Glossary of Terms and Acronyms
Call Session Control Function

Contents

1Introduction

2

Terms

Glossary

1   Introduction

This document defines the terms and acronyms used in the documentation for the Call Session Control Function (CSCF).

2   Terms

-A The -A option can be omitted, if the password-less logon is not configured. The -A option enables the forwarding of the authentication agent connection.
Accounting The act of collecting information on resource use for the purpose, among others, of billing or cost allocation.
Action An executable operation triggered by setting attributes on an MO. Each action is defined in the related MOC description.
AF Application Function. Element offering applications that use IP bearer resources. One example of an AF is the P-CSCF.
Alarm An event raised by unplanned system fault that prevents the system from operating properly or requires immediate action from node administrator. Alarms are automatically cleared when fault is corrected.
Alarm issuer Component that reports an alarm.
Alert A stateless alarm, that is, an alarm that can only have the raised state. As an alarm, an alert has an associated Operating Instructions document and is reported in real time as an SNMP notification. Alerts are recorded in the Alert Log but are not exposed in any list over the NBI.
Alias Role Identity of a role, which has meaning to the user. An alias role is an alias for one or more real roles. The definition of alias role allows the user to use names of roles that the user is used to. Also, the same alias can be used for several real roles. The latter can be useful when different types of MEs have defined real roles with different names, but which requires the same (or similar) authority.
Application A service enabler deployed by service providers, manufacturers, or users. Individual applications are often enablers for a wide range of services.
Attribute Represents the configuration. The read-only attributes in the MOs describe configuration state and operational values. The writable attributes control the operation and configuration for the particular network resource. Each attribute is defined in the related MOC description.
Authentication The process of verifying the identity of an entity.
Authorization The granting of permission based on authenticated identification.
AUTN Authentication Token. A component of an AV, used to authenticate a network to a UE.
AUTS Authentication Token. A value generated by the UE upon experiencing an SQN synchronization failure.
AVP Attribute-Value Pair. Diameter AVPs carry specific authentication, authorization, and accounting information, security information, and configuration details for the request and the reply.
Basic Compression In basic compression, no state is saved except for the byte code, which is uploaded in the first message. Returned parameters are used.
Called Party Number The called party number is a telephone number identifying the called user. The telephone number is included in a SIP request either in the format of a tel URI or in the format of a SIP URI with the telephone number in the user field.
Cardinality Can exist in the MOM between MOs in parent-child relationships, and in associations between MOs.
Charging Determination Charging determination is the process by which the S-CSCF extracts relevant data from the SIP signalling received and compare it with a set of preconfigured charging triggers to determine whether charging is to be applied, which charging mechanism (online or offline), and whether session or event charging is to be applied.
Charging Profile A set of configured rules assigned to a particular charging trigger and defining the charging behavior to apply, and the reference to the concrete configuration options of the charging protocols applicable.
Charging Rule A set of information including the service data flow filters (IP 5 tuple – local/remote IP address, local/remote port, and transport protocol), the gating status (pass/drop packets matching the rule), and the rating group, for a single service data flow.
Charging Trigger A set of configured rules containing the criteria by which the SIP request received in the S-CSCF is analyzed to determine whether it must be charged or not and which type of charging mechanism is to be applied.
CM Configuration Management. An area in the model, covering for, example system, configuration, network provisioning, subscriber provisioning, backup, and restore.
Compute Host A physical computer where one or more Virtual Machines are running.
CPI Customer Product Information. Documentation for an ME, delivered in the Active Library Explorer.
Credit Control Credit control is a mechanism that directly interacts in real time with an account and controls or monitors the charges related to the service use. Credit control is a process of checking whether credit is available.
CscfTrustedASEntry The S-CSCF verifies that the Application Server transport address is in the list of trusted Application Servers.
CSR Customer Service Request. Used during the trouble reporting process to describe the problems identified.
Cx The 3GPP reference point between a CSCF and an HSS.
Data Model A mapping of the contents of an information model into a form that is specific to a particular type of data store or repository. A data model is basically the rendering of an information model according to a specific set of mechanisms for representing, organizing, storing, and handling data. In contrast to an Information Model, a Data Model includes implementation (and protocol-) specific details. That is, rules that explain how to map MOs onto lower-level protocol constructs.
Derived Data Type Data type enhanced with extra restrictions and properties. Derived string data types contain, for example, length and content constraints. Derived integer data types contain extra range constraints. Each derived data type is defined in the related MOC description.
Distinct IMPU A Distinct IMPU is provisioned in the HSS and identifies a single non-wildcarded Public User Identity that can belong to any service profile. The Distinct IMPU can be or not be within the range of a wIMPU. The Distinct IMPU is part of the same Implicit Registration Set as one or more wIMPUs. An Implicit Registration Set can have any combination of wIMPUs and Distinct IMPUs, with any combination of service profiles.
DN Distinguished Name. The name of an object in an object tree that is shared between the system and the Management System. The DN is in 3GPP® format (from root to leave). The DN is used to identify an MO uniquely in the system. It gives the path of the MO in the tree of objects. The system uses 3GPP formatted DNs where each relative DN part consists of the MOC name equal the MO identity. If the key attribute name is not equal to the MOC name plus ID, then the key attribute name is also appended to the MOC name separated by a dot.
Downlink Refers to the direction of traffic from the network to the user equipment.
Dx The 3GPP reference point between a CSCF and an SLF.
E.164 The International Public Telecommunication Numbering Plan, ITU-T Recommendation E.164.
ECIM Ericsson Common Information Model. Controls the MOM structure. The ECIM is based on the CIM standard.
ECLI Ericsson Command-Line Interface. A terminal-based Command-Line Interface that is used to monitor and manage the ME. The ECLI is based on industry de facto standard patterns.
Enumeration Integer-name pairs defining a fixed set of named values for an attribute, return value, or action parameter. Each enumeration is defined in the MOM.
Ericsson NETCONF Interface A Machine to Machine interface for configuration management of the ME using the NETCONF protocol over the Secure Shell.
Event Occurrence of significance to users, the MEs under surveillance and Network Management specifications. Events do not have states.
Explicit iFC Initial Filter Criteria specified explicitly in the user profile received from the HSS.
Explicit Preference A caller preference indicated explicitly in the Accept-Contact or Reject-Contact header fields.
External Router A Layer 3 capable router to which the CSCF VNF is connected. It can reside outside or inside the cloud infrastructure.
Failover The mechanism carried out by an I-CSCF for forwarding a request to the secondary S-CSCF after the I-CSCF detects the primary S-CSCF has experienced a service interruption.
Feature tag A name that identifies a feature. An example is "sip.methods".
First Match Analysis A first match analysis is defined as an analysis where a set of characters, for example, a set of characters representing a telephone number, is matched against the entries in a list and the analysis is performed character by character against the entries in the list until either a match is found or it has been concluded that no match exists.
Fixed Domain The set of nodes that cannot be subject of a scaling operation. Fixed domain of the CSCF consists of SC-1 and SC-2 nodes permanently. The domain cannot be changed.
Flow Description See Service Data Flow, ServiceDataFlow.
Freephone Service Two accesses to the freephone databases are normally done for routing a call to a freephone number. The first one is done by the originating network that queries a freephone database for the CIC information so that the call can be routed to the serving freephone service provider of the called freephone number. The first freephone database contains the CIC information for all the active freephone numbers. The CIC information is returned in the query response but the npdi indicator is not to be set.

