Sie sind auf Seite 1von 68

eNodeB

Glossary

Issue 02
Date 2013-07-22

HUAWEI TECHNOLOGIES CO., LTD.


Copyright © Huawei Technologies Co., Ltd. 2013. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior written
consent of Huawei Technologies Co., Ltd.

Trademarks and Permissions

and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.

Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.

The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.

Huawei Technologies Co., Ltd.


Address: Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China

Website: http://www.huawei.com
Email: support@huawei.com

Issue 02 (2013-07-22) Huawei Proprietary and Confidential i


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary About This Document

About This Document

Overview
This document provides LTE terms, acronyms, and abbreviations.

Version
The following table lists the product versions related to this document.

Product Name Version

DBS3900 V100R008C00
The mapping single-mode base station version
DBS3900 TDD
is:
BTS3900 eNodeB: V100R006C00
BTS3900A

BTS3900L

BTS3900AL

BTS3202E

BTS3203E LTE V100R00600

Intended Audience
This document is intended for:

l Network planners
l eNodeB installers
l Field engineers
l System engineers

Issue 02 (2013-07-22) Huawei Proprietary and Confidential ii


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary About This Document

l Shift operators
l Site maintainers
l Network operators
l Network administrators

Organization
1 Numerics

2A

3B

4C

5D

6E

7F

8G

9H

10 I

11 K

12 L

13 M

14 N

15 O

16 P

17 Q

18 R

19 S

20 T

Issue 02 (2013-07-22) Huawei Proprietary and Confidential iii


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary About This Document

21 U

22 V

23 W

24 X

25 Z

Conventions
Symbol Conventions
The symbols that may be found in this document are defined as follows.

Symbol Description

Indicates a hazard with a high level or medium level of risk


which, if not avoided, could result in death or serious injury.

Indicates a hazard with a low level of risk which, if not


avoided, could result in minor or moderate injury.

Indicates a potentially hazardous situation that, if not


avoided, could result in equipment damage, data loss,
performance deterioration, or unanticipated results.

Indicates a tip that may help you solve a problem or save


time.

Provides additional information to emphasize or supplement


important points of the main text.

General Conventions
The general conventions that may be found in this document are defined as follows.

Convention Description

Times New Roman Normal paragraphs are in Times New Roman.

Boldface Names of files, directories, folders, and users are in


boldface. For example, log in as user root.

Italic Book titles are in italics.


Courier New Examples of information displayed on the screen are in
Courier New.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential iv


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary About This Document

Command Conventions
The command conventions that may be found in this document are defined as follows.

Convention Description

Boldface The keywords of a command line are in boldface.

Italic Command arguments are in italics.

[] Items (keywords or arguments) in brackets [ ] are optional.

{ x | y | ... } Optional items are grouped in braces and separated by


vertical bars. One item is selected.

[ x | y | ... ] Optional items are grouped in brackets and separated by


vertical bars. One item is selected or no item is selected.

{ x | y | ... }* Optional items are grouped in braces and separated by


vertical bars. A minimum of one item or a maximum of all
items can be selected.

[ x | y | ... ]* Optional items are grouped in brackets and separated by


vertical bars. Several items or no item can be selected.

GUI Conventions
The GUI conventions that may be found in this document are defined as follows.

Convention Description

Boldface Buttons, menus, parameters, tabs, window, and dialog titles


are in boldface. For example, click OK.

> Multi-level menus are in boldface and separated by the ">"


signs. For example, choose File > Create > Folder.

Keyboard Operations
The keyboard operations that may be found in this document are defined as follows.

Format Description

Key Press the key. For example, press Enter and press Tab.

Key 1+Key 2 Press the keys concurrently. For example, pressing Ctrl+Alt
+A means the three keys should be pressed concurrently.

Key 1, Key 2 Press the keys in turn. For example, pressing Alt, A means
the two keys should be pressed in turn.

Mouse Operations

Issue 02 (2013-07-22) Huawei Proprietary and Confidential v


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary About This Document

The mouse operations that may be found in this document are defined as follows.

Action Description

Click Select and release the primary mouse button without moving
the pointer.

Double-click Press the primary mouse button twice continuously and


quickly without moving the pointer.

Drag Press and hold the primary mouse button and move the
pointer to a certain position.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential vi


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary Contents

Contents

About This Document.....................................................................................................................ii


1 Numerics.........................................................................................................................................1
2 A........................................................................................................................................................2
3 B........................................................................................................................................................5
4 C........................................................................................................................................................7
5 D......................................................................................................................................................11
6 E.......................................................................................................................................................14
7 F.......................................................................................................................................................18
8 G......................................................................................................................................................20
9 H......................................................................................................................................................22
10 I......................................................................................................................................................24
11 K....................................................................................................................................................27
12 L.....................................................................................................................................................28
13 M...................................................................................................................................................30
14 N....................................................................................................................................................34
15 O....................................................................................................................................................36
16 P.....................................................................................................................................................38
17 Q....................................................................................................................................................42
18 R....................................................................................................................................................43
19 S.....................................................................................................................................................46
20 T....................................................................................................................................................51
21 U....................................................................................................................................................54
22 V....................................................................................................................................................56
23 W...................................................................................................................................................57

Issue 02 (2013-07-22) Huawei Proprietary and Confidential vii


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary Contents

24 X....................................................................................................................................................58
25 Z....................................................................................................................................................59

Issue 02 (2013-07-22) Huawei Proprietary and Confidential viii


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 1 Numerics

1 Numerics

1xCS IWS Circuit Switched Fallback Interworking Solution Function for 3GPP2 1xCS
3DES See Triple Data Encryption Standard
3GPP See Third Generation Partnership Project

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 1


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 2A

2 A

A-GPS Assisted-GPS
AAA See Authentication, Authorization and Accounting
AAS Adaptive Antenna System
ABS Almost Blank Subframe
Access Control List An Access Control List (ACL) is a list of IP addresses. It is used for client authentication.
Access Stratum An access stratum is a communication medium or system that can be used to request and
set up the transfer of data or information between points.
ACK/NACK Acknowledgement/Not-acknowledgement
Acknowledged Mode The acknowledged services in Radio Link Control (RLC) provide reliability through
retransmission. These include but are not limited to: transfer of user data, segmentation
and reassembly, error correction, duplicate detection, protocol error detection and
recovery, and ciphering.
ACL See Access Control List
ACSI Average Cell Stay Interval
Active Queue AQM is used for routers on the internet. It discards data packets or adds an explicit
Management congestion notification (ECN) to data packets before a queue on a router is full.
Adaptive Modulation Link adaptation (AMC: adaptive modulation and coding) with various modulation
and Coding schemes and channel coding rates is applied to the shared data channel. The same coding
and modulation is applied to all groups of resource blocks belonging to the same L2 PDU
scheduled to one user within one TTI and within a single stream.
ADSL See Asymmetric Digital Subscriber Line
Advanced Encryption Originally, the Advanced Encryption Standard (AES) is an encryption algorithm used
Standard by some U.S government departments to guarantee the security of some secret but
unclassified materials. Now, AES has become the most influential encryption standard
all around the world.The AES algorithm is used to ensure the system security.
Advanced Power The Advanced Power Module (APM) is a standalone cabinet configured with related
Module modules for DC power supply, battery management, power system monitoring, power
distribution, surge protection, temperature control, and backup power supply. It also
provides AC power ports for maintenance and 4 U or 5 U space for 19-inch customer
equipment complying with the ETSI standard.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 2


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 2A

AES See Advanced Encryption Standard


AF Application function
Aggregate Maximum A QoS parameter defined by 3GPP. AMBR refers to the maximum allowed rate of all
Bit Rate non-GBR services of a UE.
AH See Authentication Header
aICIC Adaptive ICIC
AID Access Description Data
AIS See alarm indication signal
AISG Antenna Interface Standards Group
AKA See Authentication and Key Agreement
alarm indication signal A code sent downstream in a digital network as an indication that an upstream failure
has been detected and alarmed. It is associated with multiple transport layers.
ALD Antenna Line Device
Allocation and Allocation and Retention Priority (ARP): the primary purpose of ARP is to decide
Retention Priority whether a bearer establishment / modification request can be accepted or needs to be
rejected in case of resource limitations. In addition, the ARP can be used by the eNodeB
to decide which bearer(s) to drop during exceptional resource limitations (e.g. at
handover).
AM See Acknowledged Mode
AMBR See Aggregate Maximum Bit Rate
AMC See Adaptive Modulation and Coding
AMR Adaptive Multi-Rate
AMS Adaptive MIMO Switching
ANR Automatic Neighbor Relation
Antenna An antenna (or aerial) is a transducer that transmits or receives electromagnetic waves.
In other words, antennas convert electromagnetic radiation into electrical current, or vice
versa.
Antenna port An antenna port corresponds to a pilot format, not a physical antenna. The pilot format
is not correlated with the number of antennas.
APAI Average Packet Arrival Interval
APM See Advanced Power Module
APN Access Point Name
AQM See Active Queue Management
AR Advanced Receiver
ARP See Allocation and Retention Priority
ARPU See Average Revenue Per User
ARQ See Automatic Repeat Request

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 3


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 2A

Array gain Array gain is a power gain achieved by combining signals from different antennas based
on the correlation between signals and the non-correlation between noises. Signal
combining increases the signal to interference plus noise ratio (SINR) of the combined
signal.
AS See Access Stratum
Asymmetric Cryptography in which a pair of keys is used to encrypt and decrypt a message. The
cryptography essential difference to symmetric cryptography is that this kind of algorithm uses two
different keys for encryption and corresponding decryption.
Asymmetric Digital A technology for transmitting digital information at a high bandwidth on existing phone
Subscriber Line lines to homes and businesses. Unlike regular dialup phone service, ADSL provides
continuously-available, "always on" connection. ADSL is asymmetric in that it uses most
of the channel to transmit downstream to the user and only a small part to receive
information from the user. ADSL simultaneously accommodates analog (voice)
information on the same line. ADSL is generally offered at downstream data rates from
512 kbit/s to about 6 Mbit/s.
AuC See Authentication Center
Authentication and AKA (Authentication and Key Agreement security protocol ) is a mechanism which
Key Agreement performs authentication and session key distribution in UMTS (Universal Mobile
Telecommunications System) networks.
Authentication Center A database that stores authentication data and encryption key. It can prevent unauthorized
users from accessing the network and ensure data security over the air interface. The
only difference between the HLR and the AuC is that the latter requires higher security.
Therefore, AuC is defined separately in the relevant protocol. In actual situations, the
AuC and HLR are combined.
Authentication Header Authentication Header (AH) is a member of the IPsec protocol suite. AH guarantees
connectionless integrity and data origin authentication of IP packets. Further, it can
optionally protect against replay attacks by using the sliding window technique and
discarding old packets.
Authentication, A mechanism for configuring authentication, authorization, and accounting security
Authorization and services. Authentication refers to the verification of user identities and the related
Accounting network services; authorization refers to the granting of network services to users
according to authentication results; and accounting refers to the tracking of the
consumption of network services by users.
Automatic Repeat An error control method for data transmission in which the receiver detects transmission
Request errors in a message and automatically requests a retransmission from the transmitter.
Average Revenue Per ARPU is a term used by telephone Operators/Carriers to indicate the financial revenue
User which is gained per subscriber on a monthly basis.
AWS Advanced Wireless Services

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 4


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 3B

3 B

Base Transceiver A Base Transceiver Station terminates the radio interface. It allows transmission of traffic
Station and signaling across the air interface. The BTS includes the baseband processing, radio
equipment, and the antenna.
Baseband A form of modulation in which the information is applied directly onto the physical
transmission medium.
BaseBand Unit Base Band Unit (BBU) is a component of the distributed base station. It provides
baseband processing for signals (such as channel coding/decoding, modulation/
demodulation), provides transmission management and interfaces, manages radio
resources, and provides clock signals.
BBU See BaseBand Unit
BCCH See Broadcast Control Channel
BCH Broadcast Channel
BER See Bit Error Rate
BFD See Bidirectional Forwarding Detection
BHSA See Busy Hour Session Attempt
Bidirectional Bidirectional Forwarding Detection (BFD) is a network protocol used to detect faults
Forwarding Detection between two forwarding engines connected by a link. It provides low-overhead detection
of faults even on physical media that don't support failure detection of any kind, such as
Ethernet, virtual circuits, tunnels and MPLS Label Switched Paths.
Binary phase shift 2-phase modulation for carrier based on binary baseband signal. In this modulation mode,
keying the binary character 0 represents phase 0 of the carrier, and character 1 represents the
phase 180. The phase of character 0 is 0, and the phase of character 1 needs to be
specified. This is an absolute phase shift mode that uses different phases to represent
digital information.
Bit Error Rate Ratio of received bits that contain errors. BER is an important indicator used to measure
the communications quality of a network.
BITS See Building Integrated Timing Supply System
BLER See Block Error Rate

