{"id":574,"date":"2025-02-20T06:16:25","date_gmt":"2025-02-20T06:16:25","guid":{"rendered":"https:\/\/demolinks2.com\/cy-yue\/?page_id=574"},"modified":"2025-04-24T19:41:27","modified_gmt":"2025-04-24T19:41:27","slug":"knowledge-based","status":"publish","type":"page","link":"https:\/\/demolinks2.com\/cy-yue\/knowledge-based\/","title":{"rendered":"Knowledge Based"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1740032182297{padding-top: 90px !important;padding-bottom: 0px !important;}&#8221; woodmart_css_id=&#8221;67b6c80fa96f9&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2N2I2YzgwZmE5NmY5Iiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243; el_id=&#8221;about-row&#8221;][vc_column css=&#8221;.vc_custom_1738681226336{padding-right: 0px !important;}&#8221; woodmart_css_id=&#8221;67a22cae7e07d&#8221; parallax_scroll=&#8221;no&#8221; woodmart_sticky_column=&#8221;false&#8221; wd_collapsible_content_switcher=&#8221;no&#8221; wd_column_role_offcanvas_desktop=&#8221;no&#8221; wd_column_role_offcanvas_tablet=&#8221;no&#8221; wd_column_role_offcanvas_mobile=&#8221;no&#8221; wd_column_role_content_desktop=&#8221;no&#8221; wd_column_role_content_tablet=&#8221;no&#8221; wd_column_role_content_mobile=&#8221;no&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_box_shadow=&#8221;no&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2N2EyMmNhZTdlMDdkIiwic2hvcnRjb2RlIjoidmNfY29sdW1uIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_reset_margin=&#8221;no&#8221; tablet_reset_margin=&#8221;no&#8221; wd_z_index=&#8221;no&#8221;]\n\t\t<div id=\"wd-67b6cad6e5b0d\" class=\"title-wrapper wd-wpb set-mb-s reset-last-child  wd-rs-67b6cad6e5b0d wd-title-color-default wd-title-style-overlined text-center  wd-underline-colored\">\n\t\t\t\n\t\t\t<div class=\"liner-continer\">\n\t\t\t\t<h4 class=\"woodmart-title-container title  wd-font-weight- wd-fontsize-l\" >Knowledge-Based<\/h4>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\n\t\t[\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221; woodmart_css_id=&#8221;680a8fabe4cca&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2ODBhOGZhYmU0Y2NhIiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243; el_id=&#8221;info-four-05&#8243;][vc_column width=&#8221;1\/4&#8243;]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-68002c4dbf3bb\" class=\" wd-rs-68002c4dbf3bb wd-info-box wd-wpb text-left box-icon-align-top box-style- color-scheme- wd-bg-none with-btn box-btn-static \">\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title box-title-style-default wd-fontsize-m\">Digitization<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>Real-time remote monitoring<\/p>\n<ul>\n<li>The Trends of Industry 4.0 &amp; IIoT impact the efficiency, productive, and competitive within the Manufacturing&#8230;&#8230;<\/li>\n<\/ul>\n<p>\n<\/div>\n\n\t\t\t\t\t\t<div class=\"info-btn-wrapper\"><div id=\"wd-69d579c5bc6d7\" class=\"  wd-button-wrapper text-left\"><a href=\"https:\/\/demolinks2.com\/cy-yue\/digitization\/\" title=\"Digitization\" class=\"btn btn-color-default btn-style-link btn-style-rectangle btn-size-default\">Read More<\/a><\/div><\/div>\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column][vc_column width=&#8221;1\/4&#8243;]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-68002c55a9333\" class=\" wd-rs-68002c55a9333 wd-info-box wd-wpb text-left box-icon-align-top box-style- color-scheme- wd-bg-none with-btn box-btn-static \">\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title box-title-style-default wd-fontsize-m\">Smart Infrastructure<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>Reliability | Interoperability<\/p>\n<ul>\n<li>Building a Reliable industrial communication network is crucial, due to the concern about the control systems&#8230;..<\/li>\n<\/ul>\n<p>\n<\/div>\n\n\t\t\t\t\t\t<div class=\"info-btn-wrapper\"><div id=\"wd-69d579c5bc72d\" class=\"  wd-button-wrapper text-left\"><a href=\"https:\/\/demolinks2.com\/cy-yue\/smart-infrastructure\/\" title=\"Smart Infrastructure\" class=\"btn btn-color-default btn-style-link btn-style-rectangle btn-size-default\">Read More<\/a><\/div><\/div>\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column][vc_column width=&#8221;1\/4&#8243;]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-68002c62b5e44\" class=\" wd-rs-68002c62b5e44 wd-info-box wd-wpb text-left box-icon-align-top box-style- color-scheme- wd-bg-none with-btn box-btn-static \">\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title box-title-style-default wd-fontsize-m\">Remote Site Management<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>Reliability | Real-Time | Visibility<\/p>\n<ul>\n<li>Remote field site management is critical to Engineers and Technician without advance notification..<\/li>\n<\/ul>\n<p>\n<\/div>\n\n\t\t\t\t\t\t<div class=\"info-btn-wrapper\"><div id=\"wd-69d579c5bc771\" class=\"  wd-button-wrapper text-left\"><a href=\"https:\/\/demolinks2.com\/cy-yue\/remote-site-management\/\" title=\"Remote Site Management\" class=\"btn btn-color-default btn-style-link btn-style-rectangle btn-size-default\">Read More<\/a><\/div><\/div>\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column][vc_column width=&#8221;1\/4&#8243;]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-68002c68d8945\" class=\" wd-rs-68002c68d8945 wd-info-box wd-wpb text-left box-icon-align-top box-style- color-scheme- wd-bg-none with-btn box-btn-static \">\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title box-title-style-default wd-fontsize-m\">24\/7 Hardened Network<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>Protection from Edge-to-Core<\/p>\n<ul>\n<li>Cyber attack trends toward industrial automation sectors is continuous increasing everyday. Cybersecurity&#8230;&#8230;.<\/li>\n<\/ul>\n<p>\n<\/div>\n\n\t\t\t\t\t\t<div class=\"info-btn-wrapper\"><div id=\"wd-69d579c5bc7b1\" class=\"  wd-button-wrapper text-left\"><a href=\"https:\/\/demolinks2.com\/cy-yue\/24-7-hardened-network\/\" title=\"24\/7 Hardened Network\" class=\"btn btn-color-default btn-style-link btn-style-rectangle btn-size-default\">Read More<\/a><\/div><\/div>\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column][\/vc_row][vc_row woodmart_css_id=&#8221;680a8f900ea0e&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2ODBhOGY5MDBlYTBlIiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243; el_id=&#8221;info-four-05&#8243;][vc_column width=&#8221;1\/4&#8243;]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-680a92fd6dbb8\" class=\" wd-rs-680a92fd6dbb8 wd-info-box wd-wpb text-left box-icon-align-top box-style- color-scheme- wd-bg-none with-btn box-btn-static \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"180\" height=\"109\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_733942f1a29a4a0abcbed2721a05e60emv2.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_733942f1a29a4a0abcbed2721a05e60emv2.png 180w, https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_733942f1a29a4a0abcbed2721a05e60emv2-150x91.png 150w\" sizes=\"(max-width: 180px) 100vw, 180px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title box-title-style-default wd-fontsize-m\">Digitization<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>Real-time remote monitoring<\/p>\n<ul>\n<li>The Trends of Industry 4.0 &amp; IIoT impact the efficiency, productive, and competitive within the Manufacturing&#8230;&#8230;<\/li>\n<\/ul>\n<p>\n<\/div>\n\n\t\t\t\t\t\t<div class=\"info-btn-wrapper\"><div id=\"wd-69d579c5bcb99\" class=\"  wd-button-wrapper text-left\"><a href=\"https:\/\/demolinks2.com\/cy-yue\/digitization\/\" title=\"Digitization\" class=\"btn btn-color-default btn-style-link btn-style-rectangle btn-size-default\">Read More<\/a><\/div><\/div>\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column][vc_column width=&#8221;1\/4&#8243;]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-680a92eb80af9\" class=\" wd-rs-680a92eb80af9 wd-info-box wd-wpb text-left box-icon-align-top box-style- color-scheme- wd-bg-none with-btn box-btn-static \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"180\" height=\"109\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/image_edited.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/image_edited.jpg 180w, https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/image_edited-150x91.jpg 150w\" sizes=\"(max-width: 180px) 100vw, 180px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title box-title-style-default wd-fontsize-m\">Smart Infrastructure<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>Reliability | Interoperability<\/p>\n<ul>\n<li>Building a Reliable industrial communication network is crucial, due to the concern about the control systems&#8230;..<\/li>\n<\/ul>\n<p>\n<\/div>\n\n\t\t\t\t\t\t<div class=\"info-btn-wrapper\"><div id=\"wd-69d579c5bcefb\" class=\"  wd-button-wrapper text-left\"><a href=\"https:\/\/demolinks2.com\/cy-yue\/smart-infrastructure\/\" title=\"Smart Infrastructure\" class=\"btn btn-color-default btn-style-link btn-style-rectangle btn-size-default\">Read More<\/a><\/div><\/div>\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column][vc_column width=&#8221;1\/4&#8243;]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-680a92f1943d2\" class=\" wd-rs-680a92f1943d2 wd-info-box wd-wpb text-left box-icon-align-top box-style- color-scheme- wd-bg-none with-btn box-btn-static \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"180\" height=\"109\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_7a3097f222394238a1d7a564f7e87c04mv2.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_7a3097f222394238a1d7a564f7e87c04mv2.png 180w, https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_7a3097f222394238a1d7a564f7e87c04mv2-150x91.png 150w\" sizes=\"(max-width: 180px) 100vw, 180px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title box-title-style-default wd-fontsize-m\">Remote Site Management<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>Reliability | Real-Time | Visibility<\/p>\n<ul>\n<li>Remote field site management is critical to Engineers and Technician without advance notification..<\/li>\n<\/ul>\n<p>\n<\/div>\n\n\t\t\t\t\t\t<div class=\"info-btn-wrapper\"><div id=\"wd-69d579c5bd20e\" class=\"  wd-button-wrapper text-left\"><a href=\"https:\/\/demolinks2.com\/cy-yue\/remote-site-management\/\" title=\"Remote Site Management\" class=\"btn btn-color-default btn-style-link btn-style-rectangle btn-size-default\">Read More<\/a><\/div><\/div>\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column][vc_column width=&#8221;1\/4&#8243;]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-680a93c816772\" class=\" wd-rs-680a93c816772 wd-info-box wd-wpb text-left box-icon-align-top box-style- color-scheme- wd-bg-none with-btn box-btn-static \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"245\" height=\"148\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_df3da1a1962d4d988c071d3d80fddd3dmv2-2.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_df3da1a1962d4d988c071d3d80fddd3dmv2-2.png 245w, https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_df3da1a1962d4d988c071d3d80fddd3dmv2-2-150x91.png 150w\" sizes=\"(max-width: 245px) 100vw, 245px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title box-title-style-default wd-fontsize-m\">24\/7 Hardened Network<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><p>Protection from Edge-to-Core<\/p>\n<ul>\n<li>Cyber attack trends toward industrial automation sectors is continuous increasing everyday. Cybersecurity&#8230;&#8230;.<\/li>\n<\/ul>\n<p>\n<\/div>\n\n\t\t\t\t\t\t<div class=\"info-btn-wrapper\"><div id=\"wd-69d579c5bd4d3\" class=\"  wd-button-wrapper text-left\"><a href=\"https:\/\/demolinks2.com\/cy-yue\/24-7-hardened-network\/\" title=\"24\/7 Hardened Network\" class=\"btn btn-color-default btn-style-link btn-style-rectangle btn-size-default\">Read More<\/a><\/div><\/div>\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1740032182297{padding-top: 90px !important;padding-bottom: 0px !important;}&#8221; woodmart_css_id=&#8221;67b6c80fa96f9&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2N2I2YzgwZmE5NmY5Iiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243; el_id=&#8221;about-row&#8221;][vc_column css=&#8221;.vc_custom_1738681226336{padding-right: 0px !important;}&#8221; woodmart_css_id=&#8221;67a22cae7e07d&#8221; parallax_scroll=&#8221;no&#8221; woodmart_sticky_column=&#8221;false&#8221; wd_collapsible_content_switcher=&#8221;no&#8221; wd_column_role_offcanvas_desktop=&#8221;no&#8221; wd_column_role_offcanvas_tablet=&#8221;no&#8221; wd_column_role_offcanvas_mobile=&#8221;no&#8221; wd_column_role_content_desktop=&#8221;no&#8221; wd_column_role_content_tablet=&#8221;no&#8221; wd_column_role_content_mobile=&#8221;no&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_box_shadow=&#8221;no&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2N2EyMmNhZTdlMDdkIiwic2hvcnRjb2RlIjoidmNfY29sdW1uIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_reset_margin=&#8221;no&#8221; tablet_reset_margin=&#8221;no&#8221; wd_z_index=&#8221;no&#8221;]\n\t\t<div id=\"wd-67b6ceca74452\" class=\"title-wrapper wd-wpb set-mb-s reset-last-child  wd-rs-67b6ceca74452 wd-title-color-default wd-title-style-overlined text-center  wd-underline-colored\">\n\t\t\t\n\t\t\t<div class=\"liner-continer\">\n\t\t\t\t<h4 class=\"woodmart-title-container title  wd-font-weight- wd-fontsize-l\" >Frequently asked questions<\/h4>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\n\t\t[\/vc_column][\/vc_row][vc_row el_id=&#8221;faqs-0000&#8243; woodmart_css_id=&#8221;67b6e1eda5cee&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2N2I2ZTFlZGE1Y2VlIiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243;][vc_column el_id=&#8221;faq&#8217;s-0000&#8243; woodmart_css_id=&#8221;67b6e19ec248f&#8221; parallax_scroll=&#8221;no&#8221; woodmart_sticky_column=&#8221;false&#8221; wd_collapsible_content_switcher=&#8221;no&#8221; wd_column_role_offcanvas_desktop=&#8221;no&#8221; wd_column_role_offcanvas_tablet=&#8221;no&#8221; wd_column_role_offcanvas_mobile=&#8221;no&#8221; wd_column_role_content_desktop=&#8221;no&#8221; wd_column_role_content_tablet=&#8221;no&#8221; wd_column_role_content_mobile=&#8221;no&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_box_shadow=&#8221;no&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2N2I2ZTE5ZWMyNDhmIiwic2hvcnRjb2RlIjoidmNfY29sdW1uIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_reset_margin=&#8221;no&#8221; tablet_reset_margin=&#8221;no&#8221; wd_z_index=&#8221;no&#8221;][vc_tta_tabs alignment=&#8221;center&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Knowledge-Based&#8221; tab_id=&#8221;1740033936452-21726a60-93aa&#8221;]\n\t\t<div id=\"wd-67b6d3502030d\" class=\"wd-accordion wd-wpb wd-rs-67b6d3502030d  wd-style-shadow\" data-state=\"all_closed\">\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"0\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tWhat is Legacy Devices in industrial automation applications?