Glossary of Terms and Acronyms
Ericsson Service-Aware Policy Controller

Contents

1Glossary of Terms and Acronyms Introduction

2

Terms
2.1A-E
2.2F-K
2.3L-P
2.4Q-T
2.5U-Z

Glossary

1   Glossary of Termsand Acronyms Introduction

This document defines the terms and acronyms used in this library.

2   Terms

2.1   A-E

Access Point (AP) A device that allows Wi-Fi capable devices to connect to a wired network using Wi-Fi technology.
Action An executable operation triggered by setting attributes on an MO. Each action is defined in the related MOC description.
Active node SAPC node that is processing traffic and provisioning operations.
Alarm Raised by the system to indicate an unexpected behavior of malfunction requiring corrective action by the user. An alarm has at least states raised (initial detection of the fault) or cleared (when the fault no longer exists). An alarm can also change state regarding perceived severity. Alarms are also called "stateful" alarms to emphasize that they have a state. An active alarm is an alarm that has been raised but not cleared.

All alarm state changes including cleared state are recorded in the Alarm Log. Each alarm has an alarm Operating Instructions document. It describes the possible fault reasons, fault locations, and the potential service impact. It also describes the procedure to execute to eliminate the problem and eventually clear the alarm.

Alert A stateless alarm, that is, an alarm that can only have the raised state. As an alarm, an alert has an associated Operating Instructions document and is reported in real time as an SNMP notification. Alerts are recorded in the Alert Log but are not exposed in any list over the NBI.
Alias Role Identity of a role, which has meaning to the user. An alias role is an alias for one or more real roles. The definition of alias role allows the user to use names of roles that the user is used to. Also, the same alias can be used for several real roles. The latter can be useful when different types of MEs have defined real roles with different names, but which requires the same (or similar) authority.
Application A service enabler deployed by service providers, manufacturers, or users. Individual applications are often enablers for a wide range of services.
Application detection filter A logic used to detect packets generated by an application based on extended inspection of these packets, such as header and/or payload information, and dynamics of packet flows. The logic is entirely internal to a PCEF enhanced with ADC.
Application Function (AF) A logical element that enables applications to control IP-CAN bearer resources. The AF shall use the Rx reference point to provide session information to the SAPC. In the context of this document, the AF can be the Proxy Call Session Control Function (P-CSCF), a DPI node (such as SASN), or a third-party service provider.
Application identifier An identifier, referring to a specific application detection filter.
Asynchronous replication The data is committed in the active node and then it is replicated to the mated peer. Therefore, the standby node lags behind the active until the data is replicated.
Attribute Represents the configuration. The read-only attributes in the MOs describe configuration state and operational values. The writable attributes control the operation and configuration for the particular network resource. Each attribute is defined in the related MOC description.
Authentication The process of verifying the identity of an entity.
Authorization The granting of permission based on authenticated identification.
BNG Broadband Network Gateway is an IP Edge Router where bandwidth and QoS policies may be applied. The BNG may encompass any or all the functionality of a BRAS
BRAS Broadband Remote Access Server is a component of broadband access networks that serves as an aggregation point for subscriber traffic. It provides session termination function, IP address assignment, and subscriber management functions.
Broadband Service Controller (BBSC) An intelligent control function that combines information from different sources and makes decisions about the Service Chaining.
Cardinality Can exist in the MOM between MOs in parent-child relationships, and in associations between MOs.
Charging Control The charging control function makes it possible to determine the Rating Group applicable to an IP flow.
CPI Customer Product Information. Documentation for an ME, delivered in the Active Library Explorer.
CNOM Core Network Operations Manager (CNOM) provides a set of GUI-based applications used to facilitate operator user cases, including monitoring, health check, troubleshooting, and tracing.
CSR Customer Service Request. Used during the trouble reporting process to describe the problems identified.
Data Model A mapping of the contents of an Information Model into a form that is specific to a particular type of data store or repository. A data model is basically the rendering of an information model according to a specific set of mechanisms for representing, organizing, storing, and handling data. In contrast to an Information Model, a Data Model includes implementation (and protocol-) specific details. That is, rules that explain how to map MOs onto lower-level protocol constructs.
Data Product/Data Plan A Data Product or a Data Plan is a component of the operator Service Offering. It may be simple (for example, Mobile Data at Flat Rate Data Plan), but also complex (bundling different data services and assigning to each one specific usage condition, for example time, volume, or monetary). Data Products/Data Plans are configured in the SAPC using Subscriber Groups.
Derived Data Type Data type enhanced with extra restrictions and properties. Derived string data types contain, for example, length and content constraints. Derived integer data types contain extra range constraints. Each derived data type is defined in the related MOC description.
Destination It is either an end user or an external system that receives notification messages.
Distinguished Name The Distinguished Name (DN) is the name that uniquely identifies an entry in the directory.
Directory Information Tree Tree structure where a set of Lightweight Directory Access Protocol (LDAP) entries are hierarchically organized.
DN Distinguished Name. The name of an object tree that is shared between the system and the Management System. The DN is in 3GPP format (from root to leave). The DN is used to identify an MO uniquely in the system. It gives the path of the MO in the tree of objects. The system uses 3GPP formatted DNs where each relative DN part consists of the MOC name equal the MO identity. If the key attribute name is not equal to the MOC name plus ID, then the key attribute name is also appended to the MOC name separated by a dot.
Dynamic PCC rules Dynamic PCC rules are dynamically generated or modified by the SAPC based on information received from the AF and dynamically provisioned towards the PCEF. The PCC rule definition includes the 5-tuple filter along with charging and QoS Information.
ECIM Ericsson Common Information Model. Controls the MOM structure. The ECIM is based on the CIM standard.
ECLI Ericsson Command-Line Interface. A terminal-based Command-Line Interface that is used to monitor and manage the ME. The ECLI is based on industry de facto standard patterns.
EF Enforcement Function. It is a logical entity that enforces policy decisions made by the SAPC.

