Beruflich Dokumente
Kultur Dokumente
Glossary
Issue 02
Date 2013-07-22
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Overview
This document provides LTE terms, acronyms, and abbreviations.
Version
The following table lists the product versions related to this document.
DBS3900 V100R008C00
The mapping single-mode base station version
DBS3900 TDD
is:
BTS3900 eNodeB: V100R006C00
BTS3900A
BTS3900L
BTS3900AL
BTS3202E
Intended Audience
This document is intended for:
l Network planners
l eNodeB installers
l Field engineers
l System engineers
l Shift operators
l Site maintainers
l Network operators
l Network administrators
Organization
1 Numerics
2A
3B
4C
5D
6E
7F
8G
9H
10 I
11 K
12 L
13 M
14 N
15 O
16 P
17 Q
18 R
19 S
20 T
21 U
22 V
23 W
24 X
25 Z
Conventions
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
General Conventions
The general conventions that may be found in this document are defined as follows.
Convention Description
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Keyboard Operations
The keyboard operations that may be found in this document are defined as follows.
Format Description
Key Press the key. For example, press Enter and press Tab.
Key 1+Key 2 Press the keys concurrently. For example, pressing Ctrl+Alt
+A means the three keys should be pressed concurrently.
Key 1, Key 2 Press the keys in turn. For example, pressing Alt, A means
the two keys should be pressed in turn.
Mouse Operations
The mouse operations that may be found in this document are defined as follows.
Action Description
Click Select and release the primary mouse button without moving
the pointer.
Drag Press and hold the primary mouse button and move the
pointer to a certain position.
Contents
24 X....................................................................................................................................................58
25 Z....................................................................................................................................................59
1 Numerics
1xCS IWS Circuit Switched Fallback Interworking Solution Function for 3GPP2 1xCS
3DES See Triple Data Encryption Standard
3GPP See Third Generation Partnership Project
2 A
A-GPS Assisted-GPS
AAA See Authentication, Authorization and Accounting
AAS Adaptive Antenna System
ABS Almost Blank Subframe
Access Control List An Access Control List (ACL) is a list of IP addresses. It is used for client authentication.
Access Stratum An access stratum is a communication medium or system that can be used to request and
set up the transfer of data or information between points.
ACK/NACK Acknowledgement/Not-acknowledgement
Acknowledged Mode The acknowledged services in Radio Link Control (RLC) provide reliability through
retransmission. These include but are not limited to: transfer of user data, segmentation
and reassembly, error correction, duplicate detection, protocol error detection and
recovery, and ciphering.
ACL See Access Control List
ACSI Average Cell Stay Interval
Active Queue AQM is used for routers on the internet. It discards data packets or adds an explicit
Management congestion notification (ECN) to data packets before a queue on a router is full.
Adaptive Modulation Link adaptation (AMC: adaptive modulation and coding) with various modulation
and Coding schemes and channel coding rates is applied to the shared data channel. The same coding
and modulation is applied to all groups of resource blocks belonging to the same L2 PDU
scheduled to one user within one TTI and within a single stream.
ADSL See Asymmetric Digital Subscriber Line
Advanced Encryption Originally, the Advanced Encryption Standard (AES) is an encryption algorithm used
Standard by some U.S government departments to guarantee the security of some secret but
unclassified materials. Now, AES has become the most influential encryption standard
all around the world.The AES algorithm is used to ensure the system security.
Advanced Power The Advanced Power Module (APM) is a standalone cabinet configured with related
Module modules for DC power supply, battery management, power system monitoring, power
distribution, surge protection, temperature control, and backup power supply. It also
provides AC power ports for maintenance and 4 U or 5 U space for 19-inch customer
equipment complying with the ETSI standard.
Array gain Array gain is a power gain achieved by combining signals from different antennas based
on the correlation between signals and the non-correlation between noises. Signal
combining increases the signal to interference plus noise ratio (SINR) of the combined
signal.
AS See Access Stratum
Asymmetric Cryptography in which a pair of keys is used to encrypt and decrypt a message. The
cryptography essential difference to symmetric cryptography is that this kind of algorithm uses two
different keys for encryption and corresponding decryption.
Asymmetric Digital A technology for transmitting digital information at a high bandwidth on existing phone
Subscriber Line lines to homes and businesses. Unlike regular dialup phone service, ADSL provides
continuously-available, "always on" connection. ADSL is asymmetric in that it uses most
of the channel to transmit downstream to the user and only a small part to receive
information from the user. ADSL simultaneously accommodates analog (voice)
information on the same line. ADSL is generally offered at downstream data rates from
512 kbit/s to about 6 Mbit/s.
AuC See Authentication Center
Authentication and AKA (Authentication and Key Agreement security protocol ) is a mechanism which
Key Agreement performs authentication and session key distribution in UMTS (Universal Mobile
Telecommunications System) networks.
Authentication Center A database that stores authentication data and encryption key. It can prevent unauthorized
users from accessing the network and ensure data security over the air interface. The
only difference between the HLR and the AuC is that the latter requires higher security.
Therefore, AuC is defined separately in the relevant protocol. In actual situations, the
AuC and HLR are combined.
Authentication Header Authentication Header (AH) is a member of the IPsec protocol suite. AH guarantees
connectionless integrity and data origin authentication of IP packets. Further, it can
optionally protect against replay attacks by using the sliding window technique and
discarding old packets.
Authentication, A mechanism for configuring authentication, authorization, and accounting security
Authorization and services. Authentication refers to the verification of user identities and the related
Accounting network services; authorization refers to the granting of network services to users
according to authentication results; and accounting refers to the tracking of the
consumption of network services by users.
Automatic Repeat An error control method for data transmission in which the receiver detects transmission
Request errors in a message and automatically requests a retransmission from the transmitter.
Average Revenue Per ARPU is a term used by telephone Operators/Carriers to indicate the financial revenue
User which is gained per subscriber on a monthly basis.
AWS Advanced Wireless Services
3 B
Base Transceiver A Base Transceiver Station terminates the radio interface. It allows transmission of traffic
Station and signaling across the air interface. The BTS includes the baseband processing, radio
equipment, and the antenna.
Baseband A form of modulation in which the information is applied directly onto the physical
transmission medium.
