Sei sulla pagina 1di 97

Glossary for Huawei OSN

Numerics
3DES See Triple Data Encryption Standard. 3G See 3rd Generation. 3GPP 3rd Generation Partnership Project 3R reshaping, retiming, regenerating 3rd Generation (3G) The third generation of digital wireless technology, as defined by the International Telecommunications Union (ITU). Third generation technology is expected to deliver data transmission speeds between 144 kbit/s and 2 Mbit/s, compared to the 9.6 kbit/s to 19.2 kbit/s offered by second generation technology. 802.11n A wireless transmission standard released after 802.11a/b/g by Wi-Fi Alliance. As a new member to the 802.11 protocol family, 802.11n supports the 2.4 GHz and 5 GHz frequency bands and provides a higher bandwidth (300 Mbit/s, much higher than the 54 Mbit/s provided by 802.11a/g) for WLAN access users. In addition, 802.11n supports the MIMO technology, which provides two methods of increasing the communication rate: by increasing the bandwidth and by improving the channel usage. 802.1Q in 802.1Q (QinQ) A VLAN feature that allows the equipment to add a VLAN tag to a tagged frame. The implementation of QinQ is to add a public VLAN tag to a frame with a private VLAN tag to allow the frame with double VLAN tags to be transmitted over the service provider's backbone network based on the public VLAN tag. This provides a layer 2 VPN tunnel for customers and enables transparent transmission of packets over private VLANs. 802.1X An access control and authentication protocol based on the client/server mode. It can prevent unauthorized users/equipment from accessing the LAN/WLAN through an access port. After a client (STA) is associated with an AP, the 802.1X authentication result determines whether the STA can use the wireless services provided by the AP. If the STA passes the authentication, the STA can access the resources in the WLAN. If the STA fails to pass the authentication, the STA cannot access the resources in the WLAN. 802.1ag MAC ping A network administration utility similar to ping. 802.1ag MAC ping works by sending test packets and waiting for a reply to test whether the destination device is reachable. 802.1ag MAC ping is initiated by a MEP and destined for a MEP or MIP at the same maintenance level within any MA. 802.1ag MAC trace A network diagnositic tool similar to traceroute or tracert. 802.1ag MAC trace works by sending test packets and waiting for a reply to test the path between the local device and the destination device and to locate faults. 802.1ag MAC trace is initiated by a MEP and destined for a MEP or MIP at the same maintenance level within any MA.

A/D analog/digit A3 algorithm A3 AAA See Authentication, Authorization and Accounting. AAL See ATM Adaptation Layer. AAL1 See ATM Adaptation Layer Type 1. AAL5 ATM Adaptation Layer Type 5 ABR See area border router. ACAP See adjacent channel alternate polarization. ACB access barred signal ACH associated channel header ACK See acknowledgement. ACL See access control list. ACM adaptive clock method ACR allowed cell rate ADM add/drop multiplexer ADMC automatically detected and manually cleared ADSL asymmetric digital subscriber line ADSL2+ asymmetric digital subscriber line 2 plus AES See Advanced Encryption Standard. AF See assured forwarding.

AFI address family identifier AG See access gateway. AGC automatic gain control AH See Authentication Header. AID access identifier AIS alarm indication signal AKA See Authentication and Key Agreement. ALC See automatic level control. ALG See application level gateway. ALS See automatic laser shutdown. AM See adaptive modulation. AMI See alternate mark inversion. AMR See adaptive multirate. AMT advanced manufacturing technique AN access node ANCP See Access Node Control Protocol. ANI See automatic number identification. ANSI See American National Standards Institute. AOE ATM over Ethernet AP access preamble

APE automatic power equilibrium APN See access point name. APS automatic protection switching ARP See Address Resolution Protocol. ARQ See automatic repeat request. AS See autonomous system. ASBR See autonomous system boundary router. ASCII American Standard Code for Information Interchange ASE amplified spontaneous emission ASIC See application-specific integrated circuit. ASL analog subscriber line ASM See any-source multicast. ASN.1 See Abstract Syntax Notation One. ASP active server page ASPF application specific packet filter ATD attribute discovery ATI See any time interrogation. ATM asynchronous transfer mode ATM Adaptation Layer (AAL) An interface between higher-layer protocols and Asynchronous Transfer Mode (ATM). The AAL provides a conversion function to and from ATM for various types of information, including voice, video, and data.

ATM Adaptation Layer Type 1 (AAL1) A layer defined in the Asynchronous Transfer Mode (ATM) protocol reference model and located between the ATM and user layers. AAL1 is used to segment and encapsulate user data into ATM cells. It can attenuate delay jitters, prevent cell loss, and perform flow control and error control. It is designed for adaptation of ATM to the voice, image, and data services. AAL1 is dedicated to the voice service. ATPC See automatic transmit power control. ATU-R ADSL transceiver unit, remote terminal end AU See administrative unit. AUG See administrative unit group. AUTN authentication token AVP See attribute-value pair. Abstract Syntax Notation One (ASN.1) A syntax notation type employed to specify protocols. Many protocols defined by the ITU-T use this syntax format. Other alternatives are standard text or Augmented Backus-Naur Form (ABNF). Access Node Control Protocol (ANCP) An IP-based protocol that operates between the access node (AN) and the network access server (NAS), over a DSL access and aggregation network. Address Resolution Protocol (ARP) An Internet Protocol used to map IP addresses to MAC addresses. It allows hosts and routers to determine the link layer addresses through ARP requests and ARP responses. Advanced Encryption Standard (AES) An encryption algorithm that is originally used by some U.S. government departments to guarantee the security of some secret but unclassified material. Now, AES has become the most influential encryption standard all around the world. The AES algorithm is used to ensure the system security. American National Standards Institute (ANSI) An organization that defines U.S standards for the information processing industry. ANSI participates in defining network protocol standards. Authentication Header (AH) A protocol that provides connectionless integrity, data origin authentication, and anti-replay protection for IP data. Authentication and Key Agreement (AKA) A user authentication method defined in 3GPP. IMS AKA is used to implement interauthentication between the UE and the IMS to ensure confidentiality and integrity of the IMS. Authentication, Authorization and Accounting (AAA) A mechanism for configuring authentication, authorization, and accounting security services. Authentication refers to the verification of user identities and the related network services;

authorization refers to the granting of network services to users according to authentication results; and accounting refers to the tracking of the consumption of network services by users. access control list (ACL) A list of entities, together with their access rights, which are authorized to have access to a resource. access gateway (AG) A type of gateway that provides a user-network interface (UNI) such as ISDN. An access gateway is located at the edge access layer of the NGN structure, and provides various methods for connecting users to the NGN. access point name (APN) The network identifier defined by the general packet radio system (GPRS)/Universal Mobile Telecommunications System (UMTS). On one hand, an APN helps the GPRS/UMTS identify the gateway GPRS support node (GGSN). On the other hand, an APN identifies the external packet data networks (PDNs) (such as an Internet service provider network and enterprise network) connected through this GGSN or certain associated services (such as Internet access and wireless application protocol services). acknowledgement (ACK) A response sent by a receiver to indicate successful reception of information. Acknowledgements may be implemented at any level including the physical level (using voltage on one or more wires to coordinate transfer), at the link level (to indicate successful transmission across a single hardware link), or at higher levels. adaptive modulation (AM) A technology that is used to automatically adjust the modulation mode according to the channel quality. When the channel quality is favorable, the equipment uses a high-efficiency modulation mode to improve the transmission efficiency and the spectrum utilization of the system. When the channel quality is degraded, the equipment uses the low-efficiency modulation mode to improve the anti-interference capability of the link that carries high-priority services. adaptive multirate (AMR) A type of algorithm that is based on the adaptive rate and adopts Algebraic Code Excitation Linear Prediction (ACELP). Generally, it refers to a codec type. adjacent channel alternate polarization (ACAP) A channel configuration method, which uses two adjacent channels (a horizontal polarization wave and a vertical polarization wave) to transmit two signals. administrative unit (AU) The information structure which provides adaptation between the higher order path layer and the multiplex section layer. It consists of an information payload (the higher order VC) and an AU pointer which indicates the offset of the payload frame start relative to the multiplex section frame start. administrative unit group (AUG) One or more administrative units occupying fixed, defined positions in an STM payload. An AUG consists of AU-4s. agent A process that resides in all managed devices. It receives request packets from the element management system, performs the Read or Write operation on managed variables based on the packet types, generates response packets, and returns the response packets to the element management system. alternate mark inversion (AMI)

A synchronous clock encoding technique which uses bipolar pulses to represent logical 1 values. any time interrogation (ATI) A service control function of querying the current status and location information of a subscriber at any time. any-source multicast (ASM) A multicast service mode. In ASM mode, any sender can become the multicast source to send information to a multicast group address. After joining the multicast group identified by this address, multiple receivers can receive all the information sent to this multicast group. application level gateway (ALG) An ALG consists of a security component that augments a firewall or NAT employed in a computer network. It allows customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application layer "control/data" protocols such as FTP, BitTorrent, SIP, RTSP, file transfer in IM applications etc. In order for these protocols to work through NAT or a firewall, either the application has to know about an address/port number combination that allows incoming packets, or the NAT has to monitor the control traffic and open up port mappings (firewall pinhole) dynamically as required. Legitimate application data can thus be passed through the security checks of the firewall or NAT that would have otherwise restricted the traffic for not meeting its limited filter criteria. application-specific integrated circuit (ASIC) A special type of chip that starts out as a nonspecific collection of logic gates. Late in the manufacturing process, a layer is added to connect the gates for a specific function. By changing the pattern of connections, the manufacturer can make the chip suitable for many needs. area border router (ABR) A router that can belong to more than two areas of which one area must be a backbone area. assured forwarding (AF) One of the four per-hop behaviors (PHB) defined by the Diff-Serv workgroup of IETF. It is suitable for certain key data services that require assured bandwidth and short delay. For traffic within the bandwidth limit, AF assures quality in forwarding. For traffic that exceeds the bandwidth limit, AF degrades the service class and continues to forward the traffic instead of discarding the packets. attribute-value pair (AVP) An information element that includes a header and is used to encapsulate protocol-specific data (for example, routing information) as well as authentication, authorization or accounting information. The Diameter protocol consists of a header followed by one or more AVPs. automatic laser shutdown (ALS) A technique (procedure) to automatically shutdown the output power of laser transmitters and optical amplifiers to avoid exposure to hazardous levels. automatic level control (ALC) A feature that identifies speech signals and adjusts the sound volume to stay within a comfortable range, improving user experience. automatic number identification (ANI) An SS7 feature in which a series of digits, either analog or digital, are included in the call, identifying the telephone number of the calling device. automatic repeat request (ARQ) An error control method for data transmission in which the receiver detects transmission errors in a message and automatically requests a retransmission from the transmitter.

automatic transmit power control (ATPC) A method of adjusting the transmit power based on fading of the transmit signal detected at the receiver autonomous system (AS) A network set that uses the same routing policy and is managed by the same technology administration department. Each AS has a unique identifier that is an integer ranging from 1 to 65535. The identifier is assigned by IANA. An AS can be divided into areas. autonomous system boundary router (ASBR) A router that exchanges routing information with other ASs.

B
B-ISDN See broadband integrated services digital network. B-VLAN backbone virtual local area network BA behavior aggregate BAS See broadband access server. BBE background block error BBS See bulletin board system. BC boundary clock BCCH broadcast control channel BCD binary-coded data BDI See backward defect indication. BE See best effort. BER bit error rate BFD See Bidirectional Forwarding Detection. BG See border gateway. BGP Border Gateway Protocol

BIOS See basic input/output system. BIP See bit interleaved parity. BIP-8 See bit interleaved parity-8. BIP-X bit interleaved parity-X BITS See building integrated timing supply. BMC best master clock BMS business management system BOM broadcast overhead message BPDU See bridge protocol data unit. BPS board protection switching BRA See basic rate access. BRAS See broadband remote access server. BRI basic rate interface BSC See base station controller. BSR See bootstrap router. BSS business support system BTS base transceiver station BTV broadband TV BWS backbone wavelength division multiplexing system Bidirectional Forwarding Detection (BFD)

A fast and independent hello protocol that delivers millisecond-level link failure detection and provides carrier-class availability. After sessions are established between neighboring systems, the systems can periodically send BFD packets to each other. If one system fails to receive a BFD packet within the negotiated period, the system regards that the bidirectional link fails and instructs the upper layer protocol to take actions to recover the faulty link. backward defect indication (BDI) A function that the sink node of a LSP, when detecting a defect, uses to inform the upstream end of the LSP of a downstream defect along the return path. base station controller (BSC) A logical entity that connects the BTS with the MSC in a GSM/CDMA network. It interworks with the BTS through the Abis interface, the MSC through the A interface. It provides the following functions: radio resource management, base station management, power control, handover control, and traffic measurement. One BSC controls and manages one or more BTSs in an actual network. basic input/output system (BIOS) A firmware stored in the computer mainboard. It contains basic input/output control programs, power-on self test (POST) programs, bootstraps, and system setting information. The BIOS provides hardware setting and control functions for the computer. basic rate access (BRA) An ISDN interface typically used by smaller sites and customers. This interface consists of a single 16 kbit/s data (or "D") channel plus two bearer (or "B") channels for voice and/or data. Also known as Basic Rate Access, or BRI. best effort (BE) A traditional IP packet transport service. In this service, the diagrams are forwarded following the sequence of the time they reach. All diagrams share the bandwidth of the network and routers. The amount of resource that a diagram can use depends of the time it reaches. BE service does not ensure any improvement in delay time, jitter, packet loss ratio, and high reliability. bit interleaved parity (BIP) A method of error monitoring. With even parity an X-bit code is generated by equipment at the transmit end over a specified portion of the signal in such a manner that the first bit of the code provides even parity over the first bit of all X-bit sequences in the covered portion of the signal, the second bit provides even parity over the second bit of all X-bit sequences within the specified portion, and so on. Even parity is generated by setting the BIP-X bits so that there is an even number of 1s in each monitored partition of the signal. A monitored partition comprises all bits which are in the same bit position within the X-bit sequences in the covered portion of the signal. The covered portion includes the BIP-X. bit interleaved parity-8 (BIP-8) Consists of a parity byte calculated bit-wise across a large number of bytes in a transmission transport frame. Divide a frame is into several blocks with 8 bits (one byte) in a parity unit and then arrange the blocks in matrix. Compute the number of "1" or "0" over each column. Then fill a 1 in the corresponding bit for the result if the number is odd, otherwise fill a 0. bit/s See bits per second. bits per second (bit/s) A rate at which the individual bits are transmitted through a communication link or circuit. Its unit can be bit/s, kbit/s, and Mbit/s. bootstrap router (BSR) The management core of the PIM-SM network. The BSR collects the C-RP information into an RP-set, encapsulates the RP-set into a Bootstrap message, and advertises the Bootstrap

message to each PIM-SM router in the entire network. The PIM-SM router then calculates the RP corresponding to the specified multicast group according to the RP-set. border gateway (BG) A gateway that terminates the Gp interface to a PLMN. This function is typically an edge router supporting the Border Gateway Protocol (BGP) and security protocols such as IP Security (IPSec). bridge protocol data unit (BPDU) The data messages that are exchanged across the switches within an extended LAN that uses a spanning tree protocol (STP) topology. BPDU packets contain information on ports, addresses, priorities and costs and ensure that the data ends up where it was intended to go. BPDU messages are exchanged across bridges to detect loops in a network topology. The loops are then removed by shutting down selected bridges interfaces and placing redundant switch ports in a backup, or blocked, state. broadband access server (BAS) A server providing features such as user access, connection management, address allocation and authentication, authorization and accounting. It also works as a router featuring effective route management, high forwarding performance and abundant services. broadband integrated services digital network (B-ISDN) A standard defined by the ITU-T to handle high-bandwidth applications, such as voice. It currently uses the ATM technology to transmit data over SONNET-based circuits at 155 to 622 Mbit/s or higher speed. broadband remote access server (BRAS) A new type of access gateway for broadband networks. As a bridge between backbone networks and broadband access networks, BRAS provides methods for fundamental access and manages the broadband access network. It is deployed at the edge of network to provide broadband access services, convergence, and forwarding of multiple services, meeting the demands for transmission capacity and bandwidth utilization of different users. BRAS is a core device for the broadband users' access to a broadband network. building integrated timing supply (BITS) In the situation of multiple synchronous nodes or communication devices, one can use a device to set up a clock system on the hinge of telecom network to connect the synchronous network as a whole, and provide satisfactory synchronous base signals to the building integrated device. This device is called BITS. bulletin board system (BBS) A computer system equipped with one or more modems or other means of network access that serves as an information and message-passing center for remote users.