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 5


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 3B

Block Error Rate Block Error Rate (BLER) is used in measuring the error rate when extracting data frames
from a Compact Disc (CD). The BLER measurement is often used as a quality control
measure with regards to how well audio is retained on a Compact Disc over time.
BPSK See Binary phase shift keying
BRAS See Broadband Remote Access Server
Broadband Remote A new type of access gateway for broadband networks. As a bridge between backbone
Access Server networks and broadband access networks, BRAS provides methods for fundamental
access and manages the broadband access network. It is deployed at the edge of network
to provide broadband access services, convergence, and forwarding of multiple services,
meeting the demands for transmission capacity and bandwidth utilization of different
users. BRAS is a core device for the broadband users' access to a broadband network.
Broadcast Control This downlink channel contains specific parameters needed by a mobile in order that it
Channel can identify the network and gain access to it. Typical information includes the LAC
(Location Area Code) and RAC (Routing Area Code), the MNC (Mobile Network Code)
and BA (BCCH Allocation) list.
BSR See Buffer Status Report
BT Bit Torrent
BTS See Base Transceiver Station
Buffer Status Report Data of the radio bear set in the UE buffer.
Building Integrated In the situation of multiple synchronous nodes or communication devices, one can use
Timing Supply System a device to set up a clock system on the hinge of telecom network to connect the
synchronous network as a whole, and provide satisfactory synchronous base signals to
the building integrated device. This device is called BITS.
Busy Hour Session The number of call attempts on the current switch in the busiest hour. The BHSA is used
Attempt to measure the processing performance of the system that uses the SIP protocol in the
IMS. The system processes not only calls but also sessions.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 6


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 4C

4 C

CA See Certification Authority


CA See Carrier Aggregation
CA Certificate chain A list of certificates that are "walked" (or tRNCed) from the root CA key to the CA key
used to validate the peer's certificate. That is, a certificate chain tRNCes a path of
certificates from a lower branch CA to the root CA that is trusted by some entities in the
CA hierarchy. Thus, the entity can ensure that the peer's certificates is trusty.
Call History Record A system used for identifying faults in an efficient way. It records and stores the
information of all the faults occurring during a call for each user. If necessary, you can
query the call history records of a specific user through the CHR client to quickly identify
the faults.
CANBUS See Controller Area Network BUS
Carrier Aggregation In Carrier Aggregation (CA), two or more Component Carriers (CCs) are aggregated in
order to support wider transmission bandwidths up to 100MHz. A UE may
simultaneously receive or transmit on one or multiple CCs depending on its capabilities.
Carrier-to- A ratio used to assess channel quality. The BS sends the REP-REQ message to the MS
Interference-and-Noise to request channel quality check. The MS retrieves the CINR according to the received
Ratio information and then returns the data to the BS through the REP-RSP message. The BS
can select and adjust the transmission channel or initiate a handover according to the
CINR.
Cascade To connect components in series, the output of each component serving as the input for
the next.
CBC Cell Broadcast Centre
CBE Cell Broadcast Entity
CBS See Committed Burst Size
CC Component Carrier
CCCH See Common Control Channel
CCE Control Channel Element
CCO Cell Change Order
CCU Cell Center User

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 7


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 4C

CDD See Cyclic Delay Diversity


CDMA See Code Division Multiple Access
CDMA2000 1x Radio A 3G wireless technology based on the CDMA platform. The 1x in 1xRTT refers to 1x
Transmission the number of 1.25MHz channels. The RTT in 1xRTT stands for Radio Transmission
Technology Technology.
CDMA2000 1xRTT See CDMA2000 1x Radio Transmission Technology
CDT Call Detail Trace
Central Processing The CPU is the brains of the computer. Sometimes referred to simply as the processor
Unit or central processor, the CPU is where most calculations take place.
Certificate Revocation A list of all canceled certificates. Digital Certificates are only valid for a specified period;
List if, after this period, they are not renewed by the owner they are revoked. Revocation may
also be applied to certificates that may have been compromised. All revoked certificates
are listed and may be viewed through the CA (Certification Authorities) web site. These
lists are issued on a regular basis by the CA, and prior to a dialogue being established
between end parties this list should be checked to ensure the integrity of the parties
involved in the communication.
Certification Authority In cryptography, a certificate authority or certification authority (CA) is an entity that
issues digital certificates for use by other parties. It is an example of a trusted third party.
CAs are characteristic of many public key infrastructure (PKI) schemes.
CEU Cell Edge User
CFM See Connectivity Fault Management
CHR See Call History Record
CINR See Carrier-to-Interference-and-Noise Ratio
CIO Cell Individual Offset
CIR See Committed Information rate
Circuit Switching In telecommunications, a circuit switching network is one that establishes a dedicated
circuit (or channel) between nodes and terminals before the users may communicate.
Each circuit that is dedicated cannot be used by other callers until the circuit is r
CL-SM Closed-Loop Spatial Multiplexing
CL-TD Closed-Loop Transmit Diversity
CMAS Commercial Mobile Alert System
CME Configuration Management Express
CN See Core Network
Co-channel Co-channel interference reduction gain is achieved by using interference rejection
interference reduction combining (IRC) or other interference mitigation methods.
gain
COD Cell Outage Detection
Code Division Multiple A technique for spread-spectrum multiple-access digital communications that creates
Access channels through the use of unique code sequences.
Colored interference Colored interference is interference whose power spectral density is not evenly
distributed over the entire frequency or space domain.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 8


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 4C

Committed Burst Size A parameter used to define the capacity of token bucket C, that is, the maximum burst
IP packet size when the information is transferred at the committed information rate.
This parameter must be larger than 0. It is recommended that this parameter should not
be less than the maximum length of an IP packet that might be forwarded.
Committed The rate at which a frame relay network agrees to transfer information in normal
Information rate conditions. Namely, it is the rate, measured in bit/s, at which the token is transferred to
the leaky bucket.
Common Control A CCCH is a point-to-multipoint bidirectional control channel. A CCCH is primarily
Channel intended to carry signaling information necessary for access management functions.
Common Public Radio Common Public Radio Interface (CPRI) is a common standard of the key internal
Interface interface between the REC and the RE of the wireless base station. This standard was
established by Huawei, Ericsson, NEC, Siemens, and Nortel in June 2003. It aims at
standardizing the baseband and RF interface. The CPRI has a set of mature standards,
which advance the standard and equipment. The major feature of the CPRI is that
baseband is separated from RF to reduce the cost of engineering, equipment room, and
equipment.
CoMP See Coordinated Multipoint Transmission
Compressor It is at the TX end, and is responsible for compressing the header of the data packet based
on the Profile and the context.
Connectivity Fault Ethernet Connectivity Fault Management (CFM) is an end-to-end per-service-instance
Management Ethernet layer operation, administration, and management (OAM) protocol. It includes
proactive connectivity monitoring, fault verification, and fault isolation for large
Ethernet metropolitan-area networks (MANs) and WANs.
Context It contains the characteristic information about compression and decompression of the
packet header. Every context is associated with a unique context identifier.
Control Plane The control plane performs the call control and connection control functions. Through
signaling, the control plane sets up and releases connections, and may restore a
connection in case of a failure. The control plane also performs other functions in support
of call and connection control, such as routing information dissemination.
Controller Area Controller-area network (CAN or CANBUS) is a vehicle bus standard designed to allow
Network BUS microcontrollers and devices to communicate with each other within a vehicle without
a host computer. CANBUS is a message based protocol, designed specifically for
automotive applications but now also used in other areas such as industrial automation
and medical equipment.
Coordinated By coordinating and combining signals from multiple antennas, CoMP, will make it
Multipoint possible for mobile users to enjoy consistent performance and quality when they access
Transmission and share datas.
Core Network An architectural term relating to the part of UMTS, which is independent of the
connection technology of the terminal.
Correlation Correlation represents how closely two random processes vary in time.
CPC Continuous Packet Connectivity
CPE Customer Premise Equipment
CPRI See Common Public Radio Interface
CPU See Central Processing Unit

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 9


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 4C

CQI Channel Quality Indicator


CRC See Cyclic Redundancy Code
CRL See Certificate Revocation List
Cross-certification The process undertaken by Certification Authorities to establish a trust relationship with
another CA through the signing of another CA's public key in a certificate referred to as
a "cross-certificate". When two Certification Authorities are cross-certified, they agree
to trust and rely upon each other's public key certificates and keys as if they had issued
them themselves. The two Certification Authorities exchange cross-certificates, enabling
their respective users to interact securely.
CS See Circuit Switching
CSFB Circuit Switched Fallback
CSG Closed Subscriber Group
CSI-RS Channel Status Information Reference Signal
Cyclic Delay Diversity Cyclic Delay Diversity (CDD) is a diversity scheme used in OFDM-based
telecommunication systems, transforming spatial diversity into frequency diversity
avoiding intersymbol interference.
Cyclic Redundancy A CRC is an error-detecting code. Its computation resembles a polynomial long division
Code operation in which the quotient is discarded and the remainder becomes the result, with
the important distinction that the polynomial coefficients are calculated according to the
carry-less arithmetic of a finite field. The length of the remainder is always less than the
length of the divisor (called the generator polynomial), which therefore determines how
long the result can be. The definition of a particular CRC specifies the divisor to be used,
among other things.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 10


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 5D

5 D

D-BCH See Dynamic Broadcast Channel


Data Encryption A specification for encryption of computer data that uses a 56-bit key developed by IBM
Standard and adopted by the U.S. government as a standard in 1976.
Data Radio Bearer The DRB is used to carry the data associated with an EPS bearer. It is also known as
"dedicated radio beared".
DC See Direct Current
DCCH Dedicated Control Channel
DCDU See Direct Current Distribution Unit
DCI See Downlink Control Information
DCS Digital Cellular Service
Decompressor It is at the RX end, and is responsible for restoring the header of the data packet based
on the Profile and the context.
delay mesurement The time elapsed since the start of transmission of the first bit of the frame by a source
node until the reception of the last bit of the loopbacked frame by the same source node,
when the loopback is performed at the frame's destination node.
Demilitarized Zone A buffer area between an insecure system and the secure system and is used to solve the
problem that the external network equipped with a firewall cannot access the internal
network server. The DMZ is located between the internal network and the external
network. In the DMZ, some public server facilities, such as the enterprise Web server
and FTP server, can be located. The DMZ effectively protects the internal network.
Denial of Service Refusal to provide services. DoS attacks are aimed at stopping the computers or the
network from providing normal services.
DES See Data Encryption Standard
DHCP See Dynamic Host Configuration Protocol
Differentiated Services An IETF standard that defines a mechanism for controlling and forwarding traffic in a
differentiated manner based on CoS settings to handle network congestion.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 11


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 5D

Differentiated Services A Differentiated Services (DiffServ) Code Point is a marker in the header of each IP
Code Point packet that prompts network routers to apply differentiated grades of service to various
packet streams. It is specified by the DiffServ policy proposed by the IETF (Internet
Engineering Task Force). This allows Internet and other IP-based network service
providers to offer different levels of service to customers.
DiffServ See Differentiated Services
Digital certificate An electronic document used to validate the end parties or entities employed in data
transfer. A digital certificate binds an identity to a pair of electronic keys that can be used
to encrypt and sign digital information and issued by a Certification Authority (CA) and
signed with the CA's private key. A digital certificate typically contains the: - Owner's
name - Serial number of the digital certificate - Expiration date of the public key - Owner's
public key - Name of the issuer - Digital signature of the issuer
Digital signature A message signed with a sender's private key that can be verified by anyone who has
access to the sender's public key. Digital signature gives the receiver the reason to believe
the message was sent by the claimed sender. A proper implementation of digital signature
is computing a message digest for the message sent from the sender to the receiver, and
then signing the message digest. The result is called digital signature and is sent to the
receiver together with the original message.
Digital Subscriber Line A network device, usually situated in the main office of a telephone company that
Access Multiplexer receives signals from multiple customer Digital Subscriber Line (DSL) connections and
puts the signals on a high-speed backbone line using multiplexing techniques.
Direct Current Direct current (DC) is the unidirectional flow of electric charge.
Direct Current A direct current distribution unit distributes the -48 V DC received from an external
Distribution Unit power source to other devices.
Discontinuous Discontinous Reception (DRX) is a method used in mobile communication to conserve
Reception the battery of the mobile device. The mobile device and the network negotiate phases in
which data transfer happens. During other times the device turns its receiver off and
enters a low power state.
Diversity gain Diversity gain is a performance gain achieved by reducing the fading effects. The deep
fading degree of the combined signal can be reduced because the probability of
concurrent deep fading on multiple channels is lower than that on a single channel. The
fading degree is represented by SINR variance.
DL See Downlink
DL-SCH Downlink Shared Channel
DM See delay mesurement
DMZ See Demilitarized Zone
DOA Direction of Arrival
DoS See Denial of Service
Downlink A downlink is a channel on which data is transmitted from the BS to the terminal.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 12


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 5D

Downlink Control The PDCCH is used to carry DCI such as scheduling decisions and power control
Information commands. More specifically, the DCI includes: ● Downlink scheduling assignments,
including PDSCH resource indication, transport format, hybrid-ARQ information, and
control information related to spatial multiplexing (if applicable). A downlink scheduling
assignment also includes a command for power control of the PUCCH uplink physical
channel. ● Uplink scheduling grants, including PUSCH resource indication, transport
format, and hybrid-ARQ-related information. An uplink scheduling grant also includes
a command for power control of the PUSCH uplink physical channel. ● Power-control
commands for a set of terminals as a complement to the commands included in the
scheduling assignments/grants. The different types of control information above
typically correspond to different DCI message sizes.
DRB See Data Radio Bearer
DRS Dedicated Reference Signal
DRX See Discontinuous Reception
Dry contact A type of passive switch that has two states: open and closed. The two contacts are not
distinguished by polarity. Therefore, the two contacts can be used interchangeably.
Common dry contact signals are the outputs of switches, buttons, sensors, relays, and
dry finger pipes.
DSCP See Differentiated Services Code Point
DSLAM See Digital Subscriber Line Access Multiplexer
DTCH Dedicated Traffic Channel
Duplexer A device that consists of a transmitting filter and a receiving filter and provides a reliable
path for sharing of an antenna by transmission and reception so that the high-power
transmitted signals do not have an obvious impact on the weak received signals.
DwPTS Downlink Pilot Timeslot
Dynamic Broadcast It carriers the MIB information.
Channel
Dynamic Host Dynamic Host Configuration Protocol (DHCP) is a client-server networking protocol.
Configuration Protocol A DHCP server provides configuration parameters specific to the DHCP client host
requesting, generally, information required by the host to participate on the Internet
network. DHCP also provides a mechanism for allocation of IP addresses to hosts.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 13


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 6E

6 E

E-CID Enhanced Cell ID


E-MBMS See Evolved MBMS
E-RAB See E-UTRAN Radio Access Bearer
E-UTRA Absolute A method of identifying the center carrier frequencies in E-UTRA. The carrier frequency
Radio Frequency in the uplink and downlink is designated by the EARFCN (E-UTRA Absolute Radio
Channel Number Frequency Channel Number) in the range 0 - 65535. The channel raster is 100KHz for
all bands, which means that the carrier centre frequency must be an integer multiple of
100KHz. The relation between EARFCN and the carrier frequency in MHz for the
downlink/uplink is given by an equation and associated table of frequency bands.
E-UTRAN See Evolved UTRAN
E-UTRAN Cell Global The E-UTRAN Cell Global Identifier is used to identify cells globally. The ECGI is
Identifier constructed from the MCC (Mobile Country Code), MNC (Mobile Network Code) and
the ECI (E-UTRAN Cell Identifier).
E-UTRAN NodeB The eNodeB is the principal function within the E-UTRAN. Its functions include Radio
Resource Management, Uplink Packet Classification and QoS Policy Enforcement, Data
Compression and User Data Encryption across the air. Towards the EPC (Evolved Packet
Core) it is responsible for forwarding of control plane signalling to the MME (Mobility
Management Entity). Likewise User Plane traffic is forwarded to the S-GW (Serving
Gateway).
E-UTRAN Radio The concatenation of an S1 bearer and the corresponding radio bearer. When an E-RAB
Access Bearer exists, there is a one-to-one mapping between this E-RAB and an EPS bearer of the Non
Access Stratum. Each E-RAB is defined by the following parameters: 1) E-RAB ID -
this element is used to identify the E-RAB on the S1 interface. 2) E-RAB QoS - this
element describes the QCI (Quality Class Identifier) that defines QoS parameters such
as end to end delay, bit error rates etc. Also included are allocation and retention priorities
as well as GBR (Guaranteed Bit Rate) parameters if real time services are to be supported
over the E-RAB.
EAP-TLS See Extensible Authentication Protocal Transport Layer Security
EAPoL See Extensible Authentication Protocol over LAN
EARFCN See E-UTRA Absolute Radio Frequency Channel Number
EBC See Event Based Counter

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 14


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 6E

EBF See Eigen Beamforming


EBS See Excess Burst Size
ECGI See E-UTRAN Cell Global Identifier
ECM See EPS Connection Management
eCSFB Enhanced Circuit Services fallback
EEA See EPS Encryption Algorithm
EGT See Equal Gain Transmission
EHPLMN See Equivalent HPLMN
EIA See EPS Integrity Algorithm
eICIC Enhanced-Inter-Cell Interference Coordination
Eigen Beamforming EBF computes the eigen values of a channel covariance matrix to obtain beamforming
weights.
Electronic Serial A 32-bit number assigned by the mobile station manufacturer, uniquely identifying a
Number mobile station. This is similar to the International Mobile Equipment Identity (IMEI)
used in GSM networks.
EMM See EPS Mobility Management
EMU See Environment Monitoring Unit
Energy Per Resource Downlink power control determines the energy per resource element (EPRE). The term
Element resource element energy denotes the energy prior to CP insertion. The term resource
element energy also denotes the average energy taken over all constellation points for
the modulation scheme applied.
eNodeB See E-UTRAN NodeB
Environment The Environment Monitoring Unit (EMU) uses sensors to monitor the temperature,
Monitoring Unit humidity, smoke, and intrusion in the environment in real time. The environment can be
automatically monitored according to the preset values and alarms are automatically
generated when the preset thresholds are exceeded.
EOC Emergency Operations Center
EPC See Evolved Packet Core
EPF Enhanced Proportional Fair
EPRE See Energy Per Resource Element
EPS See Evolved Packet System
EPS Connection In addition to the LTE Active, Idle and Detached states there also exists various EPS
Management Mobility Management (EMM) and EPS Connection Management (ECM) states. The
ECM states describe the signalling connectivity between the UE and the EPC. Two ECM
states exist, namely ECM-IDLE and ECM-CONNECTED.
EPS Encryption E-UTRA includes the support of EEA (EPS Encryption Algorithm) and EIA (EPS
Algorithm Integrity Algorithm). The EEA (EPS Encryption Algorithm) are each assigned a 4bit
identifier. Currently, the following values have been defined for NAS, RRC and UP
ciphering: 0000 - 128-EEA0 Null ciphering algorithm. 0001 - 128-EEA1 SNOW 3G.
0010 - 128-EEA2 AES (Advanced Encryption Standard).

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 15


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 6E

EPS Integrity The integrity process uses an EIA (EPS Integrity Algorithm), these have a 4bit identifier.
Algorithm Examples of EIA algorithms include: 0001 - 128-EIA1 SNOW 3G. 0010 - 128-EIA2
AES. These are implemented in the UE and eNB for RRC signalling integrity protection.
In addition, they are also implemented in the UE and MME for NAS integrity protection.
EPS Mobility In addition to the LTE Active, Idle and Detached states there also exists various EPS
Management Mobility Management (EMM) and EPS Connection Management (ECM) states. The
EMM states result from the mobility management procedures, such as Attach and
Tracking Area Update procedures. Two EMM states exist, EMM-DEREGISTERED and
EMMREGISTERED.
Equal Gain EGT is similar to EBF. The difference is that EGT normalizes the amplitudes of antenna
Transmission weights. That is, only phases are weighted, but amplitudes are not. Huawei eNodeB uses
the EGT algorithm.
Equivalent HPLMN Any PLMN to be declared as an equivalent to the HPLMN shall be present within the
EHPLMN list and is called an EHPLMN.
ESN See Electronic Serial Number
ETSI European Telecommunications Standards Institute
Event Based Counter The method of generate extended performance statistics counter based on message from
eNB Call History Record.
event-triggered After an event is reported for the first time, the measurement results associated with the
periodic reporting event are reported periodically. This reporting mode is called event-triggered periodical
reporting.
Evolved MBMS MBMS is called EMBMS (Evolved MBMS) in the SAE/LTE-based network
architecture.
Evolved Packet Core A framework for an evolution or migration of the 3GPP system to a higher-data-rate,
lower-latency, packet-optimized system that supports, multiple RATs.
Evolved Packet System An evolution of the 3G UMTS characterized by higher-data-rate, lower-latency, packet-
optimized system that supports multiple RATs. The Evolved Packet System comprises
the Evolved Packet Core together with the evolved radio access network (E-UTRA and
E-UTRAN).
Evolved UTRAN An evolution of the 3G UMTS radio-access network towards a high-data-rate, low-
latency and packet-optimized radio-access network.
Excess Burst Size In the single rate three color marker (srTCM) mode, traffic control is achieved by the
token buckets C and E. Excess burst size is a parameter used to define the capacity of
token bucket E, that is, the maximum burst IP packet size when the information is
transferred at the committed information rate. This parameter must be larger than 0. It
is recommended that this parameter should not be less than the maximum length of an
IP packet that might be forwarded.
Extensible EAP-Transport Layer Security (EAP-TLS), defined in RFC 5216, is an IETF open
Authentication standard, and is well-supported among wireless vendors. The security of the TLS
Protocal Transport protocol is strong, provided the user understands potential warnings about false
Layer Security credentials. It uses PKI to secure communication to a RADIUS authentication server or
another type of authentication server.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 16


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 6E

Extensible Extensible Authentication Protocol (EAP) over LAN (EAPoL) is a network port
Authentication authentication protocol used in IEEE 802.1X (Port Based Network Access Control)
Protocol over LAN developed to give a generic network sign-on to access network resources. EAPoL, similar
to EAP, is a simple encapsulation that can run over any LAN. The same three main
components are defined in EAP and EAPoL to accomplish the authentication
conversation: - Supplicant (Port Authentication Entity (PAE) seeking access to netwrok
resources) - Authenticator (PAE that controls network access) - Authentication Server
(a RADIUS/AAA server)

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 17


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 7F

7 F

FAG Feature Activation Guidline


Fan A device for heat dissipation by creating a current of air.
Fast Ethernet In computer networking, Fast Ethernet is a collective term for a number of Ethernet
standards that carry traffic at the nominal rate of 100 Mbit/s, against the original Ethernet
speed of 10 Mbit/s. Of the fast Ethernet standards 100BASE-TX is by far the most
common and is supported by the vast majority of Ethernet hardware currently produced.
FDD See Frequency Division Duplex
FDMA See Frequency Division Multiple Access
FE See Fast Ethernet
FEC See Forward Error Correction
FFT Fast Fourier Transform
FH See frequency hopping
FIFO See First In First Out
File Transfer Protocol A member of the TCP/IP suite of protocols, used to copy files between two computers
on the Internet. Both computers must support their respective FTP roles: one must be an
FTP client and the other an FTP server.
Firewall A combination of a series of components set between different networks or network
security domains. By monitoring, limiting, and changing the data traffic across the
firewall, it masks the interior information, structure and running state of the network as
much as possible to protect the network security.
First In First Out FIFO is a term used to describe routing buffers where no QoS (Quality of Service) is
applied to packets entering the router. Packets are treated in the order that they are
received by the router. QoS routers use processes such as weighted fair queuing and
weighted round robin in order to provide QoS to IP packet services.
First Order A ROHC compressor is in one of 3 main states. In First-Order (FO) state, the compressor
has detected and stored the static fields (such as IP addresses and port numbers) on both
sides of the connection. The compressor is also sending dynamic packet field differences
in FO state. Thus, FO state is essentially static and pseudo-dynamic compression.
FL Feature List

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 18


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 7F

FO See First Order


Forward Error A bit error correction technology that adds the correction information to the payload at
Correction the transmit end. Based on the correction information, the bit errors generated during
transmission are corrected at the receive end.
FPC See Fractional Power Control
FPI Flow Priority Index
Fractional Power A power control technique used to compensate part of path loss.
Control
Frequency Division Frequency Division Duplex is employed in radio systems to provide an uplink and
Duplex downlink radio channel between the network and the user. The frequencies separated by
a duplex spacing. Users tune between the uplink and downlink frequencies to transmit
and receive respectively.
Frequency Division A technique in which multiple users of a radio system are separated in the frequency
Multiple Access domain.
frequency hopping The repeated switching of frequencies during radio transmission according to a specified
algorithm, to minimize unauthorized interception or jamming of telecommunications.
Frequency Switched Frequency switched transmit diversity (FSTD) is a technique in which some of multiple
Transmit Diversity antennas (if configured) are selected in a specific frequency order for transmission.
FSTD See Frequency Switched Transmit Diversity
FTP See File Transfer Protocol

