ac6605 v200r001c00 glossary 01

78
AC6605 Access Controller V200R001C00 Glossary Issue 01 Date 2012-05-30 HUAWEI TECHNOLOGIES CO., LTD.

Upload: euniceika

Post on 03-Jun-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 1/78

AC6605 Access Controller 

V200R001C00

Glossary

Issue 01

Date 2012-05-30

HUAWEI TECHNOLOGIES CO., LTD.

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 2/78

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 3/78

About This Document

Intended Audience

This document describes the glossaries and abbreviation of all software and hardware features

about AC6605.

This document is intended for:

l Commissioning Engineer 

l Data Configuration Engineer 

l  Network Monitoring Engineer 

l System Maintenance Engineer 

Symbol Conventions

The symbols that may be found in this document are defined as follows.

Symbol Description

DANGER

Indicates a hazard with a high level of risk, which if not

avoided, will result in death or serious injury.

WARNING

Indicates a hazard with a medium or low level of risk, which

if not avoided, could result in minor or moderate injury.

CAUTION

Indicates a potentially hazardous situation, which if not

avoided, could result in equipment damage, data loss, performance degradation, or unexpected results.

TIP Indicates a tip that may help you solve a problem or save

time.

NOTE Provides additional information to emphasize or supplement

important points of the main text.

 

AC6605 Access Controller 

Glossary About This Document

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

ii

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 4/78

Command Conventions

The command conventions that may be found in this document are defined as follows.

Convention Description

Boldface The keywords of a command line are in boldface.

 Italic Command arguments are in italics.

[ ] Items (keywords or arguments) in brackets [ ] are optional.

{ x | y | ... } Optional items are grouped in braces and separated by

vertical bars. One item is selected.

[ x | y | ... ] Optional items are grouped in brackets and separated by

vertical bars. One item is selected or no item is selected.

{ x | y | ... }* Optional items are grouped in braces and separated byvertical bars. A minimum of one item or a maximum of all

items can be selected.

[ x | y | ... ]* Optional items are grouped in brackets and separated by

vertical bars. Several items or no item can be selected.

&<1-n> The parameter before the & sign can be repeated 1 to n times.

# A line starting with the # sign is comments.

 

Change History

Updates between document issues are cumulative. Therefore, the latest document issue contains

all updates made in previous issues.

Changes in Issue 01 (2012-05-30)

Initial commercial release.

AC6605 Access Controller 

Glossary About This Document

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

iii

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 5/78

Contents

About This Document.....................................................................................................................ii

1 Numerics.........................................................................................................................................1

2 A........................................................................................................................................................3

3 B........................................................................................................................................................8

4 C......................................................................................................................................................11

5 D......................................................................................................................................................17

6 E.......................................................................................................................................................22

7 F.......................................................................................................................................................25

8 G......................................................................................................................................................27

9 H......................................................................................................................................................29

10 I......................................................................................................................................................31

11 J......................................................................................................................................................34

12 L.....................................................................................................................................................35

13 M...................................................................................................................................................38

14 N....................................................................................................................................................42

15 O....................................................................................................................................................44

16 P.....................................................................................................................................................46

17 Q....................................................................................................................................................51

18 R....................................................................................................................................................52

19 S.....................................................................................................................................................55

20 T....................................................................................................................................................60

21 U....................................................................................................................................................65

22 V....................................................................................................................................................67

23 W...................................................................................................................................................69

AC6605 Access Controller 

Glossary Contents

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

iv

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 6/78

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 7/78

1 Numerics

1:n (protection)architecture (n 1) An architecture that has n normal traffic signals, n working SNCs/trails, and one protection SNC/trail. It may have an extra traffic signal. The signals on the working

SNCs/trails are normal traffic signals. The signal on the protection SNC/trail may be a

normal traffic signal, an extra traffic signal, or a null signal. For example, an all ONEs

signal, a test signal, one of normal traffic signals. At the source end, one signal is

connected to the protection SNC/trail. At the destination end, the signals from the

working SNCs/trails are selected as normal signals. When a defect is detected on a

working SNC/trail or under the influence of certain external commands, the transmitted

signal is bridged to the protection SNC/trail. At the destination end, the signal from this

 protection SNC/trail is then selected instead.

1+1 (protection)

architecture

One plus one architecture. At the source end, traffic signals are sent on both active and

standby links. At the destination end, the traffic signals on the active link are received.

When the active link is disconnected, the traffic signals are switched to the standby link,

which is called unidirectional switchover.

10BASE-T An Ethernet specification in IEEE 802.3 standards that uses twisted pair cables with the

transmission rate of 10 Mbit/s and transmission distance of 100 meters.

100BASE-FX A fiber optic Ethernet specification in IEEE 802.3u standards with the transmission rate

of 100 Mbit/s.

100BASE-T A physical layer specification for a 100 Mbit/s CSMA/CD local area network in IEEE

802.3 standards.

100BASE-TX A physical layer specification in IEEE 802.3 standards for a 100 Mb/s CSMA/CD local

area network over two pairs of Category 5 unshielded twisted-pair (UTP) or shielded

twisted-pair (STP) wire.

1000BASE-SX A fiber optic Gigabit Ethernet specification in IEEE 802.3 standards that uses multi-

mode fiber short-wavelength lasers.

1000BASE-T An Ethernet specification in IEEE 802.3ab standards that uses twisted pair cables with

the transmission rate of 1000 Mbit/s and transmission distance of 100 meters.

24-hour alarm

threshold

Maximum number of times an alarm is generated within 24 hours. When the threshold

is set to 0, the alarm function is disabled.

AC6605 Access Controller 

Glossary 1 Numerics

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

1

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 8/78

802.11n A wireless transmission standard released after 802.11a/b/g by Wi-Fi Alliance. As a new

member in the 802.11 protocol family, 802.11n supports 2.4 GHz and 5 GHz frequency

 bands and provides a higher bandwidth (300 Mbit/s, much higher than 54 Mbit/s provided

 by 802.11a/g) for WLAN access users. In addition, 802.11n supports the Multiple-Input

Multiple-Output (MIMO) technology which provides two methods of increasing thecommunication rate: increasing bandwidth and improving channel usage.

802.1X An access control and authentication protocol based on the client/server mode. It can

 prevent unauthorized users/equipment from accessing the LAN/WLAN through an

access port. After a client is associated with an AP, the 802.1X authentication result

determines whether the client can access the wireless services provided by the AP. If the

client is authenticated, it can access resources in the WLAN. If the client fails to be

authenticated, it cannot access resources in the WLAN.

AC6605 Access Controller 

Glossary 1 Numerics

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

2

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 9/78

2 A

AAA See Authentication, Authorization, and AccountingABR  See area border router

absolute humidity Amount of water vapor per cubic meter of air.

Abstract Syntax

Notation One

A syntax notation type employed to specify protocols. Many protocols defined by the

ITU-T use this syntax format. Other alternatives are standard text or Augmented Backus-

 Naur Form (ABNF).

AC See alternating current

AC access controller.A device that manages all access points (APs) on a WLAN and

communicates with an authentication server to authenticate users.

access control right Rights granted to users for access to certain items.access gateway A type of device that is located at the edge access layer of the next-generation network 

(NGN) structure, and provides various methods for connecting users to the NGN.

access media gateway A type of device that is located at the media access layer of the next-generation network 

(NGN) structure and is responsible for media translation between voice streams and IP

 packets, connecting plain old telephone service (POTS) users to the IP network. An

access media gateway translates media streams under the control of the softswitch and

is used for voice service access of end users.

Access Node Control

Protocol

An IP-based protocol that works between an access node and a network access server 

over a digital subscriber line (DSL) access and aggregation network.

access service A type of service providing the basic capability of network access. When users run accessservices, operators can differentiate the charge on users based on the traffic count or 

service provision period.

accurate bandwidth

control

Bandwidth management based on each data stream, which guarantees the data stream

 bandwidth.

acknowledged alarm An alarm that triggers a maintenance action.

acknowledged alarms Some or all alarms that can be acknowledged automatically or manually. After being

acknowledged, these alarms are added to the historical alarm list.

ACL See access control list

AC6605 Access Controller 

Glossary 2 A

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

3

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 10/78

acoustic echo Voice broadcast by a loudspeaker, which is sent back to the remote end after a

microphone captures it. In this way, the talker at the remote end can hear his or her own

voice.

activate An operation to enable a task or object to enter the working state from the non-working

state.

active The normal running status of a device.

active main board One of the two main control boards on the router that is in active state.

active server and

standby server

The active server is an active host where services are running. The standby server is a

host in the standby status and functions as the backup. Only one active server is available

in the N2000 system.

active test An intrusive test that injects test service stream into a network and obtains the test data

 by analyzing the test service stream.

adaptation function A function that converts between an optical network unit/optical network terminal

(ONU/ONT) user interface and a user-to-network interface (UNI). The AF can alsoconvert between an OLT network interface and a service node interface (SNI).

add-drop multiplexer A device installed on an intermediate node of a transmission line. It inputs new signals

and outputs existing signals.

additional bandwidth Sum of the non-assured bandwidth and best-effort bandwidth.

Address Resolution

Protocol

An Internet protocol for mapping an IP address to a media access control (MAC) address.

This protocol allows hosts and routers to determine the data link layer addresses based

on the ARP request and ARP response.

ADM Add-drop multiplexer. A network element that provides access to all or some subsets of 

the constituent signals contained within a synchronous transport module level n (STM-

 N) signal. The constituent signals are added to, or dropped from the STM-N signal as it passed through the ADM.

ADSL See asymmetric digital subscriber line

Advanced Encryption

Standard

An encryption algorithm that ensures system security. It is originally used by some U.S.

government departments to guarantee the security of some secret but unclassified

materials. Currently, AES has become the most influential encryption standard all around

the world.

AES See Advanced Encryption Standard

AF See adaptation function

AG See access gateway

aging time The time that determines when multicast entries on a router port will be deleted. If no

IGMP packet is sent from a port within this time, all multicast entries related to this router 

 port are deleted.

AIFSN Arbitration interframe spacing number.

air conditioning system A system that fully and automatically controls climate parameters such as temperature

and humidity.

alarm A message reported when a fault is detected by a device or by the network management

system (NMS) during the device polling process. Each alarm corresponds to a clear 

alarm.

AC6605 Access Controller 

Glossary 2 A

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

4

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 11/78

alarm automatic report A function that reports an alarm to the network management system (NMS) immediately

after the alarm is generated on the device side. After the alarm is reported, an alarm panel

is displayed where users can view the alarm details.

alarm classification A function that classifies alarms into different types. Based on modules where alarms

are generated, alarms are classified into five types: communication alarms, servicealarms, process alarms, equipment alarms, and environment alarms.

alarm color Colors that indicate alarm severities and can be customized by users.

alarm correlation

analysis

A process in which the second alarm will be shielded or its severity will be upgraded if 

it occurs five seconds after the first alarm and meets the alarm correlation analysis rules.

alarm correlation rules Rules that define the alarm correlation of alarms and specify whether the NMS

suppresses correlated alarms.

alarm delay time Time that includes start delay time and end delay time. When an NE detects an alarm

for a period, the period is the start delay time. When an NE detects that the alarm

disappears for a period, the period is the end delay time. Unnecessary alarms that are

caused by error reports or jitters can be avoided by setting the alarm delay time.

alarm dump A process of transferring the alarms stored in the system memory to other external

devices.

alarm filtering An alarm management method. Alarms are detected and reported to the network 

management system (NMS) which decides whether to display and save the alarms based

on the filtering states of alarms. The filtered alarms are not displayed or saved on the

 NMS, but still monitored.

alarm ID A unique alarm identifier of four bytes. Each alarm ID corresponds to an alarm.

Generally, alarm IDs are allocated based on the alarm type and alarm module.

alarm indication A function that indicates the alarm status of an NE. On an NE cabinet, there are four 

indicators in different colors. When the green indicator is on, the NE is powered on.

When the red indicator is on, a critical alarm is generated. When the orange indicator is

on, a major alarm is generated. When the yellow indicator is on, a minor alarm is

generated. The ALM alarm indicator on the front panel of a board indicates the current

status of the board. (Metro)

alarm input port A port that receives alarm signals.

alarm location A function that helps locate the topology objects where alarms are generated.

alarm masking An alarm management method. Alarms are detected and reported to the network 

management system (NMS) which decides whether to display and save the alarms based

on the filtering states of the alarms. The masked alarms are not displayed or stored on

the NMS.

alarm output port A port that transmits alarm signals.

alarm parameter Parameters that describe the location where a fault occurs. For example, if an alarm

occurs on a board, parameters include shelf ID, slot ID, and port ID.

alarm redefinition A function that enables an operator to change a defined alarm to a required one. Alarms

are detected and reported to the NMS, and the alarm name, type and severity can be

customized in alarm settings.

AC6605 Access Controller 

Glossary 2 A

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

5

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 12/78

alarm severity Significance of a change in system performance or events. According to ITU-T

recommendations, an alarm can have one of the following severities: Critical: indicates

that services are affected and recovery measures should be taken immediately. Major:

indicates that services are affected and recovery measures should be taken in a timely

manner. Minor: indicates that services are affected and recovery measures should betaken to prevent faults from becoming more serious. Warning: indicates that potential

faults are detected and measures should be taken to further diagnose (if necessary) and

correct the faults.

alarm synchronization An alarm management method. When alarm synchronization is implemented, the NMS

checks alarm information in its database and on NEs. If the alarm information on the

two locations is inconsistent, the alarm information on NEs is loaded to the NMS

database and replaces original records.

ALG See application level gateway

alternating current Current that periodically reverses direction. Its frequency is measured in Hertz (Hz) or 

durations per unit of time.

AMB See active main board

American National

Standard Institute

A private organization that defines standards for devices and procedures.

AMG See access media gateway

ANCP See Access Node Control Protocol

ANSI See American National Standard Institute.

application level

gateway

A specific proxy for translating specified application protocols. It interacts with Network 

Address Translation (NAT) to establish the state, uses NAT state information to modify

the specific data encapsulated in the data part of an IP packet, and performs necessary

operations to make the application protocol run in different ranges.

area border router A router that can belong to two or more areas, and one of the areas must be a backbone

area.

ARP See Address Resolution Protocol

ARP mapping table A table that contains a series of mappings between IP addresses and MAC addresses of 

other hosts that have communicated with the host recently.

ARP proxy Proxy Address Resolution Protocol. This protocol allows an intermediate device such

as a router to function as a terminal node to send an ARP response packet to a host. The

 bandwidth can be saved in the networking of a low-rate WAN.

ANSI See Abstract Syntax Notation One

association A logical relationship or channel for data transmission which is set up by two Stream

Control Transmission Protocol (SCTP) endpoints through the four-way startup

handshake mechanism of SCTP.

asymmetric digital

subscriber line

A technology that transmits digital information at a high bandwidth on existing phone

lines to homes and businesses. Unlike the regular dialup phone service, ADSL provides

continuously available, always-on connection. ADSL is asymmetric in that it uses most

of channels to transmit downstream to users and only a small part to receive information

from users. ADSL simultaneously accommodates analog (voice) information on the

same line. ADSL supports downstream data rates from 512 kbit/s to 6 Mbit/s.

AC6605 Access Controller 

Glossary 2 A

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

6

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 13/78

asynchronous mode A mode in which two systems periodically send Bidirectional Forwarding Detection

(BFD) control packets to each other. If a system fails to receive the BFD control packets

from its peer within the detection period, the system reports that the session is Down.

Asynchronous

Transfer Mode

A high-performance, cell-oriented switching and multiplexing technology that utilizes

fixed-length packets to carry different types of traffic.

ATM See Asynchronous Transfer Mode

ATM/Ethernet

emulation

Emulation of the ATM/Ethernet service on a non-ATM network or a non-Ethernet

network.

attainable net data rate A capacity metric of an asymmetric digital subscriber line (ADSL) communication

channel. It is also known as the maximum attainable bit rate (MABR) in ADSL standards.

attenuation Reduction of signal magnitude or signal loss, expressed in decibels (dBs).

ATTNDR  See attainable net data rate

audio A sound portion of a program or a track recorded on a videotape.

authentication A procedure for validating the user login information in a multiuser or network operating

system.

authentication server A server that provides authentication services. The authentication server determines

whether to grant a privilege to a user based on the user information.

authentication word A unique identifier that identifies a server or user in the office system.

Authentication,

Authorization, and

Accounting

A mechanism for configuring authentication, authorization, and accounting security

services.

authority and domain-

based management

A function of the NMS authority management. With this function, you can: 1. Partition

and control the management authority. 2. Manage device nodes and service data basedon regions. 3. Grant management and operation rights to users based on their regions.

auto-negotiation A program in which two devices can agree on transmission mode before starting

transmission. It is defined in Fast Ethernet and the transmission mode can be 100 Mbit/

s or 10 Mbit/s and full or half duplex.

availability Accessibility of a computer system or resource, or a measure of the fault tolerance of a

computer and its programs.

AC6605 Access Controller 

Glossary 2 A

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

7

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 14/78

3 B

backbone area An area for routing between areas and forwarding routing information about non- backbone areas.

backbone network  A part of computer network infrastructure that connects various pieces of network,

 providing a path for information exchange between LANs or subnets. A backbone can

tie together networks in the same building, in different buildings in a campus

environment, or over wide areas. The backbone's capacity is greater than the networks

connected to it.

backplane An electronic circuit board containing circuits and sockets into which electronic devices

on other circuit boards or cards can be plugged. In a computer system, a backplane

functions as or belongs to a motherboard.

backup A periodic operation performed on the data stored in the database for the database

recovery in case that the database is faulty. The backup is also data synchronization between active and standby boards.

backup designated

router

A router installed on a network. When a designated router fails, the backup designated

router functions as the designated router to ensure stable data transmission.

backup port A port configured for fast switching of the designated port. A backup port is blocked

when it learns the BPDU packets sent by itself. If the designated port fails, the backup

 port switches to the new designated port rapidly and starts to forward packets without

delay.

bandwidth increase A method used by 802.11n to bind two 20 MHz channels to form a 40 MHz channel for 

doubling the transmission rate and improving the throughput of the wireless network. In

actual applications, the two bound 20 MHz channels can also be used as two separatechannels, one as the primary channel and the other as the secondary channel. Therefore,

either a 40 MHz channel or a single 20 MHz channel can be used for transmitting and

receiving data.

base station Also known as base transceiver station. A base station transmits services and signaling

through air. A base station includes baseband units, wireless devices, and antennas.

Basic Input Output

System

Firmware built into a computer. It contains basic input/output control programs, power-

on self test (POST) programs, bootstraps, and system settings. A BIOS provides

hardware setting and control functions for a computer.

AC6605 Access Controller 

Glossary 3 B

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

8

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 15/78

baud rate  Number of times per second the signal changes on a transmission line. The transmission

line usually uses only two signal states, making the baud rate equal to the number of bits

 per second that are transferred. The underlying transmission technique may occupy some

 bandwidths, so user data may not be transmitted at the line's specified bit rate.

BDI packet A packet for notifying the upstream label switched routers (LSR) of the failure eventthat has occurred on the downstream LSR along the reverse LSP. The BDI packet can

 be used in the 1:1/N protective switchover service.

BDR  See backup designated router

bearer network  A network that transmits transport-layer protocol messages between physical devices.

BER  See bit error rate

BFD See bidirectional forwarding detection

BGP See Border Gateway Protocol

Bidirectional

Forwarding Detection

A mechanism for detecting the communication faults between adjacent devices quickly

so that engineers can take measures to ensure smooth services.

binding authentication An authentication mode in which the BRAS creates a user name and a password for an

access user based on the location of the user.

binding strap A component installed on two sides of the cabinet to bind various cables.

BIOS See basic input output system

bit error alarm

threshold

A bit error limit which will trigger an alarm on the equipment when it is exceeded. The

threshold is classified into crossing threshold and defect threshold.

bit error rate A ratio of the number of transmitted bits that contain errors to the total number of received

 bits. BER is an important index for measuring the communications quality of a network.

A low BER indicates good communications quality of the digital communication system.

BITS Building integrated timing supply system. When the number of synchronous nodes or 

communication devices is large, you can use a device to set up a clock system on the

hinge of telecom network to connect the synchronous network as a whole, and provide

satisfactory synchronous base signals to the building integrated device.

blacklist A list of ring back tone (RBT) subscribers for whom the RBT service is suspended for 

reasons, for example, they fail to pay for the RBT service in a certain period. The system

charges monthly rental payments from blacklisted subscribers. Blacklisted subscribers

cannot perform any operations involving charges, such as downloading and setting

RBTs. Calling parties hear beep tones when calling the blacklisted subscribers.

BLAN See bridged local area network 

board An electronic part that can be plugged in a subrack to provide uplink interfaces or service

interfaces. It consists of chips and electronic components.

Border Gateway

Protocol

An inter-autonomous system routing protocol. An autonomous system is a network or 

group of networks under a common administration and with common routing policies.

BGP is used to exchange routing information for the Internet and is the protocol used

 between Internet service providers (ISPs).

BPON See broadband passive optical network 

AC6605 Access Controller 

Glossary 3 B

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

9

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 16/78

BRA Basic rate access. An Integrated Services Digital Network (ISDN) configuration

intended primarily for use in subscriber lines. The basic rate interface (BRI)

configuration provides two 64 kbit/s bearer channels (B channels) and one 16 kbit/s Delta

channel (D channel). The B channels are used to carry services and the D channel is used

to transmit call control signaling and maintain and manage signaling.bridge A store-and-forward device that connects LANs with different types of network 

topologies. It can perform the functions of the data link layer.

bridge tap A twisted pair cable in the Public Switched Telephone Network (PSTN). It belongs to

the valid copper cable branch.

bridged local area

network 

Cascaded IEEE 802 LANs interconnected by MAC bridges.

bridging Action of transmitting same traffic on the working and protection channels

simultaneously.

broadband passive

optical network 

A one-to-many broadband optical transmission system. A BPON can transparently

transport any type of data, such as voice, video, and IP data. The data frame type is not

limited.

broadcast storm Accumulation of broadcast traffic on a computer network. A broadcast storm occurs

when broadcast or multicast packets flood the subnet, creating excessive traffic and

degrading network performance. Errors in the protocol-stack implementation or in the

network configuration can lead to a broadcast storm.

BSS Basic service set. A BSS includes stations (STAs) that have successfully synchronized

with the BSS using the Join service primitive and a STA that is using the Start primitive.

Membership in a BSS does not necessarily enable wireless communications with other 

members in the BSS.

BTS Seebase station

bundling strap A strap made of polypropylene and nylon materials for bundling and fixing various

cables.

buzzer A signaling device that makes buzzing sound.

bypass tunnel A tunnel for protecting a group of MPLS tunnels in the facility backup. The protected

MPLS tunnels share this tunnel. A bypass tunnel needs to be created beforehand.

AC6605 Access Controller 

Glossary 3 B

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

10

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 17/78

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 18/78

CAPWAP tunnel A tunnel for transmitting management packets and data packets between an AC and an

AP when the AP is registered with the AC. Control and provisioning of wireless access

 points (CAPWAP) is a control protocol for wireless access points. The management

 packets exchanged between the AC and the AP must be transmitted over the CAPWAP

tunnel. No additional hardware needs to be installed in the CAPWAP managementtunnel. If data packets exchanged between the AC and the AP need to be transmitted

over the CAPWAP tunnel, a CAPWAP data tunnel needs to be set up between the AC

and the AP. You need to install additional hardware that implements tunnel encapsulation

and decapsulation. If data packets exchanged between the AC and the AP do not need

to be transmitted over the CAPWAP tunnel, data packets from the AP are directly

forwarded.

CAR  See committed access rate

carrier sense In a local area network, an ongoing activity of a data station to detect whether another 

data station is transmitting signals.

Carrier Sense Multiple

Access/Collision

Detection

Carrier Sense Multiple Access With Collision Detection (CSMA/CD). CSMA/CD is a

network access method in which devices that are ready to transmit data first check the

channel for a carrier. If two devices transmit data at the same time, a collision occurs

and devices wait a random amount of time before attempting to retransmit data.

category 5 balanced

cable

Balanced 100-ohm and 120-ohm unshielded twisted-pair (UTP) cables and associated

connecting hardware whose transmission characteristics are specified to 100 MHz. This

indicates that performance meets the requirements of a Class D link as per ISO/IEC

11801: 1995. In addition to the requirements outlined in ISO/IEC 11801: 1995, IEEE

802.3 Clauses 14, 23, 25, and 32 specify additional requirements for this cabling when

used with 10BASE-T and 100BASE-T.

CATV See cable TV

CAU See client auto update

CBR  See constant bit rate

CCITT Consultative Committee of International Telegraph and Telephone. As one of several

committees operating under the auspices of the International Telecommunication Union

(ITU), the CCITT carries out researches on new technologies, services, and accounting

about telecommunication, and standardizes these recommendations.

CCM Counter-mode/CBC-MAC.

CCMP See Counter mode with CBC-MAC protocol

CE See customer edge

CEAS See customer equipment archives system

cell loss priority A field in the asynchronous transfer mode (ATM) cell header. The cell loss priority

determines the probability of a cell being discarded when the network becomes

congested. Cells with CLP of 0 are ensured services and unlikely to be discarded.

center wavelength An arithmetic mean of the half-maximum spectral intensity points of the transmitter. If 

the spectral intensity distribution is symmetric and singly peaked, the center wavelength

is at maximum intensity.

CFM See connectivity fault management

AC6605 Access Controller 

Glossary 4 C

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

12

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 19/78

channel A telecommunication path of a specific capacity and at a specific rate between locations

in a network. Channels can be established through wire, radio (microwave), fiber, or a

combination of the three. The amount of information transmitted per second in a channel

is the information transmission rate, expressed in bits per second, such as bit/s, kbit/s,

Mbit/s, Gbit/s, and Tbit/s.channel adjustment A mechanism that achieves the following effects for a WLAN: Every AP is assigned an

optimal channel, with minimum interference to and from neighboring channels. APs are

free from interference sources such as radar and microwave ovens with the help of real-

time channel detection. Dynamic channel adjustment allows for continuous

communication and provides reliable transmission over WLANs.

cipher key A variable used in the Global System for Mobile Communications (GSM) and general

 packet radio system (GPRS) cipher process.

CIST See common and internal spanning tree

CK  See cipher key

class of service A technology or method for classifying services into different categories based on service

quality.

Class of Service A rule for precedence mapping. CoS functions on internal interfaces and its advantages

are more evident when congestion occurs. CoS processes services based on their 

 priorities. Services with high priorities are processed preferentially, whereas services

with low priorities are processed as much as possible. If bandwidth is insufficient, low-

 priority services are discarded.

claw hammer A tool for knocking or shaping a workpiece, or extracting a nail.

clear alarm An alarm reported when a fault is rectified and the device or system recovers.

CLI See command line interface

client A terminal that has a wireless network interface card installed, such as a laptop or a

computer.

client auto upgrade A function that automatically detects the updates of a client version and upgrades the

client, which ensures the consistency of the client and server versions.

client/server software

architecture

A message-based modular software architecture that defines servers and clients.

Compared with the centralized, mainframe, and time sharing computing, the client/server 

software architecture enhances availability, flexibility, interoperability, and scalability

of the client/server. In this architecture, the client is defined as a service requester and

the server is defined as a service provider. The client/server software architecture

 provides services based on requests rather than transfer all files, reducing network traffic.

CLIP See calling line identification presentation

CLK  See clock 

clock  An electronic circuit in a computer that generates a steady stream of timing pulses. The

digital signals synchronize every operation.

clock filtering An algorithm for selecting the best clock for clock synchronization. For different peers

(multiple servers or peers configured for a STA), a STA sends clock synchronization

 packets to each server or passive peer. After receiving the response packets, the peer 

uses the clock selection algorithm to select the best clock.

clock source A device that provides standard time for the Network Time Protocol (NTP)

configuration.

AC6605 Access Controller 

Glossary 4 C

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

13

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 20/78

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 21/78

common and internal

spanning tree

A single spanning tree jointly calculated by Spanning Tree Protocol (STP), Rapid

Spanning Tree Protocol (RSTP), the logical connectivity of Multiple Spanning Tree

(MST) bridges and regions, and Multiservice Transport Platform (MSTP). The CIST

ensures that all local area networks (LANs) in the bridged local area network are simply

and fully connected.communication

connection status

A status that indicates whether communication between two nodes is normal.

composite echo An echo consisting of electric echoes and acoustic echoes. It is caused by reflected signals

in hybrid and acoustic environments, such as analog hands-free telephones.

concatenation A process of combining multiple virtual containers. The combined capacities can be used

as a single capacity, ensuring bit-sequence integrity.

configuration data A command file for configuring hardware of a network element (NE) so that the NE can

collaborate with other NEs in the entire network and process specified services.

Configuration data is the key factor for normal running of the entire network. A typical

configuration data file configures boards, the clock, and the protection relationship.

configuration file A file that contains machine-readable operating specifications for a piece of hardware

or software. It can also contain information about another file or a specific user, such as

the user's login ID.

congestion A condition of a network when the current load approaches or exceeds the available

resources and bandwidth designed to handle that load at a particular location on the

network. Congestion leads to a decrease in network service efficiency.

connecting plate A plate for connecting two adjacent cabinets.

connection An association of transmission channels or telecommunication circuits set up for 

transferring signals between two or more network points. It supports an independent

communication.

connection admission

control

A series of actions taken on the network in the call establishment or call re-negotiation

 phase to determine which connection request is accepted.

connectivity fault

management

A function that detects connectivity of the entire network and locates faults. It improves

the network reliability.

connectivity

verification

A method for verifying the path. Connectivity verification (CV) and fast failure detection

(FFD) are path failure detection methods. CV checks whether the label switched path

(LSP) is valid. FFD supports the functions that require quick response, such as protection

switching.

connectivity

verification (CV)packet

A packet that is generated at a frequency of 1/s on the source end label switching router 

(LSR) of a label switched path (LSP), and terminated on the destination end LSR of theLSP. A CV packet contains the unique identifier (TTSI) of the LSP. Therefore, all types

of exceptions on the path can be detected.

constant bit rate A type of service category defined by the asynchronous transfer mode (ATM) forum.

