A
interface
This is the interface
within the GSM network architecture between the BSS (Base Station Subsystem)
and an MSC (Mobile Switching Centre). The interface supports standard 64Kbps
channels for signalling and traffic. The primary protocols on this interface
are DTAP (Direct Transfer Application Part) and BSSMAP (Base Station
Subsystem Management Application Part).
A Link - Access link
Access link is a SL (Signalling Link) that connects a
signalling end point i.e. a SP (Signalling Point) to an STP (Signalling
Transfer Point). Only messages that are originating from or destined to the
signalling end point are transmitted on this link.
A-GNSS - Assisted Global
Navigation Satellite System
GNSS based location systems such as GPS (Global
Positioning System) may take a significant amount of time to accurately
calculate a device’s location, particularly if the satellite signals are
being impaired by buildings, weather and other obstructions, or if the device
is inside a building. A-GNSS enabled devices utilize the mobile
network/Internet to provide additional location data, enabling the device to
provide accurate location information more quickly.
A-key
A secret, 64bit pattern stored in the MS (Mobile Station)
and HLR (Home Location Register) / AC (Authentication Center).It is used to
generate/update the mobile’s SSD (Shared Secret Data).
a-law
ITU-T (International Telecommunications
Union-Telecommunication Standardization Sector) companding standard used in
the conversion between analogue and digital signals in PCM (Pulse Code
Modulation) systems. In contrast to the North American m -law, a-law provides
a constant signal to distortion ratio over a broader dynamic range of
analogue input signals at the expense of a poorer signal to distortion ratio
for low level signals.
a-number
A term used to identify the number of the calling party.
A-SBC - Access Session
Border Controller
The A-SBC is deployed between the access network and the
service provider’s network edge in order to provide SIP related roles
including security, NAT Traversal and media anchoring.
A/D - Analogue-to-Digital
converter or conversion
The process of sampling an analogue waveform and
describing it in terms of binary digits.
A1 Interface
A1 Interface The A1 interface carries signalling
information between the Call Control and Mobility Management functions of the
MSC (Mobile Switching Centre) and the call control component of the BSC (Base
Station Controller).
A10 Interface
A10 Interface The A10 interface carries user traffic
between the PCF (Packet Control Function) and the PDSN (Packet Data Serving
Node).
A11 Interface
A11 Interface The A11 interface carries signalling
information between the PCF (Packet Control Function) and the PDSN (Packet
Data Serving Node).
A2 Interface
A2 Interface The A2 interface carries 64Kbps/56Kbps PCM
(Pulse Code Modulation) information (voice/data) or 64Kbps UDI (Unrestricted
Digital Information) between the MSC (Mobile Switching Centre) and the
channel element component of the BSC (Base Station Controller).
A2DP - Advanced Audio
Distribution Profile
The Advanced Audio Distribution Profile in Bluetooth
specifies the protocols and procedures that define the distribution of high
quality audio content, in either mono or stereo on ACL (Asynchronous
Connectionless link) channels.
A3 - Authentication
Algorithm A3
Authentication algorithm used in conjunction with Ki , the
authentication key, and RAND , the random number generated in the AuC
(Authentication Centre) to produce the SRES (Signed Response). This variable
is used by the network to authenticate a MS (Mobile Station) requesting
network resources.
A3 Interface
The A3 interface carries coded user information
(voice/data) and signaling information between the Selection / Distribution
unit function and the channel element component of the BTS (Base Transceiver
System). The A3 interface is composed of two parts, Signaling and User
Traffic. The signaling information is carried across a separate logical
channel from the user traffic channel, and controls the allocation and use of
channels for transporting user traffic. The user traffic is transported in
traffic channels.
A38
A38 A single algorithm in GSM that performs the functions
of A3 and A8.
A5 Interface
A5 Interface The A5 interface carries a full duplex stream
of bytes between the IWF (Interworking Function) and the Selection /
Distribution unit function.
A5/1 - Encryption
Algorithm A5/1
Algorithm used in the GSM ciphering process between a MS
(Mobile Station) and the GSM network.
A5/2 - Encryption
Algorithm
A5/2 A5/2 – Encryption Algorithm A5/2 Algorithm used in
the GSM ciphering process between a MS (Mobile Station) and the GSM network.
This algorithm is simpler than A5/1 and was developed by ETSI (European
Telecommunications Standards Institute) for use in Eastern European states
that had restrictions to certain Western technologies.
A5/X
A5/X GSM encryption algorithms A5/0 to A5/7.
A7 Interface
A7 Interface The A7 interface carries signaling
information between a source BS (Base Station) and a target BS.
A8 - Ciphering Key
Generating Algorithm A8
This algorithm is used in conjunction with Ki , the
authentication key, and RAND (Random Number) to generate Kc (Cipher Key).
This is used with A5/X to cipher the data stream between the MS (Mobile
Station) and the GSM network.
A8 Interface
A8 Interface The A8 interface carries user traffic between
the BS (Base Station) and the PCF (Packet Control Function).
A9 Interface
A9 Interface The A9 interface carries signaling
information between the BS (Base Station) and the PCF (Packet Control
Function).
AA - Abbreviated Alert
An Abbreviated Alert is used to remind the subscriber that
previously selected alternative routing features are still active.
AAA - Access,
Authorization, and Accounting
Authentication, Authorization and Accounting systems
implemented to securely determine the identity and privileges of a user and
to track that user’s activities, particularly with respect to billing.
Popular examples of AAA protocols which are used to transport AAA information
around the network include RADIUS and Diameter.
AAC - Advanced Audio Codec
The AAC features in both the MPEG-2 and MPEG-4 standards
and was designed to be the successor to MP3. As such, AAC can operate using a
variety of bitrates whilst sustaining adequate sound quality. AAC has been
adopted for use in a wide variety of devices, ranging from Apple’s iPod to
the Nintendo Wii. A low bitrate variant of the AAC, termed the HE-AAC (High
Efficiency Advanced Audio Codec) is also available.
AAL - ATM Adaptation Layer
Provides a conversion function to and from ATM
(Asynchronous Transfer Mode) for various types of information, including
voice, video, and data. There are several versions of AAL, each applicable to
a given information type. All of them convert elements of an information
stream (such as voice frames and data packets) into cells, giving ATM the
versatility to carry many different types of data, from constant rate voice
data to highly bursty messages generated by LAN (Local Area Network), all
within the same cell format.
AAL1 - ATM Adaptation
Layer 1
The AAL1 adaptation layer is used to support continuous
bit rate transmissions with a constant delay.
AAL2 - ATM Adaptation
Layer 2
AAL2 supports continuous bit rate transmissions, but also
solves the problems of packetization delay and efficiency in the use of
bandwidth resources.
AAL5 - ATM Adaptation
Layer 5
The AAL5 adaptation layer was developed because of
concerns about the overhead and performance of the AAL3/4 adaptation layers.
The result is a very simple and light weight adaptation layer.
AAR - Authorization
Authentication Request
A Diameter message used in the PCC (Policy and Charging
Control) framework which allows an Application Function to supply session
related information to the PCRF.
AB - Access Burst
This is used by GSM and GPRS mobiles when accessing the
system. It is smaller than other transmissions since it is typically
transmitted when timing information is not known.
ABI - Application Binary
Interface
A binary interface for applications to utilize external
and/or underlying software or hardware.
Abis Interface
The interface within the GSM architecture, between the BTS
(Base Transceiver Station) and BSC (Base Station Controller). This interface
is usually configured using a 16Kbps slot structure.
ABM - Asynchronous
Balanced Mode
This mode refers to the data link layer and identifies
that a link has been established for sending information. The opposite state
is ADM (Asynchronous Disconnect Mode).
ABMF - Account Balance
Management Function
The ABMF is a logical element of the 3GPP OCS (Online
Charging System) which is designed to track the remaining credit a subscriber
has left on their account.
ABNF - Augmented
Backus-Naur Form
ABNF – Augmented Backus-Naur Form A standard programming
syntax used to express the command messages in distributed programming.
ABR - Area Border Router
A router that attaches to multiple areas of an OSPF based
network. Area border routers run multiple copies of the basic algorithm, one
copy for each attached area. Area border routers condense the topological
information of their attached areas for distribution to the backbone. The
backbone in turn distributes the information to the other areas.
ABR - Available Bit Rate
QoS (Quality of Service) class defined by the ATM
(Asynchronous Transfer Mode) Forum for ATM networks. ABR is used for
connections that do not require timing relationships between source and
destination. ABR provides no guarantees in terms of cell loss or delay,
providing only best-effort service. Traffic sources adjust their transmission
rate in response to information they receive describing the status of the
network and its capability to successfully deliver data.
ABR - Available Bit Rate
QoS (Quality of Service) class defined by the ATM
(Asynchronous Transfer Mode) Forum for ATM networks. ABR is used for
connections that do not require timing relationships between source and
destination. ABR provides no guarantees in terms of cell loss or delay,
providing only best-effort service. Traffic sources adjust their transmission
rate in response to information they receive describing the status of the
network and its capability to successfully deliver data.
AC - Access Category
The term Access Category is used in wireless networks
supporting the IEEE 802.11e Quality of Service standard. There are four
defined Access Categories – Voice, Video, Best Effort and Background.
AC - Access Class (C0 to
C15)
AC – Access Class (C0 to C15) In GSM , the Access Class
indicates the type of access that is permitted. This class is broadcasted
over the air interface. If a mobile is a member of at least one of the
signalled access classes then it may attempt to access the network.
AC - Attachment Circuit
The physical or virtual circuit attaching a CE to a PE. An
AC can be a Frame Relay DLCI , an ATM VPI / VCI , an Ethernet port, a VLAN ,
a HDLC , a connection on a physical interface, a PPP session from an L2TP
tunnel, an MPLS LSP , etc.
Access Code
In Bluetooth, each baseband packet starts with an Access
code, which can be one of 3 types: CAC (Channel Access Code), DAC (Device
Access Code) and IAC (Inquiry Access Code). The respective access code types
are used for a Bluetooth unit in different operating modes. The CAC (Channel
Access Code) identifies a piconet. The DAC (Device Access Code) is used for
special signalling procedures and the IAC (Inquiry Access Code) is used to
discover other Bluetooth units that are in range.
Access Control Method
This is the main distinguishing feature between different
LAN (Local Area Network) technologies. It regulates each workstation’s
physical access to the cable (transmission medium), and determines the order
in which nodes gain access so that each user gets efficient service. Access
methods include token passing, which is used in Token Ring and FDDI (Fibre
Distributed Data Interface), and CSMA/CD (Carrier Sense Multiple Access with
Collision Detection), which is employed by Ethernet and Fast Ethernet systems.
Access delay
The Access delay is the value of elapsed time between an
access request and the successful access of the network.
Access Protocol
A set of specific procedures that enable a user to obtain
services from a telephone company or network.
Access Server
Communications processor that connects asynchronous
devices to a LAN (Local Area Network) or WAN (Wide Area Network) through
network and terminal emulation software. It performs both synchronous and
asynchronous routing of supported protocols and is sometimes called a NAS
(Network Access Server).
Access Stratum SDU -
Access Stratum SDU (Service Data Unit)
Unit of data transferred over the access stratum SAP
(Service Access Point) in the Core Network or in the User Equipment.
ACCH - Associated Control
Channel
The GSM signalling channels associated with a user’s
traffic channel or dedicated signalling channel. Two ACCH are defined for GSM
Circuit Switched operation. These are SACCH (Slow Associated Control Channel)
and FACCH (Fast Associated Control Channel). In GPRS packet operation, an
ACCH is allocated in conjunction with a PDTCH (Packet Data Traffic Channel)
and is termed a PACCH (Packet Associated Control Channel).
Account Code
A numeric code that identifies the calling party for
internal billing or accounting purposes. Account codes are often used by
service companies such as accountants and lawyers to bill specific clients
for telephone expenses. Also known as a project code or bill-back code.
Accounting
Accounting is the process of apportioning charges between
the Home Environment, Serving Network and User.
Accuracy
The Accuracy indicates the performance criterion that
describes the degree of correctness with which a function is performed.
ACD - Automatic Call
Distributor
A device that handles a large number or incoming calls. An
ACD performs four functions: first, it recognizes and answers incoming calls;
second, it looks in a database to decide how to route the call; third, based
on these instructions, it sends the call to an answering position based on a
pre-determined, logical answering pattern. (Or, if all positions are busy,
the ACD plays a recorded message and places the call in a queue until an
answering position becomes available). Finally, the ACD connects the call to
an agent, once that agent has completed the previous call.
ACELP - Algebraic
Code-Excited Linear Prediction
A process employed in analysis by synthesis codecs in
order to predict the filter coefficients required to synthesize speech at the
receiving party. This process is employed in the ITU-T (International
Telecommunications Union-Telecommunication Standardization Sector) G723.1
codec specification.
ACF - Admission Confirm
An H.225 message sent by a H.323 Gatekeeper to an endpoint
that has requested access to the zone controlled by the Gatekeeper. This
message indicates a successful acknowledgement to the endpoint that issued
the ARQ (Admission Request) message.
ACI - Adjacent Channel
Interference
The phenomenon whereby channels that are beside one
another in the frequency domain may have some spectral overlap, causing
impairment and interference.
ACID - HARQ Channel
Identifier
The ACID (HARQ Channel Identifier) Differentiates channels
within a HARQ (Hybrid Automatic Repeat Request) connection.
ACL - Access Control List
A roster of users and groups of users, along with their
access rights.
ACLR - Adjacent Channel
Leakage Ratio
The Adjacent Channel Leakage Ratio is the ratio of the on
channel transmit power to the power measured in one of the adjacent channels.
ACM - Accumulated Call
Meter
The accumulated charge for both the current call and all
proceeding calls. This value is calculated by the MS (Mobile Station) and
expressed in home units. The ACM is stored on the SIM / USIM (Subscriber
Identity Module / UMTS Subscriber Identity Module).
ACM - Address Complete
An ISUP (ISDN User Part) signalling message sent by the
destination switch indicating that a switched circuit has been established to
the requested endpoint. This message is an acknowledgement to the switch
issuing the IAM (Initial Address Message).
ACMC - Access Channel
Message Capsule
This term is given to the AC (Access Channel) message plus
any additional overheads or padding.
ACO - Additional Call
Offering
An ISDN feature that allows multiple calls to be placed
simultaneously to the same telephone number. A serving switch is programmed
with the number of lines on the receiving telephone equipment. The switch
will offer an additional call if there is a line available to accept it.
ACP - Automatic Call
Processing
A system in which calls are processed entirely by
computer.
ACR - Access Channel
Request
An Access Channel Request is a message that is
autonomously generated by the MS (Mobile Station) and is used to request
radio resources from the network.
ACR - Accounting Request
A Diameter message used by network nodes to supply billing
related information to the offline charging system.
ACS - Access Channel Slot
The assigned time interval for an access probe. An Access
Channel slot consists of an integer number of frames. The transmission of an
access probe is performed within the boundaries of an Access Channel slot.
ACS - Adjacent Channel
Selectivity
This relates to the ability of a radio receiver to
correctly receive the desired radio channel in the presence of strong
adjacent signals.
ACSE - Application Control
Service Element
The Application Control Service Element is a Layer 7
protocol used in the management of two peer entities by either connecting
releasing or aborting the association between them.
Active Communication
A UE (User Equipment) is in active communication when it
has a CS (Circuit Switched) connection established. For PS (Packet Switched)
operation, active communication is defined by the existence of one or more
Activated PDP (Packet Data Protocol) contexts. Either one or both of the
mentioned active communications may occur in the UE.
Active Mode
In the Active Mode, the Bluetooth unit actively
participates on the channel. The master of the piconet schedules the
transmission based on traffic requirements to and from the slaves. It also
allows regular transmissions to keep piconet slaves synchronized to the
channel. An active slave will listen for packets at predetermined times; if
not addressed, the active slave may sleep until the next scheduled master
transmission.
Active Monitor
A node on a Token Ring network which purges the ring and
generates a new token (when necessary), initiates and monitors neighbour
notification, and maintains the master clock.
Active Set
Active Set A set of radio links simultaneously involved in
a specific communication service between the UE (User Equipment) and the
UTRAN (UMTS Terrestrial Radio Access Network).
ad hoc
This is a term used to describe an IEEE 802.11 networks
operating in IBSS (Independent Basic Service Set) mode in which no network
infrastructure is utilized. As such, wireless Stations will communicate with
each other across a temporary network.
Ad Hoc Network
An Ad Hoc network is formed by two or more wireless
devices dynamically setting up a temporary network. This is achieved without
using any existing network infrastructure. Examples of systems that employ Ad
Hoc networks are Bluetooth and WiFi.
Address Mask
Used to select bits from an Internet address for subnet
addressing. The mask is 32bits long and selects the network portion of the
Internet address and one or more bits of the local portion. Sometimes called
the subnet mask.
ADDTS - Add Traffic Stream
The term ADDTS is used in wireless networks supporting the
IEEE 802.11e Quality of Service standard. It is used to carry the TSPEC and
optional TCLAS messages between a QAP and QSTA.
ADM - Add/Drop Multiplexer
A Core SDH network element which allows data to be
directly inserted into or extracted from an STM stream as it passes through
the network, without demultiplexing the frame.
ADPCM - Adaptive
Differential Pulse Code Modulation
A form of PCM (Pulse Code Modulation) that produces a
digital signal with a lower bit rate than standard PCM. ADPCM produces a
lower bit rate by recording only the difference between samples and adjusting
the coding scale dynamically to accommodate large and small differences. Some
applications use ADPCM to digitize a voice signal so voice and data can be
transmitted simultaneously over a digital facility normally used only for one
or the other.
ADSL - Asymmetric Digital
Subscriber Line
A technology that allows data to be sent over existing
copper telephone lines ( POTS ). ADSL supports data rates from 1.5Mbps to
9Mbps when receiving data (known as the downstream rate) and from 16Kbps to
640Kbps when sending data (known as the upstream rate). ADSL requires a
special modem, termed the ATU-R (ADSL Termination Unit Remote). ADSL2+ is a
more recent incarnation of ADSL and has been deployed widely. The difference
between the two is a matter of data rate, with the later version offering
downstream rates of up to 24Mbps and upstream rates of up to 1Mbps
(theoretical). This is achieved using improved physical layer techniques in
conjunction with a reduction in the permissible length of the last mile.
AEC - Automatic Echo
Cancellation
Employed in speech circuits and VoIP (Voice over Internet
Protocol) systems where excessive delay is experienced between the parties
involved in the speech call.
AEF - Access Entry Handoff
The AEF is the act of transferring reception of the PCH
(Paging Channel) from one base station to another. This occurs when the MS
(Mobile Station) transitions from the Mobile Station Idle State to the System
Access State.
AES - Advanced Encryption
Standard
AES is a widely used encryption algorithm which is defined
by NIST (National Institute of Standards and Technology). It employs a
symmetric encryption algorithm and the Rijndael block cipher in order to
protect user data.
AF - Active Frame
An Active Frame is a frame that contains data and is
therefore enabled in terms of traffic power.
AF - Application Function
The AF is a logical element of the 3GPP PCC framework
which provides session related information to the PCRF in support of PCC rule
generation.
AF - Assured Forwarding
A QoS (Quality of Service) term employed within the
DiffServ (Differentiated Services) policy. Assured Forwarding values are set
as part of the PHB (Per Hop Behaviour) used by routers. This value is used to
determine the degree of reliability a packet should be afforded within the
DiffServ domain.
AGC - Automatic Gain
Control
Receiver function that generates constant power output
under varying power input.
AGCH - Access Grant
Channel
The Access Grant Channel is used to assign resources to a
user requesting access to the network. These resources will include the
dedicated channel to be used along with timing advance information.
Aging
When applied to pilot channels, Aging is the mechanism
through which a mobile maintains, in its NS (Neighbour Set), the pilots that
have been sent to it by the BS (Base Station). It may also apply to the
pilots whose handoff drop timers have recently expired.
AGPS - Assisted Global
Positioning System
Assisted Global Positioning System is a technique enabling
both mobiles and cellular networks to establish accurate positioning
information. The system utilizes both the GPS (Global Positioning System) and
the terrestrial cellular network and is one of the LCS (Location Services)
methodologies.
AH - Access Handoff
An Access Handoff is the process of transferring reception
of the PCH (Paging Channel) from one BS (Base Station) to another after the
mobile has completed the AA (Access Attempt) and is in the System Access
State.
AH - Authentication Header
AH is a version of IPSec which support authentication and
integrity checking of each individual IP packet.
AICH - Acquisition
Indicator Channel
The Acquisition Indicator Channel is a fixed rate physical
channel with a spreading factor of 256 equating to 32Kbps. It is used to
carry acquisition indicators which correspond to signatures on the PRACH
(Physical Random-Access Channel).
AID - Association
Identifier
This is a unique number which identifies a particular
Association between an AP (Access Point) and a wireless Station.
AIFS - Arbitration
Interframe Space
The term AIFS is used in wireless networks supporting the
IEEE 802.11e Quality of Service standard. It defines a period of time,
depended upon Access Category, a QSTA must wait before it can access the
Wireless Medium.
AIFSN - Arbitration
Interframe Space Number
This is a term used in IEEE (Institute of Electrical and
Electronics Engineers) 802.11 networks which are supporting the QoS (Quality
of Service) enhancements originally defined in the 802.11e standard. This
parameter, which is transmitted from the AP (Access Point), is used by a
station in order to determine the specific AIFS (Arbitration Interframe
Space) value for each of the four EDCA (Enhanced Distributed Channel Access)
classes.
AIUR - Air Interface User
Rate
The AIUR (Air Interface User Rate) is the rate indicated
between the Mobile Termination and IWF (Interworking Function) for
transparent and non-transparent data services.
AK - Anonymity Key
AK is a term used in the UMTS AKA (Authentication and Key
Agreement) architecture. AK is a 48-bit value derived from the f5 algorithm,
which can then be employed to conceal the value of SQN (Sequence Number).
AKA - Authentication and
Key Agreement
AKA is the term given to the mechanism which performs
authentication and session key distribution in UMTS, IMS and LTE networks.
The AKA process is different for each technology, but the main goal of
authentication and key agreement is the same.
AL - Ambient Listening
In MCPTT ambient listening is a feature that allows a call
to be instigated on an end user’s device without that device indicating that
it is transmitting. Initiation of ambient listening can be done by an
authorised MCPTT user that wishes to be listened to, or alternatively by a
remote authorized MCPTT user, such as a dispatcher.
ALCAP - Access Link
Control Application Part
Access Link Control Application Part is a generic name for
the transport signalling protocol used to setup and tear down transport
bearers. In UMTS the main ALCAP protocol is the AAL2 signalling protocol.
Alert
A signal (of some sort) that indicates a monitored
parameter of the system is out of range. An example alert is an audible alarm
when the system temperature gets too high. Alerts may also trigger action by
the system monitoring software.
ALG - Application-Level
Gateway
An ALG is a DPI device designed to provide security and
overcome interoperability issues for a particular protocol or application. In
effect, ALGs are a sophisticated type of firewall, analyzing the various
fields associated with inbound or outbound traffic from a particular protocol
and checking to see if contains malicious content or content that will cause
an interworking problem. Numerous examples of ALGs have been developed for
protocols such as SIP and HTTP.
ALI - Automatic Location
Identification
This is a database used in emergency services dialling
such as 999 or 911. The database will map a subscriber’s telephone number to
their physical location.
AM - Acknowledged Mode
The acknowledged service in RLC (Radio Link Control)
provides reliability through retransmission. These include but are not
limited to: transfer of user data, segmentation and re-assembly, error
correction, duplicate detection, protocol error detection and recovery,
ciphering.
AM_ADDR - Active Member
Address
The Bluetooth AM_ADDR (Active Member Address) represents
an address used to distinguish between the active members participating in a
piconet. Each piconet has one or more slaves connected to a master. The
master allocates each active slave a temporary 3bit address. Any packets
exchanged between master and an active slave will carry the associated
AM_ADDR. The AM_ADDR is used for both master-to-slave packets and
slave-to-master packets. The all-zero address (000) is used by the master for
broadcasting packets.
AM/PM - Amplitude
Modulation to Phase Modulation conversion
An impairment generated when a signal with amplitude
variation impinges on a device that converts some of this variation to output
signal phase changes.
Ambient Noise
The background noise that is present on a non-digital
communications line at all times.
AMBR - Aggregate Maximum
Bit Rate
LTE data bearers that are classified as Non GBR are
scheduled according to the AMBR for the subscriber. This means that of the
total radio resources available to all the Non GBR bearers that a subscriber
has active cannot exceed the AMBR.
AMC - Adaptive Modulation
and Coding
This provides link adaptation with various modulation
schemes and channel coding rates being applied to an air interface channel.
AMD - Acknowledged Mode
Data
AMD is a mode of RLC which ensures that transmitted SDUs
are acknowledged upon successful reception. If necessary, SDUs can be
retransmitted if they do not receive an acknowledgement.
AMF - Authentication
Management Field
AMF is a term used within the UMTS AKA (Authentication and
Key Agreement) architecture. The AMF is a 16 bit value which is used to set
the acceptable synchronization window in both the UE (User Equipment) and the
network.
AMF - Core Access and
Mobility Management Function
The Core Access and Mobility Management Function is part
of the 3GPP 5G Architecture. Its primary tasks include: Registration
Management, Connection Management, Reachability Management, Mobility
Management and various function relating to security and access management
and authorization.
AMIS - Audio Messaging
Interchange Specification
A series of standards aimed at addressing the problem of
how voice messaging systems produced by different vendors can network or
inter-network. Before AMIS, systems from different vendors could not exchange
voice messages. AMIS deals only with the interaction between two systems for
the purpose of exchanging voice messages. It does not describe the user
interface to a voice messaging system, specify how to implement AMIS in a
particular system, or limit the features a vendor may implement.
Amplifier
An electronic device used to increase the amplitude or
power level of a signal. Amplifiers are used in telecommunications on
analogue transmission lines to offset the signal loss that occurs as the
signal is propagated along the line.
AMPS - Advanced Mobile
Phone Service
A North American analogue cellular system developed in the
1980s. This was enhanced to DAMPS (Digital Advanced Mobile Phone Service).
AMR - Adaptive Multi Rate
A codec offering a wide range of data rates. The
philosophy behind AMR is to lower the codec rate as the interference
increases, thus enabling more error correction to be applied. The AMR codec
is also used to harmonize the codec standards amongst different cellular
systems (including VoLTE) and can operate as a narrowband or wideband
version.
AMR-WB - AMR Wideband
The wideband derivative of AMR supports HD voice services,
utilizing a range of operating modes to suit the available bandwidth (6.6 to
23.85kbps).
Analogue signal
A continuous signal that is infinitely and continuously
variable in amplitude and/or frequency.
Analogue transmission
The transmission of continuously variable (analogue)
signals. As a signal is transmitted along an analogue network, the signal
strength eventually weakens or attenuates. Amplifiers may be installed in the
network to amplify the signal, but because there is no way to differentiate
between an analogue signal and noise, both are amplified. Therefore, noise
tends to accumulate in an analogue network.
ANDSF - Access Network
Discovery and Selection Function
ANDSF (Access Network Discovery and Selection Function) is
designed to assist mobile devices in discovering offload destinations,
including WiFi, WiMAX and CDMA2000 networks. The feature was designed to
provide mobile devices with information about available alternative wireless
networks and to enforce policies for selecting and using those networks.
ANF - Assigned Number
Field
In MPLS and other VPN based networks VPN-IPv4 is used to
ensure addressing spaces within the VPN do not cross. The VPN-IPv4 address is
defined through the RD. The RD comprises of the AF (Administrator Field) and
the ANF. The ANF defines the VPN-IPv4 variable and is populated by the
service provider.
ANI - Automatic Number
Identification
Term used in the United States of America by long distance
carriers for CLI (Calling Line Identity). This is an ISDN (Integrated
Services Digital Network) function used to provide information to the user
regarding the calling party.
ANM - Answer Message
An off hook signal sent in the reverse direction that
indicates when the called party answers. Billing starts when the answer
message is received.
ANR - Automatic Neighbour
Relation
ANR is a SON feature associated with the automatic
configuration of neighbour cell relations at a given base station. The
Neighbour Relation Table held at the base station will contain an entry for
each neighbouring cell. Each entry will contain all the information the base
station needs to know about its neighbour.
ANS - Answer Message
An ISUP (ISDN User Part) signalling message sent by the
destination switch indicating that the endpoint is now in the off-hook
position i.e., the telephone has been picked up.
ANSI - American National
Standards Institute
This is a US organization chartered to accredit standards
developed by a wide variety of industry groups while avoiding improper
influence from any one company or organization. ANSI does not develop
standards, but reviews and implements those developed by other organizations.
Answerback
A signal sent by a data receiver to a data transmitter
indicating that it is ready to receive data or to acknowledge the receipt of
data.
ANT+
ANT+ is a wireless technology first developed by
Dynastream (purchased by Gamin in 2006) and now under the auspices of the
ANT+ Alliance that provides a series of standards enabling health and fitness
sensors to pass information with compatible devices.
Antenna Gain - Antenna
Gain (dBi)
The maximum gain an antenna in the horizontal plane
(specified as dB (Decibels) relative to an isotropic radiator).
AOA - Angle of Arrival
AOA measurements are used to determine the direction from
which a received radio signal originally emanated. Individual elements of an
antenna array will utilize TDOA (Time Difference On Arrival) measurements,
from which the AOA can then be calculated. In mobile networks, AOA
measurements taken at several cell sites can be used together in order to
identify the location of a subscriber. This technique is particularly useful
for meeting the location accuracy requirements associated with E911 services
but does require the subscriber to be in Line of Sight to the cell sites.
AoC - Advice of Charge
This service allows e-parameters to be passed to the
mobile so that charge estimation can take place. This process is typically
associated with the CAMEL Charging Information procedures.
AoR - Address of Record
An address-of-record (AOR) is a SIP or SIPs URI that
points to a domain with a location service that can map the URI to another
URI where the user might be available. Typically, the location service is
populated through the SIP Registration process. An AOR is frequently thought
of as the public address of the user.
AP - Access Point
The AP (Access Point) serves as the base station within a
WLAN, terminating the air interface on the network side. They provide the
link between the wireless world of 802.11 and the wired world of technologies
such as Ethernet. They may also play a bridging function ensuring only
traffic destined for a Station is transmitted across the Wireless Medium.
This prevents information from being broadcast around the wireless element of
the network at the expense of data throughput. Access Points can also perform
other functions, e.g. manage QoS (Quality of Service) and take/provide
measurements for roaming.
AP - Access Probe
An Access Probe involves a transmission consisting of a
preamble and a message. The transmission incorporates a number of frames
transmitted in one AC (Access Channel) message.
AP-AICH - Access Preamble
Acquisition Indicator Channel
The Access Preamble Acquisition Indicator Channel is a
fixed rate physical channel with a spreading factor of 256 used to carry AP
(Access Preamble) acquisition indicators of CPCH (Common Packet Channel).
APCH - Auxiliary Pilot
Channel
The Auxiliary Pilot Channel is a non data bearing, direct
sequence spread spectrum signal transmitted by a CDMA (Code Division Multiple
Access) BS (Base Station).
APH - Access Probe Handoff
An Access Probe Handoff occurs while the MS (Mobile
Station) is performing an AA (Access Attempt) in the System Access State.
API - Application
Programming Interface
A set of routines, protocols, and tools used when building
software applications. A good API makes it easier to develop a program by
providing all the building blocks and enabling a programmer to put the blocks
together. Most operating environments, such as MS-Windows, provide an API so
that programmers can write applications consistent with the operating
environment. Although API are designed for programmers, they are ultimately
good for users because they guarantee that all programs using a common API
will have similar interfaces.
APN - Access Point Name
An Access Point Name provides routing information for SGSN
(Serving GPRS Support Nodes) and GGSN (Gateway GPRS Support Nodes). The APN
consists of two parts; the Network ID, which identifies the external service
requested by a user of the GPRS service and the Operator ID which specifies
routing information. Example: Operator ID = MNCyyyy.MCCzzzz.gprs Network ID =
mpirical.net
APN AMBR - Access Point
Name Aggregate Maximum Bit Rate
The Aggregate Maximum Bitrate which is applicable to a
given APN. The total bandwidth associated with all the Non GBR bearers to the
APN must not exceed the APN AMBR.
Applet
An Applet is a small program that is intended not to be
run on its own, but rather to be embedded inside another application.
Application
An application consists of a set of security mechanisms,
files, data and protocols (excluding transmission protocols) which are
combined to provide a particular service for a user or system.
Application Context
This context signifies the type of process or procedure
that is required typically on the MAP (Mobile Application Part) interfaces.
Examples of Application Context include Location Updating and Location
Cancellation.
Application Generator
Proprietary software to enable a user to produce a
customized application, mainly for PC based systems.
Application Interface
The Application Interface is a standardized interface used
by application/clients to access service capability features.
Applications / Clients
These are services, which are designed using service
capability features.
APS - Access Probe
Sequence
An Access Probe Sequence consists of one or more probes on
the AC (Access Channel).
APSD - Automatic Power
Save Delivery
Automatic Power Save Delivery is a term used in WiFi to
describe a power saving technique originally introduced in the IEEE 802.11e
specification. It involves a QAP (Quality Access Point) delivering downlink
frames (which belong to a specified Access Class) to Power Saving stations
automatically, thereby preventing the need to poll for each frame as is
usually performed. APSD defines two delivery mechanism – U-APSD (Unscheduled
– Automatic Power Save Delivery) and S-APSD (Scheduled – Automatic Power Save
Delivery).
AR - Area Router
A router within an OSPF (Open Shortest Path First) routing
area with all directly connected networks belonging to the same area. Area
routers run a single copy of the basic routing algorithm associated with
OSPF.
AR - Autonomous
Registration
Autonomous Registration is the method of registration in
which the MS (Mobile Station) registers without an explicit command from the
BS (Base Station).
AR_ADDR - Access Request
Address
The Bluetooth AR_ADDR (Access Request Address) is used by
the parked slave to determine the slave -to- master half slot in the access
window it is allowed to send access request messages in. The AR_ADDR is
assigned to the slave when it enters the park mode and is only valid as long
as the slave is parked and is not necessarily unique.
ARFCN - Absolute Radio
Frequency Channel Number
Within the spectrum allocated for cellular mobile
communications, the radio channels are identified by ARFCN. If the system is
operating in FDD (Frequency Division Duplex) mode then the channel number is
associated with both the uplink and downlink radio channels. Within the
GSM900 spectrum ARFCN 1 to 124 are used. In GSM1800 , ARFCN 512 to 885 are
used and in GSM1900 ARFCN 512 to 810 are used.
ARI - Assist Request
Instructions
This message is associated with gsmSRF procedures in which
the gsmSRF is collocated with an MSC that is not involved with the call.
Hence this MSC must assist with the call. The ARI is passed to the gsmSCF to
indicate that it too has been requested to assist in the CAMEL service.
ARIB - Association of
Radio Industries and Businesses
Association of Radio Industries and Businesses was
established in 1995 with a charter from the Japanese Minister of Posts and
Telecommunications. ARIB concentrates on the growth and development of the
wireless industry, mainly looking at investigation, research development of
new radio systems in the field of telecommunications and broadcasting. ARIB
is one of the main partners in 3GPP (Third Generation Partnership Project )
and 3GPP2 (Third Generation Partnership Project 2).
ARJ - Admission Reject
This is an H.225 message sent by a H.323 Gatekeeper to an
endpoint that has requested access to the zone controlled by the Gatekeeper.
This message indicates an unsuccessful acknowledgement to the endpoint that
issued the ARQ (Admission Request) message.
ARL - Adjusted Ring Length
Calculated to ensure that if there is a ring failure, the
longest ring path is still within specifications. Generally associated with
Token Ring , adjusted ring length ensures that the secondary ring can still
function properly in the event of a failure on the shortest trunk cable.
ARP - Address Resolution
Protocol
Internet protocol used to map an IP address to a MAC
(Medium Access Control) address. It allows host computers and routers to
determine the data link layer addresses through the ARP Request and ARP
Response process.
ARP - Allocation and
Retention Priority
ARP is related to the QoS of an EPS Bearer. At times of
network congestion, the ARP value of a subscriber’s bearer will determine
whether or not it can replace an existing bearer that has a lower ARP
precedence or be replaced by new bearer with a higher ARP precedence.
ARPA - Advanced Research
Projects Agency
An organization formed in the United States in 1958 to
conduct R&D in order to advance technology and science. ARPA became DARPA
in 1972 and later went on to develop the early global Internet.
ARPF - Authentication
Credential Repository and Processing Function
The ARPF is a functional element of the UDM (Unified Data
Management), responsible for generating 5G HE AV (5G Home Environment
Authentication Vectors) based on the subscriber’s shared secret key.
ARPU - Average Revenue Per
User
ARPU is a term used by telephone Operators/Carriers to
indicate the financial revenue which is gained per subscriber on a monthly
basis.
ARQ - Automatic Repeat
Request
This is a rudimentary transmission error protection
whereby the receiver requests a retransmission when it detects that errors
have occurred in a frame.
ARU - Audio Response Unit
An Audio Response Unit is an output device that provides a
spoken response to digital inquiries from a telephone or other device. For
example, Press 1 to hear this information again; Press 2 to hear more
options. It is also known by the generic name audiotex.
AS - Active Set
The Active Set defines the set of pilots associated with
the CDMA (Code Division Multiple Access) Channels containing Forward Traffic
Channels assigned to a particular MS (Mobile Station).
AS - Application Server
A logical node of the 3GPP IMS which performs specific
functions related to the delivery of a particular IMS based service. Examples
include the Telephony Application Server used in VoLTE networks to support
Supplementary Services, as well as the IM (Instant Messaging) Application
Server which is used to supported next generation messaging services.
ASA - Access Sub-attempt
An Access Sub Attempt is a subsequent AA (Access Attempt)
after the original AA has failed or not been responded to. It may involve a
sequence of one or more APS (Access Probe Sequences) on the AC (Access
Channel) and contains the same message content as the original AA.
ASA - Authorised Shared
Access
Authorised Shared Access relates to radio spectrum usage.
It was introduced as an enabler to unlock access to additional frequency
bands which are currently not allocated for mobile broadband. As such, it is
an alternative to spectrum clearing/refarming. The concept was extended as
LSA (Licensed Shared Access).
ASBR - Autonomous System
Boundary Router
A router that exchanges routing information with routers
belonging to other AS (Autonomous System). Such a router advertises AS
external routing information throughout the Autonomous System. The paths to
each AS boundary router are known by every router in the AS. AS boundary
routers may be internal or area border routers, and may or may not
participate in the backbone.
ASCII - American Standard
Code for Information Interchange
Pronounced ask-ee, ASCII is a code for representing
English characters as numbers, with each letter assigned a number from 0 to
127. For example, the ASCII code for uppercase M is 77. Most computers use
ASCII codes to represent text, which makes it possible to transfer data from
one computer to another. Text files stored in ASCII format are sometimes
called ASCII files. Text editors and word processors are usually capable of
storing data in ASCII format, although ASCII format is not always the default
storage format. Most data files, particularly if they contain numeric data,
are not stored in ASCII format. Executable programs are never stored in ASCII
format. The standard ASCII character set uses just 7 bits for each character.
There are several larger character sets that use 8 bits, which gives them 128
additional characters. The extra characters are used to represent non-English
characters, graphics symbols, and mathematical symbols. Several companies and
organizations have proposed extensions for these 128 characters. The DOS
operating system uses a superset of ASCII called extended ASCII or high
ASCII. A more universal standard is the ISO Latin 1 set of characters, which
is used by many operating systems, as well as Web browsers.
ASE - Application Service
Element
The function that allows applications to communicate with
one another in a SS7 system. Examples of an ASE include TCAP (Transaction
Capabilities Application Part) and MAP (Mobile Application Part).
ASIC - Application
Specific Integrated Circuit
These are circuit designs used by manufacturers to
consolidate many chips into a single package, reducing board size and power
consumption.
ASME - Access Security
Management Entity
The Access Security Management Entity receives the
top-level keys in an access network from the HSS or HLR. For E-UTRAN access
networks, the role of the ASME is assumed by the MME. The MME invokes the AKA
procedures by requesting authentication vectors to the HE (Home environment).
The HE sends an authentication response back to the MME that contains a fresh
authentication vector, including a base-key named KASME.
ASN - Autonomous System
Number
An ASN is a unique identifier associated with an AS
(Autonomous System) which is used by a variety of routing protocols. The IANA
(Internet Assigned Numbers Authority) is responsible for allocating blocks of
ASN to RIR (Regional Internet Registry). RIR will then allocate ASN directly
to AS operators.
ASN - Abstract Syntax
Notation 1
A syntax notation type employed to specify protocols. Many
protocols defined by the ITU-T (International Telecommunications
Union-Telecommunication Standardization Sector) use this syntax format. Other
alternatives are standard text or ABNF (Augmented Backus-Naur Form).
ASP - Application Server
Process
The processing entity within a server responsible for a
specific task or area of responsibility. A term typically associated with
distributed processing.
Association
The term is found within an IEEE 802.11 network and
identifies the service used to establish AP (Access Point) and Station
mapping. An Association is required before any information can be passed
between the Station and other nodes via the AP.
AST - Automatic Spanning
Tree
Function that supports the automatic resolution of
spanning trees in source-route bridging networks. It provides a single path
for spanning explorer frames to traverse from a given node in the network to
another. AST is based on the IEEE 802.1 standard.
Asynchronous
A method of transmitting data whereby each byte is clocked
separately. One start bit is added to the beginning, and one or more stop
bits to the end, of each character. Asynchronous transmission is the most
rudimentary form of data communication, as the originating and recipient
machines do not have to be in sync. It is commonly used for low speed
transmission, as with a PC’s serial port.
AT - Action Time
The Action Time is the time at which the action implied by
a message should take effect.
AT - Authorization Token
The term AT is used in a number of scenarios in order to
support authorized access to a resource or network services. In particular,
AT are used in the SBLP (Service Based Local Policy) architecture of the
Release 5 3GPP IMS (IP Multimedia Subsystem) specifications. Here, the AT is
passed from the P-CSCF (Proxy Call Session Control Function) to the IMS
terminal which is making a request for a service. The IMS terminal can then
use the AT in its request for network resources when it signals its IP-CAN (IP
Connectivity Access Network).
ATB - All Trunks Busy
A single tone repeated at a 120ipm (impulse per minute)
rate to indicate that all trunks in a routing group are in use.
ATCF - Access Transfer
Control Function
The ATCF (Access Transfer Control Function) was introduced
in Release 10 of the 3GPP specifications in order to reduce the voice
interruption delay when conducting an SRVCC procedure. The ATCF acts as an
anchor point for SIP signalling and sits between the P-CSCF and the
I-CSCF/S-CSCF in the signalling flow. Moreover, the ATCF controls an ATGW
(Access Transfer Gateway), which also acts as an anchor point but in this
case for the media stream, as opposed to signalling. In terms of the physical
location of the devices, the ATCF could be positioned with the P-CSCF or
IBCF.
ATDPCH - Auxiliary
Transmit Diversity Pilot Channel
ATDPCH – Auxiliary Transmit Diversity Pilot Channel The
Auxiliary Transmit Diversity Pilot Channel is associated with the APCH
(Auxiliary Pilot Channel), that is transmitted by a CDMA (Code Division
Multiple Access) BS (Base Station) from the non-primary antenna when
orthogonal transmit diversity is employed.
ATGw - Access Transfer
Gateway
The ATGw is a media function that is used to anchor the
media stream. It is controlled by the ATCF and in terms of the physical
location the ATGw could be an IM-MGW.
ATI - Any Time
Interrogation
This process enables the gsmSCF to interrogate the HLR for
location and or subscriber information. This may subsequently be used in the
service offered to the user.
ATIM - Announcement
Traffic Indication Message
Announcement Traffic Indication Messages are used in IEEE
802.11 ad hoc or Independent BSS (Basic Service Set) networks to announce the
existence of buffered frames. These messages are sent between wireless
stations to prevent them entering power saving mode and to indicate there is
data to follow.
ATIS - Alliance for
Telecommunications Industry Standards
A Washington D.C. trade group heavily involved in
standards issues, including interconnection and interoperability.
ATM - Asynchronous
Transfer Mode
A network technology based on transferring data in cells
or packets of a fixed size. The small, constant cell size allows ATM
equipment to transmit video, audio, and computer data over the same network,
and assure that no single type of data dominates the line. ATM creates a
fixed channel, or path, between two points whenever data transfer begins.
This differs from TCP/IP , in which messages are divided into packets and
each packet can take a different route from source to destination. This
difference makes it easier to track and bill data usage across an ATM
network, but it makes it less adaptable to sudden surges in network traffic.
ATM Forum
An international consortium of hundreds of companies and
users chartered to accelerate the use of ATM products and services by
developing specifications and promoting the technology. The ATM Forum was
responsible for development of a wide range of ATM standards. It worked in
cooperation with standards bodies such as ANSI (American National Standards
Institute) and ITU (International Telecommunication Union), submitting to
them proposed standards. In 2004 the ATM Forum was merged with the MPLS and
FR Alliance, which in turn developed into the IP/MPLS Forum.
Attendant Console
A large, specialized telephone set used by the operator to
answer incoming calls and send those calls to the proper extension.
Attenuation
The progressive weakening of a signal as it travels away
from its point of origin.
AU - Administrative Unit
An Administrative Unit is created during the process of
forming the payload of an STM-1. The AU contains a pointer which identifies
where in the payload the VC-4 (Virtual Container-4) data begins, thus
differentiating between padding and data. The task of the AU is to provide
adaptation between the Higher Order Channel Layer and the Multiplex Section
Layer.
AuC - Authentication
Centre
The AuC is associated with the HLR (Home Location
Register) in a GSM or UMTS network. It provides authentication parameters for
the authentication process such as authentication triplets in GSM or
authentication vectors within UMTS.
Audiotex
Audiotex is a generic term for interactive voice response
equipment and services.
AUG - Administrative Unit
Group
In terms of SDH , AUG creation is the final stage in the
formation of an STM-1. A unitary multiplexing procedure of an AU-4 creates an
AUG (Administrative User Group). Alternatively, three AU-3 can be multiplexed
together to create one AUG.
AUI - Attachment Unit
Interface
Defined in IEEE 802.1 as the interface between an Ethernet
Medium Attachment Unit and DTE (Data Terminal Equipment).
AUID - Application Unique
ID
AUIDs are used to identify specific applications provided
by XCAP (XML Configuration Access Protocol). Examples of AUIDs include
resource-lists, pres-rules, rls-services and pidf-manipulation.
AUSF - Authentication
Server Function
The Authentication Server Function is part of the 3GPP 5G
Architecture. It is used to facilitate 5G security processes.
AUTHBS - Base Station
Authentication Response
The Base Station Authentication Response is an 18bit
pattern generated by the authentication algorithm. AUTHBS is used to confirm
the validity of BS (Base Station) orders to update the SSD (Shared Secret
Data).
Authentication
A means to establish or prove identity; verifying
eligibility of users, machines, or objects.
AUTHR - Authentication
Response
The Authentication Response is an 18bit output of the
authentication algorithm. It is used by the core network to validate a MS
(Mobile Station) onto the network. Once authenticated the mobile may access
the services offered by the network.
AUTN - Authentication
Token
The Authentication Token is sent in the Authentication
Request message to the mobile along with a random number and KSI (Key Set
Identifier). The variables within the AUTN are used by the mobile in the
authentication process that it conducts with the network.
Auto Correlation Function
A function showing the relationship of a signal with a
time shifted version of itself.
Automated Key Distribution
The distribution of cryptographic keys, usually in
encrypted form, using electronic means, such as a computer network (e.g.,
down line key loading, the automated key distribution protocols of ANSI
X9.17).
AUZ - Active User Zone
Within an Active User Zone, the MS (Mobile Station) makes
its presence known via an explicit registration in order to activate tiered
service features.
AV - Authentication Vector
Either a quintet or a triplet of parameters. The GSM
authentication vector uses a triplet of parameters which provides temporary
authentication data that enables a VLR (Visitor Location Register) or SGSN
(Serving GPRS Support Node) to engage in GSM authentication with a particular
user. A triplet consists of three elements: a network challenge termedRAND
(Random Number), an expected user response termed SRES (Signed Response) and
Kc (Cipher key). The UMTS authentication vector uses a quintet of parameters
which provides temporary authentication data that enables an VLR or SGSN to
engage in UMTS authentication with a particular user. A quintet consists of
five elements: a network challenge (RAND), an expected user response termed
XRES (Expected Response), CK (Cipher Key), IK (Integrity Key) and AUTN
(Authentication Token).
AVC - Advanced Video Codec
Adopted by the MPEG-4 standards, AVC is used in a wide
variety of scenarios to reduce required bandwidth yet maintain video quality.
For example, where an MPEG2 encoded video stream would require approximately
18Mbps for high definition TV, MPEG-4, using the AVC, requires around half
that bandwidth or roughly 8Mbps.
Average Transmit Power
The average transmitter output power obtained over any
specified time interval, including periods with no transmission.
AVP - Attribute Value Pair
The term given to an information element of a Diameter
message. Each Diameter message will typically contain several different AVPs,
such as Destination-Host AVP, Server-Name AVP, Subscription ID AVP, Framed IP
Address AVP, etc.
AVRCP - Audio/Video Remote
Control Profile
The Audio/Video Remote Control Profile specifies the
features and procedures that ensure interoperability between Bluetooth
devices with audio/video control functions.
AWGN - Additive White
Gaussian Noise
The common wideband channel thermal noise impairment, on
which SNR (Signal to Noise Ratio) is typically based.
B
Link - Bridge link
Bridge link is a SL
(Signalling Link) that connects an STP (Signalling Transfer Point) to another
STP. Typically a quad of B links interconnect peer (or primary) STPs (e.g.
the STPs from one network to the STPs of another network). The distinction
between a B link and a D link is rather arbitrary. For this reason such links
may be referred to as B/D links.
B-ISDN - Broadband
Integrated Services Digital Network
A network that employs switching techniques independent of
transmission speeds, and that allows a network to expand its capacity without
major equipment overhauls. B-lSDN supports gigabit speed circuits in the
public network and high speed switching of all traffic types in public and
private networks. B-lSDN also provide bandwidth on demand capabilities.
b-number
A b number refers to the called party number.
B-RAS - Broadband Remote
Access Server
The B-RAS is a functional entity of DSL networks which is
effectively the first point at which a subscriber’s IP traffic is processed
for onward routing. Typically housed in the Local Exchange or Central Office,
the B-RAS can also be responsible for IP address allocation and termination
of PPP links. In modern DSL networks, it is not uncommon to see the
functionality of a B-RAS contained within an IP – DSLAM.
B2BUA - Back to Back User
Agent
A B2BUA is logically positioned between the IMS (IP
Multimedia Subsystem) and external networks. It handles all SIP (Session
Initiation Protocol) signalling, including session attempts, subscriptions,
instant messaging, etc, as well as including signalling where the flows may
be forward without B2BUA intervention. The originating Serving CSCF (Call
Session Control Function) should route signalling through the B2BUA when the
destination network is outside the home IMS. Unfortunately, the originating
S-CSCF does not currently have functionality to decide when the call is
destined for a 3GPP IMS network or a non 3GPP IMS network. As a consequence,
the only solution is for the originating S-CSCF to statically insert the
B2BUA for all the signalling that is leaving the home IMS.
BA - Behaviour Aggregate
In a DiffServ enabled network, a collection of packets
with the same DiffServ codepoint crossing a link in a particular direction is
termed a Behaviour Aggregate. Packets with the same DSCP get the same per-hop
forwarding treatment (PHB) everywhere inside a single DiffServ domain.
BA List - BCCH Allocation
List
This is a list of frequencies supported on the
neighbouring cells. This parameter is broadcast on the BCCH (Broadcast
Control Channel), giving mobiles the frequencies of the BCCH carriers on
neighbouring cells. It is typically used by the MS (Mobile Station) in the
cell selection and re-selection processes.
Back End
This term applies to functions and procedures of a
database server, such as a node or software application designed to
manipulate data on a network.
Backdoor
This is a hidden application or software tool set up for
authorized users to easily access resources. If discovered, backdoors can
also allow malicious hackers to gain access to a machine or software.
Backdoor Accounts
These are secret accounts installed on a machine to allow
users, usually developers or administrators, to gain access to resources
while bypassing usual authentication procedures. Backdoor accounts , if
discovered, can be used by a malicious hacker to gain access to the machine
or software.
Backup
Backup is the logical or physical provisioning of
facilities to speed the process of restart and recovery following network
failures. It also applies to redundant facilities, including duplicated
transaction files, duplicated processors, storage devices, terminals,
telecommunications hardware or switches.
BAIC - Barring of All
Incoming Calls supplementary service
A cellular supplementary service, that when invoked sets
flags in the network databases to stop a subscriber receiving incoming calls.
Band
Band relates to the range of frequencies between two
defined limits.
Bandwidth
Bandwidth may be defined as the difference between the
highest and lowest frequencies available for network signals. It is also used
to describe the amount of data that can be transmitted in a fixed amount of
time.
BAOC - Barring of All
Outgoing Calls supplementary service
A cellular supplementary service, that when invoked sets
flags in the network databases to stop a subscriber making outgoing calls.
BAR - Buffering Action
Rule
The BAR is a rule which can be presented to a user plane
element by a control plane element within either a CUPS (Control and User
Plane Separation of EPC Nodes) or 5G Core network scenario. In particular,
the BAR will determine how long data should be buffered for and also whether
a packet count is applicable.
Baseband
Baseband is a form of modulation in which the information
is applied directly onto the physical transmission medium.
Basel 2
Basel 2 is a set of regulations for risk management that
came into force in 2006. Basel 2 has implications on IT Security due to the
stringent requirements imposed on systems handling sensitive data,
particularly those in the finance industry.
Baseline capabilities
These are minimal capabilities required for a serviceless
UMTS UE (User Equipment) to operate within a network.
Basic Access Mode
Basic Access Mode This is a mode used on the Enhanced
Access Channel where a MS (Mobile Station) transmits an Enhanced Access
Channel preamble and Enhanced Access data in a method similar to that used on
the AC (Access Channel).
Bastion Server
A server that is accessible from a public network (such as
the Internet) without protection from a firewall.
BBF - Bearer Binding
Function
The BBF is a functional element of the 3GPP PCC framework,
situated within the PCEF or BBERF. The role of the BBF is to associate a PCC
rule with an IP-CAN bearer as part of an IP-CAN session.
BC - Bandwidth Constraint
BC relates to MPLS Diffserv aware Traffic Engineering and
signifies the proportion of a link’s total bandwidth that a single or
multiple CT (Class Type) can utilize.
BC - Bearer Capabilities
Used within an ISDN based network to allow a user to
inform the ISDN about the protocol they are using in the B Channel. A user
requesting ISDN services must specify the BC, which can then be conveyed to
the destination. In addition, ISDN network elements may also utilize the
information contained within the BC field.
BCC - Base Station Colour
Code
In the GSM system, this code is transmitted in the SB
(Synchronization Burst) and is used in the MS (Mobile Station) to
discriminate between cells using the same frequencies during the cell
selection and camping on process. The BCC is also used to identify the TSC
(Training Sequence Code) to be used when reading the BCCH (Broadcast Control
Channel).
BCCH - Broadcast Control
Channel (3GPP)
This downlink channel contains specific parameters needed
by a mobile in order that it can identify the network and gain access to it.
Typical information includes the LAC (Location Area Code) and RAC (Routing
Area Code), the MNC (Mobile Network Code) and BA (BCCH Allocation) list.
BCCH - Broadcast Control
Channel (3GPP2)
The Broadcast Control Channel is a code channel in a
Forward CDMA (Code Division Multiple Access) Channel used for transmission of
control information or broadcast messages from a base station to a MS (Mobile
Station).
BCCH Chip Bit - Broadcast
Control Channel Chip Bit
This is the number of PN (Pseudorandom Noise) chips per
BCCH (Broadcast Control Channel) bit. The chip bits vary depending on the
rate.
BCD - Binary Coded Decimal
A Binary Coded Decimal uses four bits to represent each
decimal digit.
BCF - Base Station Control
Function
The Base Station Control Function provides common control
functions within a BTS (Base Transceiver Station), for example frequency
hopping in the GSM system.
BCH - Broadcast Channel
The Broadcast Channel is a downlink UMTS transport channel
that is used to broadcast cell and system information. The BCCH (Broadcast
Control Channel) maps into the BCH transport channel, which in turn maps into
the P-CCPCH (Primary Common Control Physical Channel) at the physical layer.
BCH - Broadcast Channels
In the GSM system these channels are only broadcast by the
BTS (Base Transceiver Station). They provide sufficient information for the
MS (Mobile Station) to locate, synchronize and access the network. The BCCH
(Broadcast Control Channel), FCCH (Frequency Correction Channel) and the SCH
(Synchronisation Channel) are all classed as BCH.
BCIE - Bearer Capability
Information Element
The Bearer Capability Information Element is an ISDN
information element used to describe the bearer services such as data rate
and speech quality required by an individual user.
BCM - Bandwidth Constraint
Model
A BCM is used in relation to MPLS Diffserv aware TE and
identifies the maximum number of BC (Bandwidth Constraint) across a
particular link and also which CT (Class Type) map to which BC and how.
BCN - Broadcast Control
Channel Number
The Broadcast Control Channel Number identifies the
Broadcast Control Channel. BCN number 1 corresponds to the Primary Broadcast
Control Channel. BCN numbers 2 through 8 correspond to other Broadcast
Control Channels.
BCSM - Basic Call State
Model
The Basic Call State Model describes the basic processing
steps that must be performed by a switch in order to establish and tear down
a call.
BD_ADDR - Bluetooth Device
Address
All Bluetooth transceivers are allocated a unique 48bit
device address. It is divided into a 24bit LAP (Lower Address Part), a 16bit
NAP (Non-significant Address Part) and an 8bit UAP (Upper Address Part).
BDR - Backup Designated
Router
The BDR is used to provide redundancy in broadcast
networks which are utilizing the OSPF (Open Shortest Path First) routing
protocol. Should the Designated Router fail, the BDR, which like the DR is
also adjacent to all routers, will take over.
BE - Best Effort
Best Effort is a PHB description used within the DiffServ
QoS framework. In essence, if a packet receives BE forwarding treatment, the
network is not guaranteeing any level of QoS.
Beacon Carrier
The Beacon Carrier is a term that is used to identify the
main carrier on a cell which usually carries the SI (System Information)
messages.
Bearer
The bearer is an information transmission path of defined
capacity, delay and bit error rate, etc.
Bearer Capability
The Bearer Capability is a transmission function which the
mobile requests to the network.
Bearer service
The Bearer Service is a type of telecommunication service
that provides the capability for the transmission of signals between access
points.
BER - Bit Error Rate
This a variable indicating the ratio between the total
number of bits received to those that were errored during transmission. This
ratio is typically employed when expressing the QoS (Quality of Service) of a
particular bearer.
Best Effort QoS
The lowest of all QoS (Quality of Service) traffic
classes. If the guaranteed QoS cannot be delivered, the bearer network
delivers the QoS which can also be called best effort QoS.
Best Effort Service
A service model which provides minimal performance
guarantees, allowing an unspecified variance in the measured performance
criteria.
BF - Bad Frames
A Bad Frame is a frame classified with insufficient frame
quality.
BFI - Bad Frame Indication
This is a message used to indicate that a frame has been
corrupted, or received in error.
BG - Border Gateway (GPRS)
A Border Gateway function terminates the Gp interface to a
PLMN (Public Land Mobile Network). This function is typically an edge router
supporting the BGP (Border Gateway Protocol) and security protocols such as
IPSec (IP Security).
BGCF - Breakout Gateway
Control Function
The BGCF is used to route call signalling to and from the
most appropriate soft switch/S-CSCF. The S-CSCF controls PSTN services
through the use of soft switches and a BGCF. The soft switch comprises of a
MGCF (Media Gateway Control Function) and a MGW (Media Gateway) and the BGCF
has functionality in order to route traffic and signalling to the correct
soft switch.
BGP4 - Border Gateway
Protocol version 4
BGP-4 is an example of a Path Vector routing protocol and
is described as the needle and thread which binds the Internet together.
BGP-4 allows Policy and Reachability information to be passed between Border
Routers of adjacent AS (Autonomous Systems) and also between Border Routers
of the same AS, thus supporting global routing of IP datagrams. BGP-4 Update
messages are passed between routers. These messages contain lists of
destination prefixes (routes) in the NLRI (network Layer Reachability
Information) field, as well as Path Attributes associated with those routes.
BGPC - BGP Communities
BGP communities are sets of routes with some common
attribute.
BH - Busy Hour
The Busy Hour is the peak 60-minute period during a
business day when the largest volume of traffic is handled by a network.
BIC-Roam - Barring of
Incoming Calls when Roaming outside the home PLMN country supplementary
service
A cellular supplementary service, that when invoked sets
flags in the network databases to stop a subscriber receiving incoming calls
when he or she is roaming outside of their HPLMN (Home Public Land Mobile
Network).
BICC - Bearer Independent
Call Control
BICC is protocol used in IP based transport networks in
order to set up voice calls, typically between MGCFs (Media Gateway Control
Functions). BICC is based on ISUP and as such uses a very similar message
set. The difference between the two is that ISUP is based on a narrowband
signalling bearer, whereas BICC is designed to run over a broadband network
(typically IP but other protocols are possible). Therefore, when BICC is
establishing a call, it is not establishing a TDM through connection (which
is what ISUP usually does). Instead, BICC sets up a media bearer, which may
be based on IP or ATM (Asynchronous Transfer Mode).
Billing
A function whereby CDR (Call Detail Records) generated by
the charging function are transformed into bills requiring payment.
Biometric Security
Biometric security is the recognition and authentication
of individuals based on unique combinations of measurable physical or
behavioural characteristics. Examples include fingerprints, iris scanning,
face and voice recognition, or hand geometry. All of these biometric
techniques are differentiated by speed, durability, reliability, and cost
effectiveness. Fingerprints are generally considered the most practical
biometric identifier in use today and can be found on a number of PDA
(Personal Digital Assistants).
Bitcoin
This is a well-known cryptocurrency which is based on the
proof-of-work blockchain.
Bitmap
A bitmap defines a map of ѱӳ and
Ѱӳ. When used for resource allocation the ѱҠindicates
an allocated resource and a ѰҠindicates that no resources were
allocated. Bitmaps are also used in retransmission systems to indicate which
packets or frames should be sent again.
BITS - Building Integrated
Timing Supply
A timing mechanism for providing a stable, precise clock
reference for telecommunications network nodes.
BL - Bandwidth reduced Low
complexity
Introduced in Release 13 of the 3GPP specifications, BL
identifies a mobile that supports LTE-M NB (Narrowband) operation, i.e.
operates in 1.4MHz Narrowbands.
Blank and Burst
Blank and Burst is the pre-emption of an entire traffic
channel frame’s primary traffic by signaling traffic or secondary traffic.
Blank and burst is performed on a frame by frame basis.
BLE - Bluetooth Low Energy
Bluetooth Low Energy, marketed as Bluetooth Smart, is a
WPAN (Wireless Personal Area Network) technology developed by the Bluetooth
SIG (Special Interest Group) aimed at IoT (Internet of Things) devices
requiring significantly lower power consumption than traditional Bluetooth.
BLER - Block Error Rate
This typically defines the TB (Transport Block) error rate
of the transport channel.
BLES - Broadband Loop
Emulation Signalling
One approach establishes the VoDSL service is using BLES
(Broadband Loop Emulation Signalling). This extends Class-5 servicing office
capabilities (custom calling and Centrex services, as well as trunking for
CPE (Customer Premises Equipment), along with high-speed data services to
customers over DSL (Digital Subscriber Line).
Blind Transfer
Blind Transfer involves passing a call without notifying
the recipient. It is also known as unsupervised transfer or cold transfer.
Block Cipher
A block cipher is a symmetric key that encrypts blocks of
data. Examples may be 64bit, 128bit or 256bit encryption. While these ciphers
are fast, as they require little processing, identical blocks of data will
always produce the same cipher text under the same block cipher key. This
characteristic is a weakness of block ciphers.
Block Reward
This is the reward given to a Miner which has successfully
hashed a transaction block. Block Rewards can be a mixture of coins and
transaction fees depending upon the policy used by the cryptocurrency in
question.
Blockchain
This is a type of distributed ledger which is comprised of
unchangeable, digitally recorded data in packages referred to as blocks. Each
block is then chained to the next block using a cryptographic signature. This
permits the blockchains to be used like a ledger and as such shared and
accessed by anyone with the appropriate permissions.
Blockchain Mining
This is the distributed computational review process
performed on each block of data in a blockchain. This enables a consensus to
be arrived at within an environment where no party trusts or knows each
other.
Blocked Call
A block call results when a call cannot be connected. The
two most common reasons for blocked calls are when all lines or trunks to the
central office or exchange are in use, or all paths through a PABX (Private
Automatic Branch Exchange) or switch are in use. Another example is that of
specific services such as premium rate where users request that their local
carrier blocks such calls in order to avoid incurring charges.
Blocking
Blocking is the inability to establish a new call because
of restrictions or inaccessibility of facilities in the system being called.
Blowfish
Blowfish is a well-used block cipher designed by Bruce
Schneier. It encrypts 64bit blocks of plain text using a cipher key that may
vary between 32bit and 448bit.
Bluetooth
This is a technical specification to standardize wireless
transmission between a variety of devices such as PDA (Personal Digital
Assistant), mobile phones, laptop computers, printers etc. The system
operates at 2.45GHz and uses FHSS (Frequency Hopping Spread Spectrum). It
operates over distances of approximately 10m and offers a gross data rate of
1Mbps.
Bluetooth Clock
Bluetooth units have an internal system clock which
enables them to determine the timing and hopping of their transceiver. This
clock is constantly running and is never adjusted. It operates at clock rate
of 3.2KHz.
Bluetooth Device Class
The Bluetooth Device Class is a parameter received during
the discovery procedure. It identifies the device type and indicates which
services are supported.
Bluetooth Host
A Bluetooth Host can be a computing device, cellular
telephone, peripheral device, an access point to an external network, etc.
The Bluetooth Host is attached to a Bluetooth unit , which enables
communication to other Bluetooth Hosts (which are attached to their Bluetooth
units). The wireless communication channel between the Bluetooth units
provides an almost wire-like functionality.
Bluetooth Profile
A Bluetooth Profile describes the operation of a device or
application. The Bluetooth specifications identify profiles, each defining
how to achieve a specific function. Typical profiles include: Dial-up
Networking Profile, Headset Profile, File Transfer Profile etc.
Bluetooth Smart
Bluetooth Smart is the marketing name for BLE (Bluetooth
Low Energy) which is a WPAN (Wireless Personal Area Network) technology
developed by the Bluetooth SIG (Special Interest Group) aimed at IoT
(Internet of Things) devices requiring significantly lower power consumption
than traditional Bluetooth.
Bluetooth Unit
The Bluetooth Unit provides a short-range wireless
communication link which allows voice and data communications between
Bluetooth Hosts.
Bm - Bearer Mobile
(Traffic Channel Full Rate)
In accordance with ISDN notation that is given to traffic
channels (namely the B channel); in a GSM mobile network the ISDN channels
supporting TCH/F (Traffic Channel Full Rate) are termed the Bm channels.
BM-SC - Broadcast
Multicast Service Centre
The BM-SC forms an integral part of the 3GPP MBMS
architecture. Positioned between the GGSN and the PDN (where the content is
stored), the BM-SC is responsible for areas such as group membership, content
collection, QoS management, announcement of multicast/broadcast sessions and
security.
BMC - Broadcast and
Multicast Control
BMC – Broadcast and Multicast Control In the UMTS system,
this protocol adapts broadcast and multicast services on the radio interface.
BMSC - Broadcast Multicast
Service Center
The BMSC is located in the core network, functioning as
the interface between the distribution network (3G or 4G data network) and
the content provider, in support of MBMS (Multimedia Broadcast Multicast
Services) or eMBMS (Evolved Multimedia Broadcast Multicast Services). The
BMSC’s role includes scheduling and transmission of broadcast/multicast
content, billing, service announcements, security and content
synchronization.
BOIC - Barring of Outgoing
International Calls supplementary service
A cellular supplementary service, that when invoked sets
flags in the network databases to stop a subscriber making international
calls.
BOIC-exHC - Barring of
Outgoing International Calls except those directed to the Home PLMN Country
A cellular supplementary service, that when invoked sets
flags in the network databases to stop a subscriber making international
calls apart from those to their HPLMN (Home Public Land Mobile Network).
BOOTP - Bootstrap Protocol
Bootstrap Protocol is a TCP/IP protocol that enables a
network device to discover certain startup information, such as its IP
address.
Bot
A Bot is an alternative name for a Zombie device. Bots are
essentially computers or servers that have been infected with malware that
has opened a back door into the system. This back door is used by a Botnet
Controller to send instructions to the Bots, issuing commands which may range
from initiation of a DDoS attack to facilitation of a spamming run. Numerous
Bots form a Botnet.
Botnet
This is the term given to a collection of Bot or Zombie
devices that are under the control of a Botnet Controller. Botnets are
predominantly used to support spamming, although there are numerous examples
of Botnets being used to launch DDoS attacks. The major problem with Botnets
is the sheer scale of them; it is not uncommon to hear of Botnets that are
comprised of hundreds of thousands of Bots. Many Botnets have a link to
organized crime syndicates.
Botnet Controller
Also termed a Bot Herder, the Botnet Controller is the
entity responsible for generating the commands used to control the actions of
a Botnet. The Botnet Controller could be a single device, although Botnets
can also be controlled by a number of proxy devices in order to keep the real
identity of the controller secret.
BPDU - Bridge Protocol
Data Unit
The Bridge Protocol Data Unit is a spanning tree protocol
hello packet sent out at intervals to exchange information among bridges in
the network.
BPP - Basic Printing
Profile
The Basic Printing Profile is designed to operate over
Bluetooth devices, for example between a PDA (Personal Digital Assistant) and
a Bluetooth enabled printer.
BPSK - Binary
Phase Shift Keying
Binary Phase-shift keying (BPSK) is a digital modulation
scheme that conveys data by changing, or modulating, two different phase s of
a reference signal (the carrier wave ). The constellation points chosen are
usually positioned with uniform angular spacing around a circle. This gives
maximum phase-separation between adjacent points and thus the best immunity
to corruption. They are positioned on a circle so that they can all be
transmitted with the same energy. In this way, the moduli of the complex numbers
they represent will be the same and thus so will the amplitudes needed for
the cosine and sine waves.
Break
To break is to interrupt the sending of a message and take
control of the circuit at the receiving end. It is a term also used to
describe the interruption of a transmission or process.
BRF - Bridge
Relay Function
Defined by the IEEE (Institute of Electrical and
Electronics Engineers) an internal bridge function on a Token Ring switch
that is responsible for forwarding frames between port groupings with the
same logical ring number. Within a BRF, source route bridging or source route
transparent bridging can be used to forward frames.
BRI - Basic Rate
Interface
The Basic Rate Interface is an ISDN interface composed of
two B channels (at 64Kbps) and one d channel (at 16Kbps) for circuit switched
communication of voice video and data
Bridge
A bridge is a device that passes information between two
network segments. It operates at Layer 2 of the OSI (Open Systems
Interconnection) reference model. This layer is termed the Data Link Layer.
Broadband
The term Broadband in radio systems identifies a type of
communication channel capable of carrying a large portion of the
electromagnetic spectrum. It may also be applied to fixed communication
systems when referring to bearers capable of carrying high volumes of
traffic.
Broadcast
In fixed systems a broadcast is a data packet that is sent
to all nodes on a network. Broadcasts are usually identified by a broadcast
address. Cellular systems may indicate a broadcast by placing the data packet
on a particular channel rather than using a broadcast address.
Broadcast Address
A Broadcast Address is a special address reserved for use
when sending a message to all stations on a network or specific area.
Broadcast Storm
A Broadcast Storm is an undesirable network event in which
many broadcasts are sent at once. Broadcast storms use substantial network
bandwidth and may cause network time outs.
Broadcast User Zone
Broadcast User Zone The Broadcast User Zone is a zone that
is identified to the MS (Mobile Station) by means of broadcast messages. It
corresponds to the RF (Radio Frequency) coverage area of a particular set of
cells and sectors.
Browser
A Browser is a GUI (Graphical User Interface) based
hypertext client application, such as Internet Explorer, Mozilla and Opera,
used to interpret HTML (Hypertext Markup Language) codes in order to format
pages passed using the HTTP (Hypertext Transfer Protocol) protocol.
BS - Base
Station (Generic)
A Base Station is a term used usually to identify where
the radio equipment is placed that generates the cell or cells.
BSA - Basic
Service Area
A BSA is an IEEE 802.11 conceptual area within which
members of a BSS (Basic Service Set) may communicate.
BSC - Base
Station Controller
The BSC forms part of the BSS (Base Station Subsystem) and
controls a number of BTS (Base Transceiver Stations). In this role, the BSC
is responsible for activities such as radio control, timing advance and
handovers.
BSC - Base
Station Controller (3GPP2)
The BS (Base Station) consists of a BSC and one or more
BTS (Base Transceiver Station). The BSC is responsible for the exchange of
messages towards the MSC (Mobile Switching Center) and the BTS. Traffic and
signaling transferred between the MSC and MS (Mobile Station) will usually
pass transparently through a BSC.
BSIC - Base
Station Identity Code
This is a code in GSM which is broadcast on the SCH
(Synchronization Channel) in order to identify the NCC (Network Colour Code)
and the BCC (Base Station Colour Code).
BSICNCELL - BSIC
of an adjacent cell
BSIC NCELL – BSIC of an adjacent cell This code is used to
identify and decode the BCCH (Broadcast Control Channel) of neighbouring
cells so that the MS (Mobile Station) may take measuring reports to
facilitate handover, or to allow the MS to make cell selection and
reselection calculations.
BSR - Buffer
Status Report
Part of the 4G and 5G system, the Buffer Status Report
procedure provides the serving cell with information about the amount of data
in the uplink buffers available for transmission.
BSS - Base
Station System
In GSM the Base Station System is a term given to a BSC
(Base Station Controller) and the BTS (Base Transceiver Station) associated
with it. The number of BTS associated with a BSC is dependent on the
manufacturer. Although not mandatory, through interpretation of the Abis
interface standard BTS and BSC employed within a BSS will always be supplied
by the same manufacturer.
BSS - Basic
Service Set
The Basic Service Set is a term used to describe the
collection of Stations which may communicate together within an 802.11
network. The BSS may or may not include AP (Access Point) which provide a
connection onto a fixed distribution system such as an Ethernet network. Two
types of BSS exist; IBSS (Independent Basic Service Set) and Infrastructure
Basic Service Set.
BSS - Business
Support Systems
BSS is the general term given to the tools and techniques
a service provider uses to manage its business operations associated with
customers. BSS encompasses areas such as customer relations, billing, product
management and order fulfilment.
BSSAP - Base
Station Subsystem Application Part
BSSAP is used to transfer Mobility Management and Session
Management information between the BSS (Base Station Subsystem) and the MSC
(Mobile Switching Centre) or MSS (Mobile Soft Switch). As such, BSSAP is
split into two sub application parts – BSSMAP (Base Station Subsystem
Management Application Part) and DTAP (Direct Transfer Application Part).
BSSAP+ - Base
Station Subsystem Application Part +
BSSAP+ is used to support signalling between the VLR
(Visitor Location Register) and SGSN (Serving GPRS Support Node) on the Gs
interface. Typical procedures used by the VLR include sending the BSSAP+
paging request message to a mobile via the GPRS service (this procedure
applies to mobiles that are attached for GPRS services and non GPRS services
and can be performed simultaneously with any other procedure at the Gs
interface). Other procedures include the location update procedure.
BSSAPLE - Base
Station System Application Part LCS Extension
BSSAP-LE is an extension to BSSAP (Base Station System
Application Part) that contains messages and parameters specific in the
support of LCS (Location Services). Two subsets of BSSAP-LE exist: BSSMAP-LE
(Base Station System Mobile Application Part – LCS Extension) and DTAP-LE
(Direct Transfer Application Part – LCS Extension).
BSSGP - Base
Station Subsystem GPRS Protocol
The Base Station System GPRS Protocol is supported across
the Gb interface, its primary functions include the provision by an SGSN
(Serving GPRS Support Node) to a BSS (Base Station Subsystem) of radio
related information used by the RLC (Radio Link Control) and MAC (Medium
Access Control) function. In addition, the provision by a BSS to an SGSN of
radio related information derived from the RLC/MAC function. Finally, the
provision of functionality to enable two physically distinct nodes, an SGSN
and a BSS, to operate node management control functions.
BSSGP - BSS GPRS
Protocol
BSSGP conveys routing and QoS information across the Gb
interface. This is achieved by encapsulating user data from LLC and also
network and mobility management information. BSSGP also supports the transfer
of PFC (Packet Flow Context) information. However, BSSGP does not perform
error correction, leaving LLC to recover any errors which may exist.
BSSID - Basic
Service Set Identifier
The BSSID is a 48bit identity used to identify a
particular BSS (Basic Service Set) within an area. In Infrastructure BSS
networks, the BSSID is the MAC (Medium Access Control) address of the AP
(Access Point) and in Independent BSS or ad hoc networks, the BSSID is
generated randomly.
BSSMAP - Base
Station Subsystem Management Application Part
BSSMAP is used to convey general BSS (Base Station System)
control information between the MSC (Mobile Switching Centre) and the BSS. An
example of use is the allocation of traffic channels between the MSC and the
BSS. Many BSSMAP procedures are triggered by or trigger RR (Radio Resource)
management messages from the air interface.
BSSOMAP - Base
Station System Operation and Maintenance Application Part
BSSOMAP – Base Station Subsystem Operation and Maintenance
Application Part This protocol is used to convey general BSS OM (Operations
and Maintenance) information between the MSC (Mobile Switching Centre) and
the BSS (Base Station System).
BTS - Base
Transceiver Station
A BTS will be controlled by a BSC (Base Station
Controller) as part of the BSS (Base Station Subsystem). A BTS will support
one or more cells, with key responsibilities including error
protection/correction, encryption (GSM only), multiplexing and modulation.
Burst
In any TDMA (Time Division Multiple Access) based system,
there is a need to transmit information in timeslots. This involves sending
small blocks of information known as bursts.
Busy
This is a call condition in which transmission facilities
are already in use. In a fixed network a line is considered busy when the
caller goes off hook.
Busy Tone
This is a single tone that is repeated at a 60ipm (impulse
per minute) rate to indicate that a call’s terminating location is already in
use.
BVC - BSSGP
Virtual Connection
The BSSGP Virtual Connection identifies an end to end
virtual communication path between remote NS (Network Service) user entities.
BVCI - BSSGP
Virtual Connections Identifier
The BSSGP Virtual Connection Identifier is used to route
the BSSGP PDU between the SGSN (Serving GPRS Support Node) and the PCU
(Packet Control Unit).
BWP - Bandwidth
part
This is a subset of the total cell bandwidth. It is
configured as part of BA (Bandwidth Adaption).
C
This is a procedural
programming API (Application Programming Interface) for UNIX , Windows and
other operating systems.
C Link - Cross
link
Cross link connects STP (Signalling Transfer Point)
performing identical functions into a mated pair. A C link is used only when
an STP has no other route available to a destination signalling point due to
link failure(s).
C-RAN - Cloud
RAN
A general term for the introduction of virtualized
network nodes within the radio access network. Cloud RAN can be applicable to
2G, 3G and 4G RAN technologies.
C-RAN - Cloud
RAN
C-RAN is the term given to a RAN infrastructure which has
been virtualized. C-RAN deployment typically see the processing capabilities
of the cell site reduced, with the majority of the cell site protocol stack
aggregated into a more centralized NFV (Network Functions Virtualization)
solution. Consequently, all that remains at the cell site is physical layer
(radio) capabilities, with functions such as baseband processing, scheduling
and handovers all processed within a VNF (Virtualized Network Function)
elsewhere in the network. In order to ensure scheduling and handovers are
successful, latency between the cell site and the VNF must be minimised.
C-RNTI - Cell
Radio Network Temporary Identifier
The Cell Radio Network Temporary Identifier may be
allocated and used on common transport channels for optimization purposes.
The decision to use the C-RNTI is made by the CRNC (Controlling Radio Network
Controller).
C-TEID - Common
Tunnel Endpoint Identifier
Within the context of eMBMS (Evolved Multimedia Broadcast
Multicast Services), the C-TEID is related to the downlink TEID (Tunnel
Endpoint Identifier) to which the MBMS traffic will be sent from the eMBMS
Gateway to the eNB.
C/R - Command/Response
field bit
Command/Response field bit is a control message used
within HDLC (Higher Level Data Link Control) to tie command and response
messages together.
C++
C++ was initially developed by Bjarne Stroustrup, a
researcher at Bell Labs. Stroustrup developed an extension to the C language
that facilitated the creation of objects and classes.
C1
C1 is a cell selection algorithm employed in GSM and
GPRS. The algorithm uses the power received from cells plus additional
parameters in order to assess the cell that will provide the best radio
connection for the MS (Mobile Station).
C2
C2 is the GSM cell reselection algorithm. Once the MS
(Mobile Station) has camped onto a cell it will continue to assess the
surrounding cells to ensure it is monitoring the cell that will offer the
best radio connection. As the user moves the camped on cell may become
unsuitable. This situation will generate a cell reselection.
C31
C31 is a criteria based algorithm used as part of the
GPRS cell reselection process. It is used to assess if prospective cells
qualify as reselection candidates prior to applying the C32 GPRS cell
reselection algorithm.
C32
C32 is the GPRS cell reselection algorithm. Once the MS
(Mobile Station) has camped onto a cell it will continue to assess the
surrounding cells to ensure it is monitoring the cell that will offer the
best radio connection. As the user moves the camped on cell may become
unsuitable. This situation will generate a cell reselection.
C7 - Also known
as SS7 (Signalling System No. 7)
This protocol suite is used to initiate call related and
non call related circuits on ISDN (Integrated Services Digital Network) based
networks.
CA - Cell
Allocation
This is the defined ARFCN (Absolute Radio Frequency
Channel Number) list within a cell.
CA - Certification
Authority
The CA (Certification Authority) is a trusted body that
confirms the validity and identity of entities involved in public key
exchange. As the user’s digital certificate is the only means by which
entities may trust each other, the CA must be officially recognized. This is
typically done by a government body authorizing a CA prior to its
instigation. A well known CA, used by many commercial organizations, is
Verisign.
CAB - Converged
Address Book
The CAB is an evolution of the address book, it provides
enriched information to existing contacts. The CAB enables end users to
exchange Social Presence Information with authorized contacts. This includes
availability status, portrait icons, text, favourite links and timestamp.
CAC - Connection
Admission Control
An ATM (Asynchronous Transfer Mode) function used at the
UNI (User to Network Interface) to ensure data presented to the network
conforms to the traffic contract agreed between the customer and the ATM
network provider.
CACH - Common
Assignment Channel
This is a forward common channel used by the network to
acknowledge a MS (Mobile Station) accessing the Enhanced Access Channel.
CACH Chip Bit. - Common
Assigned Channel Chip Bit
This is the number of PN (Pseudorandom Noise) chips per
Common Assignment Channel bit. The PN chips for the various spreading rates
are detailed: Spreading Rate CACH Chip Bits Rate 1 128 bits at 9600bps Rate 3
384 bits at 9600bps
CAI - Charge
Advice Information
A charging tariff sent from the MSC (Mobile Switching
Centre) and held on the mobile; this is used to calculate billing information
on the mobile and present it to the user as charging advice. This information
should not be assumed to be the actual cost incurred for the call.
Call forward busy
Configurable feature that reroutes incoming calls to an
alternate line when the first line is in use.
Call forward no answer
Configurable feature that reroutes incoming calls from
one phone to another phone when the first phone is not answered after a
certain number of rings.
Call forwarding
Configurable feature that sends incoming calls routed to
a particular directory number to another number.
Call pickup
Configurable feature that allows a user to redirect an
incoming call that was intended for another destination in order to retrieve
the call on the user’s own phone or directory number.
Caller ID
A display, available to the called party before the party
answers a telephone call. It identifies the originating telephone number.
CAMEL - Customized
Application for Mobile network Enhanced Logic
CAMEL (Customized Application for Mobile network Enhanced
Logic) application servers were introduced to mobile networks in order to
supporting IN (Intelligent Networks) services such as prepaid billing. CAMEL
application servers based on CAP (CAMEL Application Part) require an IMS SSF
(Service Switching Function) in order to operate on a SIP (Session Initiation
Protocol) based network (the SSF acts as a SIP to CAP gateway).
Camp On
After conducting the cell selection process a MS (Mobile
Station) or UE (User Equipment) will camp onto the cell that offers the best
perceived radio connection with the network.
Candidate Set
The Candidate Set is a set of pilots that have been
received with sufficient strength by the MS (Mobile Station) to be
successfully demodulated, but have not been placed in the Active Set by the
BS (Base Station).
CAP - CAMEL
Application Part
CAMEL Application Part is a real time protocol used to
support the information flows between CAMEL (Customized Application for
Mobile network Enhanced Logic) functional elements such as the SCF (Service
Control Function) and SSF (Service Switching Function).
CAP - Controlled
Access Phase
This is a term used in IEEE (Institute of Electrical and
Electronics Engineers) 802.11 networks which are supporting the QoS (Quality
of Service) enhancements originally defined in the 802.11e standard. The
Controlled Access Phase defines a period of time in which the network is
supporting the controlled channel access technique HCCA (Hybrid Controlled
Channel Access).