When the call reaches the serving freephone provider, the second database access is performed to map the freephone number to a geographical telephone number, or internal routing information, or both. The second freephone database contains mapping information only for those freephone numbers served by a freephone service provider.

When a geographical telephone number is returned in the response, it is possible that the NP-related information for that geographical telephone number could also be returned. In that case, the npdi parameter and the rn parameter containing the Routing Number is added to the query response.

It is possible that the originating carrier can provide freephone service, and its freephone database contains the CIC information for all the active freephone numbers plus the mapping information for those freephone numbers it serves.

Gating A mechanism to enable or disable flows at the PCEF. It is used to prevent fraud. Charging rules are installed with status closed until the SIP session is established that the status is changed to open. It can be used when a media is temporarily paused.
Gm The 3GPP reference point between a UE and a CSCF.
GP Granularity Period. The time between the initiation of two successive gatherings of measurement data.
Guest Virtual Machine is sometimes referred to as the Guest.
Guest OS The operating system running inside a Virtual Machine.
HA High Availability. A system or component that is continuously operational for a desirably long length of time. Availability is measured relative to 100% operational status.
Heartbeats Used by a Management System to monitor the interface over which the alarms or alerts are to be sent. Heartbeats are needed because a management system cannot assume that a "silent" ME behaves properly. The Heartbeat event is reported as an SNMP notification at regular intervals.
HSS Home Subscriber Server. An IMS database that contains the subscription-related information (subscriber profiles), performs authentication and authorization of the user, and can provide information about the location and IP information of the subscriber.
ICE Interactive Connectivity Establishment. A technique for NAT traversal for media streams established by the offer/answer model. ICE is an extension to the offer/answer model, and it works by including a multiplicity of IP addresses and ports in the SDP offers and answers that are then tested for connectivity by peer-to-peer connectivity checks. The IP addresses and ports included in the SDP and the connectivity checks are performed using the revised STUN.
ICMP Internet Control Message Protocol. A message control and error-reporting protocol between a host server and a gateway to the Internet.
Implicit Preference A caller preference that is implied through the presence of other aspects of a request. For example, if the request method is INVITE, it represents an implicit caller preference to route the request to a UE that supports the INVITE method.
IMS Service Session An IMS session established between the UEs.
Information Model An abstraction and representation of the entities (or MOs) in a managed environment, their properties, attributes, and operations, as well as the way that they relate to each other. It is independent of any specific repository, software use, protocol, or platform.
Initial Request A SIP request that either initiates the creation of a new dialog or is a standalone request.
Interrogating Call Session Control Function The terminating I-CSCF is the entity that receives the SIP request. It analyses the SIP request and, depending on the result of the analysis, routes the SIP request to the BGCF, from which the Number Portability function can be started.
Inter-Operator Identifier Used to identify the networks associated with a session setup and is used for charging purposes. The inter-operator identifiers are included in the P-Charging-Vector SIP header: the orig-ioi identifies the originating network and the term-ioi identifies the terminating network of the session. The inter-operator identifiers are included (optionally) when charging data is sent to the Charging Data Function.
IP Flow A unidirectional flow of IP packets with the same source IP address and port number, the same destination IP address and port number, and the same transport protocol. Port numbers are only applicable if used by the transport protocol.
IP Multimedia Subsystem An architectural framework for delivering IP Multimedia services as defined by 3GPP 23:228.
ISP-CSCF A physical node containing I-CSCF, S-CSCF, and P-CSCF logic
K A secret Key used in AKA authentication
Load Balancing The distribution of processing and communications activity evenly across a network so that no single node is overwhelmed.
LOTC Linux® Open Telecom Cluster. A custom Ericsson operating system distribution based on GNU/Linux. The LOTC provides a Linux cluster with High Availability characteristics.
LSS Local Subsystem. A subsystem located in the own node.
MAC Message Authentication Code. Included in AUTN.
Managed Object Management A folder in the Active Library Explorer that contains the MOM.
ME Managed Element. A node in the network. ManagedElement is a single root element object in the MOM and is the starting point for navigation.
Media Component A part of an IMS session description conveying information about media (for example, media type, format, IP address, ports, transport protocol, bandwidth, direction).

