EasyManuals Logo

Edge-Core ECS3510-28T User Manual

Edge-Core ECS3510-28T
1474 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1450 background imageLoading...
Page #1450 background image
G
LOSSARY
– 1450 –
MVR Multicast VLAN Registration is a method of using a single network-wide
multicast VLAN to transmit common services, such as such as television
channels or video-on-demand, across a service-provider’s network. MVR
simplifies the configuration of multicast services by using a common VLAN
for distribution, while still preserving security and data isolation for
subscribers residing in both the MVR VLAN and other standard or
private VLAN groups.
NTP Network Time Protocol provides the mechanisms to synchronize time
across the network. The time servers operate in a hierarchical-master-
slave configuration in order to synchronize local clocks within the subnet
and to national time standards via wire or radio.
OAM Operation, Administration, and Maintenance provides remote management
tools required to monitor and maintain the links to subscriber CPEs
(Customer Premise Equipment). This section describes functions including
enabling OAM for selected ports, loopback testing, and displaying remote
device information.
OUT-OF-BAND
MANAGEMENT
Management of the network from a station not attached to the network.
PORT AUTHENTICATION See IEEE 802.1X.
PORT MIRRORING A method whereby data on a target port is mirrored to a monitor port for
troubleshooting with a logic analyzer or RMON probe. This allows data on
the target port to be studied unobstructively.
PORT TRUNK Defines a network link aggregation and trunking method which specifies
how to create a single high-speed logical link that combines several lower-
speed physical links.
PRIVATE VLANS Private VLANs provide port-based security and isolation between ports
within the assigned VLAN. Data traffic on downlink ports can only be
forwarded to, and from, uplink ports.
QINQ QinQ tunneling is designed for service providers carrying traffic for multiple
customers across their networks. It is used to maintain customer-specific
VLAN and Layer 2 protocol configurations even when different customers
use the same internal VLAN IDs.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Edge-Core ECS3510-28T and is the answer not in the manual?

Edge-Core ECS3510-28T Specifications

General IconGeneral
BrandEdge-Core
ModelECS3510-28T
CategoryNetwork Router
LanguageEnglish

Related product manuals