CAPEX - Capital
Expenditure
CAPEX identifies the monetary cost of a green field
deployment or upgrade of physical infrastructure such as equipment or real
estate.
CAPIF - Common
API Framework for 3GPP northbound APIs
In order to attempt to standardize some of the common
capabilities that are exposed by the Northbound APIs, the 3GPP have
introduced CAPIF (Common API Framework for 3GPP northbound APIs). Within the
standardization of CAPIF, the 3GPP have addressed a variety of different
processes, including onboarding/offboarding of Application Functions, service
discovery and management, event subscription and notification, security and
charging.
CAPWAP - Control
and Provisioning of Wireless Access Points
A control protocol which allows for the control and
provisioning of large scale WLANs.
CAS - Channel
Associated Signalling
Channel Associated Signalling is inband signalling in
which user call data and signalling are combined.
CAST-128
CAST-128 is a very robust block cipher and is used to
cipher 64bit blocks of plain text using a 128bit block cipher key.
CAT - Customized
Alerting Tone
Also termed Color Tunes or Caller Tunes, this service
plays a piece of music or audio clip to the Calling Party when a particular
subscriber is dialled, as opposed to hearing the standard ringing tone.
CAZAC - Constant
Amplitude Zero Auto-Correlation
3G and 4G mobile systems use code sequences with unique
properties, e.g. for orthogonality. In LTE, Zadoff Chu codes are used for
accessing the network and these have CAZAC (Constant Amplitude Zero
AutoCorrelation) properties.
CB - Cell
Broadcast
A Cell Broadcast is part of the SMS (Short Message
Service) group function known as point to multipoint. These broadcasts are
sent on the downlink CBCH (Cell Broadcast Channel). The type of information
sent on this channel may include traffic reports and local weather
information etc.
CB - Communication
Barring
Communication Barring is a 3GPP Supplementary Service
which allows users to dynamically block incoming communications from callers
whom they consider as unwanted or unsolicited.
CBC - Cell
Broadcast Centre
The CBC is an entity within a mobile network which is
responsible for sending Cell Broadcast messages, termed SMS-CB. The CBC will
supply the message to the appropriate BSCs, which in turn will pass them to
the appropriate base stations. The CBC will determining the which specific
area will receive the message, how long the message will be broadcast for and
how frequently the message will be repeated.
CBC - Cipher
Block Chaining
This is a term used to describe a common form of block
ciphers which uses the previous encrypted block as a basis for encrypting the
next block of plaintext. For the first block to be encrypted an
Initialization Vector is required.
CBCH - Cell
Broadcast Channel
The Cell Broadcast Channel is an additional feature of
the GSM system. The channel supports part of the SMS (Short Message Service)
group known as point to multipoint and is intended to be used for information
such as traffic and weather reports. This is a downlink only channel and is
mapped into the second subslot of the SDCCH (Standalone Dedicated Control
Channel).
CBMI - Cell
Broadcast Message Identifier
Cell Broadcast Message Identifier is found in the cell
broadcast message header and is used to define the content of the cell
broadcast message.
CBQ - Class-Based
Queuing
A queuing algorithm used in routers to manage packets
with different traffic characteristics. Incoming packets are classified on
such variables as the DSCP (Differentiated Services Code Point) in the IP
header. Each class of traffic is assigned to a specific FIFO (First In First
Out) queue, each of which is guaranteed some portion of the total bandwidth
of the router.
CBR - Constant
Bit Rate
Constant Bit Rate is a service offered by a network
technology such as ATM (Asynchronous Transfer Mode). This is used for real
time services such as speech.
CBS - Committed
Burst Size
CBS is a component of the bandwidth profile traffic
parameters applicable to a service running over Ethernet networks. It is the
number of allocated bytes available for bursts of service frames that are
transmitted temporarily at rates above the CIR, while still meeting the SLA
provided at the CIR.
CBWFQ - Class-Based
Weighted Fair Queuing
Class-Based Weighted Fair Queuing allows traffic to be
classified based on criteria, such as access control lists, input interface
names, protocols, and QoS (Quality of Service) labels.
CC - Content of
Communication
In relation to Lawful Intercept, content of communication
describes the voice, text or data that a subscriber sends and receives as
part of a communication service.
CC - Convolutional
Code
CC (Convolutional Code) is a FEC (Forward Error
Correction) technique used in technologies such as WiMAX.
CC - Country
Code
A one, two, or three digit number used to specify the
destination country for international calls. These are also used in mobile
networks where they are ātermed MCC (Mobile Country Code). Typical
examples are 234 for UK and 208 for France.
CCA - Clear
Channel Assessment
Clear Channel Assessment is a logical function found
within physical layers which determines the current state of use of a
wireless medium. Such a function is found in IEEE 802.11 networks and aids in
contention avoidance.
CCA - Credit
Control Answer
The Consultative Committee for International Telegraphy
and Telephony was a telecommunications organization that recommended
worldwide standards for common carrier communications services. This
organization was superseded by the ITU-T (International Telecommunications
Union – Telecommunication Standardization Sector).This is a Diameter message
which is typically used to carry a rule between the PCRF and the PCEF as part
of the PCC framework.
CCBS - Completion
of Calls to Busy Subscriber
When a called party is busy, this supplementary service
enables the calling party to be connected to a called party after they have
completed their call.
CCCH - Common
Control Channel
Common Control Channels support common procedures
required to establish a dedicated link with the network. Typical channels
include the RACH (Random Access Channel), PCH (Paging Channel) and AGCH
(Access Grant Channel) within GSM. In GPRS the common control channels
include the PRACH (Packet Random Access Channel), PPCH (Packet Paging
Channel) and PAGCH (Packet Access Grant Channel).
CCE - Control
Channel Element
The E-UTRA CCE is a group of resources which can be used
to send a PDCCH (Physical Downlink Control Channel). One, two, four or eight
CCEs can be grouped to support larger messages. Each CCE consists of 9 REGs
(Resource Element Group).
CCF - Call
Control Function
This is a telephone industry term used to describe the
setting up, monitoring, control and tearing down of calls.
CCF - Charging
Collection Function
For offline charging IMS (IP Multimedia Subsystem)
network elements report accounting information to the CCF. The CCF uses this
information to construct and format CDR (Call Detail Recording).
CCH - Control
Channel
A channel on which signalling is supported in order to
establish a traffic circuit, or to pass information to the network.
CCITT - Consultative
Committee for International Telegraphy and Telephony
The Consultative Committee for International Telegraphy
and Telephony was a telecommunications organization that recommended
worldwide standards for common carrier communications services. This
organization was superseded by the ITU-T (International Telecommunications
Union – Telecommunication Standardization Sector).
CCM - Current Call Meter
The accumulated charge as computed by the MS (Mobile
Station). CCM is expressed in terms of home units. This function is used to
provide AoC (Advice of Charge) to the user on the handset.
CCO - Cell
Change Order
A Cell Change Order procedure enables 2G/3G/4G systems to
trigger a mobile to move to a target cell without the benefit of a handover
procedure, i.e., the resources will not be waiting in the target cell. CCO
procedures are also available for Inter-RAT mobility.
CCP - Centralized
Call Processing
Centralized Call Processing refers to a situation where
all call processing is performed at a central site, or hub. No call
processing is performed at branch sites.
CCR - Credit
Control Request
This is a Diameter message which is typically used by the
PCEF to request a rule from the PCRF as part of the PCC framework.
CCS - Common
Channel Signalling
Common Channel Signalling is a signalling system used in
telephone networks that separates signalling information from user data.
Usually TS16 (Timeslot 16) on a E1 interface and TS1 (Timeslot 1) on a T1
interface, are exclusively designated to carry signalling relating to other
traffic channels.
CCTrCH - Coded
Composite Transport Channel
A data stream resulting from encoding and multiplexing of
one or several transport channels.
CD - Call
Deflection
A supplementary service in which the called user can
choose to deflect the call onto a third party without answering the calling
user.
CD/CAICH - CPCH
Collision Detection/Channel Assignment Indicator Channel
The Collision Detection Channel Assignment Indicator
Channel is a UMTS fixed rate physical channel used to carry CDI (CD
Indicator) or CDI/ CAI (CD Indicator/CA Indicator) at the same time.
CDF - Charging
Data Function
The CDF is an entity within the IMS (IP Multimedia
Subsystem) billing architecture which is responsible for collating accounting
requests from IMS CTF (Charging Trigger Functions) such as CSCF (Call Session
Control Functions) and AS (Application Servers). The CDF will use the
accounting requests to generate CDR (Charging Data Records), which will then
be directed to the CGF (Charging Gateway Function) and then on to the billing
domain.
CDI - Collision
Detection Indicator
Collision Detection Indicator the Collision Detection
Indicator is used to indicate if a collision has occurred during the channel
assignment procedure
CDIV - Communication
Diversion
This is a supplementary service which, if activated, will
direct incoming calls for a subscriber to a different telephone number.
CDMA - Code
Division Multiple Access
Code Division Multiple Access is a method for describing
physical radio channels. Data intended for a specific channel is modulated
with that channel’s code. These are typically pseudorandom in nature, and
possess favourable correlation properties to ensure physical channels are not
confused with one another. CDMA techniques are employed within cdmaOne,
CDMA2000 and UMTS
CDMA Candidate Frequency
The CDMA Candidate Frequency is the frequency specified
by the network to be searched for CDMA (Code Division Multiple Access)
pilots.
CDMA Channel
The CDMA Channel is the set of channels transmitted
between the BS (Base Station) and MS (Mobile Station) within a given CDMA
Frequency Assignment.
CDMA Frequency Assignment
A CDMA Frequency Assignment is either a 1.23MHz or
3.69MHz segment of spectrum. The center of a CDMA Frequency Assignment is
given by a CDMA Channel Number.
CDMA Preferred
Set - CDMA Preferred Set.
The CDMA Preferred Set is the set of CDMA channel numbers
in a CDMA system corresponding to frequencies that a MS (Mobile Station) will
search to acquire a CDMA Pilot Channel. For CDMA cellular systems, the
primary and secondary channels comprise the CDMA Preferred Set.
CDMA2000
CDMA2000 The CDMA2000 family of standards describe the
use of CDMA (Code Division Multiple Access) technology to meet the
requirements for 3G (Third Generation) wireless communication systems. The
standards have been developed through comprehensive proposals from Qualcomm.
cdmaOne
cdmaOne is the commercial name for a CDMA (Code Division
Multiple Access) system defined by the consortium including Qualcomm, ATT
Wireless and Motorola.
CDR - Call
Detail Record
A database record unit used to create billing records. A
CDR contains details such as the called and calling parties, originating
switch, terminating switch, call length, and time of day. When applied to
GPRS, CDR are generated typically by the SGSN (Serving GPRS Support Node) and
GGSN (Gateway GPRS Support Node), recording data volumes and QoS (Quality of
Service) rather than call time. These records are passed to the CGF (Charging
Gateway Function) for consolidation prior to being passed to the billing
platform. With the introduction of the IMS, the acronym CDR is used to
represent a Charging Data Record.
CDR - Charging
Data Record
A CDR is a collection of information about a chargeable
event such as the time of call set-up, the duration of the call, the amount
of data transferred, etc that will be used for billing of a subscriber. It is
possible that more than one CDR can be generated for a single chargeable
event eg. a call that has taken place over a very long duration may have
several CDRs associated with it.
CDV - Cell
Delay Variation
The Cell Delay Variation is a term used in ATM
(Asynchronous Transfer Mode) to describe the time difference that is
acceptable between cells being presented at the receiving host.
CE - Certificate
Enrollment
Digital Certificates are normally allocated by a trusted
body known as a CA (Certification Authority). When a party or entity is
allocated a certificate, it is described as certificate enrolment. This
process involves the party requesting a certificate, providing the CA with a
copy of its public key and additional identity information. This information
in turn is signed by the CA. This involves the CA encrypting this information
with its private key. The certificate is returned to the requesting party, which
has now been enrolled.
CE - Coverage
Enhancement
Introduced in Release 13 of the 3GPP specifications, CE
identifies a mobile that supports additional features to enhance operation in
poor coverage areas.
CEID - Customer
Edge Identifier
In MPLS VPN, use of LDP requires manual configuration at
both ends of the network, which is a significant disadvantage if VPN are to
be implemented on a large scale. In contrast, if BGP is used for signalling
and control, the BGP Auto discovery procedure will enable the pseudo wire to
be established automatically. BGP Updates will be passed from an ingress LER
to all egress LER. These updates will contain unique identifiers for CE
devices attached to the ingress LER, known as CEID.
Cell
A cell when applied to mobile technologies defines a unit
of geographical area.
Cell –
ATM - Cell (ATM)
A cell is the basic data unit of the ATM (Asynchronous
Transfer Mode) protocol. Cells contain identifiers known as VCI (Virtual
Channel Identifier) and VPI (Virtual Path Identifier) to associate the cells
with a logical data stream. Each cell consists of a 5-byte header and 48
bytes of payload. The cells are small in order to facilitate low processing
delay and so high-speed transmission.
Cell Relay
This technology is employed typically at Layer 2. Small,
fixed size cells are employed to minimize processing and switching time. They
are typically switched through hardware processes in order to achieve high
throughput speed. Typical cell-based technologies are ATM and Frame Relay.
Cell Reselection
When camped on a cell, the mobile shall regularly search
for a better cell according to the cell reselection criteria. If a better
cell is found, that cell is selected.
Cell Selection
The process whereby the mobile searches for a suitable
cell, this is referred to as C1 or C31 in the GSM system and S in the UMTS
system. The selected cell is then identified as the camped-on cell.
CELP - Code
Excited Linear Predictive Coding
Code Excited Linear Predictive Coding is a speech coding
algorithm. CELP coders use codebook excitation, a long-term pitch prediction
filter, and a short term format prediction filter.
Center SR3 Frequency
The Center SR3 Frequency is the Spreading Rate 3
frequency that has the center frequency assignment
CEPT - Conference
des administrations Europê des Poste set Telecommunications
Conference des administrations Europê des Poste set
Telecommunications is the organization, that has been superseded by ETSI
(European Telecommunications Standards Institute).
CET - Carrier
Ethernet Transport
CET is the general term which encompasses the options
available for implementation of a network that supports Carrier Ethernet
services. Examples of suitable transport technologies include those based on
Ethernet, MPLS and optical transmission.
CF
CF may be implemented as either a SS or CAMEL service in
which the call for an intended recipient is forwarded onto a designated
number. This may be within, or outside the subscribers HPLMN.
CF - Candidate
Frequency
The candidate frequency is either an analog or CDMA (Code
Division Multiple Access) based frequency, for which the BS (Base Station)
specifies a search set, using a Candidate Frequency Search Request Message.
CFB - Ciphertext
Feedback
This is similar to CBC (Cipher Block Chaining) but does
not depend on the requirement for a full block before encryption can take
place since it uses a register shift to generate the full block of data
needed for the encryption operation.
CFI - Control
Format Indicator
The CFI is a parameter used on the LTE air interface. It
defines the number of symbols in each subframe allocated to PDCCH. The CFI
takes values CFI = 1, 2 or 3 OFDM symbols.
CFNRc - Call
Forwarding on mobile subscriber Not Reachable
A cellular supplementary service in which the incoming
call is forwarded to a third party when the intended party is not reachable.
CFNRy - Call Forwarding
on No Reply
A cellular supplementary service in which the incoming
call is forwarded to a third party when there is no reply from the intended
party.
CFP - Contention
Free Period
The term CFP is used in wireless networks supporting the
IEEE 802.11 standard. It defines a period of time during which access to the
Wireless Medium is free of contention. As such, this is controlled by both
the PCF and HCF.
CFRI - Contention
Free Repetition Interval
This term is used in WiFi networks and specifies the time
interval between Contention Free periods. These typically take place
immediately after the Beacon message.
CGF - Charging
Gateway Function
The CGF forms part of a mobile service providers billing
domain, designed to translate CDRs generated by the network into a format
suitable for the billing system.
CGI - Cell Global
Identity
The Cell Global Identity is the concatenation of the LAI
(Location Area Identity) and the CI (Cell Identity) and uniquely identifies a
given cell.
Channel Coding
Channel coding may be a combination of error detection,
error correction, rate matching, interleaving and transport channel mapping
onto/splitting from physical channels.
CHAP - Challenge/Handshake
Authentication Protocol
Challenge/Handshake Authentication Protocol is a system
for determining if a user has the correct password without openly revealing
that password. CHAP does not itself prevent unauthorized access; it merely
identifies the remote end. The NAS (Network Access Server) application then
determines whether that user is allowed access to the protected resources.
Chargeable Event
An activity utilizing telecommunications network
infrastructure and related services for user-to-user communication (e.g., a
single call, a data communication session or a short message), or for user to
network communication (e.g. service profile administration), or for
inter-network communication (e.g. transferring calls, signalling, or short
messages), or for mobility (e.g. roaming or inter-system handover), which the
network operator wants to charge for. The cost of a chargeable event may
cover the cost of sending, transporting, delivery and storage. The cost of
call related signalling may also be included.
Checksum
A checksum is a method for checking the integrity of
transmitted data. A checksum is an integer value computed from a sequence of
octets taken through a series of arithmetic operations. The value is
recomputed at the receiving end and compared for verification.
CHF - Charging
Function
The 5G Charging Function forms part of the 3GPP’s
Converged Charging System, which encompasses support for both prepaid and
postpaid billing within the same charging system.
Chirping
This is a spread spectrum method, in which the
transmitter sweeps across a given frequency band.
CHP - Charging
Point
The time at which charging commences. This is usually the
point when the called party answers the call.
CI - Cell
Identity
The cell identity is a 16bit identifier in GSM and UMTS.
When combined with the LAI (Location Area Identity) or RAI (Routing Area
Identity) the result is termed the CGI (Cell Global Identity).
CIC - Circuit
Identity Code
The Circuit Identity Code is used to identify the trunk
circuit to be connected. This variable is also used to associate the ISUP
(ISDN User Part) messaging with a particular circuit. The CIC is an 8bit
field within the SIF (Service Information Field) of the ISUP message. The
coding of the CIC differs slightly between European and North American
standards.
CID - Charging
Identity
In 3GPP networks, the CID is used for billing
correlation. For every EPS bearer established as part of a specific PDN
connection, the P-GW will create a CID and distribute it to the S-GW or SGSN
as appropriate.
CIDR - Classless
Inter Domain Routing
CIDR was a technique introduced in the 1990s which was
designed to reduce the consumption rate of IPv4 addressing, whilst helping to
keep routing table sizes minimal. The system replaced the classful addressing
system which was originally used to allocate IPv4 addresses. Instead, CIDR
permits a variable length network ID, ensuring that end networks receive a
network prefix appropriate to their size.
CINR - Carrier
to Interference plus Noise Ratio
CINR is a measurement of signal effectiveness which is
expressed in Decibels. In order for a receiver to correctly process a
received signal, the CINR of that signal must be at the correct CINR level.
CIoT - Cellular
Internet of Things
This is a generic term to describe a number of cellular
based technologies supporting IoT (Internet of Things) operation. Examples
include EC-GSM-IoT (Extended Coverage – GSM – Internet of Things), LTE-M
(Long Term Evolution – Machines) and NB-IoT (Narrow Band – Internet of
Things).
Ciphertext
Ciphertext is the term given to user data (known as
Plaintext), that has been protected by an encryption system.
CIR - Committed
Information Rate
CIR is a component of the bandwidth profile traffic
parameters applicable to a service running over Ethernet networks. It is the
maximum sustained information rate the network is committed to transfer. This
is achieved while meeting the performance level guaranteed in the SLA. Three
performance metrics (FD, FDV and FLR) are applicable only to those frames
that are transmitted at or below the CIR.
Circuit Switching
Circuit switching is a process in which a dedicated
physical circuit path must exist between sender and receiver for the duration
of the call. The switch is employed to connect the various physical paths
that make up the end to end connection. Switching takes place within Layer 2
of the OSI (Open System Interconnection) 7 layer model.
CK - Cipher Key
This is a 128bit number derived in the authentication
process and used for the encryption of the RB (Radio Bearer) in UMTS.
CKSN - Cipher
Key Sequence Number
The Cipher Key Sequence Number is used in key management
in a GSM system. Since the Kc (cipher key) is dynamically generated through
the authentication process some mechanism to ensure key consistency is
required. The CKSN is employed to achieve this. If encryption is used there
is no requirement to authenticate the user for every call. It is possible to
refer to previously used cipher keys already generated in the network. The
CKSN is used to refer to these keys.
Class A Terminal
In a GSM and UMTS system a class A mobile may be attached
to both PS (Packet Switched) and CS (Circuit Switched) services. The mobile
supports simultaneous attach, simultaneous activation, simultaneous monitor,
simultaneous invocation and simultaneous traffic. The mobile user can make
and/or receive calls on the two services simultaneously subject to the QoS
requirements.
Class B Terminal
In a GSM and UMTS system a class B mobile may be attached
to both PS (Packet Switched) and CS (Circuit Switched) services, but the
mobile can only operate one set of services at a time. When the mobile is in
both idle mode (UMTS and GSM) and packet idle mode ( GPRS ) it should be able
to monitor paging channels for both circuit switched and packet switched
services depending on the mode of network operation.
Class C Terminal
In a GSM and UMTS system a class C mobile is attached to
either PS (Packet Switched) or CS (Circuit Switched) services, allowing
alternate use only. If both services (PS and CS) are supported then a Class C
mobile can make and/or receive calls only from the manually or default
selected service, i.e., either Packet Switched or Circuit Switched service.
Classmark
Classmark Mobiles when communicating to the network will
initially indicate their classmark, this includes service, equipment and
radio capabilities.
CLI - Calling
Line Identity
An ISDN function used to provide information to the user
regarding the calling party address. This is sometimes referred to as CLID.
CLID - Calling
Line Identification
CLID is a service used in telecommunications networks
which informs a called party who the calling party is during the ringing
process, before the called party answers the telephone.
Client
A client is a node or software program that requests
services from another node or software program. The node or software
providing the service is termed the server. These processes are termed
client/server functions.
CLIP - Connected Line
Identification Presentation
A supplementary service enabling the called party to
receive the line identity of the calling party.
CLIR - Connected
Line Identification Restriction
A supplementary service enabling the calling party to
restrict the identity of the line on which they are calling.
CLK - Clock
In a Bluetooth piconet the master device CLK (Clock)
typically defines the timing.
CLKE - Clock
Estimate
Clock Estimate is a Bluetooth slave device estimate of
the master device clock. It is used to synchronize the slave device to the
master device.
Closest Match Routing
This process is used by routing functions in order to
identify the address portion that should be used to route the incoming IP
datagram. The routing table record that most closely matches the destination
address is used to forward the packet.
CLP - Cell Loss
Priority
An ATM (Asynchronous Transfer Mode) message used to
indicate if a cell may be discarded from the network due to congestion. This
bit will be set on the UNI (User to Network Interface) if data being
introduced to the network does not conform to the traffic contract.
CM - Connection
Management
A function for the control, provision and maintenance of
services offered by the network; for example, SMS (Short Message Service),
teleservices and location-based services.
CMAC - Cipher
Message Authentication Code
CMAC is a keyed hash function which is based on a
symmetric key block cipher rather than a cryptographic hash, as in the case
of HMAC (Hashed Message Authentication Code).
CMAS - Commercial Mobile
Alert Service
CMAS is a PWS (Public Warning System) developed for the
delivery of multiple, concurrent warning notifications.
CMD - Command
A message sent to invoke an action by a receiving entity.
CMIP - Client
Mobile IP
CMIP is the opposite to PMIP (Proxy MIP). With CMIP, the
mobile device supports a MIP stack and interacts with Mobility Agents in the
home and foreign network.
CMM - Channel
Mode Modify
A message sent to modify the characteristics of the
current channel.
CMP - Certificate
Management Protocol
The processes involved in PKE (Public Key Encryption) are
defined in the CMP (Certificate Management Protocol). The original process
was specified by the PKIX (Public-Key Infrastructure (X.509)) Working Group
under RFC 2510. A new, more robust, management protocol is under
consideration by the IETF (Internet Engineering Test Force) and is known as
CMPv2.
CMR - Codec
Mode Request
The CMR is part of the RTP (Real time Transport Protocol)
Payload Header which is used in the transportation of AMR (Adaptive Multi
Rate) speech samples. CMR (Codec Mode Request). The CMR field is used to
indicate to the receiver of the RTP stream how the transmitter wishes future
speech frames to be encoded. This may typically be sent from a wireless
gateway, interfacing with a mobile network.
CN - Core
Network
This is an evolved GSM Core Network infrastructure or any
new UMTS Core Network infrastructure, integrating circuit and packet switched
traffic. This may include such functions as the MSC (Mobile Switching
Centre), VLR (visitor Location Register), HLR (Home Location Register), SGSN
(Serving GPRS Support Node) and GGSN (Gateway GPRS Support Node).
CNC - Central
Network Controller
The CNC is a functional element of a TSN (Time Sensitive
Networking) deployment which provides configuration data to TSN bridges in
response to TSN Flow requests received from the CUC (Centralized User
Configuration).
CNG tone
A tone generated either in the handset or the network to
indicate that the call is in progress. This tone is used as a comfort tone
for users.
CoA - Care of
Address
In Mobile IP, the CoA is the temporary IP address that is
allocated by the foreign network, allowing the Home Agent to forward packets
to the device even though it is on a different network.
CoD - Confirmation
of Delivery
A notification sent by the receiving LAC (Link Access
Control) Sublayer to the Layer 3 sending entity. This acknowledgement process
forms part of the procedure for sending PDU (Protocol Data Unit) in AM
(Assured Mode).
Code Channel
The Code Channel is a subchannel of a Forward CDMA
Channel or Reverse CDMA Channel. Each sub-channel uses an orthogonal Walsh
function.
Code Symbol
A Code Symbol is the output of an error-correcting
encoder. Information bits are input to the encoder and code symbols are
output from the encoder.
Codebook
For each subframe of speech, one particular vector is
chosen from the codec codebook and used to excite the speech codec’s filters.
The codebook vector is chosen that minimizes the difference between the
original speech sample and synthesized output.
Codec - Coder
A device used to transform analogue signal samples into
digital bit words and back again.
COM - Complete
A message sent by the receiving entity to indicate the
signalling process has been successfully completed.
Combinational Code
A combinational code is the combination of two
pseudorandom codes.
Common Power Control Sub
channel
A sub channel used by the BS (Base Station) to control
the power of a MS (Mobile Station) when operating in the Power Controlled
Access Mode on the Enhanced Access Channel or when operating in the
Reservation Access Mode or the Designated Access Mode on the Reverse Common
Control Channel.
Community Strings
Passwords used by SNMP (Simple Network Management
Protocol) to remotely manage network devices.
Companding
Companding, means compression and expansion of a signal
or sample. It forms part of the PCM (Pulse Code Modulation) process, whereby
analogue signal values are logically rounded on a nonlinear scale. The
decimal step number is then coded to its binary equivalent prior to
transmission. The process is reversed at the receiving terminal using the
same nonlinear scale.
Compression
Reducing the representation of the information, but not
the information itself. Compression is accomplished by running a data set
through an algorithm that reduces the space required to store, or the
bandwidth required to transmit the data set.
CONF - Conference
A supplementary service associated with conference
calling services.
Conference Factory
An IMS (IP Multimedia Subsystem) user agent that wants to
create a conference forwards a SIP (Session Initiation Protocol) INVITE
request towards the S-CSCF (Serving – Call Session Control Function) which
acts as the conference-factory URI (Uniform Resource Indicator). This means
it coordinates the establishment of a conference and will supply the actual
conference URI to the user once it has been generated. In doing so, the
services of the MRFC may be employed.
Confidentiality
Confidentiality, when applied to data security may either
be associated with the data (plain text) being transferred, or to both the
plain text and the identity of the sending and receiving parties; namely the
source and destination IP addresses, which is known as traffic flow
confidentiality. When IPSec (IP Security) is employed to provide
confidentiality, ESP (Encapsulation Security Payload) is used to protect user
data. To provide traffic flow confidentiality, ESP is also used. In this case
however, IPSec tunnel mode is implemented.
Configuration Change
Indicator
A one bit datum, sent on the Quick Paging Channel.
Appearance of the Configuration Change Indicator in the Quick Paging Channel
serves to alert a slotted mode MS (Mobile Station), operating in the idle
state, that, after performing an idle handoff, it should monitor the Paging
Channel, the FCCCH (Forward – Common Control Channel), or the Primary
Broadcast Control Channel in order to determine if it should update its
stored parameters.
CONNACK - Connect
Acknowledgement
A message sent by the receiving entity to acknowledge the
connect indication.
Connectable Device
A Bluetooth device that is in range and will respond to a
paging message and setup a connection is known as a connectable Device
Connected mode
Connected mode In this mode there is one UMTS RNC (Radio
Network Controller) that is acting as SRNC (Serving RNC), and an RRC (Radio
Resource Control) connection is established between the UE (User Equipment)
and this SRNC.
Conversational Service
An interactive service which provides for bi-directional
communication by means of real-time (no store -and-forward) end-to-end
information transfer from user to user.
Convolutional Code
A Convolutional Code is a type of forward error
correcting code. Typically these can be either half rate or third rate codes.
Half rate codes in effect double the data to be sent, the extra overhead
being used in the forward error correction process. Third rate codes triple
the data required to be sent but provide more robust error correction.
COPS - Common
Open Policy Services
COPS is a mechanism which allows endpoints to negotiate
with networks for resources based on pre-agreed policy. COPS uses two basic
elements to control which resources the subscriber receives, namely the PDF
(Policy Decision Function) and the PEF (Policy Enforcement Function). The PDF
holds subscriber information and will notify the PEF as to whether or not a
subscriber should be allowed the requested resources.
CORBA - Common
Object Request Broker Architecture
Common Object Request Broker Architecture is a standard
defined by the Common Object Group. It is a framework that provides
interoperability between objects built in different programming languages,
running on different physical machines perhaps on different networks. CORBA
specifies an Interface Definition Language, and API (Application Programming
Interface) that allows client / server interaction with the ORB (Object
Request Broker).
CoS - Class of
Service
Class of Service is used to identify a particular group
of traffic characteristics that may be applied to a traffic flow. All packets
fitting those characteristics are handled based on that class of service. A
typical policy employing class of service is the IETF (Internet Engineering
Task Force) DiffServ (Differentiated Services) Architecture.
COTS - Commercial
Off The Shelf
COTS is a term given to the processing/network hardware
that is delivered to the customer with no preinstalled software. For example,
COTS servers can be used in an NFV (Network Functions Virtualization)
deployment in order to provide the processing power of the NFVI (NFV
Infrastructure).
COUNT - Call
History Parameter
A modulo 64 event counter maintained by the MS (Mobile
Station) and AC (Authentication Center) that is used to combat fraud such as
cloning.
Coverage area
Coverage area defines the geographical area where devices
can exchange messages with acceptable quality and performance.
CP - Connection
Protocol
An SMS protocol layer which provides reliable delivery of
the SMS between the mobile and the network (MSC).
CP - Contention
Period
The term CP is used in wireless networks supporting the
IEEE 802.11 standard. It defines a period of time during which access to the
Wireless Medium is contention based. As such, this is controlled by both the
DCF and HCF.
CP - Cyclic
Prefix
In OFDM systems, a CP (Cyclic Prefix) can be used to
counter the effects of multipath propagation. This can be represented as a
guard period which is located just in front of the user data portion and as
such, is able to mitigate Delay Spread. The CP is in fact the final part of
the OFDM Symbol copied and placed in front of the same OFDM symbol.
CP-OFDM - Cyclic
Prefix – Orthogonal Frequency Division Multiplexing
CP-OFDM is used as the access technology for 5G New
Radio. Its operation is very similar to that of OFDM used in LTE, however
CP-OFDM features variable subcarrier spacing termed “numerology”. Where LTE
uses a fixed 15kHz subcarrier separation, CP-OFDM can utilize 15kHz, 30kHz,
60kHz, 120kHz, etc. When the subcarrier spacing is changed, the cyclic prefix
duration per symbol also changes.
CPCH - Common
Power Control Channel
A forward common channel which transmits power control
messages to mobiles. The Common Power Control Channel is used by a MS (Mobile
Station) operating in the Power Controlled Access Mode, Reservation Access
Mode, or Designated Access Mode.
CPCS - Common
Part Convergence Sublayer
A generic sublayer used to format higher layer PDU
(Protocol Data Unit) for use by a specific traffic technology. A typical user
of a CPCS is ATM (Asynchronous Transfer Mode).
CPE - Customer
Premises Equipment
CPE is the generic title given to network equipment that
is located at the customer premises. A typical example of this would be a DSL
modem, although alternatives include VPN termination equipment, ingress
routers, switches and PABX systems.
CPG - Call
Progress
An ISUP (ISDN User Part) signalling message sent in
either direction during the active or set-up phase of the call indicating
that an event of significance has occurred eg. ringing call forwarded.
CPH - Call
Party Handling
CAMEL Phase 4 offers the ability to perform CPH which is
the ability to manage the various parties participating in a call. Aspects of
the CAMEL call modelling/processing are enhanced to allow the various parties
to be added deleted joined and/or separated from the other parties involved
in the call.
CPICH - Common
Pilot Channel
This channel is used in UMTS to enable channel
estimation. The CPICH uses a pre defined bit sequence. It has a fixed rate of
30Kbps with a SF (Spreading Factor) of 256. This allows the UE (User
Equipment) to equalize the channel in order to achieve a phase reference with
the SCH (Synchronisation Channel) and also allows estimations in terms of
power control. The same channel code is always employed on the Primary CPICH.
CPIM - Common
Profile for Instant Messaging
CPIM was introduced as an interworking technique to allow
instant messaging services utilizing different protocols to interwork with
one another. As such, CPIM defines the semantics and data formats for common
services of instant messaging to facilitate the creation of gateways between
instant messaging services.
CPM - Converged
IP Messaging
An IMS based messaging service standardized by the OMA
which offers a variety of messaging services, such as 1 to 1, group chat,
multimedia and file transfer.
CPRI - Common
Public Radio Interface
CPRI is an open standard related to the internal
interface of base stations between the radio control component and the actual
radio equipment itself. It was jointly created through a cooperative
comprising of leading equipment vendors, including Ericsson, Huawei, NEC and
Nortel. CPRI facilitates connectivity in CRAN deployments by providing
interconnectivity between the centralised unit and the decentralised units.
Further information is obtainable via www.cpri.info.
CPU - Call
Processing Unit
The CPU is an integral part of a PSTN switch. The role of
the CPU is to receive and process elements of SS7 (Signalling System number
7) signalling such as the called number in order to establish appropriate
resources and facilitate circuit cross connection.
CQI - Channel
Quality Indicator
In the LTE system, the CQI is used by the mobile to
indicate the channel quality to the eNB. The CQI reported value is between 0
and 15. This indicates the level of modulation and coding the UE could
operate.
CR - Certification
Request
Companies, through their RA (Registration Authority), or
individuals, must request a digital certificate from a CA (Certification
Authority). The request contains a public key and additional identity
information. The CA will first investigate the validity of the request, and
if successful will sign the public key, along with other variables presented
by the party making the request. Once the certificate is signed, it may be
used in the PKI (Public Key Infrastructure).
CRC - Cyclic
Redundancy Code
A linear error code that is generated using a polynomial
function on the data to be sent, the remainder from the process being the
CRC. This is sent along with data so that a parity check of the received data
can be conducted.
CRI - CSI-RS
Resource Indicator
This is used by LTE-Advanced and 5G devices to indicate
the preferred beam, i.e. as part of FD-MIMO and Massive MIMO.
CriC - Critical
Communications
Critical Communications is a key part of 3GPP 5G SMARTER
(Services and Markets Technology Enablers). The study started in 2015 and
looked at potential 5G requirements, which resulted in more than 70 different
use cases, grouped into CriC (Critical Communications), MIoT (Massive
Internet of Things), eMBB (Enhanced Mobile Broadband) and Network Operation.
CRL - Certificate
Revocation List
Digital Certificates are only valid for a specified
period; if, after this period, they are not renewed by the owner they are
revoked. Revocation may also be applied to certificates that may have been
compromised. All revoked certificates are listed and may be viewed through
the CA (Certification Authorities) web site. These lists are issued on a
regular basis by the CA, and prior to a dialogue being established between
end parties this list should be checked to ensure the integrity of the
parties involved in the communication.
CRNC - Controlling
RNC
The Controlling Radio Network Controller is the RNC
(Radio Network Controller) responsible for the configuration of a Node B. A
UE (User Equipment) accessing the system will send an access to a Node B,
which in turn will forward this message onto its CRNC.
CS - Circuit
Switched
Identifies the circuit switched domain and the use of
circuit switched data.
CS-RNTI - Configured
Scheduling – RNTI
This identifier is used in 5G as part of CS (Configured
Scheduling) resource allocation. It enables RRC to defines the periodicity of
the CS grant using the CS-RNTI. This resource can then be implicitly reused
according to the periodicity defined by RRC.
CSA - Call
Segment Association
The process of controlling Call Party Handling involves
managing call segments which contain one or more call legs. The call parties
in the same call segment can communicate with each other with this typically
being achieved using a conference bridge. The gsmSCF uses a single CAP
dialogue to control a CSA which contains one or more call segments.
CSC - Communication
Service Customer
A CSC is terminology related to network slicing,
describing the customer who utilizes the network slice which is providing the
communication service.
CSCF - Call
Session Control Function
A SIP proxy device found within the 3GPP IMS which can
undertake a variety of different roles, such as Proxy CSCF, Interrogating
CSCF, Serving CSCF and Emergency CSCF.
CSE - CAMEL
Service Environment
The CSE describes the CAMEL environment in terms of the
service creation environment and the nodes within the network that interact
to deliver services to the subscriber.
CSFB - Circuit
Switched Fallback
A mechanism introduced to allow subscribers on a 4G
network to make and receive voice calls. In essence, when a Mobile Originated
/ Terminated call needs to take place, the subscriber will leave the 4G
network and fall back to the 2G/3G network in order to make or receive the
call.
CSG - Closed
Subscriber Group
Introduced in the 3GPP Release 8 specifications, a Closed
Subscriber Group is used to describe a specific group of mobiles who are
permitted access to a Femto Cell. As a CSG-ID is broadcast from the Femto
Cell in the SIB 2 message, only those mobiles who are members of this group
will attempt to select the cell.
CSI - CAMEL
Subscription Information
The contents of the CSI include: gsmSCF Address – this is
the identity of the CSE (CAMEL Service Environment) to be used for service
interaction i.e. the gsmSCF. It is made up of a global address enabling
visited networks to identify the gsmSCF and route signalling accordingly.
Service Key – the CSI also contains information related to the OSS of the
subscriber and is termed the Service Key. This is used to identify the
service logic to be used by the gsmSCF. It is administered by the HPLMN and
is passed transparently by the VPLMN / IPLMN to the gsmSCF. Default Call
Handling – this indicates whether the call shall be released or continued
when there is an error in the dialogue between the gsmSSF and gsmSCF. An
example of this maybe when the requests from the gsmSSF are not acknowledged
by the gsmSCF despite repeated re-transmissions. Each Service Key has a
default call handling setting associated with it. TDP (Trigger Detection
Point) List – this indicates at which detection point CAMEL triggering will
take place.
CSI-RS - Channel
State Information – Reference Signal
This is a term used for LTE-Advanced and 5G systems. The
CSI-RS is typically associated with a beamforming FD-MIMO or Massive MIMO
transmission.
CSICH - CPCH
Status Indicator Channel
The CPCH Status Indicator Channel is a fixed rate
(spreading factor 256) physical channel used to carry CPCH (Common Packet
Channel) status information.
CSL - Component
Sublayer
The Component Sublayer is the upper layer of TCAP
(Transaction Capabilities Application Part). The CSL defines the actual
messages or components that are contained in the TSL (Transaction Sublayer
Messages).
CSMA - Carrier
Sense Multiple Access
CSMA is a technique used by devices which utilize a
shared medium for communication. These devices, often termed nodes, will
listen to the medium to try and detect the presence of a carrier signal. A
carrier signal being present indicates to the listening device that another
node is currently using the medium, therefore the listening node will not
attempt to transmit.
CSMA/CA - Carrier
Sensing Multiple Access / Collision Avoidance
This is the medium access control method employed in IEEE
802.11 wireless networks. The IEEE 802.11utilizes collision avoidance rather
than collision detection which is used in wired systems such as IEEE 802.3
and Ethernet. Unlike these conventional wired networks, a WLAN Station cannot
detect a collision while transmitting as it operates in half duplex. If a
collision occurs, the transmitting Station will not receive an
acknowledgement from the intended receive Station. For this reason,
acknowledgement packets have a higher priority than all other network
traffic. Once all data transmission has been completed, the receive Station
will transmit an acknowledgement before any other node can begin transmitting
a new data packet. All other Stations must then wait for a longer period of
time before they may begin transmission.
CSMA/CD - Carrier
Sense Multiple Access with Collision Detection
This is a MAC (Medium Access Control) technique used on
an Ethernet LAN (Local Area Network) which is a shared collision domain. The
technique requires all network devices to monitor the carrier to determine
whether there is any traffic being sent prior to transmitting their
information. Should two devices transmit at the same time, they will back off
and wait for a time (randomly generated) prior to attempting to re-transmit
the information.
CSMF - Communication
Service Management Function
With respect to network slicing, the CSMF is responsible
for generating allocation requests for new Network Slice Instances. In this
capacity, the CSMF is functioning as an NSMS-C (Network Slice Management
Service – Consumer).
CSP - Communication
Service Provider
With respect to network slicing, a CSP is responsible for
providing one or more communication services to a CSC (Communication Service
Customer).
CSPDN - Circuit
Switched Public Data Network
A general wide area network used to provide circuit
switched data services for commercial users.
CSPF - Constrained
Shortest Path First
CSPF is the term given to a shortest path routing
algorithm which factors in a number of constraints to its routing
calculation. Using CSPF means that a network administrator can ensure the SPF
routing algorithm, for example, only considers routes able to support 100Mbps
traffic throughput or routes with a particular end to end delay. Popular
shortest path routing protocols such as OSPF (Open Shortest Path First) and
IS-IS (Intermediate System to Intermediate System) have both been extended to
support constraint based routing.
CSRC - Contributing
Source
CSRC is an RTP (Real-time Protocol) variable that is used
to indicate the sources from behind a mixing function. This mixing function
is used to combine streams before they are played to the end user.
CSRN - CS
domain Routing Number
Used in order to support IMS Centralized Services, the
CSRN will be used during a mobile terminated call set up procedure in order
to route the call from the IMS core to the MSC-S responsible for the Called
Party (within the CS domain).
CT - Call
Transfer
A supplementary service in which a call intended for a
user is passed to a different number or extension.
CT - Class Type
The term CT is used when describing MPLS Diffserv aware
Traffic Engineering. CT is used for the purpose of link bandwidth allocation,
constraint based routing and admission control. For example, CT 1 may define
a class of traffic associated with low latency requirements. That CT will be
allocated a specific amount of bandwidth on the link. That portion of
bandwidth will be populated by LSP (Label Switched Path) of CT 1 only. If the
bandwidth of CT 1 is fully utilized, further attempts to set up LSP supporting
CT 1 traffic will fail.
CTCH - Common
Traffic Channel
This is a point to multipoint unidirectional channel for
the transfer of dedicated user information for all or a group of specified UE
(User Equipment).
CTF - Charging
Trigger Function
The CTF is a network node which will generate charging
events based on network resource consumption by a subscriber. Examples of
network nodes which can contain a CTF include an SGSN, P-GW, ePDG, etc.
CTR - Connect
To Resource
CTR message is associated with CAMEL services that
require gsmSRF interaction. The CRT message is passed from the gsmSCF to the
gsmSSF when the gsmSRF is collocated with the gsmSSF.
CTS - Clear To
Send
This is a signalling message transmitted by an IEEE
802.11 Station in response to an RTS (Request to Send) message. The CTS
message silences all wireless Stations in its vicinity and enables the sender
of the RTS message to begin data transfer.
CUC - Centralized
User Configuration
The CUC is a logical function which receives requests for
TSN (Time Sensitive Networking) Flow establishment from TSN endpoints. In
turn, the CUC will pass configuration data related to the TSN Flow to the CNC
(Central Network Controller) for instantiation.
CUG - Closed
User Group
A Closed User Group is a supplementary service offered by
network operators. It allows the creation of logical groups of users within
the operator’s network.
CUG
Index - Closed User Group Index
A code used to select a CUG for outgoing calls.
CVSD - Continuous
Variable Slope Delta Modulation
Bluetooth uses a 64Kbps CVSD (Continuously Variable Slope
Delta) modulation scheme to code the voice. It is also possible to use
standard 64Kbps PCM (Pulse Code Modulation) if required. CVSD takes advantage
of the fact that human voice signals do not change rapidly and hence there is
only a small change between samples.
CW - Communication
Waiting
A supplementary service indicating to a user currently in
call that another caller is waiting.
CW - Contention
Window
This is a term used in IEEE (Institute of Electrical and
Electronics Engineers) 802.11 networks which are supporting the QoS (Quality
of Service) enhancements originally defined in the 802.11e standard. It
defines a period of time in which the network is operating in contention
mode.
CWDM - Coarse
Wave Division Multiplexing
CWDM is the term given to the practice of multiplexing up
to eight wavelengths of light down the same piece of optical fibre. This in
effect multiplies the capacity of the fibre by eight, since each wavelength
can support a separate data stream.
D
Link - Diagonal link
A Diagonal link connects a
secondary (e.g., local or regional) STP (Signalling Transfer Point) pair to a
primary (e.g., inter-network gateway) STP pair in a quad-link configuration.
Secondary STPs within the same network are connected via a quad of D links.
The distinction between a B link and a D link is rather arbitrary. For this
reason, such links may be referred to as B/D links.
D-channel - Data
channel
The D channel is a full duplex, 16Kbps BRI (Basic Rate
Interface) or 64Kbps PRI (Primary Rate Interface) ISDN channel used to carry
control signals and customer call data in the packet switched mode.
D-IM-CSI - Dialled
– IP Multimedia – CAMEL Subscription Information
D-IM-CSI is used in a similar way to the O-CSI. The main
difference is the O-CSI has a TDP List which when triggered initiates a
dialogue with the gsmSCF and IM-SSF. The D-CSI on the other hand always uses
DP2 and it is this criterion associated with the DP that dictates which
gsmSCF the IM-SSF will initiate a control dialogue with. Thus, by setting
multiple D-CSI it is possible to trigger a dialogue with one of a number of
gsmSCF.
D2D - Device to
Device
D2D is a service which allows LTE devices in close
proximity to one another to communicate directly. This type of technology is
particularly useful for LTE Public Safety applications.
DA - Destination
Address
The DA is a term frequently used in the networking realm
to signify the recipient of a piece of data. The DA could be in the form of a
Layer 2 MAC (Medium Access Control) Destination Address and identify the NIC
(Network Interface Card) of the intended recipient or a Layer 3 IP
Destination Address and identify a particular host on a network.
DAB - Digital
Audio Broadcasting
DAB is the technology behind digital radio transmission,
employed in numerous countries around the world since 1999 (DAB is also
termed Eureka 147). DAB uses techniques such as OFDM and convolutional
coding, in conjunction with the MPEG1 Audio Layer 2 codec (MP2), to provide a
service that is reported to be less susceptible to interference. In 2006,
DAB+ was introduced as a non-backwards compatible upgrade to DAB. DAB+
utilizes the AAC for improved audio encoding.
DAC - Device
Access Code
The Device Access Code is used during the Bluetooth page,
page scan and page response procedures. This code is derived from the devices
BD_ADDR (Bluetooth Device Address).
DAMPS - Digital
Advanced Mobile Phone Service
With the initiative to increase the capacity and quality
of AMPS (Advanced Mobile Phone Service) some of the AMP’S channels were
digitized in the DAMPS system. The broadcast channels remained analogue were
shared between AMPS and DAMPS. Consequently, the DAMPS handsets needed to
operate in dual mode. DAMPS operates in the 900MHz area of the spectrum.
Dark Web
The Dark Web equates to approximately 7% of the overall
World Wide Web. The Dark Web features websites that are associated with
illegal activity, although it is important to note that many websites within
the Dark Web are there simply for anonymity/privacy purposes and may be
perfectly legal. The websites of the Dark Web are often accessible as Tor
Hidden Services, which means that both the individual accessing the website
and the website itself will use Tor in order to maintain anonymity.
DARPA - Defense
Advanced Research Project Agency
Defense Advanced Research Project Agency originally laid
out the protocol architecture for today’s public Internet including the
development of IP (Internet Protocol), TCP (Transport Control Protocol) and
the TCP/IP protocol suite
dB - Decibel
The Decibel is a unit of comparison, in which the ratio of
two power values are expressed using a logarithmic scale usually to the base
10. Although the dB is a unit of comparison it is sometimes useful to have an
agreed reference point. A common reference is 1mW, which is expressed as
0dBm. Consequently 2W, the typical maximum power of a GSM handset, is rated
as 33dBm.
dBc.
A ratio in Decibels of the sideband power of a signal,
measured in a given bandwidth at a given frequency offset from the centre
frequency of the same signal, to the total in band power of the signal.
dBm.
A measure of power expressed in terms of its ratio (in
Decibels) to one milliwatt.
dBm/Hz
A measure of power spectral density. It provides a ratio
of the power in one Hertz of bandwidth, where power is expressed in units of
dBm.
dBW
A measure of power expressed in terms of its ratio (in
Decibels) to one Watt.
DC - Dead Centre
As part of the FFT (Fast Fourier Transform) process the
centre frequency, or DC subcarrier, is not allocated.
DCCH - Dedicated
Control Channel (GSM)
These channels are used for signalling between the network
and the mobile. They comprise of the SDCCH (Standalone Dedicated Control
Channel), the SACCH (Slow Associated Control Channel) and the FACCH (Fast
Associated Control Channel).
DCCH - Dedicated
Control Channel (UMTS)
A UMTS point to point bidirectional channel that transmits
dedicated control information between a UE (User Equipment) and the network.
This channel is established through the RRC (Radio Resource Control)
connection setup procedure.
DCE - Data
Circuit Terminating Equipment
A Data Circuit Terminating Equipment is a terminal device
that interfaces between the DTE (Data Terminal Equipment) and a transmission
circuit. It is sometimes referred to as Data Communications Equipment.
DCF - Distributed
Coordination Function
The Distributed Coordination Function forms the basis of
standard CSMA/CA (Carrier Sensing Multiple Access / Collision Avoidance)
access within an 802.11 network. The DCF first checks to see if the radio
link is free before transmitting and to avoid contention, initiates a random
backoff. In some circumstances, the DCF may use the RTS (Request To Send) and
CTS (Clear To Send) technique to further prevent collisions.
DCH - Dedicated
Control Channel
A portion of a Traffic Channel (Forward or Reverse) that
carries a combination of user data, signaling , and power control
information.
DCI - Downlink
Control Information
The E-UTRA Downlink Control Information is part of the LTE
air interface and is used to carry uplink grant, downlink scheduling, uplink
power control commands and RACH responses.
DCID - Destination
Channel Identifier
The Destination Channel Identifier is used in the
Bluetooth system. The purpose of the DCID is to enable the remote side to
associate the established L2CAP (Logical Link Controller and Adaptation
Protocol) channel with the ongoing call.
DCN - Dedicated
Core Networks
DCNs are deployed by mobile service providers to serve
specific subsets of subscribers, such as in support of a widescale IoT
deployment or a large enterprise customer. The DCN may support multiple RAN
types and will consist of regular core network nodes, such as the MME
(Mobility Management Entity), S-GW (Serving Gateway) and P-GW (PDN Gateway)
DCOM - Distributed
Component Object Model
The Distributed Component Object Model is a protocol that
enables software components to communicate directly over a network. Developed
by Microsoft and previously called Network Object Linking Embedding, DCOM is
designed for use across multiple networks, and is transported typically using
Internet protocols such as HTTP ( Hypertext Transport Protocol ).
DCS1800 - Digital
Cellular System 1800MHz
Digital Cellular System 1800MHz is a term given to what is
now known as GSM1800. This system operates in the 1800MHz region of the
frequency spectrum. The paired spectrum is located between 1710MHz and
1785MHz for uplink operation and 1805MHz and 1880MHz for downlink operation.
The duplex spacing being 95MHz. This spectrum supports 374 channels.
DDoS - Distributed
Denial of Service
This type of attack uses a Botnet in order to facilitate a
DoS attack which has many different sources. All members of the Botnet are
instructed by a Botnet Controller to launch an attack at a specific target.
Due to the large volume of attack sources, the victim may find it next to
impossible to mitigate against the attack. Several high profile organizations
across the globe have succumbed to a DDoS attack.
DECT - Digital
Enhance Cordless Telecommunication
Digital Enhanced Cordless Technology uses the 20MHz of
spectrum between 1880MHz and 1900MHz, DECT provides 120 duplex channels to
provide wireless speech bearers. Enhancements to this standard now allow data
services up to a data rate of 1Mbps to be supported.
Dedicated mode
Dedicated mode In this mode the GSM mobile is allocated a
dedicated physical channel.
Deep Web
The Deep Web forms the majority of the information
currently stored and accessed using the World Wide Web (the Deep Web
constitutes approximately 90% of the World Wide Web). If a website requires a
username/password to access specific information on the site, that
information can be considered to be part of the Deep Web. Moreover, unlike
the Surface Web, the Deep Web is not indexed and referenced by search
engines. It is important to note that the majority of information in the Deep
Web is mundane and perfectly legal, contrary to many media reports (which
often use the term Deep Web interchangeably with Dark Web, each of which are
actually different).
Default Router
A default router is the default gateway used by the device
to access hosts on other networks. It is also called the default gateway.
DES - Data
Encryption Standard
DES is a symmetric key encryption algorithm that is now
widely considered to be insecure for most applications due to the short 56bit
key length.
Designated Access Mode
A mode of operation on the Reverse Common Control Channel
where the MS (Mobile Station) responds to requests received on the Forward
Common Control Channel.
Device Discovery
The Device Discovery procedure allows a Bluetooth device
to request and receive information from other Bluetooth devices. The
information received includes such parameters as: the Bluetooth device
address, clock information, type of device and name of device.
Device Name
The Device Name is a Bluetooth friendly name. It is made
available to other devices during device discovery.
DFT - Discrete
Fourier Transform
The DFT (Discrete Fourier Transform) is a form of Fourier
analysis. It transforms one function into another, which is called the
frequency domain representation, or simply the DFT, of the original
function(which is often a function in the time domain). In most telecom
systems, this means that the number symbols to be transmitted are mapped to
the same number of subcarriers, e.g. 12 symbols to 12 subcarriers.
DH - Data-High
Rate
The DH (Data High Rate) indicates a Bluetooth ACL
(Asynchronous Connectionless Link) data packet type for high rate data. Three
types of ACL packets are available for DH, these are the DH1 packet (1 slot),
DH3 (3 slot) packet and DH5 packet (5 slot).
DH - Diffie-Hellman
Key Exchange
The Diffie-Hellman Key Exchange is the process in which
cryptographic keys may be distributed between communicating parties across a
public IP network. Diffie-Hellman was considered to be a significant
advancement in cryptography and has been adopted in numerous cryptographic
processes. In particular, IKE uses Diffie-Hellman key exchange to help
establish an IPSec security association.
DHCPv4 - Dynamic
Host Configuration Protocol version 4
DHCP is a Client/Server protocol which allows network
hosts to automatically receive an IP address allocation from a DHCP Server.
The DHCP Server can also provide the host device with additional information,
such as the Default Gateway address or P-CSCF address.
DIAC - Dedicated
Inquiry Access Code
The Dedicated Inquiry Access Code is used in the Bluetooth
Inquiry procedure. It is used for a dedicated group of Bluetooth units that
share a common characteristic.
Diameter
The Diameter protocol is intended to provide a framework
for any services which require AAA ( Access, Authorization, and Accounting)
/Policy support across many networks. Diameter is used in 3GPP networks
extensively, particularly within LTE and IMS networks. Key interfaces which
use Diameter include S6a, Gx and Rx, amongst many others.
DiffServ - Differentiated
Services
DiffServ is a QoS mechanism used within IP networks. In
essence, routers are configured with a number of PHBs (Per Hop Behaviours),
which dictate a particular forwarding treatment a packet should receive. In
turn, packets are marked with a 6bit DSCP (DiffServ Code Point) which, when
identified by the router during the routing process, will determine the PHB
which must be applied to the packet.
DIFS - DCF
Interframe Space
DIFS are found in IEEE 802.11 networks. When the radio
link has been free of any traffic for a period greater than the DIFS,
Stations may have immediate access to the medium in a contention-based
service.
Digital Certificate
Digital Certificates are electronic documents used to
validate the end parties or entities employed in data transfer. These
certificates are normally associated with X.509 public key certificates, and
are used to bind a public key to a recognized party for a specific period of
time.
Digital Signature
A digital signature is the process in which a block of
data is encrypted with the user’s private key. This data is normally in the
form of a digest, generated by passing the sent message through a hashing
algorithm such as MD5 (Message Digest 5). Authentication is then performed by
the receiving party by first applying the sender’s public key to the
signature (proving it came from the expected source) and then comparing the
result to the digest of the message (proving that the certificate has not
been tampered with).
Disassociation
The term Disassociation is found within an IEEE 802.11
network and identifies the service used to remove any mapping established
between an AP (Access Point) and Station.
Discoverable Device
A Discoverable Device is a Bluetooth device that is in
range that will respond to an inquiry message.
DL-SCH
(LTE) - Downlink Shared Channel
In LTE the DL-SCH (Downlink Shared Channel) is carried by
the PDSCH. This is the only downlink transport channel available to carry
user data between the mobile device and the eNB.
DL-TFT - Downlink-Traffic
Flow Template
In LTE , as part of the Dedicated EPS bearer establishment
a DL-TFT and UL-TFT are assigned. The EPS Bearer TFT is the collection of all
packet filters associated with that EPS bearer and is used as part of the
classification of a packet in order to ensure the correct traffic is sent on
the correct bearer.
DLCI - Data Link
Connection Identifier
The Data Link Connection Identifier identifies an
individual user’s information stream as well as identifying the connections
between terminal equipment and the user equipment. It is possible for
multiple DLCI to be supported however, the actual number is implementation
specific.
DLI - Durham
Light Infantry
Durham Light Infantry Infantry regiment in the British
Army.
DLP - Direct
Link Protocol
The term DLP is used in wireless networks supporting the
IEEE 802.11e Quality of Service enhancement. It defines the protocol to
enable the transfer of frames between two QSTA supporting power save mode.
DLS - Direct
Link Setup
This term describes a protocol used in WiFi networks to
optimize the transfer of information between two QSTA (Quality Station) as
originally defined in the IEEE 802.11e standard. The need for the protocol
was motivated by the fact that the recipient may be in power save mode and as
such can only be woken by the AP (Access Point).
DLT - Distributed
Ledger Technology
Distributed ledgers are types of databases that are spread
across multiple sites, institutions or countries. Records are stored one
after each other in a continuous ledger which can either be “permissioned” or
“unpermissioned” depending upon who can access it.
DM - Data
The DM (Data Medium Rate) indicates a Bluetooth ACL
(Asynchronous Connectionless Link) data packet type for medium rate data.
Three types of ACL packets are available for DM, these are the DM1 packet (1
slot), DM3 packet (3 slot) and DM5 packet (5 slot).
DMA - Direct
Memory Access
A Direct Memory Access device may access memory without
passing messages through the CPU (Central Processing Unit). This
significantly increases the processing speed of the system. Typical devices
could be a graphics card that may write and read to memory directly.
DMT - Discrete
Multi Tone
DMT is a digital modulation scheme based on FDM (Frequency
Division Multiplexing). DMT is used across the last mile to support DSL
(Digital Subscriber Line) services and is also a popular scheme for wideband
digital communication systems such as WiMAX (Wireless interoperability for
Microwave Access). DMT is also known as OFDM (Orthogonal Frequency Division
Multiplexing).
DMZ - De-Militarized
Zone
In network security terms the DMZ refers to the area
within a firewall architecture where internal company networks are separated
from publicly accessible servers, such as Web servers etc.
DN - Data
Network
The Data Network is related to the 3GPP 5G Architecture.
It identifies Service Provider services, Internet access or 3rd party
services.
DNAI - Data
Network Access Identifier
A DNAI will identify the user plane access to one or more
Data Networks at which specific applications can be found, particularly in
support of MEC (Multi Access Edge Computing).
DNIS - Dialled
Number Identification Service
DNIS (Dialled Number Identification Service) is a
telephone service that identifies for the receiver of a call the number that
the caller dialled. This service is typically used in conjunction with the
Freephone service.
DNN - Data
Network Name
In 5G, Data Networks are specifically identified using a
DNN. The DNN is typically in the form of an APN (Access Point Name).
DNS - Domain
Name System
The DNS translates memorable Domain Names/Hostnames into
corresponding IP Addresses. Routers across a network route traffic utilising
IP Addresses which are unsuitable for use by humans as a means to access
websites, email addresses, etc. Instead, more suitable representations in the
form of HTTP URL (Uniform Resource Locator) or SMTP email addresses are used.
This function is carried out utilising DNS Servers operating in a
hierarchical architecture.
Domain Name
A Domain Name is a logical name separated by periods
describing a host or virtual host. For example, www.mpirical.com.
DoS - Denial of
Service
A DoS (Denial of Service) attack is a generic description
of the process of preventing the target of the attack carrying out its normal
role. DoS attacks can be directed at network entities such as hosts and
servers or alternatively, the network infrastructure itself could be the
target. Attack mechanisms are extremely varied, largely due to the fact that
the variety of potential targets is also hugely varied. Flooding type DoS
attacks are commonplace; for example, the well-known TCP SYN Flood attack sees
the target device swamped with TCP SYN messages until its kernel resources
are eventually exhausted. Alternatively, a SIP server may succumb to a SIP
INVITE flood, which involves large amounts of INVITEs to be directed to the
target, ultimately causing the target to fail. Nowadays, Distributed DoS
attacks are used as a much more affective DoS attack mechanism.
DOS - Disk
Operating System
Computer operating system used to control the
microprocessor, and other peripherals such as the computer’s hard disk.
Downlink DPCH
The UMTS system uses the Downlink DPCH (Downlink Dedicated
Physical Channel) to carry the DPDCH (Dedicated Physical Data Channel) and
the DPCCH (Dedicated Physical Control Channel).
DP - Detection
Point
A DP indicates states in basic call and connection
processing where control may be transferred to the IN service.
DP Criteria
List - Detection Point Criteria List
The DP (Detection Point) criteria indicate conditions that
must be met in order for the gsmSSF i.e. SSP (Service Switching Point) to
request instructions from the gsmSCF i.e. SCP (Service Control Point). The
relevant criteria for mobile terminated calls are typically checked through
interaction with the HLR.
DPC - Destination
Point Code
Within a SS7 (Signalling System No.7) network the point
codes are numeric addresses which uniquely identify each signalling point.
The DPC identifies the receiving signalling point.
DPCCH - Dedicated
Physical Control Channel
The Dedicated Physical Control Channel is a type of uplink
dedicated physical channel. It is an I/Q code, multiplexed within each radio
frame. The uplink DPCCH is used to carry the DCH (Dedicated Channel)
transport channel. The uplink DPCCH is used to carry control information
generated at Layer 1.
DPCM - Differential Pulse
Code Modulation
PCM (Pulse Code Modulation) permits adjacent samples to be
described from extreme opposite ends of the sample range. As this situation
rarely occurs it should be able to convey the baseband data using fewer bits.
DPCM allows this to be achieved by describing only the changes between the
samples.
DPDCH - Dedicated
Physical Data Channel
The Dedicated Physical Data Channel is a type of uplink
dedicated physical channel. It is an I/Q code, multiplexed within each radio
frame. The uplink DPDCH is used to carry the DCH (Dedicated Channel)
transport channel. There may be zero, one, or several uplink DPDCH on each
radio link.
DPI - Deep
Packet Inspection
A term used to describe the process of packet analysis
above the transport layer (Layer 4). DPI can be used in a variety of
applications for a number of reasons, including NAT traversal, security and
policy enforcement.
DPNSS - Digital
Private Network Signalling System
An open standard signalling system developed by British
Telecom in order that PABX (Private Automatic Branch Exchange) made by
different manufacturers could be integrated. The standard came about as a
requirement, when 2Mbps digital links first became available in the early
1980’s.
DQPSK - Differential
Quadrature Phase Shift Keying
Differential Quadrature Phase Shift Keying is a modulation
technique in which the carrier can assume one of four phases, each change of
phase, or symbol, representing 2bits. The bit combinations being 00, 01, 11
and 10. Consequently the data stream can carry 2bits at a time. Using this
technique the phase transition across the origin is avoided.
DR - Designated
Router
The DR is a function of a broadcast or NBMA (Non Broadcast
Multiple Access) network which operates the OSPF (Open Shortest Path First)
routing protocol. The DR has two functions, namely: Generation and
transmission of Network LSA (Link State Advertisement) for the entire
network, thus reducing the amount of routing traffic and Synchronization with
all other routers on the network in order to ensure routing information is
current and valid.
DRA - Diameter
Routing Agent
The DRA enables PCRF (Policy and Charging Rules Function)
discovery and selection as part of the PCC architecture. Essentially, if
multiple PCRFs are available, the DRA will ensure an appropriate PCRF is
initially selected and subsequently ensure that this PCRF is used for all
future transactions associated with the subscriber. The DRA is also
frequently termed the DRA (Diameter Routing Agency) or DSC (Diameter
Signalling Controller). In all cases, the use of the DRA often goes beyond
the PCC architecture and is often involved in general routing of all Diameter
messages in the network.
DRB - Dedicated
Radio Bearer
In LTE there are two main types of bearers, namely the SRB
(Signalling Radio Bearer) and the DRB (Dedicated Radio Bearer). The DRB is
used to carry the data associated with an EPS bearer.
DRNC - Drift
Radio Network Controller
When a UE (User Equipment), in the connected state is
handed onto a cell associated with a different RNS (Radio Network Subsystem)
it is said to have drifted. The RRC (Radio Resource Control) connection
however still terminates with the SRNC (Serving RNC). In effect the DRNC acts
as a switch, routing information between the SRNC and the UE.
DRS - Demodulation
Reference Signal
In LTE there are two types of uplink reference signals,
namely the Demodulation reference signal, associated with transmission of
PUSCH or PUCCH , and the Sounding reference signal, not associated with
transmission of PUSCH or PUCCH.
DRX - Discontinuous
Reception
Discontinuous reception is employed in cellular systems to
prolong the mobile’s battery life. The mobile station listens only to the
paging channels within its DRX group. Moreover the network will only page the
mobile in that group of paging channels. Thus the mobile does not have to
continuously monitor the paging channels.
DS - Direct
Sequence
A method of achieving a spread spectrum system.
DS - Distribution
System
A Distribution System is a logical element of an IEEE
802.11 network which provides the means of connecting multiple AP (Access
Points) together. In most commercial AP, the Distribution System is already
implemented enabling it to be directly connected to a wired network such as
Ethernet etc.
DS PHY - Direct
Sequence Physical Layer
The Direct Sequence Physical Layer utilizes spread
spectrum technology to transmit the signal over a much wider frequency band.
This process entails spreading a narrow band signal over a wider frequency
band. To a narrow band receiver, the transmitted signal is impossible to
detect as it appears as low level noise. However, a wide band receiver can
monitor the whole frequency band and detect changes. The original signal can
then be recovered by a correlator which reverses the spreading process. This
process gives a significant degree of protection to direct sequence
transmissions as noise tends to be narrow in terms of frequency and thus does
not affect the entire frequency band. To support the DS PHY, the 2.4GHz ISM
(Industrial Scientific and Medical) band is divided into 14 channels, each
separated by 5GHz. Unfortunately these channels may not all be available, as
different regulatory bodies have allocated different portions of the ISM
band.
DSA - Digital
Signature Algorithm
The DSA (Digital Signature Algorithm) was developed by the
NSA (National Security Association) so that certificates and other
information could be signed using the sender’s private key.
DSCH
(UMTS) - Downlink Shared Channel
The Downlink Shared Channel is a downlink transport
channel that may be shared by several UE (User Equipment). It is used to
carry dedicated control or traffic data from the SRNC (Serving Radio Network
Controller). The DSCH will be associated with one or several downlink DCH
(Dedicated Channel).
DSCP - Differentiated
Services Code Point
The 6bit DSCP is appended to the header of an IPv4 or IPv6
packet in order to ensure the packet receives a particular forwarding
treatment as it traverses a DiffServ enabled IP network. Different DSCP
values will be used to apply different forwarding treatment and as such, a
packet must be classified before ingress to the network to make sure that
packets are given the appropriate forwarding treatment.
DSF - Data
Storage Network Function
The Data Storage Network Function is related to the 3GPP
5G Architecture.
DSL - Digital
Subscriber Line
DSL describes a physical layer technology that can be
utilized across the last mile connectivity between a customer’s premises and
the Local Exchange or Central Office. Typically based on a copper twisted
pair transmission medium, DSL can come in a variety of formats. A particular
example of this is ADSL2+ , which employs techniques such as DMT between the
ATU-R (ADSL Termination Unit – Remote) and the DSLAM.
DSLAM - DSL
Access Multiplexer
A DSLAM (DSL Access Multiplexer) is used as an aggregation
point for subscriber traffic within DSL systems. It separates the voice
frequency signals from the high-speed data traffic and controls, thus routing
DSL traffic between the subscriber’s end-user equipment, e.g. router or
modem, and the service provider’s network. IP DSLAMs are now being deployed,
which provide much of the functionality traditionally found in a B-RAS.
DSMIPv6 - Dual-stack
Mobile IPv6
The S2c interface can provide user plane and related
control and mobility support between the mobile and the PDN-GW. The interface
can be implemented over trusted and/or untrusted non-3GPP access and/or 3GPP
access. The protocol over the S2c interface is based on DSMIPv6.The purpose
of DSMIPv6 is to establish, manage and tear down a mobility tunnel between
the UE and the HA function which resides within the PDN-GW.
Dsp - Delta
Session Period
The Dsp is a variable used during the CAMEL Apply Charging
Process and is used to record the amount of session time that transpires
between the Apply Charging Report sent by the SSF and the subsequent Apply
Charging message sent by the SCF.
DSP - Digital
Signal Processor
Digital Signal Processors are specialized computer chips
designed to perform speedy and complex operations on digitized waveforms. The
DSP is used in processing sound, such as voice phone calls, and video.
DSRC - Dedicated
Short-Range Communication
DSRC provides short range communications between a vehicle
and roadside infrastructure, such as toll road booths facilitating electronic
fee collection. The technology operates within the frequency band of 5.9GHz
and consists of Road Side Units and On-Board Units with transceivers and
responders.
DSS - Digital
Signature Standard
DSS (Digital Signature Standard) is the framework laid out
by NIST (National Institute of Standards and Technology) for the signing of
data prior to transfer. The standard promotes the use of the DSA (Digital
Signature Algorithm) public-key algorithm and the SHA-1 hash algorithm.
DSS1 - Digital
Subscriber Signalling 1
Access Signalling protocol used between the subscriber
terminal and the ISDN network.
DSSS - Direct
Sequence Spread Spectrum
Direct Sequence Spread Spectrum is based on the
multiplying of the baseband signal data with a broadband spreading code. The
result is termed the chip rate. The characteristics of the broadband
spreading code are that of pseudorandom noise. Consequently, the receiver
synchronized to the code will obtain the narrowband signal. All other
receivers will see the spread signal as white or coloured noise.
DTAP - Direct
Transfer Application Part
Direct Transfer Application Part is an application
protocol used between the 2G mobile and the core network, facilitating the
transfer of session management, mobility management and call control
signalling associated with procedures such as Network Attach, Location Area
Update and Call Establishment.
DTC - Digital
Traffic Channel
A term to describe the digital traffic channels employed
in systems such as North American digital systems.
DTCH - Dedicated
Traffic Channel
Channel A Dedicated Traffic Channel is a point to point
channel, dedicated to one mobile for the transfer of user information. A DTCH
can exist in both the uplink and downlink direction.
DTE - Data
Terminal Equipment
The Data Terminal Equipment is the terminal device and may
be a voice or data terminal. The DTE interfaces through a DCE (Data
Communications Equipment).
DTI - Destination
Transaction Identifier
The DTI is a TCAP variable and is used to associate
request and response messages within the TCAP Transaction Sublayer.
DTIM - Delivery
Traffic Indication Message
A Delivery Traffic Indication Message may be found in an
IEEE 802.11b Beacon Frame which is transmitted from an AP (Access Point). The
message is comprised of two parts; DTIM Count and the DTIM Period and
indicates that broadcast and multicast frames, buffered at the AP, will be
delivered in the near future.
DTM - Dual
Transfer Mode
DTM describes the ability of a GSM handset to be able to
conduct a voice call and data session simultaneously.
DTMF - Dual Tone
Multi-Frequency
System used by touch tone telephones where one high and
one low frequency, or tone, is assigned to each touch tone button on the
phone.
DTX - Discontinuous
Transmission
A pause in the normal flow of conversation is detected in
the telephone device, and transmission is suspended. In mobile systems such
as GSM and UMTS this serves two purposes. It prolongs battery life and
reduces interference in the radio environment.
DV - Data Voice
The DV (Data Voice) indicates a Bluetooth packet which has
been defined so it can support both data and voice simultaneously on a single
SCO (Synchronous Connection Oriented) link.
DVB-H - Digital
Video Broadcasting Handheld
This ETSI standard is an enhancement to the DVB-T
architecture which specifies how TV content can be distributed to handheld
receivers such as mobile phones and PDA s. The DVB-H standard was published
in 2004 and has since seen widespread deployment across the globe,
particularly by mobile service providers. DVB-H is a physical layer
technology which employs a battery conserving technique termed timeslicing.
This involves the mobile only listening for content at set time intervals, in
much the same way as a GSM phone would operate with respect to TDMA. In terms
of spectrum usage, multiple DVB-H channels occupy a channel which would
normally be allocated to one DVB-T channel.
DVRB - Distributed
Virtual Resource Block
This is a method for allocating resources in the E-UTRA.
As its name suggests, it distributes the scheduled resources in order to
improve some aspects of interference.
DWDM - Dense
Wavelength Division Multiplexing
The development of erbium doped fibre amplifiers has
allowed channel spacing of 0.8nm in the 1550nm range. This enables many more
wavelengths to be multiplexed onto a single fibre. In simple terms, DWDM
systems shine different colours of light down the optical fibre, with each
colour or wavelength capable of conveying a separate datastream. Therefore, a
DWDM system with 200 channels would be capable of carrying 200 times the
amount of data than a single wavelength fibre.
DwPTS - Downlink
Pilot Time Slot
In LTE, the radio frame structure type 2 is used for TDD
operation and consists of two half-frames with a duration of 5ms each and
containing each 8 slots of length 0.5ms and three special fields ( DwPTS , GP
and UpPTS ) which have configurable individual lengths and a total length of
1ms. The DwPTS and UpPTS both provide time which enables downlink/uplink
switching to be performed.
DXC - Digital
Cross Connect
A Digital Cross Connect is a physical layer device in
which digital channels are switched between interfaces.
E
Carrier
European term for the TDM
(Time Division Multiplexing) digital transmission hierarchy. E1 – 2.048Mbps
E2 – 8.448Mbps E3 – 34.368Mbps E4 – 139.264Mbps E5 – 565.148Mbps
E
Link - Extended Link
An extended link connects an SP (Signalling Point) to an
alternate STP (Signalling Transfer Point). E links provide an alternate
signalling path if an SP home STP cannot be reached via an A link. E links
are not usually provisioned unless the benefit of a marginally higher degree
of reliability justifies the added expense.
E-AGCH - DCH
Absolute Grant Channel
The E-DCH Absolute Grant Channel is a downlink physical
channel carrying the uplink E-DCH absolute grant information. Key parameters
include: Absolute Grant Value and Absolute Grant Scope, as well as individual
or group RNTI (Radio Network Temporary Identifier) values which are coded
using an identity specific CRC value. There are two types of grants: –
Absolute Grants – these provide an absolute limitation of the maximum amount
of UL (Uplink) resources the UE may use. These are sent on an E-AGCH. – Relative
Grants – these increase or decrease the resource limitation compared to the
previously used value. These are sent on an E-RGCH.
E-CSCF - Emergency
– Call Session Control Function
The E-CSCF is a specialist platform which is designed to
facilitate support for emergency services dialling. In this capacity, the
E-CSCF will take in requests from the P-CSCF (Proxy CSCF) and S-CSCF (Serving
CSCF) and route these emergency session requests to a suitable onward
destination such as a PSAP (Public Safety Answering Point). In order to
achieve this, the E-CSCF can use the services of the LRF (Location Retrieval
Function).
E-DCH - Enhanced
The E-DCH is an uplink transport channel which is part of
the HSUPA specifications. The rate of the E-DCH is controlled by the downlink
E-RGCH and E-AGCH.
E-DPCCH - E-DCH
Dedicated Physical Control Channel
The E-DPCCH is the uplink physical channel used to
transmit control signalling associated with the E-DCH. It contains 10 useful
bits of information which includes: – RSN (Retransmission Sequence Number) –
2bits. – E-TFCI (Enhanced – Transport Format Combination Identifier)
information – 7bits. – Happy Bit – 1bit.
E-DPDCH - CH
Dedicated Physical Data Channel
The E-DPDCH primary role is to carry the HSUPA E-DCH
transport channel. Depending on the configuration, there may be zero, one, or
several E-DPDCH on each radio link. The rate of the E-DPDCH varies depending
on the SF in use. It can vary between SF2 and SF64, which equates to 1.92Mbps
and 64Kbps respectively.
E-HICH - DCH
HARQ Acknowledgement Indicator Channel
The E-HICH is a downlink channel. As its name suggests,
it carries an uplink E-DCH HARQ -ACK (Hybrid-ARQ Acknowledgement) indicator,
which is transmitted using 3 or 12 consecutive slots. The 3 and 12 slot
duration is used for UE which E-DCH TTI is set to respectively 2 ms and 10
ms. This channel uses the concept of signatures, in a similar way to the AICH
(Acquisition Indicator Channel).
E-OTD - Enhanced
Observed Time Difference
The E-OTD method is based on measurements in the MS
(Mobile Station) of the Enhanced Observed Time Difference of arrival of
bursts from nearby pairs of Base Stations. It is employed to calculate the
position of the MS and may be used for LCS (LoCation Service).
E-RAB - EPS
Radio Access Bearer
An E-RAB (E-UTRAN Radio Access Bearer) refers to the
concatenation of an S1 bearer and the corresponding radio bearer. When an
E-RAB exists, there is a one-to-one mapping between this E-RAB and an EPS
bearer of the Non Access Stratum. Each E-RAB is defined by the following
parameters: E-RAB ID – this element is used to identify the E-RAB on the S1
interface. E-RAB QoS – this element describes the QCI (Quality Class
Identifier) that defines QoS parameters such as end to end delay, bit error
rates etc. Also included are allocation and retention priorities as well as
GBR (Guaranteed Bit Rate) parameters if real time services are to be
supported over the E-RAB.
E-RGCH - DCH
Relative Grant Channel
The E-DCH Relative Grant Channel is very similar to the
E-HICH. It is a downlink channel used for carrying the uplink E-DCH relative
grants. There are two types of grants: – Absolute Grants – these provide an
absolute limitation of the maximum amount of UL (Uplink) resources the UE may
use. These are sent on an E-AGCH. – Relative Grants – these increase or
decrease the resource limitation compared to the previously used value. These
are sent on an E-RGCH.
E-RNTI - Enhanced
Radio Network Temporary Identity
This is valid within one cell, and is used by the Node B
to identify a UE or group of UE’s. It may also be reallocated when the
serving E-DCH cell changes.
E-UTRA - Evolved –
Universal Terrestrial Radio Access
The E-UTRA is the air interface (radio) element of the
LTE E-UTRAN.
E-UTRAN - Evolved
– Universal Terrestrial Radio Access Network
The E-UTRAN is the LTE RAN, forming part of the overall
Evolved Packet System.
E1
Wide area digital transmission scheme used predominantly
in Europe that carries data at a rate of 2.048Mbps. E1 lines can be leased
for private use from common carriers. The E1 contains 32 timeslots at 64Kbps,
which can carry voice or signalling traffic.
E164
The format of global switched telephone numbers are
defined by the ITU-T (International Telecommunications Union –
Telecommunications Standardization Sector) E164 standard. The 16 digit number
is split into international, national and user number portions. For example
+44 (0) 1344 724666.
E169
E169 defines the format for toll free numbers. The format
is defined by the ITU-T (International Telecommunications Union –
Telecommunications Standardization Sector) and examples include 800, 888 and
887.
E2
An interim data bearer that consists of four E1 bearers
multiplexed together. The capacity of the E2 bearer is 8.448Mbps.
E212
An ITU-T (International Telecommunications Union –
Telecommunications Standardization Sector) numbering plan standard, make up
of the MCC (Mobile Country Code), MNC (Mobile Network Code) and MSIN (Mobile
Station Identification Number). The IMSI (International Mobile Subscriber
Number) number of a mobile is an E212 number
E2U - E.143 to
URL
The ENUM (E Number) working group of the IETF is defining
a name space in which normal telephone numbers may be resolved into URL
(Uniform Resource Locator) for use in IP environments. E2U is a NAPTR (Naming
Authority Pointer Record) value that identifies such a string.
E3
The E3 standard is specified by ETSI (European
Telecommunications Standards Institute). The bearer supports 16 E1 channels
giving a capacity of 34.368Mbps.
E4
Carries four E3 channels. The carrier offers a capacity
of 139.264Mbps
E5
Carries four E4 channels. The carrier offers a capacity
of 565.148Mbps
E911 - Enhanced
911 Service
E911 – Enhanced 911 Service 911 is an emergency telephone
number. Enhanced 911 services offer automatic number identification and
automatic location information.
EACH - Enhanced
Access Channel
A reverse channel used by a mobile station for
communicating to the base station. The EACH operates in the Basic Access Mode
and Reservation Access Mode. It is used for transmission of short messages,
such as MAC messages, response to pages, and call originations. It can also
be used to transmit moderately sized data packets.
EAMPS - Extended
Advanced Mobile Phone System
Extension of the radio spectrum which was used by AMPS
(Advanced Mobile Phone Service). The additional 10MHz increased the number of
channels from 333 per service provider to 416.
EAP - Extensible
Authentication Protocol
EAP is an extensible authentication framework and is not
a specific authentication mechanism. Instead, EAP provides the means by which
other authentication mechanisms can be transported by the EAP protocol. These
authentication mechanisms are termed EAP methods, of which several exist
including EAP-AKA, EAP-SIM and EAP-TLS, amongst many others.
EAP-TLS - Extensible
Authentication Protocol – Transport Layer Security
EAP-TLS is a specific version of the EAP(Extensible
Authentication Protocol) providing a framework to support authentication
across a number of communication systems. The EAP-TLS variant utilizes
digital certificates to generate the various keys.
EAP-TTLS - Extensible
Authentication Protocol – Tunnelled Transport Layer Security
EAP-TTLS is a specific version of the EAP(Extensible
Authentication Protocol) providing a framework to support authentication
across a number of communication systems. Unlike EAP-TLS(Extensible
Authentication Protocol – Transport Layer Security) protocol which requires
digital certificates at both endpoints, the EAP-TTLS variant only requires a
digital certificate at the network side.
EAP/AKA Authentication
An extension to the EAP (Extensible Authentication
Protocol) proposed by the IETF (Internet Engineering Task Force) enabling
authentication and session key distribution using the UMTS AKA
(Authentication and Key Agreement) mechanism. UMTS AKA is based upon
symmetric keys and runs typically on a USIM (UMTS Subscriber Identity
Module). EAP/AKA Authentication includes optional user anonymity and
re-authentication procedures.
EAP/SIM Authentication
An extension to the EAP (Extensible Authentication
Protocol) proposed by the IETF (Internet Engineering Task Force) enabling
authentication and session key distribution using the GSM SIM (Subscriber
Identity Module). The mechanism specifies enhancements to GSM authentication
and key agreement whereby multiple authentication triplets can be combined to
create authentication response and encryption keys of greater strength than
the individual GSM triplets. The mechanism also introduces network
authentication, user anonymity and a re-authentication procedure.
EARFCN - E-UTRA
Absolute Radio Frequency Channel Number
Since the E-UTRA operates with more flexibility than UMTS
, a updated method of identifying the centre carrier frequencies is used. The
carrier frequency in the uplink and downlink is designated by the EARFCN
(E-UTRA Absolute Radio Frequency Channel Number) in the range 0 – 65535. The
channel raster is 100KHz for all bands, which means that the carrier centre
frequency must be an integer multiple of 100KHz. The relation between EARFCN
and the carrier frequency in MHz for the downlink/uplink is given by an
equation and associated table of frequency bands.
EASCII - Extended
ASCII
ASCII (American Standard Code for Information
Interchange) is a seven bit code. Extended ASCII employs the 8th bit to
enhance the addressing space available to define characters in binary.
EATF - Emergency
Access Transfer Function
This IMS network element is used during the establishment
of emergency calls within a VoLTE deployment. In particular, the E-PCSCF can
utilize the EATF as part of the media anchoring process. This ensures that
handovers between VoLTE and the 2G/3G CS domain will occur more smoothly.
Eb
A measure of the energy in a signal, at some point in a
communication system. This may be per information bit conveyed by that
signal, or an average value of such energies. Its relevance to system
performance is most often expressed by its ratio to additive noise and
interference, such as in E b /N 0.
EBCDIC - Extended
Binary Coded Decimal Interchange Code
A code developed by IBM (International Business Machines)
in order to define figures and numbers in binary format. The 8bit format
offers a possible 256 different characters to be described.
EBCF - Event
Based Charging Function
The EBCF forms part of the 3GPP Online billing
architecture, responsible for generating billing related information
associated with billable events such as sending a text message.
EBS - Excess
Burst Size
EBS is a component of the bandwidth profile traffic
parameters applicable to a service running over Ethernet networks. It is the
number of allocated bytes available for bursts of service frames temporarily
sent at rates above the CIR+EIR, while remaining EIR-conformant.
EC - Emergency
Call
A call placed by a user to request emergency assistance,
typically to an emergency services or public safety provider. Typical numbers
include 112, 911 and 999.
EC-AGCH - Extended
Coverage – Access Grant Channel
This is a modified GSM / GPRS logical channel used to
allocate resources to a mobile or device in support of EC-GSM-IoT operation.
EC-BCCH - Extended
Coverage – Broadcast Control Channel
This is a modified GSM / GPRS logical channel used to
broadcast ECSI (Extended Coverage System Information) messages in support of
EC-GSM-IoT operation.
EC-GSM-IoT - Enhanced
Coverage – GSM – Internet of Things
This is a term used to describe a number of enhancements
to the second generation cellular technologies of GSM and GPRS in order to
more efficiently support M2M (Machine-to-Machine) communications. In simple
terms, the technology which was included in the 3GPP Release 13
specifications extends coverage by using a technique based on blind physical
layer transmissions.
EC-PACCH - Extended
Coverage – Packet Associated Control Channel
This is a modified GSM / GPRS logical channel used to
carry signalling information alongside a EC-PDTCH (Extended Coverage – Packet
Data Traffic Channel) in support of EC-GSM-IoT operation.
EC-PCH - Extended
Coverage – Paging Channel
This is a modified GSM / GPRS logical channel used to
carry paging information in support of EC-GSM-IoT operation.
EC-PDTCH - Extended
Coverage – Packet Data Traffic Channel
This is a modified GSM / GPRS logical channel used to
carry user data (IP packets) in support of EC-GSM-IoT operation.
EC-RACH - Extended
Coverage – Random Access Channel
This is a modified GSM / GPRS logical channel used by a
mobile / device in order to request resources from, or respond to a page
message, in an EC-GSM-IoT network.
EC-SCH - Extended
Coverage – Synchronization Channel
This is a modified GSM / GPRS logical channel used to
carry a modified BSIC (Base Station Identity Code) and timing information in
support of EC-GSM-IoT operation.
Ec/Io
Ec/Io A notation used to represent a dimensionless ratio
of the average power of a channel, typically the pilot channel, to the total
signal power.
ECB - Electronic
Code Book
ECB is the simplest mode of operation for a block cipher.
Plain text data is segmented into blocks and each block has the relevant
encryption algorithm applied. ECB is considered to be a weak method of
encryption and is not recommended to be used in situations where robust
encryption is required.
eCCE - Enhanced
Control Channel Elements
Introduced in Release 13 of the 3GPP specifications, eCCE
are used in eMTC (enhanced Machine Type Communications) and are combined to
carry DCI (Downlink Control Information).
ECF - Event
Charging Function
For online charging, the AS (Application Server) in the
IMS (IP Multimedia Subsystem) network reports accounting information to the
ECF. The ECF uses this information to support the content charging function.
This is used for real time billing and services such as pre-pay.
ECGI - E-UTRAN
Cell Global Identifier
The E-UTRAN Cell Global Identifier is used to identify
cells globally. The ECGI is constructed from the MCC (Mobile Country Code),
MNC (Mobile Network Code) and the ECI (E-UTRAN Cell Identifier).
Echo
A type of distortion that occurs when a signal is
reflected or otherwise returned with sufficient magnitude and delay to be
perceived by the speaker.
Echo Canceller
A device or system that reduces or eliminates echoes in
voice transmission systems.
ECM - EPS
Connection Management
In addition to the LTE Active, Idle and Detached states
there also exists various EMM ( EPS Mobility Management) and ECM (EPS
Connection Management) states. The EPS Connection Management states describe
the signalling connectivity between the UE and the EPC. Two ECM states exist,
namely ECM-IDLE and ECM-CONNECTED.
ECMP - Equal
Cost Multiple Path
ECMP is a strategy used in packet routing whereby several
routes exist to the same destination, all of which have an equal cost and
hence will be equal to one another as part of a routing metric calculation.
Therefore, if a network hop has ECMP active, it will load balance across all
available onward hops.
eCPRI - enhanced
Common Public Radio Interface
eCPRI is a separate, alternative standard to the 3GPP’s
work on Centralized RAN. Where the 3GPP specifically define the protocol
stack split between the Centralised Unit and the Distributed Unit at the PDCP
(Packet Data Convergence Protocol) layer, eCPRI offers many more splitting
options. The rationale behind this is to provide the service provider with
more deployment flexibility.
ECSI - Extended
Coverage System Information
Found on the EC-BCCH (Extended Coverage – Broadcast
Control Channel), ECSI is specific system information message which contains
the rules by which mobiles / devices should operate on a EC-GSM-IoT network.
Such information includes cell allocations, cell selection and reselection
parameters and network sharing rules.
ECT - Explicit
Communication Transfer
ECT is a supplementary service which allows an individual
involved in a call to transfer that call to a third party.
EDCA - Enhanced
Distributed Channel Access
The term EDCA is used in wireless networks supporting the
IEEE 802.11e Quality of Service enhancement. It supports differentiated and
distributed access to the Wireless Medium using eight different user priority
sub fields supporting four different Access Categories. These are Voice,
Video, Best Effort and Background.
EDCAF - Enhanced
Distributed Channel Access Function
This is a term used in IEEE (Institute of Electrical and
Electronics Engineers) 802.11 networks which are supporting the QoS (Quality
of Service) enhancements originally defined in the 802.11e standard. When
supporting the EDCA (Enhanced Distributed Channel Access) mode of operation,
the EDCAF is responsible for the control of the data streams for each of the
four defined access categories.
EDGE - Enhanced
Data rates for Global Evolution
EDGE uses the same spectrum allocated for GSM900 ,
GSM1800 and GSM1900 operation. Instead of employing GMSK (Gaussian Minimum
Shift Keying) EDGE uses 8PSK (8 Phase Shift Keying) producing a 3bit word for
every change in carrier phase. This effectively triples the data rate offered
by GSM. The use of EDGE enables GSM to increase the data rates that can be
offered to users of the GSM spectrum. In release 7, Evolved EDGE (also termed
EGPRS2) was introduced which offered higher data rates through mechanisms
such as latency reduction, use of dual carriers in the downlink, higher order
modulation techniques, increased symbol rate and receiver diversity in the
mobile.
EDP - Event
Detection Point
There are two ways in which a DP may be armed. These are:
Statically – a statically armed DP is known as a TDP (Trigger Detection
Point) this is always armed within the BCSM. Dynamically – a dynamically
armed DP is known as an EDP (Event Detection Point). This will be armed by
the SCF (Service Control Function) within the context of an IN service.
EDP-N - Event
Detection Point – Notification
A dynamically armed DP is known as an EDP (Event
Detection Point). This will be armed by the SCF (Service Control Function)
within the context of an IN service. This may be either an EDP-N (Event
Detection Point – Notification) – this is dynamically armed and when
triggered the event is reported however processing is not suspended or EDP-R
(Event Detection Point – Request) – this is dynamically armed and when
triggered will suspend call processing. The SSF then waits for instructions
from the SCF.
EDP-R - Event
Detection Point – Request
A dynamically armed DP is known as an EDP (Event
Detection Point). This will be armed by the SCF (Service Control Function)
within the context of an IN service. This may be either an EDP-N (Event
Detection Point – Notification) – this is dynamically armed and when
triggered the event is reported however processing is not suspended or EDP-R
(Event Detection Point – Request) – this is dynamically armed and when
triggered will suspend call processing. The SSF then waits for instructions
from the SCF.
eDRX - extended
Discontinuous Reception
Introduced in Release 13 of the 3GPP specifications, eDRX
enables mobiles and devices to reduce power consumption by extending the
period of time they remain “asleep”. This is particularly important within
CIoT (Cellular Internet of Things) networks in order to extend battery life
to up to 10 years.
EEA - EPS
Encryption Algorithm
E-UTRA includes the support of EEA (EPS Encryption
Algorithm) and EIA (EPS Integrity Algorithm). The EEA (EPS Encryption
Algorithm) are each assigned a 4bit identifier. Currently, the algorithms
which have been defined for NAS , RRC and UP ciphering include Null, SNOW,
AES and ZUC.
EEPROM - Electrically
Erasable Programmable Read-Only Memory
Erasable Programmable Read Only Memory that can be erased
using electrical signals applied to specific pins.
EF - Expedited
Forwarding
Expedited Forwarding is a DiffServ Per Hop Behaviour
which has characteristics specifically designed for handling real time
services such as VoIP.
EGP - Exterior
Gateway Protocol
Internet protocol used to pass network reachability and
policy information between Autonomous Systems. An example is BGP4 (Border
Gateway Protocol 4).
EGPRS - Enhanced
General Packet Radio Service
Enhanced GPRS (General Packet Radio Service) uses the
modulation technique 8PSK (8 Phase Shift Keying) to increase the achievable
user data rate. See EDGE (Enhanced Data rates for Global Evolution).
EGPRS2 - Enhanced
General Packet Radio Service phase 2
EGPRS2 or Evolved EDGE is an evolution of the current
EDGE technology specified by the 3GPP in their Release 7 specifications. It
enables higher data rates, up to 118Kbps, to be supported on both the uplink
and downlink air interfaces. This is achieved through a number of
enhancements including: latency reduction, support of a dual carrier in the
downlink, higher order modulation including 16 QAM and 32QAM, an increase in
symbol rate to 325Ksps and receiver diversity in the mobile.
EGPRS2A - Enhanced
General Packet Radio Service phase 2 A
This is a variant of the generic EGPRS2 or Evolved EDGE
technology. It enables higher data rates, up to 118Kbps, to be supported on
both the uplink and downlink air interfaces. This is achieved through a
number of enhancements including: latency reduction, support of a dual
carrier in the downlink, higher order modulation including 16 QAM and 32QAM,
and receiver diversity in the mobile. It does not support the increased
symbol rate of 325Ksps unlike EGPRS2-B.
EGPRS2B - Enhanced
General Packet Radio Service phase 2 B
This is a variant of the generic EGPRS2 or Evolved EDGE
technology. It enables higher data rates, up to 118Kbps, to be supported on
both the uplink and downlink air interfaces. This is achieved through a
number of enhancements including: latency reduction, support of a dual
carrier in the downlink, higher order modulation including 16 QAM and 32QAM,
and receiver diversity in the mobile. It also supports the increased symbol
rate of 325Ksps unlike EGPRS2-A.
EGSM - Extended
GSM
GSM EGSM is an extension to the GSM900 spectrum. The
additional 10Mhz provides an additional 50 channels.
EHF - Extremely
High Frequency
The portion of the electromagnetic frequency between
30GHz and 300GHz.
EIA - Electronics
Industries Alliance
Group that specifies electrical transmission standards.
EIA - EPS
Integrity Algorithm
The integrity process in LTE uses an EIA (EPS Integrity
Algorithm) which have a 4bit identifier. Examples of EIA algorithms include
SNOW and AES. These are implemented in the UE and eNB for RRC signalling
integrity protection. In addition, they are also implemented in the UE and
MME for NAS integrity protection.
EIFS - Extended
Interframe Space
EIFS are found in IEEE 802.11 networks. EIFS unlike SIFS
(Short Interframe Space), PIFS (PCF Interframe Space) and DIFS (DCF
Interframe Space) has a variable value and is only used when there has been
an error in frame transmission. It is not used to control access onto the
radio link.
EIGRP - Enhanced
Interior Gateway Routing Protocol
An advanced version of Interior Gateway Routing Protocol.
It provides superior convergence properties and operating efficiency, and
combines the advantages of link state protocols with those of distance vector
protocols.
EIR - Equipment
Identity Register
The EIR stores IMEI (International Mobile station
Equipment Identity) numbers in order to filter unwanted handsets off the
network. Handsets are “white listed”, “grey listed” or “black listed” as
appropriate and may have their service revoked if they are allocated to the
grey or black list. The GERAN, UTRAN and E-UTRAN systems can all use the EIR.
EIR - Excess Information
Rate
EIR is a component of the bandwidth profile traffic
parameters applicable to a service running over Ethernet networks. It is the
maximum sustained information rate by which a user can exceed its CIR, with
the expectation that the excess traffic may not be carried across the network
due to traffic policing.
EIRP - Equivalent
Isotropically Radiated Power
The unit of measurement of the strength of a radiated
field. Typically that from a radio antenna.
ELF - Extremely
Low Frequency
Extremely Low Frequencies are those frequencies in the
spectrum between 30Hz and 300Hz.
eLTE
eNB - Evolved LTE eNB
The eLTE eNB is the evolution of eNB that supports
connectivity to EPC (Evolved Packet Core) and NGC (Next Generation Core).
EM - Element
Management
Element Management describes the notion of monitoring
specific network elements as part of a service provider’s OSS (Operations
Support Systems) architecture. The management aspect is typically related to
FCAPS (Fault, Configuration, Accounting, Performance, Security) activity. In
a typical network, several EM systems may exist, in relation to both physical
and virtualized network nodes.
eMBB - Enhanced
Mobile Broadband
Enhanced Mobile Broadband is a key part of 3GPP 5G
SMARTER (Services and Markets Technology Enablers). The study started in 2015
and looked at potential 5G requirements, which resulted in more than 70
different use cases, grouped into CriC (Critical Communications), MIoT
(Massive Internet of Things), eMBB (Enhanced Mobile Broadband) and Network
Operation.
eMBMS - Evolved
Multimedia Broadcast Multicast Services
eMBMS introduces broadcast and multicast service delivery
to LTE networks in order to improve the efficiency of delivering identical
content to multiple users simultaneously. Key elements of the eMBMS
architecture include the BMSC (Broadcast Multicast Service Center), the MBMS
Gateway, the MCE (Multi Cell/Multicast Coordination Entity) and the eMBMS
enhanced MME.
eMBMS Gateway
The MBMS gateway is the source of a broadcast/multicast
flow between the core network and the eNBs within the cell sites involved in
the MBMS (Multimedia Broadcast Multicast Service) service. The MBMS Gateway
uses SSM (Source Specific Multicast) techniques to deliver the data stream to
multiple cell sites simultaneously. The MBMS Gateway may be a standalone
network element or may be physically co-located with the combined S-GW/P-GW
(Serving Gateway/PDN Gateway) or the BMSC (Broadcast Multicast Service Center).
EMM - EPS
Mobility Management
In addition to the LTE Active, Idle and Detached states
there also exists various EMM ( EPS Mobility Management) and ECM (EPS
Connection Management) states. The EPS Mobility Management states result from
the mobility management procedures e.g. Attach and Tracking Area Update
procedures. Two EMM states exist, EMM-DEREGISTERED and EMMREGISTERED.
eMOS - estimated
Mean Opinion Score
An estimated MOS is calculated based on measurements
taken in the network, as opposed to being based on a human’s perception of
call quality. Various measurements and factors can be used to contribute to
the eMOS.
eMTC - enhanced
Machine Type Communications
Introduced in Release 13 of the 3GPP specifications, eMTC
is associated with LTE-M, a CIoT (Cellular Internet of Things) technology.
eMTC enhances the 3GPP Release 12 MTC (Machine Type Communications) feature.
EN-DC - E-UTRA
– NR Dual Connectivity
EN-DC is a Dual Connectivity configuration using the EPC,
whereby the master node is a 4G eNB and the secondary node is a 5G en-gNB.
EN-DC - E-UTRA
New Radio Dual Connectivity
EN-DC is a Dual Connectivity configuration using the EPC,
whereby the master node is a 4G eNB and the secondary node is a 5G en-gNB.
eNB - Evolved
Node B
The eNB serves as the base station within the E-UTRAN,
terminating the air interface on the network side. Consequently, the eNB is
responsible for all radio resource management, as well as allocation of user
traffic to the downlink/uplink, security and relaying of higher layer NAS
(Non Access Stratum) signalling to the MME (Mobility Management Entity). The
eNB is also capable of conducting an inter eNB handover procedure via the X2
interface.
Encapsulated PDU
Encapsulated PDU A LAC (Link Access Control) PDU
(Protocol Data Unit) together with the associated overheads required for
error checking.
Encapsulated PDU Fragment
Encapsulated PDU Fragment A PDU (Protocol Data Unit) is
typically to large to transmit across the radio link. Consequently it must be
segmented. This function is performed by the SAR (Segmentation And
Reassembly) Sublayer. At this point the segment is termed an Encapsulated PDU
Fragment. It is passed from the SAR to the MAC (Medium Access Control)
function for coding prior to transmission across the radio link.
Encipher
The process in which a cipher algorithm is employed in
order to protect information from eavesdroppers.
Encoder Tail Bits
A fixed sequence of bits added to the end of a block of
data to reset the convolutional encoder to a predefined state.
Encryption
Encryption is the security mechanism used for the
transformation of data from an intelligible form ( plaintext ) into an
unintelligible form ( ciphertext ), to provide confidentiality. The inverse
process is called decryption.
Encryption Key
An encryption key is a secret password or code string
used as part of the encryption process.
Enhanced Access Channel
Preamble
Enhanced Access Channel Preamble A non data bearing
portion of the Enhanced Access Probe sent by the MS (Mobile Station) to
assist the BS (Base Station) in initial channel acquisition.
Enhanced Access Channel
Slot
The assigned time interval for an enhanced access probe.
An Enhanced Access Channel Slot consists of a number of Enhanced Access
Channel frames. The transmission of an Enhanced Access Probe is performed
within the boundaries of an Enhanced Access Channel slot.
Enhanced Access Data
Enhanced
The data transmitted while in the Basic Access Mode on
the Enhanced Access Channel. This data may also be transmitted while in the
Reservation Access Mode on a Reverse Common Control Channel.
Enhanced Access Header
A control header containing access information
transmitted immediately after the Enhanced Access Channel Preamble. This is
performed while the mobile is in the Reservation Access Mode.
Enhanced Access Probe
An Enhanced Access Channel transmission consisting of an
Enhanced Access Channel Preamble. Both Enhanced Access Header and Enhanced
Access Data may also be sent in the probe.
Enhanced Access Probe
Sequence
A sequence of one or more Enhanced Access Probes on the
Enhanced Access Channel.
Enterprise Server
A Sun Solaris term to describe a suite of server
applications used to support large software solutions used in mission
critical systems.
ENUM - e.164
Number to SIP Address Mapping
ENUM is an IETF Standard (RFC 2916) which maps the public
telephone number address space into the DNS. The DNS resource records can
then be used to map the telephone number(s) into a collection of service
addresses including SIP or H.323 VoIP Addresses.
EOM - End of
Message
ATM (Asynchronous Transfer Mode) signalling message
indicating the last segment that comprises a higher layer message.
EOT - End of
Transmission
Signalling message used to indicate that no more data
will be sent during the current session.
EPC - Evolved
Packet Core
Evolution of the core network started with Release 4.
This provided the starting point for the introduction of IP into the CS
domain of the core network as well as enhancements to enable real time and
non real time services to be successfully integrated onto a common transport
medium. In Release 8 of the 3GPP standards the functionality of the core
network is made flatter with much of the intelligence required to support
service delivery being placed within domains such as the IMS. Consequently
the EPC comprises of the MME (Mobility Management Entity) that performs many
of the mobility functions traditionally provided by the SGSN such as paging,
security and Idle Mode procedures. EPC also includes the S-GW (Serving
Gateway), which replaces the User Plane functionality of the SGSN, as well as
the PDN-GW (Packet Data Network Gateway), which terminates the user plane
within the EPC.
EPDCCH - Enhanced
Physical Downlink Control Channel
Introduced as part of LTE-Advanced, EPDCCH informs
mobiles about the scheduling and resource allocation in an optimized way,
e.g. for a MTC (Machine Type Communications) mobile.
ePDG - evolved
Packet Data Gateway
The ePDG provides access to PS domain services to WLAN
UEs. For interaction with the LTE EPC (Evolved Packet Core), an ePDG (Evolved
PDG) may be utilised. General responsibilities include IP address management,
support for MIP (Mobile IP), QoS enforcement, lawful intercept and security.
EPG - Electronic
Programme Guide
The EPG is the term given to the digital guide which
represents the TV schedule. Typical EPGs are browsable, with respecting to
monitoring TV programming due hours or even days in advance. Interactivity is
also often a feature, allowing the subscriber to set reminders and group
programs into favourite categories.
EPOC
EPOC is an operating system developed by Symbian, Nokia,
Ericsson, Motorola and Panasonic.
EPRE - Energy
Per Resource Element
As part of LTE power control the system determines the
EPRE (Energy Per Resource Element). The term resource element energy denotes
the energy prior to CP insertion. The term resource element energy also
denotes the average energy taken over all constellation points for the
modulation scheme applied.
EPROM - Erasable
Programmable Read-Only Memory
Non-volatile memory chips that are programmed after they
are manufactured, and, if necessary, can be erased by some means and
reprogrammed.
EPS - Evolved
Packet System
EPS is a study group whose objective is to develop a
framework for an evolution or migration of the 3GPP system to a
higher-data-rate, lower-latency, packet-optimized system that supports,
multiple RAT s. It should be noted that this study is also termed SAE (System
Architecture Evolution) and the terms are inter-changeable.
EPS-AKA - EPS –
Authentication and Key Agreement
The security mechanism used in LTE which involves mutual
authentication between the mobile and the network, as well as key
distribution to the devices in the network responsible for encryption and
integrity checking.
Erlang
The Erlang is a measurement of telephone traffic
equivalent to 3600 seconds of telephone use.
ERP - Effective
Radiated Power
The product of the power supplied to the antenna and its
gain relative to a half wave dipole in a given direction.
Erroneous
Packets or frames are usually erroneous due to
transmission errors.
ES-IS - End
System to Intermediate System
In ISO (International Standards Organization) protocol
employed in systems to achieve router detection and address resolution.
ESA - Extended
Service Area
An ESA is an IEEE 802.11 conceptual area in which members
of an ESS (Extended Service Set) may communicate. An ESA is larger than or
equal to a BSA (Basic Service Area) and may involve several BSS (Basic
Service Set) in overlapping or disjointed configurations.
ESInet - Emergency
Services IP network
ESInet is an initiative launched in North America and
Canada associated with the next generation of 911 dialling services. In the
ESInet architecture, Public Safety Answering Points are based on IP
communication, which means that interaction between the user and the PSAP can
be based on communication techniques other than voice, such as messaging and
video.
ESM - EPS
Session Management
The ESM ( EPS Session Management) and EMM (EPS Mobility
Management) entity is a control plane function which supports all aspects of
signalling for PDN (Packet Data Network) session management, such as EPS
Bearer Activation and Modification. In a similar way to UMTS and GPRS , the
LTE system includes various ESM messages that setup and manage the EPS
bearer. The EPS bearer is similar to the PDP Context found in GPRS and UMTS.
ESN - Electronic
Serial Number
ESN – Electronic Serial Number A 32bit number assigned by
the MS (Mobile Station) manufacturer, uniquely identifying the mobile station
equipment. This is similar to the IMEI (International Mobile Equipment
Identity) used on European networks.
ESP - Encapsulating
Security Payload
ESP is a version of IPSec which support encryption,
integrity checking and authentication of each individual IP packet.
ESS - Extended
Service Set
An Extended Service Set is comprised of a number of IEEE
802.11 BSS (Basic Service Set) and enables limited mobility within the WiFi
network. Stations are able to move between BSS within a single ESS yet still
remain connected to the fixed network and so continue to receive emails etc.
As a Station moves into a new BSS, it will carry out a reassociation
procedure with the new AP (Access Point).
ETACS - Extended
Total Access Communications System
Extension of the TACS (Total Access Communications
System) system through the allocation of additional radio channels.
ETC - Establish
Temporary Connection
It is common to physically locate gsmSRF within a stand
alone IP (Intelligent Peripheral). This however requires the service control
in the gsmSCF to establish a connection between the MSC and the IP. This is
achieved using the ETC message between the gsmSCF and gsmSSF which in turn
initiates a traffic channel to be set up between the MSC and the IP.
Ethernet
Baseband LAN (Local Area Network) specification invented
by Xerox Corporation and developed jointly by Xerox, Intel, and Digital
Equipment Corporation. It can be used to connect computers, workstations,
terminals, printers, and other devices located in the same building or
campus.
Ethernet Address
The Ethernet address or MAC (Medium Access Control)
address is assigned to a Network Interface Card. The address comprises of
48bits. The first 24bits are used to identify the manufacturer of the card.
The last 24bits identify the physical interface on the card.
ETSI - European
Telecommunications Standards Institute
Standards body established to coordinate the development
of telecommunications systems within Europe. These systems relate to fixed,
wireless and cellular systems. Recently systems such as GSM and DECT have
been devolved to the 3GPP (Third Generation Partnership Project), a
collaboration of standards bodies including ARIB (Association of Radio
Industries and Businesses) from Japan.
eUICC - Embedded
Universal Integrated Circuit Card
Unlike a standard UICC or SIM, an eUICC is not intended
to be removed or replaced in the cellular device and as such has been
developed to satisfy the IoT market. Profiles can however be changed using
the GSMA’s Remote SIM Provisioning standard enabling IoT Devices to switch
between service providers without physically visiting / switching the SIM.
EUM - eUICC
Manufacturer
This is a term used within the GSMA’s Remote SIM
Provisioning standard to describe the manufacturer of an eUICC or embedded
SIM.
eURLLC - enhanced
URLLC
eURLLC is an enhancement to the URLLC (Ultra Reliable Low
Latency Communication) characteristics of 5G which were introduced in Release
15 of the 3GPP specifications. eURLLC, which was introduced in Release 16,
features latency of under 1ms and reliability beyond 99.999%.
EV-DO - Evolution
Data Optimized
EV-DO has been standardized by the 3GPP2 as part of the
CDMA2000 family of standards. EV-DO is designed to provide broadband
capabilities to mobile subscribers and is considered to be a 3G technology.
eV2X - Enhancement
of V2X
The enhancement of V2X facilitated through the provision
of 5G technology. Use cases include vehicle platooning, automated driving,
extended sensors and remote driving.
Evolved EDGE
Evolved EDGE or EGPRS2 is an evolution of the current
EDGE technology specified by the 3GPP in their Release 7 specifications. It
enables higher data rates, up to 118Kbps, to be supported on both the uplink
and downlink air interfaces. This is achieved through a number of
enhancements including: latency reduction, support of a dual carrier in the
downlink, higher order modulation including 16 QAM and 32QAM, an increase in
symbol rate to 325Ksps and receiver diversity in the mobile.
EVS - Enhanced
Voice Services
EVS is a codec introduced by the 3GPP in Release 12 of
the 3GPP specifications. The codec features several modes of operation,
including Narrowband, Wideband, Super Wideband and Fullband, with data rates
ranging from 5.9kbps through to 128kbps.
Extranet
Intranets are private corporate networks employing
internet technology to provide communication and information services to
employees. Extranets extend some of these services to customers of the
corporation.
F
Link - Fully Associated Link
A Fully Associated Link
connects two signalling end points. F links are not usually used in networks
with STP (Signalling Transfer Points). In networks without STPs F links
directly connect signalling points.
F-BCCH - Fast
Broadcast Control Channel
A logical channel within the broadcast channels of
digital cellular networks as defined by IS-136 (Interim Standard 136).
f-csch - Forward
common signaling logical channel
This channel is analogous to Paging and Synchronization
Channels.
f-dsch - Forward
dedicated signaling logical channel
This channel is analogous to Forward Traffic or
Fundamental Channel.
FA - Foreign
Agent
A Foreign Agent is a node in a MIP (Mobile IP) network
that enables roamed IP users to register on the foreign network. The FA will
communicate with the HA (Home Agent) to enable IP datagrams to be transferred
between the home IP network and the roamed IP user on the foreign network.
FAB - Fulfilment
Assurance and Billing
Within the framework of eTOM (Enhanced Telecoms
Operations Map) Level 1, FAB accounts for 3 of the main elements associated
with the Operations processes relative to the overall business process
framework. Fulfilment involves ensuring that customers are provided with
their requested products in a timely and correct manner. Assurance involves
ensuring that those products meet expectation and are performing
appropriately. Billing involves ensuring that the customer is billed
appropriately for use of the product.
FAC - Final
Assembly Code
The Final Assembly Code forms part of the IMEI
(International Mobile Equipment Identity) and identifies the place of
manufacture or final assembly. It is two digits in length.
FACCH - Fast
Associated Control Channel
The Fast Associated Control Channel appears in place of
the traffic channel when lengthy signalling is required between a GSM mobile
and the network while the mobile is in call. The channel is indicated by use
of the stealing flags in the normal burst. Typical signalling where this may
be employed is during cell handover.
FACH - Forward
Access Channel
A UMTS transport channel that forms the downlink half of
a transport channel pair known as the RACH (Random Access Channel) / FACH
(Forward Access Channel) combination. It is used for downlink signalling and
small quantities of data.
Fade Timer
The process involves the MS (Mobile Station) measuring
the continuity of a Forward Traffic Channel. If the continuity of the channel
is disrupted for a period longer then the Fade Timer then the call is
dropped.
FANR - Fast Ack
Nack Reporting
This term is used in Evolved EDGE or EGPRS2 to describe
the method of reducing latency by piggy backing Ack and Nack messages with
the data blocks.
FAR - Forwarding
Action Rule
The FAR is a rule which can be presented to a user plane
element by a control plane element within either a CUPS (Control and User
Plane Separation of EPC Nodes) or 5G Core network scenario. In particular,
the FAR will provide information on how a particular packet should be handled
(forward, duplicate, drop or buffer).
Fast Ethernet
Fast Ethernet covers any of a number of 100Mbps Ethernet
specifications. Fast Ethernet offers a speed increase of 10 times over that
of the 10BaseT Ethernet specification, while preserving frame format, MAC
(Medium Access Control) mechanisms, and MTU (Maximum Transmission Unit). Such
similarities allow the use of existing 10BaseT applications and network
management tools on Fast Ethernet networks. The protocol is based on an
extension to the IEEE (Institute of Electrical and Electronics Engineers)
802.3 specification.
Fat Client
A Fat Client is a client on which the software
applications reside. This is apposed to a thin client in which the client
uses the application services on the server side of the network.
FBC - Flow
Based Charging
The ability to generate billing records based on a
specific flow of data, such as a streaming movie or voip call.
Fc - Carrier
Frequency
A term used to identify the centre radio carrier
frequency. Most radio systems use multiple carrier frequencies and indicate
to the mobile which one to utilize.
FC - Floor
Control
Floor control is the deterministic mechanism used in
MCPTT to arbitrate between requests that are in contention. On the occasion
where multiple requests to transmit occur then determining which user’s
request is accepted and which ones are rejected or queued are based upon
numerous characteristics, including user priority.
FCAPS - Fault
Configuration Accounting Performance and Security
FCAPS relates to the ISO Telecommunications Management
Network model, which is designed to provide a standardized approach to
network management systems. Where the FCAPS model was largely designed to be
network centric, the newer eTOM Business Process Framework is more business
centric.
FCC - Federal
Communications Commission
Federal Communications Commission is a U.S. government
agency that supervises, licenses, and controls electronic and electromagnetic
transmission standards.
FCCCH - Forward
Common Control Channel
A control channel used for the transmission of control
information from a BS (Base Station) to one or more MS (Mobile Station).
FCCCH Chip
Bit - Forward Common Control Channel Chip Bit
Number of PN (Pseudorandom Noise) chips per Forward
Common Control Channel bit. The PN chips for the various spreading rates are
detailed: Spreading Rate FCCH Chip Bits Rate 1 32 x 1 when data rate =
38400bps 32 x 2 when data rate = 19200bps 32 x 4 when data rate = 9600bps
Rate 3 96 x 1 when data rate = 38400bps 96 x 2 when data rate = 19200bps 96 x
4 when data rate = 9600bps
FCCH - Frequency
Correction Channel
This channel forms part of the GSM broadcast channel. A
frequency correction burst is transmitted on the channel which generates a
beacon 67.7KHz from the cell carrier frequency.
FCH - Fundamental
Channel
A portion of a Traffic Channel that can carry a
combination of primary data, secondary data, signaling and power control
information.
FCH Chip
Bit - Fundamental Channel Chip Bit
The number of PN (Pseudorandom Noise) chips per
Fundamental Channel bit, equal to 1228800/ r b for Spreading Rate 1 and
3686400/ r b for Spreading Rate 3 , where r b is the data rate of the
Fundamental Channel.
FCH
Ec - Fundamental Channel PN bit Energy
Average energy per PN chip for one Forward Fundamental
Channel. Fundamental Channel to the total transmit power spectral density.
FCI - Furnish
Charging Information
This procedure may be associated with CAMEL interaction
for both GSM and GPRS billing functions. When used it instructs the MSC or
SGSN to append 40 Octets (Phase 2) or 160 Octets (Phase 3) of free format
data collated during the Call or GPRS session to the CDR.
FCS - Frame
Check Sequence
A Frame Check Sequence is generated by applying the
destination and source addresses along with the packet payload to a
polynomial function. The remainder of the function is recorded as the FCS and
is added, typically to the trailer of the packet. At the receiving side the
same function is conducted and the resulting remainder compared with the FCS.
If they are the same the packet is valid.
FD - Frame
Delay
FD is a key function for monitoring performance in
Ethernet networks. It is the round trip delay for a frame, defined as being
the time elapsed between the start of transmission of the first bit of the
frame from the source node until reception of the last bit of the loopbacked
frame at the source, with loopback being performed at the frame’s destination
node.
FD-MIMO - Full-Dimension
MIMO
Full-Dimension MIMO is the 3GPP official name for Massive
MIMO. It identifies systems with a large number of radio antenna ports.
FDCCH - Forward
Dedicated Control Channel
A Dedicated Control Channel that is transmitted on the
Forward CDMA (Code Division Multiple Access) Channel.
FDM - Frequency
Division Multiplexing
Frequency Division Multiplexing is a technique in which
the available transmission bandwidth of a circuit is divided by frequency
into narrower bands, each used for a separate voice or data transmission
channel. FDM enables multiple user channels to be carried on one physical
circuit.
FDMA - Frequency
Division Multiple Access
Frequency Division Multiple Access is a technique in
which multiple users of a radio system are separated in the frequency domain.
FDV - Frame
Delay Variation
FDV is a key function for monitoring performance in
Ethernet networks. It is a measure of the variations in the Frame Delay
between a pair of service frames, where the service frames belong to the same
class.
FE - Functional
Entity
A Functional Entity is a generic term for the functions
available in IN. Examples of FE include the SSF (Service Switching Function)
and SCF (Service Control Function).
FEA - Functional
Entity Action
FEA may be chained together to form a FE (Functional
Entity). Their chaining and sequencing within the FE make up the SIB (Service
Independent Building Block).
Feature Group C
Feature Group C is a tradition toll rate service offered
by Local Exchanges Carriers to ATT prior to the breakup of the Bell System.
FEC - Forward
Error Correction
Forward Error Correction techniques pass additional
information along with the user data to the receiver. Any corruption in the
user data can be repaired by use of the additional data. An example of this
is convolutional coding. At the receiving side a Viterbi trellis is used to
check and correct the data as it is received.
FEC - Forwarding
Equivalence Class
FEC is a term used in MPLS networks to describe a set of
incoming packets with similar characteristics, allowing those packets to be
allocated the same label and forwarded down the same LSP (Label Switched
Path). Particular examples could include identical destination addresses or
DSCP (Differentiated Services Code Point) values.
FECN - Forward
Explicate Congestion Notification
A Frame Relay signalling message sent upstream to inform
frame handlers that downstream frame handlers are suffering congestion. This
message will trigger upstream frame handlers to reduce the down stream flow
of frames.
Femto Cell
A Femto Cell, as defined by the 3GPP in their Release 8
specifications, can be simply described as a personal base station which is
sited inside a subscriber’s home or small business. As it is able to provide
targeted coverage, the Femto Cell can significantly increase the bandwidth
available to a mobile within its field of operation. The Femto Cell or HNB
connects to the service provider’s network via a broadband IP network and
HNB-GW. Unlike similar technologies such as UMA , which uses an alternative
radio access technology like WiFi , Femto Cells support standard cellular air
interfaces such as UMTS and CDMA2000.
FFCH - Forward
Fundamental Channel
A Fundamental Channel that is transmitted on the Forward
CDMA (Code Division Multiple Access) Channel.
FFT - Fast
Fourier Transform
OFDM systems utilize a mathematical function called FFT
(Fast Fourier Transform)to generate parallel data streams. This process
relies on a concept termed Discrete Fourier Transform which provides a way of
analyzing the components of a complex waveform. Therefore, the data stream is
first converted from a serial stream into a number of parallel virtual
branches, the number being equal to the number of virtual sub-carriers in
operation in the channel. The appropriate modulation scheme to be employed on
each sub-carrier is selected and the Inverse FFT system will calculate the
characteristics of the combined waveform which in turn is transmitted across
the air interface. At the receiver side, this signal is passed to the FFT
entity which generates the composite virtual data streams which can be
combined to form a copy of the original data stream.
FGA - Feature
Group A
Feature Group A offers access to the LE (Local Exchange)
carrier network through a subscriber line rather than a trunk line.
FGB - Feature
Group B
Similar to FGA (Feature Group A) but offers a superior
connection to the LE (Local Exchange) carrier network.
FH-PHY - Frequency
Hopping Physical Layer
The Frequency Hopping Physical Layer was developed for
IEEE 802.11 to enable multiple networks to coexist in the same frequency band
yet minimize the effect of interference. The system operates by switching the
frequency upon which data is transmitted in a pseudorandom manner. Hence the
term Frequency Hopping. Should one frequency suffer from interference, it
will only effect a very small percentage of the total information since that
frequency will only be utilised occasionally in the hopping sequence. To
support frequency hopping, the 2.4GHz ISM (Industrial Scientific and Medical)
band is divided into 95 channels, each separated by 1MHz. Unfortunately these
channels may not all be available, as different regulatory bodies have
allocated different portions of the ISM band.
FHSS - Frequency
Hopping Spread Spectrum
In FHSS the total frequency band is split into a number
of channels. The broadcast data is spread across the entire frequency band by
hopping between the channels in a pseudo random fashion.
FI - Frame
Information
This field is part of E-UTRA RLC (Radio Link Control) and
indicates different segmentation options for a RLC SDU (Service Data Unit).
FIFO - First-in
First-out
First In First Out is a term used to describe routing
buffers where no QoS (Quality of Service) is applied to packets entering the
router. Packets are treated in the order that they are received by the
router. QoS routers use processes such as weighted fair queuing and weighted
round robin in order to provide QoS to IP packet services.
FIPS - Federal
Information Processing Standard
NIST (National Institute of Standards and Technology)
produces guidelines and standards for the development of federal computer
systems. These standards and guidelines are issued by NIST as FIPS (Federal
Information Processing Standards) for use by government departments.
Firewall
A combination of hardware and software employed to
protect services sitting behind the firewall. Firewalls filter and reject
incoming and outgoing data based on specific criteria programmed into the
firewall. This filtering may be anywhere between Layer 7 and 1 of the OSI
(Open System Interconnection) model.
Firewire
Firewire is a 100Mbps serial connection. It is a six pin
cable with a maximum length of 4.5 meters and is employed to connect video
equipment to data storage drives such as the Personal Computer hard disk. The
standard is defined in IEEE (Institute of Electrical and Electronics
Engineers)1394.
FISU - Fill In
Signalling Unit
The Fill In Signalling Unit acts as flag in TDM (Time
Division Multiplexing) based SS7 (Signalling System No.7) signalling networks
when there is no other information to send. The FISU consists of MTP3
(Message Transfer Part – Level 3) routing information and is sent in place of
flags in idle periods. It also serves to verify the integrity of the link as
the receiving side will performing a FCS (Frame Check Sequence) on the FISU.
FIX - Federal
Internet Exchange
Federal Internet Exchange is a physical connection point
for federal networks such as the MILNET (Military Network), National
Aeronautics and Space Administration, Science Net and the Federal Government
Networks.
Fixed Wireless Local Loop
Based in the 10MHz spectrum these wireless connections
are designed to offer data and speech services to the home user. This
technology is also known as Fixed Radio Access.
Flash
Flash An indication sent on the Reverse CDMA (Code
Division Multiple Access) Channel by the MS (Mobile Station) to invoke
special processing.
Flash memory
This is a special kind of EEPROM (Electrically Erasable
Programmable Read-Only Memory) that can be erased and reprogrammed in blocks
rather that in one byte chunks. It provides non-volatile storage so that
software images can be stored, booted, and rewritten as necessary.
Flash RAM
Very Fast RAM (Random Access Memory).
Flash ROM
ROM (Read Only Memory) that may be reprogrammed.
FLR - Frame
Loss Ratio
FLR is a key function for monitoring performance in
Ethernet networks. It is defined as a percentage of the number of service
frames not delivered in relation to the total number of service frames sent,
during a specific time period.
FM - Frequency
Modulation
Frequency Modulation is a technique in which the
frequency of the carrier is shifted by an amount proportional to the
amplitude of the modulated signal.
FMC - Fixed
Mobile Convergence
Fixed-mobile convergenceis the trend towards seamless
connectivity between fixed and wireless telecommunications networks. The term
also describes any physical network that allows mobile cellular devices to
function smoothly with the fixed network infrastructure. The ultimate goal of
FMC is to optimize transmission of all data, voice and video communications
to and among end users, no matter what their locations or devices.
FMS - First
Missing PDCP Sequence Number
This field is part of E-UTRA PDCP (Packet Data
Convergence Protocol) and indicates the PDCP SN (Sequence Number) of the
first missing PDCP SDU (Service Data Unit).
FMSS - Flexible
Mobile Service Steering
Flexible Mobile Service Steering is a 3GPP feature that
enables efficient steering on the Gi or SGi interfaces. A Service Provider
can utilize information related to the user profile, technology, applications
etc. to define specific traffic steering policies. As such, traffic can be
steered to appropriate enablers , for example a NAT (Network Address
Translation) or firewall.
FN - Frame
Number
The number given to consecutive frames generated by a
transmitter.
FOCC - Forward
Control Channel
The Forward Control Channel is a downlink analogue AMPS
(Advanced Mobile Phone Service) channel. It is used to support paging,
broadcast and access messages to the mobile.
Foreign NID Roamer
If a MS (Mobile Station) is operating in the same SID
(System Identification) but in a different NID (Network Identification) from
the one in which the service was subscribed then it is termed a foreign NID
Roamer.
Foreign SID Roamer
If a MS (Mobile Station) is operating in a SID (System
Identification) other than the one from which service was subscribed then it
is termed a Foreign SID Roamer.
Forward CDMA Channel
A CDMA (Code Division Multiple Access) Channel from a BS
(Base Station) to MS (Mobile Station). This channel typically contains one or
more code channels that are transmitted on a CDMA Frequency Assignment.
FP - Frame
Protocol
Frame Protocol is the user plane protocol for the Iur and
Iub interfaces, facilitating the transferral of Transport Channels.
FPCH - Forward
Pilot Channel
A direct sequence spread spectrum signal transmitted
continuously by each CDMA (Code Division Multiple Access) BS (Base Station).
The Forward Pilot Channel allows a MS (Mobile Station) to acquire the timing
of the Forward CDMA Channel. It also provides a phase reference for coherent
demodulation, and provides a means for comparing the signal strength of
neighbouring base stations during the handoff process. The pilot PN
(Pseudorandom Noise) sequence time phase is used to identify an individual
BS.
FPLMN - Future
Public Land Mobile Network
A term used to describe the future makeup of mobile
networks. These may be fourth or fifth generation systems.
FQDN - Fully
Qualified Domain Name
A FQDN is a term used to describe the absolute location
of a node within the DNS (Domain Name System). FQDNs allow DNS to trace the
address of a network node such as a server through the DNS tree hierarchy to
a Top Level Domain and eventually to the root nameserver.
FQI - Frame
Quality Indicator
A parameter to indicate if a frame has been corrupted.
This signaling message may also indicate where in the system the frame became
corrupted. This may be over the radio connection or during a specific
processing task.
Frame
A frame typically resides at Layer 2 , the data link
layer, of the OSI (Open System Interconnection) seven layer model. The frame
relates to the header and trailer that surround the higher layer PDU
(Protocol Data Unit). Typical frames include HDLC (High Level Data Link
Control) in which the frames are delineated by flags which consist of zero
followed by six ones and then a zero. No other bit sequence in the flow will
have this combination. To avoid this combination at any other time bit
stuffing is used.
Frame Category
Frame Category A classification of a received Traffic
Channel. The frame classification is based upon transmission data rate, frame
content and detected errors. Typical examples include primary traffic,
secondary traffic, and signaling traffic.
Frame Offset
Frame Offset A time offset mechanism to skew Traffic
Channel frames from System Time in integer multiples of 1.25ms. The maximum
frame offset is 18.75ms.
Frame Relay
Frame Relay services are based on Broadband ISDN. The
system supports very basic frames consisting of a logical channel address
known as a DLCI.(Data Link Connection Identifier). Frame handlers switch the
logical channels based on switching tables populated through signalling or
network management functions. Frames are variable in length with the maximum
payload of 4,096 octets.
Framing Protocol
Framing Protocol A protocol used in UMTS on the Iur and
Iub interfaces to frame channels supported between the SRNC (Serving Radio
Network Controller) and UE (User Equipment).
FSCCH - Forward
Supplemental Code Channel
A Supplemental Code Channel that is transmitted on the
Forward CDMA (Code Division Multiple Access) Channel.
FSK - Frequency
Shift Keying
In Frequency Shift Keying the carrier frequency is
shifted between distinct frequencies. A common shift pattern is between two
frequencies one representing a zero and the other a one.
FTCH - Forward
Traffic Channel
One or more code channels used to transport user and
signaling traffic from the BS (Base Station) to the MS (Mobile Station).
FTFPCH - Forward
Transmit Diversity Pilot Channel
A pilot channel transmitted by a CDMA (Code Division
Multiple Access) BS (Base Station) from the non primary antenna when
orthogonal transmit diversity is employed.
FTP - File
Transfer Profile
The File Transfer Profile enables Bluetooth devices to
exchange files in a generic way.
FTP - File
Transfer Protocol
A client server application protocol using well known
ports 20 and 21. It uses the services of TCP (Transmission Control Protocol)
to provide reliability in the transfer of data files between network nodes.
FTP was first defined as a standard in RFC (Request for Comments) 959.
FTTx - Fibre To
The x
FTTx essentially stands for Fibre to the most economical
point, with respect to the significant cost of deploying a fibre optic
network. The point may be the customer premises, as in the case of FTTH
(Fibre To The Home), or may be the street cabinet, as in the case of FTTN
(Fibre To The Node). Either way, provision of FTTx connectivity is the
ultimate solution for providing extremely high capacity bandwidth to the
consumer.
Full Duplex
A bearer capable of simultaneous transmission between
both hosts partaking of the session. TCP (Transmission Control Protocol) is
an example of a full duplex session.
Full
TMSI - Full Temporary Mobile Subscriber Identity
The combination of TMSI Zone and TMSI. The full TMSI is a
globally unique address for the MS (Mobile Station).
Fuzzy Logic
Fuzzy logic is a precise sub form of mathematics in which
human thinking can be simulated through mathematical models.
FWA - Fixed
Wireless Access
FWA is a variety of wireless broadband, where a radio
link is employed as a bearer for voice and data, rather than the traditional
bearers such as copper and fibre.
G
Recommendation Series
The G series of ITU-T
(International Telecommunications Union-Telecommunication Standardization
Sector) specifications defines transmission facilities. Examples of these
facilities include E1 bearers, SDH (Synchronous Digital Hierarchy) and xDSL
(Digital Subscriber Line technologies).
G.703
ITU-T (International Telecommunications
Union-Telecommunication Standardization Sector) standard G.703 specifies the
electrical and physical characteristics of digital interfaces. These start
with the E1 and T1 rates employed in Europe and the USA respectively.
G.704
ITU-T (International Telecommunications
Union-Telecommunication Standardization Sector) standard G.704 defines the
frame structure for the primary and secondary hierarchy levels.
G.707
ITU-T (International Telecommunications
Union-Telecommunication Standardization Sector) standard G.707 defines the
bit rates that may be supported by SDH (Synchronous Digital Hierarchy).
G.708
ITU-T (International Telecommunications
Union-Telecommunication Standardization Sector) standard G.708 defines the
SDH (Synchronous Digital Hierarchy) NNI (Network to Network Interface).
G.711
ITU-T (International Telecommunications
Union-Telecommunication Standardization Sector) standard G.711 defines the
algorithms for the transmission and reception of PCM (Pulse Code Modulation)
data.
G.723.1
ITU-T (International Telecommunications
Union-Telecommunication Standardization Sector) standard G.723.1 defines
codecs for low bit rate speech. The bit rates are 5.3Kbps and 6.3Kbps and are
rates employed in VoIP (Voice over IP) systems such as H.323 and SIP (Session
Initiation Protocol).
G.726
ITU-T (International Telecommunications
Union-Telecommunication Standardization Sector) standard G.726 defines ADPCM
(Adaptive Differential Pulse Code Modulation) algorithms which support speech
rates of 40Kbps, 32Kbps, 24Kbps and 16Kbps.
G.729
ITU-T (International Telecommunications
Union-Telecommunication Standardization Sector) standard G.729 is the codec
standard for speech rates of 8kbps, 6.4kbps and 11.4kbps. This is the codec
supported in many mobile cellular systems.
G.804
ITU-T (International Telecommunications
Union-Telecommunication Standardization Sector) standard G.804 specifies the
mapping of ATM (Asynchronous Transfer Mode) cells into PDH (Plesiochronous
Digital Hierarchy) systems.
G.990
ITU-T (International Telecommunications
Union-Telecommunication Standardization Sector) standard G.990 specifies the
requirements for enabling Mbps rates on traditional copper telephone lines.
These standards form the basis for DSL (Digital Subscriber Line) based
systems.
Ga Interface
The Ga interface is a GPRS interface which is located
between the GSN (GPRS Support Nodes) and CGF (Charging Gateway Function).
GACSR - Generic
Access Circuit Switched Resource
The term GA-CSR defines a protocol found within the GANC
and MS of a network supporting Generic Access – formerly UMA. It is
responsible for the bearer establishment, paging, ciphering configuration etc
during circuit switched operation.
GAN - Generic
Access Network
The term GAN is used to define an access network
conforming to the 3GPP Release 6 specifications. Formally, this was referred
to as a UMAN and the two unlicensed radio technologies were defined as WiFi
and Bluetooth.
GANC - Generic
Access Network Controller
Formerly referred to as a UNC , the GANC forms part of
the 3GPP Release 6 GAN. It provides the connection between the mobile and the
MSC / SGSN over the generic IP access network and in so doing, supports both
the A and Gb interfaces towards the core network. The GANC also contains the
SEGW.
GAPSR - Generic
Access Packet Switched Resource
The term GA-PSR defines a protocol found within the GANC
and MS of a network supporting Generic Access – formerly UMA. It is
responsible for the delivery of GPRS signalling, SMS transfer, paging, flow
control and GPRS transport channel management in addition to the transfer of
GPRS user plane data.
GARC - Generic
Access Resource Control
The term GA-RC defines a protocol found within the GANC
and MS of a network supporting Generic Access (Originally UMA). It is
responsible for the discovery and registration process which takes place
between the mobile and the GANC.
Gating Rate Set
This specifies the set of supported reverse pilot gating
rates. The BS (Base Station) and the MS (Mobile Station) may support one or
more gating rates.
Gaussian Noise
Gaussian noise also known as white noise or thermal noise
was first defined by Karl Gauss the German mathematician. Gaussian noise is
evenly distributed across the entire range of frequencies.
GAVDP - Generic
Audio/Video Distribution Profile
The Generic Audio/Video Distribution Profile is used in a
Bluetooth device for the distribution of audio/video content using an ACL
(Asynchronous Connectionless Link) channel.
Gb Interface
The Gb interface is a GPRS interface which is located
between the SGSN (Serving GPRS Support Node) and the PCU (Packet Control
Unit).
GBR - Guaranteed
Bit Rate
In LTE Dedicated bearers carry traffic for IP flows that
have been identified to require a specific packet forwarding treatment.
Dedicated bearers can be either GBR (Guaranteed Bit Rate) or non-GBR. A GBR
bearer has a guaranteed bit rate and MBR (Maximum Bit Rate) while more than
one non-GBR bearer belonging to the same UE shares an AMBR (Aggregate Maximum
Bit Rate). Non-GBR bearers can suffer packet loss under congestion while GBR
bearers are immune to such losses. Consequently these bearers are generally
subject to admission control within the network.
Gc Interface
The Gc interface is a GPRS interface which is located
between the GGSN (Gateway GPRS Support Node) and the HLR (Home Location
Register).
GCAC - Generic
Connection Admission Control
Generic Connection Admission Control is the process at
the UNI (User to Network Interface) in an ATM (Asynchronous Transfer Mode)
network that assesses if sufficient resources are available within the
network to support the requested service.
GCP - Gateway
Control Protocol
Also known as H.248 and occasionally MEGACO, GCP is the
control protocol used between a Media Gateway Control Function and a Media
Gateway.
GCRA - Generic
Cell Rate Algorithm
Generic Cell Rate Algorithm is used to assess conformance
of data entering the ATM (Asynchronous Transfer Mode) network at the UNI
(User to Network Interface). The input of ATM cells is based on a QoS
(Quality of Service) contract agreed between the customer and the network
provider; the GCRA ensures this contract is adhered to by traffic shaping. If
the flow does not conform to the agreed contract, the ATM switch may drop the
non conforming cells.
GD - Graceful
Discard
Graceful Discard is a Frame Relay term in which frames
above the committed frame rate may be dropped to avoid network congestion. It
is termed graceful since this process is agreed between the network provider
and network user. The Frame Relay network will support information up to the
committed information rate; above this rate, cells may be dropped.
GE - Gigabit
Ethernet
Gigabit Ethernet is the Ethernet standard offering
Gigabit services. The standard typically employs fibre but can be supported
on Cat 6 cable. This technology until now has been used for campus style
backbone networks; it is now finding its way to the desktop for high end
servers and intensive graphical applications.
GEO - Geostationary
Earth Orbit
Geostationary Earth Orbit is an orbit 22,237 miles above
the Earth surface. Satellites are launched into this orbit and rotate with
the Earth such that the satellite footprint remains in the same place across
the Earth’s surface.
GERAN - GSM
EDGE Radio Access Network
The GSM Edge Radio Access Network supporting the EDGE
(Enhanced Data rates for Global Evolution) modulation technique has been
specified to connect the A , Gb and Iu interfaces to the CN (Core Network).
The architecture allows two BSS (Base Station Subsystem) to be connected to
each other.
GF - Gate
Function
A GF is used in the provision of SBLP (Service Based
Local Policy) in order to allow or prevent flows of data based on classifiers
such as destination IP address and port. The GF is typically positioned in
the access network and opened/closed by a PDF (Policy Decision Function) in
the core.
Gf Interface
The Gf interface is a GPRS system interface which is
located between the SGSN (Serving GPRS Support Node) and the EIR (Equipment
Identity Register).
GFBR - Guaranteed
Flow Bit Rate
The GFBR is used in 5G to define the expected bit rate
that a GBR (Guaranteed Bit Rate) QoS Flow can provide.
GFC - Generic
Flow Control
Generic Flow Control is employed in the header of the ATM
(Asynchronous Transfer Mode) cell at the UNI (User to Network Interface)
interface. It is used to define a multiplicity of users at a common
interface.
GGSN - Gateway
GPRS Support Node
The Gateway GPRS Support Node supports the edge routing
function of the GPRS network. To external packet data networks the GGSN
performs the task of an IP router. Firewall and filtering functionality, to
protect the integrity of the GPRS core network, are also associated with the
GGSN along with a billing function.
Gi Interface
The Gi Interface is a GPRS interface which is located
between the GGSN (Gateway GPRS Support Node) and the external PDN (Public
Data Network).
GIAC - General
Inquire Access Code
The General Inquire Access Code is the default inquiry
code which is used to discover all Bluetooth devices in range.
GIBA - GPRS IMS
Bundled Authentication
An authentication mechanism which is an interim solution
for devices which are not fully compliant with IMS AKA. A user’s IP address
which has been allocated when they establish a PDP Context is passed to the
HSS and linked to their private/public ID. Future requests to the IMS must
come from the same IP address in order
GIF - Graphics
Interchange Format
Graphics Interchange Format is a format for compressing
images, logos and drawings. The format supports 256 colours and file sizes
are typically just a few kilobits. They are normally used in web based
information due to the low download speeds required by these services.
GIX - Global
Internet Exchange
Global Internet Exchange are points within the Internet
where networks are physically connected together. The physical connection is
typically a Gigabit Ethernet connection.
GLMS - Group
List Management Server
An IMS Application Server responsible for managing and
storing the group lists associated with social presence. Each subscriber will
have a group list which they can manage at the GLMS, typically using XCAP.
GLR - Gateway
Location Register
The GLR (Gateway Location Register) is a node between the
VLR (visitor Location Register) and/or SGSN (Serving GPRS Support Node) and
the HLR (Home Location Register), which may be used to optimise the location
updating and the handling of subscriber profile data across network
boundaries. When a subscriber is roaming the GLR plays the role of the HLR
towards the VLR and SGSN in the visited network and the role of the VLR and
SGSN towards the HLR in the home network.
GMDSS - Global
Maritime Distress and Safety System
GMDSS was developed as part of the Safety of Life at Sea
convention. GMDSS covers the globe using four defined sea areas, and in
conjunction with shore based systems provides a far more robust safety system
than the legacy Morse Code systems.
GMLC - Gateway
Mobile Location Centre
GMLC – Gateway Mobile Location Centre The Gateway Mobile
Location Centre contains functionality required to support LCS (LoCation
Services). In one PLMN (Public Land Mobile Network), there may be more than
one GMLC. The GMLC is the first node an external LCS client accesses in a GSM
or UMTS network. The GMLC may request routing information from the HLR (Home
Location register) or HSS (Home Subscriber Server). After performing
registration authorization, it sends positioning requests to either the VMSC
(Visited Mobile Switching Centre), SGSN (Serving GPRS Support Node) or MSC
(Mobile Switching Centre) Server and receives final location estimates from
the corresponding entity.
GMM - GPRS
Mobility Management
GPRS MM is a sublayer of the Layer 3 connectivity between
the mobile and the GPRS core network, providing services which support the
mobility of user terminals, as well as location reporting when required.
Additional features include providing user identity confidentiality, along
with authentication and ciphering negotiation.
GMPLS - General
Multiprotocol Label Switching
General Multi Protocol Label Switching is applied to MPLS
signalling that is used not only to support packet based paths but other
technologies such as Optical MUX (Multiplexer), ATM (Asynchronous Transfer
Mode) and Frame Relay switches.
GMSC - Gateway
Mobile Switching Centre
A Gateway Mobile Switching Centre provides an edge
function within a PLMN (Public Land Mobile Network). It terminates the PSTN
(Public Switched Telephone Network) signalling and traffic formats and
converts this to protocols employed in mobile networks. For mobile terminated
calls, it interacts with the HLR (Home Location Register) to obtain routing
information.
GMSK - Gaussian
Minimum Shift Keying
Gaussian Minimum Shift Keying is the modulation technique
used in GSM networks. It employs a form of FSK (Frequency Shift Keying). GMSK
was chosen because it provides good spectral efficiency.
Gn Interface
The Gn interface is a GPRS interface which is located
between the GSN (GPRS Support Nodes).
gNB - Next
Generation Node B
The gNB is a 3GPP 5G Next Generation base station which
supports the 5G New Radio.
GOEP - Generic
Object Exchange Profile
In the Bluetooth system, the Generic Object Exchange
Profile defines the set of procedures and messages to be used by applications
handling object exchanges. The GOEP has three main features which are:
Establishing an Object Exchange session, Pushing a data object and Pulling a
data object. An example of GOEP in action could be a file transfer and
synchronisation between such devices as mobile phones, portable PC and PDA
(Personal Digital Assistant).
Gold Codes
Gold codes were developed by Robert Gold. These codes
possess pseudo random properties ensuring both favourable auto and cross
correlation characteristics. Such codes are used in direct sequence spread
spectrum systems such as UMTS in order to describe channels across the radio
interface.
Good Message
A received message is declared a good message if it is
received with a correct CRC (Cyclic Redundancy Code).
GOS - Grade of
Service
Grade of Service defines the quality of a telephone
service in terms of a user receiving a network busy signal.
GP - Guard
Period
In LTE , the radio frame structure type 2 is used for TDD
operation and consists of two half-frames with a duration of 5ms each and
containing each 8 slots of length 0.5ms and three special fields ( DwPTS , GP
and UpPTS ) which have configurable individual lengths and a total length of
1ms. The GP is between the DwPTS and the UpPTS.
Gp Interface
When the GGSN (Gateway GPRS Support Node) and the SGSN
(Serving GPRS Support Node) are located in different networks, they may be
interconnected via the Gp interface. This interface provides similar
functionality to that of the Gn interface, however it usually includes extra
security functionality which is based on mutual agreements between operators.
GPRS - General
Packet Radio Service
GPRS is defined by 3GPP ( Third Generation Partnership
Project) and is employed to connect mobile cellular users to PDN (Public Data
Network). Within the GSM network it shares the network databases and radio
access network and employs functions known as the PCU (Packet Control Unit),
SGSN (Serving GPRS Support Node) and GGSN (Gateway GPRS Support Node) to
provide packet switching data services across the fixed and radio network.
GPRS offers packet data bearers within 3G networks. The functions of the SGSN
and GGSN are the same as those in the GSM network. The difference is the
capability of the radio access network. The RNC (Radio Network Controller)
supports RAB (Radio Access Bearer) that can support real time bearer services
in the region of 100Kbps to 300Kbps. Furthermore, with the introduction of
HSPA , this figure can approach 3Mbps. Billing for GPRS services is typically
based on volumes, although a number of service providers around the globe
have adopted a fixed fee, unlimited download model.
GPRS-CSI - GPRS-CAMEL
Subscription Information
The inclusion of GPRS-CSI in the HLR is an indication
that the user has subscribed to GPRS CAMEL Services. It includes: gsmSCF
Address – this is the identity of the CSE (CAMEL Service Environment) to be
used for service interaction i.e. the gsmSCF. It is made up of a global
address enabling visited networks to identify the gsmSCF and route signalling
accordingly. Service Key – the CSI also contains information related to the
OSS of the subscriber and is termed the Service Key. This is used to identify
the service logic to be used by the gsmSCF. It is administered by the HPLMN
and is passed transparently by the VPLMN / IPLMN to the gsmSCF. Default Call
Handling – this indicates whether the call shall be released or continued
when there is an error in the dialogue between the gprsSSF and gsmSCF. An
example of this maybe when the requests from the gprsSSF are not acknowledged
by the gsmSCF despite repeated re-transmissions. Each Service Key has a
default call handling setting associated with it. TDP (Trigger Detection
Point) List – this indicates at which detection point CAMEL triggering will
take place.
gprsSSF - GPRS
Service Switching Function
The SSF and SCF functions within GSM are termed the
gsmSSF and gsmSCF. These are interconnected by CAP (CAMEL Application Part)
interfaces which in turn utilize the services of SS7 (Signalling System No.7)
to transport the CAMEL information flows. The functionality of the CAMEL
Service Environment defined in Phase 3 enables the gsmSCF to interact with
GPRS. This interaction is made possible through the addition of the gprsSSF
which resides at the SGSN.
GPS - Global
Positioning System
Global Positioning System comprises of multiple
satellites all of which orbit the earth twice a day. Users with a GPS
receiver use timing information from the satellites in order to triangulate
their position on the earth surface. The more accurate military system has
now been enabled for civilian use, giving location fixes to within 10 meters.
GPSI - Generic
Public Subscription Identifier
The GPSI is used as a means of addressing a 3GPP
subscription in data networks outside the realms of a 3GPP system. GPSIs are
public identifiers such as a MSISDN or an External Identifier.
Gr Interface
The Gr interface is a GPRS interface which is located
between the SGSN (Serving GPRS Support Node) and the HLR (Home Location
Register).
GRE - Generic
Routing Encapsulation
Generic Routing Encapsulation is an IP based term applied
to the encapsulation of IP datagrams tunnelled through an internet. The
encapsulation includes security, typically in the form of IPSec , and is most
commonly found in VPN (Virtual Private Network) implementations.
Group 1 Fax
The Groups relate the speed and sophistication of the fax
machine. The standards were developed by the ITU-T (International
Telecommunications Union-Telecommunication Standardization Sector) in order
that fax machines from different manufactures could communicate. Group 1 fax
machines transmit on 8.5 by 11 inch paper at a rate of six pages per minute
and conform to the T2 ITU-T standard.
Group 2 Fax
The Groups relate the speed and sophistication of the fax
machine. The standards were developed by the ITU-T (International
Telecommunications Union-Telecommunication Standardization Sector) in order
that fax machines from different manufactures could communicate. Group 2 fax
machines transmit on 8.5 by 11 inch paper at a rate of three pages per minute
and conform to the T3 ITU-T standard.
Group 3 Fax
The Groups relate the speed and sophistication of the fax
machine. The standards were developed by the ITU-T (International
Telecommunications Union-Telecommunication Standardization Sector) in order
that fax machines from different manufactures could communicate. Group 3 fax
is the most common type of fax machine transmitting on A4 paper. The machine
scanning format is digital and operates at rates between 9.6Kbps and
14.4Kbps.
Group 4 Fax
The Groups relate the speed and sophistication of the fax
machine. The standards were developed by the ITU-T (International
Telecommunications Union-Telecommunication Standardization Sector) in order
that fax machines from different manufactures could communicate. Group 4
faxes operate on a 64Kbps ISDN (Integrated Services Digital Network) B
Channel. Consequently, unlike Group 3 faxes, the digital scan information is
not converted into an analogue signal.
GRUU - Globally
Routable User agent URI
A GRUU is a IETF (Internet Engineering Task Force) term
which describes an addressing scheme that associates an IMS Public Identity
to the address of a particular UE (User Equipment). Using a GRUU, S-CSCF
(Serving Call Session Control Function) will not have to fork requests to
multiple UE registered to the same Public Identity.
GRX - GPRS
Roaming eXchange
The Gp Interface connects PLMN (Public Land Mobile
Network) together. This interface is IP based and must support appropriate
routing and security protocols to enable a subscriber to access its home
services from any of its home PLMN’s roaming partners. Many GPRS
operators/carriers have abstracted these functions through the GRX (GPRS
Roaming eXchange). This function is typically provided by a 3rd party IP
network offering VPN (Virtual Private Network) services that connects all the
roaming partners together. The GRX service provider ensures all aspects of
routing and security between the networks are optimized for efficient
operation.
Gs Interface
The Gs Interface is a GPRS interface which is located
between the SGSN (Serving GPRS Support Node) and the MSC (Mobile Switching
Centre).
GSM - Global
System for Mobile communication
The Global System for Mobile communications is a second
generation cellular telecommunication system which was first planned in the
early 1980s. Unlike first generation systems operating at the time, GSM was
digital and thus introduced greater enhancements such as security, capacity,
quality and the ability to support integrated services. Initially, GSM was
planned to be a European system allowing subscribers to roam between
different networks however, GSM was quickly adopted by many other regions and
is now a Global System. Many countries around the world have now met market
saturation point, which means over 100% of the population of that country
possess a GSM phone.
GSM Phase 2+ Service
GSM Phase 2+ Service Phase 2+ offers enhanced bearer
services in terms of enhanced full rate data at 14.4Kbps, HSCSD (High Speed
Circuit Switched Data) and GPRS. Additional supplementary services are also
included.
GSM R - Global
System for Mobile communications Railway
GSM-R is a European standard for Railway communications
based on the GSM standard. This system is designed to support all radio
applications required for railway operations, including speech, data and
control communication.
GSM1800
The Global System for Mobile communications (GSM) is a
second generation cellular telecommunication system which was first planned
in the early 1980s. Unlike first generation systems operating at the time,
GSM was digital and thus introduced greater enhancements such as security,
capacity, quality and the ability to support integrated services. Initially,
GSM was planned to be a European system allowing subscribers to roam between
different networks however, GSM was quickly adopted by many other regions and
is now a Global System. Many countries around the world have now met market
saturation point, which means over 100% of the population of that country
possess a GSM phone. The spectrum range for the GSM1800 operation is between
1710MHz and 1785MHz for uplink operation and 1805MHz and 1880MHz for downlink
operation. GSM 1800 is also termed PCN (Personal Communication Network) and
DCS (Digital Cellular System) 1800.
GSM1900
The Global System for Mobile communications (GSM) is a
second generation cellular telecommunication system which was first planned
in the early 1980s. Unlike first generation systems operating at the time,
GSM was digital and thus introduced greater enhancements such as security,
capacity, quality and the ability to support integrated services. Initially,
GSM was planned to be a European system allowing subscribers to roam between
different networks however, GSM was quickly adopted by many other regions and
is now a Global System. Many countries around the world have now met market
saturation point, which means over 100% of the population of that country
possess a GSM phone. The spectrum range for the GSM1900 operation is between
1850MHz and 1910MHz for uplink operation and 1930MHz and 1990MHz for downlink
operation. GSM1900 is also known as PCS (Personal Communication System) 1900.
GSM900
The Global System for Mobile communications (GSM) is a
second generation cellular telecommunication system which was first planned
in the early 1980s. Unlike first generation systems operating at the time,
GSM was digital and thus introduced greater enhancements such as security,
capacity, quality and the ability to support integrated services. Initially,
GSM was planned to be a European system allowing subscribers to roam between
different networks however, GSM was quickly adopted by many other regions and
is now a Global System. Many countries around the world have now met market
saturation point, which means over 100% of the population of that country
possess a GSM phone. The spectrum range for the GSM900 operation is between
890Mhz and 915MHz for uplink operation and 935Mhz and 960MHz for downlink
operation.
gsmSCF - GSM
Service Control Function
The gsmSCF defines the IN control environment for a
mobile network and has been enhanced to enable interworking with GSM/GPRS
systems. The gsmSCF also stores the service logic associated with IN
services.
gsmSRF - GSM
Specialized Resource Function
The gsmSRF enables user interaction with the service and
is controlled by the gsmSCF (GSM Service Control Function). This may trigger
the gsmSRF to play announcements collect numbers (e.g. a PIN or account
number) collect voice commands etc.
gsmSSF - GSM
Service Switching Function
The gsmSSF (GSM Service Switching Function) function
interworks with the MSC/VLR and the GMSC. Based on information defined in the
users subscription and sent from the HLR to the VLR triggers within the MSC
and gsmSSF can be set. These triggers are used to dictate when the gsmSSF
will communicate with the gsmSCF. This in turn will determine how IN based
services are handled.
GSN - GPRS
Support Node
This is a term which is used to include both GGSN
(Gateway GPRS Support Node) and SGSN (Serving GPRS Support Node).
GT - Global
Title
The Global Title is an address used for routing in an SS7
network. The GT is used by the higher levels of SS7 (ISUP (ISDN User Part)
TUP (Telephone User Part) SCCP (Signalling Connection Control Part) etc.)
however a translation to point code is required at MTP (Message Transfer
Part). The SCCP translation will also provide a SSN (Subsystem Number).
GTP - GPRS
Tunnelling Protocol
GPRS Tunnelling Protocol is employed on the Gn interface
in order to tunnel user data between different GSN (GPRS Support Node).
Version zero of the protocol supports both signalling and user data under one
generic header. It can be used with UDP (User Datagram Protocol) or TCP
(Transmission Control Protocol) on the registered port 3386. GTP version one
is used only on UDP. The control plane protocol GTP-C (Control) using
registered port 2123 and the user plane protocol GTP-U (User) using
registered port 2152.
GTP-C - GPRS
Tunnelling Protocol Control
GPRS Tunnelling Protocol – Control plane messages are
exchanged between GSN (Gateway Support Node) in a path. The control plane
messages are used to transfer GSN capability information between GSN pairs,
to create, update and delete GTP tunnels and for path management.
GTP-U - GPRS
Tunnelling Protocol User
GPRS Tunnelling Protocol – User plane messages are
exchanged between GSN (Gateway Support Node) pairs or GSN/ RNC (Radio Network
Controller) pairs in a path. The user plane messages are used to carry user
data packets, and signalling messages for path management and error
indication.
GTP’ - GTP
Prime
The GTP’ charging protocol is optional. GPRS nodes
generate CDR (Call Detail Record). These CDR are to be collected by the CGF
(Charging Gateway Function). The protocol GTP’ has been designed to provide
this CDR transfer.
GTPv1-C - GPRS
Tunnelling Protocol version 1 – Control
GTPv1-C is the control protocol used to establish, manage
and release GTPv1-U tunnels, particularly as part of PDP (Packet Data
Protocol) Context activation and management procedures on the Gn and Gp
interfaces.
GTPv1-U - GPRS
Tunnelling Protocol v1 – User
GTPv1-U is used to tunnel user plane data between
different network nodes e.g. on the Gn, Gp, S1-U and S5 interfaces. GTPv1-U
is used with UDP (User Datagram Protocol) and IPv4/IPv6 as supporting layers.
In order to multiplex multiple users onto the same transport bearer (port/IP
address), TEIDs (Tunnel Endpoint Identifier) are used to differentiate one
traffic stream from another (the TEID is simply a numerical identity which
has to be unique for a given traffic stream). The receiving end side of a GTP
tunnel locally assigns the TEID value that the transmitting side must use and
vice versa, assuming bidirectional transmission. TEIDs will be negotiated
during the establishment of the GTP tunnel, which is achieved using GTP-C
(GPRS Tunnelling Protocol – Control).
GTPv2 - GPRS
Tunnelling Protocol version 2
In LTE , GTP (GPRS Tunnelling Protocol) tunnels are used
between two nodes communicating over a GTP based interface, to separate
traffic into different communication flows. A GTP tunnel is identified in
each node with a TEID (Tunnel Endpoint Identifier), an IP address and a UDP
port number. The receiving end side of a GTP tunnel locally assigns the TEID
value the transmitting side has to use. The GTPv2 include an updated control
plane which enables control messages to be passed between the MME , S-GW , PDN
GW etc.
GTPv2-C - GPRS
Tunnelling Protocol v2 – Control
GTPv2-C is a control plane protocol typically found on
interfaces in the EPC (Evolved Packet Core), such as the S11 and S5
interfaces. GTPv2-C’s primary roles include the establishment, modification
and termination of EPS (Evolved Packet System) bearers across the EPC, both
Default and Dedicated.
GTT - Global
Title Translation
The routing address within an ISDN network is termed the
point code. Global titles identify end terminals that may be beyond the ISDN
network. To route information the Global Title is translated into a point
code this is typically conducted at a STP (Signalling Transfer Point).
GUAMI - Globally
Unique AMF ID
The GUAMI is used to uniquely identify an AMF within a 5G
network. It is comprised of the MCC (Mobile Country Code), MNC (Mobile
Network Code), AMF Region ID, AMF Set ID and AMF Pointer.
Guardband
A guardband is a narrow frequency band between adjacent
channels. Guardbands are usually employed in FDM (Frequency Division
Multiplexing) systems to avoid adjacent channel interference.
GUI - Graphical
User Interface
Graphical User Interface was the term coined when windows
based operating systems were integrated with mouse operation. The concept of
buttons, scroll bars and point and click operations have enhanced the
interface. This type of interface is deemed far more user friendly than the
traditional command line and has opened the use of computers to many more
users.
GUMMEI - Globally
Unique MME Identifier
The GUTI (Globally Unique Temporary Identity) has two
main components, the GUMMEI (Globally Unique MME Identifier) that uniquely
identifies the MME that allocated the GUTI and the M-TMSI (M-Temporary Mobile
Subscriber Identity) that provides for an unambiguous identity of the UE
within this MME.
GUP - Generic
User Profile
The objective of the GUP (Generic User Profile) is to
provide a conceptual description to enable harmonized usage of the
user-related information located in different entities. That is, subscriber
information held across a number of databases can be collated and accessed in
a uniform manner using the GUP architecture.
GUTI - Globally
Unique Temporary ID
In LTE the GUTI is allocated to the UE by the MME and has
two components. These are the GUMMEI (Globally Unique MME ID) and the M-TMSI
(MME-TMSI). While the GUMMEI identifies the MME, the M-TMSI identifies the UE
within the MME.
GZIP
GZIP is a free compression algorithm employed on
operating systems such as Linux , UNIX and Windows in order to reduce the
size of files for storage and transmission. Other popular compression systems
include WinZip, and PKZip.
H
Channel
The H channel is a
primary rate ISDN interface designed for video conferencing. The channel
rates vary between 384Kbps and 1,920Kbps. The H channels are achieved by
ganging together basic 64Kbps ISDN channels.
H.221
H.221 is a framing recommendation and is part of the
ITU-T (International Telecommunications Union-Telecommunication
Standardization Sector) H.320 video interoperability standards. It specifies
the framing employed during synchronous video operation over individual ISDN
(Integrated Services Digital Network) B channels ganged together into a
384Kbps H0 channels.
H.222 specifies the format of video steams employing MPEG
(Moving Picture Experts Group) 2 compression.
H.225
This is an ITU-T (International Telecommunications Union
– Telecommunications Standardization Sector) standard that governs H.225
session establishment and packetization. The standard describes several
different protocols including Q.931 and RTP (Real time Transport Protocol).
H.230
H.230 defines how individual audio/visual streams may be
multiplexed onto a digital channel.
H.242
H.242 is part of the H.323 group of standards for real
time data over packet switched networks. H.242 defines the protocol for the
establishment, maintenance and tear down of audio channels under the H.323
framework.
H.244
H.244 specifies how two audio channels may be aggregated
onto a B channel, in effect achieving half rate channels.
H.245
The H.245 protocol is used to set up the bearer
capabilities, media types and media channels. It is also used to open the
call.
H.248
H.248 is the ITU-T (International Telecommunications
Union-Telecommunication Standardization Sector) specified MGCP (Media Gateway
Control Protocol). It has been specified in conjunction with the IETF
(Internet Engineering Task Force). H.248 employs ASN.1 (Abstract Syntax
Notation 1) whereas the IETF version of MGCP titled MEGACO (Media Gateway
Control) employs a text based version of the protocol. Since the initial
development of H.248, the IETF have relinquished any further development
responsibility to the ITU.
H.248
GCP - Gateway Control Protocol
The H.248 standard was initially a collaborative project
between the ITU-T and the IETF (Internet Engineering Task Force), with the
ITU now holding overall responsibility for the protocol. H.248 is a media
gateway control protocol which is used to create, modify and delete media
streams across a MGW (Media Gateway), in addition to negotiating the media
formats to be used. Transactions which carry the various H.248 commands are
relative to contexts, which are created on an individual basis for each media
stream being processed by the MGW.
H.261
H.261 specifies the video codec algorithms, picture
format and FEC (Forward Error Correction) methods to allow codecs from
different manufacturers to interoperate. This specification of codec is
employed within the H.323 family of standards.
H.263
The H.263 is an enhanced form of H.261 video codec.
H.320
H.320 is part of the ITU-T (International
Telecommunications Union-Telecommunication Standardization Sector) standard
for video conferencing. It specifies how the two B channels on the ISDN
(Integrated Services Digital Network) basic rate service may be ganged
together to offer a 128Kbps video channel.
H.323
H.323 specifies how real time services may be implemented
over IP networks. The 3 steps include H.225 signalling for agents to request
access to the H.323 domain. H.245 signalling is then employed for call setup,
including the media streams to be used. Finally data is transported using RTP
(Real Time Protocol).
H0 Channel
A H0 (zero) channel comprises six contiguous time slots
on a T1 line. This gives a capacity of 384Kbps.
H10 Channel
The H10 channel is used in North America as a primary
rate channel. It uses 23,64Kbps channels from the T1 primary rate carrier.
The H10 has a capacity of 1472Kbps.
H11 Channel
The H11 channel uses all 24 timeslots on the T1 primary
rate channel. This offers a data channel with a capacity of 1536Kbps.
H12 Channel
The H12 is the European primary rate channel employing
all 30 time slots on an E1 primary rate carrier. This offers a channel
capacity of 1920Kbps.
HA - Home Agent
The Home Agent is the function within the MIP (Mobile IP)
architecture responsible for routing data to mobile nodes currently attached
to a foreign network. This is achieved through a tunnelling process in which
a CoA (Care-of-Address) is used to deliver the data to the mobile node. This
CoA may be associated with a FA (Foreign Agent), in which case it is termed a
FA CoA; or, it may be a co-located CoA meaning the mobile node is allocated
an IP address in the foreign network.
HAA - Home
Agent MIP Answer
The HAA is a MIP Diameter Application message, passed
from the Home Agent to the Home Diameter Server. It is used in the MIP
registration process and the variable associated with the MIP Registration
Reply. These include the Home Address, Home Agent Address, and the relevant
security keys to be used by the FA and Mobile Node for signalling and bulk
encryption of data between these entities.
Half Duplex
A half duplex circuit is capable of transmission in both
directions, but not at the same time. A typical example of a half duplex
service is that provided by a speaker phone.
HaLow
This is the common term of the IEEE 802.11ah amendment to
the Wi-Fi standards (IEEE 802.11-2012) that supports sub 1GHz radio
frequencies to provide extended range / coverage when compared to
conventional Wi-Fi networks operating in the 2.4GHz and 5GHz ISM bands. This
technology supports low energy consumption which has significant benefits for
remote / difficult to access sensors within the IoT (Internet of Things).
Hamming Code
Hamming codes, invented by R Hamming of Bell Labs, are
used to generate FEC (Forward Error Correction) data. The codes are compiled
using a matrix, in which information and parity bits are combined in order to
provide error checking and correction at the receiver. The basic code
generates three parity bits for every four information bits, whereas extended
hamming codes increase the size of the matrix.
Handoff / Handover
A Handoff, or Handover, is the process in which a
cellular phone is handed from one cell to the next in order to maintain a
radio connection with the network. The variables that dictate a handover
depend on the type of cellular system. In CDMA (Code Division Multiple
Access) based systems interference requirements are the limiting factor for
handover. In FDMA (Frequency Division Multiple Access) and TDMA (Time
Division Multiple Access) systems such as GSM the main limiting factor is the
signal quality available to the MS (Mobile Station). Other factors include
distance TA (Timing Advance), loading, and received power levels.
Handover Word
The Handover Word is a GPS (Global Positioning System)
variable used to enable a GPS receiver to switch from the course acquisition
code to the precision code.
HAR - Home
Agent MIP Request
The HAR is a MIP Diameter Application message, passed
from the Home Diameter Server to the Home Agent. It is used in the MIP
registration process and the variable associated with the MIP Registration
Request.
Hard Handover
A handoff, or handover, is the process in which a
cellular phone is handed from one cell to the next in order to maintain a
radio connection with the network. A hard handover results in the radio
connection being broken between the network and the mobile, before a new
radio connection is established with the network in the target cell. Hard
handovers usually require a change of frequency.
HARQ - Hybrid
Automatic Repeat Request
HARQ is an optimized ARQ mechanism designed to provide
error correction and packet retransmission across a wireless interface.
HARQ Information
This includes the HARQ protocol related information for
the corresponding HS-DSCH transmission, as well as information about the
redundancy version. The number of bits defined are: – Hybrid-ARQ process
number – 3 bits. – Redundancy version – 3 bits. – New-data indicator – 1 bit.
– UE ID – 10 bits implicitly encoded, i.e.part of CRC attachment process.
Hashing
Hashing is a cryptographic term for a mathematical value
used to summaries a much larger block of data. This summary is termed the
digest. The digest is generated by passing the original data through the
hashing function. Irrespective of the length of the original data block, the
hash code or digest is of a uniform length.
Hayes AT Commands
The Hayes AT (ATtention) commands are a standard set of
instructions for controlling a modem. They were developed in the mid 1980’s
by Hayes Micro Computers, hence the name Hayes. Until then modems had been
dumb, meaning that they had no memory, and could not be programmed. With the
advent of the codes modems became far more functional. The Hayes command set
is now regarded as a standard for modem control.
HCCA - Controlled
Channel Access
The term HCCA is used in wireless networks supporting the
IEEE 802.11e Quality of Service enhancement. It is a component of the HCF and
provides support for parameterized Quality of Service. It inherits some of
the rules of the legacy PCF as well as introducing many additions. HCCA
provides polled access to the Wireless Medium but unlike PCF operation, this
may take place in both the CP and CFP.
HCF - Hybrid
Coordination Function
The 802.11e Quality of Service facility defines a new
coordination function termed HCF which is only used in QBSS but implemented
in all QSTA. The HCF combines functions of the DCF and PCF with some enhanced
specific mechanisms and frame subtypes to support the transfer of Quality of
Service data across a WiFi network.
HCI - Host
Controller Interface
The Host Controller Interface enables communication
between the Bluetooth Host and the Bluetooth Device. If the Bluetooth host
and device was fully integrated there would be no requirement for the HCI.
HCP - Host
Controller Protocol
Defined by ETSI , the HCP supports communication between
a contactless application residing on a SIM and an NFC enabled mobile phone.
As such, the protocol spans the HCI. Communication across this interface also
uses the SWP.
HCS - Hierarchical
Cell Structure
This is a term typically used in GSM to describe the
priority of cells within a mixed environment. That is when Macro, Micro, and
Pico cells may be viewed as candidates for cell reselection the priority
described by the HCS will be used in the associated calculations.
HDLC - High
Level Data Link Control
HDLC is a Layer 2 protocol for point to point and
multipoint delivery of data. The frame consists of flags to delimit the
frame, along with addressing information and control information which is
used when the protocol is employed in the acknowledged mode. Also included in
the frame is a payload area and a CRC (Cyclic Redundancy Code). The protocol
was originally developed by IBM variants include LAPB (Link Access Protocol
Balanced) and LAPD (Link Access Protocol on the D Channel), as well as PPP
(Point to Point Protocol).
HDML - Handheld
Device Markup Language
Handheld Device Markup Language is a modified form of
HTML (Hypertext Markup Language), and is deigned for use of wireless devices,
or small computers such as PDA (Personal Digital Assistants). Like WML
(Wireless Markup Language), HDML is formatted on cards which are smaller
units of information than traditional HTML which uses pages. This small data
unit is more suitable for viewing on handheld devices and is quicker to
download onto wireless devices.
HDSL - High-bit-rate
Digital Subscriber Line
High-bit-rate Digital Subscriber Line is the most mature
of the xDSL family of protocols. It allows E1 / T1 rates to be achieved over
two pair copper cable. The implementation of HDSL requires equipment both at
the exchange and customer premises, but allows standard UTP (Unshielded
Twisted Pair) cable to be employed with a maximum distance between the
exchange and the customer premises of 12,000 feet.
HDTP - Hand
held Device Transport Protocol
HDTP is optimized for the carriage of HDML (Handheld
Device Markup Language) coded data. It is transported at Layer 4 and presents
the HDML to the HDML interpreter in an appropriate format.
HE-VASP - Home
Environment Value Added Service Provider
This is a VASP (Value Added Service Provider) that has an
agreement with the Home Environment to provide services.
HEC - Header
Error Control
The Header Error Control field is an 8bit CRC (Cyclic
Redundancy Code) within the header of the ATM (Asynchronous Transfer Mode)
cell. It is used to check the validity of the ATM cell control information.
Hello Packet
Hello Packets are passed between routers as part of
network routing functions. They are used by routers in order to build a map
of adjacent routers. These adjacencies are then used by routing algorithms to
formulate routing tables.
HEMM - HCCA,
EDCA Mixed Mode
The term HEMM is used in wireless networks supporting the
IEEE 802.11e Quality of Service enhancement. It defines the access policy
within a TSPEC and states the use of both EDCA and HCCA.
HeNB - Home
evolved Node B
The HeNB has almost identical functionality as an eNB
within the E-UTRAN, but is designed to be deployed in a home/office location
as part of a Femto Cell architecture. Like the eNB, the HeNB is responsible
for all radio resource management, as well as allocation of user traffic to
the downlink/uplink, security and relaying of higher layer NAS (Non Access
Stratum) signalling to the MME (Mobility Management Entity). The HeNB
backhauls traffic to the network via the S1 interface, appearing to the
upstream network as a regular eNB. The upstream network may be an MME
(Mobility Management Entity)/S-GW (Serving Gateway) or a HeNB-GW (HeNB
Gateway).
HeNB-GW - HeNB
Gateway
The HeNB-GW serves as a concentrator of large numbers of
HeNB deployments, thus lightening connection requirements on the network. As
such, HeNBs connect to the HeNB-GW via the S1 interface, with the HeNB-GW
concatenating these links and connecting to the MME (Mobility Management
Entity)/S-GW (Serving Gateway) also via the standard S1 interface.
HEO - Highly-Eccentric
Orbiting
HEO satellites have a range of operational altitudes
ranging from 7,000km to 45,000km. The higher point of HEO orbits is where the
satellite is designed to be exploited. The inclination angle is chosen in
order to compensate, either completely or partially the motion of the Earth.
This then allows the satellite to cover different parts of the Earth, e.g.
Western Europe, North America, or Northern Asia.
HEVC - Hegh
Efficiency Video Coding
Also known as H.265 or MPEG-H Part 2, HEVC is an advanced
video compression standard which supersedes the earlier H.264 AVC (Advanced
Video Codec) standard. HEVC offers improved data compression when compared to
AVC, whilst maintaining the same level of video quality. Alternatively, HEVC
can operate at the same bitrate as AVC yet provide a much improved video
quality.
HEVC - High
Efficiency Video Coding
Also known as H.265 or MPEG-H Part 2, HEVC is an advanced
video compression standard which supersedes the earlier H.264 AVC (Advanced
Video Codec) standard. HEVC offers improved data compression when compared to
AVC, whilst maintaining the same level of video quality. Alternatively, HEVC
can operate at the same bitrate as AVC yet provide a much improved video
quality.
HFN - Hyper
Frame Number
In 2G/3G/4G radio access systems the HFN is used between
the base station and the mobile to limit the number of bits used for
sequencing over the radio interface. The number may also be used as part of
the security process.
HFP - Hands-Free
Profile
The Hands-Free Profile specification defines the
interactions for hands free devices, for example cellular phone with a
Bluetooth in-car kit. This profile provides means for both remote control of
the device and voice connections.
HGW - Home
Gateway
The HGW is the successor to the vastly popular STB
however, where the STB has a dedicated role with respect to providing TV
services, the HGW is designed to be a much more capable device. Features of
the HGW may include: Control of IPTV services, CPE to network interface, IMS
terminal, Media Storage, Advanced security, Femto Cell. As more and more
service are delivered via IP transport networks, the HGW will see a
considerable rise in popularity, particularly since many STB are not capable
of handling the new generation of services.
Highest SR3 Frequency
Highest SR3 Frequency The SR3 (Spreading Rate 3)
frequency that has the highest frequency assignment.
HiperAccess
HiperAccess is an ETSI (European Telecommunications
Standards Institute), now 3GPP (Third Generation Partnership Project),
standard used to provide outdoor, high speed (25Mbps typical data rate) fixed
radio access to customer premises. The system is capable of supporting
multi-media applications and will be operated in either licensed or licensed
exempted spectrum – typically 5GHz.
HIPERLAN - HIghPErformance
Radio Local Area Network
HIPERLAN is a wireless LAN standard developed by the BRAN
(Broadband Radio Access Networks) division of ETSI. HIPERLAN defines a very
efficient, high-speed wireless LAN technology that fully meets the
requirements of Europe’s spectrum regulations. Similar to IEEE 802.11a ,
HIPERLAN/2 operates in the 5GHz spectrum and offers data rates of up to
54Mbps. While HIPERLAN appears to offer similar performance to that of WLAN
802.11a, it is far more efficient in terms of allocating users radio
resources. Unfortunately 802.11a is already available, and operation within
the UK has been ratified by the RA (Radiocommunications Agency). Due to this,
and the economies of scale it will initially prove a far cheaper option than
HIPERLAN. To this end it is viewed that WiFi derivatives such as 802.11a, b,
g and n will become the dominant technologies.
HiperLan
2 - High Performance Radio LAN
HiperLan 2 is an ETSI (European Telecommunications
Standards Institute), now 3GPP (Third Generation Partnership Project),
standard used to specify broadband wireless LAN (Local Area Network). The
carrier frequency of HiperLan is 5GHz, and supports data rates between 25Mbps
and 54Mbps, Three profiles of the standard are specified. These are for
corporate, public and domestic use.
HiperLan1 - High
Performance Radio LAN
HiperLan 1 is an ETSI (European Telecommunications
Standards Institute), now 3GPP (Third Generation Partnership Project),
standard used to specify broadband wireless LAN (Local Area Network). The
carrier frequency of HiperLan is 5GHz providing high speed (20Mbps typical
gross data rate) radio local area network communications which are compatible
with wired LAN (Local Area Network) such as Ethernet.
HiperLink
HyperLink is an ETSI (European Telecommunications
Standards Institute), now 3GPP (Third Generation Partnership Project),
standard used to provide very high speed (155Mbps data rate) radio links for
static interconnections. The system is capable of supporting multi-media
applications and will be operated at a frequency of 17GHz.
HLR - Home
Location Register
The Home Location Register is a database within the HPLMN
(Home Public Land Mobile Network). It provides routing information for MT
(Mobile Terminated) calls and SMS (Short Message Service). It is also
responsible for the maintenance of user subscription information. This is
distributed to the relevant VLR (Visitor Location Register) or SGSN (Serving
GPRS Support Node) through the attach process and mobility management
procedures such as Location Area and Routing Area updates.
HLR - Home
Location Register (3GPP2)
The Home Location Register is a database found within
cellular networks. It stores subscriber data relating to services and
features in addition to location area based information.
HLS - Higher
Layer Split
HLS relates to the functional split option point in RAN
deployments where the interconnectivity point between the centralised unit
and the distributed units is located in the protocol stack from the MAC layer
upwards.
HMAC - Hash
Message Authentication Code
HMAC (Hash Message Authentication Code) provides data
source authentication and data integrity if employed between two users.
HNB - Home Node
B
A HNB can also be defined as a Femto Cell supporting the
standard UMTS air interface. It provides cellular coverage in a subscriber’s
home or small business yet connects back to the service providers core
network via a broadband IP network running over the Iu-h interface. The HNB
is defined in the 3GPP ‘s Release 8 specifications.
HNB-GW - Home
Node B
The HNB-GW provides the point of interconnect between a
HNB or Femto Cell and a service provider’s core network. As well as
presenting an Iu-CS and Iu-PS interface towards an MSC and SGSN respectively,
the HNB-GW also terminates the IPSec tunnel which spans the Iuh interface
between itself and the HNB. The HNB-GW is defined in the 3GPP ‘s Release 8
specifications.
HOLD - Communication
Hold
This is a supplementary service in which an ongoing
communication session is paused.
Hold Mode
The Hold Mode is when a Bluetooth device is allocated a
hold timer and is waiting for it to expire before continuing with its
operation.
Hopping Pilot Beacon
Hopping Pilot Beacon A pilot beacon that changes CDMA
(Code Division Multiple Access) Frequency periodically to simulate multiple
BS (Base Station) operating on different frequencies. The transmission of the
hopping pilot beacon is discontinuous on any CDMA Channel.
HOS - Home
Operated Services
In order to understand which services are available in
the mobile network and how those services can be correctly accessed, HOS acts
as a configuration service between the mobile and the network.
Host Name Resolution
Host Name Resolution is the process in which an IP
address is resolved from a host name. The best known host name resolution
system is the DNS (Domain Name System).
HPLMN - Home
Public Land Mobile Network
The Home Public Land Mobile Network identifies the PLMN
(Public Land Mobile Network) in which the subscriber’s profile is held. Users
roaming to other networks will receive subscription information from the
HPLMN.
HR/DSSS
PHY - High Rate / Direct Sequence Spread Spectrum Physical Layer
The HR/DSSS PHY is the enhanced physical layer defined by
IEEE 802.11b which supports data transfer at up to 11Mbps. Unlike the earlier
versions of IEEE 802.11 which supported data rates of up to 2Mbps, HR/DSSS
uses complementary code keying which divides the chip stream into a number of
8bit code symbols.
HS - Home
System
The wireless cellular system in which the MS (Mobile
Station) subscribes for service.
HS-DPCCH - High
Speed Dedicated Physical Control Channel
The HS-DPCCH carries uplink feedback signalling related
to downlink HS-DSCH transmission. This feedback signalling consists of
HARQ-ACK (Hybrid-ARQ Acknowledgement) and Channel Quality Indication. The
latter is used to influence the scheduling at the Base Station.
HS-DSCH - High
Speed Downlink Shared Channel
The HS-DSCH is evolved from the UMTS Release 99 DSCH
(Downlink Shared Channel). It enables fast and flexible time multiplexing of
different users. Its purpose is to increase data rates, as well as improve
the spectral efficiency. DSCH features such as fast power control and
variable spreading factor have been replaced in HS-DSCH Release 5, which
instead utilizes: a short packet size, multi-code operation, as well as other
techniques such as AMC (Adaptive Modulation and Coding)and HARQ.
HS-DSCH
RNTI - HS-DSCH Radio Network Temporary Identity
This is used for the UE specific CRC (Cyclic Redundancy
Check) on the HS-SCCH and HS-PDSCH. It is also identified as the H-RNTI. It
is allocated by the CRNC upon the UE establishing a HS-DSCH channel and is
unique within the cell carrying the HS-DSCH.
HS-PDSCH - High
Speed Physical Downlink Shared Channel
The HS-PDSCH is used to carry the HS-DSCH (High Speed –
Downlink Shared Channel)transport channel. Each HS-PDSCH corresponds to one
channelization code of fixed spreading factor SF=16. It is also possible for
a UE to be assigned multiple channelization codes in the same HS-PDSCH
sub-frame, depending on its capability. The HS-PDSCH may use QPSK or 16QAM
modulation.
HS-SCCH - High
SpeedShared Control Channel
The HS-SCCH is a fixed rate downlink physical channel
used to carry downlink signalling related to HS-DSCH transmission. It
operates using a SF=128 channelization code, i.e. 60 kbps. The UE is provided
one HS-SCCH set on HS-PDSCH configuration/re-configuration via RRC
signalling. The number of HS-SCCH in a HS-SCCH set as seen from the UE’s
point-of-view can range from a minimum of one HS-SCCH to a maximum of four
HS-SCCHs, with the UE continuously monitoring all the HS-SCCHs in the
allocated set. For each HS-DSCH TTI , each HS-SCCH carries HS-DSCH related
signalling for one UE.
HSCSD - High
Speed Circuit Switched Data
High Speed Circuit Switched Data enhances the
capabilities of the current GSM network by combining time slots on the GSM
radio carrier. Data rates of 14.4Kbps, using one timeslot, 28.8Kbps using two
time slots, or 57.6Kbps using four time slots can be achieved. HSCSD is best
suited for services such as video conferencing.
HSDPA - High
Speed Downlink Packet Access
HSDPA improves system capacity and increases user data
rates in the downlink direction, that is, transmission from the Radio Access
Network to the mobile terminal. The processes of adaptive modulation and
coding, the procedures by which HSDPA data is scheduled for transmission
across the air interface and improved re-transmission patterns all contribute
to the improved data rates.
HSN - Hopping
Sequence Number
Frequency hopping is employed in frequency division
spread spectrum to hide the data channels in the noise or to avoid
interference from other users of the common spectrum. It is also employed in
fading channels to improve the quality of the radio connection. The hopping
pattern must be known both by the receiver and the transmitter. This pattern
is described using a hopping sequence and identified by the HSN.
HSPA+ - High
Speed Packet Access+
HSPA+ was defined as part of the 3GPP Release 7
specifications. HSPA+ employs MIMO technologies and higher order modulation
to enhance the uplink and downlink data rates of the 3G packet channels.
HSPA+ also introduces an optional all-IP architecture for the network, where
base stations are directly connected to IP based backhaul and then to the ISP
‘s edge routers known as GGSN s.
HSS - Home
Subscriber Server
The HSS is the master database for a given subscriber,
acting as a central repository of information for network nodes. Subscriber
related information held by the HSS includes user identification, security,
location and subscription profile. The HSS is a functional element of LTE and
IMS.
HSSI - High
Speed Serial Interface
The High Speed Serial Interface supports data rates up to
52Mbps. It is typically used to connect ATM (Asynchronous Transfer Mode)
switches on a T3 carrier.
HSUPA - High
Speed Uplink Packet Access
HSUPA (High Speed Uplink Packet Access), or FDD Enhanced
Uplink, is designed to improve the performance of uplink dedicated transport
channels. Like HSDPA (High Speed Downlink Packet Access), it offers increase
data rates, whilst at the same time improving capacity. The FDD Enhanced
Uplink upgrade is designed to improve the performance of uplink dedicated
transport channels, i.e. to increase capacity and throughput and reduce
delay. In order to achieve this three main changes are identified: Node B
controlled scheduling – Under the supervision of the RNC, the Node B is able
to control the set of TFC (Transport Format Combinations) from which the UE
may choose; Hybrid ARQ – this enables the rapid retransmissions of
erroneously received data packets between UE and Node B; Shorter TTI (Time
Transmission Interval) – the enhanced uplink channel is able to operate with
a TTI of 2ms or 10ms.
HTCP - Hypertext
Caching Protocol
The Hypertext Caching Protocol is employed within
internets to identify HTTP (Hypertext Transport Protocol) proxies used to
cache, typically web data.
HTG - Hunt
Group
A Hunt Group is a supplementary service in which a group
of fixed or mobile telephones are defined. An incoming call will be passed
from phone to phone until the call is accepted.
HTI - Host
Terminal Interface
The Host Terminal Interface is the Interface between a
Bluetooth Host and a Bluetooth Unit.
HTML - Hypertext
Markup Language
Hypertext Markup Language is an authoring language in
which tags are used to format data and pictures on the HTML page. In
addition, commands to download applications, generate hyperlinks and provide
dynamic user interaction may also be included. These tags and commands are
interpreted by the user’s browser in order to display data, or initiate
actions based on the HTML commands.
HTS - High
Throughput Satellite
HTS (High Throughput Satellite) systems utilize spot
beams to provide broadband services to end users with bit rates in excess of
100Mbps.
HTTP –
XCAP - Hypertext Transfer Protocol (XCAP)
In the context of the Ut interface, HTTP is used in
support of XCAP (XML Configuration Access Protocol) operation, which allows
subscribers to remotely access and manipulate configuration files stored on
Application Servers in the network. In essence, an XML configuration file can
be broken up into unique URLs, after which point regular HTTP expressions
such as GET and PUT can be used by the mobile to access and alter the XML
configuration as necessary.
HUB
A Hub is a Layer 1 function used to connect parts of a
LAN (Local Area Network) together. Along with connectivity it also
regenerates the signal, which improves the range of the LAN.
HV - High
quality Voice
The HV (High Quality Voice) indicates a Bluetooth packet
which has been defined so it can support high quality voice on a SCO
(Synchronous Connection Oriented) link. Three different types of high quality
voice packets are identified; these are known as HV1 packets (1 slot), HV2
packets (2 slot) and HV3 packets (3 slot).
Hyperframe
Hyperframe A Hyperframe is a hierarchical frame
structure. In GSM the Hyperframe is either 2048 (normal) or 1024 (classic)
Superframes , this depends on the configuration.
I - Information
Fames
Information frames are
used to carry user information or signalling data across a link.
I-CSCF - Interrogating
– Call Session Control Function
The I-CSCF is responsible for onward routing of SIP
messages to the appropriate S-CSCF (Serving CSCF) for a given subscriber.
This routing capability is utilised in specific scenarios only, such as
during registration in order to assign or ascertain the S-CSCF which should
be used. Routing SIP requests arriving from other SIP networks is also a
responsibility of the I-CSCF. The I-CSCF queries the HSS in order to discover
the S-CSCF a particular subscriber has been assigned to.
i-mode
i -mode is a Japanese mobile phone service from NTT
(Nippon Telegraph and Telephone Corporation) DoCoMo which allows users to
access many multimedia services from their handsets. In Japan , the system
supports web browsing to more than 40,000 sites, email, online shopping and
banking etc.
I-SBC - Interconnect
Session Border Controller
An Interconnect SBC typically sits on the border between
two IMS or SIP networks. In this role, the I-SBC conducts a variety of
functions, including security, traffic scrubbing, address manipulation and
media transcoding (amongst other functions).
I2RS - Interface
to Routing System
The IETF’s I2RS protocol is a potential solution for the
Southbound API associated with the Software Defined Networking architecture.
I2RS retains the use of traditional routing protocols such as OSPF (Open
Shortest Path First) and BGP (Border Gateway Protocol) between network
resources. The Southbound API is used as a mechanism to dynamically modify
routing decisions to suit specific SDN Applications. However, normal routing
decisions are still based on traditional routing protocols exchanged on an
East-West basis between Network Resources.
IA5 - International
Alphabet 5
International Alphabet 5 is an international standard
alphanumeric code which has a facility for national options. The USA version
is called ASCII (American Standard Code for Information Interchange).
IAB - Internet
Architecture Board
The Internet Architecture Board comprises of researchers
who discuss issues pertinent to the architecture of the Internet. They are
also responsible for appointing a variety of Internet-related groups, such as
the ICANN (Internet Corporation for Assigned Names and Numbers), IESG
(Internet Engineering Steering Group), and IRSG (Internet Research Steering
Group). The IAB is appointed by the trustees of the ISOC (Internet Society).
IAC - Inquiry
Access Code
The Inquiry Access Code is used in Bluetooth inquiry
procedures. There are two types: DIAC (Dedicated IAC), which is used for
specific devices, or GIAC (Generic IAC) for all devices.
IAM - Initial
Address Message
An Initial Address Message can be found in SS7 (Signalling
System No.7) signalling networks as part of the ISUP (Integrated Services
Digital Network User Part) call set up. The message is used to seize a
circuit and transfer addressing and call handling / routing information.
IANA - Internet
Assigned Numbers Authority
The IANA allocates and maintains unique codes and
numbering systems that are used in the technical standards that drive the
Internet (termed RFC ). For example, the IANA oversees Port Number
allocations. Responsibilities of the IANA include: Management of the DNS
Root, .int and .arpa domains, Coordination and allocation of global IP
Address and AS Number pool, Protocol numbering assignment.
IAPP - Inter
Access Point Protocol
Within an IEEE 802.11 network, Stations may roam between
different AP (Access Points). In order to ensure all relevant information is
delivered to the correct AP to which the station is associated, an Inter
Access Point Protocol is required. This protocol, which is often proprietary,
enables multiple AP to communicate and pass information regarding the
location of associated Stations.
IARI - IMS
Application Reference Identifier
An IARI is used to uniquely identify an IMS application.
IMS applications provide an IMS service which utilize established IMS
Communication Services in order to provide a specific service to the
customer. An example IARI for geolocation services would be
+g.3gpp.iari-ref=”urn%3Aurn-7%3A3gpp-application.ims.iari.rcs.geopush”
IARP - Inter APN
Routing Policy
Information provided by the ANDSF which tells the mobile
which traffic should be sent across which PDN connections, and also which
traffic should undergo non-seamless offload (bypassing the EPC).
IBCF - Interconnection
Border Control Function
The IBCF is a SIP (Session Initiation Protocol) ALG
(Application Level Gateway) which is designed to facilitate interconnection
between two service provider domains. Similar in role to a SBC (Session
Border Controller), the IBCF performs functions such as IPv4 to IPv6
interworking, network topology hiding, SIP message screening and transport
plane control via the TrGW (Transition Gateway).
IBSS - Independent
Basic Service Set
An Independent Basic Service Set or ad hoc network is the
simplest of all IEEE 802.11 networks in that no network infrastructure is
required. As such, an IBSS is simply comprised of one or more Stations which
communicate directly with each other. The abbreviation should NOT be confused
with an Infrastructure BSS (Basic Service Set).
ICANN - Internet
Corporation for Assigned Names Numbers
ICANN oversees the IANA and as such supervises the
allocation of IP Addressing and domain names, ensuring uniqueness in both
areas and hence driving the smooth operation of the Internet and WWW.
ICE - Interactive
Connectivity Establishment
ICE is a NAT Traversal mechanism which incorporates both
the STUN and TURN protocols. Developed by the IETF MMUSIC working group, ICE
is deployed in many next generation networks to allow VoIP users positioned
behind a NAT device to send signalling to other VOIP users. Crucially, this
signalling contains addressing information which is useable, due to the fact
that prior to sending the signalling, the VoIP client will have interrogated
an ICE server to ascertain the addressing information required for the
eventual media streams.
ICID - IM CN
subsystem Charging Identifier
The ICID is used within the IMS (IP Multimedia Subsystem)
to correlate session level charging information in both the visited and home
networks. It is generated at the edge of the IMS, either by the P-CSCF (Proxy
– Call Session Control Function) in the case of MO (Mobile Originated)
sessions and the I-CSCF (Interrogating – Call Session Control Function) for
MT (Mobile Terminated) sessions. All subsequent billable events for the
session are associated with this identifier.
ICMP - Internet
Control Message Protocol
The Internet Control Message Protocol is a Layer 2
protocol that reports errors and provides other information relevant to IP
packet processing. The protocol is described in RFC (Request For Comments)
792.
ICS - IMS
Centralized Services
ICS is a option for service providers who wish to anchor
all of their call control within the IMS, despite the fact that users may be
on CS access when they make or receive a call.
ICSI - IMS
Communication Service Identifier
Any IMS Communication Service must be identified using an
ICSI. As an example, the IMS MMTel Communication Service (upon which VoLTE is
based), is identified using the urn-xxx:3gpp-service.ims.icsi.mmtel ICSI.
ICV - Integrity
Check Value
The ICV (Integrity Check Value) is the result of the
Integrity process. This normally involves the HMAC (Hash Message
Authentication Code) algorithm and the MD5 (Message Digest 5) or SHA-1 hash
functions.
ID - Identity
A generic term used by most telecom systems. This may be
used to identify such things as a user, phone, network, channel, area, etc.
IDD - International
Direct Dial
International Direct Dial is an international number which
can be dialled directly by the user. As such, it will include the
international prefix for the country e.g. +44 (United Kingdom), +1 (United
States of America), +33 (France), +91 (India), +86 (China) etc.
Idle Handoff
Idle Handoff The act of transferring reception of the PCH
(Paging Channel), BCCH (Broadcast Control Channel) or the FCCCH (Forward
Common Control Channel) from one base station to another when the MS (Mobile
Station) is in the Idle State.
Idle mode or Idle State
Whilst in GSM or UMTS idle mode, a mobile shall implement
the cell selection and reselection procedures. The mobile has registered on
the network, and is listening for paging messages. The mobile will be
performing location area updates when necessary. The idle state in GRPS
indicates that the mobile has not yet registered onto the network or is
switched off.
IDN - Integrated
Digital Network
An Integrated Digital Network is a public
telecommunication network which uses digital transmission and signalling.
IDS - Intrusion
Detection System
An IDS is a security countermeasure that monitors traffic
and events looking for signs of intruders. Host-based IDS monitors system
events, log files etc, whereas Network based IDS monitors network traffic
patterns and also suspicious events such as multiple failed login attempts.
IE - Information
Element
An Information Element is a group of information which may
be included within a signalling message or data flow which is sent across an
interface. Examples may include QoS (Quality of Service) definitions, setup
parameters, user identifiers etc.
IEEE - Institute
of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers is a
professional organization whose activities include the development of
communications and network standards.
IEEE
802.1 - Bridging Management
The IEEE 802.1 standards cover 802 LAN (Local Area
Network) and MAN (Metropolitan Area Network) architecture, internet working
among 802 LAN, MAN and other wide area networks, 802 overall network
management, and protocol layers above the MAC (Medium Access Control) LLC
(Logical Link Control) layers.
IEEE
802.10 - SILS (Standards for Interoperable LAN/MAN Security)
The IEEE 802.10 specification defines an interoperable
data link layer security protocol and associated security services. The
802.10 standards provide: security association management, key management
(manual and certificate based), security labeling, security services (data
confidentiality, connectionless integrity, data origin authentication, and
access control).
IEEE 802.11
IEEE 802.11 are the collection of standards relating to
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
specifications. WiFi is widely used to encompass this collection of standards
and replace the 802.11 term. WiFi networks, when compared to their cellular
cousins, are far simpler in design and consist of only four major physical
elements: the Station, Wireless Medium, Access Point and Distribution System.
IEEE 802.11
Wireless - IEEE 802.11
This is an IEEE (Institute of Electrical and Electronic
Engineers) technical standard covering WLAN (Wireless Local Area Network)
technology. The standards have been divided into sub groups including
802.11a, 802.11b, 802.11g, 802.11n and 802.11ac.
IEEE 802.11a
Part of the IEEE 802.11 family of specifications, this
wireless local area network technology is comprised of a high speed physical
layer operating in the 5GHz unlicensed band and supports data rates up to
54Mbps.
IEEE 802.11ac
Part of the IEEE 802.11 family of specifications, this
enhancement of the physical layer supports data rates of up to 6.9Gbps using
MIMO. The technology only operates at within the 5GHz radio spectrum band
using a range of channel bandwidths: 20MHz, 40MHz, 80MHz and 160MHz.
IEEE 802.11ad
Part of the IEEE family of Wi-Fi standards, 802.11ad
networks support incredibly fast data throughput rates by using high radio
frequency bands around 60GHz. Unfortunately, this significantly reduces the
distance between transmitter and receiver.
IEEE 802.11af
White-Fi or more accurately 802.11af enables WiFi
operation in TV white space spectrum in the VHF (Very High Frequency) and UHF
(Ultra High Frequency) bands between 54MHz and 790MHz. Approved in 2014, the
amendment supports cognitive radio techniques to minimize interference to the
primary users of the radio spectrum, namely analogue and digital television
and wireless microphones.
IEEE 802.11ah
Part of the IEEE family of Wi-Fi standards, 802.11ah
networks have been designed to operate within the license exempt radio
frequency bands sub 1GHz to improve coverage and power saving. Also known as
Wi-Fi HaLow, this technology is aimed at IoT (Internet of Things) type
deployments.
IEEE 802.11ax
The IEEE 802.11ax standard is the successor to 802.11ac,
but unlike its predecessor, it can operate on both the 2.4GHz and 5GHz radio
frequency bands. The Wi-Fi technology is targeting at least a four times
improvement in data throughput and is expected to operate in highly dense
usage environments. This technology is also known as Wi-Fi 6.
IEEE 802.11b
Part of the IEEE 802.11 family of specifications, IEEE
802.11b was initially the most popular wireless networking technology. The
equipment operates in the 2.4GHz unlicensed band and utilizes HR/DSSS (High
Rate – Direct Sequence Spread Spectrum) enabling data rates of up to 11Mbps
to be achieved.
IEEE 802.11d
Part of the IEEE 802.11 family of wireless local area
network specifications, the IEEE 802.11d task group covers additional
regulatory domains.
IEEE 802.11e
Part of the IEEE 802.11 family of wireless local area
network specifications, the IEEE 802.11e task group covers QoS (Quality of
Service) issues.
IEEE 802.11f
Part of the IEEE 802.11 family of wireless local area
network specifications, the IEEE 802.11f task group is responsible for the
Inter Access Point Protocol.
IEEE 802.11g
Part of the IEEE 802.11 family of wireless local area
network specifications, the IEEE 802.11g task group is responsible for the
specification enabling higher data rates (54Mbps) to be achieved in the
2.4GHz unlicensed radio band.
IEEE 802.11h
Part of the IEEE 802.11 family of wireless local area
network specifications, the IEEE 802.11h task group is responsible for
dynamic channel selection and transmission power control.
IEEE 802.11i
Part of the IEEE 802.11 family of wireless local area
network specifications, the 802.11i task group was responsible for developing
a new standard for WLAN security to replace the weak WEP (Wired Equivalent
Privacy). The IEEE 802.11i standard utilizes the authentication schemes of
802.1X and EAP (Extensible Authentication Protocol) in addition to a new
encryption scheme – AES (Advanced Encryption Standard) and dynamic key
distribution scheme – TKIP (Temporal Key Integrity Protocol).
IEEE
802.11k - IEEE 802,11k
Part of the IEEE 802.11 family of specifications and
ratified in 2008, this amendment improved the way traffic is distributed
within a WiFi network. Rather than a Station simply selecting the Access
Point with the best signal, this amendment enables networks to prioritize
underutilized Access Points instead.
IEEE 802.11n
Part of the IEEE 802.11 family of wireless local area
network specifications, the IEEE 802.11n task group define modifications to
the Physical and MAC layers in order to deliver 100Mbps data rates (operating
at 2.4GHz or 5GHz frequency). The working group put forward a number of
enhancements to achieve these higher data rates including support for MIMO
and the use of two adjacent 20MHz channels. Equipment complying with the
802.11n standard is also backward compatible with the earlier 802.11a ,
802.11b and 802.11g variants.
IEEE 802.11r
Part of the IEEE 802.11 family of specifications and
ratified in 2008, the 802.11r amendment sets out to improve the mechanism for
a handoff / handover between two Access Points. This was necessary due to the
increased signalling between the Station and Access Point brought about by
the introduction of 802.11i and 802.11e amendments.
IEEE 802.11u
Part of the IEEE 802.11 family of specifications, this
amendment to the 802.11-2007 standard incorporates a number of features to
aid interworking with external networks such as WiFi hotspots.
IEEE 802.11v
Part of the IEEE 802.11 family of specifications, this
amendment enables client devices to exchange information about the network
topology including the radio frequency environment.
IEEE 802.11w
Part of the IEEE 802.11 family of specifications, this
amendment added to the security enhancements made in 802.11i by increasing
the security of management frames.
IEEE
802.12 - Demand Priority Access
The IEEE 802.12 standards define the protocol and
compatible interconnection of data communication equipment via a
repeater-controlled, star-topology LAN (Local Area Network) using the
demand-priority access method. This provides a round-robin arbitration method
to provide LAN access based on message priority level.
IEEE 802.15 Wireless
Personal Area Networks
The IEEE 802.15 standards define a PAN (Personal Area
Network) for short distance wireless networks. This is commonly known as
Bluetooth.
IEEE 802.16 Broadband
Wireless Metropolitan Area Networks
The IEEE 802.16 defines the Wireless MAN air interface
standard. This provides a highly efficient use of bandwidth and supports
voice, video and data services and is commonly referred to as WiMAX.
IEEE 802.1X
802.1X is a security standard adopted by the IEEE which
has received widespread industry support. It uses the EAP (Extensible
Authentication Protocol) and RADIUS (Remote Authentication Dial-In User
Service) to authenticate clients and distribute keys.
IEEE 802.2 - LLC
(Logical Link Control)
An IEEE 802 local area network can perform a best effort
datagram service, which is enough for some IP packets. The IEEE 802.2
standards define the LLC (Logical Link Control), which identifies four
distinct classes of LLC operation enabling it to control the levels of
service. Class I provides the data-link connectionless-mode service only.
Class 2 provides the data-link-connection-mode service plus
data-link-connectionless- mode service. Class 3 provides the
acknowledged-connectionless-mode service plus data-link-connectionless-mode
service. Class 4 provides the acknowledged-connectionless-mode service plus
data-link connection-mode service plus data-link-connectionless-mode service
IEEE 802.3
IEEE (Institute of Electrical and Electronics Engineers)
802.3 is a LAN (Local Area Network) protocol that specifies an implementation
of the physical layer and the MAC (Medium Access Control) sublayer of the
data link layer. IEEE 802.3 uses CSMA/CD (Carrier Sense Multiple Access with
Collision Detection) access at a variety of speeds over a variety of physical
media. Variations of IEEE 802.3 include 10Base2, 10Base5 and 10BaseT.
IEEE
802.4 - Token-Passing Bus Access Method
The IEEE 802.4 standard defines a bus physical topology
which uses a token message to grant the right to access the physical network
media.
IEEE
802.5 - Token Ring Access Method
The IEEE 802.5 standard defines a network topology based
on a logical ring with token-based media access control. This standard
defines data rates of 1Mbps, 4Mbps and 16Mbps.
IEEE
802.6 - DQDB Access Method
The IEEE 802.6 standard describes a MAN (Metropolitan Area
Network) standard called DQDB (Distributed Queue Dual Bus). The network is
defined as a high-speed shared medium access protocol for use over a dual,
counter-flowing, unidirectional bus networks. The use of paired bus provides
a failure tolerant configuration. DQDB is able to carry data, voice, and
video transmissions, with bandwidth being allocated using time slots on the
bus.
IEEE
802.7 - Broadband LAN
The IEEE 802.7 standard identifies the recommended
practices for Broadband Local Area Networks. It specifies the design,
installation, and test parameters for a broadband cable medium.
IEEE
802.9 - Isochronous LAN
The IEEE 802.9 standard defines an Isochronous Ethernet
(IsoEnet) and is designed to carry bursty and time critical traffic. The
system bandwidth is 16Mbps, which is identified as a 10Mbps asynchronous
channel and ninety six 64Kbps channels, available for specific data streams.
IEI - Information
Element Identifier
An Information Element Identifier is a unique identity
which enables a given information element to be determined within the
operating context.
IESG - Internet
Engineering Steering Group
The Internet Engineering Steering Group forms part of the
IETF (Internet Engineering Task Force) and is comprised of the IETF Chairman
and the Area Managers of each of the associated working groups.
IETF - Internet
Engineering Task Force
The Internet Engineering Task Force consists of more than
80 working groups responsible for developing Internet standards.
ifc - Initial
Filter Criteria
ifc are associated with a particular IMS service profile,
stored in the HSS and installed in the S-CSCF during registration. ifcs
contain parameters which form part of a filter. When these parameters are
identified within an incoming SIP message, the S-CSCF can use ifc to
determine the next hop forwarding action.
IFL - International
Frequency List
The International Frequency List is published by the ITU
(International Telecommunications Union) and specifies the allocated use of
radio frequencies.
IFOM - IP Flow
Mobility
IFOM is a technique used in WiFi offload to allow
selective traffic offload, allowing some traffic streams to traverse the LTE
network whilst others traverse the WiFi network.
IGMP - Internet
Group Management Protocol
This is the protocol used by network hosts to express the
desire to join or leave a particular multicast group. For example, in an IPTV
scenario, a subscriber changing channel will leave one multicast group and
join a different multicast group. IGMP is typically found operating over the
last hop in the IP network, between the host device and the router that
device is connected to. In the multicast network, PIM is used to allow
multicast routers to join and leave multicast groups, as and when they are required
to forward or stop forwarding multicast traffic to a particular recipient.
IGP - Interior
Gateway Protocol
An Interior Gateway Protocol is used to exchange routing
information within an autonomous system. Examples of IGP include OSPF (Open
Shortest Path First) and RIP (Routing Information Protocol).
IID - Invoke ID
The IID is a reference number allocated by CAP in order to
correlate CAP messages with the relevant Invoke Component within the TCAP
Component Sub Layer.
IK - Integrity
Key
A 128bit number used to protect the integrity of
information passing between the RNC (Radio Network Controller) and the UE
(User Equipment) in UMTS.
IKE - Internet
Key Exchange
Internet Key Exchange is a mechanism for securely
exchanging key information across an unsecure IP network. Primarily used in
support of IPSec security association establishment, IKE employs Diffie
Hellman key exchange to establish an initial security association, after
which this can be used to set up further security associations.
IKEv2 - Internet
Key Exchange Protocol Version 2
IKEv2 is a component of IPsec used for performing mutual
authentication and establishing and maintaining Security Associations (SAs).
These SAs include shared secret information that can be used to efficiently
establish SAs for ESP (Encapsulating Security Payload) or AH (Authentication
Header) and a set of cryptographic algorithms to be used by the SAs to
protect the traffic that they carry. With IKEv2, a SA is first established in
order to protect and transport IKEv2 traffic. After this point, Child SAs can
then be established in order to protect other traffic types.
ILMI - Integrated
Local Management Interface
Provides a mechanism for ATM-attached devices, such as
hosts, routers, and ATM switches, to transfer management information. It is
based on the SNMP (Simple Network Management Protocol).
IM - Instant
Messaging
IM is a service which involves the exchange of typically
short messages between point to point or point to multipoint parties.
Predominantly developed and used across the Internet, IM services are now
being adopted by telecommunications service providers as a means of enriching
current service offerings. Generally, IM exchanges do not require a session
to be established between sender and receiver.
IM CN - IP
Multimedia Core Network
The term IM when related to the IMS (IP Multimedia
Subsystem) is normally added to other terms such as network functions within
the Core Network, i.e. IM CN to indicate that these functions are enabled to
support IMS operation.
IM-AG - IMS
Access Gateway
In the 3GPP IMS (IP Multimedia Subsystem) architecture,
the IM-AG is a network functional entity which is incorporated into the
functionality of the IBCF (Interconnection Border Control Function). The role
of the IM-AG is to ensure that addressing associated with inbound and
outbound media streams is correct, which is essentially a NAT (Network
Address Translation) function. The IM-AG is also referred to as the TrGW
(Transition Gateway).
IM-CSI - IM –
CAMEL Subscription Information
If an IMS subscriber has access to CAMEL services this
will be indicated through IM-CSI (IM – CAMEL Subscription Information). This
information is stored in the HSS and is passed on by the S-CSCF to the
relevant IM-SSF.
IM-MGW - IMS –
Media Gateway
The IM-MGW handles the media plane (voice) bearer as part
of an IP based call. Controlled by an MGCF (Media Gateway Control Function),
the IM-MGW will provide CS/PS media stream termination, transcoding and
conversion services.
IM-SSF - IP
Multimedia – Service Switching Function
The IM Basic Call State Models are used to define the call
processing architecture within the IMS that is recognizable to the CSE and
are identical to those defined for call control in traditional network
functions such as the MSC (Mobile Switching Centre). The Basic Call State
Models are logically located within the IM-SSF which performs the mapping
process between SIP methods passed across the ISC and Detection Points that
will be used to initiate dialogue with the CSE.
IMA - Inverse
Multiplexing over ATM
The IMA (Inverse Multiplexing over ATM ) protocol allows
multiple E1 links to be used as a group to provide an aggregate bandwidth.
The ATM (Asynchronous Transfer Mode) transmission protocol is already used to
carry all of the signalling, voice and data information for many networks,
e.g. 3G mobile networks. The use of IMA ensures that the bandwidth from each
E1 link is proportionally used. This avoids any one link becoming a
bottleneck to the service. When additional bandwidth is required an extra
link can be added with little or no management of the ATM or application
layers required.
IMAP - Internet
Message Access Protocol
The Internet Message Access Protocol provides a method of
accessing e-mail or bulletin board messages kept on a mail server. IMAP
permits client e-mail applications to access remote message stores as if they
were local, without actually transferring the message.
IMAP4 - Internet
Message Access Protocol 4
The Internet Message Access Protocol 4 is an IETF
(Internet Engineering Task Force) which allows users to create and manage
mail folders over a network by scanning message headers and downloading
selected messages.
IMC - IMS
Credentials
IMC is a means by which a non 3GPP device can store IMS
related information, such as Private/Public ID and IMS security information.
IMEI - International
Mobile Equipment Identity
The International Mobile Equipment Identity is a unique
identifier allocated to each ME (Mobile Equipment). It consists of a TAC
(Type Approval Code), a FAC (Final Assembly Code), SNR (Serial Number) and a
Spare Digit.
IMEISV - International
Mobile Equipment Identity Software Version
A slight variation of the IMEI which also includes the
software version of the handset. In essence, this would denote, for example,
a particular iOS or Android version.
IMP - Messaging
Application Server
A Messaging application server such as an IMP (Instant
Messaging Platform) is used to provide support for legacy SMS services, as
well as next generation messaging services based on RCS (Rich Communication
Services) standards. Key features will include text and multimedia messaging,
1 to 1 chat, group chat delivery, display notifications and multidevice
support. In addition, a common message store facility may also feature as a
service offered to customers. Messaging sessions will be based on a combination
of SIP (Session Initiation Protocol) and MSRP (Message Session Relay
Protocol).
IMPI - IMS
Private ID
The IMPI within the IMS is the means by which the network
identifies the subscription. Typically, the IMPI contains a representation of
the subscriber’s IMSI (particularly in VoLTE networks).
IMPU - IMS
Public User Identity
The Public User Identity is the means by which a
subscriber of an IMS service is identified by other users of the service. For
example, in VoLTE, the IMPU typically contains a representation of the
subscriber’s telephone number. This could be in a SIP or Tel URI format.
IMS - IP
Multimedia Subsystem
The IMS is a service management architecture which was
introduced by the 3GPP. Designed to operate using SIP signalling, the IMS is
IP-CAN agnostic. That is, regardless of the IP-CAN that the subscriber is
connected to, that subscriber should still be able to access their services
using SIP signalling directed towards the IMS. The IMS does not provide
services itself, rather, it manages requests for services between the
subscriber and the AS that provides the service. Core network entities
associated with the IMS include the CSCF and HSS.
IMS
SCC - Service Centralization and Continuity
IMS SCC includes the IMS Centralized Services and IMS
Service Continuity Specifications. IMS SCC would be used in support of SR-VCC
(Single Radio Voice Call Continuity), which allows a subscriber conducting a
VoLTE call to handover to the 2G/3G network without the call dropping.
IMS-ALG - IMS
Application Level Gateway
In the 3GPP IMS (IP Multimedia Subsystem) architecture,
the IM-ALG is a DPI (Deep Packet Inspection) device which ensures that
addressing contained within SIP signalling is removed if required or altered
in order to support NAT traversal. Additionally, the IM-ALG will also monitor
SIP signalling in order to detect malicious attack. The IM-ALG is a
functional entity of the IBCF (Interconnection Border Control Function).
IMS-MGW - IMS
Media Gateway
In the 3GPP IMS (IP Multimedia Subsystem) architecture,
the IMS-MGW operates in conjunction with the MGCF (Media Gateway Control
Function) in order to support interworking between IP based transport
networks and the circuit switched domain. The IMS-MGW will translate media
arriving within a TDM based timeslot to an RTP (Real time Transport Protocol)
stream or vice versa.
IMS-SSF - IMS –
Service Switching Function
The IMS-SSF acts as a gateway between the SIP/Diameter
based IMS and the CAP (CAMEL Application Part) based CAMEL (Customized
Application for Mobile network Enhanced Logic) application servers. In this
role, the IMS-SSF ensures that where appropriate, SIP/Diameter messages are
translated to the corresponding CAP message and vice versa.
IMSI - International
Mobile Subscriber Identity
The International Mobile Subscriber Identity is a unique
identifier allocated to each mobile subscriber in a GSM, UMTS, LTE and 5G
network. It consists of a MCC (Mobile Country Code), a MNC (Mobile Network
Code) and a MSIN (Mobile Subscriber Identification Number).
IMSI Attach
The term used mainly to identify the procedure when the
mobile registers after being switched on.
IMT2000 - International
Mobile Telephony 2000
IMT2000 is a vision for a single global standard for
wireless networks proposed by the ITU (International Telecommunications
Union). It is often perceived as a global 3G (Third generation) system.
IMUN - International
Mobile User Number
The International Mobile User Number is a number allocated
to a UMTS user.
IN - Intelligent
Network
An Intelligent Network is a network in which the
intelligence is centralized and separated from the switching function. IN
systems provide enhanced services e.g. a VPN (Virtual Private Network).
In Band Signalling
In band signalling utilizes part of the data transmission
to carry other control information such as signalling.
INAP - Intelligent
Network Application Part
A protocol offering real time communication between IN
(Intelligent Network) elements.
Infrared
Electromagnetic waves whose frequency range is above that
of microwaves, but below that of the visible spectrum. These electromagnetic
frequencies are often used for communication between devices such as notebook
computers, printers and mobile phones etc.
INMARSAT - International
Maritime Satellite Organization
The International Maritime Satellite organization was set
up originally to provide ship to shore communications but was later expanded
to include aircraft and general telecommunications.
Inquiry
The inquiry procedure enables a Bluetooth unit to discover
which units are in range. The Bluetooth units that see this inquiry may send
a response to the inquiring Bluetooth unit. This contains information about
the Bluetooth unit itself and its Bluetooth Host.
Insured Burst
Within an ATM (Asynchronous Transfer Mode) network, the
largest burst of data above the insured rate that temporarily is allowed on a
PVC (Permanent Virtual Circuit) and not tagged by the traffic policing
function for dropping in the case of network congestion. The insured burst is
specified in bytes or cells.
Insured Traffic
Traffic within the insured rate specified for an ATM
(Asynchronous Transfer Mode) PVC (Permanent Virtual Circuit). This traffic
should not be dropped by the network under normal network conditions.
Integrated Circuit
A circuit which is constructed as an assembly of
electronic elements in a single structure.
Integrity
In the context of security, Integrity is the avoidance of
unauthorised modification of information.
INTELSAT - International
Telecommunication Satellite Organization
INTELSAT was set up in 1964 to develop a global satellite
communication system.
Inter
In relation to mobile networks, a term usually associated
with handovers. An example being the GSM system, a handover from one BTS
(Base Transceiver Station) to another BTS is identified as a inter BTS
handover, however it can also be called an intra BSC (Base Station
Controller) handover (assuming that both BTS are on the same BSC).
Interactive service
A service which provides the means for bi-directional
exchange of information between users. Interactive services are divided into
three classes of services: conversational services, messaging services and
retrieval services.
Interconnection
The physical and logical linking of telecommunication
networks used by the same or different organizations in order to allow
communication.
Interface
An Interface may be defined by a set of technical
characteristics describing the point of connection between two
telecommunication entities. For example, the connection between a
telecommunication network and the customer’s apparatus.
Interference
Interference can best be described as the effect of
unwanted signals or noise on a wanted signal. Co-channel interference is
caused by unwanted signals sharing the same frequency as the wanted signal
and Adjacent Channel Interference is caused by signals on neighbouring
channels.
Interleaving
The process by which a stream of bits or symbols from a
PDU (Protocol Data Unit) or SDU (Service Data Unit) may be spread in a
specific order with bits or symbols from other PDU or SDU. This technique is
often used to reduce the effect of a burst of errors on a radio transmission
link.
Internet Telephony
The generic term used to describe various approaches to
running voice telephony over IP.
InterNIC
The InterNIC serves the Internet community by supplying
documentation and a registration service for Internet domain names.
Intra
A term usually associated with handovers. An example being
the GSM system, a handover from one BTS (Base Transceiver Station) to another
BTS could be identified as an intra BSC (Base Station Controller) handover,
however this assumes that both BTS are connected to the same BSC.
Intra Base Station Frame
Handler
Intra Base Station Frame Handler The Intra-Base Station
Frame Handler exchanges backhaul frames with channel elements involved in an
Intra Base Station Soft Handoff.
Intra PLMN handover
Handover within the same network, i.e. having the same
MCC-MNC regardless of radio access system. Note: this includes the case of
UMTS to GSM handover where MCC-MNC are the same in both cases.
Intra-Cell Handover
A handover within one sector or between different sectors
of the same cell is termed an Intra-Cell Handover. These do not require
network connections to be altered.
Intranet
Intranet An Intranet is a private network operating the
same internet protocols as the Internet but is isolated from the Internet
itself. The two networks may be connected but this is usually done through a
NAT (Network Address Translator) server and firewall.
IntServ - Integrated
Services
The Internet Integrated Services framework provides the
ability for applications to choose defined QoS (Quality of Service) for their
data. To support this requirement routers along the path followed by an
application’s data packets must implement mechanisms to control the QoS
offered to those packets. Also a way to communicate the application’s
requirements to the routers along the path must also be provided. RSVP
(Resource Reservation Protocol) has been defined to fulfil this task.
IOI - Inter
Operator Identifier
The IOI is a globally unique identifier to share between
operator networks/service providers/content providers to correlate billing
information generated within the IMS (IP Multimedia Subsystem).
IoT - Internet
of Things
The Internet of Things is best described as the
interconnection of billions of devices, often in everyday objects, which will
send and receive data. The term is often associated with key verticals such
as Automotive, Utilities and Healthcare enabling smart and efficient services
to be supported. Examples from these verticals may include, fleet tracking,
smart meters and remote health monitoring.
IoTivity
IoTivity is an open source project developing a standard
specification and certification programme to enable IoT (Internet of Things)
devices to communicate with each other.
IOV - Input
Offset Value
The IOV (Input Offset Value) is used in the GPRS ciphering
process and consists of a 32bit value generated by the SGSN.
IP - Internet
Protocol
IP is a widely used network layer technology, providing
transport services to a huge array of network traffic around the globe.
Mobile service providers use IP extensively, both in the core and radio
access network in order to carry signalling and user plane traffic. For
instance, LTE (Long Term Evolution) is based on IP transport on an end to end
basis. IP will provide a variety of services to higher layer protocols,
including network level addressing to ensure end to end delivery, QoS packet
marking, payload identification, protection against unroutable packets and
packet fragmentation (although this is rarely used).There are 2 versions of
IP currently in existence: IPv4 and IPv6. IPv4 has seen considerable
deployment to date, but is limited in terms of the number of unique IP
addresses it has available. Conversely, although IPv6 has seen a lower volume
of deployment, its addressing capacity is significantly greater.
IP Address - IP
Address (IPv4)
IP v4 utilizes a 32bit address which is assigned to hosts.
An address is written as 4 octets separated by periods and may range from
0.0.0.0 through to 255.255.255.255. Each address consists of a network
number, an optional subnetwork number and a host number. The network portion
of the address is used for routing, and the host number is used to address an
individual host within the network or subnetwork. Across the Internet, IPv4
addresses are organized using CIDR (Classless Inter Domain Routing).
IP Datagram
An IP Datagram can be defined as the fundamental unit of
information which is passed across the Internet. It contains header
information such as the source and destination addresses along with the
payload data.
IP Flood
This is a class of DoS (Denial of Service) attack whereby
the system is flooded with information using up all available bandwidth and
so preventing legitimate users from access.
IP Multicast
IP Multicasting allows IP traffic to be distributed from
one source to a number of destinations or from many sources to many
destinations. This technique is efficient when sending the same information
to many hosts, such as a TV service that distributes content as a payload of
IP (termed IPTV). Multicasting employs Multicast Groups which hosts will join
(using IGMP ) if they are interested in the content being delivered to that
multicast group. As such, part of the IPv4 address space has been reserved for
multicast group identification. Multicast data for a particular group will be
sent to the multicast address of that group, with the routing network
responsible for duplicating multicast content as necessary in order to
deliver a copy of the packet to all interested parties.
IP Telephony
The transmission of voice and fax phone calls over data
networks utilizing IP (Internet Protocol) as the transport mechanism. IP
telephony could be carried out across the Internet, private enterprise LAN or
a telecoms service provider’s WAN.
IP-CAN - IP
Connectivity Access Network
In the 3GPP IMS (IP Multimedia Subsystem) architecture,
the IP-CAN is the term given to the access network which provides IP
connectivity to the IMS subscriber. Examples include GPRS, LTE and WiFi.
IP-SM-GW - IP
Short Message Gateway
The IP Short Message Gateway is an IMS Application Server
which handles SIP based messaging services for IMS subscribers. In addition,
the IP-SM-GW will interact with the legacy SMSC using MAP signalling in order
to allow IMS to SMS conversion and distribution.
IPDR - Internet
Protocol Detail Record
The IPDR has been defined in terms of the notation,
syntax, encoding, and transport specified to achieve maximum interoperability
between service elements, such as the CGF , and business support systems.
Consequently, the billing information generated externally can be interpreted
by the network and the appropriate invoice can be raised with the customer.
IPLMN - Interrogating
Public Land Mobile Network
This term is related to CAMEL operation and defines the
location of the GMSC that has triggered interaction with the CSE. The IPLMN
will normally be the Home PLMN , unless SOR is being supported.
IPRAN - IP Radio
Access Network
IPRAN is a general term used to describe a Radio Access
Network (2G, 3G or 4G) which uses IP as a transport layer technology. IPRAN
replaces older TDM based transport technologies, which in turn allows the
service provider to benefit from OPEX reduction.
IPS - Intrusion
Prevention System
IPS is a network security tool which is designed to detect
and mitigate against malicious attack. IPS devices monitor the network for
irregularities such as malware signatures, changes in average traffic volume
or access failures. Once positively identified as an attack, IPS will work
with other network elements such as routers in order to prevent or reduce the
effectiveness of the attack.
IPSec - IP
Security
IPsec provides security within IP transport networks at
the individual packet level. Packets which are IPsec protected can be
integrity checked, authenticated and encrypted, depending on the level of
protection required. Two versions of IPsec exist, AH (Authentication Header)
and ESP (Encapsulating Security Payload), the difference being that where
both versions support integrity and authentication, ESP also supports
encryption. When IPsec is used between two network nodes, a Security
Association must be established between them. The Security Association will
have a unique SPI (Security Parameters Index) which will be used to determine
exactly how the traffic traversing the Security Association is protected.
IPTV - Internet
Protocol Television
IPTV describes the notion of delivering TV services via an
IP distribution network, as opposed to the more traditional terrestrial
broadcast network. IPTV, along with voice and broadband, forms a Triple Play
service, which is being offered by many service providers around the globe.
Both unicast and multicast techniques are used in IPTV architectures, with
the former in support of video on demand type services and the latter
deployed to emulate existing terrestrial services. Unicast services typically
use RTSP for control, whereas multicast services use a combination of IP
Multicast , IGMP and PIM.
IPv6 - Internet
Protocol version 6
IPv6 provides a replacement for IPv4. IPv6 includes
support for flow Identity in the packet header, which can be used to identify
flows and improve QoS (Quality of Service). However, the primary reason for
developing IPv6 was the requirement for IP address space. As such, IPv6 uses
128bits for addressing, as opposed to IPv4 which uses 32bits. This provides a
colossal amount of address space. IPv6 was formerly known as IPng (next
generation).
IPX - IP Packet
eXchange
The IPX is the successor to the earlier GRX, providing QoS
aware, secure IP connectivity between the PS networks of different mobile
service providers.
IPX-Proxy - Internet
Packet eXchange Proxy
IPX proxies are designed to support IP service
interworking between service providers and as such, there is not a
prescriptive definition of the capabilities a particular IPX Proxy may
support. However, examples of IPX proxy functionality include session based
accounting, support for multilateral roaming agreements, security, media
conversion, signalling conversion and Diameter routing.
IrDA - Infrared
Data Association
The Infrared Data Association is a non profit making
organization established in 1993 to develop hardware and software standards
for infrared data transmission.
IREG - International
Roaming Expert Group
IREG are involved in the standardization of roaming,
specifying the benchmark of capabilities that two service providers must
support before roaming agreements can be put into place. As part of this, a
large variety of trial call and data scenarios must be conducted successfully
between the two roaming partners.
Iridium
A global mobile satellite communication system offering
telecommunication services across the entire globe. This system consists of
66 satellites operating in the LEO (Low Earth Orbit).
IRSG - Internet
Research Steering Group
The Internet Research Steering Group forms part of the
IRTF (Internet Research Task Force) and is responsible for setting the
priorities and coordinating research activities of the IRTF.
IRTF - Internet
Research Task Force
Internet Research Task Force is a group of technical
experts that consider Internet related research topics.
IS - IPDR Store
The IS provides persistence in that IPDR records can be
stored prior to transmission. The IPDR Transmitter delivers the IPDR, either
from the IS, or directly from the IR to the Business Support System.
IS-136 - Interim
Standard 136
Interim Standard 136 is often referred to as DAMPS
(Digital Advanced Mobile Phone Service). This system uses a TDMA (Time
Division Multiple Access) process over the radio interface which is similar
to that used in GSM.
IS-41 - Interim
Standard 41
Interim Standard 41 is a signaling protocol used in North
American cellular telecommunications systems. It deals with the signalling
between the MSC (Mobile Switching Centre) and other network elements for the
purpose of handovers and roaming etc.
IS-95 - Interim
Standard 95
IS-95 – Interim Standard 95 IS-95 is a TIA
(Telecommunications Industry Association) standard for North American
cellular systems based on CDMA (Code Division Multiple Access) which are
found within North America and Asia. IS-95a is often referred to as cdmaOne
which is capable of supporting voice and data at 14.4Kbps whereas IS-95b is
capable of supporting data rates up to 115Kbps.
ISAKMP - Internet
Security Association and Key Management Protocol
ISAKMP (Internet Security Association and Key Management
Protocol) forms part of the protocol suite developed to support IKE (Internet
Key Exchange) and is used to define the framework in which a SA (Security
Association) is negotiated, established and modified between end points.
ISAKMP is protocol independent and consequently may be employed with many IKE
protocols such as the Oakley key exchange.
ISC - IP
multimedia subsystem Service Control interface
The ISC connects the S-CSCF to the Application Server
supported either in the 3GPP Home PLMN or a third party network and is based
on SIP. The AS may influence the session or service being provided by the
S-CSCF across the ISC. In terms of the logic provided by the service
environments the ISC will present this in a consistent format to the S-CSCF
through a series of SIP methods and responses.
ISDN - Integrated
Services Digital Network
An ISDN is an end to end digital network capable of
simultaneous transmission of a range of services such as voice, data and
video etc. The network is based upon 64Kbps circuits which are capable of
carrying voice or signalling.
ISG - Industry
Specification Group
ETSI Industry Specification Groups operate alongside
traditional standards-making committees within a specific technology area.
ETSI ISGs have their own voting rules and determine their own work programs,
ultimately with a view to producing specifications to be published by ETSI.
ISI - Inter
Symbol Interference
Inter Symbol Interference is the interference between
adjacent pulses of a transmitted code.
ISIM - IMS
Subscriber Identity Module
IMS (IP Multimedia Subsystem) subscribers may be issued
with an ISIM for the operator or carrier supporting the IMS service. This is
similar in nature to the SIM (Subscriber Identity Module) used in GSM and
GPRS and the USIM (Universal SIM) employed in UMTS. It holds information
regarding a user’s subscription level as well as authentication, security
information and their IMS private identity held in the form of a NAI (Network
Access Identifier). It should be noted that if the subscriber does not have an
ISIM then the USIM may be employed as the security algorithms held on the
USIM are the same as those held on the ISIM. An IMS private identity however
will have to be resolved from the user’s IMSI (International Mobile
Subscriber Identity).
ISM - Industrial,
Scientific and Medical
The term ISM is often associated with equipment or
applications used with the Industrial, Scientific or Medical environments.
ISMP - Inter
System Mobility Policy
In WiFi offload, this defines the preferred access network
type if the mobile is unable to connect to both E-UTRAN and Wi-Fi
simultaneously.
ISO - International
Standards Organization
The International Standards Organization is responsible
for a wide range of standards, including those relevant to networking. The
ISO developed the OSI (Open System Interconnection) reference model which is
a popular networking reference tool.
ISOC - Internet
Society
The Internet Society is an international nonprofit making
organization that coordinates the evolution and use of the Internet. In
addition, ISOC delegates authority to other groups related to the Internet,
such as the IAB (Internet Architecture Board).
Isochronous user channel
An Isochronous user channel is used for time bounded
information. An example would be compressed audio.
ISP - Internet
Service Provider
An Internet Service Provider is a company that provides
Internet access to other companies and individuals.
ISRP - Inter
System Routing Policy
In a WiFi Offload scenario, if the device is IFOM capable,
this policy (supplied to the mobile by the ANDSF) tells the mobile which IP
traffic flows should be sent over which access networks.
ISUP - ISDN User
Part
ISDN User Part is part of the SS7 (Signalling System No.7)
protocol layer and used in the setting up management and release of trunks
that carry voice and data between calling and called parties.
IT - Information
Technology
Information Technology generally refers to industries
using computers and their associated software.
ITS - Intelligent
Transportation System
ITS technologies are designed to provide advancements in
transport safety and mobility, with a view to boosting economic productivity.
They achieve this through the integration of advanced communication
technologies into both vehicles and transportation infrastructure.
ITU - International
Telecommunications Union
The International Telecommunication Union was established
by the United Nations in order to determine a set international
telecommunications standards and to allocate radio frequencies for specific
uses.
ITU-R - International
Telecommunications Union-Radio communication Standardization Sector
The ITU-R is an international body that develops worldwide
standards for radio communications technologies.
ITU-T - International
Telecommunications Union-Telecommunication Standardization Sector
The ITU-T is an international body that develops worldwide
standards for telecommunications technologies. These standards are grouped
together in series which are prefixed with a letter indicating the general
subject and a number specifying the particular standard. The ITU-T was
formally known as the CCITT (Consultative Committee for International
Telegraphy and Telephony).
ITU-T Series A
The series of standards dealing with the organization of
the work of the ITU-T.
ITU-T Series B
The series of standards dealing with definitions, symbols
and classifications.
ITU-T Series C
The series of standards dealing with general
telecommunications statistics.
ITU-T Series D
The series of standards dealing with general tariff
principles.
ITU-T Series E
The series of standards dealing with the overall network
operation, telephone service, service operation and human factors.
ITU-T Series F
The series of standards dealing with the
telecommunications services other than those of the telephone.
ITU-T Series G
The series of standards dealing with transmission systems,
media, digital systems and networks.
ITU-T Series H
The series of standards dealing with line transmission of
non telephone signals.
ITU-T Series I
The series of standards dealing with the ISDN (Integrated
Services Digital Network).
ITU-T Series J
The series of standards dealing with the transmission of
sound, programme and television signals.
ITU-T Series K
The series of standards dealing with protection against
interference.
ITU-T Series L
The series of standards dealing with the construction,
installation and protection of cable and other elements of outside plant.
ITU-T Series M
The series of standards dealing with the maintenance of
transmission systems, telephone circuits, telegraphy and facsimile.
ITU-T Series N
The series of standards dealing with the maintenance of
international sound programme and television transmission circuits.
ITU-T Series O
The series of standards dealing with the specifications of
measuring equipment.
ITU-T Series P
The series of standards dealing with telephone
transmission quality, telephone installations and local line networks.
ITU-T Series Q
The series of standards dealing with switching and
signalling.
ITU-T Series R
The series of standards dealing with telegraph
transmission.
ITU-T Series S
The series of standards dealing with telegraph services
and terminal equipment.
ITU-T Series T
The series of standards dealing with the terminal
characteristics and higher layer protocols for telematics.
ITU-T Series U
The series of standards dealing with telegraph switching.
ITU-T Series V
The series of standards dealing with data communication
over a telephone network.
ITU-T Series X
The series of standards dealing with data networks and
open system communication.
ITU-T Series Z
The series of standards dealing with programming
languages.
Iu Interface
Iu Interface This is the interface which links the RNC
(Radio Network Controller) with either a 3G MSC (3G Mobile Switching Centre)
or a 3G SGSN (3G Serving GPRS Support Node).
Iu Protocol
Iu Protocol The Iu Protocol defines the structure of user
plane on the Iu Interface. The payload of the frame is specified as a certain
PDU (Protocol Data Unit) type, depending on the information being
transported. These include type 0, type 1 and type 14.
Iu UP - Iu User
Plane protocol
IuUP protocol is used to carry user plane data across the
Iu interface which is associated with a RAB (Radio Access Bearer).
Consequently, if several RABs are associated with a particular mobile, each
of these RABs will require a separate instance of the IuUP protocol. The IuUP
protocol can be found on either the IuCS or IuPS interface.
Iu-CS Interface – Circuit
Switched - Iu-CS Interface (Circuit Switched)
Iu-CS Interface (Circuit Switched) This is the interface
in UMTS which links the RNC (Radio Network Controller) with a 3G MSC (3G
Mobile Switching Centre).
Iu-PS Interface – Packet
Switched - Iu-PS Interface (Packet Switched)
Iu-PS Interface (Packet Switched) This is the interface in
UMTS which links the RNC (Radio Network Controller) with a 3G SGSN (3G
Serving GPRS Support Node).
Iub Interface
Iub Interface This interface is located on a UMTS network
and is found between the RNC (Radio Network Controller) and the Node B.
Iuh Interface
The Iuh Interface spans the link between the HNB and the
HNB-GW. As such, it supports the broadband IP connection which links the
Femto Cell to the service provider’s core network.
Iur Interface
Iur Interface This Interface is located on a UMTS network
and is found between two RNC (Radio Network Controller).
IV - Initialization
Vector
An Initialization Vector is a block of bits that is
required to allow a stream cipher or a block cipher to be executed in any of
several streaming modes of operation to produce a unique stream independent
from other streams produced by the same encryption key.
IVR - Interactive
Voice Recognition
IVR, also termed Interactive Voice Response, is an
automated system which allows key spoken words to be detected and interpreted
in order to invoke a particular response. Typical examples of IVR are on
automated telephony systems which detect simple statements and direct the
calling party accordingly. More sophisticated systems allow the calling party
to speak entire sentences, constantly monitoring for key phrases to
facilitate correct interpretation.
IVR - Interactive
Voice Response
The systems that provide information in the form of
recorded messages over telephone lines in response to user input in the form
of spoken words or, more commonly, DTMF (Dual Tone Multiple Frequency)
signalling.
IWF - Interworking
Function
The Interworking Function is used to provide circuit
switched data services when connecting a cellular network to a PSTN. It is
comprised of rate adapters, modems and fax adapters.
IXP - Internet
Exchange Points
An IXP allows ISP (Internet Service Providers)to extend
their network by exchanging routing information and traffic with other ISPs.
The ISP buys a connection to the exchange point and locates a router at the
physical location of the LAN that forms the IXP. An IXP may therefore be
defined as: A physical network infrastructure (layer 2), operated by a single
entity to facilitate the exchange of Internet traffic between ISPs. The
number of ISPs connected should be at least three and there must be a clear and
open policy for others to join.
J-Carrier
The Japanese version of
the E-Carrier Hierarchy in Europe or T-Carrier Hierarchy in North America.
J-1 1.544Mbps J-2 6.312Mbps J-3 32.064Mbps J-4 97.728Mbps J-5 397.000Mbps
Jamming
Jamming is the deliberate introduction of interference to
a signal by generating another signal at greater power and close to the
transmitted frequency of the first signal.
JANET - Joint Academic
Network
The Joint Academic Network is a communication backbone
linking UK education and research establishments.
JAVA
JAVA is an object oriented programming language developed
at Sun Microsystems. The Java language is used extensively on the WWW (World
Wide Web).
Jitter
Jitter can be described as small or random variations in
time or phase of a transmitted signal which can result in errors or loss of
synchronization.
JPEG - Joint Photographic
Experts Group
Joint Photographic Expert Group defined a graphic file
format that was adopted as a standard by the ITU-T (International
Telecommunications Union-Telecommunication Standardization Sector) and the
ISO (International Standards Organization). JPEG is often used to compress
still images.
Justification
Justification is the method employed to change the rate
of a transmitted signal to allow it to match with a system having a different
rate.
JVM - JAVA Virtual
Machine
JAVA Virtual Machine is an operating system which allows
it to run software written in the Java language and provides the universal
portability of the JAVA code. It interprets the JAVA byte code and compiles
binary code suitable for the underlying operation system.
k -
Window Size
The Window Size is used by
a receiving device to specify the amount of data it is able to receive. This
prevents the transmitting device from sending data which will only be
discarded.
K- Key
Long term secret key shared between the USIM and the AuC
(Authentication Centre).
Ka Band
Electromagnetic spectrum in the 12GHz to 30GHz frequency
range.
KASME - Key Access
Security Management Entries
This is a key derived by the UE and the HSS (Home
Subscriber Server) from CK and IK during an AKA run. KASME also depends on
the PLMN identity ( MCC + MNC ). The key KASME is transferred from the HSS to
the ASME (Access Security Management Entity), i.e. MME, as part of an EPS
specific authentication vector response.
kbit/s - kilobit / Second
kbps is a measurement of data-rate and is equal to 1000
bits every second.
kByte/s - kilobyte /
Second
kByte/s is a measurement of data-rate and is equal to 1000
bytes every second (Note. 1 byte = 8 bits).
Kc - Ciphering Key
The Ciphering Key is a variable used in the GSM and GPRS
cipher process. It is applied to ciphering algorithms from the A5 range to
produce a cipher stream. This is modulo 2 added to user data in order to
protect it from eavesdropping.
KDF - Key Distribution
Function
This is part of the LTE authentication and key
distribution process. The 3GPP specifications define how keys and associated
parameters are passed between entities.
Key Distribution
Key Distribution is a process that delivers a
cryptographic key from the location where it is generated to the locations
where it will be employed.
Key Pair
A Key Pair is a set of mathematically related keys,
generally one public key and one private key. The public key is freely
distributed and used to encrypt data; however, it is only possible to
retrieve the original information with knowledge of the private key. The keys
are generated in a way that makes it very difficult to derive the private key
from knowledge of the public key.
Keys
Keys can be described as symbols used in the encryption of
plaintext to ciphertext.
kHz - Kilohertz
kHz is a measure of frequency equal to 1000 cycles per
second.
Ki - Authentication Key
Ki is a unique key associated with a GSM subscriber. It
applied to the A3 and A8 algorithms along with a random number to generate
authentication triplets. These are used by the core network to authenticate
GSM users.
Kilostream
A term used to describe the digital transmission circuit
operating at 64Kbps.
KSI - Key Set Identifier
This is used in the UMTS Authentication process to enable
a mobile to be ciphered without the continual need for reauthentication. The
equivalent in a GSM network is the CKSN (Cipher Key Sequence Number).
KSIASME - Key Set
Identifier Access
The security parameters for authentication, integrity
protection and ciphering are tied together in sets and identified by the Key
Set Identifier (KSIASME).
Ku Band
Electromagnetic spectrum in the 10GHz to 12GHz frequency
band.
L1 - Layer
1
This is also referred to
as the OSI (Open System Interconnection) Physical Layer. It provides the
functions for the transparent transmission of a bit stream between data link
entities.
L2 - Layer 2
This is also referred to as the OSI (Open Systems
Interconnection) Data Link Layer. It provides the means for synchronizing the
bit stream flowing to and from the physical layer and for the detection of
errors due to transmission problems e.g. noise and interference. An example
of a Data Link protocol would be Ethernet operating on a LAN (Local Area
Network).
L2CAP - Logical
Link Controller and Adaptation Protocol
In Bluetooth, the Logical Link Controller and Adaptation
Protocol functions include: higher level protocol multiplexing, conveying of
quality of service information and controlling packet segmentation and
reassembly.
L2M - Layer 2
Management
The Abis interface is proprietary and as such,
implementation is vendor specific.
L2ML - Layer 2
Management Link
L2ML is used for transferring Layer 2 management
messages.
L2R BOP - Layer
2 Relay Bit Orientated Protocol
This protocol is utilized within GSM non transparent
circuit switched data transfer to modify synchronous data streams which then
enables RLP (Radio Link Protocol) to provide a reliable and efficient data
transfer mechanism.
L2R COP - Layer
2 Relay Character Orientated Protocol
This protocol is utilized within GSM non transparent
circuit switched data transfer to modify asynchronous characters which then
enables RLP (Radio Link Protocol) to provide a reliable and efficient data
transfer mechanism.
L2TP - Layer
Two Tunnelling Protocol
L2TP has been defined using the best features of PPTP
(Point to Point Tunnelling Protocol) and L2F (Layer 2 Forwarding). It has the
ability to encapsulate PPP frames so they can be sent over IP , X.25, Frame
Relay , or ATM (Asynchronous Transfer Mode) networks. When using L2TP on an
IP based network, the IP datagram supporting the L2TP payload employs the
services of UDP (User Datagram Protocol).
L3 - Layer 3
This is also referred to as the OSI (Open Systems
Interconnection) Network Layer. It provides the paths for the transfer of
data between systems and across networks. The paths between systems may
include switched services, and interconnections of multiple subnetworks on
route. An example of a protocol operating at the network layer would be IP
(Internet Protocol).
L4 - Layer 4
This is also referred to as the OSI (Open Systems
Interconnection) Transport Layer. It provides for the transparent transfer of
data between peer session layer entities and ensures that the appropriate
quality of service is maintained.
L5 - Layer 5
This is also referred to as the OSI (Open Systems
Interconnection) Session Layer. It provides the services to control the
communication session between the peer entities. The session protocols will
determine such things as two-way simultaneous or two way alternate data
transfer.
L6 - Layer 6
This is also referred to as the OSI (Open Systems
Interconnection) Presentation Layer. It provides the services used to
establish the transfer syntax that will be used to support communication.
L7 - Layer 7
This is also referred to as the OSI (Open Systems
Interconnection) Application Layer. This layer can be divided into two
different service elements, the ACSE (Application Control Service Element)
which is responsible for the establishing the association between
communication Application Layers and the ASE (Application Service Elements)
which are used to satisfy specific contexts such as File Transfer and Network
Management etc.
LA - Location
Area
A Location Area is a number of cells (defined by the
mobile operator) throughout which a GSM / UMTS mobile will be paged.
LAA - License
Assisted Access
LAA is a technique for increasing data rates in LTE which
essentially provides LTE service providers and their subscribers with an
additional mechanism to utilize unlicensed spectrum. LAA coexists with WiFi
and other technologies in the 5GHz unlicensed band.
Label
A Label can be described as a short fixed length value
that enables switching devices to determine how the data (packets or cells)
should be forwarded.
LAC - Location
Area Code
The Location Area Code uniquely identifies a LA (Location
Area) within a PLMN (Public Land Mobile Network). It may range from 0 to
65,535.
LADN - Local
Area Data Network
LADN is the term used in the 5G specifications to refer
to a DN (Data Network) that is only accessible in specific locations.
LAI - Location
Area Identity
The Location Area Identity uniquely identifies a LA
(Location Area) within any PLMN (Public Land Mobile Network). It is comprised
of the MCC (Mobile Country Code), MNC (Mobile Network Code) and the LAC
(Location Area Code).
LAN - Local
Area Network
A Local Area Network is a network shared by communicating
devices, usually on a small geographical area. There are many different types
of Local Area Network technologies such as Ethernet , AppleTalk, Token Ring
etc.
LANE - Local
Area Network Emulation
Local Area Network Emulation allows an ATM (Asynchronous
Transfer Mode) network to function as a LAN backbone. The ATM network
provides services including multicast and broadcast support as well as
address mapping.
LAPB - Link
Access Protocol Balanced
Link Access Protocol, Balanced is a Layer 2 protocol used
in many control protocol stacks such as X.25. LAPB is a bit oriented protocol
derived from HDLC (Higher Level Data Link Control).
LAPD - Link
Access Protocol on the D Channel
Link Access Protocol on the D channel is a Layer 2
protocol used on the ISDN D channel. LAPD was derived from the LAPB (Link
Access Protocol Balanced) protocol and was designed to satisfy the signalling
requirements of ISDN basic access. LAPD is defined in the ITU-T
(International Telecommunications Union-Telecommunication Standardization
Sector) recommendations Q.920 and Q.921.
LAPDm - Link
Access Protocol on the Dm Channel
LAPDm is a modified version of LAPD (Link Access Protocol
in the D channel), the Data link layer protocol. The modifications make it
suitable for transmission across a radio interface. It is used in GSM to
support the transport of information between the mobile and the network.
LASER - Light
Amplification by Stimulated Emission of Radiation
A device which produces short duration high intensity
bursts of optical energy. Semiconductor LASER are often used as light sources
in optical network transmission systems.
LAU - Location
Area Update
A procedure performed by the mobile to supply the MSC
with the Location Area in which the mobile currently resides.
LBA - Local
Broadcast Area
The area of a broadcast service, where the service
content is the same.
LBI - Linked
Bearer Identity
When establishing additional EPS bearers the LBI is used
to identify Default EPS Bearer with which the new bearer is associated.
LCAF - Location
Client Authorization Function
The Location Client Authorization Function is responsible
for providing access and subscription authorization to a client.
Specifically, it provides authorization to a LCS (Location Services) client
requesting access to the network and authorizes the subscription of a client.
LCAF provides authorization to a LCS client requesting location information
of a specific mobile.
LCCF - Location
Client Control Function
The Location Client Control Function manages the external
interface towards LCF (Location Client Function) and identifies the LCS
(Location Services) client within the PLMN (Public Land Mobile Network) by
requesting client verification and authorization through interaction with the
LCAF (Location Client Authorization Function).
LCCTF - Location
Client Coordinate Transformation Function
The Location Client Coordinate Transformation Function
provides conversion of a location estimate, expressed according to a
universal latitude and longitude system, into an estimate expressed according
to a local geographic system understood by the LCF (Location Client Function)
and known as location information. The local system required for a particular
LCF will be either known from subscription information or explicitly
indicated by the LCF.
LCD - Liquid
Crystal Display
A Liquid Crystal Display is an alphanumeric display
comprising of a liquid crystal format sandwiched between two films of glass.
The display includes an array of electromagnetic dots. These may be charged
or discharged; the current flowing through these points affects the
transparency of the crystal adjacent to the dots, so controlling the display.
LCF - Location
Client Function
The Location Client Function provides a logical interface
between the LCS (Location Services) client and the LCS server. This function
is responsible for requesting location information for one or more ME (Mobile
Equipment) / MS (Mobile Station) with a specified QoS (Quality of Service)
and receiving a response, which contains either location information or a
failure indicator.
LCID - Logical
Channel Identifier
The Logical Channel ID field identifies the logical
channel instance of the corresponding MAC SDU or the type of the
corresponding MAC control element or padding.
LCR - Least
Cost Routing
A telecommunication system feature in which the network
automatically selects the lowest cost transmission path to the destination.
LCS - Location
Service
Location services are those provided to clients, giving
information. These services can be divided into: Value added services (such
as route planning information), Legal and lawful interception services (such
as those that might be used as evidence in legal proceedings), Emergency
services (these will provide location information for organizations such as
police, fire and ambulance service).
LDAP - Lightweight
Directory Access Protocol
LDAP defines a standard for defining a hierarchical
directory structure, and a standard interface for accessing these
directories. LDAP grew from the X.500 standard.
LDP - Label
Distribution Protocol
LDP is specifically designed for the distribution of
label information through an MPLS domain. It achieves this through Discovery
messages, Session messages and Advertisement messages.
LE - Local
Exchange
A Local Exchange is the first telephone exchange or
switch into which the lines connecting subscribers terminate.
Leaky Feeder
A Leaky Feeder is a special type of coaxial cable which
can be used to provide radio coverage inside buildings and tunnels.
LEAP - Lightweight
Extensible Authentication Protocol
LEAP is a proprietary wireless LAN (Local Area Network)
authentication method developed by Cisco Systems. Important features of LEAP
are dynamic WEP (Wired Equivalent Privacy) keys and mutual authentication
between a wireless client and a RADIUS (Remote Authentication Dial In User
Service) server.
Leased Line
A leased line is a transmission line generally leased
from a carrier or operator and is used to link several sites in order to
carry private data.
LED - Light
Emitting Diode
A Light Emitting Diode is a device which converts
electrical energy into light.
LEO - Low Earth
Orbit
Satellites which are located between 700km and 1500km are
said to be operating in a Low Earth Orbit. These satellites are travelling
faster than the earth is rotating and as such are moving relative to the
earth. An example of a satellite system operating within a Low Earth Orbit is
Iridium.
LER - Label
Edge Router
LER is a term used in MPLS to describe a router that
resides at the ingress and egress points of an MPLS network, handling both
labelled and unlabelled packets.
LFIB - Label
Forwarding Information Base
The database held within an MPLS Label Switching Router
which contains the next hop to label mappings currently in use.
LI - Length
Indicator
The Length Indicator is used to specify the number of
octets which make up a given IE (Information Element). They may also be used
to mark a specific element within an Information Element or frame.
Li-Fi - Light
Fidelity
Developed at Edinburgh University, Li-Fi is a
communication technology similar to that of Wi-Fi however it operates within
the visual light region of the electromagnetic spectrum and as such has
specific benefits in electromagnetic sensitive areas such as hospitals and
nuclear power facilities.
Line Code
A Line Code defines equivalences between sets of digits
generated in a terminal and the corresponding sequence of symbol elements
transmitted over the channel.
Link Budget
The process of considering all factors affecting the
signal on a transmission line in order to determine the SNR (Signal to Noise
Ratio). This information can then be used to plan the network and determine
such factors as output power.
Link Key
The Link Key is a Bluetooth authentication key used to
establish a link between devices. Devices that share the link key are
identified as bonded.
LIPA - Local IP
Access
LIPA is a technology related to LTE femtocells which
allows subscribers who are attached to Femto or Pico cells to access devices
on their local network without traffic entering the service provider’s
network. Essentially, traffic destined to another entity on the local network
arrives at the Femtocell and is bounced straight back into the LAN (Local
Area Network) for delivery.
LKL - Last
Known Location
Used in LCS (Location Services), Last Known Location
represents the current location estimate and its associated time stamp for a
target mobile stored in the LCS server
LLC - Logical
Link Control
LLC provides a highly reliable ciphered logical link.
This is achieved by providing a means of checking frame errors and signalling
back to the originator for the purpose of retransmission. LLC therefore
becomes an important link, especially when a mobile moves from one BSS (Base
Station Subsystem) to another. LLC is also independent of the underlying
radio interface protocols; a feature which was designed to enable an
alternative GPRS radio solution, yet minimize the changes required to the NSS
(Network Subsystem).
LLPDU - Logical
Link Control Protocol Data Unit
In a GPRS system an LL-PDU is a frame comprising of
either, user data, SMS message or GPRS Mobility Management information which
has been built by the LLC (Logical Link Control) protocol enabling its
reliable transfer between the MS (Mobile Station) and SGSN (Serving GPRS
Support Node).
LLS - Lower
Layer Split
LLS is a term relating to the functional split option
point in RAN deployments where the interconnectivity point between the
centralised unit and the distributed units is positioned in the protocol
stack from the MAC layer downwards.
LM - Link
Manager
The Link Manager function in Bluetooth controls how the
Bluetooth piconets and scatternets are established and maintained. It carries
out link establishment, authentication, and configuration procedures.
LMA - Local
Mobility Anchor
The LMA is part of PMIPv6, functioning as the Home Agent
in a PMIPv6 deployment.
LMMF - LMU
Mobility Management Function
The LMU Mobility Management Function is responsible for
maintaining the operational status of LMU (Location Measurement Unit) and
registering each LMU with a SMLC (Serving Mobile Location Centre). Operation
of the LMMF is independent of other logical LCS (Location Service) functions
and its output is provided to the PRCF (Positioning Radio Coordination
Function).
LMP - Link
Manager Protocol
The Link Manager Protocol in Bluetooth is used for link
set-up, security and control. The signals are interpreted and filtered out by
the LM (Link Manager) on the receiving side and are not propagated to higher
layers. Link Manager messages have higher priority than user data and
therefore shall not be delayed by other traffic.
LMU - Location
Measurement Unit
A typical cell site will feature an LMU in order to
support network based location services. The LMU is responsible for taking
specific radio interface measurements, typically under the control of the
SMLC (Serving Mobile Location Centre). Measurements are often in relation to
TDOA (Time Difference On Arrival) which, when combined with the measurements
taken from three or more other LMUs can be used to triangulate the location
of the subscriber.
Load Balancing
Load balancing is the process of distributing traffic
over transmission lines so that they carry approximately the same density of
traffic.
Local Broadcast Area
The area of a broadcast service, where the service
content is the same.
Local Loop
The Local Loop is the term for the system used to connect
the subscriber’s equipment or PABX (Private Automatic Branch Exchange) to the
LE (Local Exchange) or CE (Central Office). This may also be referred to as
the Final or Last Mile.
Logical Channels
A set of Logical Channel types are defined for different
kinds of data transfer. Each logical channel type is defined by what type of
information is transferred.
Logical OM
Logical OM (Operations and Maintenance) is the signalling
associated with the control of logical resources (channels, cells,) owned by
the RNC (Radio Network Controller) but physically implemented in the Node B.
The RNC controls these logical resources. A number of OM procedures
physically implemented in Node B impact on the logical resources and
therefore require an information exchange between RNC and Node B. All
messages needed to support this information exchange are classified as
Logical OM forming an integral part of NBAP (Node B Application Part).
Long Code
Long Code A PN (Pseudorandom Noise) sequence with period
2 42 – 1 that is used for scrambling on the Forward CDMA Channel and
spreading on the Reverse CDMA Channel. The long code uniquely identifies a MS
(Mobile Station) on both the Reverse Traffic Channel and the Forward Traffic
Channel.
Long Code Mask
This is a 42bit binary number that creates the unique
identity of the long code.
Loopback
Loopback is a test method in which a signal is sent to
the device under test which then returns the signal to the originator for
comparison.
LoRa
LoRa is a Long Range Low Power wireless technology
developed by the LoRa Alliance and often associated with the IoT (Internet of
Things). The radios operate in unlicensed radio spectrum to support
communication between remote sensors and their gateways, providing a secure
high capacity communication link.
LOS - Line Of
Sight
This term is often associated with radio transmission
systems indicating there is a clear path between the transmitter and
receiver. An example of a communication system that requires a Line Of Sight
is a microwave link.
Lossy
A very general term to describe a packet switched network
that is prone to loose packets when the traffic levels build up.
Low Pass Filter
A Low Pass Filter is a device which allows all
frequencies below a predetermined value to pass through whilst blocking all
those above.
LPC - Linear
Predictive Coding
Linear Predictive Coding is an encoding technique used to
aid in the prediction of the next sample. This technique can be found in many
analogue to digital conversion processes.
LPWA - Low
Power Wide Area
Often associated with Mobile IoT (Internet of Things),
Low Power Wide Area is a generic term for a group of technologies with the
following characteristics; long battery life, (10 years +), wide area
coverage, low chipset costs and limited data throughput. Technologies under
this group include EC-GSM (Extended Coverage GSM), LTE-M (Long Term Evolution
– Machine to Machine) and NB-IoT (Narrow Band – Internet of Things).
LR - Location
Register
Location Registers are database functions storing
information typically used in the routing of signalling information. Typical
examples include the HLR (Home Location Register) and VLR (Visitor Location
Register) used in GSM.
LRF - Location
Retrieval Function
In the 3GPP IMS, the LRF retrieves location information
for users that have initiated an emergency session. This location information
is provided to the E-CSCF (Emergency CSCF) in order to facilitate routing of
the call to a suitable PSAP (Public Safety Answering Point).
LSA - Exclusive
Access Cell
A mobile may only camp on this cell if the cell belongs
to the LSA (Location Service Area) to which the user has subscribed.
Nevertheless, if no other cells are available, the mobile of non-LSA users
may originate emergency calls from this cell.
LSA - Licensed
Shared Access
Licensed Shared Access relates to radio spectrum usage.
It extends the concept of ASA (Authorised Shared Access) to other services.
LSA provides a complementary tool for spectrum management.
LSA - Localized
Service Area
A Localized Service Area is a network defined group of
cells, in which specific access conditions apply. This may correspond to an
area in which the Core Network offers specific services. A LSA may be defined
within a PLMN or globally. Therefore, a LSA may offer a non-contiguous radio
coverage.
LSA Only Access
When LSA (Localized Service Area) only access applies to
the user, the mobile can only access cells that belong to the LSAs to which
the user has subscribed. Outside the coverage area of the subscribed LSAs,
the mobile may camp on other cells and limited services apply.
LSAF - Location
Subscriber Authorization Function
The Location Subscriber Authorization Function is
responsible for authorizing the provision of a LCS (Location Services) for a
particular mobile. Specifically, this function validates that a LCS can be
applied to a given subscriber.
LSBcF - Location
System Broadcast Function
The Location System Broadcast Function provides a
broadcast capability and is only used when broadcast data is required for
E-OTD ( E-OTD – Enhanced Observed Time Difference) or AGPS (Assisted Global
Positioning System) positioning methods.
LSBF - Location
System Billing Function
The Location System Billing Function is responsible for
LCS (Location Services) billing activity within the network. This includes
charging and billing of both clients and subscribers. Specifically, it
collects charging related data and data for accounting between PLMN (Public
Land Mobile Network).
LSCF - Location
System Control Function
The Location System Control Function is responsible for
coordinating location requests. This function manages call-related and
non-call-related positioning requests of LCS (Location Services) and
allocates network resources for handling them. The LSCF retrieves the MS
(Mobile Station) classmark which enables it to determine the positioning
method to use.
LSOF - Location
System Operation Function
The Location System Operations Function is responsible
for the provisioning of data, positioning capabilities, data related to
clients and subscription information, validation, fault management and
performance management of LCS (Location Services).
LSP - Label
Switched Path
LSP is an MPLS term used to describe the virtual circuit
between two LER (Label Edge Router).
LSPF - Location
Subscriber Privacy Function
The Location Subscriber Privacy function is responsible
for performing all privacy related authorizations. For a target mobile, it
will authorize the positioning request versus the privacy options of the
mobile.
LSR - Label
Switching Router
LSR is a term used in MPLS to describe an MPLS node which
is capable of forwarding labelled packets.
LSSU - Link
Status Signalling Unit
The Link Status Signalling Unit is sent between two SS7
signalling points and serves to indicate the status of the specific link.
When a link is determined to have failed the signalling point that detected
the error condition is responsible for alerting adjacent signalling points
that the link is not available. The LSSU is used to perform this task.
LTE - Line
Terminating Equipment
Line Terminating Equipment may also be referred to as
Line Terminal Equipment and is the equipment which terminates the
transmission line. Examples include a telephone or facsimile machine.
LTE - Long Term
Evolution
Standardized in 3GPP Release 8, LTE introduces a network
which is based purely on IP as the transport mechanism. That is, all traffic,
including voice, will be passed across the E-UTRAN as an IP datagram.
Moreover, all of the network nodes within LTE use IP to carry signalling
between one another. Termed the EPS (Evolved Packet System), the end to end
LTE network is comprised of the E-UTRAN (Evolved – Universal Terrestrial
Radio Access Network) and the EPC (Evolved Packet Core).
LTE-A - LTE
Advanced
Standardized in 3GPP Release 10, LTE-Advanced introduced
enhancements to the LTE Radio interface which allow typical user data rates
in the low hundreds of Mbps, with theoretical rates in the downlink as high
as 1Gbps. Technologies introduced in order to facilitate this include higher
order modulation techniques (128 QAM), Carrier Aggregation (up to 5x20MHz
channels hence 100MHz total) and enhanced MIMO (up to 8×8).
LTE-A Pro - LTE
Advanced Pro
LTE Advanced Pro is a technology marker for 3GPP
technologies developed during the standardization of 3GPP Release 13 and
Release 14. Technology enhancements introduced in these specifications
include multi carrier aggregation, LAA (License Assisted Access), Massive
MIMO, D2D (Device to Device), V2X (Vehicle to Anything), NB-IOT (Narrowband
Internet of Things) and LTE for Public safety, amongst many others.
LTE-M - LTE
Machine Type Communications
LTE-M is a technology based on existing LTE standards
which is specifically designed for MTC. As such, LTE-M features an extended
DRX cycle which makes the LTE-M device more energy efficient. Due to the fact
that LTE-M is based on LTE, support for LTE-M in the network is not a
significant cost undertaking. LTE-M works within a 1.4Mhz LTE channel.
LTE-U - LTE
Unlicensed
LTE-U was originally developed by Qualcomm as a mechanism
for operating a 4G LTE radio deployment within the 5GHz Unlicensed spectrum
band. This technology is designed to augment existing LTE coverage, without
using alternative technologies such as Wi-Fi.
LVRB - Local
Virtual Resource Block
The E-UTRA uses the concept of VRB (Virtual Resource
Block) when allocating resources. It defines two types: LVRB (Local Virtual
Resource Block) – this is the same as the PRBs and DVRB (Distributed Virtual
Resource Block) – this identifies a distribution of the resources required
over a number of PRBs.
M-CSI - Mobility
Management – CAMEL Subscription Information
The HLR contains M-CSI so
that the CSE (CAMEL Service Environment) may monitor and control MM (Mobility
Management) events. It is sent to the VLR during the Location Update and
Restore Data procedures or when M-CSI is modified in the HLR.
M-TMSI - M
Temporary Mobile Subscriber Identity
The M-Temporary Mobile Subscriber Identity provides for
an unambiguous identity of the UE within a particular MME.
M2PA - MTP 2
Peer to Peer Adaptation
M2PA forms part of the Sigtran Architecture along with
SUA (SCCP User Adaptation) M3UA (MTP3 User Adaptation) and M2UA (MTP2 User
Adaptation). While M2UA provides an MTP3/MTP2 interface boundary M2PA
provides functionality for full message handling and network management
between SS7 nodes communicating across an IP network. Using this protocol the
IP connection between the nodes may be viewed as a fully functional
signalling link.
M2UA - MTP2
User Adaptation
MTP2 User Adaptation Layer is used to access MTP2
(Message Transfer Part Level 2) functions using SCTP (Streaming Control
Transmission Protocol). A typical scenario would be if an agent in an IP
(Internet Protocol) based network needed to send and receive signalling
network management messages from a SG (Signalling Gateway).
M3AP - M3
Application Protocol
M3AP is used in support of eMBMS (Evolved Multimedia
Broadcast Multicast Services) and is found on the M3 reference point, located
between the MME and eNB (specifically the Multicell/Multicast Coordination
Entity). The main role of M3AP is the support of MBMS Session Management,
ensuring that the MCEs within the eNB are provided with the correct
information to enable them to receive an MBMS service from the core network.
In turn, the MCE will use information provided in M3AP messages to correctly
establish the required radio resources.
M3UA - MTP
Level 3 User Adaptation Layer
M3UA enables the transport of SS7 (Signalling System
number 7) signalling over IP using the services of SCTP (Stream Control
Transmission Protocol). There are various User Adaptation layers available,
the choice of which is determined by how much SS7 functionality (in terms of
layers) needs to be retained in the IP transport network. Options include SUA
(SCCP User Adaptation), M3UA (MTP3 User Adaptation), M2UA (MTP2 User
Adaptation) and M2PA (MTP2 Peer to Peer Adaptation).
MA - Multiple
Access
The term Multiple Access is used to describe a system
where several users can gain access to a common transmission channel.
Examples of Multiple Access systems include TDMA (Time Division Multiple
Access) used in GSM , CDMA (Code Division Multiple Access) used in UMTS and
CSMA/CD (Carrier Sensing Multiple Access/Collision Detection) used by
Ethernet.
MAC - Medium
Access Control
The MAC protocol layer is present in the mobile and the
NB/eNB in order to support the correct multiplexing/demultiplexing of
signalling and user plane traffic onto the various transport channels of the
air interface.
MAC Address
This is often referred to as a hardware address and
uniquely identifies a device within a defined network area such as a LAN
(Local Area Network). A common example of a MAC address would be an Ethernet
address which will be associated with an Ethernet NIC (Network Interface
Card) used by all computers connected on an Ethernet LAN.
MAC-e
The Node B has one MAC-e entity per UE. The MAC-e entity
consists of a number of functions, including: E-DCH Scheduling, E-DCH
Control, demultiplexing of the MAC-e PDU and HARQ operation.
MAC-e/es
The MAC-es/e at the UE handles the E-DCH specific
features and functions, which include: HARQ , Multiplexing and sequence
number setting, as well as selection according to the E-RGCH and E-AGCH
information received from the UTRAN via Layer 1.
MAC-es
In the SRNC there is one MAC-es entity per UE. Key
functions of MAC-es in the SRNC include: – route MAC-es PDU to the correct
reordering buffer. – Reordering – this function is responsible for reordering
received MAC-es PDU. Each logical channel has its own reordering queue. –
Disassembly – this is responsible for disassembly of MAC-es PDU, such that
the MAC-d PDU can be delivered to MAC-d. – Macro Diversity Selection –
depending on implementation, when an UE is in soft handover there may be one
or more reordering queue distribution entities.
MAC-hs
The MAC-hs layer was added to the UMTS Node B as part of
HSDPA (High Speed Downlink Packet Access). It controls the H-ARQ
functionality of every HSDPA user, distributing the resources between
according packet scheduling, as well as dynamically controlling link
adaptation.
Macro Cell
Macro Cell A large cell, typically tens of kilometres
that is optimized to provide coverage and not capacity.
MAG - Mobile
Access Gateway
The MAG is a functional element of a PMIPv6 (Proxy Mobile
IP version 6) domain which would reside in the foreign network. When a mobile
device enters the foreign network, the MAG is responsible for communicating
with the LMA (within the home network) in order to establish a bidirectional
communication path between the home and foreign network.
Malware - Malicious
Software
Malware describes a wide range of unwanted software that
can be present on an infected machine, ranging from viruses, worms and
Trojans to spyware and addware.
MAN - Metropolitan
Area Network
A Metropolitan Area Network is a network of LAN (Local
Area Networks) or computers within a wide geographical area such as a
university campus etc.
Manchester Encoding
A digital encoding technique in which each bit period is
divided into two halves.
MANO - Management
and Orchestration
With respect to NFV (Network Functions Virtualization),
MANO provides the ability to instantiate new virtualized nodes, manage
existing nodes and also scale up or down resources for a given node. In
addition, MANO facilitates the on-boarding of new VNFs (Virtualized Network
Functions) into the system, as well as managing the instantiation of new
network services. Key elements of MANO include the NFVO (NFV Orchestrator),
VNFM (VNF Manager) and VIM (Virtualized Infrastructure Manager).
MAP - Mobile
Application Part
MAP – Mobile Application Part A protocol which enables
real time communication between nodes in a mobile cellular network. A typical
usage of the MAP protocol would be for the transfer of location information
from the VLR (Visitor Location Register) to the HLR (Home Location Register).
MAP - Mobile
Application Part
MAP – Mobile Application Part A protocol which enables
real time communication between nodes in a mobile cellular network. A typical
usage of the MAP protocol would be for the transfer of location information
from the VLR (Visitor Location Register) to the HLR (Home Location Register).
Mapping
The logical association of one or more parameters in
different networks.
MARS
MARS is a symmetric block cipher with a block size of
128bits. It employs a variable key ranging in length from 128bit to 448bit.
The algorithm was designed by IBM and was one of the five candidates selected
to become the AES (Advanced Encryption Standard).
Massive MIMO
Massive MIMO (Multiple Input Multiple Output) systems are
effectively MIMO systems with a large number of antennas. The term Massive
MIMO is closely linked to the latest enhancements in radio systems, e.g. 5G.
Master Clock
This is the clock which acts as the prime reference
source within a network and from which all other clocks derive their
reference.
Master Device
The Master Device is a term used to identify a Bluetooth
device that can initiate an action or service on a piconet. The piconet will
be synchronized to the clock and hopping sequence from the master device.
MBB - Mobile
Broadband
This is a generic term used to describe various wireless
high-speed Internet access technologies.
MBMS - Multimedia
Broadcast/Multicast Service
The MBMS is a unidirectional point to multipoint bearer
service in which data is transmitted from a single source entity to multiple
recipients. These services will typically be in the form of streaming video
and audio and should not be confused with the Cell Broadcast Service.
MBR - Maximum
Bit Rate
The MBR is the variable set in a traffic scheduler such
as an LTE eNB. This value determines the highest bit rate that may be allowed
by a device being served by the access network.
MBS - Maximum
Burst Size
A term used in ATM (Asynchronous Transfer Mode) to
specify the maximum number of cells which can be transmitted at the
contracted PCR (Peak Cell Rate).
MBSFN - MBMS
over a Single Frequency Network
MBSFN, as the title suggests, describes the delivery of
MBMS (Multimedia Broadcast Multicast Services) over a radio network which is
synchronised in order to minimise interference. The technique allows a group
of cells to transmit the same multicast content utilizing the same radio
sub-carriers, which essentially means a group of cells all appear as one
large cell since the content transmitted from each individual cell is
identical (and synchronized).
MC - Mission
Critical
The quality or characteristic of a communication
activity, application, service or device, that requires low setup and
transfer latency, high availability and reliability, the ability to handle
large numbers of users and devices, strong security and priority handling.
MCC - Mobile
Country Code
The Mobile Country Code is a three digit number uniquely
identifying a given country. It is utilized within numerous identities across
3GPP mobile networks, including the IMSI (International Mobile Subscriber
Identity), LAI (Location Area Identity) and GUTI (Globally Unique Temporary
ID).
MCData - Mission
Critical Data
As part of Mission Critical Services, MCData service
provides a number of generic capabilities such as messaging, file
distribution and data streaming. In addition, it provides specific services
such as conversation management, database enquiries, Internet and intranet
access, and also robot control.
MCE - Multicell/Multicast
Coordination Entity
The MCE forms part of the overall MBMS (Multimedia
Broadcast Multicast Service) and is responsible for the coordination of radio
resources at the cell site. As such, an MBMS capable eNB (evolved Node B)
must include an MCE as part of its functionality, or be in communication with
a standalone MCE. Responsibilities of the MCE include admission control and
allocation of radio resources related to eMBMS services.
MCEF - Mobile
Station Memory Capacity Exceeded Flag
A part of the MWI (Message Waiting Indication) to be
stored in the HLR (Home Location Register). MCEF indicates if the address
list of MWD (Message Waiting Data) contains one or more entries where SMS
delivery has failed because the memory capacity of the subscriber’s SIM
(Subscriber Identity Module) or USIM (UMTS Subscriber Identity Module) is
exceeded.
MCG - Master
Cell Group
With respect to Dual Connectivity, MCG is the term given
to the group of serving cells associated with the Master RAN node.
MCID - Malicious
Communication Identification
MCID is a supplementary service which allows the service
provider to trace the identity information of the source of an incoming
communication on request of the destination user.
Mcps - Megachips
per Second
Megachips per second (10 6 chips per second).
MCPTT - Mission
Critical Push To Talk
The collection of applications, services, and enabling
capabilities required to provide Mission Critical Push To Talk for a Mission
Critical organization.
MCPTT
Service - Mission Critical Push To Talk Service
A push to talk communication service supporting
applications for Mission Critical organizations and also mission critical
applications for other business and organizations with faster setup times,
high availability, reliability and priortiy handling.
MCS - Modulation
Coding Scheme
Modulation and Coding Scheme is a term used within EGPRS
(Enhanced GPRS) to specify which of the nine different modulation and coding
schemes is being applied. The modulation schemes can be either GMSK (Gaussian
Minimum Shift Keying) or 8PSK (8 Phase Shift Keying).
MCVideo - Mission
Critical Video
As part of Mission Critical Services, MCVideo service
provides users with the ability to capture and stream video securely. In
support of Mission Critical and Public Safety functionality group sessions,
end-to-end confidentiality, emergency type communications and low latency
performance are provided.
MD - Mediation
Device
A Mediation Device allows two differing devices to
interconnect through it by offering such services as protocol conversion and
mediation.
MD5 - Message
Digest 5
MD5 (Message Digest 5) was developed by RSA Security Inc
to provide a strong one way hashing function. The algorithm generates a fixed
length (128bit) digest from a message of any length, that can be appended to
prove data integrity. While viewed to be a strong algorithm new digests such
as SHA-1 which generate a 160bit digest are now thought to be more robust
than MD5.
MDF - Main
Distribution Frame
A Main Distribution Frame is often found at the local
exchange and is used to terminate the copper cables running from the
customers site. The frame allows these cables to be cross connected to other
equipment such as a concentrator or switch.
ME - Mobile
Equipment (Generic)
Mobile Equipment is the hardware element of a mobile
station and comprises of keyboard, screen, radio, circuit boards and
processors etc.
MEC - Multi
access Edge Computing
MEC is a means by which compute/storage resources can be
positioned closer to the subscriber’s point of attachment to the network. So,
in the case of 5G for example, it’s possible that the UPF (User Plane
Function) is situated at the RAN site in order to provide access to MEC
resources that are in close proximity to the subscriber. Use cases for MEC
are varied but include content caching, support for AR/VR and DNS caching.
MediaFLO - Media
Forward Link Only
MediaFLO was a system designed by Qualcomm specifically
for the transmission of digital TV to a mobile user. Content streams were
delivered to a NOC (Network Operations Centre) via a satellite or IP feed in
an MPEG-2 format. The encoded data was then delivered to networks of FLO (
Forward Link Only) transmitters using multiplexed links. At the FLO
transmitters, the upper layer data streams (H.264 video, MPEG-4 Advanced
Audio Coding etc.) are multiplexed into one logical channel and transmitted,
using a combination of TDM (Time Division Multiplexing)and OFDM. MediaFLO
used multicasting and also required a 3G network for provision of interactive
services. The service was discontinued in 2011.
MEF - Metro
Ethernet Forum
The MEF was the standards body behind the introduction of
Carrier Ethernet. Since its introduction, the MEF have continued to update
and refine the technology.
MEGACO - Media
Gateway Control
This VoIP (Voice over IP) term is also known as the ITU-T
(International Telecommunications Union – Telecommunications Standardization
Sector) H.248 standard and represents a collaboration between the ITU-T and
the IETF (Internet Engineering Task Force). MEGACO is a media gateway control
protocol used to create, modify and delete media streams across a media
gateway in addition to negotiating the media formats to be used. Since its
initial standardization, the IETF have relinquished any further development
responsibilities to the ITU.
Megastream
A British Telecommunications term to describe an E1
bearer comprising of 32 (64Kbps) channels.
MEO - Medium
Earth Orbit
Satellites which are located between 10,000km and
15,000km are said to be operating in a Medium Earth Orbit. These satellites
are travelling faster than the earth is rotating and as such are moving
relative to the earth.
MER - Message
Error Rate
The number of paging messages in error on the Paging
Channel or Forward Common Control Channel divided by the total number of
pages.
Message
A generic term for an SDU (Signalling Data Unit) which is
transferred between two network elements.
Message Switching
A transmission system which uses an intermediate point
for the storage and forwarding of messages between two communicating systems.
MExE - Mobile
Execution Environment
The Mobile Execution Environment provides a standardized
execution environment in an MS (Mobile Station), and an ability to negotiate
its supported capabilities with a MExE service provider, allowing
applications to be developed independently of any MS platform. The MS can
then be targeted at a range of implementations for MExE from small devices
with low bandwidth, limited displays, low processor speeds, limited memory,
etc., to sophisticated PDA (Personal Digital Organizer) type devices with a
complete MExE execution environment.
MFBR - Maximum
Flow Bit Rate
The MFBR is used in 5G to limit the bit rate that a GBR
(Guaranteed Bit Rate) QoS Flow will provide. Excess traffic will be discarded
by a rate shaping function.
MG-CSI - Mobility
Management for GPRS – CAMEL Subscription Information
The HLR contains MG-CSI so that the CSE (CAMEL Service
Environment) may monitor and control MM (Mobility Management) events. It is
sent to the SGSN during the Attach Update Location and Restore Data
procedures or when MG-CSI is modified in the HLR.
MGC - Media
Gateway Controller
A functional entity within a network that supports the
call control function for distributed switching systems.
MGCF - Media
Gateway Control Function
The MGCF facilitates call control, interfacing the PS
domain to the CS domain when interworking between the IMS and PSTN is
required. From a control perspective, the MGCF has the same responsibilities
as a regular telephony exchange, with the addition of protocol conversion in
order to switch between SIP (Session Initiation Protocol) and ISUP (ISDN User
Part) signalling. An MGCF will control one or more IMS-MGW (IMS Media
Gateways) and will be used in conjunction with a BGCF (Breakout Gateway
Control Function) for calls breaking out to the PSTN/PLMN.
MGCP - Media
Gateway Control Protocol
A command based protocol for the delivery of information
between MGC (Media Gateway Controller) and MGW (Media Gateway). Typical
protocols include MEGACO / H.248.
MgNB - Master
gNB
A device operating in 5G DC (Dual Connectivity) or NE-DC
(NR – E-UTRA Dual Connectivity) identifies the Master RAN node as the “Master
gNB”. As such, it connects to the 5GC via the N2/N3 interfaces, as well as to
the Secondary RAN node via the Xn interface.
MGW - Media
Gateway
The MGW handles the media plane (voice) in a distributed
switch (a Soft Switch). Controlled by an MSC-S (Mobile services Switching
Centre Server), the MGW will provide CS/PS media stream termination,
transcoding and conversion services.
MHz - MegaHertz
MHz is a measure of frequency equal to one million cycles
per second.
MIB - Management
Information Base
The Management Information Base is a collection of
managed objects defined by their attributes and visible to the network
management system.
MIB - Master
Information Block
The UTRA/E-UTRA both send key information in the Master
Information Block. In LTE, this RRC message includes the Bandwidth, PHICH
Configuration and System Frame Number.
MICO - Mobile
Initiated Connection Only
MICO is a mode of operation for 5G devices. When a MICO
activated device is in an Idle state, the 5G network will consider the device
to be unreachable. The device will only receive MT (Mobile Terminated) data
when it transitions to a Connected state. This transition to Connected whilst
in MICO mode is always triggered by the mobile; the mobile will not be paged
whilst in MICO mode.
Microcells
Microcells are relatively small cells within a cellular
network. They enable greater frequency reuse by allowing radio frequency
propagation to be confined to a small local area.
Microwave
The term Microwave describes electromagnetic radiation
with the frequency range of 890MHz to 30GHz. Microwave links are commonly
found in telecommunication networks as they provide a relatively quick and
cheap method of connecting points within the network. However, it should be
stated that microwaves travel in straight lines and as such, it is necessary
to have a clear line of site between transmitter and receiver. Microwave
frequencies are also often used for the radio link between earth and
satellites in orbit.
MIFR - Master
International Frequency Register
The MIFR is an ITU register that is used to manage the
assignment of frequencies with their particulars in accordance with Article
11 of the ITU Radio Regulations (RR).
MILNET - Military
Network
MILNET along with the DARPANET (Defense Advanced Research
Project Agency Network) was formed in 1983 as the successor to the ARPANET
(Advanced Research Projects Agency Network) and was used for non classified
United States of America military communications. It is also often perceived
as being an early element of the Internet.
MIM - Man In
the Middle
A generic term for network attack in which a
communication path is intercepted by a Man in the Middle, typically for
malicious purposes. The Man in the Middle may intercept and change the data,
or may copy the data for subsequent cryptanalysis.
MIME - Multipurpose
Internet Mail Extension
Multipurpose Internet Mail Extension is a technical
standard for the transmission of non text data (or data that cannot be
represented in plain ASCII code). It is often used in email to deal with
foreign language text as well as for audio and video data.
MIMO - Multiple
Input Multiple Output
The ever increasing requirement for higher data rates and
improved QoS across wireless links has generated the need to improve the
spectral efficiency and reliability of radio communication. One way to
achieve this is through the use of multiple antennas at each end of the
transmission link. This technique is known as MIMO.
MIN - Mobile
Identification Number
The Mobile Identification Number is a 10 digit number
assigned to the MS (Mobile Station) which is represented by 32bits. This is
used on air interface standards published before 1994, with the IMSI
(International Mobile Subscriber Identity) being the current identity.
Mini PDU - Mini
Protocol Data Unit
A PDU (Protocol Data Unit) that carries a Layer 3 mini
message. The total length of a Mini PDU is 48bits and it may not be
fragmented.
Mining
This is a term used in relation to Blockchains and refers
to the process by which transactions are verified and added to the
blockchain.
MIoT - Massive
Internet of Things
Enhanced Mobile Broadband is a key part of 3GPP 5G
SMARTER (Services and Markets Technology Enablers). The study started in 2015
and looked at potential 5G requirements, which resulted in more than 70
different use cases, grouped into CriC (Critical Communications), MIoT
(Massive Internet of Things), eMBB (Enhanced Mobile Broadband) and Network
Operation.
MIoT - Mobile
Internet of Things
This is a term given to a number of 3GPP defined LPWA
(Low Power Wide Area) technologies in the IoT space. These include
EC-GSM-IoT, LTE-M and NB-IoT.
MIP - Mean
Input Power
Mean Input Power is the total received power measured
within a specific bandwidth at the antenna connector.
MIP - Mobile
Internet Protocol
The Mobile Internet Protocol provides a set of extensions
to the Internet protocol standards defined by the IETF (Internet Engineering
Task Force). Its focus is to allow users to register on Foreign networks and
connect back to their Home network via a combination of FA (Foreign Agent)
and HA (Home Agent).
MM - Mobility
Management
MM is a sublayer of the Layer 3 connectivity between the
mobile and the core network, providing services which support the mobility of
user terminals, as well as location reporting when required. Additional
features include providing user identity confidentiality, along with
providing connection management services to higher layers.
MM - Multimedia
Message
A Multimedia Message is part of the MMSE (Multimedia
Message Service Environment) and is capable of carrying such formats as text,
speech, still image and video.
MM1 - Multimedia
Messaging Reference Point 1
The Multimedia Messaging Reference Point 1 defines the
link between MMS (Multimedia Massaging Service) User Agent and the MMS
Relay/Server.
MM2 - Multimedia
Messaging Reference Point 2
Multimedia Messaging Reference Point 2 defines the link
between MMS (Multimedia Massaging Service) Relay and the MMS Server.
MM3 - Multimedia
Messaging Reference Point 3
The Multimedia Messaging Reference Point 3 defines the
link between MMS Relay/Server and servers of external (legacy) messaging
systems that are connected to the service provider’s MMS Relay/Server.
MM4 - Multimedia
Messaging Reference Point 4
The Multimedia Messaging Reference Point 4 defines the
link between MMS Relay/Server belonging to different MMSE (Multimedia
Messaging Service Environment).
MM5 - Multimedia
Messaging Reference Point 5
The Multimedia Messaging Reference Point 5 defines the
link between the MMS Relay/Server and the HLR (Home Location Registry)
MM6 - Multimedia
Messaging Reference Point 6
The Multimedia Messaging Reference Point 6 defines the
link between the MMS Relay/Server and MMS User Databases.
MM7 - Multimedia
Messaging Reference Point 7
The Multimedia Messaging Reference Point 7 defines the
link between the MMS Relay/Server and MMS VAS (Value Added Services)
applications.
MMD - Multimedia
Domain
3GPP2 have developed the standards for the MMD. The MMD
is a CDMA based wireless network which provides 3rd Generation capabilities,
all based on IP protocols and network elements. The MMD is based on the 3GPP
IMS and as a result has many matching features and entities.
MME - Mobility
Management Entity
The MME is responsible for mobility and session
management procedures in the EPC. As such, the MME communicates with the
mobile via NAS (Non Access Stratum) signalling and communicates with the HSS
through Diameter. Key responsibilities include ECM (EPS Connection
Management), EMM (EPS Mobility Management), gateway selection, NAS security
and handover assistance.
MMEC - Mobility
Management Entity Code
The MMEC uniquely identifies an MME within an LTE
network.
MMEGI - MME
Group ID
When MME Pooling is utilised within an LTE network, the
MMEGI identifies which group (pool) the MME is assigned to. The MME’s MMEC
will then uniquely identify the MME within the assigned pool.
MMEI - Mobility
Management Entity Identifier
The MMEI is constructed from an MMEGI (MME Group ID) and
an MMEC (MME Code), where the MMEGI provides the Group Identity of the
registered MME within the PLMN.
MMI - Man
Machine Interface
This is the interface between the user and the equipment
or machine. An example of Man Machine Interface is the keypad and display of
a mobile phone.
MMS - Multimedia
Messaging Service
Multimedia Messaging Services will provide a mechanism to
send not only text messages as with the SMS (Short Message Service) but also
drawings, photographs, music or voice clips and even short video. The system
will operate on the store and forward principle with messages being stored
and possibly formatted at a MMSC (Multimedia Messaging Service Centre) when
sent between users. In order to maximize the full potential of MMS, the
service will need to run over a 2.5G or 3G network.
MMS Relay/Server
A MMS Relay/Server is a network entity or application
which is controlled by the MMS (Multimedia Messaging Service) provider. This
entity transfers messages, provides specific operations to the mobile
environment and provides storage services.
MMS
UA - Multimedia Messaging Service User Agent
The Multimedia Messaging Service User Agent resides on a
UE (User Equipment), a MS (Mobile Station) or on an external device connected
to a mobile such as a laptop computer or personal information manager. It is
an application layer function that provides the users with the ability to
view, compose and handle Multimedia Messages.
MMSC - Multimedia
Messaging Service Centre
The Multimedia Messaging Service Centre provides a store
and forward facility for multimedia messages sent across a mobile network.
The MMSC may also provide a formatting role to enable messages to be
optimized to the receiving handset’s capability.
MMSE - Multimedia
Messaging Service Environment
The Multimedia Messaging Service Environment is a
collection of MMS (Multimedia Massaging Service) network elements that come
under the control of a single administration. However in the case of roaming,
the visited network is considered to be part of that user’s MMSE.
MMTel - Multimedia
Telephony
MMTel is a 3GPP standardized, IMS based service which is
designed to facilitate real-time communication based on voice and video
telephony. In addition, real-time chat is also included, which encompasses
features such as file sharing. Both VoLTE and ViLTE are based on the MMTel
standards.
MMUSIC - Multiparty
Multimedia Session Control
MMUSIC is a working group of the IETF(Internet
Engineering Task Force) which is chartered to develop protocols to support
Internet teleconferencing and multimedia communications. Most notably, the
MMUSIC working group are responsible for the development of SDP (Session
Description Protocol) and RTSP (Real Time Streaming Protocol).
mmWave - Millimetre
Wave
A radio wave has a wavelength (λ) which corresponds
to its frequency, for example 1GHz equates to a wavelength of ~30cm. The term
mmWave typically refers to radio frequencies above 24GHz where the wavelength
is measured in millimetres. For example, 24GHz equates to a radio wave with a
~12.5mm wavelength. mmWave frequencies are key for 5G, since the high
frequencies are typically linked to high bandwidth opportunities.
MN - Mobile
Node
A term used in Mobile IP to describe the mobile device
that has moved from its home network to a foreign network.
MNC - Mobile
Network Code
The Mobile Network Code is either a two or three digit
number used to uniquely identify a given network from within a specified
country ( MCC (Mobile Country Code)). The MNC is used as part of the IMSI
(International Mobile Subscriber Identity) and LAI (Location Area Identity)
etc.
MNRF - Mobile
Station Not Reachable Flag
This flag is found at the HLR (Home Location Register) on
either a GSM or UMTS mobile network. The flag indicates that a mobile is not
reachable and thus prevents any further and unnecessary signalling. For
example, the flag would be set in the event that a mobile station failed to
respond to a paging message.
MNRG - Mobile
Station Not Reachable For GPRS Flag
This flag is found at the HLR (Home Location Register) on
either a GSM or UMTS mobile network. The flag indicates that the mobile is
not reachable through a SGSN (Serving GPRS Support Node). The presence of
this flag will prevent any unnecessary GPRS signalling.
MO - Managed
Object
A Managed Object can be either a physical or logical
resource which may be defined in terms of its attributes. These attributes
may be controlled by a network manager through a manager agent interaction.
Managed Objects form an important part of a TMN (Telecommunication Management
Network).
MO - Mobile
Originated
The general term used to describe the call leg on which
the call is initiated (as opposed to Mobile Terminated).
MO-SMS-CSI - Mobile
Originated-SMS-CSI
CAMEL Phase 3 introduced the ability for CAMEL
interaction with MO (Mobile Originated) SMS. In Phase 4 this has been
extended to cover MT (Mobile Terminated) SMS. The MO-SMS-CSI (Mobile
Originated-SMS-CSI) and/or MT-SMS-CSI (Mobile Terminated-SMS-CSI) are passed
down to the VLR and SGSN from the HLR. This is part of the Update Location
Procedure.
Mobile - Mobile
Device
The mobile device is termed the MS (Mobile Station) in
GSM and the UE (User Equipment) in UMTS/LTE. The capabilities of the device
are dependent on the manufacturer, but general features include support for a
variety of radio technologies and frequencies, assisting in global roaming.
Supported technologies include 3GPP technologies, as well as non-3GPP
technologies such as WiFi, Bluetooth and NFC (Near Field Communication).
Mobile devices are uniquely identified by their IMEI (International Mobile
Equipment Identity), which is tracked by the EIR (Equipment Identity
Register) in order to prevent stolen devices from accessing the network. On
board the mobile will be a 3GPP SIM (Subscriber Identity Module) or USIM
(Universal SIM), depending on the functionality of the device (particularly
with respect to supported security algorithms). The SIM/USIM holds subscriber
credentials associated with accessing services, such as the subscriber’s
IMSI.
Mobile TV
This describes the notion of providing a subscriber with
a TV service which is accessible on the subscriber’s mobile phone. Two high
level mechanisms exist to achieve this: Unicast delivery, in which the TV
content is distributed as a unicast data stream via the service provider’s
existing data network and Broadcast/Multicast Delivery, in which the service
provider utilizes a dedicated Mobile TV broadcast network in order to deliver
the mobile content eg DVB-H, STiMi, MediaFLO, T-DMB etc. Both solutions have
their relative disadvantages and merits. In both cases, the mobile network
will be used for service control, such as changing channel or possible
viewing the EPG.
Modem
A device used to modulate digital information so that it
can be carried via an analogue carrier. The signal is then demodulated at the
receive end to extract the original digital signal. The term comes from
MOdulator and DEModulator.
MoIP - Multimedia
over IP
MoIP is an expression used to describe the transport of
various types of media as a payload of an IP datagram. Typical media examples
include voice, messaging and video.
Monomode Fibre
A Monomode Fibre is an optical fibre which has been
designed to carry light of a single wavelength.
MOP - Mean
Output Power
This is the total transmitted power measured in a
specific bandwidth at the antenna connector when the transmitter is active.
MOS - Mean
Opinion Score
MOS is an indication of call quality based on the
subjective opinion of the humans taking part in the call.
MOS-CQ - Mean
Opinion Score – Conversational Quality
MOS-CQ is a call quality measurement which rates the
overall quality of a call, taking into account listening quality, as well as
conversational aspects such as whether or not delay or echo effected the
call.
MP - Media
Proxy
A generic term for the media handling and processing
element of a Session Border Controller.
MP3
MP3 is the popular digital audio encoding format for
audio based media, typically in the form of music or spoken word. MP3 is
actually a contraction of MPEG-1 Audio Layer 3, which is the MPEG standard
that defines the technology.
MPCI - Mobile
Protocol Capability Indicator
A Mobile Protocol Capability Indicator is a 2bit field
used to indicate the capabilities of a MS (Mobile Station).
MPDCCH - MTC
Physical Downlink Control Channel
Introduced in Release 13 of the 3GPP specifications,
MPDCCH is a eMTC specific channel that carries DCI (Downlink Control
Information) in a eMTC NB (Narrowband).
MPEG - Moving
Picture Experts Group
The Moving Picture Expert Group is a working group within
ISO (International Standards Organization) who have developed the MPEG
standards for the compression and coding of motion video.
MPEG-2
MPEG-2 is one of the predominant audiovisual compression
system used in digital TV systems to date (along with MPEG-4). The technology
is employed within hundreds of millions of digital and cable STBs, in
addition to a host of personal computers and DVD players. A large proportion
of the video seen on television today has been encoded with MPEG-2 at some
point in its transmission.
MPEG-4
MPEG-4 is the successor to MPEG-2, which saw the
introduction of the AVC (Advanced Video Codec)and enhancement of the AAC
(Advanced Audio Codec), improvements which enable audio and video streams to
be compressed into half the required bandwidth of MPEG-2 whilst maintaining
the same level of quality. Like the improvements made between MPEG-1 and
MPEG-2, this reduction in bandwidth is at the expense of increased CPU
activity.
MPLS - Multi
Protocol Label Switching
Multi Protocol Label Switching is a technique which
allows IP datagrams to be labelled with a particular identifier. This label
allows MPLS LSR to switch the packet to it’s appropriate destination over a
preconfigured LSP , rather than route the packet on the basis of its IP
addressing. The key drivers for deploying MPLS instead of a solely IP based
transport network are Traffic Engineering, Pseudowires/VPN and finally,
Protection and Restoration. It should be noted that MPLS was not designed to
only work with IP – MPLS can be deployed in a number of transmission
networks, such as those based on ATM, SDH and optical transmission (termed
Generalized MPLS).
MPLS-TP - Multi
Protocol Label Switching – Transport Profile
A profile of MPLS which has been designed to be
specifically implemented as a transport technology within telecommunications
networks. MPLS-TP removes certain functionality not required/desirable in a
telecoms network, but also adds additional functionality largely associated
with O&M.
MPS - Multimedia
Priority Service
Multimedia Priority Service is a 3GPP feature designed to
enable NS (National Security) or EP (Emergency Preparedness) subscribers to
make priority calls or data session on a Service Providers network,
particularly at times of congestion.
MR-DC - Multi
RAT – Dual Connectivity
MR-DC is the general term given to a range of different
Dual Connectivity configuration options, largely associated with 5G. With
MR-DC, the Master RAN Node functions as the controlling entity, utilizing a
Secondary RAN for additional data capacity. Example MR-DC configurations
include EN-DC (E-UTRA – NR Dual Connectivity), NR-DC (New Radio Dual
Connectivity), NGEN-DC (NG-RAN – E-UTRA Dual Connectivity) and NE-DC (NR –
E-UTRA Dual Connectivity).
MR-DC - Multi-RAT
Dual Connectivity
MR-DC is the general term given to a range of different
Dual Connectivity configuration options, largely associated with 5G. With
MR-DC, the Master RAN Node functions as the controlling entity, utilizing a
Secondary RAN for additional data capacity. Example MR-DC configurations
include EN-DC (E-UTRA – NR Dual Connectivity), NR-DC (New Radio Dual
Connectivity), NGEN-DC (NG-RAN – E-UTRA Dual Connectivity) and NE-DC (NR –
E-UTRA Dual Connectivity).
MRB - Multimedia
Resource Broker
IMS Application Servers will routinely use the MRFs
(Multimedia Resource Function) that are available in the network. In order to
control access to the MRFs, Application Servers will send their requests via
the MRB, which in turn will allocate a suitable MRF.
MRF - Multimedia
Resource Function
This IMS entity, in conjunction with the S-CSCF and an
AS, is responsible for carrying out a variety of processing tasks on media
streams associated with particular services. These tasks include:
coordination and distribution of voice traffic associated with a conference,
playing of announcements to the subscriber eg. session failure or redirection
announcements and finally, transcoding of voice or video streams to
facilitate successful session establishment. The MRF is comprised of a MRFC
and an MRFP.
MRFC - Multimedia
Resource Function Controller
Forming the control aspect of the MRF (Multimedia
Resource Function), the MRFC processes SIP requests received from the S-CSCF
(Serving CSCF) and also Application Servers. Depending on the request, the
MRFC will then invoke the services of an MRFP (Multimedia Resource Function
Controller) as appropriate.
MRFP - Multimedia
Resource Function Processor
Forming the media plane processing aspect of the MRF
(Multimedia Resource Function), the MRFP provides a variety of services.
These services include: conferencing, playing of announcements, audio
transcoding, recording, media analysis etc. The full functionality of the
MRFP is largely determined by the vendor, with different MRFPs having
different capabilities. Commercially, the functionality of the MRFP is
integrated into a platform commonly termed the Media Server.
MS - Mobile
Station (3GPP)
The Mobile Station is the term used in GSM to describe
the mobile phone. It is comprised of two distinct elements, the ME (Mobile
Equipment) and the SIM (Subscriber Identity Module).
MS - Mobile
Station (3GPP2)
The Mobile Station is a wireless terminal enabling the
user to access network services over a radio interface. The MS consists of
the ME (Mobile Equipment) and either a programmed UIM (User Identity Module)
or a R-UIM (Removable – User Identity Module).
MS - Multicast
Subscription
The mechanism by which a user subscribes or is subscribed
to a multicast subscription group and thereby is authorised to join certain
multicast services. Multicast subscription is performed either upon user
selection or due to home environment initiation.
MSA - Mobile
Security Association
A collection of security contexts which exist between a
pair of nodes. These may be applied to MIP (Mobile IP) protocol messages
which are exchanged between nodes. Each context will indicate an
authentication algorithm and mode, a secret and a style of protection in use.
MSC - Mobile
Switching Centre
A Mobile Switching Centre is a telecommunication switch
or exchange within a cellular network architecture which is capable of
interworking with location databases.
MSC-S - Mobile
Switching Centre – Server
The MSC-S forms the call control and mobility management
aspects of a distributed switch (a Soft Switch), interfacing the GERAN/UTRAN
to the CS domain. From a control perspective, the MSC-S has the same
responsibilities as a regular telephony exchange, with the addition of user
location registration and handover management. An MSC-S will control one or
more CS-MGW (Circuit Switched – Media Gateways). An MSC-S may function as a
GMSC (Gateway MSC), which is the term given to an MSC which handles mobile terminated
calls originating in an external network. For example, exchanges in the PSTN
are unable to interrogate the HLR therefore the call is routed to the GMSC in
order to assist onward routing.
MSCML - Media
Server Control Markup Language
MSCML was initially defined in RFC 4722 and is carried as
a SIP (Session Initiation Protocol) payload in order to control a MediaServer
as part of an IMS (IP Multimedia Subsystem) service.
MSIN - Mobile
Station Identity Number
The Mobile Station Identification Number forms part of
the ITU-T (International Telecommunications Union – Telecommunications
Standardization Sector) defined IMSI (International Mobile Subscriber
Identity) to uniquely identify a mobile or subscription from within a given
network. The MSIN is comprised of a maximum of 10 digits.
MSISDN - Mobile
Station International ISDN Number
The Mobile Station International ISDN Number is the
standard international telephone number used to identify a given subscriber.
The number is based on the ITU-T (International Telecommunications
Union-Telecommunication Standardization Sector) E.164 standard.
MSK - Minimum
Shift Keying
Minimum Shift Keying is a form of FSK (Frequency Shift
Keying) used to carry digital information on a radio carrier.
MSML - Media
Sessions Markup Language
The Media Sessions Markup Language (MSML) is used to
control and invoke many different types of services on IP mediaservers.
Clients can use it define how multimedia sessions interact on a mediaserver
and to apply services to individual or groups of users. MSML can be used, for
example, to control media server conferencing features such as video layout
and audio mixing, create sidebar conferences or personal mixes, and set the
properties of media streams.
MSRN - Mobile
Station Roaming Number
The Mobile Station Roaming Number is an E.164 defined
telephone number used to route telephone calls in a mobile network from a
GMSC (Gateway Mobile Switching Centre) to the target MSC.
MSRP - Message
Session Relay Protocol
MSRP is used in IMS networks in order to support CPM
(Converged IP Messaging). MSML sessions can be established between
participants in order to allow chat sessions, file transfers etc to take
place.
MSS - Mobile
Soft Switch
The MSS (also termed MSC-S) is a term used to describe
the call control and mobility management aspects of a distributed switch (a
Soft Switch), interfacing the GERAN/UTRAN to the CS domain. From a control
perspective, the MSC-S has the same responsibilities as a regular telephony
exchange, with the addition of user location registration and handover
management. An MSC-S will control one or more CS-MGW (Circuit Switched –
Media Gateways). An MSC-S may function as a GMSC (Gateway MSC), which is the
term given to an MSC which handles mobile terminated calls originating in an
external network. For example, exchanges in the PSTN are unable to
interrogate the HLR therefore the call is routed to the GMSC in order to
assist onward routing.
MSU - Message
Signalling Unit
The Message Signalling Unit provides the structure for
transporting the higher layer protocol types in an SS7 network. These will
include ISUP (ISDN User Part) TCAP (Transaction Capabilities Application
Part) MAP (Mobile Application Part) and others. The difference between the
MSU and signalling units such as LSSU (Link Status Signalling Unit) and FISU
(Fill In Signalling Unit) is the MSU contains the SIO (Service Indicator
Octet) and SIF (Service Information Field).
MT - Mobile
Terminated
This is the term given to all communication which
terminates at the mobile.
MT-SMS-CSI - Mobile
Terminated-SMS-CSI
CAMEL Phase 3 introduced the ability for CAMEL
interaction with MO (Mobile Originated) SMS. In Phase 4 this has been
extended to cover MT (Mobile Terminated) SMS. The MO-SMS-CSI (Mobile
Originated-SMS-CSI) and/or MT-SMS-CSI (Mobile Terminated-SMS-CSI) are passed
down to the VLR and SGSN from the HLR. This is part of the Update Location
Procedure.
MTC - Machine
Type Communication
Also termed M2M (Machine to Machine), MTC describes data
communication between two entities without the involvement of a human. This
communication is typically between an MTC device and an MTC server, with a
prime example being Smart Metering for utility services such as gas, water
and electricity. MTC communication could also potentially be between MTC
Devices, without the involvement of an MTC Server; in the case, a use
application would be IoT (Internet of Things).
MTC-AAA - Machine
Type Communications – Authentication, Authorization and Accounting.
Used within CIoT (Cellular Internet of Things) networks,
the MTC-AAA supports the translation of an IMSI to an External Identity at
the network egress.
MTC-IWF - Machine
Type Communications – Interworking Function
Used within CIoT (Cellular Internet of Things) networks,
the MTC-IWF enables the SCS (Service Capability Server) to send “triggers” to
IoT devices over the Tsp reference point to instruct them to take some form
of action such as registering with the SCS.
MTP - Message
Transfer Part
MTP defines the lower three layers of the SS7 protocol
stack. Layer 1 (MTP1) describes the Physical layer, defining how higher layer
messages are represented on the transmission medium, including message
delimiting. Layer 2 (MTP2) defines the Data Link layer, ensuring the reliable
delivery of higher layer MSU (Message Signalling Units). Layer 2 also
features FISU (Fill In Signalling Units) for link keep-alives, as well as
LSSU (Link Status Signalling Units) in order to support signalling link
establishment and maintenance. Layer 3 (MTP3) is comprised of two elements –
SMH (Signalling Message Handling) and SNM (Signalling Network Management).
SMH ensures higher layer signalling can be routed through the SS7 network
(with the use of Point Codes). SNM is a route management facility for
handling failures etc.
MTP1 - Message
Transfer Part Level 1
Message Transfer Part Level 1 resides at Layer 1 of the
OSI (Open Systems Interconnect) model. It is a 64Kbps channel which has been
allocated for signalling purposes. This channel is referred to as a SL
(Signalling Link). It is possible for multiple links to be utilized this
leads to the expression SLS (Signalling Link Set).
MTP2 - Message
Transfer Part Level 2
Message Transfer Part Level 2 resides at Layer 2 of the
OSI (Open Systems Interconnect) model it is responsible for the reliable
transmission of signalling units over an individual SL (Signalling Link).
MTP2 reliability is achieved through retransmission techniques.
MTP3 - Message
Transfer Part Level 3
Message Transfer Part Level 3 is the highest level of MTP
(Message Transfer Part) it is split into two distinct parts SMH (Signalling
Message Handling) and SNM (Signalling Network Management). Whilst the SNM
part is looking after the general management of MTP the SHM part deals with
the discrimination distribution and routing of signalling messages.
MTP3b - Message
Transfer Part level 3 broadband
Message Transfer Part level 3 broadband provides message
routing discrimination and distribution (for point to point link only). It
also provides signalling link management load sharing and changeover between
links within one link-set. The protocol is a broadband ISDN based protocol
used typically in ATM (Asynchronous Transfer Mode).
MTRF - Mobile
Terminated Roaming Forwarding
MTRF is a technique used in CSFB to reduce the delay that
may take place in an MT fallback scenario in which the phone, at the point of
fallback, attaches to a different MSC (usually due to Location Area
mismatch). In this scenario, the call is forwarded from the MSC attempting to
handle the call to the MSC actually responsible for the subscriber.
MTRR - Mobile
Terminated Roaming Retry
MTRR is a technique used in CSFB to reduce the delay that
may take place in an MT fallback scenario in which the phone, at the point of
fallback, attaches to a different MSC (usually due to Location Area
mismatch). In this scenario, the call attempt is bounced back from the
original MSC handling the call, allowing the network to retry the call setup,
this time to the correct MSC (the MSC to which the mobile has just
registered).
MTU - Maximum
Transmission Unit
A Maximum Transmission Unit is defined as the maximum
packet size (in bytes or octets), that a particular interface can handle. For
example, the MTU for Ethernet is 1500 bytes.
MTX - Mobile
Telephone Exchange
A term used to describe a large exchange used within a
cellular mobile system and connected to the PSTN.
MU-MIMO - Multi
User
MIMO SDM (Spatial division multiplexing) of multiple
modulation symbol streams to a single UE using the same time/frequency
resource, is referred to as SU-MIMO (Single-User MIMO). However, spatial
division multiplexing of modulation symbol streams to different UEs using the
same time-frequency resource is referred to as MU-MIMO.
Multi mode UE
Multi mode UE Identifies a UE (User Equipment) that can
obtain service from at least one mode of UMTS , FDD (Frequency Division
Duplex) or TDD (Time Division Duplex), and one or more different systems such
as GSM bands or possibly other radio systems which include the IMT-2000
(International Mobile Telephony 2000) family members.
Multicast
The term used to describe the broadcasting of messages or
packets to a selected group of host devices situated on either a LAN (Local
Area Network), WAN (Wide Area Network) or the Internet.
Multiframe
The term multiframe is used to describe a set of
consecutive frames in which the position of each frame can be identified by
reference to a multiframe alignment signal. Multiframes are commonly found in
cellular communication systems including GSM , GPRS and UMTS.
Multimode Fibre
A Multimode Fibre is an optical fibre which has been
designed to carry light at two or more different wavelengths at the same
time.
Multipath
A form of radio fading caused by the existence of two or
more paths between the transmitter and receiver. Delays on the reflected path
may add to (strengthen) or subtract from (fade) the main path. Multipath may
be overcome by using multiple receive antennas or frequency hopping.
Multiplex Option
Multiplex Option The ability of the multiplex sublayer
and lower layers to be tailored to provide special capabilities. A multiplex
option defines such characteristics as the frame format, the maximum number
of SCC (Supplemental Code Channel) supported, and the rate decision rules.
Multiplex Sublayer
Multiplex Sublayer One of the conceptual layers of the
system that multiplexes and demultiplexes primary traffic, secondary traffic,
and signaling traffic.
Multiplexer
This is the term given to a device which multiplexes
several signals onto a common transmission channel.
Multiplexing
This is the process where several users are able to share
a common communication channel. Several different multiplexing techniques
exist such as FDM (Frequency Division Multiplexing) and TDD (Time Division
Multiplexing).
MUX
This is a term used to describe a device acting as a
multiplexer and demultiplexer.
MWD - Messages
Waiting Data
A part of the MWI (Message Waiting Indication) to be
stored in the HLR (Home Location Centre). MWD consists of an address list of
the SMSC (Short Message Service Centre) which have messages waiting to be
delivered to the mobile.
MWI - Messages
Waiting Indication
This indicates that there are one or more messages
waiting to be delivered to the mobile due to previous unsuccessful delivery
attempt(s ). The MWI is stored in the HLR (Home Location Register) and VLR
(Visitor Location Register) with which an MS (Mobile Station) is associated.
N-ISDN - Narrowband-Integrated
Services Digital Network
A Narrowband Integrated
Services Digital Network is generally a digital network operating at
2.028Mbps or below.
N1 - N1
Reference Point
Related to the 3GPP 5G Architecture. The N1 Reference
point is between the UE and the AMF (Access and Mobility Management
Function).
N10 - N10
Reference Point
Related to the 3GPP 5G Architecture. The N10 Reference
point is between UDM (Unified Data Management) and the SMF (Session
Management Function).
N11 - N11
Reference Point
Related to the 3GPP 5G Architecture. The N11 Reference
point is between the AMF (Access and Mobility Management Function and the SMF
(Session Management Function).
N12 - N12
Reference Point
Related to the 3GPP 5G Architecture. The N12 Reference
point is between the AMF (Access and Mobility Management Function) and the
AUSF (Authentication Server Function).
N13 - N13
Reference Point
Related to the 3GPP 5G Architecture. The N13 Reference
point is between UDM (Unified Data Management) and the AUSF (Authentication
Server Function).
N14 - N14
Reference Point
Related to the 3GPP 5G Architecture. The N14 Reference
point is between two AMFs (Access and Mobility Management Functions).
N15 - N15
Reference Point
Related to the 3GPP 5G Architecture. The N15 Reference
point is between the PCF (Policy Control Function) and the AMF (Access and
Mobility Management Functions) in the case of a non-roaming scenario, or the
vPCF (Visited PCF) and AMF (Access and Mobility Management Functions) in case
of a roaming scenario.
N16 - N16
Reference Point
Related to the 3GPP 5G Architecture. The N16 Reference
point is between two SMFs. In a roaming scenario it would be between a
Visited SMF and the Home SMF.
N2 - N2
Reference Point
Related to the 3GPP 5G Architecture. The N2 Reference
point is between the (R)AN and the AMF (Access and Mobility Management
Function).
N-ISDN - Narrowband-Integrated
Services Digital Network
A Narrowband Integrated Services Digital Network is
generally a digital network operating at 2.028Mbps or below.
N3 - N3
Reference Point
Related to the 3GPP 5G Architecture. The N3 Reference
point is between the (R)AN and the UPF (User Plane Function).
N3IWF - Non-3GPP
Interworking Function
This element of the 5G SBA (Service Based Architecture)
is responsible for interworking between untrusted non-3GPP networks and the
5G Core. As such, the N3IWF supports both N2 and N3 based connectivity to the
core, whilst supporting IPSec connectivity towards the device.
N4 - N4
Reference Point
Related to the 3GPP 5G Architecture. The N4 Reference
point is between the SMF (Session Management Function) and the UPF (User
Plane Function).
N5 - N5
Reference Point
Related to the 3GPP 5G Architecture. The N5 Reference
point is between the PCF (Policy Function) and an AF (Application Function).
N6 - N6
Reference Point
Related to the 3GPP 5G Architecture. The N6 Reference
point is between the UPF (UP Function) and a DN (Data Network).
N7 - N7
Reference Point
Related to the 3GPP 5G Architecture. The N7 Reference
point is between the SMF (Session Management Function) and the PCF (Policy
Control Function).
N7r - N7r
Reference Point
Related to the 3GPP 5G Architecture. The N7r Reference
point is between the vPCF (Visited PCF) and the hPCF (Home PCF).
N8 - N8
Reference Point
Related to the 3GPP 5G Architecture. The N8 Reference
point is between UDM (Unified Data Management) and the AMF (Access and
Mobility Management Function).
N9 - N9
Reference Point
Related to the 3GPP 5G Architecture. The N9 Reference
point is between two Core UPF (User Plane Functions).
NA-ESRD - North
American Emergency Services Routing Digits
A telephone number in the North American Numbering Plan
that can be used to identify a North American emergency services provider and
its associated LCS (Location Services) client. The ESRD also identifies the
base station, cell site or sector from which a North American emergency call
originates.
NA-ESRK - North
American Emergency Services Routing Key
A telephone number in the North American Numbering Plan
assigned to an emergency services call by a North American Visited PLMN
(Public Land Mobile Network) for the duration of the call. The NA-ESRK is
used to identify both the emergency services provider and the switch in the
Visited PLMN currently serving the emergency caller. During the lifetime of
an emergency services call, the NA-ESRK also identifies the calling mobile
subscriber.
NACC - Network
Assisted Cell Change
NACC was introduced to reduce the service outage period
which is experienced by a mobile during a packet data session, as it cell
reselects from one cell to another. With NACC, the serving BTS supplies the
MS with system information for the new cell, before it reselects to that new
cell. Utilizing this technique, the delay associated with acquiring the SI
from the new cell is mitigated, hence service outage time is reduced. In 4G
LTE, NACC can be used in support of CSFB (Circuit Switched Fallback), in order
to make the fallback to 2G procedure a quicker process.
Naf - AF
Service-based Interface
Naf is related to the 3GPP 5G Architecture. It identifies
a Service-based Interface for the Application Function.
NAI - Network
Access Identifier
RFC 4282 defines the concept of a NAI, which is a
standardized method of identifying users who are attempting to access a
network or service. NAI are typically in the from of user@realm such as
Bob@domain1.
NAK - Negative
Acknowledgement
A Negative Acknowledgement character or message indicates
that a packet has arrived with the check digits in error. It is sent from the
receiving unit to the transmitting unit and may cause the packet to be
retransmitted.
NAM - Number
Assignment module
The Number Assignment Module identifies the set of MIN
(Mobile Identification Number) / IMSI (International Mobile Subscriber
Identity) related parameters stored in the MS (Mobile Station).
Name Discovery
The mechanism that allows a device to request and receive
a Bluetooth device name.
Namf - AMF
Service-based Interface
Namf is related to the 3GPP 5G Architecture. It
identifies a Service-based Interface for the Core Access and Mobility
Management Function.
NAPTR - Naming
Authority Pointer
The NAPTR (Naming Authority Pointer) record specifies a
regular expression based rewrite rule that, when applied to an existing
string, produces a new domain label or URI (Universal Resource Identifier).
This allows DNS to be used to look up services for a wide variety of resource
names that are not in domain name syntax. For more information, see RFC 2915.
NAS - Non
Access Stratum
The Non Access Stratum is a functional layer running
between the UE (User Equipment) and the CN (Core Network). The layer supports
traffic and signalling messages between the CN and UE (User Equipment).
NAS –
IuCS - Non Access Stratum (IuCS)
NAS signalling used on the IuCS reference point defines
the set of signalling messages used between the mobile and the MSC in order
to facilitate mobility management and call procedures.
NAS – Iur - Non
Access Stratum (Iur)
NAS signalling encompasses the set of signalling messages
used between the mobile and the SGSN in order to support GPRS SM (Session
Management) and MM (Mobility Management).
NAS –
UMTS - Non Access Stratum (UMTS)
NAS signalling operates between the mobile and the
MSC/SGSN in order to facilitate mobility management, session management and
call procedures.
NAS EMM - NAS
EPS Mobility Management
The NAS protocol is used between the User Equipment and
the MME in order to facilitate EPS Mobility Management and EPS Session
Management procedures. Consequently, NAS protocol messages are classified as
EMM or ESM, both of which can potentially be found in a single NAS message.
An example of this would be during the initial attach, where the first
message sent by the Mobile includes an EMM Attach Request, in addition to an
ESM PDN Connectivity Request. Generally, NAS EMM messages are associated with
the mobile’s presence or mobility on the network, encompassing procedures
such as network attach, tracking area updates and network detach.
NAS ESM - Non
Access Stratum EPS Session Management
In LTE, the NAS protocol is used between the User
Equipment and the MME in order to facilitate EPS Mobility Management and EPS
Session Management procedures. Consequently, NAS protocol messages are
classified as EMM or ESM, both of which can potentially be found in a single
NAS message. An example of this would be during the Initial Attach, where the
first message sent by the mobile includes an EMM Attach Request, in addition
to an ESM PDN Connectivity Request. Generally, NAS ESM messages are
associated with user data sessions, such as establishing, modifying or
terminated EPS bearers.
NASS - Network
Access Sub System
In the TISPAN architecture, the NASS provides
registration at the access ( IP ) level, managing IP address space and
authenticating users. The NASS also announces the contact point of the IMS
/TISPAN services to the user device.
NAT - Network
Address Translation
Network Address Translation is a mechanism for reducing
the need for globally unique IP addresses. NAT allows an organization with
private addresses to connect to the Internet by translating those addresses
into a globally unique and routable address.
NAT-T - NAT-Traversal
Certain protocols such as FTP and SIP can carry
addressing information such as source and destination IP addresses and ports.
When these protocols pass through NAT , this addressing will not be changed,
since NAT typically works at the Transport and Network Layers. Therefore, the
receiving entity will be supplied with addressing that is not relevant, such
as private IP addressing or the wrong version of IP addressing. NAT traversal
describes the process behind overcoming this issue, ensuring that addressing
information delivered to the intended recipient is valid. There are several
techniques which can be used for NAT traversal, such as ICE (Interactive
Connectivity Establishment – a combination of STUN and TURN ), Session Border
Controllers and UPnP (Universal Plug and Play).
Nausf - AUSF
Service-based Interface
Nausf is related to the 3GPP 5G Architecture. It
identifies a Service-based Interface for the Authentication Server Function.
NAV - Network
Allocation Vector
The Network Allocation Vector is used within IEEE 802.11
networks to prevent Stations accessing the wireless medium and causing
contention. The NAV is an indicator, maintained by each Station, of time
periods when transmission will not be initiated even though the Stations CCA
(Clear Channel Assessment) function does not indicate traffic on the medium.
NB - Narrowband
Found in eMTC (enhanced Machine Type Communications),
this term identifies the use of 1.4MHz “Narrowbands” for CIoT (Cellular
Internet of Things) operation.
NB - Normal
Burst
A Normal Burst is used to carry both signalling and user
information (circuit and packet switched) over the GSM air interface.
NB-IoT - Narrow
Band – Internet of Things
This is a standards based LPWA (Low Power Wide Area)
technology developed to enable a wide range of devices to connect within The
Internet of Things. The technology supports a number of key features
including low power consumption, radio spectrum efficiency and low cost. The
technology can co-exist with existing 3GPP based 2G, 3G and 4G technologies
and also benefits from the security features found within these networks.
NBA - NASS-IMS
Bundled Authentication
NBA is an IMS authentication mechanism which is an
alternative to IMS AKA. NASS-IMS is used when the access network is TISPAN
based eg xDSL, where authentication is based on a specific user registering
from a specific location. The NASS (Network Access Subsystem) is a feature of
the TISPAN architecture.
NBAP - Node B
Application Part
NBAP is used by the RNC (Radio Network Controller) to
manage and configure Node Bs, as well as set up transport channels on the Iub
and Uu interfaces. Additional responsibilities include Resource Blocking,
Auditing, Measurement Reporting, Cell Synchronization and Information
Exchange.
NC0 - Network
Control Cell Reselection Mode 0
This is the normal mode of control for a GPRS mobile. In
NC0 the MS (Mobile Station) performs autonomous cell reselection.
NC1 - Network
Control Cell Reselection Mode 1
When operating in NC1, the GPRS mobile will pass
measurement reports to the network. However the mobile will continue to
perform autonomous cell reselection.
NC2 - Network
Control Cell Reselection Mode 2
When operating in NC2, the GPRS mobile will pass
measurement reports to the network. The mobile will only perform autonomous
cell reselection when the reselection is triggered by a downlink signalling
failure or a random access failure.
NCC - Network
Colour Code
The Network Colour Code is broadcasted as part of the
BSIC (Base Station Identity Code). It consists of 3bits, which are used to
differentiate between operators utilizing the same frequencies. An example of
when this will be required is on an international border when both operators
have been allocated the same frequency or frequencies.
NCGI - New
radio Cell Global Identity
In 5G, the NR (New Radio) cell is given a NCGI (NR Cell
Global Identity). This concatenates the PLMN-Id (PLMN Identifier) and the
36bit NCI (NR Cell Identity). Note that a gNB may include multiple NCGIs.
NCGI - NR Cell
Global Identity
In 5G, the NR (New Radio) cell is given a NCGI (NR Cell
Global Identity). This concatenates the PLMN-Id (PLMN Identifier) and the
36bit NCI (NR Cell Identity). Note that a gNB may include multiple NCGI’s.
NCH - Notification
Channel
Notification Channel is a generic channel used to provide
information to a specific group of users. Typical examples of this include
the group call service.
NCI - NR Cell
Identity
In 5G, a service provider identifies a cell using an NCI
(NR Cell Identity). This is a 36bit identity which can be concatenated with
the PLMN-Id (PLMN Identifier) to form the NCGI (NR Cell Global Identity).
NCT - Network
Connection Topology
The NCT is the connectivity in place between elements of
a NFV (Network Functions Virtualization) network service. The individual
connections which form the NCT are comprised of Virtual Links.
NDSS - Network
Directed System Selection
This feature allows the MS (Mobile Station) to
automatically register with a preferred system while roaming. It also enables
the MS to be automatically directed by a service provider to a suggested
system, regardless of the frequency band class, cellular band, or PCS
(Personal Communications System) frequency block.
NE - Network
Element
A generic term used to describe equipment operating as
part of a communication network.
NE-DC - NR –
E-UTRA Dual Connectivity
NE-DC is a Dual Connectivity configuration utilizing the
5GC, whereby the master RAN is a 5G gNB and the secondary RAN node is a 4G
ng-eNB.
NEF - Network
Exposure Function
The Network Exposure Function is related to the 3GPP 5G
Architecture. This function provides a means to securely expose the services
and capabilities provided by 3GPP network functions. Example would include:
3rd party, internal exposure/re-exposure.
Neighbor Set
This is a set of pilots associated with the CDMA (Code
Division Multiple Access) Channels that are likely candidates for handoff.
Normally, the Neighbor Set consists of the pilots associated with CDMA
Channels that cover the geographical area near the MS (Mobile Station).
NENA - National
Emergency Number Association
NENA’s Mission is to foster the technological
advancement, availability and implementation of a universal emergency
telephone number system (9-1-1). In carrying out its mission, NENA promotes
research, planning, training and education. The protection of human life, the
preservation of property, and the maintenance of general community security
are among Nena’s objectives. NENA are a USA based organization.
Network Slicing
Network Slicing is a 3GPP feature whereby the Service
Provider can create a network which has been customized for a specific market
vertical. Network Slicing is implemented via Network Slice Instance(s) which
are created from a NST (Network Slice Template) and is based on network
virtualization techniques.
NextGen - Next
Generation
NextGen is a 3GPP term relating to 5G Next Generation
network. It defines the NGS (NextGen System) which is made up of the NGC
(NextGen Core) and NextGen RAN. Also see 5GS (5G System).
NF - Network
Function
A Network Function is a logical node within a network
infrastructure that has well-defined external interfaces and well-defined
functional behaviour.
NFC - Near
Field Communications
NFC is a short range, standards based wireless
connectivity technology based on RFID which uses magnetic field induction to
enable communication between electronic devices in close proximity. NFC
operates in the standard unlicensed 13.56MHz frequency band (plus 847.5KHz)
over a distance of approximately 20cm. To date, it supports data rates of
106Kbps, 212Kbps and 424Kbps although higher data rates are expected in the
future.
NFM - Network
Friendly Mode
Proposed by the GSMA, Network Friendly Mode is a non
standardized feature of the communications module in an IoT device that
polices the amount of time it will perform standard cellular procedures
including IMSI Attach, GPRS Attach, PDP Context Activation etc. in order to
reduce the number of signalling exchanges within the network.
NFVI - NFV
Infrastructure
The NFVI is responsible for providing the compute,
storage and networking resources that individual VNF (Virtualized Network
Function) instantiations require. As such, a Hypervisor will typically
provide the abstraction layer between the physical resources and VNFs,
ensuring that VNFs are allocated resources when then need them.
NG
RAN - NextGen RAN
The Next Generation Radio Access Network, is part of the
3GPP 5G NextGen System. The gNB (Next Generation Node B) is the new base
station which facilities the new 5G radio techniques. Also see 5GS (5G
System) and 5G-RAN (5G Radio Access Network).
NG UE - NextGen
User Equipment
The Next Generation User Equipment, is part of the 3GPP
5G NextGen System. It support the new 5G NR (New Radio), as well as the
Evolved E-UTRA and non-3GPP access types.
NGAP - NG
Application Protocol
NGAP is found on the N2 reference point between the gNB
and the AMF (Core Access and Mobility and Management Function) in order to
support both UE and non UE associated services. This includes operations such
as configuration updates, UE context transfer, PDU Session resource
management and also support for mobility procedures. NGAP is also used to
convey downlink and uplink NAS (Non Access Stratum) messages as a payload, as
well as support CM Idle and CM Connected operations such as Paging and UE
Context release.
NGC - NextGen
Core
The Next Generation Core is part of the 3GPP 5G NextGen
System. It support access from the new 5G RAN, as well as the Evolved E-UTRA
and non-3GPP access types. Also see 5GS (5G System) and 5GC (5G Core Network)
NGEN-DC - NG-RAN
– E-UTRA Dual Connectivity
NGEN-DC is a Dual Connectivity configuration utlizing the
5GC, whereby the master RAN is a 4G ng-eNB and the secondary RAN node is a 5G
gNB.
NGEN-DC - NG-RAN
– E-UTRA-NR Dual Connectivity
NGEN-DC is a Dual Connectivity configuration utilizing
the 5GC, whereby the master RAN is a 4G ng-eNB and the secondary RAN node is
a 5G gNB.
NGS - NextGen
System
The 3GPP 5G NextGen System consists of the NGC (NextGen
Core), NextGen RAN and NextGen UE (user Equipment). Also see 5GS (5G System).
NGSO - Non-Geostationary
NGSO satellites do not stand still with respect to the
Earth. Therefore, in order to provide service continuity a number of
satellites are required; this is referred to as a constellation. The lower
the altitude of the satellites, then the higher the number of satellites that
are needed. There are a number of different classes of NGSO: LEO, MEO and
HEO.
NIC - Network
Interface Card
A Network Interface Card allows a device to communicate
across a network. This is generally a card that slots into a computer,
printer etc. which stores a unique address ( MAC (Medium Access Control)
Address) for that device.
NID - Network
Identification
A number that uniquely identifies a network within a
cellular or PCS (Personal Communication System).
NIDD - Non IP
Data Delivery
For low power IoT devices which need to communicate with
the network on a frequent or infrequent basis, utilizing an IP protocol stack
for data delivery can be a power hungry process. NIDD allows the mobile and
MME to utilize NAS signalling as a means of exchanging data messages related
to IoT. This process is termed “EPS services with control plane CIoT
(Cellular IoT) optimization”. The MME will act as the LTE network interface
between the mobile and the SCEF (Service Capabilities Exposure Function).
NIST - National
Institute of Standards and Technology
The National Institute of Standards and Technology is
responsible for developing tests, measurements, reference data and other
technical tools to support the development of information technology. NIST
collaborates with national and international standards committees, users, and
industry groups, in order that standards may be developed.
NLOS - Non Line
of Sight
NLOS is a term used to describe an air interface which is
capable of using multipath propagation to avoid the requirement for a line of
sight propagation path between two wireless terminals such as a Mobile
Station and a WiMAX Basestation.
NM - Network
Management
A set of procedures, software, equipment etc in order to
keep a network operating in an efficient manner. The ITU (International
Telecommunications Union) have developed a series of standards for Network
Management which are referred to as the TMN (Telecommunication Management
Network). This sub-divides Network Management into the following five
categories; Fault, Configuration, Performance, Accounting and Security.
NMC - Network
Management Centre
A Network Management Centre can be described as the
central point from which the entire network may be controlled. In most cases,
an NMC will make use of several OMC (Operations and Maintenance Centre) to
control specialist areas within the network.
NMSI - National
Mobile Station Identity
A National Mobile Station Identity is part of an IMSI
(International Mobile Subscriber Identity) and identifies the MS (Mobile
Station) within its home country. The NMSI consists of the MNC (Mobile
Network Code) and the MSIN (Mobile Subscriber Identification Number).
NMT - Nordic
Mobile Telephony
An analogue cellular system developed by the Nordic PTT
(Postal, Telegraph Telephone). Two versions existed NMT450 operating in the
450MHz band and NMT900 operating in the 900MHz band.
Nnef - NEF
Service-based Interface
Nnef is related to the 3GPP 5G Architecture. It
identifies a Service-based Interface for the Network Exposure Function.
NNI - Network
to Network Interface
This is an internal interface within a network linking
two or more elements.
Nnrf - NRF
Service-based Interface
Nnrf is related to the 3GPP 5G Architecture. It
identifies a Service-based Interface for the NF Repository Function.
Node-B - Node B
A Node B is a UMTS base station, relaying radio resource
control and user plane information between the mobile and the network.
Serving one or more cells, the Node B is controlled by an RNC (Radio Network
Controller) as part of a UMTS RNS (Radio Network System).
Noise
The term noise generally refers to any unwanted signal in
a transmission system.
Non GBR - Non
Guaranteed Bit Rate
In LTE Dedicated bearers carry traffic for IP flows that
have been identified to require a specific packet forwarding treatment.
Dedicated bearers can be either GBR (Guaranteed Bit Rate) or non-GBR. A GBR
bearer has a guaranteed bit rate and MBR (Maximum Bit Rate) while more than
one non-GBR bearer belonging to the same UE shares an AMBR (Aggregate Maximum
Bit Rate). Non-GBR bearers can suffer packet loss under congestion while GBR
bearers are immune to such losses. Consequently these bearers are generally
subject to admission control within the network.
Non-Connectable Device
A Bluetooth non-connectable device is one that does not
respond to paging and is said to be in on-connectable mode
NP - Number
Portability
This is the facility whereby subscribers may retain their
telephone number when moving either location or to another carrier or
operator.
Npcf - PCF
Service-based Interface
Npcf is related to the 3GPP 5G Architecture. It
identifies a Service-based Interface for the Policy Control Function.
NPDU - Network
Protocol Data Unit
A Network Protocol Data Unit is a packet of data found at
the network layer of the OSI (Open Systems Interconnection) seven layer
model. The PDU (Protocol Data Unit) may contain either signalling or user
information.
NPN - Non-Public
Network
NPN is the 3GPP parlance for a Private 5G network
deployment. Access to the NPN will be restricted, which means that regular 5G
devices which routinely access the Public 5G network will not consider the
NPN as a potential for RAN selection.
NR - New Radio
New Radio is the term relating to the 5G 3GPP radio.
NR-DC - New
Radio Dual Connectivity
NR-DC is a Dual Connectivity configuration using the 5GC,
whereby both the master and secondary RAN nodes are 5G gNBs.
NR-U - New
Radio – Unlicensed
NR-U describes the ability of 5G NR to be deployed within
the unlicensed spectrum band.
NR-V2X - New
Radio – V2X
NR-V2X refers to the vehicle to vehicle communication
that takes place between two vehicles over the PC5 interface utilizing the 5G
New Radio technology. In V2X deployments, vehicles could be multi-technology
capable and perform both NR-V2X and LTE-V2X over the PC5, vehicle to vehicle
interface.
NRF - NF
Repository Function
The NF (Network Function) Repository Function is related
to the 3GPP 5G Architecture. This supports the service discovery function. As
such, it is able to receive NF Discovery Request from a NF instance and can
provide information about discovered NF instances.
NS - Network
Service
The Network Service performs the transport of NS SDU
(Service Data Unit) between the SGSN (Serving GPRS Support Node) and BSS
(Base Station System). It also provides indications of congestion. The NS
Layer is split into two sublayers, the Network Service Control layer and the
Subnetwork Service layer. The Subnetwork Service layer currently utilizes
Frame Relay.
NSA
NR - Non-Standalone New Radio
A 3GPP 5G deployment configuration where the gNB (New
Radio Node B) requires an LTE eNB as anchor for control plane connectivity to
the EPC (Evolved Packet Core), or an ng-eNB as anchor for control plane
connectivity to the 5GC (5G Core).
NSAPI - Network
Service Access Point Identifier
The Network Service Access Point Identifier is an index
to the PDP context that is using the services provided by the lower layer (
SNDCP (Sub Network Dependent Convergence Protocol)). One PDP may have several
PDP contexts and NSAPI.
NSD - Network
Service Descriptor
In the context of the NFV (Network Functions
Virtualization) framework, a new Network Service would be on-boarded and
instantiated into the system using an NSD. The NSD is essentially a
collection of configuration documents, determining exactly how the Network
Service is comprised in terms of required VNFs (Virtualized Network
Functions) and their associated VNFFGD (VNF Forwarding Graph
Descriptor).
NSDU - Network
Service Data Unit
A unit of data passed between the user and the GPRS
network across a Network SAP (Service Access Point).
NSI - Network
Slice Instance
A Network Slice Template is related to 3GPP Network
Slicing. Network Slicing is implemented via Network Slice Instance(s) which
are created from a NST (Network Slice Template).
Nsmf - SMF
Service-based Interface
Nsmf is related to the 3GPP 5G Architecture. It
identifies a Service-based Interface for the Session Management Function.
NSMS - Network
Slice Management Service – Provider
In network slicing, the NSMS-P processes allocation
requests received by an NSMS-C (Network Slice Management Service – Consumer)
as part of NSI (Network Slice Instance) instantiation.
NSSAI - Network
Slice Selection Assistance Information
The NSSAI is a collection of up to 8 S-NSSAI (Single –
Network Slice Selection Assistance Information) and is sent to the network by
the UE to assist the network in selecting a particular Network Slice.
NSSF - Network
Slice Selection Function
The NSSF can be used by the AMF (Core Access and Mobility
Management Function) to assist with the selection of the Network Slice
instances that will serve a particular device. As such, the NSSF will
determine the Allowed NSSAI (Network Slice Selection Assistance Information)
that is supplied to the device. Moreover, the NSSF may be used to allocate an
appropriate AMF if the current AMF is not able to support all network slice
instances for a given device.
NSSI - Network
Slice Subnet Instance
In network slicing, the NSSI forms part of the overall
network slice instance. Examples include a RAN, core and transport NSSI.
NST - Network
Slice Template
A Network Slice Template is related to 3GPP Network
Slicing. The NST represents logical Network Function(s) and resource linked
to the services and network capabilities required.
NT - Non
Transparent
Non Transparent data transfer in GSM utilizes the RLP
(Radio Link Protocol) to ensure error free data by adopting a retransmission
mechanism. PDU (Protocol Data Unit) found to be incorrect will be discarded
and a request for a retransmission will be made to the originator.
NTP - Network
Time Protocol
NTP is a protocol designed to synchronize the clocks of
computers over a network. Timestamp values are represented by 64bits, 32 of
which represent seconds, with the remaining 32 representing fractions of a
second. As such, NTP will wrap around in 2036.
NTU - Network
Termination Unit
An Network Termination Unit is a device located at the
final interconnect point between the PSTN (Public Switched Telephone Network)
and the customers’ own equipment.
Nudm - UDM
Service-based Interface
Nudm is related to the 3GPP 5G Architecture. It
identifies a Service-based Interface for the Unified Data Management.
Null Modem
A Null Modem is a small box or cable which is used to
join two computing devices directly, rather than across a network.
Null Traffic Channel Data
Null Traffic Channel Data is one or more frames of a
specified data sequence which is sent at the lowest agreed upon rate of a
negotiated radio configuration. This may be sent when there is no primary,
secondary, or signaling traffic available.
NVFO - NFV
Orchestrator
The NFVO is a functional element of MANO (Management and
Orchestration), providing a critical role in the on-boarding and
instantiation of VNFs (Virtualized Network Functions) and Network Services.
The NFVO will also be involved in scale up/down of resources. In order to
facilitate its role, the NFVO will routinely be in communication with the
VNFM (VNF Manager) and the VIM (Virtualized Infrastructure Manager).
NWDAF - Network
Data Analytics Function
The NWDAF is responsible for providing network analysis
information upon request from network functions. For example, a network
function may request specific analysis information on the load level of a
particular network slice. Alternatively, the network function can use the
subscribe service to ensure that it is notified by the NWDAF if the load
level of a network slice changes or reaches a specific threshold.
Nyquist Theorem
The theorem proposed by Nyquist which states that an
original analogue signal can be precisely recreated provided a specified
minimum of samples are taken. In practical terms, it proposes that the
maximum rate of transmission of pulses over a transmission channel is equal
to twice the bandwidth of the channel without the risk of ISI (Inter Symbol
Interference).
O-BCSM - Originating
– Basic Call State Model
The BCSM (Basic Call State
Model) is a high-level finite state machine description of the CCF (Call
Control Function) activities required to establish and maintain communication
paths for users who have IN services. For circuit switched operation there will
be an Originating and Terminating BCSM.
O-CSI - Originating
– CAMEL Subscription Information
CAMEL operation requires additional CSI (CAMEL
Subscription Information) to be included as part of a mobile subscriber’s
subscription information in the HLR. This will be forwarded to the
appropriate VLR when the mobile attaches and moves around the network. There
are two types of CSI these are O-CSI and T-CSI (Terminating – CAMEL
Subscription Information). The later phases of CAMEL include many variations
of CSI.
O-IM-CSI - Originating
– IP Multimedia – CAMEL Subscription Information
CAMEL operation requires additional O-IM-CSI to be
included as part of a mobile subscriber’s subscription information in the
HSS. This will be forwarded to the appropriate S-CSCF when the mobile
Registers in the IMS and moves around the network.
O&M - Operations
& Maintenance
This term refers to the processes and functions used in
provisioning and managing a network or element within a network.
OAM - Operations,
Administration and Maintenance
This term refers to the processes and functions used in
provisioning and managing a network or element within a network.
OBEX - Object
EXchange Protocol
Object Exchange Protocol was originally developed to allow
the exchange of data objects over an infrared link. It can also be used over
other transport layers such as RFCOMM (Radio Frequency Communications
protocol) and TCP/IP. OBEX offers the same features for applications as
within the IrDA (Infrared Data Association) protocol hierarchy, enabling the
applications to work over the Bluetooth protocol stack as well as the IrDA
stack. This protocol is typically used for file transfer and business card or
vcard transfer.
