LevelOne GSW-4876 User Manual

Page 305

Advertising
background image

G

LOSSARY

– 305 –

MD5

MD5 Message-Digest is an algorithm that is used to create digital

signatures. It is intended for use with 32 bit machines and is safer than the

MD4 algorithm, which has been broken. MD5 is a one-way hash function,

meaning that it takes a message and converts it into a fixed string of digits,

also called a message digest.

MIB

Management Information Base. An acronym for Management Information

Base. It is a set of database objects that contains information about a

specific device.

MLD S

NOOPING

Multicast Listener Discovery (MLD) snooping dynamically configures switch
ports to limit IPv6 multicast traffic so that it is forwarded only to ports with

users that want to receive it. This switch supports MLDv1, which includes

Listener Query, Listener Report, and Listener Done messages (equivalent

to IGMPv2 query, report, and leave messages).

MSTP

Multiple Spanning Tree Protocol can provide an independent spanning tree

for different VLANs. It simplifies network management, provides for even

faster convergence than RSTP by limiting the size of each region, and

prevents VLAN members from being segmented from the rest of the group.

M

ULTICAST

S

WITCHING

A process whereby the switch filters incoming multicast frames for services

for which no attached host has registered, or forwards them to all ports

contained within the designated multicast VLAN group.

MVR

Multicast VLAN Registration is a method of using a single network-wide

multicast VLAN to transmit common services, such as such as television

channels or video-on-demand, across a service-provider’s network. MVR

simplifies the configuration of multicast services by using a common VLAN

for distribution, while still preserving security and data isolation for

subscribers residing in both the MVR VLAN and other standard or
private VLAN groups.

NTP

Network Time Protocol provides the mechanisms to synchronize time
across the network. The time servers operate in a hierarchical-master-

slave configuration in order to synchronize local clocks within the subnet

and to national time standards via wire or radio.

P

ORT

A

UTHENTICATION

See IEEE 802.1X.

P

ORT

M

IRRORING

A method whereby data on a target port is mirrored to a monitor port for

troubleshooting with a logic analyzer or RMON probe. This allows data on

the target port to be studied unobstructively.

Advertising