Title | Size | Downloads |
---|---|---|
14-Acronyms-book.pdf | 93.75 KB |
- Table of Contents
H3C network technology acronyms
# A B C D E F G H I L M N O P Q R S T U V W X Z
AAL5 |
ATM Adaptation Layer 5 |
ABR |
Area Border Router |
AC |
Access Controller |
AC |
Access Category |
ACCM |
Async-Control-Character-Map |
ACFC |
Address-and-Control-Field-Compression |
ACFP |
Application Control Forwarding Protocol |
ACL |
Access Control List |
ACS |
Auto-Configuration Server |
AD |
Active Directory |
ADPCM |
Adaptive Differential Pulse Code Modulation |
ADSL |
Asymmetric Digital Subscriber Line |
AES |
Advanced Encryption Standard |
AFT |
Address Family Translation |
AFTR |
Address Family Transition Router |
AH |
Authentication Header |
AIFSN |
Arbitration Inter Frame Spacing Number |
AIS |
Alarm Indication Signal |
ALG |
Application Level Gateway |
AM |
Analog Modem |
AMI |
Alternate Mark Inversion |
ANSI |
American National Standard Institute |
AP |
Access Point |
APP |
Application Protocol |
APPN |
Advanced Peer-to-Peer Networking |
ARP |
Address Resolution Protocol |
AS |
Autonomous System |
AS |
Authentication Server |
ASBR |
Autonomous System Boundary Router |
ASM |
Any-Source Multicast |
ASPF |
Application Specific Packet Filter |
ATD |
Attribute Discovery |
ATM |
Asynchronous Transfer Mode |
AU |
Administration Unit |
AV |
Anti-Virus |
AVF |
Active Virtual Forwarder |
AVP |
Attribute Value Pair |
B8ZS |
Bipolar 8 zeros substitution |
BAS |
Broadband Access Server |
BC |
Boundary Clock |
BC |
Bandwidth Constraint |
BCB |
Backbone Core Bridge |
BDI |
Backward Defect Indication |
BDR |
Backup Designated Router |
BEB |
Backbone Edge Bridge |
BFD |
Bidirectional Forwarding Detection |
BGP |
Border Gateway Protocol |
BIMS |
Branch Intelligent Management System |
B-MAC |
Backbone MAC |
BMC |
Best Master Clock |
BOOTP |
Bootstrap Protocol |
BPDU |
Bridge Protocol Data Unit |
BQ |
Bandwidth Queuing |
BSB |
Blockade State Block |
BSR |
Bootstrap Router |
BSS |
Basic Service Set |
BT |
BitTorrent |
B-VLAN |
Backbone VLAN |
CA |
Certificate Authority |
CAC |
Connect Admission Control |
CAMS |
Comprehensive Access Management Server |
CAPWAP |
Controlling and Provisioning of Wireless Access Point |
CAR |
Committed Access Rate |
CBQ |
Class Based Queuing |
CBR |
Constant Bit Rate |
CBS |
Committed Burst Size |
C-BSR |
Candidate-BSR |
CBT |
Core-Based Tree |
CBWFQ |
Class Based Weighted Fair Queuing |
CC |
Continuity Check |
CCC |
Circuit Cross Connect |
CCM |
Continuity Check Message |
CDP |
Cisco Discovery Protocol |
CE |
Customer Edge |
CEE |
Converged Enhanced Ethernet |
CEM Class |
Circuit Emulation Class |
CESOPSN |
Circuit Emulation Services over PSN |
CFD |
Connectivity Fault Detection |
CFI |
Canonical Format Indicator |
CFM |
Connectivity Fault Management |
CHAP |
Challenge Handshake Authentication Protocol |
CIDR |
Classless Inter-Domain Routing |
CIR |
Committed Information Rate |
CIST |
Common and Internal Spanning Tree |
CO |
Central Office |
COPS |
Common Open Policy Service |
CPE |
Customer Premises Equipment |
CPS |
Certification Practice Statement |
CPTone |
Call Progress Tone |
CR |
Constraint-based Routing |
CRC4 |
Cyclic Redundancy Check 4 |
CRL |
Certificate Revocation List |
CR-LDP |
Constraint-based Routed Label Distribution Protocol |
CR-LSP |
