Glossary of Terms and Acronyms
MTAS

Contents

1Introduction
1.1Related Information

2

Terms and Definitions
2.1A-E
2.2F-K
2.3L-P
2.4Q-T
2.5U-Z

Glossary

1   Introduction

This document is a summary of known abbreviations and terminology used by other documents to describe the MTAS Customer Product Information (CPI).

The defined terms, definitions, acronyms, and abbreviations are sorted in alphabetical order. Some abbreviations can have more than one definition.

General telecommunication vocabulary can be found at Institute for Telecommunication Sciences' (ICS) home page.

General telecommunication vocabularies are described at the following URL:

Other sources for glossary are available in the following home pages:

Other sources for glossary are available at the following URLs:

Scope

This document does not cover the following:

Target Groups

This document is intended for anyone who wants more knowledge about terms and definitions used in the CPI, describing the MTAS node.

1.1   Related Information

For information on trademarks, typographic conventions, definition, and explanation of abbreviations and terminology, refer to Trademark Information.

2   Terms and Definitions

The following sections define the terms and definitions used in the MTAS CPI.

2.1   A-E

ATCF Access Transfer Control Function. Node that acts as a B2BUA between a circuit switched network and the IMS core network. The ATCF coordinate the access transfer of a session between access and circuit switched networks.
ATGW Access Transfer Gateway. Node that handles the media transport on the boundary between the circuit switched and IMS core networks as defined by 3GPP architecture and procedures. The ATCF controls the ATGW using H.248.
ATU-STI Access Transfer Update - Session Transfer Identifier. Routable URI (SIP URI or E.164 number) pointing to SCC AS. It is a statically configured URI in SCC AS node.
Action An executable operation triggered by setting attributes on an MO. Each action is defined in the related MOC description.
Activation An action taken by a user or by a service provider to change the state of a service from inactive to active.
Alarm Raised by the system to indicate an unexpected behavior of malfunction requiring corrective action by the user. An alarm has at least state raise (initial detection of the fault) or clear (when the fault no longer exists). An alarm can also change state regarding perceived severity. Alarms are also called "stateful" alarms to emphasize that they have a state. An active alarm is an alarm that has been raised but not cleared.

All alarm state changes including cleared state are recorded in the Alarm Log. Each alarm has an alarm Operating Instructions document. It describes the possible fault reasons, fault locations, and the potential service impact. It also describes the procedure to execute to eliminate the problem and eventually clear the alarm.

Alert A stateless alarm, that is, an alarm that can only have the raised state. As an alarm, an alert has an associated Operating Instructions document and is reported in real time as an SNMP notification. Alerts are recorded in the Alert Log but are not exposed in any list over the NBI.
Alias Role Identity of a role, which has meaning to the user. An alias role is an alias for one or more real roles. The definition of alias role allows the user to use names of roles that the user is used to. Also, the same alias can be used for several real roles. The latter can be useful when different types of MEs have defined real roles with different names, but which requires the same (or similar) authority.
Application A service enabler deployed by service providers, manufacturers, or users. Individual applications are often enablers for a wide range of services. Defined in 3GPP TR 21.905.
API Application Programming Interface. A formalized set of software calls and routines that can be referenced by an application program to access supporting network services.
Arwa Arwa is a Heartbeat license management solution.
Attribute Represents the configuration. The read-only attributes in the MOs describe configuration state and operational values. The writable attributes control the operation and configuration for the particular network resource. Each attribute is defined in the related MOC description.
AVP Attribute-Value Pair. A data representation in an application. Diameter AVPs carry specific authentication, authorization, and accounting information, security information as well as configuration details for the request and the reply.
Authentication The process of verifying the identity of an entity.
Authorization The granting of permission based on authenticated identification.
BE Best Effort QoS. A QoS traffic class which provides minimal performance guarantees, allowing an unspecified variance in the measured performance criteria.
CNIP Calling Name Identity Presentation. The Calling Name Identity Presentation service alters the originating identity presented in a communication based on the preferences of the participants and information retrieved from an external node outside IMS.
CSCF Call Session Control Function. Several roles of SIP servers or proxies that are collectively called Call Session Control Function (CSCF). These are used to process SIP signalling packets in the IMS. See Proxy Call Session Control Function, Interrogating Call Session Control Function, and Serving Call Session Control Function for details regarding the different CSCF types within IMS.
Cardinality The number of elements in a set. Two sets with the same number of elements have the same cardinality.

Can exist in the MOM between MOs in parent-child relationships, and in associations between MOs.

Charging The process of gathering Charging input by serving elements, transferring it to Charging Control, processing of this information, by Charging Control and distributing the result of this processing to involved parties.
Complex activation/deactivation A state of a service that can be changed by a user using Ut interface.
CPI Customer Product Information. Documentation for an ME, delivered in the Active Library Explorer.
CSR Customer Service Request. Used during the trouble reporting process to describe the problems identified.
CAI3G Customer Administration Interface Third Generation. An Ericsson-defined SOAP-based protocol for provisioning.
Data Check The interrogation function that compares data input by a user during an interrogation procedure with the data stored about a service.
Data Model A mapping of the contents of an Information Model into a form that is specific to a particular type of data store or repository. A data model is basically the rendering of an information model according to a specific set of mechanisms for representing, organizing, storing, and handling data. In contrast to an Information Model, a Data Model includes implementation (and protocol-) specific details. That is, rules that explain how to map MOs onto lower-level protocol constructs.
Deactivation An action taken by a user (or by a service provider) to change the status of a service from active to inactive.
Derived Data Type Data type enhanced with extra restrictions and properties. Derived string data types contain, for example, length and content constraints. Derived integer data types contain extra range constraints. Each derived data type is defined in the related MOC description.
Dh The name of the interface reference point between the SLF and the SIP AS.
DN Distinguished Name. The name of an object or an object tree that is shared between the system and the Management System. The DN is in 3GPP format (from root to leave). The DN is used to identify an MO uniquely in the system. It gives the path of the MO in the tree of objects. The system uses 3GPP formatted DNs where each relative DN part consists of the MOC name equal the MO identity. If the key attribute name is not equal to the MOC name plus ID, then the key attribute name is also appended to the MOC name separated by a dot.
ECIM Ericsson Common Information Model. Controls the MOM structure. The ECIM is based on the CIM standard.
ECLI Ericsson Command-Line Interface. A terminal-based command-line interface that is used to monitor and manage the ME. The ECLI is based on industry de facto standard patterns.
Embedded tel URI Embedded tel URI implies the tel URI <local-number> along with the phone-context or tel URI <global-number> parts are embedded between the “:”, and “@” characters in a SIP URI.
Enumeration Integer-name pairs defining a fixed set of named values for an attribute, return value, or action parameter. Each enumeration is defined in the MOM.
Erasure An action taken by a user (or by a service provider) to delete data stored for a particular service by a previous registration.
Ericsson NETCONF Interface A machine to machine interface for configuration management of the ME using the NETCONF protocol over the Secure Shell.
Event Occurrence of significance to users, the MEs under surveillance and network management specifications. Events do not have states.
Erasure An action taken by a user (or by a service provider) to delete data stored for a particular service by a previous registration.
XML Extensible Markup Language. Markup language that describes data formats and the information model. XML represents structured data in textual form, and is similar in concept to HTML.

