Comma Separated Values. A type of database file that separates data fields with a comma.
The file extension for files created by the Mitel HTML Toolkit Packager. An SPX file consists of individual files bundled together. HTML capable phones extract the individual files which are used for branding, screen savers, and other applications. See the HTML Toolkit Developer's Guide on the Mitel eDocs website for more information.
10 Base-T or 10 BaseT. Unshielded twisted-pair, minimum Category 3, Ethernet cabling standard. The transmission rate is 10Mbps with a cabling limit of 100m from the Ethernet switch or hub. It uses two pairs of a 4 pair cable with RJ-45 connectors.
A single-line, standard DTMF telephone. This terminology is used in the United States and Canada.
3G is an ITU specification for the third generation (analog cellular was the first generation, digital PCS the second) of mobile communications technology. 3G promises increased bandwidth, up to 384 Kbps when a device is stationary or moving at pedestrian speed, 128 Kbps in a car, and 2 Mbps in fixed applications. 3G will work over wireless air interfaces such as GSM, TDMA, and CDMA.
A digital central office switching system that is typically used for \"tandem switching office\" for long distance calls. It is made by Lucent.
A switching system made by Lucent. It is typically used as an \"end office\".
A faster protocol than 802.11b, operating at 54Mb/s. 11a devices run in the 5GHz spectrum range. Until recently in the UK this band was not available for free use. The Radio Authority has just made it a licence-exempt band for limited use.
The first published standard for wireless computer networks. 802.11b devices run at 11Mb/s (11 mega-bits per second). Devices from different manufacturers using this protocol will be compatible. 802.11b operates in the 2.4GHz spectrum range and works in 11 different channels in the UK, 13 or 3 elsewhere.
Referred to as Enhanced 802.11b this is a non-standard protocol being offered by some manufacturers that works at a nominal speed of 22Mb/s.
A faster protocol than 802.11b, also operating at 54Mb/s. 11g devices run in the 2.4GHz spectrum range. 11g is likely to take over from 11b as the standard for the foreseeable future.
An IEEE standard for bridging LANs (specifically 802.3, 802.4, and 802.5 networks). 802.1D operates at the MAC layer.
This is the prioritization standard on your switch. This standard allows prioritized data such as voice packets to pass through the switch first. In the case of VoIP equipment, it will mark the data as high-priority. 802.1p supports eight classes of prioritization, each of which has to be mapped onto a hardware queue in the switch. If you are implementing VoIP then it's best to make sure that your switches support all eight classes.
The 802.1p/Q standard was introduced to standardize the various methods of priority and VLAN tagging that were introduced by different manufacturers. An extra field for VLAN identification, which includes 3 bits for priority, is inserted into the Ethernet frame.
This is the standard for virtual LANs. It inserts an extra 4-bytes in the header for designating the VLAN. The extended header also includes the 802.1p priority scheme.
The official IEEE Ethernet Standard. Ethernet is the leading LAN architecture that originally used BUS topology and CSMA/CD at 10 Mbps. Although 802.3 is not technically the same as Ethernet, the name is commonly used.
A new extended frame length for Ethernet, which includes the 802.1p/Q priority and VLAN tag.
802.3af, or Power over Ethernet, defines a way to deliver 48 volts of AC power over unshielded twisted-pair Ethernet wiring. The internal Layer 2 switch on the CX controller supports 802.3af.
An IEEE physical layer standard for a token-ring LAN access method at 4 or 16 Mbps over unshielded twisted-pair cable.
See Tip (lead).
See Analog/Digital.
Abbreviated dial gives users the ability to dial abbreviated speed call codes, which substitute for a system wide list of frequently-called numbers. These numbers can be displayed or programmed at the attendant console or the maintenance terminal.
See Average Busy Hour.
See Average Busy Season Busy Hour.
In certain call processing functions performed by the SX-200 EL/ML system, it may be necessary to suppress the onward transmission of certain digits received in a dialed sequence of digits. This digit absorption is required for applications such as DID calls and ARS purposes. See also digit modification.
An Access Point provides an interface between the wireless network and a wired network. It provides a bridge between Ethernet wired LANs and the wireless network. Access Points are the connectivity point between Ethernet wired networks and devices equipped with a wireless LAN adapter card.
See Automatic Call Distribution.
An ACD call is an incoming call destined to an ACD path of agent groups.
An ACD caller is a caller that has successfully entered an ACD path and remains in the path until the call interflows out of the path, and is transferred to an non-path destination, or to an extension that has no logged in agent.
A hot desk ACD agent can log into any hot desk enabled set and the system will apply the agent’s personal phone profile to that set. After the agent logs into the set, the agent has access to his or her own personal speed calls, features, and phone settings. If you use hot desk ACD agents in a call center, you do not have to provide agents with their own separate phones for their personal use.
An ACD path is a directory number based service that guides an incoming call through a list of ACD agent groups.
A traditional ACD agent is identified by an Agent ID that is programmed in the ACD Agent IDs form. When a traditional ACD agent logs into an ACD set, only the Class of Service (COS) and Class of Restriction (COR) that are associated with the agent’s directory number are applied to the ACD set.
ACD Express
Analog Central Office
Agent that can take ACD calls. An agent is considered \"active\" when: logged in, not in make busy, not in DND, work time is inactive, idle.
A fault condition on an IEEE 802.3 LAN in which there is more than one active route between source and destination nodes; active loops can occur when more than one bridge is attached to the same LAN.
The conversion of an analogue signal into a digital signal.
The process that automatically removes infrequently used dynamic MAC addresses after a configurable length of time. Separate ageing times can be configured for addresses associated with extensions on the central LAN and remote LANs.
A method of deciding which data packets are allowed through a device; the decision is based on the source and destination addresses on the data packet.
Protocol used for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network. The physical machine address is also known as a Media Access Control (MAC) address.
See Associated Data Line.
A voice encoding compression scheme providing digitally encoded voice at 32Kbps.
See Adoptive Differential Pulse Code Modulation.
See Asymmetric Digital Subscriber Line.
Agents answer incoming ACD calls. Agents are specially trained to deal with the caller's requests.
A call centre term, also known as Split, Gate, Queue or Skills Group. An agent group is a collection of agents who share a common set of skills, such as being able to handle customer complaints.
There are three categories of urgency of fault condition on the SX-200 EL/ML system: minor, major, and critical. Minor alarms indicate problems affecting a portion of the system, such as failure of a line or trunk circuit. Major alarms indicate problems causing a system-wide degradation of service. Critical alarms indicate serious problems that cause automatic activation of system fail transfer.
See Automatic Location Identification.
Analog Main Board
See Application Management Center.
This organization develops and publishes voluntary standards for a wide range of industries for companies based in the US.
Standard measuring gauge for conductors such as copper & aluminum. The gauge measures the thickness of the cable.
Amphenol is a manufacturer of connectors. An Amphenol connector in this documentation refers to the 25-pair connector.
A method of testing modems and data terminals in which the device is disconnected from the telephone line, and a signal is looped out through the transmit side of the device and in through the receive side. This test indicates if the problem is with the telephone line or with the modem.
The transmission of a continuously varying signal. For example, in the transmission of speech the magnitude of the signal at any instant in the transmission path is proportional to the magnitude of the original input. This type of transmission is distinct from digital transmission in which the original input is encoded (for example, CODEC) and the resulting line signal is in digital form.
Implies the transformation of analog signals (such as normal telephone speech signals) into their equivalent digital data signals. The device in general use that performs this transformation is called an A/D converter. The device that converts digital signals into their analog form (if required), is called a D/A Converter.
Analogue technology refers to an electronic transmission whereby the voice wave-form of a person having a conversation on a telephone is converted by the telephone of the calling party into an analogue electrical signal with almost exactly the same wave-form. Until recently, telecommunications systems were invariably analogue.
In analogue transmission systems, multiplexing can be achieved by a process known as frequency division multiplexing whereby information is transmitted simultaneously within different, and unique, frequency ranges over the same transmission medium.
See Automatic Number Identification.
By using the word anonymous as your user ID and your email address as the password when you log in to an FTP site, you gain limited access to public files on the remote computer. This type of access is available on many FTP sites but not all.
See American National Standards Institute.
The name of Uniform Call Distribution and Automatic Call Distribution feature packages originating on the SX-2000. The name was eventually dropped, although options in some programming forms in the System Administration Tool (e.g., Class of Service Options) still retain it.
A device to which an incoming call is directed. It usually consists of an industry-standard telephone or an attendant console. Under certain conditions an answering point may be a hunt group, a trunk, an ACD path or a device such as a night bell, an answering machine or a recorder/announcer machine.
Analog Option Board
See Application Program Interface.
Analogue Private Network Signalling System
Refers to two or more MiVoice Business systems that are grouped into a single entity at the Mitel Application Management Center for licensing purposes.
See OSI Model Layer 7
A web-based service that handles licensing of Mitel products.
A processor containing one or more application programs which meet a customer's particular needs; for example, a hospital, a governmental agency or a university environment. The processor is usually arranged to be accessed directly by an input/output device. However, it can be connected to the SX-200 EL/ML system by means of suitable interface arrangements, and therefore be capable of access by suitable input/output devices which are also connected to the SX-200 EL/ML system.
See Application Processor.
A collection of protocols, routines or tools used by programmers to develop software application programs.
A value obtained from the Mitel Application Management Center (AMC). Used to license software on a specific MiVoice Business/3300 controller.
Alternative Recording Device - An off-hook ONS port that connects to callers in a listen-only conference. The user decides what is supplied on the ONS port: silence, music, or endless loop recordings.
See Application Record ID.
See Address Resolution Protocol.
See Automatic Route Selection.
American Standard Code for Information Exchange is the code that most computers use to represent displayable characters. An ASCII file is a straightforward text file without special control characteristics. Characters consist of an 8-bit binary code and incorporated parity bits.
A DTE connection to an SX-200 EL/ML system by means of a dataset which has an associated telephone set. The user sets up a data call by dialing an access code and destination dataset number
Analog Services Unit: A component of the 3300 ICP/MiVoice Business call control platform that provides analog connectivity to the system.
When the downstream/upstream flow of data-speed is unequal.
ADSL is a switching technology used to increase transmission speed over copper cable. ADSL allows higher speed transmission downstream (1.5 Mbps - 9 Mbps), but has significantly lower speed (16 Kbps - 800 Kbps) upstream. ADSL is permanently on. ADSL allows the multiplexing of voice data over the same cable. ADSL allows a service provider to transmit data services including internet services by squeezing more data capacity through the copper wire used for telephony.
In asynchronous data transmission the time between bytes (characters) is indeterminate and depends upon external factors. The transmitted data has its own start and stop elements, and thus controls the receiving device. See also Synchronous Mode.
See Asynchronous Time Division Multiplexing.
ATM is a LAN protocol that uses cell-based packet-switching protocol for enterprise LANs. It is dedicated-connection switching technology that can support multimedia traffic (voice, video, text, data) at multi-gigabit speeds in the same transmission. ATM runs on fibre-optic or twisted pair cable. It offers universal, service-independent switching and multiplexing capabilities. ATM transports data through fixed length packets called cells. Because ATM is designed to be easily implemented by hardware (rather than software), faster processing and switching speeds are possible. These cells are easier to store and quicker to pass through the network than the variable length packets used by other LAN formats. With the capability of providing a virtual connection with bandwidth allocation as needed, ATM can deliver multi-gigabit speeds. ATM has the ability to support integrated audio, video-conferencing, three dimensional imaging, and high-definition movies in the same transmission and switching fabric that performs
Analog Toll Office trunk
Analog Tie Trunk
An attendant is also known as an operator. The person who answers a call using a telephone system console.
Attendant Busy Override is also known as Operator Intrusion. This is a feature where the attendant can, if required forcibly enter an existing telephone conversation.
Attendant consoles grouped by programming appearances of the console DNs on a console softkey.
A feature that allows an attendant to busy-out a specific station by using the attendant console. An alternative name for this features is Extension Busy-out by operator.
Australia
Any process that ensures that users are who they say they are. When you type your name and password, you are authenticated and allowed access.
The SX-200 EL/ML system can only be accessed for programming, maintenance or administration purposes by first entering an authorized access code (user name and password).
An Auto Attendant is a telephony device that uses automated prompts to ask questions of callers and then asks the caller to respond by pressing a number. The system prompts callers to respond to choices (e.g., press one for this, two for that\"). This enables the system to direct the call to the appropriate department or service area.
Auto Wrap-up is a feature of the ACD whereby the ACD will automatically put agents into After-Call Work once they have completed a call. When they have completed the required After-Call Work, they return their status to Available.
Some data communication equipment can determine, on receipt of one or more characters, the baud rate of the transmitting source. It then sets its own receive circuits to accommodate this baud rate. In the SX-200 EL/ML system this feature is applicable to datasets and to the maintenance/CDE port which automatically adjusts its baud rate to match that of the terminal during the initial setting up procedure.
An OPS Manager Feature that automatically distributes upgrades from the OPS Manager Station to the network of PBXs.
Automated Call Distribution (ACD) is a function of a telephone system that manages incoming calls and handles them based on the number called and provides associated handling instructions. An ACD is used to validate callers, make outgoing responses or calls, forward calls to the right party, allow callers to record messages, gather usage statistics and balance the use of phone lines
Also known as Callback.
The use of a database to associate a telephone number with a physical location.
ANI is a method that is used by telephone companies to identify the billing account for a toll call but is not the same as Call Line ID.
Automatic Route Selection (ARS) simplifies local and long distance dialing by automatically selecting the most convenient and cost-effective route, and by inserting and/or deleting digits for proper routing. An alternative name is Call Route Selection.
The clock hour that has the highest average business day traffic (see Busy Hour).
This is the hour calculated to have the highest average business day traffic load during the three highest traffic months of the year.
The average time a caller must wait before their call is answered by an agent.
American Wire Gauge
The B channel is the 64-K bit channel of a DNIC device. It can carry digitized voice or ASCII characters at a maximum rate of 19.2 Kb/s.
See Ring (lead).
Also known as Standby Battery.
The backbone is the main cabling of a network that all of the segments of that network connect to. Typically, the backbone is capable of carrying more information than the individual segments. For example, each segment may have a transfer rate of 10 Mbps (megabits per second), while the backbone may operate at 100 Mbps. A Backbone is also the network that interconnects other networks, employing high-speed transmission paths and often spanning a large geographic area.
A network that interconnects other networks.
A high-speed communications line to which individual components are connected.
Bandwidth determines the rate at which information can be transmitted over a computer channel, communications line, or bus. The greater the bandwidth, the greater number of megabits can be transmitted per second.
A cost saving feature that allows a device to establish a communications link to the central LAN only when bandwidth is required to transfer data. Bandwidth on demand is suitable for high speed connection of voice, data, and video services.
Bandwidth Allocation Protocol. Layer of the Point-to-Point Protocol (PPP) which simplifies the management of multiple links in data networks.
ISDN standards and specifications for provision of low-speed ISDN services. Supports two B-channels of 64Kbps each and one D-channel of 16Kbps on a single wire pair.
A method of signaling used on long lines, in which both wires use battery and ground at each end of the circuit. When signaling to the remote end of the trunk, the battery and ground connections are reversed, opposing the potentials at the remote end and increasing the current supply to the trunk.
A measure of transmission speed over an analog phone line. Often, incorrectly used as interchangeably with bit rate.
Border Gateway Protocol. A routing protocol that interconnects organizational networks and evaluates each of the possible route to find the best one.
Blocking is a process that prevents certain types of calls to be made to or from customer premise equipment. This is used to prevent callers from making long-distance calls, or accessing alternate networks or completing any non-billable calls.
Bluetooth is a wireless communications standard for short-range, slow-speed communications between electronic devices. It complements Wi-fi in that it enables connectivity of devices without cable. Bluetooth is ideal for short range exchange of communications between devices, but is not intended for full-scale wireless network computing. There are 3 power classes available, giving the following ranges: Class 3 - up to 10metres Class 2 - up to 50metres Class 1 - up to 100metres Bluetooth uses a strong 128-bit encryption scheme. It terms of speed of data transmission, it has a nominal throughput of 1Mb/s (one megabit per second), but 720kb/s is the most generally available for data transfers. When being used for voice purposes (e.g. headset for a mobile phone) it only uses 64kb/s. When a Bluetooth 'network' is established it can have a single Master device and up to 7 Slave devices. These networks are referred to as a Personal Area Network (PAN) or a 'piconet'
(Bridge Protocol Data Unit) A spanning tree protocol (STP) message unit that describes the attributes of a switch port such as its MAC address, priority and cost to reach. BPDUs enable switches that participate in a spanning tree protocol to gather information about each other.
Bits per second. Number of binary digits transmitted per second over a communications channel.
Brazil
See Basic Rate Interface.
The Basic Rate Interface (BRI) card allows the SX-200 to communicate to Central Offices and devices that support BRI. The SX-200 supports the termination and the origination of ISDN voice and data calls for trunk side and line side U interfaces. The trunk side provides Basic Call and Incoming Calling Name.The line side provides data and voice calls from BRI devices, and voice calls from sets. The BRI card provides up to 12 ISDN BRI U interfaces.
A device used to connect LANs by forwarding packets across connections at the Media Access Control (MAC) sub-layer of the data link layer of the OSI model. A bridge filters traffic by learning source MAC addresses.
See BPDU.
A device that can provide the functions of a bridge/ router or both concurrently. Bridge/ router can route one or more protocols, such as TCP/IP and/or XNS, and bridge all other traffic. Also called a brouter.
Broadband is term used to describe a telecommunications medium that provides multiple channels of data over a single communication cable. Broadband networks have the capacity to deliver services including television, video conferencing, along with high speed transmission of data, text and graphics. It implies any technology that transmits date over 1 Mbps.
A broadcast is a special message that is destined for all devices. Each device that receives the broadcast must process the message to decide whether any action needs to be taken or not. Broadcasts affect LAN performance and the devices that receive them.
A special address that is reserved for simultaneous broadcast to all stations.
A broadcast domain is the set of all devices that will receive broadcast frames originating from any device within the set. By the use of routers and/or VLANs a network can be partitioned into several different broadcast domains and broadcast traffic can be managed.