\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"0\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-2vqu1\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Legacy devices in industrial settings refer to outdated equipment that&#8217;s still functional and crucial for operations. Even though they might be older than modern laptops or phones, these devices perform a specific task and replacing them entirely can be very expensive and disruptive. Here&#8217;s a breakdown of why legacy devices are used in industry: <\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-4e25d\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Cost-effectiveness: Replacing perfectly functional equipment with new machines can be a huge financial burden. Legacy devices are often depreciated assets, meaning their value has already been written off, making them a practical solution.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-rlfn\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Reliability: Many legacy devices are built to last. They may have simpler designs that are less prone to breakdowns compared to newer, more complex machines.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-96cc3\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Skillset and familiarity: Workers might be highly skilled at operating and maintaining legacy devices. Replacing them with new technology would require retraining and potentially lead to production slowdowns.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p id=\"viewer-1fol3\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Here are some of the challenges that come with using legacy devices: <\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-3ukd1\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Lack of support: Manufacturers may no longer produce spare parts or offer technical support for legacy devices. This can make repairs and maintenance difficult.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-fovhl\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Security vulnerabilities: Outdated technology might have unpatched security holes, making them susceptible to cyberattacks.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-frvqe\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Integration difficulties: Legacy devices often use older communication protocols that are incompatible with modern Industrial Internet of Things (IIoT) systems.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p id=\"viewer-480g0\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Despite these challenges, many industries find ways to integrate legacy devices with newer technologies. This can be done through: <\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-cr2ek\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Digital Retrofit: Adding new hardware or software components to legacy devices to enable them to communicate with modern systems.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-8r4pi\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Serial-to-Ethernet Converters: These devices act as translators, allowing legacy serial devices to communicate with Ethernet-based networks.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p id=\"viewer-ekgvn\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">By finding ways to bridge the gap, industries can leverage the value of their legacy equipment while also enjoying the benefits of modern advancements. pen_spark<\/span><\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"1\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tWhat is industrial protocols?\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-2vqu1\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Industrial protocols are essentially the languages industrial machines and devices use to communicate with each other. These communication protocols establish the rules for data exchange between different devices on a network, ensuring everything runs smoothly.<\/span><\/p>\n<p id=\"viewer-actjp\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Think of them like programming languages, but instead of creating software functions, they create a standard for how devices exchange information. Here&#8217;s a closer look:<\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-e4thu\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Function: Industrial protocols specify how data is formatted, transmitted, and received by devices. They define things like error correction, synchronization, and how devices address each other on the network.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-bp9p1\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Benefits: By using common protocols, devices from various manufacturers can talk to each other. This enables functionalities like: <\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-19dqc\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Real-time data exchange between machines and control systems<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-fc53i\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Monitoring of equipment health and performance<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-at37\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Remote control and configuration of devices<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<\/ul>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-30imk\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Examples: Some of the most common industrial communication protocols include Modbus, Profibus, EtherNet\/IP, and OPC UA. Each protocol has its strengths and weaknesses, making it suitable for specific applications.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p id=\"viewer-d0gk7\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Industrial protocols play a vital role in modern industrial automation. They allow factories to create interconnected systems where machines can share data, leading to increased efficiency, productivity, and overall control of operations<\/span><\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"2\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tWhat is IT\/OT Convergence?\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-2vqu1\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">IT\/OT convergence refers to the merging of Information Technology (IT) and Operational Technology (OT) systems. Traditionally, these functioned as separate entities:<\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-ecc1n\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">IT systems manage data processing and information within a company, like storing customer records or running business applications.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-9072e\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">OT systems directly control industrial processes and physical equipment, like factory robots or power plant generators.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p id=\"viewer-do95v\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Convergence aims to break down these barriers and enable real-time data exchange between IT and OT. This can be achieved through:<\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-9pfuh\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Connecting OT devices to IT networks: This allows data collected from physical processes (e.g., sensor readings, machine performance) to be transmitted and analyzed within IT systems.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-3p4v8\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Unifying data management: Data from both IT and OT systems can be stored and analyzed together, providing a holistic view of operations.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p id=\"viewer-frvr4\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Here are some of the key benefits of IT\/OT convergence:<\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-7cgop\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Improved decision-making: Real-time data from operations can be used to make data-driven decisions that optimize production, maintenance, and resource allocation.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-feo76\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Enhanced efficiency: Automation and data analysis can streamline processes, reduce errors, and improve overall operational efficiency.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-alo26\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Predictive maintenance: Sensor data can be used to predict equipment failures, allowing for proactive maintenance and preventing downtime.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-7kb8a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">New business models: Convergence can enable the development of new data-driven services and applications that improve customer experiences and create competitive advantages.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p id=\"viewer-19j19\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">However, IT\/OT convergence also presents some challenges:<\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-b3du3\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Security risks: Connecting OT systems to IT networks can introduce new vulnerabilities to cyberattacks. Robust security measures are crucial.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-27o1v\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Integration complexity: Merging different systems with potentially incompatible protocols and architectures requires careful planning and integration efforts.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-c4c6t\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Organizational change: Convergence might necessitate changes in company culture and collaboration between IT and OT teams.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p>Overall, IT\/OT convergence is a powerful trend in industrial automation. By overcoming the challenges, companies can leverage the benefits of this convergence to gain a significant edge in terms of efficiency, productivity, and innovation.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"3\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tWhat is Industry 4.0 standard?\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<ul class=\"s__2PJWtd\">\n<li>\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div>\n<div class=\"fsEVBp\">\n<div class=\"pWY05A ee3Vql E4baU3\">\n<div class=\"GRGO5A\">\n<div class=\"sh_i2Gv\" data-hook=\"children\">\n<div class=\"answer\" data-itemprop=\"acceptedAnswer\">\n<div class=\"questionAnswer rcvForAnswer\">\n<div class=\"sc-gqjmRU eFzLxY\">\n<div class=\"Xk2HO\" dir=\"ltr\" data-id=\"content-viewer\">\n<div class=\"orcxI\" data-query=\"container\">\n<div class=\"MJXUU\">\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Industry 4.0 itself isn&#8217;t a single standard, but rather a concept that describes a new way of thinking about manufacturing. It emphasizes heavy use of technology to create intelligent and interconnected factories. Here are some of the key technologies that underpin Industry 4.0:<\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-c4625\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Cyber-physical systems (CPS): These systems integrate physical machinery with computational algorithms, allowing for real-time monitoring and control.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-bl7cg\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Internet of Things (IoT): Connects machines and devices to gather and share data, enabling communication between different parts of the manufacturing process.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-a36g5\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Big Data and Analytics: Large datasets from sensors and machines are analyzed to identify trends, optimize processes, and predict problems.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-cmmht\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Cloud Computing: Provides access to computing resources and storage on-demand, facilitating remote monitoring and data analysis.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-eo4mj\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Artificial Intelligence (AI): Enables machines to learn from data and make autonomous decisions, such as predictive maintenance or automated quality control.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-27j2g\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Additive Manufacturing (3D Printing): Creates complex objects layer-by-layer, enabling on-demand production and mass customization.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-609l5\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Robotics: Automates tasks and improves efficiency in various aspects of manufacturing.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p id=\"viewer-7mh82\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">By implementing these technologies, industries can achieve significant advantages including:<\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-f5ijt\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Increased productivity<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-10kp3\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Improved quality control<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-99dre\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Reduced costs<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-21h4p\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Enhanced flexibility in production<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-9e7oc\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Greater sustainability<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p id=\"viewer-4s9d9\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">While there isn&#8217;t a single standard that defines Industry 4.0, there are various organizations working on developing standards and reference architectures to guide implementation. These efforts help ensure interoperability between different technologies and promote best practices.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\"><\/div>\n<\/div>\n<\/div>\n<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"4\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tWhat is industrial networking?\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"4\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Industrial networking refers to the communication systems that connect various devices and machines within an industrial setting. Imagine a factory floor &#8211; industrial networking establishes the communication channels that allow all the machines, sensors, and control systems to talk to each other and share information.<\/span><\/p>\n<p id=\"viewer-ccibg\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Here&#8217;s a breakdown of what industrial networking is all about:<\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-eia5b\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Function: It facilitates the exchange of data between different industrial devices like sensors, actuators, controllers, and human-machine interfaces (HMI). This data exchange enables functionalities like real-time monitoring, control, and optimization of industrial processes.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-cba1r\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Components: Industrial networks consist of several key elements: <\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-4h75i\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Physical Layer: This includes the cables, connectors, and wireless technologies that transmit data between devices. Common examples include Ethernet cables, fiber optics, and industrial Wi-Fi.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-k3lv\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Data Link Layer: Defines how data is packaged and transmitted over the physical layer. Protocols like Modbus and Profibus operate at this layer.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-76les\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Network Devices: These include routers, switches, and gateways that manage data flow and direct information to the correct destinations within the network.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<\/ul>\n<div id=\"viewer-fnt6j\" class=\"R920X _5wA-D d0eTW WnBEd\"><span class=\"J6XX-\">\u00a0<\/span><\/div>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-3cvdf\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Benefits: Effective industrial networking offers several advantages: <\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-kgpb\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Improved Efficiency: Real-time communication allows for faster decision-making and optimized control of processes, leading to increased production output.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-ah5ch\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Enhanced Quality Control: Continuous monitoring of machines and processes through sensor data enables early detection of anomalies and improves product quality.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-crdeq\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Reduced Downtime: Predictive maintenance based on sensor data helps prevent equipment failures and minimizes downtime.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-8ao5d\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Greater Flexibility: Industrial networks enable easier integration of new machines and processes, fostering adaptability to changing demands.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<\/ul>\n<div id=\"viewer-5shbm\" class=\"R920X _5wA-D d0eTW WnBEd\"><span class=\"J6XX-\">\u00a0<\/span><\/div>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-6d61j\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Types of Industrial Networks: There are various types of industrial networks, each suited for specific applications. Some common examples include: <\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-80unn\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Fieldbus Networks: Connect sensors and actuators to controllers at the device level. Examples include Profibus and DeviceNet.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-f788k\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Industrial Ethernet: Uses standard Ethernet protocols for high-speed data transfer between controllers and other devices.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-bqggn\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Wireless Industrial Networks: Utilize Wi-Fi or cellular technologies for communication in areas where cables are impractical.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<\/ul>\n<p id=\"viewer-csfuq\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Industrial networking plays a critical role in modern industrial automation. By enabling seamless communication between devices, it paves the way for smarter, more efficient, and more responsive factories.<\/span><\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"5\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tWhat is IEEE802.11 standard?\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"5\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">The IEEE 802.11 standard, also widely known as Wi-Fi, is a set of protocols that define how wireless devices communicate with each other in a Wireless Local Area Network (WLAN). It specifies the rules for how data is transmitted and received over radio waves, ensuring compatibility between devices from various manufacturers. Think of it as a universal language that allows laptops, smartphones, tablets, printers, and other devices to connect to the internet or each other wirelessly. Here&#8217;s a deeper dive into IEEE 802.11: <\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-c6uop\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Function: IEEE 802.11 defines two key layers for wireless communication: <\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-4fk5v\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Medium Access Control (MAC) Layer: This layer controls how devices take turns transmitting data over the shared wireless medium to avoid collisions.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-bv4rm\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Physical Layer (PHY): This layer specifies how data is converted into radio signals and vice versa, including aspects like frequency bands, transmission power, and modulation techniques.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<\/ul>\n<div id=\"viewer-hn3l\" class=\"R920X _5wA-D d0eTW WnBEd\"><span class=\"J6XX-\">\u00a0<\/span><\/div>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-ardi8\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Variations: The IEEE 802.11 standard has multiple variations, each offering different characteristics in terms of speed, range, and frequency band: <\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-adrt4\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">802.11a: Operates in the 5 GHz band, offering faster speeds but with shorter range compared to other variations.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-c6vrb\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">802.11b: Operates in the 2.4 GHz band, providing a balance between range and speed but susceptible to interference from other devices using the same frequency.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-25au2\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">802.11g: Also operates in the 2.4 GHz band but offers higher speeds than 802.11b.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-4nll3\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">802.11n: Employs Multiple-Input Multiple-Output (MIMO) technology to achieve increased data rates and improved range.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-8cb6p\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">802.11ac: Operates in both 2.4 GHz and 5 GHz bands and offers significant speed improvements over 802.11n.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-bup74\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">802.11ax (Wi-Fi 6): Latest standard known for higher data rates, improved capacity for handling multiple devices, and better performance in congested environments.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<\/ul>\n<div id=\"viewer-ag6d5\" class=\"R920X _5wA-D d0eTW WnBEd\"><span class=\"J6XX-\">\u00a0<\/span><\/div>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-1n2om\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Evolution: The IEEE 802.11 working group continues to develop new amendments and standards to improve Wi-Fi technology. Newer variations aim to address limitations of previous versions by providing faster speeds, wider coverage, better handling of network congestion, and increased energy efficiency.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p id=\"viewer-5usrd\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">In conclusion, the IEEE 802.11 standard is the foundation of Wi-Fi, the most widely used technology for wireless networking. It ensures interoperability between devices and continues to evolve to meet the growing demands of data transfer and connectivity. <\/span><\/p>\n<p class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">pen_spark tuneshare <\/span><\/p>\n<p class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">more_vert<\/span><\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"6\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tDSCP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"6\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p>DSCP is an acronym for Differentiated Services Code Point. It is a field in the header of IP packets for packet classification purposes.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t[\/vc_tta_section][vc_tta_section title=&#8221;FAQ&#8217;s&#8221; tab_id=&#8221;1740035220228-f57adfe9-6573&#8243;]\n\t\t<div id=\"wd-67b6d3502030d\" class=\"wd-accordion wd-wpb wd-rs-67b6d3502030d  wd-style-shadow\" data-state=\"all_closed\">\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"0\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tWhat are the 802.11 wireless standards\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"0\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-2vqu1\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">The 802.11 wireless standards, also known as Wi-Fi standards, are a family of specifications developed by the Institute of Electrical and Electronics Engineers (IEEE) that define how devices communicate wirelessly on a WLAN (Wireless Local Area Network). These standards specify how data is transmitted and received over radio waves, ensuring compatibility between devices from various manufacturers. Here&#8217;s a breakdown of some common variations of the 802.11 standards: <\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-512i5\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">802.11a: Launched in 1999, this standard operates in the 5 GHz band. It offered faster speeds compared to earlier standards but with a shorter range.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-at971\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">802.11b: Released in 1999, this standard operates in the 2.4 GHz band. It provided a balance between range and speed but was susceptible to interference from common devices like cordless phones and microwave ovens that also use the same frequency band.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-6rm3e\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">802.11g: Introduced in 2003, this standard also operates in the 2.4 GHz band but offers faster data rates than 802.11b while maintaining backward compatibility.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-4fnmr\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">802.11n: Released in 2009, this standard introduced MIMO (Multiple-Input Multiple-Output) technology, which significantly improved data rates and range over previous standards. It operates in both 2.4 GHz and 5 GHz bands.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-38ebs\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">802.11ac: Released in 2013, this standard offered significant speed improvements over 802.11n. It operates in both 2.4 GHz and 5 GHz bands and utilizes wider channels and higher modulation techniques to achieve faster data transfer rates.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-1emja\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">802.11ax (Wi-Fi 6): Released in 2021, this is the latest standard known for even higher data rates, improved capacity to handle more devices on a network, and better performance in congested environments. It operates in the 2.4 GHz, 5 GHz, and even the 6 GHz band (where available).<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p id=\"viewer-1cgfi\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">It&#8217;s important to note that these are just some of the most common variations of the 802.11 standards. The IEEE 802.11 working group continues to develop new amendments and standards to address the ever-growing demands for faster speeds, wider coverage, better network congestion handling, and increased energy efficiency. pen_spark <\/span><\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"1\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tHow serial to Ethernet device works?\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">A serial-to-Ethernet converter acts as a bridge between serial devices and Ethernet networks. Serial communication involves sending data one bit at a time over a wired connection, while Ethernet transmits data in packets over a network. The converter translates between these two different communication protocols.<\/span><\/p>\n<p id=\"viewer-ddit5\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Here&#8217;s a breakdown of how a serial-to-Ethernet converter works:<\/span><\/p>\n<ol class=\"GNmoH vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-4tok7\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Connection: You&#8217;ll connect your serial device (usually through a serial port like RS-232) to the converter. The converter itself will then be connected to your Ethernet network using an Ethernet cable.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-6nlq7\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Data Transmission: When the serial device transmits data, the converter receives it as a serial data stream.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-4mcu\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Encapsulation: The converter encapsulates the serial data within an Ethernet packet. This packet includes the serial data itself, along with addressing information and other control signals necessary for proper network transmission.