2.2   F-K

GP Granularity Period. The time between the initiation of two successive gatherings of measurement data.
GSM Compatible SSF The GSM Compatible SSF feature introduces an integrated SSF function supporting CAPv2 protocol. This function makes it possible to support legacy IN services already available in existing service layer when introducing Voice over LTE with MMTel.
HA High Availability. A system or component that is continuously operational for a desirably long length of time. Availability is measured relative to 100% operational status.
Heartbeats Used by a Management System to monitor the interface over which the alarms or alerts are to be sent. Heartbeats are needed because a management system cannot assume that a "silent" ME behaves properly. The Heartbeat event is reported as an SNMP notification at regular intervals.
HSS Home Subscriber Server. An IMS database that contains the subscription-related information (subscriber profiles), performs authentication and authorization of the user, and can provide information about the location of the subscriber and IP information.
ICS Enhanced MSC An MSC with extra ICS functionality such as interworking functionality between CS and IMS for an ICS user the CS user-network signaling interworking with IMS/SIP signaling for bearer control.
ICS UE The VoLTE UE with extra ICS-specific functionality such as service control communication with SCC AS (over Gm or I1), executes ADS for originating sessions, assists SCC AS in T-ADS.
ICS User An IMS subscriber that uses IMS Centralized Services as service domain regardless of the access type, CS, or PS.
ICS IMS Common System. A common base for both wireline and wireless applications on which operators can introduce their IMS services.
ISC IMS Service Control Interface. The ISC interface is able to support subscription of event notifications between the AS and the S-CSCF to allow the AS to be notified of the implicit registered Public User Identities, registration state, and UE capabilities. Defined in 3GPP TS 23.228.
IMS Voice over PS support The PS access network supports bidirectional speech media.
Information Model An abstraction and representation of the entities (or MOs) in a managed environment, their properties, attributes, and operations, as well as the way that they relate to each other. It is independent of any specific repository, software use, protocol, or platform.
Interrogation An action taken by a user to request information from a service provider about a particular service. The interrogation function includes Status Check, Data Request, and Data Check.
Invocation An action taken by a user, on a per call basis, to start (for example, temporarily activate) a supplementary service.

2.3   L-P

Load Balancing A feature that balances the load over a cluster of processors. It exposes only one IP address for the control plane independent of the number of processors configured to handle traffic to or from that network.
LOTC Linux Open Telecom Cluster. Provides a Linux cluster with High Availability characteristics. The system is an adapted and preconfigured version of the SUSE Linux Enterprise Server (SLES) distribution with added cluster level tooling and services.
Man–Machine Interface The interface through which a user communicates with a telecommunications terminal or through a telecommunications terminal to a telecommunication service provider.
Managed Object Management A folder in the Active Library Explorer that contains the MOM.
Marshalling Marshalling is the process of transforming the memory representation of an object to a data format suitable for storage or transmission (similar to serialization). It is typically used when data must be moved between different parts of a computer program or from one program to another.
ME Managed Element.

An entity that supports the management functionality needed for a specific resource that can be one or more of: network components, host systems, or applications. Managed objects are conceptual views of said resources that are being managed or exist to support management such as event logging. Therefore, a Managed Object is an abstraction of such a resource that represents its properties as seen by (and for the purposed of) management. An MO can also represent a relationship between a resource or a set of resources. A Managed Object is defined by the attributes visible at its boundary, the management operations which can be applied to it, the behavior exhibited by it in response to management operations or in reaction to other types of stimuli. These can be either internal (for example, threshold crossing) or external (for example, interaction with other objects), or notifications emitted by it.

MIB Management Information Base. A set of managed objects in a management domain, together with their attributes, constitutes that management MIB of the domain. MIB is also used in SNMP for trap and counter-definition.
MIM Management Information Model. A view of the MOM, where certain parts of the MOM can be hidden from the user, depending on the use case. The MOM is traditionally stored offline, while a MIM is traditionally stored online for use by tools. Often the MIM is represented in a different language to the MOM, for example, XML. There is normally one file, in whatever modeling format, per MIM. The cardinality between a MOM and a MIM is one to one.
MO Managed Object. A software object that encapsulates the manageable characteristics and behavior of a particular hardware or software resource. An MO is an instance of a MOC. An MO normally has attributes that provide information used to characterize the MOs that belong to the MOC. An MO can also have actions that allow the user to perform operations on the underlying implementation.
MOC Managed Object Class. A description of all the common characteristics for several Managed Objects, such as their attributes, operations, notifications, and behaviors.
MOM Managed Object Model. A structured collection of configuration information that defines the O&M capability on an ME. The MOM is defined as a set of MOCs. The MOCs contain attributes representing the configuration that can be performed by the user, and actions representing the operations that can be started by the user. The MOM is a static blueprint for the creation of the actual object model.
MMTel Multimedia Telephony, one of the IMS Service formats that provide the user with services belonging to the telephony service format.
MMTel session A Multimedia Telephony SIP session.
NBI Northbound Interface. The interface to a Management System and a CLI client. The protocols used are ECLI, NETCONF, SFTP, and SNMP.
NETCONF Network Configuration. A network management protocol developed in the IETF and published as RFC 4741.
NFS Network File System. The NFS server disk is visible as local.
Notification A general term for a message that carries an alarm or alert instance.
Offline Charging 3GPP term: A mechanism where Charging information does not affect, in real time, the service rendered (3GPP TS 32.260).
Online Charging 3GPP term: A mechanism where Charging information can affect, in real time, the service rendered, and therefore a direct interaction of the Charging mechanism with session/service control is required (3GPP TS 32.260).
Originating session A session handled on behalf of an originating user.
PAI P-Asserted-Identity. A header field that contains a URI (commonly a SIP URI) and an optional display-name. The header field is used among trusted SIP entities (typically intermediaries) to carry the identity of the user sending a SIP message as it was verified by authentication.
PM Performance Management. A functional area for collection and configuration of performance data.
PMF Performance Management Framework. A single framework to report and manage performance measurements.
P-Header Private Header
PUI Public User Identity. An identity used within the home domain of an IMS network to uniquely identify a user profile. It is the address used for establishing a session to the user. The PUI has the form of either a SIP URI or a tel URI. Defined in 3GPP TS 23.003.

