station attached to that port. The transmission of the jammed packet will last the same length of time as the original data packet. Stations that receive a jammed packet will discard it because the CRC (Cyclic Redundancy Check) field of the packet is incorrect.

To perform intrusion control, the E-SEC card must perform the following:

1.Determine the source address of the station transmitting the data. This means that the transmitting station must be allowed to transmit the following portions of the Ethernet packet:

Preamble (56 bits)

Starting delimiter (8 bits)

Destination address (48 bits)

Source address (48 bits)

2.Once the source address of the transmitting station is determined, the E-SEC card will search the network security address table to see if the station is authorized to transmit on that port. The time to search the network security address table is equivalent to 11 bit-times.

3.The E-SEC card will send the security message (pass or jam) to all the 8260 ports which are attached to that segment. It takes 16 bit-times for the E-SEC card to send this message.

4.The media module will process the security message and start jamming or passing the packet. This process takes 8 bit-times.

As can be seen, from the time that the source address of the frame is seen by the E-SEC card, it takes 35 bit-times to start jamming or passing the packets. This means that the transmitting station will be able to send 35 bits of the packet from the end of source address to the stations before the jamming process can stop an unauthorized station. This 35 bits includes 16 bits of type/length field and 19 bits of user data.

7.11.1.2 Eavesdropping Protection

To perform eavesdropping protection, the E-SEC card must perform the following:

1.Determine the destination address of the station transmitting the data. This means that the transmitting station must be allowed to transmit the following portions of the Ethernet packet:

Preamble (56 bits)

Starting delimiter (8 bits)

Destination address (48 bits)

2.As soon as the E-SEC card receives the destination address within the packet, it searches the network security address table to determine the port to which the intended recipient is connected. This process takes 8 bit-times.

3.The E-SEC module transmits security messages to media modules attached to that segment protected by the E-SEC card, to instruct them to jam all the ports except the port to which the destination station is attached. This process takes 16 bit-times.

4.The media modules will process the security message and jam or pass the packet. This process takes 8 bit-times.

Chapter 7. 8260 Ethernet Modules 123

Page 145
Image 145
IBM 8260 manual Eavesdropping Protection

8260 specifications

The IBM 8260 is a significant entry in the realm of enterprise servers, recognized for its performance, scalability, and robust features designed to cater to demanding business environments. It primarily serves as a high-capacity server for large organizations, capable of handling extensive workloads and complex applications without compromising speed or efficiency.

One of the standout features of the IBM 8260 is its powerful processing capabilities. It typically comes equipped with multiple processor units based on the IBM POWER architecture, which is renowned for its high-performance computing. This architecture allows the server to execute numerous simultaneous tasks, making it ideal for environments that require multitasking and high throughput.

Memory capacity is another key characteristic of the IBM 8260. Depending on the specific configuration, it can support substantial amounts of RAM, ensuring that applications can run effectively without the bottlenecks often associated with data-intensive tasks. This is crucial for enterprises that rely on real-time data analytics, large database management, and resource-heavy applications.

In terms of storage, the IBM 8260 offers flexible options. It supports a variety of storage solutions, including solid-state drives (SSDs) and traditional hard drives, catering to different performance and capacity needs. This scalability in storage helps organizations manage their data effectively while ensuring quick access and retrieval times.

Connectivity is also a prominent feature of the IBM 8260. The server includes advanced networking capabilities, supporting various protocols and technologies that facilitate fast data transfer and communication between devices. This enhances overall network performance, essential for businesses that depend on cloud computing and distributed computing environments.

Additionally, the IBM 8260 is designed with a focus on reliability and availability. It incorporates redundant components, such as power supplies and cooling systems, minimizing the risk of downtime. This is critically important for enterprises that require continuous availability of services.

The server’s management features are also noteworthy. IBM provides a suite of management tools that allow IT administrators to monitor performance, configure hardware settings, and troubleshoot issues seamlessly. This ease of management is bolstered by automation capabilities, enabling organizations to enhance operational efficiency.

In conclusion, the IBM 8260 stands out in the competitive server landscape due to its high processing power, extensive memory and storage options, advanced connectivity, reliability features, and robust management tools. Such attributes make it a viable choice for organizations seeking to enhance their IT infrastructure and streamline their operations effectively.