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 19


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 8G

8 G

Gateway Mobile The Gateway Mobile Location Centre (GMLC) contains functionality required to
Location Center support LCS. In one PLMN, there may be more than one GMLC. A GMLC is the first
node an external LCS client accesses in a PLMN (i.e. the Le reference point is supported
by the GMLC).
GBR Guaranteed Bit Rate
GCI Global Cell Identity
GE See Gigabit Ethernet
General Packet Radio A mobile data service available to users of GSM mobile phones. It is often described as
Service "2.5G", that is, a technology between the second (2G) and third (3G) generations of
mobile telephony.
GERAN See GSM/EDGE Radio Access Network
Gigabit Ethernet Gigabit Ethernet (GbE or 1 GigE) is a term describing various technologies for
transmitting Ethernet frames at a rate of a gigabit per second, as defined by the IEEE
802.3-2008 standard.
Global Positioning A satellite-based global navigation system that consists of a constellation of 24 satellites
System in orbit 11,000 nmi above the Earth, several on-station (i.e., in-orbit) spares, and a
ground-based control segment.
Global System for A second generation cellular telecommunication system which was first planned in the
Mobile early 1980s. Unlike first generation systems operating at the time, GSM was digital and
communications thus introduced greater enhancements such as security, capacity, quality and the ability
to support integrated services. Initially, GSM was planned to be a European system
allowing subscribers to roam between different networks however, GSM was quickly
adopted by many other regions and is now a "Global System". Many countries around
the world have now met market saturation point, which means over 100% of the
population of that country possess a GSM phone.
Globally Unique MME The GUTI (Globally Unique Temporary Identity) has two main components, the
Identifier GUMMEI (Globally Unique MME Identifier) that uniquely identifies the MME that
allocated the GUTI and the M-TMSI (M-Temporary Mobile Subscriber Identity) that
provides for an unambiguous identity of the UE within this MME.
GMLC See Gateway Mobile Location Center
GPRS See General Packet Radio Service

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 20


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 8G

GPRS Tunneling GTP is the defining IP protocol of the GPRS core network. Primarily it is the protocol
Protocol User Plane which allows end users of a GSM or WCDMA network to move from place to place
while continuing to connect to the Internet as if from one location at the Gateway GPRS
Support Node (GGSN). It does this by carrying the subscriber's data from the subscriber's
current Serving GPRS Support Node (SGSN) to the GGSN which is handling the
subscriber's session.
GPS See Global Positioning System
GSM See Global System for Mobile communications
GSM/EDGE Radio A GSM radio access network that supports the EDGE (Enhanced Data rates for Global
Access Network Evolution) modulation technique. It has been specified to connect the A , Gb and Iu
interfaces to the CN (Core Network). The architecture allows two BSSs (Base Station
Subsystems) to be connected to each other.
GTP-U See GPRS Tunneling Protocol User Plane
GUMMEI See Globally Unique MME Identifier
GUTI Globally Unique Temporary Identifier
GWCN Gateway Core Network

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 21


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 9H

9 H

HARQ See Hybrid Automatic Repeat Request


Hash Message Also known as "Hash-based Message Authentication Code". In cryptography, HMAC
Authentication Code (Hash-based Message Authentication Code), is a specific construction for calculating a
message authentication code (MAC) involving a cryptographic hash function in
combination with a secret key. As with any MAC, it may be used to simultaneously
verify both the data integrity and the authenticity of a message. Any iterative
cryptographic hash function, such as MD5 or SHA-1, may be used in the calculation of
an HMAC; the resulting MAC algorithm is termed HMAC-MD5 or HMAC-SHA1
accordingly. The cryptographic strength of the HMAC depends upon the cryptographic
strength of the underlying hash function, the size of its hash output length in bits and on
the size and quality of the cryptographic key.
Hetnet Heterogeneous network
HFN Hyper Frame Number
High Interference An IE that provides, per PRB, a 2 level report on interference sensitivity. Each position
Indication in the bitmap represents a PRB (first bit=PRB 0 and so on), for which value "1" indicates
'high interference sensitivity' and value "0" indicates 'low interference sensitivity'.
High Rate Packet Data High Rate Packet Data (HRPD), also known as TIA/EIA IS-856 or 1xEV-DO, is a packet
data protocol in the 3G mobile communications network based on CDMA2000.
HII See High Interference Indication
HLR See home location register
HMAC See Hash Message Authentication Code
home location register A database that manages the mobile subscriber data. It stores the following information
including account information of a subscriber (composed of telecommunication service
subscription data and subscriber status data), mobile station location information (MM
information), MSISDN and IMSI.
Home PLMN A PLMN where the MCC and MNC of the PLMN identity match the MCC and MNC
of the IMSI. Matching criteria are defined in TS 23.122.
Home Subscriber The Home Subscribe Server is the main IMS database which also acts as database in
Server EPC. The HSS is a super HLR that combined legacy HLR and AuC functions together
for CS and PS domains. In the IMS architecture, the HSS connects to application servers
as well as the Call Session Control Function (CSCF) using the DIAMETER protocol.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 22


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 9H

HPLMN See Home PLMN


HRPD See High Rate Packet Data
HSS See Home Subscriber Server
HSUPA High Speed Uplink Packet Data
HTTP See Hypertext Transfer Protocol
Hybrid Automatic To make up the defects of forward error correction coding and automatic retransmission
Repeat Request request, these two methods are combined to create Hybrid Automatic Repeat Request
(HARQ), which means an ARQ system contains an FEC subsystem. When the FEC can
correct the errors, the ARQ is not used. When the FEC cannot correct the errors, the
ARQ request the retransmission of error codes through the ARQ feedback channel. Only
the physical layer of OFDMA supports the HARQ mechanism. The HARQ has the
advantages of both forward error correction coding and automatic retransmission
request, thus improving the reliability of data transmission and system throughput.
Hypertext Transfer A protocol used to carry requests from a browser to a Web server and to transport pages
Protocol from Web servers back to the requesting browser. Although HTTP is almost universally
used on the Web, it is not a secure protocol.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 23


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 10 I

10 I

IBLER Initial Block Error Rate


ICI Inter Carriers Interference
ICIC Inter-Cell Interference Coordination
ICMP See Internet Control Message Protocol
IE See Information Element
IEEE See Institute of Electrical and Electronics Engineers
IFTS See Intelligent Field Test System
IKE See Internet Key Exchange
iManager M2000 A platform on which centralized management of a mobile network can be performed.
The M2000 can manage Huawei mobile network elements in a centralized way, including
the UMTS network elements, GSM network elements, CDMA network elements and IP
network devices used in the mobile network. The M2000 implements centralized fault
management, centralized performance management, centralized configuration
management, centralized topology management, centralized security management, and
system management.
IMEI See International Mobile Equipment Identity
Immediate MDT Immediate Minimization of Drive Test
IMS See IP Multimedia Subsystem
IMSI See International Mobile Subscriber Identity
Information Element An Information Element is a group of information which may be included within a
signaling message or data flow which is sent across an interface. Examples may include
QoS (Quality of Service) definitions, setup parameters, user identifiers etc.
Initialization and A ROHC compressor is in one of 3 main states. In Initialization and Refresh (IR) state,
Refresh the compressor has just been created or reset, and full packet headers are sent.
Institute of Electrical A society of engineering and electronics professionals based in the United States but
and Electronics boasting membership from numerous other countries. The IEEE focuses on electrical,
Engineers electronics, computer engineering, and science-related matters.
Intelligent Field Test The Intelligent Field Test System (IFTS) enables the eNodeB to select some UEs based
System on preset conditions, to trace the UEs, and to proactively start the next measurement.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 24


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 10 I

Inter Symbol Interference between adjacent pulses of a transmitted code.


Interference
Interference Rejection An optimized RF algorithm, which has satisfactory anti-inteference performance and
Combining improves the voice quality effectively.
International Mobile The International Mobile Equipment Identity is a unique identifier allocated to each
Equipment Identity Mobile Equipment (ME). It consists of a Type Approval Code (TAC), a Final Assembly
Code (FAC), Serial Number (SNR) and a Spare Digit.
International Mobile A unique number associated with all GSM and UMTS network mobile phone users. It
Subscriber Identity is stored in the SIM inside the phone and is sent by the phone to the network. It is also
used for acquiring other details of the mobile in the Home Location Register (HLR) or
as locally copied in the Visitor Location Register. To prevent eavesdroppers identifying
and tracking the subscriber on the radio interface, the IMSI is sent as rarely as possible
and a randomly-generated TMSI is sent instead.
International A United Nations agency, one of the most important and influential recommendation
Telecommunication bodies, responsible for recommending standards for telecommunication (ITU-T) and
Union radio networks (ITU-R).
Internet Control ICMP belongs to the TCP/IP protocol suite. It is used to send error and control messages
Message Protocol during the transmission of IP packets.
Internet Key Exchange Internet Key Exchange (IKE) is the protocol used to set up a security association (SA)
in the IPsec protocol suite. It is a hybrid protocol and implements Oakley key exchange
and SKEME key exchange in the ISAKMP frame. Both Oakley and SKEME define a
key exchange method, including the structure of the valid payload, valid payload of
transmitted information, handling procedure of the key, and method to use the key.
Internet Protocol Internet Protocol is a standardized method of transporting information across the Internet
in packets of data. It is often linked to Transmission Control Protocol, which assembles
the packets once they have been delivered to the intended location.
Internet Security A protocol that allows the message receiver to get a public key and use digital certificates
Association and Key to authenticate the sender's identity.
Management Protocol
IOS Intelligent Optimum Sample
IOT Interference Over Thermal
IP See Internet Protocol
IP Multimedia A standardized Next Generation Networking (NGN) architecture for telecom operators
Subsystem that want to provide mobile and fixed multimedia services. It uses a Voice-over-IP
(VoIP) implementation based on a 3GPP standardized implementation of SIP, and runs
over the standard Internet Protocol (IP). Existing phone systems (both packet-switched
and circuit-switched) are supported. The aim of IMS is not only to provide new services
but all the services, current and future, that the Internet provides. In this way, IMS will
give network operators and service providers the ability to control and charge for each
service. In addition, users have to be able to execute all their services when roaming as
well as from their home networks. To achieve these goals, IMS uses open standard IP
protocols, defined by the IETF. So, a multimedia session between two IMS users,
between an IMS user and a user on the Internet, and between two users on the Internet
is established using exactly the same protocol. Moreover, the interfaces for service
developers are also based on IP protocols. This is why IMS truly merges the Internet
with the cellular world; it uses cellular technologies to provide ubiquitous access and
Internet technologies to provide appealing services.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 25


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 10 I

IP Performance IP performance monitor effectively monitors the transport network by timely and quickly
Monitor monitoring the QoS of the bearer network. IP performance monitor requires the support
of the BSC and the BTS.
IP PM See IP Performance Monitor
IP Security Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP)
communications by authenticating and encrypting each IP packet of a data stream. IPsec
also includes protocols for establishing mutual authentication between agents at the
beginning of the session and negotiation of cryptographic keys to be used during the
session. IPsec can be used to protect data flows between a pair of hosts (e.g. computer
users or servers), between a pair of security gateways (e.g. routers or firewalls), or
between a security gateway and a host.
IPSec See IP Security
IR See Initialization and Refresh
IRC See Interference Rejection Combining
ISAKMP See Internet Security Association and Key Management Protocol
ISI See Inter Symbol Interference
ITU See International Telecommunication Union

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 26


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 11 K

11 K

Key Performance The KPI indicates the performance value of an object at a certain time point. A KPI may
Indicator be obtained by the aggregation of multiple levels of KPIs.
KPI See Key Performance Indicator

