Page 381 / 400 Scroll up to view Page 376 - 380
User Manual for the NETGEAR 7300S Series Layer 3 Managed Switch Software
Glossary
C-3
202-10088-01, March 2005
ASBR
See “Autonomous System Boundary Router” on page 3.
Autonomous System Boundary Router
ABR located between an OSPF autonomous system and a non-OSPF network. ASBRs run both OSPF and
another routing protocol, such as RIP. ASBRs must reside in a non-stub OSPF area. See also ABR, non-stub
area, and OSPF. (Cisco Systems Inc.)
Auto-negotiation
A feature that allows twisted-pair ports to advertise their capabilities for speed, duplex and flow control.
When connected to a port that also supports auto-negotiation, the link can automatically configure itself to
the optimum setup.
Auto Uplink
Auto Uplink
TM
technology (also called MDI/MDIX) eliminates the need to worry about crossover vs.
straight-through Ethernet cables. Auto Uplink
TM
will accommodate either type of cable to make the right
connection.
AVL tree
Binary tree having the property that for any node in the tree, the difference in height between the left and
right subtrees of that node is no more than 1.
B
BPDU
See “Bridge Protocol Data Unit” on page 4.
Backbone
The part of a network used as a primary path for transporting traffic between network segments.
Bandwidth
The information capacity, measured in bits per second, that a channel could transmit. Bandwidth examples
include 10 Mbps for Ethernet, 100 Mbps for Fast Ethernet, and 1000 Mbps (I Gbps) for Gigabit Ethernet.
Baud
The signaling rate of a line, that is, the number of transitions (voltage or frequency changes) made per
second. Also known as line speed.
BootP
See “Bootstrap Protocol” on page 4.
Page 382 / 400
User Manual for the NETGEAR 7300S Series Layer 3 Managed Switch Software
C-4
Glossary
202-10088-01, March 2005
Bootstrap Protocol
An Internet protocol that enables a diskless workstation to discover its own IP address, the IP address of a
BootP server on the network, and a file to be loaded into memory to boot the machine. This enables the
workstation to boot without requiring a hard or floppy disk drive.
Bridge Protocol Data Unit
BPDU is the IEEE 802.1D MAC Bridge Management protocol that is the standard implementation of STP
(Spanning Tree Protocol). It uses the STP algorithm to insure that physical loops in the network topology do
not result in logical looping of network traffic. Using one bridge configured as root for reference, the BPDU
switches one of two bridges forming a network loop into standby mode, so that only one side of a potential
loop passes traffic. By examining frequent 802.1d configuration updates, a bridge in the standby mode can
switch automatically into the forward mode if the other bridge forming the loop fails.
Broadcast
A packet sent to all devices on a network.
Broadcast storm
Multiple simultaneous broadcasts that typically absorb all the available network bandwidth and can cause a
network to fail. Broadcast storms can be due to faulty network devices or network loops.
C
Cat 5
Category 5
unshielded twisted pair (UTP) cabling. An Ethernet network operating at 10 Mbits/second
(10BASE-T) will often tolerate low quality cables, but at 100 Mbits/second (10BASE-Tx) the cable must be
rated as Category 5, or Cat 5 or Cat V, by the Electronic Industry Association (EIA).
This rating will be printed on the cable jacket. Cat 5 cable contains eight conductors, arranged in four
twisted pairs, and terminated with an RJ45 type connector. In addition, there are restrictions on maximum
cable length for both 10 and 100 Mbits/second networks.
Capacity planning
Determining whether current solutions can satisfy future demands. Capacity planning includes evaluating
potential workload and infrastructure changes.
Checksum
A simple error-detection scheme in which each transmitted message is identified with a numerical value
based on the number of set bits in the message. The receiving station then applies a formula to the message
and checks to make sure the accompanying numerical value is the same. If not, the receiver can assume that
the message has been corrupted.
Page 383 / 400
User Manual for the NETGEAR 7300S Series Layer 3 Managed Switch Software
Glossary
C-5
202-10088-01, March 2005
Class of Service
A term to describe treating different types of traffic with different levels of service priority. Higher priority
traffic gets faster treatment during times of switch congestion
CLI
See “Command Line Interface” on page 5.
Collision
A term used to describe two colliding packets in an Ethernet network. Collisions are a part of normal
Ethernet operation, but a sudden prolonged increase in the number of collisions can indicate a problem with
a device, particularly if it is not accompanied by a general increase in traffic.
Command Line Interface
CLI is a line-item interface for configuring systems. (It is one of the user interfaces for allowing
programmers to configure their system).
Common Open Policy Service Protocol
A proposed standard protocol for exchanging network policy information between a Policy Decision Point
(PDP) in a network and Policy Enforcement Points (PEPs) as part of overall Quality of Service (QoS) - the
allocation of network traffic resources according to desired priorities of service. The policy decision point
might be a network server controlled directly by the network administrator who enters policy statements
about which kinds of traffic (voice, bulk data, video, teleconferencing, and so forth) should get the highest
priority. The policy enforcement points might be router or layer 3 switches that implement the policy
choices as traffic moves through the network. Currently, COPS is designed for use with the Resource
Reservation Protocol (RSVP), which lets you allocate traffic priorities in advance for temporary
high-bandwidth requirements (for example, video broadcasts or multicasts). It is possible that COPS will be
extended to be a general policy communications protocol.
