Page 1
SuperStack Switch 3226 and Switch 3250 Implementation Guide 3CR17500-91 3CR17501-91 http://www.3com.com/ Part No. DUA1750-0BAA01 Published December 2003 ®...
Page 2
3Com Corporation reserves the right to revise this documentation and to make changes in content from time USA 01752-3064 to time without obligation on the part of 3Com Corporation to provide notification of such revision or change. 3Com Corporation provides this documentation without warranty, term, or condition of any kind, either implied or expressed, including, but not limited to, the implied warranties, terms or conditions of merchantability, satisfactory quality, and fitness for a particular purpose.
ONTENTS BOUT UIDE Conventions Related Documentation Documentation Comments WITCH EATURES What is Management Software? Switch Features Explained Aggregated Links Auto-negotiation Configuration Save and Restore Multicast Filtering Rapid Spanning Tree Protocol Switch Database Traffic Prioritization Rate Limiting RMON Broadcast Storm Control...
Page 4
STP Example STP Configurations Using STP on a Network with Multiple VLANs SING THE WITCH What is the Switch Database? How Switch Database Entries Get Added Switch Database Entry States SING RAFFIC ANAGEMENT What is Traffic Prioritization? How Traffic Prioritization Works...
Page 5
Creating New VLANs VLANs: Tagged and Untagged Membership VLAN Configuration Examples Using Untagged Connections Using 802.1Q Tagged Connections SING UTOMATIC How Your Switch Obtains IP Information How Automatic IP Configuration Works Automatic Process Important Considerations Server Support TATISTICS IP C...
Page 6
Access Control Lists How Access Control List Rules Work Port Security What is Network Login? How Network Login Works Important Considerations What is Switch Management Login? Benefits of RADIUS Authentication How RADIUS Authentication Works Important Considerations What is RADIUS? IP R...
Page 7
ULES Configuration Rules for Gigabit Ethernet Configuration Rules for Fast Ethernet Configuration Rules with Full Duplex ETWORK ONFIGURATION Simple Network Configuration Example Desktop Switch Example Advanced Network Configuration Example Edge Switch Example IP A DDRESSING IP Addresses Simple Overview Advanced Overview...
The terms Switch 3226 and Switch 3250 are used when referring to the 3Com SuperStack 3 Switch 3226 and 3Com SuperStack 3 Switch 3250. The term Switch is used when referring to information that applies to both Switches.
BOUT UIDE Conventions Table 1 Table 1 Notice Icons Table 2 Text Conventions Convention Screen displays This typeface represents information as it appears on the <syntax> Commands The words “enter” and “type” Keyboard key names If you must press two or more keys simultaneously, the key Words in italics Table 2 list conventions that are used throughout this guide.
SuperStack 3 Switch 3226 and SuperStack 3 Switch 3250 Getting Started Guide This guide contains: all the information you need to install and set up the Switch in its default state information on how to access the management software to begin managing your Switch.
Page 12
Please include the following information when contacting us: Example: Please note that we can only respond to comments and questions about 3Com product documentation at this e-mail address. Questions related to technical support or sales should be directed in the first instance to your network supplier.
HTML format on the CD-ROM that accompanies your Switch. What is Your Switch can operate in its default state. However, to make full use of Management the features offered by the Switch, and to change and monitor the way it...
Aggregated links are connections that allow devices to communicate using multiple links in parallel. Your Switch supports one aggregated link using the two 10/100/1000 and SFP ports (25-26 on the Switch 3225, 49-50 on the Switch 3250). Aggregated links provide two benefits: The Switch implements the IEEE 802.3ad standard for link aggregation.
The Configuration Save and Restore feature allows the configuration of and Restore your Switch to be saved as a file on a remote server, or to be restored onto the Switch from a file on a remote server. The configuration information is stored in an ASCII text file.
CD-ROM that accompanies your Switch. Multicast Filtering Multicast filtering allows the Switch to forward multicast traffic to only the endstations that are part of a predefined multicast group, rather than broadcasting the traffic to the whole network.
Features”. Switch Database The Switch Database is an integral part of the Switch and is used by the Switch to determine if a packet should be forwarded, and which port should transmit the packet if it is to be forwarded.