According to 3GPP, the EF is defined as PCEF in PCC deployment.

In fixed access, one of the entities that provides EF is the BNG.

Enumeration Integer-name pairs defining a fixed set of named values for an attribute, return value, or action parameter. Each enumeration is defined in the MOM.
Ericsson NETCONF Interface A M2M interface for configuration management of the ME using the NETCONF protocol over the Secure Shell.
Event Occurrence of significance to users, the MEs under surveillance and Network Management specifications. Events do not have states.
External System Machine or system in the network that can receive notification messages.

2.2   F-K

Gating A process of blocking or allowing packets belonging to a service data flow, to pass to the desired endpoint.
Granularity Period (GP) A GP is the time period a certain PM Job is active in collecting measurement data. That is, the GP specifies how often measurement data is harvested and aggregated.
HA High Availability. A system or component that is continuously operational for a desirably long length of time. Availability is measured relative to 100% operational status.
Heartbeats Used by a Management System to monitor the interface over which the alarms or alerts are to be sent. Heartbeats are needed because a management system cannot assume that a "silent" ME behaves properly. The Heartbeat event is reported as an SNMP notification at regular intervals.
Information Model An abstraction and representation of the entities (or MOs) in a managed environment, their properties, attributes, and operations, as well as the way that they relate to each other. It is independent of any specific repository, software use, protocol, or platform.
IP-CAN bearer IP transmission path of defined capacity, delay, bit error rate, and so on.
IP-CAN session Session identified by the IP address assigned to an UE attached to the Operator network. The UE can be reached using such IP address and the session lifetime should match with the period the UE is available through such IP address.
IPoE IP over Ethernet. IPoE encapsulation extends several LAN-based protocols, including DHCP, to allow use on a broadband network.
IP Flow A unidirectional flow of IP packets with the same source IP address and port number, the same destination IP address and port number, and the same transport protocol. Port numbers are only applicable if used by the transport protocol.