BaseBand Unit Base Band Unit (BBU) is a component of the distributed base station. It provides
baseband processing for signals (such as channel coding/decoding, modulation/
demodulation), provides transmission management and interfaces, manages radio
resources, and provides clock signals.
BBU See BaseBand Unit
BCCH See Broadcast Control Channel
BCH Broadcast Channel
BER See Bit Error Rate
BFD See Bidirectional Forwarding Detection
BHSA See Busy Hour Session Attempt
Bidirectional Bidirectional Forwarding Detection (BFD) is a network protocol used to detect faults
Forwarding Detection between two forwarding engines connected by a link. It provides low-overhead detection
of faults even on physical media that don't support failure detection of any kind, such as
Ethernet, virtual circuits, tunnels and MPLS Label Switched Paths.
Binary phase shift 2-phase modulation for carrier based on binary baseband signal. In this modulation mode,
keying the binary character 0 represents phase 0 of the carrier, and character 1 represents the
phase 180. The phase of character 0 is 0, and the phase of character 1 needs to be
specified. This is an absolute phase shift mode that uses different phases to represent
digital information.
Bit Error Rate Ratio of received bits that contain errors. BER is an important indicator used to measure
the communications quality of a network.
BITS See Building Integrated Timing Supply System
BLER See Block Error Rate
Block Error Rate Block Error Rate (BLER) is used in measuring the error rate when extracting data frames
from a Compact Disc (CD). The BLER measurement is often used as a quality control
measure with regards to how well audio is retained on a Compact Disc over time.
BPSK See Binary phase shift keying
BRAS See Broadband Remote Access Server
Broadband Remote A new type of access gateway for broadband networks. As a bridge between backbone
Access Server networks and broadband access networks, BRAS provides methods for fundamental
access and manages the broadband access network. It is deployed at the edge of network
to provide broadband access services, convergence, and forwarding of multiple services,
meeting the demands for transmission capacity and bandwidth utilization of different
users. BRAS is a core device for the broadband users' access to a broadband network.
Broadcast Control This downlink channel contains specific parameters needed by a mobile in order that it
Channel can identify the network and gain access to it. Typical information includes the LAC
(Location Area Code) and RAC (Routing Area Code), the MNC (Mobile Network Code)
and BA (BCCH Allocation) list.
BSR See Buffer Status Report
BT Bit Torrent
BTS See Base Transceiver Station
Buffer Status Report Data of the radio bear set in the UE buffer.
Building Integrated In the situation of multiple synchronous nodes or communication devices, one can use
Timing Supply System a device to set up a clock system on the hinge of telecom network to connect the
synchronous network as a whole, and provide satisfactory synchronous base signals to
the building integrated device. This device is called BITS.
Busy Hour Session The number of call attempts on the current switch in the busiest hour. The BHSA is used
Attempt to measure the processing performance of the system that uses the SIP protocol in the
IMS. The system processes not only calls but also sessions.
4 C
Committed Burst Size A parameter used to define the capacity of token bucket C, that is, the maximum burst
IP packet size when the information is transferred at the committed information rate.
This parameter must be larger than 0. It is recommended that this parameter should not
be less than the maximum length of an IP packet that might be forwarded.
Committed The rate at which a frame relay network agrees to transfer information in normal
Information rate conditions. Namely, it is the rate, measured in bit/s, at which the token is transferred to
the leaky bucket.
Common Control A CCCH is a point-to-multipoint bidirectional control channel. A CCCH is primarily
Channel intended to carry signaling information necessary for access management functions.
Common Public Radio Common Public Radio Interface (CPRI) is a common standard of the key internal
Interface interface between the REC and the RE of the wireless base station. This standard was
established by Huawei, Ericsson, NEC, Siemens, and Nortel in June 2003. It aims at
standardizing the baseband and RF interface. The CPRI has a set of mature standards,
which advance the standard and equipment. The major feature of the CPRI is that
baseband is separated from RF to reduce the cost of engineering, equipment room, and
equipment.
CoMP See Coordinated Multipoint Transmission
Compressor It is at the TX end, and is responsible for compressing the header of the data packet based
on the Profile and the context.
Connectivity Fault Ethernet Connectivity Fault Management (CFM) is an end-to-end per-service-instance
Management Ethernet layer operation, administration, and management (OAM) protocol. It includes
proactive connectivity monitoring, fault verification, and fault isolation for large
Ethernet metropolitan-area networks (MANs) and WANs.
Context It contains the characteristic information about compression and decompression of the
packet header. Every context is associated with a unique context identifier.
Control Plane The control plane performs the call control and connection control functions. Through
signaling, the control plane sets up and releases connections, and may restore a
connection in case of a failure. The control plane also performs other functions in support
of call and connection control, such as routing information dissemination.
Controller Area Controller-area network (CAN or CANBUS) is a vehicle bus standard designed to allow
Network BUS microcontrollers and devices to communicate with each other within a vehicle without
a host computer. CANBUS is a message based protocol, designed specifically for
automotive applications but now also used in other areas such as industrial automation
and medical equipment.
Coordinated By coordinating and combining signals from multiple antennas, CoMP, will make it
Multipoint possible for mobile users to enjoy consistent performance and quality when they access
Transmission and share datas.
Core Network An architectural term relating to the part of UMTS, which is independent of the
connection technology of the terminal.
Correlation Correlation represents how closely two random processes vary in time.
CPC Continuous Packet Connectivity
CPE Customer Premise Equipment
CPRI See Common Public Radio Interface
CPU See Central Processing Unit
5 D
Differentiated Services A Differentiated Services (DiffServ) Code Point is a marker in the header of each IP
Code Point packet that prompts network routers to apply differentiated grades of service to various
packet streams. It is specified by the DiffServ policy proposed by the IETF (Internet
Engineering Task Force). This allows Internet and other IP-based network service
providers to offer different levels of service to customers.
