3Com SuperStack 3 3812 Implementation Manual page 104

3com superstack 3 3812: supplementary guide
Hide thumbs Also See for SuperStack 3 3812:
Table of Contents

Advertisement

104
G
LOSSARY
server
A computer in a network that is shared by multiple endstations. Servers
provide endstations with access to shared network services such as
computer files and printer queues.
SMTP
Simple Mail Transfer Protocol. An IETF standard protocol used for
transferring mail across a network reliably and efficiently (as defined in
RFC 821).
SNMP
Simple Network Management Protocol. The current IETF standard
protocol for managing devices on an TCP/IP network.
Spanning Tree
A bridge-based system for providing fault tolerance on networks. STP
Protocol (STP)
works by allowing you to implement parallel paths for network traffic,
and ensure that redundant paths are disabled when the main paths are
operational and enabled if the main paths fail.
SSH
Secure Shell. A protocol which allows secure access to the Command
Line Interface of the switch.
SSL
Secure Sockets Layer. A protocol used for encrypting network traffic. It
is commonly used to encrypt HTTP traffic between and browser and a
Web server.
standby port
The port in a resilient link that takes over data transmission if the main
port in the link fails.
STP
See Spanning Tree Protocol (STP).
subnet mask
A subnet mask is used to divide the device part of the IP address into two
further parts. The first part identifies the subnet number. The second part
identifies the device on that subnet.
switch
A device that interconnects several LANs to form a single logical LAN
that comprises of several LAN segments. Switches are similar to
bridges, in that they connect LANs of a different type; however they
connect more LANs than a bridge and are generally more sophisticated.
Switch Database
A database that is stored by a switch to determine if a packet should
be forwarded, and which port should forward the packet if it is to be
forwarded. Also known as Forwarding Database.
TCP/IP
Transmission Control Protocol/Internet Protocol. This is the name for
two of the most well-known protocols developed for the

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents