3Com SuperStack 3C17300 Implementation Manual

4200 series
Hide thumbs Also See for SuperStack 3C17300:
Table of Contents

Advertisement

SuperStack
Switch 4200 Series
Implementation Guide
Generic guide for units in the SuperStack 3 Switch 4200 Series:
3C17300
3C17302
3C17304
http://www.3com.com/
Part No. DUA1730-0BAA02
Published November 2002
3
®

Advertisement

Table of Contents
loading

Summary of Contents for 3Com SuperStack 3C17300

  • Page 1 SuperStack ® Switch 4200 Series Implementation Guide Generic guide for units in the SuperStack 3 Switch 4200 Series: 3C17300 3C17302 3C17304 http://www.3com.com/ Part No. DUA1730-0BAA02 Published November 2002...
  • Page 2 Software is delivered as “Commercial Computer Software” as defined in DFARS 252.227-7014 (June 1995) or as a “commercial item” as defined in FAR 2.101(a) and as such is provided with only such rights as are provided in 3Com’s standard commercial license for the Software. Technical data is provided with limited rights only as provided in DFAR 252.227-7015 (Nov 1995) or FAR 52.227-14 (June 1987), whichever is applicable.
  • Page 3: Table Of Contents

    EATURES VERVIEW What is Management Software? Switch Features Explained Automatic IP Configuration Port Security Aggregated Links Auto-negotiation Multicast Filtering Spanning Tree Protocol and Rapid Spanning Tree Protocol Switch Database Traffic Prioritization RMON Broadcast Storm Control VLANs PTIMIZING ANDWIDTH Port Features...
  • Page 4 STP Calculation STP Configuration STP Reconfiguration How RSTP Differs to STP STP Example STP Configurations Using STP on a Network with Multiple VLANs SING THE WITCH ATABASE What is the Switch Database? How Switch Database Entries Get Added Switch Database Entry States...
  • Page 5 Benefits of VLANs VLANs and Your Switch The Default VLAN Communication Between VLANs Creating New VLANs VLANs: Tagged and Untagged Membership Placing a Port in a Single VLAN VLAN Configuration Examples Using Untagged Connections Using 802.1Q Tagged Connections IP C SING...
  • Page 6 ETWORK ONFIGURATION XAMPLES Simple Network Configuration Examples Segmentation Switch Example Desktop Switch Example Advanced Network Configuration Examples Improving the Resilience of Your Network Enhancing the Performance of Your Network IP A DDRESSING IP Addresses Simple Overview Advanced Overview Subnets and Subnet Masks...
  • Page 7: About This Guide

    ® This guide describes the features of the SuperStack 3 Switch 4200 Series and outlines how to use these features to optimize the performance of your network. This guide is intended for the system or network administrator who is responsible for configuring, using, and managing the Switch. It assumes...
  • Page 8: Conventions

    Return or Enter. Do not press Return or Enter when an instruction simply says “type.” Keyboard key names If you must press two or more keys simultaneously, the key names are linked with a plus sign (+). Example:...
  • Page 9: Related Documentation

    Documentation following: Getting Started Guide This guide contains: all the information you need to install and set up the Switch in its default state information on how to access the management software to begin managing the Switch. Management Interface Reference Guide...
  • Page 10: Product Registration

    Page 25 Please note that we can only respond to comments and questions about 3Com product documentation at this e-mail address. Questions related to technical support or sales should be directed in the first instance to your network supplier. Product...
  • Page 11: Switch Features Overview

    Switch Features Overview Chapter 2 Optimizing Bandwidth Chapter 3 Using Multicast Filtering Chapter 4 Using Resilience Features Chapter 5 Using the Switch Database Chapter 6 Using Traffic Prioritization Chapter 7 Status Monitoring and Statistics Chapter 8 Setting Up Virtual LANs Chapter 9...
  • Page 13: What Is Management Software

