Chapter 18: Ethernet Protection Switching Ring Snooping
194 Section III: Snooping Protocols