Implementation Guide
Page 33
...many" communication. A multicast is a packet that multicast packets are replicated and forwarded, which makes efficient use of networks that accompanies your Switch. Multicast filtering improves the performance of network bandwidth. If the network is only at these points that is an IP Multicast? It is...■ IGMP Multicast Filtering For detailed descriptions of endstations in a LAN, or VLAN, that you require to manage the Switch please refer to the Management Interface Reference Guide supplied in the communication by joining an endstation to participate in HTML format on your...
...many" communication. A multicast is a packet that multicast packets are replicated and forwarded, which makes efficient use of networks that accompanies your Switch. Multicast filtering improves the performance of network bandwidth. If the network is only at these points that is an IP Multicast? It is...■ IGMP Multicast Filtering For detailed descriptions of endstations in a LAN, or VLAN, that you require to manage the Switch please refer to the Management Interface Reference Guide supplied in the communication by joining an endstation to participate in HTML format on your...
Implementation Guide
Page 34
... many receivers in the most efficient, logical way. ■ Reduces the load on the source (for example, a server) because it does not have to join specific multicast groups. Application examples include distance learning, transmitting stock quotes to registered endstations. Figure 6 shows how a network behaves without multicast filtering and with other IP...
... many receivers in the most efficient, logical way. ■ Reduces the load on the source (for example, a server) because it does not have to join specific multicast groups. Application examples include distance learning, transmitting stock quotes to registered endstations. Figure 6 shows how a network behaves without multicast filtering and with other IP...
Implementation Guide
Page 40
... network, through backward compatibility: ■ it is possible for some ports on a port, the Switch will wait for Fast-Forwarding configuration of Spanning Tree, if required. this format. ■ it ...before RSTP (or STP) lets the port forward traffic. RSTP is enabled by default. 3Com recommends that you set Fast Start to use the Rapid Spanning Tree Protocol feature (enabled by...Some of the benefits of RSTP are: ■ Faster determination of the IEEE 802.1D bridge specification. 40 CHAPTER 4: USING RESILIENCE FEATURES The protocol is a part of the Active Spanning Tree topology ...
... network, through backward compatibility: ■ it is possible for some ports on a port, the Switch will wait for Fast-Forwarding configuration of Spanning Tree, if required. this format. ■ it ...before RSTP (or STP) lets the port forward traffic. RSTP is enabled by default. 3Com recommends that you set Fast Start to use the Rapid Spanning Tree Protocol feature (enabled by...Some of the benefits of RSTP are: ■ Faster determination of the IEEE 802.1D bridge specification. 40 CHAPTER 4: USING RESILIENCE FEATURES The protocol is a part of the Active Spanning Tree topology ...
Implementation Guide
Page 42
... Bridge B. 42 CHAPTER 4: USING RESILIENCE FEATURES Figure 8 Traffic flowing through Bridges C and A If a link failure is the most efficient path between each bridged segment and a specifically assigned reference point on the network. Therefore, in Figure 9, the STP process reconfigures the network so that the path through Bridge C was the most efficient...
... Bridge B. 42 CHAPTER 4: USING RESILIENCE FEATURES Figure 8 Traffic flowing through Bridges C and A If a link failure is the most efficient path between each bridged segment and a specifically assigned reference point on the network. Therefore, in Figure 9, the STP process reconfigures the network so that the path through Bridge C was the most efficient...
Implementation Guide
Page 56
This gives the flexibility to ensure that 18 kilobytes will operate. ■ Enable HOL with specific HOL values - You should only use this setting, the Switch uses a maximum of 12 packets of Line Blocking (HOL) You can be assigned to the Port(s). This mode ...certain specialist applications. Under these circumstances, high priority traffic may not always be largely ineffective in the profile will be able to access sufficient Switch buffers to 32 kilobytes. It has two modes: ■ Disable - 56 CHAPTER 6: USING TRAFFIC PRIORITIZATION 3 Create Profiles The next step ...
This gives the flexibility to ensure that 18 kilobytes will operate. ■ Enable HOL with specific HOL values - You should only use this setting, the Switch uses a maximum of 12 packets of Line Blocking (HOL) You can be assigned to the Port(s). This mode ...certain specialist applications. Under these circumstances, high priority traffic may not always be largely ineffective in the profile will be able to access sufficient Switch buffers to 32 kilobytes. It has two modes: ■ Disable - 56 CHAPTER 6: USING TRAFFIC PRIORITIZATION 3 Create Profiles The next step ...
Implementation Guide
Page 63
you can select specific links that you wish to receive messages for, for example, a mission-critical link to service - RMON and the Switch 63 ■ A link fails or returns to a server. ■ A security violation occurs. ■ A resilient link activates ■ System Started ■ Smart Autosensing Activated ■ Temperature Critical ■ Secure address learned ■ Execution of intrusion action ■ Authentication failure ■ POST Failed ports ■ Port access authentication failure ■ Port access logon ■ Port access logoff
you can select specific links that you wish to receive messages for, for example, a mission-critical link to service - RMON and the Switch 63 ■ A link fails or returns to a server. ■ A security violation occurs. ■ A resilient link activates ■ System Started ■ Smart Autosensing Activated ■ Temperature Critical ■ Secure address learned ■ Execution of intrusion action ■ Authentication failure ■ POST Failed ports ■ Port access authentication failure ■ Port access logon ■ Port access logoff
Implementation Guide
Page 83
...or device authenticated on a port. This must be set as DUD affects the whole port. It allows an appropriate VLAN configuration to be specific to be of the form of the device. The configuration obtained will be obtained from the device. Important This section contains some important ...that is similar to or from a RADIUS server when a user or device authenticates on the port. Rada can also be set up on the Switch . RADIUS Server settings for Rada When setting up Rada on a RADIUS server the following attributes should be taken into consideration. ■ Users ...
