
Key Concepts
99
SMT has six key frame-based protocols:
■
Neighbor Notification
— Allows SMT to learn the addresses of the
logical neighbors of each MAC in a station. This information is useful
in detecting and isolating network faults.
■
Parameter Management
— Performs the remote management of
station attributes. It operates on all SMT MIB attributes, attribute
groups, and actions.
■
Status Reporting
— Allows a station to notify network managers
about events such as station configuration changes and network
errors.
■
Status Polling
— Provides a mechanism to obtain station status
remotely through a request/response protocol.
■
Echo
— Performs loopback testing on the FDDI dual ring.
■
Synchronous Bandwidth Allocation
— Allocates synchronous
bandwidth and monitors both synchronous and total bandwidth.
Primary and
Secondary Paths
FDDI’s dual, counter-rotating ring is made up of a primary and secondary
ring. You can be connect FDDI stations to either ring or to both rings
simultaneously. Data flows downstream on the primary ring in one
direction from one station to its neighboring station. The secondary ring
serves as a redundant path and flows in the opposite direction. When a
link or station failure occurs, the ring
wraps
around the location of the
failure, creating a single logical ring.
Paths represent the segments of a logical ring that pass through a station.
An FDDI station can contain two paths:
■
Primary path
—
The segment or segments of the primary ring that
pass through a station. Conditions may exist in parts of the network
that cause the path to be in a different ring. The primary path must be
present in all nodes on the network.
■
Secondary path
—
The segment or segments of the secondary ring
that pass through a station. Conditions may exist in parts of the
network that may cause the path to be in a different ring.
Media Access Control
The Media Access Control (MAC) uses a token-passing protocol to
determine which station has control of the physical medium (the ring).
The MAC delivers frames to their destinations by scheduling and
performing all data transfers.
Summary of Contents for CoreBuilder 3500
Page 44: ...44 CHAPTER 2 MANAGEMENT ACCESS ...
Page 58: ...58 CHAPTER 3 SYSTEM PARAMETERS ...
Page 86: ...86 CHAPTER 5 ETHERNET ...
Page 112: ...112 CHAPTER 6 FIBER DISTRIBUTED DATA INTERFACE FDDI ...
Page 208: ...208 CHAPTER 9 VIRTUAL LANS ...
Page 256: ...256 CHAPTER 10 PACKET FILTERING ...
Page 330: ...330 CHAPTER 12 VIRTUAL ROUTER REDUNDANCY PROTOCOL VRRP ...
Page 356: ...356 CHAPTER 13 IP MULTICAST ROUTING ...
Page 418: ...418 CHAPTER 14 OPEN SHORTEST PATH FIRST OSPF ...
Page 519: ...RSVP 519 Figure 94 Sample RSVP Configuration Source station End stations Routers ...
Page 566: ...566 CHAPTER 18 DEVICE MONITORING ...
Page 572: ...572 APPENDIX A TECHNICAL SUPPORT ...
Page 592: ...592 INDEX ...