3Com SuperStack 3C17300 Implementation Manual

Other manuals for SuperStack 3C17300: Implementation Manual, Getting Started Manual
Manual is about: SuperStack 3 Switch 4226T

Summary of SuperStack 3C17300

  • Page 1

    Http://www.3com.Com/ part no. Dua1730-0baa02 published november 2002 superstack ® 3 switch 4200 series implementation guide generic guide for units in the superstack 3 switch 4200 series: 3c17300 3c17302 3c17304.

  • Page 2

    3com corporation 5400 bayfront plaza santa clara, california 95052-8145 copyright © 2002, 3com technologies. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) witho...

  • Page 3: Ontents

    C ontents a bout t his g uide conventions 10 related documentation 11 documentation comments 11 product registration 12 1 s witch f eatures o verview what is management software? 15 switch features explained 15 automatic ip configuration 16 port security 16 aggregated links 16 auto-negotiation 17 mu...

  • Page 4

    Aggregated links and your switch 27 aggregated link example 30 3 u sing m ulticast f iltering what is an ip multicast? 33 benefits of multicast 34 multicast filtering 34 multicast filtering and your switch 35 igmp multicast filtering 36 4 u sing r esilience f eatures spanning tree protocol (stp) 39 ...

  • Page 5: Lan

    7 s tatus m onitoring and s tatistics rmon 57 what is rmon? 57 the rmon groups 58 benefits of rmon 58 rmon and the switch 59 alarm events 60 the default alarm settings 60 the audit log 61 email notification of events 61 hardware status monitoring 62 8 s etting u p v irtual lan s what are vlans? 65 b...

  • Page 6: Ip A

    Configuration rules with full duplex 81 b n etwork c onfiguration e xamples simple network configuration examples 84 segmentation switch example 84 desktop switch example 85 advanced network configuration examples 86 improving the resilience of your network 86 enhancing the performance of your netwo...

  • Page 7: Bout

    A bout t his g uide this guide describes the features of the superstack ® 3 switch 4200 series and outlines how to use these features to optimize the performance of your network. This guide is intended for the system or network administrator who is responsible for configuring, using, and managing th...

  • Page 8

    10 a bout t his g uide conventions table 1 and table 2 list conventions that are used throughout this guide. Table 1 notice icons icon notice type description information note information that describes important features or instructions caution information that alerts you to potential loss of data ...

  • Page 9

    Related documentation 11 related documentation in addition to this guide, each switch documentation set includes the following: ■ getting started guide this guide contains: ■ all the information you need to install and set up the switch in its default state ■ information on how to access the managem...

  • Page 10

    12 a bout t his g uide please include the following information when contacting us: ■ document title ■ document part number (on the title page) ■ page number (if appropriate) example: ■ superstack 3 switch implementation guide ■ part number: dua1730-0baa0x ■ page 25 please note that we can only resp...

  • Page 11: Witch

    I s witch f eatures chapter 1 switch features overview chapter 2 optimizing bandwidth chapter 3 using multicast filtering chapter 4 using resilience features chapter 5 using the switch database chapter 6 using traffic prioritization chapter 7 status monitoring and statistics chapter 8 setting up vir...

  • Page 12

    14.

  • Page 13: Witch

    1 s witch f eatures o verview this chapter contains introductory information about the superstack ® 3 switch management software and supported features. It covers the following topics: ■ what is management software? ■ switch features explained for detailed descriptions of the web interface operation...

  • Page 14

    16 c hapter 1: s witch f eatures o verview automatic ip configuration by default the switch tries to configure itself with ip information without requesting user intervention. It uses the following industry standard methods to allocate the switch ip information: ■ dynamic host configuration protocol...

  • Page 15

    Switch features explained 17 auto-negotiation auto-negotiation allows ports to auto-negotiate port speed, duplex-mode (only at 10 mbps and 100 mbps) and flow control. When auto-negotiation is enabled (default), a port “advertises” its maximum capabilities — these capabilities are by default the para...

  • Page 16

    18 c hapter 1: s witch f eatures o verview endstations in each multicast group to which multicast traffic should be forwarded. For more information about multicast filtering, see chapter 3 “using multicast filtering” . Spanning tree protocol and rapid spanning tree protocol spanning tree protocol (s...

  • Page 17

    Switch features explained 19 traffic prioritization ensures that high priority data is forwarded through the switch without being delayed by lower priority data. Traffic prioritization uses the two traffic queues that are present in the hardware of the switch to ensure that high priority traffic is ...