C
CA Certificate Authority CAC See connection admission control. CAR committed access rate CAS See channel associated signaling. CATV

cable TV CAU See client automatic upgrade. CBC cipher block chaining CBQoS class based quality of service CBR See constant bit rate. CBS See committed burst size. CC See continuity check. CCC circuit cross connect CCCH See common control channel. CCDP See co-channel dual polarization. CCITT Consultative Committee of International Telegraph and Telephone CCM central control module CCS See Call Center Server. CDE common desktop environment CDMA See Code Division Multiple Access. CDMA2000 A 3G technology developed by Qualcomm of the US. Technology competitive with WCDMA, upgraded from CDMA1, and developed by the GSM community as a worldwide standard for 3G mobile. CDR See call detail record. CDT call detail trace CDVT cell delay variation tolerance CE

See customer edge. CE1 channelized E1 CEAS See Customer Equipment Archive System. CES See circuit emulation service. CFM connectivity fault management CG center gap CGI See cell global identification. CHAP See Challenge Handshake Authentication Protocol. CID call instance data CIR committed information rate CIST See Common and Internal Spanning Tree. CLC cluster line-card chassis CLI command-line interface CLK clock card CLNP connectionless network protocol CLP See cell loss priority. CMI coded mark inversion CN core network CN-CS core network-circuit switched domain CN-PS core network-packet switched domain CO

central office COBOL Common Business-Oriented Language COPS Common Open Policy Service CORBA See Common Object Request Broker Architecture. COS chip operating system CPCS common part convergence sublayer CPE See customer premises equipment. CPLD complex programmable logical device CPU See central processing unit. CR connection request CR-LSP constraint-based routed label switched path CRC See cyclic redundancy check. CRF connection related function CRL See certificate revocation list. CRPC case-shape Raman pump amplifier unit for C-band CSES consecutive severely errored second CSF Client Signal Fail CSG closed subscriber group CSMA/CD See carrier sense multiple access with collision detection. CSNP See complete sequence numbers protocol data unit. CSPF

constraint shortest path first CST See common spanning tree. CSV comma-separated values CT class type CT1 channelized T1 CTC common transmit clock CTD cell transfer delay CTP connection termination point CV connectivity verification CVC code verification certificate CW control word CWDM See coarse wavelength division multiplexing. Call Center Server (CCS) The core component of the call center platform, managing calls independent of media types. Challenge Handshake Authentication Protocol (CHAP) A method to periodically verify the identity of the peer using a 3-way handshake. During the establishment of a link, the authenticator sends a "challenge" message to the peer. The peer responds with a value calculated using a "one-way hash" function. The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authentication is acknowledged. CHAP provides protection against playback attack. Code Division Multiple Access (CDMA) A communication scheme that forms different code sequences by using the frequency expansion technology. Subscribers with different addresses can use different code sequences for multi-address connection. Common Object Request Broker Architecture (CORBA) A specification developed by the Object Management Group in 1992 in which pieces of programs (objects) communicate with other objects in other programs, even if the two programs are written in different programming languages and are running on different platforms. A program makes its request for objects through an object request broker, or ORB, and thus does not need to know the structure of the program from which the object comes. CORBA is designed to work in object-oriented environments. See also IIOP, object (definition 2), Object Management Group, object-oriented. Common and Internal Spanning Tree (CIST)

The single spanning tree jointly calculated by STP and RSTP, the logical connectivity using MST bridges and regions, and MSTP. The CIST ensures that all LANs in the bridged local area network are simply and fully connected. Coordinated Universal Time (UTC) The world-wide scientific standard of timekeeping. It is based upon carefully maintained atomic clocks and is kept accurate to within microseconds worldwide. Customer Equipment Archive System (CEAS) A system recording the information about all the HUAWEI devices on the network. It records the information about shelves and boards, all engineering information (including cooperation payment), and all maintenance and warranty information. The CEAS consists of the offline tool and the online system. call detail record (CDR) A database record unit used to create billing records. A CDR contains details such as the called and calling parties, originating switch, terminating switch, call length, and time of day. carrier sense multiple access with collision detection (CSMA/CD) Carrier sense multiple access with collision detection (CSMA/CD) is a computer networking access method in which: A carrier sensing scheme is used. A transmitting data station that detects another signal while transmitting a frame, stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to send that frame again.

cell global identification (CGI) A number that uniquely identifies a GSM cell worldwide. A CGI is the concatenation of a Location Area Identification (LAI) and a Cell Identity (CI). The number format is LAI + CI. CI is a 2-byte BCD, which can be customized by carriers. cell loss priority (CLP) A field in the ATM cell header that determines the probability of a cell being dropped if the network becomes congested. Cells with CLP = 0 are insured traffic, which is unlikely to be dropped. Cells with CLP = 1 are best-effort traffic, which might be dropped. central processing unit (CPU) The computational and control unit of a computer. The CPU is the device that interprets and executes instructions. The CPU has the ability to fetch, decode, and execute instructions and to transfer information to and from other resources over the computer's main data-transfer path, the bus. certificate revocation list (CRL) A list of all canceled certificates. A time-stamped list of certificates that have been revoked by the Certification Authority (CA). The CRL is signed by the issuing CA and is made available to entities that need to reply on a certificate for authentication. channel associated signaling (CAS) A signaling system in which signaling information is transmitted within a dedicated voice channel. China Signaling System No. 1 is a type of CAS signaling. circuit emulation service (CES) A function with which the E1/T1 data can be transmitted through ATM networks. At the transmission end, the interface module packs timeslot data into ATM cells. These ATM cells are sent to the reception end through the ATM network. At the reception end, the interface module re-assigns the data in these ATM cells to E1/T1 timeslots. The CES technology guarantees that the data in E1/T1 timeslots can be recovered to the original sequence at the reception end.

client automatic upgrade (CAU) A function that enables a user to automatically detect the update of the client version and upgrade the client. This keeps the version of the client is the same as that of the server. co-channel dual polarization (CCDP) A channel configuration method, which uses a horizontal polarization wave and a vertical polarization wave to transmit two signals. The Co-Channel Dual Polarization has twice the transmission capacity of the single polarization. coarse wavelength division multiplexing (CWDM) A signal transmission technology that multiplexes widely-spaced optical channels into the same fiber. CWDM widely spaces wavelengths at a spacing of several nm. CWDM does not support optical amplifiers and is applied in short-distance chain networking. committed burst size (CBS) A parameter used to define the capacity of token bucket C, that is, the maximum burst IP packet size when the information is transferred at the committed information rate. This parameter must be larger than 0. It is recommended that this parameter should be not less than the maximum length of the IP packet that might be forwarded. common control channel (CCCH) A point-to-multipoint bidirectional control channel. A CCCH is primarily intended to carry signaling information necessary for access management functions. common spanning tree (CST) A single spanning tree that connects all the MST regions in a network. Every MST region is considered as a switch; therefore, the CST can be considered as their spanning tree generated with STP/RSTP. complete sequence numbers protocol data unit (CSNP) A unit that contains brief information about the local LSDB and is used to synchronize the LSDBs of neighbors. CSNPs are sent and resolved at different levels. connection admission control (CAC) A control process in which the network takes actions in the call set-up phase (or call renegotiation phase) to determine which connection request is admitted. constant bit rate (CBR) A kind of service categories defined by the ATM forum. CBR transfers cells based on the constant bandwidth. It is applicable to service connections that depend on precise clocking to ensure undistorted transmission. continuity check (CC) Ethernet CFM can detect the connectivity between MEPs. The detection is achieved after MEPs transmit Continuity Check Messages (CCMs) periodically. cross polarization interference cancellation (XPIC) A technology used in the case of the Co-Channel Dual Polarization (CCDP) to eliminate the cross-connect interference between two polarization waves in the CCDP. customer edge (CE) A part of BGP/MPLS IP VPN model. It provides interfaces for direct connection to the Service Provider (SP) network. A CE can be a router, switch, or host. customer premises equipment (CPE) The equipment located at an end-user's premises. Most CPEs are telephones or other service equipment. A CPE can be a Mobile Station (MS) or a Subscriber Station (SS). An MS is mobile equipment, and an SS is fixed equipment. cyclic redundancy check (CRC)

A procedure used in checking for errors in data transmission. CRC error checking uses a complex calculation to generate a number based on the data transmitted. The sending device performs the calculation before transmission and includes it in the packet that it sends to the receiving device. The receiving device repeats the same calculation after transmission. If both devices obtain the same result, it is assumed that the transmission was error free. The procedure is known as a redundancy check because each transmission includes not only data but extra (redundant) error-checking values.

D
DAPI destination access point identifier DAS See Data Access Service. DB database DBA dynamic bandwidth allocation DBPS distributed board protect system DC direct current DCC See data communications channel. DCCH dedicated control channel DCE data connection equipment DCM See dispersion compensation module. DCN See data communication network. DD database description DDF digital distribution frame DDI See direct dialing in. DDN See digital data network. DEI device emulation interrupt DES

See Data Encryption Standard. DF delivery function DGE dynamic gain equalizer DH See Diffie-Hellman. DHCP See Dynamic Host Configuration Protocol. DIMM See dual in-line memory module. DLAG See distributed link aggregation group. DM See delay measurement. DMM distributed message manager DMS Datacom Integrated Network Management System DMT See discrete multi-tone. DMTI See desired Min Tx interval. DMZ See demilitarized zone. DNI dual node interconnection DNS See domain name server. DNS server A device that can provide domain name resolution for the client on the network DOD dial-on-demand DPD dead peer detection DPI deep packet inspection DR See designated router. DRAM

dynamic random access memory DRL device run log DS data service DS-TE See DiffServ-aware Traffic Engineering. DSB See Data Service Bus. DSCP See differentiated services code point. DSE dispersion slope equalizer DSL See digital subscriber line. DSLAM See digital subscriber line access multiplexer. DSP See digital signal processor. DSR data set ready DST daylight saving time DT decay time DTE See data terminal equipment. DTM digital trunk module DTMF See dual tone multiple frequency. DU downstream unsolicited DVB digital video broadcasting DVB-ASI digital video broadcast-asynchronous serial interface DVMRP See Distance Vector Multicast Routing Protocol. DWDM

See dense wavelength division multiplexing. Data Access Service (DAS) A component of the Business Management Point (BMP), for realizing the transparent access of applications to the database. The DAS shields the types, formats, and locations of data storage. Data Encryption Standard (DES) A specification for encryption of computer data developed by IBM and adopted by the U.S. government as a standard in 1976. DES uses a 56-bit key. Data Service Bus (DSB) A component of the Business Management Point (BMP). The DSB can convert, disassemble, and assemble data, process complex data logics, subscribe to and deliver data, and route data. DiffServ See Differentiated Services. DiffServ-aware Traffic Engineering (DS-TE) A technology used to optimize and subdivide network transmission resources, classify traffic, and specify the proportion of each flow to the link bandwidth. Differentiated Services (DiffServ) An IETF standard that defines a mechanism for controlling and forwarding traffic in a differentiated manner based on CoS settings to handle network congestion. Diffie-Hellman (DH) A public algorithm of key. Two communication parties can obtain the keys by exchanging some data instead of transmitting the key across the link. Distance Vector Multicast Routing Protocol (DVMRP) An Internet gateway protocol mainly based on the RIP. The protocol implements a typical dense mode IP multicast solution. The DVMRP protocol uses IGMP to exchange routing datagrams with its neighbors. DoD downstream on demand DoS denial of service Dynamic Host Configuration Protocol (DHCP) A client-server networking protocol. A DHCP server provides configuration parameters specific to the DHCP client host requesting, generally, information required by the host to participate on the Internet network. DHCP also provides a mechanism for allocation of IP addresses to hosts. data communication network (DCN) A communication network used in a TMN or between TMNs to support the data communication function. data communications channel (DCC) The data channel that uses the D1D12 bytes in the overhead of an STM-N signal to transmit information about operation, management, maintenance and provision (OAM&P) between NEs. The DCC channels that are composed of bytes D1D3 are referred to as the 192 kbit/s DCC-R channel. The other DCC channels that are composed of bytes D4 D12 are referred to as the 576 kbit/s DCC-M channel. data terminal equipment (DTE)

A user device composing the UNI. The DTE accesses the data network through the DCE equipment (for example, a modem) and usually uses the clock signals produced by DCE. delay measurement (DM) The time elapsed since the start of transmission of the first bit of the frame by a source node until the reception of the last bit of the loopbacked frame by the same source node, when the loopback is performed at the frame's destination node. demilitarized zone (DMZ) A buffer area between an insecure system and the secure system and is used to solve the problem that the external network equipped with a firewall cannot access the internal network server. The DMZ is located between the internal network and the external network. In the DMZ, some public server facilities, such as the enterprise Web server and FTP server, can be located. The DMZ effectively protects the internal network. dense wavelength division multiplexing (DWDM) The technology that utilizes the characteristics of broad bandwidth and low attenuation of single mode optical fiber, employs multiple wavelengths with specific frequency spacing as carriers, and allows multiple channels to transmit simultaneously in the same fiber. designated router (DR) A functional entity in the TCP/IP network. A DR is selected by the OSPF Hello protocol to prevent repeated link status exchanges between routers in an Open Shortest Path First (OSPF) area. All routers in an OSPF area are connected to a DR. When routing data updates in routers, a message about link status is sent to the DR, and the DR sends the message to routers. Therefore, bandwidth resources can be saved. desired Min Tx interval (DMTI) The minimum interval that the local system would like to use when transmitting BFD control packets. differentiated services code point (DSCP) According to the QoS classification standard of the Differentiated Service (Diff-Serv), the type of services (ToS) field in the IP header consists of six most significant bits and two currently unused bits, which are used to form codes for priority marking. Differentiated services code point (DSCP) is the six most important bits in the ToS. It is the combination of IP precedence and types of service. The DSCP value is used to ensure that routers supporting only IP precedence can be used because the DSCP value is compatible with IP precedence. Each DSCP maps a per-hop behavior (PHB). Therefore, terminal devices can identify traffic using the DSCP value. digital data network (DDN) A high-quality data transport tunnel that combines the digital channel (such as fiber channel, digital microwave channel, or satellite channel) and the cross multiplex technology. digital signal processor (DSP) A microprocessor designed specifically for digital signal processing, generally in real time. digital subscriber line (DSL) A technology for providing digital connections over the copper wire or the local telephone network. DSL performs data communication over the POTS lines without affecting the POTS service. digital subscriber line access multiplexer (DSLAM) A network device, usually situated in the main office of a telephone company that receives signals from multiple customer Digital Subscriber Line (DSL) connections and puts the signals on a high-speed backbone line using multiplexing techniques. direct dialing in (DDI)

A service that allows an intra-office user to be connected through the PSTN long number of this user. The call does not need to be transferred to this user through the automatic switchboard. discrete multi-tone (DMT) A modulation mode of the asymmetric digital subscriber line (ADSL), which uses the frequency division multiplex technology to divide the frequency band in use into multiple subchannels to carry data independently. ITU-T defines the maximum number of bits that each subchannel can carry. In each subchannel, data can be modulated and transmitted independently and the ADSL based on the DMT technology has a strong anti-noise capability. The transmission capability of the ADSL based on the DMT technology is related to the following factors: frequency response (line attenuation), line noise, noise margin, transmit power, preset maximum number of bits that each subfrequency band can carry. dispersion compensation module (DCM) A module, which contains dispersion compensation fibers to compensate for the dispersion of transmitting fiber. distributed link aggregation group (DLAG) A board-level port protection technology used to detect unidirectional fiber cuts and to negotiate with the opposite end. Once a link down failure occurs on a port or a hardware failure occurs on a board, the services can automatically be switched to the slave board, achieving 1+1 protection for the inter-board ports. domain name server (DNS) A functional entity in the TCP/IP network. With deployment of the DNS, subscribers can access related servers using corresponding domain names. In the TCP/IP network, a domain name maps an IP address. Domain names are easier to remember but serves in the network communicate with each other using IP addresses. Therefore the DNS is used to convert domain names to corresponding IP addresses. dual in-line memory module (DIMM) A circuit board on which RAM memory chips are mounted. A DIMM is a small circuit board that can hold a group of memory chips. A DIMM is capable of transferring 64 bits instead of 32 bits that each SIMM can transfer. Pentium processors require a 64-bit path to memory so SIMMs must be installed two at a time as opposed to one DIMM at a time. dual tone multiple frequency (DTMF) In telephone systems, multifrequency signaling in which standard set combinations of two specific voice band frequencies, one from a group of four low frequencies and the other from a group of four higher frequencies, are used.

E
E-Aggr See Ethernet aggregation. E-LAN See Ethernet local area network. E-Line See Ethernet line. E-Tree See Ethernet-tree. E-UTRAN See evolved universal terrestrial radio access network. E1

An European standard for high-speed data transmission at 2.048 Mbit/s. It provides thirty-two 64 kbit/s channels. A time division multiplexing frame is divided in to 32 timeslots numbered from 0 to 31. Timeslot 0 is reserved for frame synchronization, and timeslot 16 is reserved for signaling transmission. The rest 30 timeslots are use as speech channels. Each timeslot sends or receives an 8-bit data per second. Each frame sends or receives 256-bit data per second. 8000 frames will be sent or received per second. Therefore the line data rate is 2.048 Mbit/s. EAPE enhanced automatic power pre-equilibrium EAPoL Extensible Authentication Protocol over LAN EBGP External Border Gateway Protocol EBS See excess burst size. EC See error correction. ECC See embedded control channel. ECM entitlement control message EDFA See erbium-doped fiber amplifier. EEPROM See electrically erasable programable read-only memory. EF See expedited forwarding. EFI See external functionality interface. EFM Ethernet in the First Mile EFM OAM Ethernet in the first mile OAM EFT electrical fast transient EGP See Exterior Gateway Protocol. EIA See Electronic Industries Alliance. EIGRP Enhanced Interior Gateway Routing Protocol EIR

See equipment identity register. ELAN emulated local area network EM element management EMC See electromagnetic compatibility. EMI See electromagnetic interference. EMS element management system EMU See environment monitoring unit. EN end node EOC embedded operations channel EOS enterprise operation system EP elementary procedure EPL See Ethernet private line. EPLAN See Ethernet private LAN service. EPLD See erasable programmable logical device. EPON See Ethernet passive optical network. ERPS Ethernet ring protection switching ES edge server ESC See electric supervisory channel. ESCON See enterprise system connection. ESN See equipment serial number. ESP

See Encapsulating Security Payload. ESS See extended service set. ETSI See European Telecommunications Standards Institute. EUI extended user interface server EVC Ethernet virtual connection EVOA electrical variable optical attenuator EVPL See Ethernet virtual private line. EVPLAN See Ethernet virtual private LAN service. EXP See experimental bits. Electronic Industries Alliance (EIA) An association based in Washington, D.C., with members from various electronics manufacturers. It sets standards for electronic components. RS-232-C, for example, is the EIA standard for connecting serial components. Encapsulating Security Payload (ESP) A key protocol in the IP Security (IPsec) architecture. ESP adopts encryption and authentication mechanisms. It is used in transport mode or tunnel mode to authenticate the source of IP packets, and ensure data integrity, anti-replay, and confidentiality. ESP provides data confidentiality and integrity by encrypting the data to be protected and placing the encrypted data in the data part of the IP ESP. Based on security requirements of subscribers, this mechanism can be used to encrypt either a transport-layer segment or an IP data packet. A transport-layer segment includes Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP), and Internet Group Management Protocol (IGMP). Ethernet aggregation (E-Aggr) A type of Ethernet service that is based on a multipoint-to-point EVC (Ethernet virtual connection). Ethernet line (E-Line) A type of Ethernet service that is based on a point-to-point EVC (Ethernet virtual connection). Ethernet local area network (E-LAN) A type of Ethernet service that is based on a multipoint-to-multipoint EVC (Ethernet virtual connection). Ethernet passive optical network (EPON) A passive optical network based on Ethernet. It is a new generation broadband access technology that uses a point-to-multipoint structure and passive fiber transmission. It supports upstream/downstream symmetrical rates of 1.25 Gbit/s and a reach distance of up to 20 km. In the downstream direction, the bandwidth is shared based on encrypted broadcast transmission for different users. In the upstream direction, the bandwidth is shared based on TDM. EPON meets the requirements for high bandwidth.

