You are on page 1of 78

AC6605 Access Controller

V200R001C00
Glossary
Issue 01
Date 2012-05-30
HUAWEI TECHNOLOGIES CO., LTD.


Copyright Huawei Technologies Co., Ltd. 2012. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior written
consent of Huawei Technologies Co., Ltd.

Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.

Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.






Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China
Website: http://www.huawei.com
Email: support@huawei.com
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
i
About This Document
Intended Audience
This document describes the glossaries and abbreviation of all software and hardware features
about AC6605.
This document is intended for:
l Commissioning Engineer
l Data Configuration Engineer
l Network Monitoring Engineer
l System Maintenance Engineer
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
DANGER
Indicates a hazard with a high level of risk, which if not
avoided, will result in death or serious injury.
WARNING
Indicates a hazard with a medium or low level of risk, which
if not avoided, could result in minor or moderate injury.
CAUTION
Indicates a potentially hazardous situation, which if not
avoided, could result in equipment damage, data loss,
performance degradation, or unexpected results.
TIP
Indicates a tip that may help you solve a problem or save
time.
NOTE
Provides additional information to emphasize or supplement
important points of the main text.

AC6605 Access Controller
Glossary About This Document
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
ii
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
Boldface The keywords of a command line are in boldface.
Italic Command arguments are in italics.
[ ] Items (keywords or arguments) in brackets [ ] are optional.
{ x | y | ... } Optional items are grouped in braces and separated by
vertical bars. One item is selected.
[ x | y | ... ] Optional items are grouped in brackets and separated by
vertical bars. One item is selected or no item is selected.
{ x | y | ... }
*
Optional items are grouped in braces and separated by
vertical bars. A minimum of one item or a maximum of all
items can be selected.
[ x | y | ... ]
*
Optional items are grouped in brackets and separated by
vertical bars. Several items or no item can be selected.
&<1-n> The parameter before the & sign can be repeated 1 to n times.
# A line starting with the # sign is comments.

Change History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all updates made in previous issues.
Changes in Issue 01 (2012-05-30)
Initial commercial release.
AC6605 Access Controller
Glossary About This Document
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
iii
Contents
About This Document.....................................................................................................................ii
1 Numerics.........................................................................................................................................1
2 A........................................................................................................................................................3
3 B........................................................................................................................................................8
4 C......................................................................................................................................................11
5 D......................................................................................................................................................17
6 E.......................................................................................................................................................22
7 F.......................................................................................................................................................25
8 G......................................................................................................................................................27
9 H......................................................................................................................................................29
10 I......................................................................................................................................................31
11 J......................................................................................................................................................34
12 L.....................................................................................................................................................35
13 M...................................................................................................................................................38
14 N....................................................................................................................................................42
15 O....................................................................................................................................................44
16 P.....................................................................................................................................................46
17 Q....................................................................................................................................................51
18 R....................................................................................................................................................52
19 S.....................................................................................................................................................55
20 T....................................................................................................................................................60
21 U....................................................................................................................................................65
22 V....................................................................................................................................................67
23 W...................................................................................................................................................69
AC6605 Access Controller
Glossary Contents
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
iv
24 X....................................................................................................................................................71
25 Z....................................................................................................................................................72
AC6605 Access Controller
Glossary Contents
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
v
1 Numerics
1:n (protection)
architecture (n1)
An architecture that has n normal traffic signals, n working SNCs/trails, and one
protection SNC/trail. It may have an extra traffic signal. The signals on the working
SNCs/trails are normal traffic signals. The signal on the protection SNC/trail may be a
normal traffic signal, an extra traffic signal, or a null signal. For example, an all ONEs
signal, a test signal, one of normal traffic signals. At the source end, one signal is
connected to the protection SNC/trail. At the destination end, the signals from the
working SNCs/trails are selected as normal signals. When a defect is detected on a
working SNC/trail or under the influence of certain external commands, the transmitted
signal is bridged to the protection SNC/trail. At the destination end, the signal from this
protection SNC/trail is then selected instead.
1+1 (protection)
architecture
One plus one architecture. At the source end, traffic signals are sent on both active and
standby links. At the destination end, the traffic signals on the active link are received.
When the active link is disconnected, the traffic signals are switched to the standby link,
which is called unidirectional switchover.
10BASE-T An Ethernet specification in IEEE 802.3 standards that uses twisted pair cables with the
transmission rate of 10 Mbit/s and transmission distance of 100 meters.
100BASE-FX A fiber optic Ethernet specification in IEEE 802.3u standards with the transmission rate
of 100 Mbit/s.
100BASE-T A physical layer specification for a 100 Mbit/s CSMA/CD local area network in IEEE
802.3 standards.
100BASE-TX A physical layer specification in IEEE 802.3 standards for a 100 Mb/s CSMA/CD local
area network over two pairs of Category 5 unshielded twisted-pair (UTP) or shielded
twisted-pair (STP) wire.
1000BASE-SX A fiber optic Gigabit Ethernet specification in IEEE 802.3 standards that uses multi-
mode fiber short-wavelength lasers.
1000BASE-T An Ethernet specification in IEEE 802.3ab standards that uses twisted pair cables with
the transmission rate of 1000 Mbit/s and transmission distance of 100 meters.
24-hour alarm
threshold
Maximum number of times an alarm is generated within 24 hours. When the threshold
is set to 0, the alarm function is disabled.
AC6605 Access Controller
Glossary 1 Numerics
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1
802.11n A wireless transmission standard released after 802.11a/b/g by Wi-Fi Alliance. As a new
member in the 802.11 protocol family, 802.11n supports 2.4 GHz and 5 GHz frequency
bands and provides a higher bandwidth (300 Mbit/s, much higher than 54 Mbit/s provided
by 802.11a/g) for WLAN access users. In addition, 802.11n supports the Multiple-Input
Multiple-Output (MIMO) technology which provides two methods of increasing the
communication rate: increasing bandwidth and improving channel usage.
802.1X An access control and authentication protocol based on the client/server mode. It can
prevent unauthorized users/equipment from accessing the LAN/WLAN through an
access port. After a client is associated with an AP, the 802.1X authentication result
determines whether the client can access the wireless services provided by the AP. If the
client is authenticated, it can access resources in the WLAN. If the client fails to be
authenticated, it cannot access resources in the WLAN.
AC6605 Access Controller
Glossary 1 Numerics
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
2
2 A
AAA See Authentication, Authorization, and Accounting
ABR See area border router
absolute humidity Amount of water vapor per cubic meter of air.
Abstract Syntax
Notation One
A syntax notation type employed to specify protocols. Many protocols defined by the
ITU-T use this syntax format. Other alternatives are standard text or Augmented Backus-
Naur Form (ABNF).
AC See alternating current
AC access controller.A device that manages all access points (APs) on a WLAN and
communicates with an authentication server to authenticate users.
access control right Rights granted to users for access to certain items.
access gateway A type of device that is located at the edge access layer of the next-generation network
(NGN) structure, and provides various methods for connecting users to the NGN.
access media gateway A type of device that is located at the media access layer of the next-generation network
(NGN) structure and is responsible for media translation between voice streams and IP
packets, connecting plain old telephone service (POTS) users to the IP network. An
access media gateway translates media streams under the control of the softswitch and
is used for voice service access of end users.
Access Node Control
Protocol
An IP-based protocol that works between an access node and a network access server
over a digital subscriber line (DSL) access and aggregation network.
access service A type of service providing the basic capability of network access. When users run access
services, operators can differentiate the charge on users based on the traffic count or
service provision period.
accurate bandwidth
control
Bandwidth management based on each data stream, which guarantees the data stream
bandwidth.
acknowledged alarm An alarm that triggers a maintenance action.
acknowledged alarms Some or all alarms that can be acknowledged automatically or manually. After being
acknowledged, these alarms are added to the historical alarm list.
ACL See access control list
AC6605 Access Controller
Glossary 2 A
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
3
acoustic echo Voice broadcast by a loudspeaker, which is sent back to the remote end after a
microphone captures it. In this way, the talker at the remote end can hear his or her own
voice.
activate An operation to enable a task or object to enter the working state from the non-working
state.
active The normal running status of a device.
active main board One of the two main control boards on the router that is in active state.
active server and
standby server
The active server is an active host where services are running. The standby server is a
host in the standby status and functions as the backup. Only one active server is available
in the N2000 system.
active test An intrusive test that injects test service stream into a network and obtains the test data
by analyzing the test service stream.
adaptation function A function that converts between an optical network unit/optical network terminal
(ONU/ONT) user interface and a user-to-network interface (UNI). The AF can also
convert between an OLT network interface and a service node interface (SNI).
add-drop multiplexer A device installed on an intermediate node of a transmission line. It inputs new signals
and outputs existing signals.
additional bandwidth Sum of the non-assured bandwidth and best-effort bandwidth.
Address Resolution
Protocol
An Internet protocol for mapping an IP address to a media access control (MAC) address.
This protocol allows hosts and routers to determine the data link layer addresses based
on the ARP request and ARP response.
ADM Add-drop multiplexer. A network element that provides access to all or some subsets of
the constituent signals contained within a synchronous transport module level n (STM-
N) signal. The constituent signals are added to, or dropped from the STM-N signal as it
passed through the ADM.
ADSL See asymmetric digital subscriber line
Advanced Encryption
Standard
An encryption algorithm that ensures system security. It is originally used by some U.S.
government departments to guarantee the security of some secret but unclassified
materials. Currently, AES has become the most influential encryption standard all around
the world.
AES See Advanced Encryption Standard
AF See adaptation function
AG See access gateway
aging time The time that determines when multicast entries on a router port will be deleted. If no
IGMP packet is sent from a port within this time, all multicast entries related to this router
port are deleted.
AIFSN Arbitration interframe spacing number.
air conditioning system A system that fully and automatically controls climate parameters such as temperature
and humidity.
alarm A message reported when a fault is detected by a device or by the network management
system (NMS) during the device polling process. Each alarm corresponds to a clear
alarm.
AC6605 Access Controller
Glossary 2 A
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
4
alarm automatic report A function that reports an alarm to the network management system (NMS) immediately
after the alarm is generated on the device side. After the alarm is reported, an alarm panel
is displayed where users can view the alarm details.
alarm classification A function that classifies alarms into different types. Based on modules where alarms
are generated, alarms are classified into five types: communication alarms, service
alarms, process alarms, equipment alarms, and environment alarms.
alarm color Colors that indicate alarm severities and can be customized by users.
alarm correlation
analysis
A process in which the second alarm will be shielded or its severity will be upgraded if
it occurs five seconds after the first alarm and meets the alarm correlation analysis rules.
alarm correlation rules Rules that define the alarm correlation of alarms and specify whether the NMS
suppresses correlated alarms.
alarm delay time Time that includes start delay time and end delay time. When an NE detects an alarm
for a period, the period is the start delay time. When an NE detects that the alarm
disappears for a period, the period is the end delay time. Unnecessary alarms that are
caused by error reports or jitters can be avoided by setting the alarm delay time.
alarm dump A process of transferring the alarms stored in the system memory to other external
devices.
alarm filtering An alarm management method. Alarms are detected and reported to the network
management system (NMS) which decides whether to display and save the alarms based
on the filtering states of alarms. The filtered alarms are not displayed or saved on the
NMS, but still monitored.
alarm ID A unique alarm identifier of four bytes. Each alarm ID corresponds to an alarm.
Generally, alarm IDs are allocated based on the alarm type and alarm module.
alarm indication A function that indicates the alarm status of an NE. On an NE cabinet, there are four
indicators in different colors. When the green indicator is on, the NE is powered on.
When the red indicator is on, a critical alarm is generated. When the orange indicator is
on, a major alarm is generated. When the yellow indicator is on, a minor alarm is
generated. The ALM alarm indicator on the front panel of a board indicates the current
status of the board. (Metro)
alarm input port A port that receives alarm signals.
alarm location A function that helps locate the topology objects where alarms are generated.
alarm masking An alarm management method. Alarms are detected and reported to the network
management system (NMS) which decides whether to display and save the alarms based
on the filtering states of the alarms. The masked alarms are not displayed or stored on
the NMS.
alarm output port A port that transmits alarm signals.
alarm parameter Parameters that describe the location where a fault occurs. For example, if an alarm
occurs on a board, parameters include shelf ID, slot ID, and port ID.
alarm redefinition A function that enables an operator to change a defined alarm to a required one. Alarms
are detected and reported to the NMS, and the alarm name, type and severity can be
customized in alarm settings.
AC6605 Access Controller
Glossary 2 A
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
5
alarm severity Significance of a change in system performance or events. According to ITU-T
recommendations, an alarm can have one of the following severities: Critical: indicates
that services are affected and recovery measures should be taken immediately. Major:
indicates that services are affected and recovery measures should be taken in a timely
manner. Minor: indicates that services are affected and recovery measures should be
taken to prevent faults from becoming more serious. Warning: indicates that potential
faults are detected and measures should be taken to further diagnose (if necessary) and
correct the faults.
alarm synchronization An alarm management method. When alarm synchronization is implemented, the NMS
checks alarm information in its database and on NEs. If the alarm information on the
two locations is inconsistent, the alarm information on NEs is loaded to the NMS
database and replaces original records.
ALG See application level gateway
alternating current Current that periodically reverses direction. Its frequency is measured in Hertz (Hz) or
durations per unit of time.
AMB See active main board
American National
Standard Institute
A private organization that defines standards for devices and procedures.
AMG See access media gateway
ANCP See Access Node Control Protocol
ANSI See American National Standard Institute.
application level
gateway
A specific proxy for translating specified application protocols. It interacts with Network
Address Translation (NAT) to establish the state, uses NAT state information to modify
the specific data encapsulated in the data part of an IP packet, and performs necessary
operations to make the application protocol run in different ranges.
area border router A router that can belong to two or more areas, and one of the areas must be a backbone
area.
ARP See Address Resolution Protocol
ARP mapping table A table that contains a series of mappings between IP addresses and MAC addresses of
other hosts that have communicated with the host recently.
ARP proxy Proxy Address Resolution Protocol. This protocol allows an intermediate device such
as a router to function as a terminal node to send an ARP response packet to a host. The
bandwidth can be saved in the networking of a low-rate WAN.
ANSI See Abstract Syntax Notation One
association A logical relationship or channel for data transmission which is set up by two Stream
Control Transmission Protocol (SCTP) endpoints through the four-way startup
handshake mechanism of SCTP.
asymmetric digital
subscriber line
A technology that transmits digital information at a high bandwidth on existing phone
lines to homes and businesses. Unlike the regular dialup phone service, ADSL provides
continuously available, always-on connection. ADSL is asymmetric in that it uses most
of channels to transmit downstream to users and only a small part to receive information
from users. ADSL simultaneously accommodates analog (voice) information on the
same line. ADSL supports downstream data rates from 512 kbit/s to 6 Mbit/s.
AC6605 Access Controller
Glossary 2 A
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
6
asynchronous mode A mode in which two systems periodically send Bidirectional Forwarding Detection
(BFD) control packets to each other. If a system fails to receive the BFD control packets
from its peer within the detection period, the system reports that the session is Down.
Asynchronous
Transfer Mode
A high-performance, cell-oriented switching and multiplexing technology that utilizes
fixed-length packets to carry different types of traffic.
ATM See Asynchronous Transfer Mode
ATM/Ethernet
emulation
Emulation of the ATM/Ethernet service on a non-ATM network or a non-Ethernet
network.
attainable net data rate A capacity metric of an asymmetric digital subscriber line (ADSL) communication
channel. It is also known as the maximum attainable bit rate (MABR) in ADSL standards.
attenuation Reduction of signal magnitude or signal loss, expressed in decibels (dBs).
ATTNDR See attainable net data rate
audio A sound portion of a program or a track recorded on a videotape.
authentication A procedure for validating the user login information in a multiuser or network operating
system.
authentication server A server that provides authentication services. The authentication server determines
whether to grant a privilege to a user based on the user information.
authentication word A unique identifier that identifies a server or user in the office system.