  • Page 18

    20 c hapter 1: s witch f eatures o verview for more information about rmon and event notification, see chapter 7 “status monitoring and statistics” . Broadcast storm control broadcast storm control is a system that monitors the level of broadcast traffic on that port. If the broadcast traffic level ...

  • Page 19: Ptimizing

    2 o ptimizing b andwidth there are many ways you can optimize the bandwidth on your network and improve network performance. If you utilize certain switch features you can provide the following benefits to your network and end users: ■ increased bandwidth ■ quicker connections ■ faster transfer of d...

  • Page 20

    22 c hapter 2: o ptimizing b andwidth if the devices at either end of a link do not support auto-negotiation, both ends must be manually set to full duplex or half duplex accordingly. Ports operating at 1000 mbps support full duplex mode only. Flow control all switch ports support flow control, whic...

  • Page 21

    Port features 23 smart auto-sensing smart auto-sensing allows auto-negotiating multi-speed ports, such as 10/100 mbps or 10/100/1000 mbps, to monitor and detect a high error rate on a link, or a problem in the “physical” interconnection to another port and react accordingly. In other words, auto-neg...

  • Page 22

    24 c hapter 2: o ptimizing b andwidth aggregated links aggregated links are connections that allow devices to communicate using up to four member links in parallel. Aggregated links are supported on the 10/100/1000base-t ports and gbic ports . These parallel links provide two benefits: ■ they can po...

  • Page 23

    Aggregated links 25 re-mapping occurs as soon as the switch detects that a member link has failed — almost instantaneously. As a result, aggregated link configurations are extremely resilient and fault-tolerant. Figure 2 dynamic reassignment of traffic flows the key benefits of 802.3ad link aggregat...

  • Page 24

    26 c hapter 2: o ptimizing b andwidth figure 3 aggregated — link example ■ lacp pre-configured aggregations — if you need to know which aggregated link is associated with which device in your network you can use a lacp pre-configured aggregation. This allows you to manually configure the mac address...

  • Page 25

    Aggregated links 27 aggregated links and your switch when any port is assigned to an aggregated link (either manually or via lacp) it will adopt the configuration settings of the aggregated link. When a port leaves an aggregated link its original configuration settings are restored. A maximum of fou...

  • Page 26

    28 c hapter 2: o ptimizing b andwidth switched locally. This minimises traffic flowing across the interconnect and therefore enhances network performance. When setting up an aggregated link, note that: ■ the ports at both ends of a member link must be configured as members of an aggregated link, if ...

  • Page 27

    Aggregated links 29 figure 4 an illegal aggregated link configuration to make this configuration work you need to have two aggregated links defined on switch a, one containing the member links for switch b and the other containing those for switch c. When using an aggregated link, note that: ■ to ga...

  • Page 28

    30 c hapter 2: o ptimizing b andwidth to avoid the potential problem of out-of-sequence packets (or "packet re-ordering"), the switch ensures that all the conversations between a given pair of endstations will pass through the same port in the aggregated link. Single-to-multiple endstation conversat...

  • Page 29

    Aggregated links 31 6 connect the 1000base-t port marked ‘down’ on the upper switch to the 1000base-t port marked ‘down’ on the lower switch. 7 connect the gbic port marked ‘27’ on the upper switch to the gbic port marked ‘27’ on the lower switch. 8 connect the gbic port marked ‘28’ on the upper swi...

  • Page 30

    32 c hapter 2: o ptimizing b andwidth.

  • Page 31: Sing

    3 u sing m ulticast f iltering multicast filtering improves the performance of networks that carry multicast traffic. This chapter explains multicasts, multicast filtering, and how multicast filtering can be implemented on your switch. It covers the following topics: ■ what is an ip multicast? ■ mul...

  • Page 32

    34 c hapter 3: u sing m ulticast f iltering a multicast packet is identified by the presence of a multicast group address in the destination address field of the packet’s ip header. Benefits of multicast the benefits of using ip multicast are that it: ■ enables the simultaneous delivery of informati...

  • Page 33

    Multicast filtering 35 figure 6 the effect of multicast filtering multicast filtering and your switch your switch provides automatic multicast filtering support using igmp (internet group management protocol) snooping. It also supports igmp query mode. Snooping mode snooping mode allows your switch ...

  • Page 34

    36 c hapter 3: u sing m ulticast f iltering command will configure the switch 4200 series to automatically negotiate with compatible devices on vlan 1 to become the querier. The switch 4200 series is compatible with any device that conforms to the igmp v2 protocol. Igmp multicast filtering igmp is t...

