Loader

OLAN Glossary

ACL

Access Control List

A set of rules that will deny or permit traffic based on a set of match criteria.  Used to block or permit packets on a network.  

AES

Advanced Encryption Standard

A type of cryptography used to encrypt clear text.  AES has been adopted by the US government and usually uses AES-128 or AES-256 variants for FIPs-compliant systems.  Message block size is 128 bits and keys can be 128, 192, or 256 bits. 

AEI AS-SIP End Instrument A end device supporting the Federal Government standard for Assured Services SIP used for securely carrying phone calls and supporting MLPP.  An End Instrument is typically a VoIP phone or its equivalent.
AID Access Identifier A unique identifier guaranteed to be unique within a system.  It allows uniquely identifying a port or piece of equipment.  Often hierarchically constructed to express containment within the system.
AIS
Alarm Indication Signal
A signal sent to the far end to inform it of a failure at the near end.  This allows passing the alarm up at the other end of the link to management systems to alert them of the far end failure.
ALM Alarm Alarms are used to indicate standing failures within a system.  Alarms have a severity associated with them, typically Minor, Major, Critical, a timestamp, and its state (SET or CLEAR).  Standing alarms indicate all the current failures within the system.
ANI Access Network Interface An interface that faces towards the Network side of a system.  The opposite direction from UNI or User to Network Interfaces.
API Application Programming Interface An documented interface defined on systems that allow access to set the values of system variables and invoke system actions.
APS Automatic Protection Switching Systems able to switch traffic to protection without manual intervention.
ARP Address Resolution Protocol A protocol for requesting the binding of an IP address to MAC so that packets can be forwarded at Layer 2.  This allows nodes to learn the physical address or MAC associated with an IP.
BER Bit Error Rate The ratio of incorrectly transmitted bits to all transmitted bits over a given time.  Within the PON context, it defines errors detected on the PON via BIP or Bit Interleaved Parity on the PON overhead.  
BBU Battery Backup Unit A battery used to protect the ONT or OLT in the event of an AC power outage.  
CA Certificate Authority A trusted entity that issues SSL certificates.  CAs can sign certificates which cause end systems that trust that CA to trust that end system or user.
CBR Constant Bit Rate A Class Of Service within PON and many other transmission systems that enables Constant Bit Rate Service.  CBR guarantees that bandwidth is set aside on the PON that is not shared and it is handed out on a verify regular basis to minimize latency and jitter.  CBR is the highest Class of Service within PON.
CBS Committed Burst Size Committed burst size (CBS) specifies the maximum number of bytes that can be transmitted into the network in an extremely short interval of time.
CIR Committed Information Rate A guaranteed rate that will be given to a traffic flow even in the presence of congestion.
CLI Command Line Interface A text based interface for controlling the system.  The Tellabs OLTs all support a CLI via ssh or serial interfaces.
CoS Class Of Service Class of Service defines a number of traffic classes with similar traffic characteristics.  Systems attempt to assure the traffic characteristics by assigning a CoS to a traffic flow then configuring it's characteristics.  Tellabs PON supports the following CoS: CBR1, CBR2, VBRnrt, and UBR
CPE Customer Premise Equipment End user equipment that is attached to the ONT UNI ports.  
CRC Cyclic Redundancy Check A CRC is placed at the end of messages to validate whether the content of the message is correct or not.  If a packet fails the CRC check, it is typically discarded.
CRL Certificate Revocation List Certificates typically have a 2-3 year validity date range.  A certificate revocation list allows systems to be informed of revoked certificates that are still within their validity dates.  
CSMA/CD Carrier Sense Multiple Access
Collision Detect
Ethernet used to be a multi-dropped interface that used collision detect to know when two ports are transmitting.  While no longer in use, Ethernet is often referred to this way.
CW Call Waiting A call feature that informs a user of an incoming call while already in a call so that user can decide to take the call or ignore it.
CCW Cancel Call Waiting The ability to cancel the call waiting feature for the duration of the next phone call.
DAC Dynamic Authorization Client A client which implements the Dynamic Authorization Extensions to RADIUS allowing RADIUS to immediately log off online users, change the online user's authorization information, shut down or reboot the user's port, or force re-authentication of online users.
DAI Dynamic ARP Inspection A feature that inspects all ARPs coming from users to ensure that they meet the ARP binding from DHCP and performs a number of checks to ensure the ARPs are correct and have not been forged.  All invalid ARPs are dropped.  This same function also allows the OLT to learn and display IP to MAC bindings.
DB Database  
DBDT Draw and Break Dial Tone A fairly standard test on analog lines to ensure service by taking the phone off hook, listening for dial tone levels, and then dialing to ensure upstream audio integrity (since it will stop dial tone).
DER Distinguished Encoding Rules DES is a binary format for encoding x.509 certificates and private keys.
DEI Drop Eligibility Indicator Indicates whether a frame is eligible to be dropped whenever congestion is occurring. DEI=1 indicates a frame is less important and eligible to be dropped.
DHCP Dynamic Host Configuration Protocol A protocol associated with IP that allows dynamic assignment of an IP address to a host.  
DoS Denial of Service A type of attack that seeks to deny use of a machine or service by it's intended users.  DoS attacks tend to flood the target with packets, requests, or send packets that cause a crash of the machine or service.
DSCP Differentiated Services Code Point  
DTMF Dual Tone Multi-frequency Telephone dialing signals are created via the mixing of tones of two frequencies.  Some call progress signals also use DTMF tones.
DSCP Differentiated Services  A field within IP packets used for marking the priority of traffic at layer 3.  There is an associated PHB or per hop behavior associated with each code point.
EAPOL Extensible Access Protocol Over Lans A protocol used by 802.1x to authenticate devices attached to the port of an Ethernet switch.
EBS Excess Burst Size Maximum number of bits/bytes in excess of the Committed Burst Size (CBS) that a user can send during a predefined time period.
EDFA Erbium Doped Fiber Amplifier A type of amplifier often used in RF video systems to amplify the optical signal.
EIR Excess Information Rate
(EIR) is the size of the allowed burst above the CIR or committed information rate.
EMS Element Management System The Panorama software that is utilized to manage a network of OLTs and ONTs.
ESD Electrostatic Discharge ESD is a sudden and momentary flow of electric current between two electrically charged objects caused by contact, typically due to static electricity.  ESD can damage sensitive electronic components.
ESU Ethernet Switch Unit The primary switch card in multi-slot OLT chassis.  
ESU2 Ethernet Switch Unit 2 The ESU card for the 1150E shelf that supports 2x10G and 4x1G uplinks and can be redundant.  
ESU32 Ethernet Switch Unit 32 The ESU card for the 1134, and OLT6 chassis that supports 2x10G and 4x1G uplinks and can be redundant.
FCS Frame Check Sequence A frame check sequence (FCS) is an error-detecting code added to a frame in a communication protocol. Frames are used to send payload data from a source to a destination.  All Ethernet packets have an FCS and packets with errored FCS are typically dropped to prevent the transmission of corrupted packets.
FE Far End The other end of a circuit of transmission link.  
FEC Forward Error Correction