DiffServ See Differentiated Services
Digital certificate An electronic document used to validate the end parties or entities employed in data
transfer. A digital certificate binds an identity to a pair of electronic keys that can be used
to encrypt and sign digital information and issued by a Certification Authority (CA) and
signed with the CA's private key. A digital certificate typically contains the: - Owner's
name - Serial number of the digital certificate - Expiration date of the public key - Owner's
public key - Name of the issuer - Digital signature of the issuer
Digital signature A message signed with a sender's private key that can be verified by anyone who has
access to the sender's public key. Digital signature gives the receiver the reason to believe
the message was sent by the claimed sender. A proper implementation of digital signature
is computing a message digest for the message sent from the sender to the receiver, and
then signing the message digest. The result is called digital signature and is sent to the
receiver together with the original message.
Digital Subscriber Line A network device, usually situated in the main office of a telephone company that
Access Multiplexer receives signals from multiple customer Digital Subscriber Line (DSL) connections and
puts the signals on a high-speed backbone line using multiplexing techniques.
Direct Current Direct current (DC) is the unidirectional flow of electric charge.
Direct Current A direct current distribution unit distributes the -48 V DC received from an external
Distribution Unit power source to other devices.
Discontinuous Discontinous Reception (DRX) is a method used in mobile communication to conserve
Reception the battery of the mobile device. The mobile device and the network negotiate phases in
which data transfer happens. During other times the device turns its receiver off and
enters a low power state.
Diversity gain Diversity gain is a performance gain achieved by reducing the fading effects. The deep
fading degree of the combined signal can be reduced because the probability of
concurrent deep fading on multiple channels is lower than that on a single channel. The
fading degree is represented by SINR variance.
DL See Downlink
DL-SCH Downlink Shared Channel
DM See delay mesurement
DMZ See Demilitarized Zone
DOA Direction of Arrival
DoS See Denial of Service
Downlink A downlink is a channel on which data is transmitted from the BS to the terminal.
Downlink Control The PDCCH is used to carry DCI such as scheduling decisions and power control
Information commands. More specifically, the DCI includes: ● Downlink scheduling assignments,
including PDSCH resource indication, transport format, hybrid-ARQ information, and
control information related to spatial multiplexing (if applicable). A downlink scheduling
assignment also includes a command for power control of the PUCCH uplink physical
channel. ● Uplink scheduling grants, including PUSCH resource indication, transport
format, and hybrid-ARQ-related information. An uplink scheduling grant also includes
a command for power control of the PUSCH uplink physical channel. ● Power-control
commands for a set of terminals as a complement to the commands included in the
scheduling assignments/grants. The different types of control information above
typically correspond to different DCI message sizes.
DRB See Data Radio Bearer
DRS Dedicated Reference Signal
DRX See Discontinuous Reception
Dry contact A type of passive switch that has two states: open and closed. The two contacts are not
distinguished by polarity. Therefore, the two contacts can be used interchangeably.
Common dry contact signals are the outputs of switches, buttons, sensors, relays, and
dry finger pipes.
DSCP See Differentiated Services Code Point
DSLAM See Digital Subscriber Line Access Multiplexer
DTCH Dedicated Traffic Channel
Duplexer A device that consists of a transmitting filter and a receiving filter and provides a reliable
path for sharing of an antenna by transmission and reception so that the high-power
transmitted signals do not have an obvious impact on the weak received signals.
DwPTS Downlink Pilot Timeslot
Dynamic Broadcast It carriers the MIB information.
Channel
Dynamic Host Dynamic Host Configuration Protocol (DHCP) is a client-server networking protocol.
Configuration Protocol A DHCP server provides configuration parameters specific to the DHCP client host
requesting, generally, information required by the host to participate on the Internet
network. DHCP also provides a mechanism for allocation of IP addresses to hosts.
6 E
EPS Integrity The integrity process uses an EIA (EPS Integrity Algorithm), these have a 4bit identifier.
Algorithm Examples of EIA algorithms include: 0001 - 128-EIA1 SNOW 3G. 0010 - 128-EIA2
AES. These are implemented in the UE and eNB for RRC signalling integrity protection.
In addition, they are also implemented in the UE and MME for NAS integrity protection.
EPS Mobility In addition to the LTE Active, Idle and Detached states there also exists various EPS
Management Mobility Management (EMM) and EPS Connection Management (ECM) states. The
EMM states result from the mobility management procedures, such as Attach and
Tracking Area Update procedures. Two EMM states exist, EMM-DEREGISTERED and
EMMREGISTERED.
Equal Gain EGT is similar to EBF. The difference is that EGT normalizes the amplitudes of antenna
Transmission weights. That is, only phases are weighted, but amplitudes are not. Huawei eNodeB uses
the EGT algorithm.
Equivalent HPLMN Any PLMN to be declared as an equivalent to the HPLMN shall be present within the
EHPLMN list and is called an EHPLMN.
ESN See Electronic Serial Number
ETSI European Telecommunications Standards Institute
Event Based Counter The method of generate extended performance statistics counter based on message from
eNB Call History Record.
event-triggered After an event is reported for the first time, the measurement results associated with the
periodic reporting event are reported periodically. This reporting mode is called event-triggered periodical
reporting.
Evolved MBMS MBMS is called EMBMS (Evolved MBMS) in the SAE/LTE-based network
architecture.
Evolved Packet Core A framework for an evolution or migration of the 3GPP system to a higher-data-rate,
lower-latency, packet-optimized system that supports, multiple RATs.
Evolved Packet System An evolution of the 3G UMTS characterized by higher-data-rate, lower-latency, packet-
optimized system that supports multiple RATs. The Evolved Packet System comprises
the Evolved Packet Core together with the evolved radio access network (E-UTRA and
E-UTRAN).
Evolved UTRAN An evolution of the 3G UMTS radio-access network towards a high-data-rate, low-
latency and packet-optimized radio-access network.
Excess Burst Size In the single rate three color marker (srTCM) mode, traffic control is achieved by the
token buckets C and E. Excess burst size is a parameter used to define the capacity of
token bucket E, that is, the maximum burst IP packet size when the information is
transferred at the committed information rate. This parameter must be larger than 0. It
is recommended that this parameter should not be less than the maximum length of an
IP packet that might be forwarded.
Extensible EAP-Transport Layer Security (EAP-TLS), defined in RFC 5216, is an IETF open
Authentication standard, and is well-supported among wireless vendors. The security of the TLS
Protocal Transport protocol is strong, provided the user understands potential warnings about false
Layer Security credentials. It uses PKI to secure communication to a RADIUS authentication server or
another type of authentication server.
Extensible Extensible Authentication Protocol (EAP) over LAN (EAPoL) is a network port
Authentication authentication protocol used in IEEE 802.1X (Port Based Network Access Control)
Protocol over LAN developed to give a generic network sign-on to access network resources. EAPoL, similar
to EAP, is a simple encapsulation that can run over any LAN. The same three main
components are defined in EAP and EAPoL to accomplish the authentication
conversation: - Supplicant (Port Authentication Entity (PAE) seeking access to netwrok
resources) - Authenticator (PAE that controls network access) - Authentication Server
(a RADIUS/AAA server)
7 F
8 G
Gateway Mobile The Gateway Mobile Location Centre (GMLC) contains functionality required to
Location Center support LCS. In one PLMN, there may be more than one GMLC. A GMLC is the first
node an external LCS client accesses in a PLMN (i.e. the Le reference point is supported
by the GMLC).
GBR Guaranteed Bit Rate
GCI Global Cell Identity
GE See Gigabit Ethernet
General Packet Radio A mobile data service available to users of GSM mobile phones. It is often described as
Service "2.5G", that is, a technology between the second (2G) and third (3G) generations of
mobile telephony.
GERAN See GSM/EDGE Radio Access Network
Gigabit Ethernet Gigabit Ethernet (GbE or 1 GigE) is a term describing various technologies for
transmitting Ethernet frames at a rate of a gigabit per second, as defined by the IEEE
802.3-2008 standard.
Global Positioning A satellite-based global navigation system that consists of a constellation of 24 satellites
System in orbit 11,000 nmi above the Earth, several on-station (i.e., in-orbit) spares, and a
ground-based control segment.
Global System for A second generation cellular telecommunication system which was first planned in the
Mobile early 1980s. Unlike first generation systems operating at the time, GSM was digital and
communications thus introduced greater enhancements such as security, capacity, quality and the ability
to support integrated services. Initially, GSM was planned to be a European system
allowing subscribers to roam between different networks however, GSM was quickly
adopted by many other regions and is now a "Global System". Many countries around
the world have now met market saturation point, which means over 100% of the
population of that country possess a GSM phone.
Globally Unique MME The GUTI (Globally Unique Temporary Identity) has two main components, the
Identifier GUMMEI (Globally Unique MME Identifier) that uniquely identifies the MME that
allocated the GUTI and the M-TMSI (M-Temporary Mobile Subscriber Identity) that
provides for an unambiguous identity of the UE within this MME.
GMLC See Gateway Mobile Location Center
GPRS See General Packet Radio Service
GPRS Tunneling GTP is the defining IP protocol of the GPRS core network. Primarily it is the protocol
Protocol User Plane which allows end users of a GSM or WCDMA network to move from place to place
while continuing to connect to the Internet as if from one location at the Gateway GPRS
Support Node (GGSN). It does this by carrying the subscriber's data from the subscriber's
current Serving GPRS Support Node (SGSN) to the GGSN which is handling the
subscriber's session.
GPS See Global Positioning System
GSM See Global System for Mobile communications
GSM/EDGE Radio A GSM radio access network that supports the EDGE (Enhanced Data rates for Global
Access Network Evolution) modulation technique. It has been specified to connect the A , Gb and Iu
interfaces to the CN (Core Network). The architecture allows two BSSs (Base Station
Subsystems) to be connected to each other.
GTP-U See GPRS Tunneling Protocol User Plane
GUMMEI See Globally Unique MME Identifier
GUTI Globally Unique Temporary Identifier
GWCN Gateway Core Network
9 H
10 I
IP Performance IP performance monitor effectively monitors the transport network by timely and quickly
Monitor monitoring the QoS of the bearer network. IP performance monitor requires the support
of the BSC and the BTS.
IP PM See IP Performance Monitor
IP Security Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP)
communications by authenticating and encrypting each IP packet of a data stream. IPsec
also includes protocols for establishing mutual authentication between agents at the
beginning of the session and negotiation of cryptographic keys to be used during the
session. IPsec can be used to protect data flows between a pair of hosts (e.g. computer
users or servers), between a pair of security gateways (e.g. routers or firewalls), or
between a security gateway and a host.
IPSec See IP Security
IR See Initialization and Refresh
IRC See Interference Rejection Combining
ISAKMP See Internet Security Association and Key Management Protocol
ISI See Inter Symbol Interference
ITU See International Telecommunication Union
11 K
Key Performance The KPI indicates the performance value of an object at a certain time point. A KPI may
Indicator be obtained by the aggregation of multiple levels of KPIs.
KPI See Key Performance Indicator
12 L
Local Maintenance Local Maintenance Terminal (LMT) is a tool that connects to the network element and
Terminal provides the GUI for the OM of the network element. The LMT is used for the OM of
an NE. It supports local and remote maintenance modes.
Location Area Code An identifier used to identify an LA within a Public Land Mobile Network (PLMN). It
ranges from 0 to 65,535.
LoCation Services A service that allows carriers to obtain the geographic location of a target MS/UE by
using dedicated mobile positioning technologies and to provide location based services
to mobile subscribers.
LOFD See LTE Optional Feature Description
Logged MDT Logged Minimization of Drive Test
Logical Channel The number that can be employed to identify each virtual circuit (or logic channel) is
Identifier called logic channel identifier (LCI) or virtual circuit number (VCN).
Long Term Evolution LTE is a 3GPP advancement to current mobile telecommunications networks, designed
to significantly improve data rates to at least the tens of Mbps region per user (data rates
in the hundreds of Mbps region are possible if conditions are ideal). Standardized in
3GPP Release 8, LTE introduces a network which is based purely on IP as the transport
mechanism. That is, all traffic, including voice, will be passed across the E-UTRAN as
an IP datagram. LTE is predominantly associated with the radio access network, with
the SAE specifications defining the core network (termed the EPC).
loss measurement A method used to collect counter values applicable for ingress and egress service frames
where the counters maintain a count of transmitted and received data frames between a
pair of MEPs.
LSTI LTE SAE Trial Initiative
LTE See Long Term Evolution
LTE Basic Feature Prefix of eRAN basic-feature IDs.
