The leader in industrial automation and control solutions

What is Full or Half-Duplex Mode?

Duplex mode determines how data is transmitted between network devices. Full-duplex allows simultaneous sending and receiving of data. Half-duplex only allows one direction at a time, causing potential collisions. Full-duplex is common in modern Ethernet…

What is VLAN Tagging?

VLAN Tagging is a method used to identify and separate network traffic in Virtual Local Area Networks (VLANs). Defined by the IEEE 802.1Q standard, it adds a VLAN ID to Ethernet frames. This allows network…

What is Port Authentication?

Port Authentication is a network security feature used to control access to network ports based on device credentials. Defined by the IEEE 802.1X standard, it ensures only authorized devices can connect to the network. Port…

What is Active VLAN?

An Active VLAN is a VLAN that is actively used to separate traffic on a network. It helps keep devices isolated within their own virtual network while controlling communication. Active VLANs are configured on switch…

What is Link Aggregation (LACP)?

Link Aggregation combines multiple physical network links into one logical connection, increasing bandwidth and providing redundancy. By using IEEE 802.1ad (QinQ), Link Aggregation encapsulates multiple VLANs within another VLAN, enhancing scalability and performance. This standard…

What is 1000BASE-SX/LX?

1000BASE-SX and 1000BASE-LX are Gigabit Ethernet standards using fiber optic cables for high-speed communication. Defined by the IEEE 802.3z standard, they support 1 Gbps data transmission. 1000BASE-SX operates on multimode fiber (MMF), reaching up to 550 meters, while 1000BASE-LX uses single-mode fiber (SMF), extending up to 10 km. These standards are ideal for long-distance, interference-free…

What is Storm Threshold?

Storm control monitors the rate of incoming packets on a port. It compares the rate of broadcast, multicast, or unknown unicast traffic to a configured Storm Threshold. When the traffic rate exceeds the threshold, storm control takes…

What is Class of Service (CoS)?

Class of Service (CoS) is a networking feature that prioritizes data traffic to improve performance and reduce latency. CoS is defined by the IEEE 802.1p standard, which assigns priority levels to network packets and is commonly used in industrial automation, VoIP, and video…

What is RSTP (Rapid Spanning Tree Protocol)?

RSTP (Rapid Spanning Tree Protocol) is an improved version of STP, defined by the IEEE 802.1w standard. RSPT provides faster convergence by quickly transitioning ports to forwarding or blocking states, improving network recovery time. RSTP removes the listening and learning stages, reducing recovery time from 50…

What is Spanning Tree Protocol (STP)?

STP (Spanning Tree Protocol) is a network protocol defined by the IEEE 802.1D standard to prevent network loops by ensuring there is only one active path between devices in redundant network topologies. STP uses BPDU (Bridge Protocol…

What is Nway Auto-negotiation?

Nway Auto-Negotiation, defined by the IEEE 802.3 standard, allows network devices to automatically determine the best duplex mode and speed. It eliminates manual configuration by exchanging capabilities between devices. This process ensures optimal performance and compatibility…

What is 802.3x Flow Control?

Flow Control is a standard defined by IEEE 802.3x that manages data transmission to prevent packet loss during network congestion. It uses pause frames to temporarily stop the sending of data, allowing the receiving device to process information without overflow.…

What is a MAC Table?

A MAC table is used by network switches to map MAC addresses to specific switch ports. This allows the switch to efficiently forward data frames based on their destination MAC address. The switch dynamically builds the MAC table as…

What are Bridge Protocol Data Units?

Bridge Protocol Data Units (BPDU) are network messages used by switches to share Spanning Tree Protocol (STP) information. These packets help prevent loops by identifying redundant links in a network. IEEE 802.1D defines BPDU functionality…

What is Local Link Discovery Protocol (LLDP)?

Local Link Discovery Protocol (LLDP) is a standardized data link layer protocol used to discover and exchange information about network devices. Defined by the IEEE 802.1AB standard, LLDP allows devices to advertise their identity, capabilities, and network topology. It helps…

What is Port-Based VLAN?

Port-Based VLAN is a method of network segmentation that assigns specific switch ports to different VLANs (Virtual Local Area Networks). Each port on a switch can be configured to belong to a specific VLAN regardless…

What is a Jumbo Frame?

A Jumbo Frame is an Ethernet frame with a Maximum Transmission Unit (MTU) larger than the standard 1500-byte size, typically supporting 9000 bytes or more. This larger MTU reduces the overhead for data transmission, improving…

What is Industrial QoS?

Industrial QoS (iQoS) ensures reliable communication by prioritizing critical protocols like PROFINET, EtherNet/IP, and GOOSE in automation networks. These protocols require low latency and minimal packet loss for real-time control and monitoring. iQoS assigns higher…

What is Simple Network Management Protocol?

Simple Network Management Protocol (SNMP) monitors and manages devices on an IP network. SNMP uses a structured format with Object Identifiers (OIDs) to retrieve and modify device parameters and supports SNMPv1, SNMPv2c, and SNMPv3. SNMPv3…

What is an Access Control List?

What is an Access Control List? An Access Control List (ACL) is used to filter network traffic based on predefined rules. Traffic is allowed or denied based on IP addresses, MAC addresses, protocols, or port…

What is the IEC 60068-2 Standard?

The IEC 60068-2 standard is part of the IEC 60068 series, which covers environmental testing for electrical and electronic equipment. Specifically, IEC 60068-2 refers to various test methods and procedures used to evaluate the environmental…

What is a Switch Fabric?

A switch fabric refers to the internal architecture of a network switch that connects its ports and facilitates data forwarding. It enables communication between the switch’s ports by determining how data packets are routed from…

What is Device Flapping?

Network device flapping occurs when a network device repeatedly connects and disconnects in short intervals. This issue affects stability and can cause network disruptions. Flapping is commonly seen in links between switches, routers, or access…

What is a Command Line Interface?

A Command Line Interface (CLI) is a text-based interface used to configure and manage operating systems or network devices. Users enter text commands to perform tasks like configuring settings, managing files, or troubleshooting network issues.…

What is HTTP/HTTPs?

HTTP (Hyper Text Transfer Protocol) is the foundational protocol used to transfer data on the web. It allows the client (like a browser) to request resources from a web server. HTTPS (Hyper Text Transfer Protocol…

What is an Industrial Network Switch?

An Industrial Network Switch is a type of switch designed to operate in harsh environments typically found in industrial settings. It is built to withstand factors like temperature extremes, humidity, vibration, and electrical interference, which…

What is the GOOSE protocol?

The Generic Object-Oriented Substation Event (GOOSE) protocol is a communication standard used in electrical substations for rapid data exchange. It operates within the IEC 61850 standard and enables real-time messaging between protection and control devices.…

What is Traffic Control?

Traffic Control is a method used to manage network traffic, ensuring optimal performance, prioritization, and efficient data flow. It involves various techniques that control the rate, direction, and volume of traffic within a network. This…

What is Ethernet Ring Protection Switching?

Ethernet Ring Protection Switching (ERPS) is a network protocol designed to provide fault tolerance and network resiliency in networks. It ensures uninterrupted service by creating a redundant ring topology, where data can be rerouted if…

What is Loop Detection?

Loop Detection is a network feature used to identify and prevent network loops in networks. A network loop occurs when data packets continuously circulate in the network without reaching their destination. This can cause congestion,…

What is MapleLink ModbusTCP?

MapleLink’s ModbusTCP allows a network device to act as a Modbus TCP slave, enabling remote access by a ModbusTCP master device. With this feature, you can read and write to specific addresses on the device,…

What is VLAN Data Forwarding?

VLAN Data Forwarding is the process of directing network traffic between devices within a Virtual Local Area Network (VLAN). When a packet is sent within a VLAN, it is forwarded based on the VLAN tag.…

What is Reverse Polarity Protection?

Reverse Polarity Protection is a safety feature that prevents damage to electronic devices when the power supply connections are reversed. When the positive and negative wires are mistakenly swapped, reverse polarity can cause equipment to…

What is Power Surge Protection?

Power Surge Protection is a safety feature that safeguards electrical devices from voltage spikes or surges. It may occur due to lightning strikes, power outages, or electrical faults. These surges can damage or destroy sensitive…

What is Over Voltage Protection?

Over Voltage Protection (OVP) safeguards devices from voltage spikes and surges that could cause damage. When voltage exceeds safe levels, OVP mechanisms activate to prevent equipment failure. Certifications such as EN 61000-4-5 (Surge), EN 61000-4-2…

What is ESD Protection?

