EasyManuals Logo

EXTREME SWITCHING ISW 4-10/100P User Manual

EXTREME SWITCHING ISW 4-10/100P
167 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #165 background imageLoading...
Page #165 background image
In Shared VLAN Learning, two or more VLANs are grouped to share common source address
information in the MAC table. The common entry in the MAC table is identified by a Filter ID (FID). SVL
is useful for configuration of more complex, asymmetrical cross-VLAN trac patterns, like E-TREE
(Rooted-Multipoint) and Multi-netted Server. The alternative VLAN learning mode is IVL (Independent
VLAN Learning). The default VLAN learning mode is IVL. Not all switches support SVL.
Syslog
A protocol used for the transmission of event notification messages across networks, originally
developed on the University of California Berkeley Software Distribution (BSD) TCP/IP system
implementations, and now embedded in many other operating systems and networked devices. A
device generates a messages, a relay receives and forwards the messages, and a collector (a syslog
server) receives the messages without relaying them.
Syslog uses the UDP (User Datagram Protocol) as its underlying transport layer mechanism. The UDP
port that has been assigned to syslog is 514. (RFC 3164)
TCP
Transmission Control Protocol uses the Internet Protocol (IP) to exchange messages between
computers. It is known as a connection-oriented protocol, which means that a connection is established
and maintained until messages have been exchanged. TCP divides messages into packets for transfer
via IP and reassembles the packets into complete messages for delivery to the receiving computer.
Common network applications that use TCP include the worldwide web, email, and FTP.
TCP/IP
Transmission Control Protocol/Internet Protocol is one of the core protocols underlying the Internet. The
two protocols are usually referred to as a group, by the term TCP/IP. TCP provides a reliable connection,
which means that each end of the session is guaranteed to receive all of the data transmitted by the
other end of the connection, in the same order that it was originally transmitted without receiving
duplicates.
Telnet
Teletype Network is a terminal emulation protocol that enables the Telnet client to control the Telnet
server and communicate with other servers on the network. To start a Telnet session, users must enter a
valid username and password. After logging in, they can enter commands as if they were working
directly on the server console.
TKIP
Temporal Key Integrity Protocol is an enhancement to WEP (Wired Equivalent Privacy) encryption. It
uses a set of algorithms to rotate session keys. The protocol's enhanced encryption includes a per-
packet key mixing function, a MIC (Message Integrity Check or Code ), an extended initialization vector
(IV) with sequencing rules, and a re-keying mechanism. The encryption keys are changed (re-keyed)
automatically and authenticated between devices after the re-key interval (either a specified period of
time, or after a specified number of packets has been transmitted).
TLV
An LLDP (Link Layer Discovery Protocol) frame that can contain multiple pieces of information. Each
piece is known as a Type Length Value.
TSN
Glossary
ISW Series Managed Industrial Ethernet Switch Command Reference Guide 165

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the EXTREME SWITCHING ISW 4-10/100P and is the answer not in the manual?

EXTREME SWITCHING ISW 4-10/100P Specifications

General IconGeneral
BrandEXTREME SWITCHING
ModelISW 4-10/100P
CategoryNetwork Router
LanguageEnglish