You are on page 1of 67

eRAN

Glossary
Issue

01

Date

2013-10-30

HUAWEI TECHNOLOGIES CO., LTD.

Copyright Huawei Technologies Co., Ltd. 2013. All rights reserved.


No part of this document may be reproduced or transmitted in any form or by any means without prior written
consent of Huawei Technologies Co., Ltd.

Trademarks and Permissions


and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.

Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.

Huawei Technologies Co., Ltd.


Address:

Huawei Industrial Base


Bantian, Longgang
Shenzhen 518129
People's Republic of China

Website:

http://www.huawei.com

Email:

support@huawei.com

Issue 01 (2013-10-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

eRAN
Glossary

Contents

Contents
1 Glossary...........................................................................................................................................1

Issue 01 (2013-10-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

ii

eRAN
Glossary

1 Glossary

Glossary

Numerics
1xCS IWS

Circuit Switched Fallback Interworking


Solution Function for 3GPP2 1xCS

3DES

See Triple Data Encryption Standard

3GPP

See Third Generation Partnership Project

A-GPS

Assisted-GPS

AAA

See Authentication, Authorization and


Accounting

AAS

Adaptive Antenna System

ABS

Almost Blank Subframe

Access Control List

An Access Control List (ACL) is a list of IP


addresses. It is used for client authentication.

Access Stratum

An access stratum is a communication


medium or system that can be used to request
and set up the transfer of data or information
between points.

ACK/NACK

Acknowledgement/Not-acknowledgement

Acknowledged Mode

The acknowledged services in Radio Link


Control (RLC) provide reliability through
retransmission. These include but are not
limited to: transfer of user data, segmentation
and reassembly, error correction, duplicate
detection, protocol error detection and
recovery, and ciphering.

Issue 01 (2013-10-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

ACL

See Access Control List

ACSI

Average Cell Stay Interval

Active Queue Management

AQM is used for routers on the internet. It


discards data packets or adds an explicit
congestion notification (ECN) to data packets
before a queue on a router is full.

Adaptive Modulation and Coding

Link adaptation (AMC: adaptive modulation


and coding) with various modulation schemes
and channel coding rates is applied to the
shared data channel. The same coding and
modulation is applied to all groups of resource
blocks belonging to the same L2 PDU
scheduled to one user within one TTI and
within a single stream.

ADSL

See Asymmetric Digital Subscriber Line

Advanced Encryption Standard

Originally, the Advanced Encryption


Standard (AES) is an encryption algorithm
used by some U.S government departments to
guarantee the security of some secret but
unclassified materials. Now, AES has
become the most influential encryption
standard all around the world.The AES
algorithm is used to ensure the system
security.

Advanced Power Module

The Advanced Power Module (APM) is a


standalone cabinet configured with related
modules for DC power supply, battery
management, power system monitoring,
power distribution, surge protection,
temperature control, and backup power
supply. It also provides AC power ports for
maintenance and 4 U or 5 U space for 19-inch
customer equipment complying with the
ETSI standard.

AES

See Advanced Encryption Standard

AF

Application function

Aggregate Maximum Bit Rate

A QoS parameter defined by 3GPP. AMBR


refers to the maximum allowed rate of all nonGBR services of a UE.

AH

See Authentication Header

aICIC

Adaptive ICIC

AID

Access Description Data

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

AIS

See alarm indication signal

AISG

Antenna Interface Standards Group

AKA

See Authentication and Key Agreement

alarm indication signal

A code sent downstream in a digital network


as an indication that an upstream failure has
been detected and alarmed. It is associated
with multiple transport layers.

ALD

Antenna Line Device

Allocation and Retention Priority

Allocation and Retention Priority (ARP): the


primary purpose of ARP is to decide whether
a bearer establishment / modification request
can be accepted or needs to be rejected in case
of resource limitations. In addition, the ARP
can be used by the eNodeB to decide which
bearer(s) to drop during exceptional resource
limitations (e.g. at handover).

AM

See Acknowledged Mode

AMBR

See Aggregate Maximum Bit Rate

AMC

See Adaptive Modulation and Coding

AMR

Adaptive Multi-Rate

AMS

Adaptive MIMO Switching

ANR

Automatic Neighbor Relation

Antenna

An antenna (or aerial) is a transducer that


transmits or receives electromagnetic waves.
In other words, antennas convert
electromagnetic radiation into electrical
current, or vice versa.

Antenna port

An antenna port corresponds to a pilot format,


not a physical antenna. The pilot format is not
correlated with the number of antennas.

APAI

Average Packet Arrival Interval

APM

See Advanced Power Module

APN

Access Point Name

AQM

See Active Queue Management

AR

Advanced Receiver

ARP

See Allocation and Retention Priority

ARPU

See Average Revenue Per User

ARQ

See Automatic Repeat Request


Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Array gain

Array gain is a power gain achieved by


combining signals from different antennas
based on the correlation between signals and
the non-correlation between noises. Signal
combining increases the signal to interference
plus noise ratio (SINR) of the combined
signal.

AS

See Access Stratum

Asymmetric cryptography

Cryptography in which a pair of keys is used


to encrypt and decrypt a message. The
essential difference to symmetric
cryptography is that this kind of algorithm
uses two different keys for encryption and
corresponding decryption.

Asymmetric Digital Subscriber Line

A technology for transmitting digital


information at a high bandwidth on existing
phone lines to homes and businesses. Unlike
regular dialup phone service, ADSL provides
continuously-available, "always on"
connection. ADSL is asymmetric in that it
uses most of the channel to transmit
downstream to the user and only a small part
to receive information from the user. ADSL
simultaneously accommodates analog (voice)
information on the same line. ADSL is
generally offered at downstream data rates
from 512 kbit/s to about 6 Mbit/s.

AuC

See Authentication Center

Authentication and Key Agreement

AKA (Authentication and Key Agreement


security protocol ) is a mechanism which
performs authentication and session key
distribution in UMTS (Universal Mobile
Telecommunications System) networks.

Authentication Center

A database that stores authentication data and


encryption key. It can prevent unauthorized
users from accessing the network and ensure
data security over the air interface. The only
difference between the HLR and the AuC is
that the latter requires higher security.
Therefore, AuC is defined separately in the
relevant protocol. In actual situations, the
AuC and HLR are combined.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

eRAN
Glossary

1 Glossary

Authentication Header

Authentication Header (AH) is a member of


the IPsec protocol suite. AH guarantees
connectionless integrity and data origin
authentication of IP packets. Further, it can
optionally protect against replay attacks by
using the sliding window technique and
discarding old packets.

Authentication, Authorization and


Accounting

A mechanism for configuring authentication,


authorization, and accounting security
services. Authentication refers to the
verification of user identities and the related
network services; authorization refers to the
granting of network services to users
according to authentication results; and
accounting refers to the tracking of the
consumption of network services by users.

Automatic Repeat Request

An error control method for data transmission


in which the receiver detects transmission
errors in a message and automatically
requests a retransmission from the
transmitter.

Average Revenue Per User

ARPU is a term used by telephone Operators/


Carriers to indicate the financial revenue
which is gained per subscriber on a monthly
basis.

AWS

Advanced Wireless Services

Issue 01 (2013-10-30)

Base Transceiver Station

A Base Transceiver Station terminates the radio


interface. It allows transmission of traffic and signaling
across the air interface. The BTS includes the baseband
processing, radio equipment, and the antenna.

Baseband

A form of modulation in which the information is applied


directly onto the physical transmission medium.

BaseBand Unit

Base Band Unit (BBU) is a component of the distributed


base station. It provides baseband processing for signals
(such as channel coding/decoding, modulation/
demodulation), provides transmission management and
interfaces, manages radio resources, and provides clock
signals.

BBU

See BaseBand Unit

BCCH

See Broadcast Control Channel

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

BCH

Broadcast Channel

BER

See Bit Error Rate

BFD

See Bidirectional Forwarding Detection

BHSA

See Busy Hour Session Attempt

Bidirectional Forwarding
Detection

Bidirectional Forwarding Detection (BFD) is a network


protocol used to detect faults between two forwarding
engines connected by a link. It provides low-overhead
detection of faults even on physical media that don't
support failure detection of any kind, such as Ethernet,
virtual circuits, tunnels and MPLS Label Switched Paths.

Binary phase shift keying

2-phase modulation for carrier based on binary baseband


signal. In this modulation mode, the binary character 0
represents phase 0 of the carrier, and character 1
represents the phase 180. The phase of character 0 is 0,
and the phase of character 1 needs to be specified. This
is an absolute phase shift mode that uses different phases
to represent digital information.

Bit Error Rate

Ratio of received bits that contain errors. BER is an


important indicator used to measure the communications
quality of a network.

BITS

See Building Integrated Timing Supply System

BLER

See Block Error Rate

Block Error Rate

Block Error Rate (BLER) is used in measuring the error


rate when extracting data frames from a Compact Disc
(CD). The BLER measurement is often used as a quality
control measure with regards to how well audio is
retained on a Compact Disc over time.

BPSK

See Binary phase shift keying

BRAS

See Broadband Remote Access Server

Broadband Remote Access


Server

A new type of access gateway for broadband networks.


As a bridge between backbone networks and broadband
access networks, BRAS provides methods for
fundamental access and manages the broadband access
network. It is deployed at the edge of network to provide
broadband access services, convergence, and forwarding
of multiple services, meeting the demands for
transmission capacity and bandwidth utilization of
different users. BRAS is a core device for the broadband
users' access to a broadband network.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

eRAN
Glossary

1 Glossary

Broadcast Control Channel

This downlink channel contains specific parameters


needed by a mobile in order that it can identify the
network and gain access to it. Typical information
includes the LAC (Location Area Code) and RAC
(Routing Area Code), the MNC (Mobile Network Code)
and BA (BCCH Allocation) list.

BSR

See Buffer Status Report

BT

Bit Torrent

BTS

See Base Transceiver Station

Buffer Status Report

Data of the radio bear set in the UE buffer.

Building Integrated Timing


Supply System

In the situation of multiple synchronous nodes or


communication devices, one can use a device to set up a
clock system on the hinge of telecom network to connect
the synchronous network as a whole, and provide
satisfactory synchronous base signals to the building
integrated device. This device is called BITS.

Busy Hour Session Attempt

The number of call attempts on the current switch in the


busiest hour. The BHSA is used to measure the
processing performance of the system that uses the SIP
protocol in the IMS. The system processes not only calls
but also sessions.

Issue 01 (2013-10-30)

CA

See Certification Authority

CA

See Carrier Aggregation

CA Certificate chain

A list of certificates that are "walked" (or tRNCed) from


the root CA key to the CA key used to validate the peer's
certificate. That is, a certificate chain tRNCes a path of
certificates from a lower branch CA to the root CA that
is trusted by some entities in the CA hierarchy. Thus,
the entity can ensure that the peer's certificates is trusty.

Call History Record

A system used for identifying faults in an efficient way.


It records and stores the information of all the faults
occurring during a call for each user. If necessary, you
can query the call history records of a specific user
through the CHR client to quickly identify the faults.

CANBUS

See Controller Area Network BUS

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Carrier Aggregation

In Carrier Aggregation (CA), two or more Component


Carriers (CCs) are aggregated in order to support wider
transmission bandwidths up to 100MHz. A UE may
simultaneously receive or transmit on one or multiple
CCs depending on its capabilities.

Carrier-to-Interference-andNoise Ratio

A ratio used to assess channel quality. The BS sends the


REP-REQ message to the MS to request channel quality
check. The MS retrieves the CINR according to the
received information and then returns the data to the BS
through the REP-RSP message. The BS can select and
adjust the transmission channel or initiate a handover
according to the CINR.

Cascade

To connect components in series, the output of each


component serving as the input for the next.

CBC

Cell Broadcast Centre

CBE

Cell Broadcast Entity

CBS

See Committed Burst Size

CC

Component Carrier

CCCH

See Common Control Channel

CCE

Control Channel Element

CCO

Cell Change Order

CCU

Cell Center User

CDD

See Cyclic Delay Diversity

CDMA

See Code Division Multiple Access

CDMA2000 1x Radio
Transmission Technology

A 3G wireless technology based on the CDMA


platform. The 1x in 1xRTT refers to 1x the number of
1.25MHz channels. The RTT in 1xRTT stands for
Radio Transmission Technology.

CDMA2000 1xRTT

See CDMA2000 1x Radio Transmission Technology

CDT

Call Detail Trace

Central Processing Unit

The CPU is the brains of the computer. Sometimes


referred to simply as the processor or central processor,
the CPU is where most calculations take place.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Certificate Revocation List

A list of all canceled certificates. Digital Certificates are


only valid for a specified period; if, after this period,
they are not renewed by the owner they are revoked.
Revocation may also be applied to certificates that may
have been compromised. All revoked certificates are
listed and may be viewed through the CA (Certification
Authorities) web site. These lists are issued on a regular
basis by the CA, and prior to a dialogue being
established between end parties this list should be
checked to ensure the integrity of the parties involved
in the communication.

Certification Authority

In cryptography, a certificate authority or certification


authority (CA) is an entity that issues digital certificates
for use by other parties. It is an example of a trusted
third party. CAs are characteristic of many public key
infrastructure (PKI) schemes.

CEU

Cell Edge User

CFM

See Connectivity Fault Management

CHR

See Call History Record

CINR

See Carrier-to-Interference-and-Noise Ratio

CIO

Cell Individual Offset

CIR

See Committed Information rate

Circuit Switching

In telecommunications, a circuit switching network is


one that establishes a dedicated circuit (or channel)
between nodes and terminals before the users may
communicate. Each circuit that is dedicated cannot be
used by other callers until the circuit is r

CL-SM

Closed-Loop Spatial Multiplexing

CL-TD

Closed-Loop Transmit Diversity

CMAS

Commercial Mobile Alert System

CME

Configuration Management Express

CN

See Core Network

Co-channel interference
reduction gain

Co-channel interference reduction gain is achieved by


using interference rejection combining (IRC) or other
interference mitigation methods.

COD

Cell Outage Detection

Code Division Multiple Access

A technique for spread-spectrum multiple-access


digital communications that creates channels through
the use of unique code sequences.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Colored interference

Colored interference is interference whose power


spectral density is not evenly distributed over the entire
frequency or space domain.

Committed Burst Size

A parameter used to define the capacity of token bucket


C, that is, the maximum burst IP packet size when the
information is transferred at the committed information
rate. This parameter must be larger than 0. It is
recommended that this parameter should not be less
than the maximum length of an IP packet that might be
forwarded.

Committed Information rate

The rate at which a frame relay network agrees to


transfer information in normal conditions. Namely, it is
the rate, measured in bit/s, at which the token is
transferred to the leaky bucket.

Common Control Channel

A CCCH is a point-to-multipoint bidirectional control


channel. A CCCH is primarily intended to carry
signaling information necessary for access
management functions.

Common Public Radio Interface

Common Public Radio Interface (CPRI) is a common


standard of the key internal interface between the REC
and the RE of the wireless base station. This standard
was established by Huawei, Ericsson, NEC, Siemens,
and Nortel in June 2003. It aims at standardizing the
baseband and RF interface. The CPRI has a set of
mature standards, which advance the standard and
equipment. The major feature of the CPRI is that
baseband is separated from RF to reduce the cost of
engineering, equipment room, and equipment.

CoMP

See Coordinated Multipoint Transmission

Compressor

It is at the TX end, and is responsible for compressing


the header of the data packet based on the Profile and
the context.

Connectivity Fault Management

Ethernet Connectivity Fault Management (CFM) is an


end-to-end per-service-instance Ethernet layer
operation, administration, and management (OAM)
protocol. It includes proactive connectivity monitoring,
fault verification, and fault isolation for large Ethernet
metropolitan-area networks (MANs) and WANs.

Context

It contains the characteristic information about


compression and decompression of the packet header.
Every context is associated with a unique context
identifier.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

10

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Control Plane

The control plane performs the call control and


connection control functions. Through signaling, the
control plane sets up and releases connections, and may
restore a connection in case of a failure. The control
plane also performs other functions in support of call
and connection control, such as routing information
dissemination.

Controller Area Network BUS

Controller-area network (CAN or CANBUS) is a


vehicle bus standard designed to allow microcontrollers
and devices to communicate with each other within a
vehicle without a host computer. CANBUS is a
message based protocol, designed specifically for
automotive applications but now also used in other
areas such as industrial automation and medical
equipment.

Coordinated Multipoint
Transmission

By coordinating and combining signals from multiple


antennas, CoMP, will make it possible for mobile users
to enjoy consistent performance and quality when they
access and share datas.

Core Network

An architectural term relating to the part of UMTS,


which is independent of the connection technology of
the terminal.

Correlation

Correlation represents how closely two random


processes vary in time.

CPC

Continuous Packet Connectivity

CPE

Customer Premise Equipment

CPRI

See Common Public Radio Interface

CPU

See Central Processing Unit

CQI

Channel Quality Indicator

CRC

See Cyclic Redundancy Code

CRL

See Certificate Revocation List

Cross-certification

The process undertaken by Certification Authorities to


establish a trust relationship with another CA through
the signing of another CA's public key in a certificate
referred to as a "cross-certificate". When two
Certification Authorities are cross-certified, they agree
to trust and rely upon each other's public key certificates
and keys as if they had issued them themselves. The two
Certification Authorities exchange cross-certificates,
enabling their respective users to interact securely.

CS

See Circuit Switching

CSFB

Circuit Switched Fallback

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

11

eRAN
Glossary

1 Glossary

CSG

Closed Subscriber Group

CSI-RS

Channel Status Information Reference Signal

Cyclic Delay Diversity

Cyclic Delay Diversity (CDD) is a diversity scheme


used in OFDM-based telecommunication systems,
transforming spatial diversity into frequency diversity
avoiding intersymbol interference.

Cyclic Redundancy Code

A CRC is an error-detecting code. Its computation


resembles a polynomial long division operation in
which the quotient is discarded and the remainder
becomes the result, with the important distinction that
the polynomial coefficients are calculated according to
the carry-less arithmetic of a finite field. The length of
the remainder is always less than the length of the
divisor (called the generator polynomial), which
therefore determines how long the result can be. The
definition of a particular CRC specifies the divisor to
be used, among other things.

Issue 01 (2013-10-30)

D-BCH

See Dynamic Broadcast Channel

Data Encryption Standard

A specification for encryption of computer


data that uses a 56-bit key developed by IBM
and adopted by the U.S. government as a
standard in 1976.

Data Radio Bearer

The DRB is used to carry the data associated


with an EPS bearer. It is also known as
"dedicated radio beared".

DC

See Direct Current

DCCH

Dedicated Control Channel

DCDU

See Direct Current Distribution Unit

DCI

See Downlink Control Information

DCS

Digital Cellular Service

Decompressor

It is at the RX end, and is responsible for


restoring the header of the data packet based
on the Profile and the context.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

12

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

delay mesurement

The time elapsed since the start of


transmission of the first bit of the frame by a
source node until the reception of the last bit
of the loopbacked frame by the same source
node, when the loopback is performed at the
frame's destination node.

Demilitarized Zone

A buffer area between an insecure system and


the secure system and is used to solve the
problem that the external network equipped
with a firewall cannot access the internal
network server. The DMZ is located between
the internal network and the external network.
In the DMZ, some public server facilities,
such as the enterprise Web server and FTP
server, can be located. The DMZ effectively
protects the internal network.

Denial of Service

Refusal to provide services. DoS attacks are


aimed at stopping the computers or the
network from providing normal services.

DES

See Data Encryption Standard

DHCP

See Dynamic Host Configuration Protocol

Differentiated Services

An IETF standard that defines a mechanism


for controlling and forwarding traffic in a
differentiated manner based on CoS settings
to handle network congestion.

Differentiated Services Code Point

A Differentiated Services (DiffServ) Code


Point is a marker in the header of each IP
packet that prompts network routers to apply
differentiated grades of service to various
packet streams. It is specified by the DiffServ
policy proposed by the IETF (Internet
Engineering Task Force). This allows Internet
and other IP-based network service providers
to offer different levels of service to
customers.

DiffServ

See Differentiated Services

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

13

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Digital certificate

An electronic document used to validate the


end parties or entities employed in data
transfer. A digital certificate binds an identity
to a pair of electronic keys that can be used to
encrypt and sign digital information and
issued by a Certification Authority (CA) and
signed with the CA's private key. A digital
certificate typically contains the: - Owner's
name - Serial number of the digital certificate
- Expiration date of the public key - Owner's
public key - Name of the issuer - Digital
signature of the issuer

Digital signature

A message signed with a sender's private key


that can be verified by anyone who has access
to the sender's public key. Digital signature
gives the receiver the reason to believe the
message was sent by the claimed sender. A
proper implementation of digital signature is
computing a message digest for the message
sent from the sender to the receiver, and then
signing the message digest. The result is
called digital signature and is sent to the
receiver together with the original message.

Digital Subscriber Line Access


Multiplexer

A network device, usually situated in the main


office of a telephone company that receives
signals from multiple customer Digital
Subscriber Line (DSL) connections and puts
the signals on a high-speed backbone line
using multiplexing techniques.

Direct Current

Direct current (DC) is the unidirectional flow


of electric charge.

Direct Current Distribution Unit

A direct current distribution unit distributes


the -48 V DC received from an external power
source to other devices.

Discontinuous Reception

Discontinous Reception (DRX) is a method


used in mobile communication to conserve
the battery of the mobile device. The mobile
device and the network negotiate phases in
which data transfer happens. During other
times the device turns its receiver off and
enters a low power state.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

14

eRAN
Glossary

1 Glossary

Diversity gain

Diversity gain is a performance gain achieved


by reducing the fading effects. The deep
fading degree of the combined signal can be
reduced because the probability of concurrent
deep fading on multiple channels is lower
than that on a single channel. The fading
degree is represented by SINR variance.

DL

See Downlink

DL-SCH

Downlink Shared Channel

DM

See delay mesurement

DMZ

See Demilitarized Zone

DOA

Direction of Arrival

DoS

See Denial of Service

Downlink

A downlink is a channel on which data is


transmitted from the BS to the terminal.

Downlink Control Information

The PDCCH is used to carry DCI such as


scheduling decisions and power control
commands. More specifically, the DCI
includes:
l Downlink scheduling assignments,
including PDSCH resource indication,
transport format, hybrid-ARQ
information, and control information
related to spatial multiplexing (if
applicable). A downlink scheduling
assignment also includes a command for
power control of the PUCCH uplink
physical channel.
l Uplink scheduling grants, including
PUSCH resource indication, transport
format, and hybrid-ARQ-related
information. An uplink scheduling grant
also includes a command for power
control of the PUSCH uplink physical
channel.
l Power-control commands for a set of
terminals as a complement to the
commands included in the scheduling
assignments/grants. The different types of
control information above typically
correspond to different DCI message
sizes.

DRB

Issue 01 (2013-10-30)

See Data Radio Bearer

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

15

eRAN
Glossary

1 Glossary

DRS

Dedicated Reference Signal

DRX

See Discontinuous Reception

Dry contact

A type of passive switch that has two states:


open and closed. The two contacts are not
distinguished by polarity. Therefore, the two
contacts can be used interchangeably.
Common dry contact signals are the outputs
of switches, buttons, sensors, relays, and dry
finger pipes.

DSCP

See Differentiated Services Code Point

DSLAM

See Digital Subscriber Line Access


Multiplexer

DTCH

Dedicated Traffic Channel

Duplexer

A device that consists of a transmitting filter


and a receiving filter and provides a reliable
path for sharing of an antenna by transmission
and reception so that the high-power
transmitted signals do not have an obvious
impact on the weak received signals.

DwPTS

Downlink Pilot Timeslot

Dynamic Broadcast Channel

It carriers the MIB information.

Dynamic Host Configuration Protocol

Dynamic Host Configuration Protocol


(DHCP) is a client-server networking
protocol. A DHCP server provides
configuration parameters specific to the
DHCP client host requesting, generally,
information required by the host to participate
on the Internet network. DHCP also provides
a mechanism for allocation of IP addresses to
hosts.

E-CID

Enhanced Cell ID

E-MBMS

See Evolved MBMS

E-RAB

See E-UTRAN Radio Access Bearer

Issue 01 (2013-10-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

16

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

E-UTRA Absolute Radio Frequency


Channel Number

A method of identifying the center carrier


frequencies in E-UTRA. The carrier
frequency in the uplink and downlink is
designated by the EARFCN (E-UTRA
Absolute Radio Frequency Channel Number)
in the range 0 - 65535. The channel raster is
100KHz for all bands, which means that the
carrier centre frequency must be an integer
multiple of 100KHz. The relation between
EARFCN and the carrier frequency in MHz
for the downlink/uplink is given by an
equation and associated table of frequency
bands.

E-UTRAN

See Evolved UTRAN

E-UTRAN Cell Global Identifier

The E-UTRAN Cell Global Identifier is used


to identify cells globally. The ECGI is
constructed from the MCC (Mobile Country
Code), MNC (Mobile Network Code) and the
ECI (E-UTRAN Cell Identifier).

