1. Insights
  2. Insights by Provider

Acronyms, Definitions, and Terms

Definitions of terms frequently heard in the industry.

 

Refer to these websites for a more in-depth listing of Acronyms and Definitions.

https://www.ramcomminc.com/telecom-glossary/

https://alpinepowersystems.com/resources/telecom-glossary

Orders, Troubles, Billing, and Commissions

FOC – Firm Order Confirmation
A confirmation from a current service provider that a Service Order to port a telephone number will be fulfilled, stating the date that the current carrier will comply with the request stated in the Service Order.  This also pertains to when a Provider is given a firm date for when delivery of physical connection, local loop.

DDD – Desired Due Date
The date as to which the customer requires or would be ready to accept service.

CCD – Customer Commit Date
The date by which a provider commits to install service. desired due date

LCON – Local Contact 
The person who will be on site to allow access to the technician into the building.

RFO – Reason for Outage
In the event of a prolonged outage, service providers must furnish an explanation detailing why the issue was not rectified within a reasonable timeframe.

MRC – Monthly Recurring Revenue
The cost charged every month for service. 

NRC  - Non Recurring Charge
A onetime fee, normally charged when a service is first activated.

NTE – No Trouble Found
Provider was unable to isolate the root cause of issue.

TSD – Technology Services Distributor
Previously identified as Master Agent, the Technology Services Distributor (TSD) serves as a central hub for managing contracts with various technology providers offering connectivity, collaboration, cloud, and security services. AVAIL receives compensation from the TSD based on their contractual agreement. Additionally, AVAIL collaborates with sub-agents who opt out of handling commissions through the TSD, instead receiving a predetermined percentage of the revenue.

Aggregator -  A provider who allows customers to manage all of their telecom services through a single bill and single customer service line, rather than dealing with multiple bills and points of contact across a single service contract. Customers also get the benefit of having access to multiple types of service technology.

GP - Gross Profit Margin
Gross Profit Margin provides a more accurate representation of the company's financial health by subtracting agent payouts from provider commissions, reflecting the actual revenue retained after compensating agents. AVAIL does not subtract the TAs commission given that it’s considered the cost of doing business.

Relating to Network

IP Address – Internet Protocol
IP addresses serve as distinct markers for devices on the internet or local network, facilitating the exchange of information by specifying their locations and enabling communication. In essence, IP addresses play a crucial role in allowing the internet to distinguish between different devices such as computers, routers, and websites, thereby essential for the internet's overall functionality.

Port Speed 
Port speed refers to the maximum data transmission rate of a line card through a port at any given moment. This speed is typically measured in Kilobits per second (Kbps) or Gigabits per second (Gbps).


Access Type
The method in which service is delivered. i.e. Copper Wire, Fiber or Ethernet, Wireless.

Last Mile
The final leg of the telecommunications networks that deliver telecommunication services to customers. It is the portion of the telecommunications network chain that physically reaches the customer's premises.

Demarc – Demarcation Point
The demarcation point is where your service provider's equipment connects with your own, determining responsibility for the installation and maintenance of cabling and hardware. Anything before the demarc is the service provider's responsibility.

IP Address – Internet Protocol
It’s a set of rules governing the format of data sent via the internet or local network.The address is a unique address that identifies a device on the internet or a local network.  In essence, IP addresses are the identifier that allows information to be sent between devices on a network: they contain location information and make devices accessible for communication. The internet needs a way to differentiate between different computers, routers, and websites. IP addresses provide a way of doing so and form an essential part of how the internet works.

Port Speed 
Refers to the maximum amount of data that the line card transmits through a port at any given second. Port speed is measured as follows: Kilobits per second (Kbps) Gigabits per second (Gbps)

Access Type
The method in which service is delivered. i.e. Copper Wire, Fiber or Ethernet, Wireless.

Last Mile
The final leg of the telecommunications networks that deliver telecommunication services to customers. It is the portion of the telecommunications network chain that physically reaches the customer's premises.

Demarc – Demarcation Point
Is the dividing line where your service provider's equipment connects with your own. This spot determines who is responsible for the installation and maintenance of cabling and hardware. Equipment located before the demarc is the service provider's responsibility.

Definitions for Cloud Services

Cloud services refer to infrastructure, platforms, or software that are hosted by third-party providers and accessible to users via the internet. These services encompass licensed offerings like Microsoft Office.

Examples:

IaaS -  Infrastructure as a Service
Is a cloud computing model that offers immediate access to computing resources like servers, storage, networking, and virtualization.

DRaaS -  Disaster Recovery as a Service
Is a cloud computing model that enables organizations to securely backup their data and IT infrastructure in a third-party cloud environment. This service provides all the necessary disaster recovery orchestration through a Software as a Service (SaaS) solution, ensuring quick access and functionality to IT infrastructure in case of any unforeseen incidents.

Security
IT security encompasses a range of cybersecurity measures aimed at safeguarding organizational assets like computers, networks, and data from unauthorized access. By upholding the integrity and confidentiality of sensitive information, these strategies work to prevent sophisticated hackers from gaining access to vital resources.

Definitions for Collaboration Services

Collaboration Services refer to support team collaboration, these tools functions as a virtual meeting space where team members can communicate in real-time. It enables instant messaging, video conferencing, and file sharing, seamlessly connecting employees with just a click of a button.

Examples:

UCaaS- Unified Communications as a Service
Is a cloud-based delivery model that provides a wide range of communication and collaboration tools and services. Some key features of UCaaS include enterprise messaging, presence technology, online meetings, team collaboration, telephony, and video conferencing.

CCaaS - customer service solution that streamlines the routing of incoming customer interactions to call center agents. By leveraging cloud-based CCaaS solutions, businesses can efficiently acquire the required technology without the need for extensive in-house IT infrastructure.

Definitions for Connectivity

Connectivity refers to how various devices, systems, or components can link up and interact with one another. It's all about ensuring that devices or systems can create a dependable and effective connection for sharing data, communicating, or exchanging resources.

Examples:

BB - Broadband also known as high-speed Internet access
Provides users with faster access to the internet and related services compared to traditional dial-up connections. The speed of broadband can vary depending on the technology and service level chosen. (Comcast refers to this as BI - Business Internet)

POTS or Local Line  – Plain Old Telephone Service
What everyone knows as their traditional landline phone system. It's essentially an analog voice transmission system that's installed with copper wires.

P2P - Point to Point or Private Line
Is a specialized communication link that connects two separate locations, even if they are geographically distant. This type of connection allows for direct and secure communication between the two designated sites.  Comcast refers to this as EPL Ethernet Private Line.

PRI - Primary Rate Interface
Is a standard telecommunications interface utilized within an Integrated Services Digital Network (ISDN). Its primary function is to facilitate the transmission of multiple DS0 voice and data signals between the network infrastructure and the end user.

SIP - Session Initiation Protocol
Is a crucial signaling protocol that facilitates Voice Over Internet Protocol (VoIP) communication. It defines the messages exchanged between endpoints and manages the various aspects of a call. SIP enables voice calls, video conferencing, instant messaging, and media distribution, making it a versatile tool for effective communication over the internet.

DIA - Dedicated Internet Access
Offers high-speed internet connectivity specifically tailored for your business needs. This service ensures that your access is reliable, secure, and not shared with other businesses. Comcast also refers to this service as EDI (Ethernet Dedicated Internet).

SD-WAN - Software-Defined Wide Area Network
Empowers organizations to securely link users, applications, and data across various locations. This technology enhances performance, reliability, and scalability while simplifying WAN management through centralized control and network visibility.

DSL - Digital Subscriber Line
Is a form of high-speed internet access that utilizes the existing copper telephone lines in homes and businesses to transmit data. To access this type of high-speed internet, you will need a DSL modem, unless your computer already has an internal modem, often known as a voiceband modem.

MPLS - Multiprotocol Label Switching (outdated technology)
Is a smart routing method used in telecommunications networks. Instead of relying on traditional network addresses, MPLS directs data between nodes by using labels that indicate specific paths. These labels help establish efficient communication routes, ensuring data reaches its intended destination smoothly. Comcast also refers to this service as EVPL, which stands for Ethernet Virtual Private Line.

LD - Long Distance
Refers to a telephone call made to a location outside of your local calling area. It is also known as a trunk or toll call.

eFax - Electronic Faxing
Is a convenient method of sending faxes over the internet. This modern approach to faxing eliminates the need for traditional fax machines, making the process more efficient and eco-friendly.

