Glossary for Huawei OSN

97
Glossary for Huawei OSN Numerics 3DES See Triple Data Encryption Standard. 3G See 3rd Generation. 3GPP 3rd Generation Partnership Project 3R reshaping, retiming, regenerating 3rd Generation (3G) The third generation of digital wireless technology, as defined by the International Telecommunications Union (ITU). Third generation technology is expected to deliver data transmission speeds between 144 kbit/s and 2 Mbit/s, compared to the 9.6 kbit/s to 19.2 kbit/s offered by second generation technology. 802.11n A wireless transmission standard released after 802.11a/b/g by Wi-Fi Alliance. As a new member to the 802.11 protocol family, 802.11n supports the 2.4 GHz and 5 GHz frequency bands and provides a higher bandwidth (300 Mbit/s, much higher than the 54 Mbit/s provided by 802.11a/g) for WLAN access users. In addition, 802.11n supports the MIMO technology, which provides two methods of increasing the communication rate: by increasing the bandwidth and by improving the channel usage. 802.1Q in 802.1Q (QinQ) A VLAN feature that allows the equipment to add a VLAN tag to a tagged frame. The implementation of QinQ is to add a public VLAN tag to a frame with a private VLAN tag to allow the frame with double VLAN tags to be transmitted over the service provider's backbone network based on the public VLAN tag. This provides a layer 2 VPN tunnel for customers and enables transparent transmission of packets over private VLANs. 802.1X An access control and authentication protocol based on the client/server mode. It can prevent unauthorized users/equipment from accessing the LAN/WLAN through an access port. After a client (STA) is associated with an AP, the 802.1X authentication result determines whether the STA can use the wireless services provided by the AP. If the STA passes the authentication, the STA can access the resources in the WLAN. If the STA fails to pass the authentication, the STA cannot access the resources in the WLAN. 802.1ag MAC ping A network administration utility similar to ping. 802.1ag MAC ping works by sending test packets and waiting for a reply to test whether the destination device is reachable. 802.1ag MAC ping is initiated by a MEP and destined for a MEP or MIP at the same maintenance level within any MA. 802.1ag MAC trace A network diagnositic tool similar to traceroute or tracert. 802.1ag MAC trace works by sending test packets and waiting for a reply to test the path between the local device and the destination device and to locate faults. 802.1ag MAC trace is initiated by a MEP and destined for a MEP or MIP at the same maintenance level within any MA. A

description

Glossary for Huawei OSN

Transcript of Glossary for Huawei OSN

  • Glossary for Huawei OSN

    Numerics

    3DES

    See Triple Data Encryption Standard.

    3G

    See 3rd Generation.

    3GPP

    3rd Generation Partnership Project

    3R

    reshaping, retiming, regenerating

    3rd Generation (3G)

    The third generation of digital wireless technology, as defined by the International Telecommunications Union (ITU). Third generation technology is expected to deliver data transmission speeds between 144 kbit/s and 2 Mbit/s, compared to the 9.6 kbit/s to 19.2 kbit/s offered by second generation technology.

    802.11n

    A wireless transmission standard released after 802.11a/b/g by Wi-Fi Alliance. As a new member to the 802.11 protocol family, 802.11n supports the 2.4 GHz and 5 GHz frequency bands and provides a higher bandwidth (300 Mbit/s, much higher than the 54 Mbit/s provided by 802.11a/g) for WLAN access users. In addition, 802.11n supports the MIMO technology, which provides two methods of increasing the communication rate: by increasing the bandwidth and by improving the channel usage.

    802.1Q in 802.1Q (QinQ)

    A VLAN feature that allows the equipment to add a VLAN tag to a tagged frame. The implementation of QinQ is to add a public VLAN tag to a frame with a private VLAN tag to allow the frame with double VLAN tags to be transmitted over the service provider's backbone network based on the public VLAN tag. This provides a layer 2 VPN tunnel for customers and enables transparent transmission of packets over private VLANs.

    802.1X

    An access control and authentication protocol based on the client/server mode. It can prevent unauthorized users/equipment from accessing the LAN/WLAN through an access port. After a client (STA) is associated with an AP, the 802.1X authentication result determines whether the STA can use the wireless services provided by the AP. If the STA passes the authentication, the STA can access the resources in the WLAN. If the STA fails to pass the authentication, the STA cannot access the resources in the WLAN.

    802.1ag MAC ping

    A network administration utility similar to ping. 802.1ag MAC ping works by sending test packets and waiting for a reply to test whether the destination device is reachable. 802.1ag MAC ping is initiated by a MEP and destined for a MEP or MIP at the same maintenance level within any MA.

    802.1ag MAC trace

    A network diagnositic tool similar to traceroute or tracert. 802.1ag MAC trace works by sending test packets and waiting for a reply to test the path between the local device and the destination device and to locate faults. 802.1ag MAC trace is initiated by a MEP and destined for a MEP or MIP at the same maintenance level within any MA.

    A

  • A/D

    analog/digit

    A3

    algorithm A3

    AAA

    See Authentication, Authorization and Accounting.

    AAL

    See ATM Adaptation Layer.

    AAL1

    See ATM Adaptation Layer Type 1.

    AAL5

    ATM Adaptation Layer Type 5

    ABR

    See area border router.

    ACAP

    See adjacent channel alternate polarization.

    ACB

    access barred signal

    ACH

    associated channel header

    ACK

    See acknowledgement.

    ACL

    See access control list.

    ACM

    adaptive clock method

    ACR

    allowed cell rate

    ADM

    add/drop multiplexer

    ADMC

    automatically detected and manually cleared

    ADSL

    asymmetric digital subscriber line

    ADSL2+

    asymmetric digital subscriber line 2 plus

    AES

    See Advanced Encryption Standard.

    AF

    See assured forwarding.

  • AFI

    address family identifier

    AG

    See access gateway.

    AGC

    automatic gain control

    AH

    See Authentication Header.

    AID

    access identifier

    AIS

    alarm indication signal

    AKA

    See Authentication and Key Agreement.

    ALC

    See automatic level control.

    ALG

    See application level gateway.

    ALS

    See automatic laser shutdown.

    AM

    See adaptive modulation.

    AMI

    See alternate mark inversion.

    AMR

    See adaptive multirate.

    AMT

    advanced manufacturing technique

    AN

    access node

    ANCP

    See Access Node Control Protocol.

    ANI

    See automatic number identification.

    ANSI

    See American National Standards Institute.

    AOE

    ATM over Ethernet

    AP

    access preamble

  • APE

    automatic power equilibrium

    APN

    See access point name.

    APS

    automatic protection switching

    ARP

    See Address Resolution Protocol.

    ARQ

    See automatic repeat request.

    AS

    See autonomous system.

    ASBR

    See autonomous system boundary router.

    ASCII

    American Standard Code for Information Interchange

    ASE

    amplified spontaneous emission

    ASIC

    See application-specific integrated circuit.

    ASL

    analog subscriber line

    ASM

    See any-source multicast.

    ASN.1

    See Abstract Syntax Notation One.

    ASP

    active server page

    ASPF

    application specific packet filter

    ATD

    attribute discovery

    ATI

    See any time interrogation.

    ATM

    asynchronous transfer mode

    ATM Adaptation Layer (AAL)

    An interface between higher-layer protocols and Asynchronous Transfer Mode (ATM). The AAL provides a conversion function to and from ATM for various types of information, including voice, video, and data.

  • ATM Adaptation Layer Type 1 (AAL1)

    A layer defined in the Asynchronous Transfer Mode (ATM) protocol reference model and located between the ATM and user layers. AAL1 is used to segment and encapsulate user data into ATM cells. It can attenuate delay jitters, prevent cell loss, and perform flow control and error control. It is designed for adaptation of ATM to the voice, image, and data services. AAL1 is dedicated to the voice service.

    ATPC

    See automatic transmit power control.

    ATU-R

    ADSL transceiver unit, remote terminal end

    AU

    See administrative unit.

    AUG

    See administrative unit group.

    AUTN

    authentication token

    AVP

    See attribute-value pair.

    Abstract Syntax Notation One (ASN.1)

    A syntax notation type employed to specify protocols. Many protocols defined by the ITU-T use this syntax format. Other alternatives are standard text or Augmented Backus-Naur Form (ABNF).

    Access Node Control Protocol (ANCP)

    An IP-based protocol that operates between the access node (AN) and the network access server (NAS), over a DSL access and aggregation network.

    Address Resolution Protocol (ARP)

    An Internet Protocol used to map IP addresses to MAC addresses. It allows hosts and routers to determine the link layer addresses through ARP requests and ARP responses.

    Advanced Encryption Standard (AES)

    An encryption algorithm that is originally used by some U.S. government departments to guarantee the security of some secret but unclassified material. Now, AES has become the most influential encryption standard all around the world. The AES algorithm is used to ensure the system security.

    American National Standards Institute (ANSI)

    An organization that defines U.S standards for the information processing industry. ANSI participates in defining network protocol standards.

    Authentication Header (AH)

    A protocol that provides connectionless integrity, data origin authentication, and anti-replay protection for IP data.