Forward error correction (FEC) is an error correction technique to detect and correct a limited number of errors in transmitted data without the need for retransmission.  In this method, the sender sends a redundant error-correcting code along with the data frame.  PON Supports FEC on all PON links.  GPON in the upstream, XGS-PON in both directions.    FEC overhead is about 10% in GPON and about 13% on XGS-PON.

FIPS Federal Information Processing Standards The Federal Information Processing Standards of the United States are a set of publicly announced standards that the National Institute of Standards and Technology has developed for use in computer systems for securing data with FIPS140-2 certified crypto and PKE mechanisms.
FP Feature Package A release of software for either the OLT or Panorama EMS.
FPGA Field Programmable Gate Array Hardware logic arrays that allow re-configuration of the hardware logic in the field.  Allows for in situ addition of hardware features.  FPGA are in use on the OLT to allow extension of system capabilities.
FTP File Transfer Protocol A communications protocol used to transfer files between two computers.  FTP is not secure unless used over secure links.
FTTC Fiber to the Closet PON technology that takes PON fibers into a standard data closet or IDF and utilizes high port count ONTs to service traditional copper networks in a cost effective and future proof manner.
FTTD Fiber to the Desktop PON technology that takes fiber all the way to a users desktop placing the ONT on or around the user desk.
GA General Availability A load that has been fully system tested, typically has been used in LA releases and is suitable for release to the full customer base.
GbE Gigabit Ethernet A transmission technology based on the Ethernet frame format and protocol used in local area networks (LANs), provides a data rate of 1 billion bits per second, or 1 gigabit (Gb).
GigE Gigabit Ethernet 1000BT Ethernet circuits capable of a 1 gigabit rate.
GEM Generic Encapsulation Method

A data frame transport scheme used in gigabit

capable passive optical network (GPON) systems that is connection-oriented and that supports fragmentation of the user data frames into variable-sized transmission fragments.  Supports transport of multiple protocols including Ethernet.  Each flow in Tellabs PON (UNI + VLAN granularity) has it's own GEM port.