2.4   Q-T

Registration An action taken by a user (or by a service provider) to store specific data necessary to enable subsequent operation of a service.
Rf The name of the interface reference point between the SIP AS and the CDF.
Ro The name of the interface reference point between the SIP AS and the OCF.
Role Equivalent to the user occupation within an organization, for example, System Administrator. A user can have one or more roles.
Rule Authorization rules specify the permissions to a set of resources within the ME. The authorization rules are grouped into roles. Authorization rules are defined locally on the ME.
SDP Software Delivery Package. An archive file (TAR file) with RPM® software packages and a file describing the Ericsson product data. A software item can be an SDP. A software item represents any kind of Ericsson software product that is present on the ME.
Separator A one-character string, the star (*) symbol, used within a command dialogue control action to separate two-digit strings. The digit strings can be a service code or a supplementary information string.
SCC AS Service Centralization and Continuity Application Server. The Service Centralization and Continuity Application Server is an application server in the home IMS network of the served UE supporting at least one of the SRVCC, SDS, or T-ADS functions.
Service Code A two or three digit string used within a command dialogue control action to identify a supplementary service.
Service Code Prefix A one or two character string preceding the service code and indicating which set of functions is to be applied to a service, within a command dialogue control action.
SDS Service Domain Selection. The Service Domain Selection function selects IMS as service domain for VoLTE UE originating at 2G/3G CS access.
Serving Element The role played by a system interacting with Charging control for Charging.
Service Suffix A one-character string (usually a square symbol #) used within a command dialogue control action to define the end of the command string.
Session Charging Method performing subsequent Charging requests during delivery of a service. Charging of a voice call is a typical example for use of session Charging.
SDP Session Description Protocol. Intended for describing multimedia sessions for the purposes of session announcement, session invitation, and other forms of multimedia session initiation. Defined in IETF RFC 2327.
SF System Functions. Common system functions and resources for the management entity such as Fault Management (Fm), Performance Management (Pm), and Security Management (SecM). SystemFunctions is one of the first-level branches in the MOM.
Sh The name of the interface reference point between the HSS and the SIP AS.
SIP Session Initiation Protocol. A signaling protocol for creating, modifying, and terminating sessions with one or more participants. Defined in IETF RFC 3261.
STN-SR Session Transfer Number - Single Radio. A routable URI of E.164 format pointing to SCC AS using SRVCC R9 or to the visited ATCF using SRVCC R10.

The following is a description of the SRVCC R9 and SRVCC R10 respectively:

  • R9

    The STN-SR pointing to SCC AS is statically associated with the C-MSISDN of the subscriber.

  • R10

    The STN-SR pointing to the visited ATCF is dynamically associated with the C-MSISDN of the subscriber during the registration procedures.

SIP URI A SIP address.
SRVCC Single Radio Voice Call Continuity. The SRVCC function allows voice call continuity between IMS over PS access and CS access for calls that are anchored in IMS when the UE can transmit/receive on only one of those access networks at a given time.
Status Check The interrogation function that enables a user to request information on the existing status of a designated service.
SCTP Stream Control Transmission Protocol. A reliable transport protocol operating on top of IP. It provides acknowledged error free non-duplicated transfer of data. SCTP also detects data corruption, loss of data, and duplication of data by using checksums and sequence numbers. Defined in IETF RFC 2960.
Struct Handles structured attributes that can contain an arbitrary number of elements of the same or different type. Each struct is defined in the related MOC description.
SUM A subtype of performance measurements status inspection.
Supplementary Service Functions The collection of functions that are commonly applied in supplementary services including; Activation, Deactivation, Disabling, Erasure, Interrogation, Invocation, Provision, Registration, and Withdrawal.
Syntax The particular sequence of service prefix, service code, separator, supplementary information, service suffix, and so on, specified for a command dialogue information string.
SysM System Management. Represents the system-level functions such as time handling and version handling. SysM is a system function.
Tel URI A telephone address.
T-ADS Terminating Access Domain Selection. The Terminating Access Domain Selection (T-ADS) function is executed to select the terminating access domain for the VoLTE UE (CS or PS). The access domain is selected based on registered contacts data, on access type for ongoing VoLTE session and most recent VoLTE session, and on the T-ADS information (if the current location access network supports IMS Voice over PS) obtained from HSS.
Terminating session A session handled on behalf of a terminating user.
Terminating unregistered session A session handled on behalf of a terminating unregistered user.
Registration An action taken by a user (or by a service provider) to store specific data necessary to enable subsequent operation of a service.
Rf The name of the interface reference point between the SIP AS and the CDF.
Ro The name of the interface reference point between the SIP AS and the OCF.
Role Equivalent to the user occupation within an organization, for example, System Administrator. A user can have one or more roles.
Rule Authorization rules specify the permissions to a set of resources within the ME. The authorization rules are grouped into roles. Authorization rules are defined locally on the ME.
SDP Software Delivery Package. An archive file (TAR file) with RPM® software packages and a file describing the Ericsson product data. A software item can be an SDP. A software item represents any kind of Ericsson software product that is present on the ME.
Separator A one-character string, the star (*) symbol, used within a command dialogue control action to separate two-digit strings. The digit strings can be a service code or a supplementary information string.
SCC AS Service Centralization and Continuity Application Server. The Service Centralization and Continuity Application Server is an application server in the home IMS network of the served UE supporting at least one of the SRVCC, SDS, or T-ADS functions.
Service Code A two or three digit string used within a command dialogue control action to identify a supplementary service.
Service Code Prefix A one or two character string preceding the service code and indicating which set of functions is to be applied to a service, within a command dialogue control action.
SDS Service Domain Selection. The Service Domain Selection function selects IMS as service domain for VoLTE UE originating at 2G/3G CS access.
Serving Element The role played by a system interacting with Charging control for Charging.
Service Suffix A one-character string (usually a square symbol #) used within a command dialogue control action to define the end of the command string.
Session Charging Method performing subsequent Charging requests during delivery of a service. Charging of a voice call is a typical example for use of session Charging.
SDP Session Description Protocol. Intended for describing multimedia sessions for the purposes of session announcement, session invitation, and other forms of multimedia session initiation. Defined in IETF RFC 2327.
SF System Functions. Common system functions and resources for the management entity such as Fault Management (Fm), Performance Management (Pm), and Security Management (SecM). SystemFunctions is one of the first-level branches in the MOM.
Sh The name of the interface reference point between the HSS and the SIP AS.
SIP Session Initiation Protocol. A signaling protocol for creating, modifying, and terminating sessions with one or more participants. Defined in IETF RFC 3261.
STN-SR Session Transfer Number - Single Radio. A routable URI of E.164 format pointing to SCC AS using SRVCC R9 or to the visited ATCF using SRVCC R10.