    Authentication and Key Agreement (AKA)

    A user authentication method defined in 3GPP. IMS AKA is used to implement inter-authentication between the UE and the IMS to ensure confidentiality and integrity of the IMS.

    Authentication, Authorization and Accounting (AAA)

    A mechanism for configuring authentication, authorization, and accounting security services. Authentication refers to the verification of user identities and the related network services;

  • authorization refers to the granting of network services to users according to authentication results; and accounting refers to the tracking of the consumption of network services by users.

    access control list (ACL)

    A list of entities, together with their access rights, which are authorized to have access to a resource.

    access gateway (AG)

    A type of gateway that provides a user-network interface (UNI) such as ISDN. An access gateway is located at the edge access layer of the NGN structure, and provides various methods for connecting users to the NGN.

    access point name (APN)

    The network identifier defined by the general packet radio system (GPRS)/Universal Mobile Telecommunications System (UMTS). On one hand, an APN helps the GPRS/UMTS identify the gateway GPRS support node (GGSN). On the other hand, an APN identifies the external packet data networks (PDNs) (such as an Internet service provider network and enterprise network) connected through this GGSN or certain associated services (such as Internet access and wireless application protocol services).

    acknowledgement (ACK)

    A response sent by a receiver to indicate successful reception of information. Acknowledgements may be implemented at any level including the physical level (using voltage on one or more wires to coordinate transfer), at the link level (to indicate successful transmission across a single hardware link), or at higher levels.

    adaptive modulation (AM)

    A technology that is used to automatically adjust the modulation mode according to the channel quality. When the channel quality is favorable, the equipment uses a high-efficiency modulation mode to improve the transmission efficiency and the spectrum utilization of the system. When the channel quality is degraded, the equipment uses the low-efficiency modulation mode to improve the anti-interference capability of the link that carries high-priority services.

    adaptive multirate (AMR)

    A type of algorithm that is based on the adaptive rate and adopts Algebraic Code Excitation Linear Prediction (ACELP). Generally, it refers to a codec type.

    adjacent channel alternate polarization (ACAP)

    A channel configuration method, which uses two adjacent channels (a horizontal polarization wave and a vertical polarization wave) to transmit two signals.

    administrative unit (AU)

    The information structure which provides adaptation between the higher order path layer and the multiplex section layer. It consists of an information payload (the higher order VC) and an AU pointer which indicates the offset of the payload frame start relative to the multiplex section frame start.

    administrative unit group (AUG)

    One or more administrative units occupying fixed, defined positions in an STM payload. An AUG consists of AU-4s.

    agent

    A process that resides in all managed devices. It receives request packets from the element management system, performs the Read or Write operation on managed variables based on the packet types, generates response packets, and returns the response packets to the element management system.

    alternate mark inversion (AMI)

  • A synchronous clock encoding technique which uses bipolar pulses to represent logical 1 values.

    any time interrogation (ATI)

    A service control function of querying the current status and location information of a subscriber at any time.

    any-source multicast (ASM)

    A multicast service mode. In ASM mode, any sender can become the multicast source to send information to a multicast group address. After joining the multicast group identified by this address, multiple receivers can receive all the information sent to this multicast group.

    application level gateway (ALG)

    An ALG consists of a security component that augments a firewall or NAT employed in a computer network. It allows customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application layer "control/data" protocols such as FTP, BitTorrent, SIP, RTSP, file transfer in IM applications etc. In order for these protocols to work through NAT or a firewall, either the application has to know about an address/port number combination that allows incoming packets, or the NAT has to monitor the control traffic and open up port mappings (firewall pinhole) dynamically as required. Legitimate application data can thus be passed through the security checks of the firewall or NAT that would have otherwise restricted the traffic for not meeting its limited filter criteria.

    application-specific integrated circuit (ASIC)

    A special type of chip that starts out as a nonspecific collection of logic gates. Late in the manufacturing process, a layer is added to connect the gates for a specific function. By changing the pattern of connections, the manufacturer can make the chip suitable for many needs.

    area border router (ABR)

    A router that can belong to more than two areas of which one area must be a backbone area.

    assured forwarding (AF)

    One of the four per-hop behaviors (PHB) defined by the Diff-Serv workgroup of IETF. It is suitable for certain key data services that require assured bandwidth and short delay. For traffic within the bandwidth limit, AF assures quality in forwarding. For traffic that exceeds the bandwidth limit, AF degrades the service class and continues to forward the traffic instead of discarding the packets.

    attribute-value pair (AVP)

    An information element that includes a header and is used to encapsulate protocol-specific data (for example, routing information) as well as authentication, authorization or accounting information. The Diameter protocol consists of a header followed by one or more AVPs.

    automatic laser shutdown (ALS)

    A technique (procedure) to automatically shutdown the output power of laser transmitters and optical amplifiers to avoid exposure to hazardous levels.

    automatic level control (ALC)

    A feature that identifies speech signals and adjusts the sound volume to stay within a comfortable range, improving user experience.

    automatic number identification (ANI)

    An SS7 feature in which a series of digits, either analog or digital, are included in the call, identifying the telephone number of the calling device.

    automatic repeat request (ARQ)

    An error control method for data transmission in which the receiver detects transmission errors in a message and automatically requests a retransmission from the transmitter.

  • automatic transmit power control (ATPC)

    A method of adjusting the transmit power based on fading of the transmit signal detected at the receiver

    autonomous system (AS)

    A network set that uses the same routing policy and is managed by the same technology administration department. Each AS has a unique identifier that is an integer ranging from 1 to 65535. The identifier is assigned by IANA. An AS can be divided into areas.

    autonomous system boundary router (ASBR)

    A router that exchanges routing information with other ASs.

    B

    B-ISDN

    See broadband integrated services digital network.

    B-VLAN

    backbone virtual local area network

    BA

    behavior aggregate

    BAS

    See broadband access server.

    BBE

    background block error

    BBS

    See bulletin board system.

    BC

    boundary clock

    BCCH

    broadcast control channel

    BCD

    binary-coded data

    BDI

    See backward defect indication.

    BE

    See best effort.

    BER

    bit error rate

    BFD

    See Bidirectional Forwarding Detection.

    BG

    See border gateway.

    BGP

    Border Gateway Protocol

  • BIOS

    See basic input/output system.

    BIP

    See bit interleaved parity.

    BIP-8

    See bit interleaved parity-8.

    BIP-X

    bit interleaved parity-X

    BITS

    See building integrated timing supply.

    BMC

    best master clock

    BMS

    business management system

    BOM

    broadcast overhead message

    BPDU

    See bridge protocol data unit.

    BPS

    board protection switching

    BRA

    See basic rate access.

    BRAS

    See broadband remote access server.

    BRI

    basic rate interface

    BSC

    See base station controller.

    BSR

    See bootstrap router.

    BSS

    business support system

    BTS

    base transceiver station

    BTV

    broadband TV

    BWS

    backbone wavelength division multiplexing system

    Bidirectional Forwarding Detection (BFD)

  • A fast and independent hello protocol that delivers millisecond-level link failure detection and provides carrier-class availability. After sessions are established between neighboring systems, the systems can periodically send BFD packets to each other. If one system fails to receive a BFD packet within the negotiated period, the system regards that the bidirectional link fails and instructs the upper layer protocol to take actions to recover the faulty link.

    backward defect indication (BDI)

    A function that the sink node of a LSP, when detecting a defect, uses to inform the upstream end of the LSP of a downstream defect along the return path.

    base station controller (BSC)

    A logical entity that connects the BTS with the MSC in a GSM/CDMA network. It interworks with the BTS through the Abis interface, the MSC through the A interface. It provides the following functions: radio resource management, base station management, power control, handover control, and traffic measurement. One BSC controls and manages one or more BTSs in an actual network.

    basic input/output system (BIOS)

    A firmware stored in the computer mainboard. It contains basic input/output control programs, power-on self test (POST) programs, bootstraps, and system setting information. The BIOS provides hardware setting and control functions for the computer.

    basic rate access (BRA)

    An ISDN interface typically used by smaller sites and customers. This interface consists of a single 16 kbit/s data (or "D") channel plus two bearer (or "B") channels for voice and/or data. Also known as Basic Rate Access, or BRI.

    best effort (BE)

    A traditional IP packet transport service. In this service, the diagrams are forwarded following the sequence of the time they reach. All diagrams share the bandwidth of the network and routers. The amount of resource that a diagram can use depends of the time it reaches. BE service does not ensure any improvement in delay time, jitter, packet loss ratio, and high reliability.

    bit interleaved parity (BIP)

    A method of error monitoring. With even parity an X-bit code is generated by equipment at the transmit end over a specified portion of the signal in such a manner that the first bit of the code provides even parity over the first bit of all X-bit sequences in the covered portion of the signal, the second bit provides even parity over the second bit of all X-bit sequences within the specified portion, and so on. Even parity is generated by setting the BIP-X bits so that there is an even number of 1s in each monitored partition of the signal. A monitored partition comprises all bits which are in the same bit position within the X-bit sequences in the covered portion of the signal. The covered portion includes the BIP-X.

    bit interleaved parity-8 (BIP-8)

