Shopping Cart

No products in the cart.

IEEE 802.1Q 2012

$196.67

IEEE Standard for Local and metropolitan area networks–Media Access Control (MAC) Bridges and Virtual Bridges

Published By Publication Date Number of Pages
IEEE 2012 1782
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

– Active. This standard specifies how the MAC Service is supported by Virtual Bridged Local Area Networks, the principles of operation of those networks, and the operation of VLAN-aware Bridges, including management, protocols, and algorithms. It Incorporates: IEEE Std 802.1Q-2011, IEEE Std 802.1Qbe-2011, IEEE Std 802.1Qbc-2011,IEEE Std 802.1Qbb-2011, IEEE Std 802.1Qaz-2011, IEEE Std 802.1Qbf-2011,IEEE Std 802.1Qbg-2012, IEEE Std 802.1aq-2012, and IEEE Std 802.1Q-2011/Cor 2-2012)

PDF Catalog

PDF Pages PDF Title
1 IEEE Std 802.1Q™, 2012 Edition
15 Contents
48 Figures
55 Tables
61 IMPORTANT NOTICE
1. Overview
62 1.1 Scope
1.2 Purpose
1.3 Introduction
68 1.4 VLAN aims and benefits
70 2. Normative references
74 3. Definitions
92 4. Abbreviations
97 5. Conformance
5.1 Requirements terminology
5.2 Conformant components and equipment
98 5.3 Protocol Implementation Conformance Statement (PICS)
5.4 VLAN-aware Bridge component requirements
105 5.5 C-VLAN component conformance
5.6 S-VLAN component conformance
106 5.7 I-component conformance
107 5.8 B-component conformance
108 5.9 VLAN Bridge conformance
5.10 Provider Bridge conformance
109 5.11 System requirements for Priority-based Flow Control
110 5.12 Backbone Edge Bridge conformance
5.13 VLAN-unaware Bridge component requirements
5.14 TPMR component conformance
111 5.15 TPMR conformance
112 5.16 T-component conformance
5.17 End station requirements for MMRP, MVRP, and MSRP
114 5.18 VLAN-aware end station requirements for Connectivity Fault Management
5.19 End station requirements—forwarding and queuing for time-sensitive streams
115 5.20 End station requirements for congestion notification
5.21 MAC-specific bridging methods
116 5.22 Edge Virtual Bridging (EVB) Bridge requirements
5.23 Edge Virtual Bridging (EVB) station requirements
119 6. Support of the MAC Service
120 6.1 Basic architectural concepts and terms
123 6.2 Provision of the MAC service
124 6.3 Support of the MAC service
125 6.4 Preservation of the MAC service
6.5 Quality of service maintenance
131 6.6 Internal Sublayer Service
135 6.7 Support of the Internal Sublayer Service by specific MAC procedures
141 6.8 Enhanced Internal Sublayer Service
143 6.9 Support of the EISS
148 6.10 Support of the ISS/EISS by Provider Instance Ports
152 6.11 Support of the EISS by Customer Backbone Ports
155 6.12 Protocol VLAN classification
158 6.13 Support of the ISS for attachment to a Provider Bridged Network
160 6.14 Support of the ISS within a system
161 6.15 Support of the ISS by additional technologies
6.16 Filtering services in Bridged Local Area Networks
164 6.17 EISS Multiplex Entity
165 6.18 Backbone Service Instance Multiplex Entity
169 6.19 TESI Multiplex Entity
170 6.20 Support of the ISS with signaled priority
171 6.21 Infrastructure Segment Multiplex Entity
173 7. Principles of network operation
7.1 Network overview
174 7.2 Use of VLANs
7.3 Active topology
175 7.4 VLAN topology
176 7.5 Locating end stations
7.6 Ingress, forwarding, and egress rules
178 8. Principles of bridge operation
8.1 Bridge operation
181 8.2 Bridge architecture
182 8.3 Model of operation
185 8.4 Active topologies, learning, and forwarding
186 8.5 Bridge Port Transmit and Receive
189 8.6 The Forwarding Process
200 8.7 The Learning Process
201 8.8 The Filtering Database
214 8.9 MST, SPB, and ESP configuration information
216 8.10 Spanning Tree Protocol Entity
217 8.11 MRP Entities
8.12 Bridge Management Entity
8.13 Addressing
228 9. Tagged frame format
9.1 Purpose of tagging
9.2 Representation and encoding of tag fields
229 9.3 Tag format
9.4 Tag Protocol Identifier (TPID) formats
9.5 Tag Protocol Identification
230 9.6 VLAN Tag Control Information
231 9.7 Backbone Service Instance Tag Control Information
233 10. Multiple Registration Protocol (MRP) and Multiple MAC Registration Protocol (MMRP)
10.1 MRP overview
236 10.2 MRP architecture
237 10.3 MRP Attribute Propagation (MAP)
239 10.4 Requirements to be met by MRP
10.5 Requirements for interoperability between MRP Participants
241 10.6 Protocol operation
245 10.7 Protocol specification
259 10.8 Structure and encoding of MRP Protocol Data Units