    HTML format on the CD-ROM that accompanies your Switch. What is Your Switch can operate in its default state. However, to make full use of Management the features offered by the Switch, and to change and monitor the way it...
  • Page 14: Automatic Ip Configuration

    169.254.100.100 if it is operating in standalone mode, and/or no other Switches on the network have this IP address. If this default IP address is already in use on the network then the Switch detects this and configures itself with an IP address in the range 169.254.1.0 to 169.254.254.255.
  • Page 15: Auto-Negotiation

    All Switch ports support flow control, which is a mechanism that minimizes packet loss during periods of congestion on the network. Flow control is supported on ports operating in half duplex mode, and is implemented using the IEEE 802.3x standard on ports operating in full duplex mode.
  • Page 16: Spanning Tree Protocol And Rapid Spanning Tree Protocol

    Features”. Switch Database The Switch Database is an integral part of the Switch and is used by the Switch to determine if a packet should be forwarded, and which port should transmit the packet if it is to be forwarded.
  • Page 17: Rmon

    Switch without being delayed by lower priority data. Traffic prioritization uses the two traffic queues that are present in the hardware of the Switch to ensure that high priority traffic is forwarded on a different queue from lower priority traffic. High priority traffic is given preference over low priority traffic to ensure that the most critical traffic gets the highest level of service.
  • Page 18: Broadcast Storm Control

    VLANs A Virtual LAN (VLAN) is a flexible group of devices that can be located anywhere in a network, but which communicate as if they are on the same physical segment. With VLANs, you can segment your network without being restricted by physical connections —...
  • Page 19: Optimizing Bandwidth

    In normal operation, you do not need to alter the Switch from its default state. However, under certain conditions you may wish to alter the default state of these ports, for example, if you want to force a port to operate at 10 Mbps.
  • Page 20: Flow Control

    All Switch ports support flow control, which is a mechanism that minimizes packet loss during periods of congestion on the network. Packet loss is caused by one or more devices sending traffic to an already overloaded port on the Switch. Flow control minimizes packet loss by inhibiting the transmitting port from generating more packets until the period of congestion ends.
  • Page 21: Smart Auto-Sensing

    100 Mbps to provide an error-free 100 Mbps connection to the network. An SNMP Trap is sent every time a port is down-rated to a lower speed. Conditions that affect smart auto-sensing: Smart auto-sensing will not operate on links that do not support auto-negotiation, or on links where one end is at a fixed speed.
  • Page 22: Aggregated Links

    If a member link in an aggregated link fails, the traffic using that link is dynamically reassigned to the remaining member links in the aggregated link.
  • Page 23: Implementing 802.3Ad Aggregated Links

    Figure 3, if a port on Switch C is physically connected to Switch B, but you manually configure the port on Switch C to be a member of an aggregated link for Switch A in error, LACP (if it is enabled) will detect this and place the port in the aggregated link for Switch B, thus overriding the manual configuration.
  • Page 24 The Spanning Tree costs for a port running LACP is the cost assigned for an aggregated link running at that speed. As required by the IEEE 802.3ad standard, no changes in cost are made according to the number...
  • Page 25: Aggregated Links And Your Switch

    When multiple links of different speed connect two devices only the highest speed links will be aggregated. The other links will be held in a standby state until there is a problem with a higher speed link(s). The lower speed link(s) will then become active.
  • Page 26 To be an active participant in an aggregated link the member link ports must operate in full duplex mode. (If a member link port does not operate in full duplex mode it can still be a member of an aggregated link but it will never be activated.) If ports of a different speed are aggregated together, the higher speed links carry the traffic.
  • Page 27 To gather statistics about an aggregated link, you must add together the statistics for each port in the aggregated link. If you wish to disable a single member link of an aggregated link, you must first physically remove the connection to ensure that you do not lose any traffic, before you disable both ends of the member link separately.
  • Page 28: Aggregated Link Example

