Syniverse Dictionary of Telecomunnications
Syniverse Dictionary of Telecomunnications
Syniverse Dictionary of Telecomunnications
of
Telecommunications
September 2007
LEGAL NOTICES
ACCESS, ACCESSibility, ACCESS S&E, Brience, CCNS, Crossroads, Cell-U-Rator, ChurnManager,
CloneDetector, Customer Positive File, DataFlash, DataNet, EDT, Electronic Data Transport, Encrypt-A-Key,
Fleet-On-Track, FMR Plus, Follow Me Roaming Plus, FraudChallenger, FraudForce, FraudInterceptor,
FraudManager, FraudX, GlobalRoam, GUIDELINES, INLink, inpack, INPort, INPosition, LATALink,
LAWBUST, Phone Me Anywhere, Phone Me Anywhere Plus, PMA, PMA Plus, RoamerXchange,
SOLUTIONS Conference, S.T.A.R.S. STREAMLINER, S.T.A.R.S. STREAMLINER Terminal Access
Reporting System, STREAMLINER, TransAction Manager, Syniverse, Syniverse Datanet, Syniverse logo,
Syniverse Spark design, UniRoam, Visibility and Whatever It Takes
are services, products, service marks, or trademarks of Syniverse Technologies.
SmartAlert Real Time Analysis System is a registered mark of Verizon Data Services Incorporated.
SmartAlert is a mark of Verizon Data Services Incorporated.
All other marks are the properties of their respective owners.
As used herein, denotes registration in the United States.
A
A band
Radio frequencies used by A-side carriers/operators: 824849 MHz.
A links
(See access links.)
A-block license
Type of license granted to a Personal Communications Services (PCS) carrier/operator in the U.S.
An A-block license allows the license holder to provide PCS service in a major trading area
(MTA). An A-block license holder can use 30 MHz of the spectrum. Other PCS licenses include
B-block, C-block, D-block, E-block, and F-block.
A-B switch
Allows a wireless phone to be programmed to select service from either an A-side or a B-side
carrier/operator.
A-Key
64-bit parameter associated with a mobile station (MS) and known only to the MS and its
associated authentication center (AC). The A-Key and electronic serial number (ESN) are usually
programmed into the handset by the manufacturer.
A-side carrier/operator
One of two types of carriers/operators designated by the Federal Communication Commission
(FCC) to provide wireless telephone service. A-side market licenses were originally awarded to
non-wireline carriers/operators.
Abstract Syntax Notation One (ASN.1)
Standard language for the description of data defined in 1988. Reference International
Telecommunications Union (ITU) TX X.208. International Standards Organization (ISO) 8824.
AC
(See authentication center.)
ACCESS
A roamer settlement and exchange service provided by Syniverse to meet the data exchange,
control, and financial settlement needs of wireless carriers/operators. Stands for Automated
Clearinghouse Calls Exchange Settlement System.
access charge
Flat, monthly fee charged to a subscriber for the use of a wireless system (whether or not the
subscriber makes or receives any calls). Depending on the service plan (rate plan) chosen, this fee
may include a number of free minutes of connect time.
access control
Prevents unauthorized access to a resource.
access fee
Special fee local phone companies are allowed to charge customers for the right to connect with
the local phone network. Cellular subscribers contribute to access fees and pay a federal excise
tax.
access fraud
1) Type of fraud that occurs when a wireless phones electronic serial number (ESN) or mobile
identification number (MIN) is manipulated to emulate a legitimate wireless subscriber.
2) Subscribing for service using false information.
activation
Process of setting up call forwarding after a *18 message has been acknowledged by the home and
serving switches.
active case list
Table of active cases of suspected fraud created by FraudX detection and analysis components.
Cases are listed by the highest ranked fraud type and by confidence rating within the fraud type.
actual line range
Range of numbers a carrier/operator actually uses. A license may include the range 0000-9999 but
the carrier/operator may not use all the available numbers.
ad hoc reports
User-customized reports based on queries of a database.
adaptive array antennas
Type of advanced antenna technology that continually monitors a received signal and dynamically
adapts signal patterns to optimize wireless system performance.
adjacent channel interference
Signal impairment to one frequency due to the presence of another signal on a nearby frequency.
adjunct processor (AP)
Computer located outside a telephone switching system that issues commands to the switch.
adjustment
Charge or credit to an account due to a billing exception or error.
ADP
(See Application Database Platform.)
ADS
(See automatic database synchronization.)
Advanced Intelligent Network (AIN)
Sometimes used as a synonym for Intelligent Network (IN).
Advanced Mobile Phone System (AMPS)
The term AMPS, originated by AT&Ts Bell Laboratories, before the breakup of the Bell System
in 1984, refers to its analog cellular technology. The AMPS standard has been the foundation for
the industry in the United States, although it has undergone numerous modifications in recent
years.
advice of charge
Supplementary service that provides a subscriber with cost estimates for services.
age
Refers to the age of a call record; that is, the time that elapsed since the call was completed.
Roaming partners bilaterally agree on age limits. For example, Syniverse defines two age limits: a
standard age limit (36 hours) and an exceptional age limit (30 days), and requires a
carrier/operator to transmit records within the standard age limit.
age edit
ACCESS S&E Services check to determine if a call record is older than the age limit to which
roaming partners have agreed.
aged messages
Messages (call records) that exceed the industry standard limit, measured from call date to date of
receipt by the authorized receipt point (ARP). These messages are rejected by the settlement and
exchange service provider and returned to the serve carrier/operator.
allow unknown
Option chosen by a serving carrier/operator to allow a roamer system access when a validation
response is not received within a specified amount of time. More commonly known as assume
positive. (See assume positive.)
Allowed, Bad (Out-of-Range) ESN
Fraud identification status used in FraudManager in which an electronic serial number (ESN)
was discovered to be out of range, after an earlier call was allowed.
Allowed, Negative Current, Switch Update Required
Fraud identification status used in FraudManager in which a switch negative file update was in
progress at the time the call was allowed.
Allowed, No Status Available
Fraud identification status used in FraudManager in which there is either no general location
register (GLR) status on the roamer and no response from the home switch, or the roamer is not
validated positive in a predetermined amount of time, (30 days).
Allowed, Positive Current
Fraud identification status used in FraudManager in which the general location register (GLR)
status is positive and the authorization period has not expired or in which the roamer is positively
validated by the home switch.
Allowed, Positive Expired
Fraud identification status used in FraudManager in which a roamer is validated positive in a
predetermined amount of time (30 days), but the authorization period has expired and no response
has been received from the home switch.
Allowed, Positive Response from EDS
Fraud identification status used in FraudManager that indicates the total number of registrations
that are allowed by Electronic Data Services (EDS).
Allowed, Tumbling Detected, No Switch Update Requested
Fraud identification status used in FraudManager in which tumbling is detected but the serving
switch requests no update of the industry negative file (INF) or the switch negative file - The call
is allowed. The field indicates the number of calls allowed for this reason.
AMA
(See automated message accounting.)
AMA data
Data consisting of a record for each wireless call placed. While call record (message) formats
vary, all records include information such as the date of the call, time of the call, duration of the
call, mobile identification number and electronic serial number (MIN/ESN) of the phone making
the call, and phone number called. AMA data is captured at a mobile telephone switching office
(MTSO), recorded on magnetic tape, and forwarded to the rating/billing vendor. The billing
vendor removes home call information for customer billing and converts roamer call information
to the Cellular Intercarrier Billing Exchange Record (CIBER) format for forwarding to a
clearinghouse, such as ACCESS. (See also automated message accounting.)
AMPS
(See Advanced Mobile Phone System.)
American National Standards Institute (ANSI)
Non-profit, privately funded organization that coordinates the development of U.S. voluntary
national standards. ANSI is the U.S. representative to non-treaty international standards-setting
entities including the International Organization for Standardization (ISO) and the International
Electrotechnical Commission (IEC).
ARP
(See authorized receipt point.)
ARPU
(See average revenue per unit.)
artificial intelligence (AI)
Approach to computer software design in which an application uses programmed rules to evaluate
input, thus simulating human ability to reason. In sophisticated AI programs, a system does not
react the same way forever, but uses received input to learn new responses.
ASCII
(See American Standard Code for Information Interchange.)
ASE
(See Application Service Element.)
ASM
(See Account Status Monitor.)
ASN.1
(See Abstract Syntax Notation One.)
assume negative
Option a serving carrier/operator in an Interim Standard 41 (IS-41) environment can choose in
order to deny a roamer system access when a validation response is not received within a specified
time. (See also Deny Unknown.)
assume positive
Option a serving carrier/operator in an Interim Standard 41 (IS-41) environment can choose in
order to allow a roamer system access when a validation response is not received within a
specified time. (See also Allow Unknown.)
assurance level
Extent of verification a certification authority applies to validate the identity contained in a digital
certificate, dictated by how the digital certificate is expected to be used such as in electronic
commerce, online information services, or e-mail. Assurance levels include certifying the
uniqueness of the name, performing trusted third-party verification, and performing in-person
verification.
asynchronous transfer mode (ATM)
Multiplexed (MUX) information transfer and switching method in which information is organized
into fixed-length (53 octet) cells and transmitted according to each applications instantaneous
need. ATM is similar to packet switching because bandwidth is allocated on demand.
ATIS
(See Alliance for Telecommunications Industry Solutions.)
auditability
Ability to prove or verify that a given transaction or event occurred and that it was processed and
recorded accurately for a particular functional entity.
authentication
Process of verifying the identity of a wireless phone by a combination of its electronic serial
number (ESN), mobile identification number (MIN), and A-Key for the purpose of providing or
denying wireless service. Information is exchanged between a mobile telephone and its associated
authentication center (AC) to confirm its identity. Syniverse offers comprehensive authentication
services through its Encrypt-A-Key product family. (See also verification.)
B
B band
Radio frequencies used by B-side carriers/operators: 869894 MHz.
B links
(See bridge links.)
B-block license
Type of license granted to a Personal Communications Services (PCS) carrier/operator in the U.S.
The B-block license allows the license holder to provide PCS service in a major trading area
(MTA). B-block license holders can use 30 MHz of the spectrum. Other PCS licenses in the U.S
include A-block, C-block, D-block, E-block, and F-block.
B-side carrier/operator
One of two types of carrier/operator the Federal Communication Commission (FCC) designates to
provide wireless telephone service. B-side licenses are awarded to wireline carriers/operators.
batch
Group of Major Accounts Billing Exchange Logistical (MABEL) records submitted to a major
accounts consolidator or a group of Cellular Intercarrier Billing Exchange Record (CIBER)
formatted call records forwarded from a serve system identification (SID) to a home SID. The
CIBER record group is also sometimes referred to as a pack.
batch report
Report that bunches related information together, such as payroll records, for further processing or
analysis. A batch report is generally the result of batch processing and, unlike interactive or real
time processing, does not depend on operator intervention.
batches in transit
Cellular Intercarrier Billing Exchange Record (CIBER) data exchanged between two settlement
and exchange providers. The data contains call records from the current settlement cycle which
have not been processed by both service providers before the close of the settlement period.
baud rate
Measure of transmission speed over an analog telephone line. Baud rate, which is the number of
changes per second in an analog sine wave, is different from bits per second (bps), which is the
transfer rate of digital bits on a line. Advanced coding techniques permit more than one bit to be
placed on a baud. A 9600 bps modem is actually a 2400 baud modem with advanced coding that
impresses four bits on each baud.
Bbc service
Identification of services used within a call; consists of the service type, service code, radio
channel used, and transparency indicator.
bearer service code
Two-character code that defines a specific bearer service.
bearer service group code
Two-character code that defines a specific bearer service group (all data circuit synchronous
services, all dedicated PAD access services, etc.).
bearer services
Category of transmission service provided by the Global System for Mobile Communication
(GSM) system that covers computer data services.
Bellcore
Company formed at the breakup of the Bell System in order to continue the telecommunications
research and development work of Bell Laboratories. It is owned, jointly, by the Regional Bell
Operating Companies (RBOCs) that were created when the Bell System was broken up.
bent-pipe technology
Satellite technology to transmit calls from one point on Earth to a satellite and back down to
another point.
BIC-Roam
(See Barring of Incoming Calls when Roaming.)
BID
(See Billing Identification or Billing Identifier.)
big endian
Describes the sequence in which multi-bytes are stored in a computers memory; the most
significant byte is stored in the lowest memory address, which is the address of the data.
bit stream
Form that digital data takes when it flows on a link. The data is a series of electric pulses
representing bits, hence a bit stream.
blacklisting
Also known as restriction, blacklisting is the removal of Open Connectivity visibility by
operator or country. This can be done at the operator, country, or MSISDN level.
block denial
Service definition included in FraudForce that, when imposed in a service area, generates a
denial response back to the visited switch, preventing any calls from being placed or received.
