The leader in industrial automation and control solutions
TermAcronymDefinition
10BASE-T10BASE-T is an Ethernet standard for local area networks (LANs) that supports speeds of 10 Mbps over twisted-pair cabling. It is defined by the IEEE 802.3 standard and uses Cat 3 or higher cables to connect devices. 10BASE-T is a baseband technology, meaning it transmits data directly over the cable without modulating the signal. Although largely obsolete today, it was widely used in early networking setups for connecting PCs, HMI, and PLC devices.
100BASE-FX100BASE-FX is an Ethernet standard that supports 100 Mbps speeds over fiber optic cabling. Defined by the IEEE 802.3u standard, it uses multimode fiber (MMF) with SC, ST, or LC connectors for data transmission. Unlike 100BASE-TX, it provides longer-distance communication, up to 20 km with multimode fiber. 100BASE-FX is commonly used in industrial networks where electromagnetic interference (EMI) can affect copper-based connections. It ensures reliable, high-speed communication between devices like HMI, PLC, and switches in harsh environments.
100BASE-TX100BASE-TX is an Ethernet standard that supports 100 Mbps speeds over twisted-pair cabling. Defined by the IEEE 802.3u standard, it uses Cat 5 or higher cables and operates in full-duplex or half-duplex mode. It is a baseband technology, meaning it transmits data without modulation. IEEE 802.3u is widely used in industrial automation to connect HMI, PLC, and network switches for faster data exchange. This standard improves reliability and efficiency compared to older 10BASE-T networks.
1000BASE-SX/LX1000BASE-SX and 1000BASE-LX are Gigabit Ethernet standards using fiber optic cables for high-speed communication. Defined by the IEEE 802.3z standard, they support 1 Gbps data transmission. 1000BASE-SX operates on multimode fiber (MMF), reaching up to 550 meters, while 1000BASE-LX uses single-mode fiber (SMF), extending up to 10 km. These standards are ideal for long-distance, interference-free connections. They improve SCADA, HMI, and PLC communication by reducing latency and ensuring reliable data exchange.
1000BASE-T1000BASE-T is an Ethernet standard that supports 1 Gbps (1000 Mbps) speeds over twisted-pair cabling. Defined by the IEEE 802.3ab standard, it operates using Cat 5e or higher cables and supports full-duplex communication. This baseband technology enables faster data transfer, improving network performance for industrial automation. 1000BASE-T is widely used in modern HMI, PLC, and SCADA networks where high-speed communication is required. It enhances real-time data exchange and reduces latency in industrial environments.
802.1X (Port Authentication)Port-Based 802.1X is a network access control protocol that authenticates devices attempting to connect to a network using port authentication. When a device connects, 802.1X requires it to authenticate, usually through credentials or certificates, before allowing network access. This ensures that only authorized devices can communicate on the network, enhancing security by preventing unauthorized access. It is commonly used in enterprise and Wi-Fi networks where strict control over network access is essential. Also see User Account with Authority .
Access Control ListACLAn Access Control List (ACL) is used to filter network traffic based on predefined rules. Traffic is allowed or denied based on IP addresses, MAC addresses, protocols, or port numbers. ACLs are applied to routers, switches, and firewalls to improve security. Standard ACLs filter traffic using source IP addresses, while extended ACLs use multiple criteria. Unauthorized access is blocked, while legitimate traffic is permitted to reach its destination.
Address Resolution Protocol InspectionARPARP Inspection is a security feature that prevents Address Resolution Protocol (ARP) spoofing attacks. It verifies ARP packets against a trusted database to block malicious attempts to redirect network traffic. ARP Inspection helps maintain network integrity by ensuring only valid ARP responses are forwarded.
Alarm InformationSee DIP Switches
Auto-NegotiationNway Auto-Negotiation , defined by the IEEE 802.3 standard , allows network devices to automatically determine the best duplex mode and speed. It eliminates manual configuration by exchanging capabilities between devices. This process ensures optimal performance and compatibility in Ethernet networks. Common speeds include 10Mbps, 100Mbps, and 1Gbps, with full or half-duplex modes. If negotiation fails, devices may default to a lower speed or half-duplex mode.
Auto ProvisionAuto Provision is a service that allows the switch to automatically retrieve and apply configuration files from a remote server. This simplifies the configuration process by eliminating the need for manual setup. The switch connects to a specified TFTP, FTP, or HTTP server, downloads the configuration files, and applies them directly to the switch. This ensures consistent configuration across multiple devices. Auto Provision does not automatically upgrade firmware but is used for efficiently applying configuration settings.
BandwidthBandwidth refers to the maximum data transfer rate of a network connection, determining how much data can be transmitted per second. Bandwidth Control allows administrators to regulate network traffic by setting ingress (incoming) and egress (outgoing) limits per port. These limits are configured in multiples of 16 Kbps. Meaning the minimum bandwidth allocation per port is 16 Kbps, and it increases in increments of 16 Kbps as needed. Proper bandwidth management helps prevent congestion, optimize network performance, and ensure critical data gets prioritized.
Binding TableA Binding Table is a data structure that maps IP addresses to specific MAC addresses and ports on a network switch. It is used to validate and control traffic flow. Ensuring that only devices with legitimate IP-MAC bindings can communicate on the network. In features like IP Source Guard, the Binding Table helps prevent unauthorized access . Additionally, it protects IP address spoofing by maintaining accurate records of valid devices connected to the switch.