Authentication,
Authorization, and
Accounting
A mechanism for configuring authentication, authorization, and accounting security
services.
authority and domain-
based management
A function of the NMS authority management. With this function, you can: 1. Partition
and control the management authority. 2. Manage device nodes and service data based
on regions. 3. Grant management and operation rights to users based on their regions.
auto-negotiation A program in which two devices can agree on transmission mode before starting
transmission. It is defined in Fast Ethernet and the transmission mode can be 100 Mbit/
s or 10 Mbit/s and full or half duplex.
availability Accessibility of a computer system or resource, or a measure of the fault tolerance of a
computer and its programs.
AC6605 Access Controller
Glossary 2 A
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
7
3 B
backbone area An area for routing between areas and forwarding routing information about non-
backbone areas.
backbone network A part of computer network infrastructure that connects various pieces of network,
providing a path for information exchange between LANs or subnets. A backbone can
tie together networks in the same building, in different buildings in a campus
environment, or over wide areas. The backbone's capacity is greater than the networks
connected to it.
backplane An electronic circuit board containing circuits and sockets into which electronic devices
on other circuit boards or cards can be plugged. In a computer system, a backplane
functions as or belongs to a motherboard.
backup A periodic operation performed on the data stored in the database for the database
recovery in case that the database is faulty. The backup is also data synchronization
between active and standby boards.
backup designated
router
A router installed on a network. When a designated router fails, the backup designated
router functions as the designated router to ensure stable data transmission.
backup port A port configured for fast switching of the designated port. A backup port is blocked
when it learns the BPDU packets sent by itself. If the designated port fails, the backup
port switches to the new designated port rapidly and starts to forward packets without
delay.
bandwidth increase A method used by 802.11n to bind two 20 MHz channels to form a 40 MHz channel for
doubling the transmission rate and improving the throughput of the wireless network. In
actual applications, the two bound 20 MHz channels can also be used as two separate
channels, one as the primary channel and the other as the secondary channel. Therefore,
either a 40 MHz channel or a single 20 MHz channel can be used for transmitting and
receiving data.
base station Also known as base transceiver station. A base station transmits services and signaling
through air. A base station includes baseband units, wireless devices, and antennas.
Basic Input Output
System
Firmware built into a computer. It contains basic input/output control programs, power-
on self test (POST) programs, bootstraps, and system settings. A BIOS provides
hardware setting and control functions for a computer.
AC6605 Access Controller
Glossary 3 B
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
8
baud rate Number of times per second the signal changes on a transmission line. The transmission
line usually uses only two signal states, making the baud rate equal to the number of bits
per second that are transferred. The underlying transmission technique may occupy some
bandwidths, so user data may not be transmitted at the line's specified bit rate.
BDI packet A packet for notifying the upstream label switched routers (LSR) of the failure event
that has occurred on the downstream LSR along the reverse LSP. The BDI packet can
be used in the 1:1/N protective switchover service.
BDR See backup designated router
bearer network A network that transmits transport-layer protocol messages between physical devices.
BER See bit error rate
BFD See bidirectional forwarding detection
BGP See Border Gateway Protocol
Bidirectional
Forwarding Detection
A mechanism for detecting the communication faults between adjacent devices quickly
so that engineers can take measures to ensure smooth services.
binding authentication An authentication mode in which the BRAS creates a user name and a password for an
access user based on the location of the user.
binding strap A component installed on two sides of the cabinet to bind various cables.
BIOS See basic input output system
bit error alarm
threshold
A bit error limit which will trigger an alarm on the equipment when it is exceeded. The
threshold is classified into crossing threshold and defect threshold.
bit error rate A ratio of the number of transmitted bits that contain errors to the total number of received
bits. BER is an important index for measuring the communications quality of a network.
A low BER indicates good communications quality of the digital communication system.
BITS Building integrated timing supply system. When the number of synchronous nodes or
communication devices is large, you can use a device to set up a clock system on the
hinge of telecom network to connect the synchronous network as a whole, and provide
satisfactory synchronous base signals to the building integrated device.
blacklist A list of ring back tone (RBT) subscribers for whom the RBT service is suspended for
reasons, for example, they fail to pay for the RBT service in a certain period. The system
charges monthly rental payments from blacklisted subscribers. Blacklisted subscribers
cannot perform any operations involving charges, such as downloading and setting
RBTs. Calling parties hear beep tones when calling the blacklisted subscribers.
BLAN See bridged local area network
board An electronic part that can be plugged in a subrack to provide uplink interfaces or service
interfaces. It consists of chips and electronic components.
Border Gateway
Protocol
An inter-autonomous system routing protocol. An autonomous system is a network or
group of networks under a common administration and with common routing policies.
BGP is used to exchange routing information for the Internet and is the protocol used
between Internet service providers (ISPs).
BPON See broadband passive optical network
AC6605 Access Controller
Glossary 3 B
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
9
BRA Basic rate access. An Integrated Services Digital Network (ISDN) configuration
intended primarily for use in subscriber lines. The basic rate interface (BRI)
configuration provides two 64 kbit/s bearer channels (B channels) and one 16 kbit/s Delta
channel (D channel). The B channels are used to carry services and the D channel is used
to transmit call control signaling and maintain and manage signaling.
bridge A store-and-forward device that connects LANs with different types of network
topologies. It can perform the functions of the data link layer.
bridge tap A twisted pair cable in the Public Switched Telephone Network (PSTN). It belongs to
the valid copper cable branch.
bridged local area
network
Cascaded IEEE 802 LANs interconnected by MAC bridges.
bridging Action of transmitting same traffic on the working and protection channels
simultaneously.
broadband passive
optical network
A one-to-many broadband optical transmission system. A BPON can transparently
transport any type of data, such as voice, video, and IP data. The data frame type is not
limited.
broadcast storm Accumulation of broadcast traffic on a computer network. A broadcast storm occurs
when broadcast or multicast packets flood the subnet, creating excessive traffic and
degrading network performance. Errors in the protocol-stack implementation or in the
network configuration can lead to a broadcast storm.
BSS Basic service set. A BSS includes stations (STAs) that have successfully synchronized
with the BSS using the Join service primitive and a STA that is using the Start primitive.
Membership in a BSS does not necessarily enable wireless communications with other
members in the BSS.
BTS Seebase station
bundling strap A strap made of polypropylene and nylon materials for bundling and fixing various
cables.
buzzer A signaling device that makes buzzing sound.
bypass tunnel A tunnel for protecting a group of MPLS tunnels in the facility backup. The protected
MPLS tunnels share this tunnel. A bypass tunnel needs to be created beforehand.
AC6605 Access Controller
Glossary 3 B
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
10
4 C
C/S See client/server software architecture
CA See call agent
cabinet Free-standing and self-supporting enclosure for housing electrical or electronic
equipment. It has doors or side panels which may or may not be removed.
cabinet panel A part of a cabinet which protects the cabinet against unexpected touches and
environmental influences.
cable aperture A hole for cable routing in a cabinet.
cable connecting area An area where transfer cards are located.
cable hole Holes on a cabinet, which is used for routing cables.
cable ladder A frame for supporting cables. It has two sides made of stainless steel and rungs in the
middle made of lightweight metal tubing such as aluminum, six to eight inches wide
spaced eighteen inches apart. It can be rolled into a compact lightweight bundle for
transport ease.
cable tray A frame located on top of a cabinet, which is used for laying out cables.
cable trough A trough located in a cabinet, which is used for laying out cables.
cable TV Community antenna television originally. Now cable TV refers to any cable-based
(coaxial or fiber) system that provides television services.
cabling A method for assembling a group of insulated conductors mechanically.
CAC See connection admission control
calibration Comparison of a measurement instrument or system of unverified accuracy to a
measurement instrument or system of known accuracy to detect any variation from the
required performance specification.
call agent An external call control unit for controlling telephony gateways. A CA provides signaling
and call processing functions.
calling line
identification
presentation
A service that allows the number of the calling party to be presented to the called party
before the call is answered.
CAPWAP See control and provisioning of wireless access points
AC6605 Access Controller
Glossary 4 C
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
11
CAPWAP tunnel A tunnel for transmitting management packets and data packets between an AC and an
AP when the AP is registered with the AC. Control and provisioning of wireless access
points (CAPWAP) is a control protocol for wireless access points. The management
packets exchanged between the AC and the AP must be transmitted over the CAPWAP
tunnel. No additional hardware needs to be installed in the CAPWAP management
tunnel. If data packets exchanged between the AC and the AP need to be transmitted
over the CAPWAP tunnel, a CAPWAP data tunnel needs to be set up between the AC
and the AP. You need to install additional hardware that implements tunnel encapsulation
and decapsulation. If data packets exchanged between the AC and the AP do not need
to be transmitted over the CAPWAP tunnel, data packets from the AP are directly
forwarded.
CAR See committed access rate
carrier sense In a local area network, an ongoing activity of a data station to detect whether another
data station is transmitting signals.
Carrier Sense Multiple
Access/Collision
Detection
Carrier Sense Multiple Access With Collision Detection (CSMA/CD). CSMA/CD is a
network access method in which devices that are ready to transmit data first check the
channel for a carrier. If two devices transmit data at the same time, a collision occurs
and devices wait a random amount of time before attempting to retransmit data.
category 5 balanced
cable
Balanced 100-ohm and 120-ohm unshielded twisted-pair (UTP) cables and associated
connecting hardware whose transmission characteristics are specified to 100 MHz. This
indicates that performance meets the requirements of a Class D link as per ISO/IEC
11801: 1995. In addition to the requirements outlined in ISO/IEC 11801: 1995, IEEE
802.3 Clauses 14, 23, 25, and 32 specify additional requirements for this cabling when
used with 10BASE-T and 100BASE-T.
CATV See cable TV
CAU See client auto update
CBR See constant bit rate
CCITT Consultative Committee of International Telegraph and Telephone. As one of several
committees operating under the auspices of the International Telecommunication Union
(ITU), the CCITT carries out researches on new technologies, services, and accounting
about telecommunication, and standardizes these recommendations.
CCM Counter-mode/CBC-MAC.
CCMP See Counter mode with CBC-MAC protocol
CE See customer edge
CEAS See customer equipment archives system
cell loss priority A field in the asynchronous transfer mode (ATM) cell header. The cell loss priority
determines the probability of a cell being discarded when the network becomes
congested. Cells with CLP of 0 are ensured services and unlikely to be discarded.
center wavelength An arithmetic mean of the half-maximum spectral intensity points of the transmitter. If
the spectral intensity distribution is symmetric and singly peaked, the center wavelength
is at maximum intensity.
CFM See connectivity fault management
AC6605 Access Controller
Glossary 4 C
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
12
channel A telecommunication path of a specific capacity and at a specific rate between locations
in a network. Channels can be established through wire, radio (microwave), fiber, or a
combination of the three. The amount of information transmitted per second in a channel
is the information transmission rate, expressed in bits per second, such as bit/s, kbit/s,
Mbit/s, Gbit/s, and Tbit/s.
channel adjustment A mechanism that achieves the following effects for a WLAN: Every AP is assigned an
optimal channel, with minimum interference to and from neighboring channels. APs are
free from interference sources such as radar and microwave ovens with the help of real-
time channel detection. Dynamic channel adjustment allows for continuous
communication and provides reliable transmission over WLANs.
cipher key A variable used in the Global System for Mobile Communications (GSM) and general
packet radio system (GPRS) cipher process.
CIST See common and internal spanning tree
CK See cipher key
class of service A technology or method for classifying services into different categories based on service
quality.
Class of Service A rule for precedence mapping. CoS functions on internal interfaces and its advantages
are more evident when congestion occurs. CoS processes services based on their
priorities. Services with high priorities are processed preferentially, whereas services
with low priorities are processed as much as possible. If bandwidth is insufficient, low-
priority services are discarded.
claw hammer A tool for knocking or shaping a workpiece, or extracting a nail.
clear alarm An alarm reported when a fault is rectified and the device or system recovers.
CLI See command line interface
client A terminal that has a wireless network interface card installed, such as a laptop or a
computer.
client auto upgrade A function that automatically detects the updates of a client version and upgrades the
client, which ensures the consistency of the client and server versions.
client/server software
architecture
A message-based modular software architecture that defines servers and clients.
Compared with the centralized, mainframe, and time sharing computing, the client/server
software architecture enhances availability, flexibility, interoperability, and scalability
of the client/server. In this architecture, the client is defined as a service requester and
the server is defined as a service provider. The client/server software architecture
provides services based on requests rather than transfer all files, reducing network traffic.
CLIP See calling line identification presentation
CLK See clock
clock An electronic circuit in a computer that generates a steady stream of timing pulses. The
digital signals synchronize every operation.
clock filtering An algorithm for selecting the best clock for clock synchronization. For different peers
(multiple servers or peers configured for a STA), a STA sends clock synchronization
packets to each server or passive peer. After receiving the response packets, the peer
uses the clock selection algorithm to select the best clock.
clock source A device that provides standard time for the Network Time Protocol (NTP)
configuration.
AC6605 Access Controller
Glossary 4 C
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
13
clock synchronization Frequency synchronization. The signal frequency traces the reference frequency and
does not require the start point to be consistent.
CLP See Cell Loss Priority
CO Central office.
coaxial cable A type of copper cable between the community antenna and user homes.
code and decode An operation performed to allow two STAs that support different voice encoding and
decoding formats to communicate with each other. In a wireless network, voice data
need to be compressed to effectively use network resources, improving the network
utilization and user capacity.
CODEC See coder-decoder.
coder-decoder coder-decoder A device for converting analog signal samples into digital bit words and
back again. The coder converts analog data into digital signals. The decoder converts
digital signals into analog data.
collection period An interval at which measurement results are output. The system performs tests and
outputs results at intervals. The element management system (EMS) and business
management system (BMS) support multiple collection periods such as 5 minutes, 15
minutes, 30 minutes, 1 hour, and 1 day.
collection point A physical place or a time point during performance statistics. For example, the
collection point is the measured board for the performance index "board CPU usage
rate".
collision A condition in which two packets are transmitted over a medium simultaneously. The
interference results in a failure to identify the two packets.
collision domain A group of nodes on an Ethernet network that compete for resources. If two or more
devices attempt to access the network simultaneously, a collision occurs. A collision
domain occurs only on a subnet. See broadcast domain and CSMA/CD.
combined cabinet Two or more BTS cabinets of the same type combined to serve as one BTS.
comfort noise Insertion of pseudo-random noise during the silent interval when the Non-Linear
Processor (NLP) operates or allowance of some of the background or idle channel noise
to pass through the NLP in order to prevent the annoyance of speech intervals with
background noise followed by intervals of silence. Comfort noise is synthetic
background noise used in radio and wireless communications to fill the artificial silence
in a transmission resulting from voice activity detection or from the audio clarity of
modern digital lines.
command-line
interface
A means of communication between a program and its user, based solely on textual input
and output. Commands are input with the help of a keyboard or a similar device and are
interpreted and executed by the program. Results are output as text or graphics to the
terminal.
committed access rate An instance of traffic policing. It defines three traffic parameters: committed information
rate (CIR), committed burst size (CBS), and excess burst size (EBS). These parameters
limit the packet rate and classify packets.
committed access rate A rate configured on a device at the edge of a network. The device configured with CAR
classifies packets and limits the rate of incoming and outgoing packets so that carriers
run their networks smoothly with QoS guarantee.
AC6605 Access Controller
Glossary 4 C
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
14
common and internal
spanning tree
A single spanning tree jointly calculated by Spanning Tree Protocol (STP), Rapid
Spanning Tree Protocol (RSTP), the logical connectivity of Multiple Spanning Tree
(MST) bridges and regions, and Multiservice Transport Platform (MSTP). The CIST
ensures that all local area networks (LANs) in the bridged local area network are simply
and fully connected.
communication
connection status
A status that indicates whether communication between two nodes is normal.
composite echo An echo consisting of electric echoes and acoustic echoes. It is caused by reflected signals
in hybrid and acoustic environments, such as analog hands-free telephones.
concatenation A process of combining multiple virtual containers. The combined capacities can be used
as a single capacity, ensuring bit-sequence integrity.
configuration data A command file for configuring hardware of a network element (NE) so that the NE can
collaborate with other NEs in the entire network and process specified services.