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 27


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 12 L

12 L

LAC See Location Area Code


LACP See Link Aggregation Control Protocol
LAN See Local Area Network
LBFD See LTE Basic Feature Description
LCID See Logical Channel Identifier
LCR Low Chip Rate
LCS See LoCation Services
LDAP See Lightweight Directory Access Protocol
Lightweight Directory The Lightweight Directory Access Protocol, or LDAP, is an application protocol for
Access Protocol querying and modifying data using directory services running over TCP/IP. LDAP was
originally intended to be a lightweight alternative protocol for accessing X.500 directory
services through the simpler (and now widespread) TCP/IP protocol stack. Today, X.
500 directory protocols including DAP can also be used directly over TCP/IP.
Link Aggregation Within the IEEE specification the Link Aggregation Control Protocol (LACP) provides
Control Protocol a method to control the bundling of several physical ports together to form a single logical
channel. LACP allows a network device to negotiate an automatic bundling of links by
sending LACP packets to the peer (directly connected device that also implements
LACP).
Link Layer Discovery The Link Layer Discovery Protocol (LLDP) is an L2D protocol defined in IEEE 802.1ab.
Protocol Using the LLDP, the NMS can rapidly obtain the Layer 2 network topology and changes
in topology when the network scales expand.
LLDP See Link Layer Discovery Protocol
LM See loss measurement
LMPT See LTE Main Processing Transmission Unit
LMT See Local Maintenance Terminal
LNA Low Noise Amplifier
Local Area Network A local area network (LAN) is a computer network covering a small physical area, like
a home, office, or small groups of buildings, such as a school, or an airport.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 28


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 12 L

Local Maintenance Local Maintenance Terminal (LMT) is a tool that connects to the network element and
Terminal provides the GUI for the OM of the network element. The LMT is used for the OM of
an NE. It supports local and remote maintenance modes.
Location Area Code An identifier used to identify an LA within a Public Land Mobile Network (PLMN). It
ranges from 0 to 65,535.
LoCation Services A service that allows carriers to obtain the geographic location of a target MS/UE by
using dedicated mobile positioning technologies and to provide location based services
to mobile subscribers.
LOFD See LTE Optional Feature Description
Logged MDT Logged Minimization of Drive Test
Logical Channel The number that can be employed to identify each virtual circuit (or logic channel) is
Identifier called logic channel identifier (LCI) or virtual circuit number (VCN).
Long Term Evolution LTE is a 3GPP advancement to current mobile telecommunications networks, designed
to significantly improve data rates to at least the tens of Mbps region per user (data rates
in the hundreds of Mbps region are possible if conditions are ideal). Standardized in
3GPP Release 8, LTE introduces a network which is based purely on IP as the transport
mechanism. That is, all traffic, including voice, will be passed across the E-UTRAN as
an IP datagram. LTE is predominantly associated with the radio access network, with
the SAE specifications defining the core network (termed the EPC).
loss measurement A method used to collect counter values applicable for ingress and egress service frames
where the counters maintain a count of transmitted and received data frames between a
pair of MEPs.
LSTI LTE SAE Trial Initiative
LTE See Long Term Evolution
LTE Basic Feature Prefix of eRAN basic-feature IDs.
Description
LTE Main Processing LTE main control transmission board, which provides the main control function and
Transmission Unit transport ports.
LTE Optional Feature Prefix of eRAN optional-feature IDs.
Description

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 29


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 13 M

13 M

M2000 See iManager M2000


MAC See Medium Access Control
MAC-I See Message Authentication Code for Integrity
Man-Machine A language designed to facilitate direct user control of a computer.
Language
Managed Object A Managed Object can be either a physical or logical resource which may be defined in
terms of its attributes. These attributes may be controlled by a network manager through
a manager agent interaction. Managed Objects form an important part of a TMN
(Telecommunication Management Network).
MAPL Maximum Allowed Path Loss
Master Information A master information block is used to specify what system information blocks are in use
Block in a cell, and how they should be accessed.
Maximum Ratio MRT is similar to Maximum Ratio Combining (MRC). The difference is that MRT
Transmission weights data at the transmitter whereas MRC weights data at the receiver. When the UE
uses only one antenna for reception, MRT works the same as EBF.
maximum transmission The largest packet of data that can be transmitted on a network. MTU size varies,
unit depending on the network—576 bytes on X.25 networks, for example, 1500 bytes on
Ethernet, and 17,914 bytes on 16 Mbit/s token ring. Responsibility for determining the
size of the MTU lies with the link layer of the network. When packets are transmitted
across networks, the path MTU, or PMTU, represents the smallest packet size (the one
that all networks can transmit without breaking up the packet) among the networks
involved.
MBMS Multimedia Broadcast/Multicast Service
MBR Maximum Bit Rate
MBSFN See Multimedia Broadcast multicast service Single Frequency Network
MC-PPP Multi-Class Point-to-Point Protocol
MCC See Mobile Country Code
MCE MAC Control Element
MCE MBMS Coordination Entity

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 30


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 13 M

MCS Modulation and Coding Scheme


MD5 See Message-Digest algorithm 5
MDT See Minimization of Drive-Tests
Mean Time Between The average time between consecutive failures of a piece of equipment. It is a measure
Failures of the reliability of the system.
Mean Time To The average time that a device will take to recover from any failure.
Recovery
Media Gateway A logical entity that converts the format of the media of a network to meet the format
requirement of another network. It can process audio services, video services and data
services, and convert the media format in full duplex mode. In addition, it can play certain
audio and video signals, and provide the IVR function and media conference.
Medium Access The Media Access Control (MAC) data communication protocol sub-layer, also known
Control as the Medium Access Control, is a sublayer of the Data Link Layer specified in the
seven-layer OSI model (layer 2). It provides addressing and channel access control
mechanisms that make it possible for several terminals or network nodes to communicate
within a multi-point network, typically a local area network (LAN) or metropolitan area
network (MAN). The hardware that implements the MAC is referred to as a Medium
Access Controller. The MAC sub-layer acts as an interface between the Logical Link
Control (LLC) sublayer and the network's physical layer. The MAC layer emulates a
full-duplex logical communication channel in a multi-point network. This channel may
provide unicast, multicast or broadcast communication service.
Message For details about MAC-I, see 3GPP TS 36.323.
Authentication Code
for Integrity
Message-Digest In cryptography, MD5 (Message-Digest algorithm 5) is a widely used cryptographic
algorithm 5 hash function with a 128-bit hash value. Specified in RFC 1321, MD5 has been employed
in a wide variety of security applications, and is also commonly used to check the
integrity of files. However, it has been shown that MD5 is not collision resistant; as such,
MD5 is not suitable for applications like SSL certificates or digital signatures that rely
on this property. An MD5 hash is typically expressed as a 32-digit hexadecimal number.
MGW See Media Gateway
MIB See Master Information Block
MIMO See Multiple-Input Multiple-Output
Minimization of Drive- A technique that utilizes commercial terminal to collect measurement result
Tests automatically, in order to detect and optimize the problem and failure in wireless
network.
Minimum Mean In statistics and signal processing, a minimum mean square error (MMSE) estimator
Square Error describes the approach which minimizes the mean square error (MSE), which is a
common measure of estimator quality.
ML-PPP Multi-Link Point-to-Point Protocol
MLB Mobility Load Balancing
MME See Mobility Management Entity
MME Code The IE MMEC identifies an MME within the scope of an MME Group within a PLMN.
MME Group Identifier The MMEGI uniquely identifies an MME group within a PLMN.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 31


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 13 M

MME Identifier The MMEI is constructed from an MMEGI (MME Group ID) and an MMEC (MME
Code), where the MMEGI provides the Group Identity of the registered MME within
the PLMN.
MMEC See MME Code
MMEGI See MME Group Identifier
MMEI See MME Identifier
MML See Man-Machine Language
MMSE See Minimum Mean Square Error
MNC See Mobile Network Code
MO See Managed Object
Mobile Country Code The Mobile Country Code is a three digit number uniquely identifying a given country.
It is utilized within the IMSI (International Mobile Subscriber Identity) and LAI
(Location Area Identity).
Mobile Network Code Either a two or three digit number used to uniquely identify a given network from within
a specified country (MCC (Mobile Country Code)). The MNC is used as part of the IMSI
(International Mobile Subscriber Identity) and LAI (Location Area Identity) etc. Short
for mobile network code, it consists of two or three digits and identifies a PLMN to which
a mobile subscriber belongs.
mobile switching center A logical entity that provides interfaces for interworking with the function entities in a
wireless system and the public network. It plays a core role for switch in the wireless
system. It provides mobile management and switch to mobile subscribers and sets up
communications between mobile subscribers, or between a mobile subscriber and a fixed
line subscriber.
Mobile Terminating A process of receiving calls by mobile subscribers.
Mobility Management An EPC entity that terminates the control plane with the mobile device. It is responsible
Entity for terminating NAS (Non Access Stratum) Signalling such as MM (Mobility
Management) and SM (Session Management) information as well as coordinating Idle
Mode procedures. Other responsibilities of the MME include gateway selection, inter
MME Mobility and authentication of the mobile device.
MRC Maximum Ratio Combining
MRFD See Multi-Mode RAN Feature Description
MRO Mobility Robust Optimization
MRT See Maximum Ratio Transmission
MSC See mobile switching center
MT See Mobile Terminating
MTBF See Mean Time Between Failures
MTTR See Mean Time To Recovery
MTU See maximum transmission unit
MU-MIMO Multi User - MIMO
Multi-Mode RAN Prefix of Multi-Mode RAN feature IDs.
Feature Description

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 32


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 13 M

Multimedia Broadcast an area of the network where all eNodeBs can be synchronized and perform MBSFN
multicast service Single transmissions On a given frequency layer.
Frequency Network
Multiple-Input A technology used in wireless communications, in which multiple antennas are used at
Multiple-Output each end of the transmission link. The antennas for transmitting signals at each end of
the transmission link are combined so that the signal error is minimized, and data
transmission rate is maximized.
MVNO Mobile Virtual Network Operator

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 33


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 14 N

14 N

NACC See Network Assisted Cell Change


NAS See Non-Access Stratum
NAS Node Selection When an eNodeB is connected to multiple MMEs through different S1 connections, the
Function eNodeB directs a UE that accesses the network to a suitable MME through an S1
connection. The function of selecting an MME is called NNSF.
NCC Next Hop Chaining Count
NCL See Neighbor Cell List
Ncs Number of CycleShift
Neighbor Cell List An NCL contains the information about neighboring cells of a cell, excluding intra-
eNodeB neighboring cells. The information includes the ECGIs, PCIs, and EARFCNs
of neighboring cells.
Neighbor Relation An NCL contains the information about the neighbor relations between a cell and its
Table neighboring cells.
Network Assisted Cell Network Assisted Cell Change (NACC) accelerates the cell reselection. This feature
Change minimizes the service interruption time due to the cell reselection.
Network Management A Network Management System (NMS) is a combination of hardware and software used
System to monitor and administer a network. Individual network elements (NEs) in a network
are managed by an element management system.
Network Time Protocol NTP is a protocol designed to synchronize the clocks of computers over a network. NTP
version 3 is an internet draft standard, formalized in RFC 1305. NTP version 4 is a
significant revision of the NTP standard, and is the current development version, but has
not been formalized in an RFC. SNTP (Simple NTP) version 4 is described in RFC 2030.
Next hop Routing term used for the next gateway to which packets should be forwarded along the
path to its final destination. one technique to make content of a routing table smaller is
called next-hop routing. A routing table usually contains the IP address of a destination
network and the IP address of the next gateway (next hop) along the path to the final
network destination. Using a routing table to store a next hop for each 'Known' destination
is called next-hop forwarding. Therefore a given gateway only knows one step along the
path, not the complete path to a destination. It is also key to know that the next hops
listed in a routing table are on networks to which the gateway is directly connected to.
NMS See Network Management System

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 34


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 14 N

NNSF See NAS Node Selection Function


Non-Access Stratum The protocols between UE and MSC or SGSN that are not terminated in the UTRAN,
and the protocols between UE and MME that are not terminated in the E-UTRAN.
Non-GBR Non-Guaranteed Bit Rate
NRT See Neighbor Relation Table
NTP See Network Time Protocol

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 35


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 15 O

15 O

OAM See Operation, Administration,and Management


Oassive Optical A passive optical network (PON) is a system that brings optical fiber cabling and signals
Network all or most of the way to the end user.
OCL Object Constraint Language
OFDM See Orthogonal Frequency Division Multiplexing
OFDMA See Orthogonal Frequency Division Multiple Access
OI Overload Indication
OL-SM See Open-Loop Spatial Multiplexing
OL-TD See Open-Loop Transmit Diversity
OLC Overload Control
OLT See Optical Line Terminal
OM See Operation and Maintenance
OMC See Operation and Maintenance Center
ONT See Optical Network Terminal
ONU See Optical Network Unit
Open-Loop Spatial In OL-SM mode, the UE needs not report precoding information. When the rank is equal
Multiplexing to 1, OL-SM is equivalent to OL-TD. When the rank is equal to 2, 3, or 4, OL-SM maps
data streams onto different layers and performs precoding.
Open-Loop Transmit In OL-TD mode, the diversity gain can be achieved. Space-frequency block coding
Diversity (SFBC) is used in the case of two TX antennas. The combination of SFBC and frequency
switched TX diversity (FSTD) is used in the case of four TX antennas.
Operating Support Operating Support System (OSS) is originally used in the telecommunication world to
System describe the processes and teams that monitor the underlying networks. Predominantly
looks after the functional and non-functional requirements of solutions/systems.
Monitoring, end-to-end design, and error handling tend to be the main areas of work.
Operation and Operation and Maintenance (OM) is the activities for monitoring and managing the
Maintenance equipment in the telecommunication network.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 36