    Consists of a parity byte calculated bit-wise across a large number of bytes in a transmission transport frame. Divide a frame is into several blocks with 8 bits (one byte) in a parity unit and then arrange the blocks in matrix. Compute the number of "1" or "0" over each column. Then fill a 1 in the corresponding bit for the result if the number is odd, otherwise fill a 0.

    bit/s

    See bits per second.

    bits per second (bit/s)

    A rate at which the individual bits are transmitted through a communication link or circuit. Its unit can be bit/s, kbit/s, and Mbit/s.

    bootstrap router (BSR)

    The management core of the PIM-SM network. The BSR collects the C-RP information into an RP-set, encapsulates the RP-set into a Bootstrap message, and advertises the Bootstrap

  • message to each PIM-SM router in the entire network. The PIM-SM router then calculates the RP corresponding to the specified multicast group according to the RP-set.

    border gateway (BG)

    A gateway that terminates the Gp interface to a PLMN. This function is typically an edge router supporting the Border Gateway Protocol (BGP) and security protocols such as IP Security (IPSec).

    bridge protocol data unit (BPDU)

    The data messages that are exchanged across the switches within an extended LAN that uses a spanning tree protocol (STP) topology. BPDU packets contain information on ports, addresses, priorities and costs and ensure that the data ends up where it was intended to go. BPDU messages are exchanged across bridges to detect loops in a network topology. The loops are then removed by shutting down selected bridges interfaces and placing redundant switch ports in a backup, or blocked, state.

    broadband access server (BAS)

    A server providing features such as user access, connection management, address allocation and authentication, authorization and accounting. It also works as a router featuring effective route management, high forwarding performance and abundant services.

    broadband integrated services digital network (B-ISDN)

    A standard defined by the ITU-T to handle high-bandwidth applications, such as voice. It currently uses the ATM technology to transmit data over SONNET-based circuits at 155 to 622 Mbit/s or higher speed.

    broadband remote access server (BRAS)

    A new type of access gateway for broadband networks. As a bridge between backbone networks and broadband access networks, BRAS provides methods for fundamental access and manages the broadband access network. It is deployed at the edge of network to provide broadband access services, convergence, and forwarding of multiple services, meeting the demands for transmission capacity and bandwidth utilization of different users. BRAS is a core device for the broadband users' access to a broadband network.

    building integrated timing supply (BITS)

    In the situation of multiple synchronous nodes or communication devices, one can use a device to set up a clock system on the hinge of telecom network to connect the synchronous network as a whole, and provide satisfactory synchronous base signals to the building integrated device. This device is called BITS.

    bulletin board system (BBS)

    A computer system equipped with one or more modems or other means of network access that serves as an information and message-passing center for remote users.

    C

    CA

    Certificate Authority

    CAC

    See connection admission control.

    CAR

    committed access rate

    CAS

    See channel associated signaling.

    CATV

  • cable TV

    CAU

    See client automatic upgrade.

    CBC

    cipher block chaining

    CBQoS

    class based quality of service

    CBR

    See constant bit rate.

    CBS

    See committed burst size.

    CC

    See continuity check.

    CCC

    circuit cross connect

    CCCH

    See common control channel.

    CCDP

    See co-channel dual polarization.

    CCITT

    Consultative Committee of International Telegraph and Telephone

    CCM

    central control module

    CCS

    See Call Center Server.

    CDE

    common desktop environment

    CDMA

    See Code Division Multiple Access.

    CDMA2000

    A 3G technology developed by Qualcomm of the US. Technology competitive with WCDMA, upgraded from CDMA1, and developed by the GSM community as a worldwide standard for 3G mobile.

    CDR

    See call detail record.

    CDT

    call detail trace

    CDVT

    cell delay variation tolerance

    CE

  • See customer edge.

    CE1

    channelized E1

    CEAS

    See Customer Equipment Archive System.

    CES

    See circuit emulation service.

    CFM

    connectivity fault management

    CG

    center gap

    CGI

    See cell global identification.

    CHAP

    See Challenge Handshake Authentication Protocol.

    CID

    call instance data

    CIR

    committed information rate

    CIST

    See Common and Internal Spanning Tree.

    CLC

    cluster line-card chassis

    CLI

    command-line interface

    CLK

    clock card

    CLNP

    connectionless network protocol

    CLP

    See cell loss priority.

    CMI

    coded mark inversion

    CN

    core network

    CN-CS

    core network-circuit switched domain

    CN-PS

    core network-packet switched domain

    CO

  • central office

    COBOL

    Common Business-Oriented Language

    COPS

    Common Open Policy Service

    CORBA

    See Common Object Request Broker Architecture.

    COS

    chip operating system

    CPCS

    common part convergence sublayer

    CPE

    See customer premises equipment.

    CPLD

    complex programmable logical device

    CPU

    See central processing unit.

    CR

    connection request

    CR-LSP

    constraint-based routed label switched path

    CRC

    See cyclic redundancy check.

    CRF

    connection related function

    CRL

    See certificate revocation list.

    CRPC

    case-shape Raman pump amplifier unit for C-band

    CSES

    consecutive severely errored second

    CSF

    Client Signal Fail

    CSG

    closed subscriber group

    CSMA/CD

    See carrier sense multiple access with collision detection.

    CSNP

    See complete sequence numbers protocol data unit.

    CSPF

  • constraint shortest path first

    CST

    See common spanning tree.

    CSV

    comma-separated values

    CT

    class type

    CT1

    channelized T1

    CTC

    common transmit clock

    CTD

    cell transfer delay

    CTP

    connection termination point

    CV

    connectivity verification

    CVC

    code verification certificate

    CW

    control word

    CWDM

    See coarse wavelength division multiplexing.

    Call Center Server (CCS)

    The core component of the call center platform, managing calls independent of media types.

    Challenge Handshake Authentication Protocol (CHAP)

    A method to periodically verify the identity of the peer using a 3-way handshake. During the establishment of a link, the authenticator sends a "challenge" message to the peer. The peer responds with a value calculated using a "one-way hash" function. The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authentication is acknowledged. CHAP provides protection against playback attack.

    Code Division Multiple Access (CDMA)

    A communication scheme that forms different code sequences by using the frequency expansion technology. Subscribers with different addresses can use different code sequences for multi-address connection.

    Common Object Request Broker Architecture (CORBA)

    A specification developed by the Object Management Group in 1992 in which pieces of programs (objects) communicate with other objects in other programs, even if the two programs are written in different programming languages and are running on different platforms. A program makes its request for objects through an object request broker, or ORB, and thus does not need to know the structure of the program from which the object comes. CORBA is designed to work in object-oriented environments. See also IIOP, object (definition 2), Object Management Group, object-oriented.

    Common and Internal Spanning Tree (CIST)

  • The single spanning tree jointly calculated by STP and RSTP, the logical connectivity using MST bridges and regions, and MSTP. The CIST ensures that all LANs in the bridged local area network are simply and fully connected.

    Coordinated Universal Time (UTC)

    The world-wide scientific standard of timekeeping. It is based upon carefully maintained atomic clocks and is kept accurate to within microseconds worldwide.

    Customer Equipment Archive System (CEAS)

    A system recording the information about all the HUAWEI devices on the network. It records the information about shelves and boards, all engineering information (including cooperation payment), and all maintenance and warranty information. The CEAS consists of the offline tool and the online system.

    call detail record (CDR)

    A database record unit used to create billing records. A CDR contains details such as the called and calling parties, originating switch, terminating switch, call length, and time of day.

    carrier sense multiple access with collision detection (CSMA/CD)

    Carrier sense multiple access with collision detection (CSMA/CD) is a computer networking access method in which:

    A carrier sensing scheme is used.

    A transmitting data station that detects another signal while transmitting a frame, stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to send that frame again.

    cell global identification (CGI)

    A number that uniquely identifies a GSM cell worldwide. A CGI is the concatenation of a Location Area Identification (LAI) and a Cell Identity (CI). The number format is LAI + CI. CI is a 2-byte BCD, which can be customized by carriers.

    cell loss priority (CLP)

    A field in the ATM cell header that determines the probability of a cell being dropped if the network becomes congested. Cells with CLP = 0 are insured traffic, which is unlikely to be dropped. Cells with CLP = 1 are best-effort traffic, which might be dropped.

    central processing unit (CPU)

    The computational and control unit of a computer. The CPU is the device that interprets and executes instructions. The CPU has the ability to fetch, decode, and execute instructions and to transfer information to and from other resources over the computer's main data-transfer path, the bus.

    certificate revocation list (CRL)

    A list of all canceled certificates. A time-stamped list of certificates that have been revoked by the Certification Authority (CA). The CRL is signed by the issuing CA and is made available to entities that need to reply on a certificate for authentication.

    channel associated signaling (CAS)

    A signaling system in which signaling information is transmitted within a dedicated voice channel. China Signaling System No. 1 is a type of CAS signaling.

    circuit emulation service (CES)

    A function with which the E1/T1 data can be transmitted through ATM networks. At the transmission end, the interface module packs timeslot data into ATM cells. These ATM cells are sent to the reception end through the ATM network. At the reception end, the interface module re-assigns the data in these ATM cells to E1/T1 timeslots. The CES technology guarantees that the data in E1/T1 timeslots can be recovered to the original sequence at the reception end.

