Design Reference

Table Of Contents
Provider Backbone
Bridge (PBB)
To forward customer traffic across the service-provider backbone, SPBM
uses IEEE 802.1ah Provider Backbone Bridging (PBB) MAC-in-MAC
encapsulation, which hides the customer MAC (C-MAC) addresses in a
backbone MAC (B-MAC) address pair. MAC-in-MAC encapsulation defines
a BMAC-DA and BMAC-SA to identify the backbone source and destination
addresses.
quality of service
(QoS)
QoS features reserve resources in a congested network, allowing you to
configure a higher priority for certain devices. For example, you can
configure a higher priority for IP deskphones, which need a fixed bit rate
and split the remaining bandwidth between data connections if calls in the
network are more important than the file transfers.
Read Write All (RWA)
An access class that lets users access all menu items and editable fields.
remote login (rlogin) An application that provides a terminal interface between hosts (usually
UNIX) that use the TCP/IP network protocol. Unlike Telnet, rlogin assumes
the remote host is, or behaves like, a UNIX host.
remote monitoring
(RMON)
A remote monitoring standard for Simple Network Management Protocol
(SNMP)-based management information bases (MIB). The Internetwork
Engineering Task Force (IETF) proposed the RMON standard to provide
guidelines for remote monitoring of individual LAN segments.
resilient packet ring
(RPR)
A shared packet edge ring connection, where both paths around the ring
carry traffic, which allows double bandwidth on each ring.
reverse path
forwarding (RPF)
Prevents a packet from forging its source IP address. Typically, the system
examines and validates the source address of each packet.
route flapping An instability that is associated with a prefix, where the associated prefix
routes can exhibit frequent changes in availability over a period of time.
routing policy A form of routing that is influenced by factors other than the default
algorithmically best route, such as the shortest or quickest path.
Secure Copy (SCP) Secure Copy securely transfers files between the switch and a remote
station.
Secure Shell (SSH) SSH uses encryption to provide security for remote logons and data
transfer over the Internet.
Secure Sockets
Layer (SSL)
An Internet security encryption and authentication protocol for secure point-
to-point connections over the Internet and intranets, especially between
clients and servers.
Service Instance
Identifier (I-SID)
The SPBM B-MAC header includes a Service Instance Identifier (I-SID)
with a length of 24 bits. SPBM uses this I-SID to identify and transmit any
virtualized traffic in an encapsulated SPBM frame. SPBM uses I-SIDs to
virtualize VLANs (Layer 2 Virtual Services Network [VSN]) or VRFs (Layer
Provider Backbone Bridge (PBB)
December 2014 Network Design Reference for Avaya VSP 4000 Series 155
Comments? infodev@avaya.com