2.3   L-P

LDAP Attribute It holds information about the object that the LDAP entry represents.
LDAP Information Tree In a Lightweight Directory Access Protocol (LDAP) directory, it is the hierarchically organized collection of entries. It contains a base entry at the top of the hierarchy and the rest of entries organized in a tree-like structure below the base entry.
Load Balancing The distribution of processing and communications activity evenly across a network so that no single node is overwhelmed.
Load Regulation Function that secures sustainable acceptable throughput even when the system is overloaded. It provides a graceful degradation of the system at high load.
LOTC Linux Open Telecom Cluster. A custom Ericsson operating system distribution based on GNU/Linux. The LOTC provides a Linux cluster with High Availability characteristics.
Managed Object Management A folder in the Active Library Explorer containing the MOM.
ME Managed Element. A node in the network. ManagedElement is a single root element object in the MOM and is the starting point for navigation.
Measurement Instance A Measurement Instance is a specific measurement value that is identified by three names. It is moClassName in ManagedObjectClass and measurementTypeId in MeasurementType.

The third name is the instance name defined in runtime by the application doing the measurement.

Measurement Type A Measurement Type defines how measurement data is collected and aggregated. Cumulative counters and gauges are examples of collection. Sum, average, and last update are examples of aggregation.
MIB Management Information Base. The collection of MOs, which control the configuration of an ME and its functionality.
MIM Management Information Model. A view of the MOM, where certain parts of the MOM can be hidden from the user, depending on the use case. The MOM is traditionally stored offline, while a MIM is traditionally stored online for use by tools. Often the MIM is represented in a different language to the MOM, for example, XML. There is normally one file, in whatever modeling format, per MIM. The cardinality between a MOM and a MIM is one to one.
MO Managed Object. A software object encapsulating the manageable characteristics and behavior of a particular hardware or software resource. An MO is an instance of a MOC. An MO normally has attributes providing information used to characterize the MOs belonging to the MOC. An MO can also have actions allowing the user to perform operations on the underlying implementation.
MOC Managed Object Class. The MOM has one or more defined MOCs. The MOCs are instantiated with real data on a deployed ME. The MOC maintains all characteristics of an MO such as attributes and actions.
MOM Managed Object Model. A structured collection of configuration information defining the O&M capability on an ME. The MOM is defined as a set of MOCs. The MOCs contain attributes representing the configuration that can be performed by the user, and actions representing the operations that can be started by the user. The MOM is a static blueprint for the creation of the actual object model.
Monitoring Key It is the 3GPP term for Reporting Group.
Multimedia telephony (MMTel) The 3GPP IMS Multimedia Telephony service that comprises high-quality voice and video services, and uses IP transport over mobile networks and IMS protocol for call and media handling.
NBI Northbound Interface. The interface to a Management System and a CLI client. The protocols used are ECLI, NETCONF, SFTP, and SNMP.
NETCONF Network Configuration Protocol. A Network Management protocol developed in the IETF and published as RFC 4741.
Notification A general term for a message carrying an alarm or alert instance.
Notification Address IP address or URL belonging to a Notification Server which is identified as contact point where notification delivery requests are sent.
Notification Message Message sent by the SAPC to an external destination with information related to an event occurred to a subscriber.
Notification Receiver Identity of one or several external systems.
Notification Server Target system where notification delivery requests are sent. This Notification Server may comprise a set of Notifications Addresses.
Object Identifier An object identifier (OID) is a string, of decimal numbers, that uniquely identifies an object. These objects are typically an object class or an attribute.
Online Charging System The entity that performs real-time credit control. Its functionality includes transaction handling, rating, online correlation, and management of subscriber accounts/balances.
Operator Network Policies Operator Network Policies are the different operator decisions that need to be added to the subscriber data stored in the operator nodes. They may not be visible in the contract between the service provider and the subscriber. Their purpose may be to comply with the operator strategy for network optimization, for up-sell, or with the existing regulation. They may result on more data assigned to the subscriber. The relation between the operator network policies and the Data Products can be any.
Original Distinguished Name It is the comma-separated list of the object Relative Distinguished Name (RDN) and its parents RDNs all the way up to the top of the object hierarchy, exactly as they were provisioned.
Origin State Id It is a monotonically increasing value that is advanced whenever a Diameter entity restarts with loss of previous state, for example upon reboot. It is used to allow rapid detection of Diameter terminated sessions.
Overload Protection Function that protects the system against load peaks. Prevents a processor or the system from crash at overload. Overload protection is needed to handle sudden load bursts even if there is an overload regulation.
PCC deployment Policy and Charging Control architecture that encompasses 3GPP accesses (E-UTRAN, UTRAN, GERAN), non-3GPP accesses, and fixed broadband access in the convergent scenario. In this deployment, the Ericsson Service-Aware Policy Controller (SAPC) interworks with the PCEF by Gx interface.
PCC Rule The set of information enabling the detection of a service data flow and providing parameters for Policy and Charging Control (PCC).
PDN Connection Association between a UE and a PDN. An APN identifies a PDN.
PDP Context GPRS term equivalent to Public Data Networks (PDN) connection or bearer. Primary PDP Context in GPRS is equivalent to Default Bearer in EPS. When the term Bearer or Default bearer is used in this document, the content could be also applied to PDP context or Primary PDP Context.
Performance Management This is an operation and maintenance function responsible for reporting statistical measures, related to system performance and tuning of the system.
PM Job A PM Job is a set of Measurement Types, identified by measurementTypeId in MeasurementType, with rules that specify when they are collected and how the measurement is reported. It can be a Measurement Job handling data for measures to be reported or a Threshold Job that is used for generating alarms.
Policy The set of rules that implies a decision about a resource and that trigger certain behavior in the network.
Public Safety Answering Point (PSAP) A physical location, where emergency calls from the public are received.

