Design Reference
Table Of Contents
- Contents
- Chapter 1: Introduction
- Chapter 2: New in Release 4.0.50
- Chapter 3: New in Release 4.0.40
- Chapter 4: New in Release 4.0
- Chapter 5: Network design fundamentals
- Chapter 6: Hardware fundamentals and guidelines
- Chapter 7: Optical routing design
- Chapter 8: Platform redundancy
- Chapter 9: Link redundancy
- Chapter 10: Layer 2 loop prevention
- Chapter 11: Spanning tree
- Chapter 12: Layer 3 network design
- Chapter 13: SPBM design guidelines
- Chapter 14: IP multicast network design
- Multicast and VRF-Lite
- Multicast and MultiLink Trunking considerations
- Multicast scalability design rules
- IP multicast address range restrictions
- Multicast MAC address mapping considerations
- Dynamic multicast configuration changes
- IGMPv3 backward compatibility
- IGMP Layer 2 Querier
- TTL in IP multicast packets
- Multicast MAC filtering
- Guidelines for multicast access policies
- Multicast for multimedia
- Chapter 15: System and network stability and security
- Chapter 16: QoS design guidelines
- Chapter 17: Layer 1, 2, and 3 design examples
- Chapter 18: Software scaling capabilities
- Chapter 19: Supported standards, RFCs, and MIBs
- Glossary
Provider Backbone
Bridge (PBB)
To forward customer traffic across the service-provider backbone, SPBM
uses IEEE 802.1ah Provider Backbone Bridging (PBB) MAC-in-MAC
encapsulation, which hides the customer MAC (C-MAC) addresses in a
backbone MAC (B-MAC) address pair. MAC-in-MAC encapsulation defines
a BMAC-DA and BMAC-SA to identify the backbone source and destination
addresses.
quality of service
(QoS)
QoS features reserve resources in a congested network, allowing you to
configure a higher priority for certain devices. For example, you can
configure a higher priority for IP deskphones, which need a fixed bit rate
and split the remaining bandwidth between data connections if calls in the
network are more important than the file transfers.
Read Write All (RWA)
An access class that lets users access all menu items and editable fields.
remote login (rlogin) An application that provides a terminal interface between hosts (usually
UNIX) that use the TCP/IP network protocol. Unlike Telnet, rlogin assumes
the remote host is, or behaves like, a UNIX host.
remote monitoring
(RMON)
A remote monitoring standard for Simple Network Management Protocol
(SNMP)-based management information bases (MIB). The Internetwork
Engineering Task Force (IETF) proposed the RMON standard to provide
guidelines for remote monitoring of individual LAN segments.
resilient packet ring
(RPR)
A shared packet edge ring connection, where both paths around the ring
carry traffic, which allows double bandwidth on each ring.
reverse path
forwarding (RPF)
Prevents a packet from forging its source IP address. Typically, the system
examines and validates the source address of each packet.
route flapping An instability that is associated with a prefix, where the associated prefix
routes can exhibit frequent changes in availability over a period of time.
routing policy A form of routing that is influenced by factors other than the default
algorithmically best route, such as the shortest or quickest path.
Secure Copy (SCP) Secure Copy securely transfers files between the switch and a remote
station.
Secure Shell (SSH) SSH uses encryption to provide security for remote logons and data
transfer over the Internet.
Secure Sockets
Layer (SSL)
An Internet security encryption and authentication protocol for secure point-
to-point connections over the Internet and intranets, especially between
clients and servers.
Service Instance
Identifier (I-SID)
The SPBM B-MAC header includes a Service Instance Identifier (I-SID)
with a length of 24 bits. SPBM uses this I-SID to identify and transmit any
virtualized traffic in an encapsulated SPBM frame. SPBM uses I-SIDs to
virtualize VLANs (Layer 2 Virtual Services Network [VSN]) or VRFs (Layer
Provider Backbone Bridge (PBB)
December 2014 Network Design Reference for Avaya VSP 4000 Series 155
Comments? infodev@avaya.com










