|
Table Of Contents
Glossary
Numerics1:1 protectionAn electrical card protection scheme that pairs a working card with a protect card of the same type in an adjacent slot (DS-1 and DS-3 speeds). If the working card fails, the traffic from the working card switches to the protect card. When the failure on the working card is resolved, traffic reverts to the working card.1+1 protectionAn optical (OC-N) card protection scheme that pairs a single working port/card with a single dedicated protect port/card. All OC-N cards can use this protection type (OC-3, OC-12, OC-48, and OC-192 speeds).1:N protectionAn electrical card protection scheme that allows a single protect card to provide protection for several working cards (DS-1 and DS-3 speeds). If a working card fails, the traffic from the working card switches to the protect card.When the failure on the working card is resolved, traffic reverts to the working card.10BaseTStandard 10 Mbps local area network over unshielded twisted pair copper wire.100BaseTStandard 100 Mbps local ethernet network.100BaseTXSpecification of 100BaseT that supports full duplex operation.
AAccess dropPoints where network devices can access the network.ACOAlarm cutoff.Active cardA card that is working or carrying traffic. A card provisioned as working can be an active card or, after a protection switch, a protect card can be an active card.ACT/STBYActive/Standby.Address maskBit combination used to describe the portion of an IP address that refers to the network or subnet and the portion that refers to the host. Sometimes referred to as mask. See also subnet mask.ADM(Add/drop multiplexers). Linear ADMs allow signals to be added to a SONET span or dropped from a SONET span. An ADM has three or more nodes.Agent1. 1. Generally, software that processes queries and returns replies on behalf of an application.
2. 2. In a network management system, a process that resides in all managed devices and reports the values of specified variables to management stations.
AICAlarm Interface Controller.AID(Access Identifier). An access code used in TL1 messaging that identifies and addresses specific objects within the ONS 15454. These objects include individual pieces of equipment, transport spans, access tributaries, and others. See also TID.AIPAlarm Interface Panel.AISAlarm Indication Signal.AIS-LLine Alarm Indication Signal.AMI(Alternate Mark Inversion). Line-code format used on T1 circuits that transmits ones by alternate positive and negative pulses. Zeroes are represented by 01 during each bit cell and ones are represented by 11 or 00, alternately, during each bit cell. AMI requires that the sending device maintain ones density. Ones density is not maintained independently of the data stream. Sometimes called binary-coded alternate mark inversion.ANSIAmerican National Standards Institute.APS(Automatic Protection Switching). SONET switching mechanism that routes traffic from working lines to protect lines if a line card failure or fiber cut occurs.ARPAddress Resolution Protocol.APSBAlarm Protection Switching Byte.ATAG(Autonomous Message Tag). ATAG is used for TL1 message sequencing. See also CTAG.ATMAsynchronous Transfer Mode.AWGAmerican Wire Gauge
BB8ZS(Binary 8-zero Substitution). A line-code type, used on T1 circuits, that substitutes a special code whenever 8 consecutive zeros are sent over the link. This code is then interpreted at the remote end of the connection. This technique guarantees ones density independent of the data stream. Sometimes called bipolar 8-zero substitution.BackboneThe part of the network that carries the heaviest traffic or joins LANs together.BER(Bit Error Rate). Ratio of received bits that contain errors.BICBackplane Interface Connector.BIPBit Interleaved Parity.Bit rateSpeed at which bits are transmitted, usually expressed in bits per second.BITS(Building Integrated Timing Supply). A single building master timing supply that minimizes the number of synchronization links entering an office. Sometimes referred to as a Synchronization Supply Unit.BLSR(Bidirectional Line Switched Ring). SONET ring architecture that provides working and protection fibers between nodes. If the working fiber between nodes is cut, traffic is automatically routed onto the protection fiber. See also path protection.Blue bandDense Wavelength Division Multiplexing (DWDM) wavelengths are broken into two distinct bands: red and blue. DWDM cards for the ONS 15454 SDH operate on wavelengths between 1530.33nm and 1542.94nm in the blue band. The blue band is the lower frequency band.BNCBayonet Neill-Concelman (coaxial cable bayonet-locking connector).BPDUBridge Protocol Data Unit.BridgeDevice that connects and passes packets between two network segments that use the same communications protocol. In general, a bridge will filter, forward, or flood an incoming frame based on the MAC address of that frame. See also MAC address.BroadcastData packet that will be sent to all nodes on a network. Broadcasts are identified by a broadcast address. Compare with multicast and unicast. See also Broadcast address.Broadcast addressSpecial address reserved for sending a message to all stations. Generally, a broadcast address is a MAC destination address of all ones. See also MAC address.Broadcast stormUndesirable network event in which many broadcasts are sent simultaneously across all network segments. A broadcast storm uses substantial network bandwidth and, typically, causes network time-outs.BusCommon physical signal path composed of wires or other media across which signals can be sent from one part of a computer to another.