2.4   Q-T

QoS Quality of Service. Totality of characteristics of a telecommunications service that bear on its ability to satisfy stated and implied needs of the user of the service.
QoS Class Identifier (QCI) An identifier that is used as a reference to a specific packet forwarding behavior (for example, packet loss rate and packet delay budget to be provided to a PCC rule.
Quota Information provided from the SAPC to the EF that specifies the maximum number of seconds or bytes allowed to be reported from the EF and used by the subscriber. When subscriber consumes the quota, the EF reports usage to the SAPC.
Reporting Group The set of service IP flows treated as group from the perspective of usage reporting. Reporting Group is the same concept as Monitoring Key.
Relative Distinguished Name It is the name and the value (key) of an object distinguished attribute.
RG Residential gateway is a home networking device, used as a gateway to connect devices in the home to the Internet or other WAN.
Role Equivalent to the user occupation within an organization, for example, System Administrator. A user can have one or more roles.
Rule It contains a condition formula that is evaluated to permit or deny the authorization to a resource or to return an output attribute.
SDP Software Delivery Package. An archive file (TAR file) with RPM® software packages and a file describing the Ericsson product data. A software item can be an SDP. A software item represents any kind of Ericsson software product that is present on the ME.
SDN Domain An SDN domain is a network domain that complies with the SDN architecture supporting one SDN Controller (SDN-C) and one or more Evolved Flow Switches (EFSs). The SDN domain can span multiple geographically separate sites.
Seamless Handover A method that ensures mobility of the user equipment in the network without affecting a call session, previously established. To secure continuity of the call connection during the handover, the “make before break” principle is applied. According to that principle, the UE attaches to new radio access point establishing a new connection. Once the traffic starts being conveyed through the new connection, the old one is released.
Secured Operator SSID Is a Service Set Identifier (SSID) that allows a user to connect to the Wi-Fi network using EAP method during Wi-Fi connection setup and grants access to Operator services and the internet.
Service It identifies a set of aggregated IP flows in the Enforcement function. The SAPC performs policy control over the services using PCC Rules.
Service Chain A service chain is a logical concept and an object type in the BBSC that determines a chain of service functions which a user’s data flow passes in a well-defined sequence. A service chain can replicate the data flow at specific points in the sequence and forward the replicas to specific service functions.
Service Data Flow An aggregate set of IP flows. If GPRS or WCDMA is used, it is possible that a service data flow is more granular than a PDP context.
Service Data Flow Filter A set of filter parameters used to identify one or more of the IP flows constituting a service data flow. At least the following means for the IP flow identification are supported: source and destination IP address+port, protocol.
Service Function A service function is a network node, or a cluster of network nodes, that analyzes or modifies individual user data packets or complete data flows. Some examples of service functions are deep packet inspection, Content Filter, and header enrichment devices.
Services offering The set of common Policy and Charging Control data offered by an operator to the end users, including, for example, allowed services, bandwidth limit, and Fair Usage data. Services offerings are managed in the SAPC by configuring subscriber groups.
SF System Functions. Common system functions and resources for the management entity such as Fault Management (Fm), Performance Management (Pm), and Security Management (SecM). SystemFunctions is one of the first-level branches in the MOM.
Single Radio Voice Call Continuity (SRVCC) Voice call continuity from IMS over E-UTRAN or HSPA access to UTRAN or GERAN access for calls that are anchored in IMS, when the UE can transmit or receive on only one of those access networks at a given time.
Slice The maximum allowed quota for a Reporting Group.
