Glossary
Comprehensive glossary of mobile industry terminology
cancel
Showing results for 
Search instead for 
Did you mean: 
Transmission Control Protocol (TCP ) is a standard that defines how to establish and maintain a network conversation through which application programs can exchange data. TCP works with the Internet Protocol (IP), which defines how computers send packets of data to each other.
View article
Telephone Consumer Protection Acts a federal statute enacted in 1991 designed to safeguard consumer privacy.
View article
Time Division Multiple Access (TDMA) is a channel access method for GSM networks. It allows several users to share the same frequency channel by dividing the signal into different time slots.
View article
A Temporary Negative Notification is returned when attempting a retry on a message that previously failed to deliver. In such a case, customers should expect a final status to be sent at the conclusion of the retry process, whether successful or not. Until a final status is received, customers must not initiate their own retry as it could potentially result in duplicate messages arriving at the handset.
View article
A temporary positive notification indicates an interim delivery confirmation to a customer, with a final delivery confirmation yet to be returned.
View article
The terminating operator is an expression used to explain which Mobile Operator’s SMSC delivered a message to a subscriber. For example, sending a message to MTN South Africa via Vodafone UK’s SMSC, we would say Vodafone UK was the terminating operator (or termination operator).
View article
See SMS Message.
View article
Text to Voice is a product used when an SMS message cannot be delivered (or sometimes as a preference). A message will be delivered by calling the number and delivering the message through a voice recording that reads out the contents of the SMS message. This is a useful feature especially for people who have a visual impairment or only have a land line.
View article
Network protocol based on the IEEE 802.15.4 standard, similar to Zigbee, providing IPv6 addressing.
View article
Closely related to throughput, throttle is a technique a server will use to prevent your application from exceeding its allowed throughput. By way of example, if your account is allowed to send at 10 msg/sec, and you try and submit at 20 msg/sec, then the receiving server will throttle your application send rate by either delaying acknowledgement or responding with throttle errors to slow your application down back down to 10 msg/sec.
View article
Throughput is a term used to describe how many messages can be sent per second. For example, a throughput of 10 messages per second suggests an SMS account can submit (and receive an acknowledgement) for up to 10 SMS messages per second. Typically, throughput is limited by account service or by bind. You can increase message throughput by ensuring the SMPP/UCP client software you use is set to allow up to 10 pending operations. This is also called the asynchronous window. You can also increase your message throughput by using two separate BINDs for transmission.
View article
Has a deep commercial, operational and technical integration into their Mobile Network Operator (MNO) partners enabling them to deliver communications to all subscribers in a large amount of countries without transiting another Super Network.
View article
Has a deep commercial, operational and technical integration into a Tier 1 Super Network whereby the Tier 1 Super Network has contractually guaranteed to deliver the message via their Tier 1 connections for the Tier 2 Super Network.
View article
Can be using a combination of Tier 2 and Tier 1 Super Networks but does not care about the provenance of the downstream connectivity. It is most likely using least cost routing communications to be delivered at the lowest price possible, more often than not, this is at the cost of quality, deliverability and latency.
View article
Transport Layer Security (TLS) is a network security protocol that provides end-to-end communications security over networks and is widely used for internet communications and online transactions.
View article