A directory number programmed to appear on multiple devices constitutes a broadcast group. There are two types of broadcast groups: Non-Prime Line and Prime Line. A Non-Prime Line group is a directory number programmed on one or more devices that is not the prime line on any device. A Prime Line group is a directory number programmed on button 0 of a phone. Server-based variants of MiVoice Business that use x86 processors, MiVoice Business for Industry Standard Servers MCD-ISS), Multi-instance MiVoice Business, and Virtual MiVoice Business, up to 250 appearances of the directory number can appear on one or more devices. For all other 3300 ICP/MiVoice Business call control platforms, up to 32 appearances of the directory number may appear on one or more devices.
See Bridge/Router.
Allows the administrator to send configuration data to a large number of devices by using range programming, the Import Spreadsheet, or other bulk provisioning facilities of the 3300 ICP/MiVoice Business call control platform.
The hour when a system carries the most traffic (the busiest hour of the busiest day of a normal week).
A device on a telephone system that has indicator lights or a display that shows which telephones in the system are in conversation, which telephones are ringing, which telephones are on hold, and which telephones are idle.
Busy Override is also known as Call Intrusion. A feature that allows a conversation at a busy station to be entered by a third party.
Busy Override Security
The fundamental unit that a computer uses in its operation. It is a group of adjacent binary digits, usually eight, often used to represent a single character.
Calibrated Flash or Timed Break Recall is produced by generating a Switchhook Flash of 24 ms or more (on an industry-standard set). Unlike alternative signaling methods, Calibrated Flash does not require the use of a third wire or second pair.
Allows extensions to call only certain numbers or groups of numbers.
Call Blending is a means to combine traditionally separate inbound and outbound calls to call centre agent groups into one group. This new group of agents will then be responsible for handling both inbound and outbound contacts. A system that is capable of call blending automatically puts agents who are making outbound calls into the inbound mode and vice versa, as necessitated by the incoming call load.
The process of routing a call to the optimum destination according to real-time conditions.
Traditionally, a call centre is a facility specifically set up to handle calls from customers or the public. The call centre is the primary telephone interface between customers and a business for specific services or for resolving issues. The facility is a structured environment whereby all calls are handled by a group of agents to handle all inbound and outbound calls. The difference between a call centre and a contact centre lies in the ability to blend together inbound communications from a variety of sources. With a call centre, you manage only one channel of contact, the telephone. The Contact Centre enables you to address multiple channels of contact; voice, web, fax and email. As each input comes into the contact centre through its individual channel, a routing decision is taken based on the subject matter. This requires e-mail messages to be analysed, and telephone integration to be used. Providing a common level of service for all channels of communication is the key difference between a call ce
See Glare
The set of criteria used by the ACD to process calls. Examples include routing criteria, overflow parameters, recorded announcements and timing thresholds.
The ACD captures and stores data on each call, include trunk used, time in queue, call duration, agent who handled the call, number dialled (for outgoing), and other information
See Call Forward.
A feature of the ACD which automatically delivers calls to available call centre agents. The agent will hear a notification that the call has arrived (e.g. a beep tone), but do not have to press a button to answer the call.
Call Forward or Call Divert is a feature that allows a user to redirect incoming calls to an alternate number.
Call Forward- Busy or Divert on Busy is a feature that allows a user to redirect incoming calls to an alternate number when the number being called is in use.
Call Forward - Follow Me or Divert all Calls is a feature that allows all incoming calls to be redirected to an alternate number.
Call Forward - No Answer or Divert on No Reply is a feature that lets a user have incoming calls redirected to an alternate answer point if the call is not answered within a set period of time.
See Hold.
See Busy Override.
Call Park or Call Storage and Retrieval is a feature that allows the attendant to place a call on Hold so that a telephone user can remotely retrieve the call.
The software package which handles all aspects of the setting up of connections within the system.
A Call Processing System provides for automated call processes such as: message delivery, store-and-forward, automated collect, dialled number screening and interconnection with other CPE systems.
See Automatic Route Selection.
For SIP calls, if the signalling portion of a call is lost the call media will be maintained until one of the parties hangs up or the session timer expires.
The CPNM is sent out on all telephone calls that are made, regardless of whether or not the calling party wants their number blocked. While the caller can block their number from being delivered to the called party, the CPNM is still delivered to the final local exchange serving the end subscriber, but the number is then blocked and the CID message marked as private.
A real-time report that can be generated to determine the number of calls received by the ACD system but have not yet been connected to a call centre agent.
Camp-on, wait-on-busy, or Call Waiting is a feature that lets a caller notify someone using their telephone that they are waiting to be connected with them. An attendant may also camp a call onto a busy station. Upon hearing the Camp-on tone, the busy party can either respond or finish the current call.
Customer Access Network - CAN Customer Access Network
A Carrier is a telephone or other service provider that sells or rents telecommunications transmission services.
See Centralized Attendant Service or Channel Associated Signaling
There are five grades of unshielded twisted-pair (UTP) cabling: Category 1: Used for voice communications Category 2: Used for data transmission up to 4 Mbps Category 3: Used in 10Base-T networks Category 4: Used in token ring networks transmitting up to 16 Mbps Category 5: Used in local-area networks transmitting at up to 100 Mbps
Industry standard for unshielded twisted pair capable of supporting voice and low-grade data traffic. Minimum requirement for 10 BaseT Ethernet.
A higher grade of unshielded twisted-pair cable available. Category 5 UTP cable is required to run Fast Ethernet.
Consultative Committee for International Telegraph and Telephone. Now known as the ITU-T (Telecommunication Standard sector of the International Telecommunications Union)
See Centum Call Seconds or Common Channel Signaling.
See Customer Data Entry (CDE).
A digital wireless standard used in radio communication for transmission between a mobile phone and a radio base station. CDMA works by converting speech into digital information, which is then transmitted as a radio signal over a wireless network. Using a unique code to distinguish each different call, CDMA enables many more people to share the airwaves at the same time - without static, cross-talk or interference. It enables the simultaneous transmission and reception of several messages. Each message has a coded identity to distinguish it from the other messages.
Cisco Discovery Protocol. A proprietary mechanism used by Cisco bridges and switches that enables connected devices to learn about each other. For more information, see the MiVoice Business Engineering Guidelines.
Cluster Element Identifier - A digit string used to identify an element in a cluster. In a cluster that is configured for the PDN feature, the CEID allows calls to be routed between the elements in the cluster. You assign unique CEID digits to each cluster element. You also assign a CEID index to each CEID. You must set up ARS to route calls between the cluster elements based on the CEID digits.
A 1- to 3-digit number from 1 to 999 that you assign to the CEID digit string of a cluster element in the Cluster Element Assignment form. You use the CEID Index number to associate the CEID string in the form with the remote directory numbers in the Remote Directory Number Assignment form.
See ATM
The local telephone company office which connects to all local loops in a given area and where circuit switching of customer lines occurs. The local telephone company office can also be referred to as the telephone exchange.
See Trunk.
One group of switchboard operators answer all incoming calls for several telephone systems at different locations.
Centrex (central office exchange service) is a service from telephone companies offered to business users so that they don't need to purchase their own telephony equipment. The switching equipment is located at the phone companies premises. The customer is spared the expense of maintaining its own PBX infrastructure). In some cases, the phone company places Centrex equipment on the customer premises. Typical Centrex service includes direct dialling inward (DDI), sharing of the same system among multiple company locations, and self-managed line allocation and cost-accounting monitoring. This allows telephones in one or more offices to be given similar features to those available through a PABX at the customer's premises. See IP Centrex.
CCS is a measured unit of traffic flow (1 CCS is 1 call occupying a channel for 100 seconds in one hour). Traffic Flow is measured in CCS when the calling rate is given as a number of call per hour, the holding time expressed in seconds and the multiple calling rate times the holding time divided by 100.
In internet commerce, a third-party (a bank or a firm such as VeriSign or DigiCert) that issues digital certificates to guarantee that the two parties to a transaction are who they claim to be. The CA authenticates a party's identity and creates encryption/decryption keys to secure communication between the parties.
Customer Emergency Service Identification. The CESID is a number that uniquely identifies the device that dialed 911. The CESID is fed into the automatic location identification (ALI) database at the Public Safety Answering Point (PSAP) so that emergency services can be dispatched to the correct location.
Call Forward No Answer.
China
Channel-associated signaling is a method in which the signaling information is transmitted over the traffic channels themselves. This type of signaling is also known as bit-stealing because certain bits in specific frames are used to provide signaling. Because these bits are \"stolen\", the customer usable data rate on each of the 24 channels is limited to 56 Kbps.
Calling Identity Delivery on Call Waiting
The CIM (Copper Interface Module) provides a copper communications link between the control cabinet and a peripheral cabinet or a PRI card bay.
A circuit is transmission path between two points in a network.
The SX-200 EL/ML system circuit switch provides a matrix of bidirectional switch links. Each circuit switch link accommodates 32 channels. Each channel can be used for a voice or data transmission. Through the circuit switch, any device can be connected to any other device in the system. It is located on the DX Module on the main control card. The number of links in the matrix depends upon the system configuration.
Circuit switching is a basic concept used by telephone networks. When a call is made between two parties, the connection is maintained for the entire duration of the call. Because you are connecting two points in both directions, the connection is called a circuit. This is the foundation of the Public Switched Telephone Network (PSTN).
Circular hunting starts at the extension after the last extension in the hunt group to which a call was completed (the extension rung), and hunts overall extensions in the hunt group in the sequence programmed. Hunting stops at the first idle extension found.
See Custom Local Area Signaling Service
A class of restriction controls station and trunk access to trunk circuits. It performs functions similar to toll control and is programmable on a station (or trunk) basis using the Class of Restriction Groups and ARS Routes forms.
A class of service has a number of different feature options assigned to it. A class of service can be allotted to one or many stations, and enables these stations to have, or be denied, features which are available within the SX-200 EL/ML system. Up to 100 classes of service are available which allow a large number of different groups of station users to be programmed, each with differing feature characteristics.
Calling Line Identification or Command Line Interface
Calling Line ID is a telephone service that transmits a caller's number to the called party's telephone during the ringing signal, or when the call is being set up but before the call is answered. Also known as Caller ID, Calling Line Indentification (CLIP), Caller Identification, and Calling Number Identification.
In Internet terms, it's an application that performs a specific function, such as Telnet or FTP i.e. it's the front-end to an Internet process. In more general terms, a client is computer system or process that requests a service of another computer system or process.
A network system design in which a processor or computer designated as a server (such as a file server or database server) provides services to other client computers.
Calling Line Identification Presentation - the presentation of the near-end device's Calling Party Number to the far end.
Refers to a grouping of systems (for example, a cluster MiVoice Business systems) that share common dialing plans, or common directory information, such as Remote Directory Numbers with Telephone Directory.
A directory number that you can call from any extension in the cluster by just dialing the number. You do not need to precede the number with the CEID digits. A cluster dialable directory number appears in the Remote Directory Number forms of the cluster elements.
A term that refers to network elements (that is, MiVoice Business systems) sharing data through the System Data Synchronization feature. Cluster Elements are network elements that are sharing data within a cluster, as well as within a network.
See Central Office or Telephone Exchange.
The location of a customer's telecommunications equipment on the premises of the ISP.
The COder-DECoder is a device used in digital switching and transmission systems, for coding analog signals (voice signals) into a digital format for onward transmission, and decoding a digital transmission to recover the original analog signal.
The CODEC/Filter chip used in the SX-200 EL/ML system consists of a CODEC, a filter and other elements. It forms part of the peripheral card, with the CODEC portion performing the necessary A/D and D/A functions and the filter portion providing low-pass filtering for the line transmission.
The Communications port on a PC, server, or workstation.
Also known as Night Bell.
A method of signaling in which signaling information relating to a multiplicity of circuits, or relating to a function for network management, is conveyed over a single channel by addressed messages.
The reduction in size of data in order to save space or transmission time. The encoding used the IP Phones to send voice to other IP Phones. When compression is enabled, an increased number of simultaneous voice calls is possible over a network without increasing the network capacity.
Adding computer intelligence to the making, receiving and managing of telephone calls.
Integrating computers with telephone and switch systems to increase the power and effectiveness of making, receiving, and managing of telephone calls. MiTAI and TAPI are examples APIs that enable CTI.
The ACD has the ability to route calls based on current conditions. It is based on \"if-then\" programming statements. To illustrate, \"if the number of calls in agent group 1 exceeds 10 and there are at least 2 available agents in group two, then route calls to group two.\"
An internally generated number that the MiVoice Business system assigns to attendant consoles. Each 2-digit ID is unique, unalterable, and viewable only from the console. The ID is displayed when the attendant parks a call.
A form of temporary hold. It is used to put a second party on hold while the first party is speaking (consulting) with a third party, or wants to temporarily isolate the second party from conversation. Also known as Soft Hold.
The card supports up to two Fiber Interfaces Module and connects them to the backplane. It has a 1 km FIM onboard and a connector to plug in a second optional FIM (either a 1 km FIM or an extended FIM).
Control over voice is used by the voice mail system to perform most of its signaling functions. A 32 kHz carrier signal is modulated according to the control function, and is transmitted to or from the voice mail system on the same pair of wires used for the audio connection. The carrier frequency lies above the normal audio range of the voice mail system and is therefore inaudible to the user.
The card supports up to three Fiber Interface Modules and connects them to the backplane. It has two 1 km FIMs onboard and a connector to plug in a third optional FIM (either a 1 km FIM or an extended FIM).
Also known as External Call Barring.
Coordinated Universal Time (UTC) is International Atomic Time (TAI) with leap seconds added periodically as required to account for the slowing of the Earth's rotation.
Class of Restriction
The minimum licensing required for every system that is sold and licensed through the Mitel Application Management Center. The Core Package tells the AMC what System Type to create on the Application Record and what licenses are included as part of the Core Package. It subsequently controls the type of licenses that can be added to the Application Record and what the license limitations (capabilities) of the Application Record are. Every Application Record on the AMC is essentially a Core Package with additional system licenses added on top of it.
Class of Service
See Control Over Voice.
See Call Processing.
Customer premises equipment is the terminal equipment used by residential and business consumer
Calling Party Number
CRC or Cyclical Redundancy Check is an error-checking measure used to ensure the accuracy of transmitting data. The transmitted message is a small integer value computed from a sequence of octets. This value is used to detect errors that result when the sequence of octets is transmitted from one machine to another.
For each alarm category, the thresholds represent the alarm level trip points; that is, the precise divisions between the alarm levels. The thresholds are simple percentages, indicating availability: the number of working devices is compared to the number of programmed devices. The Critical Alarm threshold is not a percentage, but is a precise numerical value. When the number of available devices falls below this number, a critical alarm is raised.
Also seen as Test Jack Frame. Wire terminations that are grouped together, usually identified by colour coded backboards in an equipment room providing Cross Connect capability.
Also known as Cross Connect (Jumpering in the UK).This is where the Central Office Trunks terminate on a wiring frame and the internal telephone wiring terminates on a different wiring frame and the two are linked or joined. The linking or joining is the cross connection.
Carrier Sense Multiple Access with Collision Detection. A channel access mechanism where devices waiting to transmit first check the channel for a carrier. If no carrier is sensed for some period of time, devices can transmit. If two devices transmit simultaneously, a collision occurs and is detected by all colliding devices, which subsequently delays their re-transmissions for some random length of time. CSMA/CD is used by Ethernet.
Canadian Switched Network
A method for integrating telephony systems with computers systems in order to share information and provide capabilities that neither system could provide alone, such as Automatic Data Delivery. See also TAPI
An SX-200 EL/ML system permits advanced voice features such as Calling Line ID digits and CLASS Name to accompany or precede the telephone call across multiple switches.
Customer data entry (CDE) is the process employed when data particular to a specific customer installation is entered into the SX-200 EL/ML system. This data includes such things as numbering plan, ARS routings, and trunk descriptors. CDE is entered into the SX-200 EL/ML system by the maintenance/CDE terminal.
The CESID is sent to the Public Safety Answering Point (PSAP) in the event of an Emergency Call and is used as a key in the Automatic Location Information (ALI) database to pinpoint the precise location of the caller.
(1) Telephone terminal devices, such as handsets and private branch exchanges (PBXs), located on the customer's premises. (2) Terminating equipment, such as terminals, phones, routers and modems, supplied by the phone company, installed at customer sites, and connected to the phone company network.
Refers to a method of Frame Switching where the switching device commences forwarding a frame after it has determined the destination port without waiting for the entire frame to have been received on the incoming port. Also known as on-the-fly switching.
The D Channel is the 16 K bit/s control channel of a DNIC device.
DASS is a protocol for digital signalling between digital PBXs using PCM digital public exchanges. There are two versions are available: - single channel connection using 80 Kbps links (see IDA) - multi-channel (30 channels) connection using 2.048 Mbps links
Data communication equipment (DCE) interfaces a communications line or data device to data terminal equipment (DTE) over an RS-232 line. A modem and the local maintenance port on the SX-200 EL/ML system are examples of a DCE.
A security procedure in which messages are enciphered in secret code so that only the intended receiver can read them.
See OSI Model
A cluster of elements that share database information via the System Data Synchronization (SDS) mechanism.
The part of a data station that serves as a data source, destination, or both and that provides for the data communications control function according to protocol. DTE includes computers, protocol translators, and multiplexors.
A database is a collection of data that is organized so that its contents can easily be accessed, managed, and updated. The most prevalent type of database is the relational database, a tabular database in which data is defined so that it can be reorganized and accessed in a number of different ways. A distributed database is one that can be dispersed or replicated among different points in a network. An object-oriented database is one that is congruent with the data defined in object classes and subclasses.
Standard nine-pin RS232 serial port connector.
See Data Communication Equipment.
Digital Central Office trunk
See DID (Direct Inward Dialing).
Digitally Enhanced Cordless Telephony - Digital wireless technology for telephones in businesses and in the homes, which uses TDMA to transmit radio signals to phones.
The value assigned to a particular function which most nearly represents the normal or standard value of the function. A typical default value used in the SX-200 EL/ML system, for example, is a value of 2 minutes allowed before an unanswered ringing extension times out. However this value can be changed in CDE programming from the default value to a value which lies between 1 and 30 minutes.
A TCP/IP term that is referring to the default router.
Data Entity of Interest. For the purposes of the System Admin Tool, the term is synonymous with System Admin form data, such as data from the Network Element Assignment or Shared Data Updates form.
The Designated License Manager (DLM) connects with an Application Group on the AMC in order to obtain licenses which may then be shared among the group members. The DLM also tracks license usage and violations for the group, and provides statistics to the AMC. The DLM requires a Group Application Record ID (GARID) with Enterprise License Sharing enabled.
