FDDI Applications

T-Req. (Requested Target Token Rotation Time)

The token rotation time bid made by the selected SMT entity during ring initialization. Each station detecting that the ring must be initialized begins a claim token process and issues a stream of Claim Frames, which negotiate the value assigned to the Target Token Rotation Time (TTRT). The information field of these frames contains the issuing station’s bid for the value of TTRT. Each claiming station inspects incoming Claim frames (from other issuing stations) and either continues its own bid (and removes the competing Claim Frame from the ring) or defers (halts transmission of its own bid and repeats the competing bid) according to the following hierarchy of arbitration:

A Claim Frame with the lowest TTRT bid has precedence.

If the values of TTRT are equal, the frame with the longest source address (48 vs. 16 bits) has precedence.

If both TTRT value and source address length are equal, the frame with the highest address has precedence.

The HSIM-F6 is shipped with a T-Req = 83 msec (earlier versions of firmware) or 6 msec (later firmware versions). T-Req is stored within the MIB in units of nanoseconds (one billionth of a second) rather than milliseconds (one thousandth of a second); your management application converts nanoseconds to milliseconds for display purposes. You can use any SNMP Set Request tool to edit the T-Req value; just remember that you must enter your value in nanoseconds, rather than milliseconds.

T-Neg. (Negotiated)

The winning time negotiated in the ring initialization sequence.

Concentrator M Ports

This field displays the number of Master (M) ports on the modular concentrator controlled by the HSIM-F6. A Master port is a port that provides a connection for Single Attachment Station (SAS) devices to the FDDI network.

Concentrator Non-M Ports

This field displays the number of non-Master ports (A, B, or S ports) on the modular HSIM-F6 concentrator.

Number of MACs

The number of Media Access Control entities present in the HSIM-F6, indicating the number of ring port pairs. For the HSIM-F6, this number will be 1.

MAC Path

Indicates which FDDI ring the HSIM-F6 MAC is attached to:

Primary 1 indicates that the Primary 1 FDDI ring is being used.

Secondary 1 indicates that the Secondary 1 FDDI ring is being used.

Primary 2 indicates that the Primary 2 FDDI ring is being used.

Concentrator Configuration

6-5

Page 157
Image 157
Enterasys Networks 2000 Req. Requested Target Token Rotation Time, Neg. Negotiated, Concentrator M Ports, Number of MACs

2000 specifications

Enterasys Networks, a key player in the networking space in 2000, was renowned for its innovative solutions that combined high-performance networking with robust security features. Founded with the vision of providing enterprise-level networking infrastructure, Enterasys positioned itself to cater to the growing demands of business networks during the dot-com boom.

One of the main features of Enterasys Networks was its focus on delivering secure, scalable networking solutions that could seamlessly integrate with existing enterprise systems. The company developed a range of products including switches, routers, and wireless solutions that were designed to optimize performance while ensuring security at every layer. Their core offerings provided businesses with the reliability required to handle increasing volumes of data traffic.

A standout technology of Enterasys was its identity and access management solutions. These technologies allowed organizations to control who could access network resources and under what conditions. This was particularly crucial in a time when cyber threats were on the rise, and businesses were becoming more aware of the need for strict network security protocols. The features included role-based access control and authentication measures, which were fundamental in safeguarding sensitive information.

Enterasys also introduced intelligent networking features, which enabled dynamic traffic management and prioritization. This technology helped organizations optimize their network performance by automatically adjusting to changing workload demands. Such capabilities were essential for businesses relying on bandwidth-intensive applications and services.

The company also embraced the rising trend of wireless networking, providing solutions that combined wired and wireless technologies for a unified experience. Enterasys Wireless LAN solutions were groundbreaking at the time, offering seamless connectivity and security to mobile devices, thereby enhancing productivity and flexibility within enterprise environments.

In addition to hardware, Enterasys developed network management software that simplified the administration of complex networks. This software enabled IT professionals to monitor performance, troubleshoot issues, and implement security policies efficiently.

Overall, Enterasys Networks in 2000 was characterized by its commitment to delivering secure, intelligent networking solutions that catered to the needs of modern enterprises. With its innovative technologies and features, Enterasys played a significant role in shaping the networking landscape, laying the groundwork for future advancements in network security and management.