The media described by a media component can be either bi- or unidirectional. Media using RTP for transport also have associated RTCP. The media component also conveys information about the associated RTCP (port and possibly bandwidth).

An IMS session description can consist of more than one media component.

Media component can consist of media subcomponents.

Media Subcomponent A part of a media component describing a bi- or unidirectional IP flow.
MIB Management Information Base. The collection of MOs, which control the configuration of an ME and its functionality.
MIM Management Information Model. A view of the MOM, where certain parts of the MOM can be hidden from the user, depending on the use case. The MOM is traditionally stored offline, while a MIM is traditionally stored online for use by tools. Often the MIM is represented in a different language to the MOM, for example, XML. There is normally one file, in whatever modeling format, per MIM. The cardinality between a MOM and a MIM is one to one.
MIP Movable Internet Protocol. In this context MIP is used when moving an IP address between two or several blades. Another description of MIP is Mobile IP, which is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile device users to move from one network to another while maintaining a permanent IP address.
MO Managed Object. A software object that encapsulates the manageable characteristics and behavior of a particular hardware or software resource. An MO is an instance of a MOC. An MO normally has attributes that provide information used to characterize the MOs that belong to the MOC. An MO can also have actions that allow the user to perform operations on the underlying implementation.
MOC Managed Object Class. The MOM has one or more defined MOCs. The MOCs are instantiated with real data on a deployed ME. The MOC maintains all characteristics of an MO such as attributes and actions.
MOM Managed Object Model. A structured collection of configuration information that defines the O&M capability on an ME. The MOM is defined as a set of MOCs. The MOCs contain attributes representing the configuration that can be performed by the user, and actions representing the operations that can be started by the user. The MOM is a static blueprint for the creation of the actual object model.
MSISDN Mobile Subscriber Integrated Services Digital Network Number. A number uniquely identifying a subscription in a GSM or a UMTS mobile network.
Mw SIP interface between the P-CSCF and the I/S/E-CSCF.
NBI Northbound Interface. The interface to a Management System and a CLI client. The protocols used are ECLI, NETCONF, SFTP, and SNMP.
NETCONF Network Configuration. A Network Management protocol developed in the IETF and published as RFC 4741.
NeLS Network License Manager
Node Refers to a compute resource and can be a physical hardware blade or a virtual machine (VM) instantiation.
Not registered The Public Identity has not been registered and it is not in unregistered state.
Notification A general term for a message that carries an alarm or alert instance.
Notifier A notifier is a user agent who generates NOTIFY requests for notifying subscribers of the state of a resource. Notifiers typically also accept SUBSCRIBE requests to create subscriptions. For further information, refer to Session Initiation Protocol (SIP)-Specific Event Notification - RFC3265.
NSSA Not So Stubby Area. An extension of the stub area feature allowing the injection of external routes in a limited fashion into the stub area.
Offline Charging A charging mechanism where charging information does not affect, in real time, the service rendered. Information is generated for post-processing of billing, accounting, capacity and trend analysis, cost allocation and auditing.
Online Charging Charging mechanism where charging information can affect the service rendered in real time and therefore a direct interaction of the charging mechanisms with the session/service control is required.
OSS Operations Support System. Systems dealing with the telecom network to support processes such as maintaining network inventory, provisioning services, configuring network components, and managing faults.
OSS-RC Operations Support System for Radio and Core. The OSS-RC is a Network Management System, used for fault and performance management.
Outgoing Gateway The outgoing gateway accepts SIP requests for a user connected to another network, for example, PSTN or another IMS network. The Number Portability function does not directly interact with the outgoing gateway, but just provides a, possibly modified, called party number to be used as input for the further analysis to select an outgoing gateway.
Paravirtualization Paravirtualization is a virtualization technique that presents a software interface to Virtual Machines that is similar, but not identical, to that of the underlying hardware.
Performance Management A functional area for collection and configuration of performance data.
P-Header Private Header
Ported Number A ported number is a user telephone number that has been kept when the user has changed its subscription from one operator to another one.
Preservation of Restoration Data Different contacts of a user are to be registered in different Register requests. To avoid the existing restoration information in the HSS being overwritten by subsequent registration of a different contact, the restoration procedure uses the Multiple-registration-indication AVP in the SAR message.

According to 3GPP TS 23.380, when the HSS receives an SAR with Multiple-registration-indication and the Public Identity is stored as "registered" and there exists restoration information, the HSS does not overwrite the stored restoration information. Instead, the HSS rejects the SAR request and includes the existing restoration information in the SAA response. The S-CSCF updates the received restoration information with data of the new contact.

The updated restoration information is sent back to the HSS through another SAR with SAT equals to re-registration. This time the HSS accepts the restoration information update.

Primary S-CSCF The S-CSCF serving the user before a failover.
QoS preconditions The UE, through the SIP negotiation with its peer, can opt for one of two of the following options:
  • The UE can request preconditions for one or more media components within the session.

    An IMS session with preconditions does not complete until the required resources have been allocated to the session. In this case, the UE must succeed in establishing the QoS bearer for the media stream according to the QoS preconditions defined at the IMS session level before it can indicate a successful response to complete the session and alert the other end point.

  • The UE cannot request preconditions for one or more media components within the session.

    In this case, the UE intends to use the general-purpose PDP context to carry the media. As such, the UE does not require any specific bearer reservation.

    In this case, when the PCRF gets notification from the P-CSCF, the PCRF pushes the authorized policies to the PCEF. Authorized policies include, among other things, the charging rules that apply to the media in question and the quality of service information.