CBR transfers cells based on constant bandwidth. It is applicable to service connections

that depend on precise clocking to ensure undistorted transmission. See ABR, UBR, and

VBR.

container A set of environment variables and processes. A container provides the running

environment for services in the ENIP CORE.

AC6605 Access Controller 

Glossary 4 C

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

15

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 22/78

control and

provisioning of wireless

access points

A protocol that defines how APs communicate with ACs and provides a universal

encapsulation and transmission mechanism for communication between APs and ACs.

CAPWAP defines data tunnels and control tunnels.

controllable multicast Management of multicast services by controlling multicast sources and multicast users

on the network.

cooling system A system that minimizes the climate impact by decreasing the temperature.

cooling vent A vent in a cabinet that allows air to come in.

CoS See Class of Service

CoS See Class of Service

CoS priority Priority represented by the 802.1p field in the VLAN tag contained in an Ethernet frame.

It ranges from 0 to 7.

Counter-Mode with

CBC-MAC Protocol

A CCM method based on the Advanced Encryption Standard (AES) algorithm. In

CCMP, CCM combines the counter (CTR) mode for confidentiality check and combines

cipher block chaining-message authentication code (CBC-MAC) for authentication andintegrity check. CCM protects the integrity of both the MPDU data field and selected

fields of the IEEE 802.11 MPDU header. All AES processes in CCMP use a 128-bit key

and a 128-bit block size. CCM requires a new temporal key for every session. CCM also

requires a unique nonce value for each frame encrypted by a given temporal key, and

CCMP uses a 48-bit packet number (PN) for this purpose. For the same temporal key,

the reuse of a PN voids all security guarantees.

CPU usage Proportion of resources allocated to the running processes or programs to the total

resource in a central processing unit (CPU).

CRC error frame Frames that fail to pass cyclic redundancy check (CRC) are called CRC error frames,

such as long frames, oversized frames, and check error frames.

crossover cable A twisted pair cable that routes signals from one device to another.

cross-platform Developing software or running software on multiple hardware platforms.

CSMA/CD See carrier sense multiple access/collision detection

CTR  Counter mode

current alarm An alarm in unrecovered and unacknowledged state, unrecovered and acknowledged

state, or recovered and unacknowledged state. Treatment measures must be taken on

these alarms. This definition is applicable to network management products and other 

 products, but not wireless terminals. For wireless terminals, current alarms include

alarms in unacknowledged and urgent state as well.

customer edge A part of BGP/MPLS IP VPN model. It provides interfaces for direct connection to the

Service Provider (SP) network. A CE can be a router, a switch, or a host.

Customer Equipment

Archives System

A system that manages all Huawei online devices. It records the information about

shelves and boards of all products (including purchased products), engineering

information (including cooperation payment), and maintenance and warranty

information. A CEAS consists of offline tools and online systems.

AC6605 Access Controller 

Glossary 4 C

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

16

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 23/78

5 D

data communicationnetwork  A communication network used in a Telecommunication Management Network (TMN)or between TMNs which support the data communication function.

Data Encryption

Standard

A specification developed by IBM for encrypting computer data and adopted by the U.S.

government as a standard in 1977. DES uses a 56-bit key.

data terminal

equipment

A user device composing a user-to-network interface (UNI). The DTE accesses the data

network through data connection equipment (DCE) such as a modem and usually uses

the clock signals generated by the DCE.

data tunnel quantity  Number of data tunnels. It indicates the number of APs that can use the data tunnels. For 

example, a system supports a maximum of 2000 APs, but only 1200 APs go online.

Among these 1200 APs, only 800 APs use data tunnels.

database description(DD) packet

Packets that are exchanged between two OSPF devices when they synchronize their link state databases (LSDBs). A DD packet is used to describe the LSDB of a device. It

contains the header of each LSA in the LSDB. The header of an LSA uniquely identifies

an LSA. This can reduce the traffic between routers because the header of an LSA only

occupies a small portion of the overall LSA traffic. With the header, the peer router can

determine whether it has had the LSA.

daughter board A circuit board installed on a printed circuit board (PCB) to enhance performances.

DC See direct current

DCF See distributed coordination function

DCN See data communication network 

DDF See digital distribution frame

DDI See direct-dialing-in

deactivation An operation that disables a task or object.

default route A special route used only when no matching entry is found in the routing table. If the

destination IP address of a packet does not match any entry in the routing table, the

default route is chosen.

delay variation A change of signal transfer delay compared with the ideal signal.

AC6605 Access Controller 

Glossary 5 D

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

17

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 24/78

DELT Dual-ended loop test. When the central office (CO) and customer premises equipment

(CPE) are functional, the dual-ended loop test is carried out to test the transmission

feature, line attenuation, signal attenuation, power spectrum of the background noise,

signal-to-noise ratio (SNR), and maximum rate.

DES See Data Encryption Standard

descriptor In information retrieval, a word, similar to an index entry in a book, which identifies a

significant topic or element in a stored document or group of documents.

designated port A port defined in the Spanning Tree Protocol (STP). On each switch that runs the STP

 protocol, the traffic from the root bridge is forwarded to the designated port. The network 

segment that connects the STP switch receives the data sent from the root bridge through

a designated port. All the ports on the root bridge are designated ports. In each network 

segment, there is only one designated port. When a topology is stable, only the root port

and the designated port forward traffic. Non-designated ports are in the Blocking state,

which only receive STP protocol packets rather than forward user traffic.

designated router A router defined in the open shortest path first (OSPF) protocol. In a broadcast network where routers are directly connected without other routing devices in between, all the

routers only need to send information to the DR for broadcasting network link states,

which reduces the number of adjacency relationships set up between routers in a multi-

address access network.

detection mode A mechanism for implementing bidirectional detection in the Bidirectional Forwarding

Detection (BFD) protocol. The mechanism may operate in two modes: asynchronous

mode and demand mode.

device file information Sum of the device hardware information, software information, location information,

and service configuration information, including cabinet model, shelf model, slot and

 board model, FRU E-label, system software version, board software version, equipment

room location, and service configuration data.

device panel An interface for indicating the panel of physical devices and their status in the NMS.

device set A group of managed devices. By dividing managed devices into different device sets,

users can manage the devices easily. If a user or a user group is granted operation rights

over one device set, the user or the user group will have the same operation rights over 

all the devices in the device set, making it unnecessary to set the operation rights over 

all the devices in a device set separately. It is recommended that you configure a device

set based on the geographical region, network level, or device type.

DHCP See Dynamic Host Configuration Protocol

DHCP client An Internet host (usually a workstation) that obtains an IP address and related TCP/IP

configuration information using a DHCP server.

DHCP Option60 An option in a DHCP packet for identifying the terminal type and choosing an appropriate

interface gateway based on the terminal type.

DHCP Option82 A reliable option added to a DHCP packet to identify the user port and terminal

information, which functions as validity reference to the DHCP server to allocate IP

addresses and other parameters. This option is also called DHCP Relay Agent

Information Option and its number is 82.

DHCP proxy A program that relays the DHCP requests of a user to the DHCP/BOOTP server, which

then assigns an IP address to the user.

AC6605 Access Controller 

Glossary 5 D

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

18

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 25/78

DHCP relay Dynamic Host Configuration Protocol relay. It is a function that enables DHCP broadcast

 packet forwarding between DHCP clients and DHCP servers across subnets. In this

manner, DHCP clients in different physical subnets can obtain IP addresses from the

same DHCP server.

DHCP server Dynamic Host Configuration Protocol server for obtaining necessary configurationinformation such as IP addresses. In addition to the standard DHCP services, it can also

assign the URL address of the proxy-call session control function (P-CSCF) to the IMS

terminals during the dynamic assignment of the IP address.

DHCP standard mode Dynamic host configuration protocol in standard mode. It is used to assign IP addresses

to devices on the network.

diagonal pliers A tool used to cut insulation tubes and tie wraps.

differential fiber

distance

Difference in the distance between the nearest ONU/ONT and the OLT and that between

the furthest ONU/ONT and the OLT. An OLT is connected to several ONU/ONTs.

digital distribution

frame

A frame for laying out cables.

digital parameter A physical parameter with discrete values: normal or failed. A digital parameter is a

status parameter. In general, the high and low levels are compared to determine the status

 parameter.

digital subscriber line A technology for providing digital connections over the copper wires or the local

telephone network. DSL performs data communication over the plain old telephone

service (POTS) lines without affecting POTS services.

digital subscriber line

access multiplexer

A network device located in the main office of a telephone company. A DSLAM receives

signals through multiple customer digital subscriber line (DSL) links and puts the signals

on a high-speed backbone line using multiplexing techniques.

DIP switch A tiny switch installed on the circuit board. A Dual In-line Package (DIP) switch consists

of eight switches that indicate 8-bit binary (0 or 1) from left to right. It is used to set the

number of a subrack. When multiple subracks are cascaded, a DIP switch can uniquely

identify the shelf position. For example, if the eight switches are set to 00000001, the

subrack number is 1.

direct current Electrical current whose flow direction does not reverse. The current flows in the same

direction though it may stop or change amplitude.

direct current power

distribution cabinet

A cabinet that provides direct current power for devices.

direct-dialing-in The ability for an outside caller to call an internal number without having to pass through

an operator or attendant.

discrete multi-tone A modulation mode of the asymmetric digital subscriber line (ADSL), which uses the

frequency division multiplex technology to divide the frequency band into multiple

subchannels for carrying data independently. ITU-T defines the maximum number of 

 bits that each subchannel can carry. In each subchannel, data can be modulated and

transmitted independently and DMT-based DSL has a strong anti-noise capability. The

transmission capability of the DMT-based ADSL technology is related to the following

factors: the frequency response (line attenuation), line noise, noise margin, transmit

 power, and preset maximum number of bits that a frequency band can carry.

AC6605 Access Controller 

Glossary 5 D

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

19

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 26/78

disk mirroring A procedure that involves duplicating data to two disks or two partitions on a disk. If the

original disk fails, the secondary disk automatically takes over. Disk mirroring cannot

 protect against failures that occur along the channel between the disks, because the

duplicate disks exist on the same channel.

distributedcoordination function

A coordination function. The coordination function logic is active in every station (STA)of the basic service set (BSS) when the network is in running state.

DLM Dynamic line management. It adjusts the maximum transmit power of a single line to

achieve the optimized transmit power and reduce the crosstalk between lines.

DMS Huawei iManager N2000 datacom integrated network management system.

DMT See discrete multi-tone

domain A logical subscriber group based on which subscriber rights are controlled.

DoS attack  Denial of Service (DoS) attack. Attackers send a lot of request packets which take up

too much resources of the target server, resulting in the target server's failure to respond

to the requests from authorized users.down Pertaining to a status in which the system is damaged, resulting in system failure.

DR  See designated router

DSL See digital subscriber lineLine

DSLAM See digital subscriber line access multiplexer

DSM Dynamic spectrum management. DSM calculates the best power spectrum for each line

 based on the crosstalk between lines in a cable, and then adjusts the power spectrum of 

each line to the best value to minimize the crosstalk between lines.

DTE See data terminal equipment

dual homing A network topology in which signaling transfer points are configured in pairs. Each

signaling point connects two signaling transfer points. Dual homing solutions can be 1

+1 master/slave backup, 1+1 mutual aid, N+1 backup, and N+1 mutual aid. The dual

homing solution was put forward by Huawei first and had been applied in multiple

commercial networks.

dual-host backup A method of configuring an active device and a standby device to back up data in real

time to guarantee system data security and minimize loss caused by system failures (such

as service interruption and data loss).

duplex An ability to transmit and receive data simultaneously in a communications channel. It

is also called full duplex. If a system can only transmit or receive data at a time, it is half 

duplex.

Dynamic Host

Configuration Protocol

A client-server network protocol. A DHCP server provides configuration parameters

corresponding to the DHCP client requests. These parameters are required when a client

host attempts to connect to the Internet. DHCP is also a mechanism for allocating IP

addresses to hosts.

dynamic routing Routing mode in which a router talks to an adjacent router, informing each other of what

networks each router is currently running on.

AC6605 Access Controller 

Glossary 5 D

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

20

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 27/78

dynamic service data Core data that guarantees the normal running of a system. The data can be either 

generated from the database during system initialization after the system is restarted, or 

generated through the related configuration command. The data can be modified only

during system initialization after the system is restarted, during the configuration

operation, or during system smoothing. The data may change during the systemoperation, but the change does not occur frequently. The common change is typically

caused by the system status change such as board failure and connection status change.

AC6605 Access Controller 

Glossary 5 D

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

21

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 28/78

6 E

EC See echo cancellationecho cancellation An operation in which an echo canceler is configured in a communications network to

minimize or eliminate echoes.

echo canceler A voice-operating device connected on the four wire side of a circuit. It is used for 

reducing near-end echo present on the send path.

echo suppression An operation in which signal reflection is suppressed.

EDCA See enhanced distributed channel access

edge port A port located on the edge of a domain. It is directly connected to terminals.

EFM Ethernet in the first mile.

E-LABEL See electronic label

electric echo An echo consists of reflected signals caused by the cancelled-end impedance mismatch,

for example a 2-wire/4-wire conversion unit.

electric supervisory

channel

A technology that realizes the communication among all nodes and transmits monitoring

data on the optical transmission network. The monitoring data of ESC is included in data

communication channel (DCC) service overhead and is transmitted together with service

signals.

electromagnetic

compatibility

A condition when telecommunications equipment works properly without suffering

degradation from unintentional electromagnetic interference or from other equipment in

the same environment.

electromagnetic

interference

Any electromagnetic disturbance that interrupts, obstructs, or degrades the performanceof electronic or electrical equipment.

electronic label A label that stores codes for identifying objects in electronic data format.

electrostatic discharge Sudden and momentary electric current that flows between two objects at different

electrical potentials caused by direct contact or induced by an electrostatic field.

EMC See electromagnetic compatibility

EMI See electromagnetic interference

EMU See environment monitoring unit

AC6605 Access Controller 

Glossary 6 E

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

22

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 29/78

enhanced distributed

channel access

A channel preemption mechanism defined by Wi-Fi multimedia (WMM). It is a

 prioritized carrier sense multiple access with collision avoidance (CSMA/CA)

mechanism used by quality of service (QoS) stations (STAs) in a basic service set (BSS).