The Desktop tool is a web-based application that enables IP phones users to assign features to the programmable keys on their phone and to manage personal contact lists.
A Device Activity Map is a SX-2000 data structure which stores the state of all call processing devices (for example, stations, trunks, DTMF receivers)
See Dynamic Host Configuration Protocol.
Trunks that connect incoming calls directly to an extension in the PBX without going through the operator. Also known as Direct Dial In Trunks (DDI) or Direct Inward Dial (DID). Seel also Non-dial in Trunks.
Dial-up or narrowband Internet access offers access speeds up to and including 128 kilobits per second (kbps).
A dialler is a device that automatically dials pre-programmed numbers to complete a call or to gain access to a network. Diallers are used by long distance resellers and other carriers. When a dialler hears a 1 before a number, it pulses access numbers and authorisation codes. While pulsing the access codes, the dialler stores the digits being dialled. It then releases the called digits to the switch for screening.
Also known as DDI (Direct Dialing Inwards). Allows an external caller to dial an internal extension without having to go through an attendant or operator.
The process of restructuring a dialed sequence of digits received by the MiVoice Business system to effectively result in a different sequence of digits. The revised sequence can have new digits added and/or digits deleted (absorbed); or certain digits in the original sequence can be repeated. This process is performed automatically by MiVoice Business and is transparent to the user. Digit modification is used in speed calling, tandeming of trunk circuits, processing incoming DID calls, processing calls in ARS, and other applications.
North American Digital Hierarchy signalling standard for transmissions at 1.544 Mbps. Supports 24 simultaneous DS-0 signals. Term often used interchangeably with T-1, although DS-1 signals may be exchanged over other transmission systems.
A term used in connection with the conversion of digital signals to equivalent analog signals. The original signals are usually in analog form and are converted from analog to digital signals for transmission (see also Analog/Digital).
Direct-in line.
A network element that is connected directly to an OPS Manager station. (Unsolicited data transfers (UDTs) are sent directly to an OPS Manager Station).
See Individual Trunk Access.
A directory server is not simply a form of database, but a specialized server for directories. A directory can be distinguished from a general-purpose database by the usage pattern. A directory contains information that is often searched but rarely modified. Host names or user names, for example, are assigned once and then looked up thousands of times. Directory servers are tuned for this type of usage, whereas relational databases are much more geared toward maintaining data that's constantly changing. Another difference is that relational databases store information in rows of tables, whereas in directory server they use object-oriented hierarchies of entries.
Direct Inward System Access (DISA) lets external callers access the system by using a special trunk. The system sees the DISA trunk as a station with its own Class of Service and Class of Restriction.
See Designated License Manager
DNIC Music On Hold/Pager Unit
A digital telephony switch manufactured by Nortel Networks.
Directory Number.
Do Not Disturb
Digital Network Interface
Digital Network Interface Card
Dialled Number Identification Service. A service that identifies the number that a caller dialled to the receiver of a call.
See Domain Name System.
Direct outward dialing.
A \"logical\" collection of computers. There are two forms of the term Domain in use. Firstly, it is used to describe a logical region of the Internet which people sometimes refer loosely as \"sites.\" And secondly a Windows NT Domain, which is a collection of computers using the same security access database. The two terms are not interchangeable.
A computer server that responds to security authentication requests (logging in, verifying permissions, etc.). The term 'domain' refers to the scope of computer resources granted to a user with the entry of a single username and password combination.
DNS is the way that Internet domain names (e.g. mycompany.com) are located and translated into IP addresses. A domain name is a meaningful and easy-to-remember \"handle\" for an Internet address. Because maintaining a central list of domain name/IP address correspondences would be impractical; the lists of domain names and IP addresses are distributed throughout the Internet in a hierarchy of authority.
Digital Private Network Signalling System; it allows for communication between PBXs, even of different makes. It supports a limited set of inter-networking facilities based on the ISDN protocol. See also: QSIG
See Digital Signal 1.
Differentiated Services Code Point. A method that attempts to guarantee quality of service on large networks by assigning priorty to traffic based on packet type (e.g., voice or data).
Digital Subscriber Line. Provides high-bandwidth information over conventional copper wiring. The four most commonly used types of DSL are: ADSL, HDSL, SDSL, and VDSL.
Digital Subscriber Line Advanced Multiplexing - A telephone network device for the reception of multiple signals from DSL customers which places the signals on a single line using multiplexing techniques.
Defense Switched Network - An information transfer network for the U.S. Department of Defense.
Digital Signal Processor. An integrated circuit which processes analog signals that have been converted into digital format.
DSR or Data Set Ready is a hardware signal defined by the RS-232C standard to indicate that the device is ready to operate.
Direct Station Selection / Busy Lamp Field. A key programmed to a set that shows the status (via an LED) of another directory number. The same key also acts as a Direct Station Select (DSS) key for dialing the associated DN.
Direct Sequence Spread Spectrum
See Data Terminal Equipment.
See Dual Tone Multi-Frequency.
Digital Toll Office trunk.
Data terminal ready RS-232 pin.
Data transceiver.
DTRX message code used to standardize messages between Mitel PBXs as well as different language text. Intelligent devices can interpret these codes.
Direct Trunk Select
Digital Tie Trunk circuit.
Dual Tone Multi Frequency : Touch tone signal which is generated to a phone company when a key on the telephone pad is pressed. The technical term describing Touch Tone dialling. Basically the combining of two tones, one low frequency and one high frequency. DTMF assigns a specific frequency, or tone, to each key so that it can easily be identified by a microprocessor.
Duplex communication means that both ends of the communication can send and receive data at the same time. Full-duplex communication is the same thing. Half duplex is also bi-directional communication but signals can only flow in one direction at a time. Simplex communication means that communication can only flow in one direction and never flow back the other way. A full duplex speakerphone allows you to hear what is going on at the other end of the line while you are talking. An ordinary telephone conversation is a duplex communication.
An abbreviation of the term digital crosspoint, the fundamental switching element of the SX-200 EL/ML circuit switch. The circuit switch is composed of a large number of digital crosspoint switch elements in the form of DX chips.
An Ethernet address that can be automatically deleted by the bridge if the bridge has not seen a packet from that address within a configurable time period (aging).
Refers to an External Hot Desk User who is also a member of a Personal Ring Group.
This is a TCP/IP protocol that automates the assignment of IP addresses of devices on a network from a central server. The DHCP server is run on the host computer and the DHCP Client is the workstation. Information given to a client includes the subnet mask, gateway address, and DNS (Domain Name Server) address.
Electronic Mail: A method by which computer users can exchange messages with each other over a network. Email is probably the most widely used communication tool on the Internet.
An email address is made up of several parts. By convention, addresses use lowercase letters with no spaces. The first part of the address, the username, identifies a unique user on a server. The @ (pronounced at) separates the username from the host name. The host name uniquely identifies the server computer and is the last part of the Internet email address.
An international numbering plan for the public switched telephone network (PSTN) in which each number contains a country code, a national destination code, and a subscriber number. There can be up to 15 digits in an E.164 number, excluding the international call prefix. Phone numbers published for use abroad usually include the country code, but show a leading plus sign (+) in lieu of any international call prefix. The + signifies that the caller should use the prefix code appropriate for their country.
A type of tie trunk. Also the signaling method used for this and for other types of trunks. The term is derived from the use of the E and M leads forming part of the trunk equipment, and taken respectively to denote the receive and transmit leads. The two leads are used to pass supervisory conditions over the trunk.
Also seen as E-1. A digital link with the capacity of transmitting 2.048 Mbps. This is the rate that European CEPT carriers transmit 30 voice or data calls at 64 Kbps plus a 64 Kbps channel for signaling and a 64Kbps channel for framing and maintenance. E1 is the European Equivalent to the North American T1 except for the extra channels.
Ethernet to TDM converter. Gateway between the traditional circuit-switched, time division multiplexed telephone systems and IP devices on the Ethernet.
This is the technique that is allows the filtering and isolation of unwanted echoes from the main transmitted signal.
A standard format for the transfer of data between different companies using networks such as the internet. EDI was meant to automate transactions between companies, but the means to implement EDI, is long, arduous, expensive and fraught with contention. With EDI, transactions are processed as a batch, meaning they are often processed once a day, or a number of times per day, introducing long delays between transaction requests.
Embedded Digital Trunk
External Hot Desk Agent
External Hot Desk User
In a network or cluster that supports Remote Directory Number (RDN) Synchronization, you can configure resilient devices from the MiVoice Business System Administration Tool. Prior to Release 9.1, you had to use OPS Manager to configure resilient devices.
Europe, Middle East and Africa
Europe, Middle East, Africa and Asia-Pacific
Embedded Mitel Express Manager
See Power Fail Transfer.
Enhanced Messaging Service - The ability to send a combination of simple melodies, pictures, sounds, animations, modified text and standard text as an integrated message for display on an EMS compliant mobile phone.
The wrapping of data in a particular protocol header. For example, Ethernet data is wrapped in a specific Ethernet header before network transit.
The basis of network security. Encryption encodes network packets to prevent anyone except the intended recipient from accessing the data.
A network node that supplies information to the network but does not receive information from the network.
Also known as Tone Transmission over External Lines.
Echo Return Loss
Erlang is a methodology used to measure voice traffic to determine the number of trunks required in a business. It measures the average activity on a line or group of lines, e.g. exchange lines, extension or operator consoles, over a period (usually an hour) and is expressed as a number of simultaneous calls. Figures are given in hours and hundredths of an hour, e.g. 4.46 Erlang = 4 hours 28 minutes of traffic. - Erlang B. Used to determine the number of trunks required to handle a known calling load during a one hour period. - Erlang C. Calculates predicted waiting times based on three things: the number of agents. the number of people waiting to be served (callers); and the average amount of time it takes to serve each person. It can also predict the resources required to keep waiting times within targeted limits. Erlang C assumes no lost calls or busy signals, so it has a tendency to overestimate staff required.
ISO abbreviation for Spain
Embedded System Management. An set of browser-based administrative tools in MiVoice Business software that includes the System Admin, Group Admin, and Desktop Tool.
A local area network (see LAN) technology used for connecting computers, printers, workstations, terminals, and servers within the same building or campus. Ethernet operates over twisted wire and over coaxial cable at speeds up to 100 Mpbs, with 1 Gbps speeds coming soon. Ethernet is a local area technology, with networks traditionally operating within a single building, connecting devices in close proximity. At most, Ethernet devices could have only a few hundred meters of cable between them, making it impractical to connect geographically dispersed locations. Modern advancements have increased these distances considerably, allowing Ethernet networks to span tens of kilometers.
See MAC address.
This is the most common Ethernet frame type used for encapsulating IP traffic. It differs from the 802.3 Ethernet type frame by having a \"Type\" field instead of the \"Length\" field.
European Telecommunications Standards Institute. ETSI was founded in 1988 to pave the way for telecommunications integration in the European Community. The main aim of the organization is to have unrestricted communication between all member states by providing essential European Standards.
See Trunk.
See station.
See Attendant Status Busy-out.
See Busy Lamp Field.
See Trunk.
Intranet that is partially accessible to authorised users from outside an organisation via valid usernames and passwords.
Feature Access Code. A special pattern of characters dialed by a telephone user to turn a feature on or off.
Feature Access Key
A protocol (T.38) used to send FAX communications over the IP network.
Federal Communications Commission. The U.S. federal agency responsible for regulating interstate and international communications by radio, television, wire, satellite, and cable.
FCS or Frame Check Sequence refers to the special bits appended to the end of a data frame for error checking. An FCS calculation involves a polynomial equation being performed on the data and address fields. FCS is typically accurate to one packet in 4 billion.
A special pattern of characters dialed by a telephone user to invoke features.
A directory number that allows DPNSS features, such as busy lamp fields, direct paging and extension paging to function across the cluster. You enter unique directory numbers in the Feature DN fields of the Cluster Element Assignment form at each element in the cluster.
The Fiber Interface Module supports the transmission of voice and data signals over fiber optic cables. The FIM plugs into the Control FIM Carrier.
A transmission medium that uses glass or plastic fibres, rather than copper wire, to transport data or voice signals. The signal is imposed on the fibre via pulses of light from a laser or a light-emitting diode (LED). Because of its high bandwidth and lack of susceptibility to interference, fibre-optic cable is used in long haul or noisy applications.
A computer that provides network stations with controlled access to sharable resources. The network operating system (NOS) is loaded on the file server and most sharable devices including disk subsystems and printers, are attached to it. The file server controls systems security and monitors station-to-station communications.
FTP or File Transfer Protocol is a TCP/IP protocol in LAN technology that is used to log on to the network, list directories, and copy files. FTP can also perform ASCII to EBCIDIC conversions.
The process used to ensure that only selected frames are forwarded.
A set of programs designed to prevent unauthorised users access to or from a private network. A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system. If an incoming packet of information is flagged by the filters, it is not allowed through. Firewalls use one or more of three methods to control traffic flowing in and out of the network: - Packet filtering - Packets (small chunks of data) are analysed against a set of filters. Packets that make it through the filters are sent to the requesting system and all others are discarded. - Proxy service - Information from the Internet is retrieved by the firewall and then sent to the requesting system and vice versa. - Stateful inspection - A method that doesn't examine the contents of each packet but instead compares certain key parts of the packet to a database of trusted information. Information travelling from inside the firewall to the outside is monito
In fixed list forms the same fields always appear on the form regardless of the element, but the data in the fields can be different. Records cannot be added or deleted from a form that is a fixed list form. The Class of Service Assignment form is an example of a fixed list form.
A feature of MiVoice Business 7.0 and MiCollab 7.0 that allows you to perform user and service provisioning for a network of MiVoice Business servers from the MiCollab User and Services application. Also synchronizes updates made to the user and services data between the MiCollab and MiVoice Business system databases using System Data Synchronization (SDS). Replaces Single Point Provisioning and Single Single Point of User Provisioning (SPUP) in earlier releases.
When the forced account code feature is entered in a station's class of service, the user at that station must dial a valid account code each time an outgoing trunk call is made. If it is not entered in a user's COS, the user is denied access to the trunk. The account code appears as part of the SMDR record.
Fully Qualified Domain Name. An unique identifier consisting of the host name (name assigned to a device on a network) and the domain name, including the top-level domain. For example, www.mitel.com is a fully qualified domain name. www is the host, mitel is the second-level domain, and.com is the top level domain.
France
A fixed block of data bits with a flag at each end to indicate the beginning and end of the frame. The defined format enables network equipment to recognize the meaning and purpose of specific bits. Also called a packet, in LAN terminology.
A high-speed transmission method, switching packets of data through its network to their destination.
Field Replaceable Unit. A term used to represent a piece of hardware that can be replaced on site by a system maintainer.
Frequency Shift Keying. A method of data transmission in which each binary state (1 and 0) is represented by a different in-band tone. FSK generators are used to generate the calling name and number data on ONS CLASS sets and LS CLASS trunks.
See File Transfer Protocol.
Full duplex communication means that both ends of the communication can send and receive signals at the same time. A telephone conversation is an example of full duplex communication. Some Ethernet devices can also run in full duplex mode when connected directly to Ethernet switches.
This Service Level indicates that the directory number (DN) is assigned to a standard user and device with full telephony functionality.
This algorithm produces telephone grade audio, especially useful in videoconferencing at aggregate bit rates above 128 Kbps. A 32- to 64-Kbps 3.4-KHz bandwidth audio coding algorithm. Part of the ITU-T codec and telephony requirements.
This is an algorithm used to compress digital audio over telephone lines and is emerging as a popular coding choice for IP Telephony.
An ADPCM compression scheme providing digitally encoded voice at 32Kbps
G.729 is an 8 kbps Conjugate-Structure Algebraic-Code-Excited Linear Prediction (CS-ACELP)speech compression algorithm approved by ITU-T. G.729 offers similar voice quality to 32Kbps Adoptive Differential Pulse Code Modulation, with moderate transmission delays. There are several revisions including G.729a and b.
See Group Application Record ID.
The 'gateway' or interface between two networks of different technology. A kind of \"go-between\" device or program that passes information between networks that normally couldn't communicate. It is also the entrance into and out of a communications network.
In resilient ACD configurations, a gateway controller is a MiVoice Business system that hosts ACD paths. It distributes calls from the CO to the ACD controller.
Connects directly to the OPS Manager station through an Ethernet LAN. Network elements can be configured to communicate with the OPS Manager station through the gateway element.
Gobal Data Model. Database framework used by SDS for storing information about users, devices, and services in a data-sharing network. Also referred to as RDN Synchronization Mode.
Gigabit
A unit of measure for memory or disk storage capacity. One Gigabyte is 1,073,741,824 bytes.
Glare or Call Collision occurs when two separate parties at either end of the telephone line seize the trunk simultaneously. Neither party will be able to complete the call.
A database created by a System Administrator or system engineer to be used by certain systems are the default backup or restore database.
A graphical (rather than textual) user interace to computer applications. GUIs usually consist of such elements as windows, dialogs, buttons, icon, and scroll bars.
General Packet Radio Service is a packet-based wireless communications service that offers data rates from 56 up to 114Kbps and continuous connection to the Internet for mobile phone and computer users.
Constellation of 24 navigation satellites used to pinpoint a user's location to an accuracy of 10-100m depending on the type of receiver used.
A particular type of trunk circuit on which a ground condition is applied to the ring lead of the trunk when an outgoing call seizes the trunk.
See Recall Button.
A particular type of trunk circuit on which a ground condition is applied to the ring lead of the trunk when an outgoing call seizes the trunk.
The Group Administration Tool is web-based application that enables administrators to configure and mange users, the system phone directory, membership in hunt and other groups, and other basic provisioning requirements.
A value obtained from the Mitel Application Management Center (AMC). Used to license software on two or more MiVoice Business systems that are grouped into a single entity on the AMC for licensing purposes.
The Silent Monitoring of telephones in an ACD Agent Group, ACD Express Group, or hunt group. Softkeys on the monitoring telephone allows the user to monitor each member of the group in turn.
A network-based application that lets users collaborate.
General Reset. A Property Management System (PMS) function that compares its check-in/check-out data with the MiVoice Business system to ensure that the data on both systems match.
Guest Services Application. An attendant console-based application used to manage guest rooms in a hotel/motel.