Configuration data is the key factor for normal running of the entire network. A typical
configuration data file configures boards, the clock, and the protection relationship.
configuration file A file that contains machine-readable operating specifications for a piece of hardware
or software. It can also contain information about another file or a specific user, such as
the user's login ID.
congestion A condition of a network when the current load approaches or exceeds the available
resources and bandwidth designed to handle that load at a particular location on the
network. Congestion leads to a decrease in network service efficiency.
connecting plate A plate for connecting two adjacent cabinets.
connection An association of transmission channels or telecommunication circuits set up for
transferring signals between two or more network points. It supports an independent
communication.
connection admission
control
A series of actions taken on the network in the call establishment or call re-negotiation
phase to determine which connection request is accepted.
connectivity fault
management
A function that detects connectivity of the entire network and locates faults. It improves
the network reliability.
connectivity
verification
A method for verifying the path. Connectivity verification (CV) and fast failure detection
(FFD) are path failure detection methods. CV checks whether the label switched path
(LSP) is valid. FFD supports the functions that require quick response, such as protection
switching.
connectivity
verification (CV)
packet
A packet that is generated at a frequency of 1/s on the source end label switching router
(LSR) of a label switched path (LSP), and terminated on the destination end LSR of the
LSP. A CV packet contains the unique identifier (TTSI) of the LSP. Therefore, all types
of exceptions on the path can be detected.
constant bit rate A type of service category defined by the asynchronous transfer mode (ATM) forum.
CBR transfers cells based on constant bandwidth. It is applicable to service connections
that depend on precise clocking to ensure undistorted transmission. See ABR, UBR, and
VBR.
container A set of environment variables and processes. A container provides the running
environment for services in the ENIP CORE.
AC6605 Access Controller
Glossary 4 C
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
15
control and
provisioning of wireless
access points
A protocol that defines how APs communicate with ACs and provides a universal
encapsulation and transmission mechanism for communication between APs and ACs.
CAPWAP defines data tunnels and control tunnels.
controllable multicast Management of multicast services by controlling multicast sources and multicast users
on the network.
cooling system A system that minimizes the climate impact by decreasing the temperature.
cooling vent A vent in a cabinet that allows air to come in.
CoS See Class of Service
CoS See Class of Service
CoS priority Priority represented by the 802.1p field in the VLAN tag contained in an Ethernet frame.
It ranges from 0 to 7.
Counter-Mode with
CBC-MAC Protocol
A CCM method based on the Advanced Encryption Standard (AES) algorithm. In
CCMP, CCM combines the counter (CTR) mode for confidentiality check and combines
cipher block chaining-message authentication code (CBC-MAC) for authentication and
integrity check. CCM protects the integrity of both the MPDU data field and selected
fields of the IEEE 802.11 MPDU header. All AES processes in CCMP use a 128-bit key
and a 128-bit block size. CCM requires a new temporal key for every session. CCM also
requires a unique nonce value for each frame encrypted by a given temporal key, and
CCMP uses a 48-bit packet number (PN) for this purpose. For the same temporal key,
the reuse of a PN voids all security guarantees.
CPU usage Proportion of resources allocated to the running processes or programs to the total
resource in a central processing unit (CPU).
CRC error frame Frames that fail to pass cyclic redundancy check (CRC) are called CRC error frames,
such as long frames, oversized frames, and check error frames.
crossover cable A twisted pair cable that routes signals from one device to another.
cross-platform Developing software or running software on multiple hardware platforms.
CSMA/CD See carrier sense multiple access/collision detection
CTR Counter mode
current alarm An alarm in unrecovered and unacknowledged state, unrecovered and acknowledged
state, or recovered and unacknowledged state. Treatment measures must be taken on
these alarms. This definition is applicable to network management products and other
products, but not wireless terminals. For wireless terminals, current alarms include
alarms in unacknowledged and urgent state as well.
customer edge A part of BGP/MPLS IP VPN model. It provides interfaces for direct connection to the
Service Provider (SP) network. A CE can be a router, a switch, or a host.
Customer Equipment
Archives System
A system that manages all Huawei online devices. It records the information about
shelves and boards of all products (including purchased products), engineering
information (including cooperation payment), and maintenance and warranty
information. A CEAS consists of offline tools and online systems.
AC6605 Access Controller
Glossary 4 C
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
16
5 D
data communication
network
A communication network used in a Telecommunication Management Network (TMN)
or between TMNs which support the data communication function.
Data Encryption
Standard
A specification developed by IBM for encrypting computer data and adopted by the U.S.
government as a standard in 1977. DES uses a 56-bit key.
data terminal
equipment
A user device composing a user-to-network interface (UNI). The DTE accesses the data
network through data connection equipment (DCE) such as a modem and usually uses
the clock signals generated by the DCE.
data tunnel quantity Number of data tunnels. It indicates the number of APs that can use the data tunnels. For
example, a system supports a maximum of 2000 APs, but only 1200 APs go online.
Among these 1200 APs, only 800 APs use data tunnels.
database description
(DD) packet
Packets that are exchanged between two OSPF devices when they synchronize their link
state databases (LSDBs). A DD packet is used to describe the LSDB of a device. It
contains the header of each LSA in the LSDB. The header of an LSA uniquely identifies
an LSA. This can reduce the traffic between routers because the header of an LSA only
occupies a small portion of the overall LSA traffic. With the header, the peer router can
determine whether it has had the LSA.
daughter board A circuit board installed on a printed circuit board (PCB) to enhance performances.
DC See direct current
DCF See distributed coordination function
DCN See data communication network
DDF See digital distribution frame
DDI See direct-dialing-in
deactivation An operation that disables a task or object.
default route A special route used only when no matching entry is found in the routing table. If the
destination IP address of a packet does not match any entry in the routing table, the
default route is chosen.
delay variation A change of signal transfer delay compared with the ideal signal.
AC6605 Access Controller
Glossary 5 D
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
17
DELT Dual-ended loop test. When the central office (CO) and customer premises equipment
(CPE) are functional, the dual-ended loop test is carried out to test the transmission
feature, line attenuation, signal attenuation, power spectrum of the background noise,
signal-to-noise ratio (SNR), and maximum rate.
DES See Data Encryption Standard
descriptor In information retrieval, a word, similar to an index entry in a book, which identifies a
significant topic or element in a stored document or group of documents.
designated port A port defined in the Spanning Tree Protocol (STP). On each switch that runs the STP
protocol, the traffic from the root bridge is forwarded to the designated port. The network
segment that connects the STP switch receives the data sent from the root bridge through
a designated port. All the ports on the root bridge are designated ports. In each network
segment, there is only one designated port. When a topology is stable, only the root port
and the designated port forward traffic. Non-designated ports are in the Blocking state,
which only receive STP protocol packets rather than forward user traffic.
designated router A router defined in the open shortest path first (OSPF) protocol. In a broadcast network
where routers are directly connected without other routing devices in between, all the
routers only need to send information to the DR for broadcasting network link states,
which reduces the number of adjacency relationships set up between routers in a multi-
address access network.
detection mode A mechanism for implementing bidirectional detection in the Bidirectional Forwarding
Detection (BFD) protocol. The mechanism may operate in two modes: asynchronous
mode and demand mode.
device file information Sum of the device hardware information, software information, location information,
and service configuration information, including cabinet model, shelf model, slot and
board model, FRU E-label, system software version, board software version, equipment
room location, and service configuration data.
device panel An interface for indicating the panel of physical devices and their status in the NMS.
device set A group of managed devices. By dividing managed devices into different device sets,
users can manage the devices easily. If a user or a user group is granted operation rights
over one device set, the user or the user group will have the same operation rights over
all the devices in the device set, making it unnecessary to set the operation rights over
all the devices in a device set separately. It is recommended that you configure a device
set based on the geographical region, network level, or device type.
DHCP See Dynamic Host Configuration Protocol
DHCP client An Internet host (usually a workstation) that obtains an IP address and related TCP/IP
configuration information using a DHCP server.
DHCP Option60 An option in a DHCP packet for identifying the terminal type and choosing an appropriate
interface gateway based on the terminal type.
DHCP Option82 A reliable option added to a DHCP packet to identify the user port and terminal
information, which functions as validity reference to the DHCP server to allocate IP
addresses and other parameters. This option is also called DHCP Relay Agent
Information Option and its number is 82.
DHCP proxy A program that relays the DHCP requests of a user to the DHCP/BOOTP server, which
then assigns an IP address to the user.
AC6605 Access Controller
Glossary 5 D
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
18
DHCP relay Dynamic Host Configuration Protocol relay. It is a function that enables DHCP broadcast
packet forwarding between DHCP clients and DHCP servers across subnets. In this
manner, DHCP clients in different physical subnets can obtain IP addresses from the
same DHCP server.
DHCP server Dynamic Host Configuration Protocol server for obtaining necessary configuration
information such as IP addresses. In addition to the standard DHCP services, it can also
assign the URL address of the proxy-call session control function (P-CSCF) to the IMS
terminals during the dynamic assignment of the IP address.
DHCP standard mode Dynamic host configuration protocol in standard mode. It is used to assign IP addresses
to devices on the network.
diagonal pliers A tool used to cut insulation tubes and tie wraps.
differential fiber
distance
Difference in the distance between the nearest ONU/ONT and the OLT and that between
the furthest ONU/ONT and the OLT. An OLT is connected to several ONU/ONTs.
digital distribution
frame
A frame for laying out cables.
digital parameter A physical parameter with discrete values: normal or failed. A digital parameter is a
status parameter. In general, the high and low levels are compared to determine the status
parameter.
digital subscriber line A technology for providing digital connections over the copper wires or the local
telephone network. DSL performs data communication over the plain old telephone
service (POTS) lines without affecting POTS services.
digital subscriber line
access multiplexer
A network device located in the main office of a telephone company. A DSLAM receives
signals through multiple customer digital subscriber line (DSL) links and puts the signals
on a high-speed backbone line using multiplexing techniques.
DIP switch A tiny switch installed on the circuit board. A Dual In-line Package (DIP) switch consists
of eight switches that indicate 8-bit binary (0 or 1) from left to right. It is used to set the
number of a subrack. When multiple subracks are cascaded, a DIP switch can uniquely
identify the shelf position. For example, if the eight switches are set to 00000001, the
subrack number is 1.
direct current Electrical current whose flow direction does not reverse. The current flows in the same
direction though it may stop or change amplitude.
direct current power
distribution cabinet
A cabinet that provides direct current power for devices.
direct-dialing-in The ability for an outside caller to call an internal number without having to pass through
an operator or attendant.
discrete multi-tone A modulation mode of the asymmetric digital subscriber line (ADSL), which uses the
frequency division multiplex technology to divide the frequency band into multiple
subchannels for carrying data independently. ITU-T defines the maximum number of
bits that each subchannel can carry. In each subchannel, data can be modulated and
transmitted independently and DMT-based DSL has a strong anti-noise capability. The
transmission capability of the DMT-based ADSL technology is related to the following
factors: the frequency response (line attenuation), line noise, noise margin, transmit
power, and preset maximum number of bits that a frequency band can carry.
AC6605 Access Controller
Glossary 5 D
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
19
disk mirroring A procedure that involves duplicating data to two disks or two partitions on a disk. If the
original disk fails, the secondary disk automatically takes over. Disk mirroring cannot
protect against failures that occur along the channel between the disks, because the
duplicate disks exist on the same channel.
distributed
coordination function
A coordination function. The coordination function logic is active in every station (STA)
of the basic service set (BSS) when the network is in running state.
DLM Dynamic line management. It adjusts the maximum transmit power of a single line to
achieve the optimized transmit power and reduce the crosstalk between lines.
DMS Huawei iManager N2000 datacom integrated network management system.
DMT See discrete multi-tone
domain A logical subscriber group based on which subscriber rights are controlled.
DoS attack Denial of Service (DoS) attack. Attackers send a lot of request packets which take up
too much resources of the target server, resulting in the target server's failure to respond
to the requests from authorized users.
down Pertaining to a status in which the system is damaged, resulting in system failure.
DR See designated router
DSL See digital subscriber lineLine
DSLAM See digital subscriber line access multiplexer
DSM Dynamic spectrum management. DSM calculates the best power spectrum for each line
based on the crosstalk between lines in a cable, and then adjusts the power spectrum of
each line to the best value to minimize the crosstalk between lines.
DTE See data terminal equipment
dual homing A network topology in which signaling transfer points are configured in pairs. Each
signaling point connects two signaling transfer points. Dual homing solutions can be 1
+1 master/slave backup, 1+1 mutual aid, N+1 backup, and N+1 mutual aid. The dual
homing solution was put forward by Huawei first and had been applied in multiple
commercial networks.
dual-host backup A method of configuring an active device and a standby device to back up data in real
time to guarantee system data security and minimize loss caused by system failures (such
as service interruption and data loss).
duplex An ability to transmit and receive data simultaneously in a communications channel. It
is also called full duplex. If a system can only transmit or receive data at a time, it is half
duplex.
Dynamic Host
Configuration Protocol
A client-server network protocol. A DHCP server provides configuration parameters
corresponding to the DHCP client requests. These parameters are required when a client
host attempts to connect to the Internet. DHCP is also a mechanism for allocating IP
addresses to hosts.
dynamic routing Routing mode in which a router talks to an adjacent router, informing each other of what
networks each router is currently running on.
AC6605 Access Controller
Glossary 5 D
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
20
dynamic service data Core data that guarantees the normal running of a system. The data can be either
generated from the database during system initialization after the system is restarted, or
generated through the related configuration command. The data can be modified only
during system initialization after the system is restarted, during the configuration
operation, or during system smoothing. The data may change during the system
operation, but the change does not occur frequently. The common change is typically
caused by the system status change such as board failure and connection status change.
AC6605 Access Controller
Glossary 5 D
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
21
6 E
EC See echo cancellation
echo cancellation An operation in which an echo canceler is configured in a communications network to
minimize or eliminate echoes.
echo canceler A voice-operating device connected on the four wire side of a circuit. It is used for
reducing near-end echo present on the send path.
echo suppression An operation in which signal reflection is suppressed.
EDCA See enhanced distributed channel access
edge port A port located on the edge of a domain. It is directly connected to terminals.
EFM Ethernet in the first mile.
E-LABEL See electronic label
electric echo An echo consists of reflected signals caused by the cancelled-end impedance mismatch,
for example a 2-wire/4-wire conversion unit.
electric supervisory
channel
A technology that realizes the communication among all nodes and transmits monitoring
data on the optical transmission network. The monitoring data of ESC is included in data
communication channel (DCC) service overhead and is transmitted together with service
signals.
electromagnetic
compatibility
A condition when telecommunications equipment works properly without suffering
degradation from unintentional electromagnetic interference or from other equipment in
the same environment.
electromagnetic
interference
Any electromagnetic disturbance that interrupts, obstructs, or degrades the performance
of electronic or electrical equipment.
electronic label A label that stores codes for identifying objects in electronic data format.
electrostatic discharge Sudden and momentary electric current that flows between two objects at different
electrical potentials caused by direct contact or induced by an electrostatic field.
EMC See electromagnetic compatibility
EMI See electromagnetic interference
EMU See environment monitoring unit
AC6605 Access Controller
Glossary 6 E
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
22
enhanced distributed
channel access
A channel preemption mechanism defined by Wi-Fi multimedia (WMM). It is a
prioritized carrier sense multiple access with collision avoidance (CSMA/CA)
mechanism used by quality of service (QoS) stations (STAs) in a basic service set (BSS).
This mechanism is also used by the QoS access point (AP) and operates concurrently
with hybrid coordination function (HCF) controlled channel access (HCCA).
environment
monitoring unit
A type of power and environment monitoring unit. The EMU monitors environment
variables, such as the power supply and temperature. With external signals input through
the relay, alarms such as fire alarms, smoke alarms, and burglar alarms can be monitored.
Environment changes can be monitored timely and accurately because they are displayed
on the network management system (NMS).
EPON See Ethernet passive optical network
error An exception that causes function failures.
error packet A data packet that cannot be parsed.
ES See echo suppression
ESD See electrostatic discharge
ESD gloves Gloves used to prevent the electrostatic discharge (ESD) from damaging a board or other
electrostatic sensitive devices (ESSDs) when you are inserting or removing a board or
holding an ESSD.