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-5acn0\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Transmission over Ethernet: The converter then transmits the Ethernet packet over the network to the designated recipient. This recipient could be another computer on the network running software that can understand the serial data, or another serial-to-Ethernet converter connected to a different serial device.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-8t73d\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Decapsulation and Delivery: When the Ethernet packet reaches its destination, the receiving converter (or software) decapsulates the packet, extracts the original serial data, and delivers it to the connected serial device.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-4s5on\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Bi-directional Communication: Serial-to-Ethernet converters typically operate bidirectionally. This means they can both transmit and receive data, allowing for two-way communication between the serial device and the network.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ol>\n<p id=\"viewer-9u704\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Here are some additional points to consider:<\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-7ehuv\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Configuration: Serial-to-Ethernet converters might require some configuration to specify communication settings like baud rate, parity, and data bits. These settings need to match the settings of the serial device for proper communication.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-8tp2u\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Virtual COM Ports: Some converter solutions create virtual COM ports on the connected computer. This allows software designed for traditional serial communication to interact with the serial device over the network as if it were directly connected.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-65f3v\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Applications: Serial-to-Ethernet converters are used in various industrial and commercial applications where legacy serial devices need to be integrated into modern Ethernet networks. This allows for remote access, monitoring, and control of these devices from a central location.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p id=\"viewer-absgo\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Overall, serial-to-Ethernet converters play a crucial role in bridging the gap between legacy serial devices and modern Ethernet networks, facilitating communication and data exchange in various industrial settings.<\/span><\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"2\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tWhat is industrial Ethernet Network?\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">An industrial Ethernet network is a system that connects devices on a Local Area Network (LAN) using Ethernet technology. Here&#8217;s a breakdown of what an Ethernet network is and how it works:<\/span><\/p>\n<p id=\"viewer-fllvi\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Components:<\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-73vje\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Devices: These can be computers, printers, servers, gaming consoles, or any device with an Ethernet port.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-ccfji\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Cables: Ethernet networks traditionally use twisted-pair copper cables to connect devices. In some cases, fiber optic cables are used for longer distances or higher bandwidth needs.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-1q4ib\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Network Devices (optional): Switches and routers are networking devices that can be used to manage data flow within the network and connect multiple Ethernet segments. For small home networks, a simple router with built-in switch functionality might be sufficient.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p id=\"viewer-4p79d\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">How it Works:<\/span><\/p>\n<ol class=\"GNmoH vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-d5krl\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Data Transmission: When a device on the network wants to send data to another device, it packages the data into packets. These packets contain the destination address, source address, and the actual data itself.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-764pl\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Communication: The device transmits the data packet over the Ethernet cable to the connected network switch (or router).<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-53gd7\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Routing (if using a switch): The switch reads the destination address in the packet and intelligently routes it towards the intended recipient device on the network.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-9s0vj\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Delivery: The recipient device receives the data packet, verifies the destination address, and extracts the actual data.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ol>\n<p id=\"viewer-4vb0t\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Benefits of Ethernet Networks:<\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-cacnk\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Reliability: Wired connections offer a stable and dependable connection compared to Wi-Fi, which can be affected by interference and signal fluctuations.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-7jclr\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Speed: Ethernet provides high data transfer rates, enabling fast communication and data exchange between devices. Speeds can range from 10 Mbps (megabits per second) to 10 Gbps (gigabits per second) depending on the Ethernet standard used.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-7glq7\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Security: Wired connections are generally considered more secure than wireless connections, as they are less susceptible to eavesdropping.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-8vlfl\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Scalability: Ethernet networks can be easily scaled to accommodate more devices by adding switches and extending cables.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p id=\"viewer-58obn\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Applications:<\/span><\/p>\n<p id=\"viewer-2gbcd\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Ethernet networks are the foundation of wired networking in various settings, including:<\/span><\/p>\n<ul class=\"b8zlN vC2ou\">\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-e5r5f\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Homes: Connecting computers, printers, and other devices for sharing resources and internet access.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-bfasq\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Businesses: Creating a secure and reliable network for communication, data transfer, and resource sharing within an organization.<\/span><\/p>\n<\/div>\n<\/li>\n<li class=\"-PmAX d0eTW\" dir=\"auto\">\n<div>\n<p id=\"viewer-37g8\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Schools: Enabling network access for computers, labs, and other devices used for educational purposes.<\/span><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p id=\"viewer-8hugg\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Overall, Ethernet networks offer a reliable and efficient way to connect devices and share data on a Local Area Network. They provide the backbone for wired communication in homes, businesses, and many other organizations.<\/span><\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t[\/vc_tta_section][vc_tta_section title=&#8221;Terminology &#8211; Network Acronyms&#8221; tab_id=&#8221;1740035200869-02ce2036-2ef9&#8243;]\n\t\t<div id=\"wd-67b6d3502030d\" class=\"wd-accordion wd-wpb wd-rs-67b6d3502030d  wd-style-shadow\" data-state=\"all_closed\">\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"0\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tACE\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"0\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p>ACE is an acronym for Access Control Entry. It describes access permission associated with a particular ACE ID. There are three ACE frame types (Ethernet Type, ARP, and IPv4) and two ACE actions (permit and deny). The ACE also contains many detailed, different parameter options that are available for individual application.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"1\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tACL\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"1\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p>ACL is an acronym for Access Control List. It is the list table of ACEs, containing access control entries that specify individual users or groups permitted or denied to specific traffic objects, such as a process or a program. Each accessible traffic object contains an identifier to its ACL. The privileges determine whether there are specific traffic object access rights. ACL implementations can be quite complex, for example, when the ACEs are prioritized for the various situation. In networking, the ACL refers to a list of service ports or network services that are available on a host or server, each with a list of hosts or servers permitted or denied to use the service. ACL can generally be configured to control inbound traffic, and in this context, they are similar to firewalls.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"2\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tAES\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"2\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p>AES is an acronym for Advanced Encryption Standard. The encryption key protocol is applied in 802.1i standard to improve WLAN security. It is an encryption standard by the U.S. government, which will replace DES and 3DES. AES has a fixed block size of 128 bits and a key size of 128, 192, or 256 bits.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"3\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tAPS\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"3\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p>APS is an acronym for Automatic Protection Switching. This protocol is used to secure that switching is done bidirectional in the two ends of a protection group, as defined in G.8031.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"4\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tARP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"4\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p>ARP is an acronym for Address Resolution Protocol. It is a protocol that used to convert an IP address into a physical address, such as an Ethernet address. ARP allows a host to communicate with other hosts when only the Internet address of its neighbors is known. Before using IP, the host sends a broadcast ARP request containing the Internet address of the desired destination system.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"5\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tARP Inspection\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"5\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p>ARP Inspection is a secure feature. Several types of attacks can be launched against a host or devices connected to Layer 2 networks by &#8220;poisoning&#8221; the ARP caches. This feature is used to block such attacks. Only valid ARP requests and responses can go through the switch device.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"6\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tDES\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"6\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p>DES is an acronym for Data Encryption Standard. It provides a complete description of a mathematical algorithm for encrypting (enciphering) and decrypting (deciphering) binary coded information.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"7\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tDHCP.......\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"7\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<ul class=\"s__2PJWtd\">\n<li>\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div>\n<div class=\"fsEVBp\">\n<div class=\"pWY05A ee3Vql E4baU3\">\n<div class=\"GRGO5A\">\n<div class=\"sh_i2Gv\" data-hook=\"children\">\n<div class=\"answer\" data-itemprop=\"acceptedAnswer\">\n<div class=\"questionAnswer rcvForAnswer\">\n<div class=\"sc-gqjmRU eFzLxY\">\n<div class=\"Xk2HO\" dir=\"ltr\" data-id=\"content-viewer\">\n<div class=\"orcxI\" data-query=\"container\">\n<div class=\"MJXUU\">\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">DHCP &#8211; is an acronym for Dynamic Host Configuration Protocol. It is a protocol used for assigning dynamic IP addresses to devices on a network.<\/span><\/p>\n<p id=\"viewer-es8g6\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">DHCP Relay &#8211; is used to forward and to transfer DHCP messages between the clients and the server when they are not on the same subnet domain. <\/span><\/p>\n<p id=\"viewer-4i8go\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">DHCP Snooping &#8211; is used to block intruder on the untrusted ports of the switch device when it tries to intervene by injecting a bogus DHCP reply packet to a legitimate conversation between the DHCP client and server. <\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\"><\/div>\n<\/div>\n<\/div>\n<\/li>\n<\/ul>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"8\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tDNS\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"8\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div>\n<div class=\"fsEVBp\">\n<div class=\"pWY05A ee3Vql E4baU3\">\n<div class=\"GRGO5A\">\n<div class=\"sh_i2Gv\" data-hook=\"children\">\n<div class=\"answer\" data-itemprop=\"acceptedAnswer\">\n<div class=\"questionAnswer rcvForAnswer\">\n<div class=\"sc-gqjmRU eFzLxY\">\n<div class=\"Xk2HO\" dir=\"ltr\" data-id=\"content-viewer\">\n<div class=\"orcxI\" data-query=\"container\">\n<div class=\"MJXUU\">\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">DNS is an acronym for Domain Name System. It stores and associates many types of information with domain names. Most importantly, DNS translates human-friendly domain names and computer hostnames into computer friendly IP addresses. For example, the domain name www.example.com might translate to 192.168.0.1.