OLAN Glossary
|
ACL |
Access Control List |
A set of rules that will deny or permit traffic based on a set of match criteria. Used to block or permit packets on a network. |
|
AES |
Advanced Encryption Standard |
A type of cryptography used to encrypt clear text. AES has been adopted by the US government and usually uses AES-128 or AES-256 variants for FIPs-compliant systems. Message block size is 128 bits and keys can be 128, 192, or 256 bits. |
| AEI | AS-SIP End Instrument | A end device supporting the Federal Government standard for Assured Services SIP used for securely carrying phone calls and supporting MLPP. An End Instrument is typically a VoIP phone or its equivalent. |
| AID | Access Identifier | A unique identifier guaranteed to be unique within a system. It allows uniquely identifying a port or piece of equipment. Often hierarchically constructed to express containment within the system. |
| AIS | Alarm Indication Signal |
A signal sent to the far end to inform it of a failure at the near end. This allows passing the alarm up at the other end of the link to management systems to alert them of the far end failure. |
| ALM | Alarm | Alarms are used to indicate standing failures within a system. Alarms have a severity associated with them, typically Minor, Major, Critical, a timestamp, and its state (SET or CLEAR). Standing alarms indicate all the current failures within the system. |
| ANI | Access Network Interface | An interface that faces towards the Network side of a system. The opposite direction from UNI or User to Network Interfaces. |
| API | Application Programming Interface | An documented interface defined on systems that allow access to set the values of system variables and invoke system actions. |
| APS | Automatic Protection Switching | Systems able to switch traffic to protection without manual intervention. |
| ARP | Address Resolution Protocol | A protocol for requesting the binding of an IP address to MAC so that packets can be forwarded at Layer 2. This allows nodes to learn the physical address or MAC associated with an IP. |
| BER | Bit Error Rate | The ratio of incorrectly transmitted bits to all transmitted bits over a given time. Within the PON context, it defines errors detected on the PON via BIP or Bit Interleaved Parity on the PON overhead. |
| BBU | Battery Backup Unit | A battery used to protect the ONT or OLT in the event of an AC power outage. |
| CA | Certificate Authority | A trusted entity that issues SSL certificates. CAs can sign certificates which cause end systems that trust that CA to trust that end system or user. |
| CBR | Constant Bit Rate | A Class Of Service within PON and many other transmission systems that enables Constant Bit Rate Service. CBR guarantees that bandwidth is set aside on the PON that is not shared and it is handed out on a verify regular basis to minimize latency and jitter. CBR is the highest Class of Service within PON. |
| CBS | Committed Burst Size | Committed burst size (CBS) specifies the maximum number of bytes that can be transmitted into the network in an extremely short interval of time. |
| CIR | Committed Information Rate | A guaranteed rate that will be given to a traffic flow even in the presence of congestion. |
| CLI | Command Line Interface | A text based interface for controlling the system. The Tellabs OLTs all support a CLI via ssh or serial interfaces. |
| CoS | Class Of Service | Class of Service defines a number of traffic classes with similar traffic characteristics. Systems attempt to assure the traffic characteristics by assigning a CoS to a traffic flow then configuring it's characteristics. Tellabs PON supports the following CoS: CBR1, CBR2, VBRnrt, and UBR |
| CPE | Customer Premise Equipment | End user equipment that is attached to the ONT UNI ports. |
| CRC | Cyclic Redundancy Check | A CRC is placed at the end of messages to validate whether the content of the message is correct or not. If a packet fails the CRC check, it is typically discarded. |
| CRL | Certificate Revocation List | Certificates typically have a 2-3 year validity date range. A certificate revocation list allows systems to be informed of revoked certificates that are still within their validity dates. |
| CSMA/CD | Carrier Sense Multiple Access Collision Detect |
Ethernet used to be a multi-dropped interface that used collision detect to know when two ports are transmitting. While no longer in use, Ethernet is often referred to this way. |
