Design Reference
Table Of Contents
- Contents
- Chapter 1: Introduction
- Chapter 2: New in this release
- Chapter 3: Network design fundamentals
- Chapter 4: Hardware fundamentals and guidelines
- Chapter 5: Optical routing design
- Chapter 6: Platform redundancy
- Chapter 7: Link redundancy
- Chapter 8: Layer 2 loop prevention
- Chapter 9: Layer 2 switch clustering and SMLT
- Chapter 10: Layer 3 switch clustering and RSMLT
- Chapter 11: Layer 3 switch clustering and multicast SMLT
- Chapter 12: Spanning tree
- Chapter 13: Layer 3 network design
- Chapter 14: SPBM design guidelines
- Chapter 15: IP multicast network design
- Multicast and VRF-Lite
- Multicast and MultiLink Trunking considerations
- Multicast scalability design rules
- IP multicast address range restrictions
- Multicast MAC address mapping considerations
- Dynamic multicast configuration changes
- IGMPv3 backward compatibility
- IGMP Layer 2 Querier
- TTL in IP multicast packets
- Multicast MAC filtering
- Guidelines for multicast access policies
- Split-subnet and multicast
- Protocol Independent Multicast-Sparse Mode guidelines
- Protocol Independent Multicast-Source Specific Multicast guidelines
- Multicast for multimedia
- Chapter 16: System and network stability and security
- Chapter 17: QoS design guidelines
- Chapter 18: Layer 1, 2, and 3 design examples
- Glossary
Provider Backbone
Bridge (PBB)
To forward customer traffic across the service-provider backbone, SPBM
uses IEEE 802.1ah Provider Backbone Bridging (PBB) MAC-in-MAC
encapsulation, which hides the customer MAC (C-MAC) addresses in a
backbone MAC (B-MAC) address pair. MAC-in-MAC encapsulation defines
a BMAC-DA and BMAC-SA to identify the backbone source and destination
addresses.
quality of service
(QoS)
QoS features reserve resources in a congested network, allowing you to
configure a higher priority for certain devices. For example, you can
configure a higher priority for IP deskphones, which need a fixed bit rate
and split the remaining bandwidth between data connections if calls in the
network are more important than the file transfers.
Read Write All (RWA)
An access class that lets users access all menu items and editable fields.
remote login (rlogin) An application that provides a terminal interface between hosts (usually
UNIX) that use the TCP/IP network protocol. Unlike Telnet, rlogin assumes
the remote host is, or behaves like, a UNIX host.
remote monitoring
(RMON)
A remote monitoring standard for Simple Network Management Protocol
(SNMP)-based management information bases (MIB). The Internetwork
Engineering Task Force (IETF) proposed the RMON standard to provide
guidelines for remote monitoring of individual LAN segments.
resilient packet ring
(RPR)
A shared packet edge ring connection, where both paths around the ring
carry traffic, which allows double bandwidth on each ring.
reverse path
forwarding (RPF)
Prevents a packet from forging its source IP address. Typically, the system
examines and validates the source address of each packet.
route flapping An instability that is associated with a prefix, where the associated prefix
routes can exhibit frequent changes in availability over a period of time.
routing policy A form of routing that is influenced by factors other than the default
algorithmically best route, such as the shortest or quickest path.
Secure Shell (SSH) SSH uses encryption to provide security for remote logons and data
transfer over the Internet.
Secure Sockets
Layer (SSL)
An Internet security encryption and authentication protocol for secure point-
to-point connections over the Internet and intranets, especially between
clients and servers.
Service Instance
Identifier (I-SID)
The SPBM B-MAC header includes a Service Instance Identifier (I-SID)
with a length of 24 bits. SPBM uses this I-SID to identify and transmit any
virtualized traffic in an encapsulated SPBM frame. SPBM uses I-SIDs to
virtualize VLANs (Layer 2 Virtual Services Network [VSN]) or VRFs (Layer
3 Virtual Services Network [VSN]) across the MAC-in-MAC backbone. With
Layer 2 VSNs, you associate the I-SID with a customer VLAN, which is
Glossary
178 Network Design Reference for Avaya VSP 4000 Series June 2015
Comments on this document? infodev@avaya.com