Ethernet private LAN service (EPLAN) A type of Ethernet service provided by SDH, PDH, ATM, or MPLS networks. This service is carried over a dedicated bridge and point-to-multipoint connections. Ethernet private line (EPL) A type of Ethernet service that is provided with dedicated bandwidth and point-to-point connections on an SDH, PDH, ATM, or MPLS server layer network. Ethernet virtual private LAN service (EVPLAN) A type of Ethernet service provided by SDH, PDH, ATM, or MPLS networks. This service is carried over a shared bridge and point-to-multipoint connections. Ethernet virtual private line (EVPL) A type of Ethernet service provided by SDH, PDH, ATM, or MPLS networks. This service is carried over a shared bridge and point-to-point connections. Ethernet-tree (E-Tree) An Ethernet service type that is based on a Point-to-multipoint Ethernet virtual connection. European Telecommunications Standards Institute (ETSI) A standards-setting body in Europe. Also the standards body responsible for GSM. Extensible Markup Language (XML) A specification developed by the W3C. XML is a pared-down version of SGML, designed especially for Web documents. It allows designers to create their own customized tags, enabling the definition, transmission, validation, and interpretation of data between applications and between organizations. Exterior Gateway Protocol (EGP) A protocol for exchanging routing information between two neighboring gateway hosts (each with its own router) in a network of autonomous systems. eTOM enhanced Telecom Operations Map electric supervisory channel (ESC) A technology that implements communication among all the nodes and transmission of monitoring data in an optical transmission network. The monitoring data of ESC is introduced into DCC service overhead and is transmitted with service signals. electrically erasable programable read-only memory (EEPROM) A type of EPROM that can be erased with an electrical signal. It is useful for stable storage for long periods without electricity while still allowing reprograming. EEPROMs contain less memory than RAM, take longer to reprogram, and can be reprogramed only a limited number of times before wearing out. electromagnetic compatibility (EMC) A condition which prevails when telecommunications equipment is performing its individually designed function in a common electromagnetic environment without causing or suffering unacceptable degradation due to unintentional electromagnetic interference to or from other equipment in the same environment. electromagnetic interference (EMI) Any electromagnetic disturbance that interrupts, obstructs, or otherwise degrades or limits the effective performance of electronics/electrical equipment. embedded control channel (ECC)

A logical channel that uses a data communications channel (DCC) as its physical layer, to enable transmission of operation, administration, and maintenance (OAM) information between NEs. enterprise system connection (ESCON) A path protocol which connects the host with various control units in a storage system. It is a serial bit stream transmission protocol. The transmission rate is 200 Mbit/s. environment monitoring unit (EMU) A type of power and environment monitoring unit. EMU is used to monitor the environment variables, such as the power supply and temperature. With external signal input through the relay, fire alarm, smoke alarm, burglary alarm, and others can be monitored as well. With the display on NMS system, the change of environment can be monitored timely and accurately. equipment identity register (EIR) A logical entity responsible for storing in the network the International Mobile Equipment Identities (IMEIs), used in the GSM system. equipment serial number (ESN) A string of characters that identify a piece of equipment and ensures correct allocation of a license file to the specified equipment. It is also called "equipment fingerprint". erasable programmable logical device (EPLD) A logical array device which can be used to implement the required functions by programming the array. In addition, a user can modify and program the array repeatedly until the program meets the requirement. erbium-doped fiber amplifier (EDFA) An optical device that amplifies the optical signals. The device uses a short length of optical fiber doped with the rare-earth element Erbium and the energy level jump of Erbium ions activated by pump sources. When the amplifier passes the external light source pump, it amplifies the optical signals in a specific wavelength range. error correction (EC) Technique for restoring integrity in data that is corrupted during transmission. It requires additional information to be sent with the original data and allows the data to be reconstructed from this information if the original data is corrupted. evolved universal terrestrial radio access network (E-UTRAN) A new radio access architecture defined in 3GPP R8. It features high transmission rate, low latency, and optimized data packets. In the E-UTRAN network, multiple eNodeBs are deployed. Two layered protocol stacks are used in the E-UTRAN network to transmit data to the user equipment (UE), including the user-plane protocol stack and the control-plane protocol stack. The user-plane protocol stack consists of Packet Data Convergence Protocol (PDCP), Radio Link Control (RLC), Medium Access Control (MAC), and physical sub-layers. For details about E-UTRAN, see 3GPP TS 36.101. excess burst size (EBS) A parameter related to traffic. In the single rate three color marker (srTCM) mode, the traffic control is achieved by the token buckets C and E. Excess burst size is a parameter used to define the capacity of token bucket E, that is, the maximum burst IP packet size when the information is transferred at the committed information rate. This parameter must be larger than 0. It is recommended that this parameter should be not less than the maximum length of the IP packet that might be forwarded. expected response (XRES) In the UMTS authentication process the network sends RAND (Random Number) to the UMTS Subscriber, XRES is the value that the network is looking for to indicate a positive response.

expedited forwarding (EF) The highest order QoS in the Diff-Serv network. EF PHB is suitable for services that demand low packet loss ratio, short delay, and broad bandwidth. In all the cases, EF traffic can guarantee a transmission rate equal to or faster than the set rate. The DSCP value of EF PHB is "101110". experimental bits (EXP) A field in the MPLS packet header, three bits long. This field is always used to identify the CoS of the MPLS packet. extended service set (ESS) A set of one or more interconnected basic service sets (BSSs) that appears as a single BSS to the logical link control (LLC) layer at any station (STA) associated with one of those BSSs. external functionality interface (EFI) The EFI service specifies the interface between WAE and components or entities with embedded applications that execute outside of the defined WAE capabilities. This is analogous to providing a plug-in module, which extends or enhances the capabilities of browsers or other applications.

F
FAD fabric adapter FC See fiber channel. FCB fan control board FD See frequency diversity. FDD See frequency division duplex. FDDI See fiber distributed data interface. FDI See forward defect indication. FDN See full distinguished name. FE See fast Ethernet. FEC See forwarding equivalence class. FF fixed filter FFD fast failure detection FIB

See forward information base. FICON See Fiber Connect. FIFO See first in first out. FMC fixed-mobile convergence FOADM fixed optical add/drop multiplexer FPGA See field programmable gate array. FQ See fair queuing. FR See frame relay. FRR See fast reroute. FS frequency slot FSM finite state machine FT fault tolerance FTP File Transfer Protocol FTTB See fiber to the building. FTTC See fiber to the curb. FTTH See fiber to the home. FWA See fixed wireless access. FXO foreign exchange office Fax over IP (FoIP) A technique for facsimile (fax) transmission over the Internet or other IP-based packet network, rather than over the traditional public switched telephone network (PSTN). FoIP typically involves a fax gateway, which not only serves as a physical gate bet Fiber Connect (FICON)

A new generation connection protocol which connects the host to various control units. It carries single byte command protocol through the physical path of fiber channel, and provides higher rate and better performance than ESCON. FoIP See Fax over IP. fair queuing (FQ) A mechanism for queue scheduling in which network resource is allocated equally so that delay and jitter time for all traffic are optimal. fast Ethernet (FE) Any network that supports transmission rate of 100 Mbit/s. The Fast Ethernet is 10 times faster than 10BaseT, and inherits frame format, MAC addressing scheme, MTU, and so on. Fast Ethernet is extended based on the IEEE802.3 standard, and it uses the following three types of transmission media: 100BASE-T4 (4 pairs of phone twisted-pair cables), 100BASETX (2 pairs of data twisted-pair cables), and 100BASE-FX (2-core optical fibers). fast reroute (FRR) A technology which provides a temporary protection of link availability when part of a network fails. The protocol enables the creation of a standby route or path for an active route or path. When the active route is unavailable, the traffic on the active route can be switched to the standby route. When the active route is recovered, the traffic can be switched back to the active route. FRR is categorized into IP FRR, VPN FRR, and TE FRR. fiber channel (FC) A high-speed transport technology used to build storage area networks (SANs). Fiber channel can be on the networks carrying ATM and IP traffic. It is primarily used for transporting SCSI traffic from servers to disk arrays. Fiber channel supports single-mode and multi-mode fiber connections. Fiber channel signaling can run on both twisted pair copper wires and coaxial cables. Fiber channel provides both connection-oriented and connectionless services. fiber distributed data interface (FDDI) A standard developed by the American National Standards Institute (ANSI) for high-speed fiber-optic local area networks (LANs). FDDI provides specifications for transmission rates of 100 megabits (100 million bits) per second on networks based on the token ring network. fiber to the building (FTTB) A fiber-based networking scenario. There are two types of FTTB scenarios: multi-dwelling unit (MDU) and business buildings. Each scenario includes the following service types: FTTB to the MDU and FTTB to the business buildings. fiber to the curb (FTTC) A fiber-based networking scenario. The FTTC scenario provides the following services: asymmetric broadband services (such as digital broadcast service, VOD, file download, and online gaming), symmetric broadband services (such as content broadcast, email, file exchange, distance education, and distance medical care), POTS, ISDN, and xDSL backhaul services. fiber to the home (FTTH) A fiber-based networking scenario. The FTTH scenario provides the following services: asymmetric broadband services (digital broadcast service, VoD, file download, and online gaming), symmetric broadband services (content broadcast, email, file exchange, distance education, and distance medical care), POTS, and ISDN services. field programmable gate array (FPGA) A type of semi-customized circuit used in the application specific integrated circuit (ASIC) field. It is developed on the basis of the programmable components, such as the PAL, GAL, and EPLD. It not only remedies the defects of customized circuits but also overcomes the

disadvantage of the original programmable components in terms of the limited number of gate arrays. first in first out (FIFO) A stack management mechanism. The first saved data is first read and invoked. fixed wireless access (FWA) A wireless access application in which the location of the end-user termination and the network access point to be connected to the end-user are fixed. forward defect indication (FDI) A packet generated and traced forward to the sink node of the LSP by the node that first detects defects. It includes fields to indicate the nature of the defect and its location. Its primary purpose is to suppress alarms being raised at affected higher level client LSPs and (in turn) their client layers. forward information base (FIB) A table that provides information for network hardware (bridges and routers) for them to forward data packets to other networks. The information contained in a routing table differs according to whether it is used by a bridge or a router. A bridge relies on both the source (originating) and destination addresses to determine where and how to forward a packet. forwarding equivalence class (FEC) A class-based forwarding technology that classifies the packets with the same forwarding mode. Packets with the same FEC are processed similarly on an MPLS network. The division of FECs is flexible, and can be a combination of the source address, destination address, source port, destination port, protocol type, and VPN. frame relay (FR) A packet-switching protocol used for WANs. Frame relay transmits variable-length packets at up to 2 Mbit/s over predetermined, set paths known as PVCs (permanent virtual circuits). It is a variant of X.25 but sacrifices X.25's error detection for the sake of speed. frequency diversity (FD) A diversity scheme in which two or more microwave frequencies with a certain frequency interval are used to transmit/receive the same signal and selection is then performed between the two signals to ease the impact of fading. frequency division duplex (FDD) An application in which channels are divided by frequency. In an FDD system, the uplink and downlink use different frequencies. Downlink data is sent through bursts. Both uplink and downlink transmission use frames with fixed time length. full distinguished name (FDN) Each record in the configuration data table has an FDN field. The FDN field is used to uniquely identify an MO. The FDN field is generated automatically when the system records the NE configuration data. The FDN value identifies the hierarchy of each MO in the configuration model.

G
G.711 Audio codec standard (A-law or U-law) that uses pulse code modulation (PCM). Its data rate is 64 kbit/s. GAL generic associated channel header label GE

See gigabit Ethernet. GE ADM A technique that is used to optimize GE service transport over a Metro WDM network. By using this technique, equipment configured with a high-speed backplane can separately transmit, aggregate, or divert GE services over electrical-layer wavelengths or subwavelengths. This achieves cross-connections of wavelengths and end-to-end management of sub-wavelengths over a single device. This technique enables GE convergence and crossconnections at the same time and therefore ensures that network resources are used effectively. GEM GPON encapsulation mode GFP See Generic Framing Procedure. GGSN See gateway GPRS support node. GMPLS generalized multiprotocol label switching GMSC See gateway mobile switching center. GMT Greenwich Mean Time GNE See gateway network element. GPON gigabit-capable passive optical network GPRS See general packet radio service. GPRS tunneling protocol (GTP) GPRS Tunneling Protocol (GTP), an IP-based protocol, is used for general packet radio service (GPRS) communication in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS) networks. The GTP includes GTP-C and GTP-U. GTP-C is used to transmit signaling for path management, tunnel management, mobility management, and location management. GTP-C performs controls on tunnels in which subscriber data is transferred. GTP-U is used to encapsulate subscriber data and transport subscriber data in tunnels. For details about GTP, see 3GPP TS 29.060. GPS See Global Positioning System. GR See graceful restart. GRE See Generic Routing Encapsulation. GSM See Global System for Mobile Communications. GTP

See GPRS tunneling protocol. GTP-C GPRS Tunneling Protocol-Control plane GTP-U GPRS Tunneling Protocol-User plane GTS See generic traffic shaping. GTSM Generalized TTL Security Mechanism GUI graphical user interface Generic Framing Procedure (GFP) A framing and encapsulation method which can be applied to any data type. It has been standardized by ITU-T SG15. Generic Routing Encapsulation (GRE) A mechanism for encapsulating any network layer protocol over any other network. GRE is used for encapsulating IP datagrams tunneled through the Internet. GRE serves as a Layer 3 tunneling protocol and provides a tunnel for transparently transmitting data packets. Global Positioning System (GPS) A global navigation satellite system. It provides reliable positioning, navigation, and timing services to worldwide users. Global System for Mobile Communications (GSM) The second-generation mobile networking standard defined by European Telecommunications Standards Institute (ETSI). It is aimed at designing a standard for global mobile phone networks. The standard allows a subscriber to use a phone globally. GSM consists of three main parts: mobile switching subsystem (MSS), base station subsystem (BSS), and mobile station (MS). gateway GPRS support node (GGSN) A functional entity that provides packet data services. It is in charge of the routing and encapsulation of the packet data between the General Packet Radio Service (GPRS) or Universal Mobile Telecommunications System (UMTS) network and the external PDN. gateway mobile switching center (GMSC) A type of Mobile Switching Center (MSC), which requests the routing information about a called subscriber and performs interconnection and settlement between networks. gateway network element (GNE) A network element that is used for communication between the NE application layer and the NM application layer. general packet radio service (GPRS) A packet oriented mobile data service defined by 3rd Generation Partnership Project (3GPP) and employed to connect mobile cellular users to the Public Data Network (PDN). Within the GSM network, it shares the network databases and radio access network and employs functions known as the Packet Control Unit (PCU), Serving GPRS Support Node (SGSN), and Gateway GPRS Support Node (GGSN) to provide packet switching data services across the fixed and radio network. generic traffic shaping (GTS)

A traffic control measure that proactively adjusts the output speed of the traffic. This is to adapt the traffic to network resources that can be provided by the downstream router to avoid packet discarding and congestion. gigabit Ethernet (GE) A collection of technologies for transmitting Ethernet frames at a rate of a gigabit per second, as defined by the IEEE 802.3z standard. GE is compatible with 10 Mbit/s and 100 Mbit/s Ethernet. It runs at 1000 Mbit/s. Gigabit Ethernet uses a private medium, and it does not support coaxial cables or other cables. It also supports the channels in the bandwidth mode. If Gigabit Ethernet is, however, deployed to be the private bandwidth system with a bridge (switch) or a router as the center, it gives full play to the performance and the bandwidth. In the network structure, Gigabit Ethernet uses full duplex links that are private, causing the length of the links to be sufficient for backbone applications in a building and campus. graceful restart (GR) In IETF, protocols related to Internet Protocol/Multiprotocol Label Switching (IP/MPLS) such as Open Shortest Path First (OSPF), Intermediate System-Intermediate System (IS-IS), Border Gateway Protocol (BGP), Label Distribution Protocol (LDP), and Resource Reservation Protocol (RSVP) are extended to ensure that the forwarding is not interrupted when the system is restarted. This reduces the flapping of the protocols at the control plane when the system performs an active/standby switchover. This series of standards is called graceful restart.

