User guide

March 2005 Glossary
Through Software Release 6.1
Page 412 of 425 Issue 1
Canopy System User Guide
Backhaul Timing Slave
Backhaul Module that receives network timing (synchronization) from
another Backhaul Module, which serves as the Backhaul timing
master.
BAM
Bandwidth and Authentication Manager. Software that operates on a
Linux server to manage data rate and burst data capabilities
individually for each registered Subscriber Module. This software also
provides secure Subscriber Module authentication and user-specified
encryption keys.
Bandwidth and
Authentication
Manager
Software that operates on a Linux server to manage data rate and
burst data capabilities individually for each registered Subscriber
Module. This software also provides secure Subscriber Module
authentication and user-specified encryption keys.
BER
Bit Error Rate. The ratio of incorrect data received to correct data
received.
BH
Backhaul Module. A module that provides point-to-point connectivity
as either a standalone link or a link to an Access Point cluster through
a selected Access Point Module.
Bit Error Rate
Ratio of incorrect data received to correct data received.
Box MIB
Management Information Base file that defines module-level objects.
See also Management Information Base.
BRAID
Stream cipher that the TIA (Telecommunications Industry Association)
has standardized. The secret keys in both modules communicate with
each other to establish the Data Encryption Standard key. See Data
Encryption Standard.
Bridge
Network element that uses the physical address (not the logical
address) of another to pass data. The bridge passes the data to either
the destination address, if found in the simple routing table, or to all
network segments other than the one that transmitted the data.
Canopy modules are Layer 2 bridges except that, where NAT is
enabled for an SM, the SM is a Layer 3 switch. Compare to Switch
and Router, and see also NAT.
Bridge Entry Timeout
Field
Value that the operator sets as the maximum interval for no activity
with another module, whose MAC address is the Bridge Entry. This
interval should be longer than the ARP (Address Resolution Protocol)
cache timeout of the router that feeds the network.
Buckets
Theoretical data repositories that can be filled at preset rates or
emptied when preset conditions are experienced, such as when data
is transferred.
Burst
Preset amount limit of data that may be continuously transferred.
C/I Ratio
Ratio of intended reception to unintended reception.