Bridge Protocol Data UnitsBPDUBridge Protocol Data Units (BPDU) are network messages used by switches to share Spanning Tree Protocol (STP) information. These packets help prevent loops by identifying redundant links in a network. IEEE 802.1D defines BPDU functionality within STP for network stability. BPDUs contain bridge ID, port roles, and timers for topology changes. Managed switches use BPDU messages to elect a root bridge and calculate best paths.
Class of Service/ Quality of ServiceCoS / QoSClass of Service (CoS) or Quality of Service (QoS) is a networking feature that prioritizes data traffic to improve performance and reduce latency. It is defined by the IEEE 802.1p standard, which assigns priority levels to network packets. CoS is commonly used in industrial automation, VoIP, and video streaming, where certain data needs higher priority. It helps ensure critical traffic, like SCADA commands, is delivered without delays. CoS is implemented at Layer 2 using VLAN tagging to classify and prioritize network traffic.
Code RedundancyCode redundancy refers to the practice of adding duplicate or backup code within a system to enhance its reliability and fault tolerance. By including extra functions or processes, systems can continue to operate smoothly even if one part fails. This technique is commonly used in error detection and error correction methods to ensure uninterrupted service. Code redundancy helps improve the overall stability and resilience of critical systems.
Command Line InterfaceCLIA Command Line Interface (CLI) is a text-based interface used to configure and manage operating systems or network devices. Users enter text commands to perform tasks like configuring settings, managing files, or troubleshooting network issues. Unlike Graphical User Interfaces (GUIs), CLI provides direct control, faster execution, and scripting capabilities for automation. Many network devices, including managed switches, routers, and firewalls, use CLI for advanced configurations.
Configuration Backup / RestoreThe Configuration Backup/Restore Utility allows network administrators to securely back up and restore switch configurations. This utility ensures that device settings, such as IP addresses, VLAN configurations, and port settings, are preserved. These settings can be easily restored in case of system failure or network changes.
Configuration WizardThe Configuration Wizard for our Lite-Managed switches is a user-friendly UI feature that simplifies the switch configuration process in just three steps. This streamlined configuration process ensures that you can quickly and easily set up the switch for your network environment.
DashboardThe Dashboard available on our Lite-Managed switches is a UI feature that allows network administrators to monitor the performance and health of the network devices. It provides real-time insights into various system statistics, including CPU usage, memory usage, and port traffic. The Dashboard is programmable through the Dashboard settings, which allow for port registration and configuration of port link-down statistics.
Device FlappingNetwork Device Flapping occurs when a network device repeatedly connects and disconnects in short intervals. This issue affects stability and can cause network disruptions. Flapping is commonly seen in links between switches, routers, or access points due to faulty cables, hardware failures, or configuration errors. It can also result from spanning tree recalculations, interface errors, or unstable power sources. Network administrators use logs, SNMP traps, and monitoring tools to detect and troubleshoot flapping devices. Also see Storm Control , Flow Control , LLPD Filter .
Downlink PortA Downlink Port is a network port used to connect a device to another device or network segment. It refers to a physical port on a switch or router that connects to end devices, or other downstream equipment. In many cases, downlink ports connect switches to downstream devices, like computers or other switches. These ports help expand the network and provide connectivity to additional devices. Downlink ports are critical for maintaining network performance and extending the network’s reach.
Dual Power InputsSee Redundant Power Inputs
Dynamic Host Configuration Protocol (Client)DHCPA DHCP Client allows a device to automatically obtain an IP address from a DHCP Server. When enabled, the client requests network settings, including IP address, subnet mask, and gateway. This eliminates the need for manual configuration, simplifying network management. Enabling the DHCP Client mode allows the switch to receive an IP address dynamically instead of using a static one.
Dynamic Host Configuration Protocol (Relay)DHCPA DHCP Relay Option 82 forwards DHCP requests between clients and a DHCP Server on different networks or specified VLANs. Without it, clients can only receive IP addresses from servers in the same subnet. DHCP Relay allows network switch to pass client requests to a remote DHCP Server over a different VLAN, enabling centralized IP address management across multiple subnets
Dynamic Host Configuration Protocol (Snooping)DHCPDHCP Snooping is a security feature that prevents unauthorized DHCP Servers from assigning IP addresses to clients. It monitors DHCP traffic and only allows responses from trusted servers on specified ports. DHCP Snooping helps protect against rogue servers and DHCP spoofing attacks, ensuring clients receive valid network configurations.
Differentiated Services Code PointDSCPDSCP (Differentiated Services Code Point) tags are part of the IP header used to indicate the priority or Quality of Service (QoS) level for network traffic. DSCP tags are 6-bit values that help classify and prioritize packets for specific handling. Such as low-latency or high-priority treatment, in networking devices like routers and switches. The DSCP value determines the level of service a packet receives.
DIP SwitchesThe DIP switches enable the network switch to send email alarm notifications, SNMP traps, or syslog messages when power status changes. This functionality is active only if these features are properly configured and enabled on the switch. The notifications are triggered when the main or redundant power goes down or comes back up. Consequently, administrators are alerted to power disruptions, ensuring quick responses to network issues. This enhances the network’s reliability through continuous monitoring of power conditions.
