9/16
Management
Technical information
Ethernet network
Infrastructure
Management
The Ethernet devices in general (end devices and the cabling devices) devices may
be divided in two categories: unmanaged and managed devices:
b
The unmanaged
devices are those which there is no possibility to configure or
control any of the parameters of the device.
b
The managed
devices are those which there is possibility to configure or control
the parameters of the device (manage them) and to access to its internal information.
The ConneXium product line offers both types of devices.
There is also a third category of devices not specifically defined but is important to
understand the difference. These devices only allow access to its information but
cannot be controlled and/or configured. Usually these devices are considered in the
category of managed devices.
Managed devices
The managed devices offer the following features:
b
Traffic optimization and filtering,
goal is to increase the bandwidth, or the traffic
capacity in a network (some of the features in this area are message and port priority,
flow control, multicast filtering, broadcast limiting, IGMP snooping, Vlan, etc.).
b
VLAN,
a virtual LAN (VLAN) consists of a group of network participants in one or
more network segments who can communicate with each other as if they belonged
to the same LAN.
VLANs are based on logical (instead of physical) links. The biggest advantage of
VLANs is their possibility of forming user groups based on the participant function
and not on their physical location or medium.
Since broad/multicast data packets are transmitted exclusively within a virtual LAN,
the remaining data network is unaffected. VLAN can also serve as a security
mechanism to block unwanted Unicast messages.
b
Security,
feature that helps the user protect the switch from unauthorized access
that could result in changes in its configuration and impact the traffic going through
the switch (some of the features in this area are port security, read/write community
name, etc.).
User can also set up the switch so that it blocks messages coming from unauthorized
“
devices” source addresses connected to the switch.
b
Time Synchronization,
feature that allows all the devices in the network to be
synchronized on time.
b
Network Redundancy,
to develop high availability applications.
b
…
2
1
3
4
5
6
7
8
9
10