    Single-to-multiple endstation conversations, on the other hand, may still take place over different ports. If the link state on any of the ports in an aggregated link becomes inactive due to link failure, then the Switch will automatically redirect the aggregated link traffic to the remaining ports.
  • Page 29 6 Connect the 1000BASE-T port marked ‘Down’ on the upper Switch to the 1000BASE-T port marked ‘Down’ on the lower Switch. 7 Connect the GBIC port marked ‘27’ on the upper Switch to the GBIC port marked ‘27’ on the lower Switch.
  • Page 30 2: O HAPTER PTIMIZING ANDWIDTH...
  • Page 31: Using Multicast Filtering

    Users explicitly request to participate in the communication by joining an endstation to a specific multicast group. If the network is set up correctly, a multicast can only be sent to an endstation or a subset of endstations in a LAN, or VLAN, that belong to the relevant multicast group.
  • Page 32: Benefits Of Multicast

    Enables the simultaneous delivery of information to many receivers in the most efficient, logical way. Reduces the load on the source (for example, a server) because it does not have to produce multiple copies of the same data. Makes efficient use of network bandwidth and scales well as the number of participants or collaborators expands.
  • Page 33: Multicast Filtering And Your Switch

    Query Mode Query mode allows the Switch to function as the Querier if it has the lowest IP address in the subnetwork to which it belongs. IGMP querying is disabled by default on the Switch 4200 Series. This helps prevent interoperability issues with core products that may not follow the lowest IP address election method.
  • Page 34: Igmp Multicast Filtering

    IP address becomes the querier. The Switch can be the IGMP querier and will become so if its own IP address is lower than that of any other IGMP queriers connected to the LAN or VLAN. However, as the Switch only has an IP address on its default VLAN, the Switch will only ever query on the default VLAN (VLAN1).
  • Page 35 IGMP Multicast Filtering Management Interface Reference Guide supplied on your Switch CD-ROM. If IGMP multicast learning is not enabled then IP multicast traffic is always forwarded, that is, it floods the network. For information about configuring IGMP functionality on an endstation, refer to the user documentation supplied with your endstation or the endstation’s Network Interface Card (NIC).
  • Page 36 3: U HAPTER SING ULTICAST ILTERING...
  • Page 37: Using Resilience Features

    The Spanning Tree Protocol (STP) makes your network more resilient to Protocol (STP) link failure and also provides a protection from loops — one of the major causes of broadcast storms. STP is enabled by default on your Switch. To be fully effective, STP must be enabled on all Switches in your network.
  • Page 38: Rapid Spanning Tree Protocol (Rstp)

    RSTP (or STP) will detect any misconfiguration that may cause a temporary loop and react accordingly. If you have Fast Start disabled on a port, the Switch will wait for 30 seconds before RSTP (or STP) lets the port forward traffic.
  • Page 39 What is STP? Enable one of the less efficient paths if the most efficient path fails. RSTP provides the same functionality as STP. For details on how the two systems differ, see “How RSTP Differs to STP” page As an example,...
  • Page 40 Once the most efficient path has been determined, all other paths are blocked. Therefore, in Figure 7, Figure 8, and Figure 9, STP initially determined that the path through Bridge C was the most efficient, and so blocked the path through Bridge B.
  • Page 41: How Stp Works

    Aggregated Link 10,000* * This path cost is correct where there are two ports in an aggregated link. However, if there are more ports in the aggregated link, the path cost will be proportionately lower. For example, if there are four ports in the aggregated link, the 802.1w path costs will be: 500,000 for 10 Mbps, 50,000 for 100 Mbps, and 5,000 for 1000 Mbps.
  • Page 42: Stp Configuration

    Bridge is the central reference point from which the network is configured. The Root Path Costs for each bridge — that is, the cost of the paths from each bridge to the Root Bridge. The identity of the port on each bridge that is to be the Root Port.
  • Page 43: How Rstp Differs To Stp