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 15 O

Operation and An Operations and Maintenance Centre is an element within a network management
Maintenance Center system responsible for the operations and maintenance of a specific element or group of
elements. For example an OMC-Radio may be responsible for the management of a radio
subsystem where as an OMC-Switch may be responsible for the management of a switch
or exchange. However, these will in turn be under the control of a NMC (Network
Management Centre) which controls the entire network.
Operation, A group of network support functions that monitor and sustain segment operation,
Administration,and activities that are concerned with, but not limited to, failure detection, notification,
Management location, and repairs that are intended to eliminate faults and keep a segment in an
operational state and support activities required to provide the services of a subscriber
access network to users/subscribers.
Optical Line Terminal Abbreviation for optical line termination. Optical network elements that terminate a line
signal.
Optical Network A device that terminates the fiber optical network at the customer premises.
Terminal
Optical Network Unit A form of Access Node that converts optical signals transmitted via fiber to electrical
signals that can be transmitted via coaxial cable or twisted pair copper wiring to
individual subscribers.
Orthogonal Frequency Orthogonal Frequency Division Multiple Access (OFDMA) uses the OFDM technology
Division Multiple to divide users. Because data on different subcarriers are transmitted in parallel, OFDMA
Access is a frequency-division multiplexing access mode. In OFDMA, users share fast Fourier
transformation space on uplink links. The BS allocates subcarriers for users. In this way,
it can allocate different rates for different users.
Orthogonal Frequency A type of Multi-Carrier Modulation (MCM). In this multiplexing mode, a channel is
Division Multiplexing divided into multiple orthogonal subchannels. High-speed data signals are converted into
parallel low-speed subdata streams and are modulated for transmission on the
subchannels. Orthogonal signals can be separated at the receiver, reducing the
interference between subchannels. The signal bandwidth on each subchannel is smaller
than the related bandwidth of the channel; therefore, each subchannel can be regarded
as flat fading, canceling the interference between symbols. In addition, the bandwidth
of each subchannel is only a small part of the original channel bandwidth, and therefore
equalization becomes easier.
OSG Open Subscribe Group
OSS See Operating Support System
OTDOA Observed Time Difference of Arrival

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 37


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 16 P

16 P

P-GW PDN Gateway


P2P See peer to peer
Packet Data Packet Data Convergence Protocol is used in UMTS to format the data into a suitable
Convergence Protocol structure prior to transfer over the air interface.
Packet Error Loss Rate Sum of the error bit rate and the packet loss rate.
Packet Switched In a packet switched network, data may be transferred by dividing it into small blocks
or pieces known as packets. Each packet contains information in its header to allow it to
be routed by packet switches across the network. This is a more efficient means of
transferring data. An example of a packet switched network is the Internet.
Parts per million One part per million (ppm) denotes one part per 1,000,000 parts, one part in 106, and a
value of 1 × 10-6.
path maximum A method of discovering the supported MTU on a specific path by using ICMPv6
transmission unit Datagram Too Big messages.
PBCH See Physical Broadcast Channel
PCC Primary Component Carrier
PCCH Paging Control Channel
PCell See primary serving cell
PCFICH See Physical Control Format Indicator Channel
PCI See Physical Cell Identifier
PCRF Policy And Charging Rules Function
PDB Packet Delay Budget
PDCCH See Physical Downlink Control Channel
PDCP See Packet Data Convergence Protocol
PDH See Plesiochronous Digital Hierarchy
PDSCH See Physical Downlink Shared Channel
Peak Information Rate Peak information rate is a traffic parameter, expressed in bit/s, whose value should not
be less than the committed information rate.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 38


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 16 P

peer to peer The protocol or application based on the peer to peer techenology.
PELR See Packet Error Loss Rate
Per-Hop Behavior IETF Diff-Serv workgroup defines forwarding behaviors of network nodes as per-hop
behaviors (PHB), such as, traffic scheduling and policing. A device in the network should
select the proper PHB behaviors, based on the value of DSCP. At present, the IETF
defines four types of PHB. They are class selector (CS), expedited forwarding (EF),
assured forwarding (AF), and best-effort (BE).
PF Proportional Fair
Phase-locked Loop A circuit that consists essentially of a phase detector which compares the frequency of
a voltage-controlled oscillator with that of an incoming carrier signal or reference-
frequency generator; the output of the phase detector, after passing through a loop filter,
is fed back to the voltage-controlled oscillator to keep it exactly in phase with the
incoming or reference frequency.
PHB See Per-Hop Behavior
PHICH See Physical HARQ Indicator Channel
PHR Power Headroom Report
Physical Broadcast A physical broadcast channel is a transmission channel that is used to transfer
Channel information to all mobile devices that are operating in a radio coverage area. The
broadcast channel periodically sends (approximately every 40 msec) system
identification and access control parameters
Physical Cell Identifier Identifier of a physical cell.
Physical Control The physical control format indicator channel (PCFICH) is the physical channel that
Format Indicator carries the number of OFDM symbols for transmission of PDCCHs in a subframe.
Channel PCFICH is located at OFDM symbol #0 of every subframe, and the assignment to the
subcarriers is determined by cell ID information.
Physical Downlink The physical downlink control channel is a transmission channel that is used to transfer
Control Channel control information to mobile devices. The PDCCH defines how the paging channel and
shared downlink channels are configured and it defines uplink transmission scheduling
information to help coordinate access control to the radio system.
Physical Downlink In LTE the PDSCH carries the DL-SCH (Downlink Shared Channel). This is the only
Shared Channel downlink transport channel available to carry user data between the mobile device and
the eNB.
Physical HARQ The Physical Hybrid Automatic Repeat Request (ARQ) Indicator Channel (PHICH) is
Indicator Channel the physical channel that carries the Hybrid ARQ Indicator (HI). The HI contains the
Acknowledgment/Negative Acknowledgement (ACK/NACK) feedback to the UE for
the uplink blocks received by the eNodeB.
Physical Multicast The Physical Multicast Channel is the physical channel that carries the Multicast Channel
Channel (MCH) transport channel. The PMCH is similar to the PDSCH except that it carries
information to multiple users for point-to-multipoint services.
Physical Random The PRACH is an uplink physical channel used to convey control information for access
Access Channel purpose. It also carries short user packets from the UE.
Physical Resource A E-UTRA PRB (Physical Resource Block) is defined as consisting of 12 consecutive
Block subcarriers for one slot (0.5 ms). A PRB is the smallest element of resource allocation
assigned by the eNB scheduler.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 39


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 16 P

PIR See Peak Information Rate


PKI See Public Key Infrastructure
Plesiochronous Digital The Plesiochronous Digital Hierarchy (PDH) is a technology used in
Hierarchy telecommunications networks to transport large quantities of data over digital transport
equipment such as fibre optic and microwave radio systems.
PLL See Phase-locked Loop
PLMN See Public Land Mobile Network
PMCH See Physical Multicast Channel
PMI Precoding Matrix Indication
PMTU See path maximum transmission unit
PMU See Power Monitoring Unit
PnP Plug-and-Play
Point-to-Point Protocol The method, PPP Multiplexing, sends multiple PPP encapsulated packets (sub-frames)
multiplexing in a single PPP frame. As a result, the PPP overhead per packet is reduced. It is applicable
to transport small packets such as voice and data over slow links.
Point-to-Point Protocol PPPoE, point-to-point protocol over Ethernet, is a network protocol for encapsulating
Over Ethernet PPP frames in Ethernet frames. It is used mainly with DSL services. It offers standard
PPP features such as authentication, encryption, and compression.
polarization A kind of electromagnetic wave, the direction of whose electric field vector is fixed or
rotates regularly. Specifically, if the electric field vector of the electromagnetic wave is
perpendicular to the plane of horizon, this electromagnetic wave is called vertically
polarized wave; if the electric field vector of the electromagnetic wave is parallel to the
plane of horizon, this electromagnetic wave is called horizontal polarized wave; if the
tip of the electric field vector, at a fixed point in space, describes a circle, this
electromagnetic wave is called circularly polarized wave.
Polarized antenna An antenna measured by aligning the target antenna and the probe antenna and then
carrying out the measurement twice when the probe antenna is at 0 degrees and 90
degrees.
PON See Oassive Optical Network
Power headroom The power headroom is a measure of the difference between the maximum terminal
transmit power and the uplink transmit power that would have been used assuming that
the mobile terminal would not have been limited by its maximum transmit power. Thus,
the power headroom can very well be negative. More exactly, a negative power
headroom indicates that the mobile terminal transmit power was limited by Pmax at the
time of the power headroom reporting.
Power Monitoring Unit Power Monitoring Unit (PMU) is the core of power and environment monitoring.
Environment variables are collected, processed, and reported through the PMU.
ppm See Parts per million
PPPmux See Point-to-Point Protocol multiplexing
PPPoE See Point-to-Point Protocol Over Ethernet
PPS See Pulse Per Second
PQ See Priority Queuing

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 40


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 16 P

PRACH See Physical Random Access Channel


PRB See Physical Resource Block
Precision Time The Precision Time Protocol (PTP) is a high-precision time protocol for synchronization
Protocol used in measurement and control systems residing on a local area network. Accuracy in
the sub-microsecond range may be achieved with low-cost implementations.
primary serving cell A cell which CA UE has RRC Connection.
Priority Queuing Priority queuing is an algorithm that assigns each queue a priority. Packets in the queue
with the highest priority are handled first. Packets in the queue with the lowest priority
are discarded first in case of congestion. If there are too many packets with higher
priorities, packets with lower priorities cannot be serviced.
Protection grounding A bar in a cabinet to which the PGND cable is connected to ensure that the cabinet and
Bar earth are equipotentially connected.
PRS Positioning reference signal
PS See Packet Switched
PSIC parallel soft interference cancellation
PSIC Parallel Successive Interference Cancellation
PTP See Precision Time Protocol
Public Key Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and
Infrastructure procedures needed to create, manage, distribute, use, store, and revoke digital
certificates. In cryptography, a PKI is an arrangement that binds public keys with
respective user identities by means of a certificate authority (CA). The user identity must
be unique within each CA domain.
Public Land Mobile A Public Land Mobile Network is a generic name for all mobile wireless networks that
Network use land based radio transmitters or base stations.
PUCCH Physical Uplink Control Channel
Pulse Per Second A Pulse per second (PPS) is an electrical signal that very precisely indicates the start of
a second. PPS signals are output by various types of precision clocks, including some
models of GPS receivers. Depending on the source, properly operating PPS signals have
an accuracy ranging from a few nanoseconds to a few milliseconds.
PUSCH Physical Uplink Shared Channel
PWS Public Warning System

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 41


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 17 Q

17 Q

QCI QoS Class Identifier


QoS See Quality of Service
QPSK See Quaternary Phase Shift Keying
Quality of Service The collective effect of service performances which determine the degree of satisfaction
of a user of a service. It is characterised by the combined aspects of performance factors
applicable to all services, such as service operability performance, service accessibility
performance, service retainability performance, and service integrity performance.
Quaternary Phase Shift Quadrature phase shift keying (QPSK) is a method for transmitting digital data across
Keying an analog channel. Data bits are grouped into pairs and represented by a unique
waveform, called a symbol. Data may be simulated with a pseudo-noise sequence
generator.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 42


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 18 R

18 R

RA Random Access
RA See Registration Authority
RAC See Routing Area Code
RACH See Random Access Channel
Radio Access Network The radio access network performs the radio functionality of the network, as well as
providing the connection to the CN (Core Network).
Radio Access RAT indicates the type of radio technology to access the CN (Core Network). Example
Technology technologies being UTRA (UMTS Terrestrial Radio Access), CDMA2000®, DECT
(Digital Enhanced Cordless Technology), GERAN (GSM EDGE Radio Access
Network) etc.
Radio bearer Radio bearers are classified into data radio bearers (DRBs) and signaling radio bearers
(SRBs). A DRB transmits packets of an EPS bearer between a UE and an eNodeB, and
an SRB transmits signalling between a UE and an eNodeB.
Radio Frequency A term that refers to alternating current (AC) havingcharacteristics such that, if the
current is input to an antenna, an electromagnetic (EM) field is generated suitable for
wireless broadcastingand/or communications. These frequencies cover asignificant
portion of the electromagnetic radiation spectrum, extending from nine kilohertz (9
kHz),the lowest allocated wireless communications frequency (it's within the range of
human hearing), to thousands of gigahertz(GHz).
Radio Link Control Radio Link Control (RLC) is a link-layer protocol that is responsible for error recovery
and flow control.
Radio Network The equipment in the RNS in charge of controlling the use and the integrity of the radio
Controller resources.
Radio Network A Radio Network Temporary Identifier is a generic term of an identifier for a UE when
Temporary Identifier an RRC connection exists. It consists of the Cell RNTI (C-RNTI), Serving RNC RNTI
(S-RNTI) and UTRAN RNTI (U-RNTI).
Radio Resource A sublayer of radio interface Layer 3 existing in the control plane only which provides
Control information transfer service to the non-access stratum. RRC is responsible for controlling
the configuration of radio interface Layers 1 and 2.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 43