The following is a description of the SRVCC R9 and SRVCC R10 respectively:

  • R9

    The STN-SR pointing to SCC AS is statically associated with the C-MSISDN of the subscriber.

  • R10

    The STN-SR pointing to the visited ATCF is dynamically associated with the C-MSISDN of the subscriber during the registration procedures.

SIP URI A SIP address.
SRVCC Single Radio Voice Call Continuity. The SRVCC function allows voice call continuity between IMS over PS access and CS access for calls that are anchored in IMS when the UE is capable of transmitting/receiving on only one of those access networks at a given time.
Status Check The interrogation function that enables a user to request information on the existing status of a designated service.
SCTP Stream Control Transmission Protocol. A reliable transport protocol operating on top of IP. It provides acknowledged error free non-duplicated transfer of data. SCTP also detects data corruption, loss of data, and duplication of data by using checksums and sequence numbers. Defined in IETF RFC 2960.
Struct Handles structured attributes that can contain an arbitrary number of elements of the same or different type. Each struct is defined in the related MOC description.
SUM A subtype of performance measurements status inspection.
Supplementary Service Functions The collection of functions that are commonly applied in supplementary services including; Activation, Deactivation, Disabling, Erasure, Interrogation, Invocation, Provision, Registration, and Withdrawal.
Syntax The particular sequence of service prefix, service code, separator, supplementary information, service suffix, and so on, specified for a command dialogue information string.
SysM System Management. Represents the system-level functions such as time handling and version handling. SysM is a system function.
Tel URI A telephone address.
T-ADS Terminating Access Domain Selection. The Terminating Access Domain Selection (T-ADS) function is executed to select the terminating access domain for the VoLTE UE (CS or PS). The access domain is selected based on registered contacts data, on access type for ongoing VoLTE session and most recent VoLTE session, and on the T-ADS information (if the current location access network supports IMS Voice over PS) obtained from HSS.
Terminating session A session handled on behalf of a terminating user.
Terminating unregistered session A session handled on behalf of a terminating unregistered user.
Transaction Configuration changes are applied through atomic transactions. Thus, it is ensured that all or none of the operations are executed.
Transport Management Transport-related functions and resources, for example, load sharing between all configured and available blades in the cluster, and distribution of incoming traffic to the system. Transport is one of the first-level branches in the MOM.
Trap An unacknowledged SNMP message that carries a notification or heartbeat.

2.5   U-Z

Unmarshalling Unmarshalling is the process of transforming a data format representation of and object to its memory representation (similar to deserialization). It is typically used when data must be moved between different parts of a computer program or from one program to another.
URI Uniform Resource Identifier. A URI is a compact string of characters for identifying an abstract or physical resource. Defined in IETF RFC 2396.
Upgrade A product or product version that is created to provide an increased level of functionality or performance to a user. Upgrade is also the operation to replace a previous product or product version with a new product or product version that provides an increased level of functionality.
UA User Agent. An endpoint in a SIP-based network.
UDP User Datagram Protocol. Part of the TCP/IP protocol suite, UDP is a standard, connectionless, host-to-host protocol that is used over packet-switched computer communications networks. UDP is typically used for real-time applications. Defined in IETF RFC 768.
Ut An integration reference point between the client and XDMS.
VoLTE UE Voice over LTE capable UE (according to IR.92) with IMS as service domain. LTE supports 3GPP accesses and an Evolved Packet Core (EPC) interfacing the IMS core.
XDMS XML Document Management Server. A server that stores and manages XML documents on behalf of network applications. The XML documents often contain configuration data for application services, for example, MMTel subscriber configuration data for MTAS. An XDMS can store documents for multiple applications. Within each application, there are documents stored for each user. Each user can have multiple documents for a particular application.