CC2 byteThe C2 byte is the signal label byte in the STS path overhead. This byte tells the equipment what the SONET payload envelope contains and how it is constructed. See also SONET.CAT 5Category 5 (cabling).CCITTComité Consultatif International Télégraphique et Téléphoniques. (Formerly ITU.)CEOCentral Office Environment.CEVControlled Environment Vaults.CLEICommon Language Equipment Identifier code.CLNPCorrectionless Network Protocol.cmCentimeter.CMIPCommon Management Information Protocol.COECentral Office Environment.CollisionIn Ethernet, the result of two nodes transmitting simultaneously. The frames from each device impact and are damaged when they meet on the physical media.ConcatenationA mechanism for allocating contiguous bandwidth for payload transport. Through the use of Concatenation Pointers, multiple OC-1s can be linked together to provide contiguous bandwidth through the network, from end to end.CORBACommon Object Request Broker Architecture.CPECustomer Premise Environments.CrosspointA set of physical or logical contacts that operate together to extend the speech and signal channels in a switching network.CTAG(Correlation Tag). A unique identifier given to each input command by the TL1 operator. When the ONS 15454 system responds to a specific command, it includes the command's CTAG in the reply. This eliminates discrepancies about which response corresponds to which command. See also ATAG.CTC(Cisco Transport Controller). A Java-based graphical user interface (GUI) that allows operations, administration, maintenance, and provisioning (OAM&P) of the ONS 15454 using an Internet browser.CTM(Cisco Transport Manager). A Java-based network management tool used to support large networks of Cisco 15000-class DDCC(Data Communications Channel). Used to transport information about operation, administration, maintenance, and provisioning (OAM&P) over a SONET interface. DCC can be located in SDCC or LDCC. See also LDCC and SDCC.DCNData Communications Network.DCSDistributed Communications System.Default routerIf the ONS 15454 must communicate with a device on a network to which the ONS 15454 is not connected, packets are sent to this router to be distributed.DemultiplexTo separate multiple multiplexed input streams from a common physical signal back into multiple output streams. Compare Multiplexing.DestinationThe endpoint where traffic exits an ONS 15454 network. Endpoints can be paths (STS or STS/VT for optical card endpoints), ports (for electrical circuits, such as DS1, VT, DS3, STS), or cards (for circuits on DS1 and Ethernet cards). See also STS, and VT.DRAMDynamic Random-Access Memory.DropSee Destination.DS-1Digital Signal Level One.DS1-14Digital Signal Level One (14 ports).DS1N-14Digital Signal Level One (N-14 ports).DS-3Digital Signal Level Three.DS3-12Digital Signal Level Three (12 ports).DS3N-12Digital Signal Level Three (N-12 ports).DS3XM-6Digital Service, level 3 Trans-Multiplexer 6 ports.DSX(Digital Signal Cross-Connect Frame). A manual bay or panel where different electrical signals are wired. A DSX permits cross-connections by patch cords and plugs.DWDM(Dense Wave Division Multiplexing). A technology that increases the information carrying capacity of existing fiber optic infrastructure by transmitting and receiving data on different light wavelengths. Many of these wavelengths can be combined on a single strand of fiber.
