WWW.DISSERTATION.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Dissertations, online materials
 
<< HOME
CONTACTS



Pages:     | 1 |   ...   | 22 | 23 ||

«Dell™ Networking™ X1000 and X4000 Series Switches User Guide FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for ...»

-- [ Page 24 ] --

IGMP Snooping IGMP Snooping examines IGMP frame contents, when they are forwarded by the device from work stations to an upstream Multicast router. From the frame, the device identifies work stations configured for Multicast sessions, and which Multicast routers are sending Multicast frames.

Image File System images are saved in two Flash sectors called images (Image 1 and Image 2). The active image stores the active copy; while the other image stores a second copy.

Ingress Port Ports on which network traffic is received.

D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 3 / 1 9 / 1 5 - F O R P R O O F O N LY FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for Web Posting\Astute_Admin_Guide_sources_MIF7\FM\Dell_Astute_Glossary.fm IP Internet Protocol. Specifies the format of packets and there addressing method. IP addresses packets and forwards the packets to the correct port.

IP Address Internet Protocol Address. A unique address assigned to a network device with two or more interconnected LANs or WANs.

IP Version 6 (IPv6) A version of IP addressing with longer addresses than the traditional IPv4.

IPv6 addresses are 128 bits long, whereas IPv4 addresses are 32 bits; allowing a much larger address space.

ISATAP Intra-Site Automatic Tunnel Addressing Protocol.l.

ISATAP is an automatic overlay tunneling mechanism that uses the underlying IPv4 network as a non-Broadcast/multicast access link layer for IPv6. ISATAP is designed for transporting IPv6 packets within a site where a native IPv6 infrastructure is not yet available.

L LAG Link Aggregated Group. Aggregates ports or VLANs into a single virtual port or VLAN.

For more information on LAGs, see Defining LAG Membership.

LAN Local Area Networks. A network contained within a single room, building, campus or other limited geographical area.

LACP Link Aggregation Control Protocol (LACP). LACP is part of the IEEE specification 802.3ad that enables bundling several physical ports to form a single logical channel.

Layer 2 Data Link Layer or MAC Layer. Contains the physical address of a client or server station. Layer 2 processing is faster than Layer 3 processing because there is less information to process.

D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 3 / 1 9 / 1 5 - F O R P R O O F O N LY FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for Web Posting\Astute_Admin_Guide_sources_MIF7\FM\Dell_Astute_Glossary.fm Layer 3 Establishes a connections and ensures that all data arrives to their destination. Packets inspected at the Layer 3 level are analyzed and forwarding decisions, based on their applications.

LLDP-MED Link Layer Discovery Protocol - Media Endpoint Discovery. LLDP allows network managers to troubleshoot and enhance network management by discovering and maintaining network topologies over multi-vendor environments. MED increases network flexibility by allowing different IP systems to co-exist on a single network LLDP.

Load Balancing Enables the even distribution of data or processing packets across available network resources. For example, load balancing may distribute the incoming packets evenly to all servers, or redirect the packets to the next available server.

M MAC Address Media Access Control Address. The MAC Address is a hardware specific address that identifies each network node.

MAC Address Learning MAC Address Learning characterizes a learning bridge, in which the packet’s source MAC address is recorded. Packets destined for that address are forwarded only to the bridge interface on which that address is located.

Packets addressed to unknown addresses are forwarded to every bridge interface. MAC Address Learning minimizes traffic on the attached LANs.

MAC Layer A sub-layer of the Data Link Control (DTL) layer.

Mask A filter that includes or excludes certain values, for example parts of an IP address.

MD5 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 3 / 1 9 / 1 5 - F O R P R O O F O N LY FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for Web Posting\Astute_Admin_Guide_sources_MIF7\FM\Dell_Astute_Glossary.fm Message Digest 5. An algorithm that produces a 128-bit hash. MD5 is a variation of MD4, and increases MD4 security. MD5 verifies the integrity of the communication, authenticates the origin of the communication.

MDI Media Dependent Interface. A cable used for end stations.

MDIX Media Dependent Interface with Crossover (MDIX). A cable used for hubs and switches.

MIB Management Information Base. MIBs contain information describing specific aspects of network components.

Multicast Transmits copies of a single packet to multiple ports.

Multicast TV VLAN Multicast Television Vlan or TV VLAN, is used for television applications with a PC or with televisions equipped with a "Set-Top Box" device.

