H. 323 Software ip interface Requirements / Feature Specifications compas id 143543 Issue 4 June 02, 2014 John W. Soltes (retired)



Download 4.77 Mb.
Page3/48
Date28.05.2018
Size4.77 Mb.
#51006
1   2   3   4   5   6   7   8   9   ...   48

1.2 Glossary


802.1p
802.1Q

802.1Q defines a layer 2 frame structure that supports VLAN identification and a QOS mechanism sometimes referred to as 802.1p, but the content of 802.1p is now incorporated in 802.1D.

ACP

Avaya Call Processing, a generic internal name for the server software marketed under names that change too often to keep track of, including Avaya Communication Manager, MultiVantageTM, and DEFINITY®; also affectionately known internally as “The Wad”.

AEC

Acoustic Echo Cancellation, a signal processing technique that significantly reduces the coupling of a received audio signal back into an active microphone.

ANSI

American National Standards Institute

application-specific

Specific to a particular “application” running inside the telephone. For example, configuration file downloading, backup and restore of user data, HTTP push, and the web browser are all internal applications that use the HTTP protocol (the term does not include individual web-page-based “applications” rendered in the web browser). Similarly, the RTCP and CNA clients are internal applications that can invoke traceroute.

ARP

Address Resolution Protocol, IETF STD 37: RFC 826 [7.3-16], used to determine the MAC address of an endpoint for which the IP address is known.

ASCII

American Standard Code for Information Interchange, ANSI standard X.3.4.

CA

Certificate Authority; the entity which issues digital certificates for use by other parties.

CNA

Converged Network Analyzer, an Avaya network management tool formerly known internally as Chatter (see 96x1H-IPI.5.1.920).

COMPAS

A document control system developed and maintained by Avaya Labs.

DCP

Digital Communications Protocol, a proprietary digital telephone interface used on DEFINITY®

Diffie-Hellman key exchange

A key agreement algorithm based on the use of two public parameters p and g that may be used by all users in a system. Parameter p is a prime number and parameter g (usually called a generator) is an integer less than p, with the following property:

For every number n between 1 and p-1 inclusive, there is a power k of g such that n = gk mod p.



The protocol depends on the discrete logarithm problem for its security, which assumes that it is computationally infeasible to calculate the shared secret key k = gab mod p given the two public values ga mod p and gb mod p when the prime p is sufficiently large.

DH Group

A number that determines the public parameters used by the Diffie-Hellman key exchange. To successfully establish a shared secret key, the same DH group must be used by both parties.

DHCP

Dynamic Host Configuration Protocol, an IETF protocol, RFCs 2131 and 2132, used to automate IP address allocation and management.

DiffServ

An IP-based QoS mechanism defined in RFCs 2474 and 2475.

Digital Certificate

The digital equivalent of an ID card used in conjunction with a public key encryption system. Digital certificates are issued by a trusted third party known as a "Certificate Authority" (CA) such as VeriSign (www.verisign.com). The CA verifies that a public key belongs to a specific company or individual (the "Subject"), and the validation process it goes through to determine if the subject is who it claims to be depends on the level of certification and the CA itself.

digital signature

A digital signature is an encrypted digest of the file (message, document, driver, program) being signed. The digest is computed from the contents of the file by a one-way hash function such as MD5 or SHA-1 and then encrypted with the private part of a public/private key pair. To prove that the file was not tampered with, the recipient uses the public key to decrypt the signature back into the original digest, recomputes a new digest from the transmitted file and compares the two to see if they match. If they do, the file has not been altered in transit by an attacker.

DNS

Domain Name System, a hierarchical network naming scheme. DNS servers provide a mapping of domain names to IP addresses.

DTMF

Dual-Tone Multi-Frequency, the “touch-tones” used for in-band telephone signaling.

FIPS

Federal Information Processing Standards, issued by NIST (National Institute of Standards and Technology, formerly the National Bureau of Standards, part of the U.S. Department of Commerce).

HTML

Hypertext Markup Language, the syntax used to format pages for the World Wide Web.

HTTP

Hypertext Transfer Protocol, a file transfer protocol primarily used to request and transmit pages on the World Wide Web, IETF RFC 2616.

ICMP

Internet Control Message Protocol, IETF STD 5: RFC 792.

IGMP

Internet Group Multicasting Protocol, IETF STD 5: RFC 1112.

IEC

International Electrotechnical Commission

IEEE

Institute of Electrical and Electronics Engineers, an organization that, among other things, produces standards applicable to LAN equipment.

IETF

Internet Engineering Task Force, the organization that produces standards for communications on the Internet.

IKE

Internet Key Exchange Protocol, RFC 2409, which has been obsoleted by IKEv2 in RFC 4306.

IPsec

A security mechanism for IP that provides encryption, integrity assurance, and authentication of data.

IP

Internet Protocol, a network-layer protocol used on LANs and internets, IETF STD 5: RFC 791.

ISAKMP

Internet Security Association and Key Management Protocol, RFC 2408, which has been obsoleted by IKEv2 in RFC 4306, defines the procedures for authenticating a communicating peer, creation and management of security associations, key generation techniques, and threat mitigation e.g. Denial of service and Replay Attacks. ISAKMP defines two phases of negotiation. During Phase 1 negotiation, two entities establish an ISAKMP SA, which is used to protect Phase 2 negotiations, in which SAs are established for other protocols.

ISO

International Standards Organization, the standards body responsible for the ISO 9000-series quality standards and the ISO 14000-series environmental management standards.

ITU-T

International Telecommunication Union – Telecommunication Standardization Sector (formerly CCITT) the sector of the ITU that produces recommendations (standards) for telecommunications.

LAN

Local Area Network

MAC

Media Access Control, low-level procedures that determine how devices physically access and share a LAN.

MIB

Management Information Base, a data structure used by SNMP to represent information about a managed entity.

MODP

Modular Exponential, used in RFC 3526 to describe groups used for Diffie-Hellman key exchange.

MR

Modification Request, a formal request to modify something under change control.

NAT

Network Address Translation, a mechanism by which IP addresses are mapped from one address space to another, and in which UDP and TCP port numbers may be remapped to allow multiple devices to share the same IP address without port number conflicts.

Oakley

OAKLEY Key Determination Protocol, RFC 2412, describes a series of key exchanges (called “modes”) and details the services provided by each, e.g. perfect forward secrecy for keys, identity protection, and authentication.

OUI

Organizationally Unique Identifier, the first three octets of a MAC address. For a list of OUIs used by Avaya IP telephones, see the Host Name option in 96x1H-IPI.5.1.604.

PFS

Perfect Forward Secrecy (see Sections 3.3 and 8 in IETF RFC 2409).

QOS or QoS

Quality of Service, used to refer to a number of mechanisms intended to improve audio quality over packet-based networks.

Refresh / Rekey

Use IKE to create a new SA with a new SPI (see Sections 4.4.3 and 4.6.2 in IETF RFC 2401).

RFC

Request For Comments, a type of document produced by the IETF.

R/FS

Requirements/Feature Specification, a document that contains detailed requirements and specifications for a product or product line.

RSA

Rivest-Shamir-Adleman; a highly secure asymmetric cryptography method developed by RSA Security, Inc. that uses a public/private key pair. The private key is kept secret by the owner and the public key is published, usually in a digital certificate. Data is encrypted using the recipient's public key, which can only be decrypted by the recipient's private key. RSA is very computation intensive, thus it is often used to encrypt a symmetric session key that is then used by a less computationally-intensive algorithm to encrypt protocol data during a “session”. RSA can also be used for authentication by creating a digital signature, for which the sender's private key is used for encryption, and the sender's public key is used for decryption.

RTCP

Real-time Transport Control Protocol, IETF RFC 3550.

RTP

Real-time Transport Protocol, IETF RFC 3550.

SA

Security Association, a security protocol (e.g., IPSEC, TLS) and a specific set of parameters that completely define the services and mechanism necessary to protect security at that security protocol location. These parameters can include algorithm identifiers, modes, cryptographic keys, etc. The SA is referred to by its associated security protocol (for example “ISAKMP SA”, “ESP SA”, “TLS SA”).

SCEP

Simple Certificate Enrollment Protocol, used to obtain a unique identity certificate.

SNMP

Simple Network Management Protocol, IETF STD 15 (RFC 1157) and RFCs 1441, 1905 and 1906.

SNTP

Simple Network Time Protocol, IETF RFC 2030.

SPD

Security Policy Database. Specifies the policies that determine the disposition of all IP traffic inbound or outbound from a host or security gateway IPsec implementation.

SPI

Security Parameter Index. An identifier for a Security Association, relative to some security protocol. Each security protocol has its own “SPI-space”.

SRTCP

Secure Real-time Transport Control Protocol, IETF RFC 3711

SRTP

Secure Real-time Transport Protocol, IETF RFC 3711

SSL

Secure Sockets Layer, a protocol designed by Netscape Communications Corporation that can provide authentication and encryption for HTTP connections.

TCP

Transmission Control Protocol, a connection-oriented transport-layer protocol, IETF STD 7: RFC 793.

TLS

Transport Layer Security, IETF RFC 2246, a protocol that can provide authentication and encryption for TCP connections, based on SSL.

TOS

Type Of Service, one of the fields in an IP packet header, also used by DiffServ.

UDP

User Datagram Protocol, a connectionless transport-layer protocol, IETF STD 6: RFC 768.

URI
URL

Uniform Resource Identifier and Uniform Resource Locator, both names for the strings used to reference resources on the Internet (e.g., http://…). URI is the newer term used by the HTTP 1.1 and XML specifications.

VLAN

Virtual LAN, a term used for networks whose traffic can be segregated independent of physical LAN connectivity. 802.1Q framing can support VLAN operation.

VoIP

Voice over IP, a technology for degrading audio quality by transporting it on packet data networks.

VPN

Virtual Private Network; a private network constructed across a public network such as the Internet. A VPN can be made secure, even though it is using existing Internet connections to carry data communication. Security measures involve encrypting data before sending it across the Internet and decrypting the data at the other end. An additional level of security can be added by encrypting the originating and receiving network address




Directory: public -> downloadFile.jsp?file= -> resources -> sites -> AVAYA -> content -> live -> SOLUTIONS
public -> The german unification, 1815-1870
public ->  Preparation of Papers for ieee transactions on medical imaging
public -> Harmonised compatibility and sharing conditions for video pmse in the 7 9 ghz frequency band, taking into account radar use
public -> Adjih, C., Georgiadis, L., Jacquet, P., & Szpankowski, W. (2006). Multicast tree structure and the power law
public -> Duarte, G. Pujolle: fits: a flexible Virtual Network Testbed Architecture
public -> Swiss Federal Institute of Technology (eth) Zurich Computer Engineering and Networks Laboratory
public -> Tr-41. 4-03-05-024 Telecommunications
public -> Chris Young sets 2016 “I’m Comin’ Over” Tour headlining dates
SOLUTIONS -> CM: How to enable 'auto answer' feature

Download 4.77 Mb.

Share with your friends:
1   2   3   4   5   6   7   8   9   ...   48




The database is protected by copyright ©ininet.org 2024
send message

    Main page