background image
Glossary
709
DXI
Data Exchange Interface: Described in RFC
1482, DXI defines the effectiveness of a network
device such as a router, bridge, or hub to act as an FEP
to an ATM network by using a special DSU that
accomplishes packet encapsulation.
dynamic entries
Used in Layer-2 and -3 devices to
create a table of either hardware addresses or logical
addresses dynamically.
dynamic routing
Also known as adaptive routing,
this technique automatically adapts to traffic or phys-
ical network revisions.
dynamic VLAN
An administrator will create an
entry in a special server with the hardware addresses
of all devices on the internetwork. The server will then
assign dynamically used VLANs.
E1
Generally used in Europe, a wide-area digital
transmission scheme carrying data at 2.048Mbps. E1
transmission lines are available for lease from com-
mon carriers for private use.
E.164
(1) Evolved from standard telephone number-
ing system, the standard recommended by ITU-T for
international telecommunication numbering, particu-
larly in ISDN, SMDS, and BISDN. (2) Label of field in
an ATM address containing numbers in E.164 format.
E channel
Echo channel: A 64Kbps ISDN control
channel used for circuit switching. Specific description
of this channel can be found in the 1984 ITU-T ISDN
specification, but was dropped from the 1988 version.
See also: B, D, and H channels.
EARL
Encoded Address Recognition Logic ASIC:
This chip works with the bus arbitration system to
control access to the data-switching bus. EARL also
controls the destination ports of packet transfers.
edge device
A device that enables packets to be for-
warded between legacy interfaces (such as Ethernet
and Token Ring) and ATM interfaces based on infor-
mation in the Data-Link and Network layers. An edge
device does not take part in the running of any Net-
work layer routing protocol; it merely uses the route
description protocol in order to get the forwarding
information required.
EEPROM
Electronically Erasable Programmable
Read-Only Memory: Programmed after their manu-
facture, these nonvolatile memory chips can be erased
if necessary using electric power and reprogrammed.
See also: EPROM, PROM.
EFCI
Explicit Forward Congestion Indication: A
congestion feedback mode permitted by ABR service
in an ATM network. The EFCI may be set by any net-
work element that is in a state of immediate or certain
congestion. The destination end-system is able to carry
out a protocol that adjusts and lowers the cell rate of
the connection based on value of the EFCI. See also:
ABR.
EIGRP
See: Enhanced IGRP.
EIP
Ethernet Interface Processor: A Cisco 7000
series router interface processor card, supplying
10Mbps AUI ports to support Ethernet Version 1 and
Ethernet Version 2 or IEEE 802.3 interfaces with a
high-speed data path to other interface processors.
ELAN
Emulated LAN: An ATM network config-
ured using a client/server model in order to emulate
either an Ethernet or Token Ring LAN. Multiple
ELANs can exist at the same time on a single ATM
network and are made up of a LAN emulation client
(LEC), a LAN Emulation Server (LES), a Broadcast
and Unknown Server (BUS), and a LAN Emulation
Configuration Server (LECS). ELANs are defined by
the LANE specification. See also: LANE, LEC, LECS,
and LES.
ELAP
EtherTalk Link Access Protocol: In an Ether-
Talk network, the link-access protocol constructed
above the standard Ethernet Data-Link layer.
encapsulation
The technique used by layered pro-
tocols in which a layer adds header information to the
protocol data unit (PDU) from the layer above. As an
example, in Internet terminology, a packet would con-
tain a header from the Physical layer, followed by a
header from the Network layer (IP), followed by a
header from the Transport layer (TCP), followed by
the application protocol data.
encryption
The conversion of information into a
scrambled form that effectively disguises it to prevent
unauthorized access. Every encryption scheme uses
some well-defined algorithm, which is reversed at the
receiving end by an opposite algorithm in a process
known as decryption.
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com