Switch Features Explained
19
RSTP allows you to implement alternative paths for network traffic in the
event of path failure and uses a loop-detection process to:
■
Discover the efficiency of each path.
■
Enable the most efficient path.
■
Disable the less efficient paths.
■
Enable one of the less efficient paths if the most efficient path fails.
RSTP is an enhanced version of STP (Spanning Tree Protocol) and is fully
compatible with STP systems. RSTP can restore a network connection
quicker than the legacy STP feature. RSTP can detect if it is connected to a
legacy device that only supports IEEE 802.1D STP and will automatically
downgrade to STP on that particular port.
RSTP conforms to the IEEE Std 802.1w-2001.
For more information about RSTP, see
Chapter 4 “Using Resilience
Features”
.
Switch Database
The Switch Database is an integral part of the Switch and is used by the
Switch to determine if a packet should be forwarded, and which port
should transmit the packet if it is to be forwarded.
For more information about the Switch Database, see
Chapter 5 “Using
the Switch Database”
.
Traffic Prioritization
The traffic prioritization capabilities of your Switch provides Class of
Service (CoS) prioritization to your network. You can prioritize traffic on
your network to ensure that high priority data is transmitted with
minimum delay.
For more information about traffic prioritization, see
Chapter 6 “Using
Traffic Management”
.
Rate Limiting
Rate limiting is the restriction of the bandwidth to or from a section of
your network. Limiting the rate of network traffic reduces the stress on
your network and, when used with traffic prioritization, ensures that
important traffic is not held up when the network is busy.
For more information about rate limiting, see
Chapter 6 “Using Traffic
Management”
.
Содержание SuperStack 3 3812
Страница 7: ...GLOSSARY INDEX...
Страница 8: ......
Страница 14: ...14 ABOUT THIS GUIDE...
Страница 22: ...22 CHAPTER 1 SWITCH FEATURES OVERVIEW...
Страница 32: ...32 CHAPTER 2 OPTIMIZING BANDWIDTH...
Страница 74: ...74 CHAPTER 9 USING AUTOMATIC IP CONFIGURATION...
Страница 84: ...84 CHAPTER 10 MAKING YOUR NETWORK SECURE...
Страница 88: ...88 APPENDIX A CONFIGURATION RULES...
Страница 106: ...106 GLOSSARY...
Страница 110: ...110 INDEX...