GPON Gigabit Passive Optical Networking A PON technology that supports a 2.5G/1.25G line rate and an Ethernet throughput of 2.2G and 1.0G.  
GUI Graphical User Interface  
HMAC Hashed Message Authentication Code A specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key.
ICMP Internet Control Message Protocol A protocol that devices within a network use to communicate problems with data transmission of IP packets.  The most well known of these is ping.
IGMP Internet Group Management Protocol A protocol used to establish multicast groups and join and leave multicast flows.  It allows pruning of multicast on ports where there are no listeners.
IPoE Internet Protocol over Ethernet IP is supported over multiple transport protocols, the most common is over an Ethernet layer 2.
IPTV Internet Protocol Television Transmission of video signals over IP packets, typically using multicast distribution although unicast distribution is sometimes utilized.
LACP Link Aggregation Control Protocol A protocol for LAGs specified by 802.3ad that allows detection of unidirectional links, miswiring of links, and enables hitless adds or removes of links in a LAG.
LAG Link Aggregation Group A protocol for bonding multiple Ethernet link into a single logical link with higher bandwidth an greater reliability.    A LAG that has a failed link will typically run without issues at a lower bandiwdth.
LAN  Local Area Network A local area network is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.
LDAP Lightweight Directory Access Protocol The Lightweight Directory Access Protocol (LDAP) is a vendor-neutral software protocol used to lookup information and perform authentication.  LDAP authentication of users is supported by the Panorama EMS.  LDAPS is recommended to protect users passwords and data.
LDAPS LDAP Secure LDAPS allows for the encryption of LDAP data (which includes user credentials) in transit during any communication with the LDAP server.  LDAPS is always recommended to protect users credentials.
LLDP Link Layer Discovery Protocol The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol used by network devices for advertising their identity, capabilities, and neighbors on a local area network based on IEEE 802 technology, principally wired Ethernet.  Allows for discovery of attached devices and their capabilities.
LLDP-MED Link Layer Discovery Protocol - Media Endpoint Discovery An ANSI standard that extends the LLDP protocol to allow Auto-discovery of LAN policies (such as VLAN, Layer 2 Priority and Differentiated services (Diffserv) settings) enabling plug and play networking.  PoE power discovery and inventory information.
LOF Loss Of Frame Loss of Frame alarm is indicated on PON links when a PON port receives multiple invalid frame delimiters and cannot frame on the signal.
LOS Loss Of Signal The system is unable to detect any incoming signal from the far end device.
MAB MAC Authentication Bypass A variant of 802.1x/RADIUS that uses a device's MAC address to authenticate a port.
     