Glossary

2PTY
Two Parties
 
3DES
Triple Data Encryption Standard
 
3G
Third Generation
 
3GPP
3rd Generation Partnership Project
 
3GPP2
3rd Generation Partnership Project 2
 
3PCC
Third-Party Call Control
 
3PP
Third Party Products
 
3PTY
Three Party Service
 
AAA
Authentication, Authorization and Accounting
 
AbDial
Abbreviated Dialing
 
ABNF
Augmented Backus-Naur Form
 
AC
Area Code
 
ACA
Accounting Control Answer
 
ACR
Anonymous Communication Rejection | Accounting-Request | Accounting Control Request | Apply Charging Report
 
ADS
Access Domain Selection
 
AES
Advanced Encryption Standard
 
AGCF
Access Gateway Control Function
 
ALB
Abstract Load Balancer
 
AMF
Availability Management Framework
 
AN
Abbreviated Number
 
ANDUB
Approaching Network Determined User Busy
 
ANSI
American National Standards Institute
 
AoC
Advice of Charge
 
AoC-D
Advice of Charge During
 
AoC-E
Advice of Charge End
 
AoC-S
Advice of Charge Start
 
AOR
Address Of Record
 
API
Application Programming Interface
 
AppTrace
Application Trace
 
ARP
Address Resolution Protocol
 
AS
Application Server
 
ASCII
American Standard Code for Information Interchange
 
ATCF
Access Transfer Control Function
 
ATGW
Access Transfer Gateway
 
ATM
Asynchronous Transfer Mode
 
ATU
Access Transfer Update
 
ATU-STI
Access Transfer Update - Session Transfer Identification
 
AT&T
American Telephone & Telegraph
 
AuC
Additional User Category
 
AUID
Application Unique Identifier
 
AV
Audio Video
 
AVC
Attribute Value Change
 
AVP
Attribute-Value Pair | Audio-Visual Profile
 
AVPF
Audio-Visual Profile with Feedback
 
B2BUA
Back-to-Back User Agent
 
BB
Broad Band
 
BCI
Backward Call Indicator
 
BCSM
Basic Call State Model
 
BE
Best Effort QoS
 
BFD
Bidirectional Forwarding Detection
 
BFCP
Binary Floor Control Protocol
 
BICC
Bearer-Independent Call Control
 
BP
Barring Program
 
BRM
Back up and Restore Management
 
BSP
Blade Server Platform
 
BSS
Business Support System
 
C-MSISDN
Correlation Mobile Subscriber Integrated Services Digital Network
 
CA
Capsule Abortion | Charge Area
 
CAC
Call Admission Control | Carrier Access Code
 
CAI3G
Customer Administration Interface Third Generation
 
CAMEL
Customized Applications for Mobile Networks Enhanced Logic
 
CAP
CAMEL Application Part
 
CARI
Carrier Information
 
CAS
Conference Administration Server
 
CAT
Customized Alerting Tones
 
CAT-S
Customized Alerting Tones Server
 
CB
Communication Barring
 
CC
Call Completion | Cumulative Counter | Communication Completion | Conference Creator | Country Code
 
CC-AC
Country Code and Area Code
 
CCA
Credit Control Answer
 
CCBS
Communication Completion Busy Subscriber
 
CCF
Charging Collection Function
 
CCFH
Credit Control Failure Handling
 
CCMP
Centralized Conferencing Manipulation Protocol
 
CCNL
Call Completion Not Logged-in
 
CCNR
Communication Completion by No Reply
 
CCR
Credit Control Request
 
CD
Call Deflection | Communication Deflection
 
CDF
Charging Data Function
 
CDIV
Communication Diversion
 
CDIVAll
Communication Diversion All
 
CDIVN
Communication Diversion Notification
 
CDP
Charge Determination Point
 
CDR
Charging Data Record
 
CDS
Communication Details Server
 
CDTF
Communication Details Transfer Function
 
CEA
Capabilities-Exchange-Answer
 
CEPT
European Conference of Postal and Telecommunications Administrations
 
CER
Capabilities-Exchange-Request
 
CertM
Certificate Management
 
CFB
Communication Forwarding on Busy
 
CFBNRVM
Communication Forwarding on No Reply or Forwarding on Busy to Voice Mail
 
CFBVM
Communication Forwarding on Busy to Voice Mail
 
CFCOND
Communication Forwarding Conditional
 
CFNL
Communication Forwarding Not Logged in
 
CFNR
Communication Forwarding on No Reply
 
CFNRc
Communication Forwarding Not Reachable
 
CFNRVM
Communication Forwarding on No Reply to Voice Mail
 
CFP
Communication Forwarding on Presence
 
CFU
Communication Forwarding Unconditional
 
CFUVM
Communication Forwarding Unconditional to Voice Mail
 
CFx
Any of CFB, CFU, and CFNR
 
CGI
Cell Global Identification
 
CI
Charge Information
 
CIC
Carrier Identification Code
 
CIEC
Chosen Interexchange Carrier
 
CIM
Common Information Model
 
CIRp
Call Information Report
 
CIT
Charge Information Type
 
CLB
Converged SIP/HTTP Load Balancer
 
CLI
Command-Line Interface
 
CLM
Cluster Membership
 
CM
Configuration Management
 
CMCO
Common Component
 
CMP
Certificate Management Protocol
 
CMPv2
Certificate Management Protocol version 2
 
CN
Common Name
 
CNIP
Calling Name Identity Presentation
 
CNS
Calling Name Server | Conference Notification Service
 
CON
Connect
 
COOB
Call Out Of the Blue
 
cp
common policy
 
CP
Conference Participant | Correction Package
 
CP Manager
Common Parts Manager
 
CPIM
Common Presence and Instant Messaging (see RFC 3862)
 
