background image

36

Chapter 4 - Configuration Management

ASUS GigaX 1024i+

• 

Port

: Select the port to make the 

configuration.

• 

Admin

:  Disable/enable  port 

security feature on the port.
• 

Violation Mode

: Set the violation 

mode.  This  action  will  be  taken 

when  a  violation  occurs.  It  is  a 

security violation when one of these 

situations occurs: 
1) It is a security violation when the maximum numbers of secure MAC 

addresses have been added to the address table, and a station whose 

MAC addresses is not in the address table attempts to access the 

interface. 
2) An address learned or configured on one secure interface is seen 

on another secure interface in the same VLAN. You can configure the 

interface for one of the three violation modes:

a) 

Protect

: In this mode, you are not notified that a security violation has 

occurred.

b) 

Restrict

: In this mode, you are notified that a security violation has 

occurred. Specifically, an SNMP trap is sent, a syslog message is 

logged, and the violation counter increments.

c) 

Shutdown

: In this mode, a port security violation causes the interface 

to become blocking state immediately. It also sends an SNMP trap, 

logs a syslog message, and increments the violation counter.

• 

Max MAC Addresses

: Set the maximum numbers of secure MAC 

addresses. The valid value is from 1 to 132. The sum of this value for all 

ports is less than or equal to the maximum number of secure MAC address 

allowed in the switch.
• 

Aging Time

: Set the aging time. The valid value is from 0 to 1440(mins). 

The  aging  mechanism  is  only  effective  for  dynamic  secure  MAC 

addresses. If the time is 0, the aging mechanism is disabled for this port.
• 

Aging Type

: Set the aging type to determine the action when the 

dynamic secure MAC addresses are aged out. Two types of aging are 

supported for each port:

a) 

Absolute

: the secure addresses on the port are deleted after the 

specified aging time.

b) 

Inactivity

: the secure addresses on the port are deleted only if there 

Figure 38. Port Configuration

 

Summary of Contents for GigaX1024i+

Page 1: ...User Manual E2698 July 2006 GigaX1024i Layer 2 Smart Plus Switch ...

Page 2: ...urpose In no event shall ASUS its directors officers employees or agents be liable for any indirect special incidental or consequential damages including damages for loss of profits loss of business loss of use or data interruption of business and the like even if ASUS has been advised of the possibility of such damages arising from any defect or error in this manual or product Specifications and ...

Page 3: ...nt CA 94538 USA General fax 1 510 608 4555 Web site address usa asus com Technical support General support tel 1 502 995 0883 Online support http support asus com Notebook tel 1 510 739 3777 x5110 Support fax 1 502 933 8713 ASUS COMPUTER GmbH Germany Austria Company address Harkort Str 25 D 40880 Ratingen Germany General tel 49 2102 95990 Web site address www asus com de General fax 49 2102 959911...

Page 4: ...talling on a flat surface 6 2 1 2 Installing on a rack 7 2 2 Part 2 Connecting the hardware 7 2 2 1 Connect to the computers or LAN 8 2 2 2 Attach the power adapter 8 2 3 Part 3 Basic switch settings 9 2 3 1 Setting up thru the Configuration Manager 9 3 Using the Configuration Manager 11 3 1 Login to the Configuration Manager 11 3 1 1 Setting up the Configuration Manager 11 3 1 2 Setting up a new ...

Page 5: ...k Aggregation 21 4 3 3 Mirroring 22 4 3 4 Static Multicast 23 4 3 5 IGMP Snooping 23 4 3 6 Bandwidth Control 24 4 3 7 Dynamic Addresses 25 4 3 8 Static Addresses 25 4 3 9 VLAN 26 4 3 10 Default Port VLAN and CoS 29 4 4 SNMP Setup 30 4 4 1 Community Table 30 4 4 2 Host Table 30 4 4 3 Trap Setting 30 4 4 4 VACM Group 31 4 4 5 VACM View 31 4 4 6 USM User 32 4 5 Security 33 4 5 1 Port Access Control 3...

Page 6: ...43 5 IP Addresses Network Masks Subnets 44 5 1 IP Addresses 44 5 1 1 Structure of an IP address 44 5 1 2 Network classes 45 5 2 Subnet masks 46 6 Troubleshooting 47 6 1 Diagnosing problems using IP utilities 47 6 1 1 ping 47 6 1 2 nslookup 48 6 2 Simple fixes 49 6 3 Files upload and download procedure 51 6 3 1 Upload firmware by FTP 52 6 3 2 Upload auto config by FTP 51 6 3 3 Backup system configu...

