INTRODUCTION
1-6
Figure 1-4 Bird’s-Eye View Of FNB Segmentation And Bypassing
All single ring MIMs can wrap their connection (on either side) to the
FNB which makes it possible to segment the FNB; port switching MIMs
(e.g., TRXMIM) do not. See the TRMM-2 Local Management User’s
Guide for details and procedures.
1.1.6 Module Bypassing, Ring Bypassing, And Port
Disabling
This section describes the concepts and results of Module Bypassing,
Ring Bypassing, and Port Disabling.
Module Bypassing
The TRMM-2 allows you to create more isolated LANs by deliberately
bypassing a MIM’s ring connection from the FNB. For example, in the
configuration represented in
Figure 1-4
, the MIM in Slot 4 is bypassed
from the FNB.
NOTE
Having a MIM in module bypass mode does not necessarily
mean that the MIM is devoid of network activity. Even if all rings
are bypassed from the backplane, the MIM may have active
LANs internally.
<---|
<--->
<--->
<-B->
|--->
<---|
|---|
|--->
Board 8
Board 7
Board 6
Board 5
Board 4
Board 3
Board 2
Board 1
FNB
T
oken Ring LAN
T
oken Ring LAN
T
oken Ring LAN
T
oken Ring LAN
T
oken Ring LAN
T
oken Ring LAN
T
oken Ring LAN
T
oken Ring LAN
Содержание TRMM-2
Страница 1: ...TRMM 2 TOKEN RING MANAGEMENT MODULE USER S GUIDE ...
Страница 2: ......
Страница 6: ...TRMM 2 QUICK REFERENCE QR 4 ...
Страница 14: ...CONTENTS viii ...
Страница 30: ...INTRODUCTION 1 12 ...
Страница 78: ...SUPPORTED MIB GROUPS E 4 ...
Страница 82: ...INDEX IX 4 ...