N NA Neighbor Advertisement.

ND Neighbor Discovery.

NS Neighbor Solicitation.

NMS Network Management System. An interface that provides a method of managing a system.

Node A network connection endpoint or a common junction for multiple network

lines. Nodes include:

• Processors D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 3 / 1 9 / 1 5 - F O R P R O O F O N LY FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for Web Posting\Astute_Admin_Guide_sources_MIF7\FM\Dell_Astute_Glossary.fm





• Controllers

• Workstations O OID Organizationally Unique Identifiers. Identifiers associated with a Voice VLAN.

OUI Object Identifier. Used by SNMP to identify managed objects. In the SNMP Manager/Agent network management paradigm, each managed object must have an OID to identify it.

P Packets Blocks of information for transmission in packet switched systems.

PDU Protocol Data Unit. A data unit specified in a layer protocol consisting of protocol control information and layer user data.

PING Packet Internet Groper. Verifies if a specific IP address is available. A packet is sent to another IP address and waits for a reply.

Port Physical ports provide connecting components that allow microprocessors to communicate with peripheral equipment.

Port Mirroring Monitors and mirrors network traffic by forwarding copies of incoming and outgoing packets from one port to a monitoring port.

Protocol A set of rules that governs how devices exchange information across networks.

PVE Protocol VLAN Edge. A port can be defined as a Private VLAN Edge (PVE) port of an uplink port, so that it will be isolated from other ports within the same VLAN.

D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 3 / 1 9 / 1 5 - F O R P R O O F O N LY FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for Web Posting\Astute_Admin_Guide_sources_MIF7\FM\Dell_Astute_Glossary.fm Q QoS Quality of Service. QoS allows network managers to decide how and what network traffic is forwarded according to priorities, application types, and source and destination addresses.

Query Extracts information from a database and presents the information for use.

R RA RADIUS Advertisement.

RD RADIUS Discovery.

RS Router Solicitation.

RADIUS Remote Authentication Dial-In User Service. A method for authenticating system users, and tracking connection time.

RMON Remote Monitoring. Provides network information to be collected from a single workstation.

Router A device that connects to separate networks. Routers forward packets between two or more networks. Routers operate at a Layer 3 level.

RSTP Rapid Spanning Tree Protocol. Detects and uses network topologies that allow a faster convergence of the spanning tree, without creating forwarding loops.

Running Configuration File Contains all startup configuration file commands, as well as all commands entered during the current session. After the switch module is powered down or rebooted, all commands stored in the Running Configuration file are lost.

D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 3 / 1 9 / 1 5 - F O R P R O O F O N LY FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for Web Posting\Astute_Admin_Guide_sources_MIF7\FM\Dell_Astute_Glossary.fm S Segmentation Divides LANs into separate LAN segments for bridging. Segmentation eliminates LAN bandwidth limitations.

Server A central computer that provides services to other computers on a network.

Services may include file storage and access to applications.

SNMP Simple Network Management Protocol. Manages LANs. SNMP based software communicates with network devices with embedded SNMP agents. SNMP agents gather network activity and device status information, and send the information back to a workstation.

SNTP Simple Network Time Protocol. SNTP assures accurate network switch clock time synchronization up to the millisecond.

SoC System on a Chip. An ASIC that contains an entire system. For example, a telecom SoC application can contain a microprocessor, digital signal processor, RAM, and ROM.

Spanning Tree Protocol Prevents loops in network traffic. The Spanning Tree Protocol (STP) provides tree topography for any arrangement of bridges. STP provides one path between end stations on a network, eliminating loops.

SSH Secure Shell. Permits logging to another computer over a network, execute commands on a remote machine, and move files from one machine to another. Secure Shell provides strong authentication and secure communications methods over insecure channels.

Startup Configuration Retains the exact switch module configuration when the switch module is powered down or rebooted.

Subnet D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 3 / 1 9 / 1 5 - F O R P R O O F O N LY FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for Web Posting\Astute_Admin_Guide_sources_MIF7\FM\Dell_Astute_Glossary.fm Sub-network. Subnets are portions of a network that share a common address component. On TCP/IP networks, devices that share a prefix are part of the same subnet. For example, all devices with a prefix of 157.100.100.100 are part of the same subnet.

Subnet Mask Used to mask all or part of an IP address used in a subnet address.

