From Introduction to Network Security Lectures at Xi'an Jaotong University -- Sept 1998. byRoman Markowski
There is a few implementations of Translational Bridging
Bits representing Token Ring functions that have no Ethernet corollary typically are thrown out by translational bridges ( priority, reservation, monitor bits)