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"9\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tDoS\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"9\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div>\n<div class=\"fsEVBp\">\n<div class=\"pWY05A ee3Vql E4baU3\">\n<div class=\"GRGO5A\">\n<div class=\"sh_i2Gv\" data-hook=\"children\">\n<div class=\"answer\" data-itemprop=\"acceptedAnswer\">\n<div class=\"questionAnswer rcvForAnswer\">\n<div class=\"sc-gqjmRU eFzLxY\">\n<div class=\"Xk2HO\" dir=\"ltr\" data-id=\"content-viewer\">\n<div class=\"orcxI\" data-query=\"container\">\n<div class=\"MJXUU\">\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">DoS is an acronym for Denial of Service. In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting at network sites or network connection, an attacker may be able to prevent network users from accessing email, web sites, online accounts (banking, etc.), or other services that rely on the affected computer.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"10\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tEther Type\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"10\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div>\n<div class=\"fsEVBp\">\n<div class=\"pWY05A ee3Vql E4baU3\">\n<div class=\"GRGO5A\">\n<div class=\"sh_i2Gv\" data-hook=\"children\">\n<div class=\"answer\" data-itemprop=\"acceptedAnswer\">\n<div class=\"questionAnswer rcvForAnswer\">\n<div class=\"sc-gqjmRU eFzLxY\">\n<div class=\"Xk2HO\" dir=\"ltr\" data-id=\"content-viewer\">\n<div class=\"orcxI\" data-query=\"container\">\n<div class=\"MJXUU\">\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">Ether Type, or Ethernet Type, is a field in the Ethernet MAC header, defined by the Ethernet networking standard. It is used to indicate which protocol is being transported in an Ethernet frame<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"11\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tFTP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"11\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div>\n<div class=\"fsEVBp\">\n<div class=\"pWY05A ee3Vql E4baU3\">\n<div class=\"GRGO5A\">\n<div class=\"sh_i2Gv\" data-hook=\"children\">\n<div class=\"answer\" data-itemprop=\"acceptedAnswer\">\n<div class=\"questionAnswer rcvForAnswer\">\n<div class=\"sc-gqjmRU eFzLxY\">\n<div class=\"Xk2HO\" dir=\"ltr\" data-id=\"content-viewer\">\n<div class=\"orcxI\" data-query=\"container\">\n<div class=\"MJXUU\">\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">FTP is an acronym for File Transfer Protocol. It is a transfer protocol that uses the Transmission Control Protocol (TCP) and provides file writing and reading. It also provides directory service and security features.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"12\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tFast Leave (Multicast snooping)\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"12\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div>\n<div class=\"fsEVBp\">\n<div class=\"pWY05A ee3Vql E4baU3\">\n<div class=\"GRGO5A\">\n<div class=\"sh_i2Gv\" data-hook=\"children\">\n<div class=\"answer\" data-itemprop=\"acceptedAnswer\">\n<div class=\"questionAnswer rcvForAnswer\">\n<div class=\"sc-gqjmRU eFzLxY\">\n<div class=\"Xk2HO\" dir=\"ltr\" data-id=\"content-viewer\">\n<div class=\"orcxI\" data-query=\"container\">\n<div class=\"MJXUU\">\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">Multicast snooping Fast Leave processing allows the switch to remove an interface from the forwarding-table entry without first sending out group specific queries to the interface. The VLAN interface is pruned from the multicast tree for the multicast group specified in the original leave message. Fast-leave processing ensures optimal bandwidth management for all hosts on a switched network, even when multiple multicast groups are in use simultaneously. This processing applies to IGMP and MLD.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"13\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tHTTP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"13\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div>\n<div class=\"fsEVBp\">\n<div class=\"pWY05A ee3Vql E4baU3\">\n<div class=\"GRGO5A\">\n<div class=\"sh_i2Gv\" data-hook=\"children\">\n<div class=\"answer\" data-itemprop=\"acceptedAnswer\">\n<div class=\"questionAnswer rcvForAnswer\">\n<div class=\"sc-gqjmRU eFzLxY\">\n<div class=\"Xk2HO\" dir=\"ltr\" data-id=\"content-viewer\">\n<div class=\"orcxI\" data-query=\"container\">\n<div class=\"MJXUU\">\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">HTTP is an acronym for Hypertext Transfer Protocol. It is a protocol that used to transfer or convey information on the World Wide Web (WWW). HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when you enter a URL in your browser, this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested Web page. The other main standard that controls how the World Wide Web works is HTML, which covers how Web pages are formatted and displayed. <\/span><\/p>\n<p id=\"viewer-3vqlv\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Any Web server machine contains, in addition to the Web page files it can serve, an HTTP daemon, a program that is designed to wait for HTTP requests and handle them when they arrive. The Web browser is an HTTP client, sending requests to server machines. An HTTP client initiates a request by establishing a Transmission Control Protocol (TCP) connection to a particular port on a remote host (port 80 by default). An HTTP server listening on that port waits for the client to send a request message.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"14\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tHTTPS\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"14\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div>\n<div class=\"fsEVBp\">\n<div class=\"pWY05A ee3Vql E4baU3\">\n<div class=\"GRGO5A\">\n<div class=\"sh_i2Gv\" data-hook=\"children\">\n<div class=\"answer\" data-itemprop=\"acceptedAnswer\">\n<div class=\"questionAnswer rcvForAnswer\">\n<div class=\"sc-gqjmRU eFzLxY\">\n<div class=\"Xk2HO\" dir=\"ltr\" data-id=\"content-viewer\">\n<div class=\"orcxI\" data-query=\"container\">\n<div class=\"MJXUU\">\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">HTTPS is an acronym for Hypertext Transfer Protocol over Secure Socket Layer. It is used to indicate a secure HTTP connection. HTTPS provide authentication and encrypted communication and is widely used on the World Wide Web for security-sensitive communication such as payment transactions and corporate logins. HTTPS is really just the use of Netscape&#8217;s Secure Socket Layer (SSL) as a sublayer under its regular HTTP application layering. (HTTPS uses port 443 instead of HTTP port 80 in its interactions with the lower layer, TCP\/IP.) SSL uses a 40-bit key size for the RC4 stream encryption algorithm, which is no longer considered an adequate degree of encryption for commercial exchange.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"15\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tICMP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"15\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div>\n<div class=\"fsEVBp\">\n<div class=\"pWY05A ee3Vql E4baU3\">\n<div class=\"GRGO5A\">\n<div class=\"sh_i2Gv\" data-hook=\"children\">\n<div class=\"answer\" data-itemprop=\"acceptedAnswer\">\n<div class=\"questionAnswer rcvForAnswer\">\n<div class=\"sc-gqjmRU eFzLxY\">\n<div class=\"Xk2HO\" dir=\"ltr\" data-id=\"content-viewer\">\n<div class=\"orcxI\" data-query=\"container\">\n<div class=\"MJXUU\">\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">ICMP is an acronym for Internet Control Message Protocol. It is a protocol that generated the error response, diagnostic or routing purposes. ICMP messages generally contain information about routing difficulties or simple exchanges such as time-stamp or echo transactions. For example, the PING command uses ICMP to test an Internet connection.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"16\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tIEEE 802.1X\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"16\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div>\n<div class=\"fsEVBp\">\n<div class=\"pWY05A ee3Vql E4baU3\">\n<div class=\"GRGO5A\">\n<div class=\"sh_i2Gv\" data-hook=\"children\">\n<div class=\"answer\" data-itemprop=\"acceptedAnswer\">\n<div class=\"questionAnswer rcvForAnswer\">\n<div class=\"sc-gqjmRU eFzLxY\">\n<div class=\"Xk2HO\" dir=\"ltr\" data-id=\"content-viewer\">\n<div class=\"orcxI\" data-query=\"container\">\n<div class=\"MJXUU\">\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">IEEE 802.1X is an IEEE standard for port-based Network Access Control. It provides authentication to devices attached to a LAN port, establishing a point-to-point connection or preventing access from that port if authentication fails. With 802.1X, access to all switch ports can be centrally controlled from a server, which means that authorized users can use the same credentials for authentication from any point within the network.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"17\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tIGMP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"17\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div>\n<div class=\"fsEVBp\">\n<div class=\"pWY05A ee3Vql E4baU3\">\n<div class=\"GRGO5A\">\n<div class=\"sh_i2Gv\" data-hook=\"children\">\n<div class=\"answer\" data-itemprop=\"acceptedAnswer\">\n<div class=\"questionAnswer rcvForAnswer\">\n<div class=\"sc-gqjmRU eFzLxY\">\n<div class=\"Xk2HO\" dir=\"ltr\" data-id=\"content-viewer\">\n<div class=\"orcxI\" data-query=\"container\">\n<div class=\"MJXUU\">\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">IGMP is an acronym for Internet Group Management Protocol. It is a communications protocol used to manage the membership of Internet Protocol multicast groups. IGMP is used by IP hosts and adjacent multicast routers to establish multicast group memberships. It is an integral part of the IP multicast specification, like ICMP for unicast connections. IGMP can be used for online video and gaming, and allows more efficient use of resources when supporting these uses. <\/span><\/p>\n<p id=\"viewer-52ja6\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">IGMP Querier A router sends IGMP Query messages onto a particular link. This router is called the Querier. There will be only one IGMP Querier that wins Querier election on a particular link. <\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"18\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tIMAP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"18\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div>\n<div class=\"fsEVBp\">\n<div class=\"pWY05A ee3Vql E4baU3\">\n<div class=\"GRGO5A\">\n<div class=\"sh_i2Gv\" data-hook=\"children\">\n<div class=\"answer\" data-itemprop=\"acceptedAnswer\">\n<div class=\"questionAnswer rcvForAnswer\">\n<div class=\"sc-gqjmRU eFzLxY\">\n<div class=\"Xk2HO\" dir=\"ltr\" data-id=\"content-viewer\">\n<div class=\"orcxI\" data-query=\"container\">\n<div class=\"MJXUU\">\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">IMAP is an acronym for Internet Message Access Protocol. It is a protocol for email clients to retrieve email messages from a mail server. IMAP is the protocol that IMAP clients use to communicate with the servers, and SMTP is the protocol used to transport mail to an IMAP server. The current version of the Internet Message Access Protocol is IMAP4. It is similar to Post Office Protocol version 3 (POP3), but offers additional and more complex features. For example, the IMAP4 protocol leaves your email messages on the server rather than downloading them to your computer. If you wish to remove your messages from the server, you must use your mail client to generate local folders, copy messages to your local hard drive, and then delete and expunge the messages from the server.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"19\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tIP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"19\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p>IP is an acronym for Internet Protocol. It is a protocol used for communicating data across an internet network. IP is a &#8220;best effort&#8221; system, which means that no packet of information sent over is assured to reach its destination in the same condition it was sent. Each device connected to a Local Area Network (LAN) or Wide Area Network (WAN) is given an Internet Protocol address, and this IP address is used to identify the device uniquely among all other devices connected to the extended network. The current version of the Internet protocol is IPv4, which has 32-bits Internet Protocol addresses allowing for in excess of four billion unique addresses. This number is reduced drastically by the practice of webmasters taking addresses in large blocks, the bulk of which remain unused. There is a rather substantial movement to adopt a new version of the Internet Protocol, IPv6, which would have 128-bits Internet Protocol addresses. This number can be represented roughly by a three with thirty-nine zeroes after it. However, IPv4 is still the protocol of choice for most of the Internet.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"20\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tIPMC\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"20\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">IPMC is an acronym for IP Multicast. IPMC supports IPv4 and IPv6 multicasting. IPMCv4 denotes multicast for IPv4. IPMCv6 denotes multicast for IPv6.<\/span><\/p>\n<p id=\"viewer-arv1o\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">IPMC Profile is an acronym for IP Multicast Profile. IPMC Profile is used to deploy the access control on IP multicast streams. <\/span><\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"21\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tIP Source Guard\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"21\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">IP Source Guard is a secure feature used to restrict IP traffic on DHCP snooping untrusted ports by filtering traffic based on the DHCP Snooping Table or manually configured IP Source Bindings. It helps prevent IP spoofing attacks when a host tries to spoof and use the IP address of another host.