Professional Documents
Culture Documents
The information in this document is subject to change without notice and describes only the
product defined in the introduction of this documentation. This document is intended for the
use of Nokia's customers only for the purposes of the agreement under which the document is
submitted, and no part of it may be reproduced or transmitted in any form or means without
the prior written permission of Nokia. The document has been prepared to be used by
professional and properly trained personnel, and the customer assumes full responsibility
when using it. Nokia welcomes customer comments as part of the process of continuous
development and improvement of the documentation.
The information or statements given in this document concerning the suitability, capacity, or
performance of the mentioned hardware or software products cannot be considered binding
but shall be defined in the agreement made between Nokia and the customer. However,
Nokia has made all reasonable efforts to ensure that the instructions contained in the
document are adequate and free of material errors and omissions. Nokia will, if necessary,
explain issues which may not be covered by the document.
Nokia's liability for any errors in the document is limited to the documentary correction of
errors. NOKIA WILL NOT BE RESPONSIBLE IN ANY EVENT FOR ERRORS IN THIS
DOCUMENT OR FOR ANY DAMAGES, INCIDENTAL OR CONSEQUENTIAL (INCLUDING
MONETARY LOSSES), that might arise from the use of this document or the information in it.
This document and the product it describes are considered protected by copyright according
to the applicable laws.
NOKIA logo is a registered trademark of Nokia Oyj.
Other product names mentioned in this document may be trademarks of their respective
companies, and they are mentioned for identification purposes only.
Copyright © Nokia Oyj 2005. All rights reserved.
Contents
1 Objectives .............................................................................................. 5
1 Objectives
After completing this module, the student should be able to:
• List the key aspects of ATM traffic management.
• Distinguish ATM Quality of Service parameters, Traffic parameters and
Service Classes from each other.
• Describe the main purposes of ATM resource management.
• Identify the steps to create ATM resources.
• Understand the configuration of routing and digit analysis in an ATM
network element.
Connection Admission Control (CAC) is used for checking that there are
bandwidth and buffer resources for requested connections. CAC is defined as a
set of actions taken by the network at the connection establishment phase in
order to decide whether a virtual channel/path connection can be accepted or
rejected. Sophisticated CAC algorithms allow maximal utilisation of network
element internal resources and external links while guaranteeing agreed
bandwidth and quality of service for all existing connections. CAC verifies
whether network (or node) is able to offer requested QoS without risking the
QoS of the existing connections.
ATM Network
Usea A
User User B
Setup CAC
User A User B
Figure 2. Usage Parameter Control (UPC) and Network Parameter Control (NPC)
Note
RNC/MGW supports a dual leaky bucket policing algorithm defined by ATM
Forum (For further information on dual leaky bucket policing algorithm refer to
appendix D at the end of this module). Policing is currently always enabled for
terminated CBR type VCCs. Policing does not apply to UBR type virtual
connections. For cross-connected semipermanent connection ("PVCs") on both
VP and VC level policing can be enabled and disabled by using MML
command LBC. Traffic policing parameters are configured manually via
management interface when ATM Permanent Virtual Connection (PVC) is
created.
Note
Policing service is available only for CBR connections in NIS and MXU units.
Policing of low bit rate ATM interfaces (E1/T1/JT1) is performed in
Multiplexing unit (MXU).
ATM
ATMcell
cell ATM
ATMcell
cell
Check on PCR(CLP=0+1) and
CVDT (PCR)
Check on
SCR(CLP=0+1),BT(SCR) and
CVDT (SCR)
Conforming Cell
Traffic policing
Traffic shaping
yes
...
Note
Traffic shaping capability is implemented in each RNC/MGW computer or
signal processing (DMCU/TCU) unit terminating/originating traffic. Traffic
originating unit provides shaping of generated ATM traffic according to
configured traffic parameters. In addition Multiplexing unit (MXU) and NIS
units shape outgoing traffic per port.
Cell loss priority bit in ATM cell header can be used to generate different
priority cell flows within a virtual path or channel connection. A network
element may selectively discard cells with low priority (CLP=1) before higher
priority cell (CLP=0) in congestion situation.
If a congested network needs to discard cells, it may be better to drop all the
cells of one Protocol Data Unit (PDU) rather than to randomly drop cells
belonging to different PDUs. If a single cell is discarded, it may cause the
retransmission of the whole PDU, which in turn may cause more traffic when
congestion is already occurring. Discarding a packet may help to avoid
congestion in the ATM network and can increase throughput.
