FDDI Applications

The following table summarizes the FDDI connection rules:

!

CAUTION

Table 3-1. FDDI Connection Rules

 

A

B

S

M

 

 

 

 

 

A

V, U

V

V, U

V, P

 

 

 

 

 

B

V

V, U

V, U

V, P

 

 

 

 

 

S

V, U

V, U

V

V

 

 

 

 

 

M

V

V

V

X

 

 

 

 

 

V – valid connection X – illegal connection

U – undesirable (but legal) connection

P – valid, but when both A and B are connected to M ports (a dual-homing configuration), only the B connection is used.

Though technically legal under FDDI connection rules, undesirable connections will cause a twisted or wrapped ring.

The Connection Policy window, Figure 3-3, lists potential connection types in a ÒReject X-YÓ format, where X represents a port on the FDDI BRIM, and Y represents the attaching node. A check in the checkbox next to a Connection Policy indicates that it is an illegal connection.

Figure 3-3. The Connection Policy Window

3-6

Connection Policy Window

Page 128
Image 128
Cabletron Systems 2.2 manual Connection Policy Window