«Dell™ Networking™ X1000 and X4000 Series Switches User Guide FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for ...»
IGMP Snooping IGMP Snooping examines IGMP frame contents, when they are forwarded by the device from work stations to an upstream Multicast router. From the frame, the device identifies work stations configured for Multicast sessions, and which Multicast routers are sending Multicast frames.
Image File System images are saved in two Flash sectors called images (Image 1 and Image 2). The active image stores the active copy; while the other image stores a second copy.
Ingress Port Ports on which network traffic is received.
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 3 / 1 9 / 1 5 - F O R P R O O F O N LY FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for Web Posting\Astute_Admin_Guide_sources_MIF7\FM\Dell_Astute_Glossary.fm IP Internet Protocol. Specifies the format of packets and there addressing method. IP addresses packets and forwards the packets to the correct port.
IP Address Internet Protocol Address. A unique address assigned to a network device with two or more interconnected LANs or WANs.
IP Version 6 (IPv6) A version of IP addressing with longer addresses than the traditional IPv4.
IPv6 addresses are 128 bits long, whereas IPv4 addresses are 32 bits; allowing a much larger address space.
ISATAP Intra-Site Automatic Tunnel Addressing Protocol.l.
ISATAP is an automatic overlay tunneling mechanism that uses the underlying IPv4 network as a non-Broadcast/multicast access link layer for IPv6. ISATAP is designed for transporting IPv6 packets within a site where a native IPv6 infrastructure is not yet available.
L LAG Link Aggregated Group. Aggregates ports or VLANs into a single virtual port or VLAN.
For more information on LAGs, see Defining LAG Membership.
LAN Local Area Networks. A network contained within a single room, building, campus or other limited geographical area.
LACP Link Aggregation Control Protocol (LACP). LACP is part of the IEEE specification 802.3ad that enables bundling several physical ports to form a single logical channel.
Layer 2 Data Link Layer or MAC Layer. Contains the physical address of a client or server station. Layer 2 processing is faster than Layer 3 processing because there is less information to process.
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 3 / 1 9 / 1 5 - F O R P R O O F O N LY FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for Web Posting\Astute_Admin_Guide_sources_MIF7\FM\Dell_Astute_Glossary.fm Layer 3 Establishes a connections and ensures that all data arrives to their destination. Packets inspected at the Layer 3 level are analyzed and forwarding decisions, based on their applications.
LLDP-MED Link Layer Discovery Protocol - Media Endpoint Discovery. LLDP allows network managers to troubleshoot and enhance network management by discovering and maintaining network topologies over multi-vendor environments. MED increases network flexibility by allowing different IP systems to co-exist on a single network LLDP.
Load Balancing Enables the even distribution of data or processing packets across available network resources. For example, load balancing may distribute the incoming packets evenly to all servers, or redirect the packets to the next available server.
M MAC Address Media Access Control Address. The MAC Address is a hardware specific address that identifies each network node.
MAC Address Learning MAC Address Learning characterizes a learning bridge, in which the packet’s source MAC address is recorded. Packets destined for that address are forwarded only to the bridge interface on which that address is located.
Packets addressed to unknown addresses are forwarded to every bridge interface. MAC Address Learning minimizes traffic on the attached LANs.
MAC Layer A sub-layer of the Data Link Control (DTL) layer.
Mask A filter that includes or excludes certain values, for example parts of an IP address.
MD5 D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 3 / 1 9 / 1 5 - F O R P R O O F O N LY FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for Web Posting\Astute_Admin_Guide_sources_MIF7\FM\Dell_Astute_Glossary.fm Message Digest 5. An algorithm that produces a 128-bit hash. MD5 is a variation of MD4, and increases MD4 security. MD5 verifies the integrity of the communication, authenticates the origin of the communication.
MDI Media Dependent Interface. A cable used for end stations.
MDIX Media Dependent Interface with Crossover (MDIX). A cable used for hubs and switches.
MIB Management Information Base. MIBs contain information describing specific aspects of network components.
Multicast Transmits copies of a single packet to multiple ports.
Multicast TV VLAN Multicast Television Vlan or TV VLAN, is used for television applications with a PC or with televisions equipped with a "Set-Top Box" device.
N NA Neighbor Advertisement.
ND Neighbor Discovery.
NS Neighbor Solicitation.
NMS Network Management System. An interface that provides a method of managing a system.
Node A network connection endpoint or a common junction for multiple network
lines. Nodes include:
• Processors D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 3 / 1 9 / 1 5 - F O R P R O O F O N LY FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for Web Posting\Astute_Admin_Guide_sources_MIF7\FM\Dell_Astute_Glossary.fm
• Workstations O OID Organizationally Unique Identifiers. Identifiers associated with a Voice VLAN.
OUI Object Identifier. Used by SNMP to identify managed objects. In the SNMP Manager/Agent network management paradigm, each managed object must have an OID to identify it.
P Packets Blocks of information for transmission in packet switched systems.
PDU Protocol Data Unit. A data unit specified in a layer protocol consisting of protocol control information and layer user data.
PING Packet Internet Groper. Verifies if a specific IP address is available. A packet is sent to another IP address and waits for a reply.
Port Physical ports provide connecting components that allow microprocessors to communicate with peripheral equipment.
Port Mirroring Monitors and mirrors network traffic by forwarding copies of incoming and outgoing packets from one port to a monitoring port.
Protocol A set of rules that governs how devices exchange information across networks.
PVE Protocol VLAN Edge. A port can be defined as a Private VLAN Edge (PVE) port of an uplink port, so that it will be isolated from other ports within the same VLAN.
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 3 / 1 9 / 1 5 - F O R P R O O F O N LY FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for Web Posting\Astute_Admin_Guide_sources_MIF7\FM\Dell_Astute_Glossary.fm Q QoS Quality of Service. QoS allows network managers to decide how and what network traffic is forwarded according to priorities, application types, and source and destination addresses.
Query Extracts information from a database and presents the information for use.
R RA RADIUS Advertisement.
RD RADIUS Discovery.
RS Router Solicitation.
RADIUS Remote Authentication Dial-In User Service. A method for authenticating system users, and tracking connection time.
RMON Remote Monitoring. Provides network information to be collected from a single workstation.
Router A device that connects to separate networks. Routers forward packets between two or more networks. Routers operate at a Layer 3 level.
RSTP Rapid Spanning Tree Protocol. Detects and uses network topologies that allow a faster convergence of the spanning tree, without creating forwarding loops.
Running Configuration File Contains all startup configuration file commands, as well as all commands entered during the current session. After the switch module is powered down or rebooted, all commands stored in the Running Configuration file are lost.
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 3 / 1 9 / 1 5 - F O R P R O O F O N LY FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for Web Posting\Astute_Admin_Guide_sources_MIF7\FM\Dell_Astute_Glossary.fm S Segmentation Divides LANs into separate LAN segments for bridging. Segmentation eliminates LAN bandwidth limitations.
Server A central computer that provides services to other computers on a network.
Services may include file storage and access to applications.
SNMP Simple Network Management Protocol. Manages LANs. SNMP based software communicates with network devices with embedded SNMP agents. SNMP agents gather network activity and device status information, and send the information back to a workstation.
SNTP Simple Network Time Protocol. SNTP assures accurate network switch clock time synchronization up to the millisecond.
SoC System on a Chip. An ASIC that contains an entire system. For example, a telecom SoC application can contain a microprocessor, digital signal processor, RAM, and ROM.
Spanning Tree Protocol Prevents loops in network traffic. The Spanning Tree Protocol (STP) provides tree topography for any arrangement of bridges. STP provides one path between end stations on a network, eliminating loops.
SSH Secure Shell. Permits logging to another computer over a network, execute commands on a remote machine, and move files from one machine to another. Secure Shell provides strong authentication and secure communications methods over insecure channels.
Startup Configuration Retains the exact switch module configuration when the switch module is powered down or rebooted.
Subnet D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 3 / 1 9 / 1 5 - F O R P R O O F O N LY FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for Web Posting\Astute_Admin_Guide_sources_MIF7\FM\Dell_Astute_Glossary.fm Sub-network. Subnets are portions of a network that share a common address component. On TCP/IP networks, devices that share a prefix are part of the same subnet. For example, all devices with a prefix of 220.127.116.11 are part of the same subnet.
Subnet Mask Used to mask all or part of an IP address used in a subnet address.
Switch Filters and forwards packets between LAN segments. Switches support any packet protocol type.
T TCP/IP Transmissions Control Protocol. Enables two hosts to communicate and exchange data streams. TCP guarantees packet delivery, and guarantees packets are transmitted and received in the order their sent.
TCP/IP Congestion Avoidance Transmissions Control Protocol Congestion Avoidance. The TCP Congestion Avoidance feature activates an algorithm that breaks up or prevents TCP global synchronization on a congested node, where the congestion is due to multiple sources sending packets with the same byte count.
Telnet Terminal Emulation Protocol. Enables system users to log in and use resources on remote networks.
TFTP Trivial File Transfer Protocol. Uses User Data Protocol (UDP) without security features to transfer files.
Trap A message sent by the SNMP that indicates that system event has occurred.
Trunking Link Aggregation. Optimizes port usage by linking a group of ports together to form a single trunk (aggregated groups).
TV VLAN D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 3 / 1 9 / 1 5 - F O R P R O O F O N LY FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for Web Posting\Astute_Admin_Guide_sources_MIF7\FM\Dell_Astute_Glossary.fm Multicast Television Vlan or TV VLAN, is used for television applications with a PC or with televisions equipped with a "Set-Top Box" device.
U UDP User Data Protocol. Transmits packets but does not guarantee their delivery.
Unicast A form of routing that transmits one packet to one user.
V VLAN Virtual Local Area Networks. Logical subgroups with a Local Area Network (LAN) created via software rather than defining a hardware solution.
VoIP Voice over IP.
W WAN Wide Area Networks. Networks that cover a large geographical area.
Wildcard Mask Specifies which IP address bits are used, and which bits are ignored. A wild switch module mask of 255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all the bits are important.
D E L L C O N F I D E N T I A L – P R E L I M I N A R Y 3 / 1 9 / 1 5 - F O R P R O O F O N LY FILE LOCATION: C:\Users\vijaya_devakumar_dev\Documents\PowerConnect\Astute\Docs for Web Posting\Astute_Admin_Guide_sources_MIF7\FM\Dell_Astute_Glossary.fm