266 10.9 Multiple MAC Registration Protocol (MMRP)—Purpose
267 10.10 Model of operation
270 10.11 Default Group filtering behavior and MMRP propagation
271 10.12 Definition of the MMRP application
276 11. VLAN topology management
11.1 Static and dynamic VLAN configuration
277 11.2 Multiple VLAN Registration Protocol
285 12. Bridge management
12.1 Management functions
286 12.2 VLAN-aware bridge objects
287 12.3 Data types
288 12.4 Bridge Management Entity
293 12.5 MAC entities
12.6 Forwarding process
303 12.7 Filtering Database
308 12.8 Bridge Protocol Entity
315 12.9 MRP Entities
317 12.10 Bridge VLAN managed objects
329 12.11 MMRP entities
330 12.12 MST configuration entities
335 12.13 Provider Bridge management
342 12.14 CFM entities
359 12.15 Backbone Core Bridge management
12.16 Backbone Edge Bridge management
374 12.17 DDCFM entities
385 12.18 PBB-TE Protection Switching managed objects
388 12.19 TPMR managed objects
398 12.20 Management entities for forwarding and queueing for time-sensitive streams
399 12.21 Congestion notification managed objects
404 12.22 SRP entities
406 12.23 Priority-based Flow Control objects
407 12.24 1:1 PBB-TE Infrastructure Protection Switching (IPS) managed objects
411 12.25 Shortest Path Bridging managed objects
425 12.26 Edge Virtual Bridging management
438 12.27 Edge Control Protocol management
439 13. Spanning Tree Protocols
440 13.1 Protocol design requirements
441 13.2 Protocol support requirements
442 13.3 Protocol design goals
13.4 RSTP overview
448 13.5 MSTP overview
453 13.6 SPB overview
454 13.7 Compatibility and interoperability
455 13.8 MST Configuration Identifier
456 13.9 Spanning Tree Priority Vectors
458 13.10 CIST Priority Vector calculations
460 13.11 MST Priority Vector calculations
462 13.12 Port Role assignments
463 13.13 Stable connectivity
464 13.14 Communicating Spanning Tree information
465 13.15 Changing Spanning Tree information
466 13.16 Changing Port States with RSTP or MSTP
471 13.17 Changing Port States with SPB
473 13.18 Managing spanning tree topologies
475 13.19 Updating learned station location information
477 13.20 Managing reconfiguration
478 13.21 Partial and disputed connectivity
13.22 In-service upgrades
479 13.23 Fragile bridges
480 13.24 Spanning tree protocol state machines
482 13.25 State machine timers
484 13.26 Per bridge variables
486 13.27 Per port variables
497 13.28 State machine conditions and parameters
500 13.29 State machine procedures
511 13.30 The Port Timers state machine
512 13.31 Port Receive state machine
513 13.32 Port Protocol Migration state machine
13.33 Bridge Detection state machine
13.34 Port Transmit state machine
515 13.35 Port Information state machine
516 13.36 Port Role Selection state machine
13.37 Port Role Transitions state machine
520 13.38 Port State Transition state machine
522 13.39 Topology Change state machine
523 13.40 Layer 2 Gateway Port Receive state machine
13.41 Customer Edge Port Spanning Tree operation
525 13.42 Virtual Instance Port Spanning Tree operation
526 14. Encoding of Bridge Protocol Data Units (BPDUs)
14.1 BPDU Structure
528 14.2 Encoding of parameter types
530 14.3 Transmission of BPDUs
531 14.4 Encoding and decoding of STP Configuration, RST, MST, and SPT BPDUs
533 14.5 Validation of received BPDUs
534 14.6 Validation and interoperability
536 15. Support of the MAC Service by Provider Bridged Networks
15.1 Service transparency
537 15.2 Customer service interfaces
15.3 Port-based service interface
538 15.4 C-tagged service interface
539 15.5 S-tagged service interface
540 15.6 Remote customer service interfaces
543 15.7 Service instance segregation
15.8 Service instance selection and identification
544 15.9 Service priority selection
545 15.10 Service access protection
15.11 Connectivity Fault Management
15.12 Data-driven and data-dependent connectivity fault management (DDCFM)
546 16. Principles of Provider Bridged Network operation
16.1 Provider Bridged Network overview
547 16.2 Provider Bridged Network
550 16.3 Service instance connectivity
551 16.4 Service provider learning of customer end station addresses
16.5 Detection of connectivity loops through attached networks
552 16.6 Network management
553 17. Management Information Base (MIB)
17.1 Internet Standard Management Framework
17.2 Structure of the MIB
607 17.3 Relationship to other MIBs Relationship to other MIBs
618 17.4 Security considerations
632 17.5 Dynamic component and Port creation
645 17.6 MIB operations for service interface configuration
655 17.7 MIB modules
1110 18. Principles of Connectivity Fault Management operation
1111 18.1 Maintenance Domains and Domain Service Access Points
1113 18.2 Service instances and Maintenance Associations
1114 18.3 Maintenance Domain Levels
1118 19. Connectivity Fault Management Entity operation
19.1 Maintenance Points
19.2 Maintenance association End Point
1125 19.3 MIP Half Function
1128 19.4 Maintenance Point addressing
19.5 Linktrace Output Multiplexer
1129 19.6 Linktrace Responder
1131 20. Connectivity Fault Management protocols
1132 20.1 Continuity Check protocol
1135 20.2 Loopback protocol
1137 20.3 Linktrace protocol
1141 20.4 Connectivity Fault Management state machines
20.5 CFM state machine timers
1143 20.6 CFM procedures
1144 20.7 Maintenance Domain variable
20.8 Maintenance Association variables
20.9 MEP variables
1146 20.10 MEP Continuity Check Initiator variables
1147 20.11 MEP Continuity Check Initiator procedures
1148 20.12 MEP Continuity Check Initiator state machine
20.13 MHF Continuity Check Receiver variables
1149 20.14 MHF Continuity Check Receiver procedures
20.15 MHF Continuity Check Receiver state machine
1150 20.16 MEP Continuity Check Receiver variables
1152 20.17 MEP Continuity Check Receiver procedures
1153 20.18 MEP Continuity Check Receiver state machine
20.19 Remote MEP variables
1155 20.20 Remote MEP state machine
20.21 Remote MEP Error variables
1156 20.22 Remote MEP Error state machine
20.23 MEP Cross Connect variables
1157 20.24 MEP Cross Connect state machine
20.25 MEP Mismatch variables
1158 20.26 MEP Mismatch state machines
20.27 MP Loopback Responder variables
1160 20.28 MP Loopback Responder procedures
1161 20.29 MP Loopback Responder state machine
20.30 MEP Loopback Initiator variables
1162 20.31 MEP Loopback Initiator transmit procedures
1163 20.32 MEP Loopback Initiator transmit state machine
20.33 MEP Loopback Initiator receive procedures
1164 20.34 MEP Loopback Initiator receive state machine
20.35 MEP Fault Notification Generator variables
1166 20.36 MEP Fault Notification Generator procedures
20.37 MEP Fault Notification Generator state machine
1167 20.38 MEP Mismatch Fault Notification Generator variables
1168 20.39 MEP Mismatch Fault Notification Generator procedures
20.40 MEP Mismatch Fault Notification Generator state machine
20.41 MEP Linktrace Initiator variables
1171 20.42 MEP Linktrace Initiator procedures
1172 20.43 MEP Linktrace Initiator receive variables
20.44 MEP Linktrace Initiator receive procedures
1173 20.45 MEP Linktrace Initiator receive state machine
20.46 Linktrace Responder variables
1174 20.47 LTM Receiver procedures
1180 20.48 LTM Receiver state machine
20.49 LTR Transmitter procedure
20.50 LTR Transmitter state machine
1181 20.51 CFM PDU validation and versioning
1184 20.52 PDU identification
1185 20.53 Use of transaction IDs and sequence numbers
1186 21. Encoding of CFM Protocol Data Units
21.1 Structure, representation, and encoding
21.2 CFM encapsulation
1187 21.3 CFM request and indication parameters
1188 21.4 Common CFM Header
1189 21.5 TLV Format
1194 21.6 Continuity Check Message format
1199 21.7 Loopback Message and Loopback Reply formats
1201 21.8 Linktrace Message Format
1203 21.9 Linktrace Reply Format
1209 22. Connectivity Fault Management in systems
22.1 CFM shims in Bridges
1219 22.2 Maintenance Entity creation
1224 22.3 MPs, Ports, and MD Level assignment
22.4 Stations and Connectivity Fault Management
1225 22.5 Scalability of Connectivity Fault Management
1226 22.6 CFM in Provider Bridges
1229 22.7 Management Port MEPs and CFM in the enterprise environment
1231 22.8 Implementing CFM on existing Bridges
1233 23. MAC status propagation
1234 23.1 Model of operation
1236 23.2 MAC status protocol (MSP) overview
1240 23.3 MAC status protocol state machines
1242 23.4 State machine timers
23.5 MSP performance parameters
1243 23.6 State machine variables
1245 23.7 State machine procedures
23.8 Status Transition state machine
23.9 Status Notification state machine
23.10 Receive Process
1246 23.11 Transmit Process
23.12 Management of MSP
1247 23.13 MSPDU transmission, addressing, and protocol identification
1248 23.14 Representation and encoding of octets
23.15 MSPDU structure
1249 23.16 Validation of received MSPDUs
23.17 Other MSP participants
1250 24.