SPID Subscriber Profile ID. The Subscriber Profile ID for RAT/Frequency Selection Priority (SPID/RFSP) used to define camp priorities in Idle mode and to control inter-RAT/inter-frequency handover in Active mode. This index is mapped by the eNodeB (E-UTRAN), RNC (UTRAN), or BSC (GERAN) to locally defined configuration. For more information, refer to General Packet Radio Service (GPRS); Service Description; Stage 2, 3GPP TS 23.060 and General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access, 3GPP TS 23.401.
System Controller There are always two System controllers (SCs) in the SAPC cluster. They provide the OAM and provisioning services.
Standby node SAPC node that is replicating data from the active node. This node does not process traffic nor provisioning operations but is ready to take over in case of failure in active node.
Struct Handles structured attributes that can contain an arbitrary number of elements of the same or different type. Each struct is defined in the related MOC description.
Subscription The subscriber data stored in the operator nodes to guarantee fulfillment of the contract to a particular Service Offering, between the Service Provider (operator) and the subscriber. The part of the subscription stored in the SAPC consists of the set of Policy and Charging Control data that correspond to the contracted Service Offering, for example, allowed data services and bandwidth limit.
SysM System Management. Represents the system-level functions such as time handling and version handling. SysM is a system function.
Tethering A method of using a mobile device (such as a cell phone or smartphone) as a modem to connect another device (such as a laptop) to the Internet. The term gets its name from how a phone is attached to the computer using a USB cable, although wireless technologies such as Bluetooth can also be used.
Transaction Configuration changes are applied through atomic transactions. Thus, it is ensured that all or none of the operations are executed.
Transparent VASs Service functions that process the user traffic and add value.
Transport Management Transport-related functions and resources, for example, load sharing between all configured and available blades in the cluster, and distribution of incoming traffic to the system. Transport is one of the first-level branches in the MOM.
Trap An unacknowledged SNMP message carrying a notification or heartbeat.

2.5   U-Z

Unknown session A session that is not stored in SAPC.
Untrusted Wi-Fi A Wi-Fi access network that is not managed by the operator or does not provide sufficient security mechanisms. For example, a public open hotspot, a private Wi-Fi AP at home or any other Wi-Fi AP that does not fulfill security mechanism such as authentication and encryption.
Upgrade A product or product version that is created to provide an increased level of functionality or performance to a user. Upgrade is also the operation to replace a previous product or product version with a new product or product version that provides an increased level of functionality.
Usage accumulator The counter that accumulates the number of seconds or bytes that have been consumed by a subscriber or a group of subscribers sharing usage quota.
Usage limit The threshold of accumulated usage (volume or time) for a Reporting Group or a particular usage accumulator.
Validity time The maximum time period before a session reauthorization is required for fair usage control.
Virtual IP It is the regular method to connect a telecommunication node to an external Data Communication Network. Virtual IP (VIP) is the concept for collective addressing. With VIP, a shared IP address can be used to address distributed functions in a telecommunication node, which is a multi-processing cluster.
XML Attribute Attributes are used to specify additional information about the element. It may help to think of attributes as a means of specializing generic elements to fit your needs. An attribute for an element is displayed within the opening tag. The syntax for including an attribute in an element is: <element attributeName=value>.
XML Element Elements are used to classify data in an Extensible Markup Language (XML) document so that the data becomes "self-explanatory”. Opening (<element>) and closing tags (</element>) represent the start and end of an element.