H
H-VPN See hierarchy VPN. H.248 A media gateway control protocol used for communications between the media gateway controller (MGC) and the media gateway (MGW) in the detached gateway architecture so that the MGC can control the MGW. In Universal Mobile Telecommunications System (UMTS) networks, the interface between the MGC and the MGW is the Mc interface and the 3GPP defines specific usage of H.248 over the Mc interface. HA See high availability. HBA host bus adapter HDB3 See high density bipolar of order 3 code. HDLC High-Level Data Link Control HDSL high-speed digital subscriber line HDTV See high definition television. HFC See high-level foundation classes. HGMP Huawei Group Management Protocol HLR

See home location register. HMAC See Hashed message authentication code. HQoS See hierarchical quality of service. HSDPA See High Speed Downlink Packet Access. HSI high-speed Internet HSL See high-level script language. HSM hitless switch mode HTML Hypertext Markup Language HTTP See Hypertext Transfer Protocol. HTTPS See Hypertext Transfer Protocol Secure. HVPLS hierarchical virtual private LAN service HWTACACS See Huawei Terminal Access Controller Access Control System. Hashed message authentication code (HMAC) A specific construction for calculating a message authentication code (MAC) involving a cryptographic hash function in combination with a secret key. High Speed Downlink Packet Access (HSDPA) A modulating-demodulating algorithm put forward in 3GPP R5 to meet the requirement for asymmetric uplink and downlink transmission of data services. It enables the maximum downlink data service rate to reach 14.4 Mbit/s without changing the WCDMA network topology. Huawei Terminal Access Controller Access Control System (HWTACACS) A security protocol with enhanced functions on the base of TACACS (RFC1492). Similar to the RADIUS protocol, HWTACACS implements multiple subscriber AAA functions through communications with the HWTACACS server in the client/server mode. Hypertext Transfer Protocol (HTTP) An application-layer protocol used for communications between web servers and browsers or other programs. HTTP adopts the request-response mode. A client sends a request to the server. The request consists of two parts: request header and MIME-like message. The request header contains request method, uniform resource locator (URL), and protocol version. The MIME-like message contains request modifiers, client information, and possible body content. Upon receiving the request, the server responds with a status line. The status line includes the message's protocol version, a success or error code, and a MIME-like message, which contains server information, entity meta-information, and possible entity-body content. For details about HTTP, see RFC2616.

Hypertext Transfer Protocol Secure (HTTPS) An HTTP protocol that runs on top of transport layer security (TLS) and Secure Sockets Layer (SSL). It is used to establish a reliable channel for encrypted communication and secure identification of a network web server. For details, see RFC2818. hierarchical quality of service (HQoS) A type of QoS that controls the traffic of users and performs the scheduling according to the priority of user services. HQoS has an advanced traffic statistics function, and the administrator can monitor the usage of bandwidth of each service. Hence, the bandwidth can be allocated reasonably through traffic analysis. hierarchy VPN (H-VPN) An L3VPN networking type. Using the hierarchy technology, H-VPN distributes PE functions such as user access and router management to multiple PEs to enhance network scalability. high availability (HA) A scheme in which two modules operate in active/standby mode to achieve high availability. When the active module fails, the standby module automatically takes over the system functions of the active module. high definition television (HDTV) A type of TV that is capable of displaying at least 720 progressive or 1080 interlaced active scan lines. It must be capable of displaying a 16:9 image using at least 540 progressive or 810 interlaced active scan lines. high density bipolar of order 3 code (HDB3) A code used for baseband transmissions between telecommunications devices. The HDB3 code has the following feature: high capability of clock extraction, no direct current component, error-checking capability, and a maximum of three consecutive zeros. high-level foundation classes (HFC) A group of encapsulated function databases provided by the iSStar. You can use the provided functions to accelerate script editing. high-level script language (HSL) A script language. Based on python, the HSL syntax is simple, clear, and extendable. home location register (HLR) A function entity shared by the circuit switching (CS) domain and the packet switching (PS) domain. It is responsible for mobile subscriber data management and location information management. HLR, a network entity of the core network (CN) in the Global System for Mobile Communications (GSM), general packet radio service (GPRS), or Enhanced Data rates for GSM Evolution (EDGE) network, is the central database for the entire network.

I
I/O input/output IA Intel Architecture IAB See Internet Architecture Board. IANA See Internet Assigned Numbers Authority. IBGP

Internal Border Gateway Protocol ICC See ITU carrier code. ICMP See Internet Control Message Protocol. ICMPv6 See Internet Control Message Protocol version 6. ICP IMA Control Protocol ID See identity. IDL interface definition language IDN See integrated digital network. IDU See indoor unit. IEEE See Institute of Electrical and Electronics Engineers. IETF See Internet Engineering Task Force. IF See intermediate frequency. IGMP See Internet Group Management Protocol. IGP See Interior Gateway Protocol. IGRP Interior Gateway Routing Protocol IIOP Internet Inter-ORB Protocol IIS See Internet Information Services. IK See integrity key. IKE See Internet Key Exchange. ILM incoming label map ILS

instrument landing system IMA See inverse multiplexing over ATM. IMEI See international mobile equipment identity. IMS information management system IMSI See international mobile subscriber identity. IN intelligent network IP Internet Protocol IP Security (IPSec) A protocol family defined by the Internet Engineering Task Force (IETF). By authenticating and encrypting each IP packet of a data stream, this protocol family provides high quality, interoperable, and cryptology-based security for IP packets. IPA See intelligent power adjustment. IPM IP processing module IPSec See IP Security. IPTV See Internet Protocol television. IPX Internet Packet Exchange IPoA IP over ATM IPoE IP Over Ethernet IPoEoA IP over Ethernet over ATM IPv4 See Internet Protocol version 4. IPv6 See Internet Protocol version 6. IS-IS See Intermediate System to Intermediate System. ISAKMP

See Internet Security Association and Key Management Protocol. ISDN integrated services digital network ISDN Q.921-User Adaptation Layer (IUA) A layer that provides transport of signaling messages between the signaling gateway (SG) and the media gateway controller (MGC), including transporting Q.921/Q.931 boundary primitives, communication between layer management modules, and management of active associations. ISO International Organization for Standardization ISP See Internet service provider. ISSU See in-service software upgrade. IST internal spanning tree ISU integrated system control unit ITC independent transmit clock ITU See International Telecommunication Union. ITU carrier code (ICC) A code assigned to a network operator/service provider, maintained by the ITU-T Telecommunication Standardization Bureau (TSB). ITU-T See International Telecommunication Union-Telecommunication Standardization Sector. IUA See ISDN Q.921-User Adaptation Layer. InARP Inverse Address Resolution Protocol Institute of Electrical and Electronics Engineers (IEEE) A society of engineering and electronics professionals based in the United States but boasting membership from numerous other countries. The IEEE focuses on electrical, electronics, computer engineering, and science-related matters. Integration Script Star (iSStar) The enhanced platform of the Huawei M2000, which is developed twice. You can complete specific services through the provided HSL and HFC library program on the platform. Interior Gateway Protocol (IGP) A routing protocol that is used within an autonomous system. The IGP runs in small-sized and medium-sized networks. The commonly used IGPs are the routing information protocol (RIP), the interior gateway routing protocol (IGRP), the enhanced IGRP (EIGRP), and the open shortest path first (OSPF).

Intermediate System to Intermediate System (IS-IS) A protocol used by network devices (routers) to determine the best way to forward datagram or packets through a packet-based network. International Telecommunication Union (ITU) A United Nations agency, one of the most important and influential recommendation bodies, responsible for recommending standards for telecommunication (ITU-T) and radio networks (ITU-R). International Telecommunication Union-Telecommunication Standardization Sector (ITU-T) An international body that develops worldwide standards for telecommunications technologies. These standards are grouped together in series which are prefixed with a letter indicating the general subject and a number specifying the particular standard. For example, X.25 comes from the "X" series which deals with data networks and open system communications and number "25" deals with packet switched networks. Internet Architecture Board (IAB) A small group of people who set policies and directions for TCP/IP and the Internet. It is an elected body that listens to formal appeals and writes network architecture documents. Internet Assigned Numbers Authority (IANA) A department operated by the IAB. IANA delegates authority for IP address-space allocation and domain-name assignment to the NIC and other organizations. IANA also maintains a database of assigned protocol identifiers used in the TCP/IP suite, including autonomous system numbers. Internet Control Message Protocol (ICMP) A network-layer (ISO/OSI level 3) Internet protocol that provides error correction and other information relevant to IP packet processing. For example, it can let the IP software on one machine inform another machine about an unreachable destination. See also communications protocol, IP, ISO/OSI reference model, packet (definition 1). Internet Control Message Protocol version 6 (ICMPv6) A basic protocol of IPv6 and generates error messages and informational messages used by IPv6 nodes to report errors and information generated during packet processing. Internet Engineering Task Force (IETF) A worldwide organization of individuals interested in networking and the Internet. Managed by the Internet Engineering Steering Group (IESG), the IETF is charged with studying technical problems facing the Internet and proposing solutions to the Internet Architecture Board (IAB). The work of the IETF is carried out by various working groups that concentrate on specific topics such as routing and security. The IETF is the publisher of the specifications that led to the TCP/IP protocol standard. Internet Group Management Protocol (IGMP) One of the TCP/IP protocols for managing the membership of Internet Protocol multicast groups. It is used by IP hosts and adjacent multicast routers to establish and maintain multicast group memberships. Internet Information Services (IIS) Microsoft's brand of a Web server software, utilizing the Hypertext Transfer Protocol (HTTP) to deliver World Wide Web documents. It incorporates various functions for security, allows for CGI programs, and also provides Gopher and FTP services. Internet Key Exchange (IKE) A hybrid protocol that implements Oakley key exchange and SKEME key exchange in the ISAKMP frame. Both Oakley and SKEME define a key exchange method, including the structure of the valid payload, valid payload of transmitted information, handling procedure of the key, and method to use the key.

Internet Protocol television (IPTV) A system in which video is transmitted in IP packets. Also called "TV over IP", IPTV uses streaming video techniques to deliver scheduled TV programs or video-on-demand (VOD). Unlike transmitting over the air or through cable to a TV set, IPTV uses the transport protocol of the Internet for delivery and requires either a computer and software media player or an IPTV set-top box to decode the images in real time. Internet Protocol version 4 (IPv4) The current version of the Internet Protocol (IP). IPv4 utilizes a 32bit address which is assigned to hosts. An address belongs to one of five classes (A, B, C, D, or E) and is written as 4 octets separated by periods and may range from 0.0.0.0 through to 255.255.255.255. Each IPv4 address consists of a network number, an optional subnetwork number, and a host number. The network and subnetwork numbers together are used for routing, and the host number is used to address an individual host within the network or subnetwork. Internet Protocol version 6 (IPv6) An update version of IPv4, which is designed by the Internet Engineering Task Force (IETF) and is also called IP Next Generation (IPng). It is a new version of the Internet Protocol. The difference between IPv6 and IPv4 is that an IPv4 address has 32 bits while an IPv6 address has 128 bits. Internet Security Association and Key Management Protocol (ISAKMP) A protocol that allows the message receiver to obtain a public key and use digital certificates to authenticate the sender's identity. Internet service provider (ISP) An organization that offers users access to the Internet and related services. iGWB See iGateWay Bill. iGateWay Bill (iGWB) An entity that performs the functions of CDR collection, storage, filtering, sorting, and transmission. iMAP integrated management application platform iSStar See Integration Script Star. identity (ID) The collective aspect of the set of characteristics by which a thing is definitively recognizable or known. in-service software upgrade (ISSU) An upgrade mode. In this mode, the active and standby SCC boards are reset separately during the activation process, without interrupting services. In addition, the system checks information such as NE status, basic services, and routing relationship automatically. indoor unit (IDU) The indoor unit of the split-structured radio equipment. It implements accessing, multiplexing/demultiplexing, and intermediate frequency (IF) processing for services. integrated digital network (IDN) A set of digital nodes and digital links that uses integrated digital transmission and switches to provide digital connections between two or more defined points. integrity key (IK)

A 128bit number used to protect the integrity of information passing between the RNC (Radio Network Controller) and the UE (User Equipment) in UMTS. intelligent power adjustment (IPA) A mechanism used to reduce the optical power of all the amplifiers in an adjacent regeneration section in the upstream to a safety level if the system detects the loss of optical signals on the link. If the fiber is broken, the device performance degrades, or the connector is not plugged well, the loss of optical signals may occur. With IPA, maintenance engineers will not be hurt by the laser sent out from the slice of broken fiber. intermediate frequency (IF) The transitional frequency between the frequencies of a modulated signal and an RF signal. international mobile equipment identity (IMEI) A number unique to every GSM and UMTS mobile phone. It is usually found printed on the phone underneath the battery and can also be found by dialing the sequence *#06# into the phone. international mobile subscriber identity (IMSI) A unique number associated with all GSM and UMTS network mobile phone users. It is stored in the SIM inside the phone and is sent by the phone to the network. It is also used for acquiring other details of the mobile in the Home Location Register (HLR) or as locally copied in the Visitor Location Register. To prevent eavesdroppers identifying and tracking the subscriber on the radio interface, the IMSI is sent as rarely as possible and a randomlygenerated TMSI is sent instead. inverse multiplexing over ATM (IMA) A technique that involves inverse multiplexing and de-multiplexing of ATM cells in a cyclical fashion among links grouped to form a higher bandwidth logical link whose rate is approximately the sum of the link rates.

L
L2TP Layer 2 Tunneling Protocol L2TP access concentrator (LAC) A device attached to the switching network. LAC has a PPP terminal system and delivers L2TP processing. It usually provides access services. L2TP network server (LNS) A node that acts as one side of an L2TP tunnel endpoint and is a peer to the L2TP access concentrator (LAC). The LNS is the logical termination point of a PPP session that is being tunneled from the remote system by the LAC. L2VPN Layer 2 virtual private network L3VPN Layer 3 virtual private network LAC See L2TP access concentrator. LACP See Link Aggregation Control Protocol. LACPDU Link Aggregation Control Protocol data unit

LAG See link aggregation group. LAI See location area identity. LAN See local area network. LAPB Link Access Procedure Balanced LAPD link access procedure on the D channel LAPS Link Access Protocol-SDH LB See loopback. LBM See loopback message. LBR See loopback reply. LC line card LCAS See link capacity adjustment scheme. LCK See Locked signal function. LCP Link Control Protocol LCT local craft terminal LDAP See Lightweight Directory Access Protocol. LDP Label Distribution Protocol LE See local exchange. LER See label edge router. LFIB label forwarding information base LIG lawful interception gateway

LIU logical interface unit LL logical link LLC See logical link control. LLDP See Link Layer Discovery Protocol. LLID local loopback ID LM See loss measurement. LMP link management protocol LMT local maintenance terminal LN See local network. LNS See L2TP network server. LOC loss of clock LOG call logging LOM loss of multiframe LOP loss of pointer LOS See loss of signal. LOSW loss of sync failure LP logical port LPF See low-pass filter. LPQ low priority queuing LPT link-state pass through

LPU line interface processing unit LQM link quality monitoring LRF location registration function LS logical system LSA link-state advertisement LSDB link state database LSP See label switched path. LSR See label switching router. LT linktrace LTE Long Term Evolution LTM See linktrace message. LTR See linktrace reply. Lightweight Directory Access Protocol (LDAP) A TCP/IP based network protocol that enables access to a DSA. It involves some reduced functionality from X.500 DAP specification. Link Aggregation Control Protocol (LACP) A dynamic link aggregation protocol that improves the transmission speed and reliability. The two ends of the link send LACP packets to inform each other of their parameters and form a logical aggregation link. After the aggregation link is formed, LACP maintains the link status in real time and dynamically adjusts the ports on the aggregation link upon detecting the failure of a physical port. Link Layer Discovery Protocol (LLDP) The Link Layer Discovery Protocol (LLDP) is an L2D protocol defined in IEEE 802.1ab. Using the LLDP, the NMS can rapidly obtain the Layer 2 network topology and changes in topology when the network scales expand. Locked signal function (LCK) A function administratively locks an MEG end point (MEP) at the server layer, informs consequential data traffic interruption to the peer MEP at the client layer, and suppresses the alarm at the client layer. label edge router (LER)

A device that sits at the edge of an MPLS domain, that uses routing information to assign labels to datagrams and then forwards them into the MPLS domain. label switched path (LSP) A sequence of hops (R0...Rn) in which a packet travels from R0 to Rn through label switching mechanisms. A label-switched path can be chosen dynamically, based on common routing mechanisms or through configuration. label switching router (LSR) Basic element of an MPLS network. All LSRs support the MPLS protocol. The LSR is composed of two parts: control unit and forwarding unit. The former is responsible for allocating the label, selecting the route, creating the label forwarding table, creating and removing the label switch path; the latter forwards the labels according to groups received in the label forwarding table. link aggregation group (LAG) An aggregation that allows one or more links to be aggregated together to form a link aggregation group so that a MAC client can treat the link aggregation group as if it were a single link. link capacity adjustment scheme (LCAS) LCAS in the virtual concatenation source and sink adaptation functions provides a control mechanism to hitless increase or decrease the capacity of a link to meet the bandwidth needs of the application. It also provides a means of removing member links that have experienced failure. The LCAS assumes that in cases of capacity initiation, increases or decreases, the construction or destruction of the end-to-end path is the responsibility of the network and element management systems. linktrace message (LTM) The message sent by the initiator MEP of 802.1ag MAC Trace to the destination MEP. LTM includes the Time to Live (TTL) and the MAC address of the destination MEP2. linktrace reply (LTR) For 802.1ag MAC Trace, the destination MEP replies with a response message to the source MEP after the destination MEP receives the LTM, and the response message is called LTR. LTR also includes the TTL that equals the result of the TTL of LTM minus 1. local area network (LAN) A network formed by the computers and workstations within the coverage of a few square kilometers or within a single building. It features high speed and low error rate. Ethernet, FDDI, and Token Ring are three technologies used to implement a LAN. Current LANs are generally based on switched Ethernet or Wi-Fi technology and running at 1,000 Mbit/s (that is, 1 Gbit/s). local exchange (LE) An exchange nearest to users or directly connected to user terminals. local network (LN) A telephony network that consists of several local exchanges (or several local exchanges and transit exchanges), trunks between exchanges, toll exchanges, subscriber cables, and telephone sets. A telephony network is within a toll call numbering zone. location area identity (LAI) The LAI uniquely identifies a LA (Location Area) within any PLMN (Public Land Mobile Network). It is comprised of the MCC (Mobile Country Code), MNC (Mobile Network Code) and the LAC (Location Area Code). logical link control (LLC)

According to the IEEE 802 family of standards, Logical Link Control (LLC) is the upper sublayer of the OSI data link layer. The LLC is the same for the various physical media (such as Ethernet, token ring, WLAN). loopback (LB) A troubleshooting technique that returns a transmitted signal to its source so that the signal or message can be analyzed for errors. The loopback can be a inloop or outloop. loopback message (LBM) The loopback packet sent by the node that supports 802.2ag MAC Ping to the destination node. LBM message carries its own sending time. loopback reply (LBR) A response message involved in the 802.2ag MAC Ping function, with which the destination MEP replies to the source MEP after the destination MEP receives the LBM. The LBR carries the sending time of LBM, the receiving time of LBM and the sending time of LBR. loss measurement (LM) A method used to collect counter values applicable for ingress and egress service frames where the counters maintain a count of transmitted and received data frames between a pair of MEPs. loss of signal (LOS) No transitions occurring in the received signal. low-pass filter (LPF) A filter designed to transmit electromagnetic frequencies below a certain value, while excluding those of a higher frequency.

