Design Reference
Table Of Contents
- Contents
- Chapter 1: Introduction
- Chapter 2: New in this release
- Chapter 3: Network design fundamentals
- Chapter 4: Hardware fundamentals and guidelines
- Chapter 5: Optical routing design
- Chapter 6: Platform redundancy
- Chapter 7: Link redundancy
- Chapter 8: Layer 2 loop prevention
- Chapter 9: Spanning tree
- Chapter 10: Layer 3 network design
- Chapter 11: SPBM design guidelines
- Chapter 12: IP multicast network design
- Multicast and VRF-lite
- Multicast and MultiLink Trunking considerations
- Multicast scalability design rules
- IP multicast address range restrictions
- Multicast MAC address mapping considerations
- Dynamic multicast configuration changes
- IGMPv3 backward compatibility
- IGMP Layer 2 Querier
- TTL in IP multicast packets
- Multicast MAC filtering
- Guidelines for multicast access policies
- Multicast for multimedia
- Chapter 13: System and network stability and security
- Chapter 14: QoS design guidelines
- Chapter 15: Layer 1, 2, and 3 design examples
- Chapter 16: Software scaling capabilities
- Chapter 17: Supported standards, RFCs, and MIBs
- Glossary
diameter. These fibers have a potential bandwidth of 50 to 100 GHz per
kilometer.
small form factor
pluggable (SFP)
A hot-swappable input and output enhancement component used with
Avaya products to allow gigabit Ethernet ports to link with other gigabit
Ethernet ports over various media types.
small form factor
pluggable plus
(SFP+)
SFP+ transceivers are similar to SFPs in physical appearance but SFP
+ transceivers provide Ethernet at 10 gigabit per second (Gb/s).
spanning tree A simple, fully-connected active topology formed from the arbitrary
physical topology of connected bridged Local Area Network components
by relaying frames through selected bridge ports. The protocol
parameters and states that are used and exchanged to facilitate the
calculation of the active topology and to control the bridge relay
function.
Spanning Tree
Group (STG)
A collection of ports in one spanning tree instance.
SysAdmin, Audit,
Network, Security
(SANS) Institute
The research and education organization for network administrators and
security professionals.
time-to-live (TTL) The field in a packet used to determine the valid duration for the packet.
The TTL determines the packet lifetime. The system discards a packet
with a TTL of zero.
traffic engineering A method that guarantees performance in a network.
Trivial File
Transfer Protocol
(TFTP)
A protocol that governs transferring files between nodes without
protection against packet loss.
trunk A logical group of ports that behaves like a single large port.
unshielded
twisted pair (UTP)
A cable with one or more pairs of twisted insulated copper conductors
bound in a single plastic sheath.
user-based
security model
(USM)
A security model that uses a defined set of user identities for authorized
users on a particular Simple Network Management Protocol (SNMP)
engine.
User Datagram
Protocol (UDP)
In TCP/IP, a packet-level protocol built directly on the Internet Protocol
layer. TCP/IP host systems use UDP for application-to-application
programs.
User Datagram Protocol (UDP)
Network Design Reference for Avaya VSP 4000 February 2014 163