    How STP Works How RSTP Differs to RSTP works in a similar way to STP, but it includes additional information in the BPDUs. This information allows each bridge to confirm that it has taken action to prevent loops from forming when it wants to enable a link to a neighbouring bridge.
  • Page 44: Stp Configurations

    LAN segment 1. Port 1 on Bridge A is therefore selected as the Designated Bridge Port for LAN Segment 1. Port 1 of Bridges B, C, X and Y have been defined as Root Ports because they are the nearest to the Root Bridge and therefore have the most efficient path.
  • Page 45 How STP Works Figure 11 STP configurations...
  • Page 46: Using Stp On A Network With Multiple Vlans

    VLANs 1 and 2. They are connected using the 802.1Q-tagged link between Switch B and Switch C. By default, this link has a path cost of 100 and is automatically blocked because the other Switch-to-Switch connections have a path cost of 36 (18+18).
  • Page 47: Using The Switch Database

    The Switch Database is used by the Switch to determine where a packet Database? should be forwarded to, and which port should transmit the packet if it is to be forwarded. The database contains a list of entries — each entry contains three items: MAC (Ethernet) address information of the endstation that sends packets to the Switch.
  • Page 48: Switch Database Entry States

    Learned entries are removed from the Switch Database if the Switch is reset or powered-down. Non-aging learned — If the aging time is set to 0 seconds, all learned entries in the Switch Database become non-aging learned entries. This means that they are not aged out, but they are still removed from the database if the Switch is reset or powered-down.
  • Page 49: Using Traffic Prioritization

    For a list of the features supported by your Switch, please refer to the Management Quick Reference Guide that accompanies your Switch. For detailed descriptions of the web interface operations and the...
  • Page 50: How Traffic Prioritization Works

    DiffServ code point (classification is done at layer 3 of the OSI model). 802.1D traffic At layer 2, a traffic service class is defined in 802.1Q frame, which is able classification to carry VLAN identification and user priority information. The information is carried in a header field immediately following the destination MAC address, and Source MAC address.
  • Page 51: Diffserv Traffic Classification

    DiffServ is an alternative method of classifying traffic so that different classification levels of service can be applied to it on a network. DiffServ is a layer 3 function; and the service to be applied is contained within the DSCP field,...
  • Page 52: Traffic Prioritization And Your Switch

    Figure 14 illustrates how DiffServ code point (DSCP) service levels are mapped to the two Traffic Queues. The DSCP service level of the packet is not altered by the Switch 4200 Series. Traffic Prioritization The traffic should be marked as it enters the network; the marking can be...
  • Page 53 Switch is the main tool for configuring QoS, and 3Com recommends that you use this application to configure QoS. You can also configure QoS via the command line interface (CLI), for a is a detailed description of the commands that you require refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM that accompanies your Switch.
  • Page 54 3 Create Profiles The next step is to create a profile, which associates classifiers with service levels. 4 Apply Qos profile After a QoS profile has been created, it can be assigned to the Port(s). When the profile is assigned to the port(s), the...
  • Page 55: Status Monitoring And Statistics

    TATUS ONITORING AND TATISTICS This chapter contains details of the features that assist you with status monitoring and statistics. For detailed descriptions of the web interface operations and the command line interface (CLI) commands that you require to manage the Switch please refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM that accompanies your Switch.
  • Page 56: The Rmon Groups

    The Events group provides you with the ability to create entries in an event log and send SNMP traps to the management workstation. Events are the action that can result from an RMON alarm. In addition to the standard five traps required by SNMP (link up, link down, warm start, cold start, and authentication failure), RMON adds two more: rising threshold and falling threshold.
  • Page 57: Rmon And The Switch

    RMON and the Switch addition, probes record the behavior of your network, so that you can analyze the causes of problems. It reduces the load on the network and the management workstation Traditional network management involves a management workstation polling network devices at regular intervals to gather statistics and identify problems or trends.
  • Page 58: Alarm Events