Glossary

3DES
Triple Data Encryption Standard
 
3GPP
3rd Generation Partnership Project
 
AAA
AA-Answer
 
AAR
AA-Request
 
ABR
Area Border Router
 
ACL
Access Control List
 
ADC
Application Detection and Control
 
AES
Advanced Encryption Standard
 
AF
Application Function
 
ALB
Abstract Load Balancer
 
AMBR
APN MBR
 
ANSI
American National Standards Institute
 
API
Application Programming Interface
 
APN
Access Point Name
 
ARP
Address Resolution Protocol

Allocation Retention Priority

 
ASA
Abort-Session-Answer
 
ASBR
Autonomous System Boundary Router
 
ASR
Abort-Session-Request
 
aTFTP
Advanced Trivial File Transfer Protocol
 
AVP
Attribute-Value Pair
 
BBSC
Broadband Service Controller
 
BE
Back-End
 
BNF
Backus-Naur Form
 
BPCF
Broadband Policy Control Function
 
BRF
Backup and Restore Framework
 
CBA
Component Based Architecture
 
CCA
Credit-Control-Answer
 
CCR
Credit-Control-Request
 
CEE
Cloud Execution Environment
 
CGNAT
Carrier Grade NAT
 
CLI
Command-Line Interface
 
CMX
Component Main Switch
 
CNOM
Core Network Operations Manager
 
CoA
Change of Authorization
 
COM
Common Operation and Maintenance
 
CoreMW
Core MiddleWare
 
CPE
Customer-Premises Equipment
 
CPG
Converged Packet Gateway
 
CS
Circuit Switch
 
CSR
Customer Service Request
 
CUDB
Ericsson Centralized User Database
 
DB
Database
 
DFC
Dynamic Filter Control
 
DHCP
Dynamic Host Configuration Protocol
 
DIT
Directory Information Tree
 
DL
Downlink
 
DLA
Data Layered Architecture
 
DN
Distinguished Name
 
DPI
Deep Packet Inspections
 
DRA
Diameter Routing Agent
 
DSCP
DiffServ Code Point
 
EBS
Ericsson Blade System
 
ECGI
E-UTRAN Cell Global Identifier
 
ECIM
Ericsson Common Information Model
 
ECLI
Ericsson Command-Line Interface
 
ECM
Ericsson Cloud Manager
 
EDS
Entity Data Source
 
EF
Enforcement Function
 
EFS
Evolved Flow Switch
 
eHRPD
Evolved High Rate Packet Data
 
ENIW
Network Integrated Wi-Fi
 
ENM
Ericsson Network Manager
 
vEPC
Virtual Evolved Packet Core
 
EPG
Evolved Packet Gateway
 
EPS
Evolved Packet System
 
ESy
Ericsson Sy
 
ETSI
European Telecommunications Standards Institute
 
E-UTRAN
Evolved Universal Terrestrial Radio Access Network
 
eVIP
Ericsson Evolved Virtual IP
 
FEE
Front-End Element
 
FLS
First Line Support
 
FQDN
Fully Qualified Domain Name
 
GBR
Guaranteed Bit Rate
 
GERAN
GSM EDGE Radio Access Network
 
GGSN
Gateway GPRS Support Node
 
GPRS
General Packet Radio Service
 
GTP
GPRS Tunneling Protocol
 
GUI
Graphical User Interface
 
HOT
Heat Orchestration Template
 
HTML
Hypertext Markup Language
 
HTTP
Hypertext Transfer Protocol
 
HTTPS
Hypertext Transfer Protocol Secure
 
HW
Hardware
 
IANA
Internet Assigned Numbers Authority
 
IEEE
Institute of Electrical and Electronics Engineers
 
IETF
Internet Engineering Task Force
 
IKE
Internet Key Exchange
 
ILOM
Integrated Lights Out Manager
 
IMEI
International Mobile Station Equipment Identity
 