For more information about VLANs, see LANs”. Automatic IP Your Switch can have its IP information automatically configured using a Configuration DHCP server. Alternatively, you can manually configure the IP information. For more information about how the automatic IP configuration feature...
Dynamic routing allows the Switch to adjust automatically to changes in network topology or traffic. Routing Information Protocol (RIP) RIP is a dynamic routing protocol that allows the Switch to adjust automatically to changes in network topology or traffic. Routes are calculated between networks automatically.
Command Line Interface (CLI) commands that you require to manage the Switch please refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM that accompanies your Switch. Port Features The default state for all the features detailed below provides the best configuration for most users.
Ports operating at 1000 Mbps support full duplex mode only. Flow Control All Switch ports support flow control, which is a mechanism that prevents packet loss during periods of congestion on the network. Packet loss is caused by one or more devices sending traffic to an already overloaded port on the Switch.
10/100 ports. When an SFP module is inserted it has priority over the 10/100/1000 port of the same number (25-26 on the Switch 3226, 49-50 on the Switch 3250). The corresponding 10/100/1000 port is disabled when an SFP module is present.
Page 24
In this example, if link 1 fails, the data flow between X and B is remapped to physical link 2. The re-mapping occurs as soon as the Switch detects that a member link has failed — almost instantaneously. As a result, aggregated link configurations are extremely resilient and fault-tolerant.
LACP) it will adopt the configuration settings of the aggregated link. When a port leaves an aggregated link its original configuration settings are restored. Your Switch supports a single aggregated link comprising: both 10/100/1000 ports both SFP ports one SFP port and one 10/100/1000 port A LinkUp / LinkDown trap will only be sent for individual links.
Page 26
If the link state on any of the ports in an aggregated link becomes inactive due to link failure, then the Switch will automatically redirect the A member link port can only belong to one aggregated link.
Add the ports 5 and 7 on the specified unit to the aggregated link. 2 Prepare ports 25 and 26 on the Switch 3226 (or ports 49 and 50 if you are configuring a Switch 3250) for aggregated links. To do this:...
Page 28
2: O HAPTER PTIMIZING ANDWIDTH 3 Connect port 5 on the core Switch to port 25 on the Switch 3226. 4 Connect port 7 on the upper Switch to port 26 on the Switch 3226.
Multicast filtering improves the performance of networks that carry multicast traffic. This chapter explains multicasts, multicast filtering, and how multicast filtering can be implemented on your Switch. It covers the following topics: For detailed descriptions of the Web interface operations and the...
3: U HAPTER SING ULTICAST A multicast packet is identified by the presence of a multicast group address in the destination address field of the packet’s IP header. Benefits of Multicast The benefits of using IP multicast are that it: There are situations where a multicast approach is more logical and efficient than a unicast approach.
The Switch 3226 and Switch 3250 are compatible with any device that conforms to the IGMP v2 protocol. The Switch does not support IGMP v3. If you have an IGMP v3 network, you should disable IGMP snooping for the Switch using the snoopMode command on the Web Interface.
3 When the report packet arrives at a port on a Switch with IGMP multicast learning enabled, the Switch learns that the port is to forward traffic for the multicast group and then forwards the packet to the router.
Page 33
The querier is always the device with the lowest IP address in the subnetwork. It can be a router or a Layer 2 switch. The network traffic flows most efficiently if the querier is the closest device to the sources of IP multicast traffic.
To further refine the IP multicast delivery process and maximize Multicast Filtering bandwidth efficiency, the Switch filters IP multicast packets on appropriate ports using a process called IGMP snooping. Both bridged interfaces and routed interfaces record which ports receive host IGMP...
— one of the major causes of broadcast storms. RSTP is enabled by default on your Switch. To be fully effective, RSTP or STP must be enabled on all Switches in your network.
SING ESILIENCE The protocol is a part of the IEEE Std 802.1w-2001, bridge specification. To explain RSTP more effectively, your Switch will be referred to as a bridge. Rapid Spanning Tree The Rapid Spanning Tree (RSTP) is an enhanced Spanning Tree feature.