Page 7: ... IP Setup 12 Figure 10 Functional Layout 13 Figure 11 Expanded Menu List 14 Figure 12 Management 16 Figure 13 Administration 17 Figure 14 Reboot 17 Figure 15 Firmware Upgrade 18 Figure 16 Physical Interface 19 Figure 17 Spanning tree 20 Figure 18 Link aggregation 21 Figure 19 Mirroring page 22 Figure 20 Static Multicast 23 Figure 21 IGMP Snooping 23 Figure 22 Bandwidth control 24 Figure 23 Dynamic...

Page 8: ...ation 36 Figure 39 Port Status 37 Figure 40 Secure MAC addresses 38 Figure 41 Trust state 39 Figure 42 Mapping 39 Figure 43 Priority override 40 Figure 44 CoS 41 Figure 45 Cable Diagnosis 42 Figure 46 Traffic Comparison 42 Figure 47 Error Group 43 Figure 48 Historical Status 43 Figure 49 Save Configuration 43 Figure 50 Using the ping Utility 47 Figure 51 Upload Firmware by FTP 51 Figure 52 Upload ...

Page 9: ...d LEDs 4 Table 2 Rear Panel Labels 5 Table 3 Technical Specifications 5 Table 4 LED Indicators 8 Table 5 Port Color Description 13 Table 6 Commonly Used Buttons and Icons 14 Table 7 IP Address Structure 45 Table 8 Problems and Suggested Actions 51 ...

Page 10: ... the switch The terms LAN and network are used interchangeably to refer to a group of Ethernet connected computers at one site 1 1 2 Typographical conventions Boldface type text is used for items you select from menus and drop down lists and commands you type when prompted by the program 1 1 3 Symbols This document uses the following icons to call your attention to specific instructions or explana...

Page 11: ...your ASUS GigaX 1024i switch package Contact your retailer if any item is damaged or missing GigaX 1024i 28 port L2 smart plus switch AC power cord Rack installation kit two brackets with six 6 32 screws User Manual Quick installation guide Figure 1 GigaX L2 smart plus switch package contents ...

Page 12: ...802 1p class of service 4 queues per port IGMP snooping v1 v2 support Static multicast group support 802 3ad link aggregation manual and LACP up to 15 trunk groups Port Mirroring 802 1X port based network access control RADIUS remote authentication dial in user service Ingress and egress bandwidth control Port security Ethernet cable diagnosis DHCP client Quality of service classification DA SA MA...

Page 13: ...cription SYSTEM Green On Unit is powered on Flashing Self test INIT or downloading Amber On Abnormal temperature or voltage Off No power 10 100 1000 port status Green On Link RJ 45 or SFP is present port is enabled Flashing Data is being transmitted received Off No Ethernet link 10 100 1000 port speed Green On 1000Mbps on Giga port or 100Mbps on 10 100 ports Amber On 100Mbps on Giga port Off 10Mbp...

Page 14: ...ption Power connector Connects to the supplied power cord 1 6 Technical specifications Table 3 Technical specifications Physical Dimensions 43 5mm H X 444 mm W X 180mm D Power Input 100 240V AC 2A 50 60Hz Consumption 50 watts Environmental Ranges Operating Storage Temperature 0 to 40o C 32 to 104o C 25 70o C 13 to 158o C Humidity 5 to 90 0 to 95 Altitude up to 10 000 ft 3 000m 40 000 ft 12 000m ...

Page 15: ...i Before starting obtain the following information from your network administrator IP address for the switch Default gateway for the network Network mask for this network 2 1 Part 1 Installing the switch The switch can be installed either on a flat surface or on a rack 2 1 1 Installing on a flat surface The switch should be installed on a flat surface which can support the weight of the switches a...

Page 16: ...t in the equipment rack 2 Securely fasten the switch to the rack with two screws on each side 2 2 Part 2 Connecting the hardware In Part 2 you connect the device to the power outlet and to your computer and to your network Refer to Figure 4 for the overview of the hardware connections CAT 5 Ethernet cables LAN computers Expansion hubs switch Figure 4 Overview of hardware connections ...