  • Page 35

    Igmp multicast filtering 37 management interface reference guide supplied on your switch cd-rom. If igmp multicast learning is not enabled then ip multicast traffic is always forwarded, that is, it floods the network. For information about configuring igmp functionality on an endstation, refer to th...

  • Page 36

    38 c hapter 3: u sing m ulticast f iltering.

  • Page 37: Sing

    4 u sing r esilience f eatures setting up resilience on your network helps protect critical links against failure, protects against network loops, and reduces network downtime to a minimum. This chapter explains the features supported by the switch that provide resilience for your network. It covers...

  • Page 38

    40 c hapter 4: u sing r esilience f eatures the protocol is a part of the ieee 802.1d bridge specification. To explain stp more effectively, your switch will be referred to as a bridge. Rapid spanning tree protocol (rstp) the rapid spanning tree (rstp) is an enhanced spanning tree feature. Rstp impl...

  • Page 39

    What is stp? 41 ■ enable one of the less efficient paths if the most efficient path fails. Rstp provides the same functionality as stp. For details on how the two systems differ, see “how rstp differs to stp” on page 45 . As an example, figure 7 shows a network containing three lan segments separate...

  • Page 40

    42 c hapter 4: u sing r esilience f eatures figure 8 traffic flowing through bridges c and a if a link failure is detected, as shown in figure 9 , the stp process reconfigures the network so that traffic from lan segment 2 flows through bridge b. Figure 9 traffic flowing through bridge b stp determi...

  • Page 41

    How stp works 43 how stp works when enabled, stp determines the most appropriate path for traffic through a network. It does this as outlined in the sections below. Stp requirements before it can configure the network, the stp system requires: ■ communication between all the bridges. This communicat...

  • Page 42

    44 c hapter 4: u sing r esilience f eatures ■ the identity of the bridge that is to be the root bridge. The root bridge is the central reference point from which the network is configured. ■ the root path costs for each bridge — that is, the cost of the paths from each bridge to the root bridge. ■ t...

  • Page 43

    How stp works 45 how rstp differs to stp rstp works in a similar way to stp, but it includes additional information in the bpdus. This information allows each bridge to confirm that it has taken action to prevent loops from forming when it wants to enable a link to a neighbouring bridge. This allows...

  • Page 44

    46 c hapter 4: u sing r esilience f eatures ■ because bridge a is the root bridge, it is also the designated bridge for lan segment 1. Port 1 on bridge a is therefore selected as the designated bridge port for lan segment 1. ■ port 1 of bridges b, c, x and y have been defined as root ports because t...

  • Page 45

    How stp works 47 figure 11 stp configurations.

  • Page 46

    48 c hapter 4: u sing r esilience f eatures using stp on a network with multiple vlans the ieee 802.1d standard does not take into account vlans when it calculates stp information — the calculations are only performed on the basis of physical connections. For this reason, some network configurations...

  • Page 47: Sing

    5 u sing the s witch d atabase what is the switch database? The switch database is used by the switch to determine where a packet should be forwarded to, and which port should transmit the packet if it is to be forwarded. The database contains a list of entries — each entry contains three items: ■ m...

  • Page 48

    50 c hapter 5: u sing the s witch d atabase switch database entry states databases entries can have three states: ■ learned — the switch has placed the entry into the switch database when a packet was received from an endstation. Note that: ■ learned entries are removed (aged out) from the switch da...

  • Page 49: Sing

    6 u sing t raffic p rioritization using the traffic prioritization capabilities of your switch allows your network traffic to be prioritized to ensure that high priority data is transmitted with minimum delay. For a list of the features supported by your switch, please refer to the management quick ...

  • Page 50

    52 c hapter 6: u sing t raffic p rioritization ■ resource planning applications — used by organizations that require predictable and reliable access to enterprise resource planning applications such as sap. ■ financial applications — used by accounts departments that need immediate access to large f...

  • Page 51

    How traffic prioritization works 53 you cannot alter the mapping of priority levels 0 - 7 to the traffic queues. These priority levels are fixed to the traffic queues as shown in figure 13 . Figure 13 ieee 802.1d traffic types figure 13 illustrates ieee 802.1d traffic types as well as associated pri...

  • Page 52

    54 c hapter 6: u sing t raffic p rioritization figure 14 dscp service level mapping figure 14 illustrates how diffserv code point (dscp) service levels are mapped to the two traffic queues. The dscp service level of the packet is not altered by the switch 4200 series. Traffic prioritization and your...

