Wireless Icon glossary E-Plane E-plane: For a linearly polarized antenna, the plane containing the electric field vector and the direction of maximum radiation. The electric field or “E” plane determines the polarization or orientation… E-plane: For a linearly polarized antenna, the plane containing the electric field vector and the direction of maximum radiation. The electric field or “E” plane determines the polarization or orientation of the radio wave. For a vertically-polarized antenna, the E-plane usually coincides with the vertical/elevation plane. For a horizontally-polarized antenna, the E-Plane usually concided with the horizontal/azimuth plane Show more
LTE Icon glossary E-UTRA E-UTRA is the air interface of 3GPP’s Long Term Evolution (LTE) upgrade path for mobile networks. It is the abbreviation for evolved UMTS Terrestrial Radio Access, also referred to as… E-UTRA is the air interface of 3GPP’s Long Term Evolution (LTE) upgrade path for mobile networks. It is the abbreviation for evolved UMTS Terrestrial Radio Access, also referred to as the 3GPP work item on the Long Term Evolution (LTE) also known as the Evolved Universal Terrestrial Radio Access (E-UTRA) in early drafts of the 3GPP LTE specification. Show more
LTE Icon glossary E-UTRAN Evolved Universal Terrestrial Radio Access Network, see E-UTRA. Evolved Universal Terrestrial Radio Access Network, see E-UTRA.
Wireless Icon glossary E1 E1 (or E-1) is a European digital transmission format devised by the ITU-TS and given the name by the Conference of European Postal and Telecommunication Administration (CEPT). It is the… E1 (or E-1) is a European digital transmission format devised by the ITU-TS and given the name by the Conference of European Postal and Telecommunication Administration (CEPT). It is the equivalent of the North American T-carrier system format. The E1 signal format carries data at a rate of 2.048 million bits per second and can carry 32 channels of 64 Kbps each. E1 carries at a somewhat higher data rate than T-1 (which carries 1.544 million bits per second) because, unlike T-1, it does not do bit-robbing and all eight bits per channel are used to code the signal. E1 and T-1 can be interconnected for international use. Show more
Wireless Icon glossary EAP-TLS Extensible Authentication Protocol – Transportation Layer Security Extensible Authentication Protocol – Transportation Layer Security
LTE Icon glossary EARFCN E-UTRA Absolute Radio Frequency Channel Number. E-UTRA Absolute Radio Frequency Channel Number.
LTE Icon glossary ECGI E-UTRAN Cell Global Identifier is a globally unique identity of a cell in E-UTRA. E-UTRAN Cell Global Identifier is a globally unique identity of a cell in E-UTRA.
LTE Icon glossary ECI E-UTRAN Cell Identifier is used to identify a cell uniquely within a Public Land Mobile Network (PLMN). The ECI has a length of 28 bits and contains the eNodeB-IDentifier (eNB-ID). E-UTRAN Cell Identifier is used to identify a cell uniquely within a Public Land Mobile Network (PLMN). The ECI has a length of 28 bits and contains the eNodeB-IDentifier (eNB-ID).
LTE Icon glossary EDGE Enhanced Data rates for GSM Evolution or Enhanced Data rates for Global Evolution is a digital mobile phone technology that allows improved data transmission rates as a backward-compatible extension of… Enhanced Data rates for GSM Evolution or Enhanced Data rates for Global Evolution is a digital mobile phone technology that allows improved data transmission rates as a backward-compatible extension of GSM. Show more
LTE Icon glossary EEA Evolved Packet System Encryption Algorithm is used for ciphering, this may be either Advanced Encryption Standard (AES), SNOW 3G or null. All algorithms use a 128-bit input key. Evolved Packet System Encryption Algorithm is used for ciphering, this may be either Advanced Encryption Standard (AES), SNOW 3G or null. All algorithms use a 128-bit input key.
LTE Icon glossary EEC Ethernet Equipment Clock is used for synchronizing network equipment that uses synchronous Ethernet. Ethernet Equipment Clock is used for synchronizing network equipment that uses synchronous Ethernet.
LTE Icon glossary EESM Exponential Effective Signal to Interference plus Noise Ratio Mapping is a method for predicting an SINR level which in an Additive White Gaussian Noise (AWGN) channel would give equivalent demodulation… Exponential Effective Signal to Interference plus Noise Ratio Mapping is a method for predicting an SINR level which in an Additive White Gaussian Noise (AWGN) channel would give equivalent demodulation performance to that of a frequency-selective channel whose per subcarrier SINR values are known. Show more
Wireless Icon glossary Effective Isotropic Radiated Power (EIRP) The product of the power supplied to the antenna and the antenna gain in a given direction relative to an isotropic antenna. The product of the power supplied to the antenna and the antenna gain in a given direction relative to an isotropic antenna.
Wireless Icon glossary EGP (Exterior Gateway Protocol) A routing protocol that advertises networks between autonomous systems. A routing protocol that advertises networks between autonomous systems.
Wireless Icon glossary Electromagnetic compatibility (EMC) Electromagnetic interference immunity and interference emission of a cable/system. Electromagnetic interference immunity and interference emission of a cable/system.
Wireless Icon glossary Element Pack A license for Prizm management of a multi-point sector and covers the AP and up to 200 SMs, a backhaul link, or an Powerline LV link. A license for Prizm management of a multi-point sector and covers the AP and up to 200 SMs, a backhaul link, or an Powerline LV link.
