Glossary
Comprehensive glossary of mobile industry terminology
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Throughput is a term used to describe how many messages can be sent per second. For example, a throughput of 10 messages per second suggests an SMS account can submit (and receive an acknowledgement) for up to 10 SMS messages per second. Typically, throughput is limited by account service or by bind. You can increase message throughput by ensuring the SMPP/UCP client software you use is set to allow up to 10 pending operations. This is also called the asynchronous window. You can also increase your message throughput by using two separate BINDs for transmission.
View article
Has a deep commercial, operational and technical integration into their Mobile Network Operator (MNO) partners enabling them to deliver communications to all subscribers in a large amount of countries without transiting another Super Network.
View article
Has a deep commercial, operational and technical integration into a Tier 1 Super Network whereby the Tier 1 Super Network has contractually guaranteed to deliver the message via their Tier 1 connections for the Tier 2 Super Network.
View article
Can be using a combination of Tier 2 and Tier 1 Super Networks but does not care about the provenance of the downstream connectivity. It is most likely using least cost routing communications to be delivered at the lowest price possible, more often than not, this is at the cost of quality, deliverability and latency.
View article
Timestamps in Sinch APIs are used for expressing a moment in time. They're represented using the ISO-8601 standard. Examples of timestamps are the fields send_at and expire_at in the Send a batch message operation.   A time offset can be specified in accordance with ISO-8601 time offsets from UTC. If no time offset is specified (local time in ISO-8601) then UTC will be used.   All timestamps returned by the API will be represented in UTC time, with millisecond precision.  
View article
Transport Layer Security (TLS) is an encryption protocol used to transmit sensitive data over the internet. Many uses of the web involve sensitive or private data. Logging into an application requires you to send authentication credentials that must be known only to you.   Making an online payment is another sensitive transaction. If malicious actors such as hackers get hold of your card details, you could become a victim of financial fraud.  Additionally many people use the internet for online messaging, which these days is often on a mobile device.  Given all these sensitive applications, there needs to be a guarantee that data sent over the internet is known only to the sender and the intended recipient.  TLS encryption provides that guarantee and it is a fundamental component of both our SMS and Voice products.   History of TLS Transport Layer Security was first created in 1999, at which time it represented a leap forward in internet security.  At the beginning of the web, most data was transmitted in an unencrypted fashion by default.  The first form of online data encryption was Secure Socket Layers (SSL). Created in 1994, SSL encryption was initially used for a specialised applications where the security of sensitive information needed to be guaranteed.  These included, online financial transactions and submitting authentication credentials such as passwords.   As the internet became more and more popular, there emerged two sources of pressure for data to be encrypted in a foolproof fashion. First, an increasing number of users were relying on the internet for sensitive data transactions.  In addition to the traditional realms of online payment and user authentication, more and more people were using the internet through their phones for applications such as online messaging, social media posting, and even dating. Second, as the information revolution progressed, the methods used by hackers and bad actors became much more technically sophisticated.  To stay one step ahead in the cybersecurity arms race, encryption technology needed to step on the gas.   The original SSL protocol was improved in three iterations through the 1990s. Modern TLS is developed from SSL 3.0 and represents the current standard of online encryption.  The high proportion of sensitive transactions in the web means that data encryption is shifting towards being the rule rather than the exception. The extent of this was made clear when, in 2014, the IAB called on developers and operators to encrypt data by default.  Nowadays, servers and browsers include TLS encryption as the default for online data transactions, so your connection is more likely encrypted than not, even if you don’t realise it.   TLS encryption methods To ensure that sensitive data is secure from hackers, TLS uses a range of clever mathematical and computational encryption procedures. The core of TLS encryption is encryption keys. A key is a random string which is applied to unencrypted data to produce encrypted data. Once encrypted, the data can only be decrypted by another person with the key used to encrypt it.  TLS implements keys using symmetric and asymmetric cryptography.   Symmetric cryptography is when a key is shared with both the sender and the recipient. This method is computationally efficient but requires trust between the sender and the recipient, which could make any information shared with this method less secure. Asymmetric cryptography uses two keys: a public key and a private key. The public key is shared between both sender and recipient.  The recipient decrypts the message using a mathematically related private key. Security is ensured by making it impractical to derive the private key from the public key.  TLS uses asymmetric cryptography to generate a session key which is shared between sender and recipient. The session key is discarded when a session is finished.   Sinch Products with TLS Sinch API platforms use the internet to facilitate mobile communications from SMS to voice calls. Customers value secure communication channels so TLS encryption is built into two of our products.   SMPP with Sinch enables customers to send SMS traffic securely and in bulk. It uses the Short Message Peer to Peer (SMPP) Protocol. This is an open, industry standard protocol enabling SMS data to be transmitted between our servers and our customers. TLS encryption ensures secure connectivity to SMPP servers. SIP Trunking enables customers to make secure voice calls using our servers, Sinch uses SIP trunking. SIP refers to Session Initiation Protocol, the de facto way to make and end connections for VoIP data exchanges. TLS encryption is used to ensure voice data exchanged between Sinch servers and Sinch clients remains private.
View article
Tag Length Value.   It's an encoding scheme used for optional information element (key/value pairs) in the SMPP protocol.
View article
Number that are free of charge for the calling party but billed for all arriving calls.   Toll-free numbers are an allowed Sender ID in the US that can be used for two-way text messaging.    
View article
Type Of Number (TON) is a value is set for both the originator and destination number in every SMS. It is used for both SMS routing and handset display purposes.
View article
Transport Protocol Message Type Indicator.
View article
Transmission Path Destination Address.
View article
Transport Protocol Data Unit.
View article
Transmission Path Originating Address. The TPOA is the SMS header field that contains the message sender's number. The TPOA field is limited by GSM standards to: - Maximum 16 digits if the origin is numeric (for example, a phone number), or - Maximum 11 alphabet characters and digits if the origin is alphanumeric for example, a company name).
View article
Transport Protocol User Data Header.
View article
Transport Protocol User Data Header Indicator.
View article
Transport Protocol User Data Length.
View article
Transactions per second - throughput.
View article
Time Sensitive Services.
View article
Where you send messages to your end users and expect sinch.com to receive replies.
View article
Two Factor Authentication's main aim is to be used for verification codes, 2FA and One-time Pin codes content. It can be used to secure login and sign up from unwanted visitors by verifying user possession of number or adding second-factor authentication.
View article