Dual HomingDual Homing is a redundancy method where a device connects to two separate network paths for reliability. If one connection fails, traffic switches to the other, ensuring continuous network access. Dual Homing improves fault tolerance by providing backup connectivity, reducing downtime in case of link failure.
Electromagnetic InterferenceEMIElectromagnetic Interference (EMI) refers to unwanted electromagnetic energy that disrupts the normal operation of electronic devices. It can be caused by various sources, such as electrical circuits, radio frequency signals, and electrical appliances. EMI can interfere with communication signals, leading to data loss, signal degradation, or malfunctioning devices. To minimize the impact of EMI, devices often use shielding, grounding, and filtering techniques to block or reduce the interference. In industrial and networking environments, managing EMI is crucial to ensure the reliability and stability of communication and control systems.
Electromagnetic SusceptibilityEMSElectromagnetic Susceptibility (EMS) refers to a device’s ability to function correctly in the presence of electromagnetic interference (EMI). It is the opposite of electromagnetic immunity, which indicates a device’s ability to resist EMI. Devices with low EMS are more vulnerable to disturbances, which may cause malfunctions or data errors. Therefore, EMS plays a crucial role in the design and certification of electronics. In particular, it is essential in environments with high levels of EMI. Standards and tests are used to ensure equipment meets acceptable EMS levels for reliable operation.
Electrostatic Discharge (Protection)ESDESD Protection refers to the methods and components used to protect electronic devices from electrostatic discharge (ESD). ESD occurs when static electricity is suddenly released, which can damage sensitive electronic components. This type of protection ensures that devices, such as network equipment or computers, are shielded from these discharges, preventing potential malfunctions or failures. This protection is achieved through the use of specialized components like surge suppressors, diodes, and grounding techniques. Proper ESD protection is vital for maintaining the reliability and longevity of electronic devices in environments where static electricity is present.
Element Management SystemsEMSAn Element Management System (EMS) is a software platform for managing network devices like switches and routers. It helps monitor, configure, and troubleshoot these devices in a centralized manner. EMS collects data, generates alerts, and provides reports on network performance. It also allows administrators to push configurations and updates to network elements. Ultimately, EMS enhances network reliability and simplifies network management tasks.
Energy Efficient EthernetEEEEnergy Efficient Ethernet (EEE) reduces power consumption during periods of low network activity while maintaining network connectivity. EEE, defined by the IEEE 802.3az standard, allows Ethernet devices to enter low-power states when traffic is idle. When network traffic increases, devices automatically return to full power, ensuring normal operation while saving energy during inactivity. This technology helps reduce overall energy consumption, especially in environments with fluctuating network traffic, like data centers or offices. Also see Green Ethernet .
EtherNet/IPEtherNet/IP (Ethernet Industrial Protocol) is an industrial networking protocol that operates over standard Ethernet infrastructure. EtherNet/IP is an open and standardized protocol governed by the ODVA (Open DeviceNet Vendors Association). It uses the standard TCP/IP suite for communication but is specifically designed to handle real-time control and monitoring in industrial environments. EtherNet/IP uses an electronic data sheet (EDS) to describe the capabilities and configuration parameters of an industrial device. It will contain device ID, configuration data, how data is exchanged over a network, and the devices behavior within the network.
Ethernet Management PortAn Ethernet Management Port in an Industrial Network Switch refers to a dedicated console port or USB port for device management. It provides administrators with direct access to configure and troubleshoot network devices. This port is separate from regular data traffic to ensure security and reliability. It allows for remote monitoring and management, streamlining network operations. By using this port, administrators can easily perform maintenance without disrupting network performance.
Ethernet Ring Protection SwitchingERPSEthernet Ring Protection Switching (ERPS) is a network protocol designed to provide fault tolerance and network resiliency in networks. It ensures uninterrupted service by creating a redundant ring topology, where data can be rerouted if a link or device fails. ERPS quickly detects failures and activates an alternative path, minimizing downtime. It enhances network reliability by maintaining constant data flow, even when network components experience issues.
Filter TableA Filter Table in ARP Inspection is used to store valid ARP (Address Resolution Protocol) entries that have been verified to ensure legitimate traffic on the network. This table helps prevent ARP spoofing, as well as other malicious activities by allowing the switch to filter out any ARP requests or responses that do not match the expected entries in the table.
FirmwareFirmware is a type of software that is embedded into hardware devices to control and manage their operations. Unlike regular software that can be easily updated or removed, firmware is typically stored in non-volatile memory, such as ROM or flash memory, and is essential for the device to function. It provides low-level control over the hardware and allows the device to communicate with other systems or applications.
Flow ControlFlow Control is a standard defined by IEEE 802.3x that manages data transmission to prevent packet loss during network congestion. It uses pause frames to temporarily stop the sending of data, allowing the receiving device to process information without overflow. This is particularly useful in full-duplex Ethernet networks, where both devices send and receive data simultaneously. Flow control ensures smooth communication, reducing dropped packets and improving reliability.
