3Com 3CBLSG48 User Guide - Page 221

F GLOSSARY, Address Resolution, Protocol, Access Control List, Class of Service, Boot Protocol

Page 221 highlights

F GLOSSARY Access Control Entries ACEs are made of the filters that determine traffic classifications. (ACE) Access Control List ACLs can limit network traffic and restrict access to certain users or (ACL) devices by checking each packet for certain IP or MAC (i.e., Layer 2) information. Address Resolution Protocol (ARP) Boot Protocol (BOOTP) ARP converts between IP addresses and MAC (i.e., hardware) addresses. ARP is used to locate the MAC address corresponding to a given IP address. This allows the switch to use IP addresses for routing decisions and the corresponding MAC addresses to forward packets from one hop to the next. BOOTP is used to provide bootup information for network devices, including IP address information, the address of the TFTP server that contains the devices system files, and the name of the boot file. Committed Information Rate (CIR) CIR is a committed rate in bits-per-second at which the carrier agrees to accept packets from the client over a virtual circuit. The packets that are sent in excess of the CIR rate, become eligible to be discarded and not delivered if the frame relay network becomes congested, and it would then be necessary to resend these discarded packets. Committed Burst Size CbS is the maximum number of bits that can be transferred over a (CbS) frame relay lilnk during some time interval. Class of Service (CoS) CoS is supported by prioritizing packets based on the required level of service, and then placing them in the appropriate output queue. Data is transmitted from the queues using weighted round-robin service to enforce priority service and prevent blockage of lower-level queues. Priority may be set according to the port default, the packet's priority bit (in the VLAN tag), TCP/UDP port number, IP Precedence bit, or DSCP priority bit.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231

F
G
LOSSARY
Address Resolution
Protocol
(ARP)
ACLs can limit network traffic and restrict access to certain users or
devices by checking each packet for certain IP or MAC (i.e., Layer 2)
information.
ARP converts between IP addresses and MAC (i.e., hardware)
addresses. ARP is used to locate the MAC address corresponding to a
given IP address. This allows the switch to use IP addresses for routing
decisions and the corresponding MAC addresses to forward packets
from one hop to the next.
Access Control List
(ACL)
Access Control Entries
(ACE)
ACEs are made of the filters that determine traffic classifications.
Class of Service
(CoS) CoS is supported by prioritizing packets based on the required level of
service, and then placing them in the appropriate output queue. Data
is transmitted from the queues using weighted round-robin service to
enforce priority service and prevent blockage of lower-level queues.
Priority may be set according to the port default, the packet’s
priority bit (in the VLAN tag), TCP/UDP port number, IP Precedence bit,
or DSCP priority bit.
Boot Protocol
(BOOTP)
BOOTP is used to provide bootup information for network devices,
including IP address information, the address of the TFTP server that
contains the devices system files, and the name of the boot file.
Committed
Information Rate
(CIR)
CIR is a committed rate in bits-per-second at which the carrier agrees
to accept packets from the client over a virtual circuit. The packets that
are sent in excess of the CIR rate, become eligible to be discarded and
not delivered if the frame relay network becomes congested, and it
would then be necessary to resend these
discarded packets.
Committed Burst Size
(CbS)
CbS is the maximum number of bits that can be transferred over a
frame relay lilnk during some time interval.