Description
LTE Main Processing LTE main control transmission board, which provides the main control function and
Transmission Unit transport ports.
LTE Optional Feature Prefix of eRAN optional-feature IDs.
Description
13 M
MME Identifier The MMEI is constructed from an MMEGI (MME Group ID) and an MMEC (MME
Code), where the MMEGI provides the Group Identity of the registered MME within
the PLMN.
MMEC See MME Code
MMEGI See MME Group Identifier
MMEI See MME Identifier
MML See Man-Machine Language
MMSE See Minimum Mean Square Error
MNC See Mobile Network Code
MO See Managed Object
Mobile Country Code The Mobile Country Code is a three digit number uniquely identifying a given country.
It is utilized within the IMSI (International Mobile Subscriber Identity) and LAI
(Location Area Identity).
Mobile Network Code Either a two or three digit number used to uniquely identify a given network from within
a specified country (MCC (Mobile Country Code)). The MNC is used as part of the IMSI
(International Mobile Subscriber Identity) and LAI (Location Area Identity) etc. Short
for mobile network code, it consists of two or three digits and identifies a PLMN to which
a mobile subscriber belongs.
mobile switching center A logical entity that provides interfaces for interworking with the function entities in a
wireless system and the public network. It plays a core role for switch in the wireless
system. It provides mobile management and switch to mobile subscribers and sets up
communications between mobile subscribers, or between a mobile subscriber and a fixed
line subscriber.
Mobile Terminating A process of receiving calls by mobile subscribers.
Mobility Management An EPC entity that terminates the control plane with the mobile device. It is responsible
Entity for terminating NAS (Non Access Stratum) Signalling such as MM (Mobility
Management) and SM (Session Management) information as well as coordinating Idle
Mode procedures. Other responsibilities of the MME include gateway selection, inter
MME Mobility and authentication of the mobile device.
MRC Maximum Ratio Combining
MRFD See Multi-Mode RAN Feature Description
MRO Mobility Robust Optimization
MRT See Maximum Ratio Transmission
MSC See mobile switching center
MT See Mobile Terminating
MTBF See Mean Time Between Failures
MTTR See Mean Time To Recovery
MTU See maximum transmission unit
MU-MIMO Multi User - MIMO
Multi-Mode RAN Prefix of Multi-Mode RAN feature IDs.
Feature Description
Multimedia Broadcast an area of the network where all eNodeBs can be synchronized and perform MBSFN
multicast service Single transmissions On a given frequency layer.
Frequency Network
Multiple-Input A technology used in wireless communications, in which multiple antennas are used at
Multiple-Output each end of the transmission link. The antennas for transmitting signals at each end of
the transmission link are combined so that the signal error is minimized, and data
transmission rate is maximized.
MVNO Mobile Virtual Network Operator
14 N
15 O
Operation and An Operations and Maintenance Centre is an element within a network management
Maintenance Center system responsible for the operations and maintenance of a specific element or group of
elements. For example an OMC-Radio may be responsible for the management of a radio
subsystem where as an OMC-Switch may be responsible for the management of a switch
or exchange. However, these will in turn be under the control of a NMC (Network
Management Centre) which controls the entire network.
Operation, A group of network support functions that monitor and sustain segment operation,
Administration,and activities that are concerned with, but not limited to, failure detection, notification,
Management location, and repairs that are intended to eliminate faults and keep a segment in an
operational state and support activities required to provide the services of a subscriber
access network to users/subscribers.
Optical Line Terminal Abbreviation for optical line termination. Optical network elements that terminate a line
signal.
Optical Network A device that terminates the fiber optical network at the customer premises.
Terminal
Optical Network Unit A form of Access Node that converts optical signals transmitted via fiber to electrical
signals that can be transmitted via coaxial cable or twisted pair copper wiring to
individual subscribers.
Orthogonal Frequency Orthogonal Frequency Division Multiple Access (OFDMA) uses the OFDM technology
Division Multiple to divide users. Because data on different subcarriers are transmitted in parallel, OFDMA
Access is a frequency-division multiplexing access mode. In OFDMA, users share fast Fourier
transformation space on uplink links. The BS allocates subcarriers for users. In this way,
it can allocate different rates for different users.
Orthogonal Frequency A type of Multi-Carrier Modulation (MCM). In this multiplexing mode, a channel is
Division Multiplexing divided into multiple orthogonal subchannels. High-speed data signals are converted into
parallel low-speed subdata streams and are modulated for transmission on the
subchannels. Orthogonal signals can be separated at the receiver, reducing the
interference between subchannels. The signal bandwidth on each subchannel is smaller
than the related bandwidth of the channel; therefore, each subchannel can be regarded
as flat fading, canceling the interference between symbols. In addition, the bandwidth
of each subchannel is only a small part of the original channel bandwidth, and therefore
equalization becomes easier.
OSG Open Subscribe Group
OSS See Operating Support System
OTDOA Observed Time Difference of Arrival
16 P
peer to peer The protocol or application based on the peer to peer techenology.
PELR See Packet Error Loss Rate
Per-Hop Behavior IETF Diff-Serv workgroup defines forwarding behaviors of network nodes as per-hop
behaviors (PHB), such as, traffic scheduling and policing. A device in the network should
select the proper PHB behaviors, based on the value of DSCP. At present, the IETF
defines four types of PHB. They are class selector (CS), expedited forwarding (EF),
assured forwarding (AF), and best-effort (BE).
PF Proportional Fair
Phase-locked Loop A circuit that consists essentially of a phase detector which compares the frequency of
a voltage-controlled oscillator with that of an incoming carrier signal or reference-
frequency generator; the output of the phase detector, after passing through a loop filter,
is fed back to the voltage-controlled oscillator to keep it exactly in phase with the
incoming or reference frequency.
PHB See Per-Hop Behavior
PHICH See Physical HARQ Indicator Channel
PHR Power Headroom Report
Physical Broadcast A physical broadcast channel is a transmission channel that is used to transfer
Channel information to all mobile devices that are operating in a radio coverage area. The
broadcast channel periodically sends (approximately every 40 msec) system
identification and access control parameters
Physical Cell Identifier Identifier of a physical cell.