A technology which digitises and compresses data and transmits it at either 900 MHz or 1800MHz. GSM uses narrowband TDMA to transmit information and is the most widely used standard in the world.
Graphical User Interface.
Globally Unique Identifier.
Voice and Video standard for transmission over packet switched networks H.323 defines four major components for a network-based communications system: terminals, gateways, gatekeepers, and multipoint control units (MCU). Voice, video, and data are all supported across this common four-part architecture. - Terminals are the user endpoints on a LAN that support voice, video and data. H.323 terminals must also support H.245, which is used to broker channel usage and capabilities. Three other components are required: Q.931 for call signalling and call set-up; Registration/Admission/Status, which is used to communicate with a gatekeeper; and support for sequencing audio and video packets. - Gateways are optional in an H.323 conference. Gateways provide many services, the most common being translation between H.323 conferencing endpoints and other terminal types. Gateways are not required if connections are made to other endpoints on the same LAN. - A gatekeeper provides call control services to registered
Voice and Video standard for transmission over POTS (Plain Old Telephone Service)
Half duplex is a bidirectional communication path that signals can only flow in one direction at a time on. An ordinary telephone conversation is a duplex communication. Most inexpensive speakerphones in conference rooms are half-duplex communication.(If you're speaking, you can't hear anyone else interrupt. You have to pause to let others speak.). Basic Ethernet is the same, it can only send or receive, it can't do both at the same time.
A unit of the telephone that contains the receiver and the microphone.
The process of transferring a telephone conversation from a particular frequency in one cell to a new frequency in an adjacent cell as the user moves between cells.
The time a call centre agent spends in Talk Time and After-Call Work, handling a transaction.
A station user, or an attendant, puts another party on hold, and can perform any of the functions which are normally available at the station (as opposed to consultation hold, which restricts the functions which can be performed).
When the installation of the MiVoice Business software is complete, it generates a unique Hardware ID that includes the MAC address of the controller. The DLM uses the Hardware ID and the Application Record ID to identify itself to the AMC. Upon synchronization with the AMC, purchased software and options for the application group become available.
Hardwired implies that) pieces of equipment communicate with one another via a dedicated circuit or through a wire to which both are directly connected.
High Speed Data Link Control. A protocol defined by ISO and used in X.25 communications. It specifies an encapsulation method for data on synchronous serial data links. Many manufacturers have proprietary versions of HDLC.
High bit-rate DSL. Used for wideband digital transmission within a corporate site and between the telephone company and customer. HDSL provides equal amounts of bandwidth in each direction over two copper-twisted pairs.
The initial portion of a message, which contains any information and control codes that are not part of the text (e.g., routine, priority, message type, destination addressee and time of origination).
Cycles per second. Used to measure frequency.
Reports that track call centre and agent performance over a period of time. Historical reports are generated by ACDs. The amount of history that a system can store varies by system.
Hold lets you temporarily suspend a telephone call. While the call is on Hold, you can use other telephone features. The call can be retrieved at the telephone that placed the call on Hold or at another telephone.
A Home Area Network is a network is established within a user's home which connects communications devices within the home such as computers and printers.
The number of bridges a frame has passed through.
Any computer connected to the network that serves as a source or is the recipient of information.
The address of a host computer on the Internet.
The HOST COMMAND INTERFACE (HCI) / Computer Telephony Integration (CTI) specification is a MITEL protocol which allows integration of host computer-based applications with system-based telecommunications services.
See Host ICP
The unique name given to a device on a network used to identify it in electronic mail or other forms of electronic information interchange.
A hot desk ACD agent can log into any hot desk enabled set and the system will apply the agent’s personal phone profile to that set. After the agent logs into the set, the agent has access to his or her own personal speed calls, features, and phone settings. If you use hot desk ACD agents in a call center, you do not have to provide agents with their own separate phones for their personal use.
A device provisioning option that allows a device to service multiple users. Each user is provided with a PIN to log in to the hot desk-enabled telephone. Once logged in, the system
A system can allow maintenance or repair action to be performed without power being removed from the system first.
To exchange a component or a module in a networking device without having to turn the device off.
Handoff Services Type
See Hypertext Mark-up Language
Protocol used by the World Wide Web for defining a collection of rules for exchanging files.
Often including a switch, a hub is a central location where data arrives from different directions and is then delivered out again in different directions.
A hunt group is a group of stations to which incoming calls are directed by dialing a master number. Two types of hunting are provided by the system, circular and terminal: - Circular hunting starts at the extension after the last extension in the hunt group to which a call was completed (the extension rung), and hunts overall extensions in the hunt group in the sequence programmed. Hunting stops at the first idle extension found. - Terminal hunting starts at the first extension in the hunt group and terminates at the first idle extension found. Hunting takes place in the order in which the extensions were programmed into the hunt group.
The standard way to mark text documents for publishing on the World Wide Web. HTML is marked-up using tags surrounded by brackets.
ICMP or Internet Control Message Protocol is a protocol that generates error messages, test packets, and informational messages related to IP.
IP Communications Platform
Information and Communications Technology
See \"Initial Device Attributes.\"
A variant of the ISDN PRI signaling protocol sued in Hong Kong.
See Integrated Directory Services.
Through its members, the IEEE is a leading authority in technical areas ranging from computer engineering, biomedical technology and telecommunications, to electric power, aerospace and consumer electronics, among others.
IMAP or Internet Message Access Protocol is a mail protocol that provides management of received messages on a remote server. The user can review headers, create or delete folders/mailboxes and messages, and search contents remotely without downloading.
ISDN Maintenance & Administration Tool. A tool developed by Mitel Networks for programming ISDN onto their hardware (Network Services Unit and Peripheral Cabinet).
An element that is not connected directly to the OPS manager Station.
Also known as Direct Trunk Select.
All sets with a system type of \"IP Device Only\" have Initial Device Attributes (IDA). This restricts the sets to basic functionality (emergency and attendant calls) until someone logs in as a hot desk user or hot desk ACD agent.
A service that alerts users when friends or colleagues are on line and allows them to communicate with each other in real time through private online chat areas. With instant messaging, a user creates a list of users with whom they wish to communicate; when someone from this list is on line, the service alerts the user and enables immediate contact with the other user. Instant messaging has primarily been a proprietary service offered by AOL and MSN. Today, secure instant messaging is being targeted at businesses who are looking to employ instant messaging for presence management of communications.
IDS synchronizes user and service data between a corporate directory server and MiVoice Business IDS (or MiCollab if in the same network cluster) using the Lightweight Directory Access Protocol (LDAP). Once the data is synchronized, it is distributed from the MiVoice Business IDS to the various member elements in the SBS network or cluster.
An alternative to unified messaging for users who do not require the full functionality of unified messaging, Integrated Messaging provides users with a unified view of all message types within an e-mail client.
Set of CCITT/ITU standards for digital transmission over copper wire and other media. Two levels of service are available: Basic rate Interface, intended for the home and small enterprise and Primary Rate Interface intended for larger users. Both Services include B-channels and a single D-channel. Each B channel carries voice, data and other services. Each D channel carries the control and signaling information.
Certain interconnections between stations and trunks, and between trunk and trunk circuits, are not allowed for various reasons. These interconnections are prevented by setting appropriate parameters in the device interconnection table which is programmed as part of the SX-200 EL/ML CDE procedures. Calls made with trunk circuits are subject to the parameters in the table.
A gateway that ensures connectivity across attached networks of different natures without ensuring compatibility between applications.
A shared boundary that is defined by common physical and electrical interconnection characteristics.
Interflow is a time-based or load-based feature that takes an ACD call out of the path and routes it to the interflow answer point (if programmed). All calls that interflow lose their priority in the Queue.
The global collection of interconnected networks. The Internet uses the TCP/IP protocol suite. It's not a corporation, organization, or entity in itself, when you connect to the Internet, you become part of it. The word Internet is always capitalised.
A network-layer Internet protocol that provides message packets to report errors and other information relevant to IP packet processing.
IP is the most basic protocol used to communicate over the Internet. IP allows for a confederation of computers and networks over geographically-diverse areas to communicate with each other quickly and economically over a variety of physical links. Computers on the Internet use IP addresses to route traffic and establish connections. To simplify things, user-friendly names are used to locate sites which is possible by the Domain Name System. The Internet Protocol is commonly referred to as TCP/IP.
A collection of networks interconnected by routers that function (generally) as a single network. Sometimes called an internet, which is not to be confused with the Internet.
General term used to refer to the industry that has arisen around the problem of connecting networks together. The term can refer to products, procedures, and technologies.
Intraflow is a function of an overflow of calls in a call centre environment, When it occurs, calls flow between agent groups.
Inward Wide-Area Telephone Service. Toll-free long distance number.
An industry standard, connection-less, best-effort packet switching protocol used as the network layer in the TCP/IP Protocol Suite. A unique, 32-bit number for a specific TCP/IP host on the Internet normally printed in decimal form (for example, 192.168.3.15). Part of the TCP/IP family of protocols, it describes software that tracks the Internet address of nodes, routes outgoing messages, and recognises incoming messages.
The 32-bit address defined by the Internet Protocol. Every resource on the Internet has a unique numerical IP address, represented in dotted decimal notation. IP addresses are the closest thing the Internet has to phone numbers. When you \"call\" that number (using any number of connection methods e.g. HTTP, etc.) you get connected to the computer to which that IP address is assigned.
IP Centrex off-loads all the call management, moves, adds and changes from the user to the carrier. Instead of maintaining and managing a PBX, users pay a monthly fee to their carriers for a service that delivers similar functionality.
IP Contact Centres are an enhanced version of contact centres, based on IP Telephony. By changing to an IP-based telephone network, contact centres can move away from the \"mega-centre\" facilities approach, in favour of partially or fully distributed contact centres. With IP Telephony, your voice system becomes an application on your network which means that you can set up virtual contact centres, simply by running IP phones remotely from your main phone system, over the network to any branch office connected to your network. This means that contact -centre facilities can be set up in various locations suitable to the organisation. With IP Telephony, the contact centre can expand when the organisation sees fit and is no longer restricted by fixed physical space to do so. IP contact centres offer ease of implementation as well as flexibility which can yield a more affordable contact centre model than under a traditional fixed facility approach.
This Service Level indicates that the directory number (DN) is assigned to an unlicensed device that has only basic telephony functionality (emergency or attendant calls). The device becomes functional when a hot desk user or hot desk ACD agent logs into it.
IP Gateways bridge the gap between the traditional circuit-switched telephony world and the Internet. They convert a telephone call into IP packets or another packet-based format and route it to a gateway near its destination, which changes it back to a standard phone call.
The action of directing network traffic according to the rules of the TCP/IP protocol.
IPSec or Internet Protocol SECurity is a set of protocols for encryption of IP traffic over the Internet through virtual private networks (VPNs).
A mask is a value associated with each IP address. A mask is configured by the network manager and allows the nodes and routers to read the portion of the IP address that represents the network (subnetwork) number.
IP Telephony provides for voice communications to be delivered over the same network as data, using the data transport mechanisms associated with the Internet, called the Transmission Control Protocol/Internet Protocol (TCP/IP) suite. A separate voice network is no longer necessary with IP Telephony. Voice becomes another application on your network. Now you can truly integrate voice with your data applications. IP Telephony is not a new technology. The basic technology for using advanced packet services like frame relay, ATM and IP for transporting voice between corporate sites is several years old. The extensive deployment of IP Telephony today has been brought about by advances in network technology and deployments of new network infrastructure. The greatest challenge in implementing an IP Telephony system is meeting the very high standard set for voice quality by the traditional PSTN system. The same cannot be said about mobile phones, where inferior quality is accepted as the price of mobility. However, reliability and Quality-of-Service advances in codecs, gateways and network-planning tools have made IP Telephony truly reliable. Now voice packets can be prioritized so voice traffic is transmitted ahead of other traffic. The best way to ensure voice quality is to have enough bandwidth at the network access point. Ultimately, a robust network infrastructure capable of carrying voice traffic is required.
IP trunking lets remote PBXs connect over an IP WAN.
A standard security protocol that provides authentication and encryption over the Internet. IPSec is used predominantly in the construction of Virtual Private Networks.
The new standard protocol for the Internet, Internet Protocol version 6 (also known as IPv6), is the next step beyond IPv4, the current standard protocol for the Internet. These protocols provide IP addresses, the \"phone numbers\" for the Internet that are responsible for identifying computers and devices so they can communicate. IPv6 expands the address space on the Internet from 32 bits to 128 bits, enough for trillions upon trillions of additional addresses.
InfraRed Data Association or InfraRed Data Adaptor. The definition Infrared Data Adaptor is used by Mitel Networks as the interface between proprietary equipment and a PDA.
The link access protocol component of the IrDA communications protocol.
The Integrated Services Digital Network (ISDN) accurately transmits voice, data, and video at high speeds without a modem. The SX-200 system with LIGHTWARE 17 Release 4.0 or greater software supports voice with 3.1 kHz audio.
Commonly known as ISDN 2 which is commonly used for residential purposes or very small business customers. It enables two 64 kbp/s per channel to be transmitted. It supports both data and voice, offering two simultaneous connections (any mix of fax, voice and data). When used as a data connection, ISDN BRI can offer two independent data channels of 64kbps each, or 128kbps when combined into one connection ISDN BRI can be used for many purposes from a standard desktop or laptop PC. Applications are comparable to a modem, although there are some key advantages for ISDN, for example: - 64kbps or 128kbps Internet connection, with 1-3 second dialup - Send/Receive fax: Group 3 and Group 4 (64kbps digital) - Concurrent Internet access and phone/fax use- Telephony with multiple phone numbers - Point-to-point video conferencing ISDN BRI is ideal for remote working (telecommuting), since it gives access to most of the services available in an office including: telephony; fax; email; Internet. The fast dialup
Commonly known as ISDN 30 which is exclusively used by enterprises. It enables 30 x 64kbp/s which is equivalent to 1.92 mgbp/s. Businesses will rent ISDN lines from a carrier for voice and data. The ISDN Primary Rate Interface (or PRI) offers 30 channels (of 64kbps each), giving a total of 1920kbps. As with BRI, each channel can be connected to a different destination, or they can be combined to give a larger bandwidth. These channels, known as \"bearer\" or \"B\" channels, are at the heart of the flexibility of ISDN. Advantages of ISDN: • Dialup is fast, calls dial and connect within in 1 to 3 seconds. • It's digital. Guaranteed 64kbps bandwidth for each \"B\" channel. • It's multi-mode. A \"B\" channel can carry data, voice, fax or video. • It concentrates calls: a PRI connection can deliver 30 concurrent calls through one cable. A BRI delivers 2 calls through one cable. The ISDN Primary Rate connection is well suited for server-end or central-site tasks, where many concurrent connections or calls will be handled in one place. As well as acting as a central point for incoming connections, a server-based connection to ISDN can (at the same time) act as a Gateway offering telephony services to users on the local area network (LAN) in the office. For example, a server connected to ISDN can accept incoming faxes, and route them to individual users on the LAN: this is a growing application today, since it is convenient for users to receive fax and voicemail messages in the same way that they receive email.
International Organization for Standardization. Established in 1947 this organization is a worldwide federation of standards bodies from 130 countries. The mission of ISO is to promote the development of standardization and related activities to facilitate the international exchange of goods and services,and to developing cooperation in the spheres of intellectual, scientific, technological, and economic activity. The result is the various International Standards that are published.
The ISO (international) date format is YYYY-MM-DD. For example, August 6, 2007 is 2007-08-06 (sometimes abbreviated to 07-08-06).
ISP or Internet Service Provider is an organization that provides users with an Internet connection.
Italy.
International Telecommunications Union. An organization established by the United Nations to set telecommunications standards, allocate frequencies to various uses, and hold trade shows every four years.
Interactive Voice Response is an automated call handling system in which the caller interacts with a computer device which can interpret and react to voice or touch tone commands. The interaction can be through the use of a touch tone telephone or through speech recognition. This telephone-based application prompts the inbound caller for information using a recorded or synthesised human voice. Most IVR systems do not allow the caller to respond by voice, but require user input through touch-tone response.
An IXC is a telephone service provider that provides connections between local exchanges in different geographic areas.
An object-oriented programming language developed by Sun Microsystems. Applets written in Java include their own software players, so you can download and run them on any computer.
Jitter is the variation in delay or latency that occurs in a network. Jitter can be caused by networks experiencing congestion problems such as processor queues and bandwidth overload. Voice is particularly susceptible to jitter.
A buffer in the VoIP gateway or end point that realigns voice samples that were sent in separate packets. Jitter buffers size has to be designed carefully as it also adds to end to end latency.
A way to manually set device configuration.
See Cross Connection.
kbps or kilobits per second is a data transmission rate measured in thousands of bits per second.
A mode on Mitel sets entered using Superkey. Used to view and modify the programming of a programmable feature key. Also used to display caller information on Single, Multicall and Key System line keys with active calls.
A multiple line phone system for small business. It offers basic features and intercom. It is usually configured in a squared fashion (all lines on all sets). Some key systems may be configured in a pooled environment to emulate small PBX's. Only one member of a Key System Group can use the line at one time. See also Multicall Group.
A unit of measure or memory or disk storage capacity. One KB is 1,024 bytes.
Latin America
See Local Area Network.
A system that implements classic PBX functions over a LAN. It is able to wired over a data LAN (e.g. Ethernet) and may include IP phones and/or PC based soft phones.
Dividing LAN bandwidth into multiple independent LANs to improve performance.
The last mile is the connectivity between the enduser and the cable or telephone company.
The constant delay experienced by data traversing a network (Jitter was the variation in delay).
In a call centre environment, the experience of declining marginal improvements in service levels that can be attributed to each additional agent, as successive agents are added.
The emerging Layer 3 switching technology integrates routing with switching to yield very high routing throughput rates in the millions-of-packets-per-second range.
Logical Community of Interest. The classification of a grouping of applications or endpoints that have a common interest in a certain set of data. For example, a cluster of systems sharing call directory information is a pre-defined LCI (see glossary entry for Cluster).
LCP or Link Control Protocol is a protocol that provides a method of establishing, configuring, maintaining, and terminating a point-to-point connection.
Lightweight Directory Access Protocol is a software protocol for enabling anyone to locate organizations, individuals, and other resources such as files and devices in a network. LDAP is a \"lightweight\" (smaller amount of code) version of DAP (Directory Access Protocol), which is part of X.500, a standard for directory services in a network.