The two most common congestion control mechanisms implemented in ATM
are:
• Partial Packet Discard
If a cell is dropped from a switch buffer, the subsequent cells in the
higher layer protocol datagram are also discarded.
• Early Packet Discard
When the switch buffer queues reach a threshold level, the entire higher
level datagrams are dropped.
Buffer positions
for cells
When the buffer reaches the
capacity, PPD discards the the
remaining cells, except the last
one.
Buffer positions
for cells
EPD Discards
Frames
One of the advantages of ATM is the QoS. The ATM supports QoS guarantees
for different types of traffic. The quality of service defines the performance to
be guaranteed. There are six QoS parameters. Three of these are negotiated
between the end system and the networks.
Propagation delay dominates the fixed delay component of CTD, while queuing
behaviour contributes to delay variations in heavily loaded networks. The
effects of queue service strategy and buffer sizes dominate loss and delay
variation performance in congested networks. Transmission link error
characteristics largely determine the CER, SECBR and CMR parameters. (For
further information on QoS parameters refer to appendix C at the end of this
module)
1
PCR =
min(T)
ATM cells
T
BT
TPCR Real Flow
MBS = 6
TPCR
Nominal Flow
……..
t
In the previous figure the fourth cell , in the real flow, is NOT OK .
Once the connection has been accepted, the QoS requested is provided as long
as the connection is compliant with the traffic contract.
A connection is catalogued as compliant as long as the proportion of non-
conforming cells does not exceed a certain positive threshold, the value of
which has to be specified in the traffic contract by the network operator. For
non-compliant connections, the network does not need to respect the contracted
QoS, that is, the network could release the connection. For compliant
connections, the requested QoS has always to be supported by the network. (For
further information on Cell Conformance and Connection Compliance refer to
appendix D at the end of this module).
QoS Parameter Notes QoS Class 1 QoS Class 2 QoS Class 3 U class
While establishing a new connection (VP or VC), calling users can signal their
preferred quality of service (QoS) class. The networks progress the connection
request towards the called user. If one of the networks is unable to support the
requested QoS class, the network will clear the connection request. As long as
the users comply with their traffic contract, the network providers should
support these end-to-end bounds for the duration of the connection.
Bandwidth
Time
Real time Variable Bit Rate (rt-VBR) service category is intended for real
time applications that transmit at a rate that varies over time. Rt-VBR
connections are characterised in terms of a peak cell rate, sustainable cell rate,
and maximum burst size. Cells that are delayed beyond the value specified by
maxCTD are assumed to be of significantly reduced value to the application.
Rt-VBR service category is not supported in the first RNC/MGW release.
Bandwidth
Time
Non-Real Time Variable Bit Rate (nrt-VBR) service category is intended for
non-real time applications which have bursty traffic characteristics. It has the
same traffic parameters as the rt-VBR. However, no delay bounds are
associated with this service category. Nrt-VBR service category is not
supported in the first RNC/MGW release.
Bandwidth
Time
Available Bit Rate (ABR) is intended for non-real time application sources
having ability to reduce or increase their information rate if the network requires
them to do so. The example of the application is LAN interconnection services.
ABR provides a guaranteed minimum capacity but allows data to be bursted at
higher capacities when the network is free. These are designated as the
Minimum Cell Rate (MCR) and the Peak Cell Rate (PCR), respectively. The
MCR may be specified as zero. A flow control mechanism is specified to
provide feedback to control the source rate. Although no specific QoS
parameter is negotiated, it is expected that an end system that adapts its traffic
in accordance with the feedback will experience a low cell loss ratio (CLR) and
obtain a fair share of the available bandwidth according to a network specific
allocation policy.
Unspecified Bit Rate (UBR) is meant for non-real time applications that do not
have strict requirements for delay and delay variance. UBR does not have
guaranteed QoS and is also known as 'best effort' traffic class.
Note
CBR is equivalent to DBR (Deterministic Bit Rate), whereas VBR is equivalent
with SBR (Statistical Bit Rate). The CBR and VBR are the terms used by ATM
Forum, while the DBR and SBR are used by ITU-T.
The following figures illustrate the resource creation order when building
connections on VC level.
phyTTP
ATM interface
VC connection
The ATM resources are created on the external interfaces of a network element
and they form the basis for VP and VC level connections to other network
elements.
