Glossary
98-169085-B
143
I
ICMP
Internet Control Message Protocol. An Internet protocol mostly used for diagnostics.
IMEI
International Mobile Equipment Identity. A unique number identifying your terminal.
IMSI
International Mobile Subscriber Identity. A unique number used to identify a mobile
subscriber on a wireless network.
IMSO
International Maritime Satellite Organisation. An intergovernmental body established to
ensure that Inmarsat continues to meet its public service obligations, including
obligations relating to the GMDSS.
IP
Internet Protocol.
IPsec
Internet Protocol Security. A protocol suite for securing Internet Protocol (IP)
communications by authenticating and encrypting each IP packet of a communication
session.
L
LTE
LTE stands for Long-term Evolution, and is the path followed to achieve 4G speeds in
wireless broadband networks. LTE applies more generally to the idea of improving wireless
broadband speeds to meet increasing demand.
M
M2M
MAC
Media Access Control address. A hardware address that uniquely identifies each node of
a network.
N
NAT
Network Address Translation. An Internet standard that enables a local-area network to
use one set of IP addresses for internal traffic and a second set of addresses for external
traffic. A NAT module makes all necessary address translations.
P
PIN
Personal Identification Number. A code number used to provide access to a system that
has restricted access.
PUK
PIN Unblocking Key. An eight-digit code used to unblock a SIM card after three incorrect
PINs have been entered. The PUK code is supplied with the SIM card.
S
SIP
Session Initiation Protocol. An application-layer control (signaling) protocol for creating,
modifying, and terminating sessions with one or more participants. Used e.g. for Internet
telephony.
SPI
Security Parameter Index. An identification tag added to the header while using IPsec for
tunneling the IP traffic.
SSL
Secure Sockets Layer. The standard technology for keeping an internet connection secure
and safeguarding any sensitive data that is being sent between two systems, preventing
criminals from reading and modifying any information transferred, including potential