1251 25. Support of the MAC Service by Provider Backbone Bridged Networks
1253 25.1 Service transparency
25.2 Customer service interface
1254 25.3 Port-based service interface
1255 25.4 S-tagged service interface
1257 25.5 I-tagged service interface
1259 25.6 Service instance segregation
25.7 Service instance selection and identification
1260 25.8 Service priority and drop eligibility selection
25.9 Service access protection
1264 25.10 Support of the MAC Service by a PBB-TE Region
1267 25.11 Transparent service interface
1269 26. Principles of Provider Backbone Bridged Network operation
26.1 Provider Backbone Bridged Network overview
1270 26.2 Provider Backbone Bridged Network example
1272 26.3 Backbone VLAN connectivity
1273 26.4 Backbone addressing
1275 26.5 Detection of connectivity loops through attached networks
26.6 Scaling of Provider Backbone Bridges
1276 26.7 Network Management
26.8 Connectivity Fault Management in Provider Backbone Bridges
1284 26.9 Connectivity Fault Management in a PBB-TE Region
1291 26.10 Protection switching for point-to-point TESIs
1300 26.11 Infrastructure Protection Switching in PBB-TE Region
1312 26.12 Mismatch defect
1313 26.13 Signaling VLAN registrations among I-components
1314 27. Shortest Path Bridging (SPB)
1316 27.1 Protocol design requirements
1317 27.2 Protocol support
27.3 Protocol design goals
27.4 ISIS-SPB VLAN configuration
1321 27.5 ISIS-SPB information
27.6 Calculating CIST connectivity
1322 27.7 Connectivity between regions in the same domain
1323 27.8 Calculating SPT connectivity
1324 27.9 Loop prevention
27.10 SPVID and SPSourceID allocation
1326 27.11 Allocation of VIDs to FIDs
27.12 SPBV SPVID translation
1327 27.13 VLAN topology management
1328 27.14 Individual addresses and SPBM
1329 27.15 SPBM group addressing
1330 27.16 Backbone service instance topology management
1331 27.17 Equal cost shortest paths, ECTs, and load spreading
27.18 Using SPBV and SPBM
1335 27.19 Security considerations
1336 28. ISIS-SPB Link State Protocol
28.1 ISIS-SPB control plane MAC
1337 28.2 Formation and maintenance of ISIS-SPB adjacencies
1338 28.3 Loop prevention
28.4 The Agreement Digest
1341 28.5 Symmetric shortest path tie breaking
1342 28.6 Symmetric ECT framework
1343 28.7 Symmetric ECT
1344 28.8 Predefined ECT Algorithm details
1345 28.9 ECT Migration
1346 28.10 MAC Address registration
1347 28.11 Circuit IDs and Port Identifiers
28.12 ISIS-SPB TLVs
1358 29. DDCFM operations and protocols
29.1 Principles of DDCFM operation
1361 29.2 DDCFM Entity operation
1366 29.3 DDCFM protocols
1376 29.4 Encoding of DDCFM Protocol Data Units
1379 30. Principles of congestion notification
30.1 Congestion notification design requirements
1381 30.2 Quantized Congestion Notification protocol
1385 30.3 Congestion Controlled Flow
1386 30.4 Congestion Notification Priority Value
30.5 Congestion Notification Tag
30.6 Congestion Notification Domain
1387 30.7 Multicast data
1388 30.8 Congestion notification and additional tags
1389 31. Congestion notification entity operation
31.1 Congestion aware Bridge Forwarding Process
1390 31.2 Congestion aware end station functions
1396 32. Congestion notification protocol
32.1 Congestion Notification Domain operations
1399 32.2 CN component variables
1400 32.3 Congestion notification per-CNPV variables
1402 32.4 CND defense per-Port per-CNPV variables
1405 32.5 Congestion Notification Domain defense procedures
1406 32.6 Congestion Notification Domain defense state machine
32.7 Congestion notification protocol
1407 32.8 Congestion Point variables