Physical Control The physical control format indicator channel (PCFICH) is the physical channel that
Format Indicator carries the number of OFDM symbols for transmission of PDCCHs in a subframe.
Channel PCFICH is located at OFDM symbol #0 of every subframe, and the assignment to the
subcarriers is determined by cell ID information.
Physical Downlink The physical downlink control channel is a transmission channel that is used to transfer
Control Channel control information to mobile devices. The PDCCH defines how the paging channel and
shared downlink channels are configured and it defines uplink transmission scheduling
information to help coordinate access control to the radio system.
Physical Downlink In LTE the PDSCH carries the DL-SCH (Downlink Shared Channel). This is the only
Shared Channel downlink transport channel available to carry user data between the mobile device and
the eNB.
Physical HARQ The Physical Hybrid Automatic Repeat Request (ARQ) Indicator Channel (PHICH) is
Indicator Channel the physical channel that carries the Hybrid ARQ Indicator (HI). The HI contains the
Acknowledgment/Negative Acknowledgement (ACK/NACK) feedback to the UE for
the uplink blocks received by the eNodeB.
Physical Multicast The Physical Multicast Channel is the physical channel that carries the Multicast Channel
Channel (MCH) transport channel. The PMCH is similar to the PDSCH except that it carries
information to multiple users for point-to-multipoint services.
Physical Random The PRACH is an uplink physical channel used to convey control information for access
Access Channel purpose. It also carries short user packets from the UE.
Physical Resource A E-UTRA PRB (Physical Resource Block) is defined as consisting of 12 consecutive
Block subcarriers for one slot (0.5 ms). A PRB is the smallest element of resource allocation
assigned by the eNB scheduler.
17 Q
18 R
RA Random Access
RA See Registration Authority
RAC See Routing Area Code
RACH See Random Access Channel
Radio Access Network The radio access network performs the radio functionality of the network, as well as
providing the connection to the CN (Core Network).
Radio Access RAT indicates the type of radio technology to access the CN (Core Network). Example
Technology technologies being UTRA (UMTS Terrestrial Radio Access), CDMA2000®, DECT
(Digital Enhanced Cordless Technology), GERAN (GSM EDGE Radio Access
Network) etc.
Radio bearer Radio bearers are classified into data radio bearers (DRBs) and signaling radio bearers
(SRBs). A DRB transmits packets of an EPS bearer between a UE and an eNodeB, and
an SRB transmits signalling between a UE and an eNodeB.
Radio Frequency A term that refers to alternating current (AC) havingcharacteristics such that, if the
current is input to an antenna, an electromagnetic (EM) field is generated suitable for
wireless broadcastingand/or communications. These frequencies cover asignificant
portion of the electromagnetic radiation spectrum, extending from nine kilohertz (9
kHz),the lowest allocated wireless communications frequency (it's within the range of
human hearing), to thousands of gigahertz(GHz).
Radio Link Control Radio Link Control (RLC) is a link-layer protocol that is responsible for error recovery
and flow control.
Radio Network The equipment in the RNS in charge of controlling the use and the integrity of the radio
Controller resources.
Radio Network A Radio Network Temporary Identifier is a generic term of an identifier for a UE when
Temporary Identifier an RRC connection exists. It consists of the Cell RNTI (C-RNTI), Serving RNC RNTI
(S-RNTI) and UTRAN RNTI (U-RNTI).
Radio Resource A sublayer of radio interface Layer 3 existing in the control plane only which provides
Control information transfer service to the non-access stratum. RRC is responsible for controlling
the configuration of radio interface Layers 1 and 2.
radio resource Planning and scheduling of the air interface resources for the mobile communication
management system. It manages all air interface resources, such as creating, monitoring, modifying,
or removing sites, sectors, or carriers.
RADIUS See Remote Authentication Dial in User Service
RAN See Radio Access Network
Random Access The channel used for initial access into a system. The RACH function is different
Channel depending on the technology of the system.
RAT See Radio Access Technology
RB Resource Block
RB See Radio bearer
RCU See Remote Control Unit
RDI See remote defect indication
RE See Resource Element
RE Range Expansion
Real Time Protocol Real-time Transport Protocol (RTP) is a host-to-host protocol. It is used to deliver real-
time services such as audio and video over the IP network.
Received Signal Code Given only signal power is received, the average power of the received signal after
Power despreading and combining.
Received Signal The received wide band power, including thermal noise and noise generated in the
Strength Indicator receiver, within the bandwidth defined by the receiver pulse shaping filter, for TDD
within a specified timeslot. The reference point for the measurement shall be the antenna.
Refarming Reassigning government-regulated electromagnetic spectrum for services with higher
value(e.g. GSM Spectrum reassigned to LTE with higher capacity.).
Reference Signal In the LTE E-UTRA there are various types of reference signals used in the uplink and
downlink directions. In the uplink there are two types namely the Demodulation
reference signal and the Sounding reference signal. In the downlink, there are three main
types: Cell Specific (non-MBSFN), MBFSN (Multimedia Broadcast Multicast Service
Single Frequency Network) and UE Specific
Registered PLMN The PLMN on which the UE has performed a location registration successfully.
Registration Authority A registration authority (RA) is an authority in a network that verifies user requests for
a digital certificate and tells the certificate authority (CA) to issue it. RAs are part of a
public key infrastructure (PKI), a networked system that enables companies and users
to exchange information and money safely and securely. The digital certificate contains
a public key that is used to encrypt and decrypt messages and digital signatures.
Relative Narrowband This IE provides an indication on DL power restriction per PRB in a cell and other
TX Power information needed by a neighbour eNB for interference aware scheduling.
Remote Authentication Remote Authentication Dial In User Service (RADIUS) is a networking protocol that
Dial in User Service provides centralized Authentication, Authorization, and Accounting (AAA)
management for computers to connect and use a network service. RADIUS serves three
functions: - to authenticate users or devices before granting them access to a network, -
to authorize those users or devices for certain network services and - to account for usage
of those services.
Remote Control Unit A driving motor of the phase shifter in a Remote Electrical Tilt (RET) antenna.
remote defect A signal transmitted at the first opportunity in the outgoing direction when a terminal
indication detects specific defects in the incoming signal.