Page 37
What is STP? As an example, Figure 5 shows a network containing three LAN segments separated by three bridges. With this configuration, each segment can communicate with the others using two paths. Without STP enabled, this configuration creates loops that cause the network to overload. Figure 5 A network configuration that creates loops Figure 6 shows the result of enabling STP on the bridges in the...
Bridge Identifier, the more likely the bridge is to become the Root Bridge. The Bridge Identifier is calculated using the MAC address of the bridge and a priority defined for the bridge. The default priority of your Switch is 32768. Figure 7, the STP process...
Each port to have a cost. This specifies the efficiency of each link, usually determined by the bandwidth of the link — the higher the cost, the less efficient the link. a Switch. Table 3 Default port costs Port Speed...
4: U HAPTER SING ESILIENCE EATURES bridge is configured to forward traffic only between its Root Port and the Designated Bridge Ports for the respective network segments. All other ports are blocked, which means that they are prevented from receiving or forwarding traffic.
Page 41
How STP Works Figure 8 Port costs in a network Bridge A has the lowest Bridge Identifier in the network, and has therefore been selected as the Root Bridge. Because Bridge A is the Root Bridge, it is also the Designated Bridge for LAN segment 1.
Configuration 2 — Redundancy through Meshed Backbone In this configuration, four Switch units are connected in a way that creates multiple paths between each one. STP discovers the duplicate paths and blocks two of the links. If an enabled link breaks, one of the disabled links becomes re-enabled, therefore maintaining connectivity.
Page 43
How STP Works Figure 9 STP configurations...
For example, are connected using the 802.1Q-tagged link between Switch B and Switch C. By default, this link has a path cost of 100 and is automatically blocked because the other Switch-to-Switch connections have a path cost of 36 (18+18). This means that both VLANs are now subdivided — VLAN...
What is the Switch The Switch Database is used by the Switch to determine where a packet Database? should be forwarded to, and which port should transmit the packet if it is to be forwarded. The database contains a list of entries — each entry contains three items:...
Databases entries can have three states: Entry States ATABASE Learned — The Switch has placed the entry into the Switch Database when a packet was received from an endstation. Note that: Learned entries are removed (aged out) from the Switch Database if the Switch does not receive further packets from that endstation within a certain period of time (the aging time).
Switch without being delayed by lower priority data. Traffic prioritization uses the four traffic queues that are present in the hardware of the Switch to ensure that high priority traffic is forwarded on a different queue from lower priority traffic. High priority traffic is given preference over low priority traffic to ensure that the most critical traffic gets the highest level of service.
How Traffic Prioritization Works The 802.1D standard specifies eight distinct levels of priority (0 to 7), each of which relates to a particular type of traffic. The priority levels and their traffic types are shown in Figure 11 in order of increasing priority. You cannot alter the mapping of priority levels 0 - 7 to the traffic queues.
The transmitting endstation tags a packet with source and destination port numbers. When the packet is received, the Switch places the packet in the queue that corresponds to the destination IP port number of the packet. If there is no priority set against the IP port number then the...
Figure 13 queues. Traffic Prioritization Your Switch sorts traffic based on Class of Service. It does not mark or and your Switch remark a packet with a tag, but prioritizes the packet based on its existing tag. Tags can be added to packets by either the originating device or another edge switch elsewhere on the network.
Configuring traffic prioritization CoS can be configured on your Switch using the Web interface or via the Command Line Interface (CLI). For a detailed description of the commands that you require to configure CoS refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM that accompanies your Switch.
Switch is limited rather than the traffic arriving at the Switch. This ensures that the traffic is prioritized before rate limiting is applied, and that the lowest priority packets are dropped first.
The workstation does not have to be on the same network as the Switch and can manage the Switch by in-band or out-of-band connections. The RMON Groups The IETF define groups of Ethernet RMON statistics.
Page 56
7: S HAPTER TATUS ONITORING AND TATISTICS Statistics The Statistics group provides traffic and error statistics showing packets, bytes, broadcasts, multicasts and errors on a LAN segment or VLAN. Information from the Statistics group is used to detect changes in traffic and error patterns in critical areas of your network.