Constraint-based Routed Label Switched Paths |
C-RP |
Candidate-RP |
CSNP |
Complete SNP |
CSPF |
Constraint-based Shortest Path First |
CST |
Common Spanning Tree |
CT |
Class Type |
CTR |
Counter mode |
CV |
Connectivity Verification |
CWMP |
CPE WAN Management Protocol |
DAD |
Duplicate Address Detection |
DAR |
Deeper Application Recognition |
DCBX |
Data Center Bridging Exchange Protocol |
DCC |
Dial Control Center |
DCE |
Date Center Ethernet |
DCE |
Data Circuit-terminating Equipment |
DCF |
Distributed Coordination Function |
DD |
Database Description |
DDN |
Digital Data Network |
DDNS |
Dynamic Domain Name System |
DDoS |
Distributed Denial of Service |
DER |
Distinguished Encoding Rules |
DF |
Designated Forwarder |
DH |
Diffie-Hellman |
DHCP |
Dynamic Host Configuration Protocol |
DHCPv6 |
Dynamic Host Configuration Protocol for IPv6 |
DiffServ |
Differentiated Service |
DLCI |
Data Link Connection Identifier |
DLDP |
Device Link Detection Protocol |
DLSw |
Data Link Switching |
DM |
Dense Mode |
DM |
Delay Measurement |
DMM |
Delay Measurement Message |
DMR |
Delay Measurement Reply |
DMZ |
Demilitarized Zone |
DN |
Distinguished Name |
DNAT |
Destination NAT |
DNS |
Domain Name System |
DoD |
Downstream On Demand |
DoS |
Denial of Service |
DPD |
Dead Peer Detection |
DR |
Designated Router |
DS |
Differentiated Services |
DSA |
Digital Signature Algorithm |
DSCP |
Differentiated Services Codepoint |
DS-lite |
Dual Stack Lite |
DTE |
Data Terminal Equipment |
DTMF |
Dual Tone Multi-Frequency |
DU |
Downstream Unsolicited |
DUID |
DHCP Unique Identifier |
DUID-LL |
DUID Based on Link-layer Address |
DVMRP |
Distance Vector Multicast Routing Protocol |
DVPN |
Dynamic Virtual Private Network |
DWDM |
Dense Wavelength Division Multiplexing |
E2ETC |
End-to-End Transparent Clock |
EACL |
Enhanced ACL |
EAD |
Endpoint Admission Defense |
EAIS |
Ethernet Alarm Indication Signal |
EAP |
Extensible Authentication Protocol |
EAPOL |
Extensible Authentication Protocol over LAN |
EBS |
Excess Burst Size |
ECDSA |
Elliptic Curve Digital Signature Algorithm |
ECM |
Error Correction Mode |
ECWmax |
Exponent form of CWmax |
ECWmin |
Exponent form of CWmin |
EDCA |
Enhanced Distributed Channel Access |
EGP |
Exterior Gateway Protocol |
End-Of-RIB |
End of Routing-Information-Base |
ENUM |
Telephone Number Mapping |
ERT |
Export Route-target |
ESF |
Extended Super Frame |
ESP |
Encapsulating Security Payload |
ESS |
Extended Service Set |
ETS |
Enhanced Transmission Selection |
ETSI |
European Telecommunications Standards Institute |
FC |
Fibre Channel |
FCoE |
Fibre Channel over Ethernet |
FEC |
Forwarding Equivalence Class |
FFD |
Fast Failure Detection |
FIB |
Forwarding Information Base |
FIFO |
First In First Out |
FIP |
FCoE Initialization Protocol |
FQDN |
Fully Qualified Domain Name |
FRR |
Fast Reroute |
FSK |
Frequency Shift Keying |
FTN |
FEC to NHLFE map |
FTP |
File Transfer Protocol |
GARP |
Generic Attribute Registration Protocol |
GBIC |
Gigabit Interface Converter |
GI |
Guard Interval |
GNS |
Get Nearest Server |
GPS |
Global Positioning System |
GR |
Graceful Restart |
GRE |
Generic Routing Encapsulation |
GTK |
Group Temporal Key |
GTP |
GPRS Tunneling Protocol |
GTS |
Generic Traffic Shaping |
GTSM |
Generalized TTL Security Mechanism |
GVRP |