ESD Protection refers to the methods and components used to protect electronic devices from electrostatic discharge (ESD). ESD occurs when static electricity is suddenly released, which can damage sensitive electronic components. This type of protection…

What is Code Redundancy?

Code redundancy refers to the practice of adding duplicate or backup code within a system to enhance its reliability and fault tolerance. By including extra functions or processes, systems can continue to operate smoothly even…

What is Remote System Reboot?

Maple Systems products offer the ability to remotely reboot a device. Maple Network Switches can be remotely accessed via its HTTP/HTTPs or TELNET/SSH servers. Once connected you may reboot the system. Maple System cMT /…

What is a DHCP Client?

A DHCP Client allows a device to automatically obtain an IP address from a DHCP Server. When enabled, the client requests network settings, including IP address, subnet mask, and gateway. This eliminates the need for…

What is an Ethernet Management Port?

An Ethernet Management Port in our system refers to a dedicated console port or USB port for device management. It provides administrators with direct access to configure and troubleshoot network devices. This port is separate…

What is an Element Management System?

An Element Management System (EMS) is a software platform for managing network devices like switches and routers. It helps monitor, configure, and troubleshoot these devices in a centralized manner. EMS collects data, generates alerts, and…

What is Port-Based 802.1X?

Port-Based 802.1X is a network access control protocol that authenticates devices attempting to connect to a network using port authentication. When a device connects, 802.1X requires it to authenticate, usually through credentials or certificates, before…

What is Port Utilization?

Port Utilization refers to the amount of bandwidth a network port is using compared to its total capacity. It helps monitor how effectively a port is being used for data transmission. High port utilization can…

What is Simple Network Time Protocol?

Simple Network Time Protocol (SNTP) is a protocol used to synchronize the clocks of network devices. It allows devices to receive time information from a time server over the network. SNTP is a simplified version…

What is a User Account with Authority?

A User Account with Authority (802.1X) is a network access control protocol that authenticates devices before granting network access. It requires users or devices to provide valid credentials, such as a username and password. 802.1X…

What is a Trusted Managed Host?

A Trusted Managed Host is a device or system that is authorized and trusted to manage and control network resources. It has higher security privileges, allowing it to configure, monitor, and maintain network devices. Trusted…

What is a DHCP Relay?

A DHCP Relay forwards DHCP requests between clients and a DHCP Server on different networks or specified VLANs. Without it, clients can only receive IP addresses from servers in the same subnet. DHCP Relay allows…

What is Dual Homing?

Dual Homing is a redundancy method where a device connects two separate network paths for reliability. If one connection fails, traffic switches to the other, ensuring continuous network access. On Maple Systems network switches, Dual…

What is an IP Address?

An IP Address (Internet Protocol Address) is a unique identifier assigned to each device on a network. Thus, allowing it to communicate with other devices. It serves as both the address and the location of…

What is MEL in ERPS?

MEL (Maintenance Entity Level) in ERPS (Ethernet Ring Protection Switching) defines the hierarchy of OAM (Operations, Administration, and Maintenance) messages used for fault detection and network monitoring. MEL determines the priority and scope of OAM…

What is DHCP Snooping?

DHCP Snooping is a security feature that prevents unauthorized DHCP Servers from assigning IP addresses to clients. It monitors DHCP traffic and only allows responses from trusted servers on specified ports. On Maple Systems network…

What is ARP Inspection?

ARP Inspection is a security feature that prevents Address Resolution Protocol (ARP) spoofing attacks. It verifies ARP packets against a trusted database to block malicious attempts to redirect network traffic. On Maple Systems network switches,…

What is Auto Provision?

Auto Provision is a service that allows the switch to automatically retrieve and apply configuration files from a remote server. This simplifies the configuration process by eliminating the need for manual setup. The switch connects…

What is IP DiffServ?

IP DiffServ (Differentiated Services) is a network architecture designed to manage traffic and prioritize packets for improved Quality of Service (QoS). It classifies and marks packets using the DSCP (Differentiated Services Code Point) tag which…

What is IP Source Guard?

IP Source Guard is a security feature that prevents IP address spoofing by binding IP addresses to specific ports and MAC addresses. It ensures that only devices with valid IP-MAC bindings can communicate on the…

What is a Binding Table?

A Binding Table is a data structure that maps IP addresses to specific MAC addresses and ports on a network switch. It is used to validate and control traffic flow. Ensuring that only devices with…

What is Traffic Monitor?

Traffic Monitor is a network management tool that allows you to observe and analyze the flow of network traffic through a Maple Systems switch. It helps administrators monitor specific traffic types and other network statistics…

What is Port Mirroring?

Port Mirroring is a network feature that copies traffic from one or more source ports to a designated destination port for monitoring and analysis. This allows administrators to inspect network traffic in real-time without affecting…

What is a Management Host?

A Management Host is a designated device or system authorized to access and configure a network switch. It typically refers to a computer or server used for administrative tasks. Such as monitoring network activity, adjusting…

What is Ring Settings?

Ring Settings configure a network redundancy mechanism that ensures continuous operation in case of a link failure. This feature is commonly used in industrial networks to create a ring topology where switches are connected in…

What is Port Priority?

Port Priority is a traffic management feature that controls the importance of data sent through specific ports on a network switch. It ensures that higher-priority traffic is processed first, reducing delays for critical applications. On…

What is a DIP Switch?

A DIP Switch (Dual In-line Package Switch) is a small physical switch used to configure hardware settings on a device. On Maple Systems network switches, DIP Switches are primarily used to activate the relay alarm…

What is IGMP?

IGMP (Internet Group Management Protocol) is a network protocol used to manage multicast group membership on IPv4 networks. It allows devices to join or leave multicast groups, ensuring that multicast traffic is only sent to…

What is WTR in ERPS?

WTR (Wait-to-Restore) is a timer mechanism used in ERPS (Ethernet Ring Protection Switching). It prevents network instability after a failure has been resolved. ERPS is a protocol that ensures fast recovery in Ethernet ring networks…

What is Guard Timer in ERPS?

Guard Timer in ERPS (Ethernet Ring Protection Switching) is a mechanism that prevents frequent or rapid state transitions in the network after a topology change. When a failure occurs and ERPS switches traffic to the…

What is Rate Limitation?

Rate Limitation is a feature used to control the amount of network traffic that is allowed to pass through a device. It includes Bandwidth Limitation and Storm Control. Bandwidth Limitation applies to specific ports and…

What are LLDP Neighbors?

LLDP Neighbors refers to devices on the network that support LLDP (Link Layer Discovery Protocol) and are directly connected to a network switch. LLDP is a vendor-neutral protocol. It allows network devices to advertise information…

What is RMON?

RMON (Remote Monitoring) is a network management protocol that provides in-depth traffic analysis and port statistics on network switches. It enhances traditional SNMP (Simple Network Management Protocol) by enabling switches to collect and store traffic…

What is Revertive in ERPS?

Revertive in ERPS (Ethernet Ring Protection Switching) is a feature that dictates how the network should behave when a primary path is restored. When Revertive mode is enabled, the ERPS protocol will automatically revert traffic…

What is a Filter Table?

A Filter Table in ARP Inspection is used to store valid ARP (Address Resolution Protocol) entries that have been verified to ensure legitimate traffic on the network. This table helps prevent ARP spoofing, as well…

What is a Community in SNMP?

In SNMP (Simple Network Management Protocol), a Community is a logical group used for authentication purposes and functions as a password or access control mechanism that defines the level of access to network devices such…

What is Storm Control?

Storm Control is a network feature used to prevent broadcast, multicast, and unknown unicast storms on a switch. It limits the traffic volume to a predefined threshold, preventing network congestion and potential downtime. Storms can…

What is L2 Forwarding Rate?

L2 Forwarding Rate is the speed at which a network device can process and forward Layer 2 (L2) Ethernet frames. It is a key performance metric that determines how quickly a switch can move data…

What is the Configuration Backup/Restore Utility?

The Configuration Backup/Restore Utility is available on all Maple Systems managed switches. It allows network administrators to securely backup and restore switch configurations. This utility ensures that device settings, such as IP addresses, VLAN configurations,…

What is a MAC VLAN?

A MAC VLAN is a feature that allows network administrators to filter traffic based on the MAC (Media Access Control) address of devices. This feature enables the network switch to apply VLAN configurations based on…

What are Port Statistics?