ESS See extended service set
Ethernet EFM OAM An important part of Ethernet OAM. Ethernet EFM OAM provides a mechanism for
monitoring links, such as remote default indication (RDI) and remote loopback control.
It serves as a complement to higher layer applications.
Ethernet in the First
Mile OAM
An Ethernet link OAM technology. The EFM OAM defined in IEEE 802.3ah provides
functions including link connectivity detection, link failure monitoring, remote failure
notification, and remote loopback for the link between directly connected devices.
Ethernet passive
optical network
A passive optical network based on Ethernet. It is a new generation broadband access
technology that uses a point-to-multipoint structure and passive fiber transmission.
Currently, it supports upstream/downstream symmetrical rate of 1.25 Gbit/s and a reach
distance of 20 km. In the downstream direction, the bandwidth is shared based on
encrypted broadcast transmission for different users. In the upstream direction, the
bandwidth is shared with the Time Division Multiplexer (TDM).
ETSI An independent, non-profit, standardardization organization in the telecommunications
industry (equipment makers and network operators) in Europe, with worldwide
projection. ETSI has been successful in standardizing the Low Power Radio, Short Range
Device, GSM (Global System for Mobile Communications) cell phone system and the
TETRA professional mobile radio system.
Event Something occurring during the running of the system, which requires attention from
users.
event alarm An alarm caused by a predefined event, such as congestion, which occurs when a device
is running. The alarm represents an instantaneous status of the system and the status may
not be a fault. Some event alarms are generated repeatedly and regularly. An event alarm
has no corresponding clear alarm.
AC6605 Access Controller
Glossary 6 E
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
23
event level One of the event attributes, which helps decide whether an event needs to be recorded
in the log and an alarm to be reported. There are three event levels: Major: send alarms
when recording logs Minor: only record logs Ignore: the event can be ignored and the
user does not need to record or send alarms.
extended service set A set of one or more interconnected BSSs that appear as a single BSS to the logical link
control layer at any station associated with one of those BSSs.
extinction ratio A ratio of two optical power levels, of a digital signal generated by an optical source,
such as a laser diode. EX = P1/P0, where P 1 is the optical power level generated when
the light source is on, and P 0 is the power level generated when the light source is off.
AC6605 Access Controller
Glossary 6 E
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
24
7 F
fan tray A tray that contains eight fans and is installed at the top of a subrack. It helps boards to
dissipate heat by pumping air from bottom to top.
Fast Ethernet A network that supports transmission rate of 100 Mbit/s. The Fast Ethernet is 10 times
faster than 10Base-T, and inherits 10BASE-T features such as frame format, MAC
addressing mechanism, and maximum transmission unit (MTU). The Fast Ethernet is an
extension base on the IEEE802.3 standards, and it uses the following transmission media:
100BASE-T4 (4 pairs of telephone twisted-pair cables), 100BASE-TX (2 pairs of data
twisted-pair cables), and 100BASE-FX (2-core optical fibers). As defined in the IEEE,
100 in the preceding media indicates the transmission rate.
fast failure detection
(FFD) packet
A path failure detection method independent from connectivity verification (CV)
packets. Different from a CV packet, the frequency for generating FFD packets can be
configured to satisfy service requirements. By default, the frequency is 20 packets per
second. An FFD packet contains the same information as that in a CV packet. The
destination end label switching router (LSR) processes FFD packets and CV packets in
the same way.
fat AP An AP that works independently. It can configure and manage itself without the help of
an AC.
fault alarm A type of alarm caused by hardware or software failures such as board failure, or by the
exception that occurs in major functions. After the fault is rectified, the NE reports a
clear alarm. Fault alarms are of higher severity than event alarms.
FDDI See fiber distributed data interface
FDI packet A packet that responds to detected failure events. It is used to suppress alarms on the
upper layer network where failure has occurred.
FE See fast Ethernet
FEC See forward error correction
fiber distributed data
interface
A 100 Mbit/s optical standard for data transmission based on the token ring network.
fiber patch cord A type of fiber for connections between a subrack and an optical distribution frame
(ODF), between subracks, or inside a subrack.
fiber to the building A fiber-based networking scenario in which the optical fiber extends from the Internet
service providers to multi-dwelling units (MDUs) and business buildings.
AC6605 Access Controller
Glossary 7 F
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
25
fiber to the curb A fiber-based networking scenario in which the optical fiber extends from the Internet
service providers to curbs of subscribers' locations.
fiber to the home A fiber-based networking scenario in which the optical fiber extends from the Internet
service providers to the subscriber's living or working space. FTTH features high
bandwidth, makes the network transparent to data formats, rates, wavelength, and
protocols, eases environment and power supply requirements, and simplifies
maintenance and installation.
file transfer An operation of downloading files from or uploading files to a remote computer using
the File Transfer Protocol (FTP).
filler panel A piece of board that covers vacant slots in order to keep the frame away from dirt, ensure
proper air circulation throughout the interior of the frame, and make the overall
appearance look sharp.
firewall A combination of a series of components set between different networks or network
security domains. By monitoring, limiting, and changing data traffic across the firewall,
the firewall masks the interior information, structure and running status of the network
as much as possible to protect network security.
fit AP An AP that is configured and managed by and works under an AC. An AC manages fit
APs by using the Control and Provisioning of Wireless Access Points (CAPWAP)
protocol. Certain real-time frame exchange operations and MAC address management
are implemented on the fit AP, while the authentication, security management, and
mobile functions are implemented on the AC.
flash memory A type of special electrically erasable programmable read-only memory (EEPROM). It
can be erased and rewritten in blocks at a time instead of only one byte once.
flat-head screwdriver A screwdriver used to fasten small screws and bolts. The flat-head screwdriver has a
line-shaped head and provides a small moment of fastening force.
forced ventilation
system
A system that controls or influences climate by introducing outdoor air into the room or
expelling air out of the room.
forward error
correction
A bit error correction technology that adds correction information to the payload at the
transmit end. Based on the correction information, the bit errors generated during
transmission are corrected at the receive end.
front panel A panel allocated to the vertical mounting area of racks and cabinets for protection.
FTTB See fiber to the building
FTTC See fiber to the curb
FTTH See fiber to the home
full duplex A system that can transmit information in both directions on a communication link. On
the communication link, both parties can send and receive data simultaneously.
AC6605 Access Controller
Glossary 7 F
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
26
8 G
G.SHDSL See single-pair high-speed digital subscriber line
GE Gigabit Ethernet. Based on the IEEE 802.3 Ethernet standards, the GE transmission rate
is 1 Gbit/s.
GEM GPON encapsulation mode.
gigabit-capable passive
optical network
A one-to-many broadband optical transmission system that is defined in the ITU-T G.
984.x recommendations. GPON can transport any type of data in asynchronous transfer
mode (ATM) or GPON encapsulated mode (GEM). The downstream rate is 1.2 Gbit/s
or 2.4 Gbit/s and the upstream rate is 155 Mbit/s, 622 Mbit/s, 1.2 Gbit/s, and 2.4 Gbit/s.
GND Ground. It is a reference point serving as an adequate zero-voltage in an electrical circuit
from which other voltages are measured.
GR Graceful restart. In IETF, protocols related to Internet Protocol/Multiprotocol Label
Switching (IP/MPLS) such as Open Shortest Path First (OSPF), Intermediate System-
Intermediate System (IS-IS), Border Gateway Protocol (BGP), Label Distribution
Protocol (LDP), and Resource Reservation Protocol (RSVP) are extended to ensure
continuous forwarding when the system is restarted. This reduces the flapping of
protocols at the control layer when the system performs an active/standby switchover.
This series of standards is called graceful restart.
graceful restart A series of standards defined by IETF, indicating that protocols related to Internet
Protocol/Multiprotocol Label Switching (IP/MPLS) such as Open Shortest Path First
(OSPF), Intermediate System-Intermediate System (IS-IS), Border Gateway Protocol
(BGP), Label Distribution Protocol (LDP), and Resource Reservation Protocol (RSVP)
are extended to ensure continuous forwarding when the system is restarted. This reduces
the protocol flapping at the control layer when the system performs an active/standby
switchover.
granularity The degree of modularization. If a system has a larger granularity, there are more granules
in the system for users to choose and customize the system more flexibly.
graphical user interface A visual computer environment that displays programs, files, and options with graphical
images, such as icons, menus, and dialog boxes, on the screen.
ground resistance One of the important parameters in the surge protection design of electric power systems.
The ground resistance of electrode decreases as large current is injected to the electrode
by electric discharges in soil.
AC6605 Access Controller
Glossary 8 G
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
27
ground resistance
tester
A tester for measuring the ground resistance and ground voltage of various ground
devices.
guide rail A component installed in a cabinet or shelf, on which shelves and chassis may slide.
GUI See graphical user interface
AC6605 Access Controller
Glossary 8 G
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
28
9 H
hairpin connection A service connection mode. In this mode, internal calls in the same media gateway (MG)
under the control of the media gateway controller (MGC) adopt the timeslot connection
and do not occupy the digital signal processor (DSP) resource, and no voice stream goes
outside the MG. The hairpin connection improves the voice quality and reduces service
delay.
half-duplex A transmission mode in which data can be transmitted in both directions on a signal
carrier, but not simultaneously.
handle A component on the panel. It is used to insert or remove boards and in and out of slots.
HDP See Huawei Discover Protocol
health check A service that monitors the running status of the network management system (NMS),
ensuring that the NMS works properly.
heartbeat connection
status
A detection mechanism in which a local soft switch determines the working status of the
peer soft switch. Heartbeat signals are transmitted between two mutually assistant soft
switches. The heartbeat connection status shows whether the heartbeat connection
between two soft switches is normal.
hello packet A common packet that is periodically sent by a router to its neighbors. It contains
information about timers, designated routers (DRs), backup designated routers (BDRs),
and known neighbors.
hierarchical quality of
service
A QoS technology that controls user traffic and schedules user services based on their
priorities. HQoS provides an advanced traffic statistics function which enables
administrators to monitor the bandwidth usage of each service and allocate the bandwidth
properly through traffic analysis.
historical alarm A confirmed alarm that is saved in the memory or other external memories.
hops Simplest routing metric in which each link has a metric of 1. This function counts the
number of times a packet must be forwarded.
host name A domain name of a functional entity, which functions as a route during communication.
It is planned by carriers.
hot standby A security mechanism. The environment variables and storage information of each
running device are synchronized to a standby device. When faults occur on a running
device, services are switched to the standby device automatically or manually, ensuring
the normal running of the entire system.
AC6605 Access Controller
Glossary 9 H
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
29
hot swap A technology for replacing faulty system components such as hard disks, power supply
modules, and boards without shutting down and powering off the system, which
improves the system disaster recovery capability, scalability, reliability, and
maintainability.
Hotline phone A point-to-point communication link in which a call is automatically directed to the
preselected destination after the end instrument goes off-hook.
HQoS See Hierachical Quality of Service
HTP See Huawei Topology Protocol
Huawei Discover
Protocol
A protocol for obtaining the information about an adjacent device, such as the device
type, hardware and software version, interconnected port, device ID, address
information, device capacity, and hardware platform. It provides basic information for
collecting the cluster topology structure.
Huawei Terminal
Access Controller
Access Control System
A security protocol with enhanced functions based on TACACS (RFC 1492). Similar to
the RADIUS protocol, HWTACACS implements multiple subscriber AAA functions
through communications with the HWTACACS server in client/server mode.
Huawei Topology
Protocol
A protocol for collecting the network topology information within a certain network
segment. It provides the information about the device that can be added to the cluster.
hub An inexpensive networking device with ports for connecting multiple computers or hubs
and forming a star topology. Each port of the hub uses a fixed bandwidth, which may
cause network collisions. Therefore, the data transmission rate and efficiency are
restricted by the number of users.
HWTACACS See Huawei Terminal Access Controller Access Control System.
HWTACACS
accounting
An accounting mode in which a BRAS sends accounting packets to the HWTACACS
server which then performs accounting on users.
HWTACACS
authentication
An authentication mode in which a BRAS sends the user name and password to the
HWTACACS server using the HWTACACS protocol. The HWTACACS server
authenticates the user and returns results to the BRAS.
hygrothermograph A portable instrument designed for furnishing an accurate, continuous record of relative
humidity and temperature.
AC6605 Access Controller
Glossary 9 H
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
30
10 I
IAS See integrated access software
IBSS See independent basic service set
ICMP See Internet Control Message Protocol
ICMP attack Attacks against the ICMP protocol.
IEC See International Electrotechnical Commission
IEEE See Institute of Electrical and Electronics Engineers
IGMP See Internet Group Management Protocol
IGMP snooping A multicast control mechanism running on the data link layer. This protocol manages
and controls multicast groups, and effectively restrains the flooding of multicast data on
Layer 2 devices.
IGMP snooping A multicast control mechanism running on a Layer 2 device. This protocol manages and
controls multicast groups by listening to and analyzing Internet Group Management
Protocol (IGMP) packets between hosts and Layer 3 devices. In this manner, the
multicast data on Layer 2 network can be prevented from spreading.
iManager N2000 A network management system researched and developed by Huawei. It manages the
fixed network devices, including broadband access devices and integrated access
devices.
inband network
management
A network management mode in which the network management and upstream services
use the same channel.
inband networking A networking mode that uses the service channel provided by the managed device to
manage network devices. In this mode, network management information is transmitted
through the service channel of the device.
incremental SPF A type of route calculation that calculates only changed routes rather than all routes every
time.
independent basic
service set
A basis service set (BSS) network that works independently, and on which no access to
a distribution system (DS) is available.
Institute of Electrical
and Electronics
Engineers
An association of engineering and electronics professionals based in the United States
but boasting membership from numerous other countries. The IEEE is dedicated to
electrical, electronics, communication, computer engineering, and science-related fields.
AC6605 Access Controller
Glossary 10 I
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
31
integrated access
software
Software used to approach, view, instruct, communicate with, store data in, and obtain
data from computers or information resources.
integrated services
digital network
A digital communication network that integrates the digital network and data
communication network. It enables users to transmit voice, data, files, images, music,
and video through telephone cables.
intermediate system A node that can forward packets in the OSI network.
intermittent alarm A type of alarms whose clear alarms are reported at an interval of shorter than or equal
to the specified time.
International
Electrotechnical
Commission
A non-profit and non-governmental international standard organization that prepares and
publishes international standards for all electrical, electronic and related technologies.
IEC was established in 1906 and so far has recommended more than 6000 international
standards.
International
Telecommunication
Union
A specialized agency of the United Nations, which is headquartered in Geneva. ITU is
responsible for recommending standards for telecommunication (ITU-T) and radio
networks (ITU-R).
Internet Control
Message Protocol
One of the core protocols in the Internet Protocol Suite. It is defined by IETE RFC 2463
and detects IP packet errors and diagnoses and sends packets.
Internet Group
Management Protocol
One of the TCP/IP protocols for managing the membership of IP multicast group
members. IGMP sets up and maintains membership between IP hosts and directly
connected multicast routers.
inter-working function A mechanism for transforming asynchronous transfer mode (ATM) packets to Ethernet
frames through QinQ mapping. Virtual path identifiers (VPIs) are mapped to outer
VLAN tags and virtual channel identifiers (VCIs) are mapped to inner VLAN tags In
this way, the ATM packets can be transmitted on Ethernet links which are connected to
ATM links in bridged RFC 1483 mode.
inverse multiplexing
for ATM
A technology that flexibly multiplexes multiple low-rate links. The IMA branches an
ATM integrated cell flow onto multiple low-rate links, multiplexes the multiple low-rate
links at the remote end, and restores the data to the integrated cell flow.
IP address A numerical label that uniquely identifies the address of a communication port in the
TCP/IP protocol. An IP address consists of four octets.
IP attack An attack that occurs when a malicious user sends an IP packet with the same destination
IP address as that of the digital subscriber line access multiplexer (DSLAM) system.
IP precedence First three bits in the type of service (ToS) field in IP packets. It indicates the packet
priority and serves as a basis for traffic classification in quality of service (QoS).
IP spoofing attack An attack that occurs when a malicious user sends an attack packet with a forged source
IP address to the system.