  • Page 53

    Traffic prioritization and your switch 55 how traffic is processed to provide quality of service a received packet at the ingress port is checked for its dscp and ieee 802.1d attributes to determine the level of service that the packet should receive. 802.1d packets are categorized into the 8 traffi...

  • Page 54

    56 c hapter 6: u sing t raffic p rioritization packet attributes on which to classify incoming traffic, differentiated services code point (dscp) and ieee 802.1d. 2 identify service levels you must then identify the level of service each classifier should receive. Note that dscp service levels will ...

  • Page 55: Tatus

    7 s tatus m onitoring and s tatistics this chapter contains details of the features that assist you with status monitoring and statistics. For detailed descriptions of the web interface operations and the command line interface (cli) commands that you require to manage the switch please refer to the...

  • Page 56

    58 c hapter 7: s tatus m onitoring and s tatistics the same network as the switch and can manage the switch by in-band or out-of-band connections. The rmon groups the ietf define groups of ethernet rmon statistics. This section describes the two groups supported by the switch 4200 series, and detail...

  • Page 57

    Rmon and the switch 59 addition, probes record the behavior of your network, so that you can analyze the causes of problems. ■ it reduces the load on the network and the management workstation traditional network management involves a management workstation polling network devices at regular interva...

  • Page 58

    60 c hapter 7: s tatus m onitoring and s tatistics alarm events you can define up to 200 alarms for the switch. The events that you can define for each alarm and their resulting actions are listed in table 5 . The default alarm settings a new or initialized switch has the following alarm(s) defined ...

  • Page 59

    Rmon and the switch 61 the audit log the switch keeps an audit log of all management user sessions, providing a record of a variety of changes, including ones relating to rmon. The log can only be read by users at the security access level using an snmp network management application. Each entry in ...

  • Page 60

    62 c hapter 7: s tatus m onitoring and s tatistics you can configure the email address to which you wish the notifications to be sent. However, you cannot change the factory default notification messages for event emails. Rmon traps continue to be sent, in addition to any email notifications you may...

  • Page 61

    Hardware status monitoring 63 figure 15 example cli screen text figure 16 example of an individual unit system summary screen ■ via the web. On the web interface, an indication of a general hardware failure will be provided through the top-level system summary information screen. You should refer to...

  • Page 62

    64 c hapter 7: s tatus m onitoring and s tatistics figure 17 example device summary web page ■ rmon trap see “events” on page 58 for details of this feature of your switch. ■ rmon event notification. Event notification for fan failure can be configured by the user; refer to “email notification of ev...

  • Page 63: Etting

    8 s etting u p v irtual lan s setting up virtual lans (vlans) on your switch reduces the time and effort required by many network administration tasks, and increases the efficiency of your network. This chapter explains more about the concept of vlans and explains how they can be implemented on your...

  • Page 64

    66 c hapter 8: s etting u p v irtual lan s figure 18 a network setup showing three vlans benefits of vlans the main benefit of vlans is that they provide a network segmentation system that is far more flexible than any traditional network. Using vlans also provides you with three other benefits: ■ v...

  • Page 65

    Vlans and your switch 67 ■ vlans help to control traffic with traditional networks, congestion can be caused by broadcast traffic that is directed to all network devices whether they require it or not. Vlans increase the efficiency of your network because each vlan can be set up to contain only thos...

  • Page 66

    68 c hapter 8: s etting u p v irtual lan s all the ports are initially placed in this vlan, and it is the only vlan that allows you to access the management software of the switch over the network. Communication between vlans if the devices placed in a vlan need to communicate to devices in a differ...

  • Page 67

    Vlans and your switch 69 the ieee 802.1q standard defines how vlans operate within an open packet-switched network. An 802.1q compliant packet carries additional information that allows a switch to determine to which vlan the port belongs. If a frame is carrying the additional information, it is kno...

  • Page 68

    70 c hapter 8: s etting u p v irtual lan s vlan configuration examples this section contains examples of simple vlan configurations. It describes how to set up your switch to support simple untagged and tagged connections. Using untagged connections the simplest vlan operates in a small network usin...

  • Page 69

    Vlan configuration examples 71 2 add ports to the vlans add ports 10, 11 and 12 of the switch as untagged members to vlan 2. Using 802.1q tagged connections in a network where the vlans are distributed amongst more than one switch, you must use 802.1q tagged connections so that all vlan traffic can ...