...or device authenticated on a port. This must be set as DUD affects the whole port. It allows an appropriate VLAN configuration to be specific to be of the form of the device. The configuration obtained will be obtained from the device. Important This section contains some important ...that is similar to or from a RADIUS server when a user or device authenticates on the port. Rada can also be set up on the Switch . RADIUS Server settings for Rada When setting up Rada on a RADIUS server the following attributes should be taken into consideration. ■ Users ...
Implementation Guide
Page 93
The different types of Gigabit Ethernet media and their specifications are detailed in Table 9. Table 9 Gigabit Ethernet cabling Gigabit Ethernet Transceivers 1000BASE-LX 1000BASE-SX 1000BASE-T Fiber Type 62.5 µm MM 50 µm MM 50 ...: ■ Single-mode fiber optic cable, with connections up to 100 m (328 ft). Support for Gigabit Ethernet Gigabit Ethernet is supported depending on the module specification. ■ Multimode fiber optic cable, with connections up to 550 m (1804 ft). ■ Category 5 cabling, with connections up to 5 km (3.1 miles...
The different types of Gigabit Ethernet media and their specifications are detailed in Table 9. Table 9 Gigabit Ethernet cabling Gigabit Ethernet Transceivers 1000BASE-LX 1000BASE-SX 1000BASE-T Fiber Type 62.5 µm MM 50 µm MM 50 ...: ■ Single-mode fiber optic cable, with connections up to 100 m (328 ft). Support for Gigabit Ethernet Gigabit Ethernet is supported depending on the module specification. ■ Multimode fiber optic cable, with connections up to 550 m (1804 ft). ■ Category 5 cabling, with connections up to 5 km (3.1 miles...
Implementation Guide
Page 109
...Switch Database which have timed-out and are no longer valid. When connected to a port that a channel can automatically configure itself to advertise their capabilities for speed, duplex and flow control. Aggregated Links Aggregated links allow a user to manage 3Com's Supervisor networking solutions. 10BASE-T The IEEE specification... four-pair Category 5 twisted-pair cable. 1000BASE-SX The IEEE specification for 1000 Mbps Gigabit Ethernet over fiber-optic cable. GLOSSARY 3Com Network The 3Com network management application used as a primary path for transporting traffic between...
...Switch Database which have timed-out and are no longer valid. When connected to a port that a channel can automatically configure itself to advertise their capabilities for speed, duplex and flow control. Aggregated Links Aggregated links allow a user to manage 3Com's Supervisor networking solutions. 10BASE-T The IEEE specification... four-pair Category 5 twisted-pair cable. 1000BASE-SX The IEEE specification for 1000 Mbps Gigabit Ethernet over fiber-optic cable. GLOSSARY 3Com Network The 3Com network management application used as a primary path for transporting traffic between...
Implementation Guide
Page 111
...lets you enter the name of the device, instead of Internet Protocol (IP) addresses in an organization's network. A protocol based on a Switch. DUD Disconnect Unauthorized Device. A protocol that is caused when devices send traffic to a network. Ethernet networks use CSMA/CD to a ... port security feature that is to be forwarded, and can also prevent unauthorized access to transmit packets at 100Mbps. Ethernet A LAN specification developed jointly by inhibiting devices from generating more meaningful and easy-to operate at a rate of 10 Mbps over a variety of screening...
...lets you enter the name of the device, instead of Internet Protocol (IP) addresses in an organization's network. A protocol based on a Switch. DUD Disconnect Unauthorized Device. A protocol that is caused when devices send traffic to a network. Ethernet networks use CSMA/CD to a ... port security feature that is to be forwarded, and can also prevent unauthorized access to transmit packets at 100Mbps. Ethernet A LAN specification developed jointly by inhibiting devices from generating more meaningful and easy-to operate at a rate of 10 Mbps over a variety of screening...
Implementation Guide
Page 113
... of its local router that optimizes the flow of endstations (such as PCs, printers, servers) and network devices (hubs and switches) that use Novell® Netware®. See also latency. Jitter An expression often used for sending data through a network.... its subnetworks. IP Internet Protocol. LANs are characterized by an intermediate device, such as a Layer 2 Switch, that it wishes to receive transmissions addressed to a specific multicast group. IP is responsible for IGMP messages and build mapping tables and associated forwarding filters, in addition...
... of its local router that optimizes the flow of endstations (such as PCs, printers, servers) and network devices (hubs and switches) that use Novell® Netware®. See also latency. Jitter An expression often used for sending data through a network.... its subnetworks. IP Internet Protocol. LANs are characterized by an intermediate device, such as a Layer 2 Switch, that it wishes to receive transmissions addressed to a specific multicast group. IP is responsible for IGMP messages and build mapping tables and associated forwarding filters, in addition...
Implementation Guide
Page 114
...destination port. An Ethernet port connection where the internal transmit and receive lines are 6 bytes long. MIB Management Information Base. The Switch contains its own internal MIB. also called hardware or physical address. Most devices that allows it would like to receive that occurs ... access on a network. MDI Medium Dependent Interface. MIBs are used to identify other devices in a network. multicast A packet sent to a specific group of endstations on a per-port basis. MAC Media Access Control. main port The port in a resilient link that carries data traffic in...
...destination port. An Ethernet port connection where the internal transmit and receive lines are 6 bytes long. MIB Management Information Base. The Switch contains its own internal MIB. also called hardware or physical address. Most devices that allows it would like to receive that occurs ... access on a network. MDI Medium Dependent Interface. MIBs are used to identify other devices in a network. multicast A packet sent to a specific group of endstations on a per-port basis. MAC Media Access Control. main port The port in a resilient link that carries data traffic in...