IPv4 Internet Protocol Version 4. IPv4 assigns 32-bit addresses to hosts, with each address
belonging to one of the five classes (A, B, C, D, or E). Each IPv4 address consists of a
network number, an optional subnet number, and a host number. The network and subnet
numbers together are used for routing, and the host number is used to address an
individual host within the network or subnet.
IPv6 Internet Protocol Version 6. IPv6 is designed to succeed IPv4. IPv6 contains a traffic
identifier in the packet header which identifies traffic flows, ensuring quality of service
(QoS).
IS See intermediate system
AC6605 Access Controller
Glossary 10 I
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
32
ISDN See integrated services digital network
ITU See International Telecommunications Union
IWF See Inter-Working Function
AC6605 Access Controller
Glossary 10 I
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
33
11 J
jitter Variation of the time taken for packets to be delivered to an endpoint or network entity.
AC6605 Access Controller
Glossary 11 J
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
34
12 L
Label Distribution
Protocol
A protocol that defines a series of procedures and messages. Based on these procedures
and messages, label switched routers (LSRs) establish label switched paths (LSPs) on a
network by mapping network-layer routing information directly to switched paths at the
data link layer. More information about the applicability of LDP can be found in RFC
3037.
label switched path A sequence of hops (R0...Rn) in which a packet travels from R0 to Rn by the label
switching mechanism. A label switched path can be chosen dynamically based on
common routing mechanisms, or by configuration.
LACP See Link Aggregation Control Protocol
LAG See link aggregation group
LAN See local area network
latency Amount of time it takes for the original data to go through a series of processing steps
such as coding, to be transmitted through the channel, to arrive at the receiver, and to be
decoded.
LATN See line attenuation.
LB See loopback.
LDP See label distribution protocol
leased line A dedicated telephone cable between two leased places.
license control Ability of a device to provide users with extra services such as authorized services,
functions, and extra services based on the license. The signed license file for a device
corresponds only to the device. Based on the license, the device can use the authorized
services, functions, and extra services. A device without a license is provided with only
default services and functions.
line attenuation A loss of signal power on a signal cable or optical fiber.
line capturing A process that an access device (such as a switch, DSLAM, or MSAN) or a peripheral
device (such as an ETAM or RAU) connects the device port or subscriber line to the test
bus after receiving a command.
link A physical link that connects signaling points (SPs) and signaling transfer points (STPs)
and transmits signaling messages.
AC6605 Access Controller
Glossary 12 L
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
35
Link Aggregation
Control Protocol
A protocol that provides a method to control the bundling of several physical ports
together to form a link aggregation group. After a link aggregation group is formed,
LACP maintains the link status in real time. When LACP detects a link fault in the receive
or transmit direction, it automatically adjusts member links in the aggregation group.
link aggregation group A group formed by aggregating one or more Ethernet links together so that a MAC client
considers the link aggregation group as a single link.
link state
acknowledgment
packet
A packet for acknowledging received LSU packets. The headers of LSA packets are
acknowledged.
link state request (LSR)
packet
Packets transmitted for required LSAs. By exchanging DD packets, two routers know
which LSAs of the peer router are unavailable in the local LSDBs and send LSR packets
to the peer router. The LSR packets carry brief information about the required LSAs.
link state update (LSU)
packet
A packet for transmitting required LSAs to the peer router. The LSU packet carries one
or more LSAs.
load balancing A method for allocating users to different APs in a group based on the number of users
and the traffic volume. A threshold is set on the AC. When the number of users exceeds
the threshold, load balancing starts to function.
load sharing A device running mode. Two or more hardware units can share system load based on
their processing capabilities when they are operating properly. When a hardware unit
fails, the other units take over the tasks of the faulty unit on the condition that the system
performance, such as few call loss, is guaranteed.
local area network A network that connects personal computers and workstations in a limited geographical
area such as a building or within a range of several miles. A LAN features high
transmission rate and low error rate. Ethernet, fiber distributed data interface (FDDI),
and token ring network are three main technologies that can be implemented on a LAN.
Today, LANs are set up based on the switch-Ethernet or Wi-Fi technology, and support
a transmission rate of 1 Gbit/s.
local authentication An authentication mode in which user information (such as the user name, password,
and other attributes) is configured on the BRAS where the user is authenticated. Local
authentication features fast processing and low operation cost, but the amount of
information that can be authenticated is limited due to the hardware capacity of the
device.
local loopback An internal loopback that is performed from the port processing module of the board to
the backplane. The signal from the backplane to the port directly returns to the backplane.
Usually, it is performed to check the internal processing module of the board.
local service A type of non-home services provided by the current network. The same services can be
provided as a local service for inbound roamers and as a home service for the subscribers
on this network.
lock status Status in which services are not switched to the protection board or channel when a fault
occurs if no switching has occurred. If a switching has occurred, services are not switched
back to the working board or channel after the working board or channel recovers.
logical reach The maximum distance that a specified transmission system can reach. It depends on the
structure of a signaling frame, split ratio, and transmission method, regardless of the
optical budget.
AC6605 Access Controller
Glossary 12 L
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
36
loopback A troubleshooting technique that returns a received signal to its source so that the signal
can be analyzed for errors. Loopbacks are classified into internal loopbacks and external
loopbacks.
LSAck packet See link state acknowledgment packet
LSDB Link state database.
LSP See label switched path
LSR Label switching router.
LWAPP Lightweight Access Point Protocol.
AC6605 Access Controller
Glossary 12 L
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
37
13 M
MAC See media access control
MAC address A link layer address or physical address. It is six bytes long.
MAC address aging A function that deletes MAC address entries of a device when no packet is received from
the device within a specified period of time. The MAC address aging function is only
applicable to the dynamic MAC address entries.
MAC address
authentication
An authentication method that controls network access permissions of a user based on
the access interface and MAC address of the user. A group of permitted MAC addresses
are maintained manually to filter the MAC addresses of STAs. The efficiency of this
method decreases as the number of STAs increases. Therefore, MAC address
authentication is applicable to scenarios where high security is not required, such as
homes and the small offices.
MAC address learning A function that adds the source MAC address and inbound interface of a packet to the
MAC address table when the source MAC address of the received packet cannot be found
in the MAC address table.
MAC spoofing An attack to the system carried out by malicious users who send packets with bogus
MAC addresses. If a user's MAC address is forged, services of the user are affected. If
a system's MAC address is forged or a large number of packets with bogus MAC
addresses are sent to the system, the system may fail to work properly or even crash.
main control board A board that controls and manages other boards in a system and sends services to the
devices on the upper layer.
maintenance point A point that can be either a maintenance end point (MEP) or a maintenance intermediate
point (MIP).
major alarm An alarm that indicates a service-affecting problem with the resource. The problem is
relatively severe, which may affect normal use of the resource.
management
information base
A virtual database for managing the entities in a communications network.
management right Rights that specify devices and boards that a user can manage, or domains that a user
group can manage.
marking-off plate A rectangular paper plate with four holes. It is used for locating a cabinet.
AC6605 Access Controller
Glossary 13 M
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
38
maximum bandwidth The upper threshold of bandwidth that the gigabit-capable passive optical network
(GPON) assigns a transmission container (T-CONT). It is also the total upper thresholds
of the guaranteed bandwidth and additional bandwidth.
MCR See minimum cell rate
MCU See multipoint control unit
MD Maintenance domain. A network or a part of a network whose connectivity is managed
by connectivity fault management (CFM). Devices in an MD are managed by a single
Internet Service Provider (ISP) or a carrier.
MDF Main distribution frame.
MDI See medium-dependent interface
mean signal transfer
delay
The average of the upstream and downstream delay values between reference points.
This value is determined by measuring round-trip delay and then being divided by 2.
measurement object A physical or logical entity or a combination of various entities to be measured, such as
a board, module, signaling link, or port.
media access control A protocol at the media access control sublayer. The protocol is at the lower part of the
data link layer in the OSI model and mainly controls and connects the physical media at
the physical layer. When transmitting data, the MAC protocol checks the permissions
for transmission. If the data can be transmitted, certain control information is added to
the data, and the data and the control information are transmitted in a specified format
to the physical layer. Upon receiving data, the MAC protocol checks whether the
information is transmitted correctly. If so, the control information is removed from the
data and the data is transmitted to the logical link control (LLC) layer.
media gateway A core network device that converts the media format of a network to the required format
of another network. It can process audio, video, and data services, and convert the media
format in full duplex mode. It can also play certain audio and video signals and provide
the interactive voice response (IVR) function and media conference.
media gateway
controller
A group of logical entities that provides call control, connection, and services of the
integrated service. The MGC is located at the network control layer of the IP Multimedia
System (IMS) architecture, providing call control and connection control, and
implementing interconnection and conversion between signaling protocols.
medium dependent
interface
An electrical and mechanical interface for transmission between the device and the
media.
MGC See media gateway controller
MGC See media gateway controller
MGW/MG See media gateway
MIB See management information base
minimum cell rate A parameter defined by the Asynchronous Transfer Mode (ATM) forum, which manages
ATM traffic. It specifies the minimum value of available bit rate.
minor alarm A problem of low severity that does not affect usage of resources.
mirror An operation to store a copy of a file to another archive site to relieve loads on the original
site, or to provide an archive site closer to users geographically.
AC6605 Access Controller
Glossary 13 M
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
39
modem A device or program that enables a computer to transmit data over a telephone line or
cable line. Computer information is stored digitally, whereas information is transmitted
over telephone lines in analog waves. A modem converts between digital signals and
analog signals.
MoIP Modem over IP. A function implemented after a modem is connected to the POTS
terminal. MoIP is a mode in which services are transmitted between IP networks or
between an IP network and a public switched telephone network (PSTN).
MP See maintenance point
MPLS See Multiprotocol Label Switching
MSTI See multiple spanning tree instance
MSTP See Multiple Spanning Tree Protocol
multicast A process for transmitting packets from a source to multiple destinations at the same
time. The destination IP address used by a multicast packet is a Class D IP address which
ranges from 224.0.0.0 to 239.255.255.255. A multicast IP address represents a multicast
group instead of a host.
multicast group A group of members who participate in multicast services. A group of members are
defined by the multicast group implicitly or explicitly by a rule (or a set of rules). This
rule can associate members with the purpose of participating in a call, or associate
members who do not participate in data transfer but participate in management, security,
control, and accounting for the multicast group.
multicast preview A function that allows users to view the scenes of a multicast program beforehand.
multicast server A logical entity that provides multicast packet services for members.
multicast source A source host that sends multicast packets.
multi-hop A login mode in which users log in to a target device through one or more intermediate
devices.
multimeter An electronic measuring instrument for testing cabinet insulation, cable connectivity,
and device electrical performances including voltage, current, and resistance.
multi-mode optical
fiber
A type of optical fiber that enables different light beams to transmit over the same fiber.
The core diameter of a multi-mode optical fiber is 50 um to 100 um. Therefore, the cheap
coupler or switch can be used on the multi-mode optical fiber.
multiple spanning tree
instance
A type of spanning tree calculated by MSTP within an MST region. This spanning tree
provides a simply and fully connected active topology for frames belonging to a VLAN.
A VLAN cannot be assigned to multiple MSTIs.
Multiple Spanning
Tree Protocol
A protocol that enables one MST region to run multiple MSTIs.
multipoint control unit An entity that establishes and coordinates multiuser sessions, such as voice, video, and
data services.
Multiprotocol Label
Switching
A technology that uses short tags of fixed length to encapsulate packets at different link
layers, and provides connection-oriented switching for the network layer based on IP
routing and control protocols. It improves cost effectiveness and expandability of
networks, and is beneficial to routing.
AC6605 Access Controller
Glossary 13 M
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
40
MUX VLAN A special VLAN that contains one service port and multiple uplink ports. The service
flows in different MUX VLANs are isolated from each other. There is a mapping from
a MUX VLAN to an access user. Therefore, access users can be identified based on the
MUX VLAN.
MWI Message waiting indication. As a common function in telephone networks, it involves
an audible or visible indication that voicemail messages are waiting, such as playing a
special dial tone.
AC6605 Access Controller
Glossary 13 M
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
41
14 N
navigation tree A function that searches for and locates a topic. The navigation tree is designed based
on the operators' habits of performing routine operations and maintenance. You can
search for and locate a required topic by using the Contents tab on the navigation tree.
NBI See northbound interface.
NE See network element
network diameter A path with the maximum number of network bridges that communication passes
through between two computers in the switched network. It is represented by the number
of network bridges and can be configured based on the actual network.
network element An architectural concept describing telecommunications equipment or components that
perform network element functions (NEFs), such as RNC and NodeB.
network interface card A circuit board or card that is installed on a computer, connecting the computer to a
network.
network management
layer
A logical layer that monitors and controls network devices within the management area
in the layered management architecture of the telecom NMS.
Network Management
System
A system in charge of the operation, administration, and maintenance of a network.
network segment Any discrete part of a network.
Network Time Protocol A protocol at the application layer for synchronizing the clocks of the distributional time
server and computer systems on packet-switched, variable-latency data networks based
on IP and UDP. NTP originates from Time Protocol and ICMP timestamp message and
enhances accuracy and robustness.
network unit layer A logical layer that implements the configuration, troubleshooting and performance
monitoring for a single network element in the layered management architecture of a
telecom network management system (NMS).
NIC See network interface card
NML See network management layer
NMS See network management system
node A managed device on a network. For a device with only one shelf, one node represents
one device. For a device with multiple shelves, one node represents one shelf of the
device.
AC6605 Access Controller
Glossary 14 N
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
42
Non-Status Reporting
DBA
A technique that invokes bandwidth assignment which does not need reports from the
optical network unit (ONU). However, it provides dynamic assignment by using traffic
monitoring by optical line terminal (OLT) itself.
normal switchover A switchover carried out in the case of sufficient data synchronization on the active and
standby main boards. It ensures the continuity of station (STA) services.
northbound interface An interface that connects a device to the network management system (NMS) to
implement service provisioning and report alarms and performance statistics.
NSR-DBA See non-status reporting DBA
NTP See Network Time Protocol
AC6605 Access Controller
Glossary 14 N
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
43
15 O
OAN See optical access network
object Data and its self-contained processing module. Objects are the software building blocks
of object technologies.
ODF See optical distribution frame
ODN See optical distribution network
ONT See optical network terminal
open system
authentication
A default authentication mechanism in a WLAN, and also the simplest authentication
algorithm because it means no authentication. If the authentication mode is set to OPEN-
SYS, any station (STA) that requests authentication can be authenticated. OPEN-SYS
authentication involves two stages: sending an authentication request and returning the
authentication result.
OPEN-SYS See open system authentication
operation log A list of information about operation events.
operation rights Operation rights specify operations that a user can perform. The operation rights aim at
the security objects. If a user has no right to manage a device, the user cannot operate
the device. The network management system (NMS) controls the rights by making menus
unavailable.
optical access network A network that consists of a series of links that share the same network-side interfaces
and is supported by the optical access system. The OAN includes multiple ODNs which
are connected to an OLT.
optical attenuator A device for reducing the power level of an optical signal. The basic types of optical
attenuators are fixed and variable.
optical distribution
frame
A frame that transfers and spools fibers.
optical distribution
network
A network system consisting of an optical line terminal (OLT), multiple optical network
units (ONUs), two optical networks (one of which connects the OLT with the multiple
ONUs), and a bandwidth controller. The bandwidth controller divides ONUs between
the two optical networks, assigns a predetermined transmission bandwidth to each ONU,
and responds to the bandwidth change.
AC6605 Access Controller
Glossary 15 O
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
44
optical fiber A flexible and transparent fiber that is made from glass or other transparent materials. It
serves as a waveguide or "light pipe" for transmitting light between fiber ends.
optical network
terminal
A type of network device that is connected to a local device and provides direct or remote
user-side interfaces to the optical access network.
optical power budget Allocation of available optical power in a fiber-optic communication link.
optical power meter A device for measuring power in an optical signal.
outband network
management
A network management mode in which the network management and upstream services
use different channels.
outband networking A networking mode that uses the channel provided by the other devices but not the
managed devices to transmit network management information to manage network
devices. Compared with inband networking, outbound networking provides a more
reliable device management channel to locate and monitor network devices in real time
if the managed device fails.
overhead byte Information that is added to a user's transmitted data for the purpose of control, such as
routing, error check, and synchronization information.
overload A state in which requested resources exceed the maximum resources provided by the
system.
oversized packet A packet of more than 1600 bytes.
AC6605 Access Controller
Glossary 15 O
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
45
16 P
packaging type Packaging types are designed for applications that require a permanent, indented,
embossed, or debossed mark on chipboard, metal, plastics or other packaging materials.
packet A logical grouping of messages, which includes a header with control information and
user data. Packets are usually data units at the network layer.
packet filtering A process of transmitting or blocking packets on a network interface based on source
and destination addresses, ports, or protocols of the packets. It works with packet
processing and network address resolution. As part of the firewall software, it is used to
prevent malicious attacks.
packet loss Discarding of data packets on a network when a device is overloaded and cannot accept
any incoming data at the specified moment.
packet loss ratio Ratio of all lost packets to all transmitted packets in a test.
packet mode bearer
service
A service that allows point-to-point (P2P) users to use the X.25 encoding scheme
(recommended by ITU-T) for communication through ISDN.
partial route
calculation
A type of route calculation that is similar to Incremental Shortest Path First (I-SPF). Only
the changed routes are calculated. Instead of calculating the node path, PRC updates the
leaf routes based on the SPT calculated by I-SPF.
Passive Test A non-intrusive test. It does not intrude but monitors actual services on the network, and
obtains the test data by analyzing service streams.
AC6605 Access Controller
Glossary 16 P
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
46
patch A piece of software designed to fix problems, or update a computer program or its
supporting data. A patch is composed of one or more changes. After a patch is loaded,
some original programs are affected. The realization of the patch technology depends
on the patch facture tool first. The patch file is generated based on the target codes created
by the compilation of source codes modified by functions. The patch module operates
the patch file and manages the patch. Patches have two kinds, hot patches and cold
patches. The difference between the hot patches and the cold patches are that the cold
patches must load whole software programs. Hot patches can be installed independently
and do not need to install all the system again. Cold patches, however, need to install the
software of boards again. The upgrade procedure for the cold patches is identical to some
software upgrade procedures. The two patches are described as follows: Hot patches:
Hot patches are added to the existing version. The hot patches are independent of the
server, Install program, or file copying. The hot patches are software program entities
that are installed and uninstalled independently. Cold patches: For some errors that are
difficult to modify through the hot patches, you have to load the software of boards again.
In this situation, you can use cold patches to solve this problem.
PBO Power back off. The near-end video transmission unit (VTU) can adjust its output power
spectrum density (PSD) to adapt to transmission requirements, and prevent the
transmission power from exceeding the threshold. In very-high-speed digital subscriber
line 2 (VDSL2), both the upstream PBO (UPBO) and the downstream PBO (DPBO) are
supported. In VDSL, only DPBO is supported.
PBX bi-directional
interconnection service
A service for interconnecting users of two PBXs on the access network by configuring
the semi-permanent leased line services on the access network.
PCI Peripheral component interconnect. It is a standard designed for the local bus developed
by Intel Corporation in 1991.
PCM See pulse code modulation
PDU See power distribution unit
PE See protective earth
peer group A group of functional units at the same layer in the Open Systems Interconnection (OSI)
architecture. Their functions can be applied at the same layer.
permanent virtual
circuit
A long-term data transmission service that is established between STAs. Data
transmission is established by analog calls, during which no call needs to be established
or cleared.
permanent virtual
connection
A connection that is pre-established by a network management system (NMS). PVCs
remain valid until they are released by the NMS, regardless of whether services are
transmitted or terminals are connected.
PGND cable A cable for connecting a device to a protection ground bar. Usually, the PGND cable is
yellow or green.
Phase Shift Keying See PSK authentication
Phillips screwdriver A screwdriver used to fasten small screws and bolts. The Phillips screwdriver has a cross-
shaped head and provides a small moment of fastening force.
physical layer Layer 1 in the Open System Interconnection (OSI) architecture. This layer transmits bits
or groups of bits over a transmission link between open systems, which involves
electrical, mechanical, and handshaking services.
physical reach The maximum transmission distance that a specified transmission system can reach.
AC6605 Access Controller
Glossary 16 P
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
47
PIM-SM See protocol independent multicast-sparse mode
PITP See Policy Information Transfer Protocol
PM See port management
PMBS See packet mode bearer service
PMK Pair main key.
point to point A service instance applied to a P2P Provider Backbone Bridge-Traffic Engineering
(PBB-TE) tunnel. One or a range of user VLANs can be mapped to a P2P service
instance. An interface can function as a user service and be mapped to a service instance.
Point-to-Point Protocol A protocol specified in RFC 1171/1172. It provides the relay function for the LAN
protocols (including the IP protocol) on the point-to-point link. PPP consists of two
protocols: Link Control Protocol (LCP) on the data link layer and Network Control
Protocol (NCP) on the network layer.
Point-to-Point Protocol
over Ethernet
A network protocol that adds an Ethernet header before a standard PPP packet to connect
bridging access equipment with remote access equipment. Many user hosts can be
connected by sharing information on the Ethernet. In PPPoE model, access control and
charging can be implemented for each user.
poison reverse A feature that RIP learns a route from a neighboring interface, sets the route metrics to
16 (unreachable), and advertises this route to neighboring routers.
Policy Information
Transfer Protocol
A protocol that transfers the relay agent information option (RAIO) in Layer 2 in point-
to-point (P2P) mode between the digital subscriber line access multiplexer (DSLAM)
and broadband remote access server (BRAS). It works in P mode or V mode. P mode is
an active mode, in which the DSLAM adds the information about the user port; V mode
is a passive mode, in which the system reports the information about the user port by
responding to the BRAS query.
polling status Status of a device. The NMS periodically checks the status and other configuration data
of the device, and displays the device status in the topology. The polling status includes
normal, unknown, offline, light fault, minor fault, major fault, and urgent fault. The
unknown status indicates that the device can be pinged but the SNMP protocol is Down.
The offline status indicates that the device cannot be pinged.
port Physical ports and logical ports. Physical ports are channels for exchanging signals
between two physical entities or providing power, while logical ports are channels for
exchanging information between two logical entities.
port aggregation A function that aggregates multiple ports into an aggregation group so that scattered
bandwidth is aggregated into one link.
port management A function that defines the rules to access internal PC ports, allowing the specified PCs
to access the specified resources.
portal protocol A protocol that is developed by Huawei and enables Web servers to communicate with
other devices. The portal protocol is based on the client/server model and uses the User
Datagram Protocol (UDP) as the transmission protocol.
POTS Plain old telephone service.
power adjustment A method for dynamically and properly assigning power based on the real-time status
of an entire wireless network. When an AP runs under an AC for the first time, the AP
uses the maximum transmit power. When getting reports from its neighbors (other APs
that are detected by the AP and managed by the same AC), the AP determines whether
to increase or decrease its power based on the report conclusion.
AC6605 Access Controller
Glossary 16 P
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
48
power distribution unit A unit that performs AC or DC power distribution.
power off To shut down a computer or to turn off the power.
power up To start a computer; to begin a cold boot procedure; to turn on the power.
PPP See Point-to-Point Protocol
PPPoE See Point-to-Point Protocol over Ethernet
PQ See priority queuing
PRA See primary rate access
primary rate access Primary rate access. An Integrated Services Digital Network (ISDN) configuration
intended primarily for use in subscriber lines. The primary rate interface (PRI)
configuration provides one 64 kbit/s channel (D channel), twenty-three 64 kbit/s
channels (B channels) that use Tl line, or thirty 64 kbit/s channels (B channels) that use
E1 line. The B channels are used to carry services and the D channel is used to transmit
call control signaling and maintain and manage signaling.
primary node and
secondary node
Two physical nodes that function as backup for each other. They are decided during the
installation and do not change with the system switchover.
priority flag A policy for re-marking the priority for the packets in the access control list (ACL). The
marked priority can be added to a field.
priority queue An abstract data type in computer programming that supports the following three
operations: 1. Adding an element with a specific priority to the queue. 2. Removing the
element from the queue that has the highest priority, and returning it. 3. Finding out the
element with highest priority in the queue.
priority-tagged frame A tagged frame whose tag header carries priority information, but carries no VLAN
identification information.
protective earth A cable connecting devices to ground in equipotential connection mode.
protocol A group of rules for controlling the formatting and sequencing of message exchange
between communicating systems. Protocols must be accurate on a computer network. A
protocol is established to provide a certain type of service.
protocol independent
multicast sparse mode
A protocol for efficiently routing messages to multicast groups across wide-area (WAN
and inter-domain) networks. The PIM-SM protocol is designed to support sparse mode,
independent from any specific unicast routing protocol. It uses the IP multicast model
on the basis of receiving initialized member relationship and supports sharing and
shortest path tree (SPT). The soft state mechanism that PIM-SM adopts enables it to
adapt to the changing network environment. PIM-SM can use routing information that
is injected by a routing protocol to a multicast routing information base (RIB). These
routing protocols include unicast protocols (such as RIP and OSPF) and multicast
protocols (such as Distance Vector Multicast Routing Protocol).
PSD Mask Power spectral density mask. It restricts the power spectral density of transmission
signals. It is set based on breakpoints. In very-high-speed digital subscriber line 2
(VDSL2), 32 breakpoints are in the downstream spectrum, and 16 breakpoints are in the
upstream spectrum.
pseudo wire emulation
edge-to-edge
A technology that bears Layer 2 services. It emulates the essential attributes of
telecommunications services such as ATM, FR, Ethernet, low speed Time Division
Multiplexed (TDM) circuit, and SONET/SDH in a Packet Switched Network (PSN).
Therefore, PWE3 is a solution that combines the traditional communications network
with the existing PSN.
AC6605 Access Controller
Glossary 16 P
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
49
pseudowire A virtual connection between two provider edges (PEs) for transmitting frames. PEs
establish and maintain PWs using signaling. The two PEs at both ends of a PW maintain
the PW status.
PSK authentication An authentication mode which requires a STA and an AP to be configured with the same
pre-shared key. If their pre-shared keys are the same, the STA is authenticated; otherwise,
the STA fails to be authenticated.
PSTN See public switched telephone network
PTK Pair temporary key.
PTP Precision Time Protocol. It is the precision clock synchronization protocol for networked
measurement and control systems, as defined in the IEEE 1588 standard.
public switched
telephone network
A telecommunications network (including the access system, telephone exchange, and
relay) that is established to perform telephone services for public subscribers. Sometimes
PSTN is also known as public switched telephone network (POTS).
pulse code modulation A method for encoding information in a signal by changing the amplitude of pulses.
Unlike pulse amplitude modulation (PAM) in which the pulse amplitude may change
continuously, pulse code modulation limits the pulse amplitude to several preset values.
Because the signal is discrete or digital rather than analog, pulse code modulation is more
immune to noise than PAM.
PVC See permanent virtual circuit
PVC See permanent virtual connection
PW See pseudo wire
PWE3 See pseudo wire emulation edge-to-edge
AC6605 Access Controller
Glossary 16 P
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
50
17 Q
QinQ A layer 2 tunneling protocol based on IEEE 802.1Q encapsulation. The QinQ protocol
encapsulates a private VLAN tag in a public VLAN tag, allowing each frame to be
transmitted with two tags on the backbone network of the Internet service provider (ISP).
In this way, the customer is provided with a simple Layer 2 VPN tunnel to transparently
transmit frames of the private VLAN and services. The QinQ technology expands the
scope of the private network.
QoS See quality of service
QTag Prefix The first four octets of an Ethernet-encoded tag header. The Ethernet-encoded tag header
is defined in IEEE P802.1Q.
quality of service Service capacity assessment of IP network packets. The core assessment object is the
capability of supporting service requirements such as delay, delay jitter, and packet loss.
Certain support technologies are required to meet these core requirements.
AC6605 Access Controller
Glossary 17 Q
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
51
18 R
RADIUS See Remote Authentication Dial in User Service
RADIUS accounting An accounting mode in which a BRAS sends the accounting packets to a RADIUS server,
and then the RADIUS server performs accounting.
RADIUS
authentication
An authentication mode in which a BRAS sends the user name and the password to a
RADIUS server using the RADIUS protocol, and the RADIUS server authenticates the
user and returns the result to the BRAS.
RAIO Relay-agent-info option. It is a security mechanism for users. When the Policy
Information Transfer Protocol (PITP) and DHCP Option 82 are enabled, a DSLAM
provides the BRAS with user location in the VBAS response packet (PITP V-mode),
PPPoE Discovery packet (PITP P-mode), and DHCP packet (DHCP Option 82).
Rapid Ring Protection
Protocol
An Ethernet ring-specific link layer protocol. When the Ethernet ring is complete, RRPP
can prevent broadcast storms caused by data loops. When a link on the Ethernet ring is
disconnected, RRPP can quickly recover the communication channels between nodes
on the Ethernet ring, enhancing the network reliability.
Rapid Spanning Tree
Protocol
An evolution of the Spanning Tree Protocol (STP), providing faster spanning tree
convergence after a topology change. RSTP is backward compatible with STP.
rated current Input current of devices as declared by the manufacturer.
rated frequency Supply frequency of devices as declared by the manufacturer.
rated frequency range A supply frequency range as declared by the manufacturer, including lower and upper
rated frequencies.
rated voltage Primary power voltage as declared by the manufacturer.
rated voltage range A supply voltage range as declared by the manufacturer, including lower and upper rated
voltages.
receiver sensitivity A minimum value of average receive power at point R when the 1 x 10-10 bit error rate
(BER) is reached.
relative humidity A ratio of the amount of water vapor in the air at a specific temperature to the maximum
amount that the air could hold at that temperature, expressed as a percentage.
relay address pool An address pool that provides IP addresses for users on the network side who request IP
addresses using the relay agent. Broadband remote access server (BRAS) allocates,
renews the lease of, and retrieves the IP addresses in the address pool.
AC6605 Access Controller
Glossary 18 R
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
52
reliability Likelihood of a computer system or device continuing to function over a given period
of time and under specified conditions
remote address pool A mapping of the remote Dynamic Host Configuration Protocol (DHCP) or Boot
Protocol (BOOTP) server, which does not provide real IP addresses. When a remote
address pool is used, a BRAS can send requests of users or intermediate users to the
DHCP/BOOTP server for application, lease renewal, or release of the address.
remote alarm
notification
A function with which remote maintenance personnel are informed of alarms through
Emails or short messages.
Remote Authentication
Dial-In User Service
A security service that authenticates and authorizes dial-up users. If the user name and
password are correct, the RADIUS server grants users permissions, provides
corresponding services for the user, and charges the user.
remote loopback A function in which upon receiving non-EFM OAMPDUs from a local interface, a
remote interface loops back the non-EFM OAMPDUs to the local interface rather than
forward the non-EFM OAMPDUs based on their destination MAC addresses. Remote
loopback can be used for locating link faults and testing link quality.
repeated events Same events that are reported continuously by an NE within a period.
replication status Direction and status of replication between two nodes.
RFI Radio frequency interference. The very-high-speed digital subscriber line 2 (VDSL2)
technology uses a broad frequency range which can reach 30 MHz. The entire spectrum
covers the spectrum for middle- and short-wave broadcast, and the amateur radio.
Therefore, the VDSL2 technology must solve the RFI problem.
RIP See Routing Information Protocol
root bridge A type of bridge that is located on the network to provide the shortest path to other links.
Different from other bridges, the root bridge forwards frames over all of its ports.
round trip delay Length of time it takes for a signal to be sent plus the length of time it takes for that signal
to be received. RTD indicates the network transmission quality.
route The path that network traffic takes from its source to its destination.
router A device on the network layer that selects routes in the network. Upon receiving a packet,
a router selects a preferred path in a network to send the packet to the next router based
on the packet's destination address. The last router is responsible for sending the packet
to the destination host. It is used to connect local networks, wide area networks (WANs),
or the local network and the Internet.
routine maintenance A set of preventive measures taken regularly to discover and eliminate defects or faults
of a device. Routine maintenance ensures the long-term, secure, stable, and reliable
running of the device, meeting service requirements.