CPE
Customer-Premises Equipment
 
CPI
Customer Product Information
 
CPS
Carrier Pre-Select
 
CPSRn
Carrier Pre-Select Rn
 
CPU
Central Processing Unit
 
CR
Change Request
 
CS
Charging Server | Carrier Select | Capability Set | Circuit Switched
 
CSC
Carrier Select Code
 
CSCF
Call Session Control Function
 
CSI
CAMEL Subscription Information
 
CSR
Customer Service Request
 
CSRN
CS domain Routing Number
 
CSRn
Carrier Select Rn
 
CUA
Capabilities Update Answer
 
CUG
Closed User Group
 
CUR
Capabilities Update Request
 
CW
Communication Waiting
 
CWA
Communication Waiting Active
 
CWU
Communication Waiting Used
 
DAI
Dial Around Indicator
 
DBL
Dynamic Black List
 
DBN
Database Network
 
DBS
Database Service
 
DCN
Data Communication Network
 
DER
Discrete Event Registration | Distinguished Encoding Rules
 
DES
Data Encryption Standard
 
DN
Directory Number (of a called party) | Distinguished Name
 
DNDCF
Communication Forwarding Do Not Disturb
 
DNDCFVM
Communication Forwarding Do Not Disturb to Voice Mail
 
DNDCB
Do Not Disturb Communication Barring
 
DNM
Dialed Number Mapping
 
DNS
Domain Name Server/System
 
DP
Detection Point
 
DPA
Disconnect Peer Answer
 
DPR
Disconnect Peer Request
 
DR
Distinctive Ring
 
DRBD
Distributed Replicated Block Device
 
DSA
Dialed String Analysis
 
DSCP
Differentiated Services Code Point
 
DSL
Digital Subscriber Line
 
DST
Daylight Saving Time
 
DTLS
Datagram Transport Layer Security
 
DTM
Dial Tone Management
 
DTMF
Dual-Tone Multifrequency
 
DWA
Device Watchdog Answer
 
DWR
Device-Watchdog-Request
 
ECDSA
Elliptic Curve Digital Signature Algorithm
 
ECF
Event Charging Function
 
ECIM
Ericsson Common Information Model
 
ECGI
E-UTRAN Cell Global Identifier
 
ECLI
Ericsson Command-Line Interface
 
ECM
Ericsson Cloud Manager
 
ECMP
Equal-Cost Multipath
 
EJB
Enterprise JavaBeans
 
ECT
Explicit Communication Transfer
 
EMA
Ericsson Multi Activation
 
E-MRFC
External MRFC
 
E-MSC
ICS Enhanced MSC
 
ENUM
E.164 Number Mapping
 
EP
Emergency Package
 
EPC
Evolved Packet Core
 
EPS
Evolved Packet System
 
ERB
Event Report BCSM
 
ERSIP
Evolved Realm Specific Internet Protocol
 
ETSI
European Telecommunications Standards Institute
 
eVIP
Evolved Virtual Internet Protocol
 
FA
Flexible Alerting
 
FAC
Feature Access Code | Feature Activation Code
 
FC
Function Code
 
FCD
Flexible Communication Distribution
 
FCDDP
Flexible Communication Distributions Divert Primary
 
FCH
Flexible Charging
 
FCI
Furnish Charging Information | Forward Call Indicator
 
FE
front end
 
FEE
front-end element
 
FIFO
First In, First Out
 
FM
Fault Management
 
FMC
Fixed and Mobile Convergence
 
FQDN
Fully Qualified Domain Name
 
FS
File Server
 
FSFS
Flexible Service Format Selection
 
FTP
File Transfer Protocol
 
FTU
File Transfer Utility
 
FUA
Final Unit Action
 
FUI
Final Unit Indication
 
GED
Generic Ericsson Device
 
GCAC
Group Call Admission Control
 
GETS
Government Emergency Telecommunications Service
 
GM
Gateway Model
 
GMSC
Gateway Mobile Switching Center
 
GP
Granularity Period
 
GRUU
Globally Routable User Agent URI
 
GSM
Global System for Mobile Communications
 
gsmSCF
GSM Service Control Function
 
gsmSSF
GSM Service Switching Function
 
GSN
Global Subscriber Number
 
GSU
Granted Service Units
 
GUI
Graphical User Interface
 
HA
High Availability
 
HCM
Health Check Management
 
HF
Human Factors
 
HI
History
 
HLR
Home Location Register
 
HO
Handover
 
HOT
Heat Orchestration Template
 
HSPA
High-Speed Packet Access
 
HSS
Home Subscriber Server
 
HTML
Hypertext Markup Language
 
HTTP
Hypertext Transfer Protocol
 
HTTPS
Hypertext Transfer Protocol Secure
 
HW
Hardware
 
ICMP
Internet Control Message Protocol
 
I-CSCF
Interrogating–CSCF
 
IAD
Integrated Access Device
 
IANA
Internet Assigned Numbers Authority
 
IBCF
Interconnection Border Control Function
 
ICB
Incoming Communication Barring
 
ICBS
Interconnection Charge Billing System
 
ICID
IMS Charging Identifier
 
ICN
Incoming Call Number | Incoming Communication Number
 
ICS
IMS Common System | IMS Centralized Services
 
ICSI
IMS Communication Service Identifier
 
ID
Incoming Dialog
 
IDP
International Dialing Prefix | Initial Detection Point
 
IdPres
Identity Presentation
 
IEC
Immediate Event Charging | Interexchange Carrier
 
IEEE
Institute of Electrical and Electronics Engineers
 
IETF
Internet Engineering Task Force
 
iFC
Initial Filter Criteria
 
IKE
Internet Key Exchange
 
IMM
Information Model Management
 
IMRN
IP Multimedia Routing Number
 
IMS
IP Multimedia Subsystem
 
IMSI
International Mobile Subscriber Identity
 
IMPU
IP Multimedia Public Identity
 
IN
Intelligent Network
 
INAP
Intelligent Network Application Protocol
 
I/O
Input/Output
 
IOI
Inter-Operator Identifier
 
IP
Internet Protocol
 
IPsec
Internet Protocol Security
 
IPv4
IP version 4
 
IPv6
IP version 6
 
IPVS
Internet Protocol Virtual Server
 
IRI
Internationalized Resource Identifier
 
IRP
Integration Reference Point
 
IRS
Implicit Registration Set
 
ISC
IMS Service Control | IP Multimedia Service Control | IMS Centralized Services
 
ISDN
Integrated Services Digital Network
 
ISO
International Organization for Standardization
 
ISP
In-Service Performance
 
ISUP
ISDN User Part
 
ITU
International Telecommunication Union
 
ITU-T
International Telecommunication Union Telecommunication Standardization Sector
 