| CW | Call Waiting | A call feature that informs a user of an incoming call while already in a call so that user can decide to take the call or ignore it. |
| CCW | Cancel Call Waiting | The ability to cancel the call waiting feature for the duration of the next phone call. |
| DAC | Dynamic Authorization Client | A client which implements the Dynamic Authorization Extensions to RADIUS allowing RADIUS to immediately log off online users, change the online user's authorization information, shut down or reboot the user's port, or force re-authentication of online users. |
| DAI | Dynamic ARP Inspection | A feature that inspects all ARPs coming from users to ensure that they meet the ARP binding from DHCP and performs a number of checks to ensure the ARPs are correct and have not been forged. All invalid ARPs are dropped. This same function also allows the OLT to learn and display IP to MAC bindings. |
| DB | Database | |
| DBDT | Draw and Break Dial Tone | A fairly standard test on analog lines to ensure service by taking the phone off hook, listening for dial tone levels, and then dialing to ensure upstream audio integrity (since it will stop dial tone). |
| DER | Distinguished Encoding Rules | DES is a binary format for encoding x.509 certificates and private keys. |
| DEI | Drop Eligibility Indicator | Indicates whether a frame is eligible to be dropped whenever congestion is occurring. DEI=1 indicates a frame is less important and eligible to be dropped. |
| DHCP | Dynamic Host Configuration Protocol | A protocol associated with IP that allows dynamic assignment of an IP address to a host. |
| DoS | Denial of Service | A type of attack that seeks to deny use of a machine or service by it's intended users. DoS attacks tend to flood the target with packets, requests, or send packets that cause a crash of the machine or service. |
| DSCP | Differentiated Services Code Point | |
| DTMF | Dual Tone Multi-frequency | Telephone dialing signals are created via the mixing of tones of two frequencies. Some call progress signals also use DTMF tones. |
| DSCP | Differentiated Services | A field within IP packets used for marking the priority of traffic at layer 3. There is an associated PHB or per hop behavior associated with each code point. |
| EAPOL | Extensible Access Protocol Over Lans | A protocol used by 802.1x to authenticate devices attached to the port of an Ethernet switch. |
| EBS | Excess Burst Size | Maximum number of bits/bytes in excess of the Committed Burst Size (CBS) that a user can send during a predefined time period. |
| EDFA | Erbium Doped Fiber Amplifier | A type of amplifier often used in RF video systems to amplify the optical signal. |
| EIR | Excess Information Rate | (EIR) is the size of the allowed burst above the CIR or committed information rate. |
| EMS | Element Management System | The Panorama software that is utilized to manage a network of OLTs and ONTs. |
| ESD | Electrostatic Discharge | ESD is a sudden and momentary flow of electric current between two electrically charged objects caused by contact, typically due to static electricity. ESD can damage sensitive electronic components. |
| ESU | Ethernet Switch Unit | The primary switch card in multi-slot OLT chassis. |
| ESU2 | Ethernet Switch Unit 2 | The ESU card for the 1150E shelf that supports 2x10G and 4x1G uplinks and can be redundant. |
| ESU32 | Ethernet Switch Unit 32 | The ESU card for the 1134, and OLT6 chassis that supports 2x10G and 4x1G uplinks and can be redundant. |
| FCS | Frame Check Sequence | A frame check sequence (FCS) is an error-detecting code added to a frame in a communication protocol. Frames are used to send payload data from a source to a destination. All Ethernet packets have an FCS and packets with errored FCS are typically dropped to prevent the transmission of corrupted packets. |
| FE | Far End | The other end of a circuit of transmission link. |
| FEC | Forward Error Correction |
Forward error correction (FEC) is an error correction technique to detect and correct a limited number of errors in transmitted data without the need for retransmission. In this method, the sender sends a redundant error-correcting code along with the data frame. PON Supports FEC on all PON links. GPON in the upstream, XGS-PON in both directions. FEC overhead is about 10% in GPON and about 13% on XGS-PON. |
| FIPS | Federal Information Processing Standards | The Federal Information Processing Standards of the United States are a set of publicly announced standards that the National Institute of Standards and Technology has developed for use in computer systems for securing data with FIPS140-2 certified crypto and PKE mechanisms. |