Also referred to as a private line or a tie line. A leased line is obtained from a service provider to provide a transmission medium for communications between two points. The line consists of a permanent dedicated circuit between two points, or to a set of previously arranged points. The cost of the line is commonly based on the distance between locations. This is in contrast to switched or dial-up lines, which can be connected to any point on the network.
One of the functions of automatic route selection and refers to the economical aspects of the ARS facility. In least cost routing, the trunk circuits are programmed with regard to the effects of the costs of the possible alternative trunk routings. In practice the customer may require the economical aspects to be subordinate to the overall traffic efficiency requirements of the System. For example, less costly trunk routes may be available, but offer too low a traffic grade of service for the customer's needs. Actual requirements may be subject to traffic analysis of the customer's needs.
LED or Light Emitting Diode is an indicator that emits light when an electrical current is passed through it.
The Line Interface module is an optional device that adds analog phone line (POTS) capability to a Mitel 5220 Dual Mode, 5224, 5324, 5330 or 5340 IP phone.
A link is the system connection that contains 32 channels. Each channel is a digital \"speech path\". In the SX-200 EL/ML system, there are three links per fibre connection or Bay (Node). Therefore each peripheral node has the equvalent of 3 x 32 or 96 \"speech paths\" available.
LLC or Logical Link Control is the upper portion of the data link layer, as defined in IEEE 802.2. The LLC sublayer presents a uniform interface to the user of the data link service, usually the network layer.
Link Layer Discovery Protocol. An An IEEE standard (801.1AB) that provides a vendor-neutral method for Ethernet network devices such as switches, routers and wireless LAN access points to advertise information about themselves to other nodes on the network and store the information they discover. Advertised nformation includes: device type description, boot and main revision, phone IP address, phone MAC address , duplex setting, power consumption, phone DN, attached devices, etc. The information is stored in a SNMP MIB that provides network management systems with accurate network mapping, inventory data and network troubleshooting information. For more information, see the MiVoice Business Engineering Guidelines.
LLDP-MED (ANSI/TIA-1057) is an open standard extension of the LLDP core standard (IEEE 802.1AB). The extensions provide auto-configuration and exchange of media related information, such as Voice VLAN and QoS, and are designed to provide enhanced VoIP deployment and management. For more information, see the MiVoice Business Engineering Guidelines.
A technique used by Ethernet bridges to evenly divide traffic between two channels, thus maximizing throughput.
A geographic area established for the provision and administration of communications service. It encompasses one or more designated exchanges, which are grouped to serve common social, economic, and other purposes.
A local area network (LAN) is a private, high-speed computer network used to share data, programs, or equipment such as PCs within a limited geographical area. Most LANs are confined to a single building or group of buildings. One LAN can be connected to other LANs over any distance via telephone lines and radio waves. A system of LANs connected in this way is called a wide-area network (WAN). When deploying IP Telephony over the LAN, The LAN should conform to the IEEE standard 802.1p/q. This means certain types of data packets such as voice information can be given priority across the network ahead of ordinary data packets. This is achieved using Virtual LAN's (or VLANS).
The cluster element that supports the device (that is, the device's primary controller).
A device (for example IP Phone) that an element supports is local to that cluster element
The location where the telephone company maintains its local switching equipment to serve the immediate area. The local exchange receives calls from within the local area and routes them locally or passes them to an inter-exchange carrier (IXC). The Local exchange also receives calls that originate in other areas, or from the IXC.
Refers to a member of a group, such as a clustered call pickup group or network hunt group that is being supported by the controller that you are currently logged into. A local member can be a resilient or non-resilient device.
The ability for an end user to retain their telephone number when they change service providers but remain in the same physical location.
Calls between devices that are registered to the same PBX.
A directory number that exists only in the local databases of the elements in a cluster or network. A local-only DN does not appear in the Remote Directory Assignment forms. A user on the same element can call a local-only directory number by just dialing its extension number. However, a user on a remote element cannot. To call a local-only directory number, a user on a remote element must dial the CEID digits followed by the local-only extension digits.
In a call centre environment it is the state in which agents have signed on to a system (made their presence known), but not be ready to receive calls.
Refers to the scenario where a hot desk user logs into a hot desk-enabled MiNET set where another hot desk user is already logged on. If the login is successful, the current user is automatically logged out.
A method of distributing calls to the agent who has been sitting idle the longest. With a queue, Longest Available Agent becomes the Next Available Agent.
The longest time a caller has waited in a queue, before abandoning or reaching a call centre agent.
The ability for a system or network to examine a secondary queue and evaluate the conditions, before overflowing calls from the primary queue.
In a call centre environment, Look Back Queuing refers to the ability for a system or network to look back to the primary queue after the call has been overflowed to a secondary queue, and evaluate the conditions. If the congestion clears, the call can be sent back to the initial queue.
A form of signaling used by a certain type of CO trunk which designates that type of trunk. It denotes an outgoing trunk circuit which is seized by the system placing a loop condition on the trunk.
A line on which closure between the tip (a-wire) and ring (b-wire) leads is used to originate or answer a call.
A tie trunk between PBXs which is seized by the application of a loop condition on the trunk. Subsequent supervisory conditions can be determined by the presence/absence of the loop or by battery-reversal conditions.
Malaysia
Media Access Control. Protocols used to control access to a network medium, such as a wireless LAN.
On a local area network or other network, the MAC (Media Access Control) address is your computer's or IP telephone's unique hardware number. On an Ethernet device the MAC address is hard coded into the NIC.
See Moves Adds & Changes application.
MACs in a traditional telephone environment require changes to the fixed physical environment, which often means a project must be undertaken to execute a Move, Add or Change. Some of the things that would be included under MACs include; moving a phone, number, or both, Adding voice mail or a voice menu system, Moving a data connection, Changing features on a phone, installing a new telephone line, upgrading from one phone to another, adding a new data connection, adding a new handset cord (Phone to handset)
The main distribution frame (MDF) forms the interconnection point between the in-house PBX (for example the SX-200 EL/ML system, and the internal and external cabling to the PBX. The MDF provides a convenient and flexible means of interfacing the cabling to the system.The MDF is also known as the cross-connect field.
A device (example: trunk) placed in busy state via the BUSY Maintenance command.
A term that applies broadly to tasks involving the installation, configuration, and maintenance of system hardware and software elements.
See MIB.
The Manual Ringdown (MRD) feature used with the Voice Trader Application Platform (VTAP) provides hotline-type connection without dialing between 5560IPT Turret devices.
Mitel Applications Suite
The MiVoice Business system that you use to start sharing System Data Synchronization data. The System Data Synchronization feature allows you to start sharing data from the master MiVoice Business system to the slave MiVoice Business systems. Any MiVoice Business system within a System Data Synchronization community can act as the master.
A unit of measure for memory or disk storage capacity.
Mitel Border Gateway
Mbps or Megabits per second is a data transmission rate measured in millions of bits per second.
Main Control Card.
Malicious Call Indication
See Main Distribution Frame.
Multi-device User Group
A Media Gateway acts as a translation unit, and enable communication between disparate networks: - Access media gateways connect legacy phones and PBXs to the next generation packet network - Trunk media gateways connect legacy PSTN network switches to the next generation packet network - Mobile access media gateways will enable 3G wireless clients to connect to a packet based wireless network - Mobile trunk media gateways enable a 3G wireless packet network to link to a next generation packet network
Media Gateway Control Protocol (MGCP), converts PSTN audio signals to IP data packets. MGCP is a closed, voice-only standard.
A meshed Network is a network topology in which devices are connected with many redundant interconnections between network nodes. In a true mesh topology every node has a connection to every other node in the network.
The message subsystem is one of the subsystem blocks of the SX-200 EL/ML system. Its function is to act as the main message collection and distribution facility for the system, and links the main controller with the intelligent entities at the peripheral level or below. In effect it is the \"nervous system\" of the SX-200 EL/ML system, in that it passes messages and commands between the lowest and highest levels of the system.
A MAN is a data network established for a town or city.
Megahertz. One million cycles per second.
A list of all the types of information an SNMP manager can poll a device for as well as the SNMP traps that a device may send to an SNMP manager. MIB-II is a standard MIB for use with network management protocols in TCP/IP-based networks.
Multi Instance Communications Director. Fomer name for the multi-instance version of MiVoice Business software.
The Microsoft® Office Live Communications Server (LCS) is a real-time, enterprise communications server. It provides an extensible platform to deliver presence capabilities and instant messaging to connect people, information, and processes to enable better decisions faster without the constraints of geography or time zones.
Mitel's proprietary signaling protocol used to control Mitel IP and TDM telephones.
MIS or Management Information System is a computer-based information system that integrates data from all the departments that it serves in order to provide operations and management with the information they need.
Stands for Mitel Networks Telephony Application Interface. Used by applications to communicate with Mitel PBXs.
MiVoice Business for Industry Standard Server. A version of MiVoice Business call control software that runs on industry standard servers.
The SX-200 EL/ML system caters to the use of both rotary dial and DTMF types of industry-standard telephones installed on the system.
A network of switches running different versions of call control software.
Multi-level Auto Attendant
See Multi-Level Precedence and Preemption
Mitel Mezzanine Card
MMS provides the ability to send messages comprising a combination of text, sounds, images and video to MMS capable handsets.
A MOdulator-DEModulator is a piece of Data Communications Equipment (DCE) that accepts data signals from a piece of Data Terminal Equipment (DTE) and converts them into modulated tone signals suitable for transmission over telephone lines. The DCE at the far end converts the tone signals back into data signals and sends them to its DTE. The data circuit is commonly a duplex circuit; it is capable of operation in both directions simultaneously.
Modulation is the process of translating a digital signal to a suitable analogue form.
Music on Hold
Also known as Position Monitoring or Service Observing. Monitoring is the process of listening to a call centre agent's telephone calls in order to maintain quality in delivering customer service. Monitoring can be accomplished in a number of ways: - silent: agents are not aware they are being monitored, - side by side: where the person monitoring sits next to the agent and observes calls or - record and review: calls are recorded and then later played back and assessed.
An OPS Manager application that allows the performance of programming functions that are required to move, add, change, and delete users from the network.
MP or Multilink PPP is a protocol that bundles multiple links (logical or physical) into one logical link with greater bandwidth than any of the original links. Data fragmentation in the PPP Multilink algorithm ensures optimal utilization and load- sharing of the bandwidth of both links by splitting a data frame into multiple tiny subframes and spreading them out over the physical links.
MPLS is a framework for label switching in packet switched networks. In an MPLS domain, a packet is examined. its headers are parsed, a routing decision is made, and a label is attached to it. The packet is then forwarded to the next router and the label tells the router what to do with the packet. The switching decision is made based on the label only. The router then discards the label and attaches a new label to be used by the next router. The process continues until the packet emerges at the egress point. In short, MPLS labels the packet and provides point to point delivery and provides a secure link because it authenticates at the termination point. The main benefits of MPLS are: Simplifying packet forwarding: Since the routing decision is made only once at the edge of the network, the core need to keep only minimal routing information, thus reducing the overall complexity of the network - Traffic Engineering: MPLS offers the tools to control the paths taken by different flows. Using these tools, traffic could be re-routed to avoid congestion points in a network. - Delivering Quality of Service (QoS): Using MPLS' mechanisms for traffic prioritisation and traffic path control, a service provider is able to offer different levels of service - Supporting VPNs: Since MPLS provides tunnelling of packets from any path packets emerge on a network, VPN applications that leverage MPLS can be created easily. - Security - Meshed Networking (multiple routing and resiliency)
Main processing unit. In the SX-200 EL/ML system, this refers to the 68000 CPU on the main control card.
Most Recent Known Location
MITEL Superswitch Digital Network
Mitel Standard Linux
Multiple Subscriber Number.
This Service Level indicates that the directory number (DN) is assigned to a user that has only basic telephony functionality (e.g., emergency or attendant calls) until programmed as a member of a Multi-Device user group or suite. The DN does not use an IP User License. However, the group or suite has a Multi-device Users or Multi-device Suites license which one person can use at a time in order to receive full telephony service.
A feature that supports emergency communications for the military as part of the Defense Switched Network (DSN). MLPP enables authorized users to specify a precedence level when they make a call, and to preempt calls that have a lower precedence level.
A series of applications that allow you to maintain a group of network elements from an MiVoice Business System Administration Tool session on any of the elements in the group. Multi-Node Management applications are supported for network elements that are grouped together within an SDS Administrative Group.
A line appearance type that lets multiple telephones share the same extension number. All Multicall group members can use the line simultaneously. See also Key System lines.
A technique that transmits a message to multiple recipients at the same time. Multicasting is used in teleconferencing and data communications networks.
Used to describe optical fibre that allows more than one mode of light signal transmission.
Optical fibre with a core diameter of 62.5 or 50 microns. Dispersion of light is greater than single mode fibre so distances are less.
More than one attendant console can be installed on an SX-200 EL/ML system. The trunk groups can be arranged to terminate such that they can be accessed from all of the consoles, and any call can be answered from any console.
A multiplexer is used to transmit simultaneous conversations over the same circuit, this devise connects several lines or facilities into a single pattern.
A video conference call in which more than two parties are participating.
A device which links three or more videoconference locations for fully-interactive audio, video and teleconferencing.
National ISDN-2. A specification for a \"standard\" ISDN phone line. National ISDN-2 and its precursor National ISDN -1 are intended to be a set of North American standards to which every manufacturers' equipment should conform for maximum interoperability.
North America
Narrowband or dial-up Internet access offers access speeds up to and including 128 kilobits per second (kbps).
See \"Network Address Translation\"
A group of two or more connected computers. There are a number of network types: - Local Area Networks - Wide Area Networks - Metropolitan Area Networks - Personal Area Networks - Home Area Networks
For a computer to communicate with other computers and Web servers on the Internet, it must have an IP address. An IP address is a unique 32-bit number that identifies the location of your computer on a network. An IP address is similar to a street address in that it is means to find out exactly where you are and deliver information to you. Network Address Translation allows a single device, such as a router, to act as an agent between the Internet (or \"public network\") and a local (or \"private\") network. This means that only a single, unique IP address is required to represent an entire group of computers.
(1) Systems that are managed by the OPS Manager station and connected directly to the OPS Manager station through an Ethernet LAN. (2) Elements sharing data through the System Data Synchronization feature. \"Network elements\" may apply to elements in SDS network that share at either the network or cluster scope. In other words, a cluster element is also a network element.
Network Inter-flow is the technology used in multi-site call centre environments to efficiently distribute calls between sites. Through networking sites and using ACD software, calls routed to one site may be queued simultaneously to other agent groups in other sites
A protocol used to synchronize computer systems on data networks based on UTC
Networked ACD implies that two or more ACDs are networked together to handle the overflow of calls. While the individual ACDs on the network will act as discrete systems, networked ACD enables the ACDs to work together, supporting call routing and ACD functionality between geographically dispersed call centres. This provides for seamless, simultaneous routing to multiple centres. Normally one ACD is designated as the Master ACD with the remaining ACDs acting as subordinates or slaves to the master ACD. Networked ACD is the same as a Networked Call Centre. Virtual Call Centres are distinct from Networked Call Centres and Networked ACD.
A Networked Call Centre is the same as Networked ACD.
A call distribution method within a call centre that directs calls to the next agent who becomes available. The method seeks to maintain an equal load of calls across skill groups and/or services. If a queue does not exist, the Next Available Agent function reverts to Longest Available Agent.
See Non-Facility Associated Signaling.
NIC or Network Interface Card is also known as a network adapter, a LAN Adapter, or a LAN card. Usually, a PC expansion board executes the code needed by the connected device to share a cable or some other media with other stations.
An answering point can be a night bell. Night Service lets you redirect calls to the night bell for individual trunks.
Netherlands
Network Moves Adds and Changes
NMS or Network Management System is a combination of hardware and software that allows the network manager to configure the network, perform traffic analysis, detect and correct faults, and perform regular network maintenance. NMS systems typically manage large networks containing combinations of LAN servers, concentrators, bridges, routers, and repeaters.
A connection point for two or more communications links. The node serves as the control location for forwarding data among the elements of a network or multiple networks. In some cases, it performs local processing functions. Used, along with the term \"element,\" to refer to a MiVoice Business system that is part of a network.
Inbound calls that are directed to an agent's extension, rather than to a general group. These calls may be of a personal nature or calls from customers who dial the agents' extension numbers
Trunks that carry incoming calls from the public network to a fixed answering point (console, extension or bell) in the PBX. See also Dial-in Trunks.
A term for out-of-band signaling.
In non-fixed list forms the same fields may or may not appear on the form dependingon the element. The User Authorization Profile form is an example of a form withnon-fixed fields.
Network Services Unit: Mitel term for the hardware on which a T1 or E1 trunk terminates.
See Reorder Tone.
New Zealand
An 8-bit byte.
ODBC is a standard database interface which enables interoperability between application software and ODBC-compliant databases
Off-hook occurs when the handset is lifted off the cradle.
In a call centre environment, Off-Peak is the time in which the call centre experiences a lower volume of calls that need to be answered. This is also a term to describe periods of time when long distance carriers provide lower rates.
Stations which are located at a considerable distance from the parent communication system, and require special circuit terminating arrangements at the system.
Offered calls describe the attempts callers make to reach the call centre. There are three types of offered calls: - They can get busy signals - They can be answered by the system, but hang up before reaching a call centre agent - Calls answered by a call centre agent
Measure of resistance. A resistance of one ohm allows one ampere to flow when a potential difference of one volt is applied.
See CLI
The action of placing the handset on the cradle.
Stations which are installed on the same premises as the PBX, or which can operate satisfactorily with the system when installed in adjacent premises without special circuit arrangements
See On-Premises Stations.
Out of service
Routing protocol for TCP/IP networks.
Open Source refers to software or operating systems whose source code is available for users to review and modify at will, provided they provide any modifications of that source code back to the originating developers. The Linux operating system is a prime example of open source code, Apache is another example of this.
A customer contact (transaction) that has not yet been completed or resolved (closed).
See Attendant.
See Attendant Busy Override.
See Off-Premises Stations.
OPS Manager is a telecommunications management tool developed by Mitel Networks that controls the operation and maintenance of a network of elements (PBXs).
OSI or Open System Interconnection is a set of international standards governing interconnection of multiple vendors' architecture. OSI standards are enforced by the International Organization for Standardization (ISO) and the Telecommunication Standardization Sector (TSS).