Benefits of RMON Using the RMON features of your Switch has three main advantages: RMON and the The RMON support provided by your Switch 3226 and Switch 3250 is Switch detailed in Table 4 RMON support supplied by the Switch...
When using the RMON features of the Switch, note the following: Alarm Events You can define alarms for the Switch. The events that you can define for each alarm and their resulting actions are listed in Table 5 Alarm Events...
Setting up Virtual LANs (VLANs) on your Switch increases the efficiency of your network by dividing the LAN into logical, rather than physical, segments which are easier to manage. This chapter explains more about the concept of VLANs and explains how they can be implemented on your Switch.
Devices within each VLAN can only communicate with other devices in the same VLAN. If a device in VLAN Marketing needs to communicate with devices in VLAN Finance, the traffic must pass through a routing device or Layer 3 Switch. Switch B Finance Department...
The IEEE Std 802.1Q-1998 allows each port on your Switch to be placed The standard requires that you define the following information about each VLAN on your Switch before the Switch can use it to forward traffic: The Default VLAN A new or initialized Switch contains a single VLAN, the Default VLAN.
Page 62
VLANs on the switch and how an additional VLAN can be used to aggregate two VLANs. Figure 15 Two VLANs connected to a core switch using a third VLAN The Switch can also be used to route traffic between VLANs on a Layer 2 switch. Figure 16 shows how a Layer 3 switch can be used to redirect traffic from one VLAN to another.
The IEEE Std 802.1Q-1998 defines how VLANs operate within an open packet-switched network. An 802.1Q compliant packet carries additional information that allows a Switch to determine to which VLAN the port belongs. If a frame is carrying the additional information, it is known as...
The example shown in endstations and servers using untagged connections. Ports 1, 2 and 3 of the Switch belong to VLAN 1, ports 10, 11 and 12 belong to VLAN 2. VLANs 1 and 2 are completely separate and cannot communicate with each other.
2 Add ports to the VLANs Add ports 10, 11 and 12 of the Switch as untagged members to VLAN 2. You can use the Switch Web Interface to change VLAN configuration. VLAN configuration can be found at Bridge > VLAN.
Your Switch has two ways to obtain its IP address information: Obtains IP Information If you select an option for no IP configuration the Switch will not be accessible from a remote management workstation on the LAN. In addition, the Switch will not be able to respond to SNMP requests.
The dynamic nature of automatically configured IP information means that a Switch may change its IP address whilst in use. Your DHCP server may allow you to reserve an IP address so that your Switch will always be allocated the same IP address.
Page 69
Important Considerations If you want DHCP to be the method for automatic configuration, make sure that your DHCP servers are operating normally before you power on your Switch.
Page 70
9: U IP C HAPTER SING UTOMATIC ONFIGURATION...
Before enabling trusted IP 3Com recommends that you add the IP address of your management station to the list of trusted IP addresses. The trusted IP feature restricts network access to the management interfaces of the Switch.
10: M HAPTER AKING interface of the Switch using console port, even if you have denied all access to the Switch using the trusted IP feature. Securing Access to The Switch 3226 and Switch 3250 support HTTPS, allowing secure access the Web Interface to the Web interface of the Switch.
Certificate Authority (CA) but security will not be otherwise affected. If you cannot generate an X.509 certificate yourself, you can buy one from one of the Certifying Authorities or your ISP. Each Switch requires its own X.509 certificate. Securing Access to...
As a result of the above rule, the packet matches the parameters of the rule and will be blocked. Port Security The Switch 3226 and Switch 3250 support the following port security modes, which you can set for an individual port or a range of ports: ETWORK ECURE Packet destination IP address: 10.101.67.45...
Login? unblocking access on a per-port basis. When a client device attempts to connect to a Switch port, the user is challenged to provide their identity and authentication credentials in the form of a user name and password. The user information is then sent to a remote RADIUS server in the network for authentication.
This section contains some important considerations when using Network Considerations Login on the Switch 3226 and Switch 3250. ETWORK ECURE Figure 19. The Switch does not interpret or store this Network Access Client (Client Device) Authentication Information Before you enable Network Login you must ensure that: RADIUS has been configured on the Switch.