Page 17: ... adapter 1 Connect the AC power cord to the POWER receptacle located at the back of the switch Plug the other end of the power cord into a wall outlet or a power strip 2 Check the front LED indicators If the LEDs light up as described in Table 4 the switch is working properly Table 4 LED indicators No LED Description 1 System Solid green indicates that the device is turned on If this light is off ...

Page 18: ...ger through any web browser Microsoft Internet Explorer 5 0 or later versions Netscape is not supported from any computer connected to the switch via the LAN ports 1 By default the switch s web authentication is disabled You have to enable it to be able to manage the switch via the Configuration Manager You can enable the web authentication function in the System Administration page 2 In a web bro...

Page 19: ... click OK 5 If your new address is different from the default the browser can not update the switch status window or retrieve any page This is normal You have to retype the new IP address in the address location box and press Enter The web link returns 6 To enable authentication for web access click the Administration page then select Enabled Figure 6 IP setup ...

Page 20: ...n the switch as described in the Quick Start Guide chapter A web browser installed on the computer The application is designed to work best with Microsoft Internet Explorer 5 0 or later versions It does not support Netscape You may access the program from any computer connected to the switch via the LAN ports 3 1 1 Setting up the Configuration Manager 1 By default the switch s web authentication i...

Page 21: ... address 1 To set up a new IP address click System IP Setup Fill in the IP address the network mask and the default gateway then click OK The IP setup screen appears after you click OK 2 If your new address is different from the default the browser can not update the switch status window or retrieve any page This is normal You have to retype the new IP address in the address location box and press...

Page 22: ... disabled manually or by spanning tree Table 5 Port color description The top frame or the banner frame contains the switch s logo and the front panel It shows periodic updates of the LED status See the following for LED information Table 4 for the LED definitions on page 8 Table 5 for the color status description Clicking on the port icon of the switch displays the port configuration in the lower...

Page 23: ... The left frame contains the menu bar containing all the features available for switch configuration These features are grouped into categories e g System Bridge etc You can click on any of these to display a specific configuration page The right frame displays configuration pages or graphics for the statistics See Chapter 4 8 for details 3 2 1 Menu navigation tips To expand a group of related men...

Page 24: ...is Statistical Chart Save Configuration To permanently save the changes or new settings made on any of the switch s features or configuration you must go to the Save Configuration page and click on Save 4 1 System This section describes the tasks you can perform using the System feature in the Configuration Manager Configuring the system name contact location other system info Assigning IP address...

Page 25: ...server within the same VLAN The IP Setup page contains the following editable parameters VLAN ID Specify a VLAN ID to system management interface It is necessary that it should be within the same VLAN for management uses DHCP Client Enable DHCP to get a dynamic IP address or disable DHCP to specify a static IP address The DHCP server must be reachable within the management VLAN IP Address assign a...

Page 26: ... Click on Add to add the new user Click on Modify when you are done with the modifications Click on Remove when you want to remove the selected user To save any changes made click OK Use Reload to refresh the settings When you enable the password protection you have to login again immediately 4 1 4 Reboot To reboot the system 1 Click on System Reboot The Reboot page will be displayed 2 Click on Re...

Page 27: ... shows the hardware revision number Boot ROM Version shows the version of the boot code Firmware Version shows the current running firmware version This number will be updated after the firmware update 2 In the Firmware or Auto config file text box enter the path and name of the firmware image file You may also click on Browse to search for the firmware image on your PC 3 Click on Upload to update...

Page 28: ...tatus the link speed and duplex for an existing link otherwise link is down State the STP state Admin the setting value to disable or enable the port Mode the setting value to enable or disable 802 3x flow control mechanism Flow Control the setting value to enable or disable 802 3x flow control mechanism To modify this page select the corresponding port number and configure the port setting then c...

Page 29: ...e STP setting The following options are available Disable STP Enable RSTP Enabled Turn the STP RSTP off on When you turn the STP RSTP on STP RSTP will use the following settings if the switch is the root switch Hello Time The interval between the generation of configuration BPDU Max Age A timeout value to be used by all Bridges in the LAN Forward Delay A timeout value to be used by all bridges in ...

Page 30: ...rgence time Auto is recommended in most cases Click OK to save any changes made to the settings Click Reload to refresh the settings 4 3 2 Link Aggregation This page configures the link aggregation group port trunking The switch can have 15 link aggregation groups It has the following configuration parameters Show Trunk Select Add a new Trunk to create a new group Or select an existing group to di...

Page 31: ...ss packets Mirror Mode Enables or disables the mirror function for the selected group Monitor Port Receives the copies of all the traffics in the selected mirrored ports All the ports in the link aggregation group MUST operate in full duplex mode at the same speed All the ports in the link aggregation group MUST be configured in auto negotiation mode or full duplex mode This configuration will mak...

Page 32: ...ll the ports in the group will forward the specified multicast packets to other ports in the group Show Group Select Add a new Group to enter a new entry or select an existing group address to display MAC Address Selects the multicast address VLAN Selects the vlan group Click OK to save any changes made Click Reload to refresh the settings 4 3 5 IGMP Snooping The IGMP snooping function can be turn...

Page 33: ...ts because of destination address lookup failure All Limit all types of packets Limit Rate The threshold to limit the total number of the selected type of packet For example if broadcast multicast is enabled the traffic amount of each type will not exceed the limit value The valid value is from 70 to 250000 Kbps Egress bandwidth control Port Select the port to configure Bandwidth Control Disable e...

Page 34: ...ill display the results 4 3 8 Static Addresses MAC addresses entered in this page will not expire and will remain static in the address table until you remove it from the address list The Static Addresses page has the following parameters MAC Address Enter the MAC address VLAN ID Enter the VLAN ID that the MAC belongs to Port Selection Select the port which the MAC belongs to Discard on You can do...

Page 35: ...9 VLAN 4 3 9 1 VLAN Mode There are two VLAN modes in our switch 1 Port Based VLAN 2 802 1Q Tagged VLAN The switch supports this on a per port basis by setting the configuration in the following fields a Port Select the port to configure b VLAN Mode 802 1Q Tagged VLAN Forwarding decision follows the 802 1Q Tagged VLAN Port Based VLAN if a port is in Port Based VLAN mode 1 when the port receives a t...

Page 36: ...nk type This port is not a member of the VLAN group The other fields that you can configure are as follows Show VLAN Select the existing VLAN to display or select Add a new VLAN to create a new VLAN group Name the VLAN name VLAN ID This field requires user to enter the VLAN ID when a new VLAN is created Remove VLAN Remove an existing VLAN This field disappears in VLAN creation page Private VLAN Se...

Page 37: ...e priority override based on the VLAN ID can only occur on the members of this VLAN When this occurs the priority field of any packets with this VLAN ID will be overridden with the priority value The VLAN priority override has higher priority than the port s default priority and IP priority Priority The priority value is used to override the priority on any frames associated with this VLAN ID if p...

Page 38: ...ttings to the switch via the HTTP server Click Reload to refresh the settings To permanently save the configuration go to the Save Configuration page then click Save 4 3 10 Default Port VLAN and CoS This page includes some VLAN tags related field settings for each port These are as follows Port Select the port to configure PVID Port based VLAN ID Every untagged packet received from this port will ...

Page 39: ... by checking the checkbox Click OK to save the configuration or Reload to refresh the page 4 4 2 Host Table This page links the host IP address to the community name that is entered in Community Table page Type an IP address and select the community name from the drop down list Click OK to save the configuration or Reload to refresh the page 4 4 3 Trap Setting By setting the trap destination IP ad...

Page 40: ...oup belongs to Any is suitable for v1 v2 v3 USM is SNMPv3 related Security level Enter the Security level Name that the Group belongs to Only NoAuth AuthNopriv AuthPriv can be chosen Click Add to create a new VACM group To remove an existing VACM Group select the group and click Remove To update an existing entry select the group and click Modify Click OK to save the changes on this page Click Rel...

Page 41: ... page has the following parameters Engine Id Enter the Engine Id that matches the ID in the Manager Name Enter Name combined with Engine ID that should match the Name and Engine ID in the Manager Auth Protocol Enter the Auth Protocol that Engine ID and Name belong to Only NoAuth MD5 SHA1 can be chosen If the NoAuth is chosen there is no need to enter the password Auth Password Enter the password t...

Page 42: ...settings Bridge Global settings The Bridge Global settings page has the following configuration parameters Reauthentication Once enabled the switch will try to authenticate the port user again when the reauthentication time is up Reauthentication Time If Reauthentication is enabled this is the interval for the switch to re send authentication request to the port user Authentication Method RADIUS o...