IMEI-SV
IMEI Software Version
 
IMM
Information Model Management
 
IMS
IP Multimedia Subsystem
 
IMSI
International Mobile Subscriber Identity
 
INAP
Intelligent Network Application Protocol
 
IP
Internet Protocol
 
IP-CAN
IP Connectivity Access Network
 
IPoE
IP over Ethernet
 
IPsec
Internet Protocol Security
 
IPTV
Internet Protocol Television
 
ISDN
Integrated Services Digital Network
 
ISP
In-Service Performance
 
JSON
JavaScript Object Notation
 
KPI
Key Performance Indicator
 
KVM
Kernel-based Virtual Machine
 
LAC
Location Area Code
 
LAN
Local Area Network
 
LBE
Load Balancer Element
 
LDAP
Lightweight Directory Access Protocol
 
LDIF
LDAP Data Interchange Format
 
LDN
Local Distinguished Name
 
LKF
License Key File
 
LM
License Management
 
LOTC
Linux Open Telecom Cluster
 
M2M
Machine to Machine
 
MBC
Mobile Broadband Charging
 
MBR
Maximum Bit Rate
 
ME
Managed Element
 
MIB
Management Information Base
 
MIM
Management Information Model
 
MK1
Monitoring Key 1
 
MK2
Monitoring Key 2
 
MME
Mobility Management Entity
 
MMTEL
Multimedia Telephony
 
MO
Managed Object
 
MOI
Measured Object Instance
 
MOC
Managed Object Class
 
MOM
Managed Object Model
 
MOS
Mirantis OpenStack
 
MPS
Multimedia Priority Service
 
MSER
MultiService Edged Router
 
MSISDN
Mobile Subscriber ISDN Number
 
MSP
Multiservice Proxy
 
NAI
Network Access Identifier
 
NPI
Numeric Plan Indicator
 
NTP
Network Time Protocol
 
NSP
Network Server Platform
 
OAM
Operation and Maintenance
 
OCS
Online Charging System
 
ONT
Optical Network Termination
 
OSPF
Open Shortest Path First
 
OSS
Operations Support System
 
OTR
One Time Redirect
 
OVA
Open Virtual Appliance
 
OVF
Open Virtualization Format
 
OVS
Open Virtual Switch
 
PADI
PPPoE Active Discovery Initiation
 
PADO
PPPoE Active Discovery Offer
 
PADR
PPPoE Active Discovery Request
 
PADS
PPPoE Active Discovery Session
 
PADT
PPPoE Active Discovery Terminate
 
PCC
Policy Charging and Control
 
PCEF
Policy and Charging Enforcement Function
 
PCI
Peripheral Component Interconnect
 
PCRF
Policy and Charging Rules Function
 
P-CSCF
Proxy Call Session Control Function
 
PDC
Performance Data Collector
 
PDN
Public Data Networks
 
PDN-GW
PDN Gateway
 
PE
Provider Edge
 
PGW
Public Data Network (PDN) Gateway
 
PL
PayLoad
 
PLMN
Public Land Mobile Network
 
PM
Performance Management
 
PMF
Performance Management Files
 
PMIP
Proxy Mobile Internet Protocol
 
PNF
Physical Network Function
 
PPP
Point-to-Point Protocol
 
PRA
Presence Reporting Area
 
PS
Packet Switch
 
PSAP
Public Safety Answering Point
 
PXE
Pre-Boot Execution Environment
 
QCI
QoS Class Identifier
 
QEMU
Quick Emulator
 
QoS
Quality of Service
 
QCOW
QEMU Copy-On-Write file
 
RAA
Re-Authorization Answer
 
RAB
Radio Access Bearer
 
RAC
Routing Area Code
 
RAI
Routing Area Identity
 
RAID
Redundant Array of Independent Disks
 
RAN
Radio Access Network
 
RAR
Re-Authorization-Request
 