This mechanism is also used by the QoS access point (AP) and operates concurrently

with hybrid coordination function (HCF) controlled channel access (HCCA).environment

monitoring unit

A type of power and environment monitoring unit. The EMU monitors environment

variables, such as the power supply and temperature. With external signals input through

the relay, alarms such as fire alarms, smoke alarms, and burglar alarms can be monitored.

Environment changes can be monitored timely and accurately because they are displayed

on the network management system (NMS).

EPON See Ethernet passive optical network 

error An exception that causes function failures.

error packet A data packet that cannot be parsed.

ES See echo suppression

ESD See electrostatic discharge

ESD gloves Gloves used to prevent the electrostatic discharge (ESD) from damaging a board or other 

electrostatic sensitive devices (ESSDs) when you are inserting or removing a board or 

holding an ESSD.

ESS See extended service set

Ethernet EFM OAM An important part of Ethernet OAM. Ethernet EFM OAM provides a mechanism for 

monitoring links, such as remote default indication (RDI) and remote loopback control.

It serves as a complement to higher layer applications.

Ethernet in the First

Mile OAM

An Ethernet link OAM technology. The EFM OAM defined in IEEE 802.3ah provides

functions including link connectivity detection, link failure monitoring, remote failurenotification, and remote loopback for the link between directly connected devices.

Ethernet passive

optical network 

A passive optical network based on Ethernet. It is a new generation broadband access

technology that uses a point-to-multipoint structure and passive fiber transmission.

Currently, it supports upstream/downstream symmetrical rate of 1.25 Gbit/s and a reach

distance of 20 km. In the downstream direction, the bandwidth is shared based on

encrypted broadcast transmission for different users. In the upstream direction, the

 bandwidth is shared with the Time Division Multiplexer (TDM).

ETSI An independent, non-profit, standardardization organization in the telecommunications

industry (equipment makers and network operators) in Europe, with worldwide

 projection. ETSI has been successful in standardizing the Low Power Radio, Short Range

Device, GSM (Global System for Mobile Communications) cell phone system and theTETRA professional mobile radio system.

Event Something occurring during the running of the system, which requires attention from

users.

event alarm An alarm caused by a predefined event, such as congestion, which occurs when a device

is running. The alarm represents an instantaneous status of the system and the status may

not be a fault. Some event alarms are generated repeatedly and regularly. An event alarm

has no corresponding clear alarm.

AC6605 Access Controller 

Glossary 6 E

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

23

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 30/78

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 31/78

7 F

fan tray A tray that contains eight fans and is installed at the top of a subrack. It helps boards todissipate heat by pumping air from bottom to top.

Fast Ethernet A network that supports transmission rate of 100 Mbit/s. The Fast Ethernet is 10 times

faster than 10Base-T, and inherits 10BASE-T features such as frame format, MAC

addressing mechanism, and maximum transmission unit (MTU). The Fast Ethernet is an

extension base on the IEEE802.3 standards, and it uses the following transmission media:

100BASE-T4 (4 pairs of telephone twisted-pair cables), 100BASE-TX (2 pairs of data

twisted-pair cables), and 100BASE-FX (2-core optical fibers). As defined in the IEEE,

100 in the preceding media indicates the transmission rate.

fast failure detection

(FFD) packet

A path failure detection method independent from connectivity verification (CV)

 packets. Different from a CV packet, the frequency for generating FFD packets can be

configured to satisfy service requirements. By default, the frequency is 20 packets per second. An FFD packet contains the same information as that in a CV packet. The

destination end label switching router (LSR) processes FFD packets and CV packets in

the same way.

fat AP An AP that works independently. It can configure and manage itself without the help of 

an AC.

fault alarm A type of alarm caused by hardware or software failures such as board failure, or by the

exception that occurs in major functions. After the fault is rectified, the NE reports a

clear alarm. Fault alarms are of higher severity than event alarms.

FDDI See fiber distributed data interface

FDI packet A packet that responds to detected failure events. It is used to suppress alarms on theupper layer network where failure has occurred.

FE See fast Ethernet

FEC See forward error correction

fiber distributed data

interface

A 100 Mbit/s optical standard for data transmission based on the token ring network.

fiber patch cord A type of fiber for connections between a subrack and an optical distribution frame

(ODF), between subracks, or inside a subrack.

fiber to the building A fiber-based networking scenario in which the optical fiber extends from the Internet

service providers to multi-dwelling units (MDUs) and business buildings.

AC6605 Access Controller 

Glossary 7 F

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

25

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 32/78

fiber to the curb A fiber-based networking scenario in which the optical fiber extends from the Internet

service providers to curbs of subscribers' locations.

fiber to the home A fiber-based networking scenario in which the optical fiber extends from the Internet

service providers to the subscriber's living or working space. FTTH features high

 bandwidth, makes the network transparent to data formats, rates, wavelength, and protocols, eases environment and power supply requirements, and simplifies

maintenance and installation.

file transfer An operation of downloading files from or uploading files to a remote computer using

the File Transfer Protocol (FTP).

filler panel A piece of board that covers vacant slots in order to keep the frame away from dirt, ensure

 proper air circulation throughout the interior of the frame, and make the overall

appearance look sharp.

firewall A combination of a series of components set between different networks or network 

security domains. By monitoring, limiting, and changing data traffic across the firewall,

the firewall masks the interior information, structure and running status of the network as much as possible to protect network security.

fit AP An AP that is configured and managed by and works under an AC. An AC manages fit

APs by using the Control and Provisioning of Wireless Access Points (CAPWAP)

 protocol. Certain real-time frame exchange operations and MAC address management

are implemented on the fit AP, while the authentication, security management, and

mobile functions are implemented on the AC.

flash memory A type of special electrically erasable programmable read-only memory (EEPROM). It

can be erased and rewritten in blocks at a time instead of only one byte once.

flat-head screwdriver A screwdriver used to fasten small screws and bolts. The flat-head screwdriver has a

line-shaped head and provides a small moment of fastening force.

forced ventilation

system

A system that controls or influences climate by introducing outdoor air into the room or 

expelling air out of the room.

forward error

correction

A bit error correction technology that adds correction information to the payload at the

transmit end. Based on the correction information, the bit errors generated during

transmission are corrected at the receive end.

front panel A panel allocated to the vertical mounting area of racks and cabinets for protection.

FTTB See fiber to the building

FTTC See fiber to the curb

FTTH See fiber to the home

full duplex A system that can transmit information in both directions on a communication link. On

the communication link, both parties can send and receive data simultaneously.

AC6605 Access Controller 

Glossary 7 F

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

26

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 33/78

8 G

G.SHDSL See single-pair high-speed digital subscriber lineGE Gigabit Ethernet. Based on the IEEE 802.3 Ethernet standards, the GE transmission rate

is 1 Gbit/s.

GEM GPON encapsulation mode.

gigabit-capable passive

optical network 

A one-to-many broadband optical transmission system that is defined in the ITU-T G.

984.x recommendations. GPON can transport any type of data in asynchronous transfer 

mode (ATM) or GPON encapsulated mode (GEM). The downstream rate is 1.2 Gbit/s

or 2.4 Gbit/s and the upstream rate is 155 Mbit/s, 622 Mbit/s, 1.2 Gbit/s, and 2.4 Gbit/s.

GND Ground. It is a reference point serving as an adequate zero-voltage in an electrical circuit

from which other voltages are measured.

GR  Graceful restart. In IETF, protocols related to Internet Protocol/Multiprotocol LabelSwitching (IP/MPLS) such as Open Shortest Path First (OSPF), Intermediate System-

Intermediate System (IS-IS), Border Gateway Protocol (BGP), Label Distribution

Protocol (LDP), and Resource Reservation Protocol (RSVP) are extended to ensure

continuous forwarding when the system is restarted. This reduces the flapping of 

 protocols at the control layer when the system performs an active/standby switchover.

This series of standards is called graceful restart.

graceful restart A series of standards defined by IETF, indicating that protocols related to Internet

Protocol/Multiprotocol Label Switching (IP/MPLS) such as Open Shortest Path First

(OSPF), Intermediate System-Intermediate System (IS-IS), Border Gateway Protocol

(BGP), Label Distribution Protocol (LDP), and Resource Reservation Protocol (RSVP)

are extended to ensure continuous forwarding when the system is restarted. This reducesthe protocol flapping at the control layer when the system performs an active/standby

switchover.

granularity The degree of modularization. If a system has a larger granularity, there are more granules

in the system for users to choose and customize the system more flexibly.

graphical user interface A visual computer environment that displays programs, files, and options with graphical

images, such as icons, menus, and dialog boxes, on the screen.

ground resistance One of the important parameters in the surge protection design of electric power systems.

The ground resistance of electrode decreases as large current is injected to the electrode

 by electric discharges in soil.

AC6605 Access Controller 

Glossary 8 G

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

27

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 34/78

ground resistance

tester

A tester for measuring the ground resistance and ground voltage of various ground

devices.

guide rail A component installed in a cabinet or shelf, on which shelves and chassis may slide.

GUI See graphical user interface

AC6605 Access Controller 

Glossary 8 G

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

28

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 35/78

9 H

hairpin connection A service connection mode. In this mode, internal calls in the same media gateway (MG)under the control of the media gateway controller (MGC) adopt the timeslot connection

and do not occupy the digital signal processor (DSP) resource, and no voice stream goes

outside the MG. The hairpin connection improves the voice quality and reduces service

delay.

half-duplex A transmission mode in which data can be transmitted in both directions on a signal

carrier, but not simultaneously.

handle A component on the panel. It is used to insert or remove boards and in and out of slots.

HDP See Huawei Discover Protocol

health check  A service that monitors the running status of the network management system (NMS),

ensuring that the NMS works properly.heartbeat connection

status

A detection mechanism in which a local soft switch determines the working status of the

 peer soft switch. Heartbeat signals are transmitted between two mutually assistant soft

switches. The heartbeat connection status shows whether the heartbeat connection

 between two soft switches is normal.

hello packet A common packet that is periodically sent by a router to its neighbors. It contains

information about timers, designated routers (DRs), backup designated routers (BDRs),

and known neighbors.

hierarchical quality of 

service

A QoS technology that controls user traffic and schedules user services based on their 

 priorities. HQoS provides an advanced traffic statistics function which enables

administrators to monitor the bandwidth usage of each service and allocate the bandwidth

 properly through traffic analysis.

historical alarm A confirmed alarm that is saved in the memory or other external memories.

hops Simplest routing metric in which each link has a metric of 1. This function counts the

number of times a packet must be forwarded.

host name A domain name of a functional entity, which functions as a route during communication.

It is planned by carriers.

hot standby A security mechanism. The environment variables and storage information of each

running device are synchronized to a standby device. When faults occur on a running

device, services are switched to the standby device automatically or manually, ensuring

the normal running of the entire system.

AC6605 Access Controller 

Glossary 9 H

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

29

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 36/78

hot swap A technology for replacing faulty system components such as hard disks, power supply

modules, and boards without shutting down and powering off the system, which

improves the system disaster recovery capability, scalability, reliability, and

maintainability.

Hotline phone A point-to-point communication link in which a call is automatically directed to the preselected destination after the end instrument goes off-hook.

HQoS See Hierachical Quality of Service

HTP See Huawei Topology Protocol

Huawei Discover

Protocol

A protocol for obtaining the information about an adjacent device, such as the device

type, hardware and software version, interconnected port, device ID, address

information, device capacity, and hardware platform. It provides basic information for 

collecting the cluster topology structure.

Huawei Terminal

Access Controller

Access Control System

A security protocol with enhanced functions based on TACACS (RFC 1492). Similar to

the RADIUS protocol, HWTACACS implements multiple subscriber AAA functions

through communications with the HWTACACS server in client/server mode.

Huawei Topology

Protocol

A protocol for collecting the network topology information within a certain network 

segment. It provides the information about the device that can be added to the cluster.

hub An inexpensive networking device with ports for connecting multiple computers or hubs

and forming a star topology. Each port of the hub uses a fixed bandwidth, which may

cause network collisions. Therefore, the data transmission rate and efficiency are

restricted by the number of users.

HWTACACS See Huawei Terminal Access Controller Access Control System.

HWTACACS

accounting

An accounting mode in which a BRAS sends accounting packets to the HWTACACS

server which then performs accounting on users.

HWTACACS

authentication

An authentication mode in which a BRAS sends the user name and password to the

HWTACACS server using the HWTACACS protocol. The HWTACACS server 

authenticates the user and returns results to the BRAS.

hygrothermograph A portable instrument designed for furnishing an accurate, continuous record of relative

humidity and temperature.

AC6605 Access Controller 

Glossary 9 H

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

30

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 37/78

10 I

IAS See integrated access softwareIBSS See independent basic service set

ICMP See Internet Control Message Protocol

ICMP attack  Attacks against the ICMP protocol.

IEC See International Electrotechnical Commission

IEEE See Institute of Electrical and Electronics Engineers

IGMP See Internet Group Management Protocol

IGMP snooping A multicast control mechanism running on the data link layer. This protocol manages

and controls multicast groups, and effectively restrains the flooding of multicast data on

Layer 2 devices.

IGMP snooping A multicast control mechanism running on a Layer 2 device. This protocol manages and

controls multicast groups by listening to and analyzing Internet Group Management

Protocol (IGMP) packets between hosts and Layer 3 devices. In this manner, the

multicast data on Layer 2 network can be prevented from spreading.

iManager N2000 A network management system researched and developed by Huawei. It manages the

fixed network devices, including broadband access devices and integrated access

devices.

inband network 

management

A network management mode in which the network management and upstream services

use the same channel.

inband networking A networking mode that uses the service channel provided by the managed device tomanage network devices. In this mode, network management information is transmitted

through the service channel of the device.

incremental SPF A type of route calculation that calculates only changed routes rather than all routes every

time.

independent basic

service set

A basis service set (BSS) network that works independently, and on which no access to

a distribution system (DS) is available.

Institute of Electrical

and Electronics

Engineers

An association of engineering and electronics professionals based in the United States

 but boasting membership from numerous other countries. The IEEE is dedicated to

electrical, electronics, communication, computer engineering, and science-related fields.

AC6605 Access Controller 

Glossary 10 I

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

31

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 38/78

integrated access

software

Software used to approach, view, instruct, communicate with, store data in, and obtain

data from computers or information resources.

integrated services

digital network 

A digital communication network that integrates the digital network and data

communication network. It enables users to transmit voice, data, files, images, music,

and video through telephone cables.

intermediate system A node that can forward packets in the OSI network.

intermittent alarm A type of alarms whose clear alarms are reported at an interval of shorter than or equal

to the specified time.

International

Electrotechnical

Commission

A non-profit and non-governmental international standard organization that prepares and

 publishes international standards for all electrical, electronic and related technologies.

IEC was established in 1906 and so far has recommended more than 6000 international

standards.

International

Telecommunication

Union

A specialized agency of the United Nations, which is headquartered in Geneva. ITU is

responsible for recommending standards for telecommunication (ITU-T) and radio

networks (ITU-R).