What is Switch If you intend to manage the Switch using the Web interface or the Management Command Line Interface, you need to log in with a valid user name and Login? password. For further information on managing the Switch, see the “Setting Up For Management”...
RADIUS server. The information is authenticated by the server and a valid user is allowed to login to the Switch. An invalid user will receive a reject response and is not allowed to login to the Switch.
Switch via the console port and continue to manage it. The Web interface and Telnet do not revert to the local database, and the user will not be able to log in to the Switch via the Web interface or Telnet.
RADIUS is defined in the RFCs 2865 and 2866, “Remote Authentication Dial-in User Service (RADIUS)” and “RADIUS Accounting”. Network Login, a method of port-based access control, and Switch Management Login, used to control administrative access, both utilize the RADIUS protocol.
For detailed descriptions of the web interface operations and the command line interface (CLI) commands that you require to manage the Switch please refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM supplied with your Switch or on the 3Com Web site. OUTING...
OUTING What is Routing? Routing distributes packets over potentially dissimilar networks. A router is the device that accomplishes this task. Your Switch, as a Layer 3 device, can act as a router. Routers typically: Routing in a Your Switch allows you to both perform routing and switching within Subnetworked your network.
What is IP Routing? An IP router, unlike a bridge, operates at the network layer of the OSI Reference Model. The network layer is also referred to as Layer 3. An IP router routes packets by examining the network layer address (IP address).
IP routers use the following elements to transmit packets: Router Interfaces A router interface connects the router to a subnetwork. On your Switch, more than one port can connect to the same subnetwork. Each router interface has an IP address and a subnet mask. This router interface address defines both the number of the network to which the router interface is attached and its host number on that network.
Figure 23 Routing Interfaces Network 1 158.101.1.1 = Interface 1 = Interface 2 = Interface 3 Routing Tables With a routing table, a router or host determines how to send a packet toward its ultimate destination. The routing table contains an entry for every learned and locally defined network.
If the destination MAC address is the internal router port on this Switch, the packet is routed (Layer 3). If the destination MAC address is not one of the router interfaces MAC addresses on this Switch, then the packet will be switched and is forwarded according to the IEEE 802.1D protocol.
This model allows the Switch to route the packet first, and then if the packet cannot be routed, give the packet to Layer 2 to be bridged by the VLAN. This scheme gives you the flexibility to define router interfaces on top of several bridge ports.
This is not a user configurable parameter. VLAN interface index — The number of the VLAN that is associated with the IP interface. When the Switch prompts you for this option, the menu identifies the available VLAN indexes. ) or unavailable (...
Page 89
Flush the ARP cache regularly if you set the age time to 0. Set up a default route. The Switch uses the default route to forward packets that do not match any other routing table entry. You may want to use the default route in place of routes to numerous destinations that all have the same gateway IP address.
Basic RIP Parameters There are several parameters to consider when you set up RIP for your network. When you configure an IP interface, the Switch already has the RIP parameters set to the defaults listed in Static routes take precedence over dynamically learned routes to the same destination.
Send Mode Receive Mode Poison Reverse Advertisement Address * These RIP parameters apply to the entire Switch. All other parameters are defined per interface. † The Cost value cannot be altered, it is fixed at 1. Router Mode The available settings for router mode are as follows: Disabled —...
Page 92
RIP-2 updates. RIPv1OrRIPv2 – Both RIP-1 and RIP-2 route information can be received by the Switch. doNotSend – The Switch will not broadcast (or advertise) RIP updates. doNotReceive – The Switch does not process (or passively learn) incoming RIP packets.
RIP-2 can do this because it includes a subnet mask in its header. If your Switch receives a RIP-2 packet, it puts the route into the routing table with the subnet mask that was advertised.
IP addresses to make routing decisions while it uses MAC addresses to forward packets from one hop to the next. You do not need to implement ARP — the Switch has ARP capability built in, but you can change and display the contents of the ARP cache.
