Browse Definitions :
Definition

link layer discovery protocol (LLDP)

The link layer discovery protocol (LLDP) is an open and extendable part of the Internet protocol suite used in IEEE 802 to advertise a device’s identity and abilities, as well as other devices connected within the same network.

LLDP is mainly used in wired Ethernet-connected devices to facilitate management of network resources and simplify networking tasks for administrators in a multi-vendor network. The protocol’s multi-vendor support enables network discovery of devices and management tools like Simple Network Management Protocol (SNMP) in a network made up of devices from different manufacturers. LLDP makes it unnecessary to use a larger number of proprietary protocols to support a multi-vendor network or, on the other hand, limit oneself to the hardware of a single vendor.

On an interval schedule, an LLDP device sends its information in Ethernet frames. A frame starts with the required TLVs of Chassis ID, Port ID, and time-to-live (TTL). The frame contains the device’s destination MAC address as a multicast address that is not forwarded outside a network, assuming 802.1D compliance.

LLDP is also known as Station and Media Access Control Connectivity Discovery, as specified in IEEE 802.1AB. Similar proprietary protocols include Cisco Discovery Protocol (CDP), Extreme Discovery Protocol, Foundry Discovery Protocol (FDP), Microsoft's Link Layer Topology Discovery and Nortel Discovery Protocol (AKA SONMP).

This was last updated in March 2016

Continue Reading About link layer discovery protocol (LLDP)

Networking
  • network traffic

    Network traffic is the amount of data that moves across a network during any given time.

  • dynamic and static

    In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

  • MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

Security
  • security information and event management (SIEM)

    Security information and event management (SIEM) is an approach to security management that combines security information ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from victims' bank accounts and to ...

  • Trojan horse

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

CIO
  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing.

  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

HRSoftware
  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

Customer Experience
  • BOPIS (buy online, pick up in-store)

    BOPIS (buy online, pick up in-store) is a business model that allows consumers to shop and place orders online and then pick up ...

  • real-time analytics

    Real-time analytics is the use of data and related resources for analysis as soon as it enters the system.

  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

Close