Design Reference
Table Of Contents
- Contents
- Chapter 1: Introduction
- Chapter 2: New in Release 4.0.50
- Chapter 3: New in Release 4.0.40
- Chapter 4: New in Release 4.0
- Chapter 5: Network design fundamentals
- Chapter 6: Hardware fundamentals and guidelines
- Chapter 7: Optical routing design
- Chapter 8: Platform redundancy
- Chapter 9: Link redundancy
- Chapter 10: Layer 2 loop prevention
- Chapter 11: Spanning tree
- Chapter 12: Layer 3 network design
- Chapter 13: SPBM design guidelines
- Chapter 14: IP multicast network design
- Multicast and VRF-Lite
- Multicast and MultiLink Trunking considerations
- Multicast scalability design rules
- IP multicast address range restrictions
- Multicast MAC address mapping considerations
- Dynamic multicast configuration changes
- IGMPv3 backward compatibility
- IGMP Layer 2 Querier
- TTL in IP multicast packets
- Multicast MAC filtering
- Guidelines for multicast access policies
- Multicast for multimedia
- Chapter 15: System and network stability and security
- Chapter 16: QoS design guidelines
- Chapter 17: Layer 1, 2, and 3 design examples
- Chapter 18: Software scaling capabilities
- Chapter 19: Supported standards, RFCs, and MIBs
- Glossary
small form-factor
pluggable plus (SFP
+)
SFP+ transceivers are similar to SFPs in physical appearance but SFP+
transceivers provide Ethernet at 10 gigabits per second (Gbps).
spanning tree A simple, fully-connected active topology formed from the arbitrary physical
topology of connected bridged Local Area Network components by relaying
frames through selected bridge ports. The protocol parameters and states
that are used and exchanged to facilitate the calculation of the active
topology and to control the bridge relay function.
Spanning Tree Group
(STG)
A collection of ports in one spanning-tree instance.
SysAdmin, Audit,
Network, Security
(SANS) Institute
The research and education organization for network administrators and
security professionals.
time-to-live (TTL) The field in a packet used to determine the valid duration for the packet.
The TTL determines the packet lifetime. The system discards a packet with
a TTL of zero.
traffic engineering A method that guarantees performance in a network.
Trivial File Transfer
Protocol (TFTP)
A protocol that governs transferring files between nodes without protection
against packet loss.
trunk A logical group of ports that behaves like a single large port.
unshielded twisted
pair (UTP)
A cable with one or more pairs of twisted insulated copper conductors
bound in a single plastic sheath.
User Datagram
Protocol (UDP)
In TCP/IP, a packet-level protocol built directly on the Internet Protocol
layer. TCP/IP host systems use UDP for application-to-application
programs.
user-based security
model (USM)
A security model that uses a defined set of user identities for authorized
users on a particular Simple Network Management Protocol (SNMP)
engine.
view-based access
control model
(VACM)
Provides context, group access, and group security levels based on a
predefined subset of management information base (MIB) objects.
Virtual Link
Aggregation Control
Protocol (VLACP)
Virtual Link Aggregation Control Protocol (VLACP) is a Layer 2
handshaking protocol that can detect end-to-end failure between two
physical Ethernet interfaces.
small form-factor pluggable plus (SFP+)
December 2014 Network Design Reference for Avaya VSP 4000 Series 157
Comments? infodev@avaya.com