GARP VLAN Registration Protocol |
HABP |
HW Bypass Protocol |
HDB3 |
High-density Bipolar 3 |
HDLC |
High-level Data Link Control |
HGMP |
HW Group Management Protocol |
HGMPv2 |
HW Group Management Protocol version 2 |
HQoS |
Hierarchical Quality of Service |
HTTP |
Hypertext Transfer Protocol |
HTTPS |
Hypertext Transfer Protocol Secure |
H-VPLS |
Hierarchy of VPLS |
HWTACACS |
HW Terminal Access Controller Access Control System |
IA |
Identity Association |
IACTP |
Inter Access Controller Tunneling Protocol |
IAD |
Integrated Access Device |
IANA |
Internet Assigned Numbers Authority |
IBGP |
Internal Border Gateway Protocol |
ICMP |
Internet Control Message Protocol |
ICMPv6 |
Internet Control Message Protocol for IPv6 |
ICPIF |
Calculated Planning Impairment Factor |
ID |
Direct Inward Dialing |
IDS |
Intrusion Detection System |
IE |
Information Element |
IEEE |
Institute of Electrical and Electronics Engineers |
IETF |
Internet Engineering Task Force |
IGMP |
Internet Group Management Protocol |
IGMP Snooping |
Internet Group Management Protocol Snooping |
IGP |
Interior Gateway Protocol |
IKE |
Internet Key Exchange |
ILM |
Incoming Label Map |
ILS |
Internet Locator Service |
IM |
Instant Messaging |
IMA |
Inverse Multiplexing for ATM |
IMSI |
International Mobile Subscriber Identification Number |
InARP |
Inverse Address Resolution Protocol |
IntServ |
Integrated Service |
IPC |
Inter-process Communication |
IPHC |
IP Header Compression |
IPng |
IP Next Generation |
IPS |
Intrusion Prevention System |
IPsec |
IP Security |
IPTA |
IP Terminal Access |
IPv6 |
Internet Protocol Version 6 |
IPX |
Internetwork Packet Exchange |
IRDP |
ICMP Router Discovery Protocol |
IRF |
Intelligent Resilient Framework |
ISAKMP |
Internet Security Association and Key Management Protocol |
ISATAP |
Intra-Site Automatic Tunnel Addressing Protocol |
ISDN |
Integrated Services Digital Network |
I-SID |
Backbone Service Instance Identifier |
IS-IS |
Intermediate System-to-Intermediate System |
ISP |
Internet Service Provider |
ISPF |
Incremental Shortest Path First |
ISSU |
In-Service Software Upgrade |
IST |
Internal Spanning Tree |
ITSP |
Internet Telephone Service Provider |
IVR |
Interactive Voice Response |
L2F |
Layer 2 Forwarding |
L2TP |
Layer 2 Tunneling Protocol |
LAC |
L2TP Access Concentrator |
LACP |
Link Aggregation Control Protocol |
LACPDU |
Link Aggregation Control Protocol Data Unit |
LAN |
Local Area Network |
LB |
Load Balance |
LBM |
Loopback Message |
LBR |
Loopback Reply |
LC |
Logic Channel |
LCI |
Logic Channel Identifier |
LCP |
Link Control Protocol |
LDAP |
Lightweight Directory Access Protocol |
LDP |
Label Distribution Protocol |
LER |
Label Edge Router |
LFI |
Link Fragmentation and Interleaving |
LFIB |
Label Forwarding Information Base |
LLDP |
Link Layer Discovery Protocol |
LLDPDU |
Link Layer Discovery Protocol Data Unit |
LLDP-MED |
Media Endpoint Discovery |
LLQ |
Low Latency Queuing |
LM |
Loss Measurement |
LMI |
Local Management Interface |
LMM |
Loss Measurement Message |
LMR |
Loss Measurement Reply |
LNS |
L2TP Network Server |
LOCV |
Loss of Connectivity Verification defect |
LR |
Line Rate |
LSA |
Link State Advertisement |
LSAck |
Link State Acknowledgment |
LSDB |
Link State Database |
LSP |
Label Switched Path |
LSR |
Link State Request |