  • client automatic upgrade (CAU)

    A function that enables a user to automatically detect the update of the client version and upgrade the client. This keeps the version of the client is the same as that of the server.

    co-channel dual polarization (CCDP)

    A channel configuration method, which uses a horizontal polarization wave and a vertical polarization wave to transmit two signals. The Co-Channel Dual Polarization has twice the transmission capacity of the single polarization.

    coarse wavelength division multiplexing (CWDM)

    A signal transmission technology that multiplexes widely-spaced optical channels into the same fiber. CWDM widely spaces wavelengths at a spacing of several nm. CWDM does not support optical amplifiers and is applied in short-distance chain networking.

    committed burst size (CBS)

    A parameter used to define the capacity of token bucket C, that is, the maximum burst IP packet size when the information is transferred at the committed information rate. This parameter must be larger than 0. It is recommended that this parameter should be not less than the maximum length of the IP packet that might be forwarded.

    common control channel (CCCH)

    A point-to-multipoint bidirectional control channel. A CCCH is primarily intended to carry signaling information necessary for access management functions.

    common spanning tree (CST)

    A single spanning tree that connects all the MST regions in a network. Every MST region is considered as a switch; therefore, the CST can be considered as their spanning tree generated with STP/RSTP.

    complete sequence numbers protocol data unit (CSNP)

    A unit that contains brief information about the local LSDB and is used to synchronize the LSDBs of neighbors. CSNPs are sent and resolved at different levels.

    connection admission control (CAC)

    A control process in which the network takes actions in the call set-up phase (or call re-negotiation phase) to determine which connection request is admitted.

    constant bit rate (CBR)

    A kind of service categories defined by the ATM forum. CBR transfers cells based on the constant bandwidth. It is applicable to service connections that depend on precise clocking to ensure undistorted transmission.

    continuity check (CC)

    Ethernet CFM can detect the connectivity between MEPs. The detection is achieved after MEPs transmit Continuity Check Messages (CCMs) periodically.

    cross polarization interference cancellation (XPIC)

    A technology used in the case of the Co-Channel Dual Polarization (CCDP) to eliminate the cross-connect interference between two polarization waves in the CCDP.

    customer edge (CE)

    A part of BGP/MPLS IP VPN model. It provides interfaces for direct connection to the Service Provider (SP) network. A CE can be a router, switch, or host.

    customer premises equipment (CPE)

    The equipment located at an end-user's premises. Most CPEs are telephones or other service equipment. A CPE can be a Mobile Station (MS) or a Subscriber Station (SS). An MS is mobile equipment, and an SS is fixed equipment.

    cyclic redundancy check (CRC)

  • A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values.

    D

    DAPI

    destination access point identifier

    DAS

    See Data Access Service.

    DB

    database

    DBA

    dynamic bandwidth allocation

    DBPS

    distributed board protect system

    DC

    direct current

    DCC

    See data communications channel.

    DCCH

    dedicated control channel

    DCE

    data connection equipment

    DCM

    See dispersion compensation module.

    DCN

    See data communication network.

    DD

    database description

    DDF

    digital distribution frame

    DDI

    See direct dialing in.

    DDN

    See digital data network.

    DEI

    device emulation interrupt

    DES

  • See Data Encryption Standard.

    DF

    delivery function

    DGE

    dynamic gain equalizer

    DH

    See Diffie-Hellman.

    DHCP

    See Dynamic Host Configuration Protocol.

    DIMM

    See dual in-line memory module.

    DLAG

    See distributed link aggregation group.

    DM

    See delay measurement.

    DMM

    distributed message manager

    DMS

    Datacom Integrated Network Management System

    DMT

    See discrete multi-tone.

    DMTI

    See desired Min Tx interval.

    DMZ

    See demilitarized zone.

    DNI

    dual node interconnection

    DNS

    See domain name server.

    DNS server

    A device that can provide domain name resolution for the client on the network

    DOD

    dial-on-demand

    DPD

    dead peer detection

    DPI

    deep packet inspection

    DR

    See designated router.

    DRAM

  • dynamic random access memory

    DRL

    device run log

    DS

    data service

    DS-TE

    See DiffServ-aware Traffic Engineering.

    DSB

    See Data Service Bus.

    DSCP

    See differentiated services code point.

    DSE

    dispersion slope equalizer

    DSL

    See digital subscriber line.

    DSLAM

    See digital subscriber line access multiplexer.

    DSP

    See digital signal processor.

    DSR

    data set ready

    DST

    daylight saving time

    DT

    decay time

    DTE

    See data terminal equipment.

    DTM

    digital trunk module

    DTMF

    See dual tone multiple frequency.

    DU

    downstream unsolicited

    DVB

    digital video broadcasting

    DVB-ASI

    digital video broadcast-asynchronous serial interface

    DVMRP

    See Distance Vector Multicast Routing Protocol.

    DWDM

  • See dense wavelength division multiplexing.

    Data Access Service (DAS)

    A component of the Business Management Point (BMP), for realizing the transparent access of applications to the database. The DAS shields the types, formats, and locations of data storage.

    Data Encryption Standard (DES)

    A specification for encryption of computer data developed by IBM and adopted by the U.S. government as a standard in 1976. DES uses a 56-bit key.

    Data Service Bus (DSB)

    A component of the Business Management Point (BMP). The DSB can convert, disassemble, and assemble data, process complex data logics, subscribe to and deliver data, and route data.

    DiffServ

    See Differentiated Services.

    DiffServ-aware Traffic Engineering (DS-TE)

    A technology used to optimize and subdivide network transmission resources, classify traffic, and specify the proportion of each flow to the link bandwidth.

    Differentiated Services (DiffServ)

    An IETF standard that defines a mechanism for controlling and forwarding traffic in a differentiated manner based on CoS settings to handle network congestion.

    Diffie-Hellman (DH)

    A public algorithm of key. Two communication parties can obtain the keys by exchanging some data instead of transmitting the key across the link.

    Distance Vector Multicast Routing Protocol (DVMRP)

    An Internet gateway protocol mainly based on the RIP. The protocol implements a typical dense mode IP multicast solution. The DVMRP protocol uses IGMP to exchange routing datagrams with its neighbors.

    DoD

    downstream on demand

    DoS

    denial of service

    Dynamic Host Configuration Protocol (DHCP)

    A client-server networking protocol. A DHCP server provides configuration parameters specific to the DHCP client host requesting, generally, information required by the host to participate on the Internet network. DHCP also provides a mechanism for allocation of IP addresses to hosts.

    data communication network (DCN)

    A communication network used in a TMN or between TMNs to support the data communication function.

    data communications channel (DCC)

    The data channel that uses the D1D12 bytes in the overhead of an STM-N signal to transmit information about operation, management, maintenance and provision (OAM&P) between NEs. The DCC channels that are composed of bytes D1D3 are referred to as the 192 kbit/s DCC-R channel. The other DCC channels that are composed of bytes D4D12 are referred to as the 576 kbit/s DCC-M channel.

    data terminal equipment (DTE)

  • A user device composing the UNI. The DTE accesses the data network through the DCE equipment (for example, a modem) and usually uses the clock signals produced by DCE.

    delay measurement (DM)

    The time elapsed since the start of transmission of the first bit of the frame by a source node until the reception of the last bit of the loopbacked frame by the same source node, when the loopback is performed at the frame's destination node.

    demilitarized zone (DMZ)

    A buffer area between an insecure system and the secure system and is used to solve the problem that the external network equipped with a firewall cannot access the internal network server. The DMZ is located between the internal network and the external network. In the DMZ, some public server facilities, such as the enterprise Web server and FTP server, can be located. The DMZ effectively protects the internal network.

    dense wavelength division multiplexing (DWDM)

    The technology that utilizes the characteristics of broad bandwidth and low attenuation of single mode optical fiber, employs multiple wavelengths with specific frequency spacing as carriers, and allows multiple channels to transmit simultaneously in the same fiber.

    designated router (DR)

    A functional entity in the TCP/IP network. A DR is selected by the OSPF Hello protocol to prevent repeated link status exchanges between routers in an Open Shortest Path First (OSPF) area. All routers in an OSPF area are connected to a DR. When routing data updates in routers, a message about link status is sent to the DR, and the DR sends the message to routers. Therefore, bandwidth resources can be saved.

    desired Min Tx interval (DMTI)

    The minimum interval that the local system would like to use when transmitting BFD control packets.

    differentiated services code point (DSCP)

    According to the QoS classification standard of the Differentiated Service (Diff-Serv), the type of services (ToS) field in the IP header consists of six most significant bits and two currently unused bits, which are used to form codes for priority marking. Differentiated services code point (DSCP) is the six most important bits in the ToS. It is the combination of IP precedence and types of service. The DSCP value is used to ensure that routers supporting only IP precedence can be used because the DSCP value is compatible with IP precedence. Each DSCP maps a per-hop behavior (PHB). Therefore, terminal devices can identify traffic using the DSCP value.

    digital data network (DDN)

    A high-quality data transport tunnel that combines the digital channel (such as fiber channel, digital microwave channel, or satellite channel) and the cross multiplex technology.

    digital signal processor (DSP)

    A microprocessor designed specifically for digital signal processing, generally in real time.

    digital subscriber line (DSL)

