Motorola WS2000 - Wireless Switch - Network Management Device System Reference Manual page 52

Wireless switch
Hide thumbs Also See for WS2000 - Wireless Switch - Network Management Device:
Table of Contents

Advertisement

3-16 WS2000 Wireless Switch System Reference Guide
Transport
ICMP
PIM
GRE
RSVP
IDP
PUP
EGP
IPIP
ESP
AH
IGMP
IPV6
COMPR_H
Description
Internet Control Message Protocol (ICMP) is tightly integrated with IP. ICMP messages, delivered
in IP packets, are used for out-of-band messages related to network operation. Because ICMP uses
IP, ICMP packet delivery is unreliable. Hosts cannot count on receiving ICMP packets for a network
problem.
Protocol Independent Multicast (PIM) is a collection of multicast routing protocols, each optimized
for a different environment. There are two main PIM protocols, PIM Sparse Mode and PIM Dense
Mode. A third PIM protocol, Bi-directional PIM, is less widely used.
General Routing Encapsulation (GRE) supports VPNs across the Internet. GRE is a mechanism for
encapsulating network layer protocols over any other network layer protocol. Such encapsulation
allows routing of IP packets between private IP networks across an Internet that uses globally
assigned IP addresses.
The RSVP protocol is used by a host to request specific qualities of service from the network for
particular application data streams or flows. RSVP is also used by routers to deliver quality-of-
service (QoS) requests to all nodes along the path(s) of the flows and to establish and maintain
state to provide the requested service. RSVP requests will generally result in resources being
reserved in each node along the data path.
Datagram Protocol (IDP) is a simple, unreliable datagram protocol, which is used to support the
SOCK_DGRAM abstraction for the Internet Protocol (IP) family. IDP sockets are connection less and
normally used with the sendto and recvfrom subroutines.
It is the first open protocol, named the Public Unitary Protocol (PUP protocol). It was developed to
standardize communications protocol among controls manufacturers in the facility automation
industry. This protocol is generally understood to form the basis of the current BACnet protocol,
which has become popular of late.
The Exterior Gateway Protocol (EGP) is an exterior routing protocol used for exchanging routing
information with gateways in other autonomous systems.
IPIP is a protocol which is used to encapsulate an IP packet within another IP packet.
Encapsulating Security Protocol (ESP) is one of the two key components of IP Security Protocol
(IPSec). The other key component is Authentication Header (AH), described above.
ESP encrypts the payload of packets, and also provides authentication services. ESP can be used in
transport mode, providing security between two end points. Also, ESP can be used in tunnel mode,
providing security like that of a Virtual Private Network (VPN).
Authentication Header (AH) is one of the two key components of IP Security Protocol (IPSec). The
other key component is Encapsulating Security Protocol (ESP), described below.
AH provides authentication, proving the packet sender really is the sender, and the data really is
the data sent. AH can be used in transport mode, providing security between two end points. Also,
AH can be used in tunnel mode, providing security like that of a Virtual Private Network (VPN).
The Internet Group Management Protocol (IGMP) is used between IP hosts and their immediate
neighbor multicast agents to support the creation of transient groups, the addition and deletion of
members of a group, and the periodic confirmation of group membership. IGMP is an asymmetric
protocol and is specified here from the point of view of a host, rather than a multicast agent.
IPv6 is short for "Internet Protocol Version 6". IPv6 is the "next generation" protocol designed by
the IETF to replace the current version Internet Protocol, IP Version 4 ("IPv4").
COMPR_H is the Compressed Header Protocol.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents