throbber
W-uw 3“me
`
`Application Note:
`LAN lnternet Helps
`Prudential Securities
`Compete
`
`To stay competitive, companies oi all types and sizes
`are finding it necessary to integrate diverse operations
`to achieve targeted levels of efficiency and economy.
`
`By Nathan J. Muller
`
`0 stay competitive, companies of all
`types and sizes are finding it necessary
`to integrate diverse operations to achieve
`targeted levels of efficiency and economy.
`More important than dollars saved on equipment
`is the increased productivity of employees, which
`can improve customer service. However, such
`integration projects are not easy to implement
`because of the mix of products that must be tied
`into the enterprise network.
`This was the situation recently encountered by
`Prudential Securities, 3 fully owned subsidiary
`of the Prudential Insurance Company, which
`provides brokerage services from offices world-
`wide. The company devised a plan to upgrade
`its network that included the move from SNA-
`
`More important than dollars saved on
`equipment is the increased
`productivity of employees, which can
`improve customer service.
`
`to achieve greater
`to LAN-based networks
`efficiencies and economies in service delivery.
`The resulting network would have to serve
`multiple departments, including real estate, tax,
`ordering, unit trust, information systems develop-
`ment, futures trading, personal financial manage—
`ment, investment banking, and retail sales.
`
`Nathan Muller is an independent consultant in Oxford, Con-
`necticut. He specializes m advanced technology marketing and
`education.
`
`Until recently, Prudential Securities relied upon
`the traditional SNA architecture. This entailed
`
`The Move trom SNA
`
`a».
`
`lNTERNATlONAL JOURNAL OF NETWORK MANAGEMENT 95
`
`Page 1 of 8
`
`FIS Exhibit 1028
`
`

`

`.) Wfi‘hm..uigw;hMWWl—“§¢i
`
`
`
`the use of low-speed analogue lines/modems
`in a polled multi—drop arrangement. Non-SNA
`communications protocols required the use of
`separate networks, while the multiplicity of
`communications protocols and facilities compli-
`cated network management and drove up
`operating costs.
`One byproduct of network consolidation
`activity is the diversity of protocols that can
`be accommodated on the enterprise network.
`Moving from SNA-
`to LAN-based networks
`would allow Prudential Securities to integrate
`a variety of PCs and accommodate different
`protocols, such as Novell’s lPX, IBM's SNA/3270,
`Digital Equipment Corp.'s DECnet and LAT,
`and TCP/Il", among others. The integration of
`different computers and protocols would also give
`Prudential Securities the networking flexibility
`needed to meet
`the current and emerging
`demands of customers.
`
`increasingly differentiating
`With customers
`brokers on the basis of the speed and accuracy
`of transaction processing, it was deemed impera-
`tive by Prudential Securities that its network be
`up to date and optimized for efficiency and cost
`savings. To achieve this level of integration,
`Prudential evaluated the products of many inter-
`networking vendors, including those of IBM. At
`the time, Prudential found that IBM’s source-
`
`nel, but rather offloads them so they can focus
`on strategic considerations instead of being mired
`down in the details of the protocols, such as
`addressing and routing. Once plugged in, about
`all the ILANs need is some fine tuning.
`
`The Resultlng Network
`
`Over
`
`three hundred offices worldwide are
`
`connected through modems to the distributed
`network at the Prudential Securities headquarters
`location in Manhattan. There, a star network
`
`links five home-office buildings (Figure 1). Each
`building has its own LANs, which are intercon-
`nected via lLANs over different media at a
`minimum T-l
`rate of 1.544 Mb/s. There are
`microwave links between the Cold Street and
`
`Seaport hubs, which operate at the Ethernet rate
`of 10 Mb/s and the T-3 rate of 45 Mb/s.
`
`The T—3 facilities support dual 16 Mb/s Token-
`Ring LANs and other data like 3270 terminal
`traffic and voice between the Gold Street and
`
`Seaport hubs. Gateways are used for protocol
`translation of Novell's lPX and IBM’s NetBlOS,
`among others, between the Token Rings and the
`SNA host.
`
`routing bridges were unable to support non-
`lBM protocols and that they presented potential
`security problems. Since the IBM bridges used a
`PS/2 platform, the presence of a keyboard invited
`tampering. Even with the keyboard removed and
`a plug on the bare connector, it is a relatively
`simple matter for an intruder to remove the plug
`and reinstall a keyboard to gain access. Prudential
`also considered the bridge/routers offered by
`other vendors, but
`found that
`they did not
`support SNA in the company’s multiprotocol
`environment.
`
`Novell's lntemet Packet Exchange (lPX) com-
`munications protocol enables NetWare users to
`route messages from one node to another. Any
`application program that manages its own client-
`server or peer-to-peer communications on a
`Novell network can access IPX, but lPX does not
`guarantee delivery of messages. Introduced by
`IBM, NetBlOS is a commonly used transport
`protocol for PC local area networks, which is
`also implemented in Microsoft’s MS-Net and
`LAN Manager. Applications use NetBlOS for
`dient-server or peer-to-peer communications. In
`the datagram mode, the fastest method of message
`transfer, NetBlOS does not guarantee message
`(Marlboro, MA)
`CrossComm Corporation’s
`delivery; in the session mode, a connection is
`[LAN bridge was selected precisely because it
`established until broken and message delivery
`overcame these problems and for its ease of
`is guaranteed.
`installation, which
`is
`exemplified
`by
`the
`Prudential also had the need to pass infor-
`mation between Token Ring and Ethernet LANs.
`catchphrase
`’plug-and-play’. Specifically,
`the
`lLAN unit learns all device addressses upon
`This is effectively handled by the ILANs, since
`they are designed to facilitate interconnection of
`attachment to the LAN and automatically sets
`up the routes between LANs, irrespective of the
`the two LAN types by forwarding and converting
`communications protocols being used. This does
`frames at the media access control (MAC) layer
`(see the Appendix). This is no small task because
`not alleviate the need for skilled network person—
`
` "' ‘aua'
`
`m.>-W¢....._..z a.
`— ....r _
`
`96
`
`IUNE 1993
`
`Page 2 of 8
`
`

`

`"s.
`
`'
`
`--: th4xz4f‘2m9m
` .m-wvmmM W
`
`Seaport
`4 Mbps Token Hlng
`
`Financial Square
`4 Mbps Token Ring
`
`
`
`T1
`
`T1
`
`Separate Otftoo
`
`ILAN Bfidges
`
`
`
`130 John Street
`4 Mbps Token Fling
`
`Have 1. Prudential Securities corporate backbane network
`
`127 John Street
`4 Mbps Token Ring
`
`there are over 1000 connections on Token Ring
`and Ethernet LANs at Prudential Securities.
`
`their protocol
`have been used primarily for
`conversion capabilities was not justified.
`Although some routers also offer this capability,
`Although the [LAN provides the option of
`connecting older SNA equipment to the Token
`they do so at a premium price (Table 1). Since
`Ring by means of an SDLC pass-through capa-
`Prudential did not need the routing capability“
`bility, Prudential had already upgraded this
`spending up to $75,000 for devices that would
`35-: a; ”-mmv Nada _-m-.4 x9.
`4—!va
`:wmrmywa in” .m J 3::
`... Mm»...
`'m.1~< x w. ~mfi: _,.~- :3.
`
`INTERNATIONAL IOURNAL OF NETWORK MANAGEMENT 97
`
`Page 3 of 8
`
`

`

`
`
`
`
`
`
`Router applications
`Bridge applications
`
`(Cost: 36000—30900] (Cost: up to $75,000]
`
`
`
`
`
`
`
`
`
`Accommodate several data
`
`
`
`
`
`
`
`links and can exploit complex
`
`
`
`
`
`mesh topologies in cases of
`
`
`
`
`link failure and congestion.
`
`
`
`Support multiple network and
`
`
`
`
`
`router layer protocols at the
`some time.
`
`
`Offer advanced
`
`
`administration and control
`
`
`
`services based on network
`
`
`
`
`and subnetwork addresses.
`
`
`
`
`
`
`
`
`
`
`
`Best for point-to-point, simple
`
`
`
`
`mesh or star topologies.
`
`
`
`Easier to install and maintain
`
`
`
`
`than routers.
`
`
`
`
`
`
`
`Operate independently of
`
`
`higher-level protocols.
`
`
`
`
`
`Offer a flexible method for
`
`
`
`
`
`
`
`
`
`filtering traffic according to
`source-destination addresses.
`
`
`
`
`protocol type, and
`
`application.
`
`
`
`
`
`
`
`Table 1. Bridge and router applications
`
`
`
`
`
`
`
`
`
`
`
`
`tems. The [MS resides on a single PC. From the
`
`
`
`
`
`
`
`IMS screen, any ILAN can be remotely configured,
`
`
`
`
`
`network performance statistics {Figure 2) and
`
`
`
`
`
`real-time alarms gathered, and topology map
`
`
`
`
`
`
`
`displayed. Table 2 gives descriptions of the fields
`
`
`
`
`
`
`shown in Figure 2. Moreover,
`the enterprise
`
`
`
`
`
`network can be troubleshooted quickly using
`
`
`
`
`CrossCornrn's Exper’I‘est, a valuable diagnostic
`
`
`
`
`
`tool which allows a segment-by-segment con-
`
`
`
`
`
`
`
`
`nectivity test for determining if a problem is in
`
`
`
`
`
`the network or applications software.
`
`
`
`
`
`
`
`For example, a remote ILAN can be instructed
`
`
`
`
`
`
`to test
`the connection integrity between itself
`
`
`
`
`
`
`
`and a questionable server. Then the [LAN can
`the connection between the IMS and the
`test
`
`
`
`
`
`
`
`
`
`
`
`
`
`remote ILAN, completing the network test. With
`
`
`
`
`
`
`
`ExperTest, any segment of the network can be
`
`
`
`
`
`
`tested without
`the need for extra equipment
`
`
`
`
`
`and without dispatching technicians to remote
`locations.
`
`IMS allows Prudential Securities to achieve its
`
`
`
`
`
`
`
`
`
`
`
`goals of greater network uptime, configuration
`
`
`
`
`
`flexibility and economies in equipment and
`
`
`
`
`personnel. Specifically, Prudential can accommo-
`
`
`
`
`date incremental growth, mitigate congestion
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`equipment for LAN interconnection. If the com-
`
`
`
`
`
`
`pany chooses to implement this technology in
`
`
`
`
`
`
`the future, additional cost savings will result
`from the choice of CrossCornm as the LAN
`
`
`
`
`
`
`
`interconnect vendor.
`
`
`
`
`
`
`
`Disaster recovery is implemented in association
`
`
`
`
`
`
`
`with CornDisco. Every night, all data from Pru-
`dential’s home-office locations is sent to 3 Com-
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Disco backup facility in New Jersey via a 56 kbl’s
`
`
`
`
`
`
`
`link from its Financial Square location (refer
`
`
`
`
`
`
`
`
`
`again to Figure 1}. Within 10 minutes of a
`
`
`
`
`
`
`
`
`computer failure on the internet,
`lost data can
`
`
`
`
`
`
`be retrieved from the backup site.
`
`
`
`
`Network Management
`
`
`
`
`
`
`
`With CrossComm’s network management sys—
`
`
`
`
`
`
`tem, the Internetwork Management System (IMS),
`
`
`
`
`
`
`
`Prudential Securities has the ability to isolate
`
`
`
`
`
`across
`the distributed computing
`problems
`environment. Prudential finds that the IMS does
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`job of
`troubleshooting in such an
`a better
`
`
`
`
`environment than host-based management sys-
`
`98
`
`
`iUNE I993
`
`
`
`
`Page 4 of 8
`
`Page 4 of 8
`
`

`

`also eased Prudential’s migration from depart-
`ment level, to facility, to enterprise networking.
`Other solutions such as traditional
`routers
`
`are not only more expensive, but offer no
`performance advantages in the star architecture
`employed by Prudential Securities. In the final
`analysis, Prudential found that the ILANs pro-
`vided the better price—performance ratio and
`offered the best hedge against disaster.
`
`convert frames between Ethernet and
`
`Using the MAC layer to forward and
`Token Ring LANs is one of the latest
`capabilities to be added to bridges,
`including CrossComm’s ILAN.
`
`Appendix: More About MAC-
`Iayer Frame Conversion
`
`Using the MAC layer to forward and convert
`frames between Ethernet and Token Ring LANs
`is one of the latest capabilities to be added to
`bridges, including CrossComm’s ILAN. This type
`of bridge performs two tasks that distinguish
`them from other bridges. They perform the
`routine functions of filtering and forwarding
`packets: determining whether
`a packet
`is
`addressed to a point inside the LAN and retaining
`it, or passing it through the bridge to an external
`LAN.
`
`In addition, Ethemet-to-Token Ring bridges
`convert packets between the two formats,
`a
`process known as
`frame conversion. These
`bridges perform frame conversion while main-
`taining destination information. In other words,
`the destination information must be readable in
`
`Ethernet for Token Ring packets, and vice versa.
`This process is aided by IEEE standards, which
`ensure that the frames used in both LANs contain
`
`essentially the same information despite the
`differences in frame formats.
`
`An Ethernet frame contains a preamble and a
`start frame delimiter (Figure 3). Next comes the
`destination address,
`followed by the source
`address. This is followed by the length field and
`the user’s data, which cannot exceed 1500 bytes.
`
`INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT 99
`
`Network Statistics (2i on "Finance“
`
`0 days, 0:25:48
`421
`511
`378
`381
`
`3)
`
`Age of Statistics
`Rcvd Packets
`thd Packets
`Multicast Packets
`Forwarded Packets
`Xmit Congest (no mom)
`Src Routea Packets
`Pkts Filtered (normal)
`Kept Ott Fitter
`Kept On Filter
`Wrong Packet Type
`Src Route Packets Frlered
`All Route Brddst Packets
`Singe Route Brunt Packets
`Unknown Destinations
`RIF Error
`Hop Court Exceeded
`Age at Sp. Tree State
`Sp. Tree State Changes
`
`OOOOOOOOOOO‘OO
`
`IMS network performance statistics When Network
`Figure 2.
`Statistics is selected from the network menu the statistics
`window shown above is opened. While this window is
`opened, the operator can log network statistics to a file
`that can be imported to a spreadsheet or graphics
`program for further manipulation and/or display. There are
`four network menus, one for each possible network
`connection. (Source: CrossComm Corp.)
`
`
`
`IMS allows Prudential Securities
`to achieve its goals of greater
`network uptime, configuration flexibility
`and economies in equipment and
`personnel.
`
`
`on the network, and protect against potential
`disasters.
`
`The Bottom Line
`
`The migration from SNA-based network to
`LANs permits multiple protocols to be handled
`on the same facility, allowing devices
`from
`different manufacturers to be networked. Not
`
`only have CrossComm’s ILANs provided a rela-
`tively inexpensive protocol-independent way of
`interconnecting LANs at high speed, they have
`
`Page 5 of 8
`
`
`
`

`

`_.m._.- w .: "v5.9 mass..-
`
`v
`
`.
`
`..
`
`_
`
`_-_-» _._..-- «9‘ was»?
`
`..M5;.\x<s.s--
`
`-\
`
`-.r_-
`
`Am‘m
`
`
`Field
`
`
`
`Description
`
`
`
`
`Age of Statistics
`
`Rcvd Packets
`
`
`thd Packets
`
`
`Multicast Packets
`
`
`
`Forwarded Packets
`
`
`
`
`
`
`Xmit Congest [no mem]
`
`
`
`Src Routed Packets
`
`
`
`
`
`
`
`Pkts Filtered [normal]
`
`
`
`
`Kept Off Filter
`
`
`
`
`Kept On Filter
`
`
`
`
`Wrong Packet Type
`
`Src Route Packets Filtered
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Elapsed time since traffic and error
`statistics were cleared for the
`
`
`
`
`
`selected network.
`
`
`
`
`
`
`
`Total number of packets received.
`
`
`
`
`
`Total number of packets transmitted.
`
`
`
`
`
`Total number of multicast (including
`
`
`
`broadcast] packets received.
`
`
`
`
`Total number of packets fonvarded
`to another network.
`
`
`
`
`
`
`
`
`
`Number of packets dropped by [all
`
`
`
`
`
`
`lines on} this network because the
`
`
`
`
`network capacity was inadequate to
`handle the traffic.
`
`
`
`
`
`
`
`
`Number of source routing packets
`received on this network. This number
`
`
`
`
`
`
`
`
`
`
`
`does not inciude packets sent while
`
`
`
`
`
`the bridge is operating in transparent
`mode; therefore. if
`it does not
`
`
`
`
`
`
`
`
`
`
`change when the operator expects
`
`
`
`
`to see source-routing traffic,
`
`
`
`transparent bridging must be
`checked.
`
`
`
`
`
`
`
`Of the Recvd Packets [above]. the
`total number that were filtered
`
`
`
`
`
`
`normally.
`
`
`
`
`
`
`Of the Recvd Packets [above], the
`
`
`
`
`
`
`
`total number filtered by a Kept Off
`Filter.
`
`
`
`
`
`
`
`Of the Recvd Packets [above], the
`
`
`
`
`
`
`
`total number filtered by a Kept On
`Filter.
`
`
`
`
`
`
`Total number of packets received by
`the ILAN node. but not forwarded
`
`
`
`
`
`
`
`
`
`
`because the necessary bridging
`
`
`
`
`
`option was disabled. This will
`
`
`
`
`
`
`
`happen, for example. if one type of
`
`
`
`
`
`driver [e.g. Ethemet] receives a
`
`
`
`
`
`packet formatted for another type
`
`
`
`
`
`
`[e.g. Token Ring], so cannot forward
`it.
`
`
`
`
`
`Number of discovery packets
`
`
`
`
`blocked because the general
`
`
`
`bridging parameters requested
`
`
`
`blocking of source-routed packets.
`Table 2.
`
`
`
`
`
`
`
`
`
`. w..s°w.-=n ::.
`
`.- ..._-
`
`-. -. -.
`
`'
`
`-
`
`:.J~s¢ szamF mnmjrmwwmfigu. mum?mumwe
`
`
`
`1'00
`
`
`IUNE 1993
`
`
`
`Page 6 of 8
`
`Page 6 of 8
`
`