M
M2UA See MTP2-User Adaptation Layer. M3UA See MTP3-User Adaptation Layer. MA maintenance association MAC See Media Access Control. MADM multiple add/drop multiplexer MAN See metropolitan area network. MBS maximum burst size MC See medium counter. MCA multi-channel spectrum analyzer unit MCC

See mobile country code. MCR minimum cell rate MCU See multipoint control unit. MD See maintenance domain. MD5 See message digest algorithm 5. MDF See main distribution frame. MDP message dispatch process MDU See multi-dwelling unit. MED See Multi-Exit Discrimination. MEG See maintenance entity group. MELT See metallic loop test. MEP maintenance association end point MG monitored group MGC media gateway controller MGCP See Media Gateway Control Protocol. MGW See media gateway. MIB See management information base. MID message identification MIME See multipurpose Internet mail extensions. MLD See multicast listener discovery. MLPPP

Multi-Link Point-to-Point Protocol MLR media loss ratio MLT mechanized loop testing MME mobility management entity MMS multimedia messaging service MP maintenance point MPID maintenance point identification MPLS See Multiprotocol Label Switching. MPLS TE multiprotocol label switching traffic engineering MPLS TP See Multiprotocol Label Switching traffic policing. MPLS VPN See multiprotocol label switching virtual private network. MPLS-TP See multiprotocol label switching transport profile. MPLS-TP shared protection ring (SPRing) A protection switchover mechanism defined in the ITU-T G.8132 standard. A group of nodes constitute a closed loop and each node is connected to two adjacent nodes using a bidirectional channel. Ring network protection involves two rings that provide protection for each other and are in opposite directions. Both of the two rings provide working and protection channels and redundant bandwidth or network devices. In this way, services can be automatically restored after the network does not function properly or deteriorates. MPU main processing unit MRU maximum receive unit MS multiplex section MS-AIS See multiplex section alarm indication signal. MSAN multiservice access node MSC

mobile switching center MSDP See Multicast Source Discovery Protocol. MSISDN mobile station international ISDN number MSN Microsoft Service Network MSOH multiplex section overhead MSP See multiplex section protection. MSRN See mobile station roaming number. MST See multiplex section termination. MSTI See multiple spanning tree instance. MSTP See Multiple Spanning Tree Protocol. MTA multifunctional terminal adapter MTP2-User Adaptation Layer (M2UA) A protocol used for transmitting Signaling System No.7 (SS7) Message Transfer Part Layer 2 (MTP2) user signaling (that is, MTP3 signaling) over Internet Protocol (IP) networks by using the Stream Control Transmission Protocol (SCTP). M2UA can be used for signaling transmission between the signaling gateway (SG) and the media gateway controller (MGC). In SS7 networks, a signaling point (SP) accesses the MGC through the SG. An SG provides a Nodal Interworking Function (NIF) module to achieve interworking between Message Transfer Part Layer 2 (MTP2) and M2UA by using primitives. On the MGC side, the upper-layer user of M2UA is MTP3. MTP3-User Adaptation Layer (M3UA) A protocol used for transmitting Signaling System No.7 (SS7) Message Transfer Part Layer 3 (MTP3) user signaling (ISUP or SCCP) over Internet Protocol (IP) networks by using the Stream Control Transmission Protocol (SCTP) to achieve seamless operations performed by MTP3 peer-to-peer users in the SS7 and IP. This protocol can be used for signaling transmission between the signaling gateway (SG) and the media gateway controller (MGC) or the IP database. It can also be used for signaling transmission between IP-based applications. MTU See maximum transmission unit. MUX See multiplexer. MVNE See mobile virtual network enabler.

MVNO See mobile virtual network operator. Media Access Control (MAC) A protocol at the media access control sublayer. The protocol is at the lower part of the data link layer in the OSI model and is mainly responsible for controlling and connecting the physical media at the physical layer. When transmitting data, the MAC protocol checks whether to be able to transmit data. If the data can be transmitted, certain control information is added to the data, and then the data and the control information are transmitted in a specified format to the physical layer. When receiving data, the MAC protocol checks whether the information is correct and whether the data is transmitted correctly. If the information is correct and the data is transmitted correctly, the control information is removed from the data and then the data is transmitted to the LLC layer. Media Gateway Control Protocol (MGCP) A protocol that defines a type of call control structure. It is a standard protocol for handling the signaling and session management needed during a multimedia conference. In the structure defined by MGC, call control is separated from service bearer. Being independent of the Media Gateway (MG), the call control function is processed by the external call control unit, known as Media Gateway Controller (MGC) or Call Agent (CA). The MG needs to execute the command issued by the MGC. By nature, MGCP is a master/slave protocol. MoIP modem over IP Multi-Exit Discrimination (MED) 1.An attribute that is equivalent to the metrics used by IGP. It is only exchanged between two adjacent ASs. The AS that receives this attribute does not advertise it to any other ASs. 2.The Multi-Exit Discriminator (MED) is a value assigned to a route based on a metric value. Multicast Source Discovery Protocol (MSDP) A protocol that is applicable only to the PIM-SM domain and meaningful only for the AnySource Multicast (ASM) model. After the MSDP peer relationship is set up between RPs of different PIM-SM domains, multicast source information can be shared between PIM-SM domains, and the inter-domain multicast can be implemented. After the MSDP peer relationship is set up between RPs of the same PIM-SM domain, multicast source information can be shared in the PIM-SM domain, and anycast RP can be implemented. Multiple Spanning Tree Protocol (MSTP) A protocol that can be used in a loop network. Using an algorithm, the MSTP blocks redundant paths so that the loop network can be trimmed as a tree network. In this case, the proliferation and endless cycling of packets is avoided in the loop network. The protocol that introduces the mapping between VLANs and multiple spanning trees. This solves the problem that data cannot be normally forwarded in a VLAN because in STP/RSTP, only one spanning tree corresponds to all the VLANs. Multiprotocol Label Switching (MPLS) A technology that uses short tags of fixed length to encapsulate packets in different link layers, and provides connection-oriented switching for the network layer on the basis of IP routing and control protocols. It improves the cost performance and expandability of networks, and is beneficial to routing. Multiprotocol Label Switching traffic policing (MPLS TP) It is a scheme that supervises the specific traffic entering the communication devices. By policing the speed of traffic that enters the network, it "punishes" the traffic out of the threshold, so the traffic going into network is limited to a reasonable range, protecting the network resources and the interests of the carriers. main distribution frame (MDF)

A device at a central office, on which all local loops are terminated. maintenance domain (MD) The network or the part of the network for which connectivity is managed by connectivity fault management (CFM). The devices in a maintenance domain are managed by a single Internet service provider (ISP). maintenance entity group (MEG) A MEG consists of MEs that meet the following criteria: Exist within the same management edges. Have the same MEG hierarchy. Belong to the same P2P or P2MP connection.

management information base (MIB) A type of database used for managing the devices in a communications network. It comprises a collection of objects in a (virtual) database used to manage entities (such as routers and switches) in a network. maximum transmission unit (MTU) The largest packet of data that can be transmitted on a network. MTU size varies, depending on the network576 bytes on X.25 networks, for example, 1500 bytes on Ethernet, and 17,914 bytes on 16 Mbit/s token ring. Responsibility for determining the size of the MTU lies with the link layer of the network. When packets are transmitted across networks, the path MTU, or PMTU, represents the smallest packet size (the one that all networks can transmit without breaking up the packet) among the networks involved. media gateway (MGW) A logical entity that converts the format of the media of a network to meet the format requirement of another network. It can process audio services, video services and data services, and convert the media format in full duplex mode. In addition, it can play certain audio and video signals, and provide the IVR function and media conference. medium counter (MC) A new counter that is obtained from the original performance data according to a calculation rule. The purpose is to improve the generation speed of data in a report, reduce the storage space of the report database, and increase the storage period of certain data. message digest algorithm 5 (MD5) A hash function that is used in a variety of security applications to check message integrity. MD5 processes a variable-length message into a fixed-length output of 128 bits. It breaks up an input message into 512-bit blocks (sixteen 32-bit little-endian integers). After a series of processing, the output consists of four 32-bit words, which are then cascaded into a 128-bit hash number. metallic loop test (MELT) A test solution that is provided by the DSLAM host and integrates the digital multimeter (DMM). The MELT function is integrated in the internal service board and tests the physical characteristics of the copper line for each service port. The test items include the DC voltage, AC voltage, insulation resistance, and capacitance and the test can diagnose a fault on a twisted pair cable. metropolitan area network (MAN) A network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large LAN but smaller than the area covered by an WAN. The term is applied to the interconnection of networks in a city into a single larger network (which may then also offer efficient connection to a wide area network). It is also used to mean the interconnection of several local area networks by bridging them with backbone lines. The latter usage is also sometimes referred to as a campus network.

mobile country code (MCC) A three digit number that uniquely identifies a given country. It is used in the international mobile subscriber identity (IMSI) and location area identity (LAI). mobile station roaming number (MSRN) A number temporarily allocated to a mobile station (MS) by the visitor location register (VLR), upon request from the home location register (HLR), and used for call routing. The MSRN is valid only for the current call. It is released immediately after the call is connected and reallocated to another call. The MSRN is defined in the E.164 format and generally expressed by a mobile switching center (MSC) number followed by several additional bytes. mobile virtual network enabler (MVNE) A company that provides mobile services for mobile virtual network operators. The services include billing, network element provisioning, administration, operations, support for base station subsystems and operations support systems, and provision of back end network elements. mobile virtual network operator (MVNO) A company that provides mobile services but does not own licensed radio spectrum. An MVNO resells wireless services under their own brand name but uses the networks of other mobile phone operators. multi-dwelling unit (MDU) A network access unit used for multi-dwelling units. It provides Ethernet and IP services and optionally VoIP or CATV services; has multiple broadband interfaces on the user side and optionally POTS ports or CATV RF ports. It is mainly applicable to FTTB, FTTC, or FTTCab networks. multicast listener discovery (MLD) A protocol used by an IPv6 router to discover the multicast listeners on their directly connected network segments, and to set up and maintain member relationships. On IPv6 networks, after MLD is configured on the receiver hosts and the multicast router to which the hosts are directly connected, the hosts can dynamically join related groups and the multicast router can manage members on the local network. multiple spanning tree instance (MSTI) A type of spanning trees calculated by MSTP within an MST Region, to provide a simply and fully connected active topology for frames classified as belonging to a VLAN that is mapped to the MSTI by the MST Configuration. A VLAN cannot be assigned to multiple MSTIs. multiplex section alarm indication signal (MS-AIS) An all-ONES characteristic or adapted information signal. It's generated to replace the normal traffic signal when it signal contains a defect condition in order to prevent consequential downstream failures being declared or alarms being raised. AIS can be identified as multiplex section alarm indication signal. multiplex section protection (MSP) A function, which is performed to provide capability for switching a signal between and including two multiplex section termination (MST) functions, from a "working" to a "protection" channel. multiplex section termination (MST) A function, which is performed to generate the MSOH during the process of forming an SDH frame signal and terminates the MSOH in the reverse direction. multiplexer (MUX) Equipment which combines a number of tributary channels onto a fewer number of aggregate bearer channels, the relationship between the tributary and aggregate channels being fixed. multipoint control unit (MCU)

A unit consisting of two parts, namely, Multipoint Controller (MC) and Multipoint Processor (MP). The MC is responsible for internal control and call management, and the MP is responsible for handling media streams. multiprotocol label switching transport profile (MPLS-TP) An extension to MPLS in terms of forwarding, OAM, reliability, NMS and control plane protocol standardized by IETF to provide sufficient transport functionality. multiprotocol label switching virtual private network (MPLS VPN) An Internet Protocol (IP) virtual private network (VPN) based on the multiprotocol label switching (MPLS) technology. It applies the MPLS technology for network routers and switches, simplifies the routing mode of core routers, and combines traditional routing technology and label switching technology. It can be used to construct the broadband Intranet and Extranet to meet various service requirements. multipurpose Internet mail extensions (MIME) An Internet standard that extends the format of email to support non-ASCII characters and binary attachments. The MIME first applies to email systems and then to web browsers. The web server informs the web browser of the multimedia type by displaying the MIME type of the multimedia data. Each MIME type consists of two parts: the first part is the type of data for example, audio and image, and the second part is the subtype of data, for example, GIF, PNG, and JPEG of image. For details, see RFC822.

N
NA numerical aperture NAP network access point NAS network access server NAT See Network Address Translation. NB normal burst NBI See northbound interface. NBMA non-broadcast multiple access NCP Network Control Protocol ND See neighbor discovery. NDF new data flag NDP See Neighbor Discovery Protocol. NE

network element NEL network element layer NET See network entity title. NFS See network file server. NGN See next generation network. NHLFE next hop label forwarding entry NIC network interface card NLP normal link pulse NLRI network layer reachable information NM network management NMC network management center NML See network management layer. NNI network-to-network interface NO See network optimization. NP See network processor. NPC See network parameter control. NPE network provider edge NPU network process unit NQA network quality analysis NRT-VBR non-real-time variable bit rate NRZ

non-return to zero NSAP See network service access point. NT See node table. NT1 See network termination 1. NTDP Network Topology Discovery Protocol NTP Network Time Protocol NVRAM nonvolatile random access memory Neighbor Discovery Protocol (NDP) A protocol that is used to discover the information of the neighboring Huawei device that is connected with the local device. NetBIOS network basic input/output system Network Address Translation (NAT) An IETF standard that allows an organization to present itself to the Internet with far fewer IP addresses than there are nodes on its internal network. The NAT technology, which is implemented in a router, firewall or PC, converts private IP addresses (such as in the 192.168.0.0 range) of the machine on the internal private network to one or more public IP addresses for the Internet. It changes the packet headers to the new address and keeps track of them via internal tables that it builds. When packets come back from the Internet, NAT uses the tables to perform the reverse conversion to the IP address of the client machine. neighbor discovery (ND) Neighbor discovery, which is used during the forwarding of IPv6 packets for duplicate address detection, neighbor address resolution, and neighbor reachability detection. Additionally, ND is a set of protocols and processes for host address configuration In ND, different ICMPv6 messages are used for router discovery and neighbor discovery. network entity title (NET) Network layer information of an IS itself. It excludes the transport layer information (SEL = 0) and can be regarded as a special network service access point (NSAP). network file server (NFS) A distributed file system that allows remote file access across a network through the NFS protocol. network management layer (NML) A management layer which is responsible for the management of network elements on an individual or collective basis. network optimization (NO) Network adjustment and optimization based on the system operating data that is obtained from the performance statistics or drive test during the network operation process. network parameter control (NPC)

During communications, UPC is implemented to monitor the actual traffic on each virtual circuit that is input to the network. Once the specified parameter is exceeded, measures will be taken to control. NPC is similar to UPC in function. The difference is that the incoming traffic monitoring function is divided into UPC and NPC according to their positions. UPC locates at the user/network interface, while NPC at the network interface. network processor (NP) An integrated circuit which has a feature set specifically targeted at the networking application domain. Network Processors are typically software programmable devices and would have generic characteristics similar to general purpose CPUs that are commonly used in many different types of equipment and products. network service access point (NSAP) A network address defined by ISO, at which the OSI Network Service is made available to a Network service user by the Network service provider. network termination 1 (NT1) A type of terminal device that provides U-interface and S/T interface, used to connect the ISDN terminals and ISDN exchange equipment. It mainly performs code switch between the U-interface and the S/T interface, such as the code switch between the 2B1Q and the AMI in Chinese standards. The NT1 mostly work at only the physical layer, without software intelligence; the devices, however, support functions of line maintenance and performance monitoring, and ensure the clock synchronization between the ISDN terminals and the network. next generation network (NGN) A packet-based network aimed to address requirement of various services. It adopts an integrated and open network framework. In NGN, services are separated from call control; call control is separated from bearer. In this way, services are independent of network. NGN can provide various services, such as voice services, data services, multimedia services or the integration of several services. node table (NT) A table that stores information such as the block record size, reference accounts of block data, and index locations of block data links in the file allocation table. northbound interface (NBI) An interface that connects to the upper-layer device to provision services and report alarms and performance statistics.

O
OA optical amplifier OADM See optical add/drop multiplexer. OAM See operation, administration and maintenance. OAM&P operation, administration, maintenance and provision OAMPDU operation, administration and maintenance protocol data unit OAMS Optical fiber line Automatic Monitoring System

OAU See optical amplifier unit. OC optical coupler OC-3 optical carrier level 3 OCI open connection indication OCP optical channel protection OCS See Online Charging System. OD optical demultiplexing ODF optical distribution frame ODN See optical distribution network. ODU optical demultiplexing unit ODUk optical channel data unit-k OEQ optical equalizer OFC open fiber control OHP overhead processing OID object identifier OIF See Optical Internetworking Forum. OLA optical line amplifier OLP See optical line protection. OLT optical line terminal OMCC See optical network terminal management and control channel.