The OSI Model defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, proceeding to the bottom layer, over the channel to the next station and back up the hierarchy. The following description of the 7 Layer OSI Model is courtesy of: Bill Maples, Engineering Management, The University of Kansas February 16, 2003 source: http://emgt.ku.edu/emgt862/sessions/Maples%20TechnologyB.pptOSI 7th Layer: Application LayerThis layer provides the user with network capable applications that allow the user to send and receive data, messages and files.Analogy: James Bond meets the OSI Model 7th Floor - British Embassy: Number 1 hands James Bond a stack of top secret papers to deliver to the 7th floor of the US Embassy. James takes the elevator to the 6th floorOSI 6th Layer: Presentation LayerThis layer converts application data and graphics from user format to machine formats. Data is encrypte
An architectural framework used to describe the structure and function of data communications protocols. The model consists of the following seven layers: the physical layer, the data link layer, the network layer, the transport layer, the session layer, the presentation layer, and the application layer. Each layer represents a function performed when data is transferred between applications on a network.
An exchange access signalling feature which allows customers to exchange call control and signalling information over a communications path which is separate from the message path.
In a call centre environment, this is a function performed by call centre agents, in order to conduct telemarketing campaigns or to conduct surveys with citizens.
See Trunk.
Open Virtual Appliance (or Application) is a single file distribution of the OVF (Open Virtualization Format) file package, stored in the TAR format. See OVF for more information.
When overflow occurs in a call centre environment, calls will overflow from one group or site to another. More specifically, Intraflow occurs when calls flow between agent groups and Interflow is when calls flow out of the ACD to another site.
A feature used in the SX-200 EL/ML system when making trunk calls. It results in dial pulses (or tones) being outpulsed prior to the receipt of all required digits from the user, the purpose being to reduce the time needed to process the call.
Open Virtualization Format is a packaging standard designed to address the portability and deployment of virtualization appliances. MiVoice Business software for deployment in a VMware environment is packaged in this format. See also OVA.
Private Automatic Branch Exchange, Also seen as PBX. In North America a PABX is called a switch.
A packet is the unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network. When any file is sent from one place to another it is divided into 'Packets' of an efficient size for routing. Each of these packets is separately numbered and includes the address of the destination. When they have all arrived, they are reassembled into the original file.
Used to send and receive data packets in either ITU-T Triple-X mode (for human interpretation) or the British Telecom TPAD mode for use by an application.
The recognition and selective transmission or blocking of packets based on destination addresses or other packet contents.
Receives data packets from the network and forwards them to their destinations; during this process the syntax of each packet is checked.
Packet switching is distinct from circuit switching. While circuit switching keeps the connection open and constant, packet switching opens the connection just long enough to send a small chunk of data, called a packet, from one system to another. What happens is this: The sending computer chops data into these small packets, with an address on each one telling the network where to send them. When the receiving computer gets the packets, it reassembles them into the original data. Packet switching is very efficient. It minimises the time that a connection is maintained between two systems, which reduces the load on the network. It also releases the computers that are communicating with each other so that they can accept information from other computers as well.
See Packet Assembler and Disassembler.
The division of a LAN into two or more distinct segments joined by a bridge. Partitioning can reduce LAN media loading by localizing traffic and increase reliability by isolating LAN segments.
PAP or Password Authentication Protocol is an authentication phase that PPP calls must go through. In PAP, the ID and the Password pair is sent repeatedly by the user to the authenticator until authentication is acknowledged or the connection is terminated.
A hardware unit containing port locations in an electrical or communications system.
Printed Circuit Board.
See Pulse Code Modulation.
A PCMCIA card is used to add features to laptop computers, hand-held computers, and desktop computers.
A PDA refers to a small hand-held device that provides computing and data storage capabilities. PDAs include the HP iPAQ, Palm Pilot and the BlackBerry.
See Portable Directory Group.
In a call centre environment, this is an event which occurs where a surge of call traffic is experienced beyond random variation. It is a spike within a short period of time.
Either end of a point-to-point connection.
A Peer to Peer network is a computing system set up in which all computers on the network are treated in the same way on the network. Computers on a peer to peer network may share hard drives, CD-ROM drives, and other storage devices with the other computers on the network. This is distinct from a a client/server relationship whereby most computers (clients) share resources from the server. P2P is commonly used to obtain freeware, shareware, and sometimes bootleg software. Peer to Peer often use websites to act clearinghouses which list people with computers who have or want something. Napster is the most famous of P2P exchanges. In some cases, P2P exchanges require a \"client\" program, to perform downloads.
PAN is also known as piconet. Small devices such as mobiles, printers and PDAs can exchange data wirelessly within the physical limits of someone's personal space. A PAN Allows devices to work together and share information and services. Using Bluetooth wireless technology, it offers the ability to wirelessly synchronise your desktop to your PDA to access your e-mail.
A non-prime line appearing on only one set.
Per-Hop-Behaviour. Used for differentiated services.
See OSI Model Layer 1
Personal Identification Number. Allows a user to log into a set as a hot desk user or generic SIP user. It can also used to activate the Phone Lock feature. PINs must be from 0 to 8 digits in length. Only digits (0 to 9) are permitted.
PING or Packet INternet Gopher is a useful internetworking debug and diagnostic program. When trying to determine the accessibility of a device (a router or even a PC), a PING is sent to the IP address of that device. The sender then waits for a response and reports the success or failure of the operation.
Programmable Key Module
Physical location ID. Four digits identifying the cabinet number, shelf number, slot number and circuit number.
Phase-Locked Loop. An electronic circuit used to control the clock frequency of a computer.
Property Management System
See Primary Node Identifier.
A POP is an access point to the Internet. ISPs have typically multiple POPs. A point of presence is a physical location that houses servers, routers, ATM switches and digital/analogue call aggregators.
POP3 is a client-side mail protocol designed to facilitate offline operation. Messages are downloaded to the client and manipulated there.
The access point in a computer or switching system that enables a system to exchange data with external devises.
A group of network elements (PBXs) which share a common telephone directory where the extension numbers are not restricted by the PBX to which they are connected. A user can keep his/her extension number when moving from system to another.
A Portal is a Web site that acts as a first port of call to users looking for information. It offers services such as a directory to relevant sites, possibly a search engine, and other services.
Plain Old Telephone Service. This refers to the standard telephone service that is used in most homes. Higher speed, enhanced services such as ISDN are not POTS. The main distinctions between POTS and non-POTS services are speed and bandwidth. POTS is generally restricted to about 52 Kbps (52,000 bits per second).
Power dialling is a tool used for outbound dialling in a call centre environment. The system automatically dials the number after a set amount of time. You define the amount of time before dialling when setting up the outbound calling campaign.
Also known as emergency switching. This is a feature that ensures that external trunks are connected to several single line telephones in the event that the power fails on the telephone system. As the trunks have their own power source the single line telephones are still able to function.
With PoE, a single cable is used to supply power and data connectivity. Power-sourcing equipment injects electrical current into the data cable.
Variants of MiVoice Business that use PowerPC processors--MX, MXe, CX, CXi, and AX. See also x86 platforms.
PPP or Point-to-Point Protocol is a communications protocol that allows a computer to use TCP/IP with a standard telephone line and a high-speed modem. PPP is a new standard that replaces SLIP. It can also run on any full-duplex link from dial-up to high-speed DS1 and DS3 lines.
PPPoE or Point-to-Point Protocol over Ethernet is an access control method that allows remote hosts to log on and off using a simulated dial-up connection. PPPoE is typically offered by cable and DSL Internet service providers.
PPTP or Point to Point Tunneling Protocol encapsulates data sent over the Internet within a virtual private network (VPN).
The Multi-Level Precedence and Preemption (MLPP) feature enables authorized users to specify a precedence level when they make a call, and to preempt calls that have a lower precedence level.
Predictive Dialling is a call centre tool whereby the system automatically places outbound calls and delivers answered calls to call centre agents. When the system detects busy signals, answering machines, or when the call is not answered, the system returns the number to the queue.
Presence based management is new concept whereby users can be managed based on user presence. Presence is defined as the willingness and ability of a user to communicate with other users on the network.
See OSI Model
When using preview dialling, an agent receives the customer data on their computer screen and reviews the data on the screen to determine the nature of the call to be made. The agent instructs the system to make the call once they are ready.
Personal Ring Groups are an association of two or more single-user devices under a single Directory Number (DN). The devices ring simultaneously (Ring All) when called.
See Primary Rate Interface.
The PRI Gateway is an interface that can include the ISDN Network Gateway, the PRI cards and the Ipera 2000 interfaces.
Primary Integrated Communications Platform (ICP) is the primary controller of a particular device
A digit string that identifies a network element or a cluster within a network. Automatic Route Selection for the network is set up to route calls to the network elements based on the PNIs. Note that in a single standalone cluster, you do not need to assign PNIs to the cluster members.
The PRI (Primary Rate Interface) card provides SX-200 systems with two links of Primary Rate Access (PRA) to the ISDN service provider. This PRI connection supports the simultaneous transmission of voice and data. Each channel is capable of transmitting voice or data calls at 64 kbps. By interfacing the SX-200 switch with the ISDN service provider, it allows SX-200 users to access ISDN services, such as Direct Dial In (DDI), Calling Line Identification (CLID), and Call By Call Service Selection (CBC).
Refers to the directory number acting as the pilot number for a Ring Group or Multi-device User Group. Dialing the pilot number rings the group members. Other group members are referred to as non-prime members.
A PBX (private branch exchange/ private automatic exchange) is a telephone system within an enterprise that switches calls between enterprise users on local lines while allowing all users to share a certain number of external phone lines. The PBX encompasses a wide variety of equipment that provide intra-premises telephone service as well as access to public telephone networks. The main purpose of a PBX is to save the cost of requiring a line for each user to the local exchange. The PBX is owned and operated by the enterprise rather than the telephone company (which may be a supplier or service provider, however). Private branch exchanges used analogue technology originally.A PBX includes: - Telephone trunk (multiple phone) lines that terminate at the PBX - A computer that manages the switching of the calls within the PBX and in and out of it - The network of lines within the PBX - Usually a console or switchboard for a human operator In some situations, alternatives to a PBX include Centrex service (in which a pool of lines are rented at the phone company's central office), and key telephone systems.
A network designed for the exclusive use of an enterprise or a group of organisations. It can be regional, national or international in scope.
In networking, the term protocol refers to a set of rules that govern communications. Protocols are to computers what language is to humans. For two devices on a network to successfully communicate, they must both understand the same language, or protocols.
A feature available in some network bridges in which the bridge can be programmed to automatically forward or reject transmissions associated with specified protocols.
A process in which the bridge orders a WAN output queue in order of priorities, based on protocol types.
Proxy Address Resolution Protocol. A simulation of the ARP protocol used by hosts that do not support IP subnet routing, but have an interface on a subnetted network.
See Public Safety Answering Point.
Public Switched Telephone Network. The worldwide analog voice network accessible to all those with telephones and access privileges.
Portugal
The party responsible for answering the 911 call and arranging the appropriate emergency response, such as sending police, fire, or ambulance teams.
The PSTN is collection of interconnected telephone network systems operated by the various telephone companies around the world to provide communications locally, regionally, nationally and internationally. The PSTN started as analogue circuit switching systems that were manually operated. It then progressed through electromechanical switches. This has almost completely been made digital, except for the final connection to the end-user (the \"last mile\"): The signal received by the end user is analogue. It is usually transmitted over a twisted pair cable and is still an analogue signal. This analogue signal is then digitised. At the receiving end the channels are separated, the digital signals are converted back to analogue and delivered to the received phone.
A System Data Synchronization-specific term denoting the process through which one network element integrates (\"pulls\") another element into a given data-sharing network or cluster.
A technique for converting an analog voice signal to digital format. Requires sampling the analog signal 8 thousand times per second and converting the sample to an 8-bit value. Hence, PCM requires a 64Kbps digital channel to carry one voice connection.
Quality of Service. The performance of a communications channel or system is usually expressed in terms of QoS. The QoS will relate to the type of system. SNR (Signal to Noise Ratio), BER (Bit Error Ratio), maximum and mean throughput rate, reliably, priority and other factors specific to each service.
The Q reference point Signalling System is a signalling system to enable communications between PBXs. It replaces traditional analogue signalling between a PBX (Private Automatic Branch Exchange) on one site and a PABX on another site. See also: DPNSS
Quantitative Forecasting is a call centre tool based on statistical techniques to forecast future events. Time Series and Explanatory approaches are two main methods of quantitative forecasting. Time Series techniques use past trends to forecast future events. Explanatory techniques attempt to link two or more variables.
A Recorded Announcement Device (RAD) is a device which automatically answers a call and delivers a pre-recorded message. RAD is often used to inform a caller that they are in a queue and their call will be dealt in due order.
Random Access Memory. Dynamic volatile memory in computing type devices. If power is lost the contents of the RAM are also lost.
Remote Access Server. Remote access is the ability to access a computer or network from a remote location. A remote access server is the computer and associated software that is set up to handle users seeking access remotely.
A method that uses the System Data Synchronization feature to distribute directory changes throughout a network or cluster. Such changes were handled by OPS Manager until MCD 4.0 when the option of using SDS was introduced. As of MCD 4.1, SDS is the only way to synchronize directories.
Readerboards are also known as displayboards or wall displays. It is a physical visual displayboard used in call centres, it is usually mounted on the wall or ceiling, and provides real-time and historical information on queue conditions, agent status and call centre performance.
A PABX feature which determines the actual cost of any particular call made by a person from his or her telephone extension.
Real Time Event (RTE) records are used to monitor activities of ACD agents, such as logins/logouts, call answers, call orginations, call holds, abandoned calls. etc.
The ability to make adjustments to staffing and thresholds in the systems and network, in response to
This refers to the push-button installed on certain types of industry-standard telephones, for the purpose of providing a ground condition to the line when the button is pressed. When used in conjunction with the SX-200 EL/ML system, pressing the Recall button corresponds to a switch hook flash; for example, when a party is being placed on hold. The button is sometimes referred to as the ground button.
A type of ISDN message on outbound calls that provides the carrier with both the Billing Telephone Number (BTN) and the original Caller ID. Carriers often require both before accepting the call. MiVoice Business does not support this feature.
Redundancy implies that there two types of every network element-one device is in use while the second device sits in reserve or on a shelf. Redundant network elements can increase network complexity and can be expensive to implement. Network designs that incorporate complete redundancy of switches and routers are expensive and needlessly increase the complexity of maintaining the network. Large numbers of connections and hardware sit dormant while waiting for a failure to occur.
The directory number (DN) of a phone that is provisioned for Hot Desk use. Not to be confused with the Login DN which the user enters to log in to the hot desk phone.
A location for a DCE device that is not at the central or control site. A typical application would have a terminal at the remote site and the host computer at the central or control site.
The devices in a cluster that are not supported by a given element (that is, the devices that are supported by other elements in the cluster) are considered to be remote to that element. At each cluster element, you must assign the devices that are remote to that element with the CEID index of its local cluster element. You assign CEID indexes in the Cluster Element Assignment form. The Remote Directory Number Assignment form lists the portable directory numbers of all the remote devices in the cluster.
A test that checks the telephone link and the transmitter and receiver of a remote modem.
Local directory numbers are hosted on the element that you are logged into while remote directory numbers are hosted on another element in the cluster. Users can call remote directory numbers from any extension in the cluster by just dialing the number. The Remote Directory Number Assignment form lists the remote directory numbers in a cluster network. The Remote Directory Number assignment forms of the cluster elements are updated via OPS Manager synchronizations or via Remote Directory Number Synchronization.
You can migrate a network or cluster of 3300 ICPs to support the synchronization of remote telephone directory entries across all the element databases. If you migrate a network or cluster to support Remote Directory Number (RDN) Synchronization, any telephone directory entries that you add, modify, or delete at an element are automatically distributed as shared data updates to the other elements in the network or cluster via System Data Synchronization (SDS). RDN Synchronization is a pre-requisite for Embedded Resilient Device Support.
A communications networks that lies outside the geographical area of a central LAN but is connected to it through a communications network.
Refers to a member of a group, such as a clustered call pickup group or network hunt group that is being supported by a remote controller. The local controller is the controller that you are currently logged into, a remote controller is any other controller in the network in relation to the local controller. A remote member can be a resilient or non-resilient device.
Also known as Number Unobtainable Tone. In North America this tone sounds like a busy signal but is twice as fast. The tone is applied 120 times per minute. This tone means any of the following: all switching paths are busy, all toll trunks are busy, equipment blockages, or the caller dialed incorrectly. In the UK there are different tones. A long flat tone indicates that the number has been incorrectly dialed or the number is not in service. A busy signal that has one tone louder than the other indicates all toll trunks are busy, equipment blockages, or all switching paths are busy.
Resilient networks are made up of network elements that provide reliable fail-over mechanisms-either within the device or through working in conjunction with other network elements in order to ensure that all network devices can be used simultaneously. In this way the failure of one device will not bring down the entire network, thereby eliminating single points of failure on the network. A truly resilient network will provide the maximum amount of network uptime without requiring an entire duplicate network.
A directory number provisioned with a secondary host for the purposes of ensuring continued service in the event of a failure on the primary host.
Also known as Call Barring.
The second wire of a telephone pair, originally named because it was connected to the \"ring\" of a telephone plug. The first wire (called the tip lead) was connected to the tip of the plug.
Standard 4-wire connectors for phone lines.
Standard 8-wire connectors for Ethernet Networks.
A standard MIB defined in RFC 1271 to allow remote monitoring of networked devices.
See Redirecting Number Information Element (RNIE).
A system administration policy that permits unrestricted access to the MiVoice Business System Administration Tool. Only users logged in to the tool as the Root Administrator have read/write access to all forms and can grant tool access to other users.
A special-purpose dedicated computer that attaches to two or more networks and route packets from one network to the other. Routers forward packets to other routers until they can be delivered to the final destination directly across one physical network. Forwarding decisions are made based on network layer information and routing tables, often constructed by routing protocols. A router is an OSI Layer 3 device that can decide which of several paths network traffic will follow based on some optimality metric.
The process of determining and prescribing the path or method to be used for establishing telephone connections or forwarding messages.
RIP is the most common routing protocol. RIP uses hop count as a routing metric. The largest allowable hop count for RIP is 16.
A North American data interchange standard, issued by the Electronics Industries Association (EIA). The equivalent European standard is the V.24 specification.