- VPI
- VPL service level: VP/VC
- usage e.g. MTP3SL, AAL2UD, IPOAM, AAL2SL, DNBAP, CNBAP
- service category: CBR/UBR
- traffic parameters: PCR, CDVT, SCR, Burst tolerance
- QoS class
2
Access profile of 3 4 O&M traffic (UBR, IPOAM)
ATM interface VP VP
- max bandwidth - VCI
- max VPI/VCI bits Lt VC - service category
VCLt
1 p, Lt - traffic and QoS parameters
Lt
p,
p p
RNC MGW
ATM logical interface
Phy TTP
Phy TTP
VC
y ica Lt Lt Lt Lt
ica y
TT l p, p p p, l TT
P int int P
erf erf
User traffic (CBR, AAL2UD)
- phyTTP id ac VC VC ac
- PET/IMA/ SET/ VP Lt Lt VP
PROTGROUP Lt p p Lt
VC VC
p, Lt Lt
p,
- interface id
- UNI / NNI p p
- phyTTP id
• interface id
• the maximum ingress and egress transmission bandwidth
• the maximum ingress and egress bandwidth unit
• the maximum number of VPI bits
• the maximum number of VCI bits
Interface id
This parameter identifies the ATM interface whose access profile
you want to create. The parameter value is a decimal number
ranging from 1 to 320.The parameter is obligatory.
For example, if the ATM interface is tied up to an IMA group with 3*2 Mbit/s
lines, the maximum bandwidth is 0.99*3*4528 c/s = 13448 c/s.
For further information on calculating bandwidth, refer to Inverse Multiplexing
for ATM (IMA) Specification Version 1.1, ATM Forum.
Note
The egress bandwidth (for outgoing traffic) cannot be defined larger than the
capacity of the neighbouring ATM exchange; otherwise ATM cells are lost.
The maximum number of VPI bits defines the space (number of bits) available
for specifying the VPLtp's under the interface. This defines the maximum
number of Virtual Paths (VPs). For example, if the space reserved for VPI is 4
bits, it means that the maximum number of VPLtp's that can be created under
the ATM interface is 16 (= 24). This parameter identifies the maximum number
of allocated bits of the VPI sub field for the defined ATM interface. The
parameter is used by the system to select the appropriate VPI values when
establishing ATM connections. The parameter value can range from 1 to 8 for a
UNI interface and from 1 to 12 for an NNI interface.
The maximum number of VCI bits defines the space (number of bits) available
for specifying VCLtp's under the interface. This defines the maximum number
of Virtual Channels (VCs) that can be created inside each virtual path. For
example, if the space reserved for VCI is 8 bits, the maximum number of
VCLtp's that can be created under a VPLtp is (= 28) - 1 = 255 (VCI with value 0
is not allowed). This parameter identifies the maximum number of allocated bits
of the VCI sub field per VPLtp of the defined ATM interface. This parameter is
used by the system to select the appropriate VCI values when establishing ATM
connections.
The parameter value can range from 1 to 14 for both UNI and NNI
interface. You should select the lowest possible value.
The VCI values 1 - 31 are reserved for specific purposes. For example, VCI 3
and VCI 4 are reserved for O&M (operation and maintenance). For this reason,
you must use VCI number 32 or bigger for an external VC connection. When
creating an access profile, you should reserve at least 6 VCI bits (= 26 different
VCI values).
It depends on the network level planning how the ATM interface and its access
profile, and thus the connections, should be created. For example, there can be
many Virtual Paths with a few Virtual Channels inside each path, or only a few
large VPs with numerous VCs inside each path.
For further information on VP/VC link termination point, refer to Nokia on-line
document.
Figure 18 to Figure 21 show the ATM resource management at Iub, Iur, Iu-CS
and Iu-PS.