Internet Control

Message Protocol

One of the core protocols in the Internet Protocol Suite. It is defined by IETE RFC 2463

and detects IP packet errors and diagnoses and sends packets.

Internet Group

Management Protocol

One of the TCP/IP protocols for managing the membership of IP multicast group

members. IGMP sets up and maintains membership between IP hosts and directly

connected multicast routers.

inter-working function A mechanism for transforming asynchronous transfer mode (ATM) packets to Ethernet

frames through QinQ mapping. Virtual path identifiers (VPIs) are mapped to outer 

VLAN tags and virtual channel identifiers (VCIs) are mapped to inner VLAN tags In

this way, the ATM packets can be transmitted on Ethernet links which are connected to

ATM links in bridged RFC 1483 mode.

inverse multiplexing

for ATM

A technology that flexibly multiplexes multiple low-rate links. The IMA branches an

ATM integrated cell flow onto multiple low-rate links, multiplexes the multiple low-rate

links at the remote end, and restores the data to the integrated cell flow.

IP address A numerical label that uniquely identifies the address of a communication port in the

TCP/IP protocol. An IP address consists of four octets.

IP attack  An attack that occurs when a malicious user sends an IP packet with the same destination

IP address as that of the digital subscriber line access multiplexer (DSLAM) system.

IP precedence First three bits in the type of service (ToS) field in IP packets. It indicates the packet

 priority and serves as a basis for traffic classification in quality of service (QoS).

IP spoofing attack  An attack that occurs when a malicious user sends an attack packet with a forged source

IP address to the system.

IPv4 Internet Protocol Version 4. IPv4 assigns 32-bit addresses to hosts, with each address

 belonging to one of the five classes (A, B, C, D, or E). Each IPv4 address consists of a

network number, an optional subnet number, and a host number. The network and subnet

numbers together are used for routing, and the host number is used to address an

individual host within the network or subnet.

IPv6 Internet Protocol Version 6. IPv6 is designed to succeed IPv4. IPv6 contains a traffic

identifier in the packet header which identifies traffic flows, ensuring quality of service

(QoS).

IS See intermediate system

AC6605 Access Controller 

Glossary 10 I

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

32

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 39/78

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 40/78

11 J

 jitter Variation of the time taken for packets to be delivered to an endpoint or network entity.

AC6605 Access Controller 

Glossary 11 J

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

34

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 41/78

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 42/78

Link Aggregation

Control Protocol

A protocol that provides a method to control the bundling of several physical ports

together to form a link aggregation group. After a link aggregation group is formed,

LACP maintains the link status in real time. When LACP detects a link fault in the receive

or transmit direction, it automatically adjusts member links in the aggregation group.

link aggregation group A group formed by aggregating one or more Ethernet links together so that a MAC clientconsiders the link aggregation group as a single link.

link state

acknowledgment

packet

A packet for acknowledging received LSU packets. The headers of LSA packets are

acknowledged.

link state request (LSR)

packet

Packets transmitted for required LSAs. By exchanging DD packets, two routers know

which LSAs of the peer router are unavailable in the local LSDBs and send LSR packets

to the peer router. The LSR packets carry brief information about the required LSAs.

link state update (LSU)

packet

A packet for transmitting required LSAs to the peer router. The LSU packet carries one

or more LSAs.

load balancing A method for allocating users to different APs in a group based on the number of users

and the traffic volume. A threshold is set on the AC. When the number of users exceeds

the threshold, load balancing starts to function.

load sharing A device running mode. Two or more hardware units can share system load based on

their processing capabilities when they are operating properly. When a hardware unit

fails, the other units take over the tasks of the faulty unit on the condition that the system

 performance, such as few call loss, is guaranteed.

local area network  A network that connects personal computers and workstations in a limited geographical

area such as a building or within a range of several miles. A LAN features high

transmission rate and low error rate. Ethernet, fiber distributed data interface (FDDI),

and token ring network are three main technologies that can be implemented on a LAN.

Today, LANs are set up based on the switch-Ethernet or Wi-Fi technology, and support

a transmission rate of 1 Gbit/s.

local authentication An authentication mode in which user information (such as the user name, password,

and other attributes) is configured on the BRAS where the user is authenticated. Local

authentication features fast processing and low operation cost, but the amount of 

information that can be authenticated is limited due to the hardware capacity of the

device.

local loopback  An internal loopback that is performed from the port processing module of the board to

the backplane. The signal from the backplane to the port directly returns to the backplane.

Usually, it is performed to check the internal processing module of the board.

local service A type of non-home services provided by the current network. The same services can be provided as a local service for inbound roamers and as a home service for the subscribers

on this network.

lock status Status in which services are not switched to the protection board or channel when a fault

occurs if no switching has occurred. If a switching has occurred, services are not switched

 back to the working board or channel after the working board or channel recovers.

logical reach The maximum distance that a specified transmission system can reach. It depends on the

structure of a signaling frame, split ratio, and transmission method, regardless of the

optical budget.

AC6605 Access Controller 

Glossary 12 L

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

36

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 43/78

loopback  A troubleshooting technique that returns a received signal to its source so that the signal

can be analyzed for errors. Loopbacks are classified into internal loopbacks and external

loopbacks.

LSAck packet See link state acknowledgment packet

LSDB Link state database.

LSP See label switched path

LSR  Label switching router.

LWAPP Lightweight Access Point Protocol.

AC6605 Access Controller 

Glossary 12 L

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

37

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 44/78

13 M

MAC See media access controlMAC address A link layer address or physical address. It is six bytes long.

MAC address aging A function that deletes MAC address entries of a device when no packet is received from

the device within a specified period of time. The MAC address aging function is only

applicable to the dynamic MAC address entries.

MAC address

authentication

An authentication method that controls network access permissions of a user based on

the access interface and MAC address of the user. A group of permitted MAC addresses

are maintained manually to filter the MAC addresses of STAs. The efficiency of this

method decreases as the number of STAs increases. Therefore, MAC address

authentication is applicable to scenarios where high security is not required, such as

homes and the small offices.

MAC address learning A function that adds the source MAC address and inbound interface of a packet to the

MAC address table when the source MAC address of the received packet cannot be found

in the MAC address table.

MAC spoofing An attack to the system carried out by malicious users who send packets with bogus

MAC addresses. If a user's MAC address is forged, services of the user are affected. If 

a system's MAC address is forged or a large number of packets with bogus MAC

addresses are sent to the system, the system may fail to work properly or even crash.

main control board A board that controls and manages other boards in a system and sends services to the

devices on the upper layer.

maintenance point A point that can be either a maintenance end point (MEP) or a maintenance intermediate

 point (MIP).

major alarm An alarm that indicates a service-affecting problem with the resource. The problem is

relatively severe, which may affect normal use of the resource.

management

information base

A virtual database for managing the entities in a communications network.

management right Rights that specify devices and boards that a user can manage, or domains that a user 

group can manage.

marking-off plate A rectangular paper plate with four holes. It is used for locating a cabinet.

AC6605 Access Controller 

Glossary 13 M

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

38

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 45/78

maximum bandwidth The upper threshold of bandwidth that the gigabit-capable passive optical network 

(GPON) assigns a transmission container (T-CONT). It is also the total upper thresholds

of the guaranteed bandwidth and additional bandwidth.

MCR  See minimum cell rate

MCU See multipoint control unit

MD Maintenance domain. A network or a part of a network whose connectivity is managed

 by connectivity fault management (CFM). Devices in an MD are managed by a single

Internet Service Provider (ISP) or a carrier.

MDF Main distribution frame.

MDI See medium-dependent interface

mean signal transfer

delay

The average of the upstream and downstream delay values between reference points.

This value is determined by measuring round-trip delay and then being divided by 2.

measurement object A physical or logical entity or a combination of various entities to be measured, such as

a board, module, signaling link, or port.

media access control A protocol at the media access control sublayer. The protocol is at the lower part of the

data link layer in the OSI model and mainly controls and connects the physical media at

the physical layer. When transmitting data, the MAC protocol checks the permissions

for transmission. If the data can be transmitted, certain control information is added to

the data, and the data and the control information are transmitted in a specified format

to the physical layer. Upon receiving data, the MAC protocol checks whether the

information is transmitted correctly. If so, the control information is removed from the

data and the data is transmitted to the logical link control (LLC) layer.

media gateway A core network device that converts the media format of a network to the required format

of another network. It can process audio, video, and data services, and convert the media

format in full duplex mode. It can also play certain audio and video signals and provide

the interactive voice response (IVR) function and media conference.

media gateway

controller

A group of logical entities that provides call control, connection, and services of the

integrated service. The MGC is located at the network control layer of the IP Multimedia

System (IMS) architecture, providing call control and connection control, and

implementing interconnection and conversion between signaling protocols.

medium dependent

interface

An electrical and mechanical interface for transmission between the device and the

media.

MGC See media gateway controller

MGC See media gateway controller

MGW/MG See media gateway

MIB See management information base

minimum cell rate A parameter defined by the Asynchronous Transfer Mode (ATM) forum, which manages

ATM traffic. It specifies the minimum value of available bit rate.

minor alarm A problem of low severity that does not affect usage of resources.

mirror An operation to store a copy of a file to another archive site to relieve loads on the original

site, or to provide an archive site closer to users geographically.

AC6605 Access Controller 

Glossary 13 M

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

39

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 46/78

modem A device or program that enables a computer to transmit data over a telephone line or 

cable line. Computer information is stored digitally, whereas information is transmitted

over telephone lines in analog waves. A modem converts between digital signals and

analog signals.

MoIP Modem over IP. A function implemented after a modem is connected to the POTSterminal. MoIP is a mode in which services are transmitted between IP networks or 

 between an IP network and a public switched telephone network (PSTN).

MP See maintenance point

MPLS See Multiprotocol Label Switching

MSTI See multiple spanning tree instance

MSTP See Multiple Spanning Tree Protocol

multicast A process for transmitting packets from a source to multiple destinations at the same

time. The destination IP address used by a multicast packet is a Class D IP address which

ranges from 224.0.0.0 to 239.255.255.255. A multicast IP address represents a multicastgroup instead of a host.

multicast group A group of members who participate in multicast services. A group of members are

defined by the multicast group implicitly or explicitly by a rule (or a set of rules). This

rule can associate members with the purpose of participating in a call, or associate

members who do not participate in data transfer but participate in management, security,

control, and accounting for the multicast group.

multicast preview A function that allows users to view the scenes of a multicast program beforehand.

multicast server A logical entity that provides multicast packet services for members.

multicast source A source host that sends multicast packets.

multi-hop A login mode in which users log in to a target device through one or more intermediate

devices.

multimeter An electronic measuring instrument for testing cabinet insulation, cable connectivity,

and device electrical performances including voltage, current, and resistance.

multi-mode optical

fiber

A type of optical fiber that enables different light beams to transmit over the same fiber.

The core diameter of a multi-mode optical fiber is 50 um to 100 um. Therefore, the cheap

coupler or switch can be used on the multi-mode optical fiber.

multiple spanning tree

instance

A type of spanning tree calculated by MSTP within an MST region. This spanning tree

 provides a simply and fully connected active topology for frames belonging to a VLAN.

A VLAN cannot be assigned to multiple MSTIs.

Multiple Spanning

Tree Protocol

A protocol that enables one MST region to run multiple MSTIs.

multipoint control unit An entity that establishes and coordinates multiuser sessions, such as voice, video, and

data services.

Multiprotocol Label

Switching

A technology that uses short tags of fixed length to encapsulate packets at different link 

layers, and provides connection-oriented switching for the network layer based on IP

routing and control protocols. It improves cost effectiveness and expandability of 

networks, and is beneficial to routing.

AC6605 Access Controller 

Glossary 13 M

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

40

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 47/78

MUX VLAN A special VLAN that contains one service port and multiple uplink ports. The service

flows in different MUX VLANs are isolated from each other. There is a mapping from

a MUX VLAN to an access user. Therefore, access users can be identified based on the

MUX VLAN.

MWI Message waiting indication. As a common function in telephone networks, it involvesan audible or visible indication that voicemail messages are waiting, such as playing a

special dial tone.

AC6605 Access Controller 

Glossary 13 M

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

41

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 48/78

14 N

navigation tree A function that searches for and locates a topic. The navigation tree is designed basedon the operators' habits of performing routine operations and maintenance. You can

search for and locate a required topic by using the Contents tab on the navigation tree.

NBI See northbound interface.

NE See network element

network diameter A path with the maximum number of network bridges that communication passes

through between two computers in the switched network. It is represented by the number 

of network bridges and can be configured based on the actual network.

network element An architectural concept describing telecommunications equipment or components that

 perform network element functions (NEFs), such as RNC and NodeB.

network interface card A circuit board or card that is installed on a computer, connecting the computer to anetwork.

network management

layer

A logical layer that monitors and controls network devices within the management area

in the layered management architecture of the telecom NMS.

Network Management

System

A system in charge of the operation, administration, and maintenance of a network.

network segment Any discrete part of a network.

Network Time Protocol A protocol at the application layer for synchronizing the clocks of the distributional time

server and computer systems on packet-switched, variable-latency data networks based

on IP and UDP. NTP originates from Time Protocol and ICMP timestamp message and

enhances accuracy and robustness.

network unit layer A logical layer that implements the configuration, troubleshooting and performance

monitoring for a single network element in the layered management architecture of a

telecom network management system (NMS).

NIC See network interface card

NML See network management layer

NMS See network management system

node A managed device on a network. For a device with only one shelf, one node represents

one device. For a device with multiple shelves, one node represents one shelf of the

device.

AC6605 Access Controller 

Glossary 14 N

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

42

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 49/78

Non-Status Reporting

DBA

A technique that invokes bandwidth assignment which does not need reports from the

optical network unit (ONU). However, it provides dynamic assignment by using traffic

monitoring by optical line terminal (OLT) itself.

normal switchover A switchover carried out in the case of sufficient data synchronization on the active and

standby main boards. It ensures the continuity of station (STA) services.

northbound interface An interface that connects a device to the network management system (NMS) to

implement service provisioning and report alarms and performance statistics.

NSR-DBA See non-status reporting DBA

NTP See Network Time Protocol

AC6605 Access Controller 

Glossary 14 N

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

43

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 50/78

15 O

OAN See optical access network object Data and its self-contained processing module. Objects are the software building blocks

of object technologies.

ODF See optical distribution frame

ODN See optical distribution network 

ONT See optical network terminal

open system

authentication

A default authentication mechanism in a WLAN, and also the simplest authentication

algorithm because it means no authentication. If the authentication mode is set to OPEN-

SYS, any station (STA) that requests authentication can be authenticated. OPEN-SYS

authentication involves two stages: sending an authentication request and returning the

authentication result.

OPEN-SYS See open system authentication

operation log A list of information about operation events.

operation rights Operation rights specify operations that a user can perform. The operation rights aim at

the security objects. If a user has no right to manage a device, the user cannot operate

the device. The network management system (NMS) controls the rights by making menus

unavailable.

optical access network  A network that consists of a series of links that share the same network-side interfaces

and is supported by the optical access system. The OAN includes multiple ODNs which

are connected to an OLT.

optical attenuator A device for reducing the power level of an optical signal. The basic types of optical

attenuators are fixed and variable.

optical distribution

frame

A frame that transfers and spools fibers.

optical distribution

network 

A network system consisting of an optical line terminal (OLT), multiple optical network 

units (ONUs), two optical networks (one of which connects the OLT with the multiple

ONUs), and a bandwidth controller. The bandwidth controller divides ONUs between

the two optical networks, assigns a predetermined transmission bandwidth to each ONU,

and responds to the bandwidth change.

AC6605 Access Controller 

Glossary 15 O

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

44

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 51/78

optical fiber A flexible and transparent fiber that is made from glass or other transparent materials. It

serves as a waveguide or "light pipe" for transmitting light between fiber ends.

optical network 

terminal

A type of network device that is connected to a local device and provides direct or remote

user-side interfaces to the optical access network.

optical power budget Allocation of available optical power in a fiber-optic communication link.

optical power meter A device for measuring power in an optical signal.

outband network 

management

A network management mode in which the network management and upstream services

use different channels.

outband networking A networking mode that uses the channel provided by the other devices but not the

managed devices to transmit network management information to manage network 

devices. Compared with inband networking, outbound networking provides a more

reliable device management channel to locate and monitor network devices in real time

if the managed device fails.

overhead byte Information that is added to a user's transmitted data for the purpose of control, such asrouting, error check, and synchronization information.

overload A state in which requested resources exceed the maximum resources provided by the

system.

oversized packet A packet of more than 1600 bytes.

AC6605 Access Controller 

Glossary 15 O

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

45

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 52/78

16 P

packaging type Packaging types are designed for applications that require a permanent, indented,embossed, or debossed mark on chipboard, metal, plastics or other packaging materials.

packet A logical grouping of messages, which includes a header with control information and

user data. Packets are usually data units at the network layer.

packet filtering A process of transmitting or blocking packets on a network interface based on source

and destination addresses, ports, or protocols of the packets. It works with packet

 processing and network address resolution. As part of the firewall software, it is used to

 prevent malicious attacks.

packet loss Discarding of data packets on a network when a device is overloaded and cannot accept

any incoming data at the specified moment.

packet loss ratio Ratio of all lost packets to all transmitted packets in a test.packet mode bearer

service

A service that allows point-to-point (P2P) users to use the X.25 encoding scheme

(recommended by ITU-T) for communication through ISDN.

partial route

calculation

A type of route calculation that is similar to Incremental Shortest Path First (I-SPF). Only

the changed routes are calculated. Instead of calculating the node path, PRC updates the

leaf routes based on the SPT calculated by I-SPF.

Passive Test A non-intrusive test. It does not intrude but monitors actual services on the network, and

obtains the test data by analyzing service streams.

AC6605 Access Controller 

Glossary 16 P

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

46

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 53/78

patch A piece of software designed to fix problems, or update a computer program or its

supporting data. A patch is composed of one or more changes. After a patch is loaded,

some original programs are affected. The realization of the patch technology depends

on the patch facture tool first. The patch file is generated based on the target codes created

 by the compilation of source codes modified by functions. The patch module operatesthe patch file and manages the patch. Patches have two kinds, hot patches and cold

 patches. The difference between the hot patches and the cold patches are that the cold

 patches must load whole software programs. Hot patches can be installed independently

and do not need to install all the system again. Cold patches, however, need to install the

software of boards again. The upgrade procedure for the cold patches is identical to some

software upgrade procedures. The two patches are described as follows: Hot patches:

Hot patches are added to the existing version. The hot patches are independent of the

server, Install program, or file copying. The hot patches are software program entities

that are installed and uninstalled independently. Cold patches: For some errors that are

difficult to modify through the hot patches, you have to load the software of boards again.

In this situation, you can use cold patches to solve this problem.

PBO Power back off. The near-end video transmission unit (VTU) can adjust its output power 

spectrum density (PSD) to adapt to transmission requirements, and prevent the

transmission power from exceeding the threshold. In very-high-speed digital subscriber 

line 2 (VDSL2), both the upstream PBO (UPBO) and the downstream PBO (DPBO) are

supported. In VDSL, only DPBO is supported.

PBX bi-directional

interconnection service

A service for interconnecting users of two PBXs on the access network by configuring

the semi-permanent leased line services on the access network.

PCI Peripheral component interconnect. It is a standard designed for the local bus developed

 by Intel Corporation in 1991.

PCM See pulse code modulation

PDU See power distribution unit

PE See protective earth

peer group A group of functional units at the same layer in the Open Systems Interconnection (OSI)

architecture. Their functions can be applied at the same layer.

permanent virtual

circuit

A long-term data transmission service that is established between STAs. Data

transmission is established by analog calls, during which no call needs to be established

or cleared.

permanent virtual

connection

A connection that is pre-established by a network management system (NMS). PVCs

remain valid until they are released by the NMS, regardless of whether services are

transmitted or terminals are connected.PGND cable A cable for connecting a device to a protection ground bar. Usually, the PGND cable is

yellow or green.

Phase Shift Keying See PSK authentication

Phillips screwdriver A screwdriver used to fasten small screws and bolts. The Phillips screwdriver has a cross-

shaped head and provides a small moment of fastening force.

physical layer Layer 1 in the Open System Interconnection (OSI) architecture. This layer transmits bits

or groups of bits over a transmission link between open systems, which involves

electrical, mechanical, and handshaking services.

physical reach The maximum transmission distance that a specified transmission system can reach.

AC6605 Access Controller 

Glossary 16 P

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

47

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 54/78

PIM-SM See protocol independent multicast-sparse mode

PITP See Policy Information Transfer Protocol

PM See port management

PMBS See packet mode bearer service

PMK  Pair main key.

point to point A service instance applied to a P2P Provider Backbone Bridge-Traffic Engineering

(PBB-TE) tunnel. One or a range of user VLANs can be mapped to a P2P service

instance. An interface can function as a user service and be mapped to a service instance.

Point-to-Point Protocol A protocol specified in RFC 1171/1172. It provides the relay function for the LAN

 protocols (including the IP protocol) on the point-to-point link. PPP consists of two

 protocols: Link Control Protocol (LCP) on the data link layer and Network Control

Protocol (NCP) on the network layer.

Point-to-Point Protocol

over Ethernet

A network protocol that adds an Ethernet header before a standard PPP packet to connect

 bridging access equipment with remote access equipment. Many user hosts can beconnected by sharing information on the Ethernet. In PPPoE model, access control and

charging can be implemented for each user.

poison reverse A feature that RIP learns a route from a neighboring interface, sets the route metrics to

16 (unreachable), and advertises this route to neighboring routers.

Policy Information

Transfer Protocol

A protocol that transfers the relay agent information option (RAIO) in Layer 2 in point-

to-point (P2P) mode between the digital subscriber line access multiplexer (DSLAM)

and broadband remote access server (BRAS). It works in P mode or V mode. P mode is

an active mode, in which the DSLAM adds the information about the user port; V mode

is a passive mode, in which the system reports the information about the user port by

responding to the BRAS query.

polling status Status of a device. The NMS periodically checks the status and other configuration data

of the device, and displays the device status in the topology. The polling status includes

normal, unknown, offline, light fault, minor fault, major fault, and urgent fault. The

unknown status indicates that the device can be pinged but the SNMP protocol is Down.

The offline status indicates that the device cannot be pinged.

port Physical ports and logical ports. Physical ports are channels for exchanging signals

 between two physical entities or providing power, while logical ports are channels for 

exchanging information between two logical entities.

port aggregation A function that aggregates multiple ports into an aggregation group so that scattered

 bandwidth is aggregated into one link.

port management A function that defines the rules to access internal PC ports, allowing the specified PCs

to access the specified resources.

portal protocol A protocol that is developed by Huawei and enables Web servers to communicate with

other devices. The portal protocol is based on the client/server model and uses the User 

Datagram Protocol (UDP) as the transmission protocol.

POTS Plain old telephone service.

power adjustment A method for dynamically and properly assigning power based on the real-time status

of an entire wireless network. When an AP runs under an AC for the first time, the AP

uses the maximum transmit power. When getting reports from its neighbors (other APs

that are detected by the AP and managed by the same AC), the AP determines whether 

to increase or decrease its power based on the report conclusion.

AC6605 Access Controller 

Glossary 16 P

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

48

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 55/78

power distribution unit A unit that performs AC or DC power distribution.

power off  To shut down a computer or to turn off the power.

power up To start a computer; to begin a cold boot procedure; to turn on the power.

PPP See Point-to-Point Protocol

PPPoE See Point-to-Point Protocol over Ethernet

PQ See priority queuing

PRA See primary rate access

primary rate access Primary rate access. An Integrated Services Digital Network (ISDN) configuration

intended primarily for use in subscriber lines. The primary rate interface (PRI)

configuration provides one 64 kbit/s channel (D channel), twenty-three 64 kbit/s

channels (B channels) that use Tl line, or thirty 64 kbit/s channels (B channels) that use

E1 line. The B channels are used to carry services and the D channel is used to transmit

call control signaling and maintain and manage signaling.

primary node and

secondary node

Two physical nodes that function as backup for each other. They are decided during the

installation and do not change with the system switchover.

priority flag A policy for re-marking the priority for the packets in the access control list (ACL). The

marked priority can be added to a field.

priority queue An abstract data type in computer programming that supports the following three

operations: 1. Adding an element with a specific priority to the queue. 2. Removing the

element from the queue that has the highest priority, and returning it. 3. Finding out the

element with highest priority in the queue.

priority-tagged frame A tagged frame whose tag header carries priority information, but carries no VLAN

identification information.

protective earth A cable connecting devices to ground in equipotential connection mode.

protocol A group of rules for controlling the formatting and sequencing of message exchange

 between communicating systems. Protocols must be accurate on a computer network. A

 protocol is established to provide a certain type of service.

protocol independent

multicast sparse mode

A protocol for efficiently routing messages to multicast groups across wide-area (WAN

and inter-domain) networks. The PIM-SM protocol is designed to support sparse mode,

independent from any specific unicast routing protocol. It uses the IP multicast model

on the basis of receiving initialized member relationship and supports sharing and

shortest path tree (SPT). The soft state mechanism that PIM-SM adopts enables it to

adapt to the changing network environment. PIM-SM can use routing information that

is injected by a routing protocol to a multicast routing information base (RIB). Theserouting protocols include unicast protocols (such as RIP and OSPF) and multicast

 protocols (such as Distance Vector Multicast Routing Protocol).

PSD Mask  Power spectral density mask. It restricts the power spectral density of transmission

signals. It is set based on breakpoints. In very-high-speed digital subscriber line 2

(VDSL2), 32 breakpoints are in the downstream spectrum, and 16 breakpoints are in the

upstream spectrum.

pseudo wire emulation

edge-to-edge

A technology that bears Layer 2 services. It emulates the essential attributes of 

telecommunications services such as ATM, FR, Ethernet, low speed Time Division

Multiplexed (TDM) circuit, and SONET/SDH in a Packet Switched Network (PSN).

Therefore, PWE3 is a solution that combines the traditional communications network 

with the existing PSN.

AC6605 Access Controller 

Glossary 16 P

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

49

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 56/78

pseudowire A virtual connection between two provider edges (PEs) for transmitting frames. PEs

establish and maintain PWs using signaling. The two PEs at both ends of a PW maintain

the PW status.

PSK authentication An authentication mode which requires a STA and an AP to be configured with the same

 pre-shared key. If their pre-shared keys are the same, the STA is authenticated; otherwise,the STA fails to be authenticated.

PSTN See public switched telephone network 

PTK  Pair temporary key.

PTP Precision Time Protocol. It is the precision clock synchronization protocol for networked

measurement and control systems, as defined in the IEEE 1588 standard.

public switched

telephone network 

A telecommunications network (including the access system, telephone exchange, and

relay) that is established to perform telephone services for public subscribers. Sometimes

PSTN is also known as public switched telephone network (POTS).

pulse code modulation A method for encoding information in a signal by changing the amplitude of pulses.Unlike pulse amplitude modulation (PAM) in which the pulse amplitude may change

continuously, pulse code modulation limits the pulse amplitude to several preset values.

Because the signal is discrete or digital rather than analog, pulse code modulation is more

immune to noise than PAM.

PVC See permanent virtual circuit

PVC See permanent virtual connection

PW See pseudo wire

PWE3 See pseudo wire emulation edge-to-edge

AC6605 Access Controller 

Glossary 16 P

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

50

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 57/78

17 Q

QinQ A layer 2 tunneling protocol based on IEEE 802.1Q encapsulation. The QinQ protocolencapsulates a private VLAN tag in a public VLAN tag, allowing each frame to be

transmitted with two tags on the backbone network of the Internet service provider (ISP).

In this way, the customer is provided with a simple Layer 2 VPN tunnel to transparently

transmit frames of the private VLAN and services. The QinQ technology expands the

scope of the private network.

QoS See quality of service

QTag Prefix The first four octets of an Ethernet-encoded tag header. The Ethernet-encoded tag header 

is defined in IEEE P802.1Q.

quality of service Service capacity assessment of IP network packets. The core assessment object is the

capability of supporting service requirements such as delay, delay jitter, and packet loss.

Certain support technologies are required to meet these core requirements.

AC6605 Access Controller 

Glossary 17 Q

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

51

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 58/78

18 R

RADIUS See Remote Authentication Dial in User ServiceRADIUS accounting An accounting mode in which a BRAS sends the accounting packets to a RADIUS server,

and then the RADIUS server performs accounting.

RADIUS

authentication

An authentication mode in which a BRAS sends the user name and the password to a

RADIUS server using the RADIUS protocol, and the RADIUS server authenticates the

user and returns the result to the BRAS.

RAIO Relay-agent-info option. It is a security mechanism for users. When the Policy

Information Transfer Protocol (PITP) and DHCP Option 82 are enabled, a DSLAM

 provides the BRAS with user location in the VBAS response packet (PITP V-mode),

PPPoE Discovery packet (PITP P-mode), and DHCP packet (DHCP Option 82).

Rapid Ring ProtectionProtocol

An Ethernet ring-specific link layer protocol. When the Ethernet ring is complete, RRPPcan prevent broadcast storms caused by data loops. When a link on the Ethernet ring is

disconnected, RRPP can quickly recover the communication channels between nodes

on the Ethernet ring, enhancing the network reliability.