Page 95
Figure 25 Example of an ARP Cache ARP cache IP address 158.101.1.1 158.101.2.1 If the IP address does not have a corresponding MAC address, the host or router broadcasts an ARP request packet to all the devices on the network. The ARP request contains information about the target and source addresses for the protocol (IP addresses).
When ARP proxy is enabled and a workstation sends an ARP request for a remote network, the Switch determines if it has the best route and then answers the ARP request by sending its own MAC address to the workstation.
With ICMP, you can determine whether a delivery failure resulted from a local or a remote problem. Advanced IP Your Switch has several features which further extend the networking Routing Options capabilities of the device. Refer to the following: 158.101.1.2...
Configuration Rules Gigabit Ethernet is designed to run over several media: for Gigabit Ethernet The different types of Gigabit Ethernet media and their specifications are detailed in Table 8 Gigabit Ethernet cabling ONFIGURATION Single-mode fiber optic cable, with connections up to 5 km (3.1 miles).
The key topology rules are: ULES Figure 29 Maximum UTP cable length is 100 m (328 ft) over Category 5 cable. A 412 m (1352 ft) fiber link is allowed for connecting switch-to-switch, or endstation-to-switch, using half-duplex 100BASE-FX. illustrates the key topology rules...
(one hub stack per wiring closet with a fiber link to the collapsed backbone). For example, a 225 m (738 ft) fiber link from a repeater to a router or switch, plus a 100 m (328 ft) UTP link from a repeater out to the endstations.
ETWORK XAMPLES This chapter contains the following sections: Simple Network Configuration Example Advanced Network Configuration Example ONFIGURATION Desktop Switch Example Edge Switch Example...
It illustrates the use of VLANs to separate an area of the network and the use of an aggregated link to increase the bandwidth on key links in your network. Figure 30 Using the Switch 3226 and Switch 3250 in a desktop environment XAMPLES Figure 30...
Edge Switch Example The example in edge switch in a large network. It shows how you can use aggregated links to increase the bandwidth to your core network. In this network, end-to-end security can be implemented using a VLAN architecture and core traffic reduced by using Layer 3 switching at the edge.
Page 106
B: N PPENDIX ETWORK ONFIGURATION XAMPLES...
0 and 255. An example IP address is ‘192.168.100.8’. The IP address can be split into two parts: If your network is internal to your organization only, you may use any arbitrary IP address. 3Com suggests you use addresses in the series DDRESSING IP Addresses...
C: IP A PPENDIX DDRESSING 192.168.100.X (where X is a number between 1 and 254) with a subnet mask 255.255.255.0. These suggested IP addresses are part of a group of IP addresses that have been set aside specially for use “in house” only. CAUTION: If your network has a connection to the external IP network, you must apply for a registered IP address.
Page 109
referred to as a field or an octet. Decimal notation converts the value of each field into a decimal number, and the fields are separated by dots. Figure 33 Dotted Decimal Notation for IP Addresses 10011110.01100101.00001010.00100000 The decimal value of an octet whose bits are all 1s is 255. Network Portion The location of the boundary between the network part and the host part depends on the class that the central agency assigns to your...
C: IP A PPENDIX DDRESSING Subnets and Subnet You can divide your IP network into sub-networks also known as subnets. Masks Support for subnets is important because the number of bits assigned to the device part of an IP address limits the number of devices that may be addressed on any given network.
Page 111
Subnets and Subnet Masks As shown in this example, the 32 bits of an IP address and subnet mask are usually written using an integer shorthand. This notation translates four consecutive 8-bit groups (octets) into four integers that range from 0 through 255.
If manually configuring IP information for the Switch, enter the IP address of the default gateway on the local subnet in which the Switch is located. If no default gateway exists on your network, enter the IP address 0.0.0.0 Standard Mask Notation 100.100.100.100 (255.0.0.0)
This chapter provides some additional background detail on the IP information that can be assigned to your Switch to enable you to manage it across a network. These are advanced features and are not required for operating your switch in your network. The topics covered are:...
D: A IP R PPENDIX DVANCED maintenance and the risk of creating erroneous addresses unless you plan the addressing scheme properly. Guidelines for Using VLSMs Consider the following guidelines when you implement VLSMs: See RFCs 1219 and 1878 for information about understanding and using VLSMs.
