The leader in industrial automation and control solutions

What is Full or Half-Duplex Mode?

Duplex mode determines how data is transmitted between network devices. Full-duplex allows simultaneous sending and receiving of data. Half-duplex only allows one direction at a time, causing potential collisions. Full-duplex is common in modern Ethernet…

What is VLAN Tagging?

VLAN Tagging is a method used to identify and separate network traffic in Virtual Local Area Networks (VLANs). Defined by the IEEE 802.1Q standard, it adds a VLAN ID to Ethernet frames. This allows network…

What is Port Authentication?

Port Authentication is a network security feature used to control access to network ports based on device credentials. Defined by the IEEE 802.1X standard, it ensures only authorized devices can connect to the network. Port…

What is Active VLAN?

An Active VLAN is a VLAN that is actively used to separate traffic on a network. It helps keep devices isolated within their own virtual network while controlling communication. Active VLANs are configured on switch…

What is 1000BASE-SX/LX?

1000BASE-SX and 1000BASE-LX are Gigabit Ethernet standards using fiber optic cables for high-speed communication. Defined by the IEEE 802.3z standard, they support 1 Gbps data transmission. 1000BASE-SX operates on multimode fiber (MMF), reaching up to 550 meters, while 1000BASE-LX uses single-mode fiber (SMF), extending up to 10 km. These standards are ideal for long-distance, interference-free…

What is Storm Threshold?

Storm control monitors the rate of incoming packets on a port. It compares the rate of broadcast, multicast, or unknown unicast traffic to a configured Storm Threshold. When the traffic rate exceeds the threshold, storm control takes…

What is Class of Service (CoS)?

Class of Service (CoS) is a networking feature that prioritizes data traffic to improve performance and reduce latency. CoS is defined by the IEEE 802.1p standard, which assigns priority levels to network packets and is commonly used in industrial automation, VoIP, and video…

What is RSTP (Rapid Spanning Tree Protocol)?

RSTP (Rapid Spanning Tree Protocol) is an improved version of STP, defined by the IEEE 802.1w standard. RSPT provides faster convergence by quickly transitioning ports to forwarding or blocking states, improving network recovery time. RSTP removes the listening and learning stages, reducing recovery time from 50…

What is Spanning Tree Protocol (STP)?

STP (Spanning Tree Protocol) is a network protocol defined by the IEEE 802.1D standard to prevent network loops by ensuring there is only one active path between devices in redundant network topologies. STP uses BPDU (Bridge Protocol…

What is Nway Auto-negotiation?

Nway Auto-Negotiation, defined by the IEEE 802.3 standard, allows network devices to automatically determine the best duplex mode and speed. It eliminates manual configuration by exchanging capabilities between devices. This process ensures optimal performance and compatibility…

What is 802.3x Flow Control?

Flow Control is a standard defined by IEEE 802.3x that manages data transmission to prevent packet loss during network congestion. It uses pause frames to temporarily stop the sending of data, allowing the receiving device to process information without overflow.…

What is a MAC Table?

A MAC table is used by network switches to map MAC addresses to specific switch ports. This allows the switch to efficiently forward data frames based on their destination MAC address. The switch dynamically builds the MAC table as…

What are Bridge Protocol Data Units?

Bridge Protocol Data Units (BPDU) are network messages used by switches to share Spanning Tree Protocol (STP) information. These packets help prevent loops by identifying redundant links in a network. IEEE 802.1D defines BPDU functionality…

What is Local Link Discovery Protocol (LLDP)?

Local Link Discovery Protocol (LLDP) is a standardized data link layer protocol used to discover and exchange information about network devices. Defined by the IEEE 802.1AB standard, LLDP allows devices to advertise their identity, capabilities, and network topology. It helps…

What is a Jumbo Frame?

A Jumbo Frame is an Ethernet frame with a Maximum Transmission Unit (MTU) larger than the standard 1500-byte size, typically supporting 9000 bytes or more. This larger MTU reduces the overhead for data transmission, improving…

What is Industrial QoS?

Industrial QoS (iQoS) ensures reliable communication by prioritizing critical protocols like PROFINET, EtherNet/IP, and GOOSE in automation networks. These protocols require low latency and minimal packet loss for real-time control and monitoring. iQoS assigns higher…

What is Simple Network Management Protocol?

Simple Network Management Protocol (SNMP) monitors and manages devices on an IP network. SNMP uses a structured format with Object Identifiers (OIDs) to retrieve and modify device parameters and supports SNMPv1, SNMPv2c, and SNMPv3. SNMPv3…

What is an Access Control List?