Generic Object-Orientated Substation EventGOOSEThe Generic Object-Oriented Substation Event (GOOSE) protocol is a communication standard used in electrical substations for rapid data exchange. It operates within the IEC 61850 standard and enables real-time messaging between protection and control devices. GOOSE messages use a publish-subscribe model to deliver critical data with low latency and high reliability. This protocol is used for automation, allowing devices to respond instantly to faults and system changes. By reducing reaction time, GOOSE enhances substation safety, stability, and efficiency.
Green EthernetGreen Ethernet , also known as Energy Efficient Ethernet (EEE) reduces power consumption. Particularly during periods of low network activity while maintaining network connectivity. EEE , defined by the IEEE 802.3az standard, allows Ethernet devices to enter low-power states when traffic is idle. When network traffic increases, devices automatically return to full power, ensuring normal operation while saving energy during inactivity. This technology helps reduce overall energy consumption, especially in environments with fluctuating network traffic, like data centers or offices.
Guard TimerGuard Timer in ERPS (Ethernet Ring Protection Switching) is a mechanism that prevents frequent or rapid state transitions in the network after a topology change. When a failure occurs and ERPS switches traffic to the backup path, the Guard Timer ensures a stable recovery process by delaying any new protection switch commands for a set period.
Hyper Text Transfer Protocol / Hyper Text Transfer Protocol SecureHTTP/HTTPsHTTP (Hyper Text Transfer Protocol) is the foundational protocol used to transfer data on the web. It allows the client (like a browser) to request resources from a web server. HTTPS (Hyper Text Transfer Protocol Secure) is the secure version of HTTP, encrypting the data using SSL/TLS to protect privacy and integrity. HTTP is widely used to access websites, but its data is transmitted in plain text, which can be intercepted. HTTPS, on the other hand, ensures a secure connection, safeguarding sensitive data such as passwords or payment details.
IEC 60068-2 StandardShock, Freefall, VibrationThe IEC 60068-2 standard is part of the IEC 60068 series, which covers environmental testing for electrical and electronic equipment. Specifically, IEC 60068-2 refers to various test methods and procedures used to evaluate the environmental durability of devices in different conditions. The standard includes tests for temperature, humidity, vibration, shock, and other environmental factors that may impact the performance of equipment. It ensures that products can withstand environmental stress and operate reliably in diverse real-world conditions. IEC 60068-2-27 (Shock), IEC 6008-2-32 (Freefall), IEC 60068-2-6 (Vibration) .
Industrial Network SwitchAn Industrial Network Switch is a type of switch designed to operate in harsh environments typically found in industrial settings. It is built to withstand factors like temperature extremes, humidity, vibration, and electrical interference, which are common in factories, power plants, and other industrial locations. These switches are optimized for industrial control systems, offering high reliability and performance.
Industrial QoSiQoSIndustrial QoS (iQoS) ensures reliable communication by prioritizing critical protocols like PROFINET, EtherNet/IP, and GOOSE in automation networks. These protocols require low latency and minimal packet loss for real-time control and monitoring. iQoS assigns higher transmission priority to these packets, ensuring they are processed before less critical traffic. PROFINET and EtherNet/IP benefit from QoS settings that prioritize cyclic data exchange between controllers and field devices. GOOSE messages in IEC 61850 networks rely on QoS to maintain fast and reliable communication for substation automation. By implementing iQoS, industrial networks enhance performance and operational stability.
Internet Group Management Protocol (Snooping)IGMPIGMP (Internet Group Management Protocol) is a network protocol used to manage multicast group membership on IPv4 networks. It allows devices to join or leave multicast groups, ensuring that multicast traffic is only sent to devices that need it. IGMP Snooping is a feature that enhances IGMP by allowing switches to monitor and control multicast traffic at the data link layer. Instead of forwarding multicast traffic to all ports. IGMP Snooping ensures that multicast data is only sent to the ports with registered group members. This reduces network congestion and improves efficiency by preventing unnecessary multicast flooding.
Internet Protocol AddressIPAn IP Address (Internet Protocol Address) is a unique identifier assigned to each device on a network. Thus, allowing it to communicate with other devices. It serves as both the address and the location of the device. Similar to how a street address works for mail delivery.
IP Source GuardIP Source Guard is a security feature that prevents IP address spoofing by binding IP addresses to specific ports and MAC addresses. It ensures that only devices with valid IP-MAC bindings can communicate on the network. When enabled the IP Source Guard helps protect against unauthorized devices from accessing the network, enhancing overall security by blocking invalid IP traffic.
Jumbo FrameA Jumbo Frame is an Ethernet frame with a Maximum Transmission Unit (MTU) larger than the standard 1500-byte size, typically supporting 9000 bytes or more. This larger MTU reduces the overhead for data transmission, improving network efficiency. Jumbo Frames are often used in high-performance networks to increase throughput, reduce CPU load, and optimize large data transfers. It is especially beneficial in environments like SCADA systems that handle large data sets.
L2 Forwarding RateL2 Forwarding Rate is the speed at which a network device can process and forward Layer 2 (L2) Ethernet frames. It is a key performance metric that determines how quickly a switch can move data between devices within a local network. The L2 forwarding rate is typically measured in frames per second (fps) or packets per second (pps). A higher L2 forwarding rate indicates that the switch can handle more traffic and support a higher number of devices in the network without performance degradation. The rate is critical for ensuring smooth data flow, especially in high-traffic environments. Also see Switch Fabric .