LSR |
Label Switching Router |
LSU |
Link State Update |
LTM |
Linktrace Message |
LTR |
Linktrace Reply |
LVF |
Listening Virtual Forwarder |
MA |
Maintenance Association |
MAC |
Media Access Control |
MAC |
Message Authentication Code |
MAD |
Multi-Active Detection |
MAM |
Maximum Allocation Model |
MAN |
Metropolitan Area Network |
MBGP |
Multicast BGP |
MCE |
Multi-VPN-instance Customer Edge |
MCS |
Modulation and Coding Scheme |
MD |
Maintenance Domain |
MD |
Multicast Domain |
MDI |
Medium Dependent Interface |
MEP |
Maintenance association End Point |
MIB |
Management Information Base |
MIC |
Message Integrity Check |
MIP |
Maintenance association Intermediate Point |
MLD |
Multicast Listener Discovery Protocol |
MLD Snooping |
Multicast Listener Discovery Snooping |
MLSP |
Mobile Link Switch Protocol |
MOS |
Mean Opinion Scores |
MP |
Maintenance Point |
MP-BGP |
Multiprotocol Border Gateway Protocol |
MPLS |
Multiprotocol Label Switching |
MPLS TE |
Multiprotocol Label Switching Traffic Engineering |
MPLS-TP |
MPLS Transport Profile |
MSDP |
Multicast Source Discovery Protocol |
MSTI |
Multiple Spanning Tree Instance |
MSTP |
Multiple Spanning Tree Protocol |
MTBF |
Mean Time Between Failures |
MTR |
Multi-Topology Routing |
MTTR |
Mean Time to Repair |
MTU |
Maximum Transmission Unit |
MU |
Mobile Unit |
NAPT |
Network Address Port Translation |
NAPT-PT |
Network Address Port Translation-Protocol Translation |
NAS |
Network Access Server |
NAT |
Network Address Translation |
NAT-PT |
Network Address Translation-Protocol Translation |
NBMA |
Non-Broadcast Multi-Access |
NCP |
Network Control Protocol |
ND |
Neighbor Discovery |
NDA |
NetStream Data Analyzer |
NDE |
NetStream Data Exporter |
NDP |
Neighbor Discover Protocol |
NET |
Network Entity Title |
NETCONF |
Network Configuration Protocol |
NHLFE |
Next Hop Label Forwarding Entry |
NLPID |
Network Layer Protocol Identifier |
NLRI |
Network Layer Reachability Information |
NMS |
Network Management System |
NNI |
Network-to-Network Interface |
NQA |
Network Quality Analyzer |
nrt_VBR |
Nonreal-time Variable Bit Rate |
NSC |
NetStream Collector |
NSF |
Non-Standard Facilities |
NSR |
Nonstop Routing |
NTDP |
Neighbor Topology Discover Protocol |
NTP |
Network Time Protocol |
OAA |
Open Application Architecture |
OAMPDU |
OAM Protocol Data Units |
OAP |
Open Application Platform |
OC |
Optical Carrier |
OC |
Ordinary Clock |
OID |
Object Identifier |
ORF |
Outbound Route Filtering |
OSPF |
Open Shortest Path First |
OUI |
Organizationally Unique Identifier |
P2MP |
Point-to-MultiPoint |
P2P |
Point-to-Point |
P2P |
Peer-to-Peer |
P2P |
PW to PW |
P2P |
Point to Point |
P2PTC |
Peer-to-Peer Transparent Clock |
PAGP |
Port Aggregation Protocol |
PAM |
Port to Application Map |
PAP |
Password Authentication Protocol |
PAT |
Port Address Translation |
PBB |
Provider Backbone Bridge |
PBBN |
Provider Backbone Bridge Network |
PBN |
Provider Bridge Network |
PCM |
Pulse Code Modulation |
PCR |
Peak Cell Rate |
PD |
Powered Device |
PD |
Prefix Delegation |
PDH |
Plesiochronous Digital Hierarchy |
PDP |
Policy Decision Point |
PDU |
Protocol Data Unit |
PE |
Provider Edge |
PE-agg |
PE Aggregation |
PEAP-GTC |
Protected Extensible Authentication Protocol-Microsoft Generic Token Card |
PEAP-MSCHAPv2 |
Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol v2 |
PEP |
Policy Enforcement Point |
PFC |
Protocol-Field-Compression |
PFC |
Priority-based Flow Control |
PFS |
Perfect Forward Secrecy |
PHP |
Penultimate Hop Popping |
PI |
Power Interface |
PIM |
Protocol Independent Multicast |
PIM Snooping |
Protocol Independent Multicast Snooping |
PKCS |
Public Key Cryptography Standards |
PKI |
Public Key Infrastructure |
PMK |
Pairwise Master Key |
PMTU |
Path MTU |
PoE |
Power over Ethernet |
POH |
Path Overhead |
POP3 |
Post Office Protocol, Version 3 |
POS |
Point of Sale |
PPP |
Point-to-Point Protocol |
PPPoE |
Point-to-Point Protocol over Ethernet |
PPTP |
Point-to-Point Tunneling Protocol |
PRL |
Preferred Roming List |
PS |
Protection Switching |
PSB |
Path State Block |
PSC |
Protection State Coordination |
PSE |
Power Sourcing Equipment |
PSK |
Pre-Shared Key |
PSNP |
Partial SNP |
PSTN |
Public Switched Telephone Network |
PTP |
Precision Time Protocol |
PTY |
Pseudo-Terminals |
PVC |
Permanent Virtual Circuit |
PVST |
Per VLAN Spanning Tree |
PXE |
Preboot eXecution Environment |
QoS |
Quality of Service |
QPPB |
QoS Policy Propagation Through the Border Gateway Protocol |
RA |
Router Advertisement |
RA |
Registration Authority |
RADIUS |
Remote Authentication Dial-In User Service |
RD |
Route Distinguisher |
RDI |
Remote Defect Indication |
RDM |
Russian Dolls Model |
RED |
Random Early Detection |
RFID |
Radio Frequency Identification |
RIP |
Routing Information Protocol |
RIP-2 |
Routing Information Protocol version 2 |
RLSN |
Remote Link Status Notification |
RMON |
Remote Network Monitoring |
RP |
Rendezvous Point |
RPA |
Rendezvous Point Address |
RPF |
Reverse Path Forwarding |
RPL |
Rendezvous Point Link |
RPR |
Resilient Packet Ring |
RPT |
Rendezvous Point Tree |
RR |
Router Renumber |
RRPP |
Rapid Ring Protection Protocol |
RS |
Router Solicitation |
RSA |
Rivest Shamir and Adleman |
RSB |
Reservation State Block |
RSH |
Remote Shell |
RSN |
Robust Security Network |
RSNA |
Robust Security Network Association |
RSTP |
Rapid Spanning Tree Protocol |
RSVP |
Resource Reservation Protocol |
rt_VBR |
Real-time Variable Bit Rate |
RTC |
Remote Terminal Connection |
RTCP |
Real-Time Transport Control Protocol |
RTP |
Real-Time Transport Protocol |
RTS |
Request to Send |
RTSP |
Real Time Streaming Protocol |
SA |
Security Association |
SA |
Source Active |
SABM |
Set Asynchronous Balanced Mode |
SAN |
Storage Area Networks |
SAP |
Service Advertising Protocol |
SATOP |
Structure-Agnostic TDM over Packet |
SAVI |
Source Address Validation |
SBM |
Subnetwork Bandwidth Management |
SCCP |
Skinny Client Control Protocol |
SCEP |
Simple Certificate Enrollment Protocol |
SCFF |
Single Choke Fairness Frame |
SDH |
Synchronous Digital Hierarchy |
SDLC |
Synchronous Data Link Control |
SDP |
Session Description Protocol |
SDU |
Service Data Unit |
SF |
Super Frame |
sFlow |
Sampled Flow |
SFM |
Source-Filtered Multicast |
SFP |
Small Form-factor Pluggable |
SFTP |
Secure FTP |
SIP |
Session Initiation Protocol |
SIPS |
SIP secure |
SLA |
Service Level Agreement |
SLAAC-Only |
Stateless Address Autoconfiguration |
SLIP |
Serial Line Internet Protocol |
SM |
Sparse Mode |
SMTP |
Simple Mail Transfer Protocol |
SNA |
System Network Architecture |
SNAP |