| FP | Feature Package | A release of software for either the OLT or Panorama EMS. |
| FPGA | Field Programmable Gate Array | Hardware logic arrays that allow re-configuration of the hardware logic in the field. Allows for in situ addition of hardware features. FPGA are in use on the OLT to allow extension of system capabilities. |
| FTP | File Transfer Protocol | A communications protocol used to transfer files between two computers. FTP is not secure unless used over secure links. |
| FTTC | Fiber to the Closet | PON technology that takes PON fibers into a standard data closet or IDF and utilizes high port count ONTs to service traditional copper networks in a cost effective and future proof manner. |
| FTTD | Fiber to the Desktop | PON technology that takes fiber all the way to a users desktop placing the ONT on or around the user desk. |
| GA | General Availability | A load that has been fully system tested, typically has been used in LA releases and is suitable for release to the full customer base. |
| GbE | Gigabit Ethernet | A transmission technology based on the Ethernet frame format and protocol used in local area networks (LANs), provides a data rate of 1 billion bits per second, or 1 gigabit (Gb). |
| GigE | Gigabit Ethernet | 1000BT Ethernet circuits capable of a 1 gigabit rate. |
| GEM | Generic Encapsulation Method |
A data frame transport scheme used in gigabit capable passive optical network (GPON) systems that is connection-oriented and that supports fragmentation of the user data frames into variable-sized transmission fragments. Supports transport of multiple protocols including Ethernet. Each flow in Tellabs PON (UNI + VLAN granularity) has it's own GEM port. |
| GPON | Gigabit Passive Optical Networking | A PON technology that supports a 2.5G/1.25G line rate and an Ethernet throughput of 2.2G and 1.0G. |
| GUI | Graphical User Interface | |
| HMAC | Hashed Message Authentication Code | A specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key. |
| ICMP | Internet Control Message Protocol | A protocol that devices within a network use to communicate problems with data transmission of IP packets. The most well known of these is ping. |
| IGMP | Internet Group Management Protocol | A protocol used to establish multicast groups and join and leave multicast flows. It allows pruning of multicast on ports where there are no listeners. |
| IPoE | Internet Protocol over Ethernet | IP is supported over multiple transport protocols, the most common is over an Ethernet layer 2. |
| IPTV | Internet Protocol Television | Transmission of video signals over IP packets, typically using multicast distribution although unicast distribution is sometimes utilized. |
| LACP | Link Aggregation Control Protocol | A protocol for LAGs specified by 802.3ad that allows detection of unidirectional links, miswiring of links, and enables hitless adds or removes of links in a LAG. |
| LAG | Link Aggregation Group | A protocol for bonding multiple Ethernet link into a single logical link with higher bandwidth an greater reliability. A LAG that has a failed link will typically run without issues at a lower bandiwdth. |
| LAN | Local Area Network | A local area network is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building. |
| LDAP | Lightweight Directory Access Protocol | The Lightweight Directory Access Protocol (LDAP) is a vendor-neutral software protocol used to lookup information and perform authentication. LDAP authentication of users is supported by the Panorama EMS. LDAPS is recommended to protect users passwords and data. |
| LDAPS | LDAP Secure | LDAPS allows for the encryption of LDAP data (which includes user credentials) in transit during any communication with the LDAP server. LDAPS is always recommended to protect users credentials. |
| LLDP | Link Layer Discovery Protocol | The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol used by network devices for advertising their identity, capabilities, and neighbors on a local area network based on IEEE 802 technology, principally wired Ethernet. Allows for discovery of attached devices and their capabilities. |
| LLDP-MED | Link Layer Discovery Protocol - Media Endpoint Discovery | An ANSI standard that extends the LLDP protocol to allow Auto-discovery of LAN policies (such as VLAN, Layer 2 Priority and Differentiated services (Diffserv) settings) enabling plug and play networking. PoE power discovery and inventory information. |