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"22\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tLACP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"22\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">LACP is an IEEE 802.3ad standard protocol. The Link Aggregation Control Protocol, allows bundling several physical ports together to form a single logical port.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"23\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tLLC\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"23\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">The IEEE 802.2 Logical Link Control (LLC) protocol provides a link mechanism for upper layer protocols. It is the upper sub-layer of the Data Link Layer and provides multiplexing mechanisms that make it possible for several network protocols (IP, IPX) to coexist within a multipoint network. LLC header consists of 1 byte DSAP (Destination Service Access Point), 1 byte SSAP (Source Service Access Point), 1 or 2 bytes Control field followed by LLC information.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"24\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tLLDP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"24\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">LLDP is an IEEE 802.1ab standard protocol. The Link Layer Discovery Protocol(LLDP) specified in this standard allows stations attached to an IEEE 802 LAN to advertise, to other stations attached to the same IEEE 802 LAN, the major capabilities provided by the system incorporating that station, the management address or addresses of the entity or entities that provide management of those capabilities, and the identification of the stations point of attachment to the IEEE 802 LAN required by those management entity or entities. The information distributed via this protocol is stored by its recipients in a standard Management Information Base (MIB), making it possible for the information to be accessed by a Network Management System (NMS) using a management protocol such as the Simple Network Management Protocol (SNMP). <\/span><\/p>\n<p id=\"viewer-2ompj\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">LLDP-MED is an extension of IEEE 802.1ab and is defined by the telecommunication industry association (TIA-1057).<\/span><\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"25\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tLLQI\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"25\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">LLQI (Last Listener Query Interval) is the maximum response time used to calculate the Maximum Response Code inserted into Specific Queries. It is used to detect the departure of the last listener for a multicast address or source. In IGMP, this term is called LMQI (Last Member Query Interval).<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"26\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tMAC Table\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"26\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">Switching of frames is based upon the DMAC address contained in the frame. The switch builds up a table that maps MAC addresses to switch ports for knowing which ports the frames should go to (based upon the DMAC address in the frame). This table contains both static and dynamic entries. The static entries are configured by the network administrator if the administrator wants to do a fixed mapping between the DMAC address and switch ports. The frames also contain a MAC address (SMAC address), which shows the MAC address of the equipment sending the frame. The SMAC address is used by the switch to automatically update the MAC table with these dynamic MAC addresses. Dynamic entries are removed from the MAC table if no frame with the corresponding SMAC address have been seen after a configurable age time.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"27\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tMD5\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"27\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">MD5 is an acronym for Message-Digest algorithm 5. MD5 is a message digest algorithm, used cryptographic hash function with a 128-bit hash value. It was designed by Ron Rivest in 1991. MD5 is officially defined in RFC 1321 &#8211; The MD5 Message-Digest Algorithm.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"28\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tMirroring\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"28\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">For debugging network problems or monitoring network traffic, the switch system can be configured to mirror frames from multiple ports to a mirror port. (In this context, mirroring a frame is the same as copying the frame.) Both incoming (source) and outgoing (destination) frames can be mirrored to the mirror port.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"29\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tMLD\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"29\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">MLD is an acronym for Multicast Listener Discovery for IPv6. MLD is used by IPv6 routers to discover multicast listeners on a directly attached link, much as IGMP is used in IPv4. The protocol is embedded in ICMPv6 instead of using a separate protocol.<\/span><\/p>\n<p id=\"viewer-5ol43\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">MLD Querier A router sends MLD Query messages onto a particular link. This router is called the Querier. There will be only one MLD Querier that wins Querier election on a particular link. <\/span><\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"30\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tMSTP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"30\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">In 2002, the IEEE introduced an evolution of RSTP: the Multiple Spanning Tree Protocol. The MSTP protocol provides for multiple spanning tree instances, while ensuring RSTP and STP compatibility. The standard was originally defined by IEEE 802.1s, but was later incorporated in IEEE 802.1D-2005.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"31\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tMVR\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"31\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">Multicast VLAN Registration (MVR) is a protocol for Layer 2 (IP)-networks that enables multicast-traffic from a source VLAN to be shared with subscriber-VLANs. The main reason for using MVR is to save bandwidth by preventing duplicate multicast streams being sent in the core network, instead the stream(s) are received on the MVR-VLAN and forwarded to the VLANs where hosts have requested it\/them.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"32\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tNAS\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"32\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">NAS is an acronym for Network Access Server. The NAS is meant to act as a gateway to guard access to a protected source. A client connects to the NAS, and the NAS connects to another resource asking whether the client&#8217;s supplied credentials are valid. Based on the answer, the NAS then allows or disallows access to the protected resource. An example of a NAS implementation is IEEE 802.1X.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"33\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tNetBIOS\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"33\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">NetBIOS is an acronym for Network Basic Input\/Output System. It is a program that allows applications on separate computers to communicate within a Local Area Network (LAN), and it is not supported on a Wide Area Network (WAN). The NetBIOS giving each computer in the network both a NetBIOS name and an IP address corresponding to a different host name, provides the session and transport services described in the Open Systems Interconnection (OSI) model.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"34\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tNFS\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"34\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">NFS is an acronym for Network File System. It allows hosts to mount partitions on a remote system and use them as though they are local file systems.<\/span><\/p>\n<p id=\"viewer-4m4ob\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">NFS allows the system administrator to store resources in a central location on the network, providing authorized users continuous access to them, which means NFS supports sharing of files, printers, and other resources as persistent storage over a computer network.<\/span><\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"35\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tNTP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"35\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">NTP is an acronym for Network Time Protocol, a network protocol for synchronizing the clocks of computer systems. NTP uses UDP (datagrams) as transport layer.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"36\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tOAM\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"36\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">OAM is an acronym for Operation Administration and Maintenance. It is a protocol described in ITU-T Y.1731 used to implement carrier Ethernet functionality. MEP functionality like CC and RDI is based on this.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"37\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tOptional TLVs\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"37\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">A LLDP frame contains multiple TLVs For some TLVs it is configurable if the switch shall include the TLV in the LLDP frame. These TLVs are known as optional TLVs. If an optional TLVs is disabled the corresponding information is not included in the LLDP frame.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"38\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tQUI\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"38\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">OUI is the organizationally unique identifier. An OUI address is a globally unique identifier assigned to a vendor by IEEE. User can determine which vendor a device belongs to according to the OUI address which forms the first 24 bits of a MAC address.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"39\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tPCP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"39\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">PCP is an acronym for Priority Code Point. It is a 3-bit field storing the priority level for the 802.1Q frame. It is also known as User Priority.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"40\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tPoE\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"40\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">PoE is an acronym for Power Over Ethernet. Power over Ethernet is used to transmit electrical power, to remote devices over standard Ethernet cable. It could for example be used for powering IP telephones, wireless LAN Access Points (AP), IP cameras and other equipment, where it would be difficult or expensive to connect the equipment to main power supply.<\/span><\/p>\n<p id=\"viewer-khmd\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">PD is an acronym for Powered Device. In a PoE system the power is delivered from a PSE ( power sourcing equipment ) to a remote device. The remote device is called a PD. <\/span><\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"41\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tPHY\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"41\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">PHY is an abbreviation for Physical Interface Transceiver and is the device that implements the Ethernet physical layer (IEEE-802.3).<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"42\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tPING\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"42\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">Ping (Packet InterNet Grouper) is a program that sends a series of packets over a network or the Internet to a specific computer in order to generate a response from that computer. The other computer responds with an acknowledgment that it received the packets. Ping was created to verify whether a specific computer on a network or the Internet exists and is connected. Ping uses Internet Control Message Protocol (ICMP) packets. The PING Request is the packet from the origin computer, and the PING Reply is the packet response from the target.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"43\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tPolicer\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"43\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">A policer can limit the bandwidth of received frames. It is located in front of the ingress queue.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"44\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tPOP3\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"44\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">POP3 is an acronym for Post Office Protocol version 3. It is a protocol for email clients to retrieve email messages from a mail server.<\/span><\/p>\n<p id=\"viewer-3vf3t\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">POP3 is designed to delete mail on the server as soon as the user has downloaded it. However, some implementations allow users or an administrator to specify that mail be saved for some period of time. POP can be thought of as a &#8220;store-and-forward&#8221; service. <\/span><\/p>\n<p id=\"viewer-jr7i\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">An alternative protocol is Internet Message Access Protocol (IMAP). IMAP provides the user with more capabilities for retaining e-mail on the server and for organizing it in folders on the server. IMAP can be thought of as a remote file server. <\/span><\/p>\n<p id=\"viewer-6ujqo\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">POP and IMAP deal with the receiving of e-mail and are not to be confused with the Simple Mail Transfer Protocol (SMTP). You send e-mail with SMTP, and a mail handler receives it on your recipient&#8217;s behalf. Then the mail is read using POP or IMAP. IMAP4 and POP3 are the two most prevalent Internet standard protocols for e-mail retrieval. Virtually all modern e-mail clients and servers support both. <\/span><\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"45\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tPPPoE\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"45\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">PPPoE is an acronym for Point-to-Point Protocol over Ethernet. It is a network protocol for encapsulating Point-toPoint Protocol (PPP) frames inside Ethernet frames. It is used mainly with ADSL services where individual users connect to the ADSL transceiver (modem) over Ethernet and in plain Metro Ethernet networks.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"46\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tPVLAN\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"46\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">In a private VLAN, PVLANs provide layer 2 isolation between ports within the same broadcast domain. Isolated ports configured as part of PVLAN cannot communicate with each other. Member ports of a PVLAN can communicate with each other.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"47\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tPTP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"47\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">PTP is an acronym for Precision Time Protocol, a network protocol for synchronizing the clocks of computer systems. It is follow IEEE1588v1\/2 standard.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"48\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tQCE\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"48\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">QCE is an acronym for QoS Control Entry. It describes QoS class associated with a particular QCE ID. There are six QCE frame types: Ethernet Type, VLAN, UDP\/TCP Port, DSCP, TOS, and Tag Priority. Frames can be classified by one of 4 different QoS classes: &#8220;Low&#8221;, &#8220;Normal&#8221;, &#8220;Medium&#8221;, and &#8220;High&#8221; for individual application.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"49\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tQCI\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"49\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">QCI is an acronym for QoS Class Identifier. This is a special identifier defining the quality of packet communication provided by LTE (Long Term Evolution, marketed as 4G LTE).<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"50\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tQCL\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"50\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">QCL is an acronym for QoS Control List. It is the list table of QCEs, containing QoS control entries that classify to a specific QoS class on specific traffic objects. Each accessible traffic object contains an identifier to its QCL. The privileges determine specific traffic object to specific QoS class.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"51\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tQL\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"51\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\">QL In SyncE this is the Quality Level of a given clock source. This is received on a port in a SSM indicating the quality of the clock received in the port.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"52\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tQoS\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"52\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<p id=\"viewer-atf0a\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">QoS is an acronym for Quality of Service. It is a method to guarantee a bandwidth relationship between individual applications or protocols. <\/span><\/p>\n<p id=\"viewer-2jqqc\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">A communications network transports a multitude of applications and data, including high-quality video and delay sensitive data such as real-time voice. Networks must provide secure, predictable, measurable, and sometimes guaranteed services. <\/span><\/p>\n<p id=\"viewer-2gcvv\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Achieving the required QoS becomes the secret to a successful end-to-end business solution. Therefore, QoS is the set of techniques to manage network resources.<\/span><\/p>\n<p id=\"viewer-4ddpp\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">QoS class <\/span><\/p>\n<p id=\"viewer-7n33i\" class=\"R920X _5wA-D d0eTW vC2ou -oJ0G\"><span class=\"J6XX-\">Every incoming frame is classified to a QoS class, which is used throughout the device for providing queuing, scheduling and congestion control guarantees to the frame according to what was configured for that specific QoS class. There is a one to one mapping between QoS class, queue and priority. A QoS class of 0 (zero) has the lowest priority. <\/span><\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"53\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tQuerier election\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"53\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">Querier election is used to dedicate the Querier, the only one router sends Query messages, on a particular link. Querier election rule defines that IGMP Querier or MLD Querier with the lowest IPv4\/IPv6 address wins the election.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"54\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tRARP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"54\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">RARP is an acronym for Reverse Address Resolution Protocol. It is a protocol that is used to obtain an IP address for a given hardware address, such as an Ethernet address. RARP is the complement of ARP.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"55\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tRADIUS\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"55\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">RADIUS is an acronym for Remote Authentication Dial In User Service. It is a networking protocol that provides centralized access, authorization and accounting management for people or computers to connect and use a network service.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"56\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tRDI\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"56\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">RDI is an acronym for Remote Defect Indication. It is a OAM functionality that is used by a MEP to indicate defect detected to the remote peer MEP.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"57\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tRouter Port\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"57\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">A router port is a port on the Ethernet switch that leads switch towards the Layer 3 multicast device.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"58\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tRSTP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"58\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">In 1998, the IEEE with document 802.1w introduced an evolution of STP: the Rapid Spanning Tree Protocol, which provides for faster spanning tree convergence after a topology change. Standard IEEE 802.1D-2004 now incorporates RSTP and obsoletes STP, while at the same time being backwards-compatible with STP.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"59\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tSHA\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"59\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">SHA is an acronym for Secure Hash Algorithm. It designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. Hash algorithms compute a fixed-length digital representation (known as a message digest) of an input data sequence (the message) of any length.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"60\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tSMTP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"60\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">SMTP is an acronym for Simple Mail Transfer Protocol. It is a text-based protocol that uses the Transmission Control Protocol (TCP) and provides a mail service modeled on the FTP file transfer service. SMTP transfers mail messages between systems and notifications regarding incoming mail.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"61\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tSNAP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"61\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">The SubNetwork Access Protocol (SNAP) is a mechanism for multiplexing, on networks using IEEE 802.2 LLC, more protocols than can be distinguished by the 8-bit 802.2 Service Access Point (SAP) fields. SNAP supports identifying protocols by Ethernet type field values; it also supports vendor-private protocol identifier.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"62\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tSNMP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"62\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">SNMP is an acronym for Simple Network Management Protocol. It is part of the Transmission Control Protocol\/Internet Protocol (TCP\/IP) protocol for network management. SNMP allow diverse network objects to participate in a network management architecture. It enables network management systems to learn network problems by receiving traps or change notices from network devices implementing SNMP.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"63\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tSNTP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"63\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">SNTP is an acronym for Simple Network Time Protocol, a network protocol for synchronizing the clocks of computer systems. SNTP uses UDP (datagrams) as transport layer.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"64\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tSPROUT\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"64\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">Stack Protocol using ROUting Technology. An advanced protocol for almost instantaneous discovery of topology changes within a stack as well as election of a master switch. SPROUT also calculates parameters for setting up each switch to perform shortest path forwarding within the stack.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"65\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tSSID\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"65\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">Service Set Identifier is a name used to identify the particular 802.11 wireless LANs to which a user wants to attach. A client device will receive broadcast messages from all access points within range advertising their SSIDs, and can choose one to connect to based on pre-configuration, or by displaying a list of SSIDs in range and asking the user to select one.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"66\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tSSH\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"66\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">SSH is an acronym for Secure SHell. It is a network protocol that allows data to be exchanged using a secure channel between two networked devices. The encryption used by SSH provides confidentiality and integrity of data over an insecure network. The goal of SSH was to replace the earlier rlogin, TELNET and rsh protocols, which did not provide strong authentication or guarantee confidentiality.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"67\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tSSM\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"67\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">SSM In SyncE this is an abbreviation for Synchronization Status Message and is containing a QL indication.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"68\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tSTP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"68\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>Spanning Tree Protocol is an OSI layer-2 protocol which ensures a loop free topology for any bridged LAN. The original STP protocol is now obsolete by RSTP.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"69\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tSwitch IDs\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"69\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>Switch IDs (1-1) are used to uniquely identify the switches within a stack. The Switch ID of each switch is shown on the display on the front of the switch and is used widely in the web pages as well as in the CLI commands.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"70\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tSyncE\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"70\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>SyncE Is an abbreviation for Synchronous Ethernet. This functionality is used to make a network &#8216;clock frequency&#8217; synchronized. Not to be confused with real time clock synchronized (IEEE 1588).<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"71\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tTACACS+\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"71\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>TACACS+ is an acronym for Terminal Access Controller Access Control System Plus. It is a networking protocol which provides access control for routers, network access servers and other networked computing devices via one or more centralized servers. TACACS+ provides separate authentication, authorization and accounting services.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"72\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tTag Priority\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"72\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>Tag Priority is a 3-bit field storing the priority level for the 802.1Q frame. The 3-bits provide 8 priority levels (0~7).<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"73\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tTCP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"73\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>TCP is an acronym for Transmission Control Protocol. It is a communications protocol that uses the Internet Protocol (IP) to exchange the messages between computers.