- VPI
- VPL service level: VP/VC
- usage e.g. MTP3SL, AAL2UD, IPOAM, AAL2SL, DNBAP, CNBAP
- service category: CBR/UBR
- traffic and QoS parameters
Phy TTP
Phy TTP
p p
VC VC VP
Lt SAAL UNI (AAL2) signalling Lt WAM
VP p p Lt
VP
VC VC
Lt Lt SAAL UNI (AAL2) signalling Lt p,
Lt
p p
p, VC VC
p,
Lt User traffic Lt
p p
phyTTP id VC VC
Lt User traffic Lt
PET/IMA/ SET/ p p
PROTGROUP VC VC
Lt User traffic Lt
- interface p p
VC VC
- UNI / NNI Lt User traffic Lt
- IMAGR /PET p p
- VPI
- VPL service level: VP/VC
- usage e.g. MTP3SL, AAL2UD, IPOAM, AAL2SL, DNBAP, CNBAP
- service category: CBR/UBR
- traffic and QoS parameters
2
3 4 O&M traffic (UBR, IPOAM)
Access profile of
ATM interface VP VP
- VCI
- max bandwidth Lt V - service category
V
Lt
- max VPI/VCI bits 1 p, CL - traffic and QoS parameters
CL
- max VPC/VCC tp tp p,
ATM logical interface
ATM logical interface
RNC RNC
Signalling and user traffic (CBR, MTP3SL, AAL2UD)
Phy TTP
Phy TTP
V V
CL For RNSAP, AAL2 (MTP3SL) signalling CL
VP tp tp VP
Lt Lt
phyTTP id p, p,
PET/IMA/ SET/ V V
PROTGROUP CL User traffic CL
tp tp
- interface id
- UNI / NNI
- IMAGR/ PET /SET
- VPI
- VPL service level: VP/VC
- usage e.g. MTP3SL, AAL2UD, IPOAM, AAL2SL, DNBAP, CNBAP
- service category: CBR/UBR
- traffic and QoS parameters
2
3 4 O&M traffic (UBR, IPOAM)
Access profile of
ATM interface VP - VCI
VP
- max bandwidth Lt V - service category
V
Lt
- max VPI/VCI bits CL - traffic and QoS parameters CL
- max VPC/VCC 1 p, tp tp p,
MGW
VPV VP
Phy TTP
Phy TTP
V
Lt CL For RANAP, AAL2 (MTP3SL) signalling
CLLt
p, tp tp p,
- VPI
- VPL service level: VP/VC
- usage e.g. MTP3SL, AAL2UD, IPOAM, AAL2SL, DNBAP, CNBAP
- service category: CBR/UBR
- traffic and QoS parameters
2
3 4 O&M traffic (UBR, IPOAM)
Access profile of
ATM interface VP VP
- VCI
- max bandwidth Lt VC - service category
VCLt
- max VPI/VCI bits 1 p, Ltp - traffic and QoS parameters
Ltp
p,
- max VPC/VCC
Phy TTP
Phy TTP
VP VP
VC VC
Lt Ltp For RANAP and AAL2 (MTP3SL)signalling LtpLt
p, p,
Digit
Digit Analysis
Analysis
Destination Subdestination
Destination
Destination
Main
Main functions:
functions:
Subdestination
Subdestination 55 •• Analyze
Analyze the
the E.164
E.164 number
number
Subdestination
Subdestination 44 and
and to
to find
find destination
destination of
of
Route
Route
Subdestination
Subdestination 33
Route the
the call
call
Subdestination
Subdestination 22 Route •• Select
Select aa route
route for
for the
the
Subdestination
Subdestination 11 Route
“primary” Route destination
destination
“primary”
Route
Note
Currently there is only one subdestination alternative in the RNC. In the future
more than one subdestination might be implanted to support, for example,
different QoS requirements in AAL2 transport.
Note
In IPA2800 A3 there will be digit analysis in MGW to transfer Iur traffic
through MGW.
Digit analysis is used in the RNC for finding a route to another RNC (in Iur
interface) or to BS (in Iub interface). The digit is analysed when a new
connection at Iur or Iub is needed; for example, a new call establishment or soft
handover branch to the existing call is going to be added.
Digit analysis gets the address of other network element and finds the route for
the destination by analysing the address. The address to be analysed in RNC is
AAL2 Service Endpoint Address (A2EA) which uses AESA format. The
address points to a certain AAL2 or ATM termination point in the neighbouring
node.
4.2 Routing
Routing is used for finding free resources under a given route for connections
going to another network element.
Route can be seen as a common concept in ATM/TDM environment.
In ATM, concept of circuit groups/circuits, used in TDM, are replaced by new
concepts:
− Virtual Channel Connection Endpoint Group (VCCEG)
− Virtual Channel Connection Endpoint (VCCE)
AAL2 connections
VCs VP
Transmission Path
VCs VP
Route
(common concept)
Circuit VCCE
The VCCE identifies the VC Link termination point (VCLtp), under which the
AAL2 connection (CID) is created.