| LOF | Loss Of Frame | Loss of Frame alarm is indicated on PON links when a PON port receives multiple invalid frame delimiters and cannot frame on the signal. |
| LOS | Loss Of Signal | The system is unable to detect any incoming signal from the far end device. |
| MAB | MAC Authentication Bypass | A variant of 802.1x/RADIUS that uses a device's MAC address to authenticate a port. |
| MAC | Media Access Control | A MAC is a six byte Ethernet physical or hardware address of an endpoint that is used to address messages at Layer 2. |
| MAU | Media Attachment Unit | Defines the type of ethernet port on the far end. 10BT, 100BTX, 1000BT, etc. |
| MBPS | MegaBits Per Second | |
| MD5 | Message Digest 5 | A widely used mechanism for generating message digests. The MD5 hash is often used to validate the authenticity of messages. MD5 is no longer considered secure and cannot be used in FIPS mode. |
| MDU | Multi Dwelling Unit | A term indicating an ONT that services multiple homes or rooms within a facility. These are usually high port count ONTs. |
| ME | Managed Entity | An object communicated via the OMCI protocol and used to configure or get status from ONTs. |
| MIB | Management Information Base | A MIB is a set of files defining the interface with a device. MIB is a generic term and used in multiple protocols. Within PON it usually refers to the SNMP MIB or OMCI MIB. |
| MoP | Method of Procedure | Documents produced by Tellabs TAC for use in performing tasks in the field. |
| MLPP | Multi Level Priority and Pre-emption | A voice military feature that supports higher priority calls being able to break into lower priority calls and informing the user of the priority of the incoming call. |
| MPLS | Multi-Protocol Label Switching | Multiprotocol Label Switching, or MPLS, is a networking technology that routes traffic using the shortest path based on “labels,” rather than network addresses, to handle forwarding over private wide area networks. |
| MTU | Maximum Transmission Unit | Specifies the maximum transmission unit over a given link. Typically specified at layer 2 for a physical link. Packets exceeding the MTU at L2 are segmented or dropped depending on the system. Please note IP also supports a separate IP MTU or payload. |
| MSA | Multi-Source Agreement | In the telecommunications industry, a multi-source agreement (MSA) is an agreement among multiple manufacturers to make products which are compatible across vendors, acting as de facto standards, establishing a competitive market for interoperable products. As it relates to PON, it covers the interfacing to PON optical modules and uplink copper and optical modules. Allows configuration, status and alarming of modules. |
| MSTP | Multiple Spanning Tree Protocol | MSTP allows multiple spanning tree instances to be created within a system. The MSTP uses RSTP to manage the spanning tree. Each MSTI has an associated set of VLANs that are associated with it. Allows load sharing and protection over physical or logical links (LAGs). |
| MSTI | Multiple Spanning Tree Instance | An identifier used to uniquely identify a MST instance within the region. |
| MWI | Message Waiting Indicator | A light on most phones that indicates when a message is waiting within voicemail of the user. |
| NAC | Network Access Controller | Network access control, or NAC, solutions support network visibility and access management through policy enforcement on devices and users of corporate networks. |
| NE | Network Element | A term that is synonymous with OLT. |
| NNI | Network to Network Interface | In PON systems, this refers to the uplink interfaces into the network. |
| NTP | Network Time Protocol | The Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. Allows synchronization of time of day and date. The OLT supports NTP. |
| OCSP | Open Certificate Status Protocol | A protocol utilized to check the status of a specific device certificate in real time to understand whether it has been revoked or is still valid. OCSP is supported by both the OLT and EMS. |
| ODN | Optical Distribution Network | The fiber network between the OLT output and the ONT input and includes the splitters. |
| OIU2 | Optical Interface Unit 2 | A Tellabs card supporting 2x PON ports and 4x 10G uplink ports. datasheet |
| OIU8 | Optical Interface Unit 8 | A Tellabs card supporting 8x PON ports capable of XGS-PON or GPON service. datasheet |