BOIC
(See Barring of Outgoing International Calls.)
BOIC-exHC
(See Barring of Outgoing International Calls except to Home Country.)
bridge links (B links)
Connects a signal transfer point (STP) to another STP. Typically a quad of B links connect STPs
at the same Signaling System 7 (SS7) level. For example, B links connect the STPs of one
network to the STPs of another network. Because the distinction between B links and diagonal
links (D links) is somewhat arbitrary, they are sometimes referred to as B/D links.
broadband
Using a wide bandwidth channel to transmit voice, data, or video services.
broadband Personal Communications Services ( broadband PCS)
Synonymous with PCS created in the A-through F-Block PCS auctions and used for voice and
data.
broadcast system identification (broadcast SID)
SID that is broadcast from a cell site to mobile stations (MSs) to identify a market when the
market has only a billing identifier (BID). BIDs are never broadcast from a cell site but are used
only for CIBERNET or billing purposes.
browned out
Term used to refer to an area code and exchange (NPA/NXX) that has been pulled for fraud.
browser
Client program, such as Microsoft Internet Explorer or Netscape Navigator, that uses Hypertext
Transfer Protocol (HTTP) to enable users to navigate in a World Wide Web (Web) and interact
with its content, such as view pages, copy and print material, and download files).
browser certificate
Digital certificate used by a browser such as Netscape Navigator or Microsoft Internet Explorer.
(See also certification.)
BTA
(See basic trading area.)
Business Monitor
Application that helps Syniverse customers monitor clearing and roaming data in a proactive
manner, so you know about problems quickly and can take steps to solve them. The application
enables you to quickly pinpoint affected markets, so you need not sift through a lot of data when
troubleshooting.
C
C band
Radio frequencies designated for Personal Communications Services (PCS).
C-block license
Type of license granted to a Personal Communications Services (PCS) carrier/operator in the
United States. A C-block license allows the license holder to provide PCS service in a basic
trading area (BTA). A C-block license holder can use 30 MHz of the spectrum. C-block licenses
are reserved for smaller companies and entrepreneurs. Other PCS licenses in the United States
include A-block, B-block, D-block, E-block, and F-block.
CA
(See certification authority.)
CA certificate
(See certification authority certificate.)
CALEA
(See Communications Assistance for Law Enforcement Act.)
call
Completed telephone connection. (See also completed call.)
call accounting systems
Applications that collect records of calls but discard incomplete records or fail to collect records
for all types of calls, such as misdials or interrupted calls). Thieves try to take advantage of these
systems by tricking them into discarding records for valid calls, then electronically adding
impulses to place fraudulent calls.
call attempt
Incomplete call. Occurs when a cellular subscriber tries to place a call, but is unsuccessful for
some reason, such as interference, equipment malfunction, or blocking by a fraud control system.
(See also completed call.)
call barring
Supplementary service preventing certain categories of outgoing or incoming calls from reaching
or being placed from a mobile phone. (See also BAOC, BOIC, BOIC-exHC, and BIC-Roam.)
call blocking
Action of denying a wireless phone user the ability to make calls. Usually initiated by a fraud
control system and executed by the serving switch.
call charges
Charges levied on a specific portion of a wireless telephone call. Examples of charges are local
airtime, long distance, or roamer airtime.
celltracker
Scanning device that looks like a wireless phone and is used to eavesdrop on other wireless phone
conversations.
cellular
Communications systems that use the radio telephone technology of limited-coverage cells with
the automatic handoff of calls-in-progress between cells.
cellular authentication and voice encryption (CAVE)
Algorithm used to produce a unique number, given a unique set of input variables. Because CAVE
always produces the same answer, given the same input variables, it is used by associated wireless
entities to verify the identity of the entity. For example, if an authentication center (AC) CAVE
calculation matches the result provided by a mobile station (MS), the AC assumes the MS is a
valid user and is not a clone.
Cellular Carrier Network Services (CCNS)
Syniverses long distance and network services, provided at highly competitive rates, that include
inbound, outbound, and infrastructure services.
cellular digital packet data (CDPD)
Open standard for using existing cellular systems to transmit data, as opposed to voice. The
technology breaks data files into packets and sends them along idle channels of existing wireless
networks.
cellular fraud
Deliberate attempt to obtain wireless phone service without paying for it.
cellular geographic service area (CGSA)
Service area composed of one or more counties in which a wireless telephone company is
authorized to operate.
cellular geographic service area (CGSA) index
Index assigned to a particular CGSA or carrier/operator
cellular geographic service area (CGSA) number
Number assigned by the Federal Communication Commission (FCC) to a particular CGSA.
cellular intercarrier billing exchange record (CIBER)
Industry-standard record format used to transfer roamer billing data in Advanced Mobile Phone
System (AMPS) networks; ensures smooth and consistent processing of roaming records for
settlement and liability among wireless carriers/operators. The Cellular Intercarrier Billing
Exchange Record (CIBER) is the AMPS counterpart to Transferred Account Procedure (TAP) in
Global System for Mobile Communication (GSM) networks and is primarily used in North
America.
cellular subscriber station (CSS)
In Interim Standard 41 (IS-41) terminology, interface equipment used to terminate a radio signal
path at a user site.
Cellular Telecommunications Internet Association (CTIA)
Trade association of wireless carriers/operators, including cellular, and related companies.
CEPT
(See Confrence Europene des Administrations des Postes et des Tlcommunications.)
CGSA index
(See cellular geographic service area index.)
CGSA number
(See cellular geographic service area number.)
chaining
Process of linking records that represent different services used within the same call by means of a
unique identification contained in all the chained records.
challenge response intelligent peripheral (CRIP)
Automated challenge/response system that interacts with callers suspected of fraud. CRIP accepts
calls suspected of fraud, challenges the caller to enter a personal identification number (PIN),
accepts dual tone multi-frequency (DTMF) responses from the caller, and authorizes the caller for
wireless phone use or routes the call to the callers home customer service representative (CSR).
channel
Frequency pair used for one wireless phone call. One frequency is for transmitting and the other is
for receiving.
CHARC
Prefix in the roaming administration report naming scheme. The final C indicates a control
report.
CHARD
Prefix in the roaming administration report naming scheme. The D indicates a daily report.
charge
Cost billed to a subscriber. In a call detail record (CDR), the charge field is the cost for the use of
the service the record describes.
charge start date
Date on which an item associated with an individual charge begins being billed. For example, the
date of a phone call.
charge start time
Time at which an item associated with an individual charge begins being billed. For example, the
start of a phone call.
chargeable duration
Duration of the use of a basic service being charged in a call detail record (CDR). For example,
the length of the phone call.
chargeable service
Any service for which a charge is incurred and recorded in a Transferred Account Procedure
(TAP) file.
chargeable units
Units in a detail record that are considered chargeable items. For example, minutes or data
segments.
charged item
Field indicating the element to which a charge applies. A charge may be a duration-based, event-
based, volume-based, or inter-network accounting charge.
CHARM
Prefix in the roaming administration report naming scheme. The M indicates a monthly report.
CHARS
Prefix in the roaming administration report naming scheme. The S indicates settlement period.
CLIP
(See calling line identification presentation.)
clip-on-fraud
Breaking into a telephone box to tap into a business telephone line for the purpose of selling long
distance service. The service may be sold directly at the point of illegal entry or the line may be
transferred to a nearby telephone booth from which service is sold.
CLIR
(See calling line identification restriction.)
CLLI code
(See common language location identifier code.)
clone
Fraudulent mobile unit that uses the mobile identification number and electronic serial number
(MIN/ESN) of a legitimate wireless phone. While the MIN/ESN is good, the user is not the person
who owns the MIN/ESN. Clones are created by illegally programming a legitimate MIN/ESN into
another phone. (See also complete clone, counterfeit, simple clone, and tumbling.)
CloneDetector System
Advanced Syniverse system that uses knowledge-based technology to automatically alert
carriers/operators to potential counterfeit (clone) fraud on an individual switch basis.
(CloneDetector has been replaced by a more sophisticated application. (See FraudX.)
cloning
Interception and illegal programming of a valid mobile identification number and an electronic
serial number (MIN/ESN) into another wireless phone.
cloning fraud
Unauthorized use of a mobile identification number (MIN), electronic serial number (ESN), and
possibly personal identification number (PIN) to alter or clone another wireless telephone to
mimic the original so the legitimate customer is billed for the calls instead of the thief.
closed user group (CUG)
Supplementary service that allows a group of subscribers to form a group in which all members
may call one another without restriction but access to and from numbers outside the CUG is
restricted or denied.
cluster
Link together switches of the same manufacturer and type for direct communication of validation
and call delivery information.
CMP
(See call management platform.)
CMRS
(See commercial mobile radio service.)
CMS
(See Certificate Management System.)
CNAM Service
(See Calling Name Service.)
corporate account
Major account, usually a corporation, spanning more than one wireless market and serviced by
more than one carrier/operator.
corporate certificate
Digital certificate issued to a corporation.
counterfeit
Fraudulent mobile unit that uses the mobile identification number (MIN) and electronic serial
number (ESN) of a legitimate wireless phone. (See also clone.)
country code
Two-or three-digit prefix used to identify a country outside the North American Numbering Plan
(NANP) when dialing a number in that country.
COW
(See cellsite on wheels.)
CPE
(See consumer premise equipment or customer provided equipment.)
CPF
(See Customer Positive File Service.)
CPN
(See calling party number.)
CPNI
(See customer proprietary network information.)
CPS
(See certification practice statement.)
credit
In the North American Interest Group Transferred Account Procedure II (NAIG TAP II) call
records, a negative value in a charge, usage charge, or tax charge field. Credits cannot be included
in TAP 1 or TAP 2 call records because negative values are not allowed in those billing formats.
credit alarm
Type of alarm that occurs when a subscribers calling activity exceeds the subscribers credit
limit.
CRIP
(See challenge response intelligent peripheral.)
CRL
(See certificate revocation list.)
CRL distribution point
Directory entry or other distribution source for certificate revocation lists (CRLs). A CRL
distributed through a CRL distribution point contains revocation entries for revoked certificates
issued by one certification authority (CA).
cron
Daemon that performs tasks at specified times and dates, according to instructions in a crontab
file. These tasks and the time when they are to be carried out are usually kept in files located in
two directories: /usr/lib and /usr/spool/cron. (See also daemon and crontab file.)
crontab file
File that enables a user to set up programs for repeated execution by specifying the dates and
times at which the specified commands are to be executed.
D
D-block license
Type of license granted to a Personal Communications Services (PCS) carrier/operator in the
United States. A D-block license allows the license holder to provide PCS service in a basic
trading area (BTA). A D-block license holder can use 10 MHz of the spectrum. Other PCS
licenses in the United States include A-block, B-block, C-block, E-block, and F-block.
daemon
Background UNIX process (pronounced demon) that carries out tasks on behalf of every user. A
daemon sleeps until an event occurs which requires its help. A daemon can perform its tasks
automatically or periodically; its system management functions are usually transparent to users.
(See also cron.)
data privacy
Process of ensuring that data is viewed only by those authorized to see it. Data encryption is often
used to ensure privacy.
dataset name (DSN)
Identifying name of a particular data file that is forwarded to or received from a rating/billing
system.
data volume
Amount of data transferred during the use of a bearer service, measured in segments of 64 octets.
data volume reference
Field in a call detail record (CDR) that is set to a unique value to indicate that the data volume
field in that call record could not be determined at the time the record was generated. The same
reference value will occur in a later record containing the correct data volume value, it is
generated when the information is available.
DCMS
(See data collection management system.)
DCS
(See digital cellular system.)
DDI
(See digital data interceptor.)
DDL
(See Data Dictionary Language.)
deactivation
Act of making a service, rate plan, or feature unavailable or the date a subscriber is no longer
allowed to use a mobile unit or service.
dead spot
Location in a cell where wireless radio signals cannot be received. This may be caused by physical
obstacles such as mountains or tall buildings), interference from other radio sources, or multi-path
interference, reflected signals that cancel out the main signal.
decimal
Numbering system, based on the digits 09. Also known as Base 10. Electronic serial numbers
(ESNs) expressed in decimal form are 11 digits long. (See also hexadecimal.)
DECT
(See digital European cordless telephone.)
dedicated line
Circuit leased by a customer for exclusive use. Also referred to as a private line.
default
Predefined standard choice made by a computer system when a user has not overridden the
default.
default processing
In an Interim Standard 41 (IS-41) environment, action a system takes, based on what the serving
carrier/operator specifies, to allow or deny system access to a roamer when a validation response
is not received within a specified amount of time. (See also Denied, No Status Available.)