In RNC and MGW, where AAL2 level signalled connections are used, only
AAL2 level routing is used for user traffic. Routing is used for finding a
suitable Virtual Channel Connection (VCC) candidate under a given route
having free resources and providing desired properties for the connection.
Under this selected VCC an AAL type 2 connection may be created. AAL type
2 is finally the level where all user traffic is carried between the ATM network
elements.
Digit analysis
Destination
Subdestination
ATM route
max 16 endpoint groups/1 route
Destination is the result of digit analysis and it is obtained on the basis of the
call origin and received address. Destination symbolises the end node where the
connection is routed.
Subdestination is a routing alternative and it always belongs to some
destination. Subdestination provides necessary routing data that is needed in the
connection establishment phase.
Routes in this context mean external ATM routes that consist of one or more
hunted Virtual Paths (VPs) or Virtual Channels (VCs), which connect two ATM
network elements and are using the same signalling protocol.
In RNC and MGW, only AAL type 2 level routing is used for all user traffic.
The AAL type 2 connections are built inside an AAL type 2 path (VCC). VCC
extends between two Virtual Channel Connection endpoints and it is identified
with an AAL type path identifier. Therefore, ATM routes consist always of
VCC endpoints.
NE1 (RNC)
Sub
Destination destination
Route 13
Digit
Endpoint group
VPI 41, VCI 120 (for AAL2UD)
Tree 23 NE2 NE2 VPI 41, VCI 121 (for AAL2UD)
NE2
VPI 41, VCI 122 (for AAL2UD)
(RNC or BS)
Note
In RNC there is only one subdestination alternative.
The following steps show the function of the digit analysis and routing:
1. Terminology
• Cell Exit Event
A “Cell Exit Event” occurs when the first bit of an ATM cell has completed
transmission out of an end-system.
• Cell Entry Event
A “Cell Entry Event” occurs when the last bit of an ATM cell has
completed transmission into an end-system.
Successful Cell Transfer Outcome:
The cell is received, corresponding to the transmitted cell, within a specified
time Tmax. The binary content of the received cell conforms exactly to the
corresponding transmitted cell payload and the cell is received with a valid
header field after header error control procedures are completed.
Errored Cell Outcome:
The cell is received corresponding to the transmitted cell within a specified
time Tmax. The binary content of the received cell payload differs from that
of the corresponding transmitted cell payload or the cell is received with an
invalid header field after header error control procedures are completed.
Lost Cell Outcome:
No cell is received corresponding to the transmitted cell within a specified
time Tmax. (Examples include “never received” or “late”.)
Misinserted Cell Outcome:
A cell is received, for it there is no corresponding transmitted cell
Severely-Errored Cell Block Outcome:
When M or more
Lost Cell outcomes,
Misinserted Cell Outcomes,
Errored Cell outcomes
are observed in a received cell block of N cells transmitted consecutively on
a given connection.
Lost Cell
CLR =
Total Transmitted Cells
The CLR objective applies either to the CLP=0 cell flow or to the
aggregate CLP=0+1 cell flow, as determined by the applicable
conformance definition.
The figure below illustrates the probability density function of the CTD
(in CBR and real-time VBR services), and relates it to the peak-to-peak
CDV and max CTD parameters.
Probability
density
1-α
Figure 27. Cell transfer delay probability density model (for real-time service categories)
The max CTD parameter represents the maximum Cell Transfer Delay
allowed in the connection.
The peak-to-peak CDV is the difference the best and worst case of CTD,
where the best case is equal to the fixed delay, and the worst case is equal
to a value likely to be exceeded with probability no greater than α.
The components of the fixed delay include propagation through the
physical media, delays induced by transmission system, and fixed
components of switch processing delay. CDV is induced by buffering,
cell scheduling and the variable components of switch processing delay.
Two measurement methods are defined for CDV. These are:
− One-point cell delay variation (one-point CDV)
The one-point CDV describes the variability in the pattern of cell arrival
events observed at a single measurement point with reference to the
negotiated peak rate 1/T
The one-point CDV for cell k (Yk) at a measurement point is defined as
the difference between the cell’s reference arrival time (Ck) and actual
arrival time (Ak) at the measurement point: Yk = Ck - Ak.