RADIUS Remote Authentication Dial In User Service. An internet protocol for carrying authentication, authorization and configuration information (RFC 2865), or accounting information (RFC2866 and RFC 2867) between a Network Access Server and a shared authentication/accounting server.
RAND Random Challenge. A component of an AV, used to challenge a UE to authenticate itself to a network.
RAR Re-Auth-Request. Rate based throttling provides a mechanism to restrict the rate of initial SIP requests from access networks toward the core network on a per SIP method basis.
Rating The act of determining the cost of the service event.
Registered state The subscriber has at least one registered contact.
Registered The Public Identity has successfully completed the registration procedure.
Registrar A registrar is a server that accepts REGISTER requests and places the information it receives in those requests into the location service for the domain it handles. For further information, refer to Session Initiation Protocol - IETF RFC 3261.
Registration Binding of a contact address to a Public User Identity.
RES Response A value computed by an UE to authenticate itself to a network, in response to a RAND challenge.
Restoration The mechanism carried out by an S-CSCF for retrieving the restoration information from the HSS.
Restoration Backup The mechanism carried out by an S-CSCF for storing the restoration information to the HSS.
Returned parameters Information (CPB, DMS, SMS, version, and state identifiers) returned in the SigComp header to the other peer.
Role A physical node contains functions like S-CSCF, I-CSCF, and P-CSCF. These functions can be used separately or combined. A role is either a function or a combination of functions that is possible to start from an external node using a defined port. Examples of roles are P, I, S, IS, ISP.
Rule Authorization rules specify the permissions to a set of resources within the ME. The authorization rules are grouped into roles. Authorization rules are defined locally on the ME.
S-CSCF Service Interruption A time period in which the S-CSCF does not respond to requests and does not send any requests to the rest of the IMS network.
SA Security Association. The establishment of shared security attributes between two network entities to support secure communication. An SA can, for example, include the following attributes: cryptographic algorithm and mode; traffic encryption key; and parameters for the network data to be passed over the connection.
Scaling Domain The set of nodes that can be subject of a scaling operation. The CSCF scaling domain consists of all traffic nodes (PL-3, PL-4, PL-5 ... PL-N).
SCP Secure Copy. A remote file copy program.
SDP Software Delivery Package. An archive file (TAR file) with RPM® software packages and a file describing the Ericsson product data. A software item can be an SDP. A software item represents any kind of Ericsson software product that is present on the ME.
SDP offer/answer A procedure used in IMS (SIP) to negotiate a multimedia (IMS) session between end points and arrives at a common view of the media parameters. For further information, refer to An Offer/Answer model with the Session Description Protocol (SDP) - IETF RFC 3264.
Secondary S-CSCF The S-CSCF serving a user after the primary S-CSCF has failed.
Selectors IP source address, IP destination address, IP protocol, IP source port, and IP destination port.
Server Capabilities The S-CSCF capability to support the defined service profiles of a user.
Service Data Flow An aggregate set of IP flows. For GPRS/WCDMA, it must be possible that a service data flow is more granular than a PDP context.
Service Data Flow Filter A set of filter parameters used to identify one or more of the IP flows constituting a service data flow. At least the following means for the IP flow identification to be supported; source and destination IP address+port, protocol. The Service Data Flow Filter is used by the PCRF and the PCEF.
Service Record A DNS Resource Record for specifying the location of services.
Serving Call Session Control Function The S-CSCF is the entity that receives the SIP request. It analyses the SIP request and, depending on the result of the analysis, routes the SIP request to the BGCF, from which the Number Portability function can be started.
Session Refresh Request An INVITE or UPDATE request sent within a dialog where at least one of the UEs supports the session timer procedure according to RFC4028.
SF System Functions. Common system functions and resources for the management entity such as Fault Management (Fm), Performance Management (Pm), and Security Management (SecM). SystemFunctions is one of the first-level branches in the MOM.
Shared iFC Initial Filter Criteria derived from the local definition associated with the Shared iFC Set ID present in the user profile received from the HSS.
SQN Sequence Number. Used to compute XRES, CK, IK, and AUTN.
Standalone Request A SIP request that does not create a dialog or is not part of an existing dialog.
State Data saved for retrieval by a SigComp message.
Stateless Compression In Stateless Compression, no state is saved, that is, SMS = 0. Hence, the byte code is sent in each SigComp message.
Struct Handles structured attributes that can contain an arbitrary number of elements of the same or different type. Each struct is defined in the related MOC description.
Stub Area A stub area is an area which does not receive route advertisements external to the autonomous system and routing from within the area is based entirely on a default route.
STUN Session Traversal Utilities for NAT. A feature, as defined by RFC 5389, to allow an end host to discover its public IP address if it is located behind a NAT. It is used to permit NAT traversal for applications of real-time voice, video, messaging, and other interactive IP communications.
Subscriber Generally a subscriber is a user agent who receives NOTIFY requests from notifiers; these NOTIFY requests contain information about the state of a resource in which the subscriber is interested. Subscribers typically also generate SUBSCRIBE requests and send them to notifiers to create subscriptions. For this event, a subscriber wants to get informed about registration state changes for a specific registered public identity/identities.
Subsequent Request A SIP request that is part of an existing dialog.
SysM System Management. Represents the system-level functions such as time handling and version handling. SysM is a system function.
TCP Transmission Control Protocol. Part of the TCP/IP protocol stack. Provides a connection-oriented way to move data across the network. The protocol support byte oriented transfer of data between the applications, and is a reliable end-to-end transport protocol between the TCP processes.
Telephone Object Request Broker An Ericsson propriety operating system. It is a CORBA®-compliant, distributed real-time processing environment, providing a robust cluster-based platform for telecom applications.
Transaction Configuration changes are applied through atomic transactions. Thus, it is ensured that all or none of the operations are executed.
Transport Management Transport-related functions and resources, for example, load sharing between all configured and available blades in the cluster, and distribution of incoming traffic to the system. Transport is one of the first-level branches in the MOM.
Trap An unacknowledged SNMP message that carries a notification or heartbeat.
UA User Agent. An endpoint in a SIP-based network that initiates SIP requests and generates accept, reject, and redirect responses on the behalf of the user.
Unregistered The Public Identity has a state stored in the HSS as a consequence of a call from or to an unregistered service.
Unregistered state The subscriber is not registered, but it has services related to its unregistered state.
Update of Restoration Information An S-CSCF updates the restoration information in the HSS once changes are detected, the S-CSCF uploads to the HSS the whole set of restoration information belonging to the IMPI/IMPU or IMPI/IRS pair including both changed and unchanged information.
Upgrade A product or product version that is created to provide an increased level of functionality or performance to a user. Upgrade is also the operation to replace a previous product or product version with a new product or product version that provides an increased level of functionality.
Uplink The direction of traffic from the UE to the network.
URL Uniform Resource Locator. The addressing system used by the server and the client to request, for example, a document. It is often called a location. The format of a URL is [protocol]://[machine:port]/[document]. The port number is necessary only on selected servers.
UTC Coordinated Universal Time. UTC is the time-scale maintained by the Bureau International des Poids et Mesures (BIPM), with assistance from the International Earth Rotation Service (IERS), which forms the basis of a coordinated dissemination of standard frequencies and time signals. It corresponds exactly in rate with International atomic time (TAI) but differs from it by an integer number of seconds.
Virtual Network A cloud infrastructure building block which provides logical separation of networking between VNF instances.
Virtual Network Function One or more Virtual Machine (VM) instances that forms a VNF and delivers a network service/feature, or set of services/features, to its users.
Virtual Network Function Instance An instantiation of VNF at time of deployment when a VNF is deployed in a cloud infrastructure. Multiple VNF instances of the same type can exist in parallel in the same cloud infrastructure.
Virtual Routing Function A cloud infrastructure building block that provides Layer 3 routing capabilities to Virtual Networks.
White List Logic Implementing a screening function using White List Logic means that the list contains entries that are allowed to be used.