  • Page 70

    72 c hapter 8: s etting u p v irtual lan s 3 add port 12 on switch 1 to the vlans add port 12 on switch 1 as a tagged member of both vlans 1 and 2 so that all vlan traffic is passed over the link to switch 2. 4 configure the vlans on switch 2 define vlan 2. Vlan 1 is the default vlan and already exi...

  • Page 71: Sing

    9 u sing a utomatic ip c onfiguration this chapter explains more about ip addresses and how the automatic configuration option works. It covers the following topics: ■ how your switch obtains ip information ■ how automatic ip configuration works ■ important considerations for detailed information on...

  • Page 72

    74 c hapter 9: u sing a utomatic ip c onfiguration how your switch obtains ip information you can use one of the following methods to allocate ip information to your switch (essential if you wish to manage your switch across the network): ■ automatic ip configuration (default) — the switch tries to ...

  • Page 73

    How automatic ip configuration works 75 automatic process to detect its ip information using the automatic configuration process, the switch goes through the following sequence of steps: 1 the dhcp client that resides in the switch makes up to four attempts to contact a dhcp server on the network re...

  • Page 74

    76 c hapter 9: u sing a utomatic ip c onfiguration important considerations this section contains some important points to note when using the automatic ip configuration feature. The dynamic nature of automatically configured ip information means that a switch may change its ip address whilst in use...

  • Page 75: Ppendices

    Ii a ppendices and i ndex appendix a configuration rules appendix b network configuration examples appendix c ip addressing glossary index.

  • Page 76

    78.

  • Page 77: Onfiguration

    A c onfiguration r ules configuration rules for gigabit ethernet gigabit ethernet is designed to run over several media: ■ single-mode fiber optic cable, with connections up to 5 km (3.1 miles). Support for distances over 5 km is supported depending on the module specification. ■ multimode fiber opt...

  • Page 78

    80 a ppendix a: c onfiguration r ules configuration rules for fast ethernet the topology rules for 100 mbps fast ethernet are slightly different to those for 10 mbps ethernet. Figure 22 illustrates the key topology rules and provides examples of how they allow for large-scale fast ethernet networks....

  • Page 79

    Configuration rules for fast ethernet 81 collapsed backbone). For example, a 225 m (738 ft) fiber link from a repeater to a router or switch, plus a 100 m (328 ft) utp link from a repeater out to the endstations. Configuration rules with full duplex the switch provides full duplex support for all it...

  • Page 80

    82 a ppendix a: c onfiguration r ules.

  • Page 81: Etwork

    B n etwork c onfiguration e xamples this chapter contains the following sections: ■ simple network configuration examples ■ segmentation switch example ■ desktop switch example ■ advanced network configuration examples ■ improving the resilience of your network ■ enhancing the performance of your ne...

  • Page 82

    84 a ppendix b: n etwork c onfiguration e xamples simple network configuration examples the following illustrations show some simple examples of how the switch 4200 series and 4900 series can be used in your network. Segmentation switch example the example in figure 23 shows how a 10/100 switch, suc...

  • Page 83

    Simple network configuration examples 85 desktop switch example the example in figure 24 shows how the switch 4200 series can be used for a group of users that require dedicated 10 mbps or 100 mbps connections to the desktop. The switch 4200 series stack has a 1000base-t module fitted that allows it...

  • Page 84

    86 a ppendix b: n etwork c onfiguration e xamples advanced network configuration examples this section shows some network examples that illustrate how you can set up your network for optimum performance using some of the features supported by your switch. Improving the resilience of your network fig...

  • Page 85

    Advanced network configuration examples 87 enhancing the performance of your network figure 26 shows how you can set your network up to enhance its performance. All ports are auto-negotiating and smart auto-sensing and will therefore pass data across the network at the optimum available speed and du...

  • Page 86

    88 a ppendix b: n etwork c onfiguration e xamples.

  • Page 87: Ip A

    C ip a ddressing this chapter provides some background detail on the ip information that needs to be assigned to your switch to enable you to manage it across a network. The topics covered are: ■ ip addresses ■ subnets and subnet masks ■ default gateways ip addressing is a vast topic and there are w...

  • Page 88

    90 a ppendix c: ip a ddressing 192.168.100.X (where x is a number between 1 and 254) with a subnet mask 255.255.255.0. If you are using slip, use the default slip address of 192.168.101.1 with a subnet mask of 255.255.255.0. These suggested ip addresses are part of a group of ip addresses that have ...