Page 43: ...ed port is forced to be authorized Thus traffic from all hosts is allowed to pass Otherwise if Force_unauthorized is selected the selected port is blocked and no traffic can go through If Auto is selected the behavior of the selected port is controlled by the 802 1x protocol Multi host If enabled all hosts connected to the selected port are allowed to use the port if ONE of the hosts passed the au...

Page 44: ...at the RADIUS server is listening to Authentication Server Key The key is used for communications between the GigaX and the RADIUS server Confirm Authentication Key Re type the key for confirmation Click OK to save the settings Click Reload to refresh the settings To permanently save the configuration go to the Save Configuration page The VLAN of the RADIUS server connected to the switch must be t...

Page 45: ...ed Specifically an SNMP trap is sent a syslog message is logged and the violation counter increments c Shutdown In this mode a port security violation causes the interface to become blocking state immediately It also sends an SNMP trap logs a syslog message and increments the violation counter Max MAC Addresses Set the maximum numbers of secure MAC addresses The valid value is from 1 to 132 The su...

Page 46: ...p This indicates the port security is operational c SecureDown This indicates port security is not operational This happens when the port security is configured to be enabled but can not be operational due to some reasons such as it conflicts with other features d Restrict This indicates that the port security violation occurs when the violation mode is restrict e Shutdown This indicates that the ...

Page 47: ...ress added in this way will not age out from the secure MAC address table We call it static secure MAC address MAC Address Enter the MAC address Port Selection Select the port to which the MAC belongs Click Add after you have created a new static MAC address The new entry will be shown in the address window Users can select one port from Port Selection and then click Query You will see the current...

Page 48: ...IPv4 TOS and or Diffserv fields if the frame is IPv4 and use IPv6 Traffic Class fields if the frame is IPv6 for priority data Otherwise use port s default priority for priority data About Trust DSCP The related setting is in the Mapping and the CoS pages Click OK to send settings to the switch via the HTTP server Click Reload to refresh the settings To permanently save the configuration go to the ...

Page 49: ...sly determined priority The source MAC priority override has higher priority than the port s default priority IP priority and VLAN priority override When destination MAC priority override is enabled the priority overrides based on destination MAC can occur on all ports A destination MAC priority override occurs when the destination address of a packet results in an entry hit where the destination ...

Page 50: ...tive to the other CoS queues WRR scheduling prevents the low priority queues from being completely neglected during periods of high priority traffic WRR scheduling transmits some packets from each queue in turn The number of packets it sends corresponds to the relative importance of the queue For example if Queue 1 has a weight of 1 and Queue 2 has a weight of 2 one packet is sent from Queue 1 for...

Page 51: ...or Finally click Draw to let the browser to draw the graphic chart Each new Draw will reset the statistics 4 7 Cable Diagnosis The major function of Cable Diagnosis is to detect cable fault open or short and report the estimated fault location Moreover Cable Diagnosis can also detect PHY type 10M 100M or 1000M as well as estimated cable length of a normal cable Cable length estimation only support...

Page 52: ...e 47 Error Group 4 8 3 Historical Status In this chart you can display information for different ports and statistics This chart shows the history of the statistics information Figure 48 Historical Status 4 9 Save Configuration Click Save to save the configu ration To restore to factory default settings click Restore You will lose all the configurations when you choose to restore the default con f...

Page 53: ...20 56 0 211 is read twenty dot fifty six dot zero dot two eleven 5 1 1 Structure of an IP address IP addresses have a hierarchical design similar to that of telephone numbers For example a 7 digit telephone number starts with a 3 digit prefix that identifies a group of thousands of telephone lines and ends with four digits that identify one specific line in that group Similarly IP addresses contai...

Page 54: ...xist for a total of over 2 billion hosts Because of their huge size these networks are used for WANs and by organizations at the infrastructure level of the Internet e g your ISP Class B networks are smaller but still quite large each being able to hold over 65 000 hosts There can be up to 16 384 class B networks in existence A class B network might be appropriate for a large organization such as ...

Page 55: ...with any class C address all of the bits in field1 through field 3 are part of the network ID but note how the mask specifies that the first bit in field 4 is also included Since this extra bit has only two values 0 and 1 this means there are two subnets Each subnet uses the remaining 7 bits in field4 for its host IDs which range from 0 to 127 instead of the usual 0 to 255 for a class C address Si...

