Transition Networks, Inc.
S4224 Web User Guide
33595 Rev. C
Page 632 of 669
Glossary
This section describes many of the terms and mnemonics used in this manual. Note that the use of or
description of a term does not in any way imply support of that feature or of any related function(s).
1+1
The Protection Type 1+1 uses the protection resources at all times for sending a replica of the traffic. The
protection merge point, where both copies are expected to arrive, decides which of the two copies to select for
forwarding.
The decision can be to switch from one resource to the other due to an event like resource up/down etc. or can
be on a per frame/cell basis, the selection decision is performed according to parameters defined below (e.g.
revertive, non-revertive, manual, etc.).
A network can offer protection by providing alternative resources to be used when the working resource fails.
The specific terminology for the number and arrangement of such resources includes 1+1, 1:1, 1:n, n:1, and
m:n.
1:1
The 1:1 Protection Type provides a protection resource for a single working resource.
A network can offer protection by providing alternative resources to be used when the working resource fails.
The terminology for the number and arrangement of such resources includes 1+1, 1:1, 1:n, n:1, and m:n.
1 PPS
In IEEE 1588v2, a pulse that is repeated every second and has a very accurate phase. It synchronizes several
geographically dispersed clients (e.g., cell cites) to the same time and phase of 1 μs. Any third party test
equipment must also support 1 PPS.
A
AAA
(Authentication, Authorization and Accounting); examples of this type of protocols include RADIUS,
TACACS, , etc. See the IETF Working Group
page (
) for
more information. For IETF RFC information see
http://tools.ietf.org/html/rfc2975
Authentication
: refers to the process where an entity's identity is authenticated, typically by
providing evidence that it holds a specific digital identity such as an identifier and the corresponding
credentials. Examples of types of credentials are passwords, one-time tokens, digital certificates,
and phone numbers (calling/called).
Authorization
: determines whether a particular entity is authorized to perform a given activity,
typically inherited from authentication when logging on to an application or service. Authorization
may be determined based on a range of restrictions, for example time-of-day restrictions, or physical
location restrictions, or restrictions against multiple access by the same entity or user. Typical
authorization in everyday computer life is for example granting read access to a specific file for
authenticated user. Examples of types of service include IP address filtering, address assignment,
route assignment, quality of Service/differential services, bandwidth control/traffic management,
compulsory tunneling to a specific endpoint, and encryption.
Accounting
: refers to the tracking of network resource consumption by users for the purpose of
capacity and trend analysis, cost allocation, billing.[3] In addition, it may record events such as
authentication and authorization failures, and include auditing functionality, which permits verifying
the correctness of procedures carried out based on accounting data. Real-time accounting refers to
accounting information that is delivered concurrently with the consumption of the resources. Batch
accounting refers to accounting information that is saved until it is delivered at a later time. Typical