3Com 3CBLSG24 User Guide - Page 210

Secure Shell SSH, Control System Plus - plus specifications

Page 210 highlights

210 APPENDIX F: GLOSSARY Remote Monitoring RMON provides comprehensive network monitoring capabilities. It (RMON) eliminates the polling required in standard SNMP, and can set alarms on a variety of traffic conditions, including specific error types. Rapid Spanning Tree RSTP reduces the convergence time for network topology changes to Protocol (RSTP) about 10% of that required by the older IEEE 802.1D STP standard. Secure Shell (SSH) A secure replacement for remote access functions, including Telnet. SSH can authenticate users with a cryptographic key, and encrypt data connections between management clients and the switch. Routing Information Protocol (RIP) The RIP protocol seeks to find the shortest route to another device by minimizing the distance-vector, or hop count, which serves as a rough estimate of transmission cost. RIP-2 is a compatible upgrade to RIP. It adds useful capabilities for subnet routing, authentication, and multicast transmissions. Simple Network The application protocol in the Internet suite of protocols which offers Management network management services. Protocol (SNMP) Spanning Tree Protocol (STP) A technology that checks your network for any loops. A loop can often occur in complicated or backup linked network systems. Spanning Tree detects and directs data along the shortest available path, maximizing the performance and efficiency of the network. Terminal Access Controller Access Control System Plus (TACACS+) TACACS+ is a logon authentication protocol that uses software running on a central server to control access to TACACS-compliant devices on the network. Transmission Control Protocol/Internet Protocol (TCP/IP) Protocol suite that includes TCP as the primary transport protocol, and IP as the network layer protocol. Trivial File Transfer A TCP/IP protocol commonly used for software downloads. Protocol (TFTP) User Datagram Protocol (UDP) UDP provides a datagram mode for packet-switched communications. It uses IP as the underlying transport mechanism to provide access to IP-like services. UDP packets are delivered just like IP packets - connection-less datagrams that may be discarded before reaching their targets. UDP is useful when TCP would be too complex, too slow, or just unnecessary.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

210
A
PPENDIX
F: G
LOSSARY
Remote Monitoring
(RMON)
RMON provides comprehensive network monitoring capabilities. It
eliminates the polling required in standard SNMP, and can set alarms on
a variety of traffic conditions, including specific error types.
Rapid Spanning Tree
Protocol (RSTP)
RSTP
reduces the convergence time for network topology changes to
about 10% of that required by the older IEEE 802.1D STP standard.
Secure Shell (SSH)
A secure replacement for remote access functions, including Telnet. SSH
can authenticate users with a cryptographic key, and encrypt data
connections between management clients and the switch.
Routing Information
Protocol (RIP)
The RIP protocol seeks to find the shortest route to another device by
minimizing the distance-vector, or hop count, which serves as a rough
estimate of transmission cost. RIP-2 is a compatible upgrade to RIP. It
adds useful capabilities for subnet routing, authentication, and
multicast transmissions.
Simple Network
Management
Protocol (SNMP)
The application protocol in the Internet suite of protocols which offers
network management services.
Spanning Tree
Protocol (STP)
A technology that checks your network for any loops. A loop can often
occur in complicated or backup linked network systems. Spanning Tree
detects and directs data along the shortest available path, maximizing
the performance and efficiency of the network.
Terminal Access
Controller Access
Control System Plus
(TACACS+)
TACACS+
is a logon authentication protocol that uses software running
on a central server to control access to TACACS-compliant devices on
the network.
Transmission Control Protocol/Internet Protocol (TCP/IP)
Protocol suite that includes TCP as the primary transport protocol, and
IP as the network layer protocol.
Trivial File Transfer
Protocol (TFTP)
A TCP/IP protocol commonly used for software downloads.
User Datagram
Protocol (UDP)
UDP
provides a datagram mode for packet-switched communications. It
uses IP as the underlying transport mechanism to provide access to
IP-like services. UDP packets are delivered just like IP packets –
connection-less datagrams that may be discarded before reaching their
targets. UDP is useful when TCP would be too complex, too slow, or
just unnecessary.