E-UTRAN NodeB

The eNodeB is the principal function within


the E-UTRAN. Its functions include Radio
Resource Management, Uplink Packet
Classification and QoS Policy Enforcement,
Data Compression and User Data Encryption
across the air. Towards the EPC (Evolved
Packet Core) it is responsible for forwarding
of control plane signalling to the MME
(Mobility Management Entity). Likewise
User Plane traffic is forwarded to the S-GW
(Serving Gateway).

E-UTRAN Radio Access Bearer

The concatenation of an S1 bearer and the


corresponding radio bearer. When an E-RAB
exists, there is a one-to-one mapping between
this E-RAB and an EPS bearer of the Non
Access Stratum. Each E-RAB is defined by
the following parameters: 1) E-RAB ID - this
element is used to identify the E-RAB on the
S1 interface. 2) E-RAB QoS - this element
describes the QCI (Quality Class Identifier)
that defines QoS parameters such as end to
end delay, bit error rates etc. Also included
are allocation and retention priorities as well
as GBR (Guaranteed Bit Rate) parameters if
real time services are to be supported over the
E-RAB.

EAP-TLS

See Extensible Authentication Protocal


Transport Layer Security

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

17

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

EAPoL

See Extensible Authentication Protocol over


LAN

EARFCN

See E-UTRA Absolute Radio Frequency


Channel Number

EBC

See Event Based Counter

EBF

See Eigen Beamforming

EBS

See Excess Burst Size

ECGI

See E-UTRAN Cell Global Identifier

ECM

See EPS Connection Management

eCSFB

Enhanced Circuit Services fallback

EEA

See EPS Encryption Algorithm

EGT

See Equal Gain Transmission

EHPLMN

See Equivalent HPLMN

EIA

See EPS Integrity Algorithm

eICIC

Enhanced-Inter-Cell Interference
Coordination

Eigen Beamforming

EBF computes the eigen values of a channel


covariance matrix to obtain beamforming
weights.

Electronic Serial Number

A 32-bit number assigned by the mobile


station manufacturer, uniquely identifying a
mobile station. This is similar to the
International Mobile Equipment Identity
(IMEI) used in GSM networks.

EMM

See EPS Mobility Management

EMU

See Environment Monitoring Unit

Energy Per Resource Element

Downlink power control determines the


energy per resource element (EPRE). The
term resource element energy denotes the
energy prior to CP insertion. The term
resource element energy also denotes the
average energy taken over all constellation
points for the modulation scheme applied.

eNodeB

See E-UTRAN NodeB

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

18

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Environment Monitoring Unit

The Environment Monitoring Unit (EMU)


uses sensors to monitor the temperature,
humidity, smoke, and intrusion in the
environment in real time. The environment
can be automatically monitored according to
the preset values and alarms are automatically
generated when the preset thresholds are
exceeded.

EOC

Emergency Operations Center

EPC

See Evolved Packet Core

EPF

Enhanced Proportional Fair

EPRE

See Energy Per Resource Element

EPS

See Evolved Packet System

EPS Connection Management

In addition to the LTE Active, Idle and


Detached states there also exists various EPS
Mobility Management (EMM) and EPS
Connection Management (ECM) states. The
ECM states describe the signalling
connectivity between the UE and the EPC.
Two ECM states exist, namely ECM-IDLE
and ECM-CONNECTED.

EPS Encryption Algorithm

E-UTRA includes the support of EEA (EPS


Encryption Algorithm) and EIA (EPS
Integrity Algorithm). The EEA (EPS
Encryption Algorithm) are each assigned a
4bit identifier. Currently, the following
values have been defined for NAS, RRC and
UP ciphering: 0000 - 128-EEA0 Null
ciphering algorithm. 0001 - 128-EEA1
SNOW 3G. 0010 - 128-EEA2 AES
(Advanced Encryption Standard).

EPS Integrity Algorithm

The integrity process uses an EIA (EPS


Integrity Algorithm), these have a 4bit
identifier. Examples of EIA algorithms
include: 0001 - 128-EIA1 SNOW 3G. 0010 128-EIA2 AES. These are implemented in the
UE and eNB for RRC signalling integrity
protection. In addition, they are also
implemented in the UE and MME for NAS
integrity protection.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

19

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

EPS Mobility Management

In addition to the LTE Active, Idle and


Detached states there also exists various EPS
Mobility Management (EMM) and EPS
Connection Management (ECM) states. The
EMM states result from the mobility
management procedures, such as Attach and
Tracking Area Update procedures. Two
EMM states exist, EMM-DEREGISTERED
and EMMREGISTERED.

Equal Gain Transmission

EGT is similar to EBF. The difference is that


EGT normalizes the amplitudes of antenna
weights. That is, only phases are weighted,
but amplitudes are not. Huawei eNodeB uses
the EGT algorithm.

Equivalent HPLMN

Any PLMN to be declared as an equivalent to


the HPLMN shall be present within the
EHPLMN list and is called an EHPLMN.

ESN

See Electronic Serial Number

ETSI

European Telecommunications Standards


Institute

Event Based Counter

The method of generate extended


performance statistics counter based on
message from eNB Call History Record.

event-triggered periodic reporting

After an event is reported for the first time,


the measurement results associated with the
event are reported periodically. This reporting
mode is called event-triggered periodical
reporting.

Evolved MBMS

MBMS is called EMBMS (Evolved MBMS)


in the SAE/LTE-based network architecture.

Evolved Packet Core

A framework for an evolution or migration of


the 3GPP system to a higher-data-rate, lowerlatency, packet-optimized system that
supports, multiple RATs.

Evolved Packet System

An evolution of the 3G UMTS characterized


by higher-data-rate, lower-latency, packetoptimized system that supports multiple
RATs. The Evolved Packet System comprises
the Evolved Packet Core together with the
evolved radio access network (E-UTRA and
E-UTRAN).

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

20

eRAN
Glossary

1 Glossary

Evolved UTRAN

An evolution of the 3G UMTS radio-access


network towards a high-data-rate, lowlatency and packet-optimized radio-access
network.

Excess Burst Size

In the single rate three color marker (srTCM)


mode, traffic control is achieved by the token
buckets C and E. Excess burst size is a
parameter used to define the capacity of token
bucket E, that is, the maximum burst IP packet
size when the information is transferred at the
committed information rate. This parameter
must be larger than 0. It is recommended that
this parameter should not be less than the
maximum length of an IP packet that might
be forwarded.

Extensible Authentication Protocal


Transport Layer Security

EAP-Transport Layer Security (EAP-TLS),


defined in RFC 5216, is an IETF open
standard, and is well-supported among
wireless vendors. The security of the TLS
protocol is strong, provided the user
understands potential warnings about false
credentials. It uses PKI to secure
communication to a RADIUS authentication
server or another type of authentication
server.

Extensible Authentication Protocol over


LAN

Extensible Authentication Protocol (EAP)


over LAN (EAPoL) is a network port
authentication protocol used in IEEE 802.1X
(Port Based Network Access Control)
developed to give a generic network sign-on
to access network resources. EAPoL, similar
to EAP, is a simple encapsulation that can run
over any LAN. The same three main
components are defined in EAP and EAPoL
to accomplish the authentication
conversation: - Supplicant (Port
Authentication Entity (PAE) seeking access
to netwrok resources) - Authenticator (PAE
that controls network access) - Authentication
Server (a RADIUS/AAA server)

Issue 01 (2013-10-30)

FAG

Feature Activation Guidline

Fan

A device for heat dissipation by creating a current of air.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

21

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Fast Ethernet

In computer networking, Fast Ethernet is a collective term for a


number of Ethernet standards that carry traffic at the nominal
rate of 100 Mbit/s, against the original Ethernet speed of 10
Mbit/s. Of the fast Ethernet standards 100BASE-TX is by far
the most common and is supported by the vast majority of
Ethernet hardware currently produced.

FDD

See Frequency Division Duplex

FDMA

See Frequency Division Multiple Access

FE

See Fast Ethernet

FEC

See Forward Error Correction

FFT

Fast Fourier Transform

FH

See frequency hopping

FIFO

See First In First Out

File Transfer Protocol

A member of the TCP/IP suite of protocols, used to copy files


between two computers on the Internet. Both computers must
support their respective FTP roles: one must be an FTP client
and the other an FTP server.

Firewall

A combination of a series of components set between different


networks or network security domains. By monitoring, limiting,
and changing the data traffic across the firewall, it masks the
interior information, structure and running state of the network
as much as possible to protect the network security.

First In First Out

FIFO is a term used to describe routing buffers where no QoS


(Quality of Service) is applied to packets entering the router.
Packets are treated in the order that they are received by the
router. QoS routers use processes such as weighted fair queuing
and weighted round robin in order to provide QoS to IP packet
services.

First Order

A ROHC compressor is in one of 3 main states. In First-Order


(FO) state, the compressor has detected and stored the static
fields (such as IP addresses and port numbers) on both sides of
the connection. The compressor is also sending dynamic packet
field differences in FO state. Thus, FO state is essentially static
and pseudo-dynamic compression.

FL

Feature List

FO

See First Order

Forward Error
Correction

A bit error correction technology that adds the correction


information to the payload at the transmit end. Based on the
correction information, the bit errors generated during
transmission are corrected at the receive end.

FPC

See Fractional Power Control

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

22

eRAN
Glossary

1 Glossary

FPI

Flow Priority Index

Fractional Power
Control

A power control technique used to compensate part of path loss.

Frequency Division
Duplex

Frequency Division Duplex is employed in radio systems to


provide an uplink and downlink radio channel between the
network and the user. The frequencies separated by a duplex
spacing. Users tune between the uplink and downlink
frequencies to transmit and receive respectively.

Frequency Division
Multiple Access

A technique in which multiple users of a radio system are


separated in the frequency domain.

Frequency Switched
Transmit Diversity

Frequency switched transmit diversity (FSTD) is a technique in


which some of multiple antennas (if configured) are selected in
a specific frequency order for transmission.

frequency hopping

The repeated switching of frequencies during radio transmission


according to a specified algorithm, to minimize unauthorized
interception or jamming of telecommunications.

FSTD

See Frequency Switched Transmit Diversity

FTP

See File Transfer Protocol

Issue 01 (2013-10-30)

Gateway Mobile Location Center

The Gateway Mobile Location Centre


(GMLC) contains functionality required to
support LCS. In one PLMN, there may be
more than one GMLC. A GMLC is the first
node an external LCS client accesses in a
PLMN (i.e. the Le reference point is
supported by the GMLC).

GBR

Guaranteed Bit Rate

GCI

Global Cell Identity

GE

See Gigabit Ethernet

General Packet Radio Service

A mobile data service available to users of


GSM mobile phones. It is often described as
"2.5G", that is, a technology between the
second (2G) and third (3G) generations of
mobile telephony.

GERAN

See GSM/EDGE Radio Access Network

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

23

eRAN
Glossary

1 Glossary

Gigabit Ethernet

Gigabit Ethernet (GbE or 1 GigE) is a term


describing various technologies for
transmitting Ethernet frames at a rate of a
gigabit per second, as defined by the IEEE
802.3-2008 standard.

Global Positioning System

A satellite-based global navigation system


that consists of a constellation of 24 satellites
in orbit 11,000 nmi above the Earth, several
on-station (i.e., in-orbit) spares, and a groundbased control segment.

Global System for Mobile communications A second generation cellular telecommunication system which was first planned in the
early 1980s. Unlike first generation systems
operating at the time, GSM was digital and
thus introduced greater enhancements such as
security, capacity, quality and the ability to
support integrated services. Initially, GSM
was planned to be a European system
allowing subscribers to roam between
different networks however, GSM was
quickly adopted by many other regions and is
now a "Global System". Many countries
around the world have now met market
saturation point, which means over 100% of
the population of that country possess a GSM
phone.

Issue 01 (2013-10-30)

Globally Unique MME Identifier

The GUTI (Globally Unique Temporary


Identity) has two main components, the
GUMMEI (Globally Unique MME
Identifier) that uniquely identifies the MME
that allocated the GUTI and the M-TMSI (MTemporary Mobile Subscriber Identity) that
provides for an unambiguous identity of the
UE within this MME.

GMLC

See Gateway Mobile Location Center

GPRS

See General Packet Radio Service

GPRS Tunneling Protocol User Plane

GTP is the defining IP protocol of the GPRS


core network. Primarily it is the protocol
which allows end users of a GSM or
WCDMA network to move from place to
place while continuing to connect to the
Internet as if from one location at the Gateway
GPRS Support Node (GGSN). It does this by
carrying the subscriber's data from the
subscriber's current Serving GPRS Support
Node (SGSN) to the GGSN which is handling
the subscriber's session.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

24

eRAN
Glossary

1 Glossary

GPS

See Global Positioning System

GSM

See Global System for Mobile


communications

GSM/EDGE Radio Access Network

A GSM radio access network that supports the


EDGE (Enhanced Data rates for Global
Evolution) modulation technique. It has been
specified to connect the A , Gb and Iu
interfaces to the CN (Core Network). The
architecture allows two BSSs (Base Station
Subsystems) to be connected to each other.