IVR
Interactive Voice Recognition
 
IW
Interworking
 
JC
Japanese Charging
 
KPI
Key Performance Indicator
 
LAI
Location Area Identity
 
LAN
Local Area Network
 
LBE
Load Balancer Element
 
LCT
Local Craft Terminal
 
LDAP
Lightweight Directory Access Protocol
 
LDIF
LDAP Data Interchange Format
 
LDN
Local Distinguished Name
 
LM
License Management
 
LEAs
Law Enforcement Agency
 
LKF
License Key File
 
LM
License Management
 
LOTC
Linux Open Telecom Cluster
 
LSDP
The SDP of the local descriptor of a termination
 
LTE
Long Term Evolution
 
MAC
Media Access Control
 
MAP
Mobile Application Part
 
MCC
Mobile Country Code
 
MCID
Malicious Communication Identification
 
MCR
Malicious Communication Rejection
 
MD5
Message-Digest algorithm 5
 
MDF
Model Delivery Function
 
ME
Managed Element
 
MG
Media Gateway
 
MGC
Media Gateway Controller
 
MGCF
Media Gateway Control Function
 
MIB
Management Information Base
 
MID
Message Identifier
 
MIM
Management Information Model
 
MIME
Multipurpose Internet Mail Extensions
 
MMAS
Multimedia Application Server
 
MME
Mobility Management Entity
 
MMI
Man–Machine Interface
 
MMTel
Multimedia Telephony
 
MNC
Mobile Network Code
 
MO
Managed Object | Mobile Originated Call
 
MOC
Managed Object Class
 
MOI
Managed Object Instance
 
MOId
Managed Object Identifier
 
MOM
Managed Object Model
 
MRF
Media Resource Function
 
MRFC
Media Resource Function Controller
 
MRFP
Media Resource Function Processor
 
MS
Mobile Station
 
MSC
Mobile Switching Center
 
MSISDN
Mobile Subscriber Integrated Services Digital Network
 
MSRN
MS Routing Number
 
MSRP
Message Session Relay Protocol
 
MSS
Mobile Soft Switch
 
MT
Mobile Terminated call
 
MTP
Message Transfer Part
 
MW
Middleware
 
MWI NA
MWI NA Message Waiting Indicator Not Applicable
 
N
Number (a one-digit number)
 
NA
Network Announcement
 
NAI
Network Access Identifier
 
NBI
Northbound Interface
 
N-CSI
Network CAMEL Subscription Information
 
NANP
North American Numbering Plan
 
NAT
Network Address Translation
 
NBI
Northbound Interface
 
NCC
NorthboundCallControl
 
ND
New Destination | New Destination Number
 
NDP
National Dialing Prefix
 
NDUB
Network Determined User Busy
 
NE
Network Element
 
NETCONF
Network Configuration
 
NFS
Network File System
 
NMS
Network Management System
 
NN
Number Normalization
 
NM
Network Management | Node Management
 
NMS
Network Management System
 
NNI
Node Network Interface
 
NOC
Network Operations Center
 
NP
Number Portability
 
NPA
Numbering Plan Areas
 
NPIN
New PIN
 
NPLI
Network Provided Location Information
 
nPMF
new Performance Management Framework
 
NSN
National Service Number | National Significant Number
 
NTP
Network Time Protocol
 
NTT
Nippon Telegraph and Telephone Corporation
 
O&M
Operation and Maintenance
 
O-CSI
Originating CAMEL Subscription Information
 
O-IOI
Originating Inter-Operator Identifier
 
O-SDS
Originating SDS
 
OAM
Operation, Administration, and Maintenance | Operation and Maintenance
 
OAUC
Originating Additional User Category
 
OCB
Outgoing Communication Barring | Originating Communication Barring
 
OCF
Online Charging Function
 
OCNIP
CNIP on originating MMTel AS
 
OCOBP
Operator Controlled Outgoing Barring Program
 
ocp
OMA common policy
 
OCS
Online Charging System
 
OCT
Operator Controlled Transfer
 
OD
Outgoing Dialog
 
OID
Object Identifier
 
OIP
Originating Identity Presentation
 
OIR
Originating Identity Restriction
 
OLP
Overload Protection
 
OMA
Open Mobile Alliance
 
OPI
Operating Instruction
 
OPIN
Old PIN
 
oPMF
old Performance Management Framework
 
OrigTerm
Originating and Terminating
 
OS
Operating System
 
OSI
Open Systems Interconnection
 
OSN
Operator Service Number
 
OSPF
Open Shortest Path First
 
OSS
Operations Support System
 
OTP
Operating Telephony Provider
 
OVA
Open Virtualized Architecture
 
OVP
Open Virtualization Format
 
P-CSCF
Proxy–CSCF
 
P-P-N-I
P-Private-Network-Indication
 
PA
Presence Agent
 
PAI
P-Asserted-Identity
 
PAM
Pluggable Authentication Module
 
PANI
P-Access-Network-Information
 
PBX
Private Branch Exchange
 
PC
Personal Computer | Probable Cause
 
PCFA
P-Charging-Function-Addresses
 
PCV
P-Charging-Vector
 
PDF
Probability Density Function
 
PDU
Protocol Data Unit
 
PEM
Privacy Enhanced Mail
 
PGM
Presence and Group Management
 
PIDF
Presence Information Data Format (RFC 3863)
 
PIN
Personal Identification Number
 
PKCS
Public-Key Cryptography Standards
 
PKI
Public-Key Infrastructure
 
PL
Payload
 
PM
Performance Management | Performance Measurement
 
PMD
Processor Module with Disk
 
PMF
Performance Management Framework
 
PMTU
Path Maximum Transmission Unit
 
POI
Point of Interface
 
POSIX
Portable Operating System Interface
 
POT
Persistent Object Type
 
PRACK
Provisional Response Acknowledgment
 
PS
Packet Switched | Presence Server | Previous Store | Protocol Specification
 
PSI
Public Service Identifier | Public Service Identity
 
PSK
Preshared Key
 
PSTN
Public Switched Telephone Network
 
PUI
Public User Identity
 
PUID
Passport Unique ID
 
PXE
Preboot Execution Environment
 
QoS
Quality of Service
 
RA
Registration Authority
 
RAM
Random-Access Memory
 
RAN
Radio Access Network
 
RAT
Radio Access Technology
 
RBAC
Role-Based Access Control
 
RBT
Ring Back Tone
 
RBS
Radio Base Station
 
RCA
Root Cause Analysis
 
RDN
Relative Distinguished Name
 
RFC
Request for Comment
 
Rn
Routing number
 
ROP
Report Output Period
 
RPC
Remote Procedure Call
 
RPH
Resource-Priority Header
 
RPID
Rich Presence Extensions to the Presence Information Data Format (RFC 4480)
 
RPM
RedHat Package Manager
 
RRT
Realm Routing Table
 
RSA
Public-key cryptography based on Rivest, Shamir, and Adleman
 
RSDP
The SDP of the remote descriptor of a termination
 
RSG
Remote Support Gateway
 
RSIP
Realm Specific Internet Protocol
 
RT
Ringing Time
 
RTP
Real-Time Transfer Protocol (RFC 3550)
 