Link AggressionLink Aggregation combines multiple physical network links into one logical connection, increasing bandwidth and providing redundancy. By using IEEE 802.1ad (QinQ), Link Aggregation encapsulates multiple VLANs within another VLAN, enhancing scalability and performance. This standard improves traffic distribution, reliability, and load balancing across multiple links. Link Aggregation is commonly used in enterprise and data center networks to ensure high availability and prevent failure points.
Local Link Display Protocol (LLDP Filter)LLDPLocal Link Discovery Protocol (LLDP) is a standardized data link layer protocol used to discover and exchange information about network devices. Defined by the IEEE 802.1AB standard, LLDP allows devices to advertise their identity, capabilities, and network topology. It helps network administrators understand device relationships and configurations without manual mapping. LLDP operates similarly to Cisco’s CDP (Cisco Discovery Protocol), but it is vendor-neutral and works across different network vendors’ equipment.
Loop DetectionLoop Detection is a network feature used to identify and prevent network loops in networks. A network loop occurs when data packets continuously circulate in the network without reaching their destination. This can cause congestion, degraded performance, and even network outages. Loop Detection protocols monitor network topology and detect the presence of loops by analyzing traffic patterns. When a loop is detected, the network takes corrective actions, such as blocking certain paths to prevent further issues.
MAC Limit Port SecurityMAC Limit Port Security is a feature that restricts the number of MAC addresses allowed on a specific switch port. It helps prevent unauthorized devices from connecting to the network. When the limit is exceeded, the port can be shut down or placed in a protective state. This feature enhances network security by controlling access to the network. It ensures only authorized devices can communicate through specific ports, reducing security risks.
MAC ManagementMAC Management is a feature that allows administrators to manage and configure MAC addresses on a network switch. It provides several capabilities for controlling how MAC addresses are handled within the switch.
MAC TableA MAC table is used by network switches to map MAC addresses to specific switch ports. This allows the switch to efficiently forward data frames based on their destination MAC address. The switch dynamically builds the MAC table as devices send frames across the network. By maintaining this table, the switch avoids broadcasting data to all ports and sends it directly to the correct destination. This improves network efficiency and reduces unnecessary traffic.
Management HostA Management Host is a designated device or system authorized to access and configure a network switch. It typically refers to a computer or server used for administrative tasks. Such as monitoring network activity, adjusting settings, and applying security policies. This enhances security by preventing unauthorized access and limiting control to specific network administrators.
Management VLANMVLANA Management VLAN (MVLAN) is a dedicated Virtual Local Area Network (VLAN) used specifically for managing network devices. It enhances both security and network efficiency by isolating management traffic from regular data traffic. MVLANs ensure that sensitive management interfaces, like web consoles or SNMP, are separated from the general network traffic.
Maximum Transmission UnitsMTUMaximum Transmission Units (MTU) refer to the largest size of a packet that can be transmitted over a network. It is determined by the network’s protocol and hardware limitations. MTU affects the efficiency and performance of data transmission. A larger MTU allows for sending more data at once, reducing overhead. However, if the MTU is too large, it may cause fragmentation or packet loss.
Medium Dependent Interface / MDI CrossoverMDI/MDI-XMDI (Medium Dependent Interface) and MDI-X (MDI Crossover) are two types of Ethernet port configurations. Furthermore, MDI ports are typically found on network devices like computers or routers. While MDI-X ports are often used on switches and hubs. The key difference is in the wiring configuration—MDI requires a straight-through cable, while MDI-X uses a crossover cable to connect devices.
Modbus TCPModbusTCP allows a network device to act as a Modbus TCP slave, enabling remote access by a ModbusTCP master device. With this feature, you can read and write to specific addresses on the device, while other addresses may be read-only. The protocol does not extend ModbusTCP functionality to other connected equipment, focusing only on the device itself.
Network SwitchA network switch is a networking appliance that connects multiple devices inside of a Local Area Network (LAN). It communicates by forwarding data based off MAC addresses. Typically switches operate at layer 2, data link layer, of the OSI model. However, they can operate at layer 3, network layer, which communicates by forwarding data based off IP addresses. Network switches typically support 10/100 (Fast Ethernet) or 10/100/1000 (Gigabit Ethernet) speeds, offering different bandwidth options. Fast Ethernet switches support speeds of 10 Mbps and 100 Mbps, while Gigabit Ethernet switches support up to 1000 Mbps.
Open Network Video Interface ForumONVIFONVIF (Open Network Video Interface Forum) is an open standard for network video surveillance devices. This ensures interoperability between different manufacturers’ equipment. It enables devices like IP cameras, NVRs (Network Video Recorders), and video management systems to communicate seamlessly over IP networks. ONVIF defines a set of standards for video streaming, device discovery, and control, making it easier to integrate and manage devices from various vendors. The protocol is widely used in the security industry for open, scalable surveillance solutions. ONVIF supports a range of features such as video streaming, PTZ control, and alarm management.
Over Current ProtectionOCPOver Current Protection (OCP) is a safety feature designed to prevent electrical devices from being damaged by excessive current. When the current flowing through a circuit exceeds the device’s safe threshold. OCP mechanisms activate to either shut down the device or limit the current to prevent overheating, damage, or fire hazards. Over current protection is typically implemented in power supplies, circuit breakers, and electrical devices to ensure safe operation and avoid costly repairs.