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 18 R

radio resource Planning and scheduling of the air interface resources for the mobile communication
management system. It manages all air interface resources, such as creating, monitoring, modifying,
or removing sites, sectors, or carriers.
RADIUS See Remote Authentication Dial in User Service
RAN See Radio Access Network
Random Access The channel used for initial access into a system. The RACH function is different
Channel depending on the technology of the system.
RAT See Radio Access Technology
RB Resource Block
RB See Radio bearer
RCU See Remote Control Unit
RDI See remote defect indication
RE See Resource Element
RE Range Expansion
Real Time Protocol Real-time Transport Protocol (RTP) is a host-to-host protocol. It is used to deliver real-
time services such as audio and video over the IP network.
Received Signal Code Given only signal power is received, the average power of the received signal after
Power despreading and combining.
Received Signal The received wide band power, including thermal noise and noise generated in the
Strength Indicator receiver, within the bandwidth defined by the receiver pulse shaping filter, for TDD
within a specified timeslot. The reference point for the measurement shall be the antenna.
Refarming Reassigning government-regulated electromagnetic spectrum for services with higher
value(e.g. GSM Spectrum reassigned to LTE with higher capacity.).
Reference Signal In the LTE E-UTRA there are various types of reference signals used in the uplink and
downlink directions. In the uplink there are two types namely the Demodulation
reference signal and the Sounding reference signal. In the downlink, there are three main
types: Cell Specific (non-MBSFN), MBFSN (Multimedia Broadcast Multicast Service
Single Frequency Network) and UE Specific
Registered PLMN The PLMN on which the UE has performed a location registration successfully.
Registration Authority A registration authority (RA) is an authority in a network that verifies user requests for
a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a
public key infrastructure (PKI), a networked system that enables companies and users
to exchange information and money safely and securely. The digital certificate contains
a public key that is used to encrypt and decrypt messages and digital signatures.
Relative Narrowband This IE provides an indication on DL power restriction per PRB in a cell and other
TX Power information needed by a neighbour eNB for interference aware scheduling.
Remote Authentication Remote Authentication Dial In User Service (RADIUS) is a networking protocol that
Dial in User Service provides centralized Authentication, Authorization, and Accounting (AAA)
management for computers to connect and use a network service. RADIUS serves three
functions: - to authenticate users or devices before granting them access to a network, -
to authorize those users or devices for certain network services and - to account for usage
of those services.
Remote Control Unit A driving motor of the phase shifter in a Remote Electrical Tilt (RET) antenna.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 44


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 18 R

remote defect A signal transmitted at the first opportunity in the outgoing direction when a terminal
indication detects specific defects in the incoming signal.
Remote Radio Unit Remote Radio Unit (RRU) is a component of the distributed base station. It performs
the Intermediate Frequency (IF) processing (digital I/Q modulation/demodulation,
frequency up-/down-conversion, and DA/AD conversion) of the signals, Radio
Frequency (RF) processing, and duplex.
Resource Element The smallest unit at the physical layer.
RET antenna The electrical downtilt can be continuously adjusted using the mechanically-adjustable
phase shifter built in the antenna.
RF See Radio Frequency
RFU Radio frequency unit
RGPS Remote Global Position System
RLC See Radio Link Control
RLF Radio Link Failure
RNC See Radio Network Controller
RNTI See Radio Network Temporary Identifier
RNTP See Relative Narrowband TX Power
RObust Header Robust Header Compression (ROHC) is a standardized method to compress the IP, UDP,
Compression RTP, and TCP headers of Internet packets. This compression scheme differs from other
compression schemes such as IETF RFC 1144 and RFC 2508 by the fact that it performs
well over links where the packet loss rate is high, such as wireless links.
ROHC See RObust Header Compression
Routing Area Code A routing Area Code is a fixed length of 1 octet and identifies a routing area within a
location area. The RAC is part of the Routing Area Identity (RAI).
RPLMN See Registered PLMN
RR Round Robin
RRC See Radio Resource Control
RRM See radio resource management
RRU See Remote Radio Unit
RS See Reference Signal
RSCP See Received Signal Code Power
RSRP Reference Signal Received Power
RSRQ Reference Signal Received Quality
RSSI See Received Signal Strength Indicator
RTP See Real Time Protocol
RTT Radio Transfers Technology

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 45


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 19 S

19 S

S-GW See Serving Gateway


S-P Serial to Parallel
S1 Application Part In the LTE E-UTRAN the S1AP is the main control protocol on the S1 interface, i.e.
between the eNB and the MME.
S1 Application Protocol For details about S1AP, see 3GPP TS 36.413.
S1-MME interface An interface between the eNodeB and the MME for transfer of control information.
S1-U Interface An interface between the eNodeB and the S-GW for transfer of user data packets.
S1AP See S1 Application Part
S1AP See S1 Application Protocol
SA See Security Association
SAE See System Architecture Evolution
SAW See Stop And Wait
SC-FDMA See Single Carrier Frequency Division Multiple Access
SCC Secondary Component Carrier
SCell See secondary serving cell
SCTP See Stream Control Transmission Protocol
SDH See Synchronous Digital Hierarchy
SDMA space division multiple access
SDU See Service Data Unit
Second Order A ROHC compressor is in one of 3 main states. In Second-Order (SO) state, the
compressor is suppressing all dynamic fields such as RTP sequence numbers, and
sending only a logical sequence number and partial checksum to cause the other side to
predictively generate and verify the headers of the next expected packet. The SO state
is the optimum state of the compressor.
secondary serving cell A cell which is configured to CA UE for data transmission without RRC Connection.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 46


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 19 S

Secure Hash Algorithm The Secure Hash Algorithm is one of a number of cryptographic hash functions published
by the National Institute of Standards and Technology as a U.S. Federal Information
Processing Standard. There are currently three generations of Secure Hash Algorithm:
SHA-1 is the original 160-bit hash function. Resembling the earlier MD5 algorithm, this
was designed by the National Security Agency (NSA) to be part of the Digital Signature
Algorithm. Originally just called "SHA", it was withdrawn shortly after publication due
to an undisclosed "significant flaw" and replaced by the slightly revised version SHA-1.
The original withdrawn algorithm is now known by the retronym SHA-0. SHA-2 is a
family of two similar hash functions, with different block sizes, known as SHA-256 and
SHA-512. They differ in the word size; SHA-256 uses 32-bit words where SHA-512
uses 64-bit words. There are also truncated versions of each standardized, known as
SHA-224 and SHA-384. These were also designed by the NSA. SHA-3 is a future hash
function standard still in development. This is being chosen in a public review process
from non-government designers. An ongoing NIST hash function competition is
scheduled to end with the selection of a winning function, which will be given the name
SHA-3, in 2012.
Secure Socket Layer SSL is a security protocol developed by Netscape Communications to ensure the security
of Internet communications.
Security Association A security association (SA) is the establishment of shared security information between
two network entities to support secure communication. An SA may include
cryptographic keys, initialization vectors or digital certificates. An SA is a simplex (one-
way channel) and logical connection which endorses and provides a secure data
connection between the network devices. The fundamental requirement of an SA arrives
when the two entities communicate over more than one channel. Take an example of
mobile subscriber and a base station. The subscriber may subscribe itself for more than
one service. Therefore each service may have different service primitives like a data
encryption algorithm, public key or initialization vector. Now to make things easier, all
this security information is grouped logically. This logical group itself is a Security
Association.
Security Gateway A gateway that provides protection methods such as firewall, attack detection, flow
control, and equipment operation access control to prevent the equipment in the IMS
domain from being attacked.
Security Parameter A numeric identifier in IPsec, used with the destination address and security protocol to
Index identify a security association (SA).
Security Policy The SPD specifies what protection measures are to be taken on IP packets.
Database
SeGW See Security Gateway
Self-Organizing The main functions of Self-Organizing Network (SON) are self-configuration, self-
Network optimization, and self-healing.
Sequence Number An identifying number used to designate a data block, an operation, or a part of an
operation.
Service Data Unit Data transferred between adjacent layers in the protocol stack.
Serving Gateway Within the EPC the S-GW is responsible tunnelling user plane traffic between the eNB
and the PDN-GW. To do this its role includes acting as the mobility anchor point for the
User Plane during handovers between eNB as well as data buffering when traffic arrives
for a mobile in the LTE Idle state. Other functions performed by the S-GW include
routing, Lawful Interception and billing.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 47


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 19 S

serving GPRS support A functional entity used for providing packet data services. It is responsible for
node forwarding incoming/outgoing Internet Protocol (IP) packets to mobile stations (MSs)
within the service area of the SGSN. It traces the location of an individual MS and
performs security functions and access control. In Universal Mobile
Telecommunications System (UMTS) networks, the SGSN is connected to the radio
network controller (RNC) over the Iu-PS interface. It requests policy decision point
(PDP) contexts from the Gateway GPRS Support Node (GGSN).
SFBC Space Frequency Block Coding
SFN See System Frame Number
SFN See Single Frequency Network
SGSN See serving GPRS support node
SHA See Secure Hash Algorithm
Short Message Service The SMS (Short Messaging Service) that allows a SME (Short Message Entity) to send
short text messages to other SME.
SI System Information
SIB See System Information Block
Signal to Noise Ratio The ratio of the amplitude of the desired signal to the amplitude of noise signals at a
given point in time. SNR is expressed as 10 times the logarithm of the power ratio and
is usually expressed in dB (Decibel).
Signaling Radio Bearer The RRC (Radio Resource Control) connection process will establish the RB (Radio
Bearer) available for usage by RRC messages on the DCCH (Dedicated Control Channel)
and CCCH (Common Control Channel). These Radio Bearers are identified as a SRB
(Signaling Radio Bearer).
SIMO Single-Input Multiple-Output
Single Carrier Single-carrier FDMA (SC-FDMA) is a frequency-division multiple access scheme. It is
Frequency Division a multi-user version of the Single-carrier frequency-domain-equalization (SC-FDE)
Multiple Access modulation scheme
Single Frequency A broadcast network where several transmitters simultaneously send the same signal
Network over the same frequency channel.
Single Radio Voice Call Voice call continuity between IMS over PS access and CS access for calls that are
Continuity anchored in IMS when the UE is capable of transmitting/receiving on only one of those
access networks at a given time.
SINR Signal to Interference plus Noise Ratio
SISO Single-Input Single-Output
SLC Sleeping Cell
Slip frame In the reception of framed data, a frame slip is the loss of synchronization between a
received frame and the receiver clock signal, causing a frame misalignment event, and
resulting in the loss of the data contained in the received frame.
SLP SUPL Location Platform
SM Spatial Multiplexing
SMS See Short Message Service
SN See Sequence Number

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 48


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 19 S

SNR See Signal to Noise Ratio


SO See Second Order
SON See Self-Organizing Network
Space Division Each distinct signal or message travels over a separate physical path such as its own wire
Multiplexing or wire pair within a cable.
Space Time Coding A signal coding technology that can be used to obtain enhanced data transmission rates.
It combines the space transmitted signals and time transmitted signals. In essence, it is
a two-dimension (space dimension and time dimension) processing method. In a new-
generation communication system, space diversity achieved through multiple transmit
and receive antennas raises the system capacity and information rate. Meanwhile,
different signals are transmitted in different timeslots by the same antenna, and therefore
receive diversity can be implemented at the receiver end. In this way, diversity and coding
gains are obtained to achieve high-speed transmission. This technology is used in 3G
communications systems to increase spectrum utilization.
Spatial multiplexing Spatial multiplexing gain is a throughput gain achieved by adding spatial channels
gain without increasing the total bandwidth and total TX power.
SPD See Security Policy Database
SPI See Security Parameter Index
SPID Subscriber Profile ID
SR Scheduling Request
SRB See Signaling Radio Bearer
SRS Sounding Reference Signal
SRVCC See Single Radio Voice Call Continuity
SSL See Secure Socket Layer
SSS Secondary Synchronization Signal
STC See Space Time Coding
Stop And Wait A mechanism in which the transmitter processes another data block only after the
previously transmitted data block is correctly received.
Stream Control Stream Control Transmission Protocol is a reliable transport protocol operating on top
Transmission Protocol of IP. It provides acknowledged error free non duplicated transfer of data with flow
control. STCP also detects data corruption, loss of data and duplication of data by using
checksums and sequence numbers. A selective retransmission mechanism is applied to
correct loss or corruption of the data.
SU-MIMO single user multiple-input multiple-output
SUPL Secure User Plane Location
SVLTE Simultaneous Voice and LTE
Synchronous Digital A method of transmitting digital information where the data is packed in containers
Hierarchy which are synchronized in time enabling relatively simple multiplexing and
demultiplexing at the transmitting and receiving ends. The technique is used to carry
high capacity information over long distances up to speeds of 10Gbps.
System Architecture The core network architecture of 3GPP's future LTE wireless communication standard.
Evolution