    A technology for providing digital connections over the copper wire or the local telephone network. DSL performs data communication over the POTS lines without affecting the POTS service.

    digital subscriber line access multiplexer (DSLAM)

    A network device, usually situated in the main office of a telephone company that receives signals from multiple customer Digital Subscriber Line (DSL) connections and puts the signals on a high-speed backbone line using multiplexing techniques.

    direct dialing in (DDI)

  • A service that allows an intra-office user to be connected through the PSTN long number of this user. The call does not need to be transferred to this user through the automatic switchboard.

    discrete multi-tone (DMT)

    A modulation mode of the asymmetric digital subscriber line (ADSL), which uses the frequency division multiplex technology to divide the frequency band in use into multiple subchannels to carry data independently. ITU-T defines the maximum number of bits that each subchannel can carry. In each subchannel, data can be modulated and transmitted independently and the ADSL based on the DMT technology has a strong anti-noise capability. The transmission capability of the ADSL based on the DMT technology is related to the following factors: frequency response (line attenuation), line noise, noise margin, transmit power, preset maximum number of bits that each subfrequency band can carry.

    dispersion compensation module (DCM)

    A module, which contains dispersion compensation fibers to compensate for the dispersion of transmitting fiber.

    distributed link aggregation group (DLAG)

    A board-level port protection technology used to detect unidirectional fiber cuts and to negotiate with the opposite end. Once a link down failure occurs on a port or a hardware failure occurs on a board, the services can automatically be switched to the slave board, achieving 1+1 protection for the inter-board ports.

    domain name server (DNS)

    A functional entity in the TCP/IP network. With deployment of the DNS, subscribers can access related servers using corresponding domain names. In the TCP/IP network, a domain name maps an IP address. Domain names are easier to remember but serves in the network communicate with each other using IP addresses. Therefore the DNS is used to convert domain names to corresponding IP addresses.

    dual in-line memory module (DIMM)

    A circuit board on which RAM memory chips are mounted. A DIMM is a small circuit board that can hold a group of memory chips. A DIMM is capable of transferring 64 bits instead of 32 bits that each SIMM can transfer. Pentium processors require a 64-bit path to memory so SIMMs must be installed two at a time as opposed to one DIMM at a time.

    dual tone multiple frequency (DTMF)

    In telephone systems, multifrequency signaling in which standard set combinations of two specific voice band frequencies, one from a group of four low frequencies and the other from a group of four higher frequencies, are used.

    E

    E-Aggr

    See Ethernet aggregation.

    E-LAN

    See Ethernet local area network.

    E-Line

    See Ethernet line.

    E-Tree

    See Ethernet-tree.

    E-UTRAN

    See evolved universal terrestrial radio access network.

    E1

  • An European standard for high-speed data transmission at 2.048 Mbit/s. It provides thirty-two 64 kbit/s channels. A time division multiplexing frame is divided in to 32 timeslots numbered from 0 to 31. Timeslot 0 is reserved for frame synchronization, and timeslot 16 is reserved for signaling transmission. The rest 30 timeslots are use as speech channels. Each timeslot sends or receives an 8-bit data per second. Each frame sends or receives 256-bit data per second. 8000 frames will be sent or received per second. Therefore the line data rate is 2.048 Mbit/s.

    EAPE

    enhanced automatic power pre-equilibrium

    EAPoL

    Extensible Authentication Protocol over LAN

    EBGP

    External Border Gateway Protocol

    EBS

    See excess burst size.

    EC

    See error correction.

    ECC

    See embedded control channel.

    ECM

    entitlement control message

    EDFA

    See erbium-doped fiber amplifier.

    EEPROM

    See electrically erasable programable read-only memory.

    EF

    See expedited forwarding.

    EFI

    See external functionality interface.

    EFM

    Ethernet in the First Mile

    EFM OAM

    Ethernet in the first mile OAM

    EFT

    electrical fast transient

    EGP

    See Exterior Gateway Protocol.

    EIA

    See Electronic Industries Alliance.

    EIGRP

    Enhanced Interior Gateway Routing Protocol

    EIR

  • See equipment identity register.

    ELAN

    emulated local area network

    EM

    element management

    EMC

    See electromagnetic compatibility.

    EMI

    See electromagnetic interference.

    EMS

    element management system

    EMU

    See environment monitoring unit.

    EN

    end node

    EOC

    embedded operations channel

    EOS

    enterprise operation system

    EP

    elementary procedure

    EPL

    See Ethernet private line.

    EPLAN

    See Ethernet private LAN service.

    EPLD

    See erasable programmable logical device.

    EPON

    See Ethernet passive optical network.

    ERPS

    Ethernet ring protection switching

    ES

    edge server

    ESC

    See electric supervisory channel.

    ESCON

    See enterprise system connection.

    ESN

    See equipment serial number.

    ESP

  • See Encapsulating Security Payload.

    ESS

    See extended service set.

    ETSI

    See European Telecommunications Standards Institute.

    EUI

    extended user interface server

    EVC

    Ethernet virtual connection

    EVOA

    electrical variable optical attenuator

    EVPL

    See Ethernet virtual private line.

    EVPLAN

    See Ethernet virtual private LAN service.

    EXP

    See experimental bits.

    Electronic Industries Alliance (EIA)

    An association based in Washington, D.C., with members from various electronics manufacturers. It sets standards for electronic components. RS-232-C, for example, is the EIA standard for connecting serial components.

    Encapsulating Security Payload (ESP)

    A key protocol in the IP Security (IPsec) architecture. ESP adopts encryption and authentication mechanisms. It is used in transport mode or tunnel mode to authenticate the source of IP packets, and ensure data integrity, anti-replay, and confidentiality. ESP provides data confidentiality and integrity by encrypting the data to be protected and placing the encrypted data in the data part of the IP ESP. Based on security requirements of subscribers, this mechanism can be used to encrypt either a transport-layer segment or an IP data packet. A transport-layer segment includes Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP), and Internet Group Management Protocol (IGMP).

    Ethernet aggregation (E-Aggr)

    A type of Ethernet service that is based on a multipoint-to-point EVC (Ethernet virtual connection).

    Ethernet line (E-Line)

    A type of Ethernet service that is based on a point-to-point EVC (Ethernet virtual connection).

    Ethernet local area network (E-LAN)

    A type of Ethernet service that is based on a multipoint-to-multipoint EVC (Ethernet virtual connection).

    Ethernet passive optical network (EPON)

    A passive optical network based on Ethernet. It is a new generation broadband access technology that uses a point-to-multipoint structure and passive fiber transmission. It supports upstream/downstream symmetrical rates of 1.25 Gbit/s and a reach distance of up to 20 km. In the downstream direction, the bandwidth is shared based on encrypted broadcast transmission for different users. In the upstream direction, the bandwidth is shared based on TDM. EPON meets the requirements for high bandwidth.

  • Ethernet private LAN service (EPLAN)

    A type of Ethernet service provided by SDH, PDH, ATM, or MPLS networks. This service is carried over a dedicated bridge and point-to-multipoint connections.

    Ethernet private line (EPL)

    A type of Ethernet service that is provided with dedicated bandwidth and point-to-point connections on an SDH, PDH, ATM, or MPLS server layer network.

    Ethernet virtual private LAN service (EVPLAN)

    A type of Ethernet service provided by SDH, PDH, ATM, or MPLS networks. This service is carried over a shared bridge and point-to-multipoint connections.

    Ethernet virtual private line (EVPL)

    A type of Ethernet service provided by SDH, PDH, ATM, or MPLS networks. This service is carried over a shared bridge and point-to-point connections.

    Ethernet-tree (E-Tree)

    An Ethernet service type that is based on a Point-to-multipoint Ethernet virtual connection.

    European Telecommunications Standards Institute (ETSI)

    A standards-setting body in Europe. Also the standards body responsible for GSM.

    Extensible Markup Language (XML)

    A specification developed by the W3C. XML is a pared-down version of SGML, designed especially for Web documents. It allows designers to create their own customized tags, enabling the definition, transmission, validation, and interpretation of data between applications and between organizations.