1409 32.9 Congestion Point procedures
1412 32.10 Reaction Point per-Port per-CNPV variables
32.11 Reaction Point group variables
1414 32.12 Reaction Point timer
32.13 Reaction Point variables
1415 32.14 Reaction Point procedures
1417 32.15 RP rate control state machine
1419 32.16 Congestion notification and encapsulation interworking function
1421 33. Encoding of congestion notification Protocol Data Units
33.1 Structure, representation, and encoding
33.2 Congestion Notification Tag format
1422 33.3 Congestion Notification Message
1423 33.4 Congestion Notification Message PDU format
1426 34. Forwarding and queuing for time-sensitive streams
34.1 Overview
34.2 Detection of SRP domains
1427 34.3 The bandwidth availability parameters
1428 34.4 Deriving actual bandwidth requirements from the size of the MSDU
1429 34.5 Mapping priorities to traffic classes for time-sensitive streams
1431 34.6 End station behavior
1433 35. Stream Registration Protocol (SRP)
1434 35.1 Multiple Stream Registration Protocol (MSRP)
1437 35.2 Definition of the MSRP application
1461 36. Priority-based Flow Control
36.1 Priority-based Flow Control operation
1464 36.2 PFC aware system queue functions
1467 37. Enhanced Transmission Selection (ETS)
37.1 Overview
37.2 ETS configuration parameters
37.3 ETS algorithm
1468 37.4 Legacy configuration
1469 38. Data Center Bridging eXchange Protocol (DCBX)
38.1 Overview
38.2 Goals
38.3 Types of DCBX attributes
38.4 DCBX and LLDP
1473 39. Multiple I-SID Registration Protocol
39.1 MIRP overview
1475 39.2 Definition of the MIRP application
1481 40. Edge Virtual Bridging (EVB)
1483 40.1 EVB architecture without S-channels
1484 40.2 EVB architecture with S-channels
1486 40.3 Asymmetric EVB architecture without S-channels
1488 41. VSI discovery and configuration protocol (VDP)
41.1 VSI manager ID TLV definition
1489 41.2 VDP association TLV definitions
1496 41.3 Organizationally defined TLV definitions
41.4 Validation rules for VDP TLVs
1497 41.5 VDP state machines
1504 42. S-Channel Discovery and Configuration Protocol (CDCP)
42.1 CDCP discovery and configuration
42.2 CDCP state machine overview
1505 42.3 CDCP configuration state machine
1506 42.4 CDCP configuration variables
1508 42.5 CDCP configuration procedures
1510 43. Edge Control Protocol (ECP)
43.1 Edge control protocol operation
1511 43.2 Edge Control Sublayer Service (ECSS)
43.3 Edge control protocol (ECP) and state machine
1517 Annex A PICS proforma—Bridge implementations
A.1 Introduction
A.2 Abbreviations and special symbols
1518 A.3 Instructions for completing the PICS proforma
1520 A.4 PICS proforma for IEEE Std 802.1Q—Bridge implementations
1521 A.5 Major capabilities
1525 A.6 Media Access Control methods
1526 A.7 Relay and filtering of frames
1527 A.8 Basic Filtering Services
1528 A.9 Addressing
1530 A.10 Rapid Spanning Tree Protocol
1532 A.11 BPDU encoding
A.12 Implementation parameters
1533 A.13 Performance
1534 A.14 Bridge management
1543 A.15 Remote management
1544 A.16 Expedited traffic classes
A.17 Extended Filtering Services
A.18 Multiple Spanning Tree Protocol
1546 A.19 VLAN support
1550 A.20 MMRP
1551 A.21 MVRP
1552 A.22 MRP
1553 A.23 Connectivity Fault Management
1559 A.24 Management Information Base (MIB)
1561 A.25 Protection Switching
1562 A.26 Data-driven and data-dependent connectivity fault management
A.27 TPMR
1563 A.28 MSP
A.29 Forwarding and queuing for time-sensitive streams
1564 A.30 Congestion notification
1565 A.31 Stream Reservation Protocol
1568 A.32 MIRP
1569 A.33 Priority-based Flow Control