Object
The term object is commonly found in both
telecommunication and computer networks. It can be described as an element
within the network defined by a series of attributes. These are often
collated within a MIB (Management Information Base). Within computing
networks, an object can also be described as a unit of information
OCF - Online
Charging Function
In the 3GPP IMS (IP Multimedia Subsystem) architecture,
the OCF forms an integral part of the online charging system, determining
whether or not, from a billing perspective, the customer is allowed to access
network resources or services. The EBCF (Event Based Charging Function) and
SBCF (Session Based Charging Function) are key elements of the OCF.
OCF - Open
Connectivity Foundation
The Open Connectivity Foundation represents a number of
companies involved in the development of standards to connect the billions of
devices forming the IoT (Internet of Things). Members include Cisco, Intel,
Qualcomm and Microsoft etc.
OCS - Online
Charging System
The OCS is the main element of a service provider’s online
(prepaid) billing architecture. In this capacity, the OCS interacts with a
number of network nodes e.g. MSC, SGSN, PCEF, all of which can potentially
provide billing related data. Core functions of the OCS include Rating
(determining the units such as time, volume, etc in use and determining their
price), subscriber account balance management, transaction control and advice
of charge to external systems.
OCSP - Online
Certificate Status Protocol
OCSP (Online Certification Status Protocol) has been
developed as the requirements of e-commerce and m-commerce have evolved. This
protocol provides real time access to CRL (Certificate Revocation Lists)
enabling users to validate commerce sites as part of the transaction process.
OFB - Output
Feedback
OFB is a mode of operation for symmetrical block ciphers
which allows the block cipher mechanism to be used to create a synchronous
stream cipher.
OFCS - Offline
Charging System
The OFCS is the main element of a service provider’s
offline (postpaid) billing architecture. In this capacity, the OFCS interacts
with a number of network nodes e.g. MSC, SGSN, CSCF, all of which can
potentially provide billing related data. The OFCS includes functions such as
the CDF (Charging Data Function) and CGF (Charging Gateway Function) which
are used to collect and present CDRs (Charging Data Records) to the billing
domain.
OFDM - Orthogonal
Frequency Division Multiplexing
OFDM is a multi carrier transmission technique capable of
supporting high speed services whilst still being bandwidth efficient. It
achieves this by forcing multiple sub-carriers together thereby reducing the
bandwidth required when compared to more traditional FDM (Frequency Division
Multiplexing)methods. However, to ensure these adjacent sub-carriers do not
cause excessive interference, they must be orthogonal or 90 degrees to one
another.
OFDMA - Orthogonal
Frequency Division Multiple Access
OFDMA (Orthogonal Frequency Division Multiple Access) can
be described as an extreme application of channelization. However, whereas
OFDM sub-channelization is semi-static, OFDMA permits a more dynamic
allocation of resources. Thus, OFDMA will allocate a number of sub-carriers
for different symbol periods based upon network conditions and user’s
requirements. This enables better utilization of the available bandwidth by
minimizing waste.
OFTEL - Office
of Telecommunications
Office of Telecommunications is a United Kingdom
government organization set up in 1984 to regulate the UK’s telecommunication
industry.
OIC - Open
Interconnect Consortium
This is the former name of the organization now known as
the OCF (Open Connectivity Foundation).
OIP - Originating
Identification Presentation
OIP is a supplementary service in which the network
provides the Called Party with the trusted identity of the Calling Party.
OIR - Originating
Identification Restriction
OIR is a supplementary service in which the network does
not provide the Called Party with the Calling Party’s identity.
OLT - Optical
Line Termination
OLT is the name given to the optical device that sits at
the head end of a PON or FTTx system. As such, the OLT is responsible for
coordination of a number of ONU , particularly with respect to the allocation
of upstream bandwidth to these devices. In addition, the OLT is the point at
which downstream traffic is broadcast to the ONU via the optical distribution
system.
OMA - Open
Mobile Alliance
The OMA was formed in the summer of 2002 by a number of
companies including the world’s leading mobile operators, device and network
suppliers, information technology companies and content and service
providers. OMA is primarily involved with the development of interoperable
end-to-end mobile services.
OMA-DM - Open
Mobile Alliance Device Management
OMA Device Management can through a Management Authority
remotely set parameters, conduct troubleshooting servicing of terminals,
install or upgrade software. By using the interfaces specified by the OMA DM
Client Framework API, applications running on the device can access the DM
Tree and interact with Management Objects and the DM Server, in order to
obtain configurations or report data.
OMC - Operations
Maintenance Centre
An Operations and Maintenance Centre is an element within
a network management system responsible for the operations and maintenance of
a specific element or group of elements. For example an OMC-Radio may be
responsible for the management of a radio subsystem whereas an OMC-Switch may
be responsible for the management of a switch or exchange. However, these
will in turn be under the control of a NMC (Network Management Centre) which
controls the entire network.
OML - Operations
and Maintenance Link
OML is used for supporting network management procedures
(transferring O&M messages).
ONF - Open
Networking Foundation
The ONF have been a key figurehead in the promotion and
standardization of SDN (Software Defined Networks). In particular, the ONF
standardize OpenFlow, a widely used and popular protocol choice for the
Southbound API between the SDN Controller and the network resources.
ONU - Optical
Network Unit
An Optical Network Unit is a device used to terminate a
fibre optic line and is often situated close to the subscriber’s site. This
terminology is used in PON (Passive Optical Network) architectures to
describe the CPE.
OPC - Operation
Code
This is a TCAP variable and is used to identify the
information flow contained within the CSL (Component Sublayer) of a TCAP
message. The typical information flow would be either CAMEL or MAP messages.
OPEX - Operational
Expenditure
General term which describes the day to day cost of
running a network, encompassing a wide variety of contributing factors.
Optical Budget
This is a parameter used in the design of optical
transmission networks. It is the difference between output power level of the
source and the receiver sensitivity. It is generally measured in dB
(Decibel).
ORB - Object
Request Broker
Within an Object based communication system, an ORB keeps
track of the actual addresses of all defined objects and thus is used to
route traffic to the correct destination. The CORBA (Common Object Request
Broker Architecture) defines the ORB in a series of standards enabling
different platforms to share common information.
OS - Operating
System
This can be described as the software within a computer
which controls basic functions. Examples of operating systems include
Windows, DOS and Linux.
OSA - Open
Service Access
OSA (Open Services Access) is a joint initiative between
the 3GGP, ETSI and the Parlay Group which is designed to facilitate the
design and implementation of service architectures in mobile networks. OSA
services have an open API (Application Programming Interface) termed Parlay,
which developers can use as the basis for server design. In the IMS (IP
Multimedia Subsystem), OSA servers may require a SCS (Service Capability
Server) in order to support integration with a SIP (Session Initiation
Protocol) based network.
OSI - Open
System Interconnection
Refers to a 7 layer reference model developed by the OSI.
OSPF - Open
Shortest Path First
Open Shortest Path First is a link state, hierarchical IGP
(Interior Gateway Protocol) routing algorithm. Features supported by OSPF
include least cost routing, multipath routing and load balancing.
OSS - Operations
Support System
Operations Support System can be described as a network
management system supporting a specific management function, such as fault,
performance, security, configuration etc.
OTD - Orthogonal
Transmit Diversity
An optional method of transmission of the Forward CDMA
Channel that utilizes two antennas, each transmitting a fraction of the code
symbols. It is used to enhance the performance in the presence of fades due
to multipath propagation.
OTDOA - Observed
Time Difference On Arrival
OTDOA is a subscriber location technique which was
introduced in Release 9 of the 3GPP specifications. OTDOA is based on the
mobile taking TDOA measurements from the PRS (Positioning Reference Signal)
associated with the neighbouring eNBs that the mobile is able to receive.
These measurements are then supplied to the ESMLC (Enhanced Serving Mobile
Location Centre) by the mobile, which the ESMLC is able to utilize in order
to calculate the location of the mobile.
OTI - Originating
Transaction Identifier
The OTI is a TCAP variable and is used to associate
request and response messages within the TCAP Transaction Sublayer.
OTN - Optical
Transport Network
OTN (Optical Transport Network) is designed to improve
transport network performance using fibre optic technology, with the ultimate
goal to facilitate migration to very high backbone transport bandwidths. The
actual OTN standard is ITU-T G.709, which provides the network interface
definitions for an OTN deployment.
OTT - Over The
Top
A term used to describe the delivery of communication
services over the top of an existing transport network, without any
relationship between the OTT service provider and the transport network
service provider. An example would the use of Skype over a mobile network to
conduct a voice call.
Out of Band Signalling
Out of Band Signalling utilizes an additional signalling
channel alongside the data information channel to carry control information
such as signalling.
Overhead
This can be described as information added to a user’s
transmitted message for the purpose of control. Such overhead includes error
checking and synchronization information.
Overlay Network
This is a telecommunication network which is added over
essentially the same route as an existing network yet does not replace it.
The overlay network usually carries supplementary services.
P-CCPCH - Primary
Common Control Physical Channel
There is only one Primary
Common Control Physical Channel within a cell, and it is used to carry
synchronization and broadcast information for users. The frame structure of
the Primary CCPCH differs from the downlink DPCH (Dedicated Physical Channel)
in that no TPC (Transmit Power Control) commands, no TFCI (Transport Format
Combination Indicator) and no pilot bits are transmitted. The Primary CCPCH
is not transmitted during the first 256 chips of each slot. Instead, Primary
SCH (Synchronization Channel) and Secondary SCH are transmitted during this
period, the remainder being used for broadcast messages.
P-CSCF - Proxy
– Call Session Control Function
The P-CSCF acts as the ingress and egress point to and
from a service provider’s IMS domain with respect to the IMS client. The
P-CSCF has a large number of responsibilities, including: onward routing of
registration and session requests to the correct nodes in the network,
ensuring the S-CSCF (Serving CSCF) is kept updated on the access network the
subscriber is using, providing session information to the PCRF (Policy and
Charging Rules Function) and maintaining a secure connection with the client
device.
P-GW - Packet
Data Network Gateway
The P-GW serves as an ingress and egress point to the EPC
from a PDN (Packet Data Network) such as the Internet. When a subscriber
establishes an EPS (Evolved Packet System) bearer to a given PDN, the P-GW
serves as the point of attachment to that PDN for the life of the EPS bearer
(regardless of any mobility procedures). Packet filtering is a key role of
the P-GW in order to ensure that downlink data has the appropriate QoS
applied. This is associated with PCC (Policy and Charging Control), with the
P-GW typically housing PCEF (Policy and Charging Enforcement Function)
capabilities.
P-GW - PDN
Gateway
The P-GW serves as an ingress and egress point to the EPC
from a PDN (Packet Data Network) such as the Internet. When a subscriber
establishes an EPS (Evolved Packet System) bearer to a given PDN, the P-GW
serves as the point of attachment to that PDN for the life of the EPS bearer
(regardless of any mobility procedures). Packet filtering is a key role of
the P-GW in order to ensure that downlink data has the appropriate QoS
applied. This is associated with PCC (Policy and Charging Control), with the
P-GW typically housing PCEF (Policy and Charging Enforcement Function)
capabilities.
P-RNTI - Paging
The E-UTRA Paging Control Channel uses a P-RNTI (Paging –
Radio Network Temporary Identifier) which is set to 0xFFFE and is used to CRC
encode the paging messages.
P-SCH - Primary
Synchronization Channel
The UMTS Primary SCH (Synchronization Channel) is a
downlink signal used for cell search. The SCH consists of two sub channels,
the Primary and Secondary SCH. The 10ms radio frames of the SCH are divided
into 15 slots, each of length 2560chips. The Primary SCH consists of a
modulated code of length 256chips, and is transmitted once every slot.
P-TMSI - Packet
– Temporary Mobile Subscriber Identity
The P-TMSI is a temporary identity issued to a GPRS
enabled mobile, unique within a given RA (Routing Area), and is used by the
GPRS network to page the specified mobile. The P-TMSI is comprised of 32bits
and is associated with the TLLI (Temporary Logical Link Identifier).
P/F - Poll /
Final Bit
A Poll/Final bit is often found in data link layer
protocols and is used to indicate the function of a frame. If the frame is a
command a one in this bit indicates a poll. If the frame is a response a one
in this bit indicates that the current frame is the final frame.
PABX - Private
Automatic Branch Exchange
A Private Automatic Branch Exchange is a private switch
or exchange often found within a company. The PABX will perform the switching
of local calls within the organization as well as setting up external
connections with the local operator or carrier.
PACA
Call - Priority Access and Channel Assignment Call
A priority MS (Mobile Station) originated call for which
no traffic or voice channel was immediately available, and which has been
queued for a priority assignment.
PACCH - Packet
Associated Control Channel
The Packet Associated Control Channel conveys signalling
information related to a given GPRS mobile such as acknowledgements and power
control information. The PACCH also carries resource assignment and
reassignment messages.
Packet
A packet can be described as a logical grouping of
information including header and (usually) user data. Packets most often are
used to refer to network layer units of data and are also often called
datagrams, frames, messages, PDU (Protocol Data Unit) to name but a few.
Packet error Ratio
Identifies the ratio of good to bad packets.
Packet Filtering
Packet Filtering is the method for determining how IP
packets should be handled by a network device. When IPSec is employed, all IP
packets passing the IPSec engine are filtered and may be modified, passed
intact, or dropped.
Packet Idle Mode
In packet idle mode, the MS (Mobile Station) is prepared
to transfer packet data. The MS however has not been allocated any radio
resource on a PDCH (Packet Data Channel).
Packet mode
In this mode the GPRS mobile is ready to access and
operate on a packet data physical channel. The packet mode includes two
substates: packet wait state and packet transfer state.
PAD - Packet
Assembly / Disassembly
A Packet Assembly / Disassembly is a device used to
assemble and disassemble packets enabling simple devices to connect to a
packet switched network such as X.25. A PAD may also carry out buffering.
PAGCH - Packet
Access Grant Channel
The Packet Access Grant Channel is used in the GPRS
packet transfer establishment phase to send resource assignment to a MS
(Mobile Station) prior to packet transfer.
PageState
The Page State is a mode that a Bluetooth device enters
when searching for other devices. The device sends out a page to notify other
listening devices that it is looking for devices and the possible services.
Paging - Bluetooth
A Bluetooth unit transmits paging messages to other
Bluetooth units who are active within the coverage area. This enables a
communication link to be established.
Paired
In Bluetooth, two devices are Paired together and in so
doing exchanging connection information. This information includes the Device
Name , Passkey and any other relevant information, thus allowing devices to
automatically and seamlessly connect together.
Pairing
Pairing is a Bluetooth term used to identify the exchange
of a Link Key between two devices. These devices will use the link key for
any future secure exchange of information.
PAM - Pulse
Amplitude Modulation
This is a process of representing a continuous analogue
signal with a series of discrete analogue samples. The process is used in PCM
(Pulse Code Modulation) during the conversion of an analogue signal into a
digital representation.
PAN - Personal
Area Network
A Personal Area Network is a group of personal devices,
communicating seamlessly together. This is also referred to as a WPAN
(Wireless Personal Area Network), an example being the Bluetooth system.
PAP - Password
Authentication Protocol
The Password Authentication Protocol allows PPP (Point to
Point Protocol) peers to authenticate one another. The remote device
attempting to connect to the local device is required to send an
authentication request. PAP does not itself prevent unauthorized access but
merely identifies the remote end.
Park Mode
The Park Mode is when a Bluetooth device is synchronized
to the piconet but does not participate in traffic transfer. Parked devices
relinquish their AM_ADDR (Active Member Address) address and monitor the
master for broadcast messages. The Park mode conserves the most power
compared with other power saving modes, Sniff Mode and Hold Mode.
Passkey
In Bluetooth, a Passkey is used to authenticate incoming
device connections. These Passkeys are only valid for that connection.
PAT - Port
Address Translation
Port Address Translation or sorting is a feature which
allows many devices on a LAN (Local Area Network) to share one IP address by
allocating a unique port address at layer four. The system is popular as in
enables greater efficiency of the limited IPv4 (IP version 4) address space.
Path Loss
Path Loss is said to occur when RF (Radio Frequency)
waves are transmitted through the air. This loss occurs due to atmospheric
influences and interaction with objects, which can have a filtering effect on
the signal.
Payload
A payload can be described as the portion of a cell,
frame, or packet that contains upper layer information (data).
PBB - Provider
Backbone Bridges
Standardized as IEEE 802.1ah-2008, PBB allows customers
to connect their Ethernet VLAN s across a service provider’s network, whilst
keeping their own VLAN traffic separate from other customers of the service
provider. As such, it is actually the service provider that needs to deploy a
PBB capable network, which will take customer traffic and add an additional
Ethernet header. The header contains information and identifiers which ensure
that customer traffic will be sent to the correct egress point in the network
and will also be kept separate from other customer traffic.
PBB-TE - Provider
Backbone Bridge Traffic Engineering
PBB-TE is based on the earlier PBB standard, which uses a
series of identifiers to ensure that customer traffic can be kept separate
and can be delivered to the correct egress point whilst transiting a service
provider network. PBB-TE, as the title suggests, introduces traffic
engineering into the architecture, which essentially means that prior to the
customer traffic hitting the network, the route the customer traffic will
take has already been preconfigured in the network. This preconfigured route
will be established based on the requirements of the customer traffic, in
much the same way as existing traffic engineering mechanisms. Therefore,
PBB-TE is different to PBB in the sense that STP is not required and also
flooding is not allowed.
PBCC - Packet
Binary Convolutional Coding
PBCC is an optional method of error protection which may
be used in IEEE (Institute of Electrical and Electronics Engineers) 802.11
networks. Its support within a network is broadcast in the beacon message.
PBCCH - Packet
Broadcast Control Channel
The Packet Broadcast Control Channel broadcasts packet
data specific PSI (Packet System Information). If PBCCH is not allocated, the
packet data specific system information will be broadcast on BCCH (Broadcast
Control Channel).
PBCH - Physical
Broadcast Channel
This channel is used in E-UTRA to carry the RRC MIB
(Master Information Block). The MIB utilizes the BCH Transport Channel and
BCCH Logical Channel. The PBCH includes physical layer error protection and
formatting, as well as being located in a predefined position for FDD/TDD
radio frames.
PC - Privacy
Class
The Privacy Class is a list of LCS (Location Services)
clients defined within a privacy exception class to which permission may be
granted to locate the target mobile. The permission is granted either on
activation by the target mobile or permanently for a contractual period of
time agreed between the target mobile and the service provider.
PC5
LINK-AMBR - PC5 Link Aggregate Maximum Bitrate
In 5G V2X, PC5 unicast links are limited using PC5
LINK-AMBR. This limits the aggregated bit rate that can be expected across
all non-GBR QoS Flows with a peer device. It is measured over an averaging
window and is only applicable to non-GBR Flows.
PCC - Policy
and Charging Control
The PCC (Policy and Charging Control) architecture has
been specified by the 3GPP as a mechanism which enables packets flowing
through an IP-CAN to be associated with a particular charging key for both
online and offline billing. In addition, PCC also provides policy control, in
which a PCRF (Policy Control and Charging Rules Function) interacts with a
PCEF (Policy Charging and Control Enforcement Function) in order to provide
instruction on the control of the IP-CAN. PCC is a technique which can be used
within the IMS to provide policy and charging control between IMS entities
(namely the P-CSCF ) and the IP-CAN.
PCCCH - Packet
Common Control Channel
The Packet Common Control Channel comprises of logical
channels for GPRS common control signalling. These subchannels include: PRACH
(Packet Random Access Channel), PPCH (Packet Paging Channel), PAGCH (Packet
Access Grant Channel) and PNCH (Packet Notification Channel).
PCCH - Paging
Control Channel
Paging Control Channel (PCCH) A downlink channel that
transfers paging information. This channel is used when the network does not
know the location cell of the UE (User Equipment), or, the UE is in the cell
connected state but utilizing UE sleep mode procedures.
PCEF - Policy
and Charging Enforcement Function
The PCEF is a DPI (Deep Packet Inspection) device
responsible for the enforcement of rules which have been configured
statically or supplied to the PCEF dynamically from the PCRF (Policy and
Charging Rules Function). The PCEF sits on the user plane, ensure that
subscriber traffic flows are treated in accordance with network policy e.g.
implementing QoS, throttling traffic, blocking traffic, etc. Crucially, the
PCEF will ensure that services are billed accordingly.
PCF - Point
Coordination Function
When contention free operation is required in an IEEE
802.11 network, special wireless stations called Point Coordinators are
utilized which enable other stations to transmit frames after a shorter than
normal time interval. Point Coordinators are only found in AP (Access Point)
and as such PCF operation is restricted to Infrastructure networks.
PCF - Policy
Control Function
The Policy Control function is related to the 3GPP 5G
Architecture. This function supports the unified policy framework that
governs network behaviour. In so doing, it provides policy rules to control
plane function(s) to enforce them. In order to facilitate this the
subscription information is gathered from the Unified Data Management
function.
PCF - Positioning
Calculation Function
The Positioning Calculation Function is responsible for
calculating the position of the mobile. It obtains BTS (Base Transceiver
Station) related data e.g., BTS geographic co-ordinates and stores this data.
This function applies an algorithmic computation on the collected signal
measurements to compute the final location estimate and accuracy. It also
supports conversion of a mobile’s location estimate between different
geodatic reference systems.
PCFICH - Physical
Control Format Indicator Channel
The PCFICH (Physical Control Format Indicator Channel) is
used to inform the UE about the number of OFDM symbols (1, 2 or 3) used for
the PDCCH in a subframe. This channel consists of 32bits which are
cell-specific scrambled prior to modulation and mapping.
PCH - Paging
Channel (Generic)
The Paging Channel is used to alert a mobile that there
is a call or text message waiting. The alert is broadcast from all cells
within a given area.
PCFICH - Physical
Control Format Indicator Channel
The PCFICH (Physical Control Format Indicator Channel) is
used to inform the UE about the number of OFDM symbols (1, 2 or 3) used for
the PDCCH in a subframe. This channel consists of 32bits which are
cell-specific scrambled prior to modulation and mapping.
PCH - Paging
Channel (Generic)
The Paging Channel is used to alert a mobile that there
is a call or text message waiting. The alert is broadcast from all cells
within a given area.
PCI - Physical
Cell Identity
This is used in E-UTRA systems to identify a cell. Its
value is dependant on the combination of PSS (Primary Synchronization
Signal), numbered 0 to 2 and the SSS (Secondary Synchronization Signal)
numbered 0 to 167. This effectively allows for 504 combinations which are
reused in the cell planning and optimization phases. The PCI value can be
reused within the network and different radio carriers on the same eNB can
also reuse the same PCI.
PCM - Pulse
Code Modulation
Pulse Code Modulation is the process in which an analogue
signal is encoded into a digital bit stream. The analogue is first sampled,
then quantized and finally encoded into a bit stream. The most common version
of PCM enables one voice circuit to be represented by a 64Kbps stream. Other
versions of PCM exist such as ADPCM (Adaptive Differential PCM) which enables
lower bit rates to be achieved.
PCMCIA - Personal
Computer Memory Card International Association
Technical standard for small cards which are able to plug
into notebooks to provide enhanced functions. Common examples include network
cards, modem cards and security cards.
PCN - Personal
Communication Network
Term initially used to describe cellular operators
utilizing the 1800MHz frequency band. These networks are now known as GSM1800
networks.
PCO - Protocol
Configuration Options
PCO is used in LTE as a means by which the mobile can
indirectly exchange information with the P-GW. The information is typically
related to particular PDN connection, with examples of PCO information
including the address of a DNS server and IP address of the P-CSCF (for VoLTE
operation).
PCPCH - Physical
Common Packet Channel
In UMTS the Physical Common Packet Channel is used to
carry the CPCH (Common Packet Channel). Each cell scrambling code is
allocated a possible 64 PCPCH codes.
PCR - Parameter
Change Registration
The process by which a mobile registers when some of its
stored parameters change.
PCR - Peak Cell
Rate
This is an ATM (Asynchronous Transfer Mode) term to
describe the rate in cells per second that the source device may never
exceed.
PCRF - Policy
and Charging Rules Function
The PCRF is a policy decision point for subscriber data
flows in the network. Using inputs from other network nodes, the PCRF will
formulate rules which control how traffic flows (required QoS, restrictions,
throttling, blocking, billing, etc) over the network down to individual
subscriber granularity. The PCRF passes these rules to the PCEF (Policy and
Charging Enforcement Function).
PCS - Personal
Communication System
Personal Communication System is the term given to
cellular phone technologies within the USA. PCS1900 (Personal Communication
System 1900) is a well known standard that is based on DCS1800 (Digital
Communication System 1800) but shifted up through 100MHz of spectrum.
PCU - Packet
Control Unit
The Packet Control Unit is a device found within a GPRS
network which is logically associated with a BSC (Base Station Controller).
The PCU is responsible for the radio related aspects of GPRS when connected
to a GSM network and lies between the BTS (Base Transceiver Station) and the
SGSN (Serving GPRS Support Node).
PDA - Personal
Digital Assistant
A Personal Digital Assistant can be generally described
as a small handheld computer holding such information as diaries, address
books etc.
PDCCH - Physical
Downlink Control Channel
The PDCCH control area size is defined by the PCFICH ,
i.e. 1, 2 or 3 OFDM symbols. The E-UTRA PDCCH carries scheduling assignments
and other control information. It is transmitted on an aggregation of one or
several consecutive CCE (Control Channel Element), where a CCE corresponds to
nine REG s.
PDCH - Packet
Data Channel
The Packet Data Channel is a general term used in GPRS to
represent a timeslot given over to the control of GPRS rather than
conventional GSM circuit switching. As such, it may carry either signalling
or user data.
PDCP
(LTE) - Packet Data Convergence Protocol
PDCP fundamentally provides a compression service to
higher layer data, which may be control plane or user plane (IP) traffic.
When the LTE variant of PDCP compresses data, a separate standard termed ROHC
(Robust Header Compression) is utilized (UMTS PDCP can use ROHC and an
earlier standard termed IP Header Compression). Moreover, the LTE variant of
PDCP is also responsible for implementing ciphering and integrity checking.
PDCP
(UMTS) - Packet Data Convergence Protocol
Packet Data Convergence Protocol is used in UMTS to
format the data into a suitable structure prior to transfer over the air
interface.
PDF - Policy
Decision Function
To support policy in IP networks a simple architecture
based upon a policy server and policy aware network routers is deployed. The
policy server is termed the PDF and uses a protocol such as COPS to
communicate policy information to the PEF (Policy Enforcement Function).
Using policy information access, network resources etc are allocated to the
network user.
PDH - Plesiochronous
Digital Hierarchy
A common standard utilized throughout the world to
multiplex digital information. Due to limitations such as lack of flexibility
and performance it has been superseded in many areas by SDH (Synchronous
Digital Hierarchy).
PDI - Packet
Detection Information
PDI is found within a PFCP PDR (Packet Data Rule),
outlining key filter elements that should be applied in order to detect a
specific packet e.g. IP address, port information.
PDN - Public
Data Network or Packet Data Network
This is a generic term for a network providing data
services. Examples include the Internet , Intranet and IMS (IP Multimedia
Subsystem).
PDN-GW - PDN
Gateway
Within the EPC the PDN Gateway terminates the SGi
interface and is responsible for functions such as policy enforcement, based
around the monitoring of traffic characteristics on a subscriber by
subscriber basis to ensure that the agreed traffic policy is being adhered
to. Other tasks include packet filtering and screening for things such as
Malware and unauthorized data types, as well as accounting, IP Address
Allocation and Lawful Interception.
PDP Address
The PDP (Packet Data Protocol) Address conforms to the
standard addressing scheme of the respective network layer service used, e.g.
IPv4 (IP version 4), IPv6 (IP version 6) or X.25 etc.
PDP Context
A PDP (Packet Data Protocol) Context is a logical
association between a MS (Mobile Station) and PDN (Public Data Network)
running across a GPRS network. The context defines aspects such as Routing,
QoS (Quality of Service), Security, Billing etc.
PDP Type
When establishing a PDP Context the PDP Type indicates
what type of protocol is to be used by the mobile for a certain service, e.g.
IP and X.25.
PDR - Packet
Detection Rule
A PDR contains information required to classify a packet
arriving at a UP function, e.g. a TDF-U, a PGW-U or a SGW-U. There will be at
least one PDR for both the uplink and the downlink. The PDR will contain
various amounts of information depending upon the user function type. This
will include a unique session and rule identity and also packet detecton
information such as source information, service data flow filter and
application identity.
PDS - Packet
Data Session
Generic term used to describe a session during which a
user will invoke and utilize a packet data service.
PDSCH - Physical
Downlink Shared Channel
In LTE the PDSCH carries the DL-SCH (Downlink Shared
Channel). This is the only downlink transport channel available to carry user
data between the mobile device and the eNB.
PDSN - Packet
Data Serving Node
Packet Data Serving Node is responsible for the
establishment, maintenance and termination of a PPP (Point to Point Protocol)
session towards the MS (Mobile Station). It may also assign dynamic IP
addresses in addition to supporting Mobile IP functionality. It provides a
similar function to the GSN (GPRS Support Nodes) found in GSM and UMTS
networks.
PDTCH - Packet
Data Traffic Channel
A Packet Data Traffic Channel is a channel allocated for
data transfer. It is temporarily dedicated to one MS (Mobile Station) or to a
group of mobiles in the Point to Multipoint – Multicast case. In multislot
operation, one MS may use multiple PDTCH in parallel for individual packet
transfer.
PDU - Protocol
Data Unit
A Protocol Data Unit comprises of data and control
information which is passed between layers in a protocol stack.
PE - Provider
Edge
PE describes the border between a service provider’s
network and the customer. PE routers are often deployed at the PE in order to
facilitate interaction.
PEAP - Protected
Extensible Authentication Protocol
PEAP is an authentication method used to transmit
authentication information, including passwords, over wired or wireless
networks. It was jointly developed by Cisco Systems, Microsoft, and RSA
Security. PEAP is similar to EAP-TTLS (Extensible Authentication Protocol –
Tunnelled Transport Layer Security).
PEI - Permanent
Equipment Identifier
In 5G, the PEI is the means by which the network
identifies the User Equipment (for devices that are capable of accessing a
3GPP network, the PEI will be an IMEI).
PEL - Privacy
Exception List
The Privacy Exception List defines the of various types
of privacy classes (i.e. operator related, personal etc.). Certain types of
classes may require agreement between the service provider and the target
mobile.
PEM - Privacy
Enhanced Mail
PEM (Privacy Enhanced Mail) is based on RFC 1421 and
defines a suite of protocols that provide privacy, authentication and
integrity. This protocol is normally used to protect binary information when
it has been translated into a printable format.
PENALTY_TIME
This specifies the time duration in GSM and UMTS for
which the TEMPORARY_OFFSET is applied for a neighbouring cell.
PEP - Policy
Enforcement Point
To support policy in IP networks a simple architecture
based upon a policy server and policy aware network routers is deployed. The
policy server is termed the PDF (Policy Decision Function) and uses a
protocol such as COPS to communicate policy information to the PEF. Using
policy information access, network resources etc are allocated to the network
user.
PES - PSTN
Emulation Subsystem
In the TISPAN specifications, the PES is designed to
support the emulation of PSTN / ISDN type services for legacy terminals that
are connected to the TISPAN network.
PF - Paging
Frame
This is used in relation to DRX (Discontinuous Reception)
in E-UTRA and identifies a radio frame which may contain one or multiple
Paging Occasion(s). The paging frame is calculated using various parameters
including a modulo version of the IMSI.
PF - Policy
Function
PF is the generic title given to a policy element such as
a PDF (Policy Decision Function) or PEF (Policy Enforcement Function).
PFC - Packet
Flow Context
In GPRS Release 99, a SGSN (Serving GPRS Support Node) is
able to provide the BSS (Base Station System) with information related to the
ongoing user data transmission in terms of a BSS PFC. These are used to
describe the QoS (Quality of Service) characteristics for data transmission
per mobile and are identified in terms of their PFI (Packet Flow Identity).
There are three predefined Packet Flow Contexts which are used for Best
Effort, SMS (Short Message Service) transmission and Signalling which do not
require any form of negotiation between the SGSN and the BSS.
PFD - Packet
Flow Detection
A PFD is a means by which an ASP (Application Service
Provider) related to Cellular IoT can push application or service detection
information into the 5G network in order for its associated user plane
traffic to be detected at the UPF and hence have the correct PCC enforcement
applied.
PFDF - Packet
Flow Description Function
Used within CIoT (Cellular Internet of Things) networks,
the PFDF is a repository which stores PFD (Packet Flow Description) that can
be managed and updated by third party service providers. For example, an IoT
platform may require all its associated devices to send information to a new
IoT Application Server and thus would provide it with an IP address, protocol
and port number to use.
PFI - Packet
Flow Identity
The Packet Flow Identifier is used to indicate a PFC
(Packet Flow Context) associated with an LLC (Logical Link Control) – PDU
(Protocol Data Unit). If the mobile does not support PFC or if the PFI is not
known by the SGSN (Serving GPRS Support Node), then it will use the
pre-defined PFI indicating best effort QoS (Quality of Service).
PFS - Perfect
Forward Secrecy
PFS (Perfect Forward Secrecy), also known as public-key
forward secrecy, works on the premise that no key used for the transfer of
data may be used to derive any keys for future transmission.
PGP - Pretty
Good Privacy
Pretty Good Privacy is a widely used public key
encryption application that allows secure file and message exchange.
PGW-C - PDN
Gateway Control plane function
The PGW-C controls the functionality performed by the
assigned PGW-U when control and user plane separation is in place. When a
subscriber establishes an EPS (Evolved Packet System) bearer to a given PDN,
the PGW-C selects and controls the point of attachment to that PDN for the
life of the EPS bearer (regardless of any mobility procedures).
Responsibilities include resource management for bearer resources, bearer
binding, subscriber IP address management and mobility support.
PGW-U - PDN
Gateway User plane function
The PGW-U serves as the user data plane ingress and
egress point to the EPC when control and user plane separation is in place.
When a subscriber establishes an EPS (Evolved Packet System) bearer to a
given PDN, the PGW-U under the control of the PGW-C serves as the point of
attachment to that PDN for the life of the EPS bearer (regardless of any
mobility procedures). Packet inspection is a key role of the PGW-U in order
to ensure that data has the appropriate service level applied.
PHB - Per Hop
Behaviour
This is the treatment that a DiffServ (Differentiated
Services) router applies to an IP datagram containing a given DSCP (DiffServ
Code Point) value.
PHICH - Physical
Hybrid ARQ Indicator Channel
The E-UTRA PHICH (Physical Hybrid ARQ Indicator Channel)
carries HARQ (Hybrid ARQ) ACK/NAK’s and is transmitted in terms of PHICH
groups. A PHICH group consists of up to eight ACK/NACK processes and one
PHICH group uses three REG s.
Photonics
Photonics is the technology of using light particles
(photons) to carry information over fibres of pure glass.
PHS - Personal
Handyphone System
PHS was developed in Japan in 1989 as a cordless
telecommunication system operating within the band 1895MHz to 1918MHz. The
aim was to provide cordless access to the PSTN and thus had similar operating
characteristics to cellular systems.
Physical - Medium
Access Control
The MAC protocol layer is present in the mobile and the
NB/eNB in order to support the correct multiplexing/demultiplexing of
signalling and user plane traffic onto the various transport channels of the
air interface.
Physical
Channel - Bluetooth
The Bluetooth physical channel is identified by a
synchronized RF (Radio Frequency) hopping sequence in a piconet.
Physical Channels
The physical channel supports the physical media, usually
in an encoded format. This may be pulses of light, a modulated voltage or
radio waves. The physical channel is described in Layer 1 of the OSI (Open
Standards Interconnection) model.
Physical Link
A Physical Link is the connection between devices.
PIA - Point in
Association
GPRS State Models use PIA (Point In Association) to
identify SGSN activities that are relevant to the CAMEL Service Environment.
These points may be viewed as similar to the traditional PIC (Point In Call)
found in systems.
PIC - Point In
Call
The PIC identifies Call Control Function activities
associated with one or more basic call/connection states which are of
interest to IN service logic instances.
Pico Cell
A very small cell, from tens to hundreds of meters in
size. Pico cells are optimized to provide high capacity.
Piconet
In the Bluetooth system, a piconet is created when two or
more devices create a Master / Slave connection in an ad hoc fashion, an
example being a cellular phone and a computer. Each piconet can have only one
Master, one to seven active Slaves, and 0-255 Parked Slaves. All devices in
the piconet use the same physical channel, this is defined by the master
device.
PIFS - PCF
Interframe Space
PIFS are found in IEEE 802.11 networks. When the radio
link has been free of any traffic for a period greater than the PIFS,
Stations operating in contention free mode may have immediate access to the
medium. As such, PIFS has a shorter duration than DIFS (DCF Interframe Space)
which is used in the contention based mode.
Pilot
Pilot Pilot bits are used to support channel estimation
for coherent detection.
Pilot Beacon
This is found on a transmit only base station that
broadcasts a Pilot Channel, a Sync Channel, optionally a Paging Channel or a
Broadcast Control Channel, but not Forward Traffic Channels. The MS (Mobile
Station) measures the pilot beacon to assist in CDMA (Code Division Multiple
Access) hard handoffs and inter frequency idle mode handoffs.
Pilot Channel
This is an unmodulated , direct sequence spread spectrum
signal transmitted by a CDMA (Code Division Multiple Access) BS (Base
Station) or MS (Mobile Station). A pilot channel provides a phase reference
for coherent demodulation in addition to providing a means for signal
strength comparisons between Base Stations, which is used when determining
when to handoff.
Pilot PN Chip
One bit or bit pair of a pilot PN (Pseudorandom Noise)
sequence, or the time interval corresponding to it.
Pilot PN Sequence
A pair of modified maximum length PN (Pseudorandom Noise)
sequences used to spread the quadrature components of a CDMA (Code Division
Multiple Access) Channel.
Pilot PN Sequence Offset
This is the time offset of a Forward Pilot Channel from
CDMA (Code Division Multiple Access) System time, as transmitted by the BS
(Base Station), expressed modulo to the pilot period.
Pilot PN Sequence Offset
Index
The pilot PN sequence offset is expressed in units of 64
PN (Pseudorandom Noise) chips of a Forward Pilot Channel , relative to the
zero offset pilot PN sequence.
Pilot Strength
The ratio of pilot power to total power in the signal
bandwidth of a CDMA (Code Division Multiple Access) Forward or Reverse
Channel.
PIM - Protocol
Independent Multicast
PIM is a routing protocol that is utilized in multicast
IP transport networks. As such, PIM ensures that multicast traffic is only
being sent to recipients that are interested in that traffic and also when
traffic is sent, it takes the optimal path through the network.
PIN - Personal
Identification Number
The Bluetooth Personal Identification Number is used to
authenticate two devices that have not previously exchanged link key. By
exchanging a PIN, the devices create a trusted relationship. The PIN is used
in the pairing procedure to generate the initial link that is used for
further identification.
PING - Packet
Internet Groper
This is a utility programme which tests access to a
device by sending a series of messages and measuring the replies.
Ping of Death
This is an attack that sends a larger than expected PING
(Packet Internet Gopher). For example, an echo request packet with a packet
size greater than 65,507. If the TCP/IP stack on the end machine is badly
written, it will cause the machine to crash with a buffer overflow causing a
DoS (Denial of Service) or in some instances, the ability to log onto the
system.
Pitch
The fundamental frequency in speech caused by the
periodic vibration of the human vocal cords.
PKCS - Public-Key
Cryptography Standards
PKCS (Public-Key Cryptography Standards) are a list of
specifications and framework documents issued by RSA Security.
PKCS 1 - Public
Key Cryptography Standard 1
PKCS 1 (Public Key Cryptography Standard 1) is the
standard used to define the use of RSA algorithms for encryption and digital
certificates.
PKCS
10 - Public Key Cryptography Standard 10
PKCS 10 (Public Key Cryptography Standard 10) defines the
process for certification requests.
PKCS
11 - Public Key Cryptography Standard 11
PKCS 11 (Public Key Cryptography Standard 11) defines the
standard for the interface between smart cards and crypto accelerators.
PKCS
12 - Public Key Cryptography Standard 12
PKCS 12 (Public Key Cryptography Standard 12) defines the
standard for the storage of keys and certificates.
PKCS
15 - Public Key Cryptography Standard 15
PKCS 15 (Public Key Cryptography Standard 15) defines the
standard for the storage of keys on smart cards.
PKCS 7 - Public
Key Cryptography Standard 7
PKCS 7 (Public Key Cryptography Standard 7) defines the
syntax for data that may have encryption applied to it.
PKCS 8 - Public
Key Cryptography Standard 8
PKCS 8 (Public Key Cryptography Standard 8) defines the
syntax for private keys and private key information.
PKE - Public
Key Encryption
Public Key Encryption is the process of utilizing
Public/Private key pairs in order to protect data across the public Internet.
PKI - Public-Key
Infrastructure
PKI (Public-Key Infrastructure) comprises all the
elements required to implement public key encryption. These include the key
pairs, certification authorities, certificate repositories and all the other
software and hardware components.
PKIX - Public
Key Infrastructure (X.509)
PKIX (Public Key Infrastructure ( X.509)) defines the
framework for the many processes and collaborations being used to support
public key technology on the Internet. The framework has been coordinated by
the IETF (Internet Engineering Task Force) working group known as PKIX.
Plaintext
Plaintext is text which has not been encrypted.
PLC - Power
Line Communication
This is a communication technology which enables
electrical wiring to be used to carry both electricity and communication data
around the home or office. Standards such as HomePlug utilize PLC technology
to network their IoT (Internet of Things) devices.
PLL - Phase
Lock Loop
This is a technique for recovering the clock in
transmitted data and is often performed by an integrated circuit.
PLMN - Public
Land Mobile Network
A Public Land Mobile Network is a generic name for all
mobile wireless networks that use land based radio transmitters or base
stations.
PMA or
PM_ADDR - Parked Member Address
In a piconet, each slave in the park mode can be
identified by a BD_ADDR ( Bluetooth Device Address) or a dedicated PM_ADDR
(Parked Member Address). The PM_ADDR is an 8bit member address allocated by
the master to separate parked devices. Once a slave is in the active mode, it
will lose the PM_ADDR and be assigned an AM_ADDR (Active Member Address). The
PM_ADDR is set to eight zeros for the parked slaves who only use their
BD_ADDR to communicate.
PMCH - Physical
Multicast Channel
This is a E-UTRA physical channel used to support MBMS
(Multimedia Broadcast Multicast Service). It carries the MCH (Multicast
Channel) Transport Channel.
PMI - Precoding
Matrix Indicator
This is a E-UTRA parameter related to MIMO feedback for
some of the E-UTRA transmission modes. The precoding feedback is used for
channel dependent codebook based precoding and relies on UEs reporting the
desired PMI (Precoding Matrix Indicator).
PMIP - Proxy
Mobile IP
Proxy MIP introduces a MAG (Mobility Access Gateway) into
the Mobile IP architecture which interacts with the HA , termed a LMA (Local
Mobility Anchor)in Proxy MIP parlance, on behalf of the Mobile Node. With
PMIP, the use of MIP in the network is transparent to the mobile device.
PMK - Pairwise
Master Key
A PMK is a cryptographic key which is used to derive
lower level keys. Networks based on technologies such as UMTS and WiMAX use
PMK as part of their relative security procedures.
PMR - Private
Mobile Radio
Private Mobile Radio is the term used to describe radio
communication systems used by small to medium sized groups of users.
PN - N-PDU
Number
This is a GTP (GPRS Tunnelling Protocol) based flag that
indicates the presence of a meaningful value of the N-PDU Number field.
PN - Pseudorandom
Noise
A bit stream that when analyzed out of context appears to
be random. It is sometimes referred to as Pseudonoise.
PN Chip
One bit in a PN (Pseudorandom Noise) sequence, or the
time duration of such a bit. It corresponds to the smallest modulation
interval in a CDMA (Code Division Multiple Access) system.
PNCH - Packet
Notification Channel
The Packet Notification Channel is used to send Point to
Multipoint multicast notification information to a group of MS (Mobile
Station) prior to Point to Multipoint multicast packet transfer.
PNF - Physical
Network Function
Within the NFV (Network Functions Virtualization)
framework, a PNF is a physical network node which has not undergone
virtualization. Both PNFs and VNFs (Virtualized Network Functions) can be
used to form an overall Network Service.
PNP - Private
Numbering Plan
A Private Numbering Plan defines the format of telephone
numbers to be used within a private telephone system. The PNP number normally
consist of at least 3 digits, excluding 112.
PoA - Point of
Attachment
The PoA can be defined as the point at which the user
breaks out of their link layer access network and onto the packet data
network eg the Internet, IMS etc.
POC - Push to
talk Over Cellular
POC which is also termed PTT (Push To Talk) uses the GPRS
network to send packetized speech between participants of a POC session. The
process as far as the user is concerned can be likened to CB Radio in which
users share a communication channel, by pressing the button to talk, and then
releasing it to allow other participants to speak. PoC is also available as
an IMS managed service, with PoC sessions established using SIP. In this
case, the IP-CAN is not necessarily GPRS.
POC Client
The POC Client is an application supported on the
operating system of the mobile device and terminates the POC signalling both
for registration and other procedures within the network Core such as
authentication. It also interacts, through POC signalling, with the POC
Server. This involves setting up POC sessions with individuals or groups as
well as answering invitations by other POC users.
POC Server
The POC Server provides the controlling function within
the POC architecture. It is, in effect, an AS (Application Server) supporting
the call control function.
Point to Multipoint
A generic term used to identify communications from a
single source to multiple destinations.
Point-to-Point
A value of the service attribute communication
configuration, which denotes that the communication involves only two network
terminations.
PON - Passive
Optical Networks
PON (Passive Optical Network) are optical fibre based
networks which employ a point to multipoint network architecture. Passive,
unpowered optical splitters are utilized to allow one fibre, often connected
to the Local Exchange/Central Office, to serve a number of subscribers
(typically 32 subscribers but can be as many as 128). PON technology emerged
in the early 1990s and recently, PON have been deployed in support of IP
convergence in many existing and green field networks. Key components of PON
architecture include the OLT and ONU.
POP - Point Of
Presence
A Point of Presence is a local access point into a
network such as the Internet.
Port Number
Port Numbers may be physical or logical. The most common
use of the term port is in IP based application protocols, and is used to
describe the SAP (Service Access Point) through which the transport
protocols, such as TCP (Transport Control Protocol) or UDP (User Datagram
Protocol), pass information to the higher layers, and vice versa. The port
numbers that are associated with the higher layer application protocol are
assigned through the IANA and are classified as follows: Well Known – 0 to
1023, Registered – 1024 to 49151, Dynamic – 49152 to 65535.
POTS - Plain
Old Telephone Service
A very general term used to describe an ordinary voice
telephone service.
Power Control Bit
The Power Control Bit is sent on the Forward Power
Control Subchannel or Reverse Power Control Subchannel to signal the MS
(Mobile Station) or base station to increase or decrease its transmit power.
Power Down Registration
An autonomous registration method in which the MS (Mobile
Station) registers with the network on power down.
Power Up Registration
An autonomous registration method in which the MS (Mobile
Station) registers with the network on power up.
PPCH - Packet
Paging Channel
The Packet Paging Channel is used to page a MS (Mobile
Station) prior to downlink packet transfer. The PPCH uses paging groups in
order to allow the mobile to utilize DRX (Discontinuous Reception) mode. It
can be used for paging both circuit switched and packet data services.
PPP - Point to
Point Protocol
The Point to Point Protocol was designed to provide
router to router and host to network connections over synchronous and
asynchronous circuits. In addition, PPP has a built in security mechanism.
PPTP - Point
Point-to-Point Tunnelling Protocol is a Layer 2 protocol
that encapsulates PPP (Point to Point Protocol) frames in IP datagrams for
transmission, typically over the Internet. PPTP uses a TCP (Transmission
Control Protocol) connection for tunnel maintenance and a modified version of
GRE (Generic Routing Encapsulation) to encapsulate PPP data frames.
PQI - PC5 QoS
Identifier
PQI is a special 5QI used as a reference to PC5 QoS
characteristics. QoS handling for V2X communication over PC5 is based upon
the 5QI (5G QoS Indicator) format, with an additional parameter covering
range being added.
PRACH - Packet
Random Access Channel
The Packet Random Access Channel is used by a GPRS
enabled MS (Mobile Station) to initiate uplink transfer of user data or
signalling information.
PRACH - Physical
Random Access Channel
The Random Access procedure is used in various scenarios,
including initial access, handover, or re-establishment. Like other 3GPP
systems the random access procedure provides a method for contention and
non-contention based access. The PRACH (Physical Random Access Channel)
includes RA (Random Access) preambles generated from Zadoff-Chu sequences.
PRACK - Provisional
Response Acknowledgement
This is a SIP method which will provide information that
confirms the receipt of an earlier provisional response message.
PRAF - Positioning
Radio Assistance Function
The Positioning Radio Assistance Function provides
additional support for the PRCF (Positioning Radio Coordination Function)
when radio coordination is distributed among multiple network elements. A
particular function of the PRAF for network based position methods is to
induce positioning signals from the target mobile. For mobile based and
mobile assisted position methods, the PRAF can induce position signals from
the network or from some other external reference source.
PRB - Physical
Resource Block
A E-UTRA PRB (Physical Resource Block) is defined as
consisting of 12 consecutive subcarriers for one slot (0.5 ms). A PRB is the
smallest element of resource allocation assigned by the eNB scheduler.
PRC - Primary
Reference Clock
The PRC is the term given to the master timing source
within a network.
PRCF - Positioning
Radio Coordination Function
The Positioning Radio Control Function manages the
positioning of a mobile through the overall coordination and scheduling of
resources to perform positioning measurements. This function interfaces with
the PSMF (Positioning Signal Measurement Function) and PCF (Positioning
Calculation Function) and possibly with a PRAF (Positioning Radio Assistance
Function). The PRCF determines the positioning method to be used based on the
QoS (Quality of Service), the capabilities of the network and the mobile’s
location capabilities.
Precedence
The term precedence indicates the relative priority of
maintaining the service.
Presence - Presence
Application Server
A Presence Application Server provides the ability for a
user to inform any interested parties as to the current status of the user.
This can include availability, portrait icon, favourite link, timestamp and
location details. Authorisation is central to enabling multiple parties to
share social presence information and in order to assist with this Social
Presence service and architecture is based upon the OMA Presence
specification – OMA Presence SIMPLE Specification 1.1.
Presence Server
Presence is a service which can be applied as a
supplement to many other services, such as voice, gaming and IM. Presence
Servers collate presence information from presence clients and subsequently
distribute this information to interested parties. SIP provides a presence
architecture through use of the SUBSCRIBE, NOTIFY and PUBLISH methods.
PRI - Primary
Rate Interface
A Primary Rate Interface is a ISDN (Integrated Services
Digital Network) term describing either an E1 circuit in Europe or a T1
circuit in North America. These are comprised of 30 traffic channels and two
signalling channels (E1, 30B+2D – 2.048Mbps) or 23 traffic channels and one
signalling channels (T1, 23B+D – 1.544Mbps) respectively.
Primary CDMA Channel
Primary CDMA Channel This is a preassigned channel in a
CDMA (Code Division Multiple Access) cellular system used by the MS (Mobile
Station) for initial acquisition.
Primitive
A generic term for the transfer of data and control
information between two adjacent layers and sublayers within a protocol
stack. It is conventionally represented as a function invocation, with the
data and control information passed as parameters.
Private Key
A Private Key is the secret component of a pair of
cryptographic keys (Public / Private Key) used for cryptography.
PRN - Provide
Roaming Number
The MAP PRN message is sent from the HLR to the MSC
serving a mobile for which an incoming call is being processed. The message
triggers the MSC to forward an MSRN (Mobile Station Roaming Number) to the
GMSC via the HLR. This MSRN is used by the GMSC to route the call to the
correct MSC.
Proactive SIM
A SIM (Subscriber Identity Module), which is capable of
issuing commands to the handset/terminal.
Propagation Delay
This is the time taken for a signal to travel over a
given distance in a specified medium.
ProSe - Proximity-based
services
ProSe is an enabling technology for LTE for Public
Safety. ProSe features consist of ProSe discovery (direct or EPC-level) and
ProSe Direct Communication (using E-UTRAN or WLAN direct). With respect to
ProSe Discovery, this identifies that ProSe-enabled LTE mobiles are in
proximity to one another. ProSe Direct Communication enables establishment of
communication paths between two or more ProSe-enabled UEs that are in direct
communication range. The ProSe Direct Communication path could use E-UTRAN or
WLAN.
Protection Switching
This is a facility enabling the recovery from a failure
by switching to another transmission path. An example of protection switching
is 1+1 which provides a standby path all of the time. N+M protection
switching enables N paths to be protected by M standbys.
Protocol
A Protocol can be described as a set of rules and
conventions that govern how devices on a network exchange information.
Protocol Stack
Conceptual model of the layered architecture of
communication protocols in which layers within a station are represented in
hierarchical order. Each layer in the protocol stack is defined in generic
terms describing functionality and mode of operation. Examples of protocol
stacks include the OSI (Open System Interconnection) model and the TCP/IP
protocol stack.
PS - Packet
Switched
In a packet switched network, data may be transferred by
dividing it into small blocks or pieces known as packets. Each packet
contains information in its header to allow it to be routed by packet
switches across the network. This is a more efficient means of transferring
data. An example of a packet switched network is the Internet.
PS-Code - Pseudo
Random Code
A signal with random noise like properties. It contains a
complicated repeated pattern of 1’s and 0’s.
PSA - PDU Session Anchor
PSA is the term given to the UPF (User Plane Function)
which terminates the N6 interface of a PDU session within a 5G core network.
PSAP - Public
Safety Answering Point
The PSAP is the physical location(s) within the PSTN at
which emergency services call handlers will take emergency calls from
individuals in distress. Emergency services can be sent to the individual’s
geographic location based on information provided verbally or through
automated means based on their access network. The latest generation of PSAPs
support packet based connectivity to service frameworks such as the IMS (IP
Multimedia Subsystem), allowing users of an IMS to make emergency calls
without having to break the call out to the PSTN.
PSI - Packet
System Information
In GPRS Packet System Information messages are broadcast
on the PBCCH (Packet Broadcast Control Channel) and inform terminals of the
GPRS parameters within the cell.
PSI - Provide
Subscriber Information
This message is used as part of the CAMEL ATI (Any Time
Interrogation) process. It is sent from the HLR to the serving MSC in order
to retrieve subscriber state and location information.
PSI - Public
Service Identity
With respect to the 3GPP IMS (IP Multimedia Subsystem),
PSI are used to identify services which are hosted by an AS (Application
Server), as opposed to Public User Identities, which identify an IMS
subscriber. PSI can also be used to identify groups of IMS subscribers.
PSK - Phase
Shift Keying
Phase Shift Keying is a technique enabling digital
information to be carried over an analogue carrier such as a radio link. The
process causes the phase of the carrier wave to be manipulated in order to
signify either a logical 0 or 1 There are many variations of PSK allowing
greater data transfer rates to be achieved.
PSM - Power
Save Mode
Introduced in Release 13 of the 3GPP specifications, PSM
enables mobile / devices to reduce power consumption by effectively powering
off for long periods of time. However, during such periods, the mobile /
device remains attached to the network and maintains any PDP (Packet Data
Protocol) Contexts or EPS (Evolved Packet System) bearers.
PSMF - Positioning
Signal Measurement Function
The Positioning Signal Measurement Function is
responsible for gathering uplink or downlink radio signal measurements in
order to calculate a mobile’s position. These measurements can be positioning
related or ancillary.
PSS - Primary
Synchronization Signal
The PSS (Primary Synchronization Signal) provides
downlink synchronization information for the UE. The signal is based on one
of three Zadoff-Chu sequences that in effect generates a pseudo noise pattern
to enable the UE to discriminate between synchronization signals on adjacent
cells.
PSTN - Public
Switched Telephone Network
This is a general term referring to a public telephony
network which is based on the switching of TDM circuits in order to convey
both signalling and voice.
PTCCH - Packet
Timing Control Channel
The Packet Timing Control Channel is used in GPRS to
ensure that the correct timing advance is maintained for each MS (Mobile
Station). On the uplink, the PTCCH is used by a mobile station to send an
Access Burst and on the downlink, the mobile station will receive a TAI
(Timing Advance Index) value.
PTI - Procedure
Transaction Identity
An identity which is dynamically allocated by the UE for
tracking and correlating UE requested ESM (EPS Session Management)
procedures. The PTI is released when the procedure is completed.
PTP - Precision
Time Protocol
A protocol based mechanism which provides timing and
synchronization reference over a packet switched transport network.
Standardized as IEEE 1588v2.
PTT - Push to
Talk
PTT is a walkie-talkie style service that uses the
services of cellular network technology such as GSM (Global System for Mobile
communications), GPRS (General Packet Radio Service) and 3G (Third
Generation) systems such as UMTS (Universal Mobile telecommunications System)
and CDMA2000 It was first offered as a service over ten years ago by Nextel,
a North American carrier.
Public Key
A Public Key is the publicly disclosable component of a
pair of cryptographic keys (Public / Private Key) used for cryptography.
PUCCH - Physical
Uplink Control Channel
The E-UTRA PUCCH (Physical Uplink Control Channel)
carries UCI (Uplink Channel Information) such as ACK/NAK’s in response to
downlink transmission, as well as CQI (Channel Quality Indicator) reports. It
also carries scheduling request indicators and MIMO codeword feedback.
PUF - Power Up
Function
A method by which a MS (Mobile Station) increases its
output power to support location services.
PUSCH - Physical
Uplink Shared Channel
The E-UTRA PUSCH (Physical Uplink Shared Channel) is the
main uplink channel and is used to carry the UL-SCH (Uplink Shared Channel)
transport channel. It carries both signalling and user data, in addition to
UCI.
PVC - Permanent
Virtual Circuit
A Permanent Virtual Circuit is a permanently established
logical connection between two devices on a packet switched network. Examples
of PVC can be found on ATM (Asynchronous Transfer Mode) and Frame Relay
networks. The advantage of a PVC over a SVC (Switched Virtual Circuit) is the
saving of bandwidth associated with circuit establishment and tear down.
PWE3 - Pseudowire
Emulation Edge to Edge
PWE3, also termed Pseudowires, are used extensively in
IP-RAN scenarios whereby cell sites based on TDM or ATM transmission are
linked to the core network using IP or MPLS based transport links. These
links, although fundamentally packet based, can carry the native E1 frames or
ATM cells, hence negating the requirement to upgrade the cell site device yet
still benefitting from IP/MPLS transport in the RAN.
PZID - Packet
Zone Identification
The Packet Zone Identification is a unique number which
identifies the PCF (Packet Control Function) coverage area within a
particular geographic area.
QAM - Quadrature
Amplitude Modulation
Modulation
technique using two amplitude modulated RF (Radio Frequency) carriers that
are out of phase by 90 degrees. Information transfer is achieved using a
mixture of phase and amplitude changes. Since noise also appears as amplitude
variations QAM is prone to interference.
QAP - Quality
Access Point
The term QAP is used in wireless networks
supporting the IEEE 802.11e Quality of Service enhancement. It defines a
Quality of Service aware Access Point.
QBSS - Quality
Basic Service Set
The term QBSS is used in wireless networks
supporting the IEEE 802.11e Quality of Service enhancement. It defines a
Basic Service Set supporting a QAP and a number of QSTA.
QCI - QoS Class
Identifier
In LTE , the QoS Class Identifier is used as a
reference to access node-specific parameters that control bearer level packet
forwarding treatment (e.g. scheduling weights, admission thresholds, queue
management thresholds, link layer protocol configuration, etc.) which have
been pre-configured by the operator owning the eNB.
QDU - Quantization
Distortion Unit
A particular quantization process will
generate quantization noise that affects the quality of the process. Each
quantization process is given a Quantization Distortion unit value to
indicate the amount of quantization noise generated. PCM (Pulse Code Modulation)
generates 1 quantization distortion unit (1qdu).
Qhcs
This specifies the UMTS quality threshold
levels when applying prioritized hierarchical cell reselection.
Qhyst
This specifies the UMTS hysteresis value
(Qhyst). It is used for FDD (Frequency Division Duplex) cells if the quality
measure for cell selection and reselection is set to CPICH (Common Pilot
Channel) Ec/No.
QIB - Quality
Indicator Bit
The Quality Indicator Bit indicates signal
quality on the Forward Dedicated Control Channel.
Qmap
Quality of the neighbouring (Qmap, n) or
serving (Qmap, s) cell, after the mapping function is applied.
QoE - Quality
of Experience
Where QoS is an indication of network
performance, QoE is a measure of how network performance effects the end
service and hence how the subscriber experiences that service. In some cases,
a relatively significant QoS failure in the network may not have a
perceivable effect on QoS. Conversely, in certain scenarios just a single
dropped packet could detrimentally effect QoE eg dropping a packet carrying
an i-frame as part of an IPTV service.
Qoffset
Qoffset This specifies the offset between the
two cells. It is used for FDD (Frequency Division Duplex) cells in case the
quality measure for cell selection and re-selection is set to CPICH (Common
Pilot Channel) Ec/No.
QoS - Quality
of Service
The performance of a communications channel or
system is usually expressed in terms of QoS (Quality of Service). Depending
upon the communication system, QoS may relate to service performance, SNR
(Signal to Noise Ratio), BER (Bit Error Ratio), maximum and mean throughput
rate, reliability, priority and other factors specific to each service.
QoS Negotiated
The QoS provided by the SGSN (Serving GPRS
Support Node), this will be dependant on the QoS Requested and the QoS
Subscribed.
QoS Profile
The QoS (Quality of Service) profile in a GPRS
system comprises a number of QoS parameters. A GPRS QoS profile is associated
with each QoS Session. The GPRS QoS profile defines the performance
expectations for the bearer network.
QoS Requested
The term used to identify the QoS (Quality of
Service) that the user is requesting for this PDP (Packet Data Protocol)
context. The mobile should receive back a QoS Negotiated which will depend on
the QoS Subscribed and the current conditions in the network.
QoS Session
Within a GPRS system the QoS (Quality of
Service) session indicates the lifetime of a PDP (Packet Data Protocol)
context. The period between the opening and closing of a PDP context whose
characteristics are defined by a QoS Profile. Multiple QoS sessions may
exist, each with a different GPRS QoS profile.
QoS Subscribed
The GPRS term used to identify the QoS
(Quality of Service) that the user has subscribed to, this is stored in the
HLR (Home Location Register) and current SGSN (Serving GPRS Support Node).
QPCH - Quick
Paging Channel
This channel is utilized by a BS (Base
Station) to inform a slotted mode MS (Mobile Station) whether to monitor the
PCH (Paging Channel) or the FCCCH (Forward Common Control Channel).
QPSK - Quadrature
Phase Shift Keying
Phase shift keying in which four different
phase angles are used. Sometimes called quadriphase or quaternary phase shift
keying.
Qqualmeas
Qqualmeas Measured cell quality value. The
quality of the received signal expressed in CPICH (Common Pilot Channel)
Ec/N0 dB (decibel) for FDD (Frequency Division Duplex) cells.
Qqualmin
Qqualmin Minimum required quality level in the
cell, in dB (Decibels).
Qrxlevmin
This specifies the minimum required RX
(Receiver) level in the cell in dBm (decibels with reference to 1mW).
QSIG - Q
reference point Signalling System
The Q reference point Signalling System
replaces traditional analogue signalling between a PABX (Private Automatic
Branch Exchange) on one site and a PABX on another site.
QSTA - Quality
Station
The term QSTA is used in wireless networks
supporting the IEEE 802.11e Quality of Service enhancement. It defines a
Quality of Service aware Station (Non Access Point Station).
Quantization
A process in which an analogue signal is
sampled and converted into a discrete value. PCM (Pulse Code Modulation) uses
quantization.
Quantization level
In the quantization process, the discrete
value assigned to a particular sample of the analogue signal being quantized.
Quantization noise
Noise caused by the error of approximation in
quantization. The level of quantizing noise is dependent on the particular
quantization process used and the characteristics of the quantized signal.
Quick Paging
This is an optimal feature enabling a MS
(Mobile Station) to further conserve its battery power.
Quick Paging Channel Slot
An interval on the QPCH (Quick Paging Channel)
lasting 80ms.
Quick Repeats
Quick Repeats Identifies additional
transmissions of a message within a short interval; this is used to increase
the probability of successful reception.
R -
Reselection
The process made by a
mobile whilst in the UMTS idle state or one of the paging states. The term
R(s) is used for the calculation on the serving cell, whilst R(n) is for
calculations on the neighbouring cell.
R Reference Point
The R Reference Point lies between non ISDN equipment and
a TA (Terminal Adapter).
r-csch - reverse-common
signaling logical channel
A logical channel that carries higher layer signaling
traffic from the user to the BS (Base Station) over a common physical
channel.
r-dsch -
reverse-dedicated signaling logical channel
A logical channel that carries higher layer signaling
traffic from the BS (Base Station) to the user over a common physical
channel.
R-UIM - Removable User
Identity Module
The R-UIM is a removable variant of a UIM (User Identity
Module) which can be physically removed from a ME (Mobile Equipment) and
inserted into another ME. This removal into another ME will be dependant on
compatible ME/UIM interfaces.
R2MFC - R2 Multi
Frequency Compelled
CCS (Common Channel Signalling) system that allows the
equipment units at the exchanges to send and receive digits.
RA - Rate Adaptation
The Rate Adaptation process takes place when a slow
device is connected to an ISDN (Integrated Services Digital Network). Rate
Adaptation is required when the equipment at one end is a TA (Terminal
Adapter) connected to a synchronous or asynchronous device running at a speed
lower than 64Kbps. The two main ITU-T (International Telecommunications
Union-Telecommunication Standardization Sector) Rate Adaptation standards are
V.110 and V.120.
RA - Registration
Authority
An RA (Registration Authority) may be used in PKE (Public
Key Encryption) to support the distribution and management of keys and tokens
along with other responsibilities such as certificate revocation reporting.
RA - Routing Area
The SGSN (Serving GPRS Support Node) in a GPRS system
will control one or more RA (Routing Area). It is the responsibility of the
mobile to keep the SGSN informed as to its current RA. Routing Areas can be
made up on one or more cells. Each Routing Area is given a RAI (Routing Area
Identification).
RA-RNTI - Random Access –
Radio Network Temporary Identifier
As part of the E-UTRA access procedure the UE will probe
the system with Random Access Preambles. On receiving these the eNB generates
a RA-RNTI to effectively schedule the response.
RAA - Re-Authorization
Answer
The RAA is a Diameter credit control command. In LTE, the
message is sent by the PCEF to the PCRF across the Gx interface in response
to the Re-Authorization Request command as a confirmation of receipt.
RAB - Radio Access Bearer
Term used in UMTS to identify the service the AS (Access
Stratum) provides to the NAS (Non Access Stratum) for transfer of user data
between the UE (User Equipment) and the CN (Core Network).
RAC - Routing Area Code
Routing Area Code is a fixed length of 1 octet and
identifies a routing area within a location area. The RAC is part of the RAI
(Routing Area Identity).
RACH - Random Access
Channel
The channel used for initial access into a system. The
RACH function is different depending on the technology of the system. The
term RACH applies to cdmaOne, GSM, UMTS, TETRA, CDMA2000 LTE and other
telecommunication systems.
RAck - Response
Acknowledged
RAck is a SIP (Session Initiation Protocol) header field
which is used in support of the PRACK method.
RACS - Resource and
Admission Control Subsystem
The RACS is an integral part of the TISPAN architecture,
designed to allow user devices to request and reserve resources in the access
network, essentially providing subscribers with the correct QoS for the
service they are attempting to initiate.
Radio Access Mode
Identifies the access mode for a cell. This usually
indicates FDD (Frequency Division Duplex) or TDD (Time Division Duplex) mode
of access.
Radio Configuration Class
A term used to identify a group of RC (Radio
Configuration). The RC (Radio Configuration) for forward and reverse traffic
channels, are divided into three classes.
Radio frame
Depending on the technology, a radio frame is a numbered
time interval used for data transmission on the radio physical channel.
Radio Interface
The radio interface is the wireless interface between two
points. This term encompasses all the functionality required to maintain such
interfaces. In cellular systems the interface between the terminal and the
base station is referred to as the radio interface or air interface.
Radio link
Radio link In a UMTS system, the term radio link is a
logical association between single UE (User Equipment) and a single UTRAN
(UMTS Terrestrial Radio Access Network) access point. Its physical
realization comprises one or more radio bearer transmissions. It is possible
for a UMTS mobile to have many radio links established, when this occurs the
mobile is said to be in a soft handover.
Radio link addition
The procedure in UMTS where a new radio link is added to
the active set.
Radio link removal
The procedure in UMTS where a radio link is removed from
the active set.
Radio Spectrum
The range of frequencies used, for example, for
broadcasting radio, PMR (Private Mobile Radio), terrestrial television,
cellular mobile networks and satellite television. Usable frequency ranges
from about 100KHz to about 500GHz.
RADIUS - Remote
Authentication Dial-In User Service
Remote Authentication Dial-In User Service is a system of
distributed security that secures remote access to networks and network
services against unauthorized access. RADIUS includes the authentication
server which is installed on a central computer within the network core and
the client protocols used to access the server. RADIUS is designed to
simplify the security process by separating security technology from
communications technology. RADIUS servers are deployed extensively in support
of DSL services and mobile broadband architectures, although there are many
more instances of RADIUS usage for AAA.
RAF - Repository Access
Function
The RAF is used to interwork the standardized XML based
GUP (Generic User Profile) Server interface to the GUP data repositories, as
specified by the 3GPP (3rd Generation Partnership Project).
RAI - Routing Area
Identification
The Routing Area Identification is composed of the LAC
(Location Area Code) and the RAC (Routing Area Code). It is used for paging
and registration purposes.
RAM - Random Access
Memory
Random Access Memory is the place in a computer where the
operating system, application programs, and data currently in use are kept so
that they can be quickly reached by the computer’s processor. Data in RAM
stays there only as long as your computer is running. Turning off the
computer loses the data in the RAM.
Rake Receiver
The rake receiver is a technique which uses several
baseband correlators to individually process multipath signal components. The
outputs from the different correlators are combined to achieve improved
reliability and performance.
RAN - Radio Access
Network
The Radio Access Network performs the radio functionality
of the network, as well as providing the connection to the CN (Core Network).
The RAN typically includes a controller ( RNC (Radio Network Controller) in
3GPP (Third Generation Partnership Project) and BSC (Base Station Controller)
in 3GPP2 (Third Generation Partnership Project 2)) and several
transmitter/receivers ( Node B in 3GPP, BTS (Base Transceiver Station) in
3GPP2).
RANAP - Radio Access
Network Application Part
RANAP operates over the Iu-PS interface and provides two
main functions; the support of AS (Access Stratum) signalling between the RNC
and the SGSN and the encapsulation of NAS (Non Access Stratum) signalling
passing between the mobile and the core network. With respect to AS
signalling, RANAP supports procedures such as RAB (Radio Access Bearer)
assignment and management, relocation, location reporting, paging and
security management. RANAP uses the services of SCCP which in turn resides on
either IP or ATM (Asynchronous Transfer Mode).
RAND - Random Number
A number selected from a known set of numbers in such a
way that each number in the set has the same probability of occurrence. This
is typically used in the authentication and ciphering process.
RANDBS - Base Station
Random Variable
The RANDBS is a 32bit random number generated by the MS
(Mobile Station) for authenticating BS (Base Station) orders to update the
SSD (Shared Secret Data).
RANDC - Random Challenge
A MS (Mobile Station) parameter used in conjunction with
the SSD (Shared Secret Data) and other parameters, enabling validation of
calls and registrations.
RANDU - Unique Random
Variable
A 24bit random number generated by the BS (Base
Station)when carrying out the Unique Challenge-Response procedure.
RAPID - Random Access
Preamble Identifier
This is used by the E-UTRA MAC layer and relates to the
6bit access preamble identifier which was initially used by a UE accessing
the eNB on the PRACH. Effectively it forms part of the contention resolution
procedure.
RAR - Random Access
Response
This is used by the E-UTRA MAC layer. It contains the TA
(Timing Alignment) information, initial UL grant and assignment of a
Temporary C-RNTI to the UE associated with the RAPID (Random Access Preamble
Identifier).
RAR - Re-Authorization
Request
The RAR is a Diameter credit control command. In LTE, the
message is sent by the PCRF to the PCEF across the Gx interface in order to
provision PCC/QoS rules and event triggers using a push procedure. An example
would be a network initiated dedicated EPS bearer establishment, whereby the
receipt of this message would trigger the appropriate GTPv2-C message to be
sent to the PDN-GW and the S-GW.
RARP - Reverse Address
Resolution Protocol
Reverse Address Resolution Protocol is a protocol by
which a physical machine in a LAN (Local Area Network) can request to learn
its IP address from a gateway server’s ARP (Address Resolution Protocol)
table or cache. When a new machine is set up, its RARP client program
requests from the RARP server on the router to be sent its IP address.
Assuming that an entry has been set up in the router table, the RARP server
will return the IP address to the machine which can store it for future use.
RAT - Radio Access
Technology
This indicates the type of radio technology to access the
CN (Core Network). Example technologies being UTRA (UMTS Terrestrial Radio
Access), CDMA2000, WiFi, GERAN (GSM EDGE Radio Access Network), LTE (Long
Term Evolution) etc.
Rate centre
The geographic area used by local exchange carriers to
set rate boundaries for billing and for issuing phone numbers.
Rate matching
This process is carried out so that the block size
matches the radio frame(s). It will either repeat bits to increase the rate
or puncture bits to decrease the rate.
RAU - Routing Area Update
A GPRS mobile will perform a Routing Area Update in the
Ready and Standby state. The RAU is triggered when the mobile crosses a RA
(Routing Area) boundary, or periodically. The time interval being set by the
network. A RAU is also performed when the mobile moves from the Idle to the
Standby state. This will typically happen when the mobile is powered on.
Rayleigh Fading
In electromagnetic wave propagation, phase interference
fading caused by multipath effects.
RB - Radio Bearer
The service provided by the Layer 2 for the transfer of
user data between UE (User Equipment) and UTRAN (UMTS Terrestrial Radio
Access Network).
RB - Resource Block
In LTE a RB or PRB ( Physical Resource Block) is defined
as consisting of 12 consecutive subcarriers for one slot (0.5 ms). A PRB is
the smallest element of resource allocation assigned by the eNB scheduler.
RBG - Resource Block
Group
This is a term used in the E-UTRA when the Distributed
Virtual Resource Block concept is used. It effectively is part of the
distribution/allocation method
RBOC - Regional Bell
Operating Companies
The term RBOC (Regional Bell Operating Company) describes
one of the U.S.regional telephone companies which were created as a result of
the break-up of ATT/Bell Systems.
RBSN - Reduced Block
Sequence Number
In GPRS each downlink RLC/MAC (Radio Link Control /
Medium Access Control) control block contains a Reduced Block Sequence Number
bit. At the time that an in sequence RLC / MAC control block is designated
for transmission, the value of RBSN is set equal to the value of the control
send state variable.
RC - Radio Configuration
The term Radio Configuration identifies a set of forward
and reverse traffic channel transmission formats. At the physical layer these
are characterized by the transmission rates, modulation characteristics,
spreading rate, etc.
RC4
RC4 is a proprietary cipher algorithm which was developed
and licensed by RSA Security Inc. The algorithm is used in many technologies
including the IEEE 802.11 b WEP (Wired Equivalent Privacy).
RC5
RC5 is a symmetric block cipher designed by RSA Security
Inc in 1994. RC5 uses a block size of between 32bits and 128bits and a key
length of between 0bits and 2040bits.
RC6
RC6 is a symmetric block cipher based on RC5 and was
selected as one of the candidates for the AES (Advanced Encryption Standard).
It was designed by Rivest, Robshaw, Sidney, and Yin of RSA Security Inc. The
block size, the key size, and the number of rounds are variable; the upper
limit on the key size is 2040bits.
RCAF - RAN Congestion
Awareness Function
The RCAF is a network element which monitors congestion
in the E-UTRAN and UTRAN. The RCAF will collect information related to user
plane congestion for an eNB or E-UTRAN cell, and will then liaise with the
MME (Mobility Management Entity) to determine which users served by the
eNB/cell are being affected. In turn, the RCAF can provide this information
to the PCRF (Policy and Charging Rules Function), triggering a policy
decision to alleviate the congestion.
RCF - Radio Control
Function
An IN (Intelligent Network) functional entity providing
access to users/terminals. It provides the network call related call
unrelated and radio link functions.
RCS - Rich Communication
Services
A GSMA initiative which aims to standardize the next
generation of IP based services in order to support worldwide cross network
interoperability. Services are largely IMS based and include voice and video
calling, enhanced messaging services, social presence, file/media transfer
and geolocation, amongst others.
RD - Route Distinguisher
A BGP speaker can only advertise one route per IP prefix
and can therefore completely omit a route to a VPN if its addressing overlaps
a different VPN, creating a one or the other scenario. The solution to this
problem is to add an 8-byte RD (Route Distinguisher) to the IPv4 address,
creating a unique 12byte VPN-IPv4 address.
Ready State
This is a GPRS state that indicates the mobile has
received or is waiting for resources from the network. In this state the
mobile is carrying out cell selection and cell reselection calculations to
determine the best cell. The mobile will carry out cell and routing area
updates when necessary.
Reassociation
The term Reassociation is found within an IEEE 802.11
network and identifies the service used when a Station moves from one AP
(Access Point) to another. In such cases, the Association is transferred
between the two AP with the Station Reassociating with the second.
Received Signal Code
Power
Given only signal power is received, the average power of
the received signal after despreading and combining.
Received Total Wide Band
Power
The received wide band power, including noise generated
in the receiver, within the bandwidth defined by the pulse shaping filter. In
case of receiver diversity the reported value shall be a linear average of
the power in the diversity branches. The reference point for the received
total wide band power measurement shall be the output of the pulse shaping
filter in the receiver.
Receiver Antenna Gain
The maximum gain of the receiver antenna in the
horizontal plane, specified as dBi (dB relative to an isotropic radiator).
Receiver Noise Figure
Receiver noise figure in dB (decibel) is the noise figure
of the receiving system referenced to the receiver input.
Receiver Sensitivity -
Receiver Sensitivity (dBm)
The Receiver Sensitivity is the signal level needed at
the receiver input that just satisfies the required Eb/(No+Io).
Recipient network
Term linked to number portability. The network which
receives the number in the porting process. This network becomes the
subscription network when the porting process is complete.
Redundancy
In data communications redundancy is the excess of
transmitted information over that required to convey the essential
information in a noise free circuit. Redundancy is introduced intentionally
in some systems, as in the case of error detection or correction codes.
Surplus capability is usually provided to improve the reliability and quality
of service.
Redundancy check
A check that uses one or more extra bits, digits or
characters attached to the data which allows for the detection of errors.
Refarming
A term given to the practice of redistributing licensed
spectrum for alternative uses or users.
Reference point
A conceptual point at the conjunction of two non
overlapping functional entities or groups.
Reflection
The sudden change in direction of a wave front at an
interface between two dissimilar media so that the wave front returns into
the medium from which it originated. Depending on the nature of the interface
reflection may be mirror like or may diffused.
Refractive index
The Refractive index of a medium is the ratio of the
velocity of propagation of an electromagnetic wave in a vacuum to its
velocity in the medium.
REG - Resource Element
Group
As part of the E-UTRA radio frame structure a REG
(Resource Element Group) consists of 4 RE (Resource Elements). The system
then groups 9 REGs to form a CCE (Control Channel Element), which in turn is
used to define the PDCCH.
Regeneration
Term usually applied to digital or fibre optical
repeaters whereby digital signals are amplified, reshaped, retimed, and
retransmitted.
Registration
A procedure by which the MS (Mobile Station) identifies
its location and sends parameters to the network.
Registration Area
A Registration Area is an area in which the mobile may
roam without a need to perform location registration.
Registration Zone
A Registration Zone is a collection of one or more BS
(Base Station) which enables the MS (Mobile Station) to decide whether it
should perform a zone based registration.
Relay
A device capable of relaying communications.
Release
A process used to identify the release of a channel or
call.
Releases - Releases (GSM)
A particular version of the standards documents produced
by the 3GPP (Third Generation Partnership Project).
Reliability
The reliability parameter indicates the transmission
characteristics that are required by an application. The reliability class
defines the probability of loss, duplication, mis sequencing or corruption of
SDU (Service Data Unit).
Remaining Set
This term identifies the set of all allowable pilot
offsets. This excludes the pilot offsets in the Active Set , Candidate Set ,
and Neighbor Set pilots.
Remote access
In essence it refers to workers being able to access
their organization’s network, from any or from a designated location. A dial
up connection through desktop, notebook, or handheld computer over regular
telephone lines or ISDN (Integrated Services Digital Network) is a common
method of remote access. The latest technologies use wireless, cable modem,
and DSL (Digital Subscriber Line) for remote access.
Repeater
A repeater is a radio transceiver used to extend the
transmission of a radio signal beyond its normal range. Repeaters typically
are used for buildings, tunnels or difficult terrain.
Replay Attack
Indicates an attempt by a unauthorized third party to
record an over the air message; this may be used later in a process to fool
the receiver.
Requested QoS
GPRS QoS (Quality of Service) profile that is requested
at the beginning of a GPRS QoS session. QoS modification requests are also
possible during the lifetime of a QoS session.
Required Eb/No+Io -
Required Eb/(No+Io) (dB)
The ratio between the received energy per information bit
to the total effective noise and interference power density needed to satisfy
the quality objectives.
Reseller
An independent company that buys airtime in bulk at
wholesale rates from carriers. This airtime is then resold to individuals or
companies. The difference between the wholesale and retail rate is their
margin allowing for operating expenses, such as billing, customer service,
etc.
Reservation Access Mode
A mode used on the Enhanced Access Channel and Reverse
Common Control Channel where a MS (Mobile Station) transmits a preamble and a
header on the Enhanced Access Channel before moving to the Reverse Common
Control Channel.
Residual error rate
Residual error rate describes the service accuracy. The
frequency of lost, corrupted or duplicated SDU (Service Data Unit).
REST - REpresentational
State Transfer
The REST architectural style is essentially a set of
common principles against which APIs (Application Programming Interfaces) can
be developed for a variety of different scenarios, including the 5G Core.
Reverse CDMA Channel
Identifies the CDMA (Code Division Multiple Access)
channel sent from the MS (Mobile Station) to the BS (Base Station). The BS
(Base Station) will receive a combination of multiple reverse CDMA channels
from different mobiles.
Reverse Common Control
Channel
A logical channel that carries higher layer traffic from
multiple users to the BS (Base Station). This channel can operate in a
Reservation Access Mode or Designated Access Mode.
Reverse Dedicated Control
Channel
A logical channel that carries higher layer information
from the user to the BS (Base Station) on the reverse CDMA channel.
Reverse Fundamental
Channel
Identifies a portion of a Traffic Channel which is able
to carry a combination of primary and secondary data, signalling, and power
control information. The Reverse Fundamental Channel is transmitted on the
Reverse CDMA Channel.
Reverse Pilot Channel
The Reverse Pilot Channel is transmitted either
continuously or in gated mode; this enables a BS (Base Station) to acquire
the necessary timing of the Reverse CDMA Channel and also provides a phase
reference for the demodulation process. The Reverse Pilot Channel is utilized
when the Reverse Common Control Channel, Enhanced Access Channel, or Reverse
Traffic Channel is enabled.
Reverse Power Control
Subchannel
This is a subchannel on the Reverse Pilot Channel which
is used by the MS (Mobile Station) to control the forward power when
operating on the Forward Traffic Channel with RC (Radio Configuration) 3 to
9.
Reverse Supplemental
Channel
An optional portion of a Reverse Traffic Channel which
operates with the Fundamental Channel to provide higher data rate services.
This channel is transmitted on the Reverse CDMA Channel.
Reverse Supplemental Code
Channel
An optional portion of a Reverse Traffic Channel which
operates with the Fundamental Channel to provide higher data rate services.
The Supplemental Channel that is transmitted on the Reverse CDMA Channel.
This channel allows a combination of primary data, secondary data, or both to
be transmitted. It does not however support signalling.
Reverse Traffic Channel
The Traffic Channel on which data and signalling are
transmitted from the MS (Mobile Station) to the BS (Base Station). The
Reverse Traffic Channel consists of: 0 or 1 Reverse Fundamental Channel, 0 to
7 Reverse Supplemental Code Channels, 0 to 2 Reverse Supplemental Channels, 0
or 1 Reverse Dedicated Control Channel.
RF - Radio Frequency
Any frequency within the electromagnetic spectrum
normally associated with radio wave propagation.
RF - Rating Function
A logical element of the 3GPP online billing system,
responsible for determining the rate at which credit should be decremented.
RFA - Radio Fixed Access
Technology that enables operators to provide customers
with direct connection to the public telecommunications network via a fixed
radio link from the home or premises to the local exchange, instead of
providing a ‘wired’ connection using copper cables or optical fibre.
RFC - Request For
Comments
A Request for Comments is a formal document from the IETF
(Internet Engineering Task Force) which provides the standard for a
particular protocol or technology. It is the result of committee drafting and
subsequent review by interested parties. RFC may be informational in nature.
Some RFC may be intended to become Internet standards, then the final version
of the RFC becomes the standard and no further comments are permitted.
Changes can still occur through subsequent RFC that supersede or build on all
or parts of previous RFC.
RFC 2544
RFC 2544 is a testing methodology widely used to assess
the performance of an Ethernet based network. It was designed to evaluate the
performance characteristics of network devices primarily in a lab environment
and has been widely adapted to provide performance metrics of Ethernet based
network services. RFC 2544 defines a number of out of service tests that can
used to describe the performance characteristics of a network interconnecting
device. In addition, the standard describes the specific formats for
reporting the results of the tests. Tests include Burst, Throughput, Latency
and Frame Loss.
RFCOMM - Radio Frequency
Communications Protocol
The Bluetooth system uses the Radio Frequency
Communications Protocol to emulate serial ports over the L2CAP (Logical Link
Controller and Adaptation Protocol). The protocol is based on the ETSI
standard TS 07.10, however only a subset of this standard is used within
Bluetooth. The RFCOMM protocol is capable of supporting up to 60 simultaneous
connections between two Bluetooth devices. The number of connections that can
be used simultaneously in a Bluetooth device is implementation-specific.
RFCOMM Client
In Bluetooth , the RFCOMM (Radio Frequency Communications
Protocol) client is the application requesting a connection to another
application, which in turn is called the RFCOMM server.
RFCOMM initiator
In Bluetooth , the RFCOMM (Radio Frequency Communications
Protocol) initiator is the device initiating the RFCOMM session.
RFCOMM Server
In Bluetooth , an RFCOMM (Radio Frequency Communications
Protocol) server is the application awaiting a connection from an RFCOMM
client.
RFE - Routing Functional
Entity
A UMTS functional entity within RRC (Radio Resource
Control) that deals with the routing of higher layer messages to different MM
(Mobility Management) and CM (Connection Management) entities on the mobile.
Within the UTRAN (UMTS Terrestrial Radio Access Network) the RFE deals with
routing to different core network domains.
RFID - Radio Frequency
Identification
RFID (Radio Frequency Identification) is quickly gaining
global popularity in a wide range of different scenarios, from stock tracking
to access control. RFID essentially works by implanting a small passive or
active RF (Radio Frequency) transponder within a device which is commonly
termed an RFID Tag. The tag, if passive, will respond when a RFID scanner is
passed over it. Alternatively, an active tag constantly transmits
identification information up to a distance of several meters.
RFP - Radio Fixed Part
A DECT base station is called a RFP (Radio Fixed Part).
RI - Rank Indication
This is a E-UTRA parameter related to MIMO feedback for
some of the E-UTRA transmission modes. It represents the transmission rank,
i.e. the number of layers that can be supported under the current channel
conditions.
Rijndael
Rijndeal is a symmetric block cipher with a variable
block size of 128bit, 192bit, or 256bit and a variable key length of 128bit,
192bit, or 256bit. Rijndael is the algorithm used in AES (Advanced Encryption
Standard).
RIM - RAN Information
Management
This function is a generic mechanism that allows the
request and transfer of information between two RAN nodes via the core
network, e.g. SON information.
RIP - Routing Information
Protocol
Routing Information Protocol is used to manage router
information within a self contained network such as a corporate LAN (Local
Area Network) or an interconnected group of such LAN. RIP is classified by
the IETF (Internet Engineering Task Force) as one of several internal gateway
protocols called IGP (Interior Gateway Protocols).
RIR - Regional Internet
Registry
Although ICANN have overall responsibility for the global
IPv4 and IPv6 address space, part of that responsibility is handed to each of
the five RIR that operate around the globe. In basic terms, the RIRs are
given chunks of IP address space which they are expected to manage. Those RIR
include RIPE NCC, AFRINIC, APNIC, LACNIC and ARIN, each of which operate
within their own region of the world. In turn, these RIR will further
disseminate their IP address space allocations to national internet
registries and ISPs.
RISC - Reduced
Instruction Set Computer
RISC (Reduced Instruction Set Computer) is a
microprocessor that is designed to perform a smaller number of computer
instructions so that it can operate at a higher speed. Since each instruction
type that a computer must perform requires additional transistors and
circuitry, a larger set of computer instructions makes the microprocessor
more complicated and slower in operation.
RIV - Resource Indication
Value
This is a E-UTRA scheduling parameter that typically
corresponds to a starting resource block and a length in terms of
contiguously allocated resource blocks.
RLL - Radio in Local Loop
The technical approach of providing customer connection
to the public network via a fixed radio link from the home or premises to the
local exchange. This is implemented instead of providing a wired connection
using copper cables or optical fibre.
RLP - Radio Link Protocol
Radio Link Protocol terminates at the MS (Mobile Station)
and the IWF (Interworking Function) generally located at the MSC (Mobile
Switching Centre). It utilizes the reliability mechanisms of the underlying
protocols in order to deliver data.
RLS - Resource List
Server
RFC 4622 defines the use of Resource Lists and RLS as a
means of reducing the significant signalling overhead associated with
providing SIP (Session Initiation Protocol) based Presence services. As such,
the RLS acts as a termination point for SUBSCRIBE messages from SIP clients,
interacting with resource lists to carry out presence services on behalf of
the user in order to reduce traffic.
RNA - RAN Based
Notification Area
The 5G RAN includes a sub-state called “RRC Inactive”. In
this state, air interface resources are released but the device’s context
remains on the last serving gNB. If the last serving gNB receives downlink
data from the UPF, or signalling from the AMF, it pages in the cells
corresponding to the RNA (RAN Based Notification Area). This can include
sending Paging to neighbour gNB(s), which belong to the RNA, across the Xn
interface. Whilst in the RRC Inactive state, the device will perform a RNA
update procedure if it moves to a cell which is not part of the current RNA
assigned.
RNC - Radio Network
Controller
The RNC is a functional element of the UMTS RNS (Radio
Network System) which controls a number of Node Bs. Responsibilities of the
RNC include radio resource management and control, air interface security,
mobility procedures and system synchronization. Three types of RNC exist,
SRNC (Serving RNC), DRNC (Drift RNC) and CRNC (Controlling RNC).
RNS - Radio Network
Subsystem
The UTRAN (UMTS Terrestrial Radio Access Network)
consists of one or more RNS (Radio Network Subsystem). Each RNS control the
allocation and the release of specific radio resources to establish a
connection between a UE (User Equipment) and the UTRAN. A RNS is responsible
for the resources and transmission/reception in a group of cells.
RNSAP - Radio Network
Subsystem Application Part
RNSAP supports communication over the Iur interface in
order to support inter RNC (Radio Network Controller) procedures such as soft
handovers. RNSAP utilizes the services of SCCP (Signalling Connection Control
Part) and either ATM or IP.
RNTI - Radio Network
Temporary Identifier
A Radio Network Temporary Identifier is used to identify
a UE when an RRC connection exists. The following types of RNTI are defined:
C-RNTI (Cell RNTI), S-RNTI (Serving RNC RNTI) and U-RNTI (UTRAN RNTI).
RNTP - Relative
Narrowband Tx Power
This E-UTRA parameter provides an indication on downlink
power restriction per PRB in a cell and other information needed by a
neighbour eNB for interference aware scheduling.
ROADS - Running Out of
ADdressSpace
Term used to describe the situation being faced by the
Internet community due to the exhaustion of IPv4 Addresses. As a result, the
IETF (Internet Engineering Task Force) introduced a technique known as
Classless Addressing or CIDR (Classless Inter-Domain Routing) which enabled
IP addresses to be used more efficiently. The longer term solution to the
problem is IPv6.
Roamer
A MS (Mobile Station) receiving services in a network
other than the one from which the MS has subscribed.
Roaming
The ability for a user to function when the serving
network is different from their home network.
ROHC - Robust Header
Compression
A mechanism which reduces the number of bits which are
required to be sent across the air interface. The compression technique takes
into account header fields that don’t change on a packet by packet basis, or
change in a highly predictable manner. Each of these attributes can be
exploited as part of the compression process to significantly reduce header
field transmission overheads.
ROI - Return On
Investment
ROI is a figure which indicates the ratio of money which
is gained or lost relative to the amount of money initially invested. ROI is
not a telecommunications centric term and can be applied to a range of
scenarios.
ROM - Read Only Memory
Read Only Memory is built in computer memory containing
data that normally can only be read but not written to. ROM contains the
programming that allows the computer to be booted up. ROM is not lost when
the computer power is turned off. The ROM is sustained by a small long-life
battery in the computer.
ROSE - Remote Operation
Service Element
A protocol that provides remote operation capabilities
that enables an application to invoke an operation to be performed by a
remote peer application and to receive a report of the results. The ROSE
protocol itself is only a vehicle for conveying the arguments and results of
the operation as defined by the application.
Router
A router is a device that determines the next network
point to which a packet should be forwarded towards its destination. The
router is connected to at least two networks and decides which way to send
each information packet based on its current understanding of the state of
the networks it is connected to.
RP - Relay Protocol
A protocol used in the relaying of SMS messages between
the mobile and the Short Message Service Centre.
RPE-LTP - Regular Pulse
Excited Long Term Prediction
The Regular Pulse Excited Long Term Prediction is used by
GSM for full rate speech coding.
RQI - Reflective QoS
Indicator
In 5G, the RQI is contained within the encapsulation
header of the downlink user plane in order to notify the device that
Reflective QoS is required for that specific SDF (Service Data Flow).
RR - Radio Resource
RR is the protocol used for radio resource management
across the Um interface for circuit switched and GPRS services. RR supports
procedures associated with processes such as SI (System Information)
broadcasting, radio connection establishment, radio channel management and
measurement reporting.
RRBP - Relative Reserved
Block Period
In GPRS the Relative Reserved Block Period value
specifies a single uplink block in which the mobile station shall transmit
either a Packet Control Acknowledgement message or a PACCH (Packet Associated
Control Channel) block to the network.
RRC - Radio Resource
Control
A sublayer of Layer 3 on the UMTS radio interface; it
exists in the control plane only and provides information transfer service to
the NAS (Non Access Stratum). RRC is responsible for controlling the
configuration of UMTS radio interface Layers 1 and 2.
RRC - Radio Resource
Control (UMTS)
RRC is a sublayer of Layer 3 on the UMTS radio interface;
it exists in the control plane only and provides an information transfer
service to NAS (Non Access Stratum) signalling. RRC is also responsible for
controlling the configuration of the UMTS radio interface, facilitating the
establishment and management of radio bearers, mobility management and
security.
RRC Connection
A point to point bi directional connection between the
RRC (Radio Resource Control) entities on the UE (User Equipment) and UTRAN
(UMTS Terrestrial Radio Access Network). The UE requires an RRC connection to
access the services of the UMTS network.
RS - Reference Signals
In the LTE E-UTRA there are various types of reference
signals used in the uplink and downlink directions. In the uplink there are
two types namely the Demodulation reference signal and the Sounding reference
signal. In the downlink, there are three main types: Cell Specific
(non-MBSFN), MBFSN (Multimedia Broadcast Multicast Service Single Frequency
Network) and UE Specific.
RSA - Rivest, Shamir,
Adleman
RSA describes a public key encryption algorithm and
certification process to protect user data over networks. The system was
designed by Ron Rivest, Adi Shamir, and Leonard Adleman who formed RSA
Security Inc. The patent for the RSA process expired in September 2000 and
now is available for general use.
RSA - Rural Service Area
Designation of a non metropolitan area covered by a
cellular licensee.
RSeq - Response Sequence
RSeq is a SIP (Session Initiation Protocol) header field
which is used in support of the PRACK method.
RSL - Radio Signalling
Link
RSL is used for supporting traffic management procedures,
as well as communication between the mobile and the network. There is one RSL
per TRX (Transceiver).
RSL - Received Signal
Level
The signal level at a receiver input. The RSL is usually
expressed in dB (Decibel) with respect to 1 mW, i.e., 0 dBm.
RSN - Robust Security
Network
The term Robust Security Network is used in WiFi networks
to describe the security enhancements encompassed in the IEEE 802.11i and WPA
(WiFi Protected Access) 1 and 2 variants. The suite of protocols endeavours
to compensate for the weaknesses associated with WEP(Wired Equivalent
Privacy).
RSQI - Received Signal
Quality Indicator
This is a Traffic Channel measurement of signal quality.
RSRP - Reference Signal
Received Power
The LTE E-UTRA requires various measurements to be made.
The RSRQ (Reference Signal Received Quality) and is defined as NxRSCP /
(E-UTRA carrier RSSI ), where N is the number of RB s defined by the E-UTRA
carrier RSSI measurement bandwidth.
RSRQ - Reference Signal
Received Quality
This is a E-UTRA UE measurement defined as the ratio SRP
/ (E-UTRA carrier RSSI), where N is the number of RBs of the E-UTRA carrier
RSSI measurement bandwidth. It is used as part of the RRC measurement process
when evaluating cells.
RSSI - Received Signal
Strength Indication
The measured power of a received signal.
RSU - Road Side Unit
In relation to V2X, an RSU is a stationary infrastructure
entity that supports V2X applications that can exchange messages with other
entities supporting V2X applications.
RSVP - Resource
Reservation Protocol
Resource Reservation Protocol is a set of communication
rules that allows connections or resources on the Internet to be reserved.
RSVP is part of the Internet IntServ (Integrated Service) model, which
ensures best effort service, real time service, and controlled link sharing.
Although Intserv has not seen widespread use, an extension to RSVP which
supports Traffic Engineering, termed RSVP-TE, is used widely in MPLS
networks.
RTCP - RTP Control
Protocol
RTCP is a protocol designed to provide feedback on the
quality of data distribution during RTP payload transfer activity. It is an
integral part of RTP’s role by transferring statistics and information on
packet counts, jitter and round trip times.
RTD - Real Time
Difference
This means the relative synchronization difference in the
network between two base stations.
RTI R - audio Transaction
Identifier
In GPRS the Radio Transaction Identifier is used to group
the downlink RLC / MAC (Radio Link Control / Medium Access Control) control
blocks that make up an RLC/MAC control message and identifies the segmented
control message sequence with which the downlink RLC/MAC control block is
associated. The RTI field is five bits in length with range 0 to 31.
RTP - Real time Transport
Protocol
RTP is a protocol designed to transfer real time media
payloads, including voice and video. The protocol is used extensively in both
3GPP and non-3GPP networks, with a prime example being the transport of voice
packets between MGWs (Media Gateways). RTP is also used to support end to end
voice transfer in the VoLTE (Voice over LTE) architecture. The protocol
itself provides services such as payload identification, sequential delivery
and jitter correction via a timestamp. In addition, RTP uses a companion
protocol termed RTCP (Real time Transport Control Protocol) in order to
provide feedback for ongoing sessions e.g. no. of dropped packets, jitter,
etc.
RTS - Request To Send
This is a signalling message transmitted by an IEEE
802.11 Station in order to indicate that it has data to transmit and to
prevent other wireless Stations seizing the radio link. This message forms
part of the 802.11 CSMA/CA (Carrier Sensing Multiple Access / Collision
Avoidance) process.
RTSP - Real Time
Streaming Protocol
The RTSP (Real Time Streaming Protocol) is a
client-server application-level protocol for controlling the delivery of data
with real-time properties. It establishes and controls either a single or
several time-synchronized streams of continuous media, such as audio and
video. It uses transport protocols such as UDP , multicast UDP, TCP , and RTP
to deliver the continuous streams. In other words, RTSP acts as a network
remote control for multimedia servers. Sources of data can include both live
data feeds and stored clips.
RX - Receiver
The terminator of any signal on a transmission medium.
RXQUAL - Received Signal
Quality
In a radio system RXQUAL indicates the average signal
quality received.
S
interface
For basic rate access in
an ISDN (Integrated Services Digital Network) environment, a user to network
interface reference point that is characterized by a 4 wire, 144Kbps (2B+d)
user rate.
S-Band
The frequency spectrum near 2GHz used for land based
microwave and some mobile satellite communications.
S-CCPCH - Secondary
Common Control Physical Channel
The Secondary Common Control Physical Channel is used to
carry the FACH (Forward Access Channel) and PCH (Paging Channel) in the UMTS
system.
S-CSCF - Serving
– Call Session Control Function
The S-CSCF is the primary node in the IMS responsible for
session control. Subscribers will be allocated a S-CSCF for the duration of
their IMS registration in order to facilitate routing of SIP messages as part
of service establishment procedures. Consequently, the S-CSCF will download a
subscriber profile from the HSS (Home Subscriber Server) at the time of
registration, which allows the S-CSCF to ascertain which Application Server
any service requests should be sent to. The S-CSCF will also be involved in
breakout to the PSTN, if this is supported.
S-GW - Serving
Gateway
The S-GW is the user data plane ingress and egress point
of the E-UTRAN side of the EPC. As such, when the subscriber moves around the
E-UTRAN, their point of attachment to the EPC remains fixed at the S-GW
(unless the network decides that a S-GW relocation is required). Additional
responsibilities include lawful interception of subscriber traffic, as well
as downlink data buffering whilst the subscriber is paged.
S-NSSAI - Single
– Network Slice Selection Assistance Information
Used in support of Network Slicing, the S-NSSAI is used
to uniquely identify a Network Slice. The S-NSSAI contains two components:
the SST (Slice/Service Type) and an optional SD (Slice Differentiator).
S-RNTI - Serving
RNC Radio Network Temporary Identifier
In UMTS the S-RNTI is the UE (User Equipment) identifier
which is allocated by the Serving RNC (Radio Network Controller) and is
unique within that SRNC. It is allocated to all UE having a RRC (Radio
Resource Control) connection. S-RNTI is reallocated when the Serving RNC for
the RRC connection is changed and de-allocated when the RRC connection is
released.
S-SCH - Secondary
Synchronised Channel
UMTS uses the P-SCH (Primary Synchronization Channel) and
S-SCH (Secondary Synchronization Channel) to inform the mobiles of the
current cells timing and scrambling code.
S-TMSI - Serving
Temporary Mobile Subscriber Identity
The S-TMSI is similar in format to the P-TMSI. It is used
to protect the subscribers IMSI during NAS interaction as well as identifying
the MME (Mobility Management Entity) or MME pool that is responsible for the
UE. The S-TMSI is constructed from the MMEC (MME Code) and the M-TMSI.
S/MIME - Secure
Multipurpose Internet Mail Extensions
S/MIME (Secure / Multipurpose Internet Mail Extensions)
is a standard specification for secure e-mail within a PKI (Public Key
Infrastructure), helping to enable secure communication between two or more
parties.
S/P - Supplementary/Polling
Used in some Layer 2 protocols to indicated when a
response is required.
S1AP - S1
Application Protocol
S1AP is used between the eNB and the MME in order to
support operations such as E-RAB (E-UTRAN Radio Access Bearer) Management,
transfer of UE Context information, NAS Signalling transport, Paging and EPC
based mobility.
SA - Security
Association
A SA (Security Association) is the title given to the
secure relationship between two network entities, often as part of the IPSec
security architecture. Data passing over the SA can be protected with respect
to authentication, integrity and confidentiality.
SA - Service
Area
A Service Area consists of one or more cells within a
given LA (Location Area) and may be used to assist in the delivery of
location based services.
SA
NR - Standalone New Radio
A 3GPP 5G deployment configuration where the 5G gNB (Next
Generation Node B) connects to the NGC (Next Generation Core).
SAAL - ATM
Adaptation Layer for Signalling
In ATM (Asynchronous Transfer Mode), the SAAL (ATM
Adaptation Layer for Signalling) provides reliable transport of signalling
messages between peer entities. These signalling messages are carried over a
PVC (Permanent Virtual Circuit).
SABM - Set
Asynchronous Balanced Mode
For systems that work in the ABM (Asynchronous Balanced
Mode). This mode is totally balanced, meaning there is no master/slave
relationship. Each station may initialize, supervise, recover from errors,
and send frames at any time. The DTE (Data Terminal Equipment) and DCE (Data
Circuit Terminating Equipment) are treated as equals. The initiator for
Asynchronous Balanced Mode sends a SABM.
SAC - Service
Area Code
The Service Area Code is a fixed length code of 2 octets
used to identify a SA (Service Area) within a LA (Location Area).
SACCH - Slow
Associated Control Channel
A GSM signalling channel that provides a relatively slow
signalling connection. The SACCH is associated with either a traffic or
dedicated channel. The SACCH can also be used to transfer SMS (Short Message
Service) messages if associated with a traffic channel.
SACK - Selective
Acknowledgement
It is an extension to a protocol which allows the
acknowledge reception of specific packets or messages.
SAE - System
Architecture Evolution
SAE is a study group whose objective was to develop a
framework for an evolution or migration of the 3GPP system to a
higher-data-rate, lower-latency, packet-optimized system that supports
multiple RATs. It should be noted that this study is also termed EPS (Evolved
Packet System) and the terms are inter-changeable.
SAI - Service
Area Identifier
The Service Area Identifier is used to identify an area
consisting of one or more cells belonging to the same LA (Location Area).
Such an area is called a Service Area and can be used for indicating the
location of a UE (User Equipment) to the CN (Core Network). The SAC (Service
Area Code) together with the PLMN -Id (Public Land Mobile Network Identifier)
and the LAC (Location Area Code) will constitute the Service Area Identifier.
SAI = PLMN-Id + LAC + SAC.
SAM - ubsequent
Address Message
A SS7 (Signalling System No.7) signalling message which
carries further dial numbers after the initial address message has been sent.
Sampling rate
The sampling rate indicates the number of samples taken
per given unit of time. It identifies the rate at which signals are sampled
for subsequent modulation, coding, or quantization.
SAP - Service
Access Point
A conceptual point where a protocol layer offers access
to its services to the layer above or below.
SAP - Session
Announcement Protocol
SAP is a protocol used for broadcasting multicast session
information. It is standardized by the IETF (Internet Engineering Task Force)
in RFC 2974.
SAPI - Service
Access Point Identifier
An identifier given to a SAP (Service Access Point). The
SAPI may identify the type of service, signalling, Data transfer, Management
etc. required by the higher layer.
SAPSD - Scheduled
Automatic Power Save Delivery
The term S-APSD is used in wireless networks supporting
the IEEE 802.11e Quality of Service enhancement. It was introduced in order
to support power management in QBSS. In essence, it involves a QAP delivering
downlink frames which belong to a specified access class to power saving
Stations automatically. The Scheduled variant defines fixed intervals of time
specified to the Station within a TSPEC.
SAR - Segmentation
And Reassembly
A process by which a PDU (Protocol Data Unit) is split or
segmented in order for it to be transported over a given medium. The segments
will then be reassembled to form the original PDU.
SAT - SIM
Application Toolkit
The SIM (Subscriber Identity Module) Application Toolkit
function resides on GSM. It essentially enables the SIM card to drive the GSM
handset, allowing an interactive exchange between a network application and
the end user.
Satellite
A communication device designed to orbit about the earth
and relay information to ground stations or mobiles.
Satellite communications
A telecommunications service provided via one or more
satellites.
Satellite phone
A wireless phone that utilizes satellites to relay the
voice and data signals.
SB - Synchronisation
Burst
Information used by the receiver to get synchronized to
an incoming signal.
SBA - Service
Based Architecture
SBA is the name given to the 5G Core network, in which
the control plane elements operate as VNFs (Virtualized Network Functions).
Communication between VNFs is based on RESTful based API exchange, allowing a
given VNF to offer “services” to other VNFs.
SBC - Session
Border Controller
A SBC is a SIP based Application Level Gateway, deployed
in next generation networks to provide services and features such as NAT
Traversal, Security, Lawful Intercept, QoS Enforcement, Encryption and
Interoperability.
SBCF - Session
Based Charging Function
In the 3GPP specifications, the SBCF is a key function of
the OCF (Online Charging Function). As such, its role is to carry out session
based charging and credit control. This role is carried out at the bearer,
subsystem and service level, with the SBCF denying a subscriber their request
if credit is not available.
SBI - Service
Based Interface
SBI is the term given to the API based communication that
can take place between two VNFs (Virtualized Network Functions) within the 5G
SBA (Service Based Architecture). A given VNF can utilise an API call over
the SBI in order to invoke a particular service or service operation.
SBLP - Service
Based Local Policy
SBLP is a QoS control mechanism which is typically
employed in cellular networks.
SC-FDMA - Single
Carrier
LTE uplink requirements differ from downlink requirements
in several ways. Not surprisingly, power consumption is a key consideration
for UE terminals. The high PAPR and related loss of efficiency associated
with OFDM signalling are major concerns. As a result, an alternative to OFDM
was sought for use in the LTE uplink. SC-FDMA is well suited to the LTE
uplink requirements. The basic transmitter and receiver architecture is very
similar (nearly identical) to OFDMA, and it offers the same degree of multipath
protection. Importantly, because the underlying waveform is essentially
single-carrier, the PAPR is lower.
Scattering
Scattering is where the direction, frequency, or
polarization of the wave is changed when the wave encounters discontinuities
in the medium, or interacts with the material at the atomic or molecular
level.
Scattering loss
The part of the transmission power which is lost that
results from scattering within a transmission medium or from roughness of a
reflecting surface.
Scatternet
In Bluetooth , a Scatternet is two or more Piconets that
are co-located in the same area. A Scatternet can exist with or without
inter-piconet communication.
SCC - Service
Centralization and Continuity
Service Centralization and Continuity is the term given
to the network feature which sees all calls, whether originating/terminating
on CS or PS access, to be managed centrally by the IMS. Moreover, the
continuity aspect ensures that ongoing sessions such as voice calls can be
seamlessly switched between different access technologies as the user moves
around.
SCC
AS - Service Centralization and Continuity Application Server
The SCC AS acts as a B2BUA within the IMS architecture.
It’s role is to facilitate service centralization, as well as coordination of
SR-VCC handover procedures.
SCCP - Signalling
Connection and Control Part
Although MTP3 (Message Transfer Part 3) provides routing
capabilities in the guise of Point Codes, there is an inherent limitation
when two SS7 networks need to exchange SS7 messages since point codes can
overlap. SCCP overcomes this problem by adding a higher level of addressing
in the form of unique Global Titles. Consequently, using SCCP in the protocol
stack permits the routing of higher layer SS7 messages on a global basis. In
addition, SCCP can operate in a connection orientated or connectionless state,
with reliable delivery of messages if required.
SCE - Service
Creation Environment
In an IN (Intelligent Network) this is a set of functions
to support service creation processing by altering service logic and service
data on behalf of the controlling node.
SCEF - Service
Capabilities Exposure Function
The SCEF was introduced in Release 13 of the 3GPP
specifications and was designed to provide a means to securely expose the
services and capabilities provided by the 3GPP network interfaces. This SCEF
is specifically deployed in support of IoT, whereby devices can use NIDD (Non
IP Data Delivery) in order to exchange data with the MME, which in turn
passes that data to the SCEF for onward delivery to IoT application servers.
SCEF - Service
Creation Environment Function
In an IN (Intelligent Network) this is a set of functions
that support the service creation process the output of which includes both
service logic programs and service data.
SCF - Service
Control Function
In an IN (Intelligent Network) this is the application of
service logic to control functional entities in providing Intelligent Network
services.
SCFE - Shared
Control Functional Entity
In UMTS the SCFE (Shared Control Function Entity) is
located in the CRNC (Controlling Radio Network Controller), which controls
the allocation of the PDSCH (Physical Downlink Shared Channel) and PUSCH
(Physical Uplink Shared Channel) using lower layer services.
SCG - Secondary
Cell Group
With respect to Dual Connectivity, SCG is the term given
to the group of serving cells associated with the Secondary RAN node.
SCH Channel
SCH - Synchronisation Channel
The Synchronization Channel is a downlink signal channel
used for cell search and conveying of synchronization information.
SCID - Source
Channel Identifier
In a Bluetooth system, the Source Channel Identifier is
used in the L2CAP (Link Controller and Adaptation Protocol) layer and
represents a channel endpoint on the device sending the request.
SCIM - Service
Capability interaction Manager
In the 3GPP based IMS , a particular service offering may
actually be comprised of a number of AS (Application Server) working
together. In order to manage which AS should be invoked at the correct time
as part of a particular service, a SCIM may be employed. This function will
essentially take processing load away from the SCSF (Serving Call Session
Control Function).
SCM - Station
Class Mark
A parameter that identifies certain characteristics of a
MS (Mobile Station). An example being its frequency capabilities.
SCO - Synchronous
Connection Oriented link
The Synchronous Connection Oriented link is one of the
two possible Bluetooth data link types defined. The SCO link is a symmetric,
point-to-point link between the master device and a specific slave device.
The SCO link reserves slots between the master and the slave and can
therefore be considered to provide a circuit switched connection. The SCO
link is usually used to support time critical information, e.g. voice, since
time critical SCO packets are never retransmitted. The master device can
support up to three SCO links, this might be to the same slave or to
different slaves. A slave can support up to a maximum of three SCO links,
assuming they are from the same master. If the slave has links from different
masters, a maximum of two SCO links are available.
SCP - Service
Control Point
A physical entity in the IN (Intelligent Network) that
implements a SCF (Service Control Function).
SCS - Service
Capability Server
The SCS acts as a gateway between the SIP/Diameter based
IMS and OSA (Open Service Access) based application servers. OSA/Parlay is an
open API (Application Programming Interface) for application access to
telecoms network resources.
SCSI - Small
Computer Serial Interface
Small Computer Serial Interface is a standard for
computer system communication. Commonly used for storage devices and
scanners, SCSI is an ANSI (American National Standards Institute) standard.
SCTP - Stream
Control Transmission Protocol
SCTP provides sequential, reliable delivery of higher
layer data, using logical streams to separate this functionality and hence
avoid head of line blocking. An SCTP connection between two network nodes
e.g. eNB (Evolved Node B) to MME (Mobility Management Entity) is termed an
SCTP Association, which can feature flow control and multihoming as standard
capabilities. SCTP provides much of the same functionality as TCP
(Transmission Control Protocol), without the inherent drawbacks that TCP can
suffer from.
SD - Slice
Differentiator
In Network Slicing, the Slice Differentiator is directly
related to the SST (Slice/Service Type) and is used as an additional
differentiator if multiple Network Slices carry the same SST value.
SDAP - Service
Data Adaptation Protocol
SDAP is responsible for QoS Flow handling across the 5G
air interface. In particular, SDAP will map a specific QoS Flow within a PDU
Session to a corresponding Data Radio Bearer (which has been established with
the appropriate level of QoS). In addition, SDAP will mark the transmitted
packets with the correct QFI (QoS Flow ID), ensuring that the packet receives
the correct forwarding treatment as it traverses the 5G System. For each PDU
Session, a single protocol entity of SDAP will be configured. The exception
to this is Dual Connectivity, whereby the Master Cell Group and Secondary
Cell Group will each have a separate SDAP configuration on the device.
SDAP - Service
Discovery Application Profile
The Service Discovery Application Profile defines the
features and procedures for an application in a Bluetooth device to discover
services registered in other Bluetooth devices and retrieve any desired
available information pertinent to these services.
SDCCH - Standalone
Dedicated Control Channel
This channel is used in the GSM system to provide a
reliable connection for signalling and SMS (Short Message Service) messages.
The SACCH (Slow Associated Control Channel) is used to support this channel.
SDes - Source
Description
SDes is an RTCP (RTP Control Protocol) variable that
provides a description of the participants within a session. This report is
present in all compound messages and includes a header and a number of
information chunks providing information such as the name of the participant,
email address and optionally other contact information.
SDF - Service
Data Flow
Describes a flow of packets which represent a service
being delivered to a subscriber, such as a flow of voice packets associated
with a call or streaming data from a website.
SDF - Service
Data Function
The set of functions in a IN (Intelligent Network) that
provides for the management of service data in accordance with a service data
template.
SDH - Synchronous
Digital Hierarchy
A method of transmitting digital information where the
data is packed in containers which are synchronized in time enabling
relatively simple multiplexing and demultiplexing at the transmitting and
receiving ends. The technique is used to carry high capacity information over
long distances up to speeds of 10Gbps.
SDL - Specification
and Description Language
Specification and Description Language is an
object-oriented, formal language defined by the ITU-T (International
Telecommunications Union-Telecommunications Standardization Sector).The
language is intended for the specification of complex, event driven, real
time, and interactive applications involving many concurrent activities that
communicate using discrete signals.
SDN - Software
Defined Networking
SDN describes the process of abstracting and centralizing
much of the control activity related to packet forwarding and handling
processes which would typically take place within an individual network
router or switch. Therefore, the network router/switch would only be
forwarding user plane traffic, whilst receiving control information on
forwarding decisions from a centralized SDN Controller. In turn, the SDN
Controller can provide an abstracted, end to end view of the network to SDN
Applications. These SDN Applications can then request and reserve network
resources which are appropriate to that application, ensuring that overall,
the packet transport network is much more service and application aware.
SDP - Service
Data Point
A physical entity in an IN (Intelligent Network) that
implements a SDF (Service Data Function).
SDP - Service
Discovery Protocol
The Bluetooth defined Service Discovery Protocol enables
applications to discover which services and service characteristics are
available on other Bluetooth devices.
SDP - Session
Description Protocol
Used predominantly in mobile networks to describe the
parameters associated with a media stream, such as IP connection address,
ports, required bandwidth and codec description. Typically encountered as a
payload of protocols such as SIP, BICC and H.248 GCP.
SDS - Short
Data Service
SDS is a MCData service capability that assists with
carrying a limited size, but variable payload. This could be a text or an
extended message, a hyperlink providing users access to linked and accessible
content; such as a large file, situational awareness data, location
information or command instructions.
SDSL - Symmetric
Digital Subscriber Line
One of the family of DSL (Digital Subscriber Line)
services. Unlike ADSL (Asymmetric Digital Subscriber Line), it offers the
same data rate speeds of 2Mbps both upstream and downstream.
SDU - Service
Data Unit
The Service Data Unit identifies the information
transferred between peer layer entities which is not interpreted by the
supporting lower layer entities.
Seamless handover
Seamless handover is when a handover from one cell to
another takes place without a perceivable interruption of the radio
connection.
Search Engine
Search engines are huge databases of web page files that
have been assembled automatically by machine. There are two types of search
engines – individual and meta searchers. Individual search engines compile
their own searchable databases on the web whereas metasearchers do not
compile databases. Instead, they search the databases of multiple sets of
individual engines simultaneously.
Search Window
Search Window Specifies the range of PN (Pseudorandom
Noise) sequence offsets which a MS (Mobile Station) searches for a pilot.
Search Window Offset
Search Window Offset Identifies the PN (Pseudorandom
Noise) sequence offset employed by the MS (Mobile Station) when positioning
the search window.
Secondary CDMA Channel
Secondary CDMA Channel Identifies a preassigned channel
used by the MS (Mobile Station) for initial acquisition.
Secondary Traffic
Secondary Traffic Identifies an additional traffic stream
between the MS (Mobile Station) and the BS (Base Station).
Sector
Base Stations are often sectorized to improve efficiency.
It should be noted that sectors are cells in their own right.
Security
The ability to prevent fraud and the protection of
information availability, integrity and confidentiality.
Security Code
A number used to prevent unauthorized alteration of data
programmed into the phone.
Security Mode
Bluetooth has three defined security modes, these are:
Security Mode 1 – this is a non-secure mode, since the device will not
initiate any security; Security Mode 2 – this provides a service level
enforced security mode, providing a flexible access security method by
allowing multiple applications to use different security requirements in
parallel; Security Mode 3 – this is a link level enforced security mode. The
Bluetooth device will initiate security procedures before the link is set-up.
Security Token
This is a credit card size or key-fob sized
authentication device that a user carries which usually displays numbers that
change over time and synchronizes with an authentication server on the
network. May also be encountered as a smartphone app.
SEGW - Security
Gateway
The SEGW or Security Gateway forms part of the GANC
within a 3GPP Release 6 GAN. It provides the security functionality and in so
doing, terminates the IPSec tunnel at the GANC.
Selective Call Barring
The ability to programme a public switched network access
line, so that outgoing calls to certain related groups of numbers such as
special charge rate, international or mobile services cannot be made.
Semiduplex operation
A method in which simplex operation is used but with two
frequencies.
SEPP - Security
Edge Protection Proxy
The SEPP is used to protect control plane traffic that is
exchanged between different 5G PLMNs (Public Land Mobile Networks). As such,
the SEPP performs message filtering, policing and topology hiding for all API
messages.
Serial Port
A port through which data is passed serially, i.e., one
bit at a time, and that requires only one input channel to handle a set of
bits, e.g., all the bits of a byte.
Server
A server is a function on the network which holds
information or applications to be accessed by users of the network.
Service Agreement
The contract or agreement a user enters into with the
operator. Service agreements usually include a monthly fee.
Service Configuration
The Service Configuration identifies attributes used by
the MS (Mobile Station) and the BS (Base Station) which enable them to
interpret the traffic channel frames.
Service Discovery
In Bluetooth , Service Discovery describes the ability to
discover the capability of connecting devices or hosts.
Service Instance
The term Service Instance identifies a higher layer
interaction between the mobile and another endpoint.
Service Negotiation
The MS (Mobile Station) and BS (Base Station) use the
Service Negotiation to establish a Service Configuration.
Service Option Connection
This identifies the use of a particular Service Option.
Service Option Connection
Reference
A common reference used by the BS (Base Station) and MS
(Mobile Station) to uniquely identify a particular Service Option Connection.
Service Option
Negotiation
Provides a flexible method allowing the MS (Mobile
Station) and BS (Base Station) to establish a Service Configuration.
Service Provider
Service Provider is the generic title given to an
organization which provides services to subscribers. Traditionally these
services have been telecommunications based however, modern day service
providers are diverse organizations which can provide services other than
voice and broadband.
Service Provider Network
Identifies a network through which the user is provided
services. This may be either the home or visited service provider.
Service Redirection
Service Redirection Enables the BS (Base Station) to
alter the system selection made by a MS (Mobile Station). If testing is
required, this enables a temporary divert to an alternate system.
Services
The set of functions that the telecommunication system
may make available to the user.
Serving Frequency
Serving Frequency The frequency on which a MS (Mobile
Station) is currently communicating with one or more BS (Base Station).
Serving Network
The serving network provides the user with access to the
services of their home environment. When roaming, the serving network is
referred to as the visited network.
SF - Spreading
Factor
In a CDMA (Code Division Multiple Access) system, the
number of chips per data symbol is called the SF (Spreading Factor). The
lower the spreading factor the higher the data rate.
SFH - Slow
Frequency Hopping
Slow Frequency Hopping is a technique in which the
carrier frequency changes using a predetermined hopping pattern. The hopping
rate is slower than the bit rate.
SFN - Cell
System Frame Number
This is used in the UMTS system to identify the framing
and timing of a cell on a Node B.
SFN - System
Frame Number
This is used in the UMTS system to identify the framing
and timing of a cell on a Node B.
SFP - Small-form
Factor Pluggable
An SFP is a small hot pluggable transceiver used in data
communication and telecommunications networks. SFPs interface between
communication devices such as switches, routers and fibre optic cables. They
are available in a wide range of interface types to both single mode and
multi-mode fibre optics as well as copper cable. Modern SFPs support service
assurance and performance monitoring activities.
SgNB - Secondary
gNB
A device operating in 5G DC (Dual Connectivity), NGEN-DC
(NG-RAN – E-UTRA NR Dual Connectivity) or EN-DC (E-UTRA – NR Dual
Connectivity), identifies the Secondary RAN node as the “Secondary gNB”. In
the case of EN-DC, it is also identified as the “en-gNB”.
SGsAP - SGs
Application Protocol
SGsAP is designed to facilitate mobility management and
paging procedures on the SGs interface, as part of CSFB (Circuit Switched
Fallback) operation. In addition, SGsAP permits the transfer of SMS delivery
via the circuit switched core network when IP based messaging services are
not available. Key capabilities of SGsAP include: Paging for non-EPS
services, Location Updates for non EPS services, alerting procedures, IMSI
detach from EPS services, Mobility Management procedures and failure
conditions.
SGSN - Serving
GPRS Support Node
The SGSN forms part of the PS core network, providing
mobility and session management services to subscribers. This requires the
SGSN to hold subscriber data associated with user identification and
location. The SGSN facilitates connectivity between the UTRAN/GERAN and the
GGSN, generating billing information if required.
SGW - Security
Gateway
In an LTE deployment, security gateways are used as VPN
concentrators, terminating IPSec connections between the eNB at the cell site
and the SGW in the EPC. In particular, both the S1-MME and S1-U will be
protected using an IPSec tunnel which terminates at the SGW.
SGw - Signalling
Gateway
Signalling interworking between SS7 (Signalling System No
7) and IP based networks is achieved by the use of a SGw. These functions
strip off the traditional transport protocols such as MTP (Message Transfer
Part) employed in circuit switched networks and replace them with a transport
mechanism based on IP, termed SIGTRAN.
SGW-C - Serving
Gateway Control plane function
The SGW-C controls the functionality performed by the
assigned SGW-U when control and user plane separation is in place. A
subscriber is served by a single SGW-C, and can have multiple SGW-Us selected
for multiple PDN connections. When the subscriber moves around the E-UTRAN,
under control of a SGW-C their point of attachment to the EPC remains fixed
at the SGW-U (unless the network decides that a SGW-U relocation is
required). Additional responsibilities include lawful interception of
subscriber traffic, as well as triggering downlink data buffering whilst the
subscriber is paged and PGW pause of charging management based on implemented
policies (failed paging, abnormal radio link release and dropped
packets/bytes at SGW-U).
SGW-U - Serving
Gateway User plane function
The SGW-U is the user data plane ingress and egress point
of the E-UTRAN side of the EPC when control and user plane separation is in
place. As such, when the subscriber moves around the E-UTRAN, their point of
attachment to the EPC remains fixed at the SGW-U (unless the network decides
that a SGW-U relocation is required). A single subscriber may be supported by
multiple SGW-U if connectivity to multiple PDNs are in place. Additional
responsibilities include lawful interception of subscriber traffic, inter-operator
accounting, as well as downlink data buffering whilst the subscriber is
paged.
SHA1 - Secure
Hashing Algorithm 1
SHA1 is one of several cryptographic hashing functions
developed by the NSA (National Security Agency). Hashing functions compute a
fixed-length digital representation (known as a message digest) of an input
data sequence (the message) of any length. They are termed secure when it is
computationally infeasible to find a message that corresponds to a given
message digest or find two different messages that produce the same message
digest. Also, any change to a message should, with a very high probability,
result in a different message digest. It should be noted that SHA-1 is
considered to be insecure by some industry experts, although SHA-2 and SHA-3
are still potential options.
Shannon’s law
Shannon’s law defines the theoretical maximum rate at
which error free digits can be transmitted over a bandwidth limited channel
in the presence of noise. It is usually expressed in the form C = W log2(1 +
S/N ), where C is the channel capacity in bits per second, W is the bandwidth
in Hertz, and S/N is the SNR (Signal to Noise Ratio).
Shared Secret
Shared Secrets are pre-shared keys that have been
allocated to the communicating parties prior to the communication process
starting. Shared Secrets may be used in PKI (Public Key Infrastructure),
however due to the requirement to pre share the keys, it has very poor
scaling characteristics.
Shareware
Software which can be trialled for free, then paid for
later.
SHCCH - Shared
Channel Control Channel
Bidirectional channel that transmits control information
for uplink and downlink shared channels between the network and UE (User
Equipment). This channel is for TDD (Time Division Duplex) only.
SHF - Super
High Frequency
Identified as the frequency band from 3GHz to 30GHz.
SI - Stall
Indicator
The Stall indicator bit indicates whether the mobile’s
RLC (Radio Link Control) transmit window can advance (i.e., is not stalled)
or can not advance (i.e., is stalled). The MS (Mobile Station) shall set the
SI bit in all uplink RLC data blocks.
SI-RNTI - System
Information
When the E-UTRA eNB sends broadcast messages on the BCCH
it uses a SI-RNTI (System Information – Radio Network Temporary Identifier),
which is set to 0xFFFF. This is used to CRC encode the broadcast messages,
enabling all UEs to correctly decode/identify.
SIB - Service
Independent Building Block
A reusable set of FEA (Functional Entity Action) and
information flows used to support a service feature or a part of a service
feature in an IN (Intelligent Network).
SIB - System
Information Block
The system information elements are broadcast in system
information blocks. A system information block groups together system
information elements of the same nature. Different system information blocks
may have different characteristics, e.g. regarding their repetition rate and
the requirements of UE (User Equipment) to read the System Information.
SIB1-BR - SIB1
Bandwidth Reduced
As part of LTE-M, SIB1-BR is the new LTE SIB (System
Information Block) that has been optimized to facilitate transmission in
LTE-M NB (Narrowband).
SID - Silence
Descriptor
A frame that conveys information on the acoustic
background noise in order to generate comfort noise during periods of silence
suppression within a call.
SIDF - Subscriber
Identity De-concealing Function
The SIDF is a functional element of the UDM (Unified Data
Management), responsible for decrypting a SUCI (Subscription Concealed
Identifier) to reveal the subscriber’s SUPI (Subscription Permanent
Identifier).
SIF - Service
Information Field
A Service Information Field is the payload of an MTP
Level 2 (Message Transfer Part Level 2) MSU (Message Signalling Unit).
SIFS - Short
Interframe Space
SIFS are found in IEEE 802.11 networks. They are used for
the highest priority transmissions enabling Stations with this type of
information to access the radio link first. Examples of information which
will be transmitted after the SIFS has expired include RTS (Request To Send)
and CTS (Clear To Send) messages in addition to positive acknowledgements.
SIG - Special
Interest Group
The Bluetooth Special Interest Group mission statement
is: develop, publish and promote the preferred short-range wireless
specification for connecting mobile products, and to administer a
qualification program that fosters interoperability for a positive user
experience.
SIG - SS7 to IP
Gateway
Signalling interworking between SS7 (Signalling System No
7) and IP based networks is achieved by the use of a SIG. These functions
strip off the traditional transport protocols such as MTP (Message Transfer
Part) employed in circuit switched networks and replace them with a transport
mechanism based on IP, termed SIGTRAN.
SigComp - Signalling
Compression
RFC 3320 specifies a protocol on the IETF (Internet
Engineering Task Force) standards track that may be used to compress
application layer protocols such as SIP (Session Initiation Protocol). In
turn SigComp may interface with the three principle transport layer
protocols; namely TCP (Transport Control Protocol), UDP (User Datagram
Protocol) and SCTP (Stream Control Transmission Protocol). The main driver
for the development of SigComp is the planned usage of protocols like SIP
which are text based in wireless handsets as part of 2.5G, 3G and 4G cellular
networks. Consequently the large message size coupled with relatively low
data rates across the radio interface will result in significant transmission
delays. SigComp provides a means to eliminate this problem by offering
robust, lossless compression of application messages. In SIP SigComp is
invoked and negotiated between the client and server. The client initiates
the compression mechanism by advertising its ability to employ SigComp
through the inclusion of the extension header comp=sigcomp in the request
message.
Sigfox
Sigfox is a LPWA (Low Power Wide Area) network technology
used within the IoT (Internet of Things) to support communication between
devices / sensors and their base stations spanning a region or country where
wide area coverage is required.
Signal processing gain
The ratio of the SNR (Signal to Noise Ratio) of a
processed signal to the Signal to Noise Ratio of the unprocessed signal.
Signal processing gain is usually expressed in dB (decibel).
Signaling Connection
The connection used to carry signaling traffic.
Signaling Traffic
Signaling Traffic Identifies the control messages sent
between the MS (Mobile Station) and the BS (Base Station) on the traffic
channel.
Signalling
The exchange of information specifically concerned with
the establishment/control of connections and management in a
telecommunications network.
Sigtran - Signalling
Transport
Sigtran is a technique used in service provider IP
transport networks in order to carry SS7 (Signalling System number 7)
messages between network nodes. This is largely due to the fact that SS7’s
lower layers rely on a TDM (Time Division Multiplexed) bearer, such as an E1
or T1 link. Sigtran uses a User Adaptation layer in order to support the
regular SS7 border primitives sent between layers of the SS7 protocol stack.
In turn, the User Adaptation layer packets are transported across the IP
network using SCTP (Stream Control Transmission Protocol) at the Transport
Layer. There are various User Adaptation layers available, the choice of
which is determined by how much SS7 functionality (in terms of layers) needs
to be retained in the IP transport network. Options include SUA (SCCP User
Adaptation), M3UA (MTP3 User Adaptation), M2UA (MTP2 User Adaptation) and
M2PA (MTP2 Peer to Peer Adaptation).
Silent Re-origination
Silent Reorigination After a user initiated access
attempt failure, an autonomous attempt is made to reoriginate a call.
SIM - Subscriber
Identity Module
Usually referred to as a SIM card, the SIM (Subscriber
Identity Module) is the user subscription to the mobile network. The SIM
contains relevant information that enables access onto the subscribed
operator’s network.
SIM lock
Software protection which may prevent the SIM (Subscriber
Identity Module) being used in a different handset.
SIMPLE - SIP
for Instant Messaging and Presence Leveraging
SIMPLE is an IETF (Internet Engineering Task Force)
working group which, as its title suggests, is responsible for the
development of SIP (Session Initiation Protocol) based IM (Instant Messaging)
and Presence services.
Simplex
Simplex communication describes one way communication at
any one time.
Simulcast
A signalling technique that broadcasts the same signal
over each site in a network.
SIO - Service
Information Octet
The Service Information Octet field in a MSU (Message
Signalling Unit) contains the 4bit subservice field followed by the 4-bit
service indicator. The subservice field contains the network indicator (e.g.
national or international) and the message priority (0 to 3 with 3 being the
highest priority). Message priority is considered only under congestion
conditions not to control the order in which messages are transmitted. Low
priority messages may be discarded during periods of congestion. The service
indicator specifies the MTP (Message Transfer Part) user thereby allowing the
decoding of the information contained in the payload.
SIP - Session
Initiation Protocol
SIP is an IETF protocol which was initially designed to
establish, maintain and terminate multimedia sessions. Since its initial
standardization, SIP has been adopted as the main signalling protocol in a
variety of different network architectures. This includes the 3GPP IMS (IP
Multimedia System), where existing SIP features have been utilized, in
addition to new enhancements which have been specifically created.
SIP-AS - SIP
Application Server
SIP application servers host and execute services, acting
as proxy servers, originating user agents, terminating user agents, or
back-to-back user agents. They can be located in a home or visited network.
SIP-T - SIP for
Telephones
SIP for Telephones provides a framework for the
integration of legacy telephony signalling into SIP messages. It provides two
key characteristics, namely ‘encapsulation’ and ‘translation’. The SS7 ISUP
messages arriving at a SIP-ISUP gateway are ‘encapsulated’ within SIP; this
makes sure the information necessary for services is not discarded in the SIP
request. However, routing decisions for SIP requests are made at proxy
servers which cannot be expected to understand ISUP messages. To overcome
this, some of the critical information is translated from an ISUP message
into the corresponding SIP headers, allowing the SIP request to be routed.
SIPPING - Session
Initiation Protocol Project INvestiGation
The Session Initiation Protocol Project INvestiGation is
a working group chartered to document the use of SIP for several applications
related to telephony and multimedia, developing requirements for any
extensions to SIP needed for those applications.
SIPs - Session
Initiation Protocol secure
SIPs employs TLS (Transport Layer Security) in order to
secure both the SIP protocol header and whatever payload may be in the SIP
message body.
SIPPING - Session
Initiation Protocol Project INvestiGation
The Session Initiation Protocol Project INvestiGation is
a working group chartered to document the use of SIP for several applications
related to telephony and multimedia, developing requirements for any
extensions to SIP needed for those applications.
SIPs - Session
Initiation Protocol secure
SIPs employs TLS (Transport Layer Security) in order to
secure both the SIP protocol header and whatever payload may be in the SIP
message body.
SIPTO - Selective
IP Traffic Offload
SIPTO is a network optimization technique which involves
traffic analysis being undertaken at the eNB (Evolved Node B), with selected
traffic being transferred across the most optimal path in the core network or
even bypassing the core network completely (hence being sent straight to the
Internet for instance).
SIR - Signal to
Interference Ratio
A ratio between the wanted signal power in the channel
and the interference in the channel.
Sky wave
A radio wave that travels upward from the antenna. Sky
waves may be reflected back to Earth by the ionosphere.
SL - Signalling
Link
The SS7 signalling channel between two signalling
terminals SP (Signalling Point) or STP (Signalling Transfer Point) is
identified as a SL (Signalling Link).
Slave Device
Within a Bluetooth piconet there may be many Slave
Devices, these are all slaves to the Master Device.
SLC - Signalling
Link Code
The Signalling Link Code is the number of the SL
(Signalling Link) to which SS7 MTP (Message Transfer Part) management
messages are related.
Sleep mode
Designed to conserve battery life, this mode
automatically turns off a terminal after it has been unused for a specified
period of time. The unit is reactivated periodically and when the keypad is
touched.
SLF - Subscription
Locator Function
In an IMS network where multiple separate instances of
the HSS can exist, an SLF is used by various network nodes in order to
ascertain which HSS holds the subscriber profile of a particular IMS
subscriber. Interaction with the SLF is based on Diameter.
SLIP - Serial
Line Internet Protocol
A data communications standard to connect to the Internet
across a Modem-based link. SLIP is being replaced by PPP (Point to Point
Protocol). Many Internet companies offer SLIP or PPP connections to the
Internet.
Slotted Mode
Slotted Mode Mode in which the MS (Mobile Station)
monitors selected slots on the PCH (Paging Channel) or the FCCCH (Forward
Common Control Channel) when in the idle state. This increases the MS (Mobile
Station) battery life.
SLR - Source
Local Reference
Signalling Connection Control Part will allocate a SLR
for each connection orientated service between two SCCP nodes.
SLRC - Station
Long Retry Counter
The Station Long Retry Counter is used in WiFi during
error recovery procedures. The counter is incremented each time a frame over
the RTS (Request To Send) threshold is received in error. This in turn
increases the contention window maximum value.
SLS - Signalling
Link Selection
Usually the user of the MTP (Message Transfer Part) layer
in SS7 will allocate a SLS value. Different SLS values may lead to load
sharing and will also help to provide sequence integrity.
SM - Session
Management
This function exists in the mobile and in the SGSN
(Serving GPRS Support Node) and handles PDP (Packet Data Protocol) Context
Activation, Modification, Deactivation, and Preservation Functions.
SM-DP - Subscription
Manager – Data Preparation
This is a term used within the GSMA’s Remote SIM
Provisioning standard to describe the function of preparing both bootstrap
and operational profiles which will be securely provisioned on an eUICC.
SM-SR - Subscription
Manager – Secure Routing
This is a term used within the GSMA’s Remote SIM
Provisioning standard to describe the function of securely transporting both
platform and profile management commands in order to load, enable, disable
and delete profiles from the eUICC.
Smart antenna
An antenna system whose technology enables it to focus
its beam on a desired signal to reduce interference. A wireless network would
employ smart antennas at its base stations in an effort to reduce the number
of dropped calls, improve call quality and improve channel capacity.
Smart card
A card containing a processor and memory to store
important data about a person’s identity to allow access to a network or
premises.
SMDS - Switched
Multi megabit Data Service
A connectionless, broadband, packet switched data service
that provides LAN (Local Area Network) like performance and features.
SME - Short
Message Entity
An entity which may send or receive Short Messages. The
SME may be located in a fixed network, a mobile, or a SMSC (Short Messages
Service Centre).
SMF - Service
Management Function
The set of processes in an IN (Intelligent Network) that
support the management of user and/or network information including service
data and Service Logic programs that are required for the proper operation of
a service.
SMG - Special
Mobile Group
The ETSI (European Telecommunications Standards
Institute) technical committee SMG (Special Mobile Group) has the primary
responsibility within ETSI for coordinating some aspects of GSM.
SMH - Signalling
Message Handling
A function at level 3 of MTP (Message Transfer Part) that
provides message discrimination message routing and message distribution
services.
SMLC - Serving
Mobile Location Centre
The Serving Mobile Location Centre is found within a PLMN
(Public Land Mobile Network) and is used to calculate positional information
and coordinate location based services. An SMLC controls a number of LMU
(Location Measurement Unit) in order to obtain radio interface measurements
required to locate or help to locate a specific subscriber.
SMP - Service
Management Point
A physical entity in an IN (Intelligent Network) that
implements a service management function.
SMpSDU - Support
Mode for predefined SDU size
The UMTS Iu Interface uses the Iu Protocol, which can be
operated in either TrM (Transparent Mode) or SMpSDU (Support Mode for
predefined SDU size mode). SMpSDU is intended for those RAB (Radio Access
Bearer) that require extra functionality from the Iu user part protocol other
than transfer of user data.
SMS - Short
Message Service (Generic)
The SMS (Short Messaging Service) that allows a SME
(Short Message Entity) to send short text messages to other SME.
SMS - Short
Message Service (GSM)
The Short Message Service was introduced in the first
phase of GSM during 1991 as a simple store and forward text messaging system.
Even though nearly all GSM mobile phones were capable of supporting SMS, the
take up was very limited as network operators or carriers failed to market
the system. However, this has all changed with tens of billions of text
messages being sent each month. A significant proportion of this rapid growth
can be attributed to the inclusion of SMS into youth culture. In fact it has
introduced a new text language to bypass the often awkward text entry or MMI
(Man Machine Interface). SMS messages are limited to 160 characters in length
although it is possible to concatenate several messages to produce a much
greater macro message.
SMSC - Short
Message Service Centre
The SMSC is responsible for storing and forwarding SMS
messages, which are delivered to the SMSC by MSCs as a payload of MAP (Mobile
Application Part) signalling.
SMSF - Short
Message Service Function
In 5G networks, the SMSF supports the transfer of SMS
over NAS. In this capacity, the SMSF will conduct subscription checking and
perform a relay function between the device and the SMSC (Short Message
Service Centre), through interaction with the AMF (Core Access and Mobility
Management Function).
SMTP - Simple
Mail Transfer Protocol
The TCP/IP (Transmission Control Protocol/Internet
Protocol) protocol which facilitates the transfer of electronic-mail
messages, specifies how two systems are to interact, and the format of
messages used to control the transfer of electronic mail.
SN - Service
Node
A physical entity in an IN (Intelligent Network) that
contains the service control function service data function specialized
resource function and service switching/call control functions.
SN - Subscriber
Number
The number dialled to reach a customer in a telecoms
network.
SNAP - Sub
Network Access Protocol
SNAP is used in the IEEE (Institute of Electrical and
Electronics Engineers) 802.2 LLC (Logical Link Control) protocol as a
mechanism for multiplexing more protocols than can be distinguished by the
8bit 802.2 SAP (Service Access Point) fields. SNAP supports identifying
protocols by Ethernet type field values in addition to vendor specific
protocol identifiers.
SNDCP - Sub
Network Dependent Convergence Protocol
In addition to the protocols used to carry GMM (GPRS
Mobility Management) information across the Gb interface; namely LLC (Logical
Link Control) and BSSGP (Base Station Subsystem GPRS Protocol), a further
protocol exists which is used to transfer data between the mobile and the
SGSN as a result of the activation of a PDP Context. Termed SNDCP (Sub
Network Dependent Convergence Protocol), the protocol resides on top of LLC
and provides compression and segmentation services to the protocols being
carried in GPRS – IPv4 and IPv6.
Sniff Mode
Once a Bluetooth device is synchronized to a piconet, it
can enter one of three power saving modes. In this mode the activity is
lowered, enabling a slave device to listen at a reduced rate to the piconet.
The interval or period between sniffs is configurable based on the
applications using the device. Sniff mode is the least power efficient of all
three power saving modes.
SNM - Signalling
Network Management
Level 3 function of MTP (Message Transfer Part) that
provides continuous supervision of the signalling network. SNM uses
autonomous and manual network control functions to ensure optimal use of
available signalling resources.
SNMP - Simple
Network Management Protocol
Simple Network Management Protocol is part of the TCP/IP
(Transmission Control Protocol/Internet Protocol) suite and is used to
control and manage IP gateways and other network functions.
SNPN - Standalone
NPN
An SNPN is an example of a Private 5G network which has
been deployed separately to the Public 5G network. As such, the Private 5G
network is standalone, with no dependencies on the Public 5G network.
SNR - Serial
Number
The Serial Number forms part of the IMEI (International
Mobile Equipment Identity) and uniquely identifies each ME (Mobile Equipment)
with a given TAC (Type Approval Code) and FAC (Final Assembly Code). It is
six digits in length.
SO - Service
Option
A 3GPP2 term used to identify a specific service.
Examples of Service options include, speech utilizing a particular codec,
type of traffic e.g. SMS (Short Message Service), or a connection type such
as IP (Internet Protocol).
SOAP - Simple
Object Access Protocol
SOAP is a messaging protocol associated with web services
implementation that allows programs that run on different operating systems
(such as Windows and Linux) to communicate with one another using HTTP and
XML.
SOCKS
SOCKS is a protocol that allows an application inside the
firewall to access resources on the global Internet.
Soft Handover
Soft handover is a category of handover procedures where
the radio links are added and abandoned in such manner that the mobile always
keeps at least one radio link established.
Soft key
A key below the phone’s display that performs whatever
function is listed on the display.
SOHO - Small
Office Home Office
This is a generic term regularly used to describe an
environment or the equipment designed for either the Small Office or Home
Office.
SoLSA - Support
of Localized Service Area
Support of Localized Service Area allows a network
operator to offer subscribers or groups of subscribers different services,
different tariffs and different access rights depending on their geographical
location.
SOR - Support
of Optimal Routing
SOR (Support of Optimal Routing) is a network feature
which enables the calls directed to a mobile subscriber to be routed directly
to the mobile subscriber’s actual location, or to their forwarded to
destination (instead of via the HPLMN (Home Public Land Mobile Network) or in
the case of Late Call Forwarding via the VPLMN (Visited Public Land Mobile
Network)).
SONET - Synchronous
Optical Network
An interface standard for synchronous optical fiber
transmission, applicable to the physical layer of the OSI (Open Systems
Interconnection) reference model. SONET was developed by the Exchange
Carriers Standards Association. SONET has a similar architecture to SDH (
Synchronous Digital Hierarchy).
Source Base Station
The Source BS (Base Station) is a term used to identify
the BS (Base Station) that is in control of the call.
SP - Signalling
Point
A Signalling Point is a node in the SS7 network. It is
either the originating or terminating point.
SP - Subscriber
Profile
SP is a generic term used to describe subscriber specific
information which can be used by network entities in the course of service
provision. The SP can contain information such as the user’s subscribed level
of service and QoS entitlement.
Space diversity
A method of TX (Transmission) or RX (Reception), or both,
in which the effects of fading are reduced by the simultaneous use of two or
more antennas. Antennas should ideally be separated by one or more
wavelengths.
Spam
Spam is the general title given to unwanted messages
delivered to a victim. These messages are predominantly in the form of an
email, although recent trends in spam delivery are also exploiting SMS , MMS
and VoIP. It is said that the majority of traffic that passes across the
Internet is actually spam, often distributed with the aid of a Botnet of some
description. Although spam filters reduce the amount of unwanted spam an
average user would receive, spammers are adopting a multitude of techniques
to overcome these filters. In particular, with respect to email, spammers are
utilizing a large variety of different attachment formats, including MP3.
SPC - Signalling
Point Code
Codes used by the SS7 network for routing purposes which
identify the originator or destination of an SS7 message.
SPD - Security
Policy Database
A logical element of an IPSec implementation which holds
the selectors required to determine whether a packet should be secured by
IPSec.
Spectral density
Spectral density is the total power in the specified
bandwidth divided by the specified bandwidth, usually expressed in Watts per
Hertz.
Spectrum assignment
Government authorization for use of specific frequencies
or frequency pairs within a given allocation, usually at a stated geographic
location.
Speech synthesizer
A device that is capable of accepting digital or analogue
data and developing intelligible speech sounds that correspond to the input
data.
SPI - Security
Parameters Index
The SPI (Security Parameters Index) is a pointer that
references the session key and algorithms used to protect the data being
transported. The index is defined during the SA (Security Association)
establishment and described in the ESP (Encapsulating Security Protocol) or
AH (Authentication Header) extension to the IP header.
SPNP - Support
of Private Numbering Plan
Support of Private Numbering Plan enables a subscriber to
use a PNP (Private Numbering Plan) for communication across one or more
networks with mobile and fixed users within the digital cellular
telecommunications system.
SPR - Subscription
Profile Repository
The SPR is a logical database which contains subscriber
related information related to policy and charging control. The SPR may be a
subset of the HSS (Home Subscriber Server), providing information such as
subscriber allowed services, permitted QoS and charging related information.
Spread spectrum
Jamming resistant and initially devised for military use,
it is a telecommunications technique in which a signal is transmitted in a
bandwidth considerably greater than the frequency content of the original
information. Methods include frequency hopping, direct sequence spreading,
time scrambling, and combinations of these techniques.
Spurious emission
Emission on a frequency or frequencies which are outside
the necessary bandwidth. Spurious emissions include such things as harmonic
emissions and inter modulation products.
SR - Scan
Repetition
Scan Repetition is a Bluetooth mode used to identify how
long the device will continue to scan for a page response message.
SR - Signalling
Route
A predetermined path described by a succession of
signalling points that may be traversed by signalling messages directed by a
SP (Signalling Point) towards a specific destination point.
SR1 - Spreading
Rate 1
A 1.2288Mcps chip rate based system. This utilizes a
direct spread single carrier.
SR3 - Spreading
Rate 3
A 3.6864Mcps chip rate based system. This utilizes three
1.2288Mcps carriers on the Forward CDMA Channel and the Reverse CDMA Channel
uses a 3.6864Mcps direct spread carrier.
SR3 Frequencies
The three 1.2288Mcps carriers on the Forward CDMA
Channel, identified as the lowest, centre and highest frequencies.
SRB - Signalling
Radio Bearer
The RRC (Radio Resource Control) connection process will
establish the RB (Radio Bearer) available for usage by RRC messages on the
DCCH (Dedicated Control Channel) and CCCH (Common Control Channel). These
Radio Bearers are identified as a SRB (Signalling Radio Bearer).
SRES - Signed
Response
The variable generated in the AuC (Authentication Centre)
and the MS (Mobile Station). A successful authentication occurs if the SRES
value received from the AuC by the VLR (Visitor Location Register) matches
that sent by the MS.
SRF - Specialized
Resource Function
The set of functions that provides for the control and
access to resources used in providing services. Typical functions of a SRF
include the collecting of dialled digits and the playing of announcements.
SRI - Send
Routing Information
SRI is a MAP message sent by the GMSC to the HLR to
request routing information in order to route a call towards a mobile
subscriber.
SRNC - Serving
Radio Network Controller
When a RNC (Radio Network Controller) has a RRC (Radio
Resource Control) connection with a UE (User Equipment), it is known as the
SRNC for that UE. The SRNC is responsible for the user’s mobility within the
UTRAN and is also the point of connection towards the CN (Core Network).
SRNS - Serving
Radio Network Subsystem
There is one Serving Radio Network Subsystem for each UE
(User Equipment) that has a connection to the UTRAN (UMTS Terrestrial Access
Network). The Serving RNS controls the RRC (Radio Resource Control)
connection between a UE and the UTRAN.
SRNS Relocation
The change of control from the SRNS (Serving Radio
Network Subsystem) to another RNS (Radio Network Subsystem).
SRS - Signalling
Route Set
The combination of all the permitted SR (Signalling
Route) that may be used to pass signalling messages from a SP (Signalling
Point) to a specific destination.
SRS - Sounding
Reference Signal
This is a E-UTRA reference signal that is transmitted by
the UE. It is then evaluated by the eNB to determine the channel quality and
assist in resource scheduling.
SRTP - Secure
Real time Transport Protocol
A mechanism which allows the user to encrypt the RTP
packets being generated as part of a real time data session.
SRV - Server
Record
A type of DNS record which provides information on a
potential target server which may be able to handle a particular
request/message.
SRVCC - Single
Radio Voice Call Continuity
The network feature which allows ongoing calls to be
seamlessly switched between 4G and 2G/3G access networks. SR-VCC is essential
for VoLTE networks that do not benefit from ubiquitous LTE coverage (in which
case 2G/3G coverage fills in the gaps).
SS - Supplementary
Service
A service which modifies or supplements a basic
telecommunication service. A supplementary service must be offered together
with or in association with a basic telecommunication service.
SS-CSI - Supplementary
Service Invocation Notification – CAMEL Subscription Information
SS-CSI is used to notify the CSE about the invocation of
certain Supplementary Services. It includes: notification criteria – this
indicates the supplementary services for which notifications will be sent.
gsmSCF address.
SS7 - Signalling
System No. 7
A CCS (Common Channel Signalling) system defined by the
ITU-T (International Telecommunications Union-Telecommunication
Standardization Sector). SS7 is used in many modern telecoms networks and
provides a suite of protocols which enables circuit and non circuit related
information to be routed about and between networks. The main protocols
include MTP (Message Transfer Part) SCCP (Signalling Connection Control Part)
and ISUP (ISDN User Part).
SSC - Session
and Service Continuity
This 5G technique allows the service provider to set a
specific SSC mode for a given PDU Session, which in turn will determine the
flow of packets across the network in mobility scenarios. In particular, the
different SSC modes will determine what type of IP address preservation is
used as the device moves from one data network anchor to another.
SSCF - Service
Specific Coordination Function
In the ATM (Asynchronous Transfer Mode) signalling layer
the SSCF maps the requirements of the layer above to the requirements of
SSCOP (Service Specific Connection Oriented Protocol).
SSCOP - Service
Specific Connection Oriented Protocol
In the ATM (Asynchronous Transfer Mode) signalling
layers, SSCOP provides mechanisms for the establishment and release of
connections and the reliable exchange of signalling information between
signalling entities.
SSD - Shared
Secret Data
A key of length 128bits, stored in the MS (Mobile
Station) and known by the BS (Base Station). The SSD is a concatenation of
two 64bit subsets: SSD_A , used in the authentication procedures, and SSD_B ,
used along with other parameters to generate the encryption mask and private
long code.
SSDT - Site
Selection Diversity Transmission
The intention with Site Selection Diversity Transmission
is that only the primary cell sends the data part of the downlink data
channel, while the control part is sent by the BS (Base Station).
SSF - Service
Switching Function
The set of processes in an IN (Intelligent Network) that
provide the communication path for interaction between a CCF (Call Control
Function) and a SSF (Service Control Function).
SSH - Secure
Shell
SSH is a security mechanism which allows remote
configuration of network devices through the establishment of a secure
channel between the target device and the configuring entity. SSH was
designed as a replacement for the less secure TELNET protocol.
SSID - Service
Set Identifier
The Service Set Identifier or Network Name is used within
IEEE 802.11 networks to identify a particular network. It is usually set by
the administrator setting up the WLAN (Wireless Local Area Network) and will
be unique within a BSS (Basic Service Set) or ESS (Extended Service Set). The
SSID may be broadcast from an AP (Access Point) within the wireless network
to enable Stations to determine which network to Associate with. However,
this feature should be disabled as it may assist hackers or wardrivers in
gaining access to a private network.
SSL - Secure
Sockets Layer
The SSL protocol runs above TCP/IP and below higher-level
protocols such as HTTP (Hypertext Transport Protocol) or IMAP (Internet
Message Access Protocol). It uses TCP/IP on behalf of the higher-level
protocols, and in the process allows an SSL enabled server to authenticate
itself to an SSL enabled client.
SSM - Source
Specific Multicast
In normal IP multicast operation, numerous entities are
permitted to be the source of a multicast traffic stream. SSM describes the
notion of one source of traffic associated with the multicast group, as
opposed to numerous. This is particularly relevant for IPTV services, where
the source for the multicast group would be an individual media server. As
such, when subscribers choose a particular channel, they will join the
multicast group for that channel but also specify the source IP address of
the appropriate media server.
SSN - Sub
System Number
The SCCP (Signalling Connection Control Part) function
uses the SSN to determine the local subsystem.
SSP - Service
Switching Point
The physical entity in an IN (Intelligent Network) that
implements the service switching function.
SSRC - Station
Short Retry Counter
The Station Short Retry Counter is used in WiFi during
error recovery procedures. The counter is incremented each time a frame less
than the RTS (Request To Send) threshold is received in error. This in turn
increases the contention window maximum value.
SSS - Secondary
Synchronization Signal
The E-UTRA Secondary Synchronization Signal enables the
mobile to determine the cell and cell group on which it is decoding the
downlink radio transmission.
SST - Slice/Service
Type
In relation to Network Slicing, the SST will define the
expected behaviour of the Network Slice in terms of specific features and
services. Standardized SST values include eMBB (enhanced Mobile Broadband),
URLLC (Ultra Reliable Low Latency Communications) and MIoT (Massive Internet
of Things).
ST - Signalling
Terminal
A signalling terminal is the termination of a SL
(Signalling Link) at a SP (Signalling Point). Each end of the signalling link
employs a signalling terminal.
Stack Smashing
Stack Smashing is the technique used to trick a computer
into executing arbitrary code by forcing a buffer overflow.
Standby State
This is a GPRS state which is similar to the idle state
in GSM and UMTS. A mobile will perform a RAU (Routing Area Update) when
necessary in the standby state.
Standby Time
The amount of time a subscriber can leave a fully charged
handset turned on to receive incoming calls before the phone will discharge
the batteries.
Standing wave
A standing wave may be formed when a wave is transmitted
into one end of a transmission line and is reflected from the other end by an
impedance mismatch.
Star topology
A network topology in which peripheral nodes are
connected to a central node, which rebroadcasts all transmissions received
from any peripheral node to all peripheral nodes on the network, including
the originating node.
Station
A term used to describe any device that contains an IEEE
802.11 conformant MAC (Medium Access Control) and physical layer interface to
the wireless medium. In practice, this may represent a laptop computer or PDA
(Personal Digital Assistant) fitted with an IEEE 802.11 data card.
STB - Set Top
Box
The STB is an integral part of cable based TV services.
Located at the customer premises, the device is responsible for demodulating,
decrypting and processing MPEG-2 or MPEG-4 based TV content, in addition to
providing the capability for the user to utilize interactive services. Newer
IPTV systems use the same terminology, although in this case the term STB is
being phased out in favour of the Home Gateway.
STC - Space
Time Coding
This is a radio technique used in many mobile systems to
provide diversity and combat interference. It typically involves transmitting
copies of the same data across multiple spaced antennas at different times,
enabling the receiver to combine and find all the original data.
STiMi - Satellite
and Terrestrial Interactive Multiservice
STiMi was developed by the China based company TiMiTech,
which is actually part of the Chinese Academy of Broadcasting science. STiMi
is actually a hybrid Mobile TV technology which utilizes both satellite and
terrestrial broadcast to ensure optimal coverage. As such, STiMi is
considered to be a Fill In service, whereby the predominant delivery
mechanism is satellite which is complimented by terrestrial broadcast in
areas of poor coverage.
STM - Synchronous
Transport Module
The basic transport frame of an SDH network, operating at
a minimum of 155Mbps (STM-1). The payload of an STM-1 frame can vary,
supporting potentially 63 E1 trunks, a combination of E1 to E3 bearers, a
single E4 trunk or alternatively IP data. The STM-1 frame is comprised of
Overhead blocks, Payload blocks (Virtual Containers) and Pointers, the ratio
of each depending on the initial payload to be transported. STM-1 can be
multiplexed to create higher order STM, for example an STM-4 would be 4 x
STM-1 and an STM-16 would be 4 x STM-4. SDH (Synchronous Digital Hierarchy)
uses the following STM (Synchronous Transport Modules) and rates: STM-1
(155Mbps), STM-4 (622Mbps), STM-16 (2.5Gbps), and STM-64 (10Gbps).
STM-1 - Synchronous
Transfer Module 1
The lowest data rate for an SDH system, operating at
155Mbps.
STN-SR - Session
Transfer Number for SRVCC
A routing number used to identify an SCC AS or ATCF as
part of and SR-VCC handover procedure.
Store-and-forward
Communications systems in which messages are received at
intermediate routing points and stored, and then transmitted, to the next
routing point or to the ultimate recipient.
STP - Shielded
Twisted Pair
A term used to describe a twisted pair cable which has a
protective radiation screen to reduce outside interference.
STP - Signalling
Transfer Point
In a common channel signalling network a STP (Signalling
Transfer Point) provides for the transfer of signalling messages from one SL
(Signalling Link) to another.
STR - Session
Termination Request
This Diameter message is used to tear down an ongoing
session. For example, upon detection of the SIP BYE and 200 OK, the P-CSCF
will send the STR message to the PCRF in order to ensure the Dedicated EPS
Bearer is removed in the LTE network.
Stream Cipher
A Stream Cipher is a symmetric or secret-key encryption
algorithm that encrypts a single bit at a time. With a Stream Cipher, the
same plaintext bit or byte will encrypt to a different bit or byte every time
it is encrypted (the plaintext bit/byte can also, of course, be encrypted to
the same value).
STS - Space
Time Spreading
A method by which all forward link channel symbols are
transmitted on multiple antennas.
STUN - Simple
Traversal of UDP through Network Address Translation
STUN is an IETF (Internet Engineering Task Force) based
protocol defined in RFC 3489. STUN is used as a mechanism when overcoming the
problem of NAT (Network Address Translation) traversal for protocols such as
SIP (Session Initiation Protocol).
SU-MIMO - Single
User – MIMO
This is a MIMO term relating to how the data is
transmitted. SU-MIMO, as it’s name suggests, defines a single user being
scheduled, i.e. maximizing the data rate. In contrast, MU-MIMO (Multi-User
MIMO) shares the resources to support more users.
SUA - SCCP User
Adaptation
SUA enables the transport of any native SCCP (Signalling
Connection and Control Part) user signalling such as TCAP (Transaction
Capabilities Application Part) or RANAP (Radio Access Network Application
Part). Like SCCP it provides the user with both connectionless and connection
orientated services as well as network management functionality. SUA like the
other adaptation layers requires the services of SCTP (Streaming Control
Transmission Protocol) to provide reliable transfer of user messages.
Sublayer
The term Sublayer identifies a protocol layer that
resides within another protocol layer or sublayer.
Subnet address
The Subnet address is an extension that allows users in a
network to use a single IP network address for multiple physical subnetworks.
Subscribed QoS
In GPRS and UMTS , the network will not grant a QoS
(Quality of Service) greater than that to which the user has subscribed. The
QoS profile subscription parameters are held in the HLR (Home Location
register) and forwarded to the SGSN (Serving GPRS Support Node).
Subscriber
A person who is party to a contract with the provider of
public telecommunication services.
Superframe
A hierarchical number used to indicate multiple radio
frames. It is used by the mobile to ascertain where control and traffic
channels may appear on the radio interface.
Supplemental Channel
An optional portion of a Forward and Reverse Traffic
channel which operates with the Fundamental Channel to provide higher data
rate services.
Supplemental Code Channel
An optional portion of a Forward and Reverse Traffic
Channel which operates with the Fundamental Channel to provide higher data
rate services. The Supplemental Channel is transmitted on the Forward or
Reverse CDMA Channel. This channel allows a combination of primary data,
secondary data, or both (not signaling information) to be transmitted.
Surface wave
A wave that is guided along the interface between two
different media or by a refractive index gradient.
Surface Web
The Surface Web equates to approximately 3% of the World
Wide Web and can be described as the part of the Web that is indexed and
referenced by search engines and freely accessible via a web browser. In
other words, websites of the Surface Web do not require a username/password
in order to access the site.
SVC - Switched
Virtual Circuit
A generic term for any switched communications medium. In
a network, a SVC (Switched Virtual Circuit) is a temporary virtual circuit
that is established and maintained only for the duration of a data transfer
session.
Switch - PSTN
Telephony Switch
PSTN Switches were originally introduced to improve
efficiency of the telephony network and negate the requirement for every
telephone in the network to be directly connected through dedicated
connections. They enable the establishment and termination of voice calls to
be enabled with networks external to the PSTN, e.g. in mobile networks the
PSTN Switch will connect to the GMSC.
SwMI - Switching
and Management Infrastructure
In a TETRA system, the SwMI includes the base stations,
switches and controllers. A TETRA mobile registers and communicates with the
SwMI.
SWP - Single
Wire Protocol
Defined by ETSI , the SWP is a bit orientated
point-to-point communication protocol that exists between the NFC device and
a SIM. It operates in full duplex mode by transmitting two signals S1 and S2
in the voltage and current domain respectively.
Sxa Interface
The Sxa interface carries signalling information between
the SGW-C (Serving Gateway Control plane function) and the SGW-U (Serving
Gateway User plane function) to control the functionality of the SGW-U.
Sxb Interface
The Sxb interface carries signalling information between
the PGW-C (PDN Gateway Control plane function) and the PGW-U (PDN Gateway
User plane function) to control the functionality of the PGW-U.
Sxc Interface
The Sxc interface carries signalling information between
the TDF-C (Traffic Detection Function Control plane function) and the TDF-U
(Traffic Detection Function User plane function) to control the functionality
of the TDF-U.
Sync Channel
Sync Channel Identified as code channel 32 in the Forward
CDMA Channel which transports the synchronization message to the MS (Mobile
Station).
Sync Channel Superframe
Sync Channel Superframe Identifies an 80ms interval which
consists of three Sync Channel frames, each 26.66ms in length.
Synchronization
A state of simultaneous occurrences of significant
instants among two or more signals.
Synchronization Code
In digital systems, a sequence of bits introduced into a
transmitted signal to achieve or maintain synchronization.
Synchronous Transmission
Digital transmission in which the time interval between
any two similar significant instants in the overall bit stream is always an
integral number of unit intervals.
System
A system is a fixed, cellular or wireless communications
service that covers a geographic area.
System Area
The System Area is defined as the area accessible to the
mobile. Interworking of several networks enables the mobile to access
visiting networks and thus increases the system area.
T
Carrier
North American term for
the TDM (Time Division Multiplexing) digital transmission hierarchy. Includes
T1 – 1.544Mbps, T1-C – 3.152Mbps, T2 – 6.312Mbps, T3 – 44.736Mbps, T4 –
274.176Mbps.
T Interface
For basic rate access in an ISDN (Integrated Services
Digital Network) environment, a user to network interface reference point
that is characterized by a four wire, 144Kbps (2B+D) user rate.
T-ADS - Terminating
Access Domain Selection
Term given to the process which takes place at an SCC-AS
to determine whether or not MT call signalling should be sent to the PS or CS
domain in order to contact the called party.
T-BCSM - Terminating
Basic Call State Model
A term used in an IN (Intelligent Networks) it identifies
the terminating half of the BCSM (Basic Call State Model).
T-CSI - Terminating –
CAMEL Subscription Information
CAMEL operation requires additional CSI (CAMEL
Subscription Information) to be included as part of a mobile subscriber’s
subscription information in the HLR. This will be forwarded to the
appropriate VLR when the mobile attaches and moves around the network. There
are two types of CSI these are O-CSI (Originating – CAMEL Subscription
Information) and T-CSI (Terminating – CAMEL Subscription Information). The
later phases of CAMEL include many variations of CSI.
T-DMB - Digital
Multimedia Broadcasting (Terrestrial)
T-DMB (Terrestrial) is a Mobile TV technology, developed
in Korea from the European Eureka 147 DAB (Digital Audio Broadcasting)
standard (Satellite DMB is also available but is a completely different
technology). T-DMB relies on DAB technology at the physical layer, using OFDM
for transmission. Like DVB-H , T-DMB uses MPEG-2 -TS (MPEG-2 Transport
Stream) to carry audio and video. However, where DVB-H encapsulates media
using IP, T-DMB encodes audio and video using MPEG-4 and sends the encoded
data directly to the MPEG-2-TS layer.
TA - Terminal Adapter
An interfacing device employed at the R reference point
in an ISDN environment that allows connection of a non ISDN terminal at the
physical layer to communicate with an ISDN network.
TA - Timing Advance
In order to get TDMA (Time Division Multiple Access)
schemes to work, the time-frames from each mobile must be synchronized when
received by a base station. This synchronization is achieved by using the
concept of TA (Timing Advance). The degree of synchronization is measured by
the base station on the uplink, by checking the position of the TSC (Training
Sequence Code). This training sequence is mandatory in all frames transmitted
from the mobile. From these measurements, the base station can calculate the
TA and send this information to the mobile.
TA - Tracking Area
Am area of LTE radio coverage which is comprised of a
collection of LTE cells. If an LTE mobile is in an idle state, its current TA
should be known to the MME (or TAI List, if in use).
TAC - Tracking Area Code
An element of the TAI which serves to uniquely identify
the Tracking Area.
TAC - Type Approval Code
Type Approval Code is the first six digits of the IMEI
(International Mobile Equipment identity). This code identifies the country
in which type approval was sought for the phone, and the approval number. The
first two digits of the TAC represent the country of approval.
TACS - Total Access
Communication System
A cellular mobile telephone standard originally used in
the UK. TACS operated on the 900MHz frequency band.
TAD - Traffic Aggregate
Description
The Traffic Aggregate Description specifies the
aggregation of one or more packet filters and includes their related
parameters. The TAD is utilised by a mobile device within the LTE network in
order to inform the network of the packet filters to be used for traffic
mapping to the correct EPS bearer contexts. The TAD is created in the same
format as the TFT and can be seen in the Bearer Resource Allocation Request
or Bearer Resource Modification Request messages.
TADIG - Transferred
Account Data Interchange Group
TADIG is the group responsible for ensuring that billing
for roaming is correctly conducted within mobile networks.
TAI - Timing Advance
Index
The MS (Mobile Station) performing uplink or downlink
packet transfer, will receive a packet uplink or downlink assignment message.
This message will contain the MS assigned TAI and the PTCCH (Packet Timing
Control Channel). The TAI specifies which PTCCH subchannel is to be used by
the MS.
TAI - Tracking Area
Identity
The Tracking Area identity is the identity used to
identify tracking areas. The Tracking Area Identity is constructed from the
MCC (Mobile Country Code), MNC (Mobile Network Code) and TAC (Tracking Area
Code).
Tails
Functioning as a Linux Live distribution, Tails is a
standalone operating system which features a variety of tools to assist with
anonymity. This includes mandatory use of Tor for anonymous web browsing, as
well as applications to secure instant messaging, provide file encryption and
protect against keystroke logging, amongst many others.