DEFINE names
Method of assigning a logical name to a physical object using a disk file, Structured Query
Language (SQL) catalog, or tape drive. On Tandem, DEFINE names begin with an equal sign (=).
detail report
Lists each call or each market. This contrasts with a summary report that shows the total, or
average, of all calls or all markets.
Deutsche Telekom MobilNet (T-Mobil)
Europes largest provider of Global System for Mobile Communication (GSM) cellular service.
diagonal links (D links)
Connect secondary signal transfer point (STP) pairs to primary STP pairs in a quad-link
configuration. For example, STPs in a local or regional network would connect to STPs on the
inter-network gateway. Secondary STPs in the same network are connected through a quad of D
links. Because the distinction between bridge links (B links) and D links is somewhat arbitrary,
these links are sometimes referred to as B/D links.
dialed number information service (DNIS)
Included in the Caller Validate message to determine the original dialed digits of the caller and to
identify the 800 number used to route the call to FraudManager.
dialog box
Interactive window for providing, requesting, or verifying information on screen.
digital cellular system (DCS 1800)
Global system for the mobile communications-based Personal Communications Services (PCS)
network outside of the United States.
digital certificate
1) In cryptography, a password-protected, encrypted data file that includes the name and other
data that identifies an associated entity. A certificate includes a public key that verifies the
digital signature of the user, which is signed with a matching private key unique to the user.
Through the use of keys and certificates entities exchanging data can authenticate each other.
2) Digital token assigned to address security issues when executing business transactions through
the Internet. Certificates are designed so that none of the details can be changed during a
transaction or interchange without invalidating the digital signature.
digital data interceptor (DDI) box
Scanner used to collect wireless mobile identification numbers (MINs), electronic serial numbers
(ESNs), and anything entered through a telephone keypad such as personal identification numbers
(PINs), voice mail, access, and credit cards.
digital envelope
Generic technique for encrypting data and sending the encryption key along with the data.
digital European cordless telephone (DECT)
Device that can be used as a cordless telephone and wireless office phone in Europe.
digital key
String of unique bits that enables a message to be scrambled and unscrambled. The string size
determines the key size. The smallest key contains 512 bits, the largest, 2048 bits - the larger the
number, the higher the level of security. (See also key and session key.)
digital modulation
Method of encoding information for transmission. In most cases of voice conversation,
information is turned into a series of digital bits the 0s and 1s of computer binary language. The
information is converted back to its original form at the receiving end. Digital transmission offers
a clean signal and is less susceptible than analog transmission to modulation problems, such as
fading and static. Digital transmission is more widely used than analog transmission because it
offers increased capacity. (See CDMA, TDMA, and GSM.)
E
E-mail hit
Involves wide distribution of e-mails that contain information on computer threats and warnings
that turn out to be a hoax. Also known as e-mail hoax or mail spoofing.
E-block license
Type of license granted to a Personal Communications Services (PCS) carrier/operator in the U.S,
which allows the license holder to provide PCS service in a basic trading area (BTA). An E-block
license holder can use 10 MHz of the spectrum. Other U.S. PCS licenses include A-block, B-
block, C-block, D-block, and F-block.
E-link
(See extended links.)
Eastern (Standard/Daylight) Time (ET)
Time zone of the Syniverse Data Center, which is reflected on all ACCESS reports.
EDI
(See Electronic Data Interchange.)
edit
Operation performed on the individual call records contained in a file to check their validity,
internal consistency, and conformance to specified standards.
editing
Process of reviewing files to ensure they meet industry standards.
EDT
(See electronic data transfer.)
EE
(See end entity.)
EIR
(See equipment identity register.)
elapsed time
Duration from the time a connection is made to the release of all radio resources. Chargeable time
and elapsed time are usually the same but may differ if a carrier/operator does not charge for part
of the call such as during call hold. In a North American Interest Group Transferred Account
Procedure II (NAIG TAP II) mobile-originated or mobile-terminated call record, this is the Usage
Detail field.
Electronic Data Interchange (EDI)
Standard format for exchanging business data. An EDI message contains data elements that are
separated by delimiters, which collectively build a string called a data segment. One or more data
segments enveloped by a header and trailer form a transaction set, which is the EDI equivalent of
a message.
electronic data transfer (EDT)
Network transportation medium used to transfer roamer call data among carriers/operators, billing
vendors, and settlement and exchange service providers.
electronic serial number (ESN)
Unique number, embedded in a wireless phone by the manufacturer, that is used to identify the
unit for billing and fraud control purposes. ESNs consist of two parts, a manufacturers code that
is assigned by CIBERNET to each wireless phone manufacturer and an individual serial number
for that phone. ESNs are expressed as decimal numbers (1290000000 to 2509999999) or
hexadecimal numbers (81000000 to FA989677F).
EMS
(See Event Management Service.)
Encrypt-A-Key Authentication Services
Syniverses complete authentication solution, including key repository, key management, and
authentication services.
Encrypt-A-Key Management Center
Syniverses facility that provides A-Key management service to the Encrypt-A-Key Network
Authentication Center (NAC) and autonomous service provider authentication centers (ACs).
Encrypt-A-Key Network Authentication Center
Syniverses facility that provides authentication services for subscribers who roam in an
authentication-capable market and have authentication-capable phones. (See also authentication
center.)
Encrypt-A-Key Repository
Syniverse service facility that provides storage and retrieval of authentication keys (A-Keys).
encryption
Converting a message so it is unreadable by anyone without a secret encryption key. This is a
method of ensuring security through the use of complicated mathematical algorithms. Encrypted
messages are assigned a key that must be used to decrypt them. (See A-Key.)
error-handling script
Routine that clears all application resources when a severe application error occurs. In Syniverses
Prepaid Wireless system, this script is created each time an application is generated in the
application builder.
error log
Detailed list of system and application errors.
ESID
(See extended system identification.)
ESMR
(See enhanced specialized mobile radio.)
ESN
(See electronic serial number.)
ESN converter
Visibility Services function that allows users to convert an electronic serial number (ESN) from
hexadecimal to decimal or from decimal to hexadecimal.
Ethernet local area network (Ethernet LAN)
Type of LAN that uses twisted-pair wire and coaxial cable to transmit data at speeds up to 10
Mbps. It is used to connect computers and printers within the same building or campus.
ETSI
(See European Telecommunications Standards Institute.)
European radio messaging system (ERMES)
Paging system used in Europe.
European Telecommunications Standards Institute (ETSI)
European counterpart to the American National Standards Institute (ANSI) that encourages the
integration of telecommunications standards throughout Europe.
event
Any network occurrence, which merits the attention of some network device such as a task
commencement or task completion).
Event Manager
Part of Syniverses Mobile Data Solutions, Event Manager is a clearing solution that manages IP
events for content providers and wireless operators, including messaging, m-commerce, mobile
financial, Internet content, intranet access, and entertainment information. (See also Message
Manager.)
Event Management Service (EMS)
Tandem utility that contains processes, tools, and interfaces to report and retrieve events.
event message
Message provided by a switching domain to a computing domain, to indicate: a change in state of
a call by reporting state transitions of each connection; a physical or logical device change, such
as, ready, sending, or not connected; a change in call-associated information; or a change in
switching domain specific information that is associated with a device or call.
event threshold
User-defined number that represents the acceptable ceiling for a given event, such as tumbling or
teardown attempts, to occur per roamer. It is used to filter out insignificant or normal activity.
F
F link
(See fully-associated links.)
F-block license
Type of license granted to a Personal Communications Services (PCS) carrier/operator in the U.S.
An F-block license allows the license holder to provide PCS service in a basic trading area (BTA).
An F-block license holder can use 10 MHz of the spectrum. F-block licenses are reserved for
small companies and entrepreneurs. Other PCS licenses in the United States include A-block, B-
block, C-block, D-block, and E-block.
facilities
Equipment, such as telephone lines or cell towers, or services, such as software utilities, that
makes up a telecommunication system.
far end network element (FENE)
Network node at the most distant point on a network.
fatal error
Failure during call record processing that makes it impossible to continue or casts doubt that the
information contained in the call records is correct.
FCC
(See Federal Communications Commission.)
FDMA
(See frequency division multiple access.)
FDSHOT
Specialized process that searches for matches to numbers on a carrier/operator-defined Hot List
and generates an alarm for each match.
feature package
Group of calling enhancement services associated with a wireless subscribers monthly service
such as voice mail or three-way calling.
Federal Communications Commission (FCC)
U.S. government agency responsible for regulating the telephone and radio industries. The FCC
allocates radio spectrum frequencies for certain uses, licenses those frequencies to companies, and
approves equipment types to prevent interference between devices.
Federal Information Processing Standard (FIPS)
U.S. government standards that apply to computer-based systems - in this case, the standards
apply to data communications.
filtering
Ability to control the types of information displayed in a FraudX window. For example, from the
main Cases window users can specify a filter to view only cases with an On Watch status.
financial settlement
Financial reconciliation among wireless carriers/operators for providing roaming services to each
other's customers.
FIPS
(See Federal Information Processing Standard.)
firewall
Combination of hardware and software that protects a computer or group of computers by
enforcing a boundary between networks, such as between a company intranet and the Internet. A
firewall can restrict access at any of several levels, including the network or application, and
examine traffic at that level. For example, an application-level firewall may examine traffic at the
File Transfer Protocol (FTP) or mail level while a network-level firewall examines traffic at the
protocol packet level.
fixed-length field
Field that always has the same number of bits in each message where it appears.
fixed wireless access (FWA)
(See wireless local loop.)
flagged
Industry negative file (INF) reason (code F) that indicates a wireless telephone with a mobile
identification number and an electronic serial number (MIN/ESN) that has been disconnected.
Fleet-On-TrackSM Service
Syniverse service that provides vehicle location and call validation services to businesses that
market wireless communications for fleet or field service management.
flexible SID blocking
Type of service blocking that denies service by updating a roaming customers profile. This type
of blocking enables FraudForce to track roamers in the blocked location. A carrier/operator can
specify start and stop times for flexible blocking.
flow control
Process of stopping and starting the flow of data as necessary when the receiving device cannot
receive the data as quickly as it arrives.
force positive
Option available to carriers/operators to ensure a definite positive validation status for a valid
roaming customer who is erroneously denied service on a first call in any market.
Forecasting
ACCESSibility analytical tool (available by special purchase) that enables analysis of the
performance of system identification (SID) to SID combinations for selected time frames such as
past and projected future.
frame relay
Network access standard defined by the International Telecommunications Union -
Telecommunications Services Section (ITU-T) in the I.122 recommendation, Framework for
Providing additional Packet Mode Bearer Services. Frame relay services, delivered by wireless
carriers/operators, use a form of packet switching that is analogous to a streamlined version of
X.25 networks. A frame relay network can accommodate data packets of various sizes associated
with virtually any native data protocol.
frequency ability
Ability of a wireless telephone to shift frequencies automatically to maintain a call in process.
frequency division multiple access (FDMA)
Method of radio transmission that allows multiple users to access a group of radio frequency
bands without interference.
frequency reuse
System of allocating frequencies among cells so that nearby, non-adjacent cells can use the same
frequencies. This works because wireless transmitters have a limited range. Frequency reuse
allows a wireless system to handle large numbers of calls with a limited number of channels. The
idea is akin to FM radio stations in different cities using the same frequency without interference.
FSN
(See Fraud Serial Number.)
FSS
(See File Specification Group.)
FTAM
(See File Transfer, Access, and Management.)
FTP
(See File Transfer Protocol.)
Fullyassociated links (F links)
Directly connects two signaling end points in networks without signal transfer points (STPs).
FWA
(See fixed wireless access.)
G
gateway
Entrance and exit into a communications network. Technically an electrical repeater that receives
and routes signals from one network to another, Gateways typically include signal conditioners to
filter unwanted noise and control characters. In data networks, gateways usually connect two or
more otherwise incompatible networks.
gateway mobile services switching center (GMSC)
Interface of the wireless network to the public switched telephone network (PSTN).
gateway screening
Process that occurs on any signal transfer point (STP) that connects two networks. The process
verifies that incoming messages are from legitimate network users and discards any that are not.
general location register (GLR)
Syniverses call processor database that contains information used to validate known TIA/EIA-41
roamers. The GLR also contains routing files the call processor uses to locate the home wireless
carrier/operator for the validation of unknown roamers.