Subnetwork Access Protocol |
SNMP |
Simple Network Management Protocol |
SNPA |
Subnetwork Point of Attachment |
SNR |
Signal-to-Noise Ratio |
SONET |
Synchronous Optical Network |
SOO |
Site of Origin |
SP |
Service Provider |
SP |
Strict Priority |
SPCS |
Stored Program Control Switching System |
SPE |
Superstratum PE or Sevice Provider-end PE |
SPF |
Shortest Path First |
SPI |
Security Parameter Index |
SPID |
Service Profile Identification |
SPT |
Shortest Path Tree |
SQL |
Structured Query Language |
SRTP |
Secure Real-time Transport Protocol |
SSH |
Secure Shell |
SSID |
Service Set Identifier |
SSL |
Secure Sockets Layer |
SSM |
Source-Specific Multicast |
SSM |
Synchronization Status Marker |
SSP |
Switch-to-Switch Protocol |
ST |
Shared Tree |
STP |
Spanning Tree Protocol |
SVC |
Static Virtual Circuit |
SVC |
Switched Virtual Circuit |
SVP |
Spectralink Voice Priority |
TA |
Terminal Adapter |
TC |
Topology Checksum |
TC |
Transparent Clock |
TCI |
Tag Control Information |
TCN BPDU |
Topology Change Notification BPDU |
TDM |
Time Division Multiplexing |
TE |
Traffic Engineering |
TEDB |
TE DataBase |
TFTP |
Trivial File Transfer Protocol |
TLS |
Transport Layer Security |
TLS |
Transparent LAN Service |
ToS |
Type of Service |
TP |
Topology Protection |
TPDU |
Transport Protocol Data Unit |
TPID |
Tag Protocol Identifier |
TRIP |
Triggered RIP |
TS |
Traffic Shaping |
TST |
Test |
TTL |
Time to Live |
TTY |
True Type Terminal |
TU |
Tributary Unit |
TXOPLimit |
Transmission Opportunity Limit |
UA |
Unnumbered Acknowledge |
U-APSD |
Unscheduled automatic power-save delivery |
UBR |
Unspecified Bit Rate |
UDLD |
Uni-directional Link Direction |
UNI |
User Network Interface |
URL |
Uniform Resource Locator |
URPF |
Unicast Reverse Path Forwarding |
USM |
User-Based Security Model |
UTC |
Coordinated Universal Time |
VAD |
Voice Activity Detection |
VAM |
VPN Address Management |
VC |
Virtual Circuit |
VC |
Virtual Container |
VCC |
Virtual Circuit Connection |
VCN |
Virtual Circuit Number |
VE |
Virtual Ethernet |
VE-Bridge |
Virtual Ethernet Bridge |
VF Owner |
Virtual Forwarder Owner |
VLAN |
Virtual Local Area Network |
VoD |
Video on Demand |
VoIP |
Voice over IP |
VP |
Virtual Path |
VPC |
Virtual Path Connection |
VPDN |
Virtual Private Dial-up Network |
VPLS |
Virtual Private LAN Service |
VPN |
Virtual Private Network |
VRRP |
Virtual Router Redundancy Protocol |
VSAN |
Virtual Storage Area Network |
VSI |
Virtual Switch Instance |
VT |
Virtual-template |
VTP |
VLAN Trunking Protocol |
VTY |
Virtual Type Terminal |
WAI |
WLAN Authentication Infrastructure |
WAN |
Wide Area Network |
WAPI |
WLAN Authentication and Privacy Infrastructure |
WDS |
Wireless Distribution System |
WEP |
Wired Equivalent Privacy |
WFQ |
Weighted Fair Queuing |
WIDS |
Wireless Intrusion Detection System |
WiNet |
Wisdom Network |
WINS |
Windows Internet Naming Service |
WLAN |
Wireless Local Area Network |
WMM |
Wi-Fi Multimedia |
WPA |
Wi-Fi Protected Access |
WPI |
WLAN Privacy Infrastructure |
WRED |
Weighted Random Early Detection |
WRR |
Weighted Round Robin |
WWN |
World Wide Name |
WWW |
World Wide Web |
XENPAK |
10-Gigabit Ethernet Transceiver Package |
XFP |
10-Gigabit small Form-factor Pluggable |
XML |
Extensible Markup Language |
ZBR |
Zone Border Router |