Background Image
Table of Contents Table of Contents
Previous Page  404 / 413 Next Page
Information
Show Menu
Previous Page 404 / 413 Next Page
Page Background

9/16

Management

Technical information

Ethernet network

Infrastructure

Management

The Ethernet devices in general (end devices and the cabling devices) devices may

be divided in two categories: unmanaged and managed devices:

b

The unmanaged

devices are those which there is no possibility to configure or

control any of the parameters of the device.

b

The managed

devices are those which there is possibility to configure or control

the parameters of the device (manage them) and to access to its internal information.

The ConneXium product line offers both types of devices.

There is also a third category of devices not specifically defined but is important to

understand the difference. These devices only allow access to its information but

cannot be controlled and/or configured. Usually these devices are considered in the

category of managed devices.

Managed devices

The managed devices offer the following features:

b

Traffic optimization and filtering,

goal is to increase the bandwidth, or the traffic

capacity in a network (some of the features in this area are message and port priority,

flow control, multicast filtering, broadcast limiting, IGMP snooping, Vlan, etc.).

b

VLAN,

a virtual LAN (VLAN) consists of a group of network participants in one or

more network segments who can communicate with each other as if they belonged

to the same LAN.

VLANs are based on logical (instead of physical) links. The biggest advantage of

VLANs is their possibility of forming user groups based on the participant function

and not on their physical location or medium.

Since broad/multicast data packets are transmitted exclusively within a virtual LAN,

the remaining data network is unaffected. VLAN can also serve as a security

mechanism to block unwanted Unicast messages.

b

Security,

feature that helps the user protect the switch from unauthorized access

that could result in changes in its configuration and impact the traffic going through

the switch (some of the features in this area are port security, read/write community

name, etc.).

User can also set up the switch so that it blocks messages coming from unauthorized

devices” source addresses connected to the switch.

b

Time Synchronization,

feature that allows all the devices in the network to be

synchronized on time.

b

Network Redundancy,

to develop high availability applications.

b

2

1

3

4

5

6

7

8

9

10