General Packet Radio Service (GPRS)
Standardized by the European Telecommunications Standards Institute (ETSI) as part of Global
System for Mobile Communication (GSM) Phase 2+ development, GPRS represents the first
implementation of packet switching within a GSM. Rather than sending a continuous stream of
data over a permanent connection, packet switching uses the network only when there is data to be
sent.
H
handheld device markup language (HDML)
Specialized language capable of supporting Internet access from wireless devices such as
handheld personal computers and smart phones. Based on hypertext markup language (HTML),
several commercial versions currently exist.
handoff
Process by which a mobile telephone switching office (MTSO) passes a wireless phone
conversation from one radio frequency in one cell to another radio frequency in another cell.
Handoff occurs when a mobile station (MS) crosses from one cells range into another cells
range. The decision to hand off a call to another cell and the determination of which cell the call
should be transferred to is made by the base station, based on the signal strengths between the MS
and the base stations within its range. Handoff is performed quickly enough that callers dont
notice.
handoff/handback
Transfer of responsibility for a wireless call from one cell to the next by switching frequencies.
handover
Technique used by Global System for Mobile Communication (GSM) technologies to continue a
call when a mobile station (MS) crosses from one cells range into another cells range. The
decision to hand over a call to another cell and the determination of which cell the call should be
transferred to, is made by the MS based on its measurement of the signal strengths between itself
and known base stations in the current area.
hard dollar loss
Revenue a home carrier/operator loses when it must pay a serving carrier/operator for fraudulent
roaming services.
hash function, value, or algorithm
Function or value used to produce a message digest (MD) that cannot be reversed to obtain the
original. Hashing makes it highly unlikely that different messages will yield the same MD. Also
referred to as one-way hashing. (See also cryptographic algorithm, message digest, and
nonrepudiation.)
HDML
(See handheld device markup language.)
hertz (Hz)
Measurement of frequency expressed in cycles per second. (See also kilohertz, megahertz, and
gigahertz.)
hexadecimal
Numbering system used extensively with computers that is based on the digits 09 and the letters
AF. Electronic serial numbers (ESNs) expressed in hexadecimal are 8 digits long. (See also
decimal.)
hierarchy of trust
(See trust hierarchy.)
High Level Data Link (HLDL)
International Standards Organization (ISO) standard for Layer 2 (Data Link Layer) of the ISO 7-
layered architecture. The high level data link (HLDL) standard ensures that data passed up to the
next layer is received exactly as transmitted - error-free, no data loss, and in the correct order.
hijacker
Fraudulent user who takes control of a traffic channel assigned to a legitimate mobile phone by
increasing the power level of a fraudulent mobile unit above that of a legitimate phone. (See also
call hijacker.)
hit
Event that occurs when a fraud control system identifies a call made by a fraudulent roamer.
hit rate
Percentage of call records that match a predefined pattern. If the percentage is met or exceeded,
the fraud control system creates a violation error.
HLDL
(See High Level Data Link.)
HLR
(See home location register.)
hold
(See call holding.)
home
Carrier/operator, market, or switch associated with a mobile customer or phone. It is based on the
phones mobile identification number (MIN) and the area code and exchange (NPA/NXX)
assignments for the carrier/operator, market, or switch.
HomeInfo
American National Standards Institute 41 (ANSI 41) call processor static database used to store
home-related data.
home call
Call made by a subscriber while in the home market.
home carrier/operator
Company a subscriber pays for basic wireless service. In roamer administration processes, the
home carrier/operator is identified by cross-referencing the callers mobile identification number
(MIN) with a routing file.
home endpoint
Home market for any roamer. (See also home location register.)
HTML
(See Hypertext Markup Language.)
HTTP
(See Hypertext Transfer Protocol.)
HTTPS
(See Hypertext Transfer Protocol Secure.)
hypercube
Statistical model of a subscriber base that enables ChurnManagerSM to identify profile patterns and
usage behaviors for any one subscriber within the general population of subscribers.
hypertext
System that uses distinctly formatted text, such as a different color or underscored text, to link to
another location. When a user clicks on hypertext, the resultant jump may be to another location in
the same file or maybe to a different file.
Hypertext Markup Language (HTML)
Text language used to format content passed from Hypertext Transfer Protocol (HTTP) servers to
client browsers on the World Wide Web and for building and displaying Web pages with
hypertext links. HTML is an offshoot of Standard Generalized Markup Language (SGML). It uses
tags and end tags or standard code terminology encased in open brackets (< >), to indicate
formatting or structural information.
Hypertext Transfer Protocol (HTTP)
Used on the World Wide Web (Web) to pass information from HTTP Web servers to client
browsers. It is the protocol that transmits Web data, or what the user types when surfing the net
(along with the domain name). It means: go to and bring me back the index file with the
following name.
Hypertext Transfer Protocol Secure (HTTPS)
Similar to Hypertext Transfer Protocol (HTTP), but this server software provides for secure
transactions to take place on the World Wide Web (Web).
I
ICC
(See Inter-Carrier Communications.)
ICE
(See InterClearinghouse Exchange.)
ICNS
See (InterClearinghouse Net Settlement.)
ICP
(See Inter-Carrier Communications.)
ICRL
(See indirect certificate revocation list.)
IDEA
(See International Data Encryption Algorithm.)
IFAST
(See International Forum on AMPS Standard Technology.)
INTNAT
Twelve-digit system for long distance calls dialed outside of the North American Numbering Plan
(NANP).
intranet
Private network that uses Internet software and standards to support services such as e-mail,
information distribution, and interconnection (with appropriate security) to the Internet. For
example, agents and sub-agents with access to Syniverses intranet can use the Syniverse World
Wide Web (Web) page to facilitate voucher replenishment.
intrastate long distance
Long distance call placed by a wireless user within the same state.
invalid messages
Call records processed by ACCESS, or another settlement and exchange service provider, that do
not meet Cellular Intercarrier Billing Exchange Record (CIBER) standards.
invalidity date
Date on which a certificates private key was compromised or on which a certificate otherwise
became invalid. This date may be earlier than the revocation date in the certificate revocation list
(CRL) entry, but must be later than the issue date of the previously issued CRL.
invoice
Summary of the amount a specific corporate account owes a consolidator for wireless usage.
invoke
Message transmitted to request information or action.
IP
(See Internet Protocol.)
IP address
(See Internet Protocol address.)
IPDR
(See Internet Protocol detail record.)
IPM
(See interprocessor message.)
IPC
(See interprocessor communication.)
IREC
(See intercarrier records exchange complex.)
IREG
(See International Roaming Experts Group.)
IRM
(See international roaming mobile identification number.)
IS-136
Latest generation of the digital standard time division multiple access technology.
IS-41
(See Interim Standard 41.)
IS-41.0
First Interim Standard 41 (IS-41). It included pre-call roamer validation to block known fraudulent
and tumbling users prior to call connection.
ITA
(See Industrial Telecommunications Association.)
ITU
(See International Telecommunications Union.)
IVR
(See interactive voice response.)
IXC
(See inter-exchange carrier.)
J
JAVA
Programming language from Sun Microsystems; primarily intended for developing World Wide
Web (Web) applications accessible through Internet browsers such as Microsoft Internet Explorer
and Netscape.
JPEG
Compression technique used primarily for editing still images, graphic arts, and desktop
publishing. Jointly developed by the International Standards Organization (ISO) and International
Telecommunications Union - Telecommunications Services Section (ITU-T), it is often used in
Internet-based applications.
K
Ka-band
Radio spectrum in the 18 GHz to 31 GHz range used by satellite communications systems.
kernel
Part of the UNIX operating system that performs basic services such as reading and writing
information, turning devices on and off, and printing or reading characters on a terminal.
key
Parameter used in conjunction with a cryptographic algorithm that determines the transformation
of plain text data into cipher text, the transformation of cipher text data into plain text data, a
digital signature, or a message authentication code. (See also cryptographic algorithm and digital
key.)
key agreement
Method for negotiating a key value online without transferring the key, even in an encrypted form.
key escrow
Encryption system that enables unauthorized access, for example by government agencies, to
encrypted data through special data recovery keys held by a trusted third party. A copy of a
private digital key is secured at a remote location so it can be recovered if needed. Much
controversy exists over key escrow because of the big brother aspects of the concept.
key management
Generation, transmission, and storage of cryptographic keys to authorized recipients in a secure
manner.
L
landline
Traditional wireline telephone network.
Land Mobile Communications Council (LMCC)
Trade group of frequency coordinators and associations serving private users and commercial
carriers/operators.
LAPB
(See link access procedure balanced.)
last hit
Most recent call made by a fraudulent roamer.
LATA
(See Local Access Transport Area.)
LataLinkSM
Syniverses centralized Signaling System 7 (SS7) network connection that provides telephone
companies, competitive local exchange carriers (CLECs), and inter-exchange carriers (IXCs) with
Integrated Services User Part (ISUP) signaling to other IXCs and local exchange carriers (LECs).
LAWBUSTSM
Syniverse service for U.S. law enforcement agencies that provides law enforcement officials with
immediate 24-hour, seven-days-a-week information about wireless carrier/operator contacts. The
service connects to over 70 carriers/operators who can give law enforcement officials critical
information, such as billing or service records, call tracking, and whether a phone has been lost,
stolen, or cloned.
LDAP
(See lightweight directory access protocol.)
LDMTS
(See Long Distance Message Telecommunications Service.)
LEC
(See local exchange carrier.)
LIDB
(See line information database.)
LIDB Access
(See line information database access.)
LIDB/CNAM Storage
(See line information database and calling name services storage.)
lifetime phone
Unlike conventional cell phones, a lifetime phone must be cabled to a laptop to alter its numbers.
A lifetime phone chip stores as many as 99 numbers, along with its reprogramming code.
lightweight directory access protocol (LDAP)
Software protocol that enables anyone to locate organizations, individuals, and other resources,
such as files and devices, in a network. LDAP is a lightweight (less code) version of Directory
Access Protocol (DAP).line information database (LIDB)
Contains valid telephone and calling card numbers in a region. It is used for billing validation.
line information database (LIDB)
Local telephone company database, which contains subscriber information used to perform billing
validation. This is a validation database that can be used by an Interexchange Carrier or another
Local Exchange Carrier to perform line record verification.
line information database access (LIDB Access)
Syniverse service that provides access to LIDBs.
line information database and calling name services storage (LIDB/CNAM Storage)
Syniverse service that provides line information database and calling name services.
line range
Last four digits of a mobile telephone number.
link
Communications channel consisting of a circuit or transmission path, including the equipment
between a sender and a receiver.
M
MABEL
(See Major Accounts Billing Exchange Logistical record.)
magic box
Also known as stealth phone; a cigarette-pack-sized reprogramming aid available from mail order
electronics distributors in the United States and Britain. It has no scanning or memory functions,
but enables a mobile crook to connect to a cell phone and change phone numbers every few
minutes.
major account
Large business customer that requires consolidated billing records for centralized invoicing and
management reporting.
Major Accounts Billing Exchange Logistical (MABEL) record
Standard record format developed by the Cellular Telecommunications Internet Association
(CTIA), for the exchange of major account billing data between carriers/operators and resellers.
MEP/VSP
(See Multi-endpoint MicroLegend Versatile Signaling Point.)
MEPX.25
(See Multi-endpoint X.25.)
message
1) Record of an answered (completed) call. (See also call record.) 2) Information transmitted on a
packet-switched network, such as Signaling System 7 (SS7), travels in parcels called messages.
On the SS7 network, messages are also signal units.
message digest (MD)
Condensed version of a message produced by processing the message with a hash algorithm.
Typically, the digest has a fixed length and is independent of the length of the original message. It
is used to create a digital signature unique to a particular document. An MD can be made public
without revealing the contents of the document from which it is derived. (See also cryptographic
algorithm and hash function.)
message digest version 5 (MD5)
Hashing algorithm. The most common key algorithm used to generate digital certificates.
Message Manager
Part of Syniverses Mobile Data Solutions, Message Manager is a centralized messaging
management service that provides network access, protocol translations and conversions, routing,
and delivery of messages to wireless units. (See also Event Manager.)
Message Processing Engine (MPE)
In local number portability, software that supports robust and accurate flow of porting messages as
well as error checking, to automate switching a customer from one service provider to another.
message service unit (MSU)
Unit of measure on a Signaling System 7 (SS7) network. A single SS7 message typically contains
one Interim Standard 41 (IS-41), one Transaction Capabilities Application Part (TCAP), or one
Integrated Services user Part (ISUP) message. In call processing, this is a message that contains
Message Transfer Part (MTP), SCCP, and TCAP components, sent from or delivered to a call
processing application.
Message Transfer Part (MTP)
Bottom three levels of Signaling System 7 (SS7) signaling node (physical, data link, and network)
used to place formatted signaling messages into packets, strip formatted signaling messages from
packets, and send or receive packets.
Message Transfer Part Level 1 (MTP 1)
Bottom level of the Signaling System 7 (SS7) protocol MTP. Defines the physical, electrical, and
functional characteristics of the data link and the means to access it. This level defines the medium
over which the signaling link is established.
Message Transfer Part Level 2 (MTP 2)
Middle level of the Signaling System 7 (SS7) protocol MTP. At the receiving end, MTP 2
receives a bit stream, assembles bits into fields, assembles fields into messages, provides error
checking and correction, and provides flow control. At the sending end, MTP 2 does the reverse.
Message Transfer Part Level 3 (MTP 3)
Top level of the Signaling System 7 (SS7) protocol MTP. Performs two functions: Signaling
Message Handling, which routes signaling messages between signaling points and Signaling
Network Management, which handles control information concerning outages and congestion.
MSCID
(See mobile switching center identification.)
MSINFO
(See mobile station information.)
MSISDN
(See mobile station Integrated Service Digital Network number.)
MST
(See memory segment transfer.)
MSU
(See mobile station unit or message service unit.)
MTA
(See major trading area.)
MTC
(See mobile terminated call.)
MTP
(See Message Transfer Part.)
MTP 1, 2, 3
(See Message Transfer Part Level 1, Level 2, Level 3.)
MTSO
(See mobile telephone switching office.)
multi party service
Supplementary service allowing simultaneous communication with more than one party. It
requires call holding to be active.
Multimedia Messaging Service (MMS)
A communications technology that enables users to exchange multimedia communications
between capable mobile phones and other devices. An extension to the Short Message Service
(SMS) protocol, MMS defines a way to send and receive wireless messages that include images,
audio, and video clips as well as text.
Multi-endpoint MicroLegend Versatile Signaling Point (MEP/VSP)
I/O control program (Signaling System 7 (SS7) protocol stack converter device) used to handle
connections with the MSVP through Transmission Control Protocol/Internet Protocol (TCP/IP).
Multi-endpoint Transmission Control Protocol (MEP/TCP)
Control program that manages a connection, using Transmission Control Protocol/Internet
Protocol (TCP/IP).
Multi-endpoint X.25 (MEPX.25)
Control program that handles a connection using X.25 networks.
Multi-routing extensible data director (MREDD)
Syniverse's multi-routing extensible data director.
multifrequency signals
Touch tone signals used for in-band signaling.
Multipurpose Internet Mail Extension (MIME)
Internet protocol used to send e-mail messages.
NDA
(See non-disclosure agreement.)
negative
Roamer validation status that indicates a caller is invalid or fraudulent and should be denied
service or if a call is in progress, that call teardown should be initiated.
negative entries
Entries on the industry negative file (INF). ACCESS edits for and rejects those calls made by
roamers with mobile identification numbers and electronic serial numbers (MIN/ESNs) that were
on the INF after the effective liability time.
negative file
File containing blacklisted mobile identification numbers (MINs) and electronic serial numbers
(ESNs) that should be denied service. Syniverse maintains an industry negative file (INF) and
each carrier/operator maintains a local negative file in its switch.
negative file bypass
Agreement among carriers/operators that are connected in a switch-to-switch environment or use a
Signaling System 7 (SS7) network to instruct ACCESS to forward certain call records
(designated by system identification (SID) combinations) for processing regardless of their status
on the industry negative file (INF). This agreement with roaming partners ensures that
carriers/operators will be reimbursed for all served subscribers, including those who have entries
on the INF.
NENA
(See National Emergency Number Association.)
net data
System identification (SID) to SID summary of the activity between a carrier/operator and its
roaming partners.
net settlement
Monthly accumulation of financial data among roaming partners, identifying the total payables
and receivables of each carrier/operator. For Cellular Intercarrier Billing Exchange Record
(CIBER) data, the settlement period runs from the 16th of one month to the 15th of the following
month. For Global System for Mobile Communications (GSM) technologies, the normal
settlement period is a calendar month. (See also industry net settlement.)
network
System that links two or more places and pieces of equipment. Network components may be
widely dispersed, such as the Internet, or in relatively close proximity, like a LAN. Networks
typically include some type of hardware connection, such as copper wire, fiber optics, or
microwaves, and software to administer and monitor transmissions. They may also include routing
and switching facilities.
network assignment module (NAM)
Integrated circuit in a wireless phone that is programmed with information specific to that phone,
including its electronic serial number (ESN) and mobile identification number (MIN).
network element
Network device. On the Signaling System 7 (SS7) network, elements are synonymous with
signaling points or nodes, such as signal transfer points (STPs), service control points (SCPs), and
the switch (mobile switching center (MSC) on a wireless network).
non-wireline
Wireless carrier/operator not affiliated with a landline telephone service. One of two types of
carrier/operator designated by the Federal Communications Commission (FCC) to provide
wireless telephone service. A-side licenses were originally awarded to companies other than local
telephone companies. (See also A-side carrier/operator.)
nonrepudiation
Inability to deny the authenticity of a message or file through undeniable evidence that an initiator
of the message sent the message or a receiver received it. (See also digital signature and message
digest.)
normalized record
Intermediate record format produced by applying translation rules to call detail records (CDRs).
Normalized records are input to business rules processing.
normalizing
Phase of translation during which an input conversion object reads an input record object from an
input conversion work queue, applies translation runtime rules, creates a normalized record, and
places the normalized record in an output conversion work queue in preparation for business rule
processing.
North American Cellular Network (NACN)
Interconnection of regional wireless carriers/operators that enables customers to travel anywhere
within the network and still have their phones operate as if they were at home.
North American Interest Group (NAIG)
Group of North American Personal Communication Services (PCS) carriers/operators that use
Global System for Mobile Communications (GSM) technology to provide wireless services.
North American Numbering Plan (NANP)
System that specifies the format for telephone numbers in the United States, Canada, Bermuda,
and many Caribbean countries. It uses a system of 10-digit numbers to uniquely identify every
telecommunications device in North America.
Notice of Inquiry (NOI)
In local number portability, the FCC opens a Notice of Inquiry window for 30 90 days to ask the
industry to provide input regarding a suggestion so the FCC can understand all sides of an issue.
notification file
Empty user file (one with no (CDRs) call detail records) transferred between a given source and
destination, and produced for electronic transfers to indicate that no other data is available to be
transferred.
NPA
(See numbering plan area.)
NPAC
(See Number Portability Administration Center.)
NPAC SMS
(See Number Portability Administration Center Service Management System.)
NPA-NXX
First six digits of a 10-digit telephone number the area code (NPA) and exchange (NXX); for
example, 813-5555. Because these numbers are uniquely assigned to a service provider and a
geographic region, the numbers can be used to determine the home market of a roamer for
settlement, validation, or call delivery.
O
OBEY
Tandem method of running either a batch or command file.
object identifier (OID)
Numeric identifier assigned to an entity (individual, organization, or corporation) and used in a
variety of protocols. For example, when a certificate is issued, one or more policy OIDs are
included to indicate the policy or policies under which the certificate must be used. OIDs are
obtained from various sources, such as the American National Standards Institute (ANSI).
object library
Set of flexible, special objects that allow developers to build user interfaces to Transaction
Manager products and be able to reuse them frequently to simplify development.
Object Monitoring Facility (OMF)
Tandem utility that supervises objects such as CPUs, disks, process, and communication lines.
OCC
(See other charges and credits.)
OCH returns
(See other clearinghouse returns.)
OCOS
(See Origination Class of Service.)
off-peak
Hours during which a system is little-used. In wireless systems, off-peak time is usually defined to
be between 7:00 p.m. and 7:00 a.m., local time, as well as weekends and holidays. Per-minute
airtime rates are usually lower during this period.
offline certification authority (offline CA)
Standalone workstation used to create root certificates and subordinate certification authority (CA)
certificates.
OID
(See object identifier.)
Old Network Service Provider (ONSP)
In number portability, the ONSP is the donor provider that formerly provided the facility or
infrastructure used to route network messaging.
Old Service Provider (OSP)
In number portability, the OSP is the donor provider that transfers a customer to a recipient or new
service provider (NSP).
OMAP
(See Operations, Maintenance, and Administration Part.)
Opt In
When an operator signs an Open Connectivity contract, no agreements are automatically
established; the operator must establish agreements Opt In.
Opt Out
When an operator signs an OC contract, agreements are automatically established; the operator
must disable the agreement Opt Out.
origination point code (OPC)
24-bit subfield to the service information octet (SIO) field in Signaling System 7 (SS7) signaling
messages that contains the point code (address) of the signaling point that sent the message. OPC
is part of the routing label.
Origination Class of Service
Set of permissions and privileges in a voice network or data signaling rates, terminal operating
mode, or code structure in a data network assigned to a call at its origination. Known as
Origination Indication in Interim Standard 41 (IS-41). The call normally retains this class of
service throughout, although some features or capabilities may be lost due to incompatibility with
another carrier/operators facilities.
OSP
(See Old Service Provider.)
OSS
(See Operating Support System.)
OTASP
(See over-the-air service provisioning.)
other charges and credits (OCC)
One-time charges and credits that may be applied to a customers account. For example, call
credits, late payment fees, or promotional credits.)
other clearinghouse returns (OCH)
Call records (messages) that fail the primary edit process of a settlement and exchange service
provider other than ACCESS. These call records are subsequently returned to the serving
carrier/operators billing vendor.
out-of-band signaling
Type of signaling used by telecommunications service providers for call setup and features. The
signals are carried on separate facilities rather than on the voice path. For example, Signaling
System 7 (SS7) uses out-of-band-signaling.
outcollects
Records for calls made by subscribers to their carrier/operators roaming partners markets. (See
also receivables.)
overridable error
(See bypassable error.)
over-the-air service provisioning (OTASP)
Ability of a carrier/operator to add new features or services to a customers handset using the
wireless network instead of asking the customer to bring the unit into a retail establishment for
reprogramming.
PATHCOM
Operator interface to PATHWAY.
PATHWAY
1) Tandem transaction processing system;
2) Group of related software tools used in the development, installation, and management of
online transaction processing applications.
pattern (alarm)
Type of alarm that occurs when predefined conditions, which indicate suspicious calling activity,
are met in a call record.
patterns
Predefined conditions that identify call record characteristics that are associated with potential
wireless fraud such as cloning.
pay phone fraud
Electronic or physical manipulation of pay phones in order to steal service.
payables
1) Records for calls made by subscribers who roam in their carrier/operators roaming partners
markets. 2) Amount one carrier/operator owes to another. (See also incollects.)
PCA
(See policy certification authority.)
PCIA
(See Personal Communications Industry Association.)
PCMS
(See Pre-LIDB Call Management System.)
PCN
(See Personal Communications Networks.)
PCS
(See Personal Communications Services.)
PDA
(See personal digital assistant.)
PDC
(See Personal Digital Cellular.)
PDESC
(See process description.)
PDF
(See portable document format.)
PDU
(See Protocol Data Unit.)
peak
Hours of heaviest wireless system use. Peak time is usually defined as being between 7:00 a.m.
and 7:00 p.m., Monday through Friday. Per-minute airtime rates are highest during peak time.
PGS
(See Profile Generation System.)
Phone Me Anywhere (PMASM) Service
Syniverse service that extends call delivery services to non-wireline carriers/operators.
Phone Me Anywhere Plus Service (PMA PlusSM)
Advanced version of Syniverse PMASM service that extends advanced call delivery services, to
non-wireline carriers/operators.
phone number
Ten-digit number assigned to a specific wireless telephone to identify that telephone exclusively
to the mobile telephone switching office (MTSO). Includes a 3-digit numbering plan area (NPA),
3-digit carrier code or exchange (NXX), and 4-digit line number.
phone phreaks
Thieves who deal in a wide variety of toll phone frauds. Also known as phreakers.
physical service name (PSN)
During global message layer (GML) communication, processes that need services write service
requests to an associated PSN. Processes capable of answering these service requests respond to
the PSN.
physical switch
Actual electronic device that switches wireless phone calls, in contrast to a virtual switch or
logical switch. (See also MSC and switch.)
PIC
(See preferred inter-exchange carrier.)
PIN
(See personal identification number.)
PING
(See packet InterNet groper.)
pipe
Programming construct that couples the output of one program directory to the input of another.
Pipes are created by using a vertical bar ( | ) between commands. For example, % nroff inputfile -
ms | 1pr processes the input file (with the nroff command) and sends the processed file directly to
the printer.
plain old telephone service (POTS)
Typical landline telephone system, contrasting with wideband, high-speed, and other specialized
telecommunication services.
Plenary
Decision-making body of the Memorandum of Understanding (MoU).
PLMN
(See public land mobile network.)
PLMN code
Five-character code that identifies each Global Service for Mobile Communication (GSM)
carrier/operator. The first three characters identify the carrier/operators country and the last two
identify the carrier/operator. Public land mobile network (PLMN) codes are identified in
Memorandum of Understanding (MoU) PRD TD.13, TAP PLMN Naming Conventions.
positive
Roamer validation status indicating that the caller is valid and allowed to make calls.
positive file
File containing the mobile identification numbers (MINs) and electronic serial numbers (ESNs) of
valid wireless subscribers.
post-call validation
Call validation that occurs after a call has been connected.
POTS
(See plain old telephone service.)
power up registration
(See autonomous registration.)
PPDX
(See process pair directory command.)
PPP
(See point-to-point.)
PQI or PQO
(See port.)
PR1 or PR2
(See port.)
pre-call validation
Call validation that occurs before a call is connected, detecting and blocking a fraudulent call on
the invalid user's first attempt. Requires Interim Standard 41.0 (IS-41.0) or later revision.
preferred inter-exchange carrier (PIC)
Code contained in a wireless subscribers Interim Standard 41.A (IS-41.A) service profile that
indicates the preferred carrier/operator for long distance service. The profile is transferred only
between two FraudManager IS-41.A, Signaling System 7 (SS7), or direct-connected markets.
Pre-LIDB Call Management System (PCMS)
Syniverses collect-call fraud management system, which scans called telephone numbers,
compares them to a carrier/operators line information database (LIDB), and blocks outbound
collect calls.
prepaid calling card
Enables cardholders to charge phone calls to a prepaid account. Customers purchase a card that
contains a designated amount of calling time measured in either units or dollars. Each time the
cardholder uses the card; the cost of the call is deducted from the card balance until the entire
available amount is used. Cards may be designated as rechargeable (the cardholder can purchase
additional time or add cash value to the card).
Prepaid Wireless Services
Syniverse solution that uses prepaid debit cards to represent the phone time a consumer or retailer
pays for in advance. Some cards store the time used directly on the card, while others use a remote
computer to track the used time. If a card is lost or stolen, liability is limited to the prepaid
amount.
pretty good privacy (PGP)
Implementation of public-key cryptography used with computer data, e-mail, and voice
conversations. PGP is based on public-domain software that is freely available from the Internet,
although numerous security and software companies offer customized versions for a fee.
prompt
1) Recorded message that callers hear when they connect to interactive voice response (IVRs)
units. 2) Cursor or dialog box that prompts a user to verify a command.
protocol
Formal description of message formats and rules that two computers must follow to exchange
messages. Protocols can describe low-level details of machine-to-machine interfaces (for example,
the order in which bits and bytes are sent across a wire), or high level exchanges between
programs (for example, the way in which two programs transfer a file across the Internet.)
Protocol Data Unit (PDU)
Open Systems Interconnection (OSI) term for a generic packet. A PDU is a protocol message,
typically contained in a header, to communicate payload and protocol-specific control
information.
provisioning
Assignment of service definitions.
provisioning system
External application that prepares applications to process data.
PSN
(See packet switched network.)
PSTN
(See Public Switched Telephone Network.)
public access mobile radio (PAMR)
European designation for services similar to specialized mobile radio in the United States
public key
One half of a key pair, used to verify signatures created with a matched private key. Also used to
encrypt messages or files, which can be decrypted only by using the matched private key.
public key cryptography, public key encryption
Encryption method that uses public and private key pairs. Information encrypted with one key can
be decrypted only by using the other key of the pair. Allows data to be sent over unsecured public
networks with a high degree of integrity and confidentiality.
Public Land Mobile Network (PLMN)
Global Service for Mobile Communication (GSM) wireless carrier/operator.
Public Switched Telephone Network (PSTN)
1) Vast landline network consisting of local exchange carriers (LECs) and inter-exchange
carriers (IXCs).
2) Circuit-switched network that is the North American telephone system.
PUK
(See personal unblocking key.)
Q
QualDir
(See Qualification Directive.)
R
RA
(See registration authority.)
radio frequency
Sound wave frequency from nine kilohertz (9 KHz), the lowest allocated wireless communications
frequency (it's within the range of human hearing), to thousands of gigahertz (GHz).
radio frequency (RF) fingerprinting
Technology that records radio signals emitted by wireless phones and uses those fingerprints to
distinguish individual phones and deny access to a cloner on a pre-call basis. RF fingerprinting is
used to prevent cloning fraud because a cloned phone does not have the same fingerprint as the
legal phone with the same electronic serial number (ESN).
Radio Frequency (RF) Signature
Third-party software application that intercepts the communication link between a cell site and
mobile phone.
registration
Process by which a user first becomes known to a certification authority (CA) before the CA
issues a certificate for the user.
registration authority (RA)
For customer-branded certification authority (CA) service, a trusted agent who verifies each
individual certificate request and then sends approved requests for signature. An optional system
to which a CA delegates certain management functions.
Registration Cancellation (RegCan)
Interim Standard 41 (IS-41) message sent to a visited location register (VLR) or visited switch to
indicate a roamer is no longer in that service area.
registration cancellation invoke (REGCANC)
Interim Standard 41 (IS-41) message invoking the cancellation of the roamer which is sent from a
home location register (HLR) to the previous serving visited location register (VLR) and from
there to the mobile switching center (MSC). (All capitals indicates an invoke instead of a return
result.)
registration cancellation return result (regcanc)
Interim Standard 41 (IS-41) message that acknowledges the receipt of a REGCNAC which is sent
from the previous serving visited location register (VLR) to a home location register (HLR), and
from the previous serving mobile switching center (MSC) to the VLR. (All lower case indicates a
return result instead of an invoke.)
Registration Notification (RegNot)
Interim Standard 41 (IS-41) message sent from a visited switch or visited location register (VLR)
to indicate the roamer is registered (or re-registered).
registration notification invoke (REGNOT)
Interim Standard 41 (IS-41) message sent from a serving mobile switching center (MSC)
requesting information about a new roamer from the roamers home location register (HLR) The
message is sent from the MSC to the visited location register (VLR) and then to the HLR. (All
capital letters indicate an invoke instead of a return result.)
registration notification return result (regnot)
Interim Standard 41 (IS-41) message in which the home location register (HLR) supplies new
roamer information to the the serving mobile switching center (MSC) . The message is sent from
the HLR to the serving visited location register (VLR) and then to the MSC. (All lower case
letters indicate a return result instead of an invoke.)
RegNot
(See Registration Notification.)
reinstatement
Restoration of a previously invalid negative file entry.
reject
To physically remove a record, file, or composite file (available only in North American Interest
Groups Transferred Account Procedure (NAIG TAP) II) from processing. Rejected data is not
forwarded to a home public land mobile network (HPLMN) for payment.
rejects
Call records that fail a primary or secondary editing process and are returned to the serving
carrier/operators billing vendor. Same as returns.
remote access port hits
Illegal access to a telecommunication system through remote ports.
ringback
Feature that directs a phone to automatically dial back a caller who was blocked by a busy line
when the line is free. A technical flaw in the service enables the use of ringback to avoid paying
for unlimited calls from privately owned pay phones. This is quite common in the U.K.
roam
To use a wireless phone in a market other than the subscribers home market.
ROAM indicator
Indicator on a wireless phone that denotes the phone is outside of its home market and roaming
charges may be applied to calls.
roamer
1) Wireless customer placing one or more calls outside of a home service area, whether or not the
visited area is serviced by the customers home carrier/operator. 2) Call made by a customer of
another mobile system.
roamer access number (RAN)
Number that must be dialed before dialing the phone number of a roamer. Each city (or market)
has a unique RAN identifier.
roamer agreement
(See intercarrier roamer agreement.)
Roamer Data Delivery Service (RDDS)
Data feed that contains a subscribers roaming event records. The records contain pre- or post-call
mobile identification number (MIN), electronic serial number (ESN), location, and time data but
do not show toll calls, call duration, or dialed digits.
roamer registration
Process that occurs when a subscriber, roaming in a market other than the home market, turns on
the phone. The serving mobile switching center (MSC) queries the subscribers home location
register (HLR) to identify the subscribers information.
roamer surcharge
Per-day charge a carrier/operator applies to a roamer for using a wireless phone in an area outside
of the roamers home market.
RoamerXchange Service
Obsolete Syniverse PC-based, online management tool that enables carrier/operators to
electronically maintain and update technical data sheet (TDS) information that can then be
exchanged with roaming partners or within a carrier/operators organization.
RoamEx
Systems/Link Corporations national wireless real-time roamer record exchange network that
includes roamer fraud control, network analysis, and customer service. RoamEx is a single data
collection network for both cellular and Personal Communication Services (PCS) usage.
roaming
Using a wireless phone to make and receive calls in places outside ones home service area.
roaming agreement
Legally binding document executed by two wireless carriers/operators to provide service to each
others roaming subscribers with provisions for rates, privileges, and cases of fraud. (See also
bilateral roaming agreement.)
roaming air
Amount of time a roamers wireless telephone is connected, for which charges can be levied.
RSA
(See rural statistical area.)
RSC
(See Remote Server Call.)
rules
1) Set of filters or parameters that determine program activity.
2) If-then statements that alter FraudX programming logic for assigning fraud types and
confidence levels.
rule base
Popular method of representing knowledge in expert systems that analyze and present conclusions
based on multiple factors.
runtime rules
Rules logic that analyzes and modifies field data, marks call detail records (CDRs) to be dropped,
and derives new fields from other field values.
Rural Cellular Association Volume of Business (RCA VOB)
Syniverse discount applying to any service purchased by a member of the Rural Cellular
Association (RCA), who has committed to a 3-year contract. The discount varies with the usage
level and the type of service.
rural service area
(See rural statistical area.)
rural statistical area (RSA)
Non-metropolitan area mapped by the Census Bureau and used by the Federal Communications
Commission (FCC) to award wireless licenses within rural areas; also known as rural service area.
S
SA
(See site administrator.)
SCCP
(See Signaling Connection Control Part.)
SCE
(See service creation environment.)
SCP
(See service control point.)
SDR
(See special drawing rights.)
secondary edits
Edits performed by a home carrier/operators billing vendor after primary edits. The billing vendor
checks all call records for edits that were not performed by the authorized receipt point. For
example, the lack of a roaming agreement between the home and serve carrier/operator.
secondary link
Backup link for wireless communications that takes over handling data traffic in case the primary
link fails.
service application
Unique, legal contract that binds a subscriber to the standards, prices, and policies set by a
carrier/operator.
service area
Area in which a carrier/operator provides wireless service.
service blocking
Service definition that denies wireless service to roamers. (See also block denial and flexible SID
blocking.)
service bureau
System for which Syniverse retains ownership, operates the server computing environment, and
administers operational, administrative, and maintenance routines. If applicable, the wireless
carriers/operators own the workstations and printers.
service control point (SCP)
Computer system that connects to the Signaling System 7 (SS7) network; an SCP contains SS7
node software, application software used to effect a service, a database for record storage, and
system management software. SCPs are usually deployed as mated pairs.
service creation environment (SCE)
Architecture used by Syniverses Prepaid Wireless service. The SCE consists of a comprehensive
reusable set of processes, tools, and commonly used libraries for building telephony applications.
In the SCE, users graphically create the complete logic of a call flow to integrate with the switch,
the voice response unit (VRU), and an Oracle database. The SCE consists of the application
builder, core server processes, and commercial hardware and software.
Service Experts Rapporteurs Group (SERG)
Memorandum of Understanding (MoU) organization, primarily concerned with product
marketing.
service groups
Collection of services that perform the same function.
service ID
Combination of the service code and the parameters that describe both the service type of and the
actions requested or taken during a call, such as invoking call forwarding or radio channel requests
for speech calls.
service independent building block (SIBB)
Service creation environment (SCE) component used by Syniverses Prepaid Wireless system.
Each SIBB has a particular function or group of functions to be executed on the server. The six
SIBB categories are: application, voice response unit (VRU), logic, switch, event, and
communication. SIBBs are programmed in the application builder.
service information octet (SIO)
Eight-bit field in Signaling System 7 (SS7) signaling messages that indicates the application using
SS7, the network in use (national or international), and various routing schemes.
service location register (SLR)
Database used by FraudForce for authentication and expiration information.
Service Logic Provider (SLP)
Intelligent network (IN) application that implements the logic to provide a call feature. For
example, the FraudChallenger SLP is the master controlling process for the system.
Service Management Gateway (SMG)
A software product that facilitates the process of number portability and number pooling.
settlement period
Monthly accounting period for settlement and exchange service providers; currently running from
the 16th of one month through the 15th of the next. For ACCESS S&E Services, this period is
the first day of the month through the last day of the month.
settlement reports
Reports produced by ACCESS S&E Services describing various aspects of the settlement data.
severe errors
Call record errors that affect the ability to charge a subscriber. Roaming partners can agree
bilaterally to either reject these records, or retain them and report them as containing severe errors
on the appropriate ACCESS S&E Services reports.
severity
Carrier/operator-defined indication that ranks the significance of a threshold violation. Severity
rank is determined by calculating the extent to which the call event exceeds the subscribers
specified usage ceiling for a particular wireless service. In cases where multiple fraud types are
identified, the fraud type with the highest severity ranking (collision, for example) is assigned to
the case.
SGML
(See Standard Generalized Markup Language.)
shared secret data (SSD)
Variable digital number used to identify a specific mobile station (MS) during authentication;
composed of the mobile identification number and electronic serial number (MIN/ESN), A-key,
and random number generated by the authentication center (AC). During authentication, an MS
SSD must match that of the AC.
shell
Utility program that serves as a command line interpreter that enables a user to interact with a
UNIX operating system. User commands are passed by the shell to the kernel of the operating
system, which carries out the instructions. The results are then passed back by the shell and are
displayed on the users monitor.
Short Message Service (SMS)
Supplemental service allowing short (one-way) messages to be recorded and delivered over the
Global System for Mobile Communication (GSM) network.
Short Message Peer-to-Peer (SMPP)
A protocol for exchanging SMS messages between SMS peer entities such as short message
service providers.
shoulder surfing
Method thieves use to steal calling card numbers and personal identification numbers (PINs) from
legitimate users, by observing the dialing process; the visual equivalent of eavesdropping.
SIBB
(See service independent building block.)
SID
(See system identification.)
SIF
(See signaling information field.)
signal units
Parcels used to transmit information over the Signaling System 7 (SS7) network; more commonly
referred to as messages.
simple clone
Fraudulent mobile unit that uses the numeric identifiers (mobile identification digits and electronic
serial number (MID/ESN)) of another mobile unit.
Simple Network Management Protocol (SNMP)
Protocol that governs network management and monitors network devices. SNMP is not limited to
Transmission Control Protocol/Internet Protocol (TCP/IP) networks.
Single Number Service (SNS)
Syniverse service that transports SNS queries to designated third-party line information databases
to provide a nine-digit zip code in response to a directory number query.
single point of contact (SPOC)
Key benefit a consolidator provides to a corporate account in terms of time and money savings.
Rather than dealing with each service provider individually, the corporation contacts the
consolidator who handles the corporations wireless business.
SIO
(See service information octet.)
site administrator (SA)
Typically, an individual responsible to monitor application servers and set up and maintain local
user accesses.
site collector
(See call collection system.)
SLIP
(See Serial Line Internet Protocol.)
SLP
(See Service Logic Provider.)
SLR
(See service location register.)
SLS
(See signaling link selection.)
SM
(See security manager.)
smart card
Credit card device that can generate and store key pairs and certificates. Uses an embedded
integrated circuit to provide logic and intelligence processing and to store information. Holds
about 8 KB of information, enough to store 1600 words of text or a digital snapshot of a
fingerprint. A multipurpose smart card can serve as personal identification, a credit card, ATM
card, telephone credit card, medical information record, and cash for small transactions.
smart phone
Class of wireless phones; typically used to describe handsets with many features, and often a
keyboard. These phones are considered smart because they handle data as well as voice calls.
SmartAlert Real-Time Analysis System
Text and graphics alarm management service that provides real-time remote monitoring of
wireless switches and cell site equipment to alert carriers/operators of network problems.
SMG
(See Service Management Gateway.)
source
Geographic area from which a wireless call originates.
spamming
Sending a single message to a large number of recipients; spamming can seriously degrade
network and host performance.
span
Part of a high-speed digital system that connects central offices or terminal offices to one another.
SP
(See Service Provider.)
SPC
(See signaling point code, software publisher certificate.)
SPID
(See Service Provider Identifier.)
special
CIBERNET designation for the mobile identification number and electronic serial number
(MIN/ESN) assigned to a phone that has been stolen or equipment that has not been returned to a
carrier/operator by a user. A MIN may be entered as all zeros, because the ESN remains invalid
until the phone is retrieved. The industry negative file (INF) reason code is S.
special drawing rights (SDR)
Currency used to transfer charges in the exchange of Transferred Account Procedure (TAP) files
between public land mobile networks (PLMNs). It consists of several currencies combined into a
stable financial unit and is maintained by the International Monetary Fund (IMF). SDRs are also
used by other telecommunications companies for international inter-company accounting.
specialized mobile radio (SMR)
Dispatch radio and interconnect service for businesses. Covers frequencies in the 200 MHz, 800
MHz, and 900 MHz bands.
SPOC
(See single point of contact.)
SprintMail
Sprints e-mail service; used by Syniverse to distribute batch reports for ACCESS,
FraudManager, Customer Positive File, Visibility, and INLink. Before the service was
acquired by Sprint, it was known as Telemail.
SQL
(See Structured Query Language.)
SRAM
(See static random access memory.)
SS
(See supplementary service.)
SS7
(See Signaling System 7.)
SS7 Message Protocol
Set of rules governing the structure and content of messages sent over a Signaling System 7 (SS7)
network.
SSD
(See shared secret data.)
STREAMLINER
Syniverse service that assists wireless carriers/operators in offering their corporate accounts a
single point of contact (SPOC) for national service needs. It consolidates information from
multiple carrier/operators billing systems into one integrated package of reports, invoices, and
data files for those customers with national accounts.
Structured Query Language (SQL)
Ddatabase language invented by IBM for creating, searching, and maintaining computer
databases. Sometimes pronounced sequel.
SUBa
Subscriber database file in the NAC.
subordinate CA
Certification authority (CA) generated from a self-signing root certificate or another subordinate
CA. The subordinate CA can then be used to sign other CA and end-entity certificates.
subscriber
Wireless user who pays a fee to receive wireless services.
subscriber base
Carrier/operators customers who subscribe to wireless services.
subscriber factors
Problems and conditions that influence a subscribers likelihood to churn and place the mobile
unit at risk. The subscriber factor score indicates the level of churn danger.
Subscriber Identification Module (SIM)
Global System for Mobile Communication (GSM) card that contains information about a
subscriber, including the subscriber's International Mobile Subscriber Identity (IMSI) and other
billing information. The subscriber can insert the SIM card into any GSM mobile equipment and
use that equipment.
subscriber profile transfer
Interim Standard 41 (IS-41) Rev. A capability that enables wireless phone users to continue using
all home service features while roaming.
subscription fraud
Activation of a wireless telephone using an invalid or stolen name or address, with no intention of
paying for the service. The intent to defraud differentiates this activity from bad debt, in which a
subscriber fails to pay charges for services rendered. (See also non-payment.)
supplementary service (SS)
Service that modifies or supplements a basic telecommunication service and, therefore, cannot be
offered to a customer as a stand-alone service. Examples of supplementary services provided by
Global System for Mobile Communication (GSM) technologies include call forwarding, call
barring, caller identification, call waiting, and advice of charge.
supplementary service event
Supplementary service (SS) action not related to a call. (See also action type code.)
support network
High-speed data network that moves large amounts of information necessary to monitor and
control the North American Cellular Network (NACN).
suspend
Interim Standard 41.A (IS-41.A) switch option that enables carriers/operators to impose calling
restrictions (deny service for a non-paying customer) within the subscriber's calling profile.
T
T1 line
Digital transmission line with a capacity of 1.544Mbps used to accommodate high volume traffic,
such as that seen on the Internet.
tables
Databases that contain all necessary information required to set up accounts for reports and
invoices.
TACL
(See Tandem Advanced Command Language.)
TADIG
(See Transferred Account Data Inter-exchange Group.)
tail circuit
Dedicated circuit from a customers premises to the nearest point of presence for the Syniverse
frame relay network. This provides a private, dedicated link from the customer to Syniverse
through Syniverses private network.
Tandem Advanced Command Language (TACL)
The Tandem interface to the operating system.
Tandem Call Processor (TCP)
Hardware platform selected by Syniverse for advanced, real-time processing because of its fault
tolerance and multiple transaction capabilities.
TAP
(See Transferred Account Procedure or Telocator Alphanumeric Paging.)
TAP file
User file, as specified by the Transferred Account Data Inter-exchange Group (TADIG),
containing call information to be exchanged between two carriers/operators.
TAP Version 1
First version of the Transferred Account Procedure (TAP) file format, as specified by the
Transferred Account Data Inter-exchange Group document TD.01.
TAP Version 2
Second version of the Transferred Account Procedure (TAP) file format, as specified by the
Transferred Account Data Inter-exchange Group (TADIG) document TD.17. Version 2
substantially extends Version 1s functionality and complexity. North American carriers/operators
use a variation of TAP Version 2. (See also NAIG TAP II.)
tax liability
Whether or not a given call is subject to tax.
TCAP
(See Transaction Capabilities Application Part.)
TD.40
The Transferred Account Data Inter-exchange Group (TADIG) standard defining call scenarios
for Transferred Account Procedure (TAP) 2+. (See Transferred Account Data Inter-exchange
Group.)
TD.57
The Transferred Account Data Inter-exchange Group (TADIG) standard defining the Transferred
Account Procedure (TAP) 3. (See Transferred Account Data Inter-exchange Group.)
TD.60
The Transferred Account Data Inter-exchange Group (TADIG) standard defining call scenarios
for TAP3. (See Transferred Account Data Inter-exchange Group.)
TDMA
(See Time Division Multiple Access.)
TDN
(See temporary directory number.)
TDP
(See Telocator Data Protocol.)
TDR
(See transaction data repository.)
TDS
(See technical data sheet or Syniverse Database Synchronization.)
TDS Collector
The Syniverse Database Synchronization (TDS) Collector repackages individual records received
from a Receive Queue into destination specific buffers. If a buffer is full, the data record is written
to a local safe store file. The TDS Collector can use multiple disk drives for safe store files.
TDS Monitor
A node specific monitor process that oversees both functional sides of a service on a node (service
control point (SCP) 1 or SCP2). A given node can be both a source and a destination for data
synchronization. The Syniverse Database Synchronization (TDS) Monitor operates as a nonstop
pair of processes and is responsible for coordination of synchronization data transfer and posting
activities.
TDS Poster
Each Syniverse Database Synchronization (TDS) Poster opens the TDS Monitor to request an
instruction. It is responsible for processing a successfully transferred safe store file by decoding
the contents and applying the data records to the appropriate files. It is capable of performing add,
update, and delete operations on any defined Enscribe file.
TDS Receiver
Syniverse Database Synchronization (TDS) Receiver uses the File Transfer Protocol (FTP)
application programmatic interface (API) to transfer safe store files from the source node to the
destination node. The TDS Receiver processes operate under the direct control of the TDS
Monitor process.
TDS Transfer Control File
Used only to pull safe store files and post their contents to destination data files. A Syniverse
Database Synchronization (TDS) File Transfer Protocol (FTP) Receiver adds records into the TDS
Transfer Control file when it processes a file list instruction from the TDS Monitor.
toll charge
Charge for long distance service that appears in a roamer call record and on the subscribers bill.
toll rate period
Toll rates are generally determined by time of day and day of week. Typical toll rate periods are
day, evening, and night.
Tool Command Language (TCL)
String-processing language for issuing commands to interactive programs. Each application
program can extend TCL with its own set of commands. It may also be used as an embedded
interpreter in application programs.
TPM
(See Terminating Point Master.)
TPT
Transparent Protocol Translation service. Part of the NSCP-2000 platform software.
trading partner agreements
Specifications agreed upon by two or more companies doing business together, which define the
forms of the data that will be exchanged using Electronic Data Interchange (EDI).
Transaction Capabilities Application Part (TCAP)
Upper layer protocol used to transfer messages over a Signaling System 7 (SS7) network between
two applications. TCAP typically contains Interim Standard 41 (IS-41 or ANSI 41) messaging,
and uses underlying SS7 protocols such as Message Transfer Part (MTP) routing or Global Title
Translation (GTT) to transfer the SS7 messages between two SS7 network nodes.
transaction data repository (TDR)
Centralized data storage facility that supervises the sharing of multiple transactions; requests
submitted by users are processed by the repository in real time (or near real time). Encrypt-A-
Key authentication services use a dedicated TDR to store all data related to call processing
activity, including transaction logs, table maintenance activity logs, activity monitoring logs, and
network element statistics tables.