MAC Media Access Control A MAC is a six byte Ethernet physical or hardware address of an endpoint that is used to address messages at Layer 2.
MAU Media Attachment Unit Defines the type of ethernet port on the far end.  10BT, 100BTX, 1000BT, etc.
MBPS MegaBits Per Second  
MD5 Message Digest 5 A widely used mechanism for generating message digests.  The MD5 hash is often used to validate the authenticity of messages.  MD5 is no longer considered secure and cannot be used in FIPS mode.
MDU Multi Dwelling Unit A term indicating an ONT that services multiple homes or rooms within a facility.  These are usually high port count ONTs.
ME Managed Entity An object communicated via the OMCI protocol and used to configure or get status from ONTs.
MIB Management Information Base A MIB is a set of files defining the interface with a device.  MIB is a generic term and used in multiple protocols.  Within PON it usually refers to the SNMP MIB or OMCI MIB.
MoP Method of Procedure Documents produced by Tellabs TAC for use in performing tasks in the field.
MLPP Multi Level Priority and Pre-emption A voice military feature that supports higher priority calls being able to break into lower priority calls and informing the user of the priority of the incoming call.
MPLS Multi-Protocol Label Switching  Multiprotocol Label Switching, or MPLS, is a networking technology that routes traffic using the shortest path based on “labels,” rather than network addresses, to handle forwarding over private wide area networks.
MTU Maximum Transmission Unit Specifies the maximum transmission unit over a given link.  Typically specified at layer 2 for a physical link.  Packets exceeding the MTU at L2 are segmented or dropped depending on the system.  Please note IP also supports a separate IP MTU or payload.
MSA Multi-Source Agreement In the telecommunications industry, a multi-source agreement (MSA) is an agreement among multiple manufacturers to make products which are compatible across vendors, acting as de facto standards, establishing a competitive market for interoperable products.  As it relates to PON, it covers the interfacing to PON optical modules and uplink copper and optical modules.  Allows configuration, status and alarming of modules.
MSTP Multiple Spanning Tree Protocol MSTP allows multiple spanning tree instances to be created within a system.  The MSTP uses RSTP to manage the spanning tree.  Each MSTI has an associated set of VLANs that are associated with it.  Allows load sharing and protection over physical or logical links (LAGs).
MSTI Multiple Spanning Tree Instance An identifier used to uniquely identify a MST instance within the region.
MWI Message Waiting Indicator A light on most phones that indicates when a message is waiting within voicemail of the user.
NAC Network Access Controller Network access control, or NAC, solutions support network visibility and access management through policy enforcement on devices and users of corporate networks.
NE Network Element A term that is synonymous with OLT.
NNI Network to Network Interface In PON systems, this refers to the uplink interfaces into the network.
NTP Network Time Protocol The Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks.  Allows synchronization of time of day and date.  The OLT supports NTP.
OCSP Open Certificate Status Protocol A protocol utilized to check the status of a specific device certificate in real time to understand whether it has been revoked or is still valid.  OCSP is supported by both the OLT and EMS.
ODN Optical Distribution Network The fiber network between the OLT output and the ONT input and includes the splitters.
OIU2 Optical Interface Unit 2 A Tellabs card supporting 2x PON ports and 4x 10G uplink ports.  datasheet
OIU8 Optical Interface Unit 8 A Tellabs card supporting 8x PON ports capable of XGS-PON or GPON service.  datasheet
OLAN Optical LAN Optical LAN utilizes Passive Optical Networking to implement LAN networks.  Passive Optical LAN (aka POL or OLAN or POLAN) is a better way to build and operate networks. Optical LAN speeds IT productivity through simplification. It reduces network vulnerability points. It offers flexible design options to right-size capacity and density. Optical LAN is optimized for modern fiber-based network connectivity inside buildings and across campus.
OLT Optical Line Terminal In OLAN the Optical Line Terminal provides the uplink interfaces and configures, surveilles and distributes traffic to the ONTs.  It is the main switch, provides most of the security functions and protocol processing.
OLT1 Optical Line Terminal 1 Tellabs OLT supports 2x10G, and 4x1G Uplink along with 8x GPON or XGS-PON ports datasheets.
OLT6 Optical Line Terminal 6 Tellabs OLT supporting 2x10G and 4x1G Uplinks along with up to 32x GPON or XGS-PON ports in a chassis with removable line cards.  Also supports a higher speed backplane for future upgrades.  datasheet
OLT-mini OLT-mini Tellabs OLT outdoor enclosure supporting 2x PON ports and 4x 10G ports. datasheet
OLT-mini Plus OLT-mini Plus Tellabs OLT enclosure supporting up to 5 OIU2 cards.  datasheet
ONT Optical Network Terminal In OLAN the ONT is a 4-48 port device that distributes packets from the PON to the UNI or User to Network Interfaces.  It is a fully secure device with no user interfaces and is controlled by the OLT via an inband channel on the PON.
ONT131 Optical Network Terminal 131 Tellabs GPON ONT supporting 3x 1000BT ports, one POTs port, and 2x of the ports support PoE .  datasheet
ONT140C Optical Network Unit 140 Cubicle Tellabs GPON ONT supporting 4x 1000BT ports with PoE.  datasheet
ONT140W Optical Network Unit 140 Wall Mount Tellabs GPON ONT supporting 4x 1000BT ports with PoE that fits into standard electrical outlet boxes.  datasheet
ONT142R Optical Network Unit 142R Tellabs GPON ONT supporting 4x 1000BT ports with PoE, 2x POTs ports, and 1 RF port. datasheet
ONT202 Optical Network Unit 202 Tellabs XGS-PON ONT supporting 1x10G port and 1x2.5G port with 802.11bt PoE.  datasheet
ONT205 Optical Network Unit 205 Tellabs XGS-PON ONT supporting 1x10G, and 4x1000BT ports with 802.3bt PoE on specific ports. datasheet
ONT248 Optical Network Unit 248 Tellabs XGS-PON ONT supporting 48x1000BT ports with 802.3bt PoE.
ONU Optical Network Unit ONU was originally designated to indicate ONTs with higher line counts.  After being adopted into some standards it became interchangeable for the most part with the term ONT.
OOS Out Of Service A device that has experienced a failure and is no longer able to render it's configured services.
OS  Operating System The operating system utilized to implement a system such as Windows or Linux
OUI Organizationally Unique Identifier The first three bytes of the MAC address which is used to indicate the vendor or manufacturer of that device.
PAE Port Access Entity The protocol entity associated with a port. May support functionality of Authenticator, Supplicant or both.  In OLAN it refers to the software that implements 802.1x, MAB, and RADIUS functionality
PCP Priority Code Point The three bit priority field found in Layer 2 VLAN headers.
PD Powered Device In PoE the device receiving power from the PSE.  In PON this would be the device attached to the ONT port such as an access point or door lock.
PDU Protocol Data Unit In telecommunications, a protocol data unit (PDU) is a single unit of information transmitted among peer entities of a computer network. It is composed of protocol-specific control information and user data.  Typically this is referring to an Ethernet packet or a portion of a packet.
PEM Privacy Enhanced Mail Privacy-Enhanced Mail (PEM) is a de facto file format for storing and sending cryptographic keys, certificates, and other data, based on a set of 1993 IETF standards.  It is also a standard file format using x509 or base 64 encoding that contains one or more certificates, certificate chains and public keys.  PEM format should only be used for public certs as it does not encrypt the contents.
PKCS Public Key Cryptography Standards In cryptography, PKCS stands for "Public Key Cryptography Standards". These are a group of public key cryptography standards devised and published by RSA Security LLC, starting in the early 1990s and has been evolved by the industry.
