INTRODUCTION
1-6
All single ring MIMs can wrap their connection (on either side) to the
FNB which makes it possible to segment the FNB; port switching MIMs
(e.g., the TRXMIM) do not. See the TRMM-4 Local Management User’s
Guide for details and procedures.
Figure 1-4 Bird’s-Eye Model Of FNB Segmenting And Bypassing
1.1.6 Module Bypassing, Ring Bypassing, And Port
Disabling
This section describes the concepts and results of Module Bypassing,
Ring Bypassing, and Port Disabling.
Module Bypassing
The TRMM-4 allows you to create more isolated LANs by deliberately
bypassing a MIM’s ring connection from the FNB. For example, in the
configuration represented in
Figure 1-4
, the MIM in Slot 4 is bypassed
from the FNB.
NOTE
Having a MIM in module
bypass
mode does not necessarily
mean that the MIM is devoid of network activity. Even if all ring
channels are bypassed from the backplane, the MIM may host
active LANs internally.
<---|
<--->
<--->
<-B->
|--->
<---|
|---|
|--->
Board 8
Board 7
Board 6
Board 5
Board 4
Board 3
Board 2
Board 1
FNB
T
oken Ring LAN
T
oken Ring LAN
T
oken Ring LAN
T
oken Ring LAN
T
oken Ring LAN
T
oken Ring LAN
T
oken Ring LAN
T
oken Ring LAN
Содержание TRMM-4
Страница 1: ...TRMM 4 TOKEN RING MANAGEMENT MODULE USER S GUIDE BOOKTITLE2 OPTIONAL ...
Страница 2: ......
Страница 6: ...TRMM 4 QUICK REFERENCE QR 4 ...
Страница 14: ...CONTENTS viii ...
Страница 30: ...INTRODUCTION 1 12 ...
Страница 44: ...INSTALLATION 2 14 ...
Страница 52: ...MONITORING AND TROUBLESHOOTING 3 8 ...
Страница 70: ...SUPPORTED MIB GROUPS D 4 ...
Страница 74: ...INDEX IX 4 ...