Rapid Spanning Tree

Protocol

An evolution of the Spanning Tree Protocol (STP), providing faster spanning tree

convergence after a topology change. RSTP is backward compatible with STP.

rated current Input current of devices as declared by the manufacturer.

rated frequency Supply frequency of devices as declared by the manufacturer.

rated frequency range A supply frequency range as declared by the manufacturer, including lower and upper 

rated frequencies.

rated voltage Primary power voltage as declared by the manufacturer.

rated voltage range A supply voltage range as declared by the manufacturer, including lower and upper rated

voltages.

receiver sensitivity A minimum value of average receive power at point R when the 1 x 10-10 bit error rate

(BER) is reached.

relative humidity A ratio of the amount of water vapor in the air at a specific temperature to the maximum

amount that the air could hold at that temperature, expressed as a percentage.

relay address pool An address pool that provides IP addresses for users on the network side who request IP

addresses using the relay agent. Broadband remote access server (BRAS) allocates,

renews the lease of, and retrieves the IP addresses in the address pool.

AC6605 Access Controller 

Glossary 18 R  

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

52

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 59/78

reliability Likelihood of a computer system or device continuing to function over a given period

of time and under specified conditions

remote address pool A mapping of the remote Dynamic Host Configuration Protocol (DHCP) or Boot

Protocol (BOOTP) server, which does not provide real IP addresses. When a remote

address pool is used, a BRAS can send requests of users or intermediate users to theDHCP/BOOTP server for application, lease renewal, or release of the address.

remote alarm

notification

A function with which remote maintenance personnel are informed of alarms through

Emails or short messages.

Remote Authentication

Dial-In User Service

A security service that authenticates and authorizes dial-up users. If the user name and

 password are correct, the RADIUS server grants users permissions, provides

corresponding services for the user, and charges the user.

remote loopback  A function in which upon receiving non-EFM OAMPDUs from a local interface, a

remote interface loops back the non-EFM OAMPDUs to the local interface rather than

forward the non-EFM OAMPDUs based on their destination MAC addresses. Remote

loopback can be used for locating link faults and testing link quality.

repeated events Same events that are reported continuously by an NE within a period.

replication status Direction and status of replication between two nodes.

RFI Radio frequency interference. The very-high-speed digital subscriber line 2 (VDSL2)

technology uses a broad frequency range which can reach 30 MHz. The entire spectrum

covers the spectrum for middle- and short-wave broadcast, and the amateur radio.

Therefore, the VDSL2 technology must solve the RFI problem.

RIP See Routing Information Protocol

root bridge A type of bridge that is located on the network to provide the shortest path to other links.

Different from other bridges, the root bridge forwards frames over all of its ports.

round trip delay Length of time it takes for a signal to be sent plus the length of time it takes for that signal

to be received. RTD indicates the network transmission quality.

route The path that network traffic takes from its source to its destination.

router A device on the network layer that selects routes in the network. Upon receiving a packet,

a router selects a preferred path in a network to send the packet to the next router based

on the packet's destination address. The last router is responsible for sending the packet

to the destination host. It is used to connect local networks, wide area networks (WANs),

or the local network and the Internet.

routine maintenance A set of preventive measures taken regularly to discover and eliminate defects or faults

of a device. Routine maintenance ensures the long-term, secure, stable, and reliable

running of the device, meeting service requirements.

Routing Information

Protocol

A part of the TCP/IP protocol group. It is used for locating a route based on the minimum

number of hops from the source interface to the destination interface. RIP is a distance

vector protocol that routinely broadcasts routing information to its neighboring routers,

which wastes bandwidth.

routing protocol A standard used by routers to determine the appropriate path onto which data should be

forwarded

AC6605 Access Controller 

Glossary 18 R  

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

53

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 60/78

routing table A table for storing and updating addresses of network devices. Routers regularly share

the routing information to be up to date. A router forwards packets based on the

destination address and routing information. The routing table gives paths of routers and

destinations in relay segments or in hops. The routing table is updated when new

information is available.RPC See partial route calculation

RPT An operation code in common open policy service (COPS). A policy enforcement point

(PEP) uses it to report the following contents to the policy decision point (PDP): 1.

Whether the policy execution is successful or not 2. A state change

RRPP See Rapid Ring Protection Protocol

RSTP See Rapid Spanning Tree Protocol

RSVP-TE Resource Reservation Setup Protocol (RSVP) with Traffic-engineering Extensions. It is

an extension to the RSVP protocol for setting up label switched paths (LSPs) in MPLS

networks. The RSVP-TE protocol is used to establish and maintain the LSPs by initiating

label requests and allocating label binding messages. It also supports LSP rerouting and

LSP bandwidth increasing.

RTD See round trip delay

AC6605 Access Controller 

Glossary 18 R  

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

54

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 61/78

19 S

SAToP Structure-agnostic time division multiplexing (TDM) over packet.SBI See southbound interface

SCC See main control board

scheduled task 

management

A function that allows a system to create scheduled tasks (such as backup tasks, loading

tasks, restoration tasks) and run, suspend, or automatically resume these tasks.

SDH Synchronous digital hierarchy. The SDH is a hierarchical set of digital transmission

structures, which is used for standardizing the transmission of suitably adapted payloads

over physical transmission networks.

SDT See structured data transfer

secondary supply Supply to the telecommunications equipment such as a cabinet or system blocks. It isderived from the primary supply.

Secure Shell A network protocol that allows data to be exchanged using a secure channel between a

local computer and a remote computer. When a user logs in to a remote computer through

an insecure network, Secure Shell (SSH) provides the strong information security and

authentication function to prevent the network from attacks, such as IP address spoofing

and plain-text password interception.

security command A type of command that affects the system security after being executed, for example,

the firewall command and the user management command.

security mode A mode in which the security administrator and system administrator use different user 

accounts.

self switchover A function that enables the MG to operate as a standalone switch and process the

switching between the internal users on the MG if the communication between the MG

and MGC is interrupted.

SELT See single-ended loop testing

serial port An input/output location (channel) that sends and receives data to and from a computer's

CPU or a communication device one bit every time. Serial ports are used for connecting

computers to peripheral devices, such as mice and printers.

AC6605 Access Controller 

Glossary 19 S

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

55

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 62/78

server 1. On a local area network, a computer running administrative software that controls

access to the network and its resources, such as printers and disk drives. It provides

resources to computers functioning as workstations on the network. 2. On the Internet

or other network, a computer or program that responds to commands from a client. For 

example, a file server may contain an archive of data or program files. When a clientsends a request for a file, the server transfers a copy of the file to the client. See also

client/server architecture.

service authority A function that divides the operation rights of a specified service into three levels:

maintenance, operation, and watching.

service board A piece of hardware that works as a server to provide services.

service handling A process of handling user applications in an Operations Support System (OSS) of the

 business hall.

service node A physical entity that contains service data and specialized resources, and provides the

service control, service switching, and call control functions.

service port A service channel for connecting an xDSL port and a VLAN port.

SES See severely errored second

Session Initiation

Protocol

An application-layer control protocol that can establish, modify, and terminate sessions

or calls, such as Internet phone calls.

set-top box A device that connects a television and an external source of signal, receiving and

converting signals from the signal source into content which is then displayed on the

television screen.

severely errored second Seconds during which the bit error rate (BER) exceeds the threshold and transmission

 performances degrades. Performance monitoring parameters can be measured in every

channel.

SFM Source-filtered multicast. As a type of multicast service, the SFM extends the functions

 based on any-source multicast (ASM): the upper-layer software checks the source

address of the received multicast packet, and allows the packets from specific multicast

sources to pass through. For the receivers in the SFM model, only some of multicast

sources are valid and some multicast sources are filtered out.

SGW See signaling gateway

shared key

authentication

An authentication mode. The shared key authentication requires that a STA and an AP

 be configured with the same shared key. The process of shared key authentication is as

follows: A STA sends an authentication request to an AP, and the AP randomly generates

a character string "challenge text" and sends it to the STA. The STA then copies the

received "challenge text" to a new message, and sends the message encrypted with theshared key to the AP. Then, the AP decrypts the message using the shared key, and

compares the decrypted character string with the character string that has been sent to

the STA. If the character strings are same, the STA is authenticated; otherwise, the STA

fails to be authenticated.

SHDSL See single-pair high-speed digital subscriber line (S-HDSL)

shielded twisted-pair

cable

A special type of copper telephone line for installing some services. There is an overall

shield covering the traditional twisted pair cable. This shield enables the telephone line

to be grounded.

short-time-operation Operation under normal load for a specified period. The interval between operations is

sufficient for a device to cool down to the environment temperature.

AC6605 Access Controller 

Glossary 19 S

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

56

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 63/78

signal attenuation A loss of signal strength during signal transmission. If the signal attenuation is too high,

data is hard to understand and lacks reliability. The farther the client adapter is away

from the access point, the higher the signal attenuation of the client adapter is.

signal cable A cable that can be an E1 cable, network cable, or other non-subscriber signal cable.

signal to noise ratio

margin

Maximum amount of increased received noise (in dB) relative to the noise power when

the system is designed to tolerate and meet the target bit error rate (BER) of accounting

for all coding gains.

signaling Information exchange for establishing and controlling a telecommunications circuit and

managing a network.

signaling gateway A network device that converts control signals from one format to another.

single ended loop

testing

An automatic method of testing a digital subscriber line (DSL) loop from one end of the

line. This method enables operators to effectively evaluate loops in their daily operational

 practices.

single-mode fiber A type of optical fiber cable through which only the optical signal with a fixedwavelength can travel at a time. The inner diameter of a single-mode optical fiber is less

than 10 microns and is used to transmit data in long distance.

single-pair high-speed

digital subscriber line

Also known as G.991.2. SHDSL is an international standard for symmetric DSL

developed by the ITU-T. SHDSL facilitates the sending and receiving high-speed

symmetrical rate for data streams over a single pair of copper wires.

SIP See Session Initiation Protocol

slave shelf  A shelf that is a backup of the master shelf. On the physical plane, the slave shelf has

independent slots. On the management plane, the slave shelf is managed by the master 

shelf.

Small Office and HomeOffice

A small business office or home office located in a home. This type of business usuallyoperates on a limited budget.

Smart VLAN A special VLAN that contains standard ports and service ports. The broadcast domain

of a standard port includes all ports in the Smart VLAN, whereas the broadcast domain

of a service port includes only standard ports.

SMB A through-wall connecting place or junction for electric wires, plugs, and light bulbs.

SMF See single-mode fiber

smooth upgrade A process for upgrading system files without service interruption.

SN See service node

SNC See subnetwork connection

SNRM See signal to noise ratio margin

softswitch A functional entity that provides call control and connection control for real-time

services. As main control of the next generation network (NGN), softswitches separate

the services of call control and call control from the bearer network, and adopt the

application programming interface (API) and standard protocols. This makes it easy for 

network carriers to develop new services and realize new features.

sound alarm An audio or a visible signal sent by a running computer or telecommunications

equipment when errors or emergency events occur.

AC6605 Access Controller 

Glossary 19 S

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

57

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 64/78

source MAC address

filtering

A function that checks the source MAC addresses of packets and discards packets with

existing MAC addresses on the service board. This function prevents users from forging

the MAC addresses of an upper layer device.

southbound interface An interface that connects the lower-level network management system (NMS) and the

device and implements the functions of delivering services and transmitting performanceindex data.

SPL See splitter

split horizon A function that prevents a RIP route learned on an interface from being sent to neighbors

from the interface. This reduces bandwidth consumption and avoids route loops.

split ratio Ratio of the number 1 to the number of optical signal channels that are split from a

channel of downstream optical signals in a GPON network.

splitter An analog low-pass filter for separating high frequency signals (xDSL) from voice

signals.

SQM Service quality management. It monitors the network in real time to learn the servicecondition on the network, rectifies faults in a timely manner, ensuring the service quality

committed for the subscribers.

SSH See Secure Shell

STA See station

stacking A VLAN feature that allows a device to add two 802.1Q VLAN tags to an untagged

 packet or translate a tagged packet to the packet with two 802.1Q tags. The packet with

two VLAN tags traverses the backbone network of the service provider and reaches the

 broadband remote access server (BRAS). The BRAS authenticates the packet based on

the two VLAN tags, or the outer VLAN tag is removed and the packet is authenticated

 based on the inner VLAN tag. The upper layer BRAS performs the dual-VLAN

authentication based on the two tags to increase the number of access users. On the upper-

layer network in Layer 2 mode, a packet can be forwarded directly based on the SVLAN

and MAC addresses to provide wholesale services for the ISP.

STAN See signal attenuation

standard VLAN A standard virtual local area network (VLAN) that contains multiple interconnected

standard Ethernet ports. All ports in a standard VLAN are logically equal and can

communicate with each other. Ports in different standard VLANs are isolated from each

other.

standby A state of a device. The counter part of standby is active. In a two-node system, if the

active device crashes down, the standby device switches to the active state.

static route A special route that cannot automatically adapt to network topology changes and must

 be manually configured by administrators. On a network with a simple topology, static

routes enable the network to work properly. Proper configuration and usage of static

routes improve network performance and guarantee bandwidth for important services.

When a network fault occurs or the topology changes, the static route does not change

automatically and the administrator needs to modify it manually.

static user A user with a fixed IP address. A user can configure a fixed IP address for his or her 

computer. Then an administrator configures this IP address to be valid.

station A software program that is installed on a computer to request services from the server.

STB See set-top box

AC6605 Access Controller 

Glossary 19 S

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

58

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 65/78

step Amount of output amplitude change represented by the smallest valid bit of the

differential pulse code modulation (DPCM) signal in a DPCM or adaptive differential

 pulse code modulation (ADPCM) system. In an ADPCM system, the step size is changed

dynamically in response to the needs of the signal being processed. See DPCM and

ADPCM.stop bit In asynchronous transmission, a bit indicating the end of a character. In early

electromechanical teleprinters, the stop bit provided time for the receiving mechanism

to coast back to the idle position and had 1, 1.5, or 2 data bits depending on the

mechanism.

STP See shielded twisted pair

stratum The Network Time Protocol (NTP) protocol uses Universal Time Coordinated (UTC)

as the standard time. On large communication networks, the tree structure network is

deployed and the time is propagated according to levels of the NTP server. The accuracy

of a time sever depends on the distance to the UTC. The accuracy of the time server is

represented by a stratum value. Servers are classified into different stratums based on

their distance to the UTC.

structured data

transfer

A transfer mode in which CS procedure supports any fixed octet-based packet structure,

 particularly 8 kHz-based structures used in circuit-mode services. When the structure

size is greater than one octet, the CS procedure uses a pointer to describe structure

 boundaries.

SUA Software fault-oriented group unblocking acknowledgment message.

submap A collection of mappings that is part of a larger map. Submaps are often used together 

with group mappings.

subnet mask  A technique used in the IP protocol to determine which network segment packets are

destined for. The subnet mask is stored in the client machine, server, or router in the

 binary mode corresponding to the IP address.

subnet connection A dynamic relationship between two (or more in the broadcast connection) subnet points

on the boundary of the subnet.

subrack  A shelf used to insert circuit cards for microwave transmission.

suit of racks or cabinets A row of racks or cabinets placed side by side.

Super VLAN An aggregated VLAN that can be configured with multiple sub VLANs. Sub VLANs in

a super VLAN use the Layer 3 interface of the super VLAN. Unlike a common VLAN,

the super VLAN contains only sub VLANs without physical interfaces and virtual

service interfaces. A sub VLAN can be a smart VLAN or MUX VLAN.

support A part used to support and fix a cabinet on the ESD floor. It is made of welded steel plated and used to block up the cabinets to align the cabinet bottom with the ESD floor.