1. Real Time Clock. 2. Real Time Complex. The RTC is a card that is used for the IP phones signaling, and for the ESM, DHCP, FTP and TFTP servers, among others. Call progress, device status and screen updated messages are sent between the IP Phones and the RTC.
Real Time Control Protocol.
See Real Time Events.
Real-time Transport Protocol. A standardized packet format for delivering audio and video over IP networks.
RTS or Request To Send is a hardware signal defined by the RS-232C standard to request permission to transmit.
RXD or Receiving data is a hardware signal defined by the RS-232C standard to transport information from one device to another.
Switch Application Communications (SAC) protocol. A messaging protocol used by IP phones to support graphics-based software applications on the MiVoice Business system. List of SAC sets supported by MiVoice Business 8.0: 5240, 5304, 5312, 5320, 5320e, 5324, 5330, 5330e, 5340, 5340e, 5360, 5560 IPT, Navigator, WebSet (5140 or 5240). NOTE: The 5240 and WebSet are no longer supported.
A 4-wire connection which enables data communication between the devices on a network.
A call centre system function that enables a supervisor to remotely monitor call centre agent's activity on a computer screen.
A screen pop is a CTI application that enables a computer system to display information related to am incoming caller onto a call centre agent's computer screen. This information is delivered at the same time as the call arrives at the agent's desk. Callers' records are automatically retrieved and displayed from the relevant database onto the call centre agents computer screen. The information is based on the caller's CLI and delivered to call centre agents, along with the calls.
Session Description Protocol
Synchronous Dynamic Random Access Memory. This is the general name for types of Dynamic Random Access Memory (DRAM) which are synchronised with the clock speed that the microprocessor is set up for.
See System Data Synchronization.
System Data Synchronization - Common Component. Software that extends the SDS infrastructure to network elements besides MiVoice Business systems allowing them to share data with each other. SDS-CC can be run as a standalone application or as an integrated component of Mitel Enterprise Manager, Open Integration Gateway (OIG), and Mitel Standard Linux (MSL).
Symmetric DSL. This is similar to HDSL using a single twisted-pair line; the line carries 2.048 Mbps in both directions.
A user making a trunk call through a system usually receives dial tone after the handset is removed, and then dial tone from the CO after the trunk access code has been dialed. However, the ARS feature of the SX-200 EL/ML system would mask the CO dial tone, because the outpulsing sequences are isolated from the user. To prevent confusion a second dial tone can be provided to the user by the SX-200 EL/ML system (as a programmable option) at the appropriate point in the outpulsing sequence.
The Secondary Integrated Communications Platform (ICP) is the secondary, or emergency, controller of a particular device
Defines a profile that can be used to provide encyrption, message authentication and integrity, and protection from replay attacks to the RTP data for audio and video streams
A command interface and protocol that is UNIX-based and allows secure access to a remote computer.
A technology that works at the transport layer that does authentication and encryption between a Web server and a Web browser.
A network in which only one data circuit is installed. Groups of eight bits are sent serially, one after another over the same wire.
A computer that provides resources, such as files or other information. Common servers include file servers and name servers.
MLPP subscribers reside in Service Domains. A Service Domain is an arbitrary division of switching resources among sets of users. Users in different Service Domains can call each other so long as resources are available. However, only users in the same Service Domain can preempt resources. You define Service Domains in the MLPP Assignment form.
Defines the features and licensing characteristics for a directory number. The following service levels are available: Full (standard user and device), IP Device Only (limited function device), Trusted (certified Mitel application), and Multi-device (member of a multi-device user group or suite).
SIP is an ASCII-character-based signaling protocol designed for real-time transmission using Voice over IP (VoIP). The appeal of SIP is the promise of interoperability of telephones from propriety PBXs. SIP extends the foundation of open-standards from the Internet to messaging, enabling disparate computers, phones, televisions and software to communicate. SIP is a streamlined protocol, developed specifically for IP telephony. It is smaller and more efficient than H.323. SIP takes advantage of existing protocols to handle certain parts of the process. For example, Media Gateway Control Protocol (MGCP) is used by SIP to establish a gateway to connect to the PSTN system. SIP operates independently of the underlying network transport protocol and is indifferent to media. Instead, it defines how one or more participant's end devices can create, modify and terminate a connection whether the content is voice, video, data or Web-based. Using SIP, programmers can add new fragments of information to messages without compromising connections.
See Layer 5 OSI Model
An SDS feature that allows you to maintain consistent system form data in a cluster by sharing data updates among the cluster elements. After sharing is enabled, the data that you identified in the Shared Forms Configuration form will be shared among the selected elements. Then, if a record is added or modified in a shared form of one of the cluster elements, the update will be made automatically in the databases of the other cluster elements.
Conventional CSMA/CD Ethernet configuration to which all stations are attached by a hub and share 10 or 100Mbps of bandwidth. Only one session can transmit at a time. All shared Ethernet is half-duplex
Signalling is the process whereby in telephony, information is passed between users to organise, control and terminates calls.
Signalling Systems are used within a telecommunications network of exchanges, whereby telephones inform telephone exchanges, and telephone exchanges inform each other, of the important features of each telephone call.
Commonly referred to as a SIM or 'smart' card. A SIM card is the part of a mobile phone that contains information about the subscriber, such as personal phone numbers and service details. Through use of the SIM calls can be made from any valid mobile phone, as it is the SIM card that contains subscriber details and not the mobile phone.
SIMPLE is protocol meant to bring interoperability to instant-messaging networks. It's based on SIP.
TCP/IP protocol for sending e-mail from one server to another.
See SNMP.
SNMP or Simple Network Management Protocol is a multivendor transport layer network management protocol used to manage bridges, routers, and concentrators.
A simpler form of NTP that can be used to synchronize time for applications and embedded devices
Simplex communication means that communication can only flow in one direction and can not flow back the other way. See Full Duplex.
Single Point of User Provisioning: A pre-MiCollab Release 7.0 feature that allows an administrator to perform user and service provisioning for a cluster of MiVoice Business elements from a single administration interface (that being the MiCollab Users and Services application). SPUP synchronizes updates made between the MiCollab and MiVoice system databases using System Data Synchronization (SDS). The following data is synchronized: - user and services data - Programmable Ring Groups (PRGs) - Multi-Device User Groups - roles, and - templates.
Single Point Provisioning: A pre-MiCollab Release 6.0 feature that allowed an administrator to perform user and service provisioning for a MiVoice Business platform from a single interface, the MiCollab Users and Services application. SPP uses MiMXL to apply updates to the MiVoice Platform. Updates made on the MiVoice Office are not distributed back to the MiCollab. SPP is not supported in MiCollab Release 6.0; SPUP is supported instead.
SIP peers are SIP-enabled devices or applications that provide telephony communications between the MiVoice Business system and callers.
A SIP URI is a complete SIP address (also called a SIP identity) consisting of a SIP number and a SIP service domain. A mechanism called the Uniform Resource Identifier (URI) establishes a common addressing scheme for all of an individual's user agents (UAs). The format of a URI address follows the same basic format as a Web or email address: contact-address@domain. An example of a SIP URI is: sip:408-555-1212@company.com.
Supplementary Information String.
An ACD capability that matches a caller's specific needs with an agent who is equipped with the skills to handle that call, on a real-time basis.
In a cluster that is configured with the System Data Synchronization feature, the master (local) controller starts sharing system and device data with the remote (slave) controllers.
Small electronic device, about the size of a credit card, with electronic memory used to store information.
See Station Message Detail Recording.
SMS is a service for sending messages of up to 160 characters to mobile phones that use GSM. SMS messages do not require the mobile phone to be active and within range and will be held for a number of days until the phone is active and within range. SMS messages are transmitted within the same cell or to anyone with roaming service capability. They can also be sent to digital phones from a Web site equipped with PC Link or from one digital phone to another.
See Simple Mail Transfer Protocol
See Subnetwork Access Protocol.
Simple Mail Transfer Protocol. The network management protocol of choice for monitoring and management of TCP/IP based networks.
SOAP is a methodology used to allow a program running in one operating system (such as Windows 2000) to communicate with a program in the same or another type an operating system (ie: Linux) by using HTTP and its XML as the mechanisms for information exchange.
See Consultation Hold.
A PC or similar device that emulates a telephone on a PBX. The voice conversation can be transmitted using the PCs sound card or using a single line analog telephone.
A key on a phone that changes function based on state of the call you are handling or the feature you are using.
A softswitch is a server that controls voice phone calls across circuit- and packet-switched networks
STP or Spanning Tree Protocol is an algorithm specified in the IEEE 802.3 standard to manage multiple links within a LAN. The Spanning Tree Algorithm allows the use of redundant links within the same network without creating active loops.
Speaker verification is a security mechanism whereby access to a system is limited to a specific speaker and the voice pattern must be verified before the system will be engaged. It verifies your voice (how you say something), rather than your speech (what you say). Unless you verify your voice, you will not be able to access the system.
Speech recognition implies that the system recognises the spoken word and is not limited to a specific voice to operate, nor does it need to be trained first (i.e. like the PC tools). In a nutshell, speech recognition enables anybody to access the system.
Speed Dialling enables users to call specific numbers by depressing a single, pre-programmed key, or dialling a special short number, such as #1 rather than the full telephone number.
Service Profile Identifier.
A device that splits and reassembles telephone signals from different frequencies.
Single Point of User Provisioning. A feature introduced in Mitel Communications Director 6.0 and Mitel Applications Server 5.0 that facilitates the task of provisioning users with phone and application services.
See Secure Shell.
Secure Sockets Layer, a global standard security technology that enables encrypted communication between a web browser and a web server.
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are protocols that ensures privacy and data integrity between client/server applications communicating over the Internet. Although their differences are minor, SSL and TLS do not interoperate
A network element that is not included in the cluster.
Refers to the non-mobile ACD agent. A standard agent uses an ACD-enabled set provisioned in the User and Services Configuration form and is identified by an ID programmed in the ACD Agent IDs form. It carries with it specific COS and COR values that are used instead of the set's on which it is logged in. In contrast, a Hot Desk ACD agent carries with it an entire user profile. When a Hot Desk ACD agent logs into a set, the set's Registration DN goes out-of-service, and the set re-registers with the Hot Desk agent's DN.
An entry defined in a routing table that never changes or expires. A static route entry will contain the target address, the next hop router address on the way to that target, and a value assigned to the entry indicating how it rates compared to other routes to the same target.
Also called extension. A station is the name for a telephone that is connected internally to a PBX or key system.
Station message detail recording (SMDR) records and prints out the details of incoming and outgoing trunk calls. Such details include the numbers of all parties involved in the call, the time and duration of each call, account codes and other pertinent details.
SMDA processes data collected on trunk calls for billing and evaluating purposes. SMDA works by accumulating meter pulses that can be read, printed, and cleared from a console.
A process used by Smart Phones and call processing systems wherein the unit simulates a Local Exchange in processing calling cards, collect, and third party billing calls. The smart phone stores the billing information for later retrieval and then dials and completes the call as a direct-dial call.
Spanning Tree Protocol. An algorithm specified in the IEEE 802.3 standard to manage multiple links within a LAN. The Spanning Tree Algorithm allows the use of redundant links within the same network without creating active loops. For more information, see the MiVoice Business Engineering Guidelines.
Shared Telephone Service.
Found in larger networks, these smaller networks are used to simplify addressing between numerous computers. Subnets connect to the central network through a router, hub or gateway. A wireless LAN will probably use the same subnet for all the local computers it talks to. Subnetting is a technique used by a network administrator to subdivide a network into smaller networks using the same network number assignment. The reasons for doing so include: - Simplified administration- subnets can managed more independently and efficiently. - Restructuring the internal network without impacting external networks - Improved security - separate internal networks are not visible to external networks. - Isolation of network traffic - subnetting can minimise network traffic See also: DHCP
An extension of the IP addressing scheme that allows a site to use a single IP address for multiple physical addresses. Outside of the site, routing continues as usual by dividing the destination address into an Internet portion and a local portion. Gateways and hosts inside the site interpret the local portion of the address by dividing it into a physical network portion and a host portion.
A bit mask used to identify which bits in an IP address correspond to the network address and subnet portions of the address. This mask is referred to as the subnet mask because the network portion of the address can be determined by the class inherent to an IP address. The subnet mask has the digit '1' in positions corresponding to the network and subnet numbers and the digit '0' in the host number positions.
SNAP or Subnetwork Access Protocol is an extension of the IEEE 802.2 LLC header used to encapsulate IP datagrams and ARP requests and replies within an 802.X (802.3, 802.4, or 802.5) frame.
D4 format employs a \"Superframe\" consisting of 12 frames of 193 bits each (2316 bits total). In each frame, one framing bit is followed by 24 8-bit bytes. The pattern of framing bits is repeated every Superframe. Framing requires 8Kbps, leaving 1.536Mbps for user information.
Supervisors normally oversee ACD operation by monitoring agent activity, reassigning agents to handle overload conditions, and dealing with any unusual situations that arise. This position is not considered a separate entity by the system.
See Switched Virtual Circuit.
Switches are a fundamental part of most networks. They make it possible for several users to send information over a network at the same time without slowing each other down. Just like routers allow different networks to communicate with each other, switches allow different nodes (a network connection point, typically a computer) of a network to communicate directly with one another in a smooth and efficient manner.There are a lot of different types of switches and networks. Switches that provide a separate connection for each node in a company's internal network are called LAN switches. Essentially, a LAN switch creates a series of instant networks that contain only the two devices communicating with each other at that particular moment. A voice switch is a PBX.
Configuration supporting an Ethernet hub with integrated MAC layer bridging or switching capability to provide each port with 10 or 100Mbps of bandwidth. Separate transmissions can occur simultaneously on each port of the switching hub, and the switch filters traffic based on the destination MAC address. Some switched Ethernet devices and switches are capable of running in full duplex mode when connected together
One of a series of lines that can be interconnected through a switching centre; a line on the public telephone network.
A multi-point communications network with circuit-switching capabilities such as the telephone network.
A temporary connection which is established and maintained for the duration of a data transfer session.
The SX-200 EL or SX-200 ML system is a microprocessor-controlled telephone system that handles both voice and data switching. The system hardware is electrically compatible with most single line telephones, MITEL(r) proprietary sets, key telephone systems, telephone systems, and central office exchanges.
An SDS feature that allows you make the shared form data on one or more remote elements the same as the data on a local element. A Sync operation allows you to synchronize the form data across a Before you can perform a sync operation, the remote elements must already be sharing data with the local element at the desired scope.
This term is associated with data which is transmitted in a continuous stream at a fixed rate, with the receiving terminal synchronized to the transmitting terminal by means of elements transmitted on a regular basis. See also Asynchronous Mode.
Syslog is a method of collecting messages from devices and sending them to a server running a syslog daemon. MiVoice Business can send its log messages to a Unix-style SYSLOG service which stores them in files for viewing and analysis.
The System Administration Tool enables trained technicians and system administrators to program system-wide settings, voice settings (lines, extensions, management parameters, system directories, and voice mail) and IP network features. The System Administration Tool also provides access to Maintenance Logs, Software Logs, and Login and Logout Audit Logs.
The particular hardware and software initially installed for the system. Any subsequent additions, deletions and any other changes which occur result in a new system configuration being created. The listing of hardware and software items which comprise the current system configuration can be obtained on command from the maintenance terminal.
A feature that shares system programming data among a network or cluster of elements (MiVoice Business systems) and synchronizes the system data of those elements with the data of a master element. This application reduces the amount of time requred to maintain consistent data across the elements. SDS also allows you to share user and device data between a primary and secodary controller.
The system fail transfer feature allows selected stations of the system (or portions of the system, according to the type of outage), to be transferred to certain trunks. Such transfer action is automatic in the event of a failure of the main power supply.
A protocol used to send FAX communications over IP networks (FAX Relay)
Also seen as T-1. A digital link with the capacity of transmitting 1.544Mbps. A T1 can normally handle 24 voice conversations at 64Kbps. T1 is a standard for digital transmission in the United States, Canada, Hong Kong and Japan
Trunk Answer From Any Station lets you answer any call that rings a night bell. Once you answer the call, you can use any of the features that are normally available at the station.
Tandem trunking describes the facility of transparently switching co-located trunks together at the SX-200 ICP system. This type of switching is subject to digit modification, and the parameters programmed during CDE for the interconnection restrictions table.
See Telephony Application Protocol Interface.
See Transmission Control Protocol.
A de facto, industry-standard protocol for interconnecting disparate networks. Also see Transmission Control Protocol/Internet Protocol. TCP/IP is common shorthand that refers to the suite of application and transport protocols that run over IP. These include FTP, TELNET, and SMTP.
See Time-Division Multiplexing.
TDM is a technology for digital transmission of radio signals between a mobile phone and a radio base station. TDMA allows the frequency band to be split into a number of channels which are then stacked into short time units so several calls can share a single channel without interfering with another call.
An abbreviation of tel(ephone) co(mpany).
A device that allows the deaf, hard of hearing or speech impaired to make telephone calls. It is normally made up of a word processor with a modem.
The use of telecommunications equipment to work from home or at another locations instead of the workplace.
A repository within the MiVoice Business system that contains names associated with the majority of dialable endpoints in the system. These names are written into the Directory Name field in the User and Services Configuration form, presented in the Telephone Directory form, and displayed on various endpoints within the system. However, if the Multilingual Name Display feature is activated on a node, the USC Names are displayed on specific supported endpoint devices within the cluster. This database supports up to 20 ASCII characters per name; it does not support UTF-8 encoded characters.
Known in North America as the Central Office (CO). This is where the local telephone company connects all calls in a specific area.
The science of telephone communications whereby sound is converted into signals. These signals were historically analogue which were converted to waves and then to digital signals, and now are converted to IP. The signal is then transmitted and translated back into sound at the receiving end of the transmission. Computer hardware and/or software that functions like telephone equipment are now used to transmit voice communications.
A telephony interface that allows you and your PC to communicate via telephones to phone-connected resources globally
The user interface to a telephony application. TUIs allow users to configure and manage telephony applications, usually through the use of phone keys.
Telnet or Teletype Network is an Internet standard protocol for remote terminal connection service that allows a user to interact with a system at another site as if the terminal were connected directly to the remote machine.
A type of software that allows a computer connected to a piece of equipment to appear to be a traditional terminal with a standard interface-often a DEC VT100 (asynchronous) terminal.
