Page 396 / 400 Scroll up to view Page 391 - 395
User Manual for the NETGEAR 7300S Series Layer 3 Managed Switch Software
C-18
Glossary
202-10088-01, March 2005
RSVP
See “Resource Reservation Setup Protocol” on page 17.
RTOS
See “Real-Time Operating System” on page 17.
S
Simple Network Management Protocol
SNMP is the protocol governing network management and the monitoring of network devices and their
functions. It is not necessarily limited to TCP/IP networks. The versions have the following differences:
SNMPv1
(full): Security is based on community strings.
SNMPsec
(historic): Security is based on parties. Few, if any, vendors implemented this version of the
protocol, which is now largely forgotten.
SNMPv2p
(historic): For this version, much work was done to update the SNMPv1 protocol and the SMIv1,
and not just security. The result was updated protocol operations, new protocol operations and data types,
and party-based security from SNMPsec.
SNMPv2c
(experimental): This version of the protocol is called community string-based SNMPv2. It is an
update of the protocol operations and data types of SNMPv2p, and uses community-based security from
SNMPv1.
SNMPv2u
(experimental): This version of the protocol uses the protocol operations and data types of
SNMPv2c and security based on users.
SNMPv2*
(experimental): This version combined the best features of SNMPv2p and SNMPv2u. (It is also
called SNMPv2star.) The documents defining this version were never published as RFCs.
SNMPv3
(proposed): This version of the protocol is a combination of user-based security and the protocol
operations and data types from SNMPv2p and support for proxies. The security is based on that found in
SNMPv2u and SNMPv2*, and updated after much review. The documents defining this protocol will soon
be published as RFCs.
SimpleX signaling
SX is one of IEEE 802.3's designations for media. For example, 1000SX indicates 1000 gigabit Ethernet
over "short haul" or "short wavelength" optical fiber.
SMII
Serial Media Independent Interface.
Page 397 / 400
User Manual for the NETGEAR 7300S Series Layer 3 Managed Switch Software
Glossary
C-19
202-10088-01, March 2005
SNMP
See “Simple Network Management Protocol” on page 18.
Spanning Tree
A technique that detects loops in a network and logically blocks the redundant paths, ensuring that only one
route exists between any two LANs.
Spanning Tree Protocol (STP)
A protocol that finds the most efficient path between segments of a multi-looped, bridged network. STP
allows redundant switches and bridges to be used for network resilience, without the broadcast storms
associated with looping. If a switch or bridge falls, a new path to a redundant switch or bridge is opened.
SRAM
Static Random Access Memory.
STP
Spanning Tree Protocol. See “802.1D” on page 1 for more information.
stub area
OSPF area that carries a default route, intra-area routes, and interarea routes, but does not carry external
routes. Virtual links cannot be configured across a stub area, and they cannot contain an ASBR. Compare
with non-stub area. See also OSPF. (Cisco Systems Inc.)
Subnet Mask
Combined with the IP address, the IP Subnet Mask allows a device to know which other addresses are local
to it, and which must be reached through a gateway or router.
Switch
A device that interconnects several LANs to form a single logical LAN that comprises of several LAN
segments. Switches are similar to bridges, in that they connect LANs of a different type; however they
connect more LANs than a bridge and are generally more sophisticated.
SX
See “SimpleX signaling” on page 18.
T
Telnet
A character-based UNIX application that enables users with a Telnet server account to log on to a UNIX
computer and utilize its resources.
Page 398 / 400
User Manual for the NETGEAR 7300S Series Layer 3 Managed Switch Software
C-20
Glossary
202-10088-01, March 2005
TFTP
See “TLS” on page 20.
TLS
Short for Transport Layer Security, TLS is a protocol that guarantees privacy and data integrity between
client/server applications communicating over the Internet.
The TLS protocol is made up of two layers. The TLS Record Protocol ensures that a connection is private by
using symmetric data encryption and ensures that the connection is reliable. The second TLS layer is the
TLS Handshake Protocol, which allows authentication between the server and client and the negotiation of
an encryption algorithm and cryptographic keys before data is transmitted or received. Based on Netscape’s
SSL 3.0, TLS supercedes and is an extension of SSL. TLS and SSL are not interoperable.