RAT
Radio Access Type
 
RCA
Root Cause Analysis
 
RDN
Relative Distinguished Name
 
REST
Representational State Transfer
 
RFSP
RAT/Frequency Selection Priority
 
RFC
Request for Comments
 
RMF
Resource Management Framework
 
RTCP
Real-Time Control Protocol
 
RTSP
Real-Time Session Protocol
 
SA
Service Area
 
SAC
Service Area Code
 
SAPC
Ericsson Service-Aware Policy Controller
 
SASN
Ericsson Service Aware Support Node
 
SBG
Session Border Gateway
 
SC
System Controller
 
SCE
Service Control Engine
 
SCX
System Control Switch
 
SDN
Software Defined Networking
 
SDP
Service Data Point
 
SDU
Service Data Unit
 
SE
Security Element
 
SELinux
Security-Enhanced Linux
 
SFTP
SSH File Transfer Protocol
 
SGSN
Serving GPRS Support Node
 
SGSN-MME
Serving GPRS Support Node and Mobility Management Entity
 
SIP
Session Initiation Protocol
 
SLA
Spending Limit Answer
 
SLES
SUSE Linux Enterprise Server
 
SLR
Spending Limit Request
 
SLS
Second Line Support
 
SMPP
Short Message Peer-to-Peer Protocol
 
SMS
Short Message Service
 
SMSC
Short Message Service Center
 
SNA
Spending-status Notification Answer
 
SNMP
Simple Network Management Protocol
 
SNR
Spending-status Notification Request
 
SOAP
Simple Object Access Protocol
 
SoC
Statement of Compliance
 
SPID
Subscriber Profile ID for RAT/Frequency Selection Priority
 
SPR
Subscription Profile Repository
 
SRVCC
Single Radio Voice Call Continuity
 
SSH
Secure Shell
 
SSID
Service Set Identifier
 
STA
Session-Termination-Answer
 
STR
Session-Termination-Request
 
TAI
Tracking Area Identity
 
TAU
Tracking Area Update
 
TDF
Traffic Detection Function
 
TFPT
Trivial File Transfer Protocol
 
THP
Traffic Handling Priority
 
TIPC
Transparent Inter-Process Communication
 
ToN
Type of Number
 
TP
Traffic Processor
 
TS
Technical Specification
 
TSA
TDF Session Answer
 
TSP
Ericsson Telecom Server Platform
 
TSR
TDF Session Request
 
UDC
User Data Consolidation
 
UE
User Equipment
 
UL
Uplink
 
ULI
User Location Information
 
URI
Uniform Resource Identifier
 
URL
Uniform Resource Locator
 
UTF
Unicode Transformation Format
 
vApp
Virtual Application
 
vCPE
Virtual Customer-Premises Equipment
 
VCPU
Virtual CPU
 
VDC
Virtual Data Center
 
VDP
Virtual Delivery Package
 
vDS
Virtual Distributed Switch
 
VIM
Virtualized Infrastructure Manager
 
VIP
Virtual IP
 
VIP_OAM
Operation and Maintenance Virtual IP
 
VLAN
Virtual Local Area Network
 
VM
Virtual Machine
 
VN
Virtual Network
 
VNF
Virtual Network Function
 
VNF-LCM
Virtual Network Function Life Cycle Manager
 
VNFM
Virtual Network Function Manager
 
VNI
VXLAN Network Identifier
 
VoLTE
Voice over LTE
 
VPN
Virtual Private Network
 
VR
Virtual Router
 
VRRP
Virtual Router Redundancy Protocol
 
VXLAN
Virtual eXtensible Local Area Network
 
Wi-Fi
Wireless Fidelity
 
WSDL
Web Services Description Language
 
XML
Extensible Markup Language
 
XSD
XML Schema Definition