| OLAN | Optical LAN | Optical LAN utilizes Passive Optical Networking to implement LAN networks. Passive Optical LAN (aka POL or OLAN or POLAN) is a better way to build and operate networks. Optical LAN speeds IT productivity through simplification. It reduces network vulnerability points. It offers flexible design options to right-size capacity and density. Optical LAN is optimized for modern fiber-based network connectivity inside buildings and across campus. |
| OLT | Optical Line Terminal | In OLAN the Optical Line Terminal provides the uplink interfaces and configures, surveilles and distributes traffic to the ONTs. It is the main switch, provides most of the security functions and protocol processing. |
| OLT1 | Optical Line Terminal 1 | Tellabs OLT supports 2x10G, and 4x1G Uplink along with 8x GPON or XGS-PON ports datasheets. |
| OLT6 | Optical Line Terminal 6 | Tellabs OLT supporting 2x10G and 4x1G Uplinks along with up to 32x GPON or XGS-PON ports in a chassis with removable line cards. Also supports a higher speed backplane for future upgrades. datasheet |
| OLT-mini | OLT-mini | Tellabs OLT outdoor enclosure supporting 2x PON ports and 4x 10G ports. datasheet |
| OLT-mini Plus | OLT-mini Plus | Tellabs OLT enclosure supporting up to 5 OIU2 cards. datasheet |
| ONT | Optical Network Terminal | In OLAN the ONT is a 4-48 port device that distributes packets from the PON to the UNI or User to Network Interfaces. It is a fully secure device with no user interfaces and is controlled by the OLT via an inband channel on the PON. |
| ONT131 | Optical Network Terminal 131 | Tellabs GPON ONT supporting 3x 1000BT ports, one POTs port, and 2x of the ports support PoE . datasheet |
| ONT140C | Optical Network Unit 140 Cubicle | Tellabs GPON ONT supporting 4x 1000BT ports with PoE. datasheet |
| ONT140W | Optical Network Unit 140 Wall Mount | Tellabs GPON ONT supporting 4x 1000BT ports with PoE that fits into standard electrical outlet boxes. datasheet |
| ONT142R | Optical Network Unit 142R | Tellabs GPON ONT supporting 4x 1000BT ports with PoE, 2x POTs ports, and 1 RF port. datasheet |
| ONT202 | Optical Network Unit 202 | Tellabs XGS-PON ONT supporting 1x10G port and 1x2.5G port with 802.11bt PoE. datasheet |
| ONT205 | Optical Network Unit 205 | Tellabs XGS-PON ONT supporting 1x10G, and 4x1000BT ports with 802.3bt PoE on specific ports. datasheet |
| ONT248 | Optical Network Unit 248 | Tellabs XGS-PON ONT supporting 48x1000BT ports with 802.3bt PoE. |
| ONU | Optical Network Unit | ONU was originally designated to indicate ONTs with higher line counts. After being adopted into some standards it became interchangeable for the most part with the term ONT. |
| OOS | Out Of Service | A device that has experienced a failure and is no longer able to render it's configured services. |
| OS | Operating System | The operating system utilized to implement a system such as Windows or Linux |
| OUI | Organizationally Unique Identifier | The first three bytes of the MAC address which is used to indicate the vendor or manufacturer of that device. |
| PAE | Port Access Entity | The protocol entity associated with a port. May support functionality of Authenticator, Supplicant or both. In OLAN it refers to the software that implements 802.1x, MAB, and RADIUS functionality |
| PCP | Priority Code Point | The three bit priority field found in Layer 2 VLAN headers. |
| PD | Powered Device | In PoE the device receiving power from the PSE. In PON this would be the device attached to the ONT port such as an access point or door lock. |
| PDU | Protocol Data Unit | In telecommunications, a protocol data unit (PDU) is a single unit of information transmitted among peer entities of a computer network. It is composed of protocol-specific control information and user data. Typically this is referring to an Ethernet packet or a portion of a packet. |
| PEM | Privacy Enhanced Mail | Privacy-Enhanced Mail (PEM) is a de facto file format for storing and sending cryptographic keys, certificates, and other data, based on a set of 1993 IETF standards. It is also a standard file format using x509 or base 64 encoding that contains one or more certificates, certificate chains and public keys. PEM format should only be used for public certs as it does not encrypt the contents. |
| PKCS | Public Key Cryptography Standards | In cryptography, PKCS stands for "Public Key Cryptography Standards". These are a group of public key cryptography standards devised and published by RSA Security LLC, starting in the early 1990s and has been evolved by the industry. |
| PKCS#7 | PKCS standard #7 | PKCS #7 Cryptographic Message File is a form of electronic signature used to secure messages that can only be read by the intended recipient. It is also a file format for transporting certificates or CRLs. KCS #7 files may be stored both as raw DER format or as PEM format. PEM format is the same as DER format but wrapped inside Base64 encoding and sandwiched in between ‑‑‑‑‑BEGIN PKCS7‑‑‑‑‑ and ‑‑‑‑‑END PKCS7‑‑‑‑‑. Windows uses the ".p7b" file name extension[6] for both these encodings. |
| PKI | Public Key Infrastructure | A public key infrastructure (PKI) is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. |
| PHY | PHY | An ethernet Transceiver that is used for Ethernet interfaces and handles the analog to digital conversion for Ethernet ports. |
| PIR | Peak Information Rate | The maximum rate at which a port is allowed transmit packets from a rate limited queue. The MBS defines the amount of traffic that can be sent above the PIR before traffic is lost. |
| PM | Performance Monitoring | PM is the collection of statistics, typically in buckets which are time limited. PM is often collected in 5 minute or 15 minute buckets and stored away as historical data. |
| PoE | Power over Ethernet | The capability to transfer power over standard Ethernet cables in addition to data. PoE allows for remote devices powered by the PSE or Power Sourcing Equipment. |
| PON | Passive Optical Network | An all fiber network using passive optical splitters to distribute traffic to multiple ONTs on the same PON. The optical distribution is completely passive not requiring any power or cooling. |
| PPG | PON Protection Group | A pair of PONs collected into a PON protection group that implements type B PON protection. The PPG protects the network from failures of the OLT PON card, OLT lasers and OLT to splitter cabling. |
| PSE | Power Sourcing Equipment | In PoE the device that provides power at one end of an Ethernet link. The PSE provides power to the PD or powered device. |
| PVID | Port VLAN ID | The VLAN to be associated with untagged traffic. Untagged traffic on ingress will be tagged with the VLAN found in the PVID. The VLAN will be stripped on egress in the opposite direction. |
| QinQ | Double Tagged Traffic where two 802.1q tags are stacked. Provides for a much larger vlan space where a flow is designated by both the inner and outer tags. | |
| QoS | Quality of Service | QoS or Quality of service provides prioritization of service typically with queues and advanced queueing behaviors. QoS is typically within a CoS. |
| QOIU7 | Quad Optical Interface Unit 7 | The Tellabs QOIU7 is a 4 port GPON PON card. |
| RADIUS | Remote Access Dial In User Service | Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for users who connect and use a network service. |
| RF | Radio Frequency | |
| RMON | Remote Network Monitoring | The Remote Network Monitoring (RMON) MIB was developed by the IETF to support monitoring and protocol analysis of local area networks (LANs). |
| RSA | (Rivest–Shamir–Adleman), public-key encryption | A public-key encryption technology developed by RSA Data Security, Inc. The acronym stands for Rivest, Shamir, and Adelman, the inventors of the technique. The RSA algorithm is based on the fact that there is no efficient way to factor very large numbers. Deducing an RSA key, therefore, requires an extraordinary amount of computer processing power and time. |
| RSTP | Rapid Spanning Tree Protocol | RSTP provides significantly faster recovery in response to network changes or failures, introducing new convergence behaviors and bridge port roles to STP |
| rtVBR | Real Time Variable bit rate. | A CoS or class of service that supports a peak rate specifying the maximum transmission rate when the network is uncongested and a sustained rate that is guaranteed during periods of congestion. |
| RTCP | Real Time Control Protocol | RTCP provides out-of-band statistics and control information for an RTP session. It partners with RTP in the delivery and packaging of multimedia data but does not transport any media data itself. |
| RTP | Real Time Protocol | The Real-time Transport Protocol (RTP) is a network protocol for delivering audio and video over IP networks. RTP is used in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications including WebRTC, television services and web-based push-to-talk features. |
| SRTP | Secure Real Time Protocol | Encrypted RTP streams. |