Over Voltage ProtectionOVPOver Voltage Protection (OVP) safeguards devices from voltage spikes and surges that could cause damage. When voltage exceeds safe levels, OVP mechanisms activate to prevent equipment failure.
Packet TypeThe Packet Type feature tracks traffic based on its type. Allowing you to monitor broadcast, multicast, or a combination of both types. Packets Per Second (PPS) measures the rate of packet transmission across the network, helping to assess the network’s performance and load. The Manual Recovery feature enables administrators to trigger recovery actions when traffic anomalies or issues are detected.
Port AuthenticationPort Authentication is a network security feature used to control access to network ports based on device credentials. Defined by the IEEE 802.1X standard, it ensures only authorized devices can connect to the network. Port Authentication uses RADIUS (Remote Authentication Dial-In User Service) servers to validate devices attempting to access the network. Once authenticated, the device is granted access to the network, improving security and preventing unauthorized devices from connecting. It is commonly used in enterprise and industrial networks to protect sensitive devices like HMIs and PLCs.
Port-Based VLANPort-Based VLAN is a method of network segmentation that assigns specific switch ports to different VLANs (Virtual Local Area Networks) . Each port on a switch can be configured to belong to a specific VLAN. Regardless of the device connected to that port. This allows for logical separation of network traffic, improving security and traffic management. Devices connected to ports in the same VLAN can communicate with each other. While communication between devices in different VLANs requires routing. Port-Based VLANs are commonly used to group devices based on function, department, or security level within an organization.
Port IsolationPort Isolation is a network feature that restricts communication between devices connected to different ports on the same switch. It allows devices to communicate with the switch. Additionally, it prevents direct communication between isolated ports. Thus, enhancing security by segmenting network traffic. Port isolation is often used in scenarios like guest networks or public access areas. Preventing unauthorized access and reduce potential security risks. It ensures that devices on the same network cannot interact with each other unless explicitly allowed.
Port MirroringPort Mirroring is a network feature that copies traffic from one or more source ports to a designated destination port for monitoring and analysis. This allows administrators to inspect network traffic in real-time without affecting normal data flow. Port Mirroring is commonly used for troubleshooting, security monitoring, and performance analysis. It works by sending mirrored traffic to a network analyzer or intrusion detection system.
Port PriorityPort Priority is a traffic management feature that controls the importance of data sent through specific ports on a network switch. It ensures that higher-priority traffic is processed first, reducing delays for critical applications. Port Priority assigns priority levels to ports, helping to manage congestion and optimize network performance. This feature is useful for prioritizing time-sensitive data such as voice, video, or industrial control signals over less critical traffic.
Port StatisticsPort Statistics provide detailed data about the performance and activity of a network port. This information includes metrics such as data transfer rates, packet counts, and error rates. Administrators use port statistics to monitor network performance and troubleshoot issues. The data helps identify congestion, packet loss, or hardware failures. By analyzing port statistics, network performance can be optimized for reliability and efficiency.
Port UtilizationPort Utilization refers to the amount of bandwidth a network port is using compared to its total capacity. It helps monitor how effectively a port is being used for data transmission. High port utilization can indicate network congestion or heavy traffic. Low utilization may suggest underused resources or potential configuration issues. Monitoring port utilization helps optimize network performance and ensures efficient use of available bandwidth.
Power Down TrapExample: a facility experiences a power loss, causing the main power supply to fail. The switch is equipped with a secondary power supply unit to ensure reliable operation. The network administrator has configured the switch to trigger an alarm when either the main or secondary power is disconnected, removed, or disabled. In response, the switch sends out SNMP traps and email alarms to notify the administrator. This solution is considered a Power Down Trap . Ensuring the network administrator is alerted immediately to any power issues, allowing for quick troubleshooting and minimal downtime.
Power Surge ProtectionPower Surge Protection is a safety feature that safeguards electrical devices from voltage spikes or surges. It may occur due to lightning strikes, power outages, or electrical faults. These surges can damage or destroy sensitive equipment by exceeding the device’s voltage rating. Power surge protection works by redirecting or absorbing excess voltage, preventing it from reaching and damaging the device. This protection is commonly found in power strips, network equipment, and power supplies.
PROFINETPROFINET (Process Field Network) is an industrial Ethernet-based communication protocol used for automation and control systems. It is designed to enable real-time communication between industrial equipment in manufacturing environments. It uses the TCP/IP stack for communication between devices. PROFINET supports different communication speeds, including Real-Time, and Isochronous Real-Time to ensure time-sensitive data exchange.
Quality of ServiceQoSSee Class of Service
Rapid Spanning Tree ProtocolRSTPRSTP (Rapid Spanning Tree Protocol) is an improved version of STP, defined by the IEEE 802.1w standard, preventing network loops efficiently. It provides faster convergence by quickly transitioning ports to forwarding or blocking states, improving network recovery time. RSTP removes the listening and learning stages, reducing recovery time from 50 seconds to a few milliseconds or seconds. It remains backward compatible with STP, allowing seamless integration into existing networks without major changes. RSTP is commonly used in SCADA and industrial automation networks requiring high availability and minimal downtime.