A.34 Enhanced Transmission Selection
1570 A.35 DCBX
A.36 Shortest Path Bridging
1571 A.37 EVB Bridge
1572 A.38 EVB station
1574 A.39 Edge relay
1576 A.40 VEB and VEPA edge relay components
1577 A.41 VDP, CDCP, and ECP
1578 Annex B PICS proforma—End station implementations
B.1 Introduction
B.2 Abbreviations and special symbols
1579 B.3 Instructions for completing the PICS proforma
1581 B.4 PICS proforma for IEEE Std 802.1Q—End station implementations
1582 B.5 Major capabilities
B.6 MMRP
1583 B.7 MVRP
1584 B.8 MRP
1585 B.9 Forwarding and queuing for time-sensitive streams
B.10 SRP (Stream Reservation Protocol)
1588 B.11 Congestion notification
1590 Annex C DMN (Designated MSRP Node) Implementations
C.1 Designated MSRP nodes on CSNs
1593 C.2 Designated MSRP Node on MoCA
1598 C.3 Designated MSRP Nodes on IEEE 802.11 media
1607 Annex D IEEE 802.1 Organizationally Specific TLVs
D.1 Requirements of the IEEE 802.1 Organizationally Specific TLV sets
1608 D.2 Organizationally Specific TLV definitions
1624 D.3 IEEE 802.1 Organizationally Specific TLV management
1625 D.4 IEEE 802.1/LLDP extension MIB
1708 D.5 PICS proforma for IEEE 802.1 Organizationally Specific TLV extensions
1711 Annex E Notational conventions used in state diagrams
1713 Annex F Shared and Independent VLAN Learning
F.1 Requirements for Shared and Independent Learning
1722 F.2 Configuring the Global VLAN Learning Constraints
1723 F.3 Interoperability
1725 Annex G MAC method dependent aspects of VLAN support
G.1 Example tagged IEEE 802.3 Ethertype-encoded frame format
G.2 Padding and frame size considerations
1727 Annex H Interoperability considerations
H.1 Requirements for interoperability
1728 H.2 Homogenous IEEE 802.1Q networks
1730 H.3 Heterogeneous networks: Intermixing IEEE 802.1D (D) and IEEE 802.1Q (Q) Bridges
1731 H.4 Heterogeneous networks: GARP and MRP issues
1733 H.5 Intermixing Port-based classification and Port-and-Protocol-based classification or future enhancements in IEEE Std 802.1Q
1735 Annex I Priority and drop precedence
I.1 Traffic types
1736 I.2 Managing latency and throughput
I.3 Traffic type to traffic class mapping
1738 I.4 Traffic types and priority values
1739 I.5 Supporting the credit-based shaper algorithm
1740 I.6 Supporting drop precedence
1741 I.7 Priority code point allocation
I.8 Interoperability
1743 Annex J Connectivity Fault Management protocol design and use
J.1 Origin of Connectivity Fault Management
J.2 Deployment of Connectivity Fault Management
1744 J.3 MD Level allocation alternative
J.4 Relationship of IEEE Std 802.1Q CFM to other standards
1745 J.5 Interpreting Linktrace results
1746 J.6 MP addressing: Individual and Shared MP addresses
1751 Annex K TPMR use cases
K.1 Use case 1—TPMR as User to Network Interface (UNI) demarcation device
1752 K.2 Use case 2—TPMRs with aggregated links
K.3 Use case 3—Multiple TPMRs
1753 K.4 Special cases
1756 Annex L Operation of the credit-based shaper algorithm
L.1 Overview of credit-based shaper operation
1759 L.2 “Class measurement intervals” in Bridges
1761 L.3 Determining worst-case latency contribution and buffering requirements
1771 L.4 Operation of the credit-based shaper in a coordinated shared network
1773 Annex M Support for PFC in link layers without MAC Control
M.1 Overview
M.2 PFC PDU Format
1774 Annex N Buffer requirements for Priority-based Flow Control
N.1 Overview
1775 N.2 Delay model
1777 N.3 Interface Delay
N.4 Cable Delay
N.5 Higher Layer Delay
1778 N.6 Computation example
1779 Annex O Bibliography
IEEE 802.1Q 2012
$196.67