A
UTONEGOTIATION
........................................................................................................................................18
LAN C
ABLING
.............................................................................................................................................19
LAN S
EGMENTATION
AND
P
ACKET
S
WITCHING
.................................................................................................19
LAN B
UFFERING
, L
OADING
AND
F
LOW
C
ONTROL
.............................................................................................19
LAN P
ACKET
P
RIORITY
................................................................................................................................19
LAN P
ACKET
O
RDER
...................................................................................................................................19
TCP/IP
AND
G
ENERAL
P
ERFORMANCE
T
UNING
................................................................................................20
C
HAPTER
9: DS3 P
ACKETS
AND
L
INK
T
OPOLOGY
...............................................................................................
20
L
INK
B
IT
-E
RRORS
.........................................................................................................................................20
L
INK
A
GGREGATION
......................................................................................................................................20
C
HAPTER
10: T
ROUBLESHOOTING
.......................................................................................................................
20
G
ENERAL
.....................................................................................................................................................20
L
OOPBACK
OF
DS3
.......................................................................................................................................21
Warnings
.............................................................................................................................................21
Terminology
........................................................................................................................................21
Limitations
...........................................................................................................................................21
Alternatives to Loopback
....................................................................................................................22
Initiating Loopback
.............................................................................................................................22
P
ERFORMANCE
..............................................................................................................................................23
I
NTEROPERABILITY
.........................................................................................................................................23
L
ABORATORY
T
ESTING
...................................................................................................................................23
P
INGING
.......................................................................................................................................................23
S
TEP
-
BY
-S
TEP
D
IAGNOSIS
..............................................................................................................................24
C
HAPTER
11: T
HIRD
P
ARTY
C
OPYRIGHT
N
OTICES
..............................................................................................
25
E
C
OS
L
ICENSE
..............................................................................................................................................25
T
HE
F
REE
BSD C
OPYRIGHT
...........................................................................................................................25
T
HE
N
ET
-SNMP C
OPYRIGHT
........................................................................................................................26
T
HE
A
PACHE
L
ICENSE
...................................................................................................................................27
T
HE
SHA2 C
OPYRIGHT
.................................................................................................................................28
T
HE
BZIP2 L
ICENSE
....................................................................................................................................28
T
HE
AT
HTTPD L
ICENSE
..............................................................................................................................28
C
HAPTER
12: T
ECHNICAL
S
PECIFICATIONS
AND
S
TANDARDS
.................................................................................
29
5