GTP-U

See GPRS Tunneling Protocol User Plane

GUMMEI

See Globally Unique MME Identifier

GUTI

Globally Unique Temporary Identifier

GWCN

Gateway Core Network

Issue 01 (2013-10-30)

HARQ

See Hybrid Automatic Repeat Request

Hash Message Authentication


Code

Also known as "Hash-based Message Authentication


Code". In cryptography, HMAC (Hash-based Message
Authentication Code), is a specific construction for
calculating a message authentication code (MAC)
involving a cryptographic hash function in combination
with a secret key. As with any MAC, it may be used to
simultaneously verify both the data integrity and the
authenticity of a message. Any iterative cryptographic
hash function, such as MD5 or SHA-1, may be used in
the calculation of an HMAC; the resulting MAC
algorithm is termed HMAC-MD5 or HMAC-SHA1
accordingly. The cryptographic strength of the HMAC
depends upon the cryptographic strength of the
underlying hash function, the size of its hash output
length in bits and on the size and quality of the
cryptographic key.

Hetnet

Heterogeneous network

HFN

Hyper Frame Number

High Interference Indication

An IE that provides, per PRB, a 2 level report on


interference sensitivity. Each position in the bitmap
represents a PRB (first bit=PRB 0 and so on), for which
value "1" indicates 'high interference sensitivity' and
value "0" indicates 'low interference sensitivity'.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

25

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

High Rate Packet Data

High Rate Packet Data (HRPD), also known as TIA/EIA


IS-856 or 1xEV-DO, is a packet data protocol in the 3G
mobile communications network based on CDMA2000.

HII

See High Interference Indication

HLR

See home location register

HMAC

See Hash Message Authentication Code

home location register

A database that manages the mobile subscriber data. It


stores the following information including account
information of a subscriber (composed of
telecommunication service subscription data and
subscriber status data), mobile station location
information (MM information), MSISDN and IMSI.

Home PLMN

A PLMN where the MCC and MNC of the PLMN


identity match the MCC and MNC of the IMSI. Matching
criteria are defined in TS 23.122.

Home Subscriber Server

The Home Subscribe Server is the main IMS database


which also acts as database in EPC. The HSS is a super
HLR that combined legacy HLR and AuC functions
together for CS and PS domains. In the IMS architecture,
the HSS connects to application servers as well as the Call
Session Control Function (CSCF) using the DIAMETER
protocol.

HPLMN

See Home PLMN

HRPD

See High Rate Packet Data

HSS

See Home Subscriber Server

HSUPA

High Speed Uplink Packet Data

HTTP

See Hypertext Transfer Protocol

Hybrid Automatic Repeat


Request

To make up the defects of forward error correction coding


and automatic retransmission request, these two methods
are combined to create Hybrid Automatic Repeat Request
(HARQ), which means an ARQ system contains an FEC
subsystem. When the FEC can correct the errors, the
ARQ is not used. When the FEC cannot correct the errors,
the ARQ request the retransmission of error codes
through the ARQ feedback channel. Only the physical
layer of OFDMA supports the HARQ mechanism. The
HARQ has the advantages of both forward error
correction coding and automatic retransmission request,
thus improving the reliability of data transmission and
system throughput.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

26

eRAN
Glossary

1 Glossary

Hypertext Transfer Protocol

A protocol used to carry requests from a browser to a Web


server and to transport pages from Web servers back to
the requesting browser. Although HTTP is almost
universally used on the Web, it is not a secure protocol.

Issue 01 (2013-10-30)

IBLER

Initial Block Error Rate

ICI

Inter Carriers Interference

ICIC

Inter-Cell Interference Coordination

ICMP

See Internet Control Message Protocol

IE

See Information Element

IEEE

See Institute of Electrical and Electronics


Engineers

IFTS

See Intelligent Field Test System

IKE

See Internet Key Exchange

iManager M2000

A platform on which centralized management


of a mobile network can be performed. The
M2000 can manage Huawei mobile network
elements in a centralized way, including the
UMTS network elements, GSM network
elements, CDMA network elements and IP
network devices used in the mobile network.
The M2000 implements centralized fault
management, centralized performance
management, centralized configuration
management, centralized topology
management, centralized security
management, and system management.

IMEI

See International Mobile Equipment Identity

Immediate MDT

Immediate Minimization of Drive Test

IMS

See IP Multimedia Subsystem

IMSI

See International Mobile Subscriber Identity

Information Element

An Information Element is a group of


information which may be included within a
signaling message or data flow which is sent
across an interface. Examples may include
QoS (Quality of Service) definitions, setup
parameters, user identifiers etc.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

27

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Initialization and Refresh

A ROHC compressor is in one of 3 main


states. In Initialization and Refresh (IR) state,
the compressor has just been created or reset,
and full packet headers are sent.

Institute of Electrical and Electronics


Engineers

A society of engineering and electronics


professionals based in the United States but
boasting membership from numerous other
countries. The IEEE focuses on electrical,
electronics, computer engineering, and
science-related matters.

Intelligent Field Test System

The Intelligent Field Test System (IFTS)


enables the eNodeB to select some UEs based
on preset conditions, to trace the UEs, and to
proactively start the next measurement.

Inter Symbol Interference

Interference between adjacent pulses of a


transmitted code.

Interference Rejection Combining

An optimized RF algorithm, which has


satisfactory anti-inteference performance and
improves the voice quality effectively.

International Mobile Equipment Identity

The International Mobile Equipment Identity


is a unique identifier allocated to each Mobile
Equipment (ME). It consists of a Type
Approval Code (TAC), a Final Assembly
Code (FAC), Serial Number (SNR) and a
Spare Digit.

International Mobile Subscriber Identity

A unique number associated with all GSM


and UMTS network mobile phone users. It is
stored in the SIM inside the phone and is sent
by the phone to the network. It is also used for
acquiring other details of the mobile in the
Home Location Register (HLR) or as locally
copied in the Visitor Location Register. To
prevent eavesdroppers identifying and
tracking the subscriber on the radio interface,
the IMSI is sent as rarely as possible and a
randomly-generated TMSI is sent instead.

International Telecommunication Union

A United Nations agency, one of the most


important and influential recommendation
bodies, responsible for recommending
standards for telecommunication (ITU-T) and
radio networks (ITU-R).

Internet Control Message Protocol

ICMP belongs to the TCP/IP protocol suite.


It is used to send error and control messages
during the transmission of IP packets.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

28

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Internet Key Exchange

Internet Key Exchange (IKE) is the protocol


used to set up a security association (SA) in
the IPsec protocol suite. It is a hybrid protocol
and implements Oakley key exchange and
SKEME key exchange in the ISAKMP frame.
Both Oakley and SKEME define a key
exchange method, including the structure of
the valid payload, valid payload of
transmitted information, handling procedure
of the key, and method to use the key.

Internet Protocol

Internet Protocol is a standardized method of


transporting information across the Internet in
packets of data. It is often linked to
Transmission Control Protocol, which
assembles the packets once they have been
delivered to the intended location.

Internet Security Association and Key


Management Protocol

A protocol that allows the message receiver


to get a public key and use digital certificates
to authenticate the sender's identity.

IOS

Intelligent Optimum Sample

IOT

Interference Over Thermal

IP

See Internet Protocol

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

29

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

IP Multimedia Subsystem

A standardized Next Generation Networking


(NGN) architecture for telecom operators that
want to provide mobile and fixed multimedia
services. It uses a Voice-over-IP (VoIP)
implementation based on a 3GPP
standardized implementation of SIP, and runs
over the standard Internet Protocol (IP).
Existing phone systems (both packetswitched and circuit-switched) are supported.
The aim of IMS is not only to provide new
services but all the services, current and
future, that the Internet provides. In this way,
IMS will give network operators and service
providers the ability to control and charge for
each service. In addition, users have to be able
to execute all their services when roaming as
well as from their home networks. To achieve
these goals, IMS uses open standard IP
protocols, defined by the IETF. So, a
multimedia session between two IMS users,
between an IMS user and a user on the
Internet, and between two users on the
Internet is established using exactly the same
protocol. Moreover, the interfaces for service
developers are also based on IP protocols.
This is why IMS truly merges the Internet
with the cellular world; it uses cellular
technologies to provide ubiquitous access and
Internet technologies to provide appealing
services.

IP Performance Monitor

IP performance monitor effectively monitors


the transport network by timely and quickly
monitoring the QoS of the bearer network. IP
performance monitor requires the support of
the BSC and the BTS.

IP PM

See IP Performance Monitor

IP Security

Internet Protocol Security (IPsec) is a


protocol suite for securing Internet Protocol
(IP) communications by authenticating and
encrypting each IP packet of a data stream.
IPsec also includes protocols for establishing
mutual authentication between agents at the
beginning of the session and negotiation of
cryptographic keys to be used during the
session. IPsec can be used to protect data
flows between a pair of hosts (e.g. computer
users or servers), between a pair of security
gateways (e.g. routers or firewalls), or
between a security gateway and a host.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

30

eRAN
Glossary

1 Glossary

IPSec

See IP Security

IR

See Initialization and Refresh

IRC

See Interference Rejection Combining

ISAKMP

See Internet Security Association and Key


Management Protocol

ISI

See Inter Symbol Interference

ITU

See International Telecommunication Union

Key Performance Indicator

The KPI indicates the performance value of


an object at a certain time point. A KPI may
be obtained by the aggregation of multiple
levels of KPIs.

KPI

See Key Performance Indicator

LAC

See Location Area Code

LACP

See Link Aggregation Control Protocol

LAN

See Local Area Network

LBFD

See LTE Basic Feature Description

LCID

See Logical Channel Identifier

LCR

Low Chip Rate

LCS

See LoCation Services

LDAP

See Lightweight Directory Access Protocol

Lightweight Directory Access Protocol

The Lightweight Directory Access Protocol,


or LDAP, is an application protocol for
querying and modifying data using directory
services running over TCP/IP. LDAP was
originally intended to be a lightweight
alternative protocol for accessing X.500
directory services through the simpler (and
now widespread) TCP/IP protocol stack.
Today, X.500 directory protocols including
DAP can also be used directly over TCP/IP.

Issue 01 (2013-10-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

31

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Link Aggregation Control Protocol

Within the IEEE specification the Link


Aggregation Control Protocol (LACP)
provides a method to control the bundling of
several physical ports together to form a
single logical channel. LACP allows a
network device to negotiate an automatic
bundling of links by sending LACP packets
to the peer (directly connected device that also
implements LACP).

Link Layer Discovery Protocol

The Link Layer Discovery Protocol (LLDP)


is an L2D protocol defined in IEEE 802.1ab.
Using the LLDP, the NMS can rapidly obtain
the Layer 2 network topology and changes in
topology when the network scales expand.

LLDP

See Link Layer Discovery Protocol

LM

See loss measurement

LMPT

See LTE Main Processing Transmission Unit

LMT

See Local Maintenance Terminal

LNA

Low Noise Amplifier

Local Area Network

A local area network (LAN) is a computer


network covering a small physical area, like
a home, office, or small groups of buildings,
such as a school, or an airport.

Local Maintenance Terminal

Local Maintenance Terminal (LMT) is a tool


that connects to the network element and
provides the GUI for the OM of the network
element. The LMT is used for the OM of an
NE. It supports local and remote maintenance
modes.

Location Area Code

An identifier used to identify an LA within a


Public Land Mobile Network (PLMN). It
ranges from 0 to 65,535.

LoCation Services

A service that allows carriers to obtain the


geographic location of a target MS/UE by
using dedicated mobile positioning
technologies and to provide location based
services to mobile subscribers.

LOFD

See LTE Optional Feature Description

Logged MDT

Logged Minimization of Drive Test

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

32

eRAN
Glossary

1 Glossary

Logical Channel Identifier

The number that can be employed to identify


each virtual circuit (or logic channel) is called
logic channel identifier (LCI) or virtual
circuit number (VCN).

Long Term Evolution

LTE is a 3GPP advancement to current


mobile telecommunications networks,
designed to significantly improve data rates
to at least the tens of Mbps region per user
(data rates in the hundreds of Mbps region are
possible if conditions are ideal). Standardized
in 3GPP Release 8, LTE introduces a network
which is based purely on IP as the transport
mechanism. That is, all traffic, including
voice, will be passed across the E-UTRAN as
an IP datagram. LTE is predominantly
associated with the radio access network, with
the SAE specifications defining the core
network (termed the EPC).

loss measurement

A method used to collect counter values


applicable for ingress and egress service
frames where the counters maintain a count
of transmitted and received data frames
between a pair of MEPs.

LSTI

LTE SAE Trial Initiative

LTE

See Long Term Evolution

LTE Basic Feature Description

Prefix of eRAN basic-feature IDs.

LTE Main Processing Transmission Unit

LTE main control transmission board, which


provides the main control function and
transport ports.

LTE Optional Feature Description

Prefix of eRAN optional-feature IDs.

Issue 01 (2013-10-30)

M2000

See iManager M2000

MAC

See Medium Access Control

MAC-I

See Message Authentication Code for Integrity

Man-Machine Language

A language designed to facilitate direct user control of a


computer.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

33

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Managed Object

A Managed Object can be either a physical or logical


resource which may be defined in terms of its attributes.
These attributes may be controlled by a network manager
through a manager agent interaction. Managed Objects
form an important part of a TMN (Telecommunication
Management Network).

MAPL

Maximum Allowed Path Loss

Master Information Block

A master information block is used to specify what system


information blocks are in use in a cell, and how they should
be accessed.

Maximum Ratio
Transmission

MRT is similar to Maximum Ratio Combining (MRC). The


difference is that MRT weights data at the transmitter
whereas MRC weights data at the receiver. When the UE
uses only one antenna for reception, MRT works the same
as EBF.

maximum transmission unit

The largest packet of data that can be transmitted on a


network. MTU size varies, depending on the network576
bytes on X.25 networks, for example, 1500 bytes on
Ethernet, and 17,914 bytes on 16 Mbit/s token ring.
Responsibility for determining the size of the MTU lies
with the link layer of the network. When packets are
transmitted across networks, the path MTU, or PMTU,
represents the smallest packet size (the one that all networks
can transmit without breaking up the packet) among the
networks involved.

MBMS

Multimedia Broadcast/Multicast Service

MBR

Maximum Bit Rate

MBSFN

See Multimedia Broadcast multicast service Single


Frequency Network

MC-PPP

Multi-Class Point-to-Point Protocol

MCC

See Mobile Country Code

MCE

MAC Control Element

MCE

MBMS Coordination Entity

MCS

Modulation and Coding Scheme

MD5

See Message-Digest algorithm 5

MDT

See Minimization of Drive-Tests

Mean Time Between Failures

The average time between consecutive failures of a piece


of equipment. It is a measure of the reliability of the system.

Mean Time To Recovery

The average time that a device will take to recover from any
failure.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

34

eRAN
Glossary

1 Glossary

Media Gateway

A logical entity that converts the format of the media of a


network to meet the format requirement of another network.
It can process audio services, video services and data
services, and convert the media format in full duplex mode.
In addition, it can play certain audio and video signals, and
provide the IVR function and media conference.

Medium Access Control

The Media Access Control (MAC) data communication


protocol sub-layer, also known as the Medium Access
Control, is a sublayer of the Data Link Layer specified in
the seven-layer OSI model (layer 2). It provides addressing
and channel access control mechanisms that make it
possible for several terminals or network nodes to
communicate within a multi-point network, typically a
local area network (LAN) or metropolitan area network
(MAN). The hardware that implements the MAC is referred
to as a Medium Access Controller. The MAC sub-layer acts
as an interface between the Logical Link Control (LLC)
sublayer and the network's physical layer. The MAC layer
emulates a full-duplex logical communication channel in a
multi-point network. This channel may provide unicast,
multicast or broadcast communication service.

Message Authentication Code For details about MAC-I, see 3GPP TS 36.323.
for Integrity

Issue 01 (2013-10-30)

Message-Digest algorithm 5

In cryptography, MD5 (Message-Digest algorithm 5) is a


widely used cryptographic hash function with a 128-bit
hash value. Specified in RFC 1321, MD5 has been
employed in a wide variety of security applications, and is
also commonly used to check the integrity of files.
However, it has been shown that MD5 is not collision
resistant; as such, MD5 is not suitable for applications like
SSL certificates or digital signatures that rely on this
property. An MD5 hash is typically expressed as a 32-digit
hexadecimal number.

MGW

See Media Gateway

MIB

See Master Information Block

MIMO

See Multiple-Input Multiple-Output

Minimization of Drive-Tests

A technique that utilizes commercial terminal to collect


measurement result automatically, in order to detect and
optimize the problem and failure in wireless network.

Minimum Mean Square


Error

In statistics and signal processing, a minimum mean square


error (MMSE) estimator describes the approach which
minimizes the mean square error (MSE), which is a
common measure of estimator quality.

ML-PPP

Multi-Link Point-to-Point Protocol

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

35

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

MLB

Mobility Load Balancing

MME

See Mobility Management Entity

MME Code

The IE MMEC identifies an MME within the scope of an


MME Group within a PLMN.

MME Group Identifier

The MMEGI uniquely identifies an MME group within a


PLMN.

MME Identifier

The MMEI is constructed from an MMEGI (MME Group


ID) and an MMEC (MME Code), where the MMEGI
provides the Group Identity of the registered MME within
the PLMN.

MMEC

See MME Code

MMEGI

See MME Group Identifier

MMEI

See MME Identifier

MML

See Man-Machine Language

MMSE

See Minimum Mean Square Error

MNC

See Mobile Network Code

MO

See Managed Object

Mobile Country Code

The Mobile Country Code is a three digit number uniquely


identifying a given country. It is utilized within the IMSI
(International Mobile Subscriber Identity) and LAI
(Location Area Identity).

Mobile Network Code

Either a two or three digit number used to uniquely identify


a given network from within a specified country (MCC
(Mobile Country Code)). The MNC is used as part of the
IMSI (International Mobile Subscriber Identity) and LAI
(Location Area Identity) etc. Short for mobile network
code, it consists of two or three digits and identifies a PLMN
to which a mobile subscriber belongs.

mobile switching center

A logical entity that provides interfaces for interworking


with the function entities in a wireless system and the public
network. It plays a core role for switch in the wireless
system. It provides mobile management and switch to
mobile subscribers and sets up communications between
mobile subscribers, or between a mobile subscriber and a
fixed line subscriber.

Mobile Terminating

A process of receiving calls by mobile subscribers.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

36

eRAN
Glossary

1 Glossary

Mobility Management Entity

An EPC entity that terminates the control plane with the


mobile device. It is responsible for terminating NAS (Non
Access Stratum) Signalling such as MM (Mobility
Management) and SM (Session Management) information
as well as coordinating Idle Mode procedures. Other
responsibilities of the MME include gateway selection,
inter MME Mobility and authentication of the mobile
device.

MRC

Maximum Ratio Combining

MRFD

See Multi-Mode RAN Feature Description

MRO

Mobility Robust Optimization

MRT

See Maximum Ratio Transmission

MSC

See mobile switching center

MT

See Mobile Terminating

MTBF

See Mean Time Between Failures

MTTR

See Mean Time To Recovery

MTU

See maximum transmission unit

MU-MIMO

Multi User - MIMO

Multi-Mode RAN Feature


Description

Prefix of Multi-Mode RAN feature IDs.

Multimedia Broadcast
multicast service Single
Frequency Network

an area of the network where all eNodeBs can be


synchronized and perform MBSFN transmissions On a
given frequency layer.

Multiple-Input MultipleOutput

A technology used in wireless communications, in which


multiple antennas are used at each end of the transmission
link. The antennas for transmitting signals at each end of
the transmission link are combined so that the signal error
is minimized, and data transmission rate is maximized.

MVNO

Mobile Virtual Network Operator

Issue 01 (2013-10-30)

NACC

See Network Assisted Cell Change

NAS

See Non-Access Stratum

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

37

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

NAS Node Selection Function

When an eNodeB is connected to multiple


MMEs through different S1 connections, the
eNodeB directs a UE that accesses the
network to a suitable MME through an S1
connection. The function of selecting an
MME is called NNSF.

NCC

Next Hop Chaining Count

NCL

See Neighbor Cell List

Ncs

Number of CycleShift

Neighbor Cell List

An NCL contains the information about


neighboring cells of a cell, excluding intraeNodeB neighboring cells. The information
includes the ECGIs, PCIs, and EARFCNs of
neighboring cells.

Neighbor Relation Table

An NCL contains the information about the


neighbor relations between a cell and its
neighboring cells.

Network Assisted Cell Change

Network Assisted Cell Change (NACC)


accelerates the cell reselection. This feature
minimizes the service interruption time due to
the cell reselection.

Network Management System

A Network Management System (NMS) is a


combination of hardware and software used
to monitor and administer a network.
Individual network elements (NEs) in a
network are managed by an element
management system.

Network Time Protocol

NTP is a protocol designed to synchronize the


clocks of computers over a network. NTP
version 3 is an internet draft standard,
formalized in RFC 1305. NTP version 4 is a
significant revision of the NTP standard, and
is the current development version, but has
not been formalized in an RFC. SNTP
(Simple NTP) version 4 is described in RFC
2030.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

38

eRAN
Glossary

1 Glossary

Next hop

Routing term used for the next gateway to


which packets should be forwarded along the
path to its final destination. one technique to
make content of a routing table smaller is
called next-hop routing. A routing table
usually contains the IP address of a
destination network and the IP address of the
next gateway (next hop) along the path to the
final network destination. Using a routing
table to store a next hop for each 'Known'
destination is called next-hop forwarding.
Therefore a given gateway only knows one
step along the path, not the complete path to
a destination. It is also key to know that the
next hops listed in a routing table are on
networks to which the gateway is directly
connected to.

NMS

See Network Management System

NNSF

See NAS Node Selection Function

Non-Access Stratum

The protocols between UE and MSC or SGSN


that are not terminated in the UTRAN, and the
protocols between UE and MME that are not
terminated in the E-UTRAN.

Non-GBR

Non-Guaranteed Bit Rate

NRT

See Neighbor Relation Table

NTP

See Network Time Protocol

OAM

See Operation, Administration,and


Management

Oassive Optical Network

A passive optical network (PON) is a system


that brings optical fiber cabling and signals all
or most of the way to the end user.

OCL

Object Constraint Language

OFDM

See Orthogonal Frequency Division


Multiplexing

OFDMA

See Orthogonal Frequency Division Multiple


Access

OI

Overload Indication

OL-SM

See Open-Loop Spatial Multiplexing

Issue 01 (2013-10-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

39

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

OL-TD

See Open-Loop Transmit Diversity

OLC

Overload Control

OLT

See Optical Line Terminal

OM

See Operation and Maintenance

OMC

See Operation and Maintenance Center

ONT

See Optical Network Terminal

ONU

See Optical Network Unit

Open-Loop Spatial Multiplexing

In OL-SM mode, the UE needs not report


precoding information. When the rank is
equal to 1, OL-SM is equivalent to OL-TD.
When the rank is equal to 2, 3, or 4, OL-SM
maps data streams onto different layers and
performs precoding.

Open-Loop Transmit Diversity

In OL-TD mode, the diversity gain can be


achieved. Space-frequency block coding
(SFBC) is used in the case of two TX
antennas. The combination of SFBC and
frequency switched TX diversity (FSTD) is
used in the case of four TX antennas.

Operating Support System

Operating Support System (OSS) is originally


used in the telecommunication world to
describe the processes and teams that monitor
the underlying networks. Predominantly
looks after the functional and non-functional
requirements of solutions/systems.
Monitoring, end-to-end design, and error
handling tend to be the main areas of work.

Operation and Maintenance

Operation and Maintenance (OM) is the


activities for monitoring and managing the
equipment in the telecommunication
network.

Operation and Maintenance Center

An Operations and Maintenance Centre is an


element within a network management
system responsible for the operations and
maintenance of a specific element or group of
elements. For example an OMC-Radio may
be responsible for the management of a radio
subsystem where as an OMC-Switch may be
responsible for the management of a switch
or exchange. However, these will in turn be
under the control of a NMC (Network
Management Centre) which controls the
entire network.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

40

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Operation, Administration,and
Management

A group of network support functions that


monitor and sustain segment operation,
activities that are concerned with, but not
limited to, failure detection, notification,
location, and repairs that are intended to
eliminate faults and keep a segment in an
operational state and support activities
required to provide the services of a
subscriber access network to users/
subscribers.

Optical Line Terminal

Abbreviation for optical line termination.


Optical network elements that terminate a line
signal.

Optical Network Terminal

A device that terminates the fiber optical


network at the customer premises.

Optical Network Unit

A form of Access Node that converts optical


signals transmitted via fiber to electrical
signals that can be transmitted via coaxial
cable or twisted pair copper wiring to
individual subscribers.