<\/p>\n<p>The TCP protocol guarantees reliable and in-order delivery of data from sender to receiver and distinguishes data for multiple connections by concurrent applications (for example, Web server and e-mail server) running on the same host.<\/p>\n<p>The applications on networked hosts can use TCP to create connections to one another. It is known as a connectionoriented protocol, which means that a connection is established and maintained until such time as the message or messages to be exchanged by the application programs at each end have been exchanged. TCP is responsible for ensuring that a message is divided into the packets that IP manages and for reassembling the packets back into the complete message at the other end.<\/p>\n<p>Common network applications that use TCP include the World Wide Web (WWW), e-mail, and File Transfer Protocol (FTP).<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"74\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tTELNET\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"74\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>TELNET is an acronym for TELetype NETwork. It is a terminal emulation protocol that uses the Transmission Control Protocol (TCP) and provides a virtual connection between TELNET server and TELNET client. TELNET enables the client to control the server and communicate with other servers on the network. To start a Telnet session, the client user must log in to a server by entering a valid username and password. Then, the client user can enter commands through the Telnet program just as if they were entering commands directly on the server console.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"75\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tToS\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"75\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>ToS is an acronym for Type of Service. It is implemented as the IPv4 ToS priority control. It is fully decoded to determine the priority from the 6-bit ToS field in the IP header. The most significant 6 bits of the ToS field are fully decoded into 64 possibilities, and the singular code that results is compared against the corresponding bit in the IPv4 ToS priority control bit (0~63).<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"76\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tTFTP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"76\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>TFTP is an acronym for Trivial File Transfer Protocol. It is transfer protocol that uses the User Datagram Protocol (UDP) and provides file writing and reading, but it does not provide directory service and security features.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"77\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tToS\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"77\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>ToS is an acronym for Type of Service. It is implemented as the IPv4 ToS priority control. It is fully decoded to determine the priority from the 6-bit ToS field in the IP header. The most significant 6 bits of the ToS field are fully decoded into 64 possibilities, and the singular code that results is compared against the corresponding bit in the IPv4 ToS priority control bit (0~63).<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"78\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tTLV\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"78\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>TLV is an acronym for Type Length Value. A LLDP frame can contain multiple pieces of information. Each of these pieces of information is known as TLV.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"79\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tTKIP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"79\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>TKIP is an acronym for Temporal Key Integrity Protocol. It used in WPA to replace WEP with a new encryption algorithm. TKIP comprises the same encryption engine and RC4 algorithm defined for WEP. The key used for encryption in TKIP is 128 bits and changes the key used for each packet.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"80\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tUDP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"80\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>UDP is an acronym for User Datagram Protocol. It is a communications protocol that uses the Internet Protocol (IP) to exchange the messages between computers.<\/p>\n<p>It is an alternative to the Transmission Control Protocol (TCP) that uses the Internet Protocol (IP). Unlike TCP, UDP does not provide the service of dividing a message into packet datagrams, and UDP doesn&#8217;t provide reassembling and sequencing of the packets. This means that the application program that uses UDP must be able to make sure that the entire message has arrived and is in the right order. Network applications that want to save processing time because they have very small data units to exchange may prefer UDP to TCP.<\/p>\n<p>It provides two services not provided by the IP layer. It provides port numbers to help distinguish different user requests and, optionally, a checksum capability to verify that the data arrived intact.<\/p>\n<p>Common network applications that use UDP include the Domain Name System (DNS), streaming media applications such as IPTV, Voice over IP (VoIP), and Trivial File Transfer Protocol (TFTP).<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"81\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tUPnP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"81\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>UPnP is an acronym for Universal Plug and Play. The goals of UPnP are to allow devices to connect seamlessly and to simplify the implementation of networks in the home (data sharing, communications, and entertainment) and in corporate environments for simplified installation of computer components.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"82\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tUser Priority\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"82\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>User Priority is a 3-bit field storing the priority level for the 802.1Q frame. It is also known as PCP.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"83\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tVLAN\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"83\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>Virtual LAN. A method to restrict communication between switch ports. VLANs can be used for the following applications: VLAN unaware switching: This is the default configuration. All ports are VLAN unaware with Port VLAN ID 1 and members of VLAN 1. This means that MAC addresses are learned in VLAN 1, and the switch does not remove or insert VLAN tags. VLAN aware switching: This is based on the IEEE 802.1Q standard. All ports are VLAN aware. Ports connected to VLAN aware switches are members of multiple VLANs and transmit tagged frames. Other ports are members of one VLAN, set up with this Port VLAN ID, and transmit untagged frames. Provider switching: This is also known as Q-in-Q switching. Ports connected to subscribers are VLAN unaware, members of one VLAN, and set up with this unique Port VLAN ID. Ports connected to the service provider are VLAN aware, members of multiple VLANs, and set up to tag all frames. Untagged frames received on a subscriber port are forwarded to the provider port with a single VLAN tag. Tagged frames received on a subscriber port are forwarded to the provider port with a double VLAN tag. VLAN ID<\/p>\n<p>VLAN ID<\/p>\n<p>VLAN ID is a 12-bit field specifying the VLAN to which the frame belongs. Voice VLAN Voice VLAN is VLAN configured specially for voice traffic. By adding the ports with voice devices attached to voice VLAN, we can perform QoS-related configuration for voice data, ensuring the transmission priority of voice traffic and voice quality.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"84\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tWEP\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"84\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>WEP is an acronym for Wired Equivalent Privacy. WEP is a deprecated algorithm to secure IEEE 802.11 wireless networks. Wireless networks broadcast messages using radio, and are more susceptible to eavesdropping than wired networks. When introduced in 1999, WEP was intended to provide confidentiality comparable to that of a traditional wired network (Wikipedia).<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"85\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tWiFi\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"85\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>WiFi is an acronym for Wireless Fidelity. It is meant to be used generically when referring of any type of 802.11 network, whether 802.11b, 802.11a, dual-band, etc. The term is promulgated by the Wi-Fi Alliance.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"86\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tWPA....\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"86\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>WPA is an acronym for Wi-Fi Protected Access. It was created in response to several serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP). WPA implements the majority of the IEEE 802.11i standard, and was intended as an intermediate measure to take the place of WEP while 802.11i was prepared. WPA is specifically designed to also work with pre-WPA wireless network interface cards (through firmware upgrades), but not necessarily with first generation wireless access points. WPA2 implements the full standard, but will not work with some older network cards.<\/p>\n<p>WPA-PSK<\/p>\n<p>WPA-PSK is an acronym for Wi-Fi Protected Access &#8211; Pre Shared Key. WPA was designed to enhance the security of wireless networks. There are two flavors of WPA: enterprise and personal. Enterprise is meant for use with an IEEE 802.1X authentication server, which distributes different keys to each user. Personal WPA utilizes less scalable &#8216;preshared key&#8217; (PSK) mode, where every allowed computer is given the same passphrase. In PSK mode, security depends on the strength and secrecy of the passphrase. The design of WPA is based on a Draft 3 of the IEEE 802.11i standard.<\/p>\n<p>WPA-Radius<\/p>\n<p>WPA-Radius is an acronym for Wi-Fi Protected Access &#8211; Radius (802.1X authentication server). WPA was designed to enhance the security of wireless networks. There are two flavors of WPA: enterprise and personal. Enterprise is meant for use with an IEEE 802.1X authentication server, which distributes different keys to each user. Personal WPA utilizes less scalable &#8216;pre-shared key&#8217; (PSK) mode, where every allowed computer is given the same passphrase. In PSK mode, security depends on the strength and secrecy of the passphrase. The design of WPA is based on a Draft 3 of the IEEE 802.11i standard.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"87\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tWPS\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"87\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>WPS is an acronym for Wi-Fi Protected Setup. It is a standard for easy and secure establishment of a wireless home network. The goal of the WPS protocol is to simplify the process of connecting any home device to the wireless network.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"88\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tWIRED\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"88\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>WRED is an acronym for Weighted Random Early Detection. It is an active queue management mechanism that provides preferential treatment of higher priority frames when traffic builds up within a queue. A frame&#8217;s DP level is used as input to WRED. A higher DP level assigned to a frame results in a higher probability that the frame is dropped during times of congestion.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"wd-accordion-item\">\n\t\t\t\t\t<div class=\"wd-accordion-title font-primary wd-fontsize-s text-left wd-opener-pos-right wd-font-weight-600\" data-accordion-index=\"89\">\n\t\t\t\t\t\t<div class=\"wd-accordion-title-text\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\tWTR\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<span class=\"wd-accordion-opener wd-opener-style-arrow\"><\/span>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div class=\"wd-accordion-content reset-last-child\" data-accordion-index=\"89\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\n<div class=\"sM7ZqDe oz4YlHH--isOpen oz4YlHH---skin-5-loose accordion-item\">\n<div data-hook=\"accordion-item\">\n<div class=\"sWmL27M question-heading\" data-hook=\"header\">\n<div class=\"sBIY03Y\" data-hook=\"titleContainer\">\n<div class=\"sc-gZMcBi jsIUqt\" data-itemprop=\"name\">\n<p>WTR is an acronym for Wait To Restore. This is the time a fail on a resource has to be &#8216;not active&#8217; before restoration back to this (previously failing) resource is done.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t[\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1740032182297{padding-top: 90px !important;padding-bottom: 0px !important;}&#8221; woodmart_css_id=&#8221;67b6c80fa96f9&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2N2I2YzgwZmE5NmY5Iiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243; el_id=&#8221;about-row&#8221;][vc_column css=&#8221;.vc_custom_1738681226336{padding-right:<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-574","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/demolinks2.com\/cy-yue\/wp-json\/wp\/v2\/pages\/574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demolinks2.com\/cy-yue\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/demolinks2.com\/cy-yue\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/demolinks2.com\/cy-yue\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/demolinks2.com\/cy-yue\/wp-json\/wp\/v2\/comments?post=574"}],"version-history":[{"count":27,"href":"https:\/\/demolinks2.com\/cy-yue\/wp-json\/wp\/v2\/pages\/574\/revisions"}],"predecessor-version":[{"id":1258,"href":"https:\/\/demolinks2.com\/cy-yue\/wp-json\/wp\/v2\/pages\/574\/revisions\/1258"}],"wp:attachment":[{"href":"https:\/\/demolinks2.com\/cy-yue\/wp-json\/wp\/v2\/media?parent=574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}