Telnet
A TCP/IP application protocol that provides a virtual terminal service, allowing a user to log into another
computer system and access a device as if the user were connected directly to the device.
Traffic prioritization
Giving time-critical data traffic a higher quality of service over other, non-critical data traffic.
Trivial File Transfer Protocol
TFTP is a simple form of the File Transfer Protocol (FTP). TFTP uses the User Datagram Protocol (UDP, a
direct protocol used to communicate datagrams over a network with little error recovery) and provides no
security features. It is often used by servers to boot diskless workstations, X-terminals, and routers.
Trunking
The process of combing a set of trunks that are traffic-engineered as a unit for the establishment of
connections between switching systems in which all of the communications paths are interchangeable.
U
UTP
Unshielded twisted pair is the cable used by 10BASE-T and 100BASE-Tx Ethernet networks.
V
Virtual Local Area Network
Operating at the Data Link Layer (Layer 2 of the OSI model), the VLAN is a means of parsing a single
network into logical user groups or organizations, as if they physically resided on a dedicated LAN segment
of their own. In reality, this virtually defined community may have individual members peppered across a
large, extended LAN. The VLAN identifier is part of the 802.1Q tag, which is added to an Ethernet frame by
Page 399 / 400
User Manual for the NETGEAR 7300S Series Layer 3 Managed Switch Software
Glossary
C-21
202-10088-01, March 2005
an 802.1Q-compliant switch or router. Devices recognizing 802.1Q-tagged frames maintain appropriate
tables to track VLANs. The first three bits of the 802.1Q tag are used by 802.1P to establish priority for the
packet.
Virtual Router Redundancy Protocol
VRRP specifies an election protocol that dynamically assigns responsibility for a virtual router to one of the
VRRP routers on a LAN. The VRRP router controlling the IP address(es) associated with a virtual router is
called the Master, and forwards packets sent to these IP addresses. The election process provides dynamic
fail-over in the forwarding responsibility should the Master become unavailable. This allows any of the
virtual router IP addresses on the LAN to be used as the default first hop router by end-hosts. The advantage
gained from using VRRP is a higher availability default path without requiring configuration of dynamic
routing or router discovery protocols on every end-host.
VLAN
See “Virtual Local Area Network” on page 20.
VRRP
See “Virtual Router Redundancy Protocol” on page 21.
W
WAN
See “Wide Area Network” on page 21.
Web
Also known as World-Wide Web (WWW) or W3. An Internet client-server system to distribute information,
based upon the hypertext transfer protocol (HTTP).
Wide Area Network
A WAN is a computer network that spans a relatively large geographical area. Typically, a WAN consists of
two or more local-area networks (LANs).
Windows Internet Naming Service
WINS. Windows Internet Naming Service is a server process for resolving Windows-based computer names
to IP addresses.
If a remote network contains a WINS server, your Windows PCs can gather information from that WINS
server about its local hosts. This allows your PCs to browse that remote network using the Windows
Network Neighborhood feature.
Page 400 / 400
User Manual for the NETGEAR 7300S Series Layer 3 Managed Switch Software
C-22
Glossary
202-10088-01, March 2005
WINS
WINS. Windows Internet Naming Service is a server process for resolving Windows-based computer names
to IP addresses.
X
XModem
One of the most popular file transfer protocols (FTPs). Xmodem is fairly effective at detecting errors. It
sends blocks of data together with a checksum and then waits for acknowledgment of the block's receipt.
The waiting slows down the rate of data transmission considerably, but it ensures accurate transmission.
Xmodem can be implemented either in software or in hardware. Many modems, and almost all
communications software packages, support Xmodem. However, it is useful only at relatively slow data
transmission speeds (less than 4,800 bps). Enhanced versions of Xmodem that work at higher transmission
speeds are known as Ymodem and Zmodem.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top