What is an Access Control List? An Access Control List (ACL) is used to filter network traffic based on predefined rules. Traffic is allowed or denied based on IP addresses, MAC addresses, protocols, or port…

What is the IEC 60068-2 Standard?

The IEC 60068-2 standard is part of the IEC 60068 series, which covers environmental testing for electrical and electronic equipment. Specifically, IEC 60068-2 refers to various test methods and procedures used to evaluate the environmental…

What is a Switch Fabric?

A switch fabric refers to the internal architecture of a network switch that connects its ports and facilitates data forwarding. It enables communication between the switch’s ports by determining how data packets are routed from…

What is Device Flapping?

Network device flapping occurs when a network device repeatedly connects and disconnects in short intervals. This issue affects stability and can cause network disruptions. Flapping is commonly seen in links between switches, routers, or access…

What is a Command Line Interface?

A Command Line Interface (CLI) is a text-based interface used to configure and manage operating systems or network devices. Users enter text commands to perform tasks like configuring settings, managing files, or troubleshooting network issues.…

What is HTTP/HTTPs?

HTTP (Hyper Text Transfer Protocol) is the foundational protocol used to transfer data on the web. It allows the client (like a browser) to request resources from a web server. HTTPS (Hyper Text Transfer Protocol…

What is an Industrial Network Switch?

An Industrial Network Switch is a type of switch designed to operate in harsh environments typically found in industrial settings. It is built to withstand factors like temperature extremes, humidity, vibration, and electrical interference, which…

What is the GOOSE protocol?

The Generic Object-Oriented Substation Event (GOOSE) protocol is a communication standard used in electrical substations for rapid data exchange. It operates within the IEC 61850 standard and enables real-time messaging between protection and control devices.…

What is Traffic Control?

Traffic Control is a method used to manage network traffic, ensuring optimal performance, prioritization, and efficient data flow. It involves various techniques that control the rate, direction, and volume of traffic within a network. This…

What is Ethernet Ring Protection Switching?

Ethernet Ring Protection Switching (ERPS) is a network protocol designed to provide fault tolerance and network resiliency in networks. It ensures uninterrupted service by creating a redundant ring topology, where data can be rerouted if…

What is Loop Detection?

Loop Detection is a network feature used to identify and prevent network loops in networks. A network loop occurs when data packets continuously circulate in the network without reaching their destination. This can cause congestion,…

What is VLAN Data Forwarding?

VLAN Data Forwarding is the process of directing network traffic between devices within a Virtual Local Area Network (VLAN). When a packet is sent within a VLAN, it is forwarded based on the VLAN tag.…

What is Reverse Polarity Protection?

Reverse Polarity Protection is a safety feature that prevents damage to electronic devices when the power supply connections are reversed. When the positive and negative wires are mistakenly swapped, reverse polarity can cause equipment to…

What is Power Surge Protection?

Power Surge Protection is a safety feature that safeguards electrical devices from voltage spikes or surges. It may occur due to lightning strikes, power outages, or electrical faults. These surges can damage or destroy sensitive…

What is Over Voltage Protection?

Over Voltage Protection (OVP) safeguards devices from voltage spikes and surges that could cause damage. When voltage exceeds safe levels, OVP mechanisms activate to prevent equipment failure. Certifications such as EN 61000-4-5 (Surge), EN 61000-4-2…

What is ESD Protection?

ESD Protection refers to the methods and components used to protect electronic devices from electrostatic discharge (ESD). ESD occurs when static electricity is suddenly released, which can damage sensitive electronic components. This type of protection…

What is Code Redundancy?

Code redundancy refers to the practice of adding duplicate or backup code within a system to enhance its reliability and fault tolerance. By including extra functions or processes, systems can continue to operate smoothly even…

What is Remote System Reboot?

Maple Systems products offer the ability to remotely reboot a device. Maple Network Switches can be remotely accessed via its HTTP/HTTPs or TELNET/SSH servers. Once connected you may reboot the system. Maple System cMT /…

What is a DHCP Client?

A DHCP Client allows a device to automatically obtain an IP address from a DHCP Server. When enabled, the client requests network settings, including IP address, subnet mask, and gateway. This eliminates the need for…

What is an Ethernet Management Port?

An Ethernet Management Port in our system refers to a dedicated console port or USB port for device management. It provides administrators with direct access to configure and troubleshoot network devices. This port is separate…

What is an Element Management System?

An Element Management System (EMS) is a software platform for managing network devices like switches and routers. It helps monitor, configure, and troubleshoot these devices in a centralized manner. EMS collects data, generates alerts, and…

What is Port-Based 802.1X?

Port-Based 802.1X is a network access control protocol that authenticates devices attempting to connect to a network using port authentication. When a device connects, 802.1X requires it to authenticate, usually through credentials or certificates, before…

What is Port Utilization?

