/ "*$3(9 3(.- -# 6(#$ 1$ -$36.1* #$+ 82 3. "".4-3 %.1 ++ .% 3'$ ;,2 #$+ 8 !4#&$3 3 %.++.62 3'$- 3' 3 %.1 $%%$"3(5$ 31 -2,(22(.- .% 1$ +;3(,$ ,4+3(,$#( 3'$ 6.1*&1.4/ #$+ 8 ,423 !$ ,(-(,(9$# . "'($5$ .41 3 1&$32 %.1 6(#$ 1$ -# +." + 31 -2,(22(.-2 6$ 2$3 6.1*; &1.4/ #$+ 8 3 1&$3 .% !.43 ,2 - , -8 " 2$2 3'$ ! 2(" ./$1 3(.- .% 3'$ ;-8 /1.3.".+ *$$/2 / "*$3 #$+ 8 "1.22 3'$ !.4-#$# !$+.6 ,2 2 -$36.1* 2(9$ -# ".,/+$7(38 (-"1$ 2$ 3'$ '(&' /1(.1(38 +$5$+ " - !$ 42$# %.1 ,4+3(,$#( 31 %%(" /.22(!+8 (".-)4-"3(.- 6(3' 1$2.41"$ ++." 3(.- 2"'$,$2 2 #$2"1(!$# .- / &$ Bandwidth Guarantees //+(" 3(.- 5$-#.12 -$$# 3. !$ ".-%(; #$-3 3' 3 3'$(1 //+(" 3(.-2 6(++ 6.1* -. , 33$1 6' 3 .3'$1 31 %%(" (2 .- 3'$ -$36.1* '$ -$$# %.1 &4 1 -3$$# '(&';!(3; 1 3$ 2$15("$2 3. 2(-&+$ -.#$ .1 %$6 -.#$2 $73$-#2 "1.22 ++ $+$,$-32 6(3'(- -$36.1* ".,/+$7 %1., 3'$ 3. !1(#&$2 -# 1.43$12 -# 6(#$ 1$ -$36.1*2 -$ 2(,/+$ ,$3'.# .% ".--$"3(-& 2 3. (2 3'1.4&' 3'$ 42$ .% #( +;4/ 1$,.3$ !1(#&$ 2$$ :$,.3$ 1(#&$ 7 ,/+$ 3 1(&'3 To illustrate the operation of a dial-up remote bridge, Fig. 1 shows two sites, each with a backbone FDDI network linking 100VG-AnyLAN hubs. Users connected to end nodes 1 and 2 want to communicate by video and audio between the two sites. The backbone networks on each site are connected to the wide area network (WAN) through dial-up remote bridges specifically designed to carry multimedia traffic. We assume that site A and site B can also communicate through existing routes, such as some kind of corporate internet. When the call between node 1 and node 2 is initialized, an isochronous link with the appropriate bit rate is set up between the two dial-up bridges. Bridge A is told the 48-bit MAC address of node 2. Any subsequent packets that appear on the backbone FDDI bearing that destination address will be forwarded across the WAN. Bridge B puts them on the backbone FDDI at site B, from which they reach node 2. Any normal-priority data packets destined for node 2 will not be picked up by bridge A because they will carry the destination address of the router connecting site A to the corporate internet, not that of node 2. Site A Site B (3'(- ;-8 " - &4 1 -3$$ ! -#6(#3' 3. ,4+3(,$#( //+(" 3(.-2 $(3'$1 !8 $7/+.(3(-& 3'$ ! 2(" ./$1 ; 3(.- .% 3'$ /1.3.".+ .1 (% ,.1$ %+$7(!(+(38 (2 1$04(1$# 3'1.4&' 3'$ 42$ .% 1$2.41"$ ++." 3(.- 2"'$,$2 2 #$2"1(!$# ./ &$ Backbone FDDI Interarrival-Time Jitter. "*$3 26(3"'(-& ' 2 !$$- /43 %.16 1# 2 - $%%$"3(5$ 3$"'-.+.&8 %.1 (-3$&1 3(-& 231$ ,;38/$ # 3 24"' 2 5(#$. -# 4#(. 6(3' ".-5$-3(.- + ".,/43$1 # 3 "*$3 26(3"'(-& " - ++.6 %+$7(!+$ ++." 3(.- .% ! -#6(#3' 3. (-#(5(#4 + " ++2 (-3$1% "$2 3' 3 1$ 6$++;, 3"'$# 3. ".,; /43$1 2823$,2 -# $%%("($-3 ,4+3(/+$7(-& .% 2.41"$2 100VG Hub .6$5$1 / "*$3 26(3"'(-& (-31.#4"$2 /1.!+$, "*$32 6(++ !$ 24!)$"3 3. 5 1( 3(.-2 (- 11(5 + 3(,$ *-.6- 2 (-3$1 1; 1(5 +;3(,$ )(33$1 .6 3'$- " - 1$".-2314"3(.- .% 3'$ ".-3(-; 4.42 4#(. .1 5(#$. 2(&- + %1., 2$3 .% / "*$32 2$-3 .5$1 -$36.1* !$ $-241$# Wide Area Network Dial-Up Remote Bridge A Backbone FDDI Dial-Up Remote Bridge B 100VG Hub End-Node 1 End-Node 2 Fig. 1. Remote sites connected by dial-up remote bridges. (33$1 (2 /1.#4"$# 6'$- 2.41"$ 31 -2,(32 # 3 / "*$32 3 1$&4+ 1 (-3$15 +2 !43 $ "' / "*$3 (2 24!)$"3 3. #(%%$1$-3 #$+ 8 !$%.1$ (3 11(5$2 $+ 8 (2 " 42$# / 13+8 !8 %(7$# $+$; ,$-32 24"' 2 3'$ /1./ & 3(.- 3(,$ -# / "*$3(9 3(.- #$; + 82 -# / 13+8 !8 5 1( !+$ #$+ 82 %1., 04$4(-& -# 6 (3(-& %.1 ""$22 3. 3'$ -$36.1* 3 (2 3'$2$ + 23 36. 3' 3 1$24+3 ()(33$1 # 3 " - 3'$- !$ 1$31($5$# %1., 3'$ !4%%$1 (- 23$ #8 231$ , %.1 #$".#(-& -# #(2/+ 8 (& 2'.62 '.6 3'(2 (2 "'($5$# 6'$- - 11(5 + 6(-#.6 " - !$ #$3$1,(-$# 1.5(#$# 3' 3 -8 )(33$1 (2 *$/3 !$+.6 , 7(,4, 5 +4$ (3 (2 /.22(!+$ 3. " +"4+ 3$ !4%%$1 2(9$ 3 3'$ 1$"$(5$1 3' 3 (2 24%%(; "($-3 3. 2,..3' .43 -8 5 1( 3(.- (- (-3$1 11(5 + 3(,$2 '$ $" 42$ (-3$1% "$ 23 -# 1#2 -# 3$"'-.+.&8 1$ 23(++ !$(-& #$5$+./$# %.1 3'$ 6'.+$ 6(#$ 1$ -$36.1* 2314"341$ (3 (2 '$ 11(5 + 6(-#.6 ,423 !$ 2, ++ .1 3'$ !4%%$1(-& #$+ 8 6(++ " 42$ 3'$ 3.3 + $-#;3.;$-# #$+ 8 .% 3'$ 31 -2,(33$# # 3 3. $7"$$# 3'$ ,2 3 1&$3 4&423 $6+$33; "* 1# .41- +