| SHA1 | Secure Cryptographic Hash 1 | Secure Hash Algorithm 1 is a cryptographic hash function designed by the National Security Agency (NSA) and published by the NIST as a U. S. government standard. SHA-1 is employed in several widely used security applications and protocols, including TLS and SSL, PGP, SSH, S/MIME, and IPSec. It was considered to be the successor to MD5, an earlier, widely-used hash function. |
| SMF | Single Mode Fiber | In fiber-optic communication, a single-mode optical fiber (SMF), also known as fundamental- or mono-mode,[1] is an optical fiber designed to carry only a single mode of light. This allows for long distance transmission and superior performance at high data rates. |
| SIP | Session Initiation Protocol | The control protocol for Voice Over IP that is used to negotiate call parameters for the RTP bearer path and handshake call setup. It also communicates call progress and encryption parameters. |
| SNR | Signal To Noise Ratio | Signal-to-noise ratio (SNR or S/N) is a measure used in science and engineering that compares the level of a desired signal to the level of background noise. A higher SNR equates to better transmission and lower error rates. |
| SSL | Secure Sockets Layer | SSL or its successor Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible. |
| SoC | System On a Chip | A system on a chip or system-on-chip (SoC) is an integrated circuit that integrates most or all components of a computer or other electronic system. This typically refers to the PON chipsets in the OLAN context. |
| SSM | Source Specific Multicast | With the advent of IGMPv3, it added the capability to not only join a specific multicast group but also to specify the source from which it originated allowing of filtering of the joins/multicast forwarding to just the multicast flow of interest. |
| STB | Set Top Box | A device for receiving IPTV video and audio and converting it to outputs suitable for display on at TV or other consumer device. |
| STIG | Security Technical Implementation Guide | A Security Technical Implementation Guide or STIG is a configuration standard consisting of cybersecurity requirements for a specific product. The use of STIGs enables a methodology for securing protocols within networks, servers, computers, and logical designs to enhance overall security. These guides, when implemented, enhance security for software, hardware, physical and logical architectures to further reduce vulnerabilities. |
| STP | Spanning Tree Protocol | The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. Spanning tree also allows a network design to include backup links providing fault tolerance if an active link fails. |
| TACACS+ | Terminal Access Control System | TACACS Plus (TACACS+) is a protocol developed by Cisco and released as an open standard beginning in 1993. Although derived from TACACS, TACACS+ is a separate protocol that handles authentication, authorization, and accounting (AAA) services. TACACS+ has largely replaced its predecessors. |
| TCP | Transmission Control Protocol | TCP provides reliable, ordered, and error-checked delivery of a stream of octets (bytes) between applications running on hosts communicating via an IP network. |
| TCN | Topology Change Notification | A message in the STP protocol indicating a change in the STP tree that has occurred. |
| TFTP | Trivial File Transfer Protocol | Trivial File Transfer Protocol (TFTP) is a simple lockstep File Transfer Protocol which allows a client to get a file from or put a file onto a remote host. One of its primary uses is in the early stages of nodes booting from a local area network. TFTP has been used for this application because it is very simple to implement. TFTP is also insecure and should not be used in modern networks. |
| TID | Terminal Identifier | A unique name for an OLT or Network Element. |
| TLS | Transport Layer Security |
The successor to SSL or secure sockets layer. Provides secure end to end connections between to applications or users. |
| TLS | Transparent LAN Service | A service which unconditionally pushes a VLAN tag onto traffic ingressing the port and strips in the opposite direction. Used to transparently transport LAN traffic between two sites. |
| TR | Telecom Room | The room used for housing networking and telecom equipment. |
| TURNUP | Turn Up | The initial configuration used to set the OLT uplink, IP, and VLAN so that it can be added to the EMS and managed. |
| UBR | Unspecified Bit Rate | A best effort Class Of Service used in PON networks. It is the default CoS for most services. |