For Payload Type Screening, this means that the list contains payload types that are allowed to be used. If a payload type is not specified in the list, the payload type is implicitly not allowed to be used.

Wildcarded Public Identity A Wildcarded Public User Identity or a Wildcarded Public Service Identity.
Wildcarded Public Service Identity A Wildcarded Public Service Identity represents a collection of Public Service Identities. A PSI identifies a service, or a specific resource created for a service on an Application Server. A Wildcarded Public Service Identity can take the form of a SIP URI or a tel URI.
Wildcarded Public User Identity An HSS provisioned identity that identifies a grouped set of Public User Identities that share service profile and are handled in one Implicit Registration Set. A Wildcarded Public User Identity can take the form of a SIP URI or a tel URI as defined in TS23.003.
XMAC Expected MAC, a value computed by a UE and compared to a received MAC value.
XPath XPath is a language for selecting parts of an XML document.
XRES Expected RES, a value computed by an AuC and used by the S-CSCF to validate a received RES value.

Glossary

3GPP
3rd Generation Partnership Project (UMTS)
 
3GPP2
3rd Generation Partnership Project (CDMA)
 
-A
The -A option can be omitted, if the password-less logon is not configured. The -A option enables the forwarding of the authentication agent connection.
 
AAA
AA Answer
 
AAR
AA Request
 
ABNF
Augmented Backus-Naur Form
 
AC
Area Code
 
ACA
Accounting-Answer
 
ACDC
Aggregated CSR Data Collection
 
ACQ
All Call Query
 
ACR
Accounting-Request
 
AF
Application Function
 
AIT
Automatic Installation Tool
 
AKA
Authentication and Key Agreement
 
ALB
Abstract Load Balancer
 
ALG
Application Layer Gateway
 
AMR
Adaptive Multi-Rate
 
ANSI
American National Standards Institute
 
AoC
Advice of Charge
 
AOR
Address Of Record
 
AP
Aggregation Proxy
 
API
Application Programming Interface
 
AppTrace
Application Trace
 
A-RACF
Access Resource and Admission Control Function
 
ARP
Address Resolution Protocol
 
AS
Application Server
 
ASA
Abort-Session-Answer
 
A-SBG
Access Session Border Gateway
 
ASP
Application Service Part
 
ASR
Abort-Session-Request
 
ATCF
Access Transfer Control Function
 
ATM
Asynchronous Transfer Mode
 
ATMM
Asynchronous Transfer Mode Management
 
AuC
Authentication Center
 
AV
Authentication Vector
 
AVP
Attribute-Value Pair
 
B2BUA
Back-to-Back User Agent
 
BCF
Break-in Control Function
 
BFD
Bidirectional Forwarding Detection
 
BGCF
Breakout Gateway Control Function
 
BNC
Bulk Number Contact
 
BNF
Backus-Naur Form
 
BRF
Backup and Restore Framework
 
BSP
Blade Server Platform
 
CAAS
Centralized Authentication and Authorization Server
 
CAS
Central Authentication Service
 
CAT
Customized Alerting Tones
 
CBA
Component Based Architecture
 
CC
Country Code
 
CC-TP
Cluster Control
 
CCA
Credit Control Answer
 
CCF
Charging Collection Function
 
CCI
Communication Content Inspection
 
CCR
Credit Control Request
 
CDF
Charging Data Function
 
CDR
Call Detail Record
 
CDSv
Container Distribution Service
 
CE
Connection Endpoint
 
CEA
Capabilities-Exchange-Answer
 
CEE
Cloud Execution Environment
 
CEI
Connection Endpoint Identifier
 
CER
Capabilities-Exchange-Request
 
CIC
Carrier Identification Code | Cloud Infrastructure Controller
 
CK
Ciphering Key | Confidentiality Key
 
CLF
Connectivity Session Location and Repository Function
 
CLI
Command-Line Interface
 
CLP
Cell Loss Priority
 
CLU
Command-Line Utility
 
CM
Configuration Management
 
CMF
Configuration Management and provisioning Framework
 
CN
Core Network
 
COM
Common Operation and Maintenance
 
COOB
Call Out Of the Blue
 
COTS
Commercial-of-the-Shelf
 
CP
Correction Package
 
CPB
Cycles Per Bit
 
CRS
Customized Ringing Signal
 
CS
Circuit Switch
 
CSCF
Call Session Control Function
 
CSI
Combinational Services
 
CSM
CBA System Model
 
CSR
Customer Service Request
 
CTF
Charging Trigger Function
 
CUDB
Centralized User Database
 
DAI
Dial Around Indicator
 
DBN
Database Network
 
DBPA
Diameter Base Protocol Accounting
 
DCCA
Diameter Credit Control Application
 
DDoS
Distributed Denial of Source
 
DHCP
Dynamic Host Configuration Protocol
 
DMS
Decompression Memory Size
 
DMZ
Demilitarized Zone
 
DN
Distinguished Name
 
DNS