OMCI optical network terminal management and control interface OMS optical multiplexing section OMU optical multiplexer unit ONE See optical network element. ONT See optical network terminal. ONU See optical network unit. OOS out of service OP operator variant algorithm configuration field OPA optical power adjust OPEX operating expense OPU optical channel payload unit OPUk optical channel payload unit-k ORB object request broker OSC See optical supervisory channel. OSI See open systems interconnection. OSN optical switch node OSNR See optical signal-to-noise ratio. OSP optical software platform OSPF See Open Shortest Path First. OSS operations support system

OTDR See optical time domain reflectometer. OTM optical terminal multiplexer OTN optical transport network OTS See optical transmission section. OTU See optical transponder unit. OTUk optical channel transport unit-k OUI organizationally unique identifier OWD one-way delay OWSP optical wavelength shared protection Online Charging System (OCS) A system that implements the convergence of online charging and offline charging, voice service charging and data service charging, prepaid subscriber management and postpaid subscriber management. The OCS provides the functions such as rating, subscriber balance management, and real-time monitoring. Open Shortest Path First (OSPF) A link-state, hierarchical interior gateway protocol (IGP) for network routing. Dijkstra's algorithm is used to calculate the shortest path tree. It uses cost as its routing metric. A link state database is constructed with the network topology which is identical on all routers in the area. Optical Internetworking Forum (OIF) A worldwide non-profit organization with membership open to any organization interested in shaping the future of optical internetworking. open systems interconnection (OSI) A framework of ISO standards for communication between different systems made by different vendors, in which the communications process is organized into seven different categories that are placed in a layered sequence based on their relationship to the user. Each layer uses the layer immediately below it and provides a service to the layer above. Layers 7 through 4 deal with end-to-end communication between the message source and destination, and layers 3 through 1 deal with network functions. operation, administration and maintenance (OAM) A group of network support functions that monitor and sustain segment operation, support activities that are concerned with, but not limited to, failure detection, notification, location, and repairs that are intended to eliminate faults and keep a segment in an operational state, and support activities required to provide the services of a subscriber access network to users/subscribers. optical add/drop multiplexer (OADM)

A device that can be used to add the optical signals of various wavelengths to one channel and drop the optical signals of various wavelengths from one channel. optical amplifier unit (OAU) A board that is mainly responsible for amplifying optical signals. The OAU can be used in both the transmitting direction and the receiving direction. optical distribution network (ODN) A network system that includes an OLT; a plurality of ONUs; a first optical network and a second optical network, one of which connects the OLT with the plurality of ONUs; and a bandwidth controller. The bandwidth controller apportions the plurality of ONUs between the first optical network and the second optical network, assigns a predetermined transmission bandwidth to each of the plurality of ONUs, and accepts a bandwidth change of the transmission bandwidth. optical line protection (OLP) A protection mechanism that adopts dual fed and selective receiving principle and singleended switching mode. In this protection, two pairs of fibers are used. One pair of fibers forms the working route. The working route transmits line signals when the line is normal. The other pair of fibers forms the protection route. The protection route carries line signals when the line is broken or the signal attenuation is extremely large. optical network element (ONE) A transport entity that implements the NE functions (terminal multiplexing, add/drop multiplexing, cross-connection and regeneration) in a DWDM layer network. The types of ONEs include OTM, OADM, OLA, REG and OXC. optical network terminal (ONT) A device that terminates the fiber optical network at the customer premises. optical network terminal management and control channel (OMCC) A communication circuit between the OLT and the ONT. It can be an ATM connection or GEM connection. ITU-T Rec. G.984.3 specifies the PLOAM message for the activation VPI/VCI (ATM mode) or PortID (GEM mode) between the OLT and the ONT. The VPI/VCI or PortID of OMCC is planned by the OLT in the PLOAM message. optical network unit (ONU) A form of Access Node that converts optical signals transmitted via fiber to electrical signals that can be transmitted via coaxial cable or twisted pair copper wiring to individual subscribers. optical signal-to-noise ratio (OSNR) The ratio of signal power and noise power in a transmission link. OSNR is the most important index of measuring the performance of a DWDM system. OSNR = signal power/noise power. optical supervisory channel (OSC) A technology that uses specific optical wavelengths to realize communication among nodes in optical transmission network and transmit the monitoring data in a certain channel. optical time domain reflectometer (OTDR) A device that sends a very short pulse of light down a fiber optic communication system and measures the time history of the pulse reflection to measure the fiber length, the light loss and locate the fiber fault. optical transmission section (OTS) A section in the logical structure of optical transport network (OTN). The OTS allows the network operator to perform monitoring and maintenance tasks between NEs. optical transponder unit (OTU)

A device or subsystem that converts the accessed client signals into the G.694.1/G.694.2compliant WDM wavelength.

P
P-CSCF See proxy-call session control function. P2MP point-to-multipoint P2P See point-to-point service. PA power amplifier PAL phase alternating line PAM See pulse amplitude modulation. PAP See Password Authentication Protocol. PBB-TE provider backbone bridge-traffic engineering PBS See peak burst size. PBX private branch exchange PC personal computer PCB See printed circuit board. PCM See pulse code modulation. PCR See peak cell rate. PCRF See policy and charging rules function. PCU See packet control unit. PD product daemon PDF See policy decision function.

PDH See plesiochronous digital hierarchy. PDN packet data network PDP See Packet Data Protocol. PDU protocol data unit PE See provider edge. PEP See policy enforcement point. PFS See perfect forward secrecy. PHB See per-hop behavior. PICMG PCI Industrial Computer Manufacturers Group PID photonics integrated device PIM Protocol Independent Multicast PIM-SM Protocol Independent Multicast - Sparse Mode PIR peak information rate PITP Policy Information Transfer Protocol PLA See physical link aggregation. PLL See phase-locked loop. PLMN public land mobile network PLOAM physical layer OAM PLR See point of local repair. PM See performance management.

PMD polarization mode dispersion PMS Product Management System PMTU See path maximum transmission unit. PMU power monitoring unit POH path overhead PON passive optical network POP See point of presence. POS See packet over SDH/SONET. POTS See plain old telephone service. PPD partial packet discard PPP Point-to-Point Protocol PPPoA Point-to-Point Protocol over ATM PPPoE Point-to-Point Protocol over Ethernet PPPoEoA Point-to-Point Protocol over Ethernet over ATM PPS See prepaid service. PPTP See Point-to-Point Tunneling Protocol. PQ See priority queuing. PRBS See pseudo random binary sequence. PRC primary reference clock PRI primary rate interface

PRL See preferred roaming list. PS packet switched PSB path state block PSD See power spectrum density. PSE See power source equipment. PSI payload structure identifier PSN See packet switched network. PST Pacific Standard Time PSTN See public switched telephone network. PTI payload type indicator PTM See packet transfer mode. PTN packet transport network PTP Precision Time Protocol PVC permanent virtual channel PVID See port default VLAN ID. PVP See permanent virtual path. PW See pseudo wire. PWE3 See pseudo wire emulation edge-to-edge. Packet Data Protocol (PDP) A network protocol used by packet switching external networks to communicate with GPRS networks. Password Authentication Protocol (PAP)

A method of verifying the identity of a user who attempts to log in to a PPP server. This protocol is adopted when a stricter authentication protocol, such as CHAP, cannot take effect, or the user name and password submitted by the user for authentication must be forwarded to other programs without being encrypted. PoE power over Ethernet Point-to-Point Tunneling Protocol (PPTP) A network protocol that enables the secure transfer of data from a remote client to a private enterprise server by creating a VPN across TCP/IP-based data networks. packet control unit (PCU) An entity that enables the communication between the BSC and the SGSN in the GPRS network. The PCU performs functions such as packet radio resource management and packet call control. packet over SDH/SONET (POS) A MAN and WAN technology that provides point-to-point data connections. The POS interface uses SDH/SONET as the physical layer protocol, and supports the transport of packet data (such as IP packets) in MAN and WAN. packet switched network (PSN) A telecommunications network that works in packet switching mode. packet transfer mode (PTM) A transfer mode in which the transmission and switching functions are achieved by packet oriented techniques, so as to dynamically share network transmission and switching resources between a multiplicity of connections. path maximum transmission unit (PMTU) A method of discovering the supported MTU on a specific path by using ICMPv6 Datagram Too Big messages. peak burst size (PBS) A parameter that is used to define the capacity of token bucket P, that is, the maximum burst IP packet size when the information is transferred at the peak information rate. This parameter must be larger than 0. It is recommended that PBS should be not less than the maximum length of the IP packet that might be forwarded. See also CIR, CBS, and PIR. peak cell rate (PCR) The maximum rate at which an ATM connection can accept cells. per-hop behavior (PHB) IETF Diff-Serv workgroup defines forwarding behaviors of network nodes as per-hop behaviors (PHB), such as, traffic scheduling and policing. A device in the network should select the proper PHB behaviors, based on the value of DSCP. At present, the IETF defines four types of PHB. They are class selector (CS), expedited forwarding (EF), assured forwarding (AF), and best-effort (BE). perfect forward secrecy (PFS) A security feature, indicating that the decoding of one key does not affect the security of other keys because these keys have no derivation relationships. performance management (PM) One of five network management categories defined by ISO for management of OSI networks. The performance management system is responsible for analyzing and controlling network performance, including network throughput and error rates. Other four categories are accounting management, configuration management, fault management, and security management.

permanent virtual path (PVP) Virtual path that consists of PVCs. phase-locked loop (PLL) A circuit that consists essentially of a phase detector which compares the frequency of a voltage-controlled oscillator with that of an incoming carrier signal or reference-frequency generator; the output of the phase detector, after passing through a loop filter, is fed back to the voltage-controlled oscillator to keep it exactly in phase with the incoming or reference frequency. physical link aggregation (PLA) Being a technology providing load balancing based on physical layer bandwidths, physical link aggregation (PLA) combines Ethernet transmission paths in several Integrated IP radio links into a logical Ethernet link for higher Ethernet bandwidth and Ethernet transmission reliability. ping A method used to test whether a device in the IP network is reachable according to the sent ICMP Echo messages and received response messages. plain old telephone service (POTS) The basic telephone service provided through the traditional cabling such as twisted pair cables. plesiochronous digital hierarchy (PDH) A multiplexing scheme of bit stuffing and byte interleaving. It multiplexes the minimum rate 64 kit/s into the 2 Mbit/s, 34 Mbit/s, 140 Mbit/s, and 565 Mbit/s rates. point of local repair (PLR) The head-end node of a backup tunnel or a detour tunnel. Services are forwarded to the backup tunnel at this node. point of presence (POP) A physical location where an interexchange carrier installs equipment to interconnect with a local exchange carrier (LEC). point-to-point service (P2P) A service between two terminal users. In P2P services, senders and recipients are terminal users. policy and charging rules function (PCRF) A functional entity defined in 3GPP to implement dynamic QoS policy control, dynamic service-based charging control, and subscription-information-based authorization control. The PCRF is a combination of the policy decision function (PDF) and charging rule function (CRF). policy decision function (PDF) A functional entity used to set policies according to the sessions and related information obtained from the P-CSCF. The PDF is a policy decision point of the SBLP control. policy enforcement point (PEP) A client in the policy system of the intra-domain policy management general model defined by the Policy Framework WG of the Internet Engineering Task Force (IETF). The PEP enforces policy decisions made by the policy decision points (PDPs) using Command-Line Interface (CLI), Simple Network Management Protocol (SNMP), and Common Open Policy Service (COPS). For example, it performs QoS policy control for mobile subscribers. port default VLAN ID (PVID)

A default VLAN ID of a port. It is allocated to a data frame if the data frame carries no VLAN tag when reaching the port. power source equipment (PSE) A piece of equipment that provides power to network devices (switches or hubs for instance) by setting up a Power over Ethernet (PoE). power spectrum density (PSD) The power layout of random signals in the frequency domain. preferred roaming list (PRL) A service that updates the roaming list of a CDMA mobile phone. The roaming list contains a roaming identifier, which indicates the roaming status for the mobile phone. prepaid service (PPS) A user prepays a service before using it and is charged in real time. When the prepaid amount is used up, the system stops providing the service. The user can use the service again only after recharging. printed circuit board (PCB) A board used to mechanically support and electrically connect electronic components using conductive pathways, tracks, or traces, etched from copper sheets laminated onto a nonconductive substrate. priority queuing (PQ) A queue scheduling algorithm based on the absolute priority. According to the PQ algorithm, services of higher priorities are ensured with greater bandwidth, lower latency, and less jitter. Packets of lower priorities must wait to be sent till all packets of higher priorities are sent. In this manner, services of higher priorities are processed earlier than others. provider edge (PE) A device that is located in the backbone network of the MPLS VPN structure. A PE is responsible for managing VPN users, establishing LSPs between PEs, and exchanging routing information between sites of the same VPN. A PE performs the mapping and forwarding of packets between the private network and the public channel. A PE can be a UPE, an SPE, or an NPE. proxy-call session control function (P-CSCF) The initial contact point between subscribers and the IMS during service usage. The P-CSCF: Serves as the agent of all SIP signaling and controls routing of calls. Reserves the QoS resources. Compresses the SIP signaling to improve the bandwidth usage of air interfaces. Provides the NAT control to support the NAT penetration in an intranet. Maintains the security union between the subscribers and the IMS to protect the confidentiality and integrity of the signaling between the UEs and the IMS.

pseudo random binary sequence (PRBS) A sequence that is random in a sense that the value of an element is independent of the values of any of the other elements, similar to real random sequences. pseudo wire (PW) An emulated connection between two PEs for transmitting frames. The PW is established and maintained by PEs through signaling protocols. The status information of a PW is maintained by the two end PEs of a PW. pseudo wire emulation edge-to-edge (PWE3)

An end-to-end Layer 2 transmission technology. It emulates the essential attributes of a telecommunication service such as ATM, FR or Ethernet in a packet switched network (PSN). PWE3 also emulates the essential attributes of low speed time division multiplexing (TDM) circuit and SONET/SDH. The simulation approximates to the real situation. public switched telephone network (PSTN) A telecommunications network established to perform telephone services for the public subscribers. Sometimes it is called POTS. pulse amplitude modulation (PAM) Modulation of pulses in which the pulse magnitude varies in accordance with a given function, generally linear, of the value of the modulating signal. pulse code modulation (PCM) A method of encoding information in a signal by changing the amplitude of pulses. Unlike pulse amplitude modulation (PAM), in which pulse amplitude can change continuously, pulse code modulation limits pulse amplitudes to several predefined values. Because the signal is discrete, or digital, rather than analog, pulse code modulation is more immune to noise than PAM.

Q
QAM See quadrature amplitude modulation. QPSK See quadrature phase shift keying. QinQ A layer 2 tunnel protocol based on IEEE 802.1Q encapsulation. It add a public VLAN tag to a frame with a private VLAN tag to allow the frame with double VLAN tags to be transmitted over the service provider's backbone network based on the public VLAN tag. This provides a layer 2 VPN tunnel for customers and enables transparent transmission of packets over private VLANs. QoS See quality of service. quadrature amplitude modulation (QAM) Both an analog and a digital modulation scheme. It conveys two analog message signals, or two digital bit streams, by changing (modulating) the amplitudes of two carrier waves, using the amplitude-shift keying (ASK) digital modulation scheme or amplitude modulation (AM) analog modulation scheme. These two waves, usually sinusoids, are out of phase with each other by 90 and are thus called quadrature carriers or quadrature components hence the name of the scheme. quadrature phase shift keying (QPSK) A modulation method of data transmission through the conversion or modulation and the phase determination of the reference signals (carrier). It is also called the fourth period or 4phase PSK or 4-PSK. QPSK uses four dots in the star diagram. The four dots are evenly distributed on a circle. On these phases, each QPSK character can perform two-bit coding and display the codes in Gray code on graph with the minimum BER. quality of service (QoS) A commonly-used performance indicator of a telecommunication system or channel. Depending on the specific system and service, it may relate to jitter, delay, packet loss ratio, bit error ratio, and signal-to-noise ratio. It functions to measure the quality of the transmission system and the effectiveness of the services, as well as the capability of a service provider to meet the demands of users.

R
RADIUS See Remote Authentication Dial-In User Service. RAI See routing area identity. RAM See random access memory. RAN See radio access network. RAND See random number. RCP Remote Copy Protocol RD See route distinguisher. RDI remote defect indication RED See random early detection. REG See regenerator. RF See radio frequency. RFC See Request For Comments. RFI radio frequency interference RGB red green blue RIP See Routing Information Protocol. RJ45 registered jack 45 RMEP remote maintenance association end point RMON See remote monitor. RMRI See required Min Rx interval.

RMS resource management system RNC See radio network controller. ROADM reconfigurable optical add/drop multiplexer RP rendezvous point RPF See reverse path forwarding. RPR resilient packet ring RPT An operand in COPS. The PEP uses it to report the following contents to the PDP: 1. Whether the policy execution is successful or not 2. A state change RPU See resource process unit. RR See route reflector. RRC radio resource control RRPP See Rapid Ring Protection Protocol. RS regenerator section RS232 A asynchronous transfer mode that does not involve hand-shaking signal. It can communicate with RS232 and RS422 of other stations in point-to-point mode and the transmission is transparent. Its highest speed is 19.2kbit/s. RS422 The specification that defines the electrical characteristics of balanced voltage digital interface circuits. The interface can change to RS232 via the hardware jumper and others are the same as RS232. RSA See Revist-Shamir-Adleman Algorithm. RSB reservation state block RSOH regenerator section overhead RST regenerator section termination

RSTP See Rapid Spanning Tree Protocol. RSVP See Resource Reservation Protocol. RSVP-TE See Resource ReserVation Protocol-Traffic Engineering. RT route target RTCP See Real-time Transport Control Protocol. RTD See round-trip delay. RTN radio transmission node RTP See Real-time Transport Protocol. RTSP Real-Time Streaming Protocol RTT round trip time RTU See remote test unit. RX receive Rapid Ring Protection Protocol (RRPP) An Ethernet ring-specific link layer protocol. It cannot only prevent data loop from causing broadcast storm efficiently when the Ethernet ring is complete, but also restore communication channels among nodes on the Ethernet ring rapidly when a link is torn down. Rapid Spanning Tree Protocol (RSTP) An evolution of the Spanning Tree Protocol, providing for faster spanning tree convergence after a topology change. The RSTP protocol is backward compatible with the STP protocol. Real-time Transport Control Protocol (RTCP) A protocol used to monitor data delivery. RTCP enables the receiver to detect if there is any packet loss and to compensate for any delay jitter. Real-time Transport Protocol (RTP) A protocol defined by the IETF for transmitting audio and video streams. RTP is based on UDP. In the RTP header, a time stamp is defined to ensure that audio and video data can be transmitted and synchronized in real time. H.323 is based on RTP. Remote Authentication Dial-In User Service (RADIUS) A security service that authenticates and authorizes dial-up users and is a centralized access control mechanism. RADIUS uses the User Datagram Protocol (UDP) as its transmission protocol to ensure real-time quality. RADIUS also supports the retransmission and multiserver mechanisms to ensure good reliability.