Communications equipment at either end of a communications link, used to permit the stations involved to accomplish the mission for which the link was established.
Terminal hunting starts at the first extension in the hunt group and terminates at the first idle extension found. Hunting takes place in the order in which the extensions were programmed into the hunt group.
A protocol used with an application program rather than a human user. A typical use for this protocol is for point-of-sale credit card authorization.
See Cross Connect Field.
Telephony Features Integration.
See Trivial File Transfer Protocol.
The capability to add a third party ( from another location ) to a two-party call.
The end result of a data call. Throughput also refers to the actual amount of useful and non-redundant information that is transmitted or processed.
Terminal Identifier.
Also known as a leased line. It is a private circuit that connects two ACDs or PBXs across a wide area.
Tie trunks directly interconnect two systems together. This enables a station, terminated on one of the systems, to be interconnected to any other station, terminated on the other system.With tandem trunking the calling party can be extended through more than one node of the network.
Involves the combination of numerous signals for transmission on a single communications channel or line, with each signal being broken into different segments of short duration.
See Calibrated Flash.
Also known as A-wire. The first wire in a pair of telephone wires. This wire is connected to the positive side of the battery at the central office. It is the telephony equivalent to Ground or Earth in a normal electrical circuit
Transport Layer Security. A communication security protocol used for LDAP connections. TLS is a successor to SSL (Secure Sockets Layer).
Telecommunications Network Voltage.
Toll control restricts the users to certain trunk routes and denies the use of specific directory numbers. It is part of the ARS feature. Each user is assigned a COR which is associated with the trunk route tables in ARS and determines what degree of access the particular station has to the trunk network.
The layout of nodes and links that constitute a LAN.
Type of Service. A numerical value which defines the priority of an IP packet which is queuing to be sent; where a packet with a value of 0100 has the lowest priority, and 1000 has the highest priority in the list.
Twisted Pair. A pair of wires which are twisted to minimize crosstalk with other pairs of wires in the same cable.
See Terminal Packet Assembler/Disassembler.
A traditional ACD agent is identified by an Agent ID that is programmed in the ACD Agent IDs form. When a traditional ACD agent logs into an ACD set, only the Class of Service (COS) and Class of Restriction (COR) that are associated with the agent’s directory number are applied to the ACD
A transport layer protocol with sequencing error detection and flow control. Transmission Control Protocol is a method used along with the IP to send data in the form of message units between computers over a network. While IP takes care of handling the actual delivery of the data, TCP takes care of keeping track of the individual units of data that a message is divided into for efficient routing through the Internet.
A bridging protocol in which the bridge learns the addresses and location of the network devices (the PCs) while those devices remain unaware of the presence of the bridge.
Notification of an event sent from a device to a monitoring station (SNMP, etc.).
In a private network, the caller's class of service can be passed to the destination node to control access to services.
A simplified version of FTP that enables devices such as Mitel Networks 5010 IP Phone and Mitel Networks 5020 IP Phone to download software without user intervention. The common name for the suite of protocols developed by the U.S. Department of Defence in the 1970s to support the construction of world-wide internetworks. TCP and IP are the two best-known protocols in the suite. TCP corresponds to Layer 4 (the transport layer) of the OSI reference model. It provides reliable transmission of data. IP corresponds to layer 3 (the network layer) of the OSI reference model and provides connectionless datagram service.
A communications channel between two points. A trunk generally refers to a high-bandwidth, fibre-optic line between telephone switching centers (central offices). Telephone \"trunks\" handle thousands of simultaneous voice and data signals, whereas telephone \"lines\" are the wires from the telephone company to your home or office. Telephone lines are low bandwidth, usually carrying a signal voice call at a time.
Trunk Answer From Any Station (TAFAS) lets you answer any call that rings a night bell. Once you answer the call, you can use any of the features that are normally available at the station.
Transit exchanges through which a long distance call may pass on its route between 2 local exchanges.
The transmission, switching and signalling systems within the PSTN which enable calls to be routed from one local exchange to another.
A system in which a number of radio channels are pooled together, and depending on demand, the frequencies are distributed according to traffic levels.
In telephone systems, a trunk is a line that carries multiple voice or data channel between two telephone exchange switching systems. In digital communications, a trunk is often a T-carrier system.
This Service Level indicates that the directory number (DN) is assigned to a trusted Mitel application that has full telephony service once it registers with the system. Although the DN can be programmed on the same forms as a Full Service user/device, it does not use an IP User License.
Telephone User Interface
A type of telephone used in the financial community, particularly by securities and commodities traders. Turrets provide hotline-type connections required for the rapid, multi-call communications involved in financial transactions.
Twisted Pair cable consists of two insulated copper wires twisted around each other, and was traditionally used in older telephone networks. One wire carries the signal while the other wire is grounded to absorb signal interference.
See Universal Asynchronous Receiver/Transmitter.
Unified Communication and Collaboration
See Uniform Call Distributor.
UDP is an alternative to the TCP and, together with IP, is sometimes referred to as UDP/IP. Like TCP, UDP uses IP to actually get a datagram from one computer to another. UDP does not provide the service of dividing a message into packets and reassembling it at the other end. UDP doesn't provide sequencing of the packets that the data arrives in. Network applications that want to save processing time because they have very small data units or don't require the above services may prefer UDP to TCP e.g. TFTP uses UDP instead of TCP.
United Kingdom
See Unified Messaging
Unified communications is an enhancement to unified messaging that adds real-time communications to the unified messaging mix. Call management features and instant messaging are generally included with unified communications. More advanced unified communications systems integrate desktop applications like calendars so, ie:, a user's calls and messages can be managed based on the user's availability, as shown on a calendar schedule.
Unified messaging is defined as technology that brings together electronic mail, fax and voice messaging into a single inbox. It uses a single directory, and provides the user with message access through a common set of message management tools. Unified messaging delivers the user access to any message, anytime, anywhere, on any device. By strictest definition, unified messaging is limited to non-real-time communications. Users can access multiple message types via a wireline phone or a mobile phone with the telephony user interface (TUI); they can also access their messages from their desktop computers or remotely via a graphical user interface (GUI) on any Web browser-enabled personal computer.
A system that distributes calls to agents and provides reports. A UCD is not as sophisticated as an ACD. It is based on very simple rules and cannot make intelligent decisions.
A short character string used to identify a name or resource on the Internet.
An Internet address, such as www.mitel.com, with a protocol prefix, such as http://, to indicate the type of Internet service being addressed.
An identifier derived from the bridge address and the manageable priority assigned to the bridge. The relative priority of the bridge in the LAN is determined by the comparison of the unique identifiers. The lower the numerical value the higher the priority.
This is a call centre term that refers to either: - An agent who can handle all types of incoming calls, or - An agent who can handle both inbound and outbound calls.
UART or Universal Asynchronous Receiver/Transmitter is an integrated circuit used for serial communications, containing a transmitter (parallel-to- serial converter) and a receiver (serial-to-parallel converter).
A power supply that can be plugged into electricity ranging from 110 volts to 240 volts AC without the need for a transformer.
More commonly referred to as the URL, the Universal Resource Locator refers to the entire address that is recognised \"universally\" as the address for an Internet resource. Each resource on the Internet has a unique URL.
A term used to describe an \"all-in-one\" telecommunications server. The majority are a phone system running on Windows NT on a PC-style architecture that is connected to a data network. This allows call center-style telephone and network communications to be blended into one hardware/software platform. Because of the technologies used relative newness many have poor feature content.
A pair of wires which are twisted to minimize crosstalk with other pairs of wires in the same cable (which are each twisted at a slightly different rate) but not shielded.
Refers to the scenario where a hot desk user logs into a hot desk enabled set while he or she is still logged in at another hot desk enabled set. If the user's login is successful, the user is automaticl logged out of the orginal set and logged in on the new set. The user has essentially updated his or her login location.
Un-interruptible Power Supply; equipment providing no break power supply for the duration of the reserves of its batteries in the event of failure of the primary source of power.
See Uniform Resource Locator.
A repository within the MiVoice Business system that contains names of all dialable users configured through the First and Last Name fields in the User and Services Configuration form. This database supports up to 64 bytes of UTF-8 encoded characters per name. Names stored in this database are used in various administrative activities, such as, Audit Trails, Message Boards, CSV exports, etc.. For MiVoice Business nodes on which the Multilingual Name Display feature is enabled, these names are displayed on supported devices within the cluster.
An IP device configured with service level \"IP Device Only\"; provides basic functionality (emergency/attendant calls and hot desk login) and does not require a license.
User and Service Provisioning. Refers to the interface used to provision users and services on the Mitel Applications Server (MAS).
See Coordinated Universal Time
See Unshielded Twisted Pair.
An automatic calling and answering protocol and command set for modems that need auto-dial capabilities.
A standard approved by the ITU-T for transmitting data downstream to a modem at 56Kbps.
Very high data rate DSL. An emerging asymmetric DSL technology offering high data transfer rates over short distances using a fiber-optic line.
A Call Centre system that supports remote call centre agents who work from remote offices or from home. Virtual call centre employees may be situated in groups in a number of smaller sites, but most often they will work from home. For the call centre organisation, the virtual call centre model saves facilities and equipment costs and may often lead to lower employee turnover rates. Turnover is quite high in facilities based call centres. For companies with a seasonal sales cycle, the virtual model also means that they don't have to maintain facilities year-round. Virtual Call Centres are distinct from Networked Call Centres and Networked ACD.
An extension that is programmed in the system but has no physical device associated with it. A virtual extension is programmed by leaving the MAC address field blank. Also called a phantom extension.
As networks have grown in size and complexity, many companies have turned to virtual local area networks (VLANs) to provide some way of structuring this growth logically. A VLAN is a collection of nodes that are grouped together in a single broadcast domain that is based on something other than physical location. In effect you take a single physical LAN and split it into a number of Virtual LAN's. Each VLAN behaves as it's own entity. Data packets on one VLAN do not delay data packets on another. The full bandwidth of the LAN is made available to all the devices using it. The reason a VLAN is important for provisioning voice is that voice is very sensitive to delay. If you are downloading a file from a computer and there is a short delay (literally a delay of milliseconds) you'll probably never notice it happening. A delay on a voice call of even a couple of hundred milliseconds is very obvious. It is essential that delays are kept within strict limits. With a VLAN, you can prioritize voice to ensure that delay is minimized. Common reasons for VLANs: - Security - Separating systems that have sensitive data from the rest of the network decreases the chances that people will gain access to information they are not authorized to see. - Projects/Special applications - Managing a project or working with a specialized application can be simplified by the use of a VLAN that brings all of the required nodes together. - Performance/Bandwidth - Careful monitoring of network use allows the network administrator to create VLANs that reduce the number of router hops and increase the apparent bandwidth for network users. - Broadcasts/Traffic flow - Since a principle element of a VLAN is the fact that it does not pass broadcast traffic to nodes that are not part of the VLAN, it automatically reduces broadcasts. Access lists provide the network administrator with a way to control who sees what network traffic. An access list is a table the network administrator creates that lists which addresses have access to that network. - Departments/Specific job types - Companies may set up VLANs for departments that are heavy network users (such as multimedia or engineering), or a VLAN across departments that is dedicated to specific types of employees (such as managers or sales people).
A \"virtual\" PKM is only programmed in the system and doesn't physically exist.
A VPN is a secure way to communicate through a dedicated server to a corporate network over the Internet. The VPN overlays a private network on top of the public Internet network. While the Internet transfers traffic based on router hops, going from one router to the next between the source and destination, the VPN uses VPN gateways as its \"hops.\" This makes the multiple Internet routers disappear and the VPN gateways appear to be logically adjacent, which simplifies the network topology and makes it possible to create a private network. In this way, private data can be sent across the Internet through VPN gateways, which encapsulate the data to maintain its privacy. Tunnels are set up for the exclusive transport of this data between pairs of gateways. Because an organisation can forward traffic through these tunnels with internal IP addresses, they also enable enterprises to connect remote offices and remote workers without having to reconfigure their IP addresses or pay for globally-unique IP addresses that are required for Internet transmission. Until fairly recently, companies have extended their networks to other sites through the use of leased lines to maintain a wide area network (WAN). Leased lines, like ISDN (integrated services digital network) provided a company with a way to expand its private network beyond its immediate geographic area. A WAN had obvious advantages over a public network like the Internet when it came to reliability, performance and security. But maintaining a WAN, particularly when using leased lines, can be quite expensive and often rises in cost as the distance between the offices increases. As the popularity of the Internet grew, businesses turned to it as a means of extending their own networks. First came intranets, which are password-protected sites designed for use only by company employees. Now, many companies are creating their own VPN (virtual private network) to accommodate the needs of remote employees and distant offices. VPNs address the security risks of leveraging a public network through the use of the IP Security Protocol (IPSec). This protocol provides security services for encrypting and authenticating the data. IPSec encryption encrypts the traffic, so even if the data is intercepted or delivered to the wrong destination, it is still safeguarded, since only the intended recipient can decrypt it. IPSec authentication prevents traffic manipulation as well as unintentional or malicious insertions into the data payload along the network path. This solves many of the security problems associated with the traditional leased and circuit-switchedlines.
See Virtual LAN.
Virtual Mitel Communication Director. Former name for MiVoice Business VMware Virtual Appliance, a version of MiVoice Business call control software for deployment in a VMWare environment.
Voice recognition implies that access to a system is limited to a specific speaker and the voice pattern must be verified before the system will be engaged. Voice recognition is used when you log in to a Unified Messaging mailbox, for example - it verifies your voice (how you say something), rather than your speech (what you say). Unless you verify your voice, you will not be able to access your mailbox. Usually, this is called speaker verification to resolve this confusion.
supports the Manual Ringdown feature, which provides hotline-type connection without dialing between 5560 IPT Turret devices.
VoiceXML enables users to use their voice to interact with databases and applications providing XML standards have been deployed at either end of the interaction. VoiceXML was designed to enable content that was developed for the Web to interact with voice systems. This permits network users to \"speak\" to applications using their voice or through touch tone responses. The application in turn can reply to the request using either pre-recorded or computer synthesised speech. VoiceXML provides an end-user with the ability to drill down into databases to access pertinent information using their voice.
The synergy amid a group of technologies, which together allow for the convergence of voice, computing, and other types of communications to coexist on a Local Area Network.
VoIP technology, also known as IP Telephony, is the technology used to deliver telephony over a data network instead of using the standard public switched telephone network Rather it uses the Internet Protocol. VoIP means that voice is converted from an analogue signal, encoded digitally, then is converted into packets. It then uses a data network to move those packets along the most efficient path to their destination, where they are reassembled and delivered and converted back into a voice transmission. VoIP uses packet-switching to provide several advantages over circuit switching. Packet switching allows several telephone calls to occupy the same amount of space used by one call in a circuit-switched network. Using PSTN, that 10-minute phone call consumed 10 full minutes of transmission time at a cost of 128 Kbps. With VoIP, that same call may have occupied only 3.5 minutes of transmission time at a cost of 64 Kbps, leaving another 64 Kbps free for that 3.5 minutes, plus an additional 128 Kbps for the remaining 6.5 minutes.
Voice Profile for Internet Messaging
See Virtual Private Network.
An industry-standard, asynchronous terminal originally created by Digital Equipment Corporation.
See Voice Trader Application (VTAP)
See Wide Area Network.
A transaction that enables a user to request a call-back from the call centre, while visiting the webpage associated with that call centre. Web call-back requires interconnection to the ACD system and the Internet by means of an Internet Gateway.
A type of online help that can either be delivered through the internet or as a standalone set of HTML files on a computer.
Queues traffic in separate queues according to class definition guaranteeing each queue with a portion of the available bandwidth. This is a variation on the Class Based Queuing (CBQ) that is used in routers.
See Weighted Fair Queuing.
A network that uses common carrier lines to form a network over an extended geographical area. It is used for both voice and data traffic.
A synonym for the 802.11b wireless standard. It enables devices to communicate with one another without the need for running cables between them for connectivity. A Wi-Fi wireless network uses radiowaves to get computers or telephones to communicate. In order for the computers to communicate with each other, they need to have a central hub to communicate with. This hub is called an Access Point. Each device is known to the Access Point and through it can communicate to other machines on the wireless network. The Access Point also acts as a connection to the traditional wired network as well as the connection to the Internet, if it includes a Router function.
The wink start feature applies generally to tie trunk circuit operation. When an incoming trunk is seized it may be necessary to prevent the transmission of any digit sequences, until the incoming trunk equipment is ready to receive these digits. When the incoming trunk equipment is ready to receive the digits, a wink start condition is sent from the incoming end to the originating end of the trunk. The distant termination can now send digit sequences over the trunk.
Two or more users belonging a ring group, hunt group, ACD group or any of the other MiVoice Business call groups.
A CCITT standard that defines the packet format for data transfer in a public data network.
An international standard for distributed global directories consisting of many individual servers responsible for their own content. X.500 is rather difficult to set up and maintain, but it is a complete directory capable of powerful searches and relational queries. See LDAP
Server-based variants of MiVoice Business that use x86 processors, MiVoice Business for Industry Standard Servers MCD-ISS), Virtual MiVoice Business, and cMiVB. See also PowerPC platforms.
A generic reference to related DSL technologies.
eXtensible Mark-up Language. XML offers the means to define application interfaces that expose informational transactions to other requests across the web. The merit in this is that you do not have to rebuild your applications as you are only building the interface. It reduces the effort to integrate applications on disparate platforms, be they Unix, Windows or Java-based. XML provides a consistent XML interface for downstream processing, web-based or not, ie: XML API. XML allows for straight through processing, reducing transactional delays as it talks to the back office applications. This enables institutions to design unique mark-up languages for different types of documents.
Short for Extended Network. XNET offers proprietary switched private network traffic networking over the Public Switched Telephone Network (PSTN). With XNET, users can make DPNSS calls on non-DPNSS trunks without the need for an entire T1/E1 link between the originating and terminating systems.
A method of flow control in asynchronous transmissions between two PCs. The receiving PC sends an XOFF control character to pause the transmission of data when the receive buffer is full, and then sends an XON character when it is ready to continue the transmission.
A value assigned in software to co-located network devices for bandwidth management and Location Based Routing purposes. Also used for the display of local time on IP sets.
Zoneinfo is a collaborative database of the world's time zones, and is primarily intended for use with computer programs and operating systems. Zoneinfo is also sometimes referred to as the Olson or the tz database.