Domain Name System | Domain Name System Server
 
DoS
Denial of Source
 
DPI
Deep Packet Inspection
 
DRBD
Distributed Replicated Block Device
 
DRF
Domain Routing Function
 
DRS
Distributed Resource Schedule
 
DSCP
Differentiated Services Code Point
 
DSL
Digital Subscriber Line
 
DTD
Document Type Documentation
 
DTLS
Datagram Transport Layer Security
 
DUA-DB
Dynamic User Association Database
 
DUA-R
Dynamic User Association Router
 
DUA-S
Dynamic User Association Server
 
DUIS
Dynamic User Identity Support
 
EATF
Emergency Access Transfer Function
 
E-CSCF
Emergency Call Session Control Function
 
ECIM
Ericsson Common Information Model
 
ECLI
Ericsson Command-Line Interface
 
ECMP
Equal-Cost Multipath
 
ECS
Ericsson Cloud System
 
ECUR
Event Charging with Unit Reservation
 
EMS
Element Management System
 
EN
External Network
 
ENB
NETCONF Browser
 
ENS
External Network Selection
 
ENUM
E.164 number
 
EOS
End-Of-Selection
 
EP
Emergency Package
 
ES
End System
 
ESRN
Emergency Service Routing Number
 
ETS
Emergency Telecommunications Service
 
eVIP
Evolved Virtual Internet Protocol
 
FE
Flow Entry
 
FEE
Front-End Element
 
FHRP
First Hop Redundancy Protocol
 
FQDN
Fully Qualified Domain Name
 
FS
Functional Specification
 
FTU
File Transfer Utility
 
GCID
GPRS Charging Identifier
 
GED
Generic Disk Board
 
GEM
Generic Equipment Magazine
 
GEP
Generic Ericsson Processor
 
GETS
Government Emergency Telecommunications Service
 
GETS-AN
Government Emergency Telecommunications Service Access Number
 
GETS-FC
Government Emergency Telecommunications Service Feature Code
 
GFC
Generic Flow Control
 
GGSN
Gateway GPRS Support Node
 
GIBA
GPRS IMS Bundled Authentication
 
gin
Generate Implicit Number
 
GPRS
General Packet Radio Services
 
GRUU
Globally Routable User agent URI
 
GSTN
Global Switched Telephone Network
 
GTP
GPRS Tunneling Protocol
 
HC
Half Call
 
HDCP
High-bandwidth Digital Content Protection
 
HDS
Ericsson Hyperscale Datacenter System
 
HEC
Header Error Control
 
HOT
Heat Orchestration Template
 
HSS
Home Subscriber Server
 
HTTP
Hypertext Transfer Protocol
 
IaaS
Infrastructure as a Service
 
IAP
Interception Access Point
 
IARI
IMS Application Reference Identifier
 
IBCF
Interconnection Border Control Function
 
ICE
Interactive Connectivity Establishment
 
ICID
IMS Charging Identifier
 
ICMP
Internet Control Message Protocol
 
I-CSCF
Interrogating Call Session Control Function
 
IDP
International Dialing Prefix
 
IEC
Immediate Event Charging
 
IETF
The Internet Engineering Task Force
 
IFC
Initial Filter Criteria
 
IIOP
Internet Inter-ORB Protocol
 
IK
Integrity Key
 
IKEv1
Internet Key Exchange version 1
 
IKEv2
Internet Key Exchange version 2
 
IM
IP Multimedia
 
IMEI
International Mobile Station Equipment Identity
 
IMM
Information Model Management
 
IMPI
IMS Private Identity
 
IMPU
IMS Public Identity | IP Multimedia Public Identity
 
IMS
IP Multimedia Subsystem
 
IN
Internal Network
 
IOI
Inter-Operator Identifier
 
IOPS
Input/Output Operations per Second
 
IP
Internet Protocol
 
IP-CAN
IP Connectivity Access Network
 
IP-PBX
Internet Protocol Private Branch Exchange
 
IPsec
IP Security
 
IPv4
IP version 4
 
IPv6
IP version 6
 
IRS
Implicit Registration Set
 
IRP
Integration Reference Point
 
IS
Information Service
 
ISC
IMS Service Control Interface
 
ISDN
Integrated Services Data Network
 
ISIM
IP Multimedia Services Identity Module
 
ISP
In-Service Performance
 
ITU
International Telecommunication Union
 
KQI
Key Quality Indicator
 
LBaaS
Load-Balancing-as-a-Service
 
LBE
Load Balancer Element
 
LDAP
Lightweight Directory Access Protocol
 
LDE
Linux Distribution Extension
 
LDN
Local Distinguished Name
 
LEM
Lightweight Entity Management
 
LI
Lawful Interception
 
LIA
Location Information Answer
 
LIC
Lawful Interception Communication Protocol
 
LIR
Location Information Request
 
LISA
Location Information Service Authority
 
LM
Load Module
 
LRF
Location Retrieval Function
 
LZBS
Lempel-Ziv Back-Skip
 
MAC
Message Authentication Code
 
MAA
Multimedia-Authentication-Answer
 
MAR
Multimedia-Authentication-Request
 
MASDT
Mean Accumulated System Downtime
 
MCC
Mobile Country Code
 
MCID
Malicious Communication Identification
 
MGC
Media Gateway Controller
 
MGCF
Media Gateway Control Function
 
MGW
Media Gateway
 
MIB
Management Information Base
 
