Specifications

Management Guide CLI
TigerAccess™ EE
SMC7824M/VSW 291
Fig. 8.29 shows an example of ERP operation when a link failure occurs.
3. Nodes detecting Link Failure
send Link Down message
Node A
Node B
2. Link Failure
Node C RM Node
Primary
Secondary
1. Secondary port of RM node is
blocking in Normal state
Unused Link for Traffic
Fig. 8.29 ERP Operation in case of Linnk Failure
After RM node receives Link Down messages from other nodes, it unblocks its secondary
port for traffic transmission with Node B directly connected to the secondary port. RM
node sends RM Link Down messages and informs the other nodes that its secondary port
begins forwarding the traffic.
Fig. 8.30 shows an example of a ring protection after a link failure.
Node A
Node B
Node C
RM Node
P
S
Sends RM Link Down Ack to both
ports and unblocks secondary port.
RM Link Down
RM Link Down
Fig. 8.30 Ring Protection