RMS Config API

(0 reviews)

Glossary

Term / Acronym Unabridged Explanation
API Application Programming Interface Method for computer systems to exchange data using defined standards and formats.
ATA Analog Telephone Adapter ATA Is a device that allows a normal PSTN line to connect to the Internet in order to make or place telephone calls.
ATA Voice Analog Telephone Adapter Voice Supports carrier grade G.711 Voice Codec so you can deliver PSTN compatible telephony options via the ATA port on the ONT.
Codec Coder-decoder A codec is a device or computer program which encodes or decodes a digital data stream or signal.
DHCP Dynamic Host Configuration Protocol A Layer 3 protocol used to auto-configure basic IP settings. Optional for Service Providers. Bitstream 2 has a configurable option to insert Circuit ID information into DHCP configuration requests as defined in TR-101/156.
DHCP Lease Time N/A DHCP Lease Time is the amount of time in minutes or seconds a network device can use an IP Address in a network. The IP Address is reserved for that device until the reservation expires.
Digit Map N/A Digit maps are templates that match different sequences of digits that users dial as part of their interaction with their phone system.
DNS Domain Name System The Domain Name System is a hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities.
DSCP Differentiated Services Code Point DSCP is a layer 3 marking method, marking uses 6-bits of the 8-bit ToS field in the IP Header to provide up to 64 classes (or code points) for traffic.
DTMF Dual-tone multi-frequency signaling DTMF is a telecommunication signalling system using the voice-frequency band over telephone lines between telephone equipment and other communications devices and switching centres.
Ethernet N/A A common communication protocol, defined in international standard IEEE 802.3, which is used to connect multiple devices on the same Layer 2 network.
Factory Reset N/A Factory Reset will trigger the following: - Power Cycle for the device - Clear end-user custom settings on the device - Restore the device to factory defaults - Reapply Service Provider (RSP) template settings on the device.
Firewall N/A A firewall is a network security system that monitors, and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.
G.711 N/A G.711 is a narrowband audio codec originally designed for use in telephony that provides toll-quality audio at 64 kbit/s. G.711 passes audio signals in the range of 300–3400 Hz and samples them at the rate of 8,000 samples per second, with the tolerance on that rate of 50 parts per million (ppm). Non-uniform (logarithmic) quantization with 8 bits is used to represent each sample, resulting in a 64 kbit/s bit rate.
G.711ALaw N/A It is a version of G.711, A-law, is used in most other countries outside North America.
G.711MuLaw N/A It is a version of G.711, MuLaw, is used primarily in North America and Japan
Interface Subnet Mask N/A A subnet mask that applies to a specific interface, e.g. LAN Interface Subnet Mask.
IP Internet Protocol Internet protocol, a communications protocol suite used for carrying data on the internet. Within telecommunications networks globally traditional analogue networks based on copper cables are being replaced with IP based networks based on fibre.
IPV4 Internet Protocol version 4 IPV4 is the fourth version of the Internet Protocol (IP). It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks.
IPV6 Internet Protocol version 6 IPv6 is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet.
JSON Java Script Object Notation An open-standard file format that uses human-readable text to transmit data objects.
LAN Local Area Network A network technology originating for transmitting data in the office. Typically using Ethernet.
MAC Media Access Control Commonly used in conjunction with MAC Address. A MAC address is the identifier associated with a network interface controller and used for communications at the data-link layer.
MRU Maximum Receive Unit MRU is the maximum packet size the ONT will receive on the interface (Note larger items are sent by breaking them up into two or more packets). It is used to tune the communications performance over the interface. It is the size of the largest protocol data unit (PDU) that can be communicated in a single network layer transaction.
MTU Maximum Transmission Unit MTU is the maximum packet size the ONT will transmit on the interface (Note larger items are sent by breaking them up into two or more packets). It is the size of the largest protocol data unit (PDU) that can be communicated in a single network layer transaction.
MWI Message Waiting Indicator MWI is a mechanism that informs the subscriber about the status of recorded messages. The subscriber may subscribe to a notification feature that makes use of the status of this MWI.