Rate LimitationRate Limitation is a feature used to control the amount of network traffic that is allowed to pass through a device. It includes Bandwidth Limitation and Storm Control. Bandwidth Limitation applies to specific ports and ingress/egress. Ingress/egress values range from 1 to 62500 Kbits * 16 (Kbits). Storm Control manages multicast, broadcast, and DLF traffic, helping to avoid network congestion.
Redundant Power InputRedundant power input is the inclusion of multiple power sources to ensure continuous device operation in case of a power failure. When one power source fails, the system automatically switches to the backup power input, preventing downtime and maintaining uninterrupted operation. Redundant power input is critical for environments where system reliability and uptime are crucial. It is commonly implemented with two or more power supplies connected to different power sources for added resilience and reliability.
Relay Contact OutputsRelay Contact Outputs on unmanaged and managed switches are controlled by a DIP-switch that can be toggled on or off. When set to ON, the DIP-switch activates a relay contact, sending current through the Alarm section of the terminal block. This current can power external devices, like an LED, to alert users to specific conditions. Also see DIP Switches .
Remote MonitoringRMONRMON (Remote Monitoring) is a network management protocol that provides in-depth traffic analysis and port statistics on network switches. It enhances traditional SNMP (Simple Network Management Protocol) by enabling switches to collect and store traffic data, reducing the need for continuous polling from an external management system.
Remote System RebootNetwork Switches can be remotely accessed via its HTTP/HTTPs or TELNET/SSH servers. Once connected you may reboot the system.
Reverse Polarity ProtectionReverse Polarity Protection is a safety feature that prevents damage to electronic devices when the power supply connections are reversed. When the positive and negative wires are mistakenly swapped, reverse polarity can cause equipment to malfunction or even fail. This protection works by ensuring that the device will either not power on or automatically correct the reversed connection, safeguarding sensitive components from electrical damage.
RevertiveRevertive in ERPS (Ethernet Ring Protection Switching) is a feature that dictates how the network should behave when a primary path is restored. When Revertive mode is enabled, the ERPS protocol will automatically revert traffic back to the primary path once the failure has been cleared. Ensuring that the network uses the most optimal path for traffic. In contrast, when Non-Revertive mode is used. Traffic will continue to flow over the backup path even after the primary path is restored.
Ring SettingsRing Settings configure a network redundancy mechanism that ensures continuous operation in case of a link failure. This feature is commonly used in industrial networks to create a ring topology. Where switches are connected in a loop to provide fault tolerance. If a link in the ring fails, the network automatically reroutes traffic through an alternate path, minimizing downtime.
ROOT GuardROOT Guard prevents a port from becoming the root bridge. If a superior BPDU (Bridge Protocol Data Unit) is received on a Root Guard-enabled port, it is blocked to maintain the current root bridge. This is useful when controlling STP (Spanning Tree Protocol) hierarchy in a managed network.
Secure ShellSSHSecure Shell ( SSH ) is a secure protocol that encrypts communications, preventing unauthorized access and data interception. Network administrators commonly use SSH to securely access and configure devices over the network. Secure Shell’s (SSH) default port is 22.
Short Circuit ProtectionSCPShort Circuit Protection (SCP) is a safety feature that prevents damage to electrical devices or circuits when a short circuit occurs. A short circuit happens when the electrical current bypasses the normal load path. Often due to a faulty connection or damaged wiring. Causing excessive current flow. SCP detects this abnormal current and disconnects the power or limits the current. This is to prevent overheating, fire hazards, or equipment failure.
Simple Network Management ProtocolSNMPSimple Network Management Protocol (SNMP) monitors and manages devices on an IP network. SNMP uses a structured format with Object Identifiers (OIDs) to retrieve and modify device parameters. It supports SNMPv1, SNMPv2c, and SNMPv3. SNMPv3 offers enhanced security through authentication and encryption. SNMP also includes Traps, which send alert messages to an SNMP manager when specific events occur. These events include device failures or high CPU usage. This protocol is widely used in industrial automation. It helps track device health, collect performance data, and detect network issues.
Simple Network Time ProtocolSNTPSimple Network Time Protocol (SNTP) is a protocol used to synchronize the clocks of network devices. It allows devices to receive time information from a time server over the network. SNTP is a simplified version of NTP (Network Time Protocol), offering less complexity. It helps ensure accurate timestamps for logging and scheduling tasks across devices. Using SNTP improves system synchronization and coordination within the network.
Small Form-Factor Pluggable (Port/Industrial Switch)SFPNetwork switches are equipped with various ports to meet different connectivity needs. An SFP Port (Small Form-factor Pluggable) is designed for high-speed fiber optic or copper connections. It offers flexibility, enabling the use of either fiber for long-distance connections or copper for shorter distances, depending on the network’s requirements.
Spanning Tree ProtocolSTPSTP (Spanning Tree Protocol) is a network protocol defined by the IEEE 802.1D standard to prevent network loops. It ensures there is only one active path between devices in redundant network topologies. STP uses BPDU (Bridge Protocol Data Units) to exchange information and determine the best path for data. If the primary path fails, STP reconfigures the network, activating a backup path and maintaining network stability.
Storm ControlStorm Control is a network feature used to prevent broadcast, multicast, and unknown unicast storms on a switch. It limits the traffic volume to a predefined threshold, preventing network congestion and potential downtime. Storms can occur when devices flood the network with excessive traffic, disrupting the communication between network devices. By enabling Storm Control, a switch can block or rate-limit traffic if the thresholds are exceeded, ensuring a stable network performance. This feature is particularly useful in managing large networks and preventing performance degradation caused by traffic overloads.
Switch FabricA Switch Fabric refers to the internal architecture of a network switch that connects its ports and facilitates data forwarding. It enables communication between the switch’s ports by determining how data packets are routed from one port to another. The switch fabric plays a crucial role in the switch’s overall performance and capacity, as it directly impacts throughput, latency, and the efficiency of the data transfer process. In high-performance network switches, the switch fabric typically features multiple connections and high-speed paths to ensure fast and efficient data movement between ports.
Syslog / System LogSyslog is a standard protocol used for sending and receiving log or event messages in a network. It allows devices like routers, switches, and servers to send log data to a centralized log server for monitoring. Syslog messages contain information about system operations, errors, or warnings that can help troubleshoot or analyze network performance.
TelnetTelnet is an older, unencrypted protocol for remote CLI (Command Line Interface) access, making it insecure for modern networks. Network administrators should disable Telnet and use SSH (Secure Shell) to prevent security risks.
Topology MapThe Topology Map is a feature used in network management to provide a visual representation of the devices and connections within a network. It allows network administrators to easily see the structure and layout of their network. Thus, identifying how different network devices, such as switches, routers, and other devices, are connected.
Traffic Control / Traffic OptimizationTraffic Control is a method used to manage network traffic, ensuring optimal performance, prioritization, and efficient data flow. It involves various techniques that control the rate, direction, and volume of traffic within a network. This can include features such as traffic shaping, rate limiting, and Quality of Service (QoS). By controlling traffic, congestion is minimized, ensuring critical applications receive the necessary bandwidth.
Traffic MonitorTraffic Monitor is a network management tool that allows you to observe and analyze the flow of network traffic through a switch. It helps administrators monitor specific traffic types and other network statistics to optimize performance and identify issues. Traffic Monitor enables real-time monitoring of traffic behaviors such as broadcast, multicast, and packet counts across various ports.
Trusted Managed HostA Trusted Managed Host is a device or system that is authorized and trusted to manage and control network resources. It has higher security privileges, allowing it to configure, monitor, and maintain network devices. Trusted managed hosts are often used for tasks like system updates, troubleshooting, and network configuration. They are protected by strict security measures, such as authentication and encryption ensuring they cannot be compromised.
User Account with AuthorityA User Account with Authority (802.1X) is a network access control protocol that authenticates devices before granting network access. It requires users or devices to provide valid credentials, such as a username and password. 802.1X uses an authentication server to verify the credentials before allowing network access. This protocol helps secure the network by ensuring only authorized devices can connect. It is commonly used in wired and wireless networks to enhance security.
VLANA virtual local area network ( VLAN ) segments a physical network into smaller, isolated networks. It can help improve security and performance on a network.
VLAN (Active)An Active VLAN is a VLAN that is actively used to separate traffic on a network. It helps keep devices isolated within their own virtual network while controlling communication. Active VLANs are configured on switch ports, allowing devices to communicate within the same VLAN. Once configured, these VLANs enable network management, security, and improved performance. An active VLAN helps maintain organization within a network by segmenting traffic efficiently.
VLAN (Data Forwarding)VLAN Data Forwarding is the process of directing network traffic between devices within a Virtual Local Area Network (VLAN). When a packet is sent within a VLAN, it is forwarded based on the VLAN tag. Layer 2 switches use this tag to ensure that the data only reaches devices within the same VLAN, effectively isolating traffic between VLANs. For communication between different VLANs, a router or Layer 3 switch is needed to perform inter-VLAN routing. VLAN data forwarding improves network efficiency by reducing broadcast traffic and ensuring that devices within a VLAN can communicate seamlessly.
VLAN PacketA VLAN packet is a data frame that includes information for a Virtual Local Area Network (VLAN). Allowing devices to communicate within a specific segment of a network. It includes a VLAN tag added to the Ethernet frame. Which identifies the VLAN to which the packet belongs.
VLAN (Passthrough)VLAN Passthrough is a network feature that allows VLAN-tagged traffic to pass through a device without altering or stripping the VLAN tags. When a device is configured for VLAN passthrough, it forwards the packets as they are. Thus, ensuring the VLAN tags remain intact as the data travels across the network. This enables devices on the other side of the network to properly recognize and process VLAN traffic.
VLAN (Tagging)VLAN Tagging is a method used to identify and separate network traffic in Virtual Local Area Networks (VLANs). Defined by the IEEE 802.1Q standard, it adds a VLAN ID to Ethernet frames. This allows network switches to differentiate traffic from multiple VLANs on a single physical connection. VLAN tagging improves network organization, security, and performance by isolating devices into separate logical networks. It is commonly used in industrial automation to segment traffic between HMI, PLC, and other devices.
Wait to RestoreWTRWTR (Wait-to-Restore) is a timer mechanism used in ERPS (Ethernet Ring Protection Switching). It prevents network instability after a failure has been resolved. ERPS is a protocol that ensures fast recovery in Ethernet ring networks by quickly switching traffic to an alternate path when a link failure occurs.