    HAPTER TATUS ONITORING AND TATISTICS Alarm Events You can define up to 200 alarms for the Switch. The events that you can define for each alarm and their resulting actions are listed in Table Table 5 Alarm Events Event Action...
  • Page 59: The Audit Log

    The Switch keeps an audit log of all management user sessions, providing a record of a variety of changes, including ones relating to RMON. The log can only be read by users at the security access level using an SNMP Network Management application.
  • Page 60: Hardware Status Monitoring

    Unit powers up. Unit in the stack fails. Fan in the unit fails. A link fails or returns to service — you can select specific links that you wish to receive messages for, for example, a mission-critical link to a server.
  • Page 61 Select menu option (system) : Via the web. On the Web interface, an indication of a general hardware failure will be provided through the top-level System Summary information screen. You should refer to the detailed Device Summary Web page, Figure...
  • Page 62 RMON Trap “Events” page 58 for details of this feature of your Switch. RMON Event Notification. Event Notification for fan failure can be configured by the User; refer “Email Notification of Events” on page page 61 for details of this...
  • Page 63: Setting U P Virtual Lans

    HTML format on the CD-ROM that accompanies your Switch. What are VLANs? A VLAN is a flexible group of devices that can be located anywhere in a network, but which communicate as if they are on the same physical segment.
  • Page 64: Benefits Of Vlans

    With a VLAN setup, if an endstation in VLAN Marketing for example is moved to a port in another part of the network, and retains its original subnet membership, you only need to specify that the new port is in VLAN Marketing.
  • Page 65: Vlans And Your Switch

    IEEE 802.1Q tagged packet (that is, the packet that contains a VLAN ID) is received at a port and that port is NOT a member of that VLAN, the Switch does not perform any VLAN filtering. As a result a tagged packet will be forwarded if the address has been previously learned by the Switch.
  • Page 66: Communication Between Vlans

    8: S HAPTER ETTING IRTUAL All the ports are initially placed in this VLAN, and it is the only VLAN that allows you to access the management software of the Switch over the network. Communication If the devices placed in a VLAN need to communicate to devices in a...
  • Page 67: Placing A Port In A Single Vlan

    VLAN IDs are global across the network). 2 Place the Switch ports in the required VLANs as tagged members. 3 Place the port at the other end of the link as a tagged member of the same VLANs as the port on your Switch.
  • Page 68: Vlan Configuration Examples

    Switch connected to endstations and servers using untagged connections. Ports 1, 2 and 3 of the Switch belong to VLAN 1, ports 10, 11 and 12 belong to VLAN 2. VLANs 1 and 2 are completely separate and cannot communicate with each other.
  • Page 69: Using 802.1Q Tagged Connections

    VLAN Configuration Examples 2 Add ports to the VLANs Add ports 10, 11 and 12 of the Switch as untagged members to VLAN 2. Using 802.1Q Tagged In a network where the VLANs are distributed amongst more than one Connections Switch, you must use 802.1Q tagged connections so that all VLAN traffic...
  • Page 70 IRTUAL 3 Add port 12 on Switch 1 to the VLANs Add port 12 on Switch 1 as a tagged member of both VLANs 1 and 2 so that all VLAN traffic is passed over the link to Switch 2.
  • Page 71: Using Automatic Ip Configuration

    SING UTOMATIC ONFIGURATION This chapter explains more about IP addresses and how the automatic configuration option works. It covers the following topics: How Your Switch Obtains IP Information How Automatic IP Configuration Works Important Considerations For detailed information on setting up your Switch for management, see the Getting Started Guide that accompanies your Switch.
  • Page 72: How Your Switch Obtains Ip Information

    Manual IP Configuration — you can manually input the IP information (IP address, subnet mask, and default gateway). If you select an option for no IP configuration the Switch will not be accessible from a remote management workstation on the LAN. In addition, the Switch will not be able to respond to SNMP requests.
  • Page 73: Automatic Process

