Design Reference

Table Of Contents
spanning tree A simple, fully-connected active topology formed from the arbitrary physical
topology of connected bridged Local Area Network components by relaying
frames through selected bridge ports. The protocol parameters and states
that are used and exchanged to facilitate the calculation of the active
topology and to control the bridge relay function.
Spanning Tree Group
(STG)
A collection of ports in one spanning-tree instance.
SysAdmin, Audit,
Network, Security
(SANS) Institute
The research and education organization for network administrators and
security professionals.
time-to-live (TTL) The field in a packet used to determine the valid duration for the packet.
The TTL determines the packet lifetime. The system discards a packet with
a TTL of zero.
traffic engineering A method that guarantees performance in a network.
Trivial File Transfer
Protocol (TFTP)
A protocol that governs transferring files between nodes without protection
against packet loss.
trunk A logical group of ports that behaves like a single large port.
unshielded twisted
pair (UTP)
A cable with one or more pairs of twisted insulated copper conductors
bound in a single plastic sheath.
User Datagram
Protocol (UDP)
In TCP/IP, a packet-level protocol built directly on the Internet Protocol
layer. TCP/IP host systems use UDP for application-to-application
programs.
user-based security
model (USM)
A security model that uses a defined set of user identities for authorized
users on a particular Simple Network Management Protocol (SNMP)
engine.
view-based access
control model
(VACM)
Provides context, group access, and group security levels based on a
predefined subset of management information base (MIB) objects.
Virtual Link
Aggregation Control
Protocol (VLACP)
Virtual Link Aggregation Control Protocol (VLACP) is a Layer 2
handshaking protocol that can detect end-to-end failure between two
physical Ethernet interfaces.
Virtual Router
Redundancy
Protocol (VRRP)
A protocol used in static routing configurations, typically at the edge of the
network. This protocol operates on multiple routers on an IP subnet and
elects a primary gateway router. When the primary router fails, a backup
router is quickly available to take its place.
Glossary
180 Network Design Reference for Avaya VSP 4000 Series June 2015
Comments on this document? infodev@avaya.com