Port Statistics provide detailed data about the performance and activity of a network port. This information includes metrics such as data transfer rates, packet counts, and error rates. Administrators use port statistics to monitor network…

What is MAC Limit Port Security?

MAC Limit Port Security is a feature that restricts the number of MAC addresses allowed on a specific switch port. It helps prevent unauthorized devices from connecting to the network. When the limit is exceeded,…

What is Short Circuit Protection?

Short Circuit Protection (SCP) is a safety feature that prevents damage to electrical devices or circuits when a short circuit occurs. A short circuit happens when the electrical current bypasses the normal load path, often…

What is Port Isolation?

Port Isolation is a network feature that restricts communication between devices connected to different ports on the same switch yet allows connected devices to communicate with the switch. Port Isolation prevents direct communication between isolated…

What is Over Current Protection?

Over Current Protection (OCP) is a safety feature designed to prevent electrical devices from being damaged by excessive current. When the current flowing through a circuit exceeds the device’s safe threshold OCP mechanisms activate to…

What is Management VLAN?

A Management VLAN (MVLAN) is a dedicated Virtual Local Area Network (VLAN) used specifically for managing network devices. The MLVAN enhances both security and network efficiency by isolating management traffic from regular data traffic. Additionally,…

What is the Topology Map?

The Topology Map is a feature used in Maple Systems lite managed and fully managed network switches to provide a visual representation of the devices and connections within a network. It allows network administrators to…

What are DSCP Tags?

DSCP (Differentiated Services Code Point) tags are part of the IP header used to indicate the priority or Quality of Service (QoS) level for network traffic. DSCP tags are 6-bit values that help classify and…

What is VLAN Passthrough?

VLAN Passthrough is a network feature that allows VLAN-tagged traffic to pass through a device without altering or stripping the VLAN tags. When a device is configured for VLAN passthrough, it forwards the packets as…

What is a VLAN Packet?

A VLAN packet is a data frame that includes information for a Virtual Local Area Network (VLAN) that allows devices to communicate within a specific segment of a network. The VLAN packet includes a VLAN…

What is ONVIF?

ONVIF (Open Network Video Interface Forum) is an open standard for network video surveillance devices. ONVIF ensures interoperability between different manufacturers’ equipment enablings devices like IP cameras, NVRs (Network Video Recorders), and video management systems…

What is a Downlink Port?

A Downlink Port is a network port used to connect a device to another device or network segment and refers to a physical port on a switch or router that connects to end devices, or…

What is Syslog?

Syslog is a standard protocol used for sending and receiving log or event messages in a network. It allows devices like routers, switches, and servers to send log data to a centralized log server for…

What is a Relay Contact Output?

Relay Contact Outputs on unmanaged and managed switches are controlled by a DIP-switch that can be toggled on or off. When set to ON, the DIP-switch activates a relay contact, sending current through the Alarm…

What is Redundant Power Input?

Redundant power input is the inclusion of multiple power sources to ensure continuous device operation in case of a power failure. When one power source fails, the system automatically switches to the backup power input,…

What is Electromagnetic Interference?

Electromagnetic Interference (EMI) refers to unwanted electromagnetic energy that disrupts the normal operation of electronic devices. It can be caused by various sources, such as electrical circuits, radio frequency signals, and electrical appliances. EMI can…

What is a Virtual Local Area Network (VLAN)?

A virtual local area network (VLAN) segments a physical network into smaller, isolated networks. It can help improve security and performance on a network. Layer 2 switches may create and segment VLANs but cannot route…

What is a Layer 3 Network Switch?

A layer 3 network switch operates at the Network Layer of the OSI model. Click here for more information about the OSI Model. Layer 3 network switches forward data based on IP addresses. Unlike layer 2 network…

What is a Layer 2 Network Switch?

A layer 2 network switch operates at the Data Link Layer of the OSI model. Click here for more information about the OSI Model. Layer 2 network switches forward data based on MAC addresses. They…

What is a UDP Port?

A UDP port is a communication endpoint for transmitting data between devices on a network using the UDP protocol. On Maple Systems products, UDP ports enable fast, connectionless communication for applications like broadcast messaging or…

What is a TCP Port

A TCP port is a communication endpoint for transmitting data between devices on a network using the TCP protocol. On Maple Systems products, TCP ports facilitate connections between HMIs, PLCs, and other networked devices for…