Page 115
routing table entry. (See RFC 1519 for detailed information about Supernetting.) To do this, supernet addressing does something very different from traditional TCP/IP routing (which allows only one netmask per network). In supernet routing, each supernet can be assigned its own netmask. Since supernet addressing is a fairly complex mechanism, the easiest way to understand it is to step through the setup process.
Page 116
D: A IP R PPENDIX DVANCED OUTING ONCEPTS supernet twice as large. So, a supernet composed of 8 Class C networks would actually have 3 zeroes (8 = 2 This would seem very limited since it restricts you to using groups that nicely fit into a power of 2 (1, 2, 4, 8, 16...).
Page 117
Figure 37 Selecting a Range of Addresses 11111100 255.255.252.0 Netmask Supernet Example The four networks in service provider (ISP). The ISP has decided to use supernetting to reduce the size of the routing tables and improve throughput. Figure 38 Supernet example Supernet 1 Network 234.170.160.0...
Page 118
D: A IP R PPENDIX DVANCED Now, assign ranges of addresses. Assume that the ISP is responsible for the network 234.170.0.0 and that its first free addresses are at 234.170.158.0. The third octet of Supernet 1 has to be an even multiple of 4, so the ISP grants an address range starting at 234.170.160.0 and hopes that the block between 158 and 160 can be filled in later.
LOSSARY 3Com Network The 3Com network management application used to manage 3Com’s Supervisor networking solutions. 10BASE-T The IEEE specification for 10 Mbps Ethernet over Category 3, 4 or 5 twisted pair cable. 100BASE-FX The IEEE specification for 100 Mbps Fast Ethernet over fiber-optic cable.
Page 120
LOSSARY bandwidth The information capacity, measured in bits per second, that a channel can transmit. The bandwidth of Ethernet is 10 Mbps, the bandwidth of Fast Ethernet is 100 Mbps, and the bandwidth of Gigabit Ethernet is 1000 Mbps. baud The signalling rate of a line, that is, the number of transitions (voltage or frequency changes) made per second.
A mechanism that prevents packet loss during periods of congestion on the network. Packet loss is caused when devices send traffic to an already overloaded port on a Switch. Flow control prevents packet loss by inhibiting devices from generating more traffic until the period of...
Page 122
LOSSARY File Transfer Protocol. A protocol based on TCP/IP for reliable file transfer. full duplex A system that allows packets to be transmitted and received at the same time and, in effect, doubles the potential throughput of a link. gateway See router.
IGMP snooping A mechanism performed by an intermediate device, such as a Layer 2 Switch, that optimizes the flow of multicast traffic. The device listens for IGMP messages and build mapping tables and associated forwarding filters, in addition to reducing the IGMP protocol traffic.
Page 124
Management Information Base. A collection of information about the management characteristics and parameters of a networking device. MIBs are used by the Simple Network Management Protocol (SNMP) to gather information about the devices on a network. The Switch contains its own internal MIB.
Page 125
Open Shortest Path First. A hierarchical Interior Gateway Protocol (IGP) routing algorithm. POST Power On Self Test. An internal test that a Switch carries out when it is powered-up. protocol A set of rules for communication between devices on a network. The rules dictate format, timing, sequencing and error control.
Page 126
See SSL. segment A section of a LAN that is connected to the rest of the network using a switch or bridge. server A computer in a network that is shared by multiple endstations. Servers provide endstations with access to shared network services such as computer files and printer queues.
Page 127
LANs than a bridge and are generally more sophisticated. Switch Database A database that is stored by a switch to determine if a packet should be forwarded, and which port should forward the packet if it is to be forwarded.
LOSSARY unicast A packet sent to a single endstation on a network. Variable Length A suffix to an IP address that indicates the size of the subnet that Subnet Mask (VLSM) contains it. Taking the address 192.168.1.1/24 as an example, the VLSM is /24 and indicates that the first 24 bits of the address form the network part of the address.
Need help?
Do you have a question about the SuperStack 3 3250 and is the answer not in the manual?
Questions and answers