    To detect its IP information using the automatic configuration process, the Switch goes through the following sequence of steps: 1 The DHCP client that resides in the Switch makes up to four attempts to contact a DHCP server on the network requesting IP information from the server.
  • Page 74: Important Considerations

    DHCP or BOOTP servers are operating normally before you power on your Switch. Event Log Entries An event log will be generated and an SNMP trap will be sent if any of and Traps the following changes occur in the IP configuration:...
  • Page 75 PPENDICES AND NDEX Appendix A Configuration Rules Appendix B Network Configuration Examples Appendix C IP Addressing Glossary Index...
  • Page 77: A Configuration Rules

    (3.1 miles). Support for distances over 5 km is supported depending on the module specification. Multimode fiber optic cable, with connections up to 550 m (1804 ft). Category 5 cabling, with connections up to 100 m (328 ft). The different types of Gigabit Ethernet media and their specifications are...
  • Page 78: Configuration Rules For Fast Ethernet

    Figure 22 Fast Ethernet configuration rules The key topology rules are: Maximum UTP cable length is 100 m (328 ft) over Category 5 cable. A 412 m (1352 ft) fiber link is allowed for connecting switch-to-switch, or endstation-to-switch, using half-duplex 100BASE-FX.
  • Page 79: Configuration Rules With Full Duplex

    Configuration Rules for Fast Ethernet collapsed backbone). For example, a 225 m (738 ft) fiber link from a repeater to a router or switch, plus a 100 m (328 ft) UTP link from a repeater out to the endstations. Configuration Rules...
  • Page 80 A: C PPENDIX ONFIGURATION ULES...
  • Page 81: N Etwork C Onfiguration

    ETWORK ONFIGURATION XAMPLES This chapter contains the following sections: Simple Network Configuration Examples Segmentation Switch Example Desktop Switch Example Advanced Network Configuration Examples Improving the Resilience of Your Network Enhancing the Performance of Your Network...
  • Page 82: Network Configuration Examples

    10/100 Switch, such as the Switch Example 4200 Series stack, can segment a network of shared 10 Mbps and 100 Mbps connections. There is a 10/100 shared segment on each floor, and these segments are connected to the Switch which is positioned in the basement.
  • Page 83: Desktop Switch Example

    Switch 4200 Series can be used Example for a group of users that require dedicated 10 Mbps or 100 Mbps connections to the desktop. The Switch 4200 Series stack has a 1000BASE-T Module fitted that allows it to provide a Gigabit Ethernet link to a Switch 4900 in the basement.
  • Page 84: Advanced Network Configuration Examples

    Spanning Tree Protocol (STP). Aggregated links Network have also been setup from the Core Switch, this increases the bandwidth available for the backbone connection, and also provides extra resilience. Figure 25 Network set up to provide resilience...
  • Page 85: Enhancing The Performance Of Your Network

    Network All ports are auto-negotiating and smart auto-sensing and will therefore pass data across the network at the optimum available speed and duplex mode. Flow control will help avoid packet loss during periods of network congestion. A Gigabit Ethernet backbone is set up between the Switch 4900 and each Switch in the workgroups to increase the bandwidth, and therefore the overall network performance.
  • Page 86 B: N PPENDIX ETWORK ONFIGURATION XAMPLES...
  • Page 87: Ip Addressing

    IP A DDRESSING This chapter provides some background detail on the IP information that needs to be assigned to your Switch to enable you to manage it across a network. The topics covered are: IP Addresses Subnets and Subnet Masks...
  • Page 88: Advanced Overview

    CAUTION: If your network has a connection to the external IP network, you must apply for a registered IP address. This registration system ensures that every IP address used is unique; if you do not have a registered IP address, you may be using an identical address to someone else and your network will not operate correctly.
  • Page 89 The actual IP address is a 32-bit number that is stored in binary format. These 32 bits are segmented into 4 groups of 8 bits — each group is referred to as a field or an octet. Decimal notation converts the value of each field into a decimal number, and the fields are separated by dots.
  • Page 90: Subnets And Subnet Masks