Port Utilization refers to the amount of bandwidth a network port is using compared to its total capacity. It helps monitor how effectively a port is being used for data transmission. High port utilization can…

What is Simple Network Time Protocol?

Simple Network Time Protocol (SNTP) is a protocol used to synchronize the clocks of network devices. It allows devices to receive time information from a time server over the network. SNTP is a simplified version…

What is a User Account with Authority?

A User Account with Authority (802.1X) is a network access control protocol that authenticates devices before granting network access. It requires users or devices to provide valid credentials, such as a username and password. 802.1X…

What is a Trusted Managed Host?

A Trusted Managed Host is a device or system that is authorized and trusted to manage and control network resources. It has higher security privileges, allowing it to configure, monitor, and maintain network devices. Trusted…

What is an IP Address?

An IP Address (Internet Protocol Address) is a unique identifier assigned to each device on a network. Thus, allowing it to communicate with other devices. It serves as both the address and the location of…

What is MEL in ERPS?

MEL (Maintenance Entity Level) in ERPS (Ethernet Ring Protection Switching) defines the hierarchy of OAM (Operations, Administration, and Maintenance) messages used for fault detection and network monitoring. MEL determines the priority and scope of OAM…

What is IP DiffServ?

IP DiffServ (Differentiated Services) is a network architecture designed to manage traffic and prioritize packets for improved Quality of Service (QoS). It classifies and marks packets using the DSCP (Differentiated Services Code Point) tag which…

What is Traffic Monitor?

Traffic Monitor is a network management tool that allows you to observe and analyze the flow of network traffic through a Maple Systems switch. It helps administrators monitor specific traffic types and other network statistics…

What is Port Mirroring?

Port Mirroring is a network feature that copies traffic from one or more source ports to a designated destination port for monitoring and analysis. This allows administrators to inspect network traffic in real-time without affecting…

What is Ring Settings?

Ring Settings configure a network redundancy mechanism that ensures continuous operation in case of a link failure. This feature is commonly used in industrial networks to create a ring topology where switches are connected in…

What is Port Priority?

Port Priority is a traffic management feature that controls the importance of data sent through specific ports on a network switch. It ensures that higher-priority traffic is processed first, reducing delays for critical applications. On…

What is a DIP Switch?

A DIP Switch (Dual In-line Package Switch) is a small physical switch used to configure hardware settings on a device. On Maple Systems network switches, DIP Switches are primarily used to activate the relay alarm…

What is IGMP?

IGMP (Internet Group Management Protocol) is a network protocol used to manage multicast group membership on IPv4 networks. It allows devices to join or leave multicast groups, ensuring that multicast traffic is only sent to…

What is WTR in ERPS?

WTR (Wait-to-Restore) is a timer mechanism used in ERPS (Ethernet Ring Protection Switching). It prevents network instability after a failure has been resolved. ERPS is a protocol that ensures fast recovery in Ethernet ring networks…

What is Guard Timer in ERPS?

Guard Timer in ERPS (Ethernet Ring Protection Switching) is a mechanism that prevents frequent or rapid state transitions in the network after a topology change. When a failure occurs and ERPS switches traffic to the…

What is Rate Limitation?

Rate Limitation is a feature used to control the amount of network traffic that is allowed to pass through a device. It includes Bandwidth Limitation and Storm Control. Bandwidth Limitation applies to specific ports and…

What are LLDP Neighbors?

LLDP Neighbors refers to devices on the network that support LLDP (Link Layer Discovery Protocol) and are directly connected to a network switch. LLDP is a vendor-neutral protocol. It allows network devices to advertise information…

What is Revertive in ERPS?

Revertive in ERPS (Ethernet Ring Protection Switching) is a feature that dictates how the network should behave when a primary path is restored. When Revertive mode is enabled, the ERPS protocol will automatically revert traffic…

What is a Community in SNMP?

In SNMP (Simple Network Management Protocol), a Community is a logical group used for authentication purposes and functions as a password or access control mechanism that defines the level of access to network devices such…

What is the MapleLink Lite Dashboard?

The Dashboard in the MapleLink Lite user-interface, included on our Lite-Managed switches, is a feature that allows network administrators to monitor the performance and health of the network devices. It provides real-time insights into various…

What is the Configuration Wizard?

The User-Interface Configuration Wizard on the Lite-Managed switches is a user-friendly feature that simplifies the switch configuration process in just three steps. Step 1: Account – You can adjust the admin password and set the…

What is Storm Control?

Storm Control is a network feature used to prevent broadcast, multicast, and unknown unicast storms on a switch. It limits the traffic volume to a predefined threshold, preventing network congestion and potential downtime. Storms can…

What is L2 Forwarding Rate?