Tier 1, 2, and 3 Providers 

Tier 1 Service Provider
Tier 1 providers are the largest, such as AT&T, CenturyLink, Zayo, and Verizon, with network systems that span the globe. They can generally send data anywhere without having to pay transit fees, either because they own the network or they have peering agreements with other networks.

Tier 2 Service Provider
These are regional operators with a more limited network coverage than Tier 1 operators. They typically serve specific geographic areas or markets and may specialize in certain types of services, such as broadband and/or mobile.

Tier 3 Service Provider
They generally purchase transit Internet connection from Tier 2 Service Providers, sometimes even from the Tier 1 Providers as well.

Layer 1: Physical Layer
Layer 1 is fairly easy to understand. It covers the physical aspects of networking, and is the lowest and most physical "rocks and blocks" layer of the model. Wiring standards play an important role in this layer such as T568A and B for Ethernet, or which radio frequencies to use for Wi-Fi. Some protocols operate in multiple layers. Ethernet is an example. In Layer 1, it utilizes physical cabling and radio frequency standards along with the conversion of data to bits. We will talk more later about its presence and operation in Layer 2.

Layer 1 Data
Data at this layer is simply bits sent across a wire, many many zeros and ones. The argument could be made that all computer data is stored in bits and, ultimately, it is. This is the network layer where that happens so that it can be transmitted somewhere else.

Layer 1 Equipment
The type of equipment involved in Layer 1 uses little to no logic when operating: copper ethernet cables, fiber optic cables, and ethernet hubs. This is not only limited to physical cables though. The physical transmission aspects of Wi-Fi, Bluetooth, Microwave, and other over the air technologies fall under this layer.

Layer 2 is where many students get hung up when learning networking basics. 
Most people understand that MAC addresses exist at Layer 2, but other than that, why does this layer exist? This layer is primarily involved in transmitting data from one specific node to another. These nodes are usually directly connected, whether that's via LAN, WAN or MAN.

Layer 2 Data
Data at this layer is referred to as a frame. Frames have basic data in them such as a source address and a destination address as well as payload. That basic data is often referred to as a header, a type of metadata. The protocol "Frame Relay" gets its name from operating at this layer.
Layer 2 Equipment
Equipment at this layer is a little more intelligent and consists of switches, bridges, and network cards. It can use the headers of the packet to determine exactly where it goes. A switch can read the destination MAC address and forward it directly to the specific port the MAC address is plugged into. On the contrary, a hub simply broadcasts traffic to all ports because it does not operate at Layer 2 and therefore does not have this intelligence.

Layer 3: Network Layer
The network layer may be the one most people are most exposed to. It is hard to come across any IT professional who has not heard of an IP address. The "IP" in TCP/IP is a Layer 3 protocol. IPX was a very popular Layer 3 protocol within the IPX/SPX protocol group in NetWare's heyday.
The network layer provides a logical address of an endpoint. Layer 2 addresses are typically automatically generated by the vendor during the manufacturing process. But layer 3 addresses are usually configured. This could be a static IP configuration or a DHCP automated configuration.

Layer 3 Data
Data at this layer is referred to as a packet, which is a stateless grouping of data. Devices that forward packets do not validate that the other end receives the data. Instead, devices leave it to higher layer protocols to implement — should they choose. For example, in the case of Layer 4 protocol TCP, it does. Layer 4 protocol, UDP, however, does not.

Layer 3 Equipment
Routers are the common equipment used at this layer but there are many others. Layer 3 switches are also very common. Those are essentially Layer 2 switches with a router built into the backplane for speed. Firewalls, while able to operate at higher layers, can operate purely at this layer. Earlier versions of firewalls were not stateful and often used static filter.

NATO Phonetic Alphabet (Spelling Alphabet)

Used by communicators around the world to clarify letters and spellings. See the full alphabet below:
•    A - Alfa
•    B - Bravo
•    C - Charlie
•    D - Delta
•    E - Echo
•    F - Foxtrot
•    G - Golf
•    H - Hotel
•    I - India
•    J - Juliet
•    K - Kilo
•    L - Lima
•    M - Mike
•    N - November
•    O - Oscar
•    P - Papa
•    Q - Quebec
•    R - Romeo
•    S - Sierra
•    T - Tango
•    U - Uniform
•    V - Victor
•    W - Whisky
•    X - X-ray
•    Y - Yankee
•    Z - Zulu