TransAction Manager System (TMan)
Syniverse system that provides automatic, real-time collection; reformatting; and routing of call
detail records (CDRs) directly from carrier/operator switches to fraud detection systems,
clearinghouses, and other advanced data exchange applications.
transaction router process (TRP)
Event-driven utility that provides connectivity between an external customer's transaction
handling system, and Syniverses service control points (SCPs) set of transaction servers. As a
router service, it moves transactions from a Transmission Control Protocol/Internet Protocol
(TCP/IP) connection to a Pathway Server Class, and returns Server Class replies to the appropriate
TCP/IP connection.
transaction set
Set of transaction types used in Electronic Data Interchange (EDI) among trading partners. Each
transaction set contains only one type of information in a standard format agreed upon by the
trading partners. For A-Key exchange, the specified transaction sets are 856, 869, and 870.
transceiver
Transmitter and receiver. A radio device, such as a wireless phone, which transmits and receives
data or voice.
All GSM Association work groups are assigned a two letter abbreviation (e.g., TD = TADIG).
Document standards produced by a work group are identified by the group abbreviation, followed
by a serial number (e.g., TD.17). TADIG is responsible for, among other things, the TAP and the
test definition for the Rejects and Returns Procedure. (See also TD.17, TD.24, TD.27, TD.31,
TD.32, TD.37, TD.40, and TD.60.)
Transferred Account Procedure (TAP)
Global System for Mobile Communication (GSM) industry standard format for the exchange of
billing information among public land mobile networks (PLMNs).
translated record
Output record whose format can be used by a downstream application.
translator
TransAction Manager application that processes call detail records (CDRs) by translating them
from one format to another, with optional filtering of certain records by predefined rules.
Transmission Control Protocol/Internet Protocol (TCP/IP)
Protocol that enables Internet communication among computers with diverse architectures and
operating systems; generally recognized as the industry standard for PC and Internet connections.
The TCP layer of the program assembles messages or files into smaller packets that are
transmitted and then received by a TCP layer that resolves the packets into the original messages
or files. The IP layer handles the address part of each packet so it gets to the right destination.
Each gateway computer on the network checks the IP address to see where to forward a message.
transparency indicator
Indicator that reveals whether a service was used in transparent or non-transparent mode.
trending
ACCESSibility analytical tool (available by special purchase), which enables a carrier/operator
to generate reports that show its historical relationship with other carriers/operators or system
identifications (SIDs).
tri-mode handset
Telephone that operates on three frequencies, typically the 1900 MHz, 800 MHz digital, and 800
MHz analog cellular bands. (See also triple band.)
TRP
(See Transaction Router Process.)
triple band
Network infrastructure or wireless telephone designed to operate in three frequencies or bands.
(See also tri-mode handset.)
trunk-based routing
Routing calls to an outbound trunk group based on the inbound trunk group. This feature increases
call routing flexibility, particularly in wireless applications. For instance, Syniverses Prepaid
Wireless system users can configure trunk routing so that an outgoing cellular call from a wireless
subscriber is routed back through the same mobile switching center (MSC) the subscribers call
came in on. Or, if a wireless subscriber makes a call to public telephone (landline), the outgoing
call is routed through the public switch telephone network (PSTN).
trust chain
(See trust hierarchy.)
trust hierarchy
Validation architecture of a digital certificate. Each certificate is linked to the signature certificate
of the certificate-issuing entity. Certificates are validated by following the trust hierarchy to the
root certification authority (CA). The path through which the certificates are validated is called the
certificate chain.
trusted environment
Messaging environment in which access, security policies, and policy enforcement are controlled
by a trusted entity.
trustee
Person responsible for making and communicating judgments and decisions on behalf of an
organization with regard to use, identification, classification, and protection of a specific
information asset.
TSI
(See Syniverse Technologies, Inc.)
TSIAPL
Syniverse's Application Programming Interface. A layer of software, written in TAL, to handle
messages, timers, and context on behalf of a call processing application such as FraudManager.
tumbling
Systematic altering of a mobile unit's electronic serial number (ESN), mobile identification
number (MIN), or both, to obtain fraudulent wireless service, usually indicated by a series of call
attempts using sequential numbers within a short timeframe.
tumbling clone
Mobile unit for which the mobile identification number (MIN) and the electronic serial number
(ESN) are repeatedly altered to duplicate (clone) a valid mobile units numbers for the purpose of
gaining fraudulent wireless network access.
TUP
(See Telephone User Part.)
turbo processes
Processes that specialize in the detection of certain kinds of fraud. The types of turbo processes,
so-called because they run continuously and simultaneously, are: CORE (collision and velocity
alarms); Threshold and Credit (threshold and credit alarms); New Subscriber (unknown subscriber
alarms); and Switch (glare and radio frequency (RF) signal alarms generated by a switch).
turnkey system
System or product that is ready for use (after it is installed) requiring no additional hardware or
software to operate.
TWG
(See technical work group.)
V
V&H Master file
File that contains the geographic vertical and horizontal coordinates of the location identified by
the numbering planning area (NPA) and the central office code or exchange (NXX); also contains
the name, route, and local access transport area (LATA).
valid
Authorized, legitimate, properly-formatted, or good. A valid roamer is a person whose mobile
identification number (MIN) and electronic serial number (ESN) is authorized and in good
standing. A valid message is one that successfully passes all edits.
valid messages
Call records processed by ACCESS (or other settlement and exchange service providers) that
meet Cellular Intercarrier Billing Exchange Record (CIBER) standards.
valid values
Carrier/operator-defined identifiers for characteristics of subscriber accounts.
validation
Process of verifying roamer status (positive or negative) to determine whether service will be
allowed.
value added tax (VAT)
Tax that may be applied to charges in a Transferred Account Procedure (TAP) record. (In North
America, VAT is not used; instead, calls are subject to a variety of taxes that vary from location to
location, such as such as federal, state, and municipal taxes.)
variable-length field
Field in which the number of bits vary from message to message.
VAS code
Code indicating a specific type of value added service (VAS); for example, voice mail services,
financial information, travel information, etc.
VAT
(See value added tax.)
velocity alarm
Occurs when the same mobile identification number (MIN) and electronic serial number (ESN)
are used in two locations that are too far apart for the same user to travel between, given the time
interval between uses. The apparent change in location occurs at faster (higher velocity) than is
reasonable to expect; this indicates potential cloning fraud.
verification
In Telecommunications Industry Association (TIA )and EIA-41, the process in which a wireless
switch determines if a mobile identification number (MIN) and electronic serial number (ESN) is
being used by the authorized user. This can be done by matching a caller's voice with a previously
recorded voiceprint, by the use of personal identification numbers (PINs), or by radio frequency
finger printing.
Verizon Wireless
One of North Americas largest providers of Advanced Mobile Phone System (AMPS) and code
division multiple access (CDMA) cellular service.
Versatile Signaling Point (VSP)
MicroLegend product name that has no industry-wide meaning. Whenever possible, use
Syniverse's term, International Signaling Gateway (ISG), which includes both the VSP and some
Tandem software. VSP functions include protocol conversion, message routing, and Signaling
System 7 (SS7) and signaling transfer point (STP) functionality.
VHS
(See Virtual Home Term System.)
VIDB
(See Voice Information Database.)
view
Structure for presenting information. The chosen view determines how reports appear when they
are generated (the types of data included, how data is organized, and the sequencing of columns).
Virtual Home Term System (VHS)
Tandem utility that acts as a virtual home terminal to receive applications, log messages, and
enable an operator to act upon the messages.
virtual switch
Collection of wireless switches or other equipment that function as a single switch within a
network or system. Because the collective has a single network address, the network treats it as a
single switch. Also called a logical switch. (See also physical switch, switch, and MSC.)
VisCP
Visibility call processor. A call processing application written in TAL, constructed using the
Syniverse Application Programming Interface (TSIAPL).
Visibility event database
Database that stores call attempts or registrations for activated area code and exchange (NPA-
NXX) line ranges in a FraudManager market (pre-call validation) and every positive or negative
validation in an EDS market (either pre-call or post-call).
W
W-CDMA
(See wideband code division multiple access.)
W3C
(See World Wide Web Consortium.)
WAN
(See wide area network.)
WAP
(See wireless application protocol.)
WAP Forum
Industry group dedicated to enabling telephony and information services on wireless devices, such
as handsets, pagers, and personal digital assistants (PADs), on all wireless networks. (See also
wireless application protocol.)
wireless
Radio-based systems that transmit telephone and data signals through the air without a physical
connection, such as a metal wire or fiber optic cable. These systems include wireless telephony,
personal communications services (PCS), cellular digital packet data (CDPD), specialized mobile
radios, and satellites.
wireless application protocol (WAP)
Set of communication protocols that standardize the way wireless devices can be used for Internet
access, including e-mail, World Wide Web pages, newsgroups, and chat groups. WAP works on
top of standard data link protocols, such as Global System for Mobile Communication (GSM),
code division multiple access (CDMA), and Time Division Multiple Access (TDMA), and
provides a complete set of network communication programs comparable to and supportive of the
Internet set of protocols. In the past, different manufacturers used different Internet access
technologies. WAP will enable devices and service systems that use it to interoperate.
WAP layers include: Wireless Application Environment (WAE), Wireless Session Layer (WSL),
Wireless Transport Layer Security (WTLS), and Wireless Transport Layer (WTP).
wireless communications services (WCS)
Frequencies in the 2.3 GHz band designated for general fixed wireless use.
wireless intelligent network (WIN)
Wireless switch network architecture that enables carriers/operators to provide customized
services for mobile telephones.
wireless Internet
Radio frequency-based service that provides access to Internet e-mail or the World Wide Web.
wireless local loop (WLL)
Alternative means of providing telephone connectivity (voice, data, or both) to a fixed location,
such as a home or office.
wireless markup language (WML)
Formerly handheld device markup language (HDML), a language that allows text portions of
World Wide Web pages to be viewed on wireless handsets and personal digital assistants (PDAs).
WML is part of the Wireless Application Protocol (WAP) being proposed by several vendors to
standards bodies. WML is an open language offered royalty-free.
wireless prepaid
Permits wireless subscribers to charge telephone calls against a prepaid account instead of
receiving a monthly bill for provided services. The subscriber account contains a designated
amount of calling time, measured in dollars or units. Each time the subscriber uses the account to
make a call, the account is charged in real time. In the openMEDIA Wireless Prepaid System,
subscribers can recharge the account through an interactive voice response (IVR) interface using
either a credit card or a voucher purchased from a retailer.
wireless number portability (WNP)
Subset of local number portability (LNP) that allows a subscriber to change his or her
carrier/operator while retaining an existing dialable phone number. This entails having a mobile
phone with two numbers: a dialable number retained by the subscriber, and a different number
used as a mobile identification number (MIN) or International Mobile Subscriber Identity (IMSI).
Wireless Port Request (WPR)
Message sent from a new service provider to an old service provider to begin the porting process.
X
X.25
Any network that implements the internationally accepted International Telecommunications
Union - Telecommunications Services Section (ITU-T) standard governing the operation of
packet-switching networks. The X.25 standard describes a switched communications service
where call setup times are relatively fast. The standard also defines how data streams are to be
assembled into packets, controlled, routed, and protected as they cross the network.
X.509
International Standards Organization (ISO) standard for digital certificates set by the Consultative
Committee on International Telegraphy & Telephony (CCITT) in Recommendation x.509: The
Directory - Authentication Framework, 1988.
X.509 certificate
Commonly used format for digital certificates, as defined by the international standard. Any
application complying with X.509 can read or write digital certificates. The X.509 certificate
determines the structure of trust in a distributed public-key cryptography system.
XML
A recommendation from the World Wide Web Consortium (W3C), similar to Hypertext Markup
Language (HTML), the language of Web pages. XML and HTML contain markup symbols that
describe the contents of a page or file. HTML describes the content of a Web page in terms of how
that content is displayed and interacted with.
XML describes content in terms of what data is being described. For example, <PHONENUM>
could indicate that following data is a phone number. An XML file can be processed as data,
stored with similar data on another computer, or displayed. For example, depending how the
application in a receiving computer wanted to handle the phone number, it could be stored,
displayed, or dialed. XML is "extensible" because, unlike HTML, the markup symbols are
unlimited and self-defining. A simpler and easier-to-use subset of the Standard Generalized
Markup Language (SGML), XML is used with HTML in many Web pages and applications.
XTerminal
Workstation (monitor, keyboard, and mouse) that interfaces with a UNIX server. Third party
software can be used on a PC workstation to emulate an XTerminal so that it may also interact
with a UNIX system.
XWindows
Type of graphical user interface used by UNIX workstations.
Y
Z