    Exterior Gateway Protocol (EGP)

    A protocol for exchanging routing information between two neighboring gateway hosts (each with its own router) in a network of autonomous systems.

    eTOM

    enhanced Telecom Operations Map

    electric supervisory channel (ESC)

    A technology that implements communication among all the nodes and transmission of monitoring data in an optical transmission network. The monitoring data of ESC is introduced into DCC service overhead and is transmitted with service signals.

    electrically erasable programable read-only memory (EEPROM)

    A type of EPROM that can be erased with an electrical signal. It is useful for stable storage for long periods without electricity while still allowing reprograming. EEPROMs contain less memory than RAM, take longer to reprogram, and can be reprogramed only a limited number of times before wearing out.

    electromagnetic compatibility (EMC)

    A condition which prevails when telecommunications equipment is performing its individually designed function in a common electromagnetic environment without causing or suffering unacceptable degradation due to unintentional electromagnetic interference to or from other equipment in the same environment.

    electromagnetic interference (EMI)

    Any electromagnetic disturbance that interrupts, obstructs, or otherwise degrades or limits the effective performance of electronics/electrical equipment.

    embedded control channel (ECC)

  • A logical channel that uses a data communications channel (DCC) as its physical layer, to enable transmission of operation, administration, and maintenance (OAM) information between NEs.

    enterprise system connection (ESCON)

    A path protocol which connects the host with various control units in a storage system. It is a serial bit stream transmission protocol. The transmission rate is 200 Mbit/s.

    environment monitoring unit (EMU)

    A type of power and environment monitoring unit. EMU is used to monitor the environment variables, such as the power supply and temperature. With external signal input through the relay, fire alarm, smoke alarm, burglary alarm, and others can be monitored as well. With the display on NMS system, the change of environment can be monitored timely and accurately.

    equipment identity register (EIR)

    A logical entity responsible for storing in the network the International Mobile Equipment Identities (IMEIs), used in the GSM system.

    equipment serial number (ESN)

    A string of characters that identify a piece of equipment and ensures correct allocation of a license file to the specified equipment. It is also called "equipment fingerprint".

    erasable programmable logical device (EPLD)

    A logical array device which can be used to implement the required functions by programming the array. In addition, a user can modify and program the array repeatedly until the program meets the requirement.

    erbium-doped fiber amplifier (EDFA)

    An optical device that amplifies the optical signals. The device uses a short length of optical fiber doped with the rare-earth element Erbium and the energy level jump of Erbium ions activated by pump sources. When the amplifier passes the external light source pump, it amplifies the optical signals in a specific wavelength range.

    error correction (EC)

    Technique for restoring integrity in data that is corrupted during transmission. It requires additional information to be sent with the original data and allows the data to be reconstructed from this information if the original data is corrupted.

    evolved universal terrestrial radio access network (E-UTRAN)

    A new radio access architecture defined in 3GPP R8. It features high transmission rate, low latency, and optimized data packets. In the E-UTRAN network, multiple eNodeBs are deployed. Two layered protocol stacks are used in the E-UTRAN network to transmit data to the user equipment (UE), including the user-plane protocol stack and the control-plane protocol stack. The user-plane protocol stack consists of Packet Data Convergence Protocol (PDCP), Radio Link Control (RLC), Medium Access Control (MAC), and physical sub-layers. For details about E-UTRAN, see 3GPP TS 36.101.

    excess burst size (EBS)

    A parameter related to traffic. In the single rate three color marker (srTCM) mode, the traffic control is achieved by the token buckets C and E. Excess burst size is a parameter used to define the capacity of token bucket E, that is, the maximum burst IP packet size when the information is transferred at the committed information rate. This parameter must be larger than 0. It is recommended that this parameter should be not less than the maximum length of the IP packet that might be forwarded.

    expected response (XRES)

    In the UMTS authentication process the network sends RAND (Random Number) to the UMTS Subscriber, XRES is the value that the network is looking for to indicate a positive response.

  • expedited forwarding (EF)

    The highest order QoS in the Diff-Serv network. EF PHB is suitable for services that demand low packet loss ratio, short delay, and broad bandwidth. In all the cases, EF traffic can guarantee a transmission rate equal to or faster than the set rate. The DSCP value of EF PHB is "101110".

    experimental bits (EXP)

    A field in the MPLS packet header, three bits long. This field is always used to identify the CoS of the MPLS packet.

    extended service set (ESS)

    A set of one or more interconnected basic service sets (BSSs) that appears as a single BSS to the logical link control (LLC) layer at any station (STA) associated with one of those BSSs.

    external functionality interface (EFI)

    The EFI service specifies the interface between WAE and components or entities with embedded applications that execute outside of the defined WAE capabilities. This is analogous to providing a plug-in module, which extends or enhances the capabilities of browsers or other applications.

    F

    FAD

    fabric adapter

    FC

    See fiber channel.

    FCB

    fan control board

    FD

    See frequency diversity.

    FDD

    See frequency division duplex.

    FDDI

    See fiber distributed data interface.

    FDI

    See forward defect indication.

    FDN

    See full distinguished name.

    FE

    See fast Ethernet.

    FEC

    See forwarding equivalence class.

    FF

    fixed filter

    FFD

    fast failure detection

    FIB

  • See forward information base.

    FICON

    See Fiber Connect.

    FIFO

    See first in first out.

    FMC

    fixed-mobile convergence

    FOADM

    fixed optical add/drop multiplexer

    FPGA

    See field programmable gate array.

    FQ

    See fair queuing.

    FR

    See frame relay.

    FRR

    See fast reroute.

    FS

    frequency slot

    FSM

    finite state machine

    FT

    fault tolerance

    FTP

    File Transfer Protocol

    FTTB

    See fiber to the building.

    FTTC

    See fiber to the curb.

    FTTH

    See fiber to the home.

    FWA

    See fixed wireless access.

    FXO

    foreign exchange office

    Fax over IP (FoIP)

    A technique for facsimile (fax) transmission over the Internet or other IP-based packet network, rather than over the traditional public switched telephone network (PSTN). FoIP typically involves a fax gateway, which not only serves as a physical gate bet

    Fiber Connect (FICON)

  • A new generation connection protocol which connects the host to various control units. It carries single byte command protocol through the physical path of fiber channel, and provides higher rate and better performance than ESCON.

    FoIP

    See Fax over IP.

    fair queuing (FQ)

    A mechanism for queue scheduling in which network resource is allocated equally so that delay and jitter time for all traffic are optimal.

    fast Ethernet (FE)

    Any network that supports transmission rate of 100 Mbit/s. The Fast Ethernet is 10 times faster than 10BaseT, and inherits frame format, MAC addressing scheme, MTU, and so on. Fast Ethernet is extended based on the IEEE802.3 standard, and it uses the following three types of transmission media: 100BASE-T4 (4 pairs of phone twisted-pair cables), 100BASE-TX (2 pairs of data twisted-pair cables), and 100BASE-FX (2-core optical fibers).

    fast reroute (FRR)

    A technology which provides a temporary protection of link availability when part of a network fails. The protocol enables the creation of a standby route or path for an active route or path. When the active route is unavailable, the traffic on the active route can be switched to the standby route. When the active route is recovered, the traffic can be switched back to the active route. FRR is categorized into IP FRR, VPN FRR, and TE FRR.

    fiber channel (FC)

    A high-speed transport technology used to build storage area networks (SANs). Fiber channel can be on the networks carrying ATM and IP traffic. It is primarily used for transporting SCSI traffic from servers to disk arrays. Fiber channel supports single-mode and multi-mode fiber connections. Fiber channel signaling can run on both twisted pair copper wires and coaxial cables. Fiber channel provides both connection-oriented and connectionless services.

    fiber distributed data interface (FDDI)

    A standard developed by the American National Standards Institute (ANSI) for high-speed fiber-optic local area networks (LANs). FDDI provides specifications for transmission rates of 100 megabits (100 million bits) per second on networks based on the token ring network.

    fiber to the building (FTTB)

    A fiber-based networking scenario. There are two types of FTTB scenarios: multi-dwelling unit (MDU) and business buildings. Each scenario includes the following service types: FTTB to the MDU and FTTB to the business buildings.

    fiber to the curb (FTTC)

    A fiber-based networking scenario. The FTTC scenario provides the following services: asymmetric broadband services (such as digital broadcast service, VOD, file download, and online gaming), symmetric broadband services (such as content broadcast, email, file exchange, distance education, and distance medical care), POTS, ISDN, and xDSL backhaul services.

    fiber to the home (FTTH)

    A fiber-based networking scenario. The FTTH scenario provides the following services: asymmetric broadband services (digital broadcast service, VoD, file download, and online gaming), symmetric broadband services (content broadcast, email, file exchange, distance education, and distance medical care), POTS, and ISDN services.

    field programmable gate array (FPGA)

    A type of semi-customized circuit used in the application specific integrated circuit (ASIC) field. It is developed on the basis of the programmable components, such as the PAL, GAL, and EPLD. It not only remedies the defects of customized circuits but also overcomes the

  • disadvantage of the original programmable components in terms of the limited number of gate arrays.

    first in first out (FIFO)

    A stack management mechanism. The first saved data is first read and invoked.

    fixed wireless access (FWA)

    A wireless access application in which the location of the end-user termination and the network access point to be connected to the end-user are fixed.

    forward defect indication (FDI)

    A packet generated and traced forward to the sink node of the LSP by the node that first detects defects. It includes fields to indicate the nature of the defect and its location. Its primary purpose is to suppress alarms being raised at affected higher level client LSPs and (in turn) their client layers.

    forward information base (FIB)

    A table that provides information for network hardware (bridges and routers) for them to forward data packets to other networks. The information contained in a routing table differs according to whether it is used by a bridge or a router. A bridge relies on both the source (originating) and destination addresses to determine where and how to forward a packet.

    forwarding equivalence class (FEC)

    A class-based forwarding technology that classifies the packets with the same forwarding mode. Packets with the same FEC are processed similarly on an MPLS network. The division of FECs is flexible, and can be a combination of the source address, destination address, source port, destination port, protocol type, and VPN.

    frame relay (FR)

    A packet-switching protocol used for WANs. Frame relay transmits variable-length packets at up to 2 Mbit/s over predetermined, set paths known as PVCs (permanent virtual circuits). It is a variant of X.25 but sacrifices X.25's error detection for the sake of speed.

    frequency diversity (FD)

    A diversity scheme in which two or more microwave frequencies with a certain frequency interval are used to transmit/receive the same signal and selection is then performed between the two signals to ease the impact of fading.

    frequency division duplex (FDD)

    An application in which channels are divided by frequency. In an FDD system, the uplink and downlink use different frequencies. Downlink data is sent through bursts. Both uplink and downlink transmission use frames with fixed time length.

    full distinguished name (FDN)

    Each record in the configuration data table has an FDN field. The FDN field is used to uniquely identify an MO. The FDN field is generated automatically when the system records the NE configuration data. The FDN value identifies the hierarchy of each MO in the configuration model.

    G

    G.711

    Audio codec standard (A-law or U-law) that uses pulse code modulation (PCM). Its data rate is 64 kbit/s.

    GAL

    generic associated channel header label

    GE

  • See gigabit Ethernet.

    GE ADM

    A technique that is used to optimize GE service transport over a Metro WDM network. By using this technique, equipment configured with a high-speed backplane can separately transmit, aggregate, or divert GE services over electrical-layer wavelengths or sub-wavelengths. This achieves cross-connections of wavelengths and end-to-end management of sub-wavelengths over a single device. This technique enables GE convergence and cross-connections at the same time and therefore ensures that network resources are used effectively.

    GEM

    GPON encapsulation mode

    GFP

    See Generic Framing Procedure.

    GGSN

    See gateway GPRS support node.

    GMPLS

    generalized multiprotocol label switching

    GMSC

    See gateway mobile switching center.

    GMT

    Greenwich Mean Time

    GNE

    See gateway network element.

    GPON

    gigabit-capable passive optical network

    GPRS

    See general packet radio service.

    GPRS tunneling protocol (GTP)

    GPRS Tunneling Protocol (GTP), an IP-based protocol, is used for general packet radio service (GPRS) communication in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS) networks. The GTP includes GTP-C and GTP-U. GTP-C is used to transmit signaling for path management, tunnel management, mobility management, and location management. GTP-C performs controls on tunnels in which subscriber data is transferred. GTP-U is used to encapsulate subscriber data and transport subscriber data in tunnels. For details about GTP, see 3GPP TS 29.060.

    GPS

    See Global Positioning System.

    GR

    See graceful restart.

    GRE

    See Generic Routing Encapsulation.

    GSM

    See Global System for Mobile Communications.

    GTP

  • See GPRS tunneling protocol.

    GTP-C

    GPRS Tunneling Protocol-Control plane

    GTP-U

    GPRS Tunneling Protocol-User plane

    GTS

    See generic traffic shaping.

    GTSM

    Generalized TTL Security Mechanism

    GUI

    graphical user interface

    Generic Framing Procedure (GFP)

    A framing and encapsulation method which can be applied to any data type. It has been standardized by ITU-T SG15.

    Generic Routing Encapsulation (GRE)

    A mechanism for encapsulating any network layer protocol over any other network. GRE is used for encapsulating IP datagrams tunneled through the Internet. GRE serves as a Layer 3 tunneling protocol and provides a tunnel for transparently transmitting data packets.

    Global Positioning System (GPS)

    A global navigation satellite system. It provides reliable positioning, navigation, and timing services to worldwide users.

    Global System for Mobile Communications (GSM)

    The second-generation mobile networking standard defined by European Telecommunications Standards Institute (ETSI). It is aimed at designing a standard for global mobile phone networks. The standard allows a subscriber to use a phone globally. GSM consists of three main parts: mobile switching subsystem (MSS), base station subsystem (BSS), and mobile station (MS).

    gateway GPRS support node (GGSN)

    A functional entity that provides packet data services. It is in charge of the routing and encapsulation of the packet data between the General Packet Radio Service (GPRS) or Universal Mobile Telecommunications System (UMTS) network and the external PDN.

    gateway mobile switching center (GMSC)

    A type of Mobile Switching Center (MSC), which requests the routing information about a called subscriber and performs interconnection and settlement between networks.

    gateway network element (GNE)

    A network element that is used for communication between the NE application layer and the NM application layer.

    general packet radio service (GPRS)

    A packet oriented mobile data service defined by 3rd Generation Partnership Project (3GPP) and employed to connect mobile cellular users to the Public Data Network (PDN). Within the GSM network, it shares the network databases and radio access network and employs functions known as the Packet Control Unit (PCU), Serving GPRS Support Node (SGSN), and Gateway GPRS Support Node (GGSN) to provide packet switching data services across the fixed and radio network.

    generic traffic shaping (GTS)

  • A traffic control measure that proactively adjusts the output speed of the traffic. This is to adapt the traffic to network resources that can be provided by the downstream router to avoid packet discarding and congestion.

    gigabit Ethernet (GE)

    A collection of technologies for transmitting Ethernet frames at a rate of a gigabit per second, as defined by the IEEE 802.3z standard. GE is compatible with 10 Mbit/s and 100 Mbit/s Ethernet. It runs at 1000 Mbit/s. Gigabit Ethernet uses a private medium, and it does not support coaxial cables or other cables. It also supports the channels in the bandwidth mode. If Gigabit Ethernet is, however, deployed to be the private bandwidth system with a bridge (switch) or a router as the center, it gives full play to the performance and the bandwidth. In the network structure, Gigabit Ethernet uses full duplex links that are private, causing the length of the links to be sufficient for backbone applications in a building and campus.

    graceful restart (GR)

    In IETF, protocols related to Internet Protocol/Multiprotocol Label Switching (IP/MPLS) such as Open Shortest Path First (OSPF), Intermediate System-Intermediate System (IS-IS), Border Gateway Protocol (BGP), Label Distribution Protocol (LDP), and Resource Reservation Protocol (RSVP) are extended to ensure that the forwarding is not interrupted when the system is restarted. This reduces the flapping of the protocols at the control plane when the system performs an active/standby switchover. This series of standards is called graceful restart.

    H

    H-VPN

    See hierarchy VPN.

    H.248

    A media gateway control protocol used for communications between the media gateway controller (MGC) and the media gateway (MGW) in the detached gateway architecture so that the MGC can control the MGW. In Universal Mobile Telecommunications System (UMTS) networks, the interface between the MGC and the MGW is the Mc interface and the 3GPP defines specific usage of H.248 over the Mc interface.

    HA

    See high availability.

    HBA

    host bus adapter

    HDB3

    See high density bipolar of order 3 code.

    HDLC

    High-Level Data Link Control

    HDSL

    high-speed digital subscriber line

    HDTV

    See high definition television.

    HFC

    See high-level foundation classes.

    HGMP

    Huawei Group Management Protocol

    HLR

  • See home location register.

    HMAC

    See Hashed message authentication code.

    HQoS

    See hierarchical quality of service.

    HSDPA

    See High Speed Downlink Packet Access.

    HSI

    high-speed Internet

    HSL

    See high-level script language.

    HSM

    hitless switch mode

    HTML

    Hypertext Markup Language

    HTTP

    See Hypertext Transfer Protocol.

    HTTPS

    See Hypertext Transfer Protocol Secure.

    HVPLS

    hierarchical virtual private LAN service

    HWTACACS

    See Huawei Terminal Access Controller Access Control System.

    Hashed message authentication code (HMAC)

    A specific construction for calculating a message authentication code (MAC) involving a cryptographic hash function in combination with a secret key.

    High Speed Downlink Packet Access (HSDPA)

    A modulating-demodulating algorithm put forward in 3GPP R5 to meet the requirement for asymmetric uplink and downlink transmission of data services. It enables the maximum downlink data service rate to reach 14.4 Mbit/s without changing the WCDMA network topology.

    Huawei Terminal Access Controller Access Control System (HWTACACS)

    A security protocol with enhanced functions on the base of TACACS (RFC1492). Similar to the RADIUS protocol, HWTACACS implements multiple subscriber AAA functions through communications with the HWTACACS server in the client/server mode.

    Hypertext Transfer Protocol (HTTP)

    An application-layer protocol used for communications between web servers and browsers or other programs. HTTP adopts the request-response mode. A client sends a request to the server. The request consists of two parts: request header and MIME-like message. The request header contains request method, uniform resource locator (URL), and protocol version. The MIME-like message contains request modifiers, client information, and possible body content. Upon receiving the request, the server responds with a status line. The status line includes the message's protocol version, a success or error code, and a MIME-like message, which contains server information, entity meta-information, and possible entity-body content. For details about HTTP, see RFC2616.