Request For Comments (RFC) A document in which a standard, a protocol, or other information pertaining to the operation of the Internet is published. The RFC is actually issued, under the control of the IAB, after discussion and serves as the standard. RFCs can be obtained from sources such as InterNIC. Resource ReserVation Protocol-Traffic Engineering (RSVP-TE) An extension to the RSVP protocol for setting up label switched paths (LSPs) in MPLS networks. The RSVP-TE protocol is used to establish and maintain the LSPs by initiating label requests and allocating label binding messages. It also supports LSP rerouting and LSP bandwidth increasing. Resource Reservation Protocol (RSVP) A network control protocol like Internet Control Message Protocol (ICMP) and designed for Integrated Service and used to reserve resources on every node along a path. RSVP operates on the transport layer; however, RSVP does not transport application data. Revist-Shamir-Adleman Algorithm (RSA) An asymmetric cryptographic algorithm, which is recommended by Public-Key Cryptography Standards (PKCS) and widely used in electronic commerce. The RSA algorithm is developed based on the fact that it is easy to multiply two large prime numbers but difficult to factoring their product. Therefore their product is used as the encryption key. The RSA algorithm can resist all known password attacks. It has been recommended as the public key encryption standard by International Organization for Standardization (ISO). Routing Information Protocol (RIP) A simple routing protocol that is part of the TCP/IP protocol suite. It determines a route based on the smallest hop count between source and destination. RIP is a distance vector protocol that routinely broadcasts routing information to its neighboring routers and is known to waste bandwidth. radio access network (RAN) The network that provides the connection between CPEs and the CN. It isolates the CN from wireless network. radio frequency (RF) A type of electric current in the wireless network using AC antennas to create an electromagnetic field. It is the abbreviation of high-frequency AC electromagnetic wave. The AC with the frequency lower than 1 kHz is called low-frequency current. The AC with frequency higher than 10 kHz is called high-frequency current. RF can be classified into such high-frequency current. radio network controller (RNC) A piece of equipment in the RNS which is in charge of controlling the use and the integrity of the radio resources. random access memory (RAM) Semiconductor-based memory that can be read and written by the central processing unit (CPU) or other hardware devices. The storage locations can be accessed in any order. Note that the various types of ROM memory are capable of random access but cannot be written to. The term RAM, however, is generally understood to refer to volatile memory that can be written to as well as read. random early detection (RED) A packet loss algorithm used in congestion avoidance. It discards the packet according to the specified higher limit and lower limit of a queue so that global TCP synchronization resulting from traditional tail drop can be prevented. random number (RAND)

A number selected from a known set of numbers in such a way that each number in the set has the same probability of occurrence. This number is typically used in the authentication and ciphering process. real-time variable bit rate (rt-VBR) A parameter intended for real-time applications, such as compressed voice over IP (VoIP) and video conferencing. The rt-VBR is characterized by a peak cell rate (PCR), sustained cell rate (SCR), and maximum burst size (MBS). You can expect the source device to transmit in bursts and at a rate that varies with time. regenerator (REG) A piece of equipment or device that regenerates electrical signals. remote monitor (RMON) A widely used network management standard defined by the IETF, and it enhances the MIB II standard greatly. It is mainly used to monitor the data traffic over a network segment or the entire network. RMON is completely based on the SNMP architecture, including the NMS and the Agent running on each network device. remote test unit (RTU) A subsystem capable of collecting, pre-processing, and sending data coming from the field sensors to the SCU. required Min Rx interval (RMRI) The minimum interval between receiving BFD control packets on the local device. resource process unit (RPU) A progress configured on the board where the resource manager subsystem (RMS) resides. It provides functions such as policy packaging, resource calculation, and preservation. reverse path forwarding (RPF) A technology that reduces the overhead of flooding. With RPF, a router accepts a packet with source address S only from link L, if L is the link which the router would use for forwarding S. round-trip delay (RTD) The time from first bit/byte of the Ranging-request in the downstream frame till the reception of the Ranging-transmission's last bit/byte. It is used for the calculation of the EqualizationDelay. route distinguisher (RD) A 8-byte field in a VPN IPv4 address. An RD and a 4-byte IPv4 address prefix construct a VPN IPv4 address, which is used to differentiate the IPv4 prefixes using the same address space. route reflector (RR) In an AS, one router severs as a Route Reflector (RR) and the other routers serve as clients. The clients establish IBGP connections with the RR. The RR and its clients form a cluster. The RR reflects routes between clients, and thus clients do not need to establish BGP connections. routing area identity (RAI) An identity that is composed of the location area code (LAC) and the routing area code (RAC). It is used for paging and registration purposes. rt-VBR See real-time variable bit rate.

S
S-VLAN

service virtual local area network SA See security association. SAN See service access number. SAP service access point SAPI source access point identifier SAToP Structure-Agnostic Time Division Multiplexing over Packet SBLP See service-based local policy. SBM Successful Backward setup information Message SCA selective call acceptance SCC synchronous common channel SCN switched circuit network SCP See service control point. SCR sustainable cell rate SCSI small computer system interface SCTP See Stream Control Transmission Protocol. SD See signal degrade. SD-SDI See standard definition-serial digital interface signal. SDH See synchronous digital hierarchy. SDI See serial digital interface. SDL See specification and description language. SDLC

synchronous data link control SDP See Session Description Protocol. SDRAM See synchronous dynamic random access memory. SDSL symmetric digital subscriber line SDU See service data unit. SE shared explicit SELT See single-ended loop test. SEP system expand card SES severely errored second SETS synchronous equipment timing source SF See signal fail. SFP small form-factor pluggable SFTP See Secure File Transfer Protocol. SFU See switch fabric unit. SG See service guide. SGML Standard Generalized Markup Language SGSN See serving GPRS support node. SGW See service gateway. SHA See secure hash algorithm. SHDSL See single-pair high-speed digital subscriber line. SHDSL.bis

single-pair high-speed digital subscriber line.bis SI See service integrator. SIG See security immunity gateway. SIGTRAN See Signaling Transport. SIM See Security Information Mangement. SIMM single inline memory module SIP Session Initiation Protocol SLA See service level agreement. SLIP See Serial Line Interface Protocol. SM security management SMB Server Message Block SMC short message center SMI structure of management information SML service management layer SMS short message service SMTP See Simple Mail Transfer Protocol. SN See service name. SNAP Subnetwork Access Protocol SNC subnetwork connection SNCMP subnetwork connection multipath protection SNCP

subnetwork connection protection SNCTP subnetwork connection tunnel protection SNI service node interface SNML subnetwork management layer SNMP See Simple Network Management Protocol. SNMS subnetwork management system SNP special number presentation SNR See signal-to-noise ratio. SNTP See Simple Network Time Protocol. SOAP Simple Object Access Protocol SOH section overhead SOHO small office home office SONET See synchronous optical network. SP See signaling point. SPC semi-permanent connection SPE See superstratum provider edge. SPF shortest path first SPI See security parameter index. SPID subscriber profile ID SPRing See MPLS-TP shared protection ring. SPT

shortest path tree SPU service process unit SQ See subscriber queue. SRA seamless rate adaptation SRAM See static random access memory. SRG See shared risk group. SRLG shared risk link group SRS stimulated Raman scattering SRU switching and routing unit SS streaming server SSG service selection gateway SSH See Secure Shell. SSL See Secure Sockets Layer. SSM See Synchronization Status Message. SSMB synchronization status message byte SSU synchronization supply unit STB set-top box STG synchronous timing generator STI service trigger information STM See synchronous transport module. STM-1

See Synchronous Transport Module level 1. STM-16 Synchronous Transport Module level 16 STM-4 Synchronous Transport Module level 4 STM-N Synchronous Transport Module level N STP Spanning Tree Protocol SVC See switched virtual circuit. Secure File Transfer Protocol (SFTP) A network protocol designed to provide secure file transfer over SSH. Secure Shell (SSH) A set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. A feature to protect information and provide powerful authentication function for a network when a user logs in to the network through an insecure network. It prevents IP addresses from being deceived and simple passwords from being captured. Secure Sockets Layer (SSL) A security protocol that works at a socket level. This layer exists between the TCP layer and the application layer to encrypt/decode data and authenticate concerned entities. Security Information Mangement (SIM) SIM provides reporting and analysis of data primarily from host systems and applications, and secondarily from security devices to support security policy compliance management, internal threat management and regulatory compliance initiatives. Serial Line Interface Protocol (SLIP) A protocol that defines the framing mode over the serial line to implement transmission of messages over the serial line and provide the remote host interconnection function with a known IP address. Session Description Protocol (SDP) A protocol intended for describing multimedia sessions for the purposes of session announcement, session invitation, and other forms of multimedia session initiation. Signaling Transport (SIGTRAN) A protocol stack for the transport of SCN (Switched Circuit Network) signaling protocols (SS7/C7) over an IP network. SIGTRAN is applied to IP network to support the IP interworking between the traditional narrowband telecommunication network PSTN and wideband network. Simple Mail Transfer Protocol (SMTP) The TCP/IP protocol which facilitates the transfer of electronic-mail messages, specifies how two systems are to interact, and the format of messages used to control the transfer of electronic mail. Simple Network Management Protocol (SNMP) A network management protocol of TCP/IP. It enables remote users to view and modify the management information of a network element. This protocol ensures the transmission of management information between any two points. The polling mechanism is adopted to

provide basic function sets. According to SNMP, agents, which can be hardware as well as software, can monitor the activities of various devices on the network and report these activities to the network console workstation. Control information about each device is maintained by a management information block. Simple Network Time Protocol (SNTP) A protocol that is adapted from the Network Time Protocol (NTP) and synchronizes the clocks of computers over the Internet. Stream Control Transmission Protocol (SCTP) A transport layer protocol used between the SCTP user application and a connectionless packet network. In the SIGTRAN protocol stack, the upper-layer user of SCTP is the adaptation module of the SCN signaling, for example, M2UA and M2UA, and the lower layer of SCTP is the IP network. The SCTP protocol delivers the higher reliability, optimum realtime performance, and multi-homing feature for signaling transmission. Synchronization Status Message (SSM) A message that carries quality levels of timing signals on a synchronous timing link. Nodes on an SDH network and a synchronization network acquire upstream clock information through this message. Then the nodes can perform proper operations on their clocks, such as tracing, switching, or converting to holdoff, and forward the synchronization information to downstream nodes. Synchronous Transport Module level 1 (STM-1) Synchronous transfer mode at 155 Mbit/s. secure hash algorithm (SHA) A technique that computes a 160-bit condensed representation of a message or data file, called a message digest. The SHA is used by the sender and the receiver of a message in computing and verifying a digital signature, for security purposes. security association (SA) Security information that is shared by the BS and the MS and is used for communication encryption. The SA includes key information and encryption algorithms. security immunity gateway (SIG) A gateway that checks the security status of the computer network by monitoring the source of the network worm virus, that is, the PCs. It prompts an unsecure PC to reinforce the system or kill the virus. It also isolates or restricts the computer already infected with the worm virus in network access according to the security access strategy. security parameter index (SPI) A pointer that references the session key and algorithm used to protect the data being transported. The index is defined during the SA (Security Association) and described in the ESP (Encapsulating Security Payload) or AH (Authentication Header) extension to the IP header. serial digital interface (SDI) An interface that transmits data in a single channel in sequence. service access number (SAN) A service access ID that a service provider (SP) allocates to each service in service series. The service access number is usually extended from the SP access number and used when the SP sends short messages or multimedia messages. service control point (SCP) A physical entity in the intelligent network that fulfills the following functions: Controlling services

Storing subscriber data and service logics Receiving query requests from the service switching point (SSP) and implementing database query to carry out decoding Initiating service logics according to the call events reported by the SSP Setting up intelligent calls by sending call control instructions to the SSP based on service logics

service data unit (SDU) Data transferred between adjacent layers in the protocol stack. service gateway (SGW) A gateway that provides functions such as access, authentication, control, and scheduling of WAP services. The SGW is independent of a service gateway and provides contents and volume charging based on WAP. service guide (SG) A server that provides Electronic Program Guide (EPG) for mobile users. service integrator (SI) An integrator for customizing and developing services for ECs. service level agreement (SLA) A service agreement between a customer and a service provider. SLA specifies the service level for a customer. The customer can be a user organization (source domain) or another differentiated services domain (upstream domain). An SLA may include traffic conditioning rules which constitute a traffic conditioning agreement as a whole or partially. service name (SN) Name of an intelligent network (IN) service. One service name corresponds to one service ID. service-based local policy (SBLP) A mechanism based on the SDP parameters in IMS sessions. The SBLP enables the GPRS to interact with the IMS. The SBLP also provides IMS media resource authorization and control. serving GPRS support node (SGSN) A functional entity used for providing packet data services. It is responsible for forwarding incoming/outgoing Internet Protocol (IP) packets to mobile stations (MSs) within the service area of the SGSN. It traces the location of an individual MS and performs security functions and access control. In Universal Mobile Telecommunications System (UMTS) networks, the SGSN is connected to the radio network controller (RNC) over the Iu-PS interface. It requests policy decision point (PDP) contexts from the Gateway GPRS Support Node (GGSN). shared risk group (SRG) A group of resources that share a common risk component whose failure can cause the failure of all the resources in the group. signal degrade (SD) A signal indicating that associated data has degraded in the sense that a degraded defect condition is active. signal fail (SF) A signal indicating that associated data has failed in the sense that a near-end defect condition (non-degrade defect) is active. signal-to-noise ratio (SNR)

The ratio of the amplitude of the desired signal to the amplitude of noise signals at a given point in time. SNR is expressed as 10 times the logarithm of the power ratio and is usually expressed in dB (Decibel). signaling point (SP) A node that sends or receives signaling messages in a signaling network. It can be an OPC or a DPC. single-ended loop test (SELT) An automated way of testing a DSL loop from one end of the line, providing operators with a method for efficiently evaluating their loop as part of their daily operational practices. single-pair high-speed digital subscriber line (SHDSL) A symmetric digital subscriber line technology developed from HDSL, SDSL, and HDSL2, which is defined in ITU-T G.991.2. The SHDSL port is connected to the user terminal through the plain telephone subscriber line and uses trellis coded pulse amplitude modulation (TCPAM) technology to transmit high-speed data and provide the broadband access service. smart VLAN A special VLAN that can contain the standard ports and the service virtual ports. The broadcast domain of a standard port includes all ports in the Smart VLAN, whereas the broadcast domain of a service virtual port includes only standard ports. specification and description language (SDL) A formal, object-oriented language defined by ITU-T as recommendation Z.100. standard definition-serial digital interface signal (SD-SDI) Standard definition video signal transported by serial digital interface. static random access memory (SRAM) A type of random access memory. Its contents can be saved only if the SRAM is provided with the uninterrupted power supply. Unlike the DRAM, the SRAM does not need to be refreshed repeatedly. subscriber queue (SQ) A virtual queue. Each SQ maps eight types of FQ priority and can be configured with one to eight FQs. Idle queues cannot be used by other SQs. One to eight FQs share the total SQ bandwidth. superstratum provider edge (SPE) Core devices that are located within a VPLS full-meshed network. The UPE devices that are connected with the SPE devices are similar to the CE devices. The PWs set up between the UPE devices and the SPE devices serve as the ACs of the SPE devices. The SPE devices must learn the MAC addresses of all the sites on UPE side and those of the UPE interfaces that are connected with the SPE. SPE is sometimes called NPE. switch fabric unit (SFU) A switch fabric used for individual family users. It functions as a broadband access terminal, provides Ethernet and IP services; supports CATV services optionally. It is mainly applicable to FTTH networks. switched virtual circuit (SVC) A logical connection between two nodes on a packet-switching network that is established only when data is to be transmitted. synchronous digital hierarchy (SDH) A transmission scheme that follows ITU-T G.707, G.708, and G.709. It defines the transmission features of digital signals such as frame structure, multiplexing mode, transmission rate level, and interface code. SDH is an important part of ISDN and B-ISDN. It interleaves the bytes of low-speed signals to multiplex the signals to high-speed counterparts,

and the line coding of scrambling is used only for signals. SDH is suitable for the fiber communication system with high speed and a large capacity since it uses synchronous multiplexing and flexible mapping structure. synchronous dynamic random access memory (SDRAM) A new type of DRAM that can run at much higher clock speeds than conventional memory. SDRAM actually synchronizes itself with the CPU's bus and is capable of running at 100 MHz, about three times faster than conventional FPM RAM, and about twice as fast as EDO DRAM or BEDO DRAM. SDRAM is replacing EDO DRAM in computers. synchronous optical network (SONET) A high-speed network that provides a standard interface for communications carriers to connect networks based on fiber optical cable. SONET is designed to handle multiple data types (voice, video, and so on). It transmits at a base rate of 51.84 Mbit/s, but multiples of this base rate go as high as 2.488 Gbit/s. synchronous transport module (STM) An information structure used to support section layer connections in the SDH. It consists of information payload and Section Overhead (SOH) information fields organized in a block frame structure which repeats every 125. The information is suitably conditioned for serial transmission on the selected media at a rate which is synchronized to the network. A basic STM is defined at 155 520 kbit/s. This is termed STM-1. Higher capacity STMs are formed at rates equivalent to N times this basic rate. STM capacities for N = 4, N = 16 and N = 64 are defined; higher values are under consideration.

T
T-CONT transmission container T1 A North American standard for high-speed data transmission at 1.544Mbps. It provides 24 x 64 kbit/s channels. TC-PAM trellis coded pulse amplitude modulation TCA threshold crossing alert TCI tag control information TCM tandem connection monitor TCP See Transmission Control Protocol. TCP/IP Transmission Control Protocol/Internet Protocol TD transmit degrade TDC tunable dispersion compensator TDD

time division duplex TDM See time division multiplexing. TDMA See Time Division Multiple Access. TE See traffic engineering. TEDB See traffic engineering database. TEI terminal endpoint identification TEID See tunnel endpoint identifier. TFTP See Trivial File Transfer Protocol. TI transaction identifier TID terminal ID TL1 Transaction Language 1 TLS Transport Layer Security TLV See type-length-value. TM See terminal multiplexer. TMF TeleManagement Forum TMN See telecommunications management network. TMSI See temporary mobile subscriber identity. TNA transport network assigned address TOD time of day TOP task oriented practice TOS

test operation system TP See topology protection. TPID tag protocol identifier TPS See tributary protection switching. TSD trail signal degrade TTI trail trace identifier TTSI See trail termination source identifier. TU tributary unit TU-LOP tributary unit loss of pointer TUG tributary unit group TX transmit Time Division Multiple Access (TDMA) An approach used for allocating a single channel among many users, by dividing the channel into different timeslots during which each user has access to the medium. Transmission Control Protocol (TCP) The protocol within TCP/IP that governs the breakup of data messages into packets to be sent using Internet Protocol (IP), and the reassembly and verification of the complete messages from packets received by IP. A connection-oriented, reliable protocol (reliable in the sense of ensuring error-free delivery), TCP corresponds to the transport layer in the ISO/OSI reference model. Triple Data Encryption Standard (3DES) In cryptography, Triple DES (3DES) is the common name for the Triple Data Encryption Algorithm (TDEA) block cipher, which applies the Data Encryption Standard (DES) cipher algorithm three times to each data block. Because the key size of the original DES cipher was becoming problematically short, Triple DES was designed to provide a relatively simple method of increasing the key size (three 56-bit DES keys) of DES to protect against brute force attacks, without designing a completely new block cipher algorithm. Trivial File Transfer Protocol (TFTP) A small and simple alternative to FTP for transferring files. TFTP is intended for applications that do not need complex interactions between the client and server. TFTP restricts operations to simple file transfers and does not provide authentication. TFTP is small enough to be contained in ROM to be used for bootstrapping diskless machines. telecommunications management network (TMN)

A protocol model defined by ITU-T for managing open systems in a communications network. An architecture for management, including planning, provisioning, installation, maintenance, operation and administration of telecommunications equipment, networks and services. temporary mobile subscriber identity (TMSI) Temporary Mobile Subscriber Identity. A temporary mobile station identification assigned by the MSC. The TMSI is stored in the VLR and the SIM card and used by the MS to originate and receive calls. One TMSI maps to only one IMSI in a VLR area. The TMSI is used to conceal the international mobile subscriber identity (IMSI) for sake of security. terminal multiplexer (TM) A device used at a network terminal to multiplex multiple channels of low rate signals into one channel of high rate signals, or to demultiplex one channel of high rate signals into multiple channels of low rate signals. time division multiplexing (TDM) A multiplexing technology. TDM divides the sampling cycle of a channel into time slots (TSn, n=0, 1, 2, 3), and the sampling value codes of multiple signals engross time slots in a certain order, forming multiple multiplexing digital signals to be transmitted over one channel. topology protection (TP) Frames that are used to quickly detect topology changes and perform protection switching within 50 ms. In addition, the frames can be sent strictly according to the sequence without disorder or repeated sending. TP frames contain the topology information including the east and west span protection states, protection configuration information and whether to allow the jumbo frame pass through. traceroute A program that prints the path to a destination. Traceroute sends a sequence of datagrams with the time-to-live (TTL) set to 1,2, and so on, and uses ICMP time exceeded messages that return to determine routers along the path. traffic engineering (TE) A technology that is used to dynamically monitor the traffic of the network and the load of the network elements, to adjust in real time the parameters such as traffic management parameters, route parameters and resource restriction parameters, and to optimize the utilization of network resources. The purpose is to prevent the congestion caused by unbalanced loads. traffic engineering database (TEDB) A type of database that every router generates after collecting the information about TE of every links in its area. TEDB is the base of forming the dynamic TE path in the MPLS TE network. trail termination source identifier (TTSI) A TTSI uniquely identifies an LSP in the network. A TTSI is carried in the connectivity verification (CV) packet for checking the connectivity of a trail. If it matches the TTSI received by the sink point, the trail has no connectivity defect. tributary protection switching (TPS) A function that uses a standby tributary processing board to protect N tributary processing boards. tunnel ID A group of information, including the token, slot number of an outgoing interface, tunnel type, and location method. tunnel endpoint identifier (TEID)

A concept of the GTPv1. A TEID is used to identify a tunnel of PDP contexts. The TEID contains the TEID of the user plane and the TEID of the control plane. The TEID is assigned by the GGSN and the SGSN. type-length-value (TLV) An encoding type that features high efficiency and expansibility. It is also called Code-LengthValue (CLV). T indicates that different types can be defined through different values. L indicates the total length of the value field. V indicates the actual data of the TLV and is most important. TLV encoding features high expansibility. New TLVs can be added to support new features, which is flexible in describing information loaded in packets.

U
UART universal asynchronous receiver/transmitter UAS See user agent server. UAT See unavailable time event. UBR unspecified bit rate UBR+ Unspecified Bit Rate Plus UDP See User Datagram Protocol. UDT user data transfer UE user equipment UI user interface UID user identity UMS See unified message service. UMTS See Universal Mobile Telecommunications System. UNI See user-to-network interface. UPC See usage parameter control. UPDATE A SIP request. It is used to modify session attributes at the initial stage or establishment stage of a session.

UPE user-end provider edge UPM uninterruptible power module URI See uniform resource identifier. URL uniform resource locator URPF See unicast reverse path forwarding. USB See Universal Serial Bus. USM user-based security model USP See universal service platform. UTC See Coordinated Universal Time. Universal Mobile Telecommunications System (UMTS) A 3G mobile technology that will deliver broadband information at speeds up to 2 Mbit/s. Besides voice and data, UMTS will deliver audio and video to wireless devices anywhere in the world through fixed, wireless and satellite systems. Universal Serial Bus (USB) A serial bus standard to interface devices. It was designed for computers such as PCs and the Apple Macintosh, but its popularity has prompted it to also become commonplace on video game consoles and PDAs. User Datagram Protocol (UDP) A TCP/IP standard protocol that allows an application program on one device to send a datagram to an application program on another. User Datagram Protocol (UDP) uses IP to deliver datagram. UDP provides application programs with the unreliable connectionless packet delivery service. There is a possibility that UDP messages will be lost, duplicated, delayed, or delivered out of order. The destination device does not confirm whether a data packet is received. unavailable time event (UAT) An event that is reported when the monitored object generates 10 consecutive severely errored seconds (SES) and the SESs begin to be included in the unavailable time. The event will end when the bit error ratio per second is better than 10-3 within 10 consecutive seconds. unicast reverse path forwarding (URPF) A feature that helps to prevent network attacks based on spoofed IP source addresses. unified message service (UMS) A telecommunication service that integrates multiple communication methods such as phone call, fax, paging, email, and personal information management (PIM). By using the unified message service, a user can receive, in any of the mentioned methods, messages that are sent by phone call, fax, paging, or email. uniform resource identifier (URI)

A string of characters for identifying an abstract or physical resource. universal service platform (USP) A universal software and hardware platform that is used to process services. Developed by Huawei, the USP uses the IA processor and complies with the PICMG 3.X standard. usage parameter control (UPC) During communications, UPC is implemented to monitor the actual traffic on each virtual circuit that is input to the network. Once the specified parameter is exceeded, measures will be taken to control. NPC is similar to UPC in function. The difference is that the incoming traffic monitoring function is divided into UPC and NPC according to their positions. UPC locates at the user/network interface, while NPC at the network interface. user agent server (UAS) An entity for processing SIP requests and generating response messages. user-to-network interface (UNI) The interface between user equipment and private or public network equipment (for example, ATM switches).

V
V-NNI virtual network-network interface V-UNI See virtual user-network interface. V.24 The physical layer interface specification between DTE and DCE defined by the ITU-T. It complies with EIA/TIA-232. V.35 The synchronous physical layer protocol defined by the ITU-T. It is used for communication between network access devices and the packet-based network. V.35 is mainly used in America and Europe. VAG virtual access gateway VB virtual bridge VBAS virtual broadband access server VBR See variable bit rate. VC See virtual channel. VCC See virtual channel connection. VCCV virtual circuit connectivity verification VCG

See virtual concatenation group. VCI virtual channel identifier VCL virtual channel link VCO voltage-controlled oscillator VCS Veritas Cluster Server VCTRUNK A virtual concatenation group applied in data service mapping, also called the internal port of a data service processing board. VDSL very-high-data-rate digital subscriber line VDSL2 See very-high-speed digital subscriber line 2. VE virtual Ethernet VGMP VRRP Group Management Protocol VIP very important person VLAN virtual local area network VLAN switch A technology that sets up the switching table based on the interface and VLAN. Based on the switching table, the device replaces the incoming VLAN tag of a received packet with the outgoing VLAN tag to implement the point-to-point transmission for Ethernet services. VLL virtual leased line VLR See visitor location register. VOA variable optical attenuator VP See virtual path. VPDN virtual private dial-up network VPI See virtual path identifier. VPLS

See virtual private LAN service. VPN virtual private network VPN-Target A BGP extended community attribute that is also called Route Target. In BGP/MPLS IP VPN, VPN-Target is used to control VPN routing information. The VPN-Target attribute defines which sites can receive a VPN IPv4 route and the routes from which sites can be received by a PE. VPNDB VPN database VPWS See virtual private wire service. VRF VPN routing and forwarding VRP See Versatile Routing Platform. VRRP See Virtual Router Redundancy Protocol. VS virtual system VSI See virtual switch instance. VT virtual terminal VTY See virtual type terminal. Versatile Routing Platform (VRP) A fruit of Huawei's many years of research and application experience in the field of network. VRP is a network OS incorporating Huawei's proprietary intellectual properties and capable of supporting various network systems of Huawei. It features a powerful IP forwarding engine as its core, and a perfect integration of real time OS technology, equipment and network management technology and various network application technologies through an advanced architectural design. As a scalable platform capable of sustained evolution with open interfaces, it supports a large number of protocols and features with great flexibility. With this platform, you can build an end-end, secure network of high efficiency, great intelligence, and easy manageability. Huawei has obtained a lot of experience in network running through the massive application of its network products and gained sufficient knowledge of various customer requirements. Such experience and knowledge serve as the basis for the design of the VRP so that the platform can adapt to most of the application environments through its support of diverse protocols and features. Virtual Router Redundancy Protocol (VRRP) A protocol used for multicast or multicast LANs such as an Ethernet. A group of routers (including an active router and several backup routers) in a LAN is regarded as a virtual router, which is called a backup group. The virtual router has its own IP address. The host in the network communicates with other networks through this virtual router. If the active router in the backup group fails, one of the backup routers in this backup group becomes active and provides routing service for the host in the network.

VoIP See voice over IP. variable bit rate (VBR) One of the traffic classes used by ATM (Asynchronous Transfer Mode). Unlike a permanent CBR (Constant Bit Rate) channel, a VBR data stream varies in bandwidth and is better suited to non real time transfers than to real-time streams such as voice calls. very-high-speed digital subscriber line 2 (VDSL2) An extension of the VDSL technology, which complies with ITU G.993.2, supports multiple spectrum profiles and encapsulation modes, and provides short-distance and high-speed access solutions to the next-generation FTTx access service. virtual channel (VC) Any logical connection in the ATM network. A VC is the basic unit of switching in the ATM network and is uniquely identified by a virtual path identifier (VPI)/virtual channel identifier (VCI) value. It is the channel on which ATM cells are transmitted by a switch. virtual channel connection (VCC) A VC logical trail that carries data between two end points in an ATM network. A point-tomultipoint VCC is a set of ATM virtual connections between two or multiple end points. virtual concatenation group (VCG) A group of co-located member trail termination functions that are connected to the same virtual concatenation link virtual path (VP) A bundle of virtual channels, all of which are switched transparently across an ATM network based on a common VPI. virtual path identifier (VPI) The field in the Asynchronous Transfer Mode (ATM) cell header that identifies to which virtual path the cell belongs. virtual private LAN service (VPLS) A type of point-to-multipoint L2VPN service provided over the public network. VPLS enables geographically isolated user sites to communicate with each other through the MAN/WAN as if they are on the same LAN. virtual private wire service (VPWS) A technology that bears Layer 2 services. VPWS emulates services such as ATM, FR, Ethernet, low-speed TDM circuit, and SONET/SDH in a PSN. virtual switch instance (VSI) An instance through which the physical access links of VPLS can be mapped to the virtual links. Each VSI provides independent VPLS service. VSI has Ethernet bridge function and can terminate PW. virtual type terminal (VTY) A logical terminal line that is used to access the device through Telnet. virtual user-network interface (V-UNI) A virtual user-network interface, works as an action point to perform service classification and traffic control in HQoS. visitor location register (VLR) A dynamic database that stores the short-term information of a subscriber who roams to the local MSC for call setup. This function of the VLR reduces the signaling link load from the

MSC to the HLR. Another function of the VLR is to assign subscribers MSRNs during roaming. voice over IP (VoIP) An IP telephony term for a set of facilities used to manage the delivery of voice information over the Internet. VoIP involves sending voice information in a digital form in discrete packets rather than by using the traditional circuit-committed protocols of the public switched telephone network (PSTN).

W
W3C World Wide Web Consortium WAE wireless application environment WAN See wide area network. WAP See Wireless Application Protocol. WCDMA See Wideband Code Division Multiple Access. WDM wavelength division multiplexing WFQ See weighted fair queuing. WINS Windows Internet Name Service WLAN See wireless local area network. WML WAP markup language WMS wholesale managed service WRED See weighted random early detection. WRR weighted round robin WSDL web services description language WSS wavelength selective switching WTR See wait to restore.

WWW See World Wide Web. WXCP See wavelength cross-connection protection. Web LCT The local maintenance terminal of a transport network, which is located at the NE management layer of the transport network. Wi-Fi See Wireless Fidelity. WiMAX See Worldwide Interoperability for Microwave Access. Wideband Code Division Multiple Access (WCDMA) A standard defined by the ITU-T for the third-generation wireless technology derived from the Code Division Multiple Access (CDMA) technology. Wireless Application Protocol (WAP) A set of specifications, developed by the WAP Forum, that lets developers using Wireless Markup Language build networked applications designed for handheld wireless devices. It is a standard designed to allow the content of the Internet to be viewed on the screen of a mobile device such as mobile phones, personal organizers and pagers. WAP also overcomes the processing limitation of such devices. The information and services available are stripped down to their basic text format. Wireless Fidelity (Wi-Fi) A short-distant wireless transmission technology. It enables wireless access to the Internet within a range of hundreds of feet wide. World Wide Web (WWW) A large scale hypermedia information system that allows users to browse information. Worldwide Interoperability for Microwave Access (WiMAX) A wireless MAN access technology based on the IEEE802.16 standard. It uses the microwave and millimetric wave bands, and has a coverage of dozens of kilometers. wait to restore (WTR) The number of minutes to wait before services are switched back to the working line. wavelength cross-connection protection (WXCP) A type of channel protection based on ring network. Also called the GE ADM protection service, it adopts the dual fed and selective receiving principle and uses the cross-connection function to achieve service switching between working and protection channels. weighted fair queuing (WFQ) A fair queue scheduling algorithm based on bandwidth allocation weights. This scheduling algorithm allocates the total bandwidth of an interface to queues, according to their weights and schedules the queues cyclically. In this manner, packets of all priority queues can be scheduled. weighted random early detection (WRED) A packet loss algorithm used for congestion avoidance. It can prevent the global TCP synchronization caused by traditional tail-drop. WRED is favorable for the high-priority packet when calculating the packet loss ratio. wide area network (WAN)

A network composed of computers which are far away from each other which are physically connected through specific protocols. WAN covers a broad area, such as a province, a state or even a country. wireless local area network (WLAN) A hybrid of the computer network and the wireless communication technology. It uses wireless multiple address channels as transmission media and carriers out data interaction through electromagnetic wave to implement the functions of the traditional LAN.

X
X.21 ITU-T standard for serial communications over synchronous digital lines. It is mainly used in Europe and Japan. X.25 A data link layer protocol. It defines the communication in the Public Data Network (PDN) between a host and a remote terminal. XAUI 10 gigabit Ethernet Attachment Unit Interface XCS cross-connect and synchronous timing board XML See Extensible Markup Language. XPIC See cross polarization interference cancellation. XPM cross-phase modulation XRES See expected response. xDSL x digital subscriber line

Y
Y.1731 The OAM protocol introduced by the ITU-T. Besides the contents defined by IEEE802.1ag, ITU-T Recommendation Y.173 also defines the following combined OAM messages: Alarm Indication Signal (AIS), Remote Defect Indication (RDI), Locked Signal (LCK), Test Signal, Automatic Protection Switching (APS), Maintenance Communication Channel (MCC), Experimental (EXP), and Vendor Specific (VSP) for fault management and performance monitoring, such as frame loss measurement (LM), and delay measurement (DM). Y1731 This Recommendation provides mechanisms for user-plane OAM functionality in Ethernet networks . Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Potrebbero piacerti anche