Glossary
Comprehensive glossary of mobile industry terminology
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a network conversation through which application programs can exchange data. TCP works with the Internet Protocol (IP), which defines how computers send packets of data to each other.
View article
Training Check Frame (from ITU T.30) – a test frame at the end of the handshake phase that ensures that the modems can communicate at the speed negotiated.
View article
Telephone Consumer Protection Acts a federal statute enacted in 1991 designed to safeguard consumer privacy.
View article
The Campaign Registry (TCR) is a central hub for Application-to-Person (A2P) 10 Digit Long Code (10DLC) messaging campaigns.    Read the What is The Campaign Registry (TCR)? article to learn more.
View article
Time Division Multiple Access (TDMA) is a channel access method for GSM networks. It allows several users to share the same frequency channel by dividing the signal into different time slots.
View article
A Temporary Negative Notification is returned when attempting a retry on a message that previously failed to deliver. In such a case, customers should expect a final status to be sent at the conclusion of the retry process, whether successful or not. Until a final status is received, customers must not initiate their own retry as it could potentially result in duplicate messages arriving at the handset.
View article
A temporary positive notification indicates an interim delivery confirmation to a customer, with a final delivery confirmation yet to be returned.
View article
The terminating operator is an expression used to explain which Mobile Operator’s SMSC delivered a message to a subscriber. For example, sending a message to MTN South Africa via Vodafone UK’s SMSC, we would say Vodafone UK was the terminating operator (or termination operator).
View article
See SMS Message.
View article
Text to Voice is a product used when an SMS message cannot be delivered (or sometimes as a preference). A message will be delivered by calling the number and delivering the message through a voice recording that reads out the contents of the SMS message. This is a useful feature especially for people who have a visual impairment or only have a land line.
View article
Network protocol based on the IEEE 802.15.4 standard, similar to Zigbee, providing IPv6 addressing.
View article
Closely related to throughput, throttle is a technique a server will use to prevent your application from exceeding its allowed throughput. By way of example, if your account is allowed to send at 10 msg/sec, and you try and submit at 20 msg/sec, then the receiving server will throttle your application send rate by either delaying acknowledgement or responding with throttle errors to slow your application down back down to 10 msg/sec.
View article
Throughput is a term used to describe how many messages can be sent per second. For example, a throughput of 10 messages per second suggests an SMS account can submit (and receive an acknowledgement) for up to 10 SMS messages per second. Typically, throughput is limited by account service or by bind. You can increase message throughput by ensuring the SMPP/UCP client software you use is set to allow up to 10 pending operations. This is also called the asynchronous window. You can also increase your message throughput by using two separate BINDs for transmission.
View article
Has a deep commercial, operational and technical integration into their Mobile Network Operator (MNO) partners enabling them to deliver communications to all subscribers in a large amount of countries without transiting another Super Network.
View article
Has a deep commercial, operational and technical integration into a Tier 1 Super Network whereby the Tier 1 Super Network has contractually guaranteed to deliver the message via their Tier 1 connections for the Tier 2 Super Network.
View article
Can be using a combination of Tier 2 and Tier 1 Super Networks but does not care about the provenance of the downstream connectivity. It is most likely using least cost routing communications to be delivered at the lowest price possible, more often than not, this is at the cost of quality, deliverability and latency.
View article
Timestamps in Sinch APIs are used for expressing a moment in time. They're represented using the ISO-8601 standard. Examples of timestamps are the fields send_at and expire_at in the Send a batch message operation.   A time offset can be specified in accordance with ISO-8601 time offsets from UTC. If no time offset is specified (local time in ISO-8601) then UTC will be used.   All timestamps returned by the API will be represented in UTC time, with millisecond precision.  
View article
Transport Layer Security (TLS) is an encryption protocol used to transmit sensitive data over the internet. Many uses of the web involve sensitive or private data. Logging into an application requires you to send authentication credentials that must be known only to you.   Making an online payment is another sensitive transaction. If malicious actors such as hackers get hold of your card details, you could become a victim of financial fraud.  Additionally many people use the internet for online messaging, which these days is often on a mobile device.  Given all these sensitive applications, there needs to be a guarantee that data sent over the internet is known only to the sender and the intended recipient.  TLS encryption provides that guarantee and it is a fundamental component of both our SMS and Voice products.   History of TLS Transport Layer Security was first created in 1999, at which time it represented a leap forward in internet security.  At the beginning of the web, most data was transmitted in an unencrypted fashion by default.  The first form of online data encryption was Secure Socket Layers (SSL). Created in 1994, SSL encryption was initially used for a specialised applications where the security of sensitive information needed to be guaranteed.  These included, online financial transactions and submitting authentication credentials such as passwords.   As the internet became more and more popular, there emerged two sources of pressure for data to be encrypted in a foolproof fashion. First, an increasing number of users were relying on the internet for sensitive data transactions.  In addition to the traditional realms of online payment and user authentication, more and more people were using the internet through their phones for applications such as online messaging, social media posting, and even dating. Second, as the information revolution progressed, the methods used by hackers and bad actors became much more technically sophisticated.  To stay one step ahead in the cybersecurity arms race, encryption technology needed to step on the gas.   The original SSL protocol was improved in three iterations through the 1990s. Modern TLS is developed from SSL 3.0 and represents the current standard of online encryption.  The high proportion of sensitive transactions in the web means that data encryption is shifting towards being the rule rather than the exception. The extent of this was made clear when, in 2014, the IAB called on developers and operators to encrypt data by default.  Nowadays, servers and browsers include TLS encryption as the default for online data transactions, so your connection is more likely encrypted than not, even if you don’t realise it.   TLS encryption methods To ensure that sensitive data is secure from hackers, TLS uses a range of clever mathematical and computational encryption procedures. The core of TLS encryption is encryption keys. A key is a random string which is applied to unencrypted data to produce encrypted data. Once encrypted, the data can only be decrypted by another person with the key used to encrypt it.  TLS implements keys using symmetric and asymmetric cryptography.   Symmetric cryptography is when a key is shared with both the sender and the recipient. This method is computationally efficient but requires trust between the sender and the recipient, which could make any information shared with this method less secure. Asymmetric cryptography uses two keys: a public key and a private key. The public key is shared between both sender and recipient.  The recipient decrypts the message using a mathematically related private key. Security is ensured by making it impractical to derive the private key from the public key.  TLS uses asymmetric cryptography to generate a session key which is shared between sender and recipient. The session key is discarded when a session is finished.   Sinch Products with TLS Sinch API platforms use the internet to facilitate mobile communications from SMS to voice calls. Customers value secure communication channels so TLS encryption is built into two of our products.   SMPP with Sinch enables customers to send SMS traffic securely and in bulk. It uses the Short Message Peer to Peer (SMPP) Protocol. This is an open, industry standard protocol enabling SMS data to be transmitted between our servers and our customers. TLS encryption ensures secure connectivity to SMPP servers. SIP Trunking enables customers to make secure voice calls using our servers, Sinch uses SIP trunking. SIP refers to Session Initiation Protocol, the de facto way to make and end connections for VoIP data exchanges. TLS encryption is used to ensure voice data exchanged between Sinch servers and Sinch clients remains private.
View article
Tag Length Value.   It's an encoding scheme used for optional information element (key/value pairs) in the SMPP protocol.
View article
Number that are free of charge for the calling party but billed for all arriving calls.   Toll-free numbers are an allowed Sender ID in the US that can be used for two-way text messaging.    
View article