The reference arrival time (Ck) is defined as follows:
C0 = A0
Ck+1 = Ak+T if Ck ≤ Ak
Ck+1 = Ck+T Otherwise
Errored Cells
CER =
Successfully Transferred Cells + Errored Cells
Misinserted Cells
CMR =
Time Interval
The GCRA is defined with two parameters: the Increment (I) and the Limit (L).
The notation “GCRA(I,L)” means the Generic Cell Rate Algorithm with the
value of the increment parameter set equal to I and the value of the limit
parameter set equal to L.
Note: I and L are not restricted to integer values.
The GCRA is formally defined in Figure xx. Figure xx is a generic version of
Figure 1 in Annex 1 of I.371. The two algorithms in Figure xx are equivalent in
the sense that for any sequence of cell arrival times, {ta(k), k >= 1}, the two
algorithms determine the same cells to be conforming and thus the same cells to
be non-conforming.
Multiple instances of the GCRA with possibly different I and L parameters may
be applied to multiple flows (CLP=0 and CLP=0+1) of the same connection, or
to the same flow. A cell is then conforming only if it conforms to all instances
of the GCRA against which cells with its CLP state are tested. For example, if
one instance of the GCRA tests the CLP=0 flow and one instance tests the
CLP=0+1 flow, then a CLP=0 cell is conforming only if it conforms to both
instances of the GCRA. In this same configuration, a CLP=1 cell is conforming
only if it conforms to the instance of the GCRA that tests the CLP=0+1 flow. If
tagging is used, a tagged cell is conforming only if it conforms as a CLP=1
cell..
2. Conformance Definitions
Conformance applies to cells as they pass at an interface and are, in principle,
tested according to some algorithm. The first cell of the connection initializes
the algorithm and from then on each cell is either conforming or non-
conforming. Even under ideal conditions some cells may be non-conforming.
Therefore it is inappropriate for the network to only commit to the QoS
objectives for those connections for which all cells are conforming. In effect,
connection compliance does not imply that all cells associated with the
connection are conforming.
For CBR, rt-VBR, nrt-VBR, and UBR, the conformance definition defines
conformity at an interface according to one or more instances of the GCRA
algorithm.
Conforming Cell
Check on SCR(CLP=0+1),BT(SCR)
and CVDT (SCR)
Conforming Cell
ATM
ATMcell
cell ATM
ATMcell
cell Check on PCR(CLP=0+1)
and CVDT(PCR)
CLP=1 CLP=0
CLP
Conforming Cell Check on SCR(CLP=0),
BT(SCR) and CVDT(SCR)
CLP=1 CLP=0
CLP
Conforming Cell Check on SCR(CLP=0),
BT(SCR) and CVDT(SCR)
Abbreviations
AAL2 ATM Adaptation Layer 2
AESA ATM End System Address
ANI Adjacent AAL2 Node Identifier
ATM Asynchronous Transfer Mode
B-ISDN Broadband Integrated Services Digital Network
BS Base Station
CAC Connection Admission Control
CBR Constant Bit Rate
CDVT Cell Delay Variation Tolerance
CID Channel Identifier
GUI Graphical User Interface
IMA Inverse Multiplexing for ATM
ISO International Standards Organisation
MGW Media Gateway
MSC Mobile Switching Centre
MTP3b Broadband Message Transfer Part level 3
NIP1 Network Interface Unit for PDH-based ATM interfaces
NIS1 Network Interface Unit for two physical (optical) STM-1 interfaces
NNI Network Node Interface
NSAP Network Service Access Point
PDH Plesiochronous Digital Hierarchy
PVC Permanent Virtual Connection
QoS Quality of Service
RNC Radio Network Controller
SAAL Signalling ATM Adaptation Layer
SDH Synchronous Digital Hierarchy
STM-1 Synchronous Transport Module One (optical) 155 520 kbit/s
TDM Time Division Multiplexing
TPI Termination Point Identifier
UBR Unspecified Bit Rate
UMTS Universal Mobile Telecommunication System
UNI User Network Interface
VC Virtual Channel
VCCE Virtual Channel Connection Endpoint
VCCep Virtual Channel Connection Endpoint
VCI Virtual Channel Identifier
VCLtp Virtual Channel Link Termination Point
VP Virtual Path
VPC Virtual Path Connection
VPCE Virtual Path Connection Endpoint
VPCep Virtual Path Connection Endpoint
VPCEG Virtual Path Connection Endpoint Group
VPI Virtual Path Identifier
VPLtp Virtual Path Link Termination Point
WCDMA Wideband Code Division Multiple Access