Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Glossary
Issue Draft A
Date 2020-01-15
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://www.huawei.com
Email: support@huawei.com
Contents
1 Glossary......................................................................................................................................1
1 Glossary
Numerics
5G NSA 5G non-standalone
A deployment configuration of 5G. 5G RAN cannot directly
connect to the core network. It is connected to the core network
through the LTE control plane. User-plane data is transferred to
the 4G and 5G networks through dual connectivity.
5G SA 5G standalone
An end-to-end 5G network architecture. In SA networking, the
terminals, New Radio (NR), and core network all adopt 5G
standards. The purpose is to support 5G interfaces and provide 5G
functions and services.
A3 algorithm A3
ACK acknowledgement
A response sent by a receiver to indicate reception of information.
Acknowledgements may be implemented at any level, including
the physical level (using voltage on one or more wires to
coordinate a transfer), link level (indicating transmission across a
single hardware link), or higher levels.
ACL group A group for ACL rules. One ACL group needs to be set up before
the ACL rules are configured. The ACL group is mainly used to
determine the type of the ACL rule, the match sequence, and the
step length.
AN access network
ARP attack A form of attack in which the attacker makes hosts on a LAN
unable to access the Internet by forging data to refresh the
dynamic ARP table through the vulnerability of ARP. Alternatively,
the attacker causes network breakdown or data disclosure by
spoofing to steal sensitive information.
AS access stratum
A functional layer in the NR radio system.
A Interface The interface between the BSC and the MSC. It supports the
signaling channels and traffic channels of 64 kbit/s.
BC boundary clock
A clock with a clock port for each of two or more distinct point-
to-point (PTP) communication paths.
CA carrier aggregation
A function that allows aggregation of multiple contiguous or non-
contiguous CCs to expand bandwidth to meet the 3GPP
requirement and increase users' peak rates in uplink and
downlink.
CB configuration baseline
A baseline of a configuration that has been formally agreed and is
managed through the Change Management process. It is used as
a basis for future Builds, Releases and Changes.
CC component carrier
The carriers that are aggregated for a CA UE.
CD collision detection
CE channel element
CP cyclic prefix
The prefix of an OFDM symbol with a repetition of the end. There
are two types of CPs: normal cyclic prefix and extended cyclic
prefix.
CS circuit service
DC dual connectivity
DC dual carrier
DC direct current
Electrical current whose direction of flow does not reverse. The
current may be terminated and the amplitude may change but
the direction never changes.
GE Gigabit Ethernet
gNodeB Functional entity of the 5G base station protocol. The base station
in CDMA is NodeB, in LTE is eNodeB, and in NR is gNodeB.
GP guard period
A protection time interval that is unique to the TDD system. The
GP is mainly used for protection during the conversion from the
downlink to the uplink when there is a bidirectional transmission
RTD between the base station and the UE.
IE Internet Explorer
IN intelligent network
A network that is not passive. It contains built-in diagnostics,
management, fault tolerance and other capabilities that keep it
running smoothly. Developed based on the existing telephone
network, the IN refers to the intelligent PSTN or ISDN. The
intelligence is configured on the computers at multiple service
control nodes across the network and the intelligent control is
realized through software to provide flexible intelligent control
functions.
IP Internet Protocol
A TCP/IP protocol that governs the breakup of data messages into
packets, the routing of the packets from sender to destination
network and station, and the reassembly of the packets into the
original data messages at the destination. IP runs at the
internetwork layer in the TCP/IP model which is equivalent to the
network layer in the ISO/OSI reference model.
IP PM IP performance monitoring
IT information technology
A general term for the technologies used to manage and process
information. IT is mainly integrated with computer science and
communications technologies to design, develop, install, and
implement information systems and software applications.
LM log management
A measure that is used to find illegal operations and fault reasons
by querying and monitoring logs, and to protect network security
by taking appropriate measures.
MM mobility management
A basic function used to ensure uninterrupted services for UEs
while on the move in mobile networks.
NE network element
An entity that contains hardware and software. An NE has at least
one main control board that manages and monitors the entire
network element. The NE software runs on the main control
board.
NR New Radio
OC ordinary clock
A Precision Time Protocol clock (PTP clock) with a single PTP port.
OOK on-off-keying
PF paging frame
PO paging occasion
PQ priority queuing
A queue scheduling algorithm based on the absolute priority.
According to the PQ algorithm, services of higher priorities are
ensured with greater bandwidth, lower latency, and less jitter.
Packets of lower priorities must wait to be sent till all packets of
higher priorities are sent. In this manner, services of higher
priorities are processed earlier than others.
RA random access
RB radio bearer
RB resource block
RE resource element
RM resource management
A resource management module oriented to Huawei complicated
applications, providing resources for applications and services
based on defined specifications, and applying for, allocating, and
releasing resources through the InterCloud.
RS reference signal
S1-U An interface between the eNodeB and the S-GW. The S1-U
interface interface is on the user plane, which is used to transmit data
packets.
SR scheduling request
TA timing advance
TC transparent clock
A device that supports the mechanism of link delay measurement
of the IEEE 1588v2 clock.
TC transmission convergence
UE user equipment
UP user plane
A set of traffic forwarding components that implements
PDCP/RLC/MAC/PHY protocol processing and radio resource
management and scheduling.
Y.1731 The OAM protocol introduced by the ITU-T. Besides the contents
defined by IEEE802.1ag, ITU-T Recommendation Y.173 also defines
the following combined OAM messages: Alarm Indication Signal
(AIS), Remote Defect Indication (RDI), Locked Signal (LCK), Test
Signal, Automatic Protection Switching (APS), Maintenance
Communication Channel (MCC), Experimental (EXP), and Vendor
Specific (VSP) for fault management and performance
monitoring, such as frame loss measurement (LM), and delay
measurement (DM).
Text
northbound A user account that the NMS uses for login to the EMS server.
user
transmissio The period from the time when a site starts to transmit a data
n delay frame to the time when the site finishes the data frame
transmission. It consists of the transmission latency and the
equipment forwarding latency.
back A traffic control method. When detecting that the transmit end
pressure transmits a large volume of traffic, the receive end sends signals
to ask the transmit end to lower the transmission rate.
multiplexin A procedure by which multiple lower order path layer signals are
g adapted into a higher order path or the multiple higher order
path layer signals are adapted into a multiplex section.
static route A route that cannot adapt to the change of network topology.
Operators must configure it manually. A network that is simple in
structure can function properly only using static routes. Proper
configuration and usage of static routes improves the network
performance and helps ensure the bandwidth requirement of
important applications. The disadvantage of static route is that it
does not change automatically when a network is faulty or the
topology changes, and operators must configure it manually.
air The interface between the cellular phone set or wireless modem
interface (usually portable or mobile) and the base station.
path loss A loss that occurs when RF waves are transmitted through the air.
This loss occurs due to atmospheric influences and interaction
with objects, which can have a filtering effect on the signal.
route The path that network traffic takes from its source to its
destination. Routes can change dynamically.
ping-pong A handover that occurs when the UE is handed over back and
handover forth between two cells because of the changes in signal quality
or the improper settings of parameters.
upstream The direction that is far from the subscriber end of the link in an
access network.
device The status of a device which can be classified into available and
status unavailable. If the device usage of a real queue exceeds the device
usage threshold (%), the real queue becomes unavailable. The
virtual queue device status is determined by its associated shared
device. If the shared device usage reaches 100%, the shared
device becomes unavailable and the mapping virtual queue also
becomes unavailable.
clock A device that provides standard time for the NTP configuration.
source
attribute Properties and features of an object. It varies with the object and
changes over time.
private key A key pair, which needs to be used together with a public key. The
certificate private key file is used to decrypt the information encrypted by
the public key.
throughput The maximum transmission rate that a measured object can reach
without packet loss. The object may be a system, a piece of
equipment, a connection, or a type of service. Throughput can be
measured by bandwidth.
5-tuple The five pieces of data found within all IP-based network packets:
source IP address, source port, destination IP address, destination
port, and protocol.
physical The link between two physical NEs. When the user creates NEs or
link refreshes the device status, the system automatically creates the
physical link according to the topology structure information on
the device. The remark information of a physical link can be
modified, but the physical link cannot be deleted.
correlation The similarities when two random processes vary with time.
virtual A virtual tunnel can group data flows by dividing all data flows
tunnel into multiple virtual tunnels according to certain conditions, and
managing the virtual tunnels as independent links. The conditions
for grouping data flows include the IP quintuple, ToS/DSCP, VLAN,
MPLS, and link. Meanwhile, the data flows of a group of users can
be classified into virtual tunnels. Users can be grouped according
to the user area and dynamic attribute.
license A permission that the vendor provides for the user with a specific
function, capacity, and duration of a product. A license can be a
file or a serial number. Usually the license consists of encrypted
codes. The operation authority granted varies with the level of the
license.
Ethernet A LAN technology that uses the CSMA/CD method. The speed of
an Ethernet interface can be 10 Mbit/s, 100 Mbit/s, 1000 Mbit/s,
or 10000 Mbit/s. The Ethernet network is highly reliable and easy
to maintain.
answer A process in which the call center platform connects a call that is
distributed to an agent. Answer includes automatic answer and
manual answer. Automatic answer means that the call center
platform automatically connects a call. Manual answer means
that a login agent clicks the answer button to connect a call.
user data Data that a user creates and manages in the course of using the
app.
user group A group of sub-users who share the same responsibilities. Carriers
can group users based on their characteristics and thereby control
users' experience by group. Different user groups allow
subscribers to have varied experiences.
certificate The certificate, also called the digital certificate, establishes the
association between the user identity and user public key. The
certificate is issued by the third-party authority, and provides
identity authentication for the communications parties.
terminal A device that converts voice, sound, text, image, table, data and
video from physical display to electronic signals or the other way
around. A terminal generates and sends signals (such as
telecommunications circuit setup or release) that maintain the
normal running state of the telecommunications network, and it
receives the call signals of telecommunications switch and
transmission.
end system A network entity that sends and receives packets in Intermediate
System to Intermediate System (IS-IS).
end user The party who is the ultimate initiator or recipient of calls. The
end user can be a human being or a device.
master A server that runs the core process in a distributed system. The
server master server manages backups, archives, and restores. The
master server is responsible for media and device selection for
NetBackup. Typically, the master server contains the NetBackup
catalog. The catalog contains the internal databases that contain
information about NetBackup backups and configuration.
host A physical server that runs virtual software. VMs can be created
on a host.
subnet A binary pattern that is stored in the device and is matched with
mask the IP address. A subnet mask is used by the IP protocol to
determine to which network segment packets are destined.