H.248 |
|
The Gateway Control Protocol (Megaco, H.248) is an implementation of the media gateway control protocol architecture for providing telecommunication services across a converged internetwork consisting of the traditional public switched telephone network (PSTN) and modern packet networks, such as the Internet. H.248 is the designation of the recommendations developed by the ITU Telecommunication Standardization Sector (ITU-T) and Megaco is a contraction of media gateway control protocol used by the earliest specifications by the Internet Engineering Task Force (IETF). The standard published in March 2013 by ITU-T is entitled H.248.1: Gateway control protocol: Version 3. |
H.323 |
|
H.323 is a recommendation from the ITU Telecommunication Standardization Sector (ITU-T) that defines the protocols to provide audio-visual communication sessions on any packet network. The H.323 standard addresses call signaling and control, multimedia transport and control, and bandwidth control for point-to-point and multi-point conferences.[1] |
Half Duplex |
|
In a half-duplex system, both parties can communicate with each other, but not simultaneously; the communication is one direction at a time. An example of a half-duplex device is a walkie-talkie two-way radio that has a "push-to-talk" button; when the local user wants to speak to the remote person they push this button, which turns on the transmitter but turns off the receiver, so they cannot hear the remote person. To listen to the other person they release the button, which turns on the receiver but turns off the transmitter. |
Happy Path |
|
See nominal path. |
Hash Function |
|
hash function is any function that can be used to map data of arbitrary size to data of a fixed size. The values returned by a hash function are called hash values, hash codes, digests, or simply hashes. Hash functions are often used in combination with a hash table, a common data structure used in computer software for rapid data lookup. Hash functions accelerate table or database lookup by detecting duplicated records in a large file. One such application is finding similar stretches in DNA sequences. They are also useful in cryptography. A cryptographic hash function allows one to easily verify that some input data maps to a given hash value, but if the input data is unknown, it is deliberately difficult to reconstruct it (or any equivalent alternatives) by knowing the stored hash value. This is used for assuring integrity of transmitted data, and is the building block for HMACs, which provide message authentication. |
HDF |
Handover Distribution Frame |
Used to terminate the cable from the exchange and to make the pairs available to the operator. |
HDLC |
High-Level Datalink Control |
High-Level Data Link Control (HDLC) is a bit-oriented code-transparent synchronous data link layer protocol developed by the International Organization for Standardization (ISO). The original ISO standards for HDLC are as follows: |
HDSL |
High Speed Digital Subscriber Line (also known as High-speed Digital Subscriber Loop) |
A copper delivered service on Copper Wideband Serving Section (CWSS). It is subject to reach limitations and is used primarily to provide 2 Mbit service to singleton sites. |
Heartbeat Retrospective |
|
The team meets regularly to reflect on the most significant events that occurred since the previous such meeting, and identify opportunities for improvement. |
HiFi Prototype |
|
See high fidelity prototype. |
High Fidelity Prototype |
|
Mockup of a system using a software or technology based tool, usually one with a RAD environment, e.g., Visual Basic or Delphi. |
High Level Design |
HLD |
Design level between architecture and low level design. Focuses defining the details of the software solution at levels abstracted from their construction. See CxStand_Design for more information. |
HLR |
Home Location Register |
The home location register (HLR) is a central database that contains details of each mobile phone subscriber that is authorized to use the GSM core network. There can be several logical, and physical, HLRs per public land mobile network (PLMN), though one international mobile subscriber identity (IMSI)/MSISDN pair can be associated with only one logical HLR (which can span several physical nodes) at a time.
|
Hotfix |
|
code (sometimes called a patch) that fixes a bug in a product. |
How Requirement |
|
Often a synonym for non-functional requirement. Sometimes used to refer to design issues. |
How Well Requirement |
|
Synonym for non-functional requirement. |
HSRP |
Hot Standby Router Protocol |
In computer networking, the Hot Standby Router Protocol (HSRP) is a Cisco proprietary redundancy protocol for establishing a fault-tolerant default gateway. Version 1 of the protocol was described in RFC 2281 in 1998. There is no RFC for version 2 of the protocol. |
HSS |
Home subscriber server |
The home subscriber server (HSS), or user profile server function (UPSF), is a master user database that supports the IMS network entities that actually handle calls. It contains the subscription-related information (subscriber profiles), performs authentication and authorization of the user, and can provide information about the subscriber's location and IP information. It is similar to the GSM home location register (HLR) and Authentication centre (AuC). |
HTTP |
Hypertext Transfer Protocol |
The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems.[1] HTTP is the foundation of data communication for the World Wide Web. |
HTTPS |
|
HTTP Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS), or formerly, its predecessor, Secure Sockets Layer (SSL). The protocol is therefore also often referred to as HTTP over TLS, or HTTP over SSL. |
Hub |
|
An Ethernet hub, active hub, network hub, repeater hub, multiport repeater, or simply hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment. It has multiple input/output (I/O) ports, in which a signal introduced at the input of any port appears at the output of every port except the original incoming. A hub works at the physical layer (layer 1) of the OSI model. A repeater hub also participates in collision detection, forwarding a jam signal to all ports if it detects a collision. In addition to standard 8P8C ("RJ45") ports, some hubs may also come with a BNC or an Attachment Unit Interface (AUI) connector to allow connection to legacy 10BASE2 or 10BASE5 network segments. |
human factors |
|
the study of how humans behave physically and psychologically in relation to particular environments, products, or services. |
Hungarian notation |
|
Hungarian notation is an identifier naming convention in computer programming, in which the name of a variable or function indicates its intention or kind, and in some dialects its type. The original Hungarian Notation uses intention or kind in its naming convention and is sometimes called Apps Hungarian as it became popular in the Microsoft Apps division in the development of Word, Excel and other apps. As the Microsoft Windows division adopted the naming convention, they used the actual data type for naming, and this convention became widely spread through the Windows API; this is sometimes called Systems Hungarian notation.
|
Attachments:
worddav7263e6d133ab422a19de5246df44ecff.png (image/png)
worddav23aafc78f8ffd5625c9206a37201a7cd.png (image/png)
worddav6a3b80775467462022110fa609ccaa6d.png (image/png)
worddavbb4f3407cc046a54f10fca79d8c45fef.png (image/png)
worddavc49c954ad0ddc6b729cfb3f692c7dd43.png (image/png)
worddav6a06e4bae0d304ac5ef497a16b30da2f.png (image/png)