Switch Filters and forwards packets between LAN segments. Switches support any packet protocol type.

T TCP/IP Transmissions Control Protocol. Enables two hosts to communicate and exchange data streams. TCP guarantees packet delivery, and guarantees packets are transmitted and received in the order their sent.

TCP/IP Congestion Avoidance Transmissions Control Protocol Congestion Avoidance. The TCP Congestion Avoidance feature activates an algorithm that breaks up or prevents TCP global synchronization on a congested node, where the congestion is due to multiple sources sending packets with the same byte count.

Telnet Terminal Emulation Protocol. Enables system users to log in and use resources on remote networks.

TFTP Trivial File Transfer Protocol. Uses User Data Protocol (UDP) without security features to transfer files.

Trap A message sent by the SNMP that indicates that system event has occurred.

Trunking Link Aggregation. Optimizes port usage by linking a group of ports together to form a single trunk (aggregated groups).

TV VLAN D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 3 / 1 9 / 1 5 - F O R P R O O F O N LY FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for Web Posting\Astute_Admin_Guide_sources_MIF7\FM\Dell_Astute_Glossary.fm Multicast Television Vlan or TV VLAN, is used for television applications with a PC or with televisions equipped with a "Set-Top Box" device.

U UDP User Data Protocol. Transmits packets but does not guarantee their delivery.

Unicast A form of routing that transmits one packet to one user.

V VLAN Virtual Local Area Networks. Logical subgroups with a Local Area Network (LAN) created via software rather than defining a hardware solution.

VoIP Voice over IP.

W WAN Wide Area Networks. Networks that cover a large geographical area.

Wildcard Mask Specifies which IP address bits are used, and which bits are ignored. A wild switch module mask of 255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all the bits are important.

D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 3 / 1 9 / 1 5 - F O R P R O O F O N LY FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for Web Posting\Astute_Admin_Guide_sources_MIF7\FM\Dell_Astute_Glossary.fm

Pages:     | 1 |   ...   | 22 | 23 ||


Similar works:

«  Past, Present and Policy  4th International Conference    The Sub‐prime Crisis and how it Changed the Past    Graduate Institute, Geneva 3‐4 February 2011  Sponsored by the Norges Bank Bicentenary Project 1816‐2016      Limiting the Witch‐Hunt: Recovering from the South  Sea Bubble  Helen Paul (University of Southampton)                             ...»

«Global Review of Research in Tourism, Hospitality and Leisure Management (GRRTHLM) An Online International Research Journal (ISSN: 2311-3189) 2015 Vol: 1 Issue 1 Marketing through Social Networks in Touristic and Gastronomy Industry in Manzanillo, Colima, México M.F. Jesús Otoniel Sosa Rodríguez, School of Tourism and Gastronomy, University of Colima, Mexico. E-mail: otonielsosa@ucol.mx M.C.A. Nuchnudee Chaisatit, School of Tourism and Gastronomy, University of Colima. Mexico. E-mail:...»

«This dissertation focuses on spin based phenomena of transport in low-dimensional mesoscopic systems. The work contains the theoretical discussion of an experimentally verified spin-transistor concept, which is based on controlling adiabaticity of spin evolution in dilute magnetic semiconductors. Furthermore the effect of spin dephasing on the weak localization and the weak antilocalization conductance corrections is investigated. In this context, the influence of spin-orbit interaction that...»

«University of Pennsylvania ScholarlyCommons Think Tanks and Civil Societies Program International Relations Program 12-1-2012 2012 Global Go To Think Tanks Index Report James G. McGann University of Pennsylvania, jmcgann@sas.upenn.edu THINK TANKS AND CIVIL SOCIETIES PROGRAM © 2012, TTCSP All rights reserved. Except for short quotes, no part of this document and presentation may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording,...»

«UNCHARTED REALMS This book is a fan-made compilation of stories from the official Magic: The Gathering website. To read new stories as they are published, visit http://magic.wizards.com/en/articles/columns/uncharted-realms The Nature of Identity 4 Cowardice of the Hero 8 Emonberry Red 15 Kiora's Followers 24 Dance of the Flitterstep 30 The Walls of Akros 35 The Hero of Iroas 45 The Oracle of Ephara 51 Ajani, Mentor of Heroes 61 Desperate Stand 71 Dreams of the City 75 Thank the Gods 84 The Path...»