PKCS#7 PKCS standard #7 PKCS #7 Cryptographic Message File is a form of electronic signature used to secure messages that can only be read by the intended recipient.  It is also a file format for transporting certificates or CRLs.  KCS #7 files may be stored both as raw DER format or as PEM format. PEM format is the same as DER format but wrapped inside Base64 encoding and sandwiched in between ‑‑‑‑‑BEGIN PKCS7‑‑‑‑‑ and ‑‑‑‑‑END PKCS7‑‑‑‑‑. Windows uses the ".p7b" file name extension[6] for both these encodings.
PKI  Public Key Infrastructure A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption.
PHY PHY An ethernet Transceiver that is used for Ethernet interfaces and handles the analog to digital conversion for Ethernet ports.
PIR Peak Information Rate The maximum rate at which a port is allowed transmit packets from a rate limited queue.  The MBS defines the amount of traffic that can be sent above the PIR before traffic is lost.
PM Performance Monitoring PM is the collection of statistics, typically in buckets which are time limited.  PM is often collected in 5 minute or 15 minute buckets and stored away as historical data.
PoE Power over Ethernet The capability to transfer power over standard Ethernet cables in addition to data.  PoE allows for remote devices powered by the PSE or Power Sourcing Equipment.
PON Passive Optical Network An all fiber network using passive optical splitters to distribute traffic to multiple ONTs on the same PON.  The optical distribution is completely passive not requiring any power or cooling.
PPG PON Protection Group A pair of PONs collected into a PON protection group that implements type B PON protection.  The PPG protects the network from failures of the OLT PON card, OLT lasers and OLT to splitter cabling.
PSE Power Sourcing Equipment In PoE the device that provides power at one end of an Ethernet link.  The PSE provides power to the PD or powered device.
PVID Port VLAN ID The VLAN to be associated with untagged traffic.  Untagged traffic on ingress will be tagged with the VLAN found in the PVID.  The VLAN will be stripped on egress in the opposite direction.
QinQ   Double Tagged Traffic where two 802.1q tags are stacked.  Provides for a much larger vlan space where a flow is designated by both the inner and outer tags.
QoS Quality of Service QoS or Quality of service provides prioritization of service typically with queues and advanced queueing behaviors.  QoS is typically within a CoS.
QOIU7 Quad Optical Interface Unit 7 The Tellabs QOIU7 is a 4 port GPON PON card.  
RADIUS Remote Access Dial In User Service Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for users who connect and use a network service.  
RF Radio Frequency  
RMON Remote Network Monitoring The Remote Network Monitoring (RMON) MIB was developed by the IETF to support monitoring and protocol analysis of local area networks (LANs).
RSA (Rivest–Shamir–Adleman), public-key encryption A public-key encryption technology developed by RSA Data Security, Inc. The acronym stands for Rivest, Shamir, and Adelman, the inventors of the technique. The RSA algorithm is based on the fact that there is no efficient way to factor very large numbers. Deducing an RSA key, therefore, requires an extraordinary amount of computer processing power and time.
RSTP Rapid Spanning Tree Protocol RSTP provides significantly faster recovery in response to network changes or failures, introducing new convergence behaviors and bridge port roles to STP
rtVBR Real Time Variable bit rate. A CoS or class of service that supports a peak rate specifying the maximum transmission rate when the network is uncongested and a sustained rate that is guaranteed during periods of congestion.
RTCP Real Time Control Protocol RTCP provides out-of-band statistics and control information for an RTP session. It partners with RTP in the delivery and packaging of multimedia data but does not transport any media data itself.
RTP Real Time Protocol The Real-time Transport Protocol (RTP) is a network protocol for delivering audio and video over IP networks. RTP is used in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications including WebRTC, television services and web-based push-to-talk features.
SRTP Secure Real Time Protocol Encrypted RTP streams.
SHA1 Secure Cryptographic Hash 1 Secure Hash Algorithm 1 is a cryptographic hash function designed by the National Security Agency (NSA) and published by the NIST as a U. S. government standard. SHA-1 is employed in several widely used security applications and protocols, including TLS and SSL, PGP, SSH, S/MIME, and IPSec. It was considered to be the successor to MD5, an earlier, widely-used hash function.
SMF Single Mode Fiber In fiber-optic communication, a single-mode optical fiber (SMF), also known as fundamental- or mono-mode,[1] is an optical fiber designed to carry only a single mode of light.  This allows for long distance transmission and superior performance at high data rates.
SIP Session Initiation Protocol The control protocol for Voice Over IP that is used to negotiate call parameters for the RTP bearer path and handshake call setup.   It also communicates call progress and encryption parameters. 
SNR Signal To Noise Ratio Signal-to-noise ratio (SNR or S/N) is a measure used in science and engineering that compares the level of a desired signal to the level of background noise.  A higher SNR equates to better transmission and lower error rates.
SSL Secure Sockets Layer SSL or its successor Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible.
SoC System On a Chip A system on a chip or system-on-chip (SoC) is an integrated circuit that integrates most or all components of a computer or other electronic system.  This typically refers to the PON chipsets in the OLAN context.
SSM Source Specific Multicast With the advent of IGMPv3, it added the capability to not only join a specific multicast group but also to specify the source from which it originated allowing of filtering of the joins/multicast forwarding to just the multicast flow of interest.
STB Set Top Box A device for receiving IPTV video and audio and converting it to outputs suitable for display on at TV or other consumer device.
 STIG  Security Technical Implementation Guide  A Security Technical Implementation Guide or STIG is a configuration standard consisting of cybersecurity requirements for a specific product. The use of STIGs enables a methodology for securing protocols within networks, servers, computers, and logical designs to enhance overall security. These guides, when implemented, enhance security for software, hardware, physical and logical architectures to further reduce vulnerabilities.
STP Spanning Tree Protocol The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. Spanning tree also allows a network design to include backup links providing fault tolerance if an active link fails.
TACACS+ Terminal Access Control System TACACS Plus (TACACS+) is a protocol developed by Cisco and released as an open standard beginning in 1993. Although derived from TACACS, TACACS+ is a separate protocol that handles authentication, authorization, and accounting (AAA) services. TACACS+ has largely replaced its predecessors.
TCP Transmission Control Protocol TCP provides reliable, ordered, and error-checked delivery of a stream of octets (bytes) between applications running on hosts communicating via an IP network.
TCN Topology Change Notification A message in the STP protocol indicating a change in the STP tree that has occurred.
TFTP Trivial File Transfer Protocol Trivial File Transfer Protocol (TFTP) is a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host. One of its primary uses is in the early stages of nodes booting from a local area network. TFTP has been used for this application because it is very simple to implement.  TFTP is also insecure and should not be used in modern networks.
TID Terminal Identifier A unique name for an OLT or Network Element.  
TLS Transport Layer Security