Remote Radio Unit Remote Radio Unit (RRU) is a component of the distributed base station. It performs
the Intermediate Frequency (IF) processing (digital I/Q modulation/demodulation,
frequency up-/down-conversion, and DA/AD conversion) of the signals, Radio
Frequency (RF) processing, and duplex.
Resource Element The smallest unit at the physical layer.
RET antenna The electrical downtilt can be continuously adjusted using the mechanically-adjustable
phase shifter built in the antenna.
RF See Radio Frequency
RFU Radio frequency unit
RGPS Remote Global Position System
RLC See Radio Link Control
RLF Radio Link Failure
RNC See Radio Network Controller
RNTI See Radio Network Temporary Identifier
RNTP See Relative Narrowband TX Power
RObust Header Robust Header Compression (ROHC) is a standardized method to compress the IP, UDP,
Compression RTP, and TCP headers of Internet packets. This compression scheme differs from other
compression schemes such as IETF RFC 1144 and RFC 2508 by the fact that it performs
well over links where the packet loss rate is high, such as wireless links.
ROHC See RObust Header Compression
Routing Area Code A routing Area Code is a fixed length of 1 octet and identifies a routing area within a
location area. The RAC is part of the Routing Area Identity (RAI).
RPLMN See Registered PLMN
RR Round Robin
RRC See Radio Resource Control
RRM See radio resource management
RRU See Remote Radio Unit
RS See Reference Signal
RSCP See Received Signal Code Power
RSRP Reference Signal Received Power
RSRQ Reference Signal Received Quality
RSSI See Received Signal Strength Indicator
RTP See Real Time Protocol
RTT Radio Transfers Technology
19 S
Secure Hash Algorithm The Secure Hash Algorithm is one of a number of cryptographic hash functions published
by the National Institute of Standards and Technology as a U.S. Federal Information
Processing Standard. There are currently three generations of Secure Hash Algorithm:
SHA-1 is the original 160-bit hash function. Resembling the earlier MD5 algorithm, this
was designed by the National Security Agency (NSA) to be part of the Digital Signature
Algorithm. Originally just called "SHA", it was withdrawn shortly after publication due
to an undisclosed "significant flaw" and replaced by the slightly revised version SHA-1.
The original withdrawn algorithm is now known by the retronym SHA-0. SHA-2 is a
family of two similar hash functions, with different block sizes, known as SHA-256 and
SHA-512. They differ in the word size; SHA-256 uses 32-bit words where SHA-512
uses 64-bit words. There are also truncated versions of each standardized, known as
SHA-224 and SHA-384. These were also designed by the NSA. SHA-3 is a future hash
function standard still in development. This is being chosen in a public review process
from non-government designers. An ongoing NIST hash function competition is
scheduled to end with the selection of a winning function, which will be given the name
SHA-3, in 2012.
Secure Socket Layer SSL is a security protocol developed by Netscape Communications to ensure the security
of Internet communications.
Security Association A security association (SA) is the establishment of shared security information between
two network entities to support secure communication. An SA may include
cryptographic keys, initialization vectors or digital certificates. An SA is a simplex (one-
way channel) and logical connection which endorses and provides a secure data
connection between the network devices. The fundamental requirement of an SA arrives
when the two entities communicate over more than one channel. Take an example of
mobile subscriber and a base station. The subscriber may subscribe itself for more than
one service. Therefore each service may have different service primitives like a data
encryption algorithm, public key or initialization vector. Now to make things easier, all
this security information is grouped logically. This logical group itself is a Security
Association.
Security Gateway A gateway that provides protection methods such as firewall, attack detection, flow
control, and equipment operation access control to prevent the equipment in the IMS
domain from being attacked.
Security Parameter A numeric identifier in IPsec, used with the destination address and security protocol to
Index identify a security association (SA).
Security Policy The SPD specifies what protection measures are to be taken on IP packets.
Database
SeGW See Security Gateway
Self-Organizing The main functions of Self-Organizing Network (SON) are self-configuration, self-
Network optimization, and self-healing.
Sequence Number An identifying number used to designate a data block, an operation, or a part of an
operation.
Service Data Unit Data transferred between adjacent layers in the protocol stack.
Serving Gateway Within the EPC the S-GW is responsible tunnelling user plane traffic between the eNB
and the PDN-GW. To do this its role includes acting as the mobility anchor point for the
User Plane during handovers between eNB as well as data buffering when traffic arrives
for a mobile in the LTE Idle state. Other functions performed by the S-GW include
routing, Lawful Interception and billing.
serving GPRS support A functional entity used for providing packet data services. It is responsible for
node forwarding incoming/outgoing Internet Protocol (IP) packets to mobile stations (MSs)
within the service area of the SGSN. It traces the location of an individual MS and
performs security functions and access control. In Universal Mobile
Telecommunications System (UMTS) networks, the SGSN is connected to the radio
network controller (RNC) over the Iu-PS interface. It requests policy decision point
(PDP) contexts from the Gateway GPRS Support Node (GGSN).
SFBC Space Frequency Block Coding
SFN See System Frame Number
SFN See Single Frequency Network
SGSN See serving GPRS support node
SHA See Secure Hash Algorithm
Short Message Service The SMS (Short Messaging Service) that allows a SME (Short Message Entity) to send
short text messages to other SME.
SI System Information
SIB See System Information Block
Signal to Noise Ratio The ratio of the amplitude of the desired signal to the amplitude of noise signals at a
given point in time. SNR is expressed as 10 times the logarithm of the power ratio and
is usually expressed in dB (Decibel).
Signaling Radio Bearer The RRC (Radio Resource Control) connection process will establish the RB (Radio
Bearer) available for usage by RRC messages on the DCCH (Dedicated Control Channel)
and CCCH (Common Control Channel). These Radio Bearers are identified as a SRB
(Signaling Radio Bearer).
SIMO Single-Input Multiple-Output
Single Carrier Single-carrier FDMA (SC-FDMA) is a frequency-division multiple access scheme. It is
Frequency Division a multi-user version of the Single-carrier frequency-domain-equalization (SC-FDE)
Multiple Access modulation scheme
Single Frequency A broadcast network where several transmitters simultaneously send the same signal
Network over the same frequency channel.
