No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Maintenance Guide

TE20 Videoconferencing Endpoint V600R019C00

Describes how to maintain and troubleshoot the Videoconferencing Endpoint.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Glossary

Glossary

Numerics

802.1X

An access control and authentication protocol based on the client/server mode. It can prevent unauthorized users/equipment from accessing the LAN/WLAN through an access port. After a client (STA) is associated with an AP, the 802.1X authentication result determines whether the STA can use the wireless services provided by the AP. If the STA passes the authentication, the STA can access the resources in the WLAN. If the STA fails to pass the authentication, the STA cannot access the resources in the WLAN.

  

A

AAC

advanced audio coding

AES

Advanced Encryption Standard

A specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST). It supersedes the Data Encryption Standard (DES). AES adopts a symmetric-key algorithm for both encrypting and decrypting the data, where the block size is 128 bits and the key size is 128 bits, 192 bits, or 256 bits.

API

application programming interface

An application programming interface is a particular set of rules and specifications that are used for communication between software programs.

  

C

CPE

customer-premises equipment

The equipment located at an end-user's premises. Most CPEs are telephones or other service equipment. A CPE can be a Mobile Station (MS) or a Subscriber Station (SS). An MS is mobile equipment, and an SS is fixed equipment.

contacts

Users can save the information about the IP address, number, type, and bandwidth of a remote site to a contact.

Corporate Directory

A next-generation address book server launched by Huawei. It provides LDAP-based unified address book services for Huawei videoconferencing and enterprise communication solutions.

  

D

DES

Data Encryption Standard

A specification for encryption of computer data developed by IBM and adopted by the U.S. government as a standard in 1976. DES uses a 56-bit key.

DHCP

Dynamic Host Configuration Protocol

A client-server networking protocol. A DHCP server provides configuration parameters specific to the DHCP client host requesting information the host requires to participate on the Internet network. DHCP also provides a mechanism for allocating IP addresses to hosts.

  

F

FTPS

File Transfer Protocol over SSL

An extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols.

  

G

G.722

Audio codec standard that uses adaptive differential pulse-code modulation (ADPCM). Its data rate is 48 kbit/s, 56 kbit/s, or 64 kbit/s.

  

H

H.264

Compared with H.263, H.264 can provide the same-quality video at half of the bit rate, with strong error resilience characteristics.

HD

high definition

HDMI

high definition multimedia interface

HTTPS

Hypertext Transfer Protocol Secure

An HTTP protocol that runs on top of transport layer security (TLS) and Secure Sockets Layer (SSL). It is used to establish a reliable channel for encrypted communication and secure identification of a network web server. For details, see RFC2818.

  

I

IMS

IP multimedia subsystem

IPv4

Internet Protocol version 4

IPv6

Internet Protocol version 6

  

L

LDAP

Lightweight Directory Access Protocol

A network protocol based on TCP/IP, which allows access to a directory system agent (DSA). It involves some reduced functionality from X.500 Directory Access Protocol (DAP) specifications.

  

M

MCU

Multipoint Control Unit

Data connection equipment used in a videoconferencing system. An MCU is used for terminal access, video exchange, audio mixing, data processing, and signaling exchange.

  

P

PIP

Picture in Picture

The Picture in Picture (PIP) service allows subscribers to view a full screen window (main window) and a small window (PIP window) at the same time on the screen when watching a live TV channel. The current channel is played in the main window and another channel is played in the PIP window.

point-to-point call

A site makes a call to another site, to hold a conference that has two participants.

presentation

During a conference, the local site shares the content input from a computer with remote sites, such as an excel file, a diagram, or slides.

  

S

SNMP

Simple network management protocol

"An IETF protocol for monitoring and managing systems and devices in a network. The data being monitored and managed is defined by a MIB. The functions supported by the protocol are the request and retrieval of data, the setting or writing of data, and traps that signal the occurrence of events."

SRTP

Secure Real-time Transport Protocol

A real time transport protocol with enhanced security and encryption mechanism-based RTP.

SSID

service set identifier

SSID can divide a wireless LAN into multiple subnets, and perform separate identity authentication on each subnet. Only the users passed the authentication can access the corresponding subnet.

STUN

Simple Traversal of UDP through NAT

Switch Center

A Switch Center (SC) is Huawei's new-generation network switch system that provides H.323 GK, SIP server, and media proxy functions.

  

T

TCP/IP

Transmission Control Protocol/Internet Protocol

TLS

Transport Layer Security

  

V

VTS

Versatile Tools Suite

  

W

WEP

wired equivalent privacy

WLAN

wireless local area network

A hybrid of the computer network and the wireless communication technology. It uses wireless multiple address channels as transmission media and carriers out data interaction through electromagnetic wave to implement the functions of the traditional LAN.

WPA

Wi-Fi Protected Access

A wireless security protocol replacing WEP and aiming to provide more powerful security performance for the IEEE 802.11 WLAN. WPA is a subset of IEEE 802.11i, whose core is IEEE 802.1x and TKIP.

WPA-PSK

Wi-Fi protected access pre-shared key

whitelist

A list or register of items that, for one reason or another, are being provided a particular privilege, service, mobility, access or recognition.

Translation
Download
Updated: 2019-06-15

Document ID: EDOC1100044520

Views: 12561

Downloads: 17

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next