  • Page 89

    Ip addresses 91 dotted decimal notation the actual ip address is a 32-bit number that is stored in binary format. These 32 bits are segmented into 4 groups of 8 bits — each group is referred to as a field or an octet. Decimal notation converts the value of each field into a decimal number, and the f...

  • Page 90

    92 a ppendix c: ip a ddressing subnets and subnet masks you can divide your ip network into sub-networks also known as subnets. Support for subnets is important because the number of bits assigned to the device part of an ip address limits the number of devices that may be addressed on any given net...

  • Page 91

    Subnets and subnet masks 93 as shown in this example, the 32 bits of an ip address and subnet mask are usually written using an integer shorthand. This notation translates four consecutive 8-bit groups (octets) into four integers that range from 0 through 255. The subnet mask in the example is writt...

  • Page 92

    94 a ppendix c: ip a ddressing the subnet mask 255.255.255.255 is reserved as the default broadcast address. Default gateways a gateway is a device on your network which is used to forward ip packets to a remote destination. An alternative name for a gateway is a router. “remote” refers to a destina...

  • Page 93: Lossary

    G lossary 3com network supervisor the 3com network management application used to manage 3com’s networking solutions. 10base-t the ieee specification for 10 mbps ethernet over category 3, 4 or 5 twisted pair cable. 100base-fx the ieee specification for 100 mbps fast ethernet over fiber-optic cable. ...

  • Page 94

    96 g lossary fast ethernet is 100 mbps, and the bandwidth of gigabit ethernet is 1000 mbps. Baud the signalling rate of a line, that is, the number of transitions (voltage or frequency changes) made per second. Also known as line speed. Bootp the bootp protocol allows you to automatically map an ip ...

  • Page 95

    97 dhcp dynamic host control protocol. A protocol that lets you centrally manage and automate the assignment of internet protocol (ip) addresses in an organization's network. Dns domain name system. This system maps a numerical internet protocol (ip) address to a more meaningful and easy-to-remember...

  • Page 96

    98 g lossary gateway see router. Gbic gigabit interface converter. Gigabit ethernet ieee standard 802.3z for 1000 mbps ethernet; it is compatible with existing 10/100 mbps ethernet standards. Half duplex a system that allows packets to transmitted and received, but not at the same time. Contrast wit...

  • Page 97

    99 internet group management protocol internet group management protocol (igmp) is a protocol that runs between hosts and their immediate neighboring multicast routers. The protocol allows a host to inform its local router that it wishes to receive transmissions addressed to a specific multicast gro...

  • Page 98

    100 g lossary loop an event that occurs when two network devices are connected by more than one path, thereby causing packets to repeatedly cycle around the network and not reach their destination. Mac media access control. A protocol specified by the ieee for determining which devices have access t...

  • Page 99

    101 post power on self test. An internal test that a switch carries out when it is powered-up. Qos profile consists of multiple sets of rules (classifier plus service level combinations). The qos profile is assigned to a port(s). Protocol a set of rules for communication between devices on a network...

  • Page 100

    102 g lossary standard service levels, for example, best effort, business critical, network control, and so on. Slip serial line internet protocol. A protocol that allows ip to run over a serial line (console port) connection. Smtp simple mail transfer protocol. An ietf standard protocol used for tr...

  • Page 101

    103 tcp relates to the content of the data travelling through a network — ensuring that the information sent arrives in one piece when it reaches its destination. Ip relates to the address of the endstation to which data is being sent, as well as the address of the destination network. Telnet a tcp/...

  • Page 102

    104 g lossary.

  • Page 103: Ndex

    I ndex numbers 802.1d priority levels 52 traffic classification 52 802.1q tagging 69 a addresses classes 91 ip 89 aggregated links 16, 24 example 30 aging time, definition 50 alarm events 60 alarm settings, default 60 alarms (rmon group) 58, 59 audit log 61 auto-ip 16, 74 automatic ip configuration ...

  • Page 104

    106 i ndex internic 90 ip (internet protocol) addresses 90 ip address 16, 74, 89 classes of 91 defined 90 derivation 90 division of network and host 90 example 92 obtaining 90 subnet mask 92 subnetwork portion 92 ip multicast addressing 33 ip routing address classes 91 l learned sdb entries 50 m mac...

  • Page 105

    I ndex 107 defined 92 example 92 numbering 93 subnets 92 subnetworking defined 92 subnet mask 92 sub-networks. See subnets switch database 49 t topology rules for fast ethernet 80 topology rules with full duplex 81 traffic classification 802.1d 52 traffic prioritization 51 802.1d 52 v vlans 65 802.1...