The successor to SSL or secure sockets layer.  Provides secure end to end connections between to applications or users.

TLS Transparent LAN Service  A service which unconditionally pushes a VLAN tag onto traffic ingressing the port and strips in the opposite direction.  Used to transparently transport LAN traffic between two sites.
TR Telecom Room The room used for housing networking and telecom equipment.
TURNUP Turn Up The initial configuration used to set the OLT uplink, IP, and VLAN so that it can be added to the EMS and managed.
UBR Unspecified Bit Rate A best effort Class Of Service used in PON networks.  It is the default CoS for most services.
UDP User Datagram Protocol n computer networking, the User Datagram Protocol (UDP) is one of the core communication protocols of the Internet protocol suite used to send messages (transported as datagrams in packets) to other hosts on an Internet Protocol (IP) network. Within an IP network, UDP does not require prior communication to set up communication channels or data paths.  UDP does not guarantee delivery of packets and error recovery must be done in external protocols.
UNI User to Network Interface The name given to ports on the ONT that connect user equipment to the network.
VGW Voice Gateway A Tellabs product that allows termination of Voice Over IP from ONTs into the legacy telco networks.
VID VLAN ID The numerical identifier of a VLAN.  VLAN IDs can range from 1 to 4095
VLAN Virtual LAN A virtual local area network (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2).  The VLAN is identified by a VLAN ID and sometimes a VLAN Name.  Users in different VLANs cannot communicate with each other unless their traffic passes through a router with a valid route between the two vlans.
VoD Video on Demand IPTV that allows playback of programs on demand by the user.
VoIP Voice Over IP Voice transported over IP packets.  Typically via SIP as the control protocol and RTP as the media bearer channel.
VPN Virtual Private Network
A virtual private network (VPN) is a mechanism for creating a secure connection between a computing device and a computer network, or between two networks, using an insecure communication medium such as the public Internet.
VRRP Virtual Router Redundancy Protocol The Virtual Router Redundancy Protocol (VRRP) is a computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts. This increases the availability and reliability of routing paths via automatic default gateway selections on an IP subnetwork.  Tellabs OLTs interop with VRRP.
WAN Wide Area Network