RTT
Round-Trip Time
 
RTTI
Real-time Transfer of Tariff Information
 
R/W
Read-write
 
S-CSCF
Serving Call Session Control Function
 
SA
Support Agent
 
SAAL
Signalling ATM Adaptation Layer
 
SAF
Service Availability Forum
 
SBG
Session Border Gateway
 
SC
Service Code | Service Continuity
 
SCC
Sentinel® Cloud Connect
 
SCEP
Simple Certificate Enrollment Protocol
 
SCF
Service Control Function
 
SCP
Secure Copy | Service Control Point
 
SCPC
Service Control Point Carrier
 
SCTP
Stream Control Transmission Protocol
 
SCUR
Session based Charging with Unit Reservations
 
SD
Subscriber Data
 
SDP
Session Description Protocol | Software Delivery Package
 
SDS
Service Domain Selection
 
SE
Security Element
 
SecM
Security Management
 
SELinux
Security-Enhanced Linux
 
SF
System Functions
 
SFTP
Secure File Transfer Protocol
 
SFW
Service Frame Work
 
SHA
Secure Hash Algorithm
 
SI
Supplementary Information
 
SIP
Session Initiation Protocol
 
SLF
Subscriber Location Function
 
SM
Security Management
 
SN
Subscriber Number
 
SND
Short Number Dialing
 
SNM
Sub-Network Manager
 
SNMP
Simple Network Management Protocol
 
SoC
Statement of Compliance
 
SOAP
Simple Object Access Protocol
 
SPM
Service Process Manager
 
SR
Separator
 
SRF
Specialized Resource Function
 
SRV
Service (Record)
 
SRVCC
Single Radio Voice Call Continuity
 
SS
Supplementary Service
 
SS7
Signalling System No.7
 
SSC
Supplementary Service Code
 
SSCF
Service Specific Coordination Functions
 
SSCOP
Service Specific Connection Oriented Protocol
 
SSF
Service Switching Function
 
SSH
Secure Shell
 
SSL
Secure Socket Layer
 
SSP
Service Switching Point
 
ST
Sip Trunking
 
ST AS
Sip Trunking Application Server
 
STI
Session Transfer Identifier
 
STN
Session Transfer Number
 
STN-SR
Session Transfer Number for SRVCC
 
STOD
Session Transfer to Own Device
 
sub-MO
sub-Managed Object
 
SU
Service Unit
 
SW
Software
 
SwIM
Software Inventory Management
 
SwM
Software Management
 
SX
Service Suffix
 
SysM
System Management
 
T-ADS
Terminating Access Domain Selection
 
T-CSI
Terminating CAMEL Subscription Information
 
T-IOI
Terminating Inter-Operator Identifier
 
T-SDS
Terminating SDS
 
TAC
Tracking Area Code
 
TAUC
Terminating Additional User Category
 
TBAC
Target-Based Access Control
 
TC
Textual Convention
 
TCA
Terminating Charge Area
 
TCAP
Terminating CAMEL Application Part
 
TCP
Transmission Control Protocol
 
TD
Transparent Data
 
TCP
Transmission Control Protocol
 
TDM
Time Division Multiplexing
 
TDMA
Time Division Multiple Access
 
TIP
Terminating Identification Presentation
 
TIR
Terminating Identification Restriction
 
TISPAN
Telecoms & Internet converged Services & Protocols for Advanced Networks
 
TLD
Top-Level Domain
 
TLDcc
Top-Level Domain Country Code
 
TLEC
Terminating Local Exchange Carrier
 
TLS
Transport Layer Security
 
TQT
Time Quota Threshold
 
TP
Traffic Processor
 
TPS
Transactions Per Seconds
 
TR
Trouble Report
 
TS
Technical Specification
 
TTC
Telecommunication Technology Committee
 
TTCN
Testing and Test Control Notation
 
UA
User Agent
 
UA-A
User Agent (Calling)
 
UA-B
User Agent (Called)
 
UAC
User Agent Client
 
UAS
User Agent Server
 
UC
Use Case
 
UCAC
User Call Admission Control
 
UCF
Upgrade Control File
 
UDUB
User Determined User Busy
 
UDP
User Datagram Protocol
 
UE
User Endpoint | User Entity | User Equipment
 
ULN
Unique Logical Name
 
UML
Unified Modeling Language
 
UMTS
Universal Mobile Communication System
 
UP
Upgrade Package | Upper Part
 
URI
Uniform Resource Identifier
 
URL
Uniform Resource Locator
 
URN
Uniform Resource Name
 
USU
Used Service Units
 
UTC
Coordinated Universal Time
 
UTF
Unicode Transformation Format
 
UUID
Universally Unique Identifier
 
UUIR
User Unrelated ISC Routing
 
UTC
Universal Time coordinate
 
VCC
Voice Call Continuity
 
VCPU
Virtual CPU
 
vDicos
Virtual Dicos
 
VIP
Virtual IP Address
 
VLAN
Virtual Local Area Network
 
VM
Virtual Machine | Voice Mail
 
VNF
Virtual Network Function
 
VoIP
Voice over IP
 
VoLTE
Voice over LTE
 
VoPS
Voice over PS
 
VPN
Virtual Private Network
 
VRRP
Virtual Router Redundancy Protocol
 
VT
Validity Time
 
VTP
Virtual Telephony Provider
 
wIMPU
Wildcarded Public User Identity
 
WSDL
Web Services Description Language
 
XCAP
XML Configuration Access Protocol
 
XCAP Client
An HTTP client that understands how to follow the naming and validation constraints defined in the XCAP draft.
 
XDMS
XML Document Management Server
 
XDP
XDMS Data Protocol
 
XUI
XCAP User Identifier
 
XML
Extensible Markup Language
 
XSD
XML Schema Definition
 
XUI
XCAP User Identity
 
YPS
Yellow Pages Server


Copyright

© Ericsson AB 2016. All rights reserved. No part of this document may be reproduced in any form without the written permission of the copyright owner.

Disclaimer

The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Ericsson shall have no liability for any error or damage of any kind resulting from the use of this document.

Trademark List
All trademarks mentioned herein are the property of their respective owners. These are shown in the document Trademark Information.

    Glossary of Terms and Acronyms         MTAS