Page 56: ...e other computers on your network and the Internet A ping command sends a message to the computer you specify If the computer receives the message it sends messages in reply To use it you must know the IP address of the computer with which you are trying to communicate On Windows based computers you can execute a ping command from the Start menu Click the Start button and then click Run In the Ope...

Page 57: ...e name You specify the common name and the nslookup command looks up the name on your DNS server usually located with your ISP If that name is not an entry in your ISP s DNS table the request is then referred to another higher level server and so on until the entry is found The server then returns the associated IP address On Windows based computers you can execute the nslookup command from the St...

Page 58: ...ork 1000BaseTx should use cables labeled Cat 5 10Mbit sec cables may tolerate lower quality cables Network Access PC cannot access another host in the same network 1 Check the Ethernet cabling is good and the LED is green 2 If the port LED is amber check if this port is disabled You may experience a disconnected network in a short period around 1 minute if you just turned on the STP PCs cannot dis...

Page 59: ... bypassing password Some pages do not display completely 1 Verify that you are using Internet Explorer v5 5 or later Netscape is not supported Support for Javascript must be enabled in your browser Support for Java may also be re quired 2 Ping the switch IP address to see if the link is stable If some ping packets fail check your network setup to make sure a valid setting Changes to Configuration ...

Page 60: ...IP address is the switch IP ex ftp 192 192 1 100 4 Type the system s user name 5 Type the system s password 6 Use command put File Name to upload firmware The file name is your local name of the firmware ex put gx2024x_2 1 3 2_051026 6 3 2 Upload auto config file by FTP Make sure your PC and the switch are in the same VLAN before you use ftp function as well as the other remote management tools Th...

Page 61: ...r PC and the switch are in the same VLAN before you use ftp function as well as the other remote management tools The switch VLAN is shown in the System IP setup page of the WEB GUI or use net interface show to display the VID by CLI 1 Open the command prompt window 2 Change to the directory that the system configurations file will be located 3 Use the command ftp IP Address to connect to the swit...

Page 62: ...face show to display the VID by CLI 1 Open the command prompt window 2 Change to the directory where the system configuration file is located 3 Use the command ftp IP Address to connect to the switch IP address as the FTP server IP ex ftp 192 192 1 100 4 Type the system s user name 5 Type the system s password 6 Use the command put File Name to restore the system configurations The file must be th...

Page 63: ... a data rate of 1000 Mbps binary The base two system of numbers which uses only two digits 0 and 1 to represent all numbers In binary the number 1 is written as 1 2 as 10 3 as 11 4 as 100 etc Although expressed as decimal numbers for convenience IP addresses in actual use are binary numbers e g the IP address 209 191 4 240 is 11010001 10111111 00000100 11 110000 in binary See also bit IP address n...

Page 64: ...ing command makes use of ICMP IGMP Internet Group Management Protocol An Internet protocol that enables a computer to share information about its membership in multicast groups with adjacent routers A multicast group of computers is one whose members have designated as interested in receiving specific content from the others Multicasting to an IGMP group can be used to simultaneously update the ad...

Page 65: ...uter and provides the physical interface to your network cabling which for Ethernet NICs is typically an RJ 45 connector See Ethernet RJ 45 packet Data transmitted on a network consists of units called packets Each packet contains a payload the data plus overhead information such as where it came from source address and where it should go destination address ping Packet Internet or Inter Network G...

Page 66: ...nation IP address and current network conditions A device that performs routing is called a router SNMP Simple Network Management Protocol The TCP IP protocol used for network management STP Spanning Tree Protocol The bridge protocol to avoid packet looping in a complicate network subnet A subnet is a portion of a network The subnet is distinguished from the larger network by a subnet mask which s...

Page 67: ...or file transfers TFTP is easier to use than File Transfer Protocol FTP but not as capable or secure Trunk Two or more ports are combined as one virtual port also called as Link Aggregation TTL Time To Live A field in an IP packet that limits the life span of that packet Originally meant as a time duration the TTL is usually represented instead as a maximum hop count each router that receives a pa...

Page 68: ...eo to the user Web browsers use Hyper Text Transfer Protocol HTTP Popular web browsers include Netscape Navigator and Microsoft Internet Explorer See also HTTP web site WWW Web page A web site file typically containing text graphics and hyperlinks cross references to the other pages on that web site as well as to pages on other web sites When a user accesses a web site the first page that is displ...

Reviews: