FDDI Management
!
CAUTION
The following table summarizes the FDDI connection rules:
Table
| A | B | S | M |
|
|
|
|
|
A | V, U | V | V, U | V, P |
|
|
|
|
|
B | V | V, U | V, U | V, P |
|
|
|
|
|
S | V, U | V, U | V | V |
|
|
|
|
|
M | V | V | V | X |
|
|
|
|
|
V
U
configuration), only the B connection is used.
Though technically legal under FDDI connection rules, undesirable connections will cause a twisted or wrapped ring.
Each SMT entity maintains its own connection policy; however, when two interfaces attempt to connect, their combined established connection policies dictate the connections that will be allowed. In an attempted connection between two nodes, the most lenient policy will determine whether the connection (as long as it is legal) can be made. For example, if two FDDI nodes attempt an
This is a
Viewing FDDI Information |