ONT Optical Network Terminal General term for a specialised piece of network equipment that terminates a single dark fibre and is located at the end user premises for fibre services.
PPPoE Point-to-Point Protocol over Ethernet It is a network protocol for encapsulating Point-to-Point Protocol (PPP) frames inside Ethernet frames.
Prefix Delegation DHCP IPV6 prefix Delegation DHCPv6 prefix delegation is used to assign a network address prefix and automate configuration and provisioning of the public routable addresses for an IPV6 network.
Proxy server N/A A proxy server is a server application or appliance that acts as an intermediary for requests from clients seeking resources from servers that provide those resources. A proxy server thus functions on behalf of the client when requesting service, potentially masking the true origin of the request to the resource server.
Instead of connecting directly to a server that can fulfil a requested resource, such as a file or web page, the client directs the request to the proxy server, which evaluates the request and performs the required network transactions. This serves as a method to simplify or control the complexity of the request, or provide additional benefits such as load balancing, privacy, or security.
RAML Restful API Modelling Language The language used to specify and document API designs.
Reboot N/A “Reboot" will trigger the following: - Power Cycle for the ONT - Retain Service Provider (RSP) settings (i.e. both from the template and/or any changes applied) on the device - Retain any end user settings on the device
Reconfigure Voice Service N/A Reconfigure Voice Service will trigger the following: - Clear end-user custom setting for voice if there were any - Clear Service Provider voice configuration (both from the template and/or any changes applied by the RSP) from the device - Reapply Service Provider voice configuration (both from the template and/or any changes applied by the RSP) on the device
Registrar Server SIP Registrar Server SIP Registrar Server accepts registrations from users and places them in a location service database. Typically the Registrar Server is managed by the RSP.
RGW Residential Gateway Router capability that provides user connectivity via LAN ports (that may be 1Gand/or 10G), Wi-Fi (that may operate at 2.4GHz, 5GHz) and supports WAN connectivity towards the RSPs.
RMS Remote Management Service Name given to the API for remotely configuring RGW services.
RSP Retail Service Provider A business/ organisation that is a reseller of Chorus fibre products.
RTP Real-time Transport Protocol RTP is a network protocol designed for delivering end-to-end, real-time transfer of audio and video over IP networks.
SIP Session Initiation Protocol SIP is a signalling protocol used for initiating, maintaining, and terminating real-time sessions that include voice, video and messaging applications.
SSID Service Set Identifier SSID defines a service set or extended service set. Normally it is broadcast in the clear by stations in beacon packets to announce the presence of a network and seen by users as a wireless network name.
Subnet Mask N/A A subnet mask is a number that defines a range of IP addresses available
URI Uniform Resource Identifier A URI is a unique sequence of characters that identifies a logical or physical resource used by web technologies.
URI Uniform Resource Identifier A URI is a unique sequence of characters that identifies a logical or physical resource used by web technologies.
Voice port N/A Voice port configuration details
Voice profile N/A List of voice (a.k.a. ATA) ports on this Remote Management Service
WAN Wide Area Network This is configuration available on the RGW that allows connectivity to an RSPs core network or data network.
WEP Security Wired Equivalent Privacy WEP is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in 1997, its intention was to provide data confidentiality comparable to that of a traditional wired network. WEP is recognizable by its key of 10 or 26 hexadecimal digits (40 or 104 bits) is a security choice presented to users by router configuration tools.
Wi-Fi Wireless network protocol Provides wireless internet connectivity to the internet or other data networks using industry standards (IEEE 802.11).
WMM Wi-Fi Multimedia WMM is a Wi-Fi Alliance interoperability certification, based on the IEEE 802.11e standard. It provides basic Quality of service (QoS) features to IEEE 802.11 networks.
WPA Security Wi-Fi Protected Access WPA security and security certification programs were developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP).
WPA2 Security Wi-Fi Protected Access II WPA2 security and security certification programs were developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP).
WPS Wi-Fi Protected Setup It is a network security standard to create a secure wireless home network.

Reviews