`

`Number of ‘all route“ broadcast
`
`
`
`
`
`
`
`
`
`
`
`packets. {These packets are useful for
`
`
`
`
`
`
`discovering the fastest route to a
`
`target.)
`
`
`
`
`Number of packets blocked because
`
`
`
`
`the generai bridging parameters
`
`
`
`
`
`requested biocking packets for which
`the address is unknown, and Node 0
`
`
`
`
`
`
`
`
`
`
`
`
`
`was not available for routing these
`
`packets.
`
`
`
`Applicable for source-routing
`
`
`
`
`
`packets. Number of packets received
`
`
`
`
`
`
`
`with an error in the routing information
`
`
`
`
`
`
`
`[9.9. for a loop in the path].
`
`
`
`Applicable for source-routing
`
`
`
`
`discovery packets. Number of
`
`
`
`
`
`packets received for which the count
`
`
`
`
`
`of Route Designator [RD] fields
`
`
`
`
`
`exceeded [or equalled] the Hop
`Count Limit for this network.
`
`
`
`
`
`
`
`
`
`
`Elapsed time the network has been
`
`
`
`
`
`
`at the current spanning tree state.
`
`
`
`
`
`
`Number of times the spanning tree
`
`
`
`
`
`
`state has changed for this network.
`
`
`§_-_---.\_’:,§$.v.$<;::_o_ -ww.4 We
`
`
`
`
`
`
`
`
`
`All Route Brdcst Packets
`
`
`
`
`
`Unknown Destinations
`
`
`
`RIF Error
`
`
`
`
`
`
`Hop Count Exceeded
`
`
`
`
`
`
`Age at Sp. Tree State
`
`
`
`
`Sp. Tree State Changes
`
`
`
`
`
`
`
`
`
`
`Table 2. Continued [Source: Cross Comm Corp.)
`
`
`
`
`
`
`
`
`
`
`If
`the data unit is smaller than the protecol
`
`
`
`
`
`
`
`
`
`
`
`requires it to be, the data field is 'padded' by a
`
`
`
`
`
`
`
`
`number of extra bytes that are inserted to
`
`
`
`
`
`
`
`
`maintain the integrity of the frame. Finally, there
`
`
`
`
`
`is a frame check sequence.
`
`
`
`
`
`
`
`frame
`The Token Ring format has a start
`delimiter, then a frame with access control and
`
`
`
`
`
`
`
`frame control information in the header. This is
`
`
`
`
`
`
`
`
`
`
`
`
`
`followed by the destination address and source
`address. Next comes the user data, which is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`followed by a frame check sequence. Then there
`is an end frame delimiter and frame status
`
`
`
`
`
`
`
`information.
`
`When an Ethernet LAN is linked to a Token
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Ring LAN, the information in the frame is altered
`
`
`
`
`
`
`and the Ethernet frame’s frame check sequence
`(FCS), which acts as a check sum, must be
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`recalculated. An added camplication is that Ether—
`
`
`
`
`
`
`
`
`net and Token Ring LANs use different frame
`sizes. The maximum frame size is about 1500
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`bytes for 10 bes Ethernet, 4K bytes for the 4
`
`
`
`
`
`
`
`
`
`Mb/s Token Ring and as much as 17.8K bytes
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`for the 16 Mbr‘s Token Ring. Therefore, when a
`
`
`
`
`
`
`
`
`
`Token Ring packet is sent to an Ethernet LAN,
`
`
`
`
`
`
`
`
`
`the Token Ring packet must be broken into a
`
`
`
`
`
`
`
`
`
`number of smaller packets that can fit on an
`Ethernet LAN.
`
`
`
`
`
`
`
`
`
`There are several ways in which vendors avoid
`
`
`
`
`
`
`
`this problem. One technique is that of frame
`
`
`
`
`
`
`
`size negotiation, which is used on the Token
`
`
`
`
`
`
`
`Ring side of a bridge. Whenever the bridge
`
`
`
`
`
`
`
`determines that a packet must pass from the
`
`
`
`
`
`
`
`
`
`Token Ring side to the Ethernet side it sends a
`
`
`
`
`
`
`
`packet back to the sending Token Ring device,
`
`
`
`
`
`
`
`
`requesting it to modify the frame size in conform-
`ance with the Ethernet standard.
`
`
`
`
`
`
`
`
`
`
`Upon completion of packet fragmentation there
`
`
`
`
`
`
`is the problem of maintaining destination address
`
`
`
`
`
`
`information across the bridge. This is because
`
`
`
`
`
`
`there are separate standards for bridging proto-
`
`
`
`
`
`
`cols. Specifically,
`there is the Spanning Tree
`
`
`
`
`
`
`
`Protocol on the Ethernet side and source routing
`
`
`
`
`
`on the Token Ring side.
`
`
`
`
`
`
`
`Going from Token Ring to Ethernet can be
`new;
`x“é'-r£"'
`uw‘.;ssc2='¢:;5::,¢x,:;:.
`_'5:-.'.‘: Q":
`.yg'i'unm:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`iNTERNATIONAL JOURNAL OF NETWORK MANAGEMENT 101
`
`
`
`
`
`
`
`Page 7 of 8
`
`Page 7 of 8
`
`