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 49


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 19 S

System Frame Number The system frame number is used to uniquely identify a random access.
System Information The system information elements are broadcast in system information blocks. A system
Block information block groups together system information elements of the same nature.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 50


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 20 T

20 T

TA See Tracking Area


TAC See Tracking Area Code
TAI See Tracking Area Identifier
TAL See Tracking Area List
Target Cell Identifier Identifier of a target cell.
TBS Transport Block Size
TCE Trace Collection Entity
TCI See Target Cell Identifier
TCO Total Cost of Operation
TCP See Transmission Control Protocol
TD-SCDMA Time Division Synchronous Code Division Multiple Access
TDD See Time Division Duplex
TDMA See Time Division Multiple Access
TDOA See Time Difference of Arrival
TEID See Tunnel Endpoint Identifier
TF See Transport Format
TFT Traffic Flow Template
Third Generation A collaboration agreement that was formed in December 1998 bringing together a
Partnership Project number of telecommunication standards bodies. These standards bodies are referred to
as Organizational Partners. The original aim of the 3GPP was to produce globally
applicable technical specifications for third generation mobile systems based on evolved
GSM core networks and the radio access technology UTRA (Universal Terrestrial Radio
Access). This was subsequently amended to include the maintenance and development
of the GSM standards including GPRS and EDGE (Enhanced Data rates for Global
Evolution). Further network developments attributed to the 3GPP included evolution of
service management through IMS, increased data rates in the UTRA via HSUPA/
HSDPA and most recently, a new access and core network commonly termed LTE.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 51


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 20 T

Time Difference of The difference of time that positioning reference signals from two cells arrive at a UE.
Arrival Since radio wave propagate at the speed of light, the difference of distances between the
UE and two cells is determined by multiplying TDOA by the speed of light.
Time Division Duplex In a Time Division Duplex system a common carrier is shared between the uplink and
downlink, the resource being switched in time. Users are allocated one or more timeslots
for uplink and downlink transmission. The main advantage of TDD operation is that it
allows asymmetric flow which is more suited to data transmission.
Time Division Multiple A communications technique that uses a common channel (multipoint or broadcast) for
Access communications among multiple users by allocating unique time slots to different users.
(188) Note: TDMA is used extensively in satellite systems, local area networks, physical
security systems, and combat-net radio systems.
Time Switched Time Switched Transmit Diversity (TSTD) is a technique utilizing multiple transmit
Transmit Diversity stations to originate the downlink signal and improve performance. The transmit station
used is determined by a fixed selection pattern similar to frequency hopping.
TM See Transparent Mode
TMA See Tower Mounted Amplifier
TOD Time of Day
Tower Mounted A Tower Mounted Amplifier or Mast Head Amplifier is a Low-noise amplifier (LNA)
Amplifier mounted as close as practical to the antenna in mobile masts or Base Transceiver Stations.
A TMA reduces the base transceiver station noise figure (NF) and therefore improve its
overall sensitivity; in other words the mobile mast is able to receive weaker signals.
TPC See Transmit Power Control
Tracking Area The TA is a concept introduced to the LTE/SAE system for location management of
UEs. A TA is identified by a Tracking Area Identity (TAI), which consists of the MCC,
MNC, and Tracking Area Code (TAC).
Tracking Area Code Code of a Tracking Area (TA).
Tracking Area Unique identity of a Tracking Area (TA).
Identifier
Tracking Area List List of multiple Tracking Areas (TAs).
Transmission Control The protocol within TCP/IP that governs the breakup of data messages into packets to
Protocol be sent via IP (Internet Protocol), and the reassembly and verification of the complete
messages from packets received by IP. A connection-oriented, reliable protocol (reliable
in the sense of ensuring error-free delivery), TCP corresponds to the transport layer in
the ISO/OSI reference model.
Transmit Power Transmit Power Control is a technical mechanism used within some networking devices
Control in order to prevent too much unwanted interference between different wireless networks
(e.g. the owner's network and the neighbour's network).
Transparent Mode The transparent service in Radio Link Control (RLC). RLC TM functions include but
are not limited to transfer of user data and segmentation and reassembly.
Transport Format A Transport Format is defined as a format offered by L1 to MAC for the delivery of a
Transport Block Set during a Transmission Time Interval on a Transport Channel. The
Transport Format constitutes of two parts - one dynamic part and one semi-static part.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 52


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 20 T

Triple Data Encryption In cryptography, Triple DES (3DES[1]) is the common name for the Triple Data
Standard Encryption Algorithm (TDEA) block cipher, which applies the Data Encryption
Standard (DES) cipher algorithm three times to each data block. Because the key size of
the original DES cipher was becoming problematically short, Triple DES was designed
to provide a relatively simple method of increasing the key size (three 56-bit DES keys)
of DES to protect against brute force attacks, without designing a completely new block
cipher algorithm.
TSTD See Time Switched Transmit Diversity
TTI Transmission Time Interval
Tunnel Endpoint The TEID unambiguously identifies a tunnel endpoint in the receiving GTP-U (GPRS
Identifier Tunnelling Protocol - User) or GTP-C (GPRS Tunnelling Protocol - Control) protocol
entity. The receiving side of a GTP tunnel locally assigns the TEID value for the
transmitting side to use. The TEID values are exchanged between tunnel endpoints using
GTP-C messages (or RANAP) in the UTRAN.
TX Transmit

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 53


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 21 U

21 U

UDP See User Datagram Protocol


UE See User Equipment
UE security capabilities A set of identifiers corresponding to the ciphering and integrity algorithms implemented
in the UE.
UL See Uplink
UL-SCH Uplink Shared Channel
UM See Unacknowledged Mode
UMB Ultra Mobile Broadband
UMTS See Universal Mobile Telecommunications System
UMTS Terrestrial A standard for 3G mobile communications services being specified by 3GPP. The radio
Radio Access access components of UTRA are based on direct-spread wideband code-division
multiple access (WCDMA) and hybrid time-division (TDCDMA) access methods that
have been designed for 3G frequency efficiency, mobility, and QoS requirements.
Unacknowledged Mode A Layer 2 mode where no retransmission protocol is used and data delivery is not
guaranteed. Cell broadcast messages and some RRC messages are transmitted in
unacknowledged mode.
Universal Mobile A 3G mobile communication system which supports improved data rates over GSM and
Telecommunications subsequently provides an enhanced range of multimedia services. UMTS has increased
System convergence between telecommunications, IT (Information technology), media and
content industries to deliver new services and create fresh revenue generating
opportunities. UMTS delivers low cost, high capacity mobile communications, offering
data rates as high as 2Mbps (under ideal conditions) with global roaming and other
advanced capabilities. The specifications defining UMTS are formulated by the 3GPP.
Universal Serial Bus A serial bus standard to interface devices. It was designed for computers such as PCs
and the Apple Macintosh, but its popularity has prompted it to also become commonplace
on video game consoles and PDAs.
Universal Subscriber Usually referred to as a SIM card, the USIM (UMTS Subscriber Identity Module) is the
Identity Module user subscription to the UMTS mobile network. The USIM contains relevant information
that enables access onto the subscribed operator's network.

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 54


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 21 U

Universal Terrestrial UTRAN is a conceptual term identifying that part of the network which consists of RNCs
Radio Access Network and Node Bs between Iu and Uu interfaces.
Universal Time The world-wide scientific standard of timekeeping. It is based upon carefully maintained
Coordinated atomic clocks and is kept accurate to within microseconds worldwide.
Universal LTE extension transmission board, which provides E1 ports.
Transmission
Processing unit
Uplink An "uplink" is a unidirectional radio link for the transmission of signals from a MS to a
base station, from a Mobile Station to a mobile base station or from a mobile base station
to a base station.
UpPTS Uplink Pilot Time Slot
USB See Universal Serial Bus
User Datagram A TCP/IP standard protocol that allows an application program on one device to send a
Protocol datagram to an application program on another. User Datagram Protocol (UDP) uses IP
to deliver datagrams. UDP provides application programs with the unreliable
connectionless packet delivery service. Thus, UDP messages can be lost, duplicated,
delayed, or delivered out of order. UDP is used to try to transmit the data packet, that is,
the destination device does not actively confirm whether the correct data packet is
received.
User Equipment A device allowing a user access to network services.
User plane A set of traffic forwarding components that the traffic flow passes through. The OAM
CV or FFD packet is periodically inserted to this traffic flow to monitor the working
status of the forwarding components. In the IETF drafts, the user plane is called data
plane.
USIM See Universal Subscriber Identity Module
UTC See Universal Time Coordinated
UTRA See UMTS Terrestrial Radio Access
UTRAN See Universal Terrestrial Radio Access Network
UTRP See Universal Transmission Processing unit

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 55


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 22 V

22 V

VDSL See Very-high-data-rate Digital Subscriber Line


Very-high-data-rate An xDSL technology that provides data transmission up to a theoretical limit of 52 Mbit/
Digital Subscriber Line s in the downstream direction and 12 Mbit/s in the upstream direction over a single
twisted pair.
Virtual Local Area A logical grouping of two or more nodes which are not necessarily on the same physical
Network network segment but which share the same IP network number. This is often associated
with switched Ethernet.
VLAN See Virtual Local Area Network
VMIMO Virtual MIMO
Voice over IP An IP telephony term for a set of facilities used to manage the delivery of voice
information over the Internet. VoIP involves sending voice information in a digital form
in discrete packets rather than by using the traditional circuit-committed protocols of the
public switched telephone network (PSTN).
VoIP See Voice over IP
Voltage Standing Wave The ratio of the maximum/minimum values of standing wave pattern along a
Ratio transmission line to which a load is connected. VSWR value ranges from 1 (matched
load) to infinity for a short or an open load. For most base station antennas the maximum
acceptable.
VRB Virtual Resource Block
VSWR See Voltage Standing Wave Ratio

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 56


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 23 W

23 W

WCDMA See Wideband Code Division Multiple Access


Weighted Round Robin A scheduling discipline, in which the weight of a queue represents the number of served
packets in a complete round; different weights are assigned to different queues; one
packet is transmitted in each scheduling. Therefore, each queue uses bandwidth resources
proportional to the number of the packets in the queue.
white noise The noise of which the spectrum density is even in the frequency domain or the space
domain.
Wideband Code A standard defined by the ITU-T for the third-generation wireless technology derived
Division Multiple from the Code Division Multiple Access (CDMA) technology.
Access
WiMAX Worldwide Interoperability for Microwave Access
Wireless Local Area A generic term covering a multitude of technologies providing local area networking via
Network a radio link. Examples of WLAN technologies include WiFi (Wireless Fidelity), 802.11b
and 802.11a, HiperLAN, Bluetooth, etc.
wiring terminal A point to which a wire can be connected.
WLAN See Wireless Local Area Network
WNP Warning Notification Provider
WRR See Weighted Round Robin

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 57


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 24 X

24 X

x Digital Subscriber A family of bandwidth-efficient modulation techniques, developed to achieve extremely


Line high data transfer rates over twisted- pair cables. While the letter "X" represents a
variable, DSL stands for "Digital Subscriber Line". XDSL techniques may offer several
benefits such as, capability to offer high-speed data services to customers, low cost by
using existing infrastructure and switching congestion relief caused by existing data
users.
xDSL See x Digital Subscriber Line
XMAC-I Expected MAC-I

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 58


Copyright © Huawei Technologies Co., Ltd.
eNodeB
Glossary 25 Z

25 Z

ZC Zadoff-Chu sequence

Issue 02 (2013-07-22) Huawei Proprietary and Confidential 59


Copyright © Huawei Technologies Co., Ltd.

Das könnte Ihnen auch gefallen