. . "See FIG. 1 for a description of the type of commands employed in this process and the types of information that may be sent to access nodes such as the digital equipment 250." . .