Routing Information
Protocol
A part of the TCP/IP protocol group. It is used for locating a route based on the minimum
number of hops from the source interface to the destination interface. RIP is a distance
vector protocol that routinely broadcasts routing information to its neighboring routers,
which wastes bandwidth.
routing protocol A standard used by routers to determine the appropriate path onto which data should be
forwarded
AC6605 Access Controller
Glossary 18 R
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
53
routing table A table for storing and updating addresses of network devices. Routers regularly share
the routing information to be up to date. A router forwards packets based on the
destination address and routing information. The routing table gives paths of routers and
destinations in relay segments or in hops. The routing table is updated when new
information is available.
RPC See partial route calculation
RPT An operation code in common open policy service (COPS). A policy enforcement point
(PEP) uses it to report the following contents to the policy decision point (PDP): 1.
Whether the policy execution is successful or not 2. A state change
RRPP See Rapid Ring Protection Protocol
RSTP See Rapid Spanning Tree Protocol
RSVP-TE Resource Reservation Setup Protocol (RSVP) with Traffic-engineering Extensions. It is
an extension to the RSVP protocol for setting up label switched paths (LSPs) in MPLS
networks. The RSVP-TE protocol is used to establish and maintain the LSPs by initiating
label requests and allocating label binding messages. It also supports LSP rerouting and
LSP bandwidth increasing.
RTD See round trip delay
AC6605 Access Controller
Glossary 18 R
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
54
19 S
SAToP Structure-agnostic time division multiplexing (TDM) over packet.
SBI See southbound interface
SCC See main control board
scheduled task
management
A function that allows a system to create scheduled tasks (such as backup tasks, loading
tasks, restoration tasks) and run, suspend, or automatically resume these tasks.
SDH Synchronous digital hierarchy. The SDH is a hierarchical set of digital transmission
structures, which is used for standardizing the transmission of suitably adapted payloads
over physical transmission networks.
SDT See structured data transfer
secondary supply Supply to the telecommunications equipment such as a cabinet or system blocks. It is
derived from the primary supply.
Secure Shell A network protocol that allows data to be exchanged using a secure channel between a
local computer and a remote computer. When a user logs in to a remote computer through
an insecure network, Secure Shell (SSH) provides the strong information security and
authentication function to prevent the network from attacks, such as IP address spoofing
and plain-text password interception.
security command A type of command that affects the system security after being executed, for example,
the firewall command and the user management command.
security mode A mode in which the security administrator and system administrator use different user
accounts.
self switchover A function that enables the MG to operate as a standalone switch and process the
switching between the internal users on the MG if the communication between the MG
and MGC is interrupted.
SELT See single-ended loop testing
serial port An input/output location (channel) that sends and receives data to and from a computer's
CPU or a communication device one bit every time. Serial ports are used for connecting
computers to peripheral devices, such as mice and printers.
AC6605 Access Controller
Glossary 19 S
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
55
server 1. On a local area network, a computer running administrative software that controls
access to the network and its resources, such as printers and disk drives. It provides
resources to computers functioning as workstations on the network. 2. On the Internet
or other network, a computer or program that responds to commands from a client. For
example, a file server may contain an archive of data or program files. When a client
sends a request for a file, the server transfers a copy of the file to the client. See also
client/server architecture.
service authority A function that divides the operation rights of a specified service into three levels:
maintenance, operation, and watching.
service board A piece of hardware that works as a server to provide services.
service handling A process of handling user applications in an Operations Support System (OSS) of the
business hall.
service node A physical entity that contains service data and specialized resources, and provides the
service control, service switching, and call control functions.
service port A service channel for connecting an xDSL port and a VLAN port.
SES See severely errored second
Session Initiation
Protocol
An application-layer control protocol that can establish, modify, and terminate sessions
or calls, such as Internet phone calls.
set-top box A device that connects a television and an external source of signal, receiving and
converting signals from the signal source into content which is then displayed on the
television screen.
severely errored second Seconds during which the bit error rate (BER) exceeds the threshold and transmission
performances degrades. Performance monitoring parameters can be measured in every
channel.
SFM Source-filtered multicast. As a type of multicast service, the SFM extends the functions
based on any-source multicast (ASM): the upper-layer software checks the source
address of the received multicast packet, and allows the packets from specific multicast
sources to pass through. For the receivers in the SFM model, only some of multicast
sources are valid and some multicast sources are filtered out.
SGW See signaling gateway
shared key
authentication
An authentication mode. The shared key authentication requires that a STA and an AP
be configured with the same shared key. The process of shared key authentication is as
follows: A STA sends an authentication request to an AP, and the AP randomly generates
a character string "challenge text" and sends it to the STA. The STA then copies the
received "challenge text" to a new message, and sends the message encrypted with the
shared key to the AP. Then, the AP decrypts the message using the shared key, and
compares the decrypted character string with the character string that has been sent to
the STA. If the character strings are same, the STA is authenticated; otherwise, the STA
fails to be authenticated.
SHDSL See single-pair high-speed digital subscriber line (S-HDSL)
shielded twisted-pair
cable
A special type of copper telephone line for installing some services. There is an overall
shield covering the traditional twisted pair cable. This shield enables the telephone line
to be grounded.
short-time-operation Operation under normal load for a specified period. The interval between operations is
sufficient for a device to cool down to the environment temperature.
AC6605 Access Controller
Glossary 19 S
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
56
signal attenuation A loss of signal strength during signal transmission. If the signal attenuation is too high,
data is hard to understand and lacks reliability. The farther the client adapter is away
from the access point, the higher the signal attenuation of the client adapter is.
signal cable A cable that can be an E1 cable, network cable, or other non-subscriber signal cable.
signal to noise ratio
margin
Maximum amount of increased received noise (in dB) relative to the noise power when
the system is designed to tolerate and meet the target bit error rate (BER) of accounting
for all coding gains.
signaling Information exchange for establishing and controlling a telecommunications circuit and
managing a network.
signaling gateway A network device that converts control signals from one format to another.
single ended loop
testing
An automatic method of testing a digital subscriber line (DSL) loop from one end of the
line. This method enables operators to effectively evaluate loops in their daily operational
practices.
single-mode fiber A type of optical fiber cable through which only the optical signal with a fixed
wavelength can travel at a time. The inner diameter of a single-mode optical fiber is less
than 10 microns and is used to transmit data in long distance.
single-pair high-speed
digital subscriber line
Also known as G.991.2. SHDSL is an international standard for symmetric DSL
developed by the ITU-T. SHDSL facilitates the sending and receiving high-speed
symmetrical rate for data streams over a single pair of copper wires.
SIP See Session Initiation Protocol
slave shelf A shelf that is a backup of the master shelf. On the physical plane, the slave shelf has
independent slots. On the management plane, the slave shelf is managed by the master
shelf.
Small Office and Home
Office
A small business office or home office located in a home. This type of business usually
operates on a limited budget.
Smart VLAN A special VLAN that contains standard ports and service ports. The broadcast domain
of a standard port includes all ports in the Smart VLAN, whereas the broadcast domain
of a service port includes only standard ports.
SMB A through-wall connecting place or junction for electric wires, plugs, and light bulbs.
SMF See single-mode fiber
smooth upgrade A process for upgrading system files without service interruption.
SN See service node
SNC See subnetwork connection
SNRM See signal to noise ratio margin
softswitch A functional entity that provides call control and connection control for real-time
services. As main control of the next generation network (NGN), softswitches separate
the services of call control and call control from the bearer network, and adopt the
application programming interface (API) and standard protocols. This makes it easy for
network carriers to develop new services and realize new features.
sound alarm An audio or a visible signal sent by a running computer or telecommunications
equipment when errors or emergency events occur.
AC6605 Access Controller
Glossary 19 S
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
57
source MAC address
filtering
A function that checks the source MAC addresses of packets and discards packets with
existing MAC addresses on the service board. This function prevents users from forging
the MAC addresses of an upper layer device.
southbound interface An interface that connects the lower-level network management system (NMS) and the
device and implements the functions of delivering services and transmitting performance
index data.
SPL See splitter
split horizon A function that prevents a RIP route learned on an interface from being sent to neighbors
from the interface. This reduces bandwidth consumption and avoids route loops.
split ratio Ratio of the number 1 to the number of optical signal channels that are split from a
channel of downstream optical signals in a GPON network.
splitter An analog low-pass filter for separating high frequency signals (xDSL) from voice
signals.
SQM Service quality management. It monitors the network in real time to learn the service
condition on the network, rectifies faults in a timely manner, ensuring the service quality
committed for the subscribers.
SSH See Secure Shell
STA See station
stacking A VLAN feature that allows a device to add two 802.1Q VLAN tags to an untagged
packet or translate a tagged packet to the packet with two 802.1Q tags. The packet with
two VLAN tags traverses the backbone network of the service provider and reaches the
broadband remote access server (BRAS). The BRAS authenticates the packet based on
the two VLAN tags, or the outer VLAN tag is removed and the packet is authenticated
based on the inner VLAN tag. The upper layer BRAS performs the dual-VLAN
authentication based on the two tags to increase the number of access users. On the upper-
layer network in Layer 2 mode, a packet can be forwarded directly based on the SVLAN
and MAC addresses to provide wholesale services for the ISP.
STAN See signal attenuation
standard VLAN A standard virtual local area network (VLAN) that contains multiple interconnected
standard Ethernet ports. All ports in a standard VLAN are logically equal and can
communicate with each other. Ports in different standard VLANs are isolated from each
other.
standby A state of a device. The counter part of standby is active. In a two-node system, if the
active device crashes down, the standby device switches to the active state.
static route A special route that cannot automatically adapt to network topology changes and must
be manually configured by administrators. On a network with a simple topology, static
routes enable the network to work properly. Proper configuration and usage of static
routes improve network performance and guarantee bandwidth for important services.
When a network fault occurs or the topology changes, the static route does not change
automatically and the administrator needs to modify it manually.
static user A user with a fixed IP address. A user can configure a fixed IP address for his or her
computer. Then an administrator configures this IP address to be valid.
station A software program that is installed on a computer to request services from the server.
STB See set-top box
AC6605 Access Controller
Glossary 19 S
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
58
step Amount of output amplitude change represented by the smallest valid bit of the
differential pulse code modulation (DPCM) signal in a DPCM or adaptive differential
pulse code modulation (ADPCM) system. In an ADPCM system, the step size is changed
dynamically in response to the needs of the signal being processed. See DPCM and
ADPCM.
stop bit In asynchronous transmission, a bit indicating the end of a character. In early
electromechanical teleprinters, the stop bit provided time for the receiving mechanism
to coast back to the idle position and had 1, 1.5, or 2 data bits depending on the
mechanism.
STP See shielded twisted pair
stratum The Network Time Protocol (NTP) protocol uses Universal Time Coordinated (UTC)
as the standard time. On large communication networks, the tree structure network is
deployed and the time is propagated according to levels of the NTP server. The accuracy
of a time sever depends on the distance to the UTC. The accuracy of the time server is
represented by a stratum value. Servers are classified into different stratums based on
their distance to the UTC.
structured data
transfer
A transfer mode in which CS procedure supports any fixed octet-based packet structure,
particularly 8 kHz-based structures used in circuit-mode services. When the structure
size is greater than one octet, the CS procedure uses a pointer to describe structure
boundaries.
SUA Software fault-oriented group unblocking acknowledgment message.
submap A collection of mappings that is part of a larger map. Submaps are often used together
with group mappings.
subnet mask A technique used in the IP protocol to determine which network segment packets are
destined for. The subnet mask is stored in the client machine, server, or router in the
binary mode corresponding to the IP address.
subnet connection A dynamic relationship between two (or more in the broadcast connection) subnet points
on the boundary of the subnet.
subrack A shelf used to insert circuit cards for microwave transmission.
suit of racks or cabinets A row of racks or cabinets placed side by side.
Super VLAN An aggregated VLAN that can be configured with multiple sub VLANs. Sub VLANs in
a super VLAN use the Layer 3 interface of the super VLAN. Unlike a common VLAN,
the super VLAN contains only sub VLANs without physical interfaces and virtual
service interfaces. A sub VLAN can be a smart VLAN or MUX VLAN.
support A part used to support and fix a cabinet on the ESD floor. It is made of welded steel
plated and used to block up the cabinets to align the cabinet bottom with the ESD floor.
Before the whole set of device is grounded, insulation plates must be installed under the
supports and insulated coverings must be added to expansion bolts to meet insulation
requirements.
switch A communication device that selects links to transmit packets.
AC6605 Access Controller
Glossary 19 S
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
59
20 T
tag header A part of a frame, which contains user priority information and VLAN identification
information.
tagged frame A frame that contains a tag header immediately following the Source MAC Address
field, or a frame that contains a Routing Information field immediately following the
Routing Information field.
tagged MAC frame A frame that contains a QTag prefix.
TC See transmission convergence
T-CONT See Transmission Containers
TCP See Transmission Control Protocol
TDM See time division multiplex
TDMA See time division multiple access
TE Traffic engineering. To dynamically monitor the network traffic and the load of the
network elements and adjust the parameters including traffic management, routing, and
resource restraint parameters in real time, preventing network congestion caused by
unbalanced loads.
TE1 An ISDN-compatible terminal that can be used on the ISDN network directly.
TE2 An ISDN non-compatible terminal (or non-ISDN digital terminal), such as a plain PSTN
telephone set and fax machine, which can be used on the ISDN network after being
adapted by a terminal adapter (TA).
Telecommunication
Management Network
A protocol model recommended by the ITU-T for managing open systems on a
communications network. It manages architecture for telecommunications equipment,
networks, and services, including planning, provisioning, installation, maintenance,
operation and administration.
Telnet A standard terminal emulation protocol in the TCP/IP protocol stack. Telnet enables
users to log in to remote systems and use resources as if they were connected to a local
system. Telnet is defined in RFC 854.
AC6605 Access Controller
Glossary 20 T
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
60
terminal A device that converts voice, sound, text, image, diagram, data, and video from physical
form to electronic signals or from electronic signals to physical form. A terminal
generates and sends signals (such as telecommunication circuit setup or release) that
maintain the normal running status of the telecommunication network. It receives the
call signals of telecommunication switch and transmission.
test bus A physical line that connects the tested device to the test circuit on the TSS board. The
test buses of different subscribers' frames can be connected through physical lines so that
subscribers' frames can share the same TSS board.
TFTP See Trivial File Transfer Protocol
The World
Telecommunication
Standardization
Assembly
A regular four-yearly conference that comes up with the next study topics for ITU-T
which produce recommendations on these topics.
threshold An allowed warp range between the actual counter value and the history average value
of the counter.
threshold alarm An alarm generated when the monitored value exceeds the threshold.
tie wrap A belt for binding cables.
Time Division Multiple
Access
A channel access method for shared medium networks. It allows several users to share
the same frequency channel by dividing a signal into different time slots.
time division
multiplexing
A type of digital multiplexing in which two or more bit streams or signals are transmitted
as sub-channels on one communication channel, and are physically taking turns on the
channel.
time stamp Time of an event recorded by a computer. By using mechanisms such as the Network
Time Protocol (NTP), a computer maintains accurate current time, calibrated to fractions
of a second. The accuracy ensures the communication efficiency. NTP timestamp: A
second relative to 00:00:00 on 1 January, 1900. The value is in the format of a 64-bit
unsigned fixed-point number, with the integer part being the first 32 bits and the fraction
part being the last 32 bits. Originate Timestamp (peer.xmt, pkt.xmt): A format of the
timestamp, indicating the local time when an NTP message leaves the sender, such as
T1. Receive Timestamp (peer.rec, pkt.rec): A format of the timestamp, indicating the
local time when an NTP message reaches the remote peer, such as T2. When the peer is
unreachable, the receive timestamp is set to 0. Transmit Timestamp (peer.org, pkt.org):
A format of the timestamp, indicating the local time when the remote peer returns an
NTP message, such as T3. When the peer is unreachable, the transmit timestamp is set
to 0. Reference Timestamp (sys.reftime, peer.reftime, pkt.reftime): A format of the
timestamp, indicating the local time when an NTP message reaches the sender, such as
T4. If the local clock is never synchronized, the reference timestamp is set to 0.
time to live A technology used in a best-effort delivery system to prevent packets that loop endlessly.