  • Hypertext Transfer Protocol Secure (HTTPS)

    An HTTP protocol that runs on top of transport layer security (TLS) and Secure Sockets Layer (SSL). It is used to establish a reliable channel for encrypted communication and secure identification of a network web server. For details, see RFC2818.

    hierarchical quality of service (HQoS)

    A type of QoS that controls the traffic of users and performs the scheduling according to the priority of user services. HQoS has an advanced traffic statistics function, and the administrator can monitor the usage of bandwidth of each service. Hence, the bandwidth can be allocated reasonably through traffic analysis.

    hierarchy VPN (H-VPN)

    An L3VPN networking type. Using the hierarchy technology, H-VPN distributes PE functions such as user access and router management to multiple PEs to enhance network scalability.

    high availability (HA)

    A scheme in which two modules operate in active/standby mode to achieve high availability. When the active module fails, the standby module automatically takes over the system functions of the active module.

    high definition television (HDTV)

    A type of TV that is capable of displaying at least 720 progressive or 1080 interlaced active scan lines. It must be capable of displaying a 16:9 image using at least 540 progressive or 810 interlaced active scan lines.

    high density bipolar of order 3 code (HDB3)

    A code used for baseband transmissions between telecommunications devices. The HDB3 code has the following feature: high capability of clock extraction, no direct current component, error-checking capability, and a maximum of three consecutive zeros.

    high-level foundation classes (HFC)

    A group of encapsulated function databases provided by the iSStar. You can use the provided functions to accelerate script editing.

    high-level script language (HSL)

    A script language. Based on python, the HSL syntax is simple, clear, and extendable.

    home location register (HLR)

    A function entity shared by the circuit switching (CS) domain and the packet switching (PS) domain. It is responsible for mobile subscriber data management and location information management. HLR, a network entity of the core network (CN) in the Global System for Mobile Communications (GSM), general packet radio service (GPRS), or Enhanced Data rates for GSM Evolution (EDGE) network, is the central database for the entire network.

    I

    I/O

    input/output

    IA

    Intel Architecture

    IAB

    See Internet Architecture Board.

    IANA

    See Internet Assigned Numbers Authority.

    IBGP

  • Internal Border Gateway Protocol

    ICC

    See ITU carrier code.

    ICMP

    See Internet Control Message Protocol.

    ICMPv6

    See Internet Control Message Protocol version 6.

    ICP

    IMA Control Protocol

    ID

    See identity.

    IDL

    interface definition language

    IDN

    See integrated digital network.

    IDU

    See indoor unit.

    IEEE

    See Institute of Electrical and Electronics Engineers.

    IETF

    See Internet Engineering Task Force.

    IF

    See intermediate frequency.

    IGMP

    See Internet Group Management Protocol.

    IGP

    See Interior Gateway Protocol.

    IGRP

    Interior Gateway Routing Protocol

    IIOP

    Internet Inter-ORB Protocol

    IIS

    See Internet Information Services.

    IK

    See integrity key.

    IKE

    See Internet Key Exchange.

    ILM

    incoming label map

    ILS

  • instrument landing system

    IMA

    See inverse multiplexing over ATM.

    IMEI

    See international mobile equipment identity.

    IMS

    information management system

    IMSI

    See international mobile subscriber identity.

    IN

    intelligent network

    IP

    Internet Protocol

    IP Security (IPSec)

    A protocol family defined by the Internet Engineering Task Force (IETF). By authenticating and encrypting each IP packet of a data stream, this protocol family provides high quality, interoperable, and cryptology-based security for IP packets.

    IPA

    See intelligent power adjustment.

    IPM

    IP processing module

    IPSec

    See IP Security.

    IPTV

    See Internet Protocol television.

    IPX

    Internet Packet Exchange

    IPoA

    IP over ATM

    IPoE

    IP Over Ethernet

    IPoEoA

    IP over Ethernet over ATM

    IPv4

    See Internet Protocol version 4.

    IPv6

    See Internet Protocol version 6.

    IS-IS

    See Intermediate System to Intermediate System.

    ISAKMP

  • See Internet Security Association and Key Management Protocol.

    ISDN

    integrated services digital network

    ISDN Q.921-User Adaptation Layer (IUA)

    A layer that provides transport of signaling messages between the signaling gateway (SG) and the media gateway controller (MGC), including transporting Q.921/Q.931 boundary primitives, communication between layer management modules, and management of active associations.

    ISO

    International Organization for Standardization

    ISP

    See Internet service provider.

    ISSU

    See in-service software upgrade.

    IST

    internal spanning tree

    ISU

    integrated system control unit

    ITC

    independent transmit clock

    ITU

    See International Telecommunication Union.

    ITU carrier code (ICC)

    A code assigned to a network operator/service provider, maintained by the ITU-T Telecommunication Standardization Bureau (TSB).

    ITU-T

    See International Telecommunication Union-Telecommunication Standardization Sector.

    IUA

    See ISDN Q.921-User Adaptation Layer.

    InARP

    Inverse Address Resolution Protocol

    Institute of Electrical and Electronics Engineers (IEEE)

    A society of engineering and electronics professionals based in the United States but boasting membership from numerous other countries. The IEEE focuses on electrical, electronics, computer engineering, and science-related matters.

    Integration Script Star (iSStar)

    The enhanced platform of the Huawei M2000, which is developed twice. You can complete specific services through the provided HSL and HFC library program on the platform.

    Interior Gateway Protocol (IGP)

    A routing protocol that is used within an autonomous system. The IGP runs in small-sized and medium-sized networks. The commonly used IGPs are the routing information protocol (RIP), the interior gateway routing protocol (IGRP), the enhanced IGRP (EIGRP), and the open shortest path first (OSPF).

  • Intermediate System to Intermediate System (IS-IS)

    A protocol used by network devices (routers) to determine the best way to forward datagram or packets through a packet-based network.

    International Telecommunication Union (ITU)

    A United Nations agency, one of the most important and influential recommendation bodies, responsible for recommending standards for telecommunication (ITU-T) and radio networks (ITU-R).

    International Telecommunication Union-Telecommunication Standardization Sector (ITU-T)

    An international body that develops worldwide standards for telecommunications technologies. These standards are grouped together in series which are prefixed with a letter indicating the general subject and a number specifying the particular standard. For example, X.25 comes from the "X" series which deals with data networks and open system communications and number "25" deals with packet switched networks.

    Internet Architecture Board (IAB)

    A small group of people who set policies and directions for TCP/IP and the Internet. It is an elected body that listens to formal appeals and writes network architecture documents.

    Internet Assigned Numbers Authority (IANA)

    A department operated by the IAB. IANA delegates authority for IP address-space allocation and domain-name assignment to the NIC and other organizations. IANA also maintains a database of assigned protocol identifiers used in the TCP/IP suite, including autonomous system numbers.

    Internet Control Message Protocol (ICMP)

    A network-layer (ISO/OSI level 3) Internet protocol that provides error correction and other information relevant to IP packet processing. For example, it can let the IP software on one machine inform another machine about an unreachable destination. See also communications protocol, IP, ISO/OSI reference model, packet (definition 1).

    Internet Control Message Protocol version 6 (ICMPv6)

    A basic protocol of IPv6 and generates error messages and informational messages used by IPv6 nodes to report errors and information generated during packet processing.

    Internet Engineering Task Force (IETF)

    A worldwide organization of individuals interested in networking and the Internet. Managed by the Internet Engineering Steering Group (IESG), the IETF is charged with studying technical problems facing the Internet and proposing solutions to the Internet Architecture Board (IAB). The work of the IETF is carried out by various working groups that concentrate on specific topics such as routing and security. The IETF is the publisher of the specifications that led to the TCP/IP protocol standard.

    Internet Group Management Protocol (IGMP)

    One of the TCP/IP protocols for managing the membership of Internet Protocol multicast groups. It is used by IP hosts and adjacent multicast routers to establish and maintain multicast group memberships.

    Internet Information Services (IIS)

    Microsoft's brand of a Web server software, utilizing the Hypertext Transfer Protocol (HTTP) to deliver World Wide Web documents. It incorporates various functions for security, allows for CGI programs, and also provides Gopher and FTP services.

    Internet Key Exchange (IKE)

    A hybrid protocol that implements Oakley key exchange and SKEME key exchange in the ISAKMP frame. Both Oakley and SKEME define a key exchange method, including the structure of the valid payload, valid payload of transmitted information, handling procedure of the key, and method to use the key.

  • Internet Protocol television (IPTV)

    A system in which video is transmitted in IP packets. Also called "TV over IP", IPTV uses streaming video techniques to deliver scheduled TV programs or video-on-demand (VOD). Unlike transmitting over the air or through cable to a TV set, IPTV uses the transport protocol of the Internet for delivery and requires either a computer and software media player or an IPTV set-top box to decode the images in real time.

    Internet Protocol version 4 (IPv4)

    The current version of the Internet Protocol (IP). IPv4 utilizes a 32bit address which is assigned to hosts. An address belongs to one of five classes (A, B, C, D, or E) and is written as 4 octets separated by periods and may range from 0.0.0.0 through to 255.255.255.255. Each IPv4 address consists of a network number, an optional subnetwork number, and a host number. The network and subnetwork numbers together are used for routing, and the host number is used to address an individual host within the network or subnetwork.

    Internet Protocol version 6 (IPv6)

    An update version of IPv4, which is designed by the Internet Engineering Task Force (IETF) and is also called IP Next Generation (IPng). It is a new version of the Internet Protocol. The difference between IPv6 and IPv4 is that an IPv4 address has 32 bits while an IPv6 address has 128 bits.

    Internet Security Association and Key Management Protocol (ISAKMP)

    A protocol that allows the message receiver to obtain a public key and use digital certificates to authenticate the sender's identity.

    Internet service provider (ISP)

    An organization that offers users access to the Internet and re