NET/MASTER Management Services (MS) System Management Guide
Regulating Intersystem Message Flows
Supporting Remote Operations
9–34 105744 Tandem Computers Incorporated
The inclusion of this information is designed to protect the network from inadvertent
message loops. There is one configuration that can produce message loops. Figure 9-7
shows this configuration.
Figure 9-7. Undetected Loop Configuration
017
\NODEA
\NODED
\NODEC\NODEB
\NODEE
The configuration in Figure 9-7 results in a message flow along these steps:
1. From \NODEE to \NODED
2. From \NODED to \NODEA
3. From \NODEA to \NODEB
4. From \NODEB to \NODEC
5. From \NODEC to \NODED, where it begins to flow in a loop, beginning again
with Step 2 and proceeding to Step 5.