«CAMBODIA QUARTERLY BIRD REPORTS OCTOBER-DECEMBER 2012 Compiled by Frédéric Goes Thanks to all contributors. In the future, please send any records you think may be of interest to fredbaksey@yahoo.com. Earlier editions can be found at www.samveasna.org. Species names follow Craig Robson (2008) A field guide to the birds of South-east Asia. National Park, Wildlife Sanctuary, Protected Forest, Bengal Florican Conservation Area are abbreviated as NP, WS, PF and BFCA respectively. Siem Reap-based...»

«AGREEMENT Between THE BUFFALO NEWS and THE NEWSPAPER GUILD OF BUFFALO *** This contract is made as of the first day of August 2011 between The Buffalo News Inc., a wholly-owned subsidiary of Berkshire Hathaway, Inc., (“The News”), and The Newspaper Guild of Buffalo, Local 31026, The Newspaper Guild/CWA, AFL-CIO, (“the Guild”), for itself and on behalf of the employees described in Article 1. The News recognizes the Guild as the sole and exclusive agent for all the employees covered by...»

«Columbia College Columbia University in the City of New York BULLETIN | 2011–2012 JULY 15, 2011 Directory of Services University Information (212) 854-1754 Columbia College On-Line http://www.college.columbia.edu/ ADDRESS INQUIRIES AS FOLLOWS: Financial Aid: Office of Financial Aid and Educational Financing Office of the Dean: Mailing address: Columbia College 100 Hamilton Hall 208 Hamilton Hall Mail Code 2802 Mail Code 2805 1130 Amersterdam Avenue 1130 Amersterdam Avenue New York, NY 10027...»

«THE FEMALE STERILIZATION CONTROVERSY: FRAMING REPRODUCTIVE RIGHTS AT THE INTERSECTION OF RACE AND GENDER IN BRAZIL By MEGAN BAROLET-FOGARTY A THESIS PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS UNIVERSITY OF FLORIDA © 2007 Megan Barolet-Fogarty To my ―boys‖ who spurred me on with their ―THESIS!‖ chant ACKNOWLEDGMENTS I am indebted to my committee for their support through this process. My...»

«T.C ANKARA ÜNİVERSİTESİ SOSYAL BİLİMLER ENSTİTÜSÜ BATI DİLLERİ VE EDEBİYATLARI İNGİLİZ DİLİ VE EDEBİYATI A STYLISTIC ANALYSIS OF EKPHRASTIC POETRY IN ENGLISH PhD Dissertation Berkan ULU Ankara-2010 T.C ANKARA ÜNİVERSİTESİ SOSYAL BİLİMLER ENSTİTÜSÜ BATI DİLLERİ VE EDEBİYATLARI İNGİLİZ DİLİ VE EDEBİYATI A STYLISTIC ANALYSIS OF EKPHRASTIC POETRY IN ENGLISH PhD Dissertation Berkan ULU Advisor Asst.Prof.Dr.Nazan TUTAŞ Ankara-2010 T.C ANKARA ÜNİVERSİTESİ...»

«University of Miami Scholarly Repository Open Access Dissertations Electronic Theses and Dissertations 2011-05-09 A Performance Guide of Selected Works for Horn and Mallet Percussion Casey N. Maltese University of Miami, casey806@yahoo.com Follow this and additional works at: http://scholarlyrepository.miami.edu/oa_dissertations Recommended Citation Maltese, Casey N., A Performance Guide of Selected Works for Horn and Mallet Percussion (2011). Open Access Dissertations. Paper 527. This Open...»

«VERZAMELDE COLLECTIEPROFIELEN MUSEUM VOLKENKUNDE Collectieprofielen Museum Volkenkunde, Leiden Inhoudsopgave Inleiding 2 Korte geschiedenis van het museum 4 Insulair Zuidoost-Azië 7 Zuiden Zuidoost-Azië 19 Zuidwesten Centraal-Azië 27 Afrika 33 Middenen Zuid-Amerika 42 Indiaans Noord-Amerika 54 Circumpolaire gebieden 61 China 68 Korea 75 Japan 78 Fotocollecties 82 VERZAMELDE COLLECTIEPROFIELEN MUSEUM VOLKENKUNDE Vooraf Museum Volkenkunde beheert al bijna 200 jaar collecties die eigendom zijn...»





 
<<  HOME   |    CONTACTS
2016 www.dissertation.xlibx.info - Dissertations, online materials

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.