A wide area network (WAN) is a telecommunications network that extends over a large geographic area. Wide area networks are often established with leased telecommunication circuits.  Businesses, as well as schools and government entities, use wide area networks to relay data to staff, students, clients, buyers and suppliers to/from various locations.

WAP Wireless Access Point In computer networking, a wireless access point, or more generally just access point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a wired network.  Tellabs sells a wide variety of Wifi Access Points.
WDM Wavelength Division Multiplexing The ability to multiplex multiple optical channels onto a single fiber using WDM combiners.  The wavelengths are chosen such that they do not interfere.  Tellabs uses WDM to place upstream and downstream traffic on a single fiber in normal PON operation.  Tellabs also supports 2 XGS-PON wavelengths and one GPON wavelength on the same fiber ODN.
WFQ Weighted Fair Queuing Weighted Fair Queuing allows assignment of weights to particular types or traffic or queues that allow starvation prevention and specification of which types of traffic can consume what percentage of the bandwidth.
WRED Weighted Random Early Detection Weighted random early detection (WRED) is a queueing discipline for a network scheduler suited for congestion avoidance.[1] It is an extension to random early detection (RED) where a single queue may have several different sets of queue thresholds. Each threshold set is associated to a particular traffic class.
WRR Weighted Round Robin Weighted round robin[1] is a generalization of round-robin scheduling. It serves a set of queues or tasks. Whereas round-robin cycles over the queues or tasks and gives one service opportunity per cycle, weighted round robin offers to each a fixed number of opportunities, as specified by the configured weight which serves to influence the portion of capacity received by each queue or task. In computer networks, a service opportunity is the emission of one packet, if the selected queue is non-empty.
WTR Wait To Restore (time) The time period that a device waits after a protection switch before switching again.  This provides hysteresis and minimizes traffic effects.  It seeks to minimize flapping of a link.
XML eXtensible Markup Language Extensible Markup Language (XML) is a markup language and file format for storing, transmitting, and reconstructing arbitrary data.  XML is used in Tellabs equipment for restore files and many configuration files.
XGS-PON 10G (X) Gigabit Symmetrical
Passive Optical Networking
The 10G variant of PON utilized to provide symmetric 10G service to ONTs.