Before the whole set of device is grounded, insulation plates must be installed under the

supports and insulated coverings must be added to expansion bolts to meet insulation

requirements.

switch A communication device that selects links to transmit packets.

AC6605 Access Controller 

Glossary 19 S

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

59

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 66/78

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 67/78

terminal A device that converts voice, sound, text, image, diagram, data, and video from physical

form to electronic signals or from electronic signals to physical form. A terminal

generates and sends signals (such as telecommunication circuit setup or release) that

maintain the normal running status of the telecommunication network. It receives the

call signals of telecommunication switch and transmission.test bus A physical line that connects the tested device to the test circuit on the TSS board. The

test buses of different subscribers' frames can be connected through physical lines so that

subscribers' frames can share the same TSS board.

TFTP See Trivial File Transfer Protocol

The World

Telecommunication

Standardization

Assembly

A regular four-yearly conference that comes up with the next study topics for ITU-T

which produce recommendations on these topics.

threshold An allowed warp range between the actual counter value and the history average value

of the counter.

threshold alarm An alarm generated when the monitored value exceeds the threshold.

tie wrap A belt for binding cables.

Time Division Multiple

Access

A channel access method for shared medium networks. It allows several users to share

the same frequency channel by dividing a signal into different time slots.

time division

multiplexing

A type of digital multiplexing in which two or more bit streams or signals are transmitted

as sub-channels on one communication channel, and are physically taking turns on the

channel.

time stamp Time of an event recorded by a computer. By using mechanisms such as the Network 

Time Protocol (NTP), a computer maintains accurate current time, calibrated to fractions

of a second. The accuracy ensures the communication efficiency. NTP timestamp: A

second relative to 00:00:00 on 1 January, 1900. The value is in the format of a 64-bit

unsigned fixed-point number, with the integer part being the first 32 bits and the fraction

 part being the last 32 bits. Originate Timestamp (peer.xmt, pkt.xmt): A format of the

timestamp, indicating the local time when an NTP message leaves the sender, such as

T1. Receive Timestamp (peer.rec, pkt.rec): A format of the timestamp, indicating the

local time when an NTP message reaches the remote peer, such as T2. When the peer is

unreachable, the receive timestamp is set to 0. Transmit Timestamp (peer.org, pkt.org):

A format of the timestamp, indicating the local time when the remote peer returns an

 NTP message, such as T3. When the peer is unreachable, the transmit timestamp is set

to 0. Reference Timestamp (sys.reftime, peer.reftime, pkt.reftime): A format of the

timestamp, indicating the local time when an NTP message reaches the sender, such asT4. If the local clock is never synchronized, the reference timestamp is set to 0.

time to live A technology used in a best-effort delivery system to prevent packets that loop endlessly.

The TTL is set by the sender to the maximum time a packet is allowed to be on the

network. Each router on the network decrements the TTL value by one when the packet

arrives, and discards any packet if the TTL value reaches zero.

timeslot Continuously repeating intervals of time. A timeslot functions as a communication

channel for a user.

TKIP encryption An encryption method as an enhancement to hardware-based WEP encryption. WEP

encryption and TKIP encryption both use the RC4 algorithm, but TKIP encryption better 

 protects WLAN services.

AC6605 Access Controller 

Glossary 20 T

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

61

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 68/78

TL1 See Transaction Language 1

TL1 northbound

interface

A northbound interface for service provisioning. The TL1 northbound interface can be

connected to the Element Management System (EMS), Operation Support System

(OSS), or Network Management System (NMS). In this case, you can provision and

maintain services through the TL1 northbound interface.

TMN See Telecommunication Management Network 

token bucket A method for measuring traffic. It is used in the committed access rate (CAR) and traffic

shaping techniques to control the traffic rate. A token bucket can be considered as a

container that stores tokens, with the capacity set in advance. The system puts tokens to

the bucket at the preset rate. When the bucket is full of tokens, the extra tokens overflow

and the number of tokens does not increase.

topological view A map of a managed network on an NMS. The managed devices and links are displayed

on the device explorer and topological view in format of the tree and diagram. It provides

configurations, alarms, performance operations for operators. In the topological view,

the navigation tree is displayed in the left pane, and the map is displayed in the right pane. The navigation tree on the left displays topology objects (NEs and subnetworks)

and relationship between them. The diagram on the right displays all topology objects

on the current subnetwork and the location relationship between them.

topology Configuration or layout of a network formed by the connections between devices on a

local area network (LAN) or between two or more LANs.

topology management A function that manages topological information about the connectivity of a system.

ToS See type of service

ToS priority Type of service priority. It is a ToS sub-field (bits 0 to 2 in the ToS field) in the ToS field

of the IP packet header.

TP See traffic policing

traffic classification A function that allows users to classify traffic into different classes with different QoS

levels according to the preset standard. Traffic is processed based on the classes.

traffic control A function that manages data flows on the network to ensure that the receiver processes

all incoming data. Traffic control is implemented by hardware and software. It can

 prevent the sender from transmitting data at a rate that the receiver cannot process.

traffic engineering A task that effectively maps service flows to the existing physical topology. By choosing

 proper routes for different service flows, the traffic engineering balances the global

network load to reduce the congestion possibility and improve the network usage.

Traffic Engineering See TE

traffic mirroring A function that copies the specified data packets to the monitoring port to monitor the

network status and rectify faults.

traffic policing A mechanism for monitoring specified traffic entering communication devices. By

monitoring the rate of traffic that enters the network, this mechanism punishes the

excessive traffic to limit the incoming traffic within a proper range and to protect the

network resources and carriers' interests.

traffic rate The amount of data that is transmitted or received on a device within a unit time.

AC6605 Access Controller 

Glossary 20 T

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

62

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 69/78

traffic statistics An operation of measuring and collecting statistics data on devices and

telecommunications networks. With the statistics, operators can analyze the operating

status, signaling, users, system resource usage of devices or networks. Statistics also help

operators manage the device, locate problems, and plan, maintain, and monitor networks.

traffic volume Average number of calls during the average occupation duration, indicating the system'straffic load. It is measured in units of erlang-hours (Erl). The traffic volume varies with

the average number of calls per unit of time and the occupation duration of each call.

Transaction Language

1

A widely used ASCII or man-machine protocol for telecommunications management.

TL1 enables a managed device that has a TL1 agent installed to communicate with the

TL1 manager. The TL1 manager monitors and manages the managed device using the

TL1 agent to access the data stored in the managed device.

transmission container Basic control unit of the upstream service traffic in the GPON system. GPON uses T-

CONTs to implement service convergence. Each T-CONT corresponds to the service

traffic of a particular bandwidth type. Each bandwidth type has its own quality of service

(QoS) which is represented by the bandwidth guarantee, such as fixed, assured, non-

assured, best-effort, and hybrid mode. Each T-CONT is identified by an Alloc-ID which

is globally allocated by the optical line terminal (OLT), ranging from 0 to 4095. A T-

CONT can only be used by one ONU/ONT of the OLT.

Transmission Control

Protocol

One of the core protocols in the Internet protocol suite. Using TCP, network device can

establish connections to exchange data. TCP provides reliable and ordered delivery of 

data from the sender to the receiver. It distinguishes data for multiple concurrent

applications running on the same host.

transmission

convergence

A function that generates and receives transmission frames. The TC sublayer packages

cells into the transmission frame.

transparent

transmission

A process during which the signaling protocol or data is not processed in the content or 

encapsulated for the processing of the next phase.

triple play An integrated three-way service bundle of VoIP services, broadband Internet and cable

television/video-on-demand.

Trivial File Transfer

Protocol

A simplified version of FTP for transferring files. Because TFTP is intended for 

applications that require no complex interaction between a client and a server, it is used

for transferring simple files, providing no authentication. TFTP has a small capacity and

therefore can be contained in read-only memory (ROM) to boot diskless devices.

trunk  A communication channel between two switching systems such as Digital Signal 0 (DS0)

on a T1 or E1 line.

trunk cable A communication cable that connects two switching systems.

trunking gateway A gateway between the switched circuit network (SCN) and packet switched network 

that terminates a large number of digital circuits.

TTL See Time to live

twisted pair A type of wiring in which two conductors (the forward and return conductors of a single

circuit) are twisted together to cancel electromagnetic interference (EMI) from external

sources.

two wire system A half-duplex connection where each unit transmits and receives on the same pair of 

wires.

AC6605 Access Controller 

Glossary 20 T

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

63

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 70/78

type B dual-homing

protection switchover

through GPON port

A protection mechanism in the GPON network. In this mechanism, the upstream active

and standby optical fibers of the optical distribution network (ODN) are connected to

two optical line terminals (OLTs) which may be located at different places. This

mechanism improves the disaster recovery performance of the device.

Type of Service A field in an IP packet used for quality of service (QoS). A ToS field has 8 bits and isdivided into five subfields.

AC6605 Access Controller 

Glossary 20 T

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

64

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 71/78

21 U

UBR  See unspecified bit rateUL See uplink 

UNI See user network interface

Universal Test &

Operations PHY

Interface for ATM

A standard on the physical layer of the ATM forum for the local connectivity between

ATM devices. It is one of the local loopbacks supported by the asymmetric digital

subscriber line (ADSL) board.

unshielded twisted pair

(UTP) cable

A standard cable used as telephone lines as well as in Ethernet whose standard IEEE

802.3 10BaseT allows the UTP to reach up to l0 Mbit/s rate.

unspecified bit rate A type of service that is ideal for the transmission of IP packets. It has neither 

commitment to transmission nor feedback to congestion. If congestion occurs, UBR cells

are discarded, and no feedback or request for slowing down the data rate is delivered tothe sender.

untagged frame A frame that does not contain a tag header immediately following the source MAC

address field or the routing information field (if have).

uplink  A unidirectional wireless link for transmitting signals from the user equipment to a base

station (BST), from a mobile station to another mobile station, or from a mobile station

to a BST.

upload An operation to report some or all configuration data of an NE to the NMS. The

configuration data then covers the configuration data stored at the NE layer on the NMS

side.

upstream In an access network, the transmission direction from the link end on the subscriber side.

Upstream is applicable to every site where the link end on the subscriber side is defined

on the network. See downstream.

user-defined ACL An ACL with the packets filtering rules and policies defined by users.

user-end provider edge A provider edge (PE) that is directly connected to a customer edge (CE). A UPE supports

routing and Multiprotocol Label Switching (MPLS) encapsulation. If a UPE is connected

to multiple CEs and has the basic bridge function, frame forwarding is performed only

on the UPE, which relieves the burden on the superstratum PE (SPE).

AC6605 Access Controller 

Glossary 21 U

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

65

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 72/78

user network interface A type of ATM Forum specification that defines an interoperability standard for the

interface between ATM-based products (a router or an ATM switch) located in a private

network and ATM switches located in the public carrier networks. It is also used to

describe similar connections in Frame Relay (FR) networks.

UTOPIA See universal test and operations PHY interface for ATM

UTP See unshielded twisted pair

AC6605 Access Controller 

Glossary 21 U

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

66

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 73/78

22 V

VAG service Virtual access gateway service. An AG is divided to multiple virtual AGs (VAGs). EachVAG accesses services separately under the control of the media gateway controller 

(MGC).

VAP Virtual access point.

VCCV See virtual circuit connectivity verification

VDSL Very-high-speed digital subscriber line (DSL). A DSL technology providing fast data

transmission over a twisted pair of copper wires (up to 52 Mbit/s downstream and 16

Mbit/s upstream).

VDSL2 An extension of the very-high-speed digital subscriber line (VDSL) technology, which

complies with ITU G.993.2. VDSL2 supports multiple spectrum profiles and

encapsulation modes, and provides short-distance and high-speed access solutions for the next-generation FTTx access service.

verification A function that determines the users that can access the network.

virtual bridged LAN See virtual Bridged Local Area Network 

video on demand A system for playing programs based on audience's demands. VoD is an interactive video

service which can meet audience's demands at any time. It develops on the basis of 

computer, communications, and television technologies.

video stream A continuously running video. Video streams may or may not be saved as a file. The

video that is not saved as a file cannot be viewed.

View A topology presented based on some principles. Users can customize the view based on

requirements of every product and organize data in the view displayed by the topology

module. By default, the platform provides the physical view in which the topology view

can be planned based on the principles such as the domain and maintenance relationship.

virtual bridged LAN See virtual bridged local area network.

virtual bridged local

area network 

A bridged LAN in which the existence of one or more VLAN-aware bridges allows the

definition, creation, and maintenance of VLANs.

virtual circuit

connectivity

verification

A function that allows users to test the virtual circuit connectivity manually. Just as

ICMP-PING and LSP-PING, the verification is implemented as an extension to LSP-

PING.

AC6605 Access Controller 

Glossary 22 V

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

67

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 74/78

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 75/78

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 76/78

Wi-Fi multimedia A wireless QoS protocol that guarantees preferential transmission of packets with high

 priorities. It ensures good quality of delay-sensitive services such as voice and video

services over a wireless network.

Wi-Fi Protected Access A wireless security standard replacing Wired Equivalent Privacy (WEP) and providing

more powerful security performance for IEEE 802.11 WLANs. WPA is a subset of IEEE802.11i and uses IEEE 802.1x authentication and TKIP encryption.

wireless medium A type of medium that transmits data frames between wireless users. WLANs use radio

as the transmission medium.

WMM See Wi-Fi multimedia

WPA See Wi-Fi Protected Access

WPA-PSK  Wi-Fi protected access pre-shared key

WRED See weighted random early detection

WRR  See weighted round robin

WTR  See wait-to-restore time

WTSA See The World Telecommunication Standardization Assembly

AC6605 Access Controller 

Glossary 23 W

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

70

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 77/78

24 X

x digital subscriber line A bandwidth-efficient modulation technology that is developed to achieve high datatransfer rates (higher than 4 kHz) over twisted-pair cables. Because xDSL has a higher 

frequency than common voice signals, the telephone lines can transfer voice and connect

to the Internet using xDSL. Nowadays, xDSL technologies include Asymmetric Digital

Subscriber Line/Rate Adaptive Asymmetric Digital Subscriber Line (ADSL/RADSL),

Symmetric Digital Subscriber Line (SDSL), and Very high-speed Digital Subscriber 

Line (VDSL).

xDSL See x digital subscriber line

AC6605 Access Controller 

Glossary 24 X

Issue 01 (2012-05-30) Huawei Proprietary and Confidential

Copyright © Huawei Technologies Co., Ltd.

71

8/12/2019 AC6605 V200R001C00 Glossary 01

http://slidepdf.com/reader/full/ac6605-v200r001c00-glossary-01 78/78

25 Z

Z interface extension A method in which analog subscribers are connected to another place.

AC6605 Access Controller 

Glossary 25 Z