MIM
Management Information Model
 
MIME
Multipurpose Internet Mail Extensions
 
MIP
Movable Internet Protocol
 
MNC
Mobile Network Code
 
MMI
Man–Machine Interfaces
 
MO
Managed Object
 
MOC
Managed Object Class
 
MOI
Managed Object Instance
 
MOM
Managed Object Model
 
MRF
Media Resource Function
 
MRFP
Media Resource Function Processor
 
MS
Mobile Station
 
MSC
Mobile Switching Center
 
MSISDN
Mobile Subscriber ISDN Number
 
MSRP
Message Session Relay Protocol
 
MT
Mobile Termination
 
MTBF
Mean Time Between Failures
 
MTBSF
Mean Time Between System Failures
 
MTU
Maximum Transmission Unit
 
MW
Middleware
 
MWI
Message Waiting Indication
 
NAI
Network Provided Terminal Identity
 
NAPTR
Naming Authority Pointer
 
NASS
Network Attachment Subsystem
 
NAT
Network Address Translation
 
NBA
NASS Bundled Authentication
 
NBI
Northbound Interface
 
NDS
Network Domain Security
 
NE
Network Element
 
NENA
National Emergency Number Association
 
NetRed
Network Redundant
 
NFV
Network Function Virtualization
 
NIC
Network Interface Controller
 
NM
Node Management
 
NNI
Network Node Interface
 
NOC
Network Operations Center
 
NPDB
Number Portability Database
 
NPDI
Number Portability Database Indicator
 
nPMF
new Performance Management Function
 
NPTI
Network Provided Terminal Identity
 
N-SBG
Network Session Border Gateway
 
NSNs
National Significant Numbers
 
NTD
Node Type Data
 
NTP
Network Time Protocol
 
NumNorm
Number Normalization
 
O&M
Operation and Maintenance
 
OAM
Operations, Administration, and Maintenance
 
OCS
Online Charging System
 
ODI
Original Dialog Identifier
 
OID
Original Dialog Identifier
 
OMR
Optimal Media Routing
 
OPI
Operating Instructions
 
oPMF
old Performance Management Function
 
OR
Onward Routing
 
OSA
Open Service Architecture
 
OSPF
Open Shortest Path First
 
OSN
Operator Service Number
 
OSS
Operations Support System
 
OSS-RC
Operations Support System for Radio and Core
 
OVA
Open Virtual Appliance | Open Virtual Alliance
 
OVF
Open Virtualization Format
 
OVFD
Open Virtualization Format Descriptor
 
P-CSCF
Proxy Call Session Control Function
 
PAI
P-Asserted-Identity
 
PANI
P-Access-Network-Info
 
PBR
Policy Based Routing
 
PBX
Private Branch Exchange
 
PCC
Policy and Charging Control
 
PCEF
Policy and Charging Enforcement Function
 
PCFA
P-Charging-Function-Address
 
PCRF
Policy and Charging Rules Function
 
P-CSCF
Proxy Call Session Control Function
 
PCV
P-Charging-Vector
 
PDB
Parameter Database
 
PDBCLI
Parameter Database Command-Line Interface
 
PDBGUI
Parameter Database Graphical User Interface
 
PDN
Public Data Network
 
PDP
Packet Data Protocol
 
PDSN
Packet Data Serving Node
 
PDU
Protocol Data Unit
 
PHY
Physical Layer
 
PIDF-LO
Presence Information Data Format Location Object
 
PL
Payload
 
PLMN
Public Land Mobile Network
 
PM
Performance Management
 
PMC
Performance Management Counters
 
PMF
Performance Management Function
 
PNI
Private Network Interface
 
PNF
Physical Node Function
 
PO
Persistent Object
 
PoC
Push to Talk over Cellular
 
PPA
Push-Profile-Answer
 
PPI
P-Preferred-Identity
 
PPR
Push-Profile-Request
 
PRC
Primary Restore Candidate
 
PRM
Protocol Reference Model
 
PS
Packet Switched
 
PSAP
Public Safety Answering Point
 
PSI
Public Service Identity
 
PSTN
Public Switched Telephone Network
 
PT
Payload Type
 
PXE
Preboot eXecution Environment
 
QoR
Query on Release
 
QoS
Quality of Service
 
RAA
Re-Auth-Answer
 
RACF
Resource and Admission Control Function
 
RACS
Resource Access Control Server
 
RADIUS
Remote Authentication Dial In User Service
 
RAND
Random Challenge
 
RAR
Re-Auth-Request
 
RCA
Root Cause Analysis
 
RDF
Routing Determination Function
 
RDN
Relative Distinguished Name
 
RES
Remote-control Equipment Subsystem
 
RFC
Request for Comments
 
RN
Routing Number
 
RPH
Resource-Priority Header
 
RS
Registration Surrogate
 
R-SGW
Roaming Signaling Gateway
 
RTA
Registration Termination Answer
 
RTCP
RTP Control Protocol
 
RTP
Real-Time Transport Protocol
 
RTR
Registration Termination Request
 
RTT
Round Trip Time
 
S-CSCF
Serving Call Session Control Function
 
SA
Security Association
 
SAA
Server-Assignment-Answer
 
SAAL
Signalling ATM Adaptation Layer
 
SAD
Security Association Database
 
SAF
Service Application Framework
 
SAN
Storage Area Network
 
SAP
Service Access Point
 
SAPC
Service-Aware Policy Controller
 
SAR
Server-Assignment-Request
 
SAT
Server_Assignment_Type
 
SBC
Session Border Controller
 
SBG
Session Border Gateway
 
S-CSCF
Serving Call Session Control Function
 
SC
System Controller
 
SCC AS
Service Centralization and Continuity Application Server
 
SCSv
Statistics Collection Service
 
SCTP
Stream Control Transmission Protocol
 
SCUR
Session Charging with Unit Reservation
 
SD
Security Domain
 
SDP
Session Description Protocol | Software Delivery Package
 
SFTP
SSH File Transfer Protocol
 
SGSN
Serving GPRS Support Node
 
SiFC
Shared iFC
 
SigComp
Signalling Compression
 
SIM
Subscriber Identity Module
 
SIP
Session Initiation Protocol
 
SLF
Subscriber Location Function
 
SLS
Second Line Support
 
SMP
Subscribed Media Profile
 
SMP ID
Subscribed Media Profile Identifier
 
SMS
State Memory Size
 
SNMP
Simple Network Management Protocol
 
SOAP
Simple Object Access Protocol
 
SoC
Statement of Compliance
 
SP
Service Provider
 
SPI
Security Parameter Index
 
SPT
Service Point Trigger
 
SQN
Sequence Number
 
SRD
System Repository and Directory
 
SRV
Service Record
 
SRVCC
Single Radio Voice Call Continuity
 
SS
Solution Set
 
SSCF
Service Specific Coordination Layer
 
SSCOP
Service Specific Connected Orientated Protocol
 
SSH
Secure Shell
 
SSHD
Secure Shell Daemon
 
SSO
Single Sign-On
 
STA
Session-Termination-Answer
 
STR
Session-Termination-Request
 
STUN
Session Traversal Utilities for NAT
 
TCP
Transmission Control Protocol
 
TCAP
Transaction Capabilities Application Part
 
TCO
Total Cost Ownership
 
TelORB
Telephone Object Request Broker
 
tel URI
Telephone Uniform Resource Locator
 
TIPC
Transparent Inter-Process Communication
 
TLS
Transport Layer Security
 
TP
Traffic Processor
 
TRs
Trouble Reports
 
T-SGW
Trunking Signaling Gateway
 
TFTP
Trivial File Transfer Protocol
 
UA
User Agent
 
UAA
User-Authorization-Answer
 
UAC
User Agent Client
 
UAR
User-Authorization-Request
 
UAS
User Agent Server
 
UAT
User Authorization Type
 
UDP
User Datagram Protocol
 
UDVM
Universal Decompressor Virtual Machine
 
UE
User Equipment
 
UICC
Universal Integrated Circuit Card
 
UMS
UDVM Memory Size
 
UMTS
Universal Mobile Telecommunications System
 
UNI
User Network Interface
 
URI
Uniform Resource Identifier
 
URL
Uniform Resource Locator
 
URN
Uniform Resource Name
 
USD
User Specific Dictionary
 
USIM
Universal Subscriber Identity Module
 
UTC
Coordinated Universal Time
 
UTRAN
Universal Terrestrial Radio Access Network
 
UUI
User-User Information Element
 
UUID
Universally Unique Identifier
 
vApp
Virtual Application
 
VC
Virtual Channel
 
VCC
Virtual Channel Connection
 
VCL
Virtual Channel Link
 
vCPU
Virtual CPU
 
vCSCF
Virtual Call Session Control Function
 
VDU
Virtualization Deployment Unit
 
VII
VNF Instantiation Improvement
 
VIP
Virtual IP
 
VLAN
Virtual Local Area Network
 
VM
Virtual Machine
 
VMDK
Virtual Machine Disk
 
VMM
Virtual Machine Monitor
 
VNF
Virtual Network Function
 
VNFC
Virtual Network Function Component
 
VNF-LCM
VNF Lifecycle Manager
 
VNIC
Virtual Network Interface Controller | Virtual Network Interface Card
 
VoLTE
Voice over LTE
 
VP
Virtual Path
 
VPC
Virtual Path Connection
 
VPL
Virtual Path Link
 
VPN
Virtual Private Network
 
VPT
Virtual Path Terminator
 
VRRP
Virtual Router Redundancy Protocol
 
wIMPU
Wildcarded Public User Identity
 
WLAN
Wireless Local Area Network
 
WP
Wholesale Partner
 
WPS
Wireless Priority Service
 
wPSI
Wildcarded Public Service Identity
 
WSDL
Web Services Description Language
 
WUIGM
Web User Interface for Group and Data Management
 
XCAP
XML Configuration Access Protocol
 
XDMS
XML Document Management Server
 
XMAC
Expected MAC
 
XRES
Expected RES
 
XSD
XML Schema Definition


Copyright

© Ericsson AB 2016–2018. All rights reserved. No part of this document may be reproduced in any form without the written permission of the copyright owner.

Disclaimer

The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Ericsson shall have no liability for any error or damage of any kind resulting from the use of this document.

Trademark List
All trademarks mentioned herein are the property of their respective owners. These are shown in the document Trademark Information.

    Glossary of Terms and Acronyms         Call Session Control Function