    The IP address can also contain a subnetwork part at the beginning of the host part of the IP address. Thus, you can divide a single Class A, B, or C network internally, allowing the network to appear as a single network to other external networks.
  • Page 91 Subnet and Host Apply the subnet mask Subnet mask 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 Result = subnet/host boundary Subnet Network...
  • Page 92: Default Gateways

    Default Gateways A gateway is a device on your network which is used to forward IP packets to a remote destination. An alternative name for a gateway is a Router. “Remote” refers to a destination device that is not directly attached to the same network segment as the source device.
  • Page 93: Glossary

    The 3Com network management application used to manage 3Com’s Supervisor networking solutions. 10BASE-T The IEEE specification for 10 Mbps Ethernet over Category 3, 4 or 5 twisted pair cable. 100BASE-FX The IEEE specification for 100 Mbps Fast Ethernet over fiber-optic cable.
  • Page 94 Carrier-sense Multiple Access with Collision Detection. The protocol defined in Ethernet and IEEE 802.3 standards in which devices transmit only after finding a data channel clear for a period of time. When two devices transmit simultaneously, a collision occurs and the colliding...
  • Page 95 Domain Name System. This system maps a numerical Internet Protocol (IP) address to a more meaningful and easy-to-remember name. When you need to access another device on your network, you enter the name of the device, instead of its IP address.
  • Page 96 Contrast with full duplex. A device that regenerates LAN traffic so that the transmission distance of that signal can be extended. Hubs are similar to repeaters, in that they connect LANs of the same type; however they connect more LANs than a repeater and are generally more sophisticated.
  • Page 97 The Protocol protocol allows a host to inform its local router that it wishes to receive transmissions addressed to a specific multicast group. Based on group membership information learned from the IGMP, a router is able to determine which if any multicast traffic needs to be forwarded to each of its subnetworks.
  • Page 98 A system that allows a network device to only forward multicast traffic to an endstation if it has registered that it would like to receive that traffic. Network Interface Card. A circuit board installed in an endstation that allows it to be connected to a network.
  • Page 99 Service Access Point. A well-defined location that identifies the user of services of a protocol entity. segment A section of a LAN that is connected to the rest of the network using a switch or bridge. server A computer in a network that is shared by multiple endstations. Servers provide endstations with access to shared network services such as computer files and printer queues.
  • Page 100 See Spanning Tree Protocol (STP). subnet mask A subnet mask is used to divide the device part of the IP address into two further parts. The first part identifies the subnet number. The second part identifies the device on that subnet.
  • Page 101 Switch. traffic classification Traffic can be classified using one or more of types of traffic classifiers. A classifier detects the packet attributes and classifies the traffic accordingly.
  • Page 102 LOSSARY...
  • Page 103 17, 22 Gigabit Ethernet configuration rules 79 glossary 95 bandwidth 21 BOOTP 16, 74 BPDUs. See Bridge Protocol Data Units Hardware Status Monitoring 62 Bridge Identifier 43 Hello BPDUs 44 Bridge Protocol Data Units 43 History (RMON group) 59...
  • Page 104 Switch 4200 55 division of network and host 90 example 92 creating profiles 56 obtaining 90 How traffic is processed to provide QoS 55 subnet mask 92 service levels 56 subnetwork portion 92 traffic classification 55...
  • Page 105 93 subnets 92 subnetworking defined 92 subnet mask 92 sub-networks. See subnets Switch Database 49 topology rules for Fast Ethernet 80 topology rules with full duplex 81 traffic classification 802.1D 52 traffic prioritization 51 802.1D 52 VLANs 65 802.1Q tagging 69...

This manual is also suitable for:

Superstack 3c17302Superstack 3c17304

Table of Contents