Glossary > Glossary > S

S
SD/SDHC/SD-XC Card
Secure, digital memory cards that use flash-type storage (non-volatile storage). Their special shape protects them from wrong insertion into the card slot. A lateral device for write protection (sliding switch) protects them from accidental deletion of data. SD cards can store up to 2 GB (SD 1.1 standard) whereas SDHC cards can store up to 32 GB (SD 2.0 standard). SC-XC cards can store from 32 GB to - theoretically - 2.048 GB (SD 3.0 standard). Information on recommended memory cards can be found in the Internet (Auerswald: www.auerswald.de/service, FONtevo: support.fontevo.com).
Server
Computer or a software that fulfils different tasks as part of the network. It provides, for example, other users (clients) in this network with certain information, data and services.
SIP
Session Initiation Protocol - network protocol which provides establishing a communication session between two or more subscribers. Via SIP only communication conditions are arranged. Other protocols such as RTP are responsible for actual data transmission.
SIP Port
Port of the local system used as the communication port for the SIP transfer.
SIP Trunking
Some VoIP providers also support a VoIP PTP connection with a Direct Dial In option. The provider allocates a PBX base number with additional Direct Dial In numbers (DDI numbers), e.g., 9200–0.
SMTP
Simple Mail Transfer Protocol - network protocol used for the secure transfer of e-mails between the PBX and external mail servers. The PBX needs an external SMTP server (outgoing mail server) to send system e-mails or forward voice mail messages and fax messages.
Under Settings > E-mail > Outgoing e-mail server you can enter different outgoing mail servers. If no outgoing mail server has been entered, no e-mails can be sent.
STUN
Simple Transversal of UDP over NATs - used to determine the public IP address of an Internet connection. To do this, a STUN request is sent to a STUN server, which then shares its own IP address allocated by the VoIP provider with the Internet connection.
Subnet mask
Configuring subnetworks makes it possible to connect many totally different networks located in totally different areas because each subnetwork receives its own address and can therefore be addressed by the router. A subnetwork is created when the IP address is linked with a subnet mask:
If a bit in the subnet mask is set, the corresponding bit in the IP address is considered a part of the network address. If a bit is not set in the subnet mask, the corresponding bit in the IP address is used as a part of the PC address.
The value of the subnet mask, as with IP addresses, is often given in decimal form (for example, 255.255.255.0 for IPv4 addresses).
Switch
Active network distributor that distributes data packages to a destination defined by an IP address among the different segments of a network.
System Telephone
Thanks to their integration into the system, system telefphones simplify the operation of the entire system and additionally offer numerous possibilities to use PBX functions and signalise their status visually and, in part, accustically.

COMfortel 1400 IP/2600 IP/3600 IP - Firmware V2.8 - Advanced Information V08 12/2020