TALI - Transport Adapter
Layer Interface
Part of SIGTRAN (Signalling Transport) the TALI
(Transport Adapter Layer Interface) is the proposed interface which provides
TCAP (Transaction Capability Application Part) ISUP (ISDN User Part) and MTP
(Message Transport Protocol) messaging over TCP/IP.
Talktime
The length of time a phone can be used to engage in a
conversation. Usually stated in minutes.
TAP3 - Transferred
Account Procedure v3
The TAP standard from the GSM Association enables service
providers to exchange billing information on roamed subscribers.
Target Base Station
A Target BS (Base Station) is a term used to identify any
BS (Base Station), excluding the Source BS (Base Station), that supports a
call.
Tariff
The set of charges that apply depending to a specific
call plan.
TAS - Telephony
Application Server
The TAS which is used within the IMS to facilitate VoLTE
call establishment procedures, as well as support supplementary services such
as Calling Party ID, Call Transfer and Call Barring.
TAU - Tracking Area
Update
The LTE UE detects a change to a new TA (Tracking Area)
by decoding the TAI (Tracking Area Identity) broadcast on the serving cell
that it has just selected. This is done by comparing this value with the list
of TAI that the UE has registered in the network. The TAU procedure is
performed due to a variety of reasons, such as TA updating, combined TA/LA
updating, combined TA/LA updating with IMSI attach and periodic updating.
TB - Terabyte
A terabyte is a measure of computer storage capacity and
is 240 bytes or approximately a thousand billion bytes / a thousand
gigabytes.
TBCP - Talk Burst Control
Protocol
TBCP as defined by the OMA (Open Mobile Alliance) uses
the application extension features of RTCP (RTP Control Protocol) in order to
invoke floor control within the POC (Push to talk Over Cellular) environment.
Typical messages include: Talk Burst Granted, Talk Burst Request Message,
Talk Burst Deny Message, Talk Burst Release Message, Talk Burst Taken, Talk
Burst Idle.
TBF - Temporary Block
Flow
A Temporary Block Flow is a physical connection used by
the two RR (Radio Resource) entities to support the unidirectional transfer
of LLC (Logical Link Control) PDU (Protocol Data Unit) on packet data
physical channels. A TBF is temporary and is maintained only for the duration
of the data transfer, i.e. until there are no more RLC (Radio Link Control) /
MAC (Medium Access Control) blocks to be transmitted.
TBS - Transport Block Set
The Transport Block is defined as a set of Transport
Blocks, which are exchanged between MAC and L1 at the same time instance
using the same transport channel. A high rate transport channel carries more
information and therefore potentially carries more transport blocks.
TCAP - Transaction
Capabilities Application Part
TCAP is an SS7 protocol which is designed to facilitate
the establishment of dialogues between SS7 nodes in the network. These
dialogues allow physical nodes running separate subsystems to communicate
directly with one another, providing a multiplexing/demultiplexing service
akin to UDP, TCP etc. For example, a single node may be running MAP (Mobile
Application Part) and CAP (CAMEL Application Part) as separate subsystems.
Two separate TCAP dialogues can be established to the same physical node,
with the traffic for each subsystem separated by the appropriate dialogue.
TCH/F - Traffic Channel
Full Rate
The Full Rate channel in GSM is identified as a 22.8Kbps
gross bit rate channel. This channel is bidirectional enabling the transfer
of speech or circuit switched data. Signalling associated with this traffic
channel will be carried on either the SACCH (Slow Associated Control Channel)
or the FACCH (Fast Associated Control Channel). The latest releases of GSM
include EDGE (Enhanced Data rates for Global Evolution) functionality which
increases the gross rate.
TCLAS - Traffic
Classification
The term TCLAS is used in wireless networks supporting
the IEEE 802.11e Quality of Service enhancement. This optional information
element contains a set of parameters to identify incoming frames with a
particular traffic stream and is thus linked to a particular TSPEC.
TCP - Transmission
Control Protocol
TCP is a Transport Layer protocol which provides
reliable, sequential delivery of higher layer application data. This is
achieved through a segmentation process, whereby the transmission and
reception of segments is monitored in order to detect and resend dropped
packets. TCP also adds port addressing for multiplexing/demultiplexing of
higher layer applications towards the same destination IP address.
TCP/IP - Transmission
Control Protocol/Internet Protocol
The TCP/IP Suite includes, but is not limited to,
protocols such as TCP (Transmission Control Protocol), IP (Internet
Protocol), UDP (User Datagram Protocol), ICMP (Internet Control Message
Protocol), FTP (file Transfer Protocol, and SMTP (Simple Mail Transfer
Protocol).
TCS - Telephony Control
protocol Specification
The Bluetooth Telephony Control protocol Specification
defines call related signalling between devices (establishment of speech and
data calls). It also controls the device mobility management procedures.
TCTF - Target Channel
Type Field
The UMTS air interface uses the Target Channel Type Field
to provide identification of the logical channel class on the FACH (Forward
Access Channel) and RACH (Random Access Channel) transport channels. TCTF
indicates if BCCH (Broadcast Control Channel), CCCH (Common Control Channel),
CTCH (Common Traffic Channel), SHCCH (Shared Channel Control Channel) or
dedicated logical channel information is being transported.
TD-CDMA - Time Division
UMTS TDD (Time Division Duplex) mode operates in the
unpaired portion of the 3G spectrum. TDD uses a combined time division and
CDMA scheme called TD-CDMA.
TDD - Time Division
Duplex
In a Time Division Duplex system a common carrier is
shared between the uplink and downlink, the resource being switched in time.
Users are allocated one or more timeslots for uplink and downlink
transmission. The main advantage of TDD operation is that it allows
asymmetric flow which is more suited to data transmission.
TDF-C - Traffic Detection
Function Control plane function
The TDF-C controls the functionality performed by the
assigned TDF-U (Traffic Detection Function User plane function) when control
and user plane separation is in place. It is responsible for selecting and
controlling the TDF-U which will be conducted based upon PCC (Policy and
Charging Control) rules, in order to perform application detection and
reporting of detected application and the associated service data flow
descriptions to the PCRF (Policy Charging and Rules Function).
TDF-U - Traffic Detection
Function User plane function
The TDF-U is located at the ingress and egress point to a
PDN (Packet Data Network) such as the Internet when control and user plane
separation is in place. Under the control of a TDF-C (Traffic Detection
Function Control plane function) the TDF-U assists with bearer and APN
(Access Point Name) policing, service data flow traffic detection,
application detection, deep packet inspection and event reporting.
TDM - Time-Division
Multiplexing
Digital Multiplexing technique in which two or more
apparently simultaneous channels can be combined to form a bit stream by
interleaving bits or bit words from different channels.
TDMA - Time-Division
Multiple Access
A communications technique that uses a common channel for
communications among multiple users by allocating each a unique time slot.
TDOA - Time Difference On
Arrival
TDOA is a technique used in mobile networks to allow the
network to obtain location information for a particular subscriber. The
technique is often used to support the stringent location accuracy
requirements associated with E911, which mandate that the network is able to
identify the location of a subscriber to a specific degree of accuracy. TDOA
bases its measurements on the time it takes for a radio signal to propagate
between the mobile phone and the cell site. Receivers at the cell site termed
LMUs (Location Measurement Units) will take the time measurements which can
then be turned into an estimated distance. Providing the service provider has
the measurements from several different cell sites surrounding the subscriber
(three or more), a technique termed multilateration can be used to pinpoint
the location to within an accuracy of approximately 50m (although this figure
can vary).
TDP - Trigger Detection
Point
There are two ways in which a DP may be armed. These are:
Statically – a statically armed DP is known as a TDP (Trigger Detection
Point) this is always armed within the BCSM. Dynamically – a dynamically
armed DP is known as an EDP (Event Detection Point). This will be armed by
the SCF (Service Control Function) within the context of an IN service.
TE - Traffic Engineering
TE refers to the practice of engineering routes through
typically IP based networks which are designed to cater for particular types
of traffic. For example, real time traffic will require a route through a
network which utilizes low latency links, therefore TE would allow that route
to be pre-established prior to the traffic passing through the network.
TE - Transit Exchange
A Transit Exchange unlike a LE (Local Exchange), does not
have subscribers connected to it and therefore does not act as a source or
sink for traffic in the network. It only collects and redirects the
TE-LSP - Traffic
Engineered Label Switched Path
TE-LSP is a term used in MPLS to describe a preconfigured
LSP whose characteristics for latency, induced jitter, number of hops etc
match the criteria to successfully support a particular traffic type.
TEI - Terminal Endpoint
Identifier
A unique identifier given to each device or terminal on
an ISDN S or T interface.
TEID - Tunnel Endpoint
Identifier
The TEID unambiguously identifies a tunnel endpoint in
the receiving GTP-U (GPRS Tunnelling Protocol – User) or GTP-C (GPRS
Tunnelling Protocol – Control) protocol entity. The receiving side of a GTP
tunnel locally assigns the TEID value for the transmitting side to use. The
TEID values are exchanged between tunnel endpoints using GTP-C messages (or
RANAP (Radio Access Network Application Part) in the UTRAN (UMTS terrestrial
Radio Access Network)).
Telecommunication
Any transmission, emission, or reception of signs,
signals, writing, images and sounds or intelligence of any nature by wire,
radio, optical or other electromagnetic systems.
Telecommunication service
Service offered by a network or service provider to its
customers in order to satisfy a specific telecommunication requirement.
Telecommunication services are divided into two broad families: bearer
services and teleservices.
Telecommunications
network
Transmission systems and, where applicable, switching
equipment and other resources which permit the conveyance of signals between
defined termination points by wire, radio, optical or other electromagnetic
means.
Teleconference
The live exchange of information among persons and
machines remote from one another but linked by a telecommunications system.
Telemetry
The use of telecommunication for automatically indicating
or recording measurements such as stock levels, weather, and road traffic
information.
Telephone
A user end instrument that is used to transmit and
receive voice frequency signals.
Telephone number
The unique network address that is assigned to a
telephone user, i.e., subscriber, for routing telephone calls.
Telephony
A form of telecommunication set up for the transmission
of speech or, in some cases, other sounds.
Teleservice
The type of telecommunication service that provides the
complete capability, including terminal equipment functions, for
communication. Examples of a teleservice include speech, fax etc.
Telnet
Telnet is a protocol to enable access to remote hosts,
assuming relevant permissions have been granted. Telnet allows remote log on
with whatever privileges may have been granted to the specific application
and data on that host.
TEMPORARY_OFFSET
This specifies the offset applied to the H and R criteria
for a neighbouring cell for the duration of PENALTY_TIME.
Terminal portability
The ability for customers to transfer their terminal
apparatus (e.g. a telephone) to another public network without any loss of
interoperability.
Terrestrial Radio
Communication
Any radio communication other than space radio
communication or radio astronomy.
TETRA - Terrestrial
Trunked Radio
An open digital trunked radio standard defined by ETSI (
European Telecommunications Standards Institute ).It is currently being used
by the emergency services to replace existing PMR (Private Mobile Radio)
systems.
TFC - Transport Format
Combination
The physical layer multiplexes one or several Transport
Channels onto a Coded Composite Transport Channel. These Transport Channels
each have defined transport formats (maybe from a Transport Format Set) which
are applicable. However, at a given point of time, not all combinations of
transport channels and their associated formats are permitted, hence a subset
is defined. The Transport Format Combination is one of the subset, which
identifies the transport channels with their chosen format that will make up
the Coded Composite Transport Channel.
TFCI - Transport Format
Combination Indicator
This is a representation of the current TFC (Transport
Format Combination) being used. The TFCI is transferred across the air
interface and allows the receiving layers to identify the current valid
Transport Format Combination and hence, how to decode, de-multiplex and
deliver the received data on the appropriate Transport Channels.
TFCS - Transport Format
Combination Set
The Transport Format Combination Set is defined as a set
of Transport Format Combinations on a Coded Composite Transport Channel.
TFI - Temporary Flow
Identity
Each TBF (Temporary Block Flow) is assigned a TFI
(Temporary Flow Identity) by the network. The mobile station shall assume
that the TFI value is unique among concurrent TBF in the same direction
(uplink or downlink) on all PDCH (Packet Data Channel) used for the TBF.
TFI - Transport Format
Indicator
The Transport Format Indicator indicates the local UMTS
air interface transport format to be used for the transmission time interval.
TFO - Tandem Free
Operation
Tandem Free Operation is the configuration of a
connection with two transcoders that support the TFO protocol and whose
external coding schemes are compatible, thus enabling compressed speech to
pass between them.
TFRI - Transport Format
and Resource Indicator
This includes information about the dynamic part of the
HS-DSCH transport format, including transport block set size and modulation
scheme. The TFRI also includes information about the set of channelization
codes onto which HS-DSCH is mapped in the corresponding HS-DSCH transmission.
The number of bits defined are: – Channelization-code set -7 bits. –
Modulation scheme – 1 bit. – Transport-block size – 6 bits.
TFS - Transport Format
Set
The Transport Format Set is the set of different
Transport Formats associated to a Transport Channel.
TFT – GPRS - Traffic Flow
Template (GPRS)
The Traffic Flow Template is used by GGSN (Gateway GPRS
Support Node) to discriminate between different user payloads. The TFT
incorporates packet filters such as QoS (Quality of Service), PDP Context and
security. Using the packet filters the GGSN maps the incoming datagrams into
the correct PDP Context. Note: The use of a TFT allows multiple PDP contexts
to be associated with the same PDP address.
TFT – LTE - Traffic Flow
Template (LTE)
In LTE, TFTs are installed at the mobile and at the P-GW
in order to determine if a particular traffic stream needs to traverse a
particular EPS bearer. As such, when a Dedicated EPS bearer is established,
an uplink TFT is installed at the handset and a downlink TFT is installed at
the P-GW. The TFT itself contains packet filters which are based on potential
packet characteristics such as IP address and port.
TFTP - Trivial File
Transfer Protocol
An Internet software utility for transferring files that
is simpler to use than the FTP (File Transfer Protocol) but less capable. It
is used where user authentication and directory visibility are not required.
TFTP - Trivial File
Transfer Protocol
An Internet software utility for transferring files that
is simpler to use than the FTP (File Transfer Protocol) but less capable. It
is used where user authentication and directory visibility are not required.
TGRP - Transmission Gap
Repetition Period
In E-UTRA a mobile may require a measurement gap in order
to monitor neighbouring Inter-RAT or Inter Frequency cells. The TGRP is one
of many parameters which is used by the eNB to schedule the measurement gap.
Thermal noise
The noise generated by thermal agitation of electrons in
a conductor. The noise power, P, in watts, is given by P = kTB , where k is
Boltzmann’s constant in joules per kelvin, T is the conductor temperature in
kelvins, and B is the bandwidth in Hertz.
Thermal radiation
Electromagnetic radiations emitted from a heat or light
source as a consequence of its temperature; it consists essentially of
ultraviolet, visible, and infrared radiation.
THF - Tremendously High
Frequency
Frequencies from 300GHz to 3000GHz.
THIG - Topology Hiding
Inter-working Gateway
Signalling emanating from the home IMS (IP Multimedia
Subsystem) may be protected through topology hiding. This increases the
robustness of the IMS in terms of security. Since functions outside the trust
domain of the home IMS have no view of the URI (Uniform Resource Identifiers)
that are used to address functions such as the S-CSCF (Serving – Call Session
Control Function) or MGCF (Media Gateway Control Functions). The basic
process in which topology hiding is implemented is through the encryption of any
URI that relates to functions within the home IMS, in SIP signalling messages
leaving the network. These include: Via – used to route responses relating to
a specific request; Route – indicating the path subsequent signalling
messages should take; Record Route – a list of SIP agents that have proxied
the specific message.
Throughput
The number of bits, characters, or blocks passing through
a data communication system, or portion of that system in a given time.
THz - Terahertz
A unit denoting one trillion Hertz.
TI - Transaction
Identifier
A transaction identifier is used to distinguish multiple
bidirectional message flows for a given users connection and a given SAP
(Service Access Point). Such a message flow is called a transaction.
TIA - Telecommunications
Industry Association.
A trade group representing manufacturers and suppliers of
communications and information technology products. TIA is a standards
developing organization accredited by ANSI (American National Standards
Institute).
TID - Tunnel Identifier
In GPRS Release 97 the TID field unambiguously identifies
a tunnel between a GGSN (Gateway GPRS Support Node) and a SGSN (Serving GPRS
Support Node). The TID field includes the NSAPI (Network Service Access Point
Identifier) and IMSI (International Mobile Subscriber Identity) values.
TIM - Traffic Indication
Map
The TIM can be defined as an information element found
within an IEEE (Institute of Electrical and Electronics Engineers) 802.11
Beacon Message. It is used by networks supporting the Power Save Poll
procedure and includes a bitmap reference specific stations for which data is
being held at the AP (Access Point).
Time diversity
Transmission in which signals representing the same
information are sent over the same channel at different times.
Timer Based Registration
A method by which the MS (Mobile Station) will register
whenever a counter reaches a defined value. The counter is incremented every
80ms. The smaller the counter, the more regular the registrations, however
this impacts on the mobile’s battery life.
Timing Offset
The delay of the received signal relative to the expected
signal from a MS (Mobile Station) at zero distance under static channel
conditions with zero timing advance. For example, for a mobile with a round
trip propagation delay of P symbols, but with a timing advance of T symbols,
the reported timing offset will be P-T quantized to the nearest symbol. For
GPRS the mobile timing offset is not reported.
TIN - Temporary ID used
in Next update
In E-UTRA the UE may have valid parameters from both the
MME (Mobility Management Entity) and from SGSN (Serving GPRS Support Node).
This parameter identifies the UE identity to be indicated in the next Routing
Area Update Request or Tracking Area Update Request message.
TIP - Terminating
Identification Presentation
TIP is a supplementary service associated with the 3GPP’s
MMTel service framework. When TIP is active, the Calling Party will receive
identification information relative to the Called Party once the IMS
communication has been accepted by both parties.
TIPHON -
Telecommunications and Internet Protocol Harmonization Over Networks
TIPHON was an initiative put forward by ETSI , designed
to support a market for voice communication and related multimedia aspects
between users of IP based networks and users of circuit switched networks.
TIPHON was replaced in 2003 by the TISPAN initiative.
TISPAN -
Telecommunications and Internet converged Services and Protocols for Advanced
Networks
TISPAN is an ETSI (European Telecommunications Standards
Institute) initiative which is tasked with developing standards for next
generation telecommunications networks, particularly with respect to fixed
line IP based access networks. As such, TISPAN employs the 3GPP IMS (IP
Multimedia Subsystem) core architecture and a fixed line IP-CAN (with DSL the
prime example). Key functions of the TISPAN architecture include the RACS
(Resource and Admission Control Subsystem) and NASS (Network Attachment Sub
System).
TKIP - Temporal Key
Integrity Protocol
This is a security protocol used within the IEEE 802.11i
specifications for WiFi networks. TKIP introduces a sophisticated key
generation function which encrypts every data packet sent over the wireless
medium (air interface) with its own unique encryption key. This increases the
complexity of decoding the keys by reducing the amount of data available to
the hacker, that has been encrypted using a particular key.
TLD - Top Level Domain
A Top Level Domain describes the tier of domain names
after the root. There are two different types of TLD, the gTLD and the ccTLD.
gTLD stands for generic Top Level Domain, and ccTLD stands for country code
Top Level Domain. Examples include. com ,.org, and.net. etc.
TLLI - Temporary Logical
Link Identifier
The Temporary Logical Link Identifier provides a
signalling address for communication between the MS (Mobile Station) and the
SGSN (Serving GPRS Support Node). Three main types of TLLI exist: Local TLLI
– used under normal operation between the mobile and the serving SGSN;
Foreign TLLI – may be used when crossing a RA (Routing Area) boundary; Random
TLLI – used for initial access or when the mobile does not possess one of the
above.
TLS - Transport Layer
Security
TLS (Transport Layer Security) is a protocol such as SSL
(Secure Sockets Layer) that normally provides confidentiality,
authentication, and integrity for stream-like connections such as those
provided by TCP (Transmission Control Protocol). It is typically used to
secure HTTP (Hypertext Transport Protocol) connections and has been
standardized by the IETF (internet Engineering Task Force).
TLV - Tag Length Value
TLV is a format for holding information within a data
communication protocol.
TME - Transfer Mode
Entity
In UMTS the Transfer Mode Entity handles the mapping
between the different entities inside the RRC (Radio Resource Control) layer
and the SAP (Service Access Points) provided by RLC (Radio Link Control).
TMGI - Temporary Mobile
Group Identity
The TMGI is a radio resource efficient mechanism for
identifying an MBMS Bearer Service (as opposed to using the IP Multicast
Address and Access Point Name). Initially allocated by the BM-SC (Broadcast
Multicast Service Center), the TMGI for a specific MBMS multicast service is
provided to the mobile during the MBMS Multicast Service Activation
procedure.
TMN - Telecommunications
Management Network
A management network that interfaces with a
telecommunications network at several points in order to receive information
from, and to control the operation of, the telecommunications network.
TMSI - Temporary Mobile
Subscriber Identity
In order to ensure subscriber identity confidentiality
the VLR (Visitor Location Register) and SGSN (Serving GPRS Support Node) may
allocate TMSI (Temporary Mobile Subscriber Identities) to visiting mobile
subscribers. The VLR and SGSN must be capable of correlating an allocated
TMSI with the IMSI (International Mobile Subscriber Identity) of the MS
(Mobile Station) to which it is allocated. A MS may be allocated two TMSI,
one for services provided through the VLR, and the other known as the P-TMSI
(Packet TMSI) for services provided through the SGSN.
TMSI Zone
TMSI Zone The TMSI Zone Identifies an area in which the
TMSI parameter is unique
TNA - Trusted Node
Authentication
TNA is an IMS authentication mechanism which allows a
trusted node to register/authenticate a user that has connected via the
circuit switched domain. As such, the MSC (Mobile Switching Centre) would be
a good example of a trusted node.
TOA - Time Of Arrival
The reference point for signal arrival time, TOA (Time Of
Arrival) is defined as the start point of a time slot. Used for LCS (LoCation
Services), and similar to E-OTD (Enhanced – Observed Time Difference) in that
the time difference of the signal arriving at different base stations is used
to calculate the location of a mobile device. The difference between TOA and
E-OTD is that no overlay network is needed for TOA. Mobile networks currently
do not employ these procedures; instead cells are synchronized using a common
timing reference.
Token Ring
A computer network configuration in which all the
computers are arranged on a ring. A token, which is a special bit pattern,
travels around the ring. To send a message, the host must be in receipt of
the token; this is attached to each message that is sent. Once the host has
completed its transmission the token is then released, to the next host
requiring service. This process continues and is used as the basis for
contention resolution.
Toll office
A central office used primarily for supervising and
switching toll traffic.
Toll quality
Toll quality is the term normally given to commercially
available voice services.
Tor
Initially known as “The Onion Router”, Tor is an Internet
based overlay network of Tor Relays which work together in order to provide
web anonymity for Tor users. In essence, the Tor network will use several
layers of encryption in order to obfuscate the origin of the web traffic,
hence keeping the source IP address of the Tor user secret. Tor also supports
“Tor Hidden Services”, which are websites only accessible from the Tor
network. Tor hidden services use the Tor network to keep the origin of the website
secret, hence making it difficult for law enforcement/government to shut
illegal/censored websites down.
ToS - Type of Service
The IP (Internet Protocol) uses the ToS (Type of Service)
field to provide an indication of the quality of service desired. These
parameters are to be used to guide the selection of the actual service
parameters when transmitting an IP datagram through a particular network. The
type of service filed in some cases has been renamed the DSCP (DiffServ Code
Point).
TPC - Transmit Power
Control
The UE (User Equipment) and Node B generate TPC (Transmit
Power Control) commands to control each others transmit power. This
information is sent in the TPC field of the DPCCH (Dedicated Physical Control
Channel). TPC commands are sent 1500 per second.
TPDU - Transfer Protocol
Data Unit
The payload of the SMS Transfer Protocol.
TR-069
This DSL Forum Technical Report defines an application
layer protocol which is used for remote configuration of terminal devices,
such as DSL modems, HNBs and STBs. Essentially, the standard came about due
to the growing complexity of CPE devices, effectively preventing typical
users from correctly configuring them. As such, TR-069 provides an auto
configuration mechanism between the CPE and a remote node in the service
provider network termed the Auto Configuration Server.
Traffic
The information moved over a communication channel.
Traffic capacity
The maximum traffic per unit of time that a given
telecommunications system, subsystem, or device can carry under specified
conditions.
Traffic Channel
A logical channel used for the transport of user data.
Traffic Class
The traffic class in UMTS identifies the type of
application for which the UMTS bearer service is optimized. Options include
conversational, streaming, interactive, and background.
Transceiver
A device that is capable of both transmission and
reception of a signal.
Transcoder
A Transcoder function is used to transform signals from
one type to another. Usually from 64Kbps PCM (Pulse Code Modulation) to
another compressed variant, and vice-versa.
Transcoding
The direct digital to digital conversion from one
encoding scheme, such as voice PCM (Pulse Code Modulation), to a different
encoding scheme without returning the signals to analogue form.
Transmission line
The material medium or structure that forms all or part
of a path from one place to another for directing the transmission of energy,
such as electric currents, magnetic fields, acoustic waves, or
electromagnetic waves. Transmission lines include wires, optical fibres,
coaxial cable and waveguides.
Transmission loss
The decrease in power that occurs during transmission
from one point to another. Transmission loss is usually expressed in dB
(Decibel) per metre.
Transmission medium
Transmission medium A substance, such as fibre-optic
cable, twisted-pair cable, coaxial cable, waveguide, water, and air, that can
be used for the propagation of signals.
Transmitted code power
Transmitted code power is the transmitted power on one
channelization code on one given scrambling code on one given carrier.
Transparent
A process that allows a transmission system to accept
user information and deliver the corresponding user information in an
unchanged form.
Transport Block Set Size
The Transport Block Set Size is defined as the number of
bits in a Transport Block Set.
Transport Channels
In UMTS the physical layer offers information transfer
services to MAC (Medium Access Control) and higher layers. The physical layer
transport services are described by how and with what characteristics data is
transferred over the radio interface. An adequate term for this is Transport
Channel.
Transport Format
Transport Format is defined as a combination of
attributes which include: error protection, timing, interleaving, bit rate
and mapping onto physical channels.
TRAU - Transcoder and
Rate Adaptation Unit
This is an entity that performs a transcoding function
for speech channels and RA (Rate Adaptation) for data channels.
Treselections
This specifies the cell reselection timer value in UMTS.
TrFO - Transcoder Free
Operation
This term is applicable to calls that have no transcoders
involved in the connection between the source codecs.
TrGW - Transition Gateway
The TrGW sits on the media path of any traffic entering
or leaving the service provider’s IMS network. The primary role of the TrGW
is to facilitate interworking between two different domains which may be
using different addressing schemes, codecs etc. The TrGW is controlled by the
IBCF (Interconnection Border Control Function).
Triband
A phone that is capable of operating on three frequency
bands, e.g. 900MHz, 1800MHz and 1900MHz.
Tributary office
A local office, located outside the exchange in which a
toll centre is located which has a different rate centre from its toll
centre.
TrM - Transparent Mode
In UMTS information may be transmitted across the Iu
interface in either TrM (Transparent Mode) or SMpSDU (Support Mode for
predefined SDU size mode) using the Iu Protocol. The transparent mode is
intended for those RAB (Radio Access Bearer) that do not require any
particular service from the Iu protocol.
Trojan Horse
This is a program that performs some undesired yet
intended action while or in addition to, pretending to do something else. One
common class of trojans are fake login programs for example, collecting
accounts and passwords by prompting for this info just like a normal login
program does. Another is a Disk Defragger that erases files rather than
reorganizing them. A Trojan Horse does not attempt to reproduce itself.
Troposphere
The lower layers of the atmosphere, in which the change
of temperature with height is relatively large. The thickness of the
troposphere varies with season and latitude. It is usually 15km to 18km thick
over tropical regions, and less than 9km thick over the poles.
Tropospheric scatter
Usually called Troposcatter, tropospheric scatter
identifies the propagation of radio waves by scattering as a result of
irregularities or discontinuities in the physical properties of the
troposphere
TRS - Transceiver
Subsystem
The term TRS (Transceiver Subsystem) is sometimes used to
identify a group of TRX (Transceivers) that belong to the same cell.
Trunk
A transmission channel between two points that are
switching centres or nodes. Trunks may be used to interconnect switches to
form networks.
TS - Timeslot
In a TDMA (Time Division Multiple Access) system the
carrier is split into multiple timeslots, the duration being dependant on the
technology. Each user is assigned one or more timeslots for communication
purposes.
TS - Traffic Stream
The term TS is used in wireless networks supporting the
IEEE 802.11e Quality of Service enhancement. It defines a particular
established Quality of Service flow in both the uplink and downlink.
TSC - Training Sequence
Code
Used mainly in TDMA (Time Division Multiple Access)
systems the training sequence is used to maintain timing and equalize the
channel. This helps reduce the impact of ISI (Inter Symbol Interference) and
multipath effects.
TSID - Traffic Stream
Identifier
This is a term used in IEEE (Institute of Electrical and
Electronics Engineers) 802.11 networks which are supporting the QoS (Quality
of Service) enhancements defined in the 802.11e standard. The term is used to
identify one of eight uplink and downlink traffic streams.
TSL - Transaction
SubLayer
TCAP (Transaction Capabilities Application Part)
comprises two protocol sublayers called the TSL (Transaction Sublayer) and
the CSL (Component Sublayer). The transaction sublayer is the lower TCAP
sublayer and defines two types of dialogues namely unstructured and
structured.
TSN - Time Sensitive
Networking
TSN (Time Sensitive Networking) is an IEEE specification
which can be deployed in industry to provide deterministic message transfer
over an Ethernet data network. TSN relies on a centrally managed system which
coordinates scheduling across all of the connected applications and processes
within the system to ensure that messages are delivered with the appropriate
latency and within the correct timeframe.
Tsp - Timer session
period
The Tsp is a variable used during the CAMEL Apply
Charging Process and is used to record the amount of session time that has
transpired between the sending of the Apply Charging Report sent by the SSF
and the subsequent Apply Charging message sent by the SCF.
TSPEC - Traffic
Specification
The term TSPEC is used in wireless networks supporting
the IEEE 802.11e Quality of Service enhancements, amongst other QoS capable
networks. It defines a series of parameters, characteristics and Quality of
Service expectations of a traffic flow.
TT - TSN Translator
TSN Translators are used when a 5G network is functioning
as a TSN (Time Sensitive Networking) Bridge. In particular, both the UE and
UPF (User Plane Function) will contained TSN TT functionality which allows
the 5G network components to interact with the remainder of the TSN
deployment.
TTA - Telecommunications
Technology Association
The Telecommunications Technology Association was founded
as a voluntary standards body and has established a total of 450 standards in
telecommunications fields. Its main aim is to enhance the Korean national
infrastructure of telecommunication systems.
TTG - Tunnel Termination
Gateway
The TTG is a logical element of the PDG, designed to
terminate IPSec tunnels between itself and the mobile residing on Untrusted
non-3GPP access (typically WiFi).
TTI - Transmission Time
Interval
This is defined as the inter-arrival time of TBS
(Transport Block Set), and is equal to the periodicity at which a Transport
Block Set is transferred by the physical layer on the radio interface. It is
always a multiple of the minimum interleaving period (e.g. 10ms, the length
of one RF (Radio Frame)). The MAC (Medium Access Control) delivers one
Transport Block Set to the physical layer every TTI.
TTL - Time To Live
Time To Live is a field in the IP header which indicates
how long a packet should be allowed to survive before it is discarded. TTL
essentially determines the maximum number of hops permitted.
Tunnelling
The generic telecommunication meaning of the term
tunnelling is to carry a PDU (Protocol Data Unit) inside a protocol of the
same type. An example is IP (Internet Protocol) tunnelling, in which IP is
carried inside IP. It is also used to describe the creation of an
encrypted/secured link over a public network.
TUP - Telephone User Part
Telephone User Part was an earlier implementation of SS7
that did not allow for data type applications hence the introduction of ISUP
(ISDN User Part).
Turbo Code
A powerful type of error correcting code that utilizes
the outputs of two convolutional coders.
TURN - Traversal of UDP
through Relay Network Address
TURN is used as a NAT (Network Address Translation)
mechanism which is similar in purpose to STUN (Simple Traversal of UDP
through NAT). However, TURN works when symmetrical NAT is in operation,
whereas STUN fails to operate in this situation.
TWAG - Trusted Wireless
Access Gateway
TWAGs enable mobiles to connect to a PDN-GW via a trusted
WiFi network. With Trusted Non-3GPP network access, the security of the WiFi
network is assured and as such the TWAG allows this to occur when no direct
connectivity is in place between the Trusted WiFi router and the PDN-GW.
TWAMP - Two Wire Active
Measurement Protocol
TWAMP is an open protocol defined in RFC 5357 which is
used to measure the network performance between two devices that support the
TWAMP protocol. It utilizes two protocols, TWAMP-Control and TWAMP-Test. In
addition, there are two variants, TWAMP and TWAMP Light. The TWAMP control
and reflector entities involved exchange packets as part of a session.
Reflected packets are timestamped, enabling performance of the network to be
measured.
TWAN - Trusted WLAN
Access Network
A type of non 3GPP access network which has a trust
relationship with the 3GPP core network.
TWAP - Trusted WLAN AAA
Proxy
For mobiles accessing the network via Trusted Non 3GPP
access eg trusted WiFi, the TWAP is required in order to support
authentication information acquisition from the HSS.
TX - Transmitter
The source or generator of any signal on a transmission
medium.
TXOP - Transmission
Opportunity
The term TXOP is used in wireless networks supporting the
IEEE 802.11e Quality of Service enhancement. Used in both EDCA and HCCA modes
of operation, the TXOP is a bounded time interval in which Stations
supporting Quality of Service are permitted to transfer a series of frames. A
TXOP is defined by a start time and a maximum duration.
Type field
The type field forms part of the IPv4 (IP version 4)
header, and is used to indicate the transport PDU (Protocol Data Unit) that
forms the payload of the datagram. This information is used to pass the PDU
through the correct SAP (Service Access Point) to the higher layer transport
protocol. The values of the type field that indicate the higher layer
protocol were listed until 1994 in RFC (Request for Comments) 1700, this has
now been superseded by an online database supported by the IANA. Typical
examples include 6 for TCP (Transmission Control Protocol) and 17 for UDP
(User Datagram Protocol).
U -
U (Unnumbered Information)
LLC (Logical Link
Control) U (Unnumbered Information) frames can be sent in both ADM
(Asynchronous Disconnected Mode) and ABM (Asynchronous Balanced Mode). There
is no acknowledgement of receipt of U frames.
U - U interface
A user to network interface reference point that is
characterized by the use of a 2 wire loop transmission system that conveys
information between the 4 wire user to network interface.
U-CSIU-CSI - USSD – CAMEL
Subscription Information
The U-CSI contains trigger information which is used to
invoke a USSD application in the CSE for CAMEL served subscribers.
U-RNTI - UTRAN Radio
Network Temporary Identifier
The UE (User Equipment) having an RRC (Radio Resource
Control) connection will be allocated a S-RNTI (Serving Radio Network
Temporary Identifier). The SRNC (Serving Radio Network Controller) identifier
together with S-RNTI is a unique identifier of the RRC connection within a
network. The combination of SRNC identifier and S-RNTI is referred to as
U-RNTI (UTRAN Radio Network Temporary Identifier), which is used on the radio
interface.
U/L - Uplink
The portion of a communications link used for the
transmission of signals from a mobile to a base station or satellite. An
uplink is the converse of a downlink. In some systems uplink is commonly
referred to as the Reverse direction and Downlink being the Forward
direction.
UA - Unnumbered
Acknowledgement
Unnumbered Acknowledgement encoding is used as a response
only. It is used to positively acknowledge a SABM (Set Asynchronous Balance
Mode) or a disconnect command.
UA Channel - User
Asynchronous data Channel
In Bluetooth the UA (User Asynchronous data) Channel is
used to carry L2CAP (Logical Link Control and Adaptation Protocol)
transparent asynchronous user data. It is usually carried on the ACL
(Asynchronous Connectionless link).
UAC - User Agent Client
This is a SIP (Session Initiation Protocol) term for a
function that performs client functionality. That is it generates a request
which in turn is serviced by the UAS (User Agent Server).
UAN - Universal Access
Number
This service allows a subscriber to publish a national
number and have the incoming calls routed to different destinations based on
various criteria such as the geographical location of the caller, the time of
day and the date on which the call is made.
UAPSD - Unscheduled
Automatic Power Save Delivery
The term U-APSD is used in wireless networks supporting
the IEEE 802.11e Quality of Service enhancement. It was introduced in order
to support power management in QBSS. In essence, it involves a QAP delivering
downlink frames which belong to a specified access class to power saving
Stations automatically. The Unscheduled variant is triggered by a Station
receiving either a Delivery or Trigger enabled frame from a particular access
class.
UARFCN - UMTS Absolute
Radio Frequency Channel Number
The carrier frequency is designated by the UTRA Absolute
Radio Frequency Channel Number. The value of the UARFCN in the IMT2000
(International Mobile Telephony 2000) band is defined as follows: Uplink
UARFCN (Nu) = 5 x Frequency (MHz) and Downlink UARFCN (Nd) = 5 x Frequency
(MHz).
UAS - User Agent Server
This is a SIP (Session Initiation Protocol) term for a
function that performs server functionality. That is it responds to a request
made by a SIP UAC (User Agent Client).
UDC - Unified Data
Convergence
UDC is a 3GPP initiative which seeks to rationalize the
databases found across the key mobile technologies such as 2G, 3G, 4G, 5G and
IMS. The general premise is that across these technologies, common subscriber
data is routinely stored and accessed. As such, this data can be stored in a
common backend database termed the UDR (Unified Data Repository). Entities
seeking to obtain specific information from this common database can use AFEs
(Application Front Ends) specific to their network. For example, a 4G MME
wishing to access a specific piece of subscriber data will utilize the 4G HSS
AFE.
UDI - Unrestricted
Digital Information
This is an ISDN (Integrated Services Digital Network)
term to describe the ability to transfer any bit pattern over a digital
channel.
UDM - Unified Data
Management
The Unified Data Management is related to the 3GPP 5G
Architecture. This supports the ARPF (Authentication Credential Repository
and Processing Function) and stores the long-term security credentials used
in authentication for AKA. In addition, it stores subscription information.
UDP - User Datagram
Protocol
UDP is a lightweight Transport Layer protocol, providing
source and destination port addressing for the multiplexing/demultiplexing of
higher layer applications onto the same transport bearer. Other than port
addressing, the UDP header contains a Length and a Checksum field, resulting
in a low transmission overhead, albeit at the cost of reliable delivery (UDP
does not provide a retransmission facility).
UDR - Unified Data
Repository
The UDR is a converged repository of subscriber
information and can be used to service a number of network functions. For
example, the 5G UDM (Unified Data Management) can use the UDR to store and
retrieve subscription data. Alternatively, the PCF (Policy Control Function)
can use the UDR to store and retrieve policy related data. From a CIoT
perspective, the NEF (Network Exposure Function) may use the UDR to store
subscriber related data that is permitted to be exposed to 3rd party
applications.
UDSF - Unstructured Data
Storage Function
In 5G, the UDSF supports data storage for stateless
network functions. That is, rather than a given network function holding its
own storage resources, it will instead store UE context data in the UDSF.
UDT - UNITDATA
The basic message of connectionless SCCP (Signalling
Connection Control Part) is the UDT (UNITDATA) message. When SCCP detects
that a destination for a message is prohibited the UDT can either be
discarded or returned to the originator as a UDTS (UNITDATA SERVICE).
UDTS - UNITDATA Service
This SCCP (Signalling Connection Control Part)
connectionless message is utilized when a UDT (UNITDATA) message is
undeliverable and the message originator has requested a delivery report.
UE - User Equipment
The UMTS Subscriber or UE (User Equipment) is a
combination of ME (Mobile Equipment) and SIM / USIM (Subscriber Identity
Module / UMTS Subscriber Identity Module).
UE-AMBR - UE – Aggregate
Maximum Bit Rate
In LTE, UE-AMBR is a bandwidth limitation applicable to
the total accumulated bandwidth for all of the non GBR bearers a mobile has
in place (across all PDN connections).
UE-PC5-AMBR - UE-PCF
Aggregate Maximum Bitrate
In LTE V2X, UE PC5 links are limited using UE-PC5-AMBR.
This limits the aggregated bit rate that can be expected with a peer device.
The UE-PC5-AMBR is obtained by the MME from the HSS and is part of the
subscription data. It is provided to the eNB for use in resource management
of the UE’s PC5 transmission for V2X services in network scheduled mode.
UG-CSI - USSD General –
CAMEL Subscription Information
The UG-CSI is held in the HLR and is not sent to any
other node. It contains trigger information which is used to invoke a USSD
application in the CSE for all subscribers in the HLR. It is possible that
for a particular service code both U-CSI and UG-CSI are applicable.
UHF - Ultra High
Frequency
Frequencies from 300MHz to 3000MHz.
UI - Unconfirmed
Information
In LLC (Logical Link Control) unacknowledged operation,
Layer 3 information is transmitted in numbered UI (Unconfirmed Information)
frames. The UI frames are not acknowledged at the LLC layer.
UI - Unnumbered
Information
Unnumbered Information frames can be sent in both ADM
(Asynchronous Disconnected Mode) and ABM (Asynchronous Balanced Mode). There
is no acknowledgement of receipt of UI frames.
UI Channel - User
Isochronous data Channel
In Bluetooth the UI (User Isochronous data) Channel is
used to carry L2CAP (Logical Link Control and Adaptation Protocol )
transparent isochronous user data. It is usually carried on the ACL
(Asynchronous Connectionless link).
UIM - User Identity
Module
The User Identity Module may contain information such as
the NAM (Number Assignment Module) and subscription feature information. It
is possible for the UIM to be integrated into the ME (Mobile Equipment) or it
may be a R-UIM (Removable Identity Module).
UL-TFT - Uplink Traffic
Flow Template
An Uplink Traffic Flow Template is the set of uplink
packet filters set out in a TFT. A DL TFT is the set of downlink packet
filters defined in a TFT. Every dedicated EPS bearer is associated with a
TFT. The UE uses the UL TFT for mapping traffic to an EPS bearer in the
uplink direction and the PDN GW maps traffic to the EPS bearer in the
downlink.
ULF - Ultra Low Frequency
Frequencies from 300Hz to 3000Hz.
ULI - User Location
Information
User Location Information is a group of identities
relating to the location of a mobile device within the network coverage area.
The ULI can comprise of an LAI, ECGI, TAI, RAI, SAI and a CGI.
Um - Air Interface (GSM)
Interface between MS (Mobile Station) and BSS (Base
Station System). The Um interface is the GSM / GPRS network interface for
providing circuit and packet data services over the radio interface to the
MS.
UMA - Unlicensed Mobile
Access
Unlicensed Mobile Access is an industry collaboration to
extend GSM and GPRS services into customer sites by utilizing unlicensed
radio technologies such as WiFi (Wireless Fidelity) and Bluetooth. This is
achieved by tunnelling GSM and GPRS protocols through a broadband IP network
towards the Access Point situated in the customer site and across the
unlicensed radio link to the mobile device. Although the title UMA is often
still used, the technology is now termed GAN and has seen relatively limited
deployment.
UMAN - Unlicensed Mobile
Access Network
An Unlicensed Mobile Access Network is derived by
utilizing existing unlicensed radio technologies such as WiFi (Wireless
Fidelity) and Bluetooth to extend GSM and GPRS services into customer sites.
This is achieved by introducing a UNC (Unlicensed Network Controller) into
the network which connects the existing GSM and GPRS core network, through a
broadband IP network, to the Access Point situated in the customer site. As
such, customers can switch between the traditional GSM / GPRS network and the
UMAN as the move into and out of coverage. Although the title UMA is often
still used, the technology is now termed GAN.
UMD - Unacknowledged Mode
Data
In UMTS the UMD PDU (Protocol Data Unit) is used to
convey sequentially numbered PDU containing RLC (Radio Link Control) SDU
(Service Data Unit) data. It is used by RLC when using unacknowledged data
transfer.
UMTS - Universal Mobile
Telecommunications System
A 3G mobile communication system which supports improved
data rates over GSM and subsequently provides an enhanced range of multimedia
services. UMTS has increased convergence between telecommunications, IT
(Information technology), media and content industries to deliver new
services and create fresh revenue generating opportunities. UMTS delivers low
cost, high capacity mobile communications, offering data rates as high as
2Mbps (under ideal conditions) with global roaming and other advanced
capabilities. The specifications defining UMTS are formulated by the 3GPP.
Unbalanced line
A transmission line in which the voltage levels on the
two conductors are not equal with respect to ground.
UNC - Unlicensed Network
Controller
A Unlicensed Network Controller is found with a UMAN
(Unlicensed Mobile Access Network). Its function is to connect the existing
GSM and GPRS core network, through a broadband IP network, to the Access
Point situated in the customer site. As such, it acts in a very similar way
to a BSC (Base Station Controller) and PCU (Packet Control Unit) found within
GSM and GPRS networks. However, the UNC supports a number of additional UMA
(Unlicensed Mobile Access) specific protocols termed URLC (UMA Radio Link Control)
and URR ( UMA Radio Resource). Although the title UMA is often still used,
the technology is now termed GAN.
UNI - User to Network
Interface
The interface between user equipment and private or
public network equipment (e.g. ATM switches).
Unicode
The Unicode Worldwide Character Standard is a character
coding system designed to support the interchange, processing and display of
the written texts of the diverse languages of the modern world. In addition,
it supports classical and historical texts of many written languages.
Unidirectional channel
A one way only channel.
Unique Challenge Response
Procedure
A procedure by which the MS (Mobile Station) and the BS
(Base Station) exchange information to confirm the mobile’s identity. The
procedure is initiated by the BS (Base Station), which sends a challenge in
the form of RANDU (Unique Random Variable).
UNIX
A portable, multiuser, time-shared operating system that
supports process scheduling, job control, and a programmable user interface.
Unnumbered command
This may be used in a data transmission and represents a
command that does not contain sequence numbers in the control field.
UPCON - User Plane
CONgestion Management
As mobile networks become increasingly congested, the
3GPP have introduced techniques for RAN congestion management which are
designed to reduce the impact of user plane congestion on the user’s service
experience. UPCON introduces congestion mitigation techniques such as traffic
prioritization, traffic reduction and limitation of traffic. UPCON utilizes
additional network elements such as the RCAF (RAN Congestion Awareness
Function) to support this.
UPF - User Plane Function
The User Plane Function is related to the 3GPP 5G
Architecture. It is similar to the roles played by the Serving/Packet Gateway
in a 4G LTE system. The UPF supports features and capabilities to facilitate
user plane operation. Examples include: packet routing and forwarding,
interconnection to the Data Network, policy enforcement and data buffering.
Uplink DPCH - Uplink
Dedicated Physical Channel
There are two types of Uplink Dedicated Physical Channel,
the uplink DPDCH (Dedicated Physical Data Channel) and the uplink DPCCH
(Dedicated Physical Control Channel).
Uplink DPCH - Uplink
Dedicated Physical Channel
There are two types of Uplink Dedicated Physical Channel,
the uplink DPDCH (Dedicated Physical Data Channel) and the uplink DPCCH
(Dedicated Physical Control Channel).
UPnP - Universal Plug and
Play
UPnP is a generic term for a series of protocols and
standards which support network devices such as computers, smartphones,
printers etc. to seamlessly discover each other and establish a communication
link in order to share data.
Upstream
The direction opposite to the data flow.
UPT - Universal Personal
Telecommunications
A telecommunications service that provides personal
mobility and service profile management. Users are identified by means of a
UPT number.
URA - UTRAN Registration
Area
The UTRAN (UMTS Terrestrial Radio Access Network)
Registration Area is an area covered by a number of cells. The URA is
configured in the UTRAN and broadcasted in relevant cells.
URI - Uniform Resource
Identifier
A URI is an address string which identifies the location
of a particular resource eg www.mpirical.com/tutorials.
URL - Uniform Resource
Locator
A standard way of specifying the location of an object,
typically a web page, on the Internet. URL are the form of address used on
the WWW (World Wide Web). They are used in HTML (Hypertext Markup Language)
documents to specify the target of a hyperlink which is often another HTML
document (possibly stored on another computer). An example of a URL is
http:\www.mpirical.com
URLC - UMA Radio Link
Control
UMA (Universal Mobile Access) Radio Link Control is a
protocol found within a UNC (Unlicensed Network Controller) to support the
transfer of both GPRS control and user plane information between the UNC and
the mobile device. This interface termed Up spans a broadband IP network in
addition to the unlicensed radio technology in operation – WiFi (Wireless
Fidelity) or Bluetooth.,
URLLC - Ultra Reliable
Low Latency Communication
URLLC is one of the three facets of 5G, alongside MMTC
(Massive Machine Type Communication) and eMBB (enhanced Mobile Broadband). In
particular, URLLC features two parts; ultra-reliability which constitutes
network reliability of beyond 99.999%, coupled with very low latency for
packet transmission (in the order of 1ms and below). Note that the two are
mutually exclusive in that some services will require both ultra-reliability
and low latency, whereas other services may require one or the other.
URR - UMA Radio Resource
UMA (Universal Mobile Access) Radio Resource is a
protocol found within a UNC (Unlicensed Network Controller) to support the
transfer of GSM control plane information between the UNC and the mobile
device. This interface termed Up spans a broadband IP network in addition to
the unlicensed radio technology in operation – WiFi or Bluetooth.
URSP - UE Route Selection
Policy
In 5G, the device can be provisioned with URSP
information which provides information on which PDU Session on network slice
a given service or application should use when it is activated.
US Channel - User
Synchronous data Channel
In Bluetooth the US (User Synchronous data) Channel is
used to carry transparent synchronous user data. It is carried in the SCO
(Synchronous Connection Oriented) link only.
US-TDMA
A term sometimes used within Europe to identify the
IS-136 (Interim Standard) TDMA (Time Division Multiple Access) based system.
USAT - Ultra Small
Aperture Terminal
Satellite dishes for telemetry and other remote
monitoring.
USB - Universal Serial
Bus
The Universal Serial Bus provides an expandable, Plug and
Play serial interface that ensures a standard, low-cost connection for
peripheral devices such as keyboards, mice, joysticks, printers, scanners,
storage devices, modems, and video conferencing cameras. Migration to USB is
recommended for all peripheral devices that use legacy ports such as the
PS/2, serial, and parallel ports.
USCH - Uplink Shared
Channel
The Uplink Shared Channel is an uplink transport channel
used in TDD (Time Division Duplex) mode, shared by several UE (User
Equipment) carrying dedicated control or traffic data.
User
A person using or requesting telecommunications services.
User information
Information transferred across the functional interface
between a source user and a telecommunications system for delivery to a
destination user. Note: In telecommunications systems, user information
includes user overhead information.
User Zone
Not to be confused with the Registration Zone, a User
zone identifies an area within which CDMA Tiered Services may be provided.
This usually corresponds to an RF (Radio Frequency) coverage area.
User Zone Registration
Whilst in the Idle State the mobile will register when it
selects an active User Zone.
USF - Uplink State Flag
The Uplink State Flag is used on PDCH (Packet Data
Channel) to allow multiplexing of radio blocks from a number of GPRS mobiles.
USF is used in dynamic and extended dynamic medium access modes. The USF
comprises 3bits at the beginning of each Radio Block that is sent on the
downlink. It enables the coding of eight different USF states which are used
to multiplex the uplink traffic.
USIM - UMTS Subscriber
Identity Module
Usually referred to as a SIM card, the USIM ( UMTS
Subscriber Identity Module) is the user subscription to the UMTS mobile
network. The USIM contains relevant information that enables access onto the
subscribed operator’s network.
USSD - Unstructured
Supplementary Service Data
The USSD (Unstructured Supplementary Service Data)
mechanism allows the MS (Mobile Station) user and a PLMN (Public Land Mobile
Network) operator defined application to communicate in a way which is
transparent to the MS and to intermediate network entities. An example of a
USSD string is *#136#numbers#
USTS - Uplink Synchronous
Transmission Scheme
To maximize the usage of 3G uplink capacity the 3GPP
(Third Generation Partnership Project) is exploring techniques in which
channel redundancy can be exploited. One approach is to implement USTS in
which signals from mobiles within the cell are orthogonalized. That is, a
number of mobiles are allocated the same scrambling code, but different
channelization codes.
UT - Universal Time
The basis for coordinated distribution of time signals,
counted from 0000 at midnight. When an accuracy better than one second is not
required, Universal Time can be used to mean UTC (Coordinated Universal
Time).
UTP - Unshielded Twisted
Pair
A pair of unshielded wires that are twisted at routine
intervals in order the minimize the amount of cross talk experienced from
other pairs in the same cable.
UTRA - Universal
Terrestrial Radio Access
Identifies the FDD (Frequency Division Duplex) and TDD
(Time Division Duplex) mode of access for the UMTS System.
UTRAN - Universal
Terrestrial Radio Access Network
UTRAN is a conceptual term identifying that part of a
UMTS network which consists of one or more RNC (Radio Network Controller) and
one or more Node B between Iu and Uu interfaces.
Uu - UMTS Air Interface
This is the radio interface between the UTRAN (UMTS
Terrestrial Radio Access Network) and the UE (User Equipment) utilizing CDMA.
UUS - User-to-User
Signalling
The UUS supplementary service allows the served
subscriber to send/receive a limited amount of subscriber generated
information to/from another user in association with a call to the user. This
information shall be passed transparently (i.e. without modification of
contents) through the network. Normally the network shall not interpret or
act upon this information.
UV - Ultraviolet
Part of the electromagnetic spectrum in which the longest
wavelength is just below the visible spectrum, extending from approximately
4nm to approximately 400nm.
UWC-136
A 3G (Third Generation) wireless standard based on TDMA
(Time Division Multiple Access) technology. It was developed by the UWCC
(Universal Wireless Communications Consortium).
UWCC - Universal Wireless
Communications Consortium
An industry group supporting IS-136 (Interim Standard
136) TDMA (Time Division Multiple Access) and IS-41 (Interim Standard 41)
wireless intelligent network technology.
V
reference point
The interface point in an
ISDN environment between the line termination and the exchange termination.
V-PCRF - Visited – Policy
and Charging Rules Function
The PCRF is a policy decision point for subscriber data
flows in the network. Using inputs from other network nodes, the PCRF will
formulate rules which control how traffic flows (required QoS, restrictions,
throttling, blocking, billing, etc) over the network down to individual
subscriber SDF (Service Data Flow) granularity. The PCRF passes these rules
to the PCEF (Policy and Charging Enforcement Function). In a roaming
scenario, a Home PCRF can pass policy decision information to V-PCRF in the
visited network.
V2I -
Vehicle-to-Infrastructure
In relation to V2X, V2I (Vehicle-to-Infrastructure) enables
vehicles to communicate with nearby roadside infrastructure, called RSU (Road
side Units). This provides connectivity to fleet and traffic management
centres, parking and toll control systems. It has a wide range of potential
uses, such as connecting to smart parking systems to find available parking
spaces automatically.
V2N - Vehicle-to-Network
In relation to V2X, V2N (Vehicle-to-Network) enables both
broadcast and unicast communications to take place between vehicles and the
V2X management system and also the V2X AS (Application Server). This is
achieved by making use of the LTE network infrastructure and the E-UTRA.
Vehicles are able receive broadcasted alerts regarding accidents further down
the road or warnings of congestion or queues on the planned route.
V2P - Vehicle-to-Pedestrian
In relation to V2X, V2P (Vehicle-to-Pedestrian) involves
direct communications between a vehicle and a pedestrian or multiple
pedestrians within close proximity. In addition, communication can be to
other vulnerable road users, such as cyclists. V2P is conducted directly or
through the use of network infrastructure. It will facilitate warnings to be
provided to the pedestrian of an approaching vehicle, and warnings to the
vehicle of vulnerable road users.
V2V - Vehicle-to-Vehicle
In relation to V2X, V2V (Vehicle-to-Vehicle) involves
direct communications between two vehicles, or multiple vehicles within close
proximity. These vehicles could include passenger vehicles, commercial
vehicles and emergency vehicles.
V2X AS - V2X Application
Server
The V2X AS is a key component in the delivery of V2X
services. It is involved in the handling of services, such as receiving
uplink data and also delivering data to the vehicle or V2X device. It will
also provision both the 5G core and the vehicle / V2X device with parameters
in order to perform V2X communication over the PC5 and Uu reference points.
V2X CF - V2X Control
Function
The V2X Control Function is the key management element for
V2X related services in a network. It is used to assist with network relation
actions, such as providing the UE with the parameters necessary to use V2X
communications. In addition, it will liaise with the V2X AS to obtain
information required for broadcast functionality.
VAD - Voice Activity
Detector
The function of the VAD is to indicate whether each frame
contains signals that should be transmitted, i.e. speech, music or
information tones.
VAN - Value Added Network
A network using the communication services of other
commercial carriers, using hardware and software that permit enhanced
telecommunication services to be offered.
VANC - VoLGA Access Network
Controller
The VANC performed an aggregation and service control
function within a VoLGA network. It should be noted that VoLGA has not seen
significant deployment, with service providers adopting VoLTE as the
preferred delivery mechanism for LTE based voice services.
VAS - Value Added Service
Value Added Services are unlike basic services in that they
have unique characteristics and they relate to other services in a completely
different way. They also provide benefits that basic services can not.
VBR - Variable Bit Rate
Variable Bit Rate is one of the traffic classes used by ATM
(Asynchronous Transfer Mode). Unlike a permanent CBR (Constant Bit Rate)
channel, a VBR data stream varies in bandwidth and is better suited to non
real time transfers than to real-time streams such as voice calls.
VC - Virtual Channel
The communication channel associated with a VCC (Virtual
Channel Connection) that provides for the transport of ATM (Asynchronous
Transfer Mode) cells.
VCC - Virtual Channel
Connection
A concatenation of VCL (Virtual Channel Link) between the
points where the ATM (Asynchronous Transfer Mode) service users access the
ATM Layer.
VCI - Virtual Channel
Identifier
The identifier in the ATM (Asynchronous Transfer Mode) cell
header that identifies to which virtual channel the cell belongs.
VCL - Virtual Channel Link
A Virtual Channel Link is a means of unidirectional
transport of ATM (Asynchronous Transfer Mode) cells. It exists between the
points where a VCI (Virtual Channel Identifier) value is assigned and the
point where the value is translated or removed.
VDSL - Very high data rate
Digital Subscriber Line
One of the family of DSL (Digital Subscriber Line)
services. It offers very high data rates over relatively short distances (up
to 55Mbps over a line length of 300m).
VDSL - Very High Digital
Subscriber Line
A variant of HDSL (High Digital Subscriber Line) which
provides a service at data rates greater than 10Mbps. With this increased
data rate, there is a significant decrease in the radius which such a system
can operate. For this reason a VHDSL system would be implemented with fibre
optics transporting the data to a remote sight near the subscribers, and use
VHDSL to bridge the last 30 metres or so to the subscriber.
VDSL2 - Very High Speed
Digital Subscriber Line
VDSL2 (Very High Speed Digital Subscriber Line) is a DSL
technology which can provide symmetrical links of up to 100Mbps, although
this figure is largely dependent on the length of copper twisted pair
available. VDSL2 uses similar modulation techniques to ADSL , with the
increased bandwidth a direct result of the close proximity to a fibre optic
node.
Verisign
Verisign is a leading provider of public key infrastructure
and digital certificate solutions. These are used by enterprises, web sites
and consumers to conduct secure communications and transactions over the
Internet and private networks.
VF - Voice Frequency
Pertaining to those frequencies within that part of the
audio range that is used for the transmission of speech. In telephony, the
usable voice-frequency band ranges from approximately 300Hz to 3400Hz (3.1KHz
bandwidth).
VGCS - Voice Group Call
Service
Allows speech conversation of a predefined group of service
subscribers in half duplex mode on the radio link.
VHF - Very High Frequency
Frequencies from 30MHz to 300MHz.
VID - VLAN Identifier
The VID is contained within each Ethernet frame of an
Ethernet VLAN , allowing switches to separate traffic based on VID, hence
creating separate VLAN.
Videophone
A telephone that is coupled to an imaging device that
enables the call receiver or the call originator, or both, to view one
another as on television, if they so desire.
ViLTE - Video over LTE
An initiative standardized in GSMA IR.94 which sees
conversational video services being made available to customers on LTE access
networks.
VIM - Virtualized
Infrastructure Manager
The VIM operates within the NFV MANO (Management and
Orchestration) architecture, handling all activities associated with the
NFVI, including resource management and operations management. In addition,
the VIM will store the software images associated with the VNFs (Virtualized
Network Functions) within the system.
VLAN - Virtual Local Area
Network
VLAN is a term used to refer to an Ethernet network that
shares the same physical infrastructure as other VLAN but is a logically
separate entity. VLAN traffic is separated by marking each frame with a VID
(VLAN ID), as specified by the IEEE 802.1Q working group. Alternatively,
VLANs can be separated from one another based on their switch port.
VLD - Virtual Link
Descriptor
The VLD provides a description of a Virtual Link within an
NFV (Network Functions Virtualization) system. Key elements of the descriptor
include the number of endpoints (for example an E-Line would contain 2
endpoints), link throughput and available QoS.
VLF - Very Low Frequency
Frequencies from 3KHz to 30KHz.
VLR - Visitor Location
Register
The Visitor Location Register contains all subscriber data
required for call handling and mobility management for mobile subscribers
currently located in the area controlled by the VLR.
VMSC - Visited Mobile
Switching Centre
The Visited Mobile Switching Centre is the term given to
the MSC (Mobile Switching Centre) that is serving a mobile in the VPLMN
(Visited Public Land Mobile Network).
VNF - Virtualized Network
Function
Within an NFV (Network Functions Virtualization) framework,
the VNF is the term given to a network node that has been implemented as a
software process. An example could be an MME (Mobility Management Entity),
where traditionally this would be a physical device but after virtualization,
it would run as a software based VNF. All VNFs in the system will share
compute, storage and networking resources through interaction with the NFVI
(NFV Infrastructure).
VNFFDG - VNF Forwarding
Graph Descriptor
Within the NSD (Network Service Descriptor), the VNFFGD
defines the VNF Forwarding Graph, outlining the Virtual Links and VNFs
(Virtualized Network Functions) which together form the Network Service.
VNFFG - VNF Forwarding
Graph
The VNFFG defines the chain of VNFs (Virtualized Network
Functions) which are linked together in order to instantiate a Network
Service.
VNFM - VNF Manager
The VNF Manager operates within the NFV MANO (Management
and Orchestration) architecture, handling all lifecycle management operations
associated with the on-boarded VNFs (Virtualized Network Functions). This
includes VNF instantiation, upgrade, scale up/down and termination.
VoB - Voice over Broadband
The term VoB (Voice over Broadband) refers to VoIP (Voice
over IP) services that allow end users to make and receive calls over a
broadband connection, for example using a DSL (Digital Subscriber Line) or
cable connection. Services include: phone-to-phone, PC-to-phone and PC-to-PC
calls.
Vocoder
A voice coder device that usually consists of a speech
analyzer, which converts analogue speech waveforms into narrowband digital
signals, and a speech synthesizer, which converts the digital signals into
artificial speech sounds.
VoDSL - Voice over DSL
The term VoDSL (Voice over DSL) typically means the
leveraging of the copper infrastructure to provide both quality voice
services as well as support a wide variety of data applications over the same
existing line to the customer’s site. VoDSL commonly implies a number of
traffic circuits over a single DSL (Digital Subscriber Line) connection.
Voice memo
A voice recorder built into a phone enabling the user to
record notes.
Voice Privacy
The voice transmitted over a CDMA Traffic Channel has some
protection against eavesdropping over the air interface.
Voicemail
A service offered by networks that will record voice
messages for users if they are unable to answer a call. Charges may apply for
retrieving messages.
VoIP - Voice over Internet
Protocol
Voice over IP is a system enabling voice data to be
delivered using the IP (Internet Protocol). It is sometimes referred to as IP
telephony.
VoLGA - Voice over LTE
Generic Access
VoLGA was an early proposal for voice service delivery over
an LTE transport network. The technology did not see any significant
deployment, with service providers opting for VoLTE as the preferred voice
delivery service.
VoLTE - Voice over LTE
Based on GSMA IR.92, VoLTE allows subscribers on LTE access
to conduct voice calls, without the requirement to fall back to 2G or 3G.
Call control is based on an IMS, which will include a TAS for supplementary
services. In addition, an SCC-AS will typically be deployed in order to
support SR-VCC. During a VoLTE call, subscribers will have a Dedicated EPS
bearer in place which provides a guaranteed level of QoS.
VoNR - Voice over New Radio
VoNR is the general term given to IMS based voice services
which use 5G as the access network (as opposed to LTE and VoLTE).
VoWiFi - Voice over WiFi
VoWiFi allows subscribers to conduct voice calls whilst
using a WiFi access network. Call control is based on IMS and in many cases,
the VoWiFi is integrated with the service providers VoLTE service offering.
Therefore, subscribers can switch between LTE and WiFi access during a call.
VP - Virtual Path
Virtual Path enables the bundling of multiple ATM
(Asynchronous Transfer Mode) VC (Virtual Circuit).
VPC - Virtual Path
Connection
The concatenation of multiple ATM (Asynchronous Transfer
Mode) virtual path links.
VPI - Virtual Path
Identifier
The field in the ATM (Asynchronous Transfer Mode) cell
header that identifies to which VP (Virtual Path) the cell belongs.
VPLMN - Visited Public Land
Mobile Network
A Visited Public Land Mobile Network is a PLMN upon which
the mobile subscriber has roamed when leaving their HPLMN (Home Public Land
Mobile Network).
VPLS - Virtual Private LAN
Service
VPLS is an Ethernet based virtual multipoint to multipoint
service, typically implemented over an IP/MPLS network. Connectivity between
customer sites using the VPLS service is based on PWE3.
VPN - Virtual Private
Network
This is a private network link, which is carried on a
public network. VPNs can be implemented in number of ways, ranging from:
Layer 1 VPN utilizing physical layer links such as E1 and SDH; Layer 2 VPN
using data link connections based on ATM, FR, Ethernet etc; Layer 3 VPN,
typically based on IP in IP tunnelling techniques such as those provided by
IPSec. In addition, MPLS networks are also extensively deployed to support
VPN connectivity. In this case, customer traffic is kept separate through the
use of unique labels per customer.
VPWS - Virtual Private Wire
Service
VPWS is a virtual point to point connection, typically
implemented over an MPLS network using PWE3.
VRB - Virtual Resource
Block
The E-UTRA uses the concept of VRB (Virtual Resource Block)
when allocating resources. It defines two types: LVRB (Local Virtual Resource
Block) – this is the same as the PRBs; DVRB (Distributed Virtual Resource
Block) – this identifies a distribution of the resources required over a
number of PRBs.
VSWR - Voltage Standing
Wave Ratio
A standing wave may be formed when a wave is transmitted
into one end of a transmission line and is reflected from the other end by an
impedance mismatch. VSWR is the ratio of maximum to minimum voltage in a
standing wave pattern.
VT-CSI - Visited Terminated
– CAMEL Subscription Information
CAMEL Phase 3 allows the initiation of terminating CAMEL
services at the VMSC (Visited Mobile Switching Centre). The VT-CSI if present
is passed to the VMSC/VLR during the Update Location procedure.
VT-IM-CSI - Visited
Terminated – IP Multimedia – CAMEL Subscription Information
CAMEL Phase 3 allows the initiation of terminating CAMEL
services at the VMSC (Visited Mobile Switching Centre). The VT-CSI if present
is passed to the VMSC/VLR during the Update Location procedure. VT-IM-CSI
allows for this functionality to be extended to the IMS.
WAE
- WAP Application Environment
Nominally viewed as the ‘
WAP Browser’, the WAP 2.0 Application Environment has evolved to embrace
developing standards of the Internet browser mark-up language.
WAEPL - Weighted Acoustic
Echo Path Loss
A term used to identify the measure of the echo
performance under normal conversation. ANSI / EIA / TIA -579 defines the
measurement of WAEPL.
WAG - WLAN Access Gateway
The WAG is the gateway between a 3GPP and WLAN network.
The WAG provides filtering, policy and charging functionality for the traffic
between the WLAN user equipment and the 3GPP network.
WAN - Wide Area Network
A network that provides data communications to a large
number of independent users spread over a larger geographic area than that of
a LAN (Local Area Network). It may consist of a number of LAN connected
together.
WAP - Wireless
Application Protocol
A standard designed to allow the content of the Internet
to be viewed on the screen of a mobile device such as mobile phones, personal
organisers and pagers. WAP also overcomes the processing limitation of such
devices. The information and services available are stripped down to their
basic text format.
WAP Gateway
A WAP (Wireless Application Protocol) Gateway accesses
web content for a mobile. In theory it is capable of converting HTML
(Hypertext Markup Language) pages to WML (Wireless Markup Language) pages,
but much of the content accessed from WAP Gateways has already been specially
authored in WML.
Warchalking
Warchalking is the practice of marking symbols on
pavements (sidewalks) and walls to indicate the presence of nearby open
wireless access. It was supposedly inspired by the practice of Hobos during
the Great Depression to use chalk marks to indicate which homes were
friendly. Warchalking is now rarely encountered, since many WiFi networks
feature automated security.
Wardriving
Wardriving was the practice of driving around an area
looking for wireless networks that are open. Once detected, the sites are
recorded by marking chalk symbols on the nearby pavement (sidewalk) or wall –
a process referred to as warchalking. Wireless networks are detected by using
sniffing software such as NetStumbler.
Waveguide
Waveguide is a medium that confines and guides a
propagating electromagnetic wave. It is usually rectangular, elliptical, or
circular in cross section.
Wavelength
The distance travelled by a wave during one complete
cycle.
WB-AMR - Wideband
Adaptive Multi Rate
Wideband variable rate speech codecs such as the WB-AMR
codec used in UMTS and VoLTE systems offers superior wideband speech quality
at data rates comparable to current narrowband speech codecs. With a higher
data rate available, HD voice services can be offered to the customer.
WCDMA - Wideband Code
Division Multiple Access
An ITU (International Telecommunications Union) standard
derived from CDMA (Code Division Multiple Access) technology. WCDMA has been
identified for 3G (Third Generation) mobile wireless technology.
WDM - Wavelength Division
Multiplexing
A technique by which two or more optical signals having
different wavelengths are simultaneously transmitted in the same direction
over one fibre.
WDP - Wireless Datagram
Protocol
Wireless Datagram Protocol is a general datagram service,
offering a consistent service to the upper layer protocols and communicating
transparently over one of the available underlying bearer services. It forms
part of the WAP (Wireless Application Protocol) suite.
Web server
A Web Server is the device used to store or host web
pages for an Intranet, Extranet or Internet.
WECA - Wireless Ethernet
Compatibility Alliance
The WECA was formed by 3Com, Aironet, Harris
Semiconductor, Lucent Technologies, Nokia and Symbol Technologies in August
1999 (it should be noted that a number of these companies have since been
taken over). It was renamed the WiFi Alliance in October 2002.
WEP - Wired Equivalent
Privacy
The IEEE 802.11b WLAN (Wireless Local Area Network)
standard incorporates a confidentiality and integrity provision called WEP.
To protect the data, WEP uses the stream cipher RC4 from RSA Security Inc.
There are two levels of WEP commonly available; one based on a 40bit
encryption key and 24bit initialization vector (64bit encryption) and one
based on a 104bit encryption key and 24bit initialization vector (128bit
encryption). Prior to encryption, the data is run through an integrity check
process to ensure that the recipient of the data can detect whether it has
been tampered with during transmission. The RC4 algorithm then generates a
key stream from either the 64bit or 128bit encryption key which is applied to
the user data and integrity check. In August 2001, Scott Fluhrer, Itsik
Mantin, Adi Shamir published a paper entitled Weakness in the Key Scheduling
Algorithm of RC4; which outlined a theoretical method for breaking the WEP
key. Providing enough traffic has been captured, modern day cracking software
can crack WEP in seconds.
White noise
Noise having a frequency spectrum that is continuous and
uniform over a specified frequency band.
Wi-Fi 4
This the term given by the Wi-Fi Alliance to networks
operating to the IEEE 802.11n standard.
Wi-Fi 5
This the term given by the Wi-Fi Alliance to networks
operating to the IEEE 802.11ac standard.
Wi-Fi 6
This the term given by the Wi-Fi Alliance to networks
operating to the IEEE 802.11ax standard.
Wi-Fi Direct
This is an extension of the IEEE 802.11 standard
supporting a direct communication link between to Wi-Fi devices without the
need for an Access Point.
Wi-Fi Easy Connect
One of the Wi-Fi Alliance’s certification programs, Wi-Fi
Easy Connect operates alongside WPA3 (Wi-Fi Protected Access 3) to enhance
the user experience when adding devices to a Wi-Fi network; especially those
with a limited graphical user interface. Instead of detecting a Wi-Fi network
and entering security keys, users will scan QR codes using a smartphone.
Wi-Fi HaLow
Incorporating the IEEE 802.11ah amendment, Wi-Fi HaLow
supports a certification program for Wi-Fi based IoT devices requiring
extended coverage and improved power efficiency. Examples of devices in this
space include those targeted at smart homes, healthcare as well as industrial
and agriculture.
Wi-Fi Location
Part of the Wi-Fi Alliance’s certification program, Wi-Fi
Location enables accurate location information regarding the Wi-Fi device to
be calculated by measuring the roundtrip delay for a signal passing between
the access point and the device. Such information can then be used for
navigation, alongside new feature rich services for manufacturing, retail and
healthcare.
Wi-Fi Passpoint
Launched by the Wi-Fi Alliance in 2012, Wi-Fi Passpoint
is an industry wide solution to streamline how users access Wi-Fi hotspots
and eliminate the need to authenticate each time. Therefore, for networks
supporting Passpoint, users may seamlessly switch between Wi-Fi networks or
even between Cellular and Wi-Fi.
WiCoP - WLAN Control
Protocol
WiCoP was a control protocol which allowed for the
control and provisioning of large scale WLANs. WiCoP has since been obsoleted
by CAPWAP (Control and Provisioning of Wireless Access Points).
Wideband
The term Wideband is often used to distinguish it from
Narrowband, however both terms are subjective. It usually identifies a signal
that occupies a broad frequency spectrum (Broadband).
WiFi - Wireless Fidelity
WiFi is an interoperability standard developed by the
WiFi Alliance and issued to those manufacturers whose IEEE 802.11 equipment
has passed a suite of basic interoperability tests. Equipment passing these
tests carries the WiFi logo.
WiFi Alliance
The WiFi Alliance is a non profit international
association formed in 1999 to certify interoperability of wireless local area
network products based on the IEEE 802.11 specifications. WiFi product
certification began in March 2000. One of the goals of the WiFi Alliance is
to ensure customers realize maximum benefit from their WiFi products in a
secure and productive manner. Equipment passing these interoperability tests
are allowed to carry the WiFi logo and service providers meeting a minimum
service level may display the WiFi Zone logo.
WiFi Zone
The WiFi Zone is a certification award issued by the WiFi
Alliance to service providers using WiFi certified equipment and meeting a
minimum service level. The WiFi Alliance provide a register of service
providers enabling users to find a location offering WiFi public access.
Wild Card APN
The APN (Access Point Name) field in the HLR (Home
Location Register) may contain a wild card APN if the HPLMN (Home Public Land
Mobile Network) operator allows the subscriber to access any network of a
given PDP (Packet Data Protocol) Type. If an SGSN (serving GPRS Support Node)
has received such a wild card APN, it may either choose the APN Network
Identifier received from the Mobile Station or a default APN Network
Identifier for addressing the GGSN (Gateway GPRS Support Node) when
activating a PDP context.
WiMAX - World wide
Interoperability for Microwave Access
WiMAX is a mobile broadband technology standardized by
the IEEE 802.16m working group. Although WiMAX is a potential option for
supporting 4G, it has seen mixed success around the globe, with many service
providers adopting LTE as an alternative.
WISP - Wireless Internet
Service Provider
A WISP is an Internet Service Provider who provides
access to the public Internet via a wireless connection. This is achieved in
most cases by using the WiFi technology.
WLAN - Wireless Local
Area Network
A WLAN is a LAN which uses a wireless technology such as
WiFi in order to allow devices to communicate with one another.
WLL - Wireless Local Loop
Sometimes called Radio in the Loop, Fixed Radio Access or
Fixed Wireless Local Loop. WLL is a system that connects subscribers to the
PSTN (Public Switched Telephone Network) using radio signals as a substitute
for copper for all or part of the connection between the subscriber and the
switch.
WML - Wireless Markup
Language
The Wireless Mark up Language is the WAP (Wireless
Application Protocol) equivalent to HTML (Hyper Text Mark up Language) used
to construct web pages for a WAP device.
WMM - WiFi Multi Media
This termed is used in WiFi networks to define a network
capable of supporting QoS (Quality of Service) traffic such as voice, video
etc. These capabilities have been defined in the IEEE (Institute of
Electrical and Electronics Engineers) 802.11e enhancement.
Worm
A worm is designed to create large volumes of network
traffic through self replication and distribution to other network nodes.
Significant worms such as MyDoom and Sobig were responsible for grinding the
Internet to a halt. Nowadays, anti-malware software and hardware is designed
to spot the traffic patterns associated with a worm and mitigate the attack
accordingly.
WPA - WiFi Protected
Access
Proposed jointly by the IEEE and WiFi Alliance , WiFi
Protected Access is a specification of standards based, interoperable
security enhancements that increase the level of data protection and access
control for existing WiFi networks. WPA has been designed to be forward
compatible with the IEEE 802.11i enhancement, which is also termed WPA2. It
utilizes the enhanced data encryption TKIP (Temporal Key Integrity Protocol)
in addition to user authentication using 802.1X and EAP (Extensible
Authentication Protocol).
WPA2 - WiFi Protected
Access 2
The successor to WPA, WPA2 features the mandatory
elements of the 802.11i WiFi security standard. This includes support of an
AES based encryption mechanism termed CCMP (Counter Mode CBC-MAC Protocol).
WPA3
Building upon the near universal adoption of WPA2 (Wi-Fi
Protected Access 2), WPA3 was introduced in 2018 to bring new and more robust
security capabilities to both personal and enterprise networks. The new
standard from the Wi-Fi Alliance introduces a new approach to authentication
termed SAE (Simultaneous Authentication of Equals), makes devices more
resistant to offline dictionary attacks and provides greater protection from
password guessing by third parties.
WRC - World Radio
Conference
The WRC is promoted and organized by the ITU-R
(International Telecommunications Union – Radiocommunications Standardization
Sector) in order to discuss and possibly amend Radio Regulations (the rules
which govern how RF spectrum is utilized). The WRC usually meet every two
years to discuss radio related issues.
WSP - Wireless Session
Protocol
Wireless Session Protocol provides the upper level
application layer of WAP (Wireless Application Protocol) with a consistent
interface for two session services. The first is a connection-mode service
that operates above the transaction layer protocol, and the second is a
connectionless service that operates above a secure or non secure datagram
transport service.
WTLS - Wireless Transport
Layer Security
The Wireless Transport Layer Security layer is designed
to provide privacy, data integrity and authentication between two
communicating applications. WTSL forms part of the WAP (Wireless Application
Protocol) suite.
WTP - Wireless
Transaction Protocol
Wireless Transaction Protocol has been defined as a light
weight transaction oriented protocol that is suitable for implementation in
thin clients and operates efficiently over wireless datagram networks. WTP
forms part of the WAP (Wireless Application Protocol) suite.
WWW - World Wide Web
An international, virtual network based information
service composed of Internet host computers that provide on line information.
X-Modem
A file transfer protocol,
written in 1977 by Ward Christiansen. This protocol was effective but slow.
Later versions (X-Modem2 and X-Modem1K) were also introduced.
X.25
The X.25 protocol is a widely available, low speed,
packet switched data service. It offers data rates below those of Frame Relay
and in today’s next generation networks, use of X.25 is very rare.
X.400
X.400 is the universal protocol for email. X.400 defines
the envelope for email messages so all messages conform to a standard format.
X.500
The ITU X.500 family of standards defines X.500 directory
services. The directory can be used for many applications, such as storing
certificates, or other information. Protocols such as LDAP are often used to
access the X.500 Directory.
X.509
X.509 is the ITU recommendation that defines the format
for digital certificates and CRL (Certificate Revocation Lists). X.509
applications include X.509 version 3 for public-key certificates and X.509
version 2 for CRL.
X2AP - X2 Application
Protocol
X2AP is a control protocol found between eNBs on the X2
control plane. Main functions of X2AP include X2 based mobility, as well as
X2 “Global Procedures”. The former is largely associated with eNB (Evolved
Node B) controlled handover procedures whereas the latter deals with the
establishment and management of the X2 connection.
XDMS - XML Document
Management Server
An XDMS is responsible for hosting several Application
Usages (essentially an Application Usage is an instance of an XML
configuration document relative to a particular aspect of a service eg
Converged Address Book, Social Presence). Client devices such as mobile
phones can use XCAP (XML Configuration Access Protocol) in order to interact
with these Application Usages in order to acquire or manipulate the data
within the XML document.
xDSL
Term used for all forms of technology using a DSL
(Digital Subscriber Line). DSL enables simultaneous two way transmission of
voice and high speed data over a phone line.
XML - eXtensible Markup
Language
The major difference between HTML (Hypertext Markup
Language) and XML is that HTML describes the content of a web page and XML
classifies the information. XML indicates what type of information should go
where and in what format.
XnAP - Xn Application
Protocol
XnAP is the control protocol used between gNBs to support
a variety of RAN related procedures, such as establishing Dual Connectivity,
coordination of Xn based handovers, data forwarding and RAN Paging. During
the handover process, the source gNB will provide the target gNB with all the
necessary information it needs to handle the subscriber, including security
and User Plane connectivity information. For Dual Connectivity, the Master
gNB will use XnAP to set up a Secondary gNB, with each gNB serving the user
simultaneously.
Xon/Xoff
Xon/Xoff is a protocol for controlling the flow of data
between DCE (Data Circuit Terminating Equipment) and other devices ( DTE
(Data Terminal Equipment)) on an asynchronous serial connection.
XRES - Expected Response
In the UMTS authentication process the network sends RAND
(Random Number) to the UMTS Subscriber, XRES is the value that the network is
looking for to indicate a positive response.
Y-Modem
A file transfer protocol based on X-Modem , Y-Modem was designed by Chuck Forsberg to add batch transmission, and variable block size. The variable function was seldom ever at the maximum size, 1024 bytes. The error detection scheme was CRC (Cyclic Redundancy Check). A subsequent version was Y-Modem-G. This was an effort to send data in a stream, evaluating the blocks on the fly and only talking back to the sender if there was an error. Both programs had to be identical and the noise predominant on POTS (Plain Old Telephone Service) at the time was a problem.
Yagi
A Yagi antenna, also known technically as a Yagi-Uda unidirectional array, is a unidirectional antenna commonly used in communications at frequencies above 10MHz. A good example is the common TV antenna.
Z -
Zulu time
Identifies Coordinated
Universal Time, synonymous with GMT (Greenwich Meridian Time).
Z-Modem
A file transfer protocol based on X-Modem. The Z-Modem
and Y-Modem protocols were designed by Chuck Forsberg to add batch
transmission, and variable data block size. Z-Modem is considerably faster
than Y-Modem and has better error checking capability.
Z-Wave
Used primarily within home automation and associated with
the IoT (Internet of Things), Z-Wave is a communication protocol providing
short range, low latency data transfer.
Zero-bit insertion
A bit stuffing technique used in some telecommunication
protocols. It ensures that six consecutive 0 bits never appear between flags.
ZigBee
This is a communication protocol based upon the IEEE
802.15.4 standard providing connectivity within the PAN (Personal Area
Networking) sphere. It supports low power consumption, low data rates and a
relatively low cost and is often associated with the IoT (Internet of
Things).
zip
Zip is a compression utility used to create.ZIP archives.
Zip - Zoning Improvement
Plan
The ZIP codes are numeric codes used as postal codes in
the United States. They identify pre-assigned geographic boundaries and make
mail sorting and delivery more efficient.
Zombie
A compromised computer that has been loaded with agent
software enabling it to controlled remotely as an attack launch point. These
are often used in coordination with a large number of similarly affected
systems for large traffic attacks such as DoS (Denial of Service).
Zone Timer
A timer used by the mobile station to remove outdated
entries from its list of zones in which it has previously registered.
ZUC - Zadoff-Chu
The E-UTRA utilizes Zadoff Chu sequences. These are
complex-valued mathematical sequences which generate signal of constant
amplitude, whereby cyclicly shifted versions of the sequence comprising the
signal do not cross-correlate with each other when the signal is recovered at
the receiver.
ZUC - Zu Chongzhi
ZUC is a stream cipher that forms the basis of the
128-EEA3 and 128-EIA3 cryptographic algorithms utilised within LTE networks.
The 128-EEA3 is the 128 bit encryption algorithm defined using ZUC and the
128-EIA3 is the EPS Integrity Algorithm designed as a Universal Hash Function
using ZUC at its core. Following agreements in 2009 for a requirement for a
third LTE encryption and integrity algorithm set, 128-EEA and 128-EIA were
designed in China. The algorithm set is based on a core stream cipher algorithm
named ZUC, after Zu Chongzhi, a famous Chinese scientist.