LTE Icon glossary EMC ElectroMagnetic Compatibility is the branch of electrical sciences which studies the unintentional generation, propagation and reception of electromagnetic energy with reference to the unwanted effects (Electromagnetic interference, or EMI) that… ElectroMagnetic Compatibility is the branch of electrical sciences which studies the unintentional generation, propagation and reception of electromagnetic energy with reference to the unwanted effects (Electromagnetic interference, or EMI) that such energy may induce. Show more
Wireless Icon glossary EMI (electromagnetic interference) Interference that is caused by electromagnetic signals, which can in turn, decrease data integrity. Interference that is caused by electromagnetic signals, which can in turn, decrease data integrity.
Wireless Icon glossary Enable To turn on a feature in the module after the feature activation file has activated the module to use the feature. See also Activate. To turn on a feature in the module after the feature activation file has activated the module to use the feature. See also Activate.
Wireless Icon glossary Encapsulating Security Payload (ESP) One of the entities that can power the IPsec security suite of protocols. ESP classifies capabilities for authentication, data integrity, and encryption algorithms. One of the entities that can power the IPsec security suite of protocols. ESP classifies capabilities for authentication, data integrity, and encryption algorithms.
Wireless Icon glossary encapsulation This process adds a header or trailer to the Protocol Data Unit at each layer of the OSI model. This process adds a header or trailer to the Protocol Data Unit at each layer of the OSI model.
Wireless Icon glossary encryption This process scrambling data in order to make it unreadable, before transmitting it over the network. This process scrambling data in order to make it unreadable, before transmitting it over the network.
Wireless Icon glossary End Point A An End Point A is a node in a Point-to-Point link which controls the channel and authenticates a single end node termed End Point B. An End Point A is a node in a Point-to-Point link which controls the channel and authenticates a single end node termed End Point B.
Wireless Icon glossary End Point B An End Point B is a node in a Point-to-Point link which can register with the End Point A node only. Its behavior is controlled by the End Point A… An End Point B is a node in a Point-to-Point link which can register with the End Point A node only. Its behavior is controlled by the End Point A to which it is authenticated. Show more
Wireless Icon glossary Engine Bandwidth and Authentication Manager (BAM) interface to the AP and SMs. Unique sets of commands are available on this interface to manage parameters and user access. Distinguished from SSE. Bandwidth and Authentication Manager (BAM) interface to the AP and SMs. Unique sets of commands are available on this interface to manage parameters and user access. Distinguished from SSE.
LTE Icon glossary EPC Evolved Packet Core is the main component of the System Architecture Evolution (SAE) architecture, also known as SAE Core. The EPC will serve as equivalent of GPRS networks (via the… Evolved Packet Core is the main component of the System Architecture Evolution (SAE) architecture, also known as SAE Core. The EPC will serve as equivalent of GPRS networks (via the Mobility Management Entity, Serving Gateway and PDN Gateway subcomponents). Show more
LTE Icon glossary EPRE Energy Per Resource Element is the transmitted energy per Resource Element. Energy Per Resource Element is the transmitted energy per Resource Element.
Wireless Icon glossary Error-Disabled A port security condition in which an violation has occurred and the interface has been immobilized. A port security condition in which an violation has occurred and the interface has been immobilized.
Wireless Icon glossary ESN (Electronic Serial Number) Hardware address that the factory assigns to the module for identification in the Data Link layer interface of the Open Systems Interconnection system. This address serves as an electronic serial… Hardware address that the factory assigns to the module for identification in the Data Link layer interface of the Open Systems Interconnection system. This address serves as an electronic serial number. Same as MAC Address. Show more
Wireless Icon glossary ESN Data Table Table in which each row identifies data about a single SM. In tabseparated fields, each row stores the ESN, authentication key, and QoS information that apply to the SM. The… Table in which each row identifies data about a single SM. In tabseparated fields, each row stores the ESN, authentication key, and QoS information that apply to the SM. The operator can create and modify this table. This table is both an input to and an output from the Bandwidth and Authentication Manager (BAM) SQL database, and should be identically input to redundant BAM servers. Show more
Wireless Icon glossary ESS (Extended Service Set) A wireless topology that incorporates two or more wireless access points which then provide extended wireless coverage across the network. A wireless topology that incorporates two or more wireless access points which then provide extended wireless coverage across the network.
Wireless Icon glossary Ethernet The predominant wired LAN technology standardized in the IEEE 802.3 specification. The predominant wired LAN technology standardized in the IEEE 802.3 specification.
Wireless Icon glossary Ethernet Protocol Any of several IEEE standards that define the contents of frames that are transferred from one network element to another through Ethernet connections. Any of several IEEE standards that define the contents of frames that are transferred from one network element to another through Ethernet connections.
Wireless Icon glossary ETSI European Telecommunications Standards Institute European Telecommunications Standards Institute
LTE Icon glossary EVM Error Vector Magnitude is a measure used to quantify the performance of a digital radio transmitter or receiver. Error Vector Magnitude is a measure used to quantify the performance of a digital radio transmitter or receiver.
Wireless Icon glossary extended access list A list of permit and deny statements which are able to match network traffic based on the protocol used, source IP address, source port number, destination IP address, and destination… A list of permit and deny statements which are able to match network traffic based on the protocol used, source IP address, source port number, destination IP address, and destination port number. Show more