Single Radio Voice Call Voice call continuity between IMS over PS access and CS access for calls that are
Continuity anchored in IMS when the UE is capable of transmitting/receiving on only one of those
access networks at a given time.
SINR Signal to Interference plus Noise Ratio
SISO Single-Input Single-Output
SLC Sleeping Cell
Slip frame In the reception of framed data, a frame slip is the loss of synchronization between a
received frame and the receiver clock signal, causing a frame misalignment event, and
resulting in the loss of the data contained in the received frame.
SLP SUPL Location Platform
SM Spatial Multiplexing
SMS See Short Message Service
SN See Sequence Number
System Frame Number The system frame number is used to uniquely identify a random access.
System Information The system information elements are broadcast in system information blocks. A system
Block information block groups together system information elements of the same nature.
20 T
Time Difference of The difference of time that positioning reference signals from two cells arrive at a UE.
Arrival Since radio wave propagate at the speed of light, the difference of distances between the
UE and two cells is determined by multiplying TDOA by the speed of light.
Time Division Duplex In a Time Division Duplex system a common carrier is shared between the uplink and
downlink, the resource being switched in time. Users are allocated one or more timeslots
for uplink and downlink transmission. The main advantage of TDD operation is that it
allows asymmetric flow which is more suited to data transmission.
Time Division Multiple A communications technique that uses a common channel (multipoint or broadcast) for
Access communications among multiple users by allocating unique time slots to different users.
(188) Note: TDMA is used extensively in satellite systems, local area networks, physical
security systems, and combat-net radio systems.
Time Switched Time Switched Transmit Diversity (TSTD) is a technique utilizing multiple transmit
Transmit Diversity stations to originate the downlink signal and improve performance. The transmit station
used is determined by a fixed selection pattern similar to frequency hopping.
TM See Transparent Mode
TMA See Tower Mounted Amplifier
TOD Time of Day
Tower Mounted A Tower Mounted Amplifier or Mast Head Amplifier is a Low-noise amplifier (LNA)
Amplifier mounted as close as practical to the antenna in mobile masts or Base Transceiver Stations.
A TMA reduces the base transceiver station noise figure (NF) and therefore improve its
overall sensitivity; in other words the mobile mast is able to receive weaker signals.
TPC See Transmit Power Control
Tracking Area The TA is a concept introduced to the LTE/SAE system for location management of
UEs. A TA is identified by a Tracking Area Identity (TAI), which consists of the MCC,
MNC, and Tracking Area Code (TAC).
Tracking Area Code Code of a Tracking Area (TA).
Tracking Area Unique identity of a Tracking Area (TA).
Identifier
Tracking Area List List of multiple Tracking Areas (TAs).
Transmission Control The protocol within TCP/IP that governs the breakup of data messages into packets to
Protocol be sent via IP (Internet Protocol), and the reassembly and verification of the complete
messages from packets received by IP. A connection-oriented, reliable protocol (reliable
in the sense of ensuring error-free delivery), TCP corresponds to the transport layer in
the ISO/OSI reference model.
Transmit Power Transmit Power Control is a technical mechanism used within some networking devices
Control in order to prevent too much unwanted interference between different wireless networks
(e.g. the owner's network and the neighbour's network).
Transparent Mode The transparent service in Radio Link Control (RLC). RLC TM functions include but
are not limited to transfer of user data and segmentation and reassembly.
Transport Format A Transport Format is defined as a format offered by L1 to MAC for the delivery of a
Transport Block Set during a Transmission Time Interval on a Transport Channel. The
Transport Format constitutes of two parts - one dynamic part and one semi-static part.
Triple Data Encryption In cryptography, Triple DES (3DES[1]) is the common name for the Triple Data
Standard Encryption Algorithm (TDEA) block cipher, which applies the Data Encryption
Standard (DES) cipher algorithm three times to each data block. Because the key size of
the original DES cipher was becoming problematically short, Triple DES was designed
to provide a relatively simple method of increasing the key size (three 56-bit DES keys)
of DES to protect against brute force attacks, without designing a completely new block
cipher algorithm.
TSTD See Time Switched Transmit Diversity
TTI Transmission Time Interval
Tunnel Endpoint The TEID unambiguously identifies a tunnel endpoint in the receiving GTP-U (GPRS
Identifier Tunnelling Protocol - User) or GTP-C (GPRS Tunnelling Protocol - Control) protocol
entity. The receiving side of a GTP tunnel locally assigns the TEID value for the
transmitting side to use. The TEID values are exchanged between tunnel endpoints using
GTP-C messages (or RANAP) in the UTRAN.
TX Transmit
21 U
Universal Terrestrial UTRAN is a conceptual term identifying that part of the network which consists of RNCs
Radio Access Network and Node Bs between Iu and Uu interfaces.
Universal Time The world-wide scientific standard of timekeeping. It is based upon carefully maintained
Coordinated atomic clocks and is kept accurate to within microseconds worldwide.
Universal LTE extension transmission board, which provides E1 ports.
Transmission
Processing unit
Uplink An "uplink" is a unidirectional radio link for the transmission of signals from a MS to a
base station, from a Mobile Station to a mobile base station or from a mobile base station
to a base station.
UpPTS Uplink Pilot Time Slot
USB See Universal Serial Bus
User Datagram A TCP/IP standard protocol that allows an application program on one device to send a
Protocol datagram to an application program on another. User Datagram Protocol (UDP) uses IP
to deliver datagrams. UDP provides application programs with the unreliable
connectionless packet delivery service. Thus, UDP messages can be lost, duplicated,
delayed, or delivered out of order. UDP is used to try to transmit the data packet, that is,
the destination device does not actively confirm whether the correct data packet is
received.
User Equipment A device allowing a user access to network services.
User plane A set of traffic forwarding components that the traffic flow passes through. The OAM
CV or FFD packet is periodically inserted to this traffic flow to monitor the working
status of the forwarding components. In the IETF drafts, the user plane is called data
plane.
USIM See Universal Subscriber Identity Module
UTC See Universal Time Coordinated
UTRA See UMTS Terrestrial Radio Access
UTRAN See Universal Terrestrial Radio Access Network
UTRP See Universal Transmission Processing unit
22 V
23 W
24 X
25 Z
ZC Zadoff-Chu sequence