Orthogonal Frequency Division Multiple


Access

Orthogonal Frequency Division Multiple


Access (OFDMA) uses the OFDM
technology to divide users. Because data on
different subcarriers are transmitted in
parallel, OFDMA is a frequency-division
multiplexing access mode. In OFDMA, users
share fast Fourier transformation space on
uplink links. The BS allocates subcarriers for
users. In this way, it can allocate different
rates for different users.

Orthogonal Frequency Division


Multiplexing

A type of Multi-Carrier Modulation (MCM).


In this multiplexing mode, a channel is
divided into multiple orthogonal
subchannels. High-speed data signals are
converted into parallel low-speed subdata
streams and are modulated for transmission
on the subchannels. Orthogonal signals can be
separated at the receiver, reducing the
interference between subchannels. The signal
bandwidth on each subchannel is smaller than
the related bandwidth of the channel;
therefore, each subchannel can be regarded as
flat fading, canceling the interference
between symbols. In addition, the bandwidth
of each subchannel is only a small part of the
original channel bandwidth, and therefore
equalization becomes easier.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

41

eRAN
Glossary

1 Glossary

OSG

Open Subscribe Group

OSS

See Operating Support System

OTDOA

Observed Time Difference of Arrival

Issue 01 (2013-10-30)

P-GW

PDN Gateway

P2P

See peer to peer

Packet Data Convergence


Protocol

Packet Data Convergence Protocol is used in UMTS to


format the data into a suitable structure prior to transfer
over the air interface.

Packet Error Loss Rate

Sum of the error bit rate and the packet loss rate.

Packet Switched

In a packet switched network, data may be transferred by


dividing it into small blocks or pieces known as packets.
Each packet contains information in its header to allow
it to be routed by packet switches across the network.
This is a more efficient means of transferring data. An
example of a packet switched network is the Internet.

Parts per million

One part per million (ppm) denotes one part per


1,000,000 parts, one part in 106, and a value of 1 10-6.

path maximum transmission


unit

A method of discovering the supported MTU on a


specific path by using ICMPv6 Datagram Too Big
messages.

PBCH

See Physical Broadcast Channel

PCC

Primary Component Carrier

PCCH

Paging Control Channel

PCell

Primary Cell

PCFICH

See Physical Control Format Indicator Channel

PCI

See Physical Cell Identifier

PCRF

Policy And Charging Rules Function

PDB

Packet Delay Budget

PDCCH

See Physical Downlink Control Channel

PDCP

See Packet Data Convergence Protocol

PDH

See Plesiochronous Digital Hierarchy

PDSCH

See Physical Downlink Shared Channel

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

42

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Peak Information Rate

Peak information rate is a traffic parameter, expressed in


bit/s, whose value should not be less than the committed
information rate.

peer to peer

The protocol or application based on the peer to peer


techenology.

PELR

See Packet Error Loss Rate

Per-Hop Behavior

IETF Diff-Serv workgroup defines forwarding behaviors


of network nodes as per-hop behaviors (PHB), such as,
traffic scheduling and policing. A device in the network
should select the proper PHB behaviors, based on the
value of DSCP. At present, the IETF defines four types
of PHB. They are class selector (CS), expedited
forwarding (EF), assured forwarding (AF), and besteffort (BE).

PF

Proportional Fair

Phase-locked Loop

A circuit that consists essentially of a phase detector


which compares the frequency of a voltage-controlled
oscillator with that of an incoming carrier signal or
reference-frequency generator; the output of the phase
detector, after passing through a loop filter, is fed back
to the voltage-controlled oscillator to keep it exactly in
phase with the incoming or reference frequency.

PHB

See Per-Hop Behavior

PHICH

See Physical HARQ Indicator Channel

PHR

Power Headroom Report

Physical Broadcast Channel

A physical broadcast channel is a transmission channel


that is used to transfer information to all mobile devices
that are operating in a radio coverage area. The broadcast
channel periodically sends (approximately every 40
msec) system identification and access control
parameters

Physical Cell Identifier

Identifier of a physical cell.

Physical Control Format


Indicator Channel

The physical control format indicator channel (PCFICH)


is the physical channel that carries the number of OFDM
symbols for transmission of PDCCHs in a subframe.
PCFICH is located at OFDM symbol #0 of every
subframe, and the assignment to the subcarriers is
determined by cell ID information.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

43

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Physical Downlink Control


Channel

The physical downlink control channel is a transmission


channel that is used to transfer control information to
mobile devices. The PDCCH defines how the paging
channel and shared downlink channels are configured
and it defines uplink transmission scheduling
information to help coordinate access control to the radio
system.

Physical Downlink Shared


Channel

In LTE the PDSCH carries the DL-SCH (Downlink


Shared Channel). This is the only downlink transport
channel available to carry user data between the mobile
device and the eNB.

Physical HARQ Indicator


Channel

The Physical Hybrid Automatic Repeat Request (ARQ)


Indicator Channel (PHICH) is the physical channel that
carries the Hybrid ARQ Indicator (HI). The HI contains
the Acknowledgment/Negative Acknowledgement
(ACK/NACK) feedback to the UE for the uplink blocks
received by the eNodeB.

Physical Multicast Channel

The Physical Multicast Channel is the physical channel


that carries the Multicast Channel (MCH) transport
channel. The PMCH is similar to the PDSCH except that
it carries information to multiple users for point-tomultipoint services.

Physical Random Access


Channel

The PRACH is an uplink physical channel used to convey


control information for access purpose. It also carries
short user packets from the UE.

Physical Resource Block

A E-UTRA PRB (Physical Resource Block) is defined


as consisting of 12 consecutive subcarriers for one slot
(0.5 ms). A PRB is the smallest element of resource
allocation assigned by the eNB scheduler.

PIR

See Peak Information Rate

PKI

See Public Key Infrastructure

Plesiochronous Digital
Hierarchy

The Plesiochronous Digital Hierarchy (PDH) is a


technology used in telecommunications networks to
transport large quantities of data over digital transport
equipment such as fibre optic and microwave radio
systems.

PLL

See Phase-locked Loop

PLMN

See Public Land Mobile Network

PMCH

See Physical Multicast Channel

PMI

Precoding Matrix Indication

PMTU

See path maximum transmission unit

PMU

See Power Monitoring Unit

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

44

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

PnP

Plug-and-Play

Point-to-Point Protocol
multiplexing

The method, PPP Multiplexing, sends multiple PPP


encapsulated packets (sub-frames) in a single PPP frame.
As a result, the PPP overhead per packet is reduced. It is
applicable to transport small packets such as voice and
data over slow links.

Point-to-Point Protocol Over


Ethernet

PPPoE, point-to-point protocol over Ethernet, is a


network protocol for encapsulating PPP frames in
Ethernet frames. It is used mainly with DSL services. It
offers standard PPP features such as authentication,
encryption, and compression.

polarization

A kind of electromagnetic wave, the direction of whose


electric field vector is fixed or rotates regularly.
Specifically, if the electric field vector of the
electromagnetic wave is perpendicular to the plane of
horizon, this electromagnetic wave is called vertically
polarized wave; if the electric field vector of the
electromagnetic wave is parallel to the plane of horizon,
this electromagnetic wave is called horizontal polarized
wave; if the tip of the electric field vector, at a fixed point
in space, describes a circle, this electromagnetic wave is
called circularly polarized wave.

Polarized antenna

An antenna measured by aligning the target antenna and


the probe antenna and then carrying out the measurement
twice when the probe antenna is at 0 degrees and 90
degrees.

PON

See Oassive Optical Network

Power headroom

The power headroom is a measure of the difference


between the maximum terminal transmit power and the
uplink transmit power that would have been used
assuming that the mobile terminal would not have been
limited by its maximum transmit power. Thus, the power
headroom can very well be negative. More exactly, a
negative power headroom indicates that the mobile
terminal transmit power was limited by Pmax at the time
of the power headroom reporting.

Power Monitoring Unit

Power Monitoring Unit (PMU) is the core of power and


environment monitoring. Environment variables are
collected, processed, and reported through the PMU.

ppm

See Parts per million

PPPmux

See Point-to-Point Protocol multiplexing

PPPoE

See Point-to-Point Protocol Over Ethernet

PPS

See Pulse Per Second

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

45

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

PQ

See Priority Queuing

PRACH

See Physical Random Access Channel

PRB

See Physical Resource Block

Precision Time Protocol

The Precision Time Protocol (PTP) is a high-precision


time protocol for synchronization used in measurement
and control systems residing on a local area network.
Accuracy in the sub-microsecond range may be achieved
with low-cost implementations.

Priority Queuing

Priority queuing is an algorithm that assigns each queue


a priority. Packets in the queue with the highest priority
are handled first. Packets in the queue with the lowest
priority are discarded first in case of congestion. If there
are too many packets with higher priorities, packets with
lower priorities cannot be serviced.

Protection grounding Bar

A bar in a cabinet to which the PGND cable is connected


to ensure that the cabinet and earth are equipotentially
connected.

PRS

Positioning reference signal

PS

See Packet Switched

PSIC

parallel soft interference cancellation

PSIC

Parallel Successive Interference Cancellation

PTP

See Precision Time Protocol

Public Key Infrastructure

Public Key Infrastructure (PKI) is a set of hardware,


software, people, policies, and procedures needed to
create, manage, distribute, use, store, and revoke digital
certificates. In cryptography, a PKI is an arrangement
that binds public keys with respective user identities by
means of a certificate authority (CA). The user identity
must be unique within each CA domain.

Public Land Mobile Network

A Public Land Mobile Network is a generic name for all


mobile wireless networks that use land based radio
transmitters or base stations.

PUCCH

Physical Uplink Control Channel

Pulse Per Second

A Pulse per second (PPS) is an electrical signal that very


precisely indicates the start of a second. PPS signals are
output by various types of precision clocks, including
some models of GPS receivers. Depending on the source,
properly operating PPS signals have an accuracy ranging
from a few nanoseconds to a few milliseconds.

PUSCH

Physical Uplink Shared Channel

PWS

Public Warning System


Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.

46

eRAN
Glossary

1 Glossary

Q
QCI

QoS Class Identifier

QoS

See Quality of Service

QPSK

See Quaternary Phase Shift Keying

Quality of Service

The collective effect of service performances


which determine the degree of satisfaction of
a user of a service. It is characterised by the
combined aspects of performance factors
applicable to all services, such as service
operability performance, service accessibility
performance, service retainability
performance, and service integrity
performance.

Quaternary Phase Shift Keying

Quadrature phase shift keying (QPSK) is a


method for transmitting digital data across an
analog channel. Data bits are grouped into
pairs and represented by a unique waveform,
called a symbol. Data may be simulated with
a pseudo-noise sequence generator.

Issue 01 (2013-10-30)

RA

Random Access

RA

See Registration Authority

RAC

See Routing Area Code

RACH

See Random Access Channel

Radio Access Network

The radio access network performs the radio functionality


of the network, as well as providing the connection to the
CN (Core Network).

Radio Access Technology

RAT indicates the type of radio technology to access the


CN (Core Network). Example technologies being UTRA
(UMTS Terrestrial Radio Access), CDMA2000, DECT
(Digital Enhanced Cordless Technology), GERAN (GSM
EDGE Radio Access Network) etc.

Radio bearer

Radio bearers are classified into data radio bearers (DRBs)


and signaling radio bearers (SRBs). A DRB transmits
packets of an EPS bearer between a UE and an eNodeB,
and an SRB transmits signalling between a UE and an
eNodeB.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

47

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Radio Frequency

A term that refers to alternating current (AC)


havingcharacteristics such that, if the current is input to an
antenna, an electromagnetic (EM) field is generated
suitable for wireless broadcastingand/or communications.
These frequencies cover asignificant portion of the
electromagnetic radiation spectrum, extending from nine
kilohertz (9 kHz),the lowest allocated wireless
communications frequency (it's within the range of human
hearing), to thousands of gigahertz(GHz).

Radio Link Control

Radio Link Control (RLC) is a link-layer protocol that is


responsible for error recovery and flow control.

Radio Network Controller

The equipment in the RNS in charge of controlling the use


and the integrity of the radio resources.

Radio Network Temporary


Identifier

A Radio Network Temporary Identifier is a generic term


of an identifier for a UE when an RRC connection exists.
It consists of the Cell RNTI (C-RNTI), Serving RNC RNTI
(S-RNTI) and UTRAN RNTI (U-RNTI).

Radio Resource Control

A sublayer of radio interface Layer 3 existing in the control


plane only which provides information transfer service to
the non-access stratum. RRC is responsible for controlling
the configuration of radio interface Layers 1 and 2.

radio resource management

Planning and scheduling of the air interface resources for


the mobile communication system. It manages all air
interface resources, such as creating, monitoring,
modifying, or removing sites, sectors, or carriers.

RADIUS

See Remote Authentication Dial in User Service

RAN

See Radio Access Network

Random Access Channel

The channel used for initial access into a system. The


RACH function is different depending on the technology
of the system.

RAT

See Radio Access Technology

RB

Resource Block

RB

See Radio bearer

RCU

See Remote Control Unit

RDI

See remote defect indication

RE

See Resource Element

RE

Range Expansion

Real Time Protocol

Real-time Transport Protocol (RTP) is a host-to-host


protocol. It is used to deliver real-time services such as
audio and video over the IP network.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

48

eRAN
Glossary

1 Glossary

Received Signal Code Power

Given only signal power is received, the average power of


the received signal after despreading and combining.

Received Signal Strength


Indicator

The received wide band power, including thermal noise


and noise generated in the receiver, within the bandwidth
defined by the receiver pulse shaping filter, for TDD within
a specified timeslot. The reference point for the
measurement shall be the antenna.

Refarming

Reassigning government-regulated electromagnetic


spectrum for services with higher value(e.g. GSM
Spectrum reassigned to LTE with higher capacity.).

Reference Signal

In the LTE E-UTRA there are various types of reference


signals used in the uplink and downlink directions. In the
uplink there are two types namely the Demodulation
reference signal and the Sounding reference signal. In the
downlink, there are three main types: Cell Specific (nonMBSFN), MBFSN (Multimedia Broadcast Multicast
Service Single Frequency Network) and UE Specific

Registered PLMN

The PLMN on which the UE has performed a location


registration successfully.

Registration Authority

A registration authority (RA) is an authority in a network


that verifies user requests for a digital certificate and tells
the certificate authority (CA) to issue it. RAs are part of a
public key infrastructure (PKI), a networked system that
enables companies and users to exchange information and
money safely and securely. The digital certificate contains
a public key that is used to encrypt and decrypt messages
and digital signatures.

Relative Narrowband TX
Power

This IE provides an indication on DL power restriction per


PRB in a cell and other information needed by a neighbour
eNB for interference aware scheduling.

Remote Authentication Dial in Remote Authentication Dial In User Service (RADIUS) is


User Service
a networking protocol that provides centralized
Authentication, Authorization, and Accounting (AAA)
management for computers to connect and use a network
service. RADIUS serves three functions: - to authenticate
users or devices before granting them access to a network,
- to authorize those users or devices for certain network
services and - to account for usage of those services.

Issue 01 (2013-10-30)

Remote Control Unit

A driving motor of the phase shifter in a Remote Electrical


Tilt (RET) antenna.

remote defect indication

A signal transmitted at the first opportunity in the outgoing


direction when a terminal detects specific defects in the
incoming signal.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

49

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Remote Radio Unit

Remote Radio Unit (RRU) is a component of the


distributed base station. It performs the Intermediate
Frequency (IF) processing (digital I/Q modulation/
demodulation, frequency up-/down-conversion, and DA/
AD conversion) of the signals, Radio Frequency (RF)
processing, and duplex.

Resource Element

The smallest unit at the physical layer.

RET antenna

The electrical downtilt can be continuously adjusted using


the mechanically-adjustable phase shifter built in the
antenna.

RF

See Radio Frequency

RFU

Radio frequency unit

RGPS

Remote Global Position System

RLC

See Radio Link Control

RLF

Radio Link Failure

RNC

See Radio Network Controller

RNTI

See Radio Network Temporary Identifier

RNTP

See Relative Narrowband TX Power

RObust Header Compression

Robust Header Compression (ROHC) is a standardized


method to compress the IP, UDP, RTP, and TCP headers
of Internet packets. This compression scheme differs from
other compression schemes such as IETF RFC 1144 and
RFC 2508 by the fact that it performs well over links where
the packet loss rate is high, such as wireless links.

ROHC

See RObust Header Compression

Routing Area Code

A routing Area Code is a fixed length of 1 octet and


identifies a routing area within a location area. The RAC
is part of the Routing Area Identity (RAI).

RPLMN

See Registered PLMN

RR

Round Robin

RRC

See Radio Resource Control

RRM

See radio resource management

RRU

See Remote Radio Unit

RS

See Reference Signal

RSCP

See Received Signal Code Power

RSRP

Reference Signal Received Power

RSRQ

Reference Signal Received Quality

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

50

eRAN
Glossary

1 Glossary

RSSI

See Received Signal Strength Indicator

RTP

See Real Time Protocol

RTT

Radio Transfers Technology

S-GW

See Serving Gateway

S-P

Serial to Parallel

S1 Application Part

In the LTE E-UTRAN the S1AP is the main control protocol


on the S1 interface, i.e. between the eNB and the MME.

S1 Application Protocol

For details about S1AP, see 3GPP TS 36.413.

S1-MME interface

An interface between the eNodeB and the MME for transfer


of control information.

S1-U Interface

An interface between the eNodeB and the S-GW for transfer


of user data packets.

S1AP

See S1 Application Part

S1AP

See S1 Application Protocol

SA

See Security Association

SAE

See System Architecture Evolution

SAW

See Stop And Wait

SC-FDMA

See Single Carrier Frequency Division Multiple Access

SCC

Secondary Component Carrier

SCell

Secondary Cell

SCTP

See Stream Control Transmission Protocol

SDH

See Synchronous Digital Hierarchy

SDMA

space division multiple access

SDU

See Service Data Unit

Second Order

A ROHC compressor is in one of 3 main states. In SecondOrder (SO) state, the compressor is suppressing all dynamic
fields such as RTP sequence numbers, and sending only a
logical sequence number and partial checksum to cause the
other side to predictively generate and verify the headers of
the next expected packet. The SO state is the optimum state
of the compressor.

Issue 01 (2013-10-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

51

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Secure Hash Algorithm

The Secure Hash Algorithm is one of a number of


cryptographic hash functions published by the National
Institute of Standards and Technology as a U.S. Federal
Information Processing Standard. There are currently three
generations of Secure Hash Algorithm: SHA-1 is the
original 160-bit hash function. Resembling the earlier MD5
algorithm, this was designed by the National Security
Agency (NSA) to be part of the Digital Signature
Algorithm. Originally just called "SHA", it was withdrawn
shortly after publication due to an undisclosed "significant
flaw" and replaced by the slightly revised version SHA-1.
The original withdrawn algorithm is now known by the
retronym SHA-0. SHA-2 is a family of two similar hash
functions, with different block sizes, known as SHA-256
and SHA-512. They differ in the word size; SHA-256 uses
32-bit words where SHA-512 uses 64-bit words. There are
also truncated versions of each standardized, known as
SHA-224 and SHA-384. These were also designed by the
NSA. SHA-3 is a future hash function standard still in
development. This is being chosen in a public review
process from non-government designers. An ongoing NIST
hash function competition is scheduled to end with the
selection of a winning function, which will be given the
name SHA-3, in 2012.

Secure Socket Layer

SSL is a security protocol developed by Netscape


Communications to ensure the security of Internet
communications.

Security Association

A security association (SA) is the establishment of shared


security information between two network entities to
support secure communication. An SA may include
cryptographic keys, initialization vectors or digital
certificates. An SA is a simplex (one-way channel) and
logical connection which endorses and provides a secure
data connection between the network devices. The
fundamental requirement of an SA arrives when the two
entities communicate over more than one channel. Take an
example of mobile subscriber and a base station. The
subscriber may subscribe itself for more than one service.
Therefore each service may have different service
primitives like a data encryption algorithm, public key or
initialization vector. Now to make things easier, all this
security information is grouped logically. This logical
group itself is a Security Association.

Security Gateway

A gateway that provides protection methods such as


firewall, attack detection, flow control, and equipment
operation access control to prevent the equipment in the
IMS domain from being attacked.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

52

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Security Parameter Index

A numeric identifier in IPsec, used with the destination


address and security protocol to identify a security
association (SA).

Security Policy Database

The SPD specifies what protection measures are to be taken


on IP packets.

SeGW

See Security Gateway

Self-Organizing Network

The main functions of Self-Organizing Network (SON) are


self-configuration, self-optimization, and self-healing.

Sequence Number

An identifying number used to designate a data block, an


operation, or a part of an operation.

Service Data Unit

Data transferred between adjacent layers in the protocol


stack.

Serving Gateway

Within the EPC the S-GW is responsible tunnelling user


plane traffic between the eNB and the PDN-GW. To do this
its role includes acting as the mobility anchor point for the
User Plane during handovers between eNB as well as data
buffering when traffic arrives for a mobile in the LTE Idle
state. Other functions performed by the S-GW include
routing, Lawful Interception and billing.

serving GPRS support node

A functional entity used for providing packet data services.


It is responsible for forwarding incoming/outgoing Internet
Protocol (IP) packets to mobile stations (MSs) within the
service area of the SGSN. It traces the location of an
individual MS and performs security functions and access
control. In Universal Mobile Telecommunications System
(UMTS) networks, the SGSN is connected to the radio
network controller (RNC) over the Iu-PS interface. It
requests policy decision point (PDP) contexts from the
Gateway GPRS Support Node (GGSN).

SFBC

Space Frequency Block Coding

SFN

See System Frame Number

SFN

See Single Frequency Network

SGSN

See serving GPRS support node

SHA

See Secure Hash Algorithm

Short Message Service

The SMS (Short Messaging Service) that allows a SME


(Short Message Entity) to send short text messages to other
SME.

SI

System Information

SIB

See System Information Block

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

53

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Signal to Noise Ratio

The ratio of the amplitude of the desired signal to the


amplitude of noise signals at a given point in time. SNR is
expressed as 10 times the logarithm of the power ratio and
is usually expressed in dB (Decibel).

Signaling Radio Bearer

The RRC (Radio Resource Control) connection process will


establish the RB (Radio Bearer) available for usage by RRC
messages on the DCCH (Dedicated Control Channel) and
CCCH (Common Control Channel). These Radio Bearers
are identified as a SRB (Signaling Radio Bearer).

SIMO

Single-Input Multiple-Output

Single Carrier Frequency


Division Multiple Access

Single-carrier FDMA (SC-FDMA) is a frequency-division


multiple access scheme. It is a multi-user version of the
Single-carrier frequency-domain-equalization (SC-FDE)
modulation scheme

Single Frequency Network

A broadcast network where several transmitters


simultaneously send the same signal over the same
frequency channel.

Single Radio Voice Call


Continuity

Voice call continuity between IMS over PS access and CS


access for calls that are anchored in IMS when the UE is
capable of transmitting/receiving on only one of those
access networks at a given time.

SINR

Signal to Interference plus Noise Ratio

SISO

Single-Input Single-Output

SLC

Sleeping Cell

Slip frame

In the reception of framed data, a frame slip is the loss of


synchronization between a received frame and the receiver
clock signal, causing a frame misalignment event, and
resulting in the loss of the data contained in the received
frame.

SLP

SUPL Location Platform

SM

Spatial Multiplexing

SMS

See Short Message Service

SN

See Sequence Number

SNR

See Signal to Noise Ratio

SO

See Second Order

SON

See Self-Organizing Network

Space Division Multiplexing

Each distinct signal or message travels over a separate


physical path such as its own wire or wire pair within a
cable.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

54

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Space Time Coding

A signal coding technology that can be used to obtain


enhanced data transmission rates. It combines the space
transmitted signals and time transmitted signals. In essence,
it is a two-dimension (space dimension and time dimension)
processing method. In a new-generation communication
system, space diversity achieved through multiple transmit
and receive antennas raises the system capacity and
information rate. Meanwhile, different signals are
transmitted in different timeslots by the same antenna, and
therefore receive diversity can be implemented at the
receiver end. In this way, diversity and coding gains are
obtained to achieve high-speed transmission. This
technology is used in 3G communications systems to
increase spectrum utilization.

Spatial multiplexing gain

Spatial multiplexing gain is a throughput gain achieved by


adding spatial channels without increasing the total
bandwidth and total TX power.

SPD

See Security Policy Database

SPI

See Security Parameter Index

SPID

Subscriber Profile ID

SR

Scheduling Request

SRB

See Signaling Radio Bearer

SRS

Sounding Reference Signal

SRVCC

See Single Radio Voice Call Continuity

SSL

See Secure Socket Layer

SSS

Secondary Synchronization Signal

STC

See Space Time Coding

Stop And Wait

A mechanism in which the transmitter processes another


data block only after the previously transmitted data block
is correctly received.

Stream Control
Transmission Protocol

Stream Control Transmission Protocol is a reliable transport


protocol operating on top of IP. It provides acknowledged
error free non duplicated transfer of data with flow control.
STCP also detects data corruption, loss of data and
duplication of data by using checksums and sequence
numbers. A selective retransmission mechanism is applied
to correct loss or corruption of the data.

SU-MIMO

single user multiple-input multiple-output

SUPL

Secure User Plane Location

SVLTE

Simultaneous Voice and LTE

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

55

eRAN
Glossary

1 Glossary

Synchronous Digital
Hierarchy

A method of transmitting digital information where the data


is packed in containers which are synchronized in time
enabling relatively simple multiplexing and demultiplexing
at the transmitting and receiving ends. The technique is used
to carry high capacity information over long distances up to
speeds of 10Gbps.

System Architecture
Evolution

The core network architecture of 3GPP's future LTE


wireless communication standard.

System Frame Number

The system frame number is used to uniquely identify a


random access.

System Information Block

The system information elements are broadcast in system


information blocks. A system information block groups
together system information elements of the same nature.

Issue 01 (2013-10-30)

TA

See Tracking Area

TAC

See Tracking Area Code

TAI

See Tracking Area Identifier

TAL

See Tracking Area List

Target Cell Identifier

Identifier of a target cell.

TBS

Transport Block Size

TCE

Trace Collection Entity

TCI

See Target Cell Identifier

TCO

Total Cost of Operation

TCP

See Transmission Control Protocol

TD-SCDMA

Time Division Synchronous Code Division


Multiple Access

TDD

See Time Division Duplex

TDMA

See Time Division Multiple Access

TDOA

See Time Difference of Arrival

TEID

See Tunnel Endpoint Identifier

TF

See Transport Format

TFT

Traffic Flow Template

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

56

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Third Generation Partnership Project

A collaboration agreement that was formed in


December 1998 bringing together a number
of telecommunication standards bodies.
These standards bodies are referred to as
Organizational Partners. The original aim of
the 3GPP was to produce globally applicable
technical specifications for third generation
mobile systems based on evolved GSM core
networks and the radio access technology
UTRA (Universal Terrestrial Radio Access).
This was subsequently amended to include
the maintenance and development of the
GSM standards including GPRS and EDGE
(Enhanced Data rates for Global Evolution).
Further network developments attributed to
the 3GPP included evolution of service
management through IMS, increased data
rates in the UTRA via HSUPA/HSDPA and
most recently, a new access and core network
commonly termed LTE.

Time Difference of Arrival

The difference of time that positioning


reference signals from two cells arrive at a
UE. Since radio wave propagate at the speed
of light, the difference of distances between
the UE and two cells is determined by
multiplying TDOA by the speed of light.

Time Division Duplex

In a Time Division Duplex system a common


carrier is shared between the uplink and
downlink, the resource being switched in
time. Users are allocated one or more
timeslots for uplink and downlink
transmission. The main advantage of TDD
operation is that it allows asymmetric flow
which is more suited to data transmission.

Time Division Multiple Access

A communications technique that uses a


common channel (multipoint or broadcast)
for communications among multiple users by
allocating unique time slots to different users.
(188) Note: TDMA is used extensively in
satellite systems, local area networks,
physical security systems, and combat-net
radio systems.

Time Switched Transmit Diversity

Time Switched Transmit Diversity (TSTD) is


a technique utilizing multiple transmit
stations to originate the downlink signal and
improve performance. The transmit station
used is determined by a fixed selection pattern
similar to frequency hopping.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

57

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

TM

See Transparent Mode

TMA

See Tower Mounted Amplifier

TOD

Time of Day

Tower Mounted Amplifier

A Tower Mounted Amplifier or Mast Head


Amplifier is a Low-noise amplifier (LNA)
mounted as close as practical to the antenna
in mobile masts or Base Transceiver Stations.
A TMA reduces the base transceiver station
noise figure (NF) and therefore improve its
overall sensitivity; in other words the mobile
mast is able to receive weaker signals.

TPC

See Transmit Power Control

Tracking Area

The TA is a concept introduced to the LTE/


SAE system for location management of UEs.
A TA is identified by a Tracking Area Identity
(TAI), which consists of the MCC, MNC, and
Tracking Area Code (TAC).

Tracking Area Code

Code of a Tracking Area (TA).

Tracking Area Identifier

Unique identity of a Tracking Area (TA).

Tracking Area List

List of multiple Tracking Areas (TAs).

Transmission Control Protocol

The protocol within TCP/IP that governs the


breakup of data messages into packets to be
sent via IP (Internet Protocol), and the
reassembly and verification of the complete
messages from packets received by IP. A
connection-oriented, reliable protocol
(reliable in the sense of ensuring error-free
delivery), TCP corresponds to the transport
layer in the ISO/OSI reference model.

Transmit Power Control

Transmit Power Control is a technical


mechanism used within some networking
devices in order to prevent too much
unwanted interference between different
wireless networks (e.g. the owner's network
and the neighbour's network).

Transparent Mode

The transparent service in Radio Link Control


(RLC). RLC TM functions include but are not
limited to transfer of user data and
segmentation and reassembly.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

58

eRAN
Glossary

1 Glossary

Transport Format

A Transport Format is defined as a format


offered by L1 to MAC for the delivery of a
Transport Block Set during a Transmission
Time Interval on a Transport Channel. The
Transport Format constitutes of two parts one dynamic part and one semi-static part.

Triple Data Encryption Standard

In cryptography, Triple DES (3DES[1]) is the


common name for the Triple Data Encryption
Algorithm (TDEA) block cipher, which
applies the Data Encryption Standard (DES)
cipher algorithm three times to each data
block. Because the key size of the original
DES cipher was becoming problematically
short, Triple DES was designed to provide a
relatively simple method of increasing the
key size (three 56-bit DES keys) of DES to
protect against brute force attacks, without
designing a completely new block cipher
algorithm.

TSTD

See Time Switched Transmit Diversity

TTI

Transmission Time Interval

Tunnel Endpoint Identifier

The TEID unambiguously identifies a tunnel


endpoint in the receiving GTP-U (GPRS
Tunnelling Protocol - User) or GTP-C (GPRS
Tunnelling Protocol - Control) protocol
entity. The receiving side of a GTP tunnel
locally assigns the TEID value for the
transmitting side to use. The TEID values are
exchanged between tunnel endpoints using
GTP-C messages (or RANAP) in the
UTRAN.

TX

Transmit

UDP

See User Datagram Protocol

UE

See User Equipment

UE security capabilities

A set of identifiers corresponding to the


ciphering and integrity algorithms
implemented in the UE.

UL

See Uplink

UL-SCH

Uplink Shared Channel

Issue 01 (2013-10-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

59

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

UM

See Unacknowledged Mode

UMB

Ultra Mobile Broadband

UMTS

See Universal Mobile Telecommunications


System

UMTS Terrestrial Radio Access

A standard for 3G mobile communications


services being specified by 3GPP. The radio
access components of UTRA are based on
direct-spread wideband code-division
multiple access (WCDMA) and hybrid timedivision (TDCDMA) access methods that
have been designed for 3G frequency
efficiency, mobility, and QoS requirements.

Unacknowledged Mode

A Layer 2 mode where no retransmission


protocol is used and data delivery is not
guaranteed. Cell broadcast messages and
some RRC messages are transmitted in
unacknowledged mode.

Universal Mobile Telecommunications


System

A 3G mobile communication system which


supports improved data rates over GSM and
subsequently provides an enhanced range of
multimedia services. UMTS has increased
convergence between telecommunications,
IT (Information technology), media and
content industries to deliver new services and
create fresh revenue generating opportunities.
UMTS delivers low cost, high capacity
mobile communications, offering data rates
as high as 2Mbps (under ideal conditions)
with global roaming and other advanced
capabilities. The specifications defining
UMTS are formulated by the 3GPP.

Universal Serial Bus

A serial bus standard to interface devices. It


was designed for computers such as PCs and
the Apple Macintosh, but its popularity has
prompted it to also become commonplace on
video game consoles and PDAs.

Universal Subscriber Identity Module

Usually referred to as a SIM card, the USIM


(UMTS Subscriber Identity Module) is the
user subscription to the UMTS mobile
network. The USIM contains relevant
information that enables access onto the
subscribed operator's network.

Universal Terrestrial Radio Access


Network

UTRAN is a conceptual term identifying that


part of the network which consists of RNCs
and Node Bs between Iu and Uu interfaces.

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

60

eRAN
Glossary

Issue 01 (2013-10-30)

1 Glossary

Universal Time Coordinated

The world-wide scientific standard of


timekeeping. It is based upon carefully
maintained atomic clocks and is kept accurate
to within microseconds worldwide.

Universal Transmission Processing unit

LTE extension transmission board, which


provides E1 ports.

Uplink

An "uplink" is a unidirectional radio link for


the transmission of signals from a MS to a
base station, from a Mobile Station to a
mobile base station or from a mobile base
station to a base station.

UpPTS

Uplink Pilot Time Slot

USB

See Universal Serial Bus

User Datagram Protocol

A TCP/IP standard protocol that allows an


application program on one device to send a
datagram to an application program on
another. User Datagram Protocol (UDP) uses
IP to deliver datagrams. UDP provides
application programs with the unreliable
connectionless packet delivery service. Thus,
UDP messages can be lost, duplicated,
delayed, or delivered out of order. UDP is
used to try to transmit the data packet, that is,
the destination device does not actively
confirm whether the correct data packet is
received.

User Equipment

A device allowing a user access to network


services.

User plane

A set of traffic forwarding components that


the traffic flow passes through. The OAM CV
or FFD packet is periodically inserted to this
traffic flow to monitor the working status of
the forwarding components. In the IETF
drafts, the user plane is called data plane.

USIM

See Universal Subscriber Identity Module

UTC

See Universal Time Coordinated

UTRA

See UMTS Terrestrial Radio Access

UTRAN

See Universal Terrestrial Radio Access


Network

UTRP

See Universal Transmission Processing unit

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

61

eRAN
Glossary

1 Glossary

V
VDSL

See Very-high-data-rate Digital Subscriber


Line

Very-high-data-rate Digital Subscriber


Line

An xDSL technology that provides data


transmission up to a theoretical limit of 52
Mbit/s in the downstream direction and 12
Mbit/s in the upstream direction over a single
twisted pair.

Virtual Local Area Network

A logical grouping of two or more nodes


which are not necessarily on the same
physical network segment but which share the
same IP network number. This is often
associated with switched Ethernet.

VLAN

See Virtual Local Area Network

VMIMO

Virtual MIMO

Voice over IP

An IP telephony term for a set of facilities


used to manage the delivery of voice
information over the Internet. VoIP involves
sending voice information in a digital form in
discrete packets rather than by using the
traditional circuit-committed protocols of the
public switched telephone network (PSTN).

VoIP

See Voice over IP

Voltage Standing Wave Ratio

The ratio of the maximum/minimum values


of standing wave pattern along a transmission
line to which a load is connected. VSWR
value ranges from 1 (matched load) to infinity
for a short or an open load. For most base
station antennas the maximum acceptable.

VRB

Virtual Resource Block

VSWR

See Voltage Standing Wave Ratio

WCDMA

See Wideband Code Division Multiple


Access

Issue 01 (2013-10-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

62

eRAN
Glossary

1 Glossary

Weighted Round Robin

A scheduling discipline, in which the weight


of a queue represents the number of served
packets in a complete round; different weights
are assigned to different queues; one packet is
transmitted in each scheduling. Therefore,
each queue uses bandwidth resources
proportional to the number of the packets in
the queue.

white noise

The noise of which the spectrum density is


even in the frequency domain or the space
domain.

Wideband Code Division Multiple Access

A standard defined by the ITU-T for the thirdgeneration wireless technology derived from
the Code Division Multiple Access (CDMA)
technology.

WiMAX

Worldwide Interoperability for Microwave


Access

Wireless Local Area Network

A generic term covering a multitude of


technologies providing local area networking
via a radio link. Examples of WLAN
technologies include WiFi (Wireless
Fidelity), 802.11b and 802.11a, HiperLAN,
Bluetooth, etc.

wiring terminal

A point to which a wire can be connected.

WLAN

See Wireless Local Area Network

WNP

Warning Notification Provider

WRR

See Weighted Round Robin

x Digital Subscriber Line

A family of bandwidth-efficient modulation


techniques, developed to achieve extremely
high data transfer rates over twisted- pair
cables. While the letter "X" represents a
variable, DSL stands for "Digital Subscriber
Line". XDSL techniques may offer several
benefits such as, capability to offer highspeed data services to customers, low cost by
using existing infrastructure and switching
congestion relief caused by existing data
users.

xDSL

See x Digital Subscriber Line

Issue 01 (2013-10-30)

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

63

eRAN
Glossary

1 Glossary

XMAC-I

Expected MAC-I

Z
ZC

Issue 01 (2013-10-30)

Zadoff-Chu sequence

Huawei Proprietary and Confidential


Copyright Huawei Technologies Co., Ltd.

64

You might also like