Nortel BayStack 820 Installation And Reference Manual page 247

Isdn router
Hide thumbs Also See for BayStack 820:
Table of Contents

Advertisement

SPID
Stac
compression
static route
TCP
TCP/IP
Telnet
TFTP
throughput
tunnel
tunneling
206901-A
Service Profile Identifier. Used only in North America, SPID numbers are
unique identifier numbers provided by your local telephone company when
you install an ISDN line. Usually, two SPID numbers are provided, but
sometimes one and even none is provided. In many cases, both SPID numbers
are required if you want to connect at a speed greater than 64 Kb/s. A SPID
number is typically 14 digits long and consists of the 10-digit telephone
number (area code plus phone number), followed by the digits "0101." Other
variations of this number are possible and your telephone company can
provide you with the correct information for your ISDN line.
A compression method that reduces the number of characters (bytes) actually
transmitted. Stac compression maximizes the throughput of ISDN and
leased-line connections which can result in two to four times more
uncompressed data being processed.
A route in the routing table that is manually configured rather than learned
through routing table exchanges.
Transmission Control Protocol. The major transport protocol in the Internet
suite of protocols providing reliable, connection-oriented, full-duplex streams.
Transmission Control Protocol/Internet Protocol. A set of networking
protocols designed to link computers from multiple vendors.
A service that provides terminal-emulation capabilities for logging into the
router from a remote location.
Trivial File Transfer Protocol. A simple form of the File Transfer Protocol
(FTP) that uses the User Datagram Protocol (UDP).
The amount of data transferred from one place to another or processed in a
specified amount of time.
A virtual, direct pathway with which to transmit bidirectional traffic between
two end points.
A mechanism used by virtual private networks (VPNs) to forward traffic from
remote users to a corporate network through an existing public IP network.
Data is encapsulated at one end point of the tunnel and then decapsulated at
the other end point.
-
Glossary-7

Advertisement

Table of Contents
loading

Table of Contents