`

`
`
`mm:wdmmmMrm-m M—rgmwmmiwr-wamumwmmw - n “new mewmr raw.
`
`Header
`
`Addressing
`
`Data Field
`
`Frame Check
`Sequence
`
`
`
`IEEE 802.3 Elhemet Frame
`
`”a Data
`
`lEEE 802.5 Token Ring Frame
`
`Legend
`
`DA = Destination Address
`SA = Source Address
`FC = Frame Control
`CRC = Cyclic Redundancy Check
`ED = Ending Delimiter
`FS = Frame Status
`SD = Starting Delimiter
`AC = Access Control
`
`nged A comparison or Erherner and Token Ring frame structures.
`
`handled by setting up a pseudo-ring number for
`the Ethernet side of the bridge. This allows the
`Token Ring side of the bridge to talk to the
`Ethernet side. When the packet crosses
`the
`bridge, the source routing information is stripped
`off and replaced with standard transparent bridge
`information.
`
`Going from the Ethernet side of a bridge to
`the Token Ring side is more difficult. This is
`because the Ethernet side of the bridge has to
`maintain a table of addresses. To build this table,
`
`the bridge sends out exploratory packets to learn
`the location of devices on the network. With
`
`source routing on Token Ring networks, the end
`
`stations only need to learn a route, since the
`bridge does not maintain a database of addresses.
`But in converting an Ethernet packet to a Token
`Ring packet, the Token Ring side must maintain
`an address database and learn all the addresses
`on the network.
`I
`
`If you wish to order reprints for this or any
`other articles in the International journal of
`Network Management, please see the Special
`
`Reprint instructions inside the front cover.
`
`1055—7148/93/02m95-0850900
`© 1993 by John Wiley 8: Sons, Ltd
`
`M-
`
`.
`
`.
`
`.
`
`the-‘ e
`
`,<.
`
`.
`
`.amm-¢-
`
`,
`
`w.-- ,
`
`e
`
`,. 7 ,
`
`.g~1«v.,~mm=mr.m/mu&.< ~14
`
`102
`
`IUNE 1993
`
`Page 8 of 8
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket