ProCurve Products
   HOME
*





ProCurve Products
HP ProCurve was the name of the networking division of Hewlett-Packard from 1998 to 2010 and associated with the products that it sold. The name of the division was changed to HP Networking in September 2010. Please use HP Networking Products for an actual list of products. The HP ProCurve division sold network switches, wireless access points, WAN routers, and Access Control Servers/Software under the "HP ProCurve" brand name. Switching Core Switches * 8212zl Series - (Released September 2007) Core switch offering, 12-module slot chassis with dual fabric modules and options for dual management modules and system support modules for high availability (HA). IPV6-ready, 692 Gbit/s fabric. Up to 48 10GbE ports, 288 Gb ports, or 288 SFPs. Powered by a combination of either 875W or 1500W PSUs, to provide a maximum of 3600W (5400W using additional power supplies) of power for PoE. Datacenter Switches * 6600 Series - (Released February 2009) Datacenter switch offered in ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

ProCurve
HP ProCurve was the name of the networking division of Hewlett-Packard from 1998 to 2010 and associated with the products that it sold. The name of the division was changed to HP Networking in September 2010 after HP bought 3Com Coporation. History The HP division that became the HP ProCurve division began in Roseville, California, in 1979. Originally it was part of HP's Data Systems Division (DSD) and known as DSD-Roseville. Later, it was called the Roseville Networks Division (RND), then the Workgroup Networks Division (WND), before becoming the ProCurve Networking Business (PNB). The trademark filing date for the ProCurve name was February 25, 1998. On August 11, 2008 HP announced the acquisition of Colubris Networks, a maker of wireless networking products. This completed on October 1, 2008. In November 2008, HP ProCurve was moved into HP's largest business division, the Technology Services Group organization, with HP Enterprise Account Managers being compensated for sales. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Command-line Interface
A command-line interpreter or command-line processor uses a command-line interface (CLI) to receive commands from a user in the form of lines of text. This provides a means of setting parameters for the environment, invoking executables and providing information to them as to what actions they are to perform. In some cases the invocation is conditional based on conditions established by the user or previous executables. Such access was first provided by computer terminals starting in the mid-1960s. This provided an interactive environment not available with punched cards or other input methods. Today, many users rely upon graphical user interfaces and menu-driven interactions. However, some programming and maintenance tasks may not have a graphical user interface and use a command line. Alternatives to the command-line interface include text-based user interface menus (for example, IBM AIX SMIT), keyboard shortcuts, and various desktop metaphors centered on the pointer (usual ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Link Layer Discovery Protocol
The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol used by network devices for advertising their identity, capabilities, and neighbors on a local area network based on IEEE 802 technology, principally wired Ethernet. The protocol is formally referred to by the IEEE as ''Station and Media Access Control Connectivity Discovery'' specified in IEEE 802.1AB with additional support in IEEE 802.3 section 6 clause 79. LLDP performs functions similar to several proprietary protocols, such as Cisco Discovery Protocol, Foundry Discovery Protocol, Nortel Discovery Protocol and Link Layer Topology Discovery. Information gathered Information gathered with LLDP can be stored in the device management information base (MIB) and queried with the Simple Network Management Protocol (SNMP) as specified in RFC 2922. The topology of an LLDP-enabled network can be discovered by ''crawling'' the hosts and querying this database. Information that may be retrieved include: ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


HP Network Node Manager
HP OpenView is the former name for a Hewlett-Packard product family that consisted of network and systems management products. In 2007, HP OpenView was rebranded as HP BTO (''Business Technology Optimization'') Software when it became part of the HP Software Division. The products are now available as various HP products, marketed through the HP Software Division. HP OpenView software provided large-scale system and network management of an organization's IT infrastructure. It included optional modules from HP as well as third-party management software, which connected within a common framework and communicated with one another. History The foundational OpenView product was Network Node Manager (NNM), network monitoring software based on SNMP. NNM was used to manage networks and could be used in conjunction with other management software, such as CiscoWorks. In April 2004, HP bought Novadigm and its Radia suite. In December 2005, it acquired Peregrine Systems with its IT asset ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


HP OpenView
HP OpenView is the former name for a Hewlett-Packard product family that consisted of network and systems management products. In 2007, HP OpenView was rebranded as HP BTO (''Business Technology Optimization'') Software when it became part of the HP Software Division. The products are now available as various HP products, marketed through the HP Software Division. HP OpenView software provided large-scale system and network management of an organization's IT infrastructure. It included optional modules from HP as well as third-party management software, which connected within a common framework and communicated with one another. History The foundational OpenView product was Network Node Manager (NNM), network monitoring software based on SNMP. NNM was used to manage networks and could be used in conjunction with other management software, such as CiscoWorks. In April 2004, HP bought Novadigm and its Radia suite. In December 2005, it acquired Peregrine Systems with its IT ass ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Network Management
Network management is the process of administering and managing computer networks. Services provided by this discipline include fault analysis, performance management, provisioning of networks and maintaining quality of service. Network management software is used by network administrators to help perform these functions. Technologies A small number of accessory methods exist to support network and network device management. Network management allows IT professionals to monitor network components within large network area. Access methods include the SNMP, command-line interface (CLI), custom XML, CMIP, Windows Management Instrumentation (WMI), Transaction Language 1 (TL1), CORBA, NETCONF, and the Java Management Extensions (JMX). Schemas include the Structure of Management Information (SMI), WBEM, the Common Information Model (CIM Schema), and MTOSI amongst others. See also * Application service management * Business service management * Capacity management * Comparison ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Wireless Distribution System
A wireless distribution system (WDS) is a system enabling the wireless interconnection of access points in an IEEE 802.11 network. It allows a wireless network to be expanded using multiple access points without the traditional requirement for a wired backbone to link them. The notable advantage of WDS over other solutions is that it preserves the MAC addresses of client frames across links between access points. An access point can be either a main, relay, or remote base station. * A main base station is typically connected to the (wired) Ethernet. * A relay base station relays data between remote base stations, wireless clients, or other relay stations; to either a main, or another relay base station. * A remote base station accepts connections from wireless clients and passes them on to relay stations or to main stations. Connections between "clients" are made using MAC addresses. All base stations in a wireless distribution system must be configured to use the same radio ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Virtual Private Network
A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The benefits of a VPN include increases in functionality, security, and management of the private network. It provides access to resources that are inaccessible on the public network and is typically used for remote workers. Encryption is common, although not an inherent part of a VPN connection. A VPN is created by establishing a virtual point-to-point connection through the use of dedicated circuits or with tunneling protocols over existing networks. A VPN available from the public Internet can provide some of the benefits of a wide area network (WAN). From a user perspective, the resources available within the private network can be accessed remotely. Types Virtual private networks may be classified into several categories: ;Remote acce ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

IPsec
In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs). IPsec includes protocols for establishing mutual authentication between agents at the beginning of a session and negotiation of cryptographic keys to use during the session. IPsec can protect data flows between a pair of hosts (''host-to-host''), between a pair of security gateways (''network-to-network''), or between a security gateway and a host (''network-to-host''). IPsec uses cryptographic security services to protect communications over Internet Protocol (IP) networks. It supports network-level peer authentication, data origin authentication, data integrity, data confidentiality (encryption), and replay protection (protection from replay attacks). The initial IPv4 suite was developed with few secur ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

ISDN
Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the digitalised circuits of the public switched telephone network. Work on the standard began in 1980 at Bell Labs and was formally standardized in 1988 in the CCITT "Red Book". By the time the standard was released, newer networking systems with much greater speeds were available, and ISDN saw relatively little uptake in the wider market. One estimate suggests ISDN use peaked at a worldwide total of 25 million subscribers at a time when 1.3 billion analog lines were in use. ISDN has largely been replaced with digital subscriber line (DSL) systems of much higher performance. Prior to ISDN, the telephone system consisted of digital links like T1/ E1 on the long-distance lines between telephone company offices and analog signals on copper telephone wires to the customers, the " last mile". At the time, the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Serial Cable
A serial cable is a cable used to transfer information between two devices using a serial communication protocol. The form of connectors depends on the particular serial port used. A cable wired for connecting two DTEs directly is known as a null modem cable. Maximum cable lengths The maximum working length of a cable varies depending on the characteristics of the transmitters and receivers, the baud rate on the cable, and the capacitance and electrical impedance of the cable. The RS-232 standard states that a compliant port must provide defined signal characteristics for a capacitive load of pF. This does not correspond to a fixed length of cable since varying cables have different characteristics. Empirically tested combinations of bit rate, serial ports, cable type, and lengths may provide reliable communications, but generally RS-232-compatible ports are intended to be connected by, at the most, a few tens of metres of cable. Other serial communications standards are better a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

ADSL2+
G.992.5 (also referred to as ADSL2+, G.dmt.bis+, and G.adslplus) is an ITU-T standard for asymmetric digital subscriber line (ADSL) broadband Internet access. The standard has a maximum theoretical downstream sync speed of 24 megabits per second (Mbit/s). Utilizing G.992.5 Annex M upstream sync speeds of 3.3 Mbit/s can be achieved. Technical information ADSL2+ extends the capability of basic ADSL by doubling the number of downstream channels. The data rates can be as high as 24 Mbit/s downstream and up to 1.4 Mbit/s upstream depending on the distance from the DSLAM to the customer's premises. ADSL2+ is capable of doubling the frequency band of typical ADSL connections from 1.1 MHz to 2.2 MHz. This doubles the downstream data rates of the previous ADSL2 standard (which was up to 12 Mbit/s), and like the previous standards will degrade from its peak bitrate after a certain distance. ADSL2+ also allows port bonding. This is where multiple ports are ph ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]