- 17 -
You must enable the Turbo Ring function first before using the
DIP switch to activate the Master and Coupler functions.
If you do not enable any of the EDS-600 switches to be the Ring
Master, the Turbo Ring protocol will automatically choose the
EDS
-600 with the smallest MAC address range to be the Ring
Master. If you accidentally enable more than one EDS
-
g Master, these EDS-600 switches will auto-negotiate to
determine which one will be the Ring Master.
Bypass Relay Function (For CM-600-4TX-BP)
The CM-600-4TX-BP is equipped with a bypass relay function that
includes 2 pairs: port 1 and port 2 are one pair, port 3 and port 4 are the
other pair. When the switch is operating normally, the bypass module
works in the same way as the other ports. That is, frame ingressions are
processed and then forwarded. In the event the switch stops working due
to a power failure, the bypass relay function will be triggered to ensure
non-stop data communication.
The figure below illustrates the bypass relay function. For example, if
Switch B loses power, then the pair will be bypassed through the relay
circuit and the transmission line from Switch A to B and the transmission
line from Switch B to C will interconnect automatically and immediately.
Therefore, by implementing this function, there will be no stoppage. The
bypass relay function helps the network recover from single-node failures
in a linear topology.
Since the maximum length of a category 5 twisted-pair cable is 100
meters, the cable length must be considered when designing a network
that utilizes this function. For example, the total length of the cables from
Switch A to C, or B to C must be no more than 100 meters. This way, if the
two adjacent nodes (Switch B or C for example) encounter a power failure,
there will be no stoppage, provided that the total length of the cables
A-to-C, and B-to-D does not exceed 100 meters.
The bypass relay function works best for networks with linear topologies.
The bypass relay function is not recommended to be used in ring
topologies because network loops may occur when redundancy protocols
such as RSTP or TurboRing™ are applied.