cc/td/doc/product/voice/ics7750
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

index

index

Numerics


2-wire   5-3

4-wire   5-3

7960 IP Phone
documentation   xvii

A


access control list (ACL)   4-20

access layer, designing   3-19

accounting   4-19

alternate path   4-16

analyzing costs   3-5

Asynchronous Transfer Mode (ATM)   5-12

audience   xi

audit, network   3-2

auditing   4-19

authentication   4-18

authorization   4-18

automatic call distribution (ACD)   5-4

availability   4-10

B


blackout   2-4

blinking lights   2-6

branch circuit   2-5

broadcast   4-8

broadcast storm   4-8

brownout   2-4

busiest hour   5-11

C


cables
characterizing   2-18
determining distances   2-19  to 2-21
planning for installation   2-18  to 2-19
termination points   2-22

cabling
guidelines   2-17  to 2-22

calculating number of trunks required   5-9

Call Detail Record (CDR)   5-8

CallManager
documentation   xvii

campus data network
designing   4-2

campus network
definition   4-2

campus voice network
designing   5-5

capacity planning   3-4

Catalyst 3500 Series XL
documentation   xvii

Catalyst 3524-PWR XL   2-5, 4-9

categorizing traffic by group   5-8

caution described   xiii

central office (CO)   5-2

centum call seconds (CCS)   5-4

Challenge Handshake Authentication Protocol (CHAP)   4-26

chassis location   2-17

choosing proper combination of trunks   5-11

ciphered data   4-19

circuit, branch   2-5

circuit breaker panel   2-5

circuit breakers   2-3, 2-4, 2-8

circuit switching   1-3

Cisco CallManager software   4-4

Cisco Connection Online   xx

Cisco ICS 7700 System Manager software   4-4

Cisco RPS 300   2-5

CiscoWorks2000
documentation   xviii

clear text   4-19

coding
CSA-CELP   1-6
definition   1-6
G.711   1-6
G.729a   1-6
PCM   1-6

collision   4-9

collision domain   4-9

Compressed Real-Time Protocol (CRTP)   5-12

compression   1-5

conduit ground, using   2-6

conjugate structure algebraic code excited linear prediction (CS-ACELP)   1-6, 3-3, 5-12

conventions
text   xiii

converged network
definition   1-3
design process   3-2  to 3-6
setting up   1-4

converting PSTN traffic to IP traffic   5-12

cooling the system   2-2

core layer, designing   3-18

cost analysis   3-5

CO trunk   5-2

D


data networking   4-2

delay   1-4

delay, acceptable range   3-4

delay, one-way   3-4

delay, packetization   3-4

delay, propagation   3-3

delay, queuing   3-4

delay, serialization   3-3

delay budget, definition   3-3

denial-of-service (DoS)   4-24

denial-of-service (DoS) attack   4-17

designing
access layer   3-19
campus data networks   4-2
campus voice networks   5-5
core layer   3-18
distribution layer   3-18
for remote users   4-4
WANs   4-3

design process, converged network   3-2  to 3-6

Direct Inward Dialing (DID) trunk   5-2

distance vector protocols   4-31

distribution layer, designing   3-18

documentation
CallManager   xvii
Catalyst 3500 Series XL   xvii
CD-ROM   xix
CiscoWorks2000   xviii
feedback   xxii
ICS 7750   xvi
IOS   xviii
IP phone   xvii
ordering   xix
power supply, backup   xvi
VIC   xvii
VWIC   xvii
WIC   xvii

domain name system (DNS)   4-25

dust, effects of   2-10

dynamic routing   3-8

E


earth ground   2-8

electricity, static   2-10

electromagnetic interference (EMI)   2-16, 2-23

electrostatic discharge (ESD)   2-16

encryption   4-19

Enhanced Interior Gateway Routing Protocol (EIGRP)   4-34

environmental requirements   2-9

Erlang   5-4

Erlang B table   A-1  to A-3

ESD damage, preventing   2-16

ESD strap, testing resistance of   2-16

Ethernet   4-2

extension cords, using   2-17

F


Fast Ethernet   4-2

fault tolerance
definition   4-10
designing for   4-10  to 4-16

firewall   4-21

flooring   2-10

floor loading   2-3

forecasting growth   5-6
example   5-7

four-wire   5-3

frequency-divison multiplexing (FDM)   5-3

full-duplex   4-9

G


G.711   1-6

G.729a   1-6

gathering voice traffic data   5-8

Gigabit Ethernet   4-2

Grade of Service (GoS)   5-8

grounding
chassis   2-8
receptacles   2-4
third wire   2-6

H


H.225   5-12

H.245   5-12

half-duplex   4-9

heat dissipation   2-9

hierarchical network design   3-16  to 3-19

hold-down timer   4-33

hop   3-9

humidity   2-9

I


ICS 7750
documentation   xvi

installation
cooling guidelines   2-2
floor loading   2-3
placement guidelines   2-2
power and grounding   2-3  to 2-8
weight distribution in rack   2-3

Inter Exchange Carrier (IEC or IXC)   5-11

interface   4-5

internetwork
components   4-2
definition   4-2

IOS   4-4
documentation   xviii

IP phone
documentation   xvii

IP routing protocols   4-32  to 4-35

IP spoofing   4-24

J


jitter   1-5

K


keepalive message   4-16

Kerberos   4-28

L


leased line   5-2
definition   3-2

lifting, safety guidelines   2-11  to 2-14

lighting   2-10

limitations
peer-to-peer topology   3-9
ring topology   3-11
star topology   3-13

line   5-2
leased   5-2
tie   5-2

line filter   2-5

link-state routing protocols   4-31

load balancing   4-13

local loop   4-12

long-distance   5-11

M


mean opinion score (MOS)   1-6

mean time between failures (MTBF)   4-11

mean time to repair (MTTR)   4-11

media   3-5

media segmentation   4-15

metric   4-6

multicast   4-8

N


network
segmentation   4-8

network, campus
definition   4-2

network audit   3-2

network design, hierarchical   3-16  to 3-19

network design guidelines   3-15  to 3-19

network objectives, setting   3-3

next hop   4-6

node   3-5, 4-6

noise, power   2-4

note described   xiii

O


off-net   5-4

on-net   5-4

Open Shortest Path First (OSPF)   4-34  to 4-35

organization, document   xii

P


packet
definition   1-3
transport   4-7

packet filter   4-20

packetization delay   3-4

packet sniffer   4-23

packet switching   1-3

partial meshed topology   3-14

Password Authentication Protocol (PAP)   4-26

peer-to-peer topology   3-8
limitations   3-9

peg count   5-8

plain text   4-19

planning cable installation   2-18

planning for capacity   3-4

Point-to-Point Protocol (PPP)   4-26

power
circuit protection   2-4
consumption   2-9
fluctuation   2-6
outage   2-6
problems   2-6

power and grounding   2-3  to 2-8

power cord   2-17

power spike   2-4

power strip   2-5

power supply, backup
documentation   xvi

power surge   2-4

power transient   2-4

Pre-Installation Checklist   6-4

Pre-Installation Checklist, submitting   6-2

Private Branch Exchange (PBX)   5-2

propagation delay   3-3

protocols
distance vector   4-31
EIGRP   4-34
IP routing   4-32  to 4-35
link-state routing   4-31
OSPF   4-34  to 4-35
RIP   4-32  to 4-33

publications
see documentation

pulse code modulation (PCM)   1-6

Q


quality of service (QoS)   4-8

queuing delay   3-4

R


Real Time Control Protocol (RTCP)   5-12

receptacles   2-4

recommended one-way delay limit   3-4

redundant hardware   4-16

redundant media   4-16

redundant power, deploying   2-7

redundant power system (RPS 300)   2-5

reliability   4-10

Remote Authentication Dial-In User Server (RADIUS)   4-26

remote users
designing for   4-4

requirements, environmental   2-9

ring topology   3-9
limitations   3-11

rlogin   4-28

route authentication   4-18

routing
activities   4-5
alternate path   4-16
benefits   4-7  to 4-8
definition (data)   4-5
definition (voice)   4-5
devices   4-5
dynamic   3-8
fundamentals   4-5  to 4-8
static   3-8

routing, wire   2-22

Routing Information Protocol (RIP)   4-32  to 4-33

routing procols, IP   4-32  to 4-35

routing table   4-6

S


safety
lifting   2-11  to 2-14
requirements and recommendations   2-10  to 2-16
with electricity   2-15

scalability
definition   3-7
designing for   4-29  to 4-31

security
designing for   4-17  to 4-28

security card   4-18

segmentation, media   4-15

segmentation, network   4-8

serialization   1-5

serialization delay   3-3

setting network objectives   3-3

site planning tasks   2-24  to 2-25

spares, calculating number required   B-3

spares, NFT-to-number required   B-4

spares, planning   B-2

split horizon   4-33

star topology   3-11
limitations   3-13

static electricity   2-10

static routing   3-8

sunlight, effects of   2-10

surge suppressor   2-6

switching
benefits   4-9  to 4-10
definition (data)   4-9
definition (voice)   4-9
fundamentals   4-9  to 4-10

system degradation   2-6

T


table, Erlang B   A-1  to A-3

TAC
see technical assistance center

technical assistance   xx

technical assistance center
contacting   xxi

telephone line   5-2

temperature   2-9

Terminal Access Controller Access Control System (TACACS)   4-27

text conventions   xiii

third wire ground   2-6

tie line   5-2

time-division multiplexing (TDM)   5-3

topology
definition   3-7
partial meshed   3-14
peer-to-peer   3-8
peer-to-peer, limitations   3-9
ring   3-9
ring, limitations   3-11
star   3-11
star, limitations   3-13

traffic engineering
process   5-6  to 5-13

transient suppressor   2-6

trojan horse   4-25

trunk   5-2
CO   5-2
definition   3-2
DID   5-2
WATS   5-3

trunks, calculating number required   5-9

trunks, choosing proper combination   5-11

two-wire   5-3

U


uninterruptible power supply (UPS)   2-5

V


vibration   2-10

virtual LAN (VLAN)   4-10

voice interface card (VIC)
documentation   xvii

Voice over IP (VoIP)   1-3

voice WAN interface card (VWIC)
documentation   xvii

W


WAN
definition   4-2
designing   4-3

WAN interface card (WIC)
documentation   xvii

weight distribution   2-3

weight distribution, chassis   2-3

wide-area network (WAN)
definition   4-2

wide area transmission service (WATS) trunk   5-3

wire routing   2-22

hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon Oct 2 13:23:22 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.