EEDFA(Erbium Doped Fiber Amplifier). A type of fiber optical amplifier that transmits a light signal through a section of erbium-doped fiber and amplifies the signal with a laser pump diode. EDFA is used in transmitter booster amplifiers, in-line repeating amplifiers, and in receiver preamplifiers.EFCAElectrical Facility Connection Assembly.EFTElectrical Fast Transient/Burst.EIA(Electrical Interface Assemblies). Provides backplane connection points for the DS-1, DS-3, and EC-1 cards.ELRExtended Long Reach.EMCElectromagnetic compatibility.EMI(Electromagnetic Interference). Interference by electromagnetic signals that can cause reduced data integrity and increased error rates on transmission channels.EMLElement Manager Layer.EMSElement Management System.EnvelopeThe part of messaging that varies in composition from one transmittal step to another. It identifies the message originator and potential recipients, documents its past, directs its subsequent movement by the Message Transfer System (MTS), and characterizes its content.EOW(Engineered Orderwire). A permanently connected voice circuit between selected stations for technical control purposes.ERDIEnhanced Remote Defect Indicator.ESErrored Seconds.ESDElectrostatic Discharge.ESFExtended Super Frame.Ethernet switchA type of Ethernet LAN device that increases aggregate LAN bandwidth by allowing simultaneous switching of packets between switch ports. Ethernet switches subdivide previously shared LAN segments into multiple networks with fewer stations per network.ETSIEuropean Telecommunications Standards Institute.Extended SNCP(Extended Subnetwork Connection Protection). Extended SNCP extends the protection scheme of a subnetwork connection protection ring (SNCP) beyond the basic ring configuration to the meshed architecture of several interconnecting rings. See SNCP.External timing referenceA timing reference obtained from a source external to the communications system, such as one of the navigation systems. Many external timing references are referenced to Coordinated Universal Time (UTC).
FFalling thresholdA falling threshold is the counterpart to a rising threshold. When the number of occurrences drops below a falling threshold, this triggers an event to reset the rising threshold. See also rising threshold.FCFailure count.FDDI(Fiber Distributed Data Interface). LAN standard, defined by ANSI X3T9.5, specifying a 100-Mbps token-passing network using fiber optic cable, with transmission distances of up to 2 km. FDDI uses a dual-ring architecture to provide redundancy.FEFrame Bit Errors.FG1Frame Ground #1 (pins are labeled "FG1," "FG2," etc.)FMECFront Mount Electrical Connection.FrameLogical grouping of information sent as a data link layer unit over a transmission medium. Often refers to the header and trailer, used for synchronization and error control that surrounds the user data contained in the unit.FSBField Service Bulletin.
GGatewayAn electronic repeater device that intercepts and steers electrical signals from one network to another.GBIC(Gigabit Interface Converter). A hot-swappable input/output device that plugs into a Gigabit Ethernet port to link the port with the fiber optic network.GbpsGigabits per second.GBpsGigabytes per second.GR-153-COREGeneral Requirements #253 Council of Registrars.GR-1089General Requirements #1089.GUIGraphical User Interface.
HHard resetThe physical removal and insertion of a TCC+ card, also known as reseating a card or performing a card pull.HDLC(High-Level Data Link Control). Bit-oriented, synchronous, data-link layer protocol developed by ISO. HDLC specifies a data encapsulation method on synchronous serial links using frame characters and checksums.Host numberPart of IP address used to address an individual host within the network or subnetwork.Hot swapThe process of replacing a failed component while the rest of the system continues to function normally.
IIEC1. 1. InterExchange Carrier.
2. 2. International Electrotechnical Commission.
IEEEInstitute of Electrical and Electronics Engineers.IETFInternet Engineering Task Force.Input alarmsUsed for external sensors such as open doors, temperature sensors, flood sensors, and other environmental conditions.I/OInput/Output.IP(Internet Protocol). Network layer protocol in the TCP/IP stack offering a connectionless internetwork service. IP provides features for addressing, type-of-service specification, fragmentation and reassembly, and security.IPPMIntermediate-Path Performance Monitoring.IP address32-bit address assigned to host using TCP/IP. An IP address belongs to one of five classes (A, B, C, D, or E) and is written as 4 octets separated by periods (dotted decimal format). Each address consists of a network number, an optional subnetwork number, and a host number.ITU-TInternational Telecommunication Union - Telecommunication Standards Sector.
JJREJava Runtime Environment.
KK bytesAutomatic protection-switching bytes located in the SONET line overhead and monitored by equipment for an indication to switch to protection.
LLAN(Local Area Network). High-speed, low error data network covering a relatively small geographic area. LANs connect workstations, peripherals, terminals, and other devices in a single building or other geographically limited area. Ethernet, FDDI, and Token Ring are widely used LAN technologies.LCD(Liquid Crystal Display). An alphanumeric display using liquid crystal sealed between two pieces of glass. LCDs conserve electricity.LDCCLine Data Communication Channel.Line layerRefers to the segment between two SONET devices in the circuit. The line layer deals with SONET payload transport, and its functions include multiplexing and synchronization. Sometimes called a maintenance span.Line terminating equipment (LTE)Refers to line cards which terminate the line signal in the ONS 15454.Line timing modeA node that derives its clock from the SONET lines.Link budgetThe difference between the output power and receiver power of an optical signal expressed in dB. Link refers to an optical connection and all of its component parts (optical transmitters, repeaters, receivers, and cables).Link integrityThe network communications channel has link integrity if it is intact.LOFLoss of Frame.Loopback testTest that sends signals then directs them back toward their source from some point along the communications path. Loopback tests are often used to test network interface usability.LOPLoss of Pointer.LOSLoss of Signal.LOW(Local Orderwire). A communications circuit between a technical control center and selected terminal or repeater locations.LTELine Terminating Equipment.LVDSLow-Voltage Differential Signal.
MMACMedia Access Control.MAC addressStandardized data link layer address that is required for every port or device that connects to a LAN. Other devices in the network use these addresses to locate specific ports in the network and to create and update routing tables and data structures. MAC addresses are six bytes long and are controlled by the IEEE. Also known as the hardware address, MAC-layer address, and physical address.Maintenance userA security level that limits user access to maintenance options only. See also Superuser, Provisioning User, and Retrieve User.Managed deviceA network node that contains an SNMP agent and resides on a managed network. Managed devices include routers, access servers, switches, bridges, hubs, computer hosts, and printers.Managed objectIn network management, a network device that can be managed by a network management protocol. Sometimes called an MIB object.MappingA logical association between one set of values, such as addresses on one network, with quantities or values of another set, such as devices on another network.MbpsMegabits per second.MBpsMegabytes per second.MHzMegahertz.MIB(Management Information Base). Database of network management information that is used and maintained by a network management protocol such as SNMP or CMIP. The value of a MIB object can be changed or retrieved using SNMP or CMIP commands, usually through a GUI network management system. MIB objects are organized in a tree structure that includes public (standard) and private (proprietary) branches.MIMEMultipurpose Internet Mail Extensions.MSMultiplex Section.MS-FERFMultiplex Section Far-end Receive Failure.MSPMultiplex Section Protection.MS-SPRing(Multiplex Section Shared Protection Ring.) SDH ring architecture that provides working and protection fibers between nodes. If the working fiber between nodes is cut, traffic is automatically rerouted onto the protection fiber.MulticastSingle packets copied by the network and sent to a specific subset of network addresses.Multiplex payloadGenerates section and line overhead, and converts electrical/optical signals when the electrical/optical card is transmitting.MultiplexingScheme that allows multiple signals to be transmitted simultaneously across a single physical channel. Compare Demultiplex.Mux/DemuxMultiplexer/Demultiplexer.MuxedMultiplexed. See Multiplexing.
NNE(Network Element). In an Operations Support System, a single piece of telecommunications equipment used to perform a function or service integral to the underlying network.NEBSNetwork Equipment-Building Systems.NELNetwork Element Layer.Network numberPart of an IP address that specifies the network where the host belongs.NMLNetwork Management Layer.NMS(Network Management System). System that executes applications that monitor and control managed devices. NMSs provide the bulk of the processing and memory resources required for network management.NodeEndpoint of a network connection or a junction common to two or more lines in a network. Nodes can be processors, controllers, or workstations. Nodes, which vary in routing and other functional capabilities, can be interconnected by links, and serve as control points in the network. Node is sometimes used generically to refer to any entity that can access a network. In this manual the term "node" usually refers to an ONS 15454.
OOAM&P(Operations, Administration, Maintenance, and Provisioning). Provides the facilities and personnel required to manage a network.OCOptical carrier.OOS ASOut of Service Assigned.Optical amplifierA device that amplifies an optical signal without converting the signal from optical to electrical and back again to optical energy.Optical receiverAn opto-electric circuit that detects incoming lightwave signals and converts them to the appropriate signal for processing by the receiving device.OrderwireEquipment that establishes voice contact between a central office and carrier repeater locations. See Local orderwire.OSIOpen Systems Interconnection.OSPFOpen Shortest Path First.OSSOperations Support System.OSS/NMSOperations Support System/Network Management System.Output contacts (controls)Triggers that drive visual or audible devices such as bells and lights. Output contacts can control other devices such as generators, heaters, and fans.
PPassive devicesComponents that do not require external power to manipulate or react to electronic output. Passive devices include capacitors, resisters, and coils.Path LayerThe segment between the originating equipment and the terminating equipment. This path segment may encompass several consecutive line segments or segments between two SONET devices.PayloadPortion of a cell, frame, or packet that contains upper-layer information (data).PCMPulse Code Modulation.PCMCIAPersonal Computer Memory Card International Association.PCNProduct Change Notice(s).PDI-PSTS Payload Defect Indication - Path.Ping(Packet internet grouper). ICMP echo message and its reply. Often used in IP networks to test the reachability of a network device.Pointer justificationIn SONET, the mechanism used to compensate for frequency and phase variations. Pointer justification counts indicate timing errors on SONET networks.POPPoint of Presence.PMPerformance Monitoring.PPMN(Path-Protected Mesh Network). PPMN extends the protection scheme of a path protection (path protection) beyond the basic ring configuration to the meshed architecture of several interconnecting rings.Priority queuingRouting feature that divides data packets into two queues: one low-priority and one high-priority.Protect cardA card in a protection pair or scheme that is provisioned as a protect card to the working card. If the working card fails, the protect card becomes active. See also working card.Provisioning userA security level that allows the user to access only provisioning and maintenance options in CTC. See also Superuser, Maintenance user, and Retrieve user.PSCProtection-Switching Count.PSDProtection-Switching Duration.PTEPath-Terminating Equipment.
QQueueIn routing, a backlog of packets waiting to be forwarded over a router interface.
RRAMRandom Access Memory.RDI-LRemote Defect Indication - Line.Red bandDWDM wavelengths are broken into two distinct bands: red and blue. The red band is the higher frequency band. The red band DWDM cards for the ONS 15454 SDH operate on wavelengths between 1547.72nm and 1560.61nm.RESReserved.Retrieve userA security level that allows the user to retrieve and view CTC information but not set or modify parameters. See also Superuser, Maintenance user, and Provisioning user.Revertive switchingA process that sends electrical interfaces (traffic) back to the original working card after the card comes back online.Rising thresholdThe number of occurrences (collisions) that must be exceeded to trigger an event.RJ-45Registered Jack #45 (8-pin).RMAReturn Materials Authorization.RMON(Remote Network Monitoring). Allows network operators to monitor the health of the network with a Network Management System (NMS). RMON watches several variables, such as Ethernet collisions, and triggers an event when a variable crosses a threshold in the specified time interval.RS-232Recommended Standard #232 (ANSI Electrical Interface for Serial Communication).RxReceive.
SSCISerial Communication Interface.SCLSystem Communications Link.SDCCSection Data Communication Channel.SDH(Synchronous Digital Hierarchy). European standard that defines a set of rate and format standards that are transmitted using optical signals over fiber. SDH is similar to SONET, with a basic SDH rate of 155.52 Mbps. Compare SONET.SEFSeverely Errored Frame.SELVSafety Extra-Low Voltage.SESSeverely Errored Seconds.SFSuper Frame.SMLService Management Layer.SMFSingle Mode Fiber.SNCP(Subnetwork Connection Protection Ring). Path-switched SDH rings that employ redundant, fiber-optic transmission facilities in a pair configuration. One fiber transmits in one direction and the backup fiber transmits in the other. If the primary ring fails, the backup takes over.SNMP(Simple Network Management Protocol). Network management protocol used almost exclusively in TCP/IP networks. SNMP monitors and controls network devices and manages configurations, statistics collection, performance, and security.SNTP(Simple Network Time Protocol). Using an SNTP server ensures that all ONS 15454 network nodes use the same date and time reference. The server synchronizes alarm timing during power outages or software upgrades.Soft resetA soft reset reloads the operating system, application software, etc., and reboots the TCC+ card. It does not initialize the ONS 15454 ASIC hardware.SONET(Synchronous Optical Network). High-speed synchronous network specification developed by Telcordia Technologies, Inc. and designed to run on optical fiber. STS-1 is the basic building block of SONET. Approved as an international standard in 1988.SourceThe endpoint where traffic enters an ONS 15454 network. Endpoints can be a path (STS or STS/VT for optical card endpoints), port (for electrical circuits, such as DS1, VT, DS3, STS), or card (for circuits on DS1 and Ethernet cards). See also STS and VT.SpanAn optical path between two nodes.Spanning treeA loop-free subset of a network topology. See also STA and STP.SPE(Synchronous Payload Envelope). A SONET term describing the envelope that carries the user data or payload.SSM(Synchronous Status Messaging). A SONET protocol that communicates information about the quality of the timing source using the S1 byte of the line overhead.STA(Spanning-Tree Algorithm). An algorithm used by the spanning tree protocol to create a spanning tree. See also Spanning tree and STP.Standby cardA card that is not active or carrying traffic. A standby card can be a protect card or, after a protection switch, a working card can be a standby card.Static routeA route that is manually entered into a routing table. Static routes take precedence over routes chosen by all dynamic routing protocols.STP1. 1. Shielded Twisted Pair.
2. 2. Spanning Tree Protocol. Bridge protocol that uses the spanning-tree algorithm to enable a learning bridge to dynamically work around loops in a network topology by creating a spanning tree. See also Spanning tree and STA.
STS(Synchronous Transport Signal, used generically when speaking of SONET signals.)STS-1(Synchronous Transport Signal Level 1). Basic building block signal of SONET, operating at 51.84 Mbps for transmission over OC-1 fiber. Faster SONET rates are defined as STS-n, where n is a multiple of 51.84 Mbps. See also SONET.Subnet mask32-bit address mask used in IP to indicate the bits of an IP address that are used for the subnet address. Sometimes referred to simply as mask. See also IP address mask and IP address.SubnetworkIn IP networks, a network confined to a particular subnet address. Subnetworks are networks segmented by a network administrator in order to provide a multilevel, hierarchical routing structure while shielding the subnetwork from the addressing complexity of attached networks. Sometimes called a subnet.Subtending ringsSONET rings that incorporate nodes that are also part of an adjacent SONET ring.SuperuserA security level that can perform all of the functions of the other security levels as well as set names, passwords, and security levels for other users. A superuser is usually the network element administrator. See also Retrieve user, Maintenance user, and Provisioning user.SWSSONET WAN switch.SXCSONET Cross Connect ASIC.
TT1T1 transmits DS-1-formatted data at 1.544 Mbps through the telephone-switching network using AMI or B8ZS coding. See also AMI, B8ZS, and DS-1.TACTechnical Assistance Center.TagIdentification information, including a number plus other information.TBOSTelemetry Byte-Oriented Serial protocol.TCAThreshold Crossing Alert.TCC+Timing Communications and Control + CardTCP/IPTransmission Control Protocol/Internet ProtocolTDM(Time Division Multiplexing). Allocates bandwidth on a single wire for information from multiple channels based on preassigned time slots. Bandwidth is allocated to each channel regardless of whether the station has data to transmit.TDSTime-Division Switching.Telcordia(Telcordia Technologies, Inc., formerly named Bellcore). Eighty percent of the U.S. telecommunications network depends on software invented, developed, implemented, or maintained by Telcordia.TID(Target Identifier). Identifies the particular network element (in this case, the ONS 15454) where each TL1 command is directed. The TID is a unique name given to each system at installation. See also AID.TL1Transaction Language 1.TLS(Transparent LAN Service). Provides private network service across a SONET backbone.TMNTelecommunications Management Network.TransponderOptional devices of a DWDM system providing the conversion of one optical wavelength to a precision narrow band wavelength. See also DWDM.TrapMessage sent by an SNMP agent to an NMS (CTM), console, or terminal to indicate the occurrence of a significant event, such as an exceeded threshold. See also CTM.TributaryThe lower-rate signal directed into a multiplexer for combination (multiplexing) with other low rate signals to form an aggregate higher rate level.TrunkNetwork traffic travels across this physical and logical connection between two switches. A backbone is composed of a number of trunks. See also Backbone.TSATime-Slot Assignment.TSITime-Slot Interchange.TunnelingArchitecture that is designed to provide the services necessary to implement any standard point-to-point encapsulation scheme.TxTransmit.
UUASUnavailable Seconds.UDP/IPUser Datagram Protocol/Internet Protocol.UIDUser Identifier.UnicastThe communication of a single source to a single destination.UPSR(path protection). Path-switched SONET rings that employ redundant, fiber- optic transmission facilities in a pair configuration. One fiber transmits in one direction and the backup fiber transmits in the other. If the primary ring fails, the backup takes over. See also BLSR.UpstreamSet of frequencies used to send data from a subscriber to the head end.UTCUniversal-Time Coordinated.UTPUnshielded Twisted Pair.
VVDCVolts Direct Current.Virtual fiberA fiber that carries signals at different rates and uses the same fiber optic cable.Virtual ringEntity in a source-route bridging (SRB) network that logically connects two or more physical rings together either locally or remotely. The concept of virtual rings can be expanded across router boundaries.Virtual wiresVirtual wires route external alarms to one or more alarm collection centers across the SONET transport network.VLAN(Virtual LAN). Group of devices located on a number of different LAN segments that are configured (using management software) to communicate as if they were attached to the same wire. Because VLANs are based on logical instead of physical connections, they are extremely flexible.VPN(Virtual Private Network). Enables IP traffic to travel securely over a public TCP/IP network by encrypting all traffic from one network to another. A VPN uses "tunneling" to encrypt all information at the IP level. See also Tunneling.VT(Virtual Tributary). A structure designed for the transport and switching of sub-DS3 payloads. See also Tributary.VT1.5Virtual Tributary that equals 1.544 Mbps.VT layerThe VT layer or electrical layer occurs when the SONET signal is broken down into an electrical signal.
WWWatts.WANWide Area Network.Working cardA card that is provisioned as an active, primary card. Traffic cards in a protection pair are provisioned as working or protect See also Protect card.
XXCCross ConnectXCVTCross Connect Virtual Tributary.X.25Protocol providing devices with direct connections to a packet-switched network.
Posted: Sat Sep 24 13:36:47 PDT 2005
All contents are Copyright © 1992--2005 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.