127
SSL
Secure Sockets Layer. A protocol used for encrypting network traffic. It
is commonly used to encrypt HTTP traffic between and browser and a
Web server.
standby port
The port in a resilient link that takes over data transmission if the main
port in the link fails.
STP
See
Spanning Tree Protocol (STP)
.
subnet mask
A subnet mask is used to divide the device part of the IP address into
two further parts. The first part identifies the subnet number. The
second part identifies the device on that subnet.
supernetting
Creating several IP networks that share the same routing entry. See
RFC 1519.
switch
A device that interconnects several LANs to form a single logical LAN
that comprises of several LAN segments. Switches are similar to
bridges, in that they connect LANs of a different type; however they
connect more LANs than a bridge and are generally more sophisticated.
Switch Database
A database that is stored by a switch to determine if a packet should
be forwarded, and which port should forward the packet if it is to be
forwarded. Also known as Forwarding Database.
TCP/IP
Transmission Control Protocol/Internet Protocol. This is the name for
two of the most well-known protocols developed for the
interconnection of networks. Originally a UNIX standard, TCP/IP is now
supported on almost all platforms, and is the protocol of the Internet.
TCP relates to the content of the data travelling through a network —
ensuring that the information sent arrives in one piece when it reaches
its destination. IP relates to the address of the endstation to which data
is being sent, as well as the address of the destination network.
Telnet
A TCP/IP application protocol that provides a virtual terminal service,
letting a user log into another computer system and access a device as
if the user were connected directly to the device.
TFTP
Trivial File Transfer Protocol. Allows you to transfer files (such as
software upgrades) from a remote device using the local management
capabilities of the Switch.
traffic prioritization
A system which allows data that has been assigned a high priority to
be forwarded through a switch without being obstructed by other data.
Summary of Contents for SUPERSTACK 3 3250
Page 8: ......
Page 20: ...20 CHAPTER 1 SWITCH FEATURES OVERVIEW...
Page 43: ...How STP Works 43 Figure 9 STP configurations...
Page 54: ...54 CHAPTER 6 USING TRAFFIC MANAGEMENT...
Page 66: ...66 CHAPTER 8 SETTING UP VIRTUAL LANS...
Page 70: ...70 CHAPTER 9 USING AUTOMATIC IP CONFIGURATION...
Page 98: ...98 CHAPTER 11 IP ROUTING...
Page 102: ...102 APPENDIX A CONFIGURATION RULES...
Page 106: ...106 APPENDIX B NETWORK CONFIGURATION EXAMPLES...
Page 132: ...132 INDEX...