AM | answering machine | |
ARA | Auerswald Remote Access | |
CLIR | Calling Line Identification Restriction | Phone number is not displayed if that is appropriate |
CTI | Computer Telephony Integration | Computer-aided telephony |
DDI | Direct Dial-In | Extension |
DECT | Digital Enhanced Cordless Telecommunications | Digital radio telephone network |
Dynamic Host Configuration Protocol | Protocol for assigning the network configuration to network clients | |
Domain Name Service | ||
DSL | Digital Subscriber Line | Digital subscriber connection |
Dual Tone Multi Frequency | Dual TMrequency | |
ESMTP | Simple Mail Transfer Protocol | An integral parrt of e-mail, extended SMTP |
HTML | Hypertext Markup Language | Defines the structure of a website |
HTTP | Hypertext Transfer Protocol | Hypertext transmission protocol |
Internet Message Access Protocol | Enables online access to an e-mail inbox (live access) | |
IP | Internet Protocol | Internet Protocol |
Internet Protocol Security | Encryption extension od the Internet Protocol (IP) | |
Internet Protocol verion 4 | ||
Internet Protocol verion 6 | ||
ISDN | Integrated Services Digital Network | Digital network with integrated services |
LAN | Local Area Network | Local network |
Lightweight Directory Access Protocol | Protocol for easy access to directory server | |
Light-emitting diode | Light emitting diode | |
Media Access Control | Physical addree of a network interface | |
Network Address Translation | ||
Network Time Protocol | ||
PBX | Private Branch Exchange | Private PBX |
Power over Ethernet | ||
Post Office Protocol, Version 3 | ||
Real-Time Transport Protocol | ||
Session Initiation Protocol | ||
Session Initiation Protocol Secure | ||
Stateless Address Autoconfiguration | Process for automatically and statelessly configuring IPv6 addresses on a network interface. | |
SMTP | Simple Mail Transfer Protocol | Protocol that is used to exchange e-mails in computer networks |
SRTP | Secure Real-Time Transport Protocol | |
SSL | Secure Sockets Layer | Most widely used security protocol, provides a secure channel between two computers working over the Internet or an internal network |
Simple Transversal of UDP over NATs | ||
Transmission Control Protocol | ||
Transport Layer Security | ||
User Datagram Protocol | ||
Uniform Resource Identifier | ||
Uniform Resource Locator | Uniform Resource Pointer | |
USB | Universal Serial Bus | |
Virtual Local Area Network | ||
VMB | Voice Mailbox | voice mailbox |
Voice over Internet Protocol | ||
Virtual Private Network | ||
Extensible Markup Language |