| UDP | User Datagram Protocol | n computer networking, the User Datagram Protocol (UDP) is one of the core communication protocols of the Internet protocol suite used to send messages (transported as datagrams in packets) to other hosts on an Internet Protocol (IP) network. Within an IP network, UDP does not require prior communication to set up communication channels or data paths. UDP does not guarantee delivery of packets and error recovery must be done in external protocols. |
| UNI | User to Network Interface | The name given to ports on the ONT that connect user equipment to the network. |
| VGW | Voice Gateway | A Tellabs product that allows termination of Voice Over IP from ONTs into the legacy telco networks. |
| VID | VLAN ID | The numerical identifier of a VLAN. VLAN IDs can range from 1 to 4095 |
| VLAN | Virtual LAN | A virtual local area network (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2). The VLAN is identified by a VLAN ID and sometimes a VLAN Name. Users in different VLANs cannot communicate with each other unless their traffic passes through a router with a valid route between the two vlans. |
| VoD | Video on Demand | IPTV that allows playback of programs on demand by the user. |
| VoIP | Voice Over IP | Voice transported over IP packets. Typically via SIP as the control protocol and RTP as the media bearer channel. |
| VPN | Virtual Private Network | A virtual private network (VPN) is a mechanism for creating a secure connection between a computing device and a computer network, or between two networks, using an insecure communication medium such as the public Internet. |
| VRRP | Virtual Router Redundancy Protocol | The Virtual Router Redundancy Protocol (VRRP) is a computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts. This increases the availability and reliability of routing paths via automatic default gateway selections on an IP subnetwork. Tellabs OLTs interop with VRRP. |
| WAN | Wide Area Network |
A wide area network (WAN) is a telecommunications network that extends over a large geographic area. Wide area networks are often established with leased telecommunication circuits. Businesses, as well as schools and government entities, use wide area networks to relay data to staff, students, clients, buyers and suppliers to/from various locations. |
| WAP | Wireless Access Point | In computer networking, a wireless access point, or more generally just access point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a wired network. Tellabs sells a wide variety of Wifi Access Points. |
| WDM | Wavelength Division Multiplexing | The ability to multiplex multiple optical channels onto a single fiber using WDM combiners. The wavelengths are chosen such that they do not interfere. Tellabs uses WDM to place upstream and downstream traffic on a single fiber in normal PON operation. Tellabs also supports 2 XGS-PON wavelengths and one GPON wavelength on the same fiber ODN. |
| WFQ | Weighted Fair Queuing | Weighted Fair Queuing allows assignment of weights to particular types or traffic or queues that allow starvation prevention and specification of which types of traffic can consume what percentage of the bandwidth. |
| WRED | Weighted Random Early Detection | Weighted random early detection (WRED) is a queueing discipline for a network scheduler suited for congestion avoidance.[1] It is an extension to random early detection (RED) where a single queue may have several different sets of queue thresholds. Each threshold set is associated to a particular traffic class. |
| WRR | Weighted Round Robin | Weighted round robin[1] is a generalization of round-robin scheduling. It serves a set of queues or tasks. Whereas round-robin cycles over the queues or tasks and gives one service opportunity per cycle, weighted round robin offers to each a fixed number of opportunities, as specified by the configured weight which serves to influence the portion of capacity received by each queue or task. In computer networks, a service opportunity is the emission of one packet, if the selected queue is non-empty. |
| WTR | Wait To Restore (time) | The time period that a device waits after a protection switch before switching again. This provides hysteresis and minimizes traffic effects. It seeks to minimize flapping of a link. |
| XML | eXtensible Markup Language | Extensible Markup Language (XML) is a markup language and file format for storing, transmitting, and reconstructing arbitrary data. XML is used in Tellabs equipment for restore files and many configuration files. |
| XGS-PON | 10G (X) Gigabit Symmetrical Passive Optical Networking |
The 10G variant of PON utilized to provide symmetric 10G service to ONTs. |