Black Box LGB5128A Network Hardware User Manual


 
243
QCL is an acronym for QoS Control List. It is the list table of QCEs that contains QoS
control entries to classify a specific QoS class on specific traffic objects.
Each accessible traffic object contains an identifier to its QCL. The privileges determine
specific traffic object to specific QoS class.
QL
QL In SyncE this is the Quality Level of a given clock source. This is received on a port in
a SSM indicating the quality of the clock received in the port.
QoS
QoS is an acronym for Quality of Service. It guarantees a bandwidth relationship between
individual applications or protocols.
A communications network transports a multitude of applications and data, including high-
quality video and delay-sensitive data such as real-time voice. Networks must provide
secure, predictable, measurable, and sometimes guaranteed services.
Achieving the required QoS becomes the secret to a successful end-to-end business
solution. Therefore, QoS is the set of techniques to manage network resources.
R
RARP
RARP is an acronym for Reverse Address Resolution Protocol. It is a protocol that is
used to obtain an IP address for a given hardware address, such as an Ethernet address.
RARP is the complement of ARP.
RADIUS
RADIUS is an acronym for Remote Authentication Dial In User Service. It is a networking
protocol that provides centralized access, authorization, and accounting management for
people or computers to connect and use a network service.
RDI
RDI is an acronym for Remote Defect Indication. It is a OAM functionality that is used by
a MEP to indicate defects detected to the remote peer MEP.
RSTP
In 1998, the IEEE with document 802.1w introduced an evolution of STP: the Rapid
Spanning Tree Protocol, which provides for faster spanning tree convergence after a
topology change. Standard IEEE 802.1D-2004 now incorporates RSTP and obsoletes
STP, while at the same time being backwards compatible with STP.
S
SHA
SHA is an acronym for Secure Hash Algorithm. It designed by the National Security
Agency (NSA) and published by the NIST as a U.S. Federal Information Processing
Standard. Hash algorithms compute a fixed-length digital representation (known as a
message digest) of an input data sequence (the message) of any length.
Shaper
A shaper can limit the bandwidth of transmitted frames. It is located after the ingress
queues.