L2 Forwarding Rate is the speed at which a network device can process and forward Layer 2 (L2) Ethernet frames. It is a key performance metric that determines how quickly a switch can move data…

What is the Configuration Backup/Restore Utility?

The Configuration Backup/Restore Utility is available on all Maple Systems managed switches. It allows network administrators to securely backup and restore switch configurations. This utility ensures that device settings, such as IP addresses, VLAN configurations,…

What are Port Statistics?

Port Statistics provide detailed data about the performance and activity of a network port. This information includes metrics such as data transfer rates, packet counts, and error rates. Administrators use port statistics to monitor network…

What is Short Circuit Protection?

Short Circuit Protection (SCP) is a safety feature that prevents damage to electrical devices or circuits when a short circuit occurs. A short circuit happens when the electrical current bypasses the normal load path, often…

What is Port Isolation?

Port Isolation is a network feature that restricts communication between devices connected to different ports on the same switch yet allows connected devices to communicate with the switch. Port Isolation prevents direct communication between isolated…

What is Over Current Protection?

Over Current Protection (OCP) is a safety feature designed to prevent electrical devices from being damaged by excessive current. When the current flowing through a circuit exceeds the device’s safe threshold OCP mechanisms activate to…

What is Management VLAN?

A Management VLAN (MVLAN) is a dedicated Virtual Local Area Network (VLAN) used specifically for managing network devices. The MLVAN enhances both security and network efficiency by isolating management traffic from regular data traffic. Additionally,…

What is the Topology Map?

The Topology Map is a feature used in Maple Systems lite managed and fully managed network switches to provide a visual representation of the devices and connections within a network. It allows network administrators to…

What are DSCP Tags?

DSCP (Differentiated Services Code Point) tags are part of the IP header used to indicate the priority or Quality of Service (QoS) level for network traffic. DSCP tags are 6-bit values that help classify and…

What is VLAN Passthrough?

VLAN Passthrough is a network feature that allows VLAN-tagged traffic to pass through a device without altering or stripping the VLAN tags. When a device is configured for VLAN passthrough, it forwards the packets as…

What is a VLAN Packet?

A VLAN packet is a data frame that includes information for a Virtual Local Area Network (VLAN) that allows devices to communicate within a specific segment of a network. The VLAN packet includes a VLAN…

What is ONVIF?

ONVIF (Open Network Video Interface Forum) is an open standard for network video surveillance devices. ONVIF ensures interoperability between different manufacturers’ equipment enablings devices like IP cameras, NVRs (Network Video Recorders), and video management systems…

What is a Downlink Port?

A Downlink Port is a network port used to connect a device to another device or network segment and refers to a physical port on a switch or router that connects to end devices, or…

What is Syslog?

Syslog is a standard protocol used for sending and receiving log or event messages in a network. It allows devices like routers, switches, and servers to send log data to a centralized log server for…

What is a Relay Contact Output?

Relay Contact Outputs on unmanaged and managed switches are controlled by a DIP-switch that can be toggled on or off. When set to ON, the DIP-switch activates a relay contact, sending current through the Alarm…

What is Redundant Power Input?

Redundant power input is the inclusion of multiple power sources to ensure continuous device operation in case of a power failure. When one power source fails, the system automatically switches to the backup power input,…

What is Electromagnetic Interference?

Electromagnetic Interference (EMI) refers to unwanted electromagnetic energy that disrupts the normal operation of electronic devices. It can be caused by various sources, such as electrical circuits, radio frequency signals, and electrical appliances. EMI can…

What is a Virtual Local Area Network (VLAN)?

A virtual local area network (VLAN) segments a physical network into smaller, isolated networks. It can help improve security and performance on a network. Layer 2 switches may create and segment VLANs but cannot route…

What is a Layer 3 Network Switch?

A layer 3 network switch operates at the Network Layer of the OSI model. Click here for more information about the OSI Model. Layer 3 network switches forward data based on IP addresses. Unlike layer 2 network…

What is a Layer 2 Network Switch?

A layer 2 network switch operates at the Data Link Layer of the OSI model. Click here for more information about the OSI Model. Layer 2 network switches forward data based on MAC addresses. They…

What is a UDP Port?

A UDP port is a communication endpoint for transmitting data between devices on a network using the UDP protocol. On Maple Systems products, UDP ports enable fast, connectionless communication for applications like broadcast messaging or…

What is a TCP Port

A TCP port is a communication endpoint for transmitting data between devices on a network using the TCP protocol. On Maple Systems products, TCP ports facilitate connections between HMIs, PLCs, and other networked devices for…