COPS
See “Common Open Policy Service Protocol” on page 5.
D
DHCP
See “Dynamic Host Configuration Protocol” on page 6.
Differentiated Services
Diffserv is a protocol for specifying and controlling network traffic by class so that certain types of traffic
get precedence - for example, voice traffic, which requires a relatively uninterrupted flow of data, might get
precedence over other kinds of traffic. Differentiated Services is the most advanced method for managing
traffic in terms of what is called Class of Service (CoS). Unlike the earlier mechanisms of 802.1P tagging
and Type of Service (ToS), Differentiated Services avoids simple priority tagging and depends on more
Page 384 / 400
User Manual for the NETGEAR 7300S Series Layer 3 Managed Switch Software
C-6
Glossary
202-10088-01, March 2005
complex policy or rule statements to determine how to forward a given network packet. An analogy is made
to travel services, in which a person can choose among different modes of travel - train, bus, airplane -
degree of comfort, the number of stops on the route, standby status, the time of day or period of year for the
trip, and so forth. For a given set of packet travel rules, a packet is given one of 64 possible forwarding
behaviors - known as per hop behaviors (PHBs). A six-bit field, known as the Differentiated Services Code
Point (DSCP), in the Internet Protocol (Internet Protocol) header specifies the per hop behavior for a given
flow of packets. Differentiated Services and the Class of Service approach provide a way to control traffic
that is both more flexible and more scalability than the Quality of Service approach.
Diffserv
See “Differentiated Services” on page 5.
DNS
Short for Domain Name System (or Service), an Internet service that translates domain names into IP
addresses.
Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on
IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the
corresponding IP address. For example, the domain name www.example.com might translate to
198.105.232.4. The DNS system is, in fact, its own network. If one DNS server doesn't know how to
translate a particular domain name, it asks another one, and so on, until the correct IP address is returned.
Domain Name
A descriptive name for an address or group of addresses on the Internet. Domain names are of the form of a
registered entity name plus one of a number of predefined top level suffixes such as .com, .edu, .uk, etc. For
example, in the address mail.NETGEAR.com, mail is a server name and NETGEAR.com is the domain.
Dynamic Host Configuration Protocol
DHCP is a protocol for assigning dynamic IP addresses to devices on a network. With dynamic addressing,
a device can have a different IP address every time it connects to the network. In some systems, the device's
IP address can even change while it is still connected. DHCP also supports a mix of static and dynamic IP
addresses. Dynamic addressing simplifies network administration because the software tracks IP addresses
rather than requiring an administrator to manage the task. A new computer can be added to a network
without the hassle of manually assigning it a unique IP address.
E
EAP
Extensible Authentication Protocol is a general protocol for authentication that supports multiple
authentication methods.
EAP, an extension to PPP, supports such authentication methods as token cards, Kerberos, one-time
passwords, certificates, public key authentication and smart cards. In wireless communications using EAP, a
user requests connection to a WLAN through an AP, which then requests the identity of the user and
Page 385 / 400
User Manual for the NETGEAR 7300S Series Layer 3 Managed Switch Software
Glossary
C-7
202-10088-01, March 2005
transmits that identity to an authentication server such as RADIUS. The server asks the AP for proof of
identity, which the AP gets from the user and then sends back to the server to complete the authentication.
EAP is defined by RFC 2284.
Endstation
A computer, printer, or server that is connected to a network.
Ethernet
A LAN specification developed jointly by Xerox, Intel and Digital Equipment Corporation. Ethernet
networks transmit packets at a rate of 10 Mbps.
F
Fast Ethernet
An Ethernet system that is designed to operate at 100 Mbps.
Fault isolation
A technique for identifying and alerting administrators about connections (such as those associated with
switch ports) that are experiencing congestion or failure, or exceeding an administrator-defined threshold.
Fast STP
A high-performance Spanning Tree Protocol. See “STP” on page 19 for more information.
Filtering
The process of screening a packet for certain characteristics, such as source address, destination address, or
protocol. Filtering is used to determine whether traffic is to be forwarded, and can also prevent unauthorized
access to a network or network devices.
Flow Control
The process of adjusting the flow of data from one network device to another to ensure that the receiving
device can handle all of the incoming data. This is particularly important where the sending device is
capable of sending data much faster than the receiving device can receive it. There are many flow control
mechanisms. One of the most common flow control protocols for asynchronous communication is called
xon-xoff. In this case, the receiving device sends a an “xoff” message to the sending device when its buffer
is full. The sending device then stops sending data. When the receiving device is ready to receive more data,
it sends an “xon” signal.
Forwarding
When a frame is received on an input port on a switch, the address is checked against the lookup table. If the
lookup table has recorded the destination address, the frame is automatically forwarded on an output port.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top