The TTL is set by the sender to the maximum time a packet is allowed to be on the
network. Each router on the network decrements the TTL value by one when the packet
arrives, and discards any packet if the TTL value reaches zero.
timeslot Continuously repeating intervals of time. A timeslot functions as a communication
channel for a user.
TKIP encryption An encryption method as an enhancement to hardware-based WEP encryption. WEP
encryption and TKIP encryption both use the RC4 algorithm, but TKIP encryption better
protects WLAN services.
AC6605 Access Controller
Glossary 20 T
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
61
TL1 See Transaction Language 1
TL1 northbound
interface
A northbound interface for service provisioning. The TL1 northbound interface can be
connected to the Element Management System (EMS), Operation Support System
(OSS), or Network Management System (NMS). In this case, you can provision and
maintain services through the TL1 northbound interface.
TMN See Telecommunication Management Network
token bucket A method for measuring traffic. It is used in the committed access rate (CAR) and traffic
shaping techniques to control the traffic rate. A token bucket can be considered as a
container that stores tokens, with the capacity set in advance. The system puts tokens to
the bucket at the preset rate. When the bucket is full of tokens, the extra tokens overflow
and the number of tokens does not increase.
topological view A map of a managed network on an NMS. The managed devices and links are displayed
on the device explorer and topological view in format of the tree and diagram. It provides
configurations, alarms, performance operations for operators. In the topological view,
the navigation tree is displayed in the left pane, and the map is displayed in the right
pane. The navigation tree on the left displays topology objects (NEs and subnetworks)
and relationship between them. The diagram on the right displays all topology objects
on the current subnetwork and the location relationship between them.
topology Configuration or layout of a network formed by the connections between devices on a
local area network (LAN) or between two or more LANs.
topology management A function that manages topological information about the connectivity of a system.
ToS See type of service
ToS priority Type of service priority. It is a ToS sub-field (bits 0 to 2 in the ToS field) in the ToS field
of the IP packet header.
TP See traffic policing
traffic classification A function that allows users to classify traffic into different classes with different QoS
levels according to the preset standard. Traffic is processed based on the classes.
traffic control A function that manages data flows on the network to ensure that the receiver processes
all incoming data. Traffic control is implemented by hardware and software. It can
prevent the sender from transmitting data at a rate that the receiver cannot process.
traffic engineering A task that effectively maps service flows to the existing physical topology. By choosing
proper routes for different service flows, the traffic engineering balances the global
network load to reduce the congestion possibility and improve the network usage.
Traffic Engineering See TE
traffic mirroring A function that copies the specified data packets to the monitoring port to monitor the
network status and rectify faults.
traffic policing A mechanism for monitoring specified traffic entering communication devices. By
monitoring the rate of traffic that enters the network, this mechanism punishes the
excessive traffic to limit the incoming traffic within a proper range and to protect the
network resources and carriers' interests.
traffic rate The amount of data that is transmitted or received on a device within a unit time.
AC6605 Access Controller
Glossary 20 T
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
62
traffic statistics An operation of measuring and collecting statistics data on devices and
telecommunications networks. With the statistics, operators can analyze the operating
status, signaling, users, system resource usage of devices or networks. Statistics also help
operators manage the device, locate problems, and plan, maintain, and monitor networks.
traffic volume Average number of calls during the average occupation duration, indicating the system's
traffic load. It is measured in units of erlang-hours (Erl). The traffic volume varies with
the average number of calls per unit of time and the occupation duration of each call.
Transaction Language
1
A widely used ASCII or man-machine protocol for telecommunications management.
TL1 enables a managed device that has a TL1 agent installed to communicate with the
TL1 manager. The TL1 manager monitors and manages the managed device using the
TL1 agent to access the data stored in the managed device.
transmission container Basic control unit of the upstream service traffic in the GPON system. GPON uses T-
CONTs to implement service convergence. Each T-CONT corresponds to the service
traffic of a particular bandwidth type. Each bandwidth type has its own quality of service
(QoS) which is represented by the bandwidth guarantee, such as fixed, assured, non-
assured, best-effort, and hybrid mode. Each T-CONT is identified by an Alloc-ID which
is globally allocated by the optical line terminal (OLT), ranging from 0 to 4095. A T-
CONT can only be used by one ONU/ONT of the OLT.
Transmission Control
Protocol
One of the core protocols in the Internet protocol suite. Using TCP, network device can
establish connections to exchange data. TCP provides reliable and ordered delivery of
data from the sender to the receiver. It distinguishes data for multiple concurrent
applications running on the same host.
transmission
convergence
A function that generates and receives transmission frames. The TC sublayer packages
cells into the transmission frame.
transparent
transmission
A process during which the signaling protocol or data is not processed in the content or
encapsulated for the processing of the next phase.
triple play An integrated three-way service bundle of VoIP services, broadband Internet and cable
television/video-on-demand.
Trivial File Transfer
Protocol
A simplified version of FTP for transferring files. Because TFTP is intended for
applications that require no complex interaction between a client and a server, it is used
for transferring simple files, providing no authentication. TFTP has a small capacity and
therefore can be contained in read-only memory (ROM) to boot diskless devices.
trunk A communication channel between two switching systems such as Digital Signal 0 (DS0)
on a T1 or E1 line.
trunk cable A communication cable that connects two switching systems.
trunking gateway A gateway between the switched circuit network (SCN) and packet switched network
that terminates a large number of digital circuits.
TTL See Time to live
twisted pair A type of wiring in which two conductors (the forward and return conductors of a single
circuit) are twisted together to cancel electromagnetic interference (EMI) from external
sources.
two wire system A half-duplex connection where each unit transmits and receives on the same pair of
wires.
AC6605 Access Controller
Glossary 20 T
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
63
type B dual-homing
protection switchover
through GPON port
A protection mechanism in the GPON network. In this mechanism, the upstream active
and standby optical fibers of the optical distribution network (ODN) are connected to
two optical line terminals (OLTs) which may be located at different places. This
mechanism improves the disaster recovery performance of the device.
Type of Service A field in an IP packet used for quality of service (QoS). A ToS field has 8 bits and is
divided into five subfields.
AC6605 Access Controller
Glossary 20 T
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
64
21 U
UBR See unspecified bit rate
UL See uplink
UNI See user network interface
Universal Test &
Operations PHY
Interface for ATM
A standard on the physical layer of the ATM forum for the local connectivity between
ATM devices. It is one of the local loopbacks supported by the asymmetric digital
subscriber line (ADSL) board.
unshielded twisted pair
(UTP) cable
A standard cable used as telephone lines as well as in Ethernet whose standard IEEE
802.3 10BaseT allows the UTP to reach up to l0 Mbit/s rate.
unspecified bit rate A type of service that is ideal for the transmission of IP packets. It has neither
commitment to transmission nor feedback to congestion. If congestion occurs, UBR cells
are discarded, and no feedback or request for slowing down the data rate is delivered to
the sender.
untagged frame A frame that does not contain a tag header immediately following the source MAC
address field or the routing information field (if have).
uplink A unidirectional wireless link for transmitting signals from the user equipment to a base
station (BST), from a mobile station to another mobile station, or from a mobile station
to a BST.
upload An operation to report some or all configuration data of an NE to the NMS. The
configuration data then covers the configuration data stored at the NE layer on the NMS
side.
upstream In an access network, the transmission direction from the link end on the subscriber side.
Upstream is applicable to every site where the link end on the subscriber side is defined
on the network. See downstream.
user-defined ACL An ACL with the packets filtering rules and policies defined by users.
user-end provider edge A provider edge (PE) that is directly connected to a customer edge (CE). A UPE supports
routing and Multiprotocol Label Switching (MPLS) encapsulation. If a UPE is connected
to multiple CEs and has the basic bridge function, frame forwarding is performed only
on the UPE, which relieves the burden on the superstratum PE (SPE).
AC6605 Access Controller
Glossary 21 U
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
65
user network interface A type of ATM Forum specification that defines an interoperability standard for the
interface between ATM-based products (a router or an ATM switch) located in a private
network and ATM switches located in the public carrier networks. It is also used to
describe similar connections in Frame Relay (FR) networks.
UTOPIA See universal test and operations PHY interface for ATM
UTP See unshielded twisted pair
AC6605 Access Controller
Glossary 21 U
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
66
22 V
VAG service Virtual access gateway service. An AG is divided to multiple virtual AGs (VAGs). Each
VAG accesses services separately under the control of the media gateway controller
(MGC).
VAP Virtual access point.
VCCV See virtual circuit connectivity verification
VDSL Very-high-speed digital subscriber line (DSL). A DSL technology providing fast data
transmission over a twisted pair of copper wires (up to 52 Mbit/s downstream and 16
Mbit/s upstream).
VDSL2 An extension of the very-high-speed digital subscriber line (VDSL) technology, which
complies with ITU G.993.2. VDSL2 supports multiple spectrum profiles and
encapsulation modes, and provides short-distance and high-speed access solutions for
the next-generation FTTx access service.
verification A function that determines the users that can access the network.
virtual bridged LAN See virtual Bridged Local Area Network
video on demand A system for playing programs based on audience's demands. VoD is an interactive video
service which can meet audience's demands at any time. It develops on the basis of
computer, communications, and television technologies.
video stream A continuously running video. Video streams may or may not be saved as a file. The
video that is not saved as a file cannot be viewed.
View A topology presented based on some principles. Users can customize the view based on
requirements of every product and organize data in the view displayed by the topology
module. By default, the platform provides the physical view in which the topology view
can be planned based on the principles such as the domain and maintenance relationship.
virtual bridged LAN See virtual bridged local area network.
virtual bridged local
area network
A bridged LAN in which the existence of one or more VLAN-aware bridges allows the
definition, creation, and maintenance of VLANs.
virtual circuit
connectivity
verification
A function that allows users to test the virtual circuit connectivity manually. Just as
ICMP-PING and LSP-PING, the verification is implemented as an extension to LSP-
PING.
AC6605 Access Controller
Glossary 22 V
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
67
virtual connection A logical channel established in a non-backbone area between two area border routers
(ABRs) in the same Open Shortest Path First (OSPF) routing domain. It is used to
maintain the logical connections between physical division areas. A virtual connection
must be configured on both ends and both ends must be ABRs. The virtual connection
is identified by the peer router ID.
virtual noise In VDSL2, the noise power spectrum density (PSD) reserved for the specified spectrum.
Virtual noise helps increase the SNR margin of the corresponding frequency band and
enhances the interference resistance of a line.
virtual number
provision
Pre-provision of a specific user group. It does not allocate service authority to the user
or specify the physical port of the user MG. In this way, the user number is separated
from the device port. To provision a user, an operator in the business hall only needs to
allocate the service authority to the user and activate the user. While deploying external
lines, an operator can bind the device port to complete the formal provision.
virtual private network An extension of the private network. It contains sharing links or encapsulated, encrypted,
and authorized links on the public network. Using the Internet, the VPN connection
provides remote access and route selection access to the private network.
virtual routing and
forwarding
A function that enables a router to function as multiple virtual routers. After Layer 3
interfaces on a router are allocated to different VRF instances, multiple VRF instances
can be implemented on this router.
VLAN-aware A property of bridges or STAs that recognizes and supports VLAN-tagged frames.
VLAN-tagged frame A tagged frame whose tag header carries both VLAN identification and priority
information.
VLAN-unaware A property of bridges or STAs that do not identify VLAN-tagged frames.
VMAC Virtual MAC address. It is a source MAC address that is assigned to an access device.
When transmitting user packets, the access device replaces the source MAC address of
user packets with the VMAC address. In the upstream direction, the device replaces the
source MAC address of user packets with the VMAC address, and then transmits the
user packets on the network. In the downstream direction, the device replaces the VMAC
address of user packets with the source MAC address, and then transmits the user packets
on the network. The VMAC helps prevent user source MAC address spoofing, network-
side BRAS MAC address spoofing, and user source MAC address conflict.
VOD See video on demand
Voice over IP An IP telephony term for a set of facilities used to manage the delivery of voice
information over the Internet. VoIP involves transmitting voice information in digital
form in discrete packets rather than in the traditional circuit-committed protocols of the
public switched telephone network (PSTN).
VoIP See voice over IP
VPN See virtual private network
VQM Voice quality monitor. A method for collecting the data about the delay, jitter, and packet
loss during the call through the H.248 messages. The data is detected by the Real-time
Transport Control Protocol (RTCP) statistics when a call is finished. The collected data
is reported to the call detail record (CDR) for performance data collection.
AC6605 Access Controller
Glossary 22 V
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
68
23 W
wait-to-restore time A period of time that will elapse before a recovered path/connection can be used again
to transmit traffic signals or to select traffic signals from.
WAN See wide area network
WAPI WLAN authentication and privacy infrastructure.
warning alarm An alarm severity indicating that the current condition could possibly cause problems
with resources.
washer A thin flat ring made of metal, plastic, rubber, or leather. It is placed under screws or in
axles or joints to reduce friction, prevent leakage, or balance pressure.
wavelength Distance between successive peaks or troughs in a periodic signal that is advertised
through space.
wavelength division
multiplexing
A data transmission technique in which multiple optical signals, each assigned to a color
(wavelength frequency), are multiplexed onto a single strand of optical fiber. Because
each signal travels separately in its own color band on the fiber, dense wavelength
division multiplexing allows for the simultaneous transmission of different types of
signals (such as SONET and ATM), each traveling at its own rate of speed, which greatly
improves the carrying capacity of the optical fiber. Depending on the number, type, and
rate of the signals involved, bandwidth ranges from 40 Gbit/s to 200 Gbit/s.
WDM See wavelength division multiplexing
weatherprotected
location
A location at which devices are protected from weather influences.
Web authentication An authentication mode in which a user enters a user name and password on the
authentication page of the Web authentication server for identity authentication.
weighted random early
detection
A packet loss algorithm with congestion avoidance capabilities. It can prevent global
TCP synchronization caused by tail-drop. WRED is favorable for high-priority packets
when calculating the packet loss ratio.
weighted round robin A scheduling discipline. Each queue is assigned a weighted value that indicates the
number of processed packets in one cycle queue. One packet is sent in one scheduling,
which ensures that the bandwidths used by different queues comply with the preset ratio.
wide area network A network composed of computers that are far away from each other and are physically
connected using specific protocols. WAN covers a broad area, such as a province, a state,
or even a country.
AC6605 Access Controller
Glossary 23 W
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
69
Wi-Fi multimedia A wireless QoS protocol that guarantees preferential transmission of packets with high
priorities. It ensures good quality of delay-sensitive services such as voice and video
services over a wireless network.
Wi-Fi Protected Access A wireless security standard replacing Wired Equivalent Privacy (WEP) and providing
more powerful security performance for IEEE 802.11 WLANs. WPA is a subset of IEEE
802.11i and uses IEEE 802.1x authentication and TKIP encryption.
wireless medium A type of medium that transmits data frames between wireless users. WLANs use radio
as the transmission medium.
WMM See Wi-Fi multimedia
WPA See Wi-Fi Protected Access
WPA-PSK Wi-Fi protected access pre-shared key
WRED See weighted random early detection
WRR See weighted round robin
WTR See wait-to-restore time
WTSA See The World Telecommunication Standardization Assembly
AC6605 Access Controller
Glossary 23 W
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
70
24 X
x digital subscriber line A bandwidth-efficient modulation technology that is developed to achieve high data
transfer rates (higher than 4 kHz) over twisted-pair cables. Because xDSL has a higher
frequency than common voice signals, the telephone lines can transfer voice and connect
to the Internet using xDSL. Nowadays, xDSL technologies include Asymmetric Digital
Subscriber Line/Rate Adaptive Asymmetric Digital Subscriber Line (ADSL/RADSL),
Symmetric Digital Subscriber Line (SDSL), and Very high-speed Digital Subscriber
Line (VDSL).
xDSL See x digital subscriber line
AC6605 Access Controller
Glossary 24 X
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
71
25 Z
Z interface extension A method in which analog subscribers are connected to another place.
AC6605 Access Controller
Glossary 25 Z
Issue 01 (2012-05-30) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
72

You might also like