Access Control List. ACLs can limit network traffic and restrict access to certain users or
devices by checking each packet for certain IP or MAC (i.e., Layer 2) information.
Address Resolution Protocol converts between IP addresses and MAC (hardware) addresses.
ARP is used to locate the MAC address corresponding to a given IP address. This allows the
switch to use IP addresses for routing decisions and the corresponding MAC addresses to
forward packets from one hop to the next.
Boot Protocol i
used to provide bootup information for network devices, including IP
address information, the address of the TFTP server that contains the devices system files,
and the name of the boot file.
Connectivity Fault Management provides fault monitoring for end-to-end
connections within a designated service area by using continuity check messages
which can detect faults in maintenance points, fault verification through loop back
messages, and fault isolation with link trace messages.
Class of Service is supported by prioritizing packets based on the required level of service,
and then placing them in the appropriate output queue. Data is transmitted from the
queues using weighted round-robin service to enforce priority service and prevent
blockage of lower-level queues. Priority may be set according to the port default, the
packet's priority bit (in the VLAN tag), TCP/UDP port number, IP Precedence bit, or DSCP
Dynamic Host Control Protocol. Provides a framework for passing configuration information
to hosts on a TCP/IP network. DHCP is based on the Bootstrap Protocol (BOOTP), adding the
capability of automatic allocation of reusable network addresses and additional
A technique used to enhance network security by snooping on DHCP server messages to
track the physical location of hosts, ensure that hosts only use the IP addresses assigned to
them, and ensure that only authorized DHCP servers are accessible.
– 595 –