{"id":129544,"date":"2024-10-19T06:33:35","date_gmt":"2024-10-19T06:33:35","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-p802-1q-rev-d2-2-july2014-draft\/"},"modified":"2024-10-24T23:35:53","modified_gmt":"2024-10-24T23:35:53","slug":"ieee-p802-1q-rev-d2-2-july2014-draft","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-p802-1q-rev-d2-2-july2014-draft\/","title":{"rendered":"IEEE P802.1Q REV D2.2 July2014 DRAFT"},"content":{"rendered":"

Revision Standard – Unapproved Draft. This standard specifies how the MAC Service is supported by Bridged Networks, the principles of operation of those networks, and the operation of MAC Bridges and VLAN Bridges, including management, protocols, and algorithms.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nP802.1Q-REV\/D2.2 <\/td>\n<\/tr>\n
17<\/td>\nContents <\/td>\n<\/tr>\n
50<\/td>\nFigures <\/td>\n<\/tr>\n
57<\/td>\nTables <\/td>\n<\/tr>\n
63<\/td>\nIMPORTANT NOTICE: This standard is not intended to ensure safety, security, health, or environmental protection. Implementers of the standard are responsible for determining appropriate safety, security, environmental, and health practices or regulat…
1. Overview
1.1 Scope <\/td>\n<\/tr>\n
64<\/td>\n1.2 Purpose
1.3 Introduction <\/td>\n<\/tr>\n
71<\/td>\n2. Normative references <\/td>\n<\/tr>\n
74<\/td>\n3. Definitions <\/td>\n<\/tr>\n
91<\/td>\n4. Abbreviations <\/td>\n<\/tr>\n
96<\/td>\n5. Conformance
5.1 Requirements terminology
5.2 Conformant components and equipment <\/td>\n<\/tr>\n
97<\/td>\n5.3 Protocol Implementation Conformance Statement (PICS)
5.4 VLAN Bridge component requirements <\/td>\n<\/tr>\n
98<\/td>\n5.4.1 VLAN Bridge component options <\/td>\n<\/tr>\n
102<\/td>\n5.4.2 Multiple VLAN Registration Protocol (MVRP) requirements <\/td>\n<\/tr>\n
103<\/td>\n5.4.3 VLAN Bridge requirements for congestion notification
5.4.4 Multiple Stream Registration Protocol (MSRP) requirements <\/td>\n<\/tr>\n
104<\/td>\n5.4.5 Shortest Path Bridging operation (optional) <\/td>\n<\/tr>\n
105<\/td>\n5.5 C-VLAN component conformance
5.5.1 C-VLAN component options
5.6 S-VLAN component conformance <\/td>\n<\/tr>\n
106<\/td>\n5.6.1 S-VLAN component options
5.6.2 S-VLAN component requirements for PBB-TE
5.6.3 S-VLAN component requirements for PBB-TE IPS
5.6.4 S-VLAN component requirements for ECMP with flow filtering
5.7 I-component conformance <\/td>\n<\/tr>\n
107<\/td>\n5.7.1 I-component options
5.8 B-component conformance
5.8.1 B-component options <\/td>\n<\/tr>\n
108<\/td>\n5.8.2 B-component requirements for PBB-TE
5.8.3 B-component requirements for PBB-TE IPS <\/td>\n<\/tr>\n
109<\/td>\n5.8.4 B-component requirements for ECMP with flow filtering
5.9 C-VLAN Bridge conformance
5.9.1 C-VLAN Bridge options
5.10 Provider Bridge conformance
5.10.1 S-VLAN Bridge conformance
5.10.2 Provider Edge Bridge conformance <\/td>\n<\/tr>\n
110<\/td>\n5.11 System requirements for Priority-based Flow Control
5.12 Backbone Edge Bridge conformance <\/td>\n<\/tr>\n
111<\/td>\n5.12.1 Backbone Edge Bridge requirements for PBB-TE
5.13 MAC Bridge component requirements
5.13.1 MAC Bridge component options <\/td>\n<\/tr>\n
112<\/td>\n5.14 MAC Bridge conformance
5.14.1 MAC Bridge options
5.15 TPMR component conformance
5.15.1 TPMR component options <\/td>\n<\/tr>\n
113<\/td>\n5.16 TPMR conformance
5.16.1 TPMR options
5.17 T-component conformance
5.17.1 T-component options
5.18 End station requirements for MMRP, MVRP, and MSRP <\/td>\n<\/tr>\n
114<\/td>\n5.18.1 MMRP requirements and options
5.18.2 MVRP requirements and options <\/td>\n<\/tr>\n
115<\/td>\n5.18.3 MSRP requirements and options
5.19 VLAN-aware end station requirements for Connectivity Fault Management <\/td>\n<\/tr>\n
116<\/td>\n5.20 End station requirements\u2014forwarding and queuing for time-sensitive streams
5.21 End station requirements for congestion notification <\/td>\n<\/tr>\n
117<\/td>\n5.22 MAC-specific bridging methods
5.23 Edge Virtual Bridging (EVB) Bridge requirements <\/td>\n<\/tr>\n
118<\/td>\n5.24 Edge Virtual Bridging (EVB) station requirements <\/td>\n<\/tr>\n
119<\/td>\n5.24.1 Edge relay requirements <\/td>\n<\/tr>\n
121<\/td>\n6. Support of the MAC Service <\/td>\n<\/tr>\n
122<\/td>\n6.1 Basic architectural concepts and terms
6.2 Provision of the MAC service <\/td>\n<\/tr>\n
123<\/td>\n6.2.1 Point-to-point, multipoint-to-multipoint, and rooted-multipoint connectivity
6.3 Support of the MAC service <\/td>\n<\/tr>\n
124<\/td>\n6.4 Preservation of the MAC service
6.5 Quality of service maintenance
6.5.1 Service availability <\/td>\n<\/tr>\n
125<\/td>\n6.5.2 Frame loss
6.5.3 Frame misordering <\/td>\n<\/tr>\n
126<\/td>\n6.5.4 Frame duplication <\/td>\n<\/tr>\n
127<\/td>\n6.5.5 Transit delay <\/td>\n<\/tr>\n
128<\/td>\n6.5.6 Frame lifetime
6.5.7 Undetected frame error rate
6.5.8 Maximum Service Data Unit Size
6.5.9 Priority <\/td>\n<\/tr>\n
129<\/td>\n6.5.10 Throughput <\/td>\n<\/tr>\n
130<\/td>\n6.6 Internal Sublayer Service
6.6.1 Control primitives and parameters
6.7 Support of the Internal Sublayer Service by specific MAC procedures
6.7.1 Support of the Internal Sublayer Service by IEEE Std 802.3 (Ethernet)
6.8 Enhanced Internal Sublayer Service
6.8.1 Service primitives <\/td>\n<\/tr>\n
132<\/td>\n6.8.2 Status parameters
6.8.3 Point-to-point parameters
6.8.4 Control primitives and parameters
6.9 Support of the EISS <\/td>\n<\/tr>\n
133<\/td>\n6.9.1 Data indications <\/td>\n<\/tr>\n
134<\/td>\n6.9.2 Data requests <\/td>\n<\/tr>\n
135<\/td>\n6.9.3 Priority Code Point encoding <\/td>\n<\/tr>\n
136<\/td>\n6.9.4 Regenerating priority <\/td>\n<\/tr>\n
138<\/td>\n6.10 Support of the ISS\/EISS by Provider Instance Ports <\/td>\n<\/tr>\n
140<\/td>\n6.10.1 Data indications <\/td>\n<\/tr>\n
141<\/td>\n6.10.2 Data requests <\/td>\n<\/tr>\n
142<\/td>\n6.10.3 Priority Code Point encoding
6.11 Support of the EISS by Customer Backbone Ports <\/td>\n<\/tr>\n
143<\/td>\n6.11.1 Data indications <\/td>\n<\/tr>\n
144<\/td>\n6.11.2 Data requests <\/td>\n<\/tr>\n
145<\/td>\n6.11.3 Priority Code Point decoding
6.11.4 Regenerating priority
6.12 Protocol VLAN classification <\/td>\n<\/tr>\n
147<\/td>\n6.12.1 Protocol Templates
6.12.2 Protocol Group Identifiers <\/td>\n<\/tr>\n
148<\/td>\n6.12.3 Protocol Group Database
6.13 Support of the ISS for attachment to a Provider Bridged Network <\/td>\n<\/tr>\n
149<\/td>\n6.13.1 Data requests <\/td>\n<\/tr>\n
150<\/td>\n6.13.2 Data indications
6.14 Support of the ISS within a system <\/td>\n<\/tr>\n
151<\/td>\n6.15 Support of the ISS by additional technologies
6.16 Filtering services in Bridged Networks
6.16.1 Purpose(s) of filtering service provision <\/td>\n<\/tr>\n
152<\/td>\n6.16.2 Goals of filtering service provision
6.16.3 Users of filtering services
6.16.4 Basis of service
6.16.5 Categories of service <\/td>\n<\/tr>\n
153<\/td>\n6.16.6 Service configuration
6.16.7 Service definition for Extended Filtering Services <\/td>\n<\/tr>\n
154<\/td>\n6.17 EISS Multiplex Entity <\/td>\n<\/tr>\n
155<\/td>\n6.18 Backbone Service Instance Multiplex Entity <\/td>\n<\/tr>\n
157<\/td>\n6.18.1 Demultiplexing direction <\/td>\n<\/tr>\n
158<\/td>\n6.18.2 Multiplexing direction
6.18.3 Priority Code Point encoding
6.18.4 Status parameters <\/td>\n<\/tr>\n
159<\/td>\n6.19 TESI Multiplex Entity <\/td>\n<\/tr>\n
160<\/td>\n6.20 Support of the ISS with signaled priority
6.20.1 Data indications <\/td>\n<\/tr>\n
161<\/td>\n6.20.2 Data requests
6.21 Infrastructure Segment Multiplex Entity <\/td>\n<\/tr>\n
163<\/td>\n7. Principles of Virtual Bridged Network operation
7.1 Network overview <\/td>\n<\/tr>\n
164<\/td>\n7.2 Use of VLANs
7.3 Active topology <\/td>\n<\/tr>\n
165<\/td>\n7.4 VLAN topology <\/td>\n<\/tr>\n
166<\/td>\n7.5 Locating end stations
7.6 Ingress, forwarding, and egress rules <\/td>\n<\/tr>\n
168<\/td>\n8. Principles of Bridge operation
8.1 Bridge operation
8.1.1 Relay <\/td>\n<\/tr>\n
169<\/td>\n8.1.2 Filtering and relaying information
8.1.3 Duplicate frame prevention
8.1.4 Traffic segregation <\/td>\n<\/tr>\n
170<\/td>\n8.1.5 Traffic reduction
8.1.6 Traffic expediting
8.1.7 Conversion of frame formats <\/td>\n<\/tr>\n
171<\/td>\n8.2 Bridge architecture <\/td>\n<\/tr>\n
173<\/td>\n8.3 Model of operation <\/td>\n<\/tr>\n
176<\/td>\n8.4 Active topologies, learning, and forwarding <\/td>\n<\/tr>\n
177<\/td>\n8.5 Bridge Port Transmit and Receive <\/td>\n<\/tr>\n
178<\/td>\n8.5.1 Bridge Port connectivity <\/td>\n<\/tr>\n
179<\/td>\n8.5.2 TPMR Port connectivity
8.5.3 Support of Higher Layer Entities <\/td>\n<\/tr>\n
180<\/td>\n8.6 The Forwarding Process
8.6.1 Active topology enforcement <\/td>\n<\/tr>\n
182<\/td>\n8.6.2 Ingress filtering
8.6.3 Frame filtering <\/td>\n<\/tr>\n
185<\/td>\n8.6.4 Egress filtering <\/td>\n<\/tr>\n
186<\/td>\n8.6.5 Flow classification and metering
8.6.6 Queuing frames <\/td>\n<\/tr>\n
188<\/td>\n8.6.7 Queue management
8.6.8 Transmission selection <\/td>\n<\/tr>\n
191<\/td>\n8.7 The Learning Process
8.7.1 Default filtering utility criteria <\/td>\n<\/tr>\n
192<\/td>\n8.7.2 Enhanced filtering utility criteria
8.7.3 Ageing of Dynamic Filtering Entries <\/td>\n<\/tr>\n
193<\/td>\n8.8 The Filtering Database <\/td>\n<\/tr>\n
196<\/td>\n8.8.1 Static Filtering Entries <\/td>\n<\/tr>\n
197<\/td>\n8.8.2 Static VLAN Registration Entries <\/td>\n<\/tr>\n
198<\/td>\n8.8.3 Dynamic Filtering Entries
8.8.4 MAC Address Registration Entries <\/td>\n<\/tr>\n
199<\/td>\n8.8.5 Dynamic VLAN Registration Entries
8.8.6 Default Group filtering behavior <\/td>\n<\/tr>\n
201<\/td>\n8.8.7 Dynamic Reservation Entries
8.8.8 Allocation of VIDs to FIDs <\/td>\n<\/tr>\n
202<\/td>\n8.8.9 Querying the Filtering Database <\/td>\n<\/tr>\n
205<\/td>\n8.8.10 Determination of the member set for a VID <\/td>\n<\/tr>\n
206<\/td>\n8.8.11 Permanent Database
8.8.12 Connection_Identifier <\/td>\n<\/tr>\n
207<\/td>\n8.9 MST, SPB, and ESP configuration information
8.9.1 MST Configuration Table <\/td>\n<\/tr>\n
208<\/td>\n8.9.2 MST configuration identification
8.9.3 FID to MSTI Allocation Table
8.9.4 SPT Configuration Identification <\/td>\n<\/tr>\n
209<\/td>\n8.10 Spanning Tree Protocol Entity
8.11 MRP Entities
8.12 Bridge Management Entity <\/td>\n<\/tr>\n
210<\/td>\n8.13 Addressing
8.13.1 End stations
8.13.2 Bridge Ports
8.13.3 Use of LLC by Spanning Tree Protocol Entities <\/td>\n<\/tr>\n
211<\/td>\n8.13.4 Reserved MAC Addresses
8.13.5 Group MAC Addresses for spanning tree entity <\/td>\n<\/tr>\n
212<\/td>\n8.13.6 Group MAC Addresses for MRP Applications <\/td>\n<\/tr>\n
213<\/td>\n8.13.7 Bridge Management Entities <\/td>\n<\/tr>\n
214<\/td>\n8.13.8 Unique identification of a Bridge
8.13.9 Points of attachment and connectivity for Higher Layer Entities <\/td>\n<\/tr>\n
217<\/td>\n8.13.10 VLAN attachment and connectivity for Higher Layer Entities <\/td>\n<\/tr>\n
218<\/td>\n8.13.11 Connectivity Fault Management entities <\/td>\n<\/tr>\n
220<\/td>\n9. Tagged frame format
9.1 Purpose of tagging
9.2 Representation and encoding of tag fields <\/td>\n<\/tr>\n
221<\/td>\n9.3 Tag format
9.4 Tag Protocol Identifier (TPID) formats
9.5 Tag Protocol Identification <\/td>\n<\/tr>\n
222<\/td>\n9.6 VLAN Tag Control Information <\/td>\n<\/tr>\n
223<\/td>\n9.7 Backbone Service Instance Tag Control Information <\/td>\n<\/tr>\n
225<\/td>\n10. Multiple Registration Protocol (MRP) and Multiple MAC Registration Protocol (MMRP)
10.1 MRP overview <\/td>\n<\/tr>\n
228<\/td>\n10.2 MRP architecture <\/td>\n<\/tr>\n
229<\/td>\n10.3 MRP Attribute Propagation (MAP) <\/td>\n<\/tr>\n
230<\/td>\n10.3.1 MAP Context <\/td>\n<\/tr>\n
231<\/td>\n10.4 Requirements to be met by MRP
10.5 Requirements for interoperability between MRP Participants <\/td>\n<\/tr>\n
233<\/td>\n10.6 Protocol operation <\/td>\n<\/tr>\n
237<\/td>\n10.7 Protocol specification <\/td>\n<\/tr>\n
238<\/td>\n10.7.1 Notational conventions and abbreviations <\/td>\n<\/tr>\n
239<\/td>\n10.7.2 Registrar Administrative Controls <\/td>\n<\/tr>\n
240<\/td>\n10.7.3 Applicant Administrative Controls
10.7.4 Protocol timers <\/td>\n<\/tr>\n
241<\/td>\n10.7.5 Protocol event definitions <\/td>\n<\/tr>\n
244<\/td>\n10.7.6 Protocol Action definitions <\/td>\n<\/tr>\n
246<\/td>\n10.7.7 Applicant state machine <\/td>\n<\/tr>\n
248<\/td>\n10.7.8 Registrar state machine
10.7.9 LeaveAll state machine
10.7.10 PeriodicTransmission state machine <\/td>\n<\/tr>\n
249<\/td>\n10.7.11 Timer values <\/td>\n<\/tr>\n
250<\/td>\n10.7.12 Operational reporting and statistics
10.7.13 Interoperability considerations <\/td>\n<\/tr>\n
251<\/td>\n10.8 Structure and encoding of MRP Protocol Data Units
10.8.1 Structure <\/td>\n<\/tr>\n
253<\/td>\n10.8.2 Encoding of MRPDU parameters <\/td>\n<\/tr>\n
256<\/td>\n10.8.3 Packing and parsing MRPDUs <\/td>\n<\/tr>\n
258<\/td>\n10.9 Multiple MAC Registration Protocol (MMRP)\u2014Purpose <\/td>\n<\/tr>\n
259<\/td>\n10.10 Model of operation <\/td>\n<\/tr>\n
260<\/td>\n10.10.1 Propagation of Group Membership information <\/td>\n<\/tr>\n
261<\/td>\n10.10.2 Propagation of Group service requirement information
10.10.3 Source pruning
10.10.4 Use of Group service requirement registration by end stations <\/td>\n<\/tr>\n
262<\/td>\n10.11 Default Group filtering behavior and MMRP propagation <\/td>\n<\/tr>\n
263<\/td>\n10.12 Definition of the MMRP application
10.12.1 Definition of MRP elements <\/td>\n<\/tr>\n
266<\/td>\n10.12.2 Provision and support of Extended Filtering Services <\/td>\n<\/tr>\n
267<\/td>\n10.12.3 Use of \u201cnew\u201d declaration capability
10.12.4 Attribute value support requirements <\/td>\n<\/tr>\n
269<\/td>\n11. VLAN topology management
11.1 Static and dynamic VLAN configuration <\/td>\n<\/tr>\n
270<\/td>\n11.2 Multiple VLAN Registration Protocol
11.2.1 MVRP overview <\/td>\n<\/tr>\n
272<\/td>\n11.2.2 VLAN registration service definition <\/td>\n<\/tr>\n
273<\/td>\n11.2.3 Definition of the MVRP application <\/td>\n<\/tr>\n
276<\/td>\n11.2.4 VID translation table
11.2.5 Use of \u201cnew\u201d declaration capability
11.2.6 New-only Participant and Registrar Administrative Controls
11.2.7 Attribute value support requirements <\/td>\n<\/tr>\n
277<\/td>\n12. Bridge management
12.1 Management functions
12.1.1 Configuration Management <\/td>\n<\/tr>\n
278<\/td>\n12.1.2 Fault Management
12.1.3 Performance Management
12.1.4 Security Management
12.1.5 Accounting Management
12.2 VLAN Bridge objects <\/td>\n<\/tr>\n
279<\/td>\n12.3 Data types <\/td>\n<\/tr>\n
280<\/td>\n12.4 Bridge Management Entity
12.4.1 Bridge Configuration <\/td>\n<\/tr>\n
283<\/td>\n12.4.2 Port configuration <\/td>\n<\/tr>\n
285<\/td>\n12.5 MAC entities
12.5.1 ISS Port Number table managed object (optional)
12.6 Forwarding process <\/td>\n<\/tr>\n
286<\/td>\n12.6.1 The Port Counters
12.6.2 Priority handling <\/td>\n<\/tr>\n
294<\/td>\n12.6.3 Traffic Class Table <\/td>\n<\/tr>\n
295<\/td>\n12.7 Filtering Database
12.7.1 The Filtering Database <\/td>\n<\/tr>\n
296<\/td>\n12.7.2 A Static Filtering Entry
12.7.3 A Dynamic Filtering Entry <\/td>\n<\/tr>\n
297<\/td>\n12.7.4 A MAC Address Registration Entry
12.7.5 A VLAN Registration Entry
12.7.6 Permanent Database <\/td>\n<\/tr>\n
298<\/td>\n12.7.7 General Filtering Database operations <\/td>\n<\/tr>\n
300<\/td>\n12.8 Bridge Protocol Entity
12.8.1 The Protocol Entity <\/td>\n<\/tr>\n
303<\/td>\n12.8.2 Bridge Port <\/td>\n<\/tr>\n
307<\/td>\n12.9 MRP Entities
12.9.1 The MRP Timer object <\/td>\n<\/tr>\n
308<\/td>\n12.9.2 The MRP Attribute Type object <\/td>\n<\/tr>\n
309<\/td>\n12.9.3 Periodic state machine objects
12.10 Bridge VLAN managed objects <\/td>\n<\/tr>\n
310<\/td>\n12.10.1 Bridge VLAN Configuration managed object <\/td>\n<\/tr>\n
315<\/td>\n12.10.2 VLAN Configuration managed object <\/td>\n<\/tr>\n
316<\/td>\n12.10.3 The VID to FID allocation managed object <\/td>\n<\/tr>\n
319<\/td>\n12.11 MMRP entities
12.11.1 MMRP Configuration managed object <\/td>\n<\/tr>\n
320<\/td>\n12.12 MST configuration entities
12.12.1 The MSTI List <\/td>\n<\/tr>\n
322<\/td>\n12.12.2 The FID to MSTID Allocation Table <\/td>\n<\/tr>\n
323<\/td>\n12.12.3 The MST Configuration Table <\/td>\n<\/tr>\n
324<\/td>\n12.13 Provider Bridge management <\/td>\n<\/tr>\n
326<\/td>\n12.13.1 Provider Bridge Port Type managed object <\/td>\n<\/tr>\n
327<\/td>\n12.13.2 Customer Edge Port Configuration managed object <\/td>\n<\/tr>\n
330<\/td>\n12.13.3 Remote Customer Access Port Configuration managed object <\/td>\n<\/tr>\n
332<\/td>\n12.14 CFM entities
12.14.1 Maintenance Domain list managed object <\/td>\n<\/tr>\n
334<\/td>\n12.14.2 CFM Stack managed object <\/td>\n<\/tr>\n
335<\/td>\n12.14.3 Default MD Level managed object <\/td>\n<\/tr>\n
336<\/td>\n12.14.4 Configuration Error List managed object <\/td>\n<\/tr>\n
337<\/td>\n12.14.5 Maintenance Domain managed object <\/td>\n<\/tr>\n
339<\/td>\n12.14.6 Maintenance Association managed object <\/td>\n<\/tr>\n
342<\/td>\n12.14.7 Maintenance association End Point managed object <\/td>\n<\/tr>\n
349<\/td>\n12.15 Backbone Core Bridge management
12.16 Backbone Edge Bridge management <\/td>\n<\/tr>\n
351<\/td>\n12.16.1 BEB configuration managed object <\/td>\n<\/tr>\n
354<\/td>\n12.16.2 BEB\/PB\/VLAN Bridge Port configuration managed object <\/td>\n<\/tr>\n
355<\/td>\n12.16.3 VIP configuration managed object <\/td>\n<\/tr>\n
356<\/td>\n12.16.4 PIP configuration managed object <\/td>\n<\/tr>\n
363<\/td>\n12.16.5 CBP Configuration managed object <\/td>\n<\/tr>\n
365<\/td>\n12.17 DDCFM entities <\/td>\n<\/tr>\n
366<\/td>\n12.17.1 DDCFM Stack managed object
12.17.2 Reflection Responder managed object <\/td>\n<\/tr>\n
370<\/td>\n12.17.3 RFM Receiver managed object <\/td>\n<\/tr>\n
371<\/td>\n12.17.4 Decapsulator Responder managed object <\/td>\n<\/tr>\n
373<\/td>\n12.17.5 SFM Originator managed object <\/td>\n<\/tr>\n
376<\/td>\n12.18 PBB-TE Protection Switching managed objects
12.18.1 TE protection group list managed object <\/td>\n<\/tr>\n
377<\/td>\n12.18.2 TE protection group managed object <\/td>\n<\/tr>\n
379<\/td>\n12.19 TPMR managed objects <\/td>\n<\/tr>\n
380<\/td>\n12.19.1 TPMR management entity <\/td>\n<\/tr>\n
382<\/td>\n12.19.2 MAC and PHY entities
12.19.3 Forwarding Process <\/td>\n<\/tr>\n
387<\/td>\n12.19.4 MAC status propagation entity <\/td>\n<\/tr>\n
389<\/td>\n12.20 Management entities for forwarding and queueing for time-sensitive streams
12.20.1 The Bandwidth Availability Parameter Table <\/td>\n<\/tr>\n
390<\/td>\n12.20.2 The Transmission Selection Algorithm Table
12.20.3 The Priority Regeneration Override Table
12.21 Congestion notification managed objects <\/td>\n<\/tr>\n
391<\/td>\n12.21.1 CN component managed object <\/td>\n<\/tr>\n
392<\/td>\n12.21.2 CN component priority managed object <\/td>\n<\/tr>\n
393<\/td>\n12.21.3 CN Port priority managed object
12.21.4 Congestion Point managed object <\/td>\n<\/tr>\n
394<\/td>\n12.21.5 Reaction Point port priority managed object <\/td>\n<\/tr>\n
395<\/td>\n12.21.6 Reaction Point group managed object
12.22 SRP entities
12.22.1 SRP Bridge Base Table
12.22.2 SRP Bridge Port Table <\/td>\n<\/tr>\n
396<\/td>\n12.22.3 SRP Latency Parameter Table <\/td>\n<\/tr>\n
397<\/td>\n12.22.4 SRP Stream Table
12.22.5 SRP Reservations Table
12.23 Priority-based Flow Control objects <\/td>\n<\/tr>\n
398<\/td>\n12.24 1:1 PBB-TE Infrastructure Protection Switching (IPS) managed objects
12.24.1 IPG list managed object <\/td>\n<\/tr>\n
400<\/td>\n12.24.2 IPG managed object <\/td>\n<\/tr>\n
402<\/td>\n12.25 Shortest Path Bridging managed objects <\/td>\n<\/tr>\n
403<\/td>\n12.25.1 The SPB System managed object <\/td>\n<\/tr>\n
406<\/td>\n12.25.2 The SPB MTID Static managed object <\/td>\n<\/tr>\n
407<\/td>\n12.25.3 The SPB Topology Instance Dynamic managed object <\/td>\n<\/tr>\n
408<\/td>\n12.25.4 The SPB ECT Static Entry managed object <\/td>\n<\/tr>\n
409<\/td>\n12.25.5 The SPB ECT Dynamic Entry managed object <\/td>\n<\/tr>\n
410<\/td>\n12.25.6 The SPB Adjacency Static Entry managed object <\/td>\n<\/tr>\n
411<\/td>\n12.25.7 The SPB Adjacency Dynamic Entry managed object <\/td>\n<\/tr>\n
412<\/td>\n12.25.8 The SPBM BSI Static Entry managed object <\/td>\n<\/tr>\n
413<\/td>\n12.25.9 The SPB Topology Node Table managed object <\/td>\n<\/tr>\n
414<\/td>\n12.25.10 The SPB Topology ECT Table managed object <\/td>\n<\/tr>\n
415<\/td>\n12.25.11 The SPB Topology Edge Table managed object
12.25.12 The SPBM Topology Service Table managed object <\/td>\n<\/tr>\n
417<\/td>\n12.25.13 The SPBV Topology Service Table managed object
12.25.14 The ECMP ECT Static Entry managed object <\/td>\n<\/tr>\n
418<\/td>\n12.26 Edge Virtual Bridging management <\/td>\n<\/tr>\n
422<\/td>\n12.26.1 EVB system base table <\/td>\n<\/tr>\n
424<\/td>\n12.26.2 SBP table entry
12.26.3 VSI table entry <\/td>\n<\/tr>\n
428<\/td>\n12.26.4 S-channel configuration and management <\/td>\n<\/tr>\n
431<\/td>\n12.26.5 Edge relay management <\/td>\n<\/tr>\n
432<\/td>\n12.27 Edge Control Protocol management
12.27.1 ECP table entry <\/td>\n<\/tr>\n
433<\/td>\n13. Spanning Tree Protocols <\/td>\n<\/tr>\n
434<\/td>\n13.1 Protocol design requirements <\/td>\n<\/tr>\n
435<\/td>\n13.2 Protocol support requirements
13.2.1 MSTP support requirements
13.2.2 SPB support requirements <\/td>\n<\/tr>\n
436<\/td>\n13.3 Protocol design goals
13.4 RSTP overview <\/td>\n<\/tr>\n
437<\/td>\n13.4.1 Computation of the active topology <\/td>\n<\/tr>\n
438<\/td>\n13.4.2 Example topologies <\/td>\n<\/tr>\n
441<\/td>\n13.5 MSTP overview <\/td>\n<\/tr>\n
442<\/td>\n13.5.1 Example topologies <\/td>\n<\/tr>\n
445<\/td>\n13.5.2 Relationship of MSTP to RSTP
13.5.3 Modeling an MST or SPT Region as a single Bridge <\/td>\n<\/tr>\n
446<\/td>\n13.6 SPB overview <\/td>\n<\/tr>\n
447<\/td>\n13.7 Compatibility and interoperability
13.7.1 Designated Port selection
13.7.2 Force Protocol Version <\/td>\n<\/tr>\n
448<\/td>\n13.8 MST Configuration Identifier <\/td>\n<\/tr>\n
449<\/td>\n13.9 Spanning Tree Priority Vectors <\/td>\n<\/tr>\n
451<\/td>\n13.10 CIST Priority Vector calculations <\/td>\n<\/tr>\n
453<\/td>\n13.11 MST Priority Vector calculations <\/td>\n<\/tr>\n
455<\/td>\n13.12 Port Role assignments <\/td>\n<\/tr>\n
456<\/td>\n13.13 Stable connectivity <\/td>\n<\/tr>\n
457<\/td>\n13.14 Communicating Spanning Tree information <\/td>\n<\/tr>\n
458<\/td>\n13.15 Changing Spanning Tree information <\/td>\n<\/tr>\n
459<\/td>\n13.16 Changing Port States with RSTP or MSTP <\/td>\n<\/tr>\n
460<\/td>\n13.16.1 Subtree connectivity and priority vectors
13.16.2 Root Port transition to Forwarding
13.16.3 Designated Port transition to Forwarding <\/td>\n<\/tr>\n
461<\/td>\n13.16.4 Master Port transition to Forwarding <\/td>\n<\/tr>\n
464<\/td>\n13.17 Changing Port States with SPB <\/td>\n<\/tr>\n
466<\/td>\n13.17.1 Agreement Digest
13.18 Managing spanning tree topologies <\/td>\n<\/tr>\n
468<\/td>\n13.19 Updating learned station location information <\/td>\n<\/tr>\n
470<\/td>\n13.20 Managing reconfiguration <\/td>\n<\/tr>\n
471<\/td>\n13.21 Partial and disputed connectivity
13.22 In-service upgrades <\/td>\n<\/tr>\n
472<\/td>\n13.23 Fragile Bridges <\/td>\n<\/tr>\n
473<\/td>\n13.24 Spanning tree protocol state machines <\/td>\n<\/tr>\n
475<\/td>\n13.25 State machine timers <\/td>\n<\/tr>\n
476<\/td>\n13.25.1 edgeDelayWhile
13.25.2 fdWhile
13.25.3 helloWhen
13.25.4 mdelayWhile
13.25.5 rbWhile
13.25.6 rcvdInfoWhile <\/td>\n<\/tr>\n
477<\/td>\n13.25.7 rrWhile
13.25.8 tcDetected
13.25.9 tcWhile
13.25.10 pseudoInfoHelloWhen
13.26 Per Bridge variables <\/td>\n<\/tr>\n
478<\/td>\n13.26.1 agreementDigest
13.26.2 BridgeIdentifier
13.26.3 BridgePriority
13.26.4 BridgeTimes <\/td>\n<\/tr>\n
479<\/td>\n13.26.5 ForceProtocolVersion
13.26.6 MigrateTime
13.26.7 MstConfigId
13.26.8 AuxMstConfigId
13.26.9 rootPortId
13.26.10 rootPriority
13.26.11 rootTimes
13.26.12 TxHoldCount
13.27 Per port variables <\/td>\n<\/tr>\n
482<\/td>\n13.27.1 AdminEdge
13.27.2 ageingTime
13.27.3 agree
13.27.4 agreed
13.27.5 agreedAbove
13.27.6 agreedDigest
13.27.7 agreedDigestValid
13.27.8 agreeDigest
13.27.9 agreeDigestValid
13.27.10 agreedMisorder <\/td>\n<\/tr>\n
483<\/td>\n13.27.11 agreedN
13.27.12 agreedND
13.27.13 agreedPriority
13.27.14 agreedTopology
13.27.15 agreementOutstanding
13.27.16 agreeN
13.27.17 agreeND
13.27.18 AutoEdge
13.27.19 AutoIsolate <\/td>\n<\/tr>\n
484<\/td>\n13.27.20 designatedPriority
13.27.21 designatedTimes
13.27.22 disputed
13.27.23 enableBPDUrx
13.27.24 enableBPDUtx
13.27.25 ExternalPortPathCost
13.27.26 isL2gp
13.27.27 isolate <\/td>\n<\/tr>\n
485<\/td>\n13.27.28 fdbFlush
13.27.29 forward
13.27.30 forwarding
13.27.31 infoInternal
13.27.32 infoIs
13.27.33 InternalPortPathCost <\/td>\n<\/tr>\n
486<\/td>\n13.27.34 learn
13.27.35 learning
13.27.36 master
13.27.37 mastered
13.27.38 mcheck
13.27.39 msgPriority
13.27.40 msgTimes <\/td>\n<\/tr>\n
487<\/td>\n13.27.41 neighbourPriority
13.27.42 newInfo
13.27.43 newInfoMsti
13.27.44 operEdge
13.27.45 portEnabled
13.27.46 portId
13.27.47 portPriority <\/td>\n<\/tr>\n
488<\/td>\n13.27.48 portTimes
13.27.49 proposed
13.27.50 proposing
13.27.51 pseudoRootId
13.27.52 rcvdBPDU
13.27.53 rcvdInfo
13.27.54 rcvdInternal
13.27.55 rcvdMsg
13.27.56 rcvdRSTP
13.27.57 rcvdSTP
13.27.58 rcvdTc
13.27.59 rcvdTcAck <\/td>\n<\/tr>\n
489<\/td>\n13.27.60 rcvdTcn
13.27.61 reRoot
13.27.62 reselect
13.27.63 restrictedDomainRole
13.27.64 restrictedRole
13.27.65 restrictedTcn
13.27.66 role
13.27.67 selected
13.27.68 selectedRole <\/td>\n<\/tr>\n
490<\/td>\n13.27.69 sendRSTP
13.27.70 sync
13.27.71 synced
13.27.72 tcAck
13.27.73 tcProp
13.27.74 tick
13.27.75 txCount
13.27.76 updtInfo
13.28 State machine conditions and parameters <\/td>\n<\/tr>\n
491<\/td>\n13.28.1 allSptAgree
13.28.2 allSynced
13.28.3 allTransmitReady
13.28.4 BestAgreementPriority
13.28.5 cist
13.28.6 cistRootPort <\/td>\n<\/tr>\n
492<\/td>\n13.28.7 cistDesignatedPort
13.28.8 EdgeDelay
13.28.9 forwardDelay
13.28.10 FwdDelay
13.28.11 HelloTime
13.28.12 MaxAge
13.28.13 msti
13.28.14 mstiDesignatedOrTCpropagatingRootPort
13.28.15 mstiMasterPort
13.28.16 operPointToPoint
13.28.17 rcvdAnyMsg
13.28.18 rcvdCistMsg <\/td>\n<\/tr>\n
493<\/td>\n13.28.19 rcvdMstiMsg
13.28.20 reRooted
13.28.21 rstpVersion
13.28.22 spt
13.28.23 stpVersion
13.28.24 updtCistInfo
13.28.25 updtMstiInfo
13.29 State machine procedures <\/td>\n<\/tr>\n
494<\/td>\n13.29.1 betterorsameInfo(newInfoIs)
13.29.2 clearAllRcvdMsgs()
13.29.3 clearReselectTree() <\/td>\n<\/tr>\n
495<\/td>\n13.29.4 disableForwarding()
13.29.5 disableLearning()
13.29.6 enableForwarding()
13.29.7 enableLearning()
13.29.8 fromSameRegion()
13.29.9 newTcDetected()
13.29.10 newTcWhile() <\/td>\n<\/tr>\n
496<\/td>\n13.29.11 pseudoRcvMsgs()
13.29.12 rcvInfo() <\/td>\n<\/tr>\n
497<\/td>\n13.29.13 rcvMsgs()
13.29.14 rcvAgreements()
13.29.15 recordAgreement() <\/td>\n<\/tr>\n
498<\/td>\n13.29.16 recordDispute()
13.29.17 recordMastered()
13.29.18 recordPriority()
13.29.19 recordProposal()
13.29.20 recordTimes() <\/td>\n<\/tr>\n
499<\/td>\n13.29.21 setReRootTree()
13.29.22 setSelectedTree()
13.29.23 setSyncTree()
13.29.24 setTcFlags()
13.29.25 setTcPropTree()
13.29.26 syncMaster()
13.29.27 txConfig() <\/td>\n<\/tr>\n
500<\/td>\n13.29.28 txRstp()
13.29.29 txTcn()
13.29.30 updtAgreement() <\/td>\n<\/tr>\n
501<\/td>\n13.29.31 updtBPDUVersion()
13.29.32 updtDigest() <\/td>\n<\/tr>\n
502<\/td>\n13.29.33 updtRcvdInfoWhile() <\/td>\n<\/tr>\n
503<\/td>\n13.29.34 updtRolesTree() <\/td>\n<\/tr>\n
504<\/td>\n13.29.35 uptRolesDisabledTree()
13.30 The Port Timers state machine <\/td>\n<\/tr>\n
505<\/td>\n13.31 Port Receive state machine <\/td>\n<\/tr>\n
506<\/td>\n13.32 Port Protocol Migration state machine
13.33 Bridge Detection state machine
13.34 Port Transmit state machine <\/td>\n<\/tr>\n
508<\/td>\n13.35 Port Information state machine <\/td>\n<\/tr>\n
509<\/td>\n13.36 Port Role Selection state machine
13.37 Port Role Transitions state machine <\/td>\n<\/tr>\n
513<\/td>\n13.38 Port State Transition state machine
13.38.1 Port State transitions for the CIST and MSTIs
13.38.2 Port State transitions for SPTs <\/td>\n<\/tr>\n
515<\/td>\n13.39 Topology Change state machine <\/td>\n<\/tr>\n
516<\/td>\n13.40 Layer 2 Gateway Port Receive state machine
13.41 Customer Edge Port Spanning Tree operation
13.41.1 Provider Edge Port operPointToPointMAC and operEdge <\/td>\n<\/tr>\n
517<\/td>\n13.41.2 updtRolesTree()
13.41.3 setReRootTree(), setSyncTree(), setTcPropTree()
13.41.4 allSynced, reRooted
13.41.5 Configuration parameters <\/td>\n<\/tr>\n
518<\/td>\n13.42 Virtual Instance Port Spanning Tree operation <\/td>\n<\/tr>\n
519<\/td>\n14. Encoding of Bridge Protocol Data Units (BPDUs)
14.1 BPDU Structure
14.1.1 Transmission and representation of octets <\/td>\n<\/tr>\n
521<\/td>\n14.1.2 Common BPDU fields
14.2 Encoding of parameter types
14.2.1 Encoding of Protocol Identifiers
14.2.2 Encoding of Protocol Version Identifiers
14.2.3 Encoding of BPDU types
14.2.4 Encoding of flags
14.2.5 Encoding of Bridge Identifiers <\/td>\n<\/tr>\n
522<\/td>\n14.2.6 Encoding of External Root Path Cost and Internal Root Path Cost
14.2.7 Encoding of Port Identifiers <\/td>\n<\/tr>\n
523<\/td>\n14.2.8 Encoding of Timer Values
14.2.9 Encoding of Port Role values
14.2.10 Encoding of Length Values
14.2.11 Encoding of Hop Counts
14.3 Transmission of BPDUs <\/td>\n<\/tr>\n
524<\/td>\n14.4 Encoding and decoding of STP Configuration, RST, MST, and SPT BPDUs <\/td>\n<\/tr>\n
525<\/td>\n14.4.1 MSTI Configuration Messages <\/td>\n<\/tr>\n
526<\/td>\n14.5 Validation of received BPDUs <\/td>\n<\/tr>\n
527<\/td>\n14.6 Validation and interoperability <\/td>\n<\/tr>\n
529<\/td>\n15. Support of the MAC Service by Provider Bridged Networks
15.1 Service transparency <\/td>\n<\/tr>\n
530<\/td>\n15.2 Customer service interfaces
15.3 Port-based service interface <\/td>\n<\/tr>\n
531<\/td>\n15.4 C-tagged service interface <\/td>\n<\/tr>\n
532<\/td>\n15.5 S-tagged service interface <\/td>\n<\/tr>\n
533<\/td>\n15.6 Remote customer service interfaces <\/td>\n<\/tr>\n
536<\/td>\n15.7 Service instance segregation
15.8 Service instance selection and identification <\/td>\n<\/tr>\n
537<\/td>\n15.9 Service priority selection <\/td>\n<\/tr>\n
538<\/td>\n15.10 Service access protection <\/td>\n<\/tr>\n
539<\/td>\n16. Principles of Provider Bridged Network operation
16.1 Provider Bridged Network overview <\/td>\n<\/tr>\n
540<\/td>\n16.2 Provider Bridged Network <\/td>\n<\/tr>\n
543<\/td>\n16.3 Service instance connectivity <\/td>\n<\/tr>\n
544<\/td>\n16.4 Service provider learning of customer end station addresses
16.5 Detection of connectivity loops through attached networks <\/td>\n<\/tr>\n
545<\/td>\n16.6 Network management <\/td>\n<\/tr>\n
546<\/td>\n17. Management Information Base (MIB)
17.1 Internet Standard Management Framework
17.2 Structure of the MIB <\/td>\n<\/tr>\n
547<\/td>\n17.2.1 Structure of the IEEE8021-TC-MIB <\/td>\n<\/tr>\n
549<\/td>\n17.2.2 Structure of the IEEE8021-BRIDGE-MIB <\/td>\n<\/tr>\n
554<\/td>\n17.2.3 Structure of the IEEE8021-SPANNING-TREE MIB <\/td>\n<\/tr>\n
556<\/td>\n17.2.4 Structure of the IEEE8021-Q-BRIDGE-MIB <\/td>\n<\/tr>\n
563<\/td>\n17.2.5 Structure of the IEEE8021-PB-MIB
17.2.6 Structure of the IEEE8021-MSTP-MIB <\/td>\n<\/tr>\n
568<\/td>\n17.2.7 Structure of the IEEE8021-CFM-MIB <\/td>\n<\/tr>\n
574<\/td>\n17.2.8 Structure of the IEEE8021-PBB-MIB <\/td>\n<\/tr>\n
577<\/td>\n17.2.9 Structure of the IEEE8021-DDCFM-MIBs <\/td>\n<\/tr>\n
579<\/td>\n17.2.10 Structure of the IEEE8021-PBBTE-MIB <\/td>\n<\/tr>\n
582<\/td>\n17.2.11 Structure of the TPMR MIB <\/td>\n<\/tr>\n
584<\/td>\n17.2.12 Structure of the IEEE8021-FQTSS-MIB <\/td>\n<\/tr>\n
585<\/td>\n17.2.13 Structure of the Congestion Notification MIB <\/td>\n<\/tr>\n
587<\/td>\n17.2.14 Structure of the IEEE8021-SRP-MIB <\/td>\n<\/tr>\n
589<\/td>\n17.2.15 Structure of the MVRP extension MIB
17.2.16 Structure of the MIRP MIB <\/td>\n<\/tr>\n
590<\/td>\n17.2.17 Structure of the Priority-based Flow Control MIB
17.2.18 Structure of the IEEE80221-TEIPS MIB <\/td>\n<\/tr>\n
592<\/td>\n17.2.19 Structure of the IEEE8021-SPB-MIB <\/td>\n<\/tr>\n
596<\/td>\n17.2.20 Structure of the IEEE8021-EVB-MIB <\/td>\n<\/tr>\n
601<\/td>\n17.2.21 Structure of the IEEE8021-ECMP-MIB
17.3 Relationship to other MIBs <\/td>\n<\/tr>\n
602<\/td>\n17.3.1 Relationship of the IEEE8021-TC-MIB to other MIB modules
17.3.2 Relationship of the IEEE8021-BRIDGE-MIB to other MIB modules <\/td>\n<\/tr>\n
604<\/td>\n17.3.3 Relationship of the IEEE8021-RSTP MIB to other MIB modules <\/td>\n<\/tr>\n
605<\/td>\n17.3.4 Relationship of the IEEE8021-Q-BRIDGE-MIB to other MIB modules <\/td>\n<\/tr>\n
606<\/td>\n17.3.5 Relationship of the IEEE8021-PB-BRIDGE MIB to other MIB modules <\/td>\n<\/tr>\n
607<\/td>\n17.3.6 Relationship of the IEEE8021-MSTP-MIB to other MIB modules
17.3.7 Relationship of the IEEE8021-CFM-MIB to other MIB modules <\/td>\n<\/tr>\n
608<\/td>\n17.3.8 Relationship of the IEEE8021-PBB-MIB to other MIB modules <\/td>\n<\/tr>\n
609<\/td>\n17.3.9 Relationship of the IEEE8021-DDCFM to other MIB modules
17.3.10 Relationship of the IEEE8021-PBBTE-MIB to other MIB modules <\/td>\n<\/tr>\n
610<\/td>\n17.3.11 Relationship of the TPMR MIB to other MIB modules
17.3.12 Relationship of the IEEE8021-FQTSS-MIB to other MIB modules
17.3.13 Relationship of the IEEE802-CN-MIB to other MIB modules <\/td>\n<\/tr>\n
611<\/td>\n17.3.14 Relationship of the IEEE8021-SRP-MIB to other MIB modules
17.3.15 Relationship of the IEEE8021-MVRPX-MIB to other MIB modules
17.3.16 Relationship of the IEEE8021-MIRP-MIB to other MIB modules
17.3.17 Relationship of the Priority-based Flow Control MIB to other MIB modules
17.3.18 Relationship of the IEEE8021-TEIPS-MIB to other MIB modules <\/td>\n<\/tr>\n
612<\/td>\n17.3.19 Relationship of the of the IEEE8021-SPB-MIB to other MIB modules
17.3.20 Relationship of the IEEE8021-EVB-MIB to other MIB modules
17.3.21 Relationship of the of the IEEE8021-ECMP-MIB to other MIB modules
17.4 Security considerations <\/td>\n<\/tr>\n
613<\/td>\n17.4.1 Security considerations of the IEEE8021-TC-MIB
17.4.2 Security considerations of the IEEE8021-BRIDGE-MIB <\/td>\n<\/tr>\n
614<\/td>\n17.4.3 Security considerations of the IEEE8021-SPANNING-TREE MIB
17.4.4 Security considerations of the IEEE8021-Q-BRIDGE-MIB <\/td>\n<\/tr>\n
615<\/td>\n17.4.5 Security considerations of the IEEE8021-PB-MIB <\/td>\n<\/tr>\n
616<\/td>\n17.4.6 Security considerations of the IEEE8021-MSTP-MIB
17.4.7 Security considerations of the IEEE8021-CFM-MIB <\/td>\n<\/tr>\n
618<\/td>\n17.4.8 Security considerations of the IEEE8021-PBB-MIB <\/td>\n<\/tr>\n
619<\/td>\n17.4.9 Security considerations of the IEEE8021-DDCFM-MIB
17.4.10 Security considerations of the IEEE8021-PBBTE-MIB <\/td>\n<\/tr>\n
620<\/td>\n17.4.11 Security considerations of the TPMR MIB <\/td>\n<\/tr>\n
621<\/td>\n17.4.12 Security considerations of the IEEE8021-FQTSS-MIB
17.4.13 Security considerations of the Congestion Notification MIB <\/td>\n<\/tr>\n
623<\/td>\n17.4.14 Security considerations of the IEEE8021-SRP-MIB
17.4.15 Security considerations of the IEEE8021-MVRPX-MIB <\/td>\n<\/tr>\n
624<\/td>\n17.4.16 Security considerations of the IEEE8021-MIRP-MIB
17.4.17 Security considerations for the Priority-based Flow Control MIB
17.4.18 Security considerations of the IEEE8021-TEIPS-MIB <\/td>\n<\/tr>\n
625<\/td>\n17.4.19 Security considerations of the IEEE8021-SPB-MIB
17.4.20 Security considerations of the IEEE8021-EVB-MIB <\/td>\n<\/tr>\n
627<\/td>\n17.4.21 Security considerations of the IEEE8021-ECMP-MIB
17.5 Dynamic component and Port creation
17.5.1 Overview of the dynamically created Bridge entities <\/td>\n<\/tr>\n
628<\/td>\n17.5.2 Component creation <\/td>\n<\/tr>\n
629<\/td>\n17.5.3 Port creation <\/td>\n<\/tr>\n
639<\/td>\n17.6 MIB operations for service interface configuration <\/td>\n<\/tr>\n
640<\/td>\n17.6.1 Provisioning Provider Bridged Network service interfaces <\/td>\n<\/tr>\n
642<\/td>\n17.6.2 Provisioning Backbone Bridged Network service interfaces <\/td>\n<\/tr>\n
649<\/td>\n17.7 MIB modules
17.7.1 Definitions for the IEEE8021-TC-MIB module <\/td>\n<\/tr>\n
660<\/td>\n17.7.2 Definitions for the IEEE8021-BRIDGE-MIB module <\/td>\n<\/tr>\n
700<\/td>\n17.7.3 Definitions for the IEEE8021-SPANNING-TREE-MIB module <\/td>\n<\/tr>\n
718<\/td>\n17.7.4 Definitions for the IEEE8021-Q-BRIDGE-MIB module <\/td>\n<\/tr>\n
764<\/td>\n17.7.5 Definitions for the IEEE8021-PB-MIB module <\/td>\n<\/tr>\n
782<\/td>\n17.7.6 Definitions for the IEEE8021-MSTP-MIB module <\/td>\n<\/tr>\n
811<\/td>\n17.7.7 Definitions for the CFM MIB modules <\/td>\n<\/tr>\n
895<\/td>\n17.7.8 Definitions for the IEEE8021-PBB-MIB module <\/td>\n<\/tr>\n
918<\/td>\n17.7.9 Definitions for the IEEE8021-DDCFM-MIB module <\/td>\n<\/tr>\n
936<\/td>\n17.7.10 Definitions for the IEEE8021-PBBTE-MIB module <\/td>\n<\/tr>\n
953<\/td>\n17.7.11 Definitions for the IEEE8021-TPMR-MIB module <\/td>\n<\/tr>\n
967<\/td>\n17.7.12 Definitions for the IEEE8021-FQTSS-MIB module <\/td>\n<\/tr>\n
978<\/td>\n17.7.13 Definitions for the IEEE8021-CN-MIB module <\/td>\n<\/tr>\n
1015<\/td>\n17.7.14 Definitions for the IEEE8021-SRP-MIB module <\/td>\n<\/tr>\n
1031<\/td>\n17.7.15 Definitions for the IEEE8021-MVRPX-MIB module <\/td>\n<\/tr>\n
1036<\/td>\n17.7.16 Definitions for the IEEE8021-MIRP-MIB module <\/td>\n<\/tr>\n
1042<\/td>\n17.7.17 Definitions for the IEEE8021-PFC-MIB module <\/td>\n<\/tr>\n
1046<\/td>\n17.7.18 Definitions for the IEEE8021-TEIPS-V2-MIB module <\/td>\n<\/tr>\n
1061<\/td>\n17.7.19 Definitions for the IEEE8021-SPB-MIB module <\/td>\n<\/tr>\n
1099<\/td>\n17.7.20 Definitions for the IEEE8021-EVB-MIB module <\/td>\n<\/tr>\n
1129<\/td>\n17.7.21 Definitions for the IEEE8021-ECMP-MIB module <\/td>\n<\/tr>\n
1159<\/td>\n18. Principles of Connectivity Fault Management operation <\/td>\n<\/tr>\n
1160<\/td>\n18.1 Maintenance Domains and Domain Service Access Points <\/td>\n<\/tr>\n
1162<\/td>\n18.2 Service instances and Maintenance Associations <\/td>\n<\/tr>\n
1163<\/td>\n18.3 Maintenance Domain Levels <\/td>\n<\/tr>\n
1167<\/td>\n19. Connectivity Fault Management Entity operation
19.1 Maintenance Points
19.2 Maintenance association End Point <\/td>\n<\/tr>\n
1168<\/td>\n19.2.1 MEP identification <\/td>\n<\/tr>\n
1169<\/td>\n19.2.2 MEP functions
19.2.3 MEP architecture
19.2.4 MP Type Demultiplexer <\/td>\n<\/tr>\n
1171<\/td>\n19.2.5 MP Multiplexer
19.2.6 MP Level Demultiplexer
19.2.7 MP OpCode Demultiplexer
19.2.8 MEP Continuity Check Receiver <\/td>\n<\/tr>\n
1172<\/td>\n19.2.9 MEP Continuity Check Initiator
19.2.10 MP Loopback Responder
19.2.11 MEP Loopback Initiator
19.2.12 MEP Linktrace Initiator <\/td>\n<\/tr>\n
1173<\/td>\n19.2.13 MEP LTI SAP
19.2.14 MEP Linktrace SAP
19.2.15 MEP CCM Database
19.2.16 MEP Fault Notification Generator
19.2.17 MEP Decapsulator Responder
19.2.18 MEP RFM Receiver <\/td>\n<\/tr>\n
1174<\/td>\n19.3 MIP Half Function
19.3.1 MHF identification
19.3.2 MHF functions <\/td>\n<\/tr>\n
1175<\/td>\n19.3.3 MHF architecture
19.3.4 MHF Level Demultiplexer
19.3.5 MHF Type Demultiplexer <\/td>\n<\/tr>\n
1176<\/td>\n19.3.6 MHF OpCode Demultiplexer
19.3.7 MHF Multiplexer
19.3.8 MHF Loopback Responder
19.3.9 MHF Continuity Check Receiver
19.3.10 MIP CCM Database
19.3.11 MHF Linktrace SAP
19.3.12 MHF Decapsulator Responder
19.3.13 MHF RFM Receiver
19.4 Maintenance Point addressing <\/td>\n<\/tr>\n
1177<\/td>\n19.5 Linktrace Output Multiplexer <\/td>\n<\/tr>\n
1178<\/td>\n19.6 Linktrace Responder <\/td>\n<\/tr>\n
1180<\/td>\n20. Connectivity Fault Management protocols <\/td>\n<\/tr>\n
1181<\/td>\n20.1 Continuity Check protocol <\/td>\n<\/tr>\n
1183<\/td>\n20.1.1 MAC status reporting in the CCM
20.1.2 Defects and Fault Alarms <\/td>\n<\/tr>\n
1184<\/td>\n20.1.3 CCM reception
20.2 Loopback protocol <\/td>\n<\/tr>\n
1185<\/td>\n20.2.1 Loopback Message transmission
20.2.2 Loopback Message reception and Loopback Reply transmission <\/td>\n<\/tr>\n
1186<\/td>\n20.2.3 Loopback Reply reception
20.3 Linktrace protocol <\/td>\n<\/tr>\n
1187<\/td>\n20.3.1 Linktrace Message origination <\/td>\n<\/tr>\n
1188<\/td>\n20.3.2 Linktrace Message reception, forwarding, and replying <\/td>\n<\/tr>\n
1189<\/td>\n20.3.3 Linktrace Reply reception <\/td>\n<\/tr>\n
1190<\/td>\n20.4 Connectivity Fault Management state machines
20.5 CFM state machine timers <\/td>\n<\/tr>\n
1191<\/td>\n20.5.1 LTFwhile <\/td>\n<\/tr>\n
1192<\/td>\n20.5.2 CCIwhile
20.5.3 errorCCMwhile
20.5.4 xconCCMwhile
20.5.5 LBIwhile
20.5.6 FNGwhile
20.5.7 mmCCMwhile
20.5.8 mmLocwhile
20.5.9 mmFNGwhile
20.5.10 rMEPwhile <\/td>\n<\/tr>\n
1193<\/td>\n20.6 CFM procedures
20.6.1 CCMtime()
20.7 Maintenance Domain variable
20.7.1 mdLevel
20.8 Maintenance Association variables
20.8.1 CCMinterval
20.9 MEP variables <\/td>\n<\/tr>\n
1194<\/td>\n20.9.1 MEPactive
20.9.2 enableRmepDefect <\/td>\n<\/tr>\n
1195<\/td>\n20.9.3 MAdefectIndication
20.9.4 allRMEPsDead
20.9.5 lowestAlarmPri
20.9.6 presentRDI
20.9.7 MEPprimaryVID
20.9.8 presentTraffic
20.9.9 presentmmLoc <\/td>\n<\/tr>\n
1196<\/td>\n20.9.10 ISpresentTraffic
20.9.11 ISpresentmmLoc
20.9.12 EpMEP
20.10 MEP Continuity Check Initiator variables
20.10.1 CCIenabled
20.10.2 CCIsentCCMs
20.10.3 MACstatusChanged
20.10.4 Npaths <\/td>\n<\/tr>\n
1197<\/td>\n20.10.5 flowHash[ ]
20.10.6 pathN
20.10.7 CCMcnt
20.11 MEP Continuity Check Initiator procedures
20.11.1 xmitCCM() <\/td>\n<\/tr>\n
1198<\/td>\n20.12 MEP Continuity Check Initiator state machine
20.13 MHF Continuity Check Receiver variables <\/td>\n<\/tr>\n
1199<\/td>\n20.13.1 MHFrecvdCCM
20.13.2 MHFCCMPDU
20.14 MHF Continuity Check Receiver procedures
20.14.1 MHFprocessCCM()
20.15 MHF Continuity Check Receiver state machine <\/td>\n<\/tr>\n
1200<\/td>\n20.16 MEP Continuity Check Receiver variables
20.16.1 CCMreceivedEqual
20.16.2 CCMequalPDU <\/td>\n<\/tr>\n
1201<\/td>\n20.16.3 CCMreceivedLow
20.16.4 CCMlowPDU
20.16.5 recvdMacAddress
20.16.6 recvdRDI
20.16.7 recvdInterval
20.16.8 recvdPortState
20.16.9 recvdInterfaceStatus
20.16.10 recvdSenderId
20.16.11 recvdFrame
20.16.12 CCMsequenceErrors <\/td>\n<\/tr>\n
1202<\/td>\n20.16.13 rcvdTrafficBit
20.17 MEP Continuity Check Receiver procedures
20.17.1 MEPprocessEqualCCM() <\/td>\n<\/tr>\n
1203<\/td>\n20.17.2 MEPprocessLowCCM()
20.18 MEP Continuity Check Receiver state machine
20.19 Remote MEP variables <\/td>\n<\/tr>\n
1204<\/td>\n20.19.1 rMEPCCMdefect
20.19.2 rMEPlastRDI and rMEPlastRDI[i]
20.19.3 rMEPlastPortState
20.19.4 rMEPlastInterfaceStatus
20.19.5 rMEPlastSenderId
20.19.6 rCCMreceived
20.19.7 rMEPmacAddress
20.19.8 rMEPportStatusDefect <\/td>\n<\/tr>\n
1205<\/td>\n20.19.9 rMEPinterfaceStatusDefect
20.19.10 lastPathN
20.20 Remote MEP state machine
20.21 Remote MEP Error variables
20.21.1 errorCCMreceived
20.21.2 errorCCMlastFailure
20.21.3 errorCCMdefect
20.22 Remote MEP Error state machine <\/td>\n<\/tr>\n
1206<\/td>\n20.23 MEP Cross Connect variables
20.23.1 xconCCMreceived <\/td>\n<\/tr>\n
1207<\/td>\n20.23.2 xconCCMlastFailure
20.23.3 xconCCMdefect
20.24 MEP Cross Connect state machine
20.25 MEP Mismatch variables <\/td>\n<\/tr>\n
1208<\/td>\n20.25.1 mmCCMreceived
20.25.2 mmCCMdefect
20.25.3 mmCCMTime
20.25.4 disableLocdefect <\/td>\n<\/tr>\n
1209<\/td>\n20.25.5 mmLocdefect
20.26 MEP Mismatch state machines
20.27 MP Loopback Responder variables
20.27.1 LBMreceived <\/td>\n<\/tr>\n
1210<\/td>\n20.27.2 LBMPDU
20.28 MP Loopback Responder procedures
20.28.1 ProcessLBM() <\/td>\n<\/tr>\n
1211<\/td>\n20.28.2 xmitLBR()
20.29 MP Loopback Responder state machine
20.30 MEP Loopback Initiator variables <\/td>\n<\/tr>\n
1212<\/td>\n20.30.1 LBMsToSend
20.30.2 nextLBMtransID
20.30.3 expectedLBRtransID
20.30.4 LBIactive
20.30.5 xmitReady <\/td>\n<\/tr>\n
1213<\/td>\n20.30.6 LBRreceived
20.30.7 LBRPDU
20.31 MEP Loopback Initiator transmit procedures
20.31.1 xmitLBM()
20.32 MEP Loopback Initiator transmit state machine <\/td>\n<\/tr>\n
1214<\/td>\n20.33 MEP Loopback Initiator receive procedures
20.33.1 ProcessLBR() <\/td>\n<\/tr>\n
1215<\/td>\n20.34 MEP Loopback Initiator receive state machine
20.35 MEP Fault Notification Generator variables
20.35.1 fngPriority <\/td>\n<\/tr>\n
1216<\/td>\n20.35.2 fngDefect
20.35.3 fngAlarmTime
20.35.4 fngResetTime
20.35.5 someRMEPCCMdefect
20.35.6 someMACstatusDefect
20.35.7 someRDIdefect
20.35.8 highestDefectPri
20.35.9 highestDefect <\/td>\n<\/tr>\n
1217<\/td>\n20.36 MEP Fault Notification Generator procedures
20.36.1 xmitFaultAlarm()
20.37 MEP Fault Notification Generator state machine <\/td>\n<\/tr>\n
1218<\/td>\n20.38 MEP Mismatch Fault Notification Generator variables
20.38.1 mfngAllowed
20.38.2 mmdefectIndication
20.38.3 mfngAlarmTime
20.38.4 mfngResetTime
20.39 MEP Mismatch Fault Notification Generator procedures
20.39.1 xmitFaultAlarm()
20.40 MEP Mismatch Fault Notification Generator state machine <\/td>\n<\/tr>\n
1219<\/td>\n20.41 MEP Linktrace Initiator variables
20.41.1 nextLTMtransID
20.41.2 ltmReplyList <\/td>\n<\/tr>\n
1221<\/td>\n20.42 MEP Linktrace Initiator procedures
20.42.1 xmitLTM() <\/td>\n<\/tr>\n
1222<\/td>\n20.43 MEP Linktrace Initiator receive variables
20.43.1 LTRreceived
20.43.2 LTRPDU <\/td>\n<\/tr>\n
1223<\/td>\n20.44 MEP Linktrace Initiator receive procedures
20.44.1 ProcessLTR()
20.45 MEP Linktrace Initiator receive state machine
20.46 Linktrace Responder variables <\/td>\n<\/tr>\n
1224<\/td>\n20.46.1 nPendingLTRs
20.46.2 LTMreceived
20.46.3 LTMPDU
20.47 LTM Receiver procedures
20.47.1 ProcessLTM() <\/td>\n<\/tr>\n
1228<\/td>\n20.47.2 clearPendingLTRs()
20.47.3 ForwardLTM() <\/td>\n<\/tr>\n
1229<\/td>\n20.47.4 enqueLTR() <\/td>\n<\/tr>\n
1230<\/td>\n20.48 LTM Receiver state machine
20.49 LTR Transmitter procedure
20.49.1 xmitOldestLTR() <\/td>\n<\/tr>\n
1231<\/td>\n20.50 LTR Transmitter state machine
20.51 CFM PDU validation and versioning <\/td>\n<\/tr>\n
1232<\/td>\n20.51.1 Goals of CFM PDU versioning
20.51.2 PDU transmission
20.51.3 PDU validation
20.51.4 Validation pass <\/td>\n<\/tr>\n
1234<\/td>\n20.51.5 Execution pass
20.51.6 Future extensions <\/td>\n<\/tr>\n
1235<\/td>\n20.52 PDU identification
20.53 Use of transaction IDs and sequence numbers <\/td>\n<\/tr>\n
1236<\/td>\n21. Encoding of CFM Protocol Data Units
21.1 Structure, representation, and encoding
21.2 CFM encapsulation <\/td>\n<\/tr>\n
1237<\/td>\n21.3 CFM request and indication parameters
21.3.1 destination_address parameter
21.3.2 source_address parameter <\/td>\n<\/tr>\n
1238<\/td>\n21.4 Common CFM Header
21.4.1 MD Level
21.4.2 Version
21.4.3 OpCode
21.4.4 Flags
21.4.5 First TLV Offset <\/td>\n<\/tr>\n
1239<\/td>\n21.5 TLV Format
21.5.1 General format for CFM TLVs <\/td>\n<\/tr>\n
1240<\/td>\n21.5.2 Organization-Specific TLV <\/td>\n<\/tr>\n
1241<\/td>\n21.5.3 Sender ID TLV <\/td>\n<\/tr>\n
1242<\/td>\n21.5.4 Port Status TLV <\/td>\n<\/tr>\n
1243<\/td>\n21.5.5 Interface Status TLV <\/td>\n<\/tr>\n
1244<\/td>\n21.5.6 Data TLV
21.5.7 End TLV
21.6 Continuity Check Message format <\/td>\n<\/tr>\n
1245<\/td>\n21.6.1 Flags <\/td>\n<\/tr>\n
1246<\/td>\n21.6.2 First TLV Offset
21.6.3 Sequence Number
21.6.4 Maintenance association End Point Identifier
21.6.5 Maintenance Association Identifier <\/td>\n<\/tr>\n
1249<\/td>\n21.6.6 Defined by ITU-T Y.1731 (02\/2008)
21.6.7 Optional CCM TLVs
21.7 Loopback Message and Loopback Reply formats
21.7.1 Flags <\/td>\n<\/tr>\n
1250<\/td>\n21.7.2 First TLV Offset
21.7.3 Loopback Transaction Identifier
21.7.4 Additional LBM\/LBR TLVs
21.7.5 PBB-TE MIP TLV <\/td>\n<\/tr>\n
1251<\/td>\n21.8 Linktrace Message Format
21.8.1 Flags <\/td>\n<\/tr>\n
1252<\/td>\n21.8.2 First TLV Offset
21.8.3 LTM Transaction Identifier
21.8.4 LTM TTL
21.8.5 Original MAC Address
21.8.6 Target MAC Address
21.8.7 Additional LTM TLVs <\/td>\n<\/tr>\n
1253<\/td>\n21.8.8 LTM Egress Identifier TLV
21.9 Linktrace Reply Format <\/td>\n<\/tr>\n
1254<\/td>\n21.9.1 Flags
21.9.2 First TLV Offset
21.9.3 LTR Transaction Identifier
21.9.4 Reply TTL
21.9.5 Relay Action <\/td>\n<\/tr>\n
1255<\/td>\n21.9.6 Additional LTR TLVs
21.9.7 LTR Egress Identifier TLV
21.9.8 Reply Ingress TLV <\/td>\n<\/tr>\n
1257<\/td>\n21.9.9 Reply Egress TLV <\/td>\n<\/tr>\n
1259<\/td>\n22. Connectivity Fault Management in systems
22.1 CFM shims in Bridges
22.1.1 Preliminary positioning of Maintenance Points <\/td>\n<\/tr>\n
1260<\/td>\n22.1.2 CFM and the Forwarding Process <\/td>\n<\/tr>\n
1262<\/td>\n22.1.3 Up\/Down separation of Maintenance Points <\/td>\n<\/tr>\n
1264<\/td>\n22.1.4 Service instances over multiple Bridges <\/td>\n<\/tr>\n
1266<\/td>\n22.1.5 Multiple VID service instances
22.1.6 Untagged CFM PDUs
22.1.7 Maintenance Points and non-VLAN aware Bridges
22.1.8 Maintenance Points and other standards <\/td>\n<\/tr>\n
1269<\/td>\n22.1.9 CFM and IEEE 802.3-2012 Clause 57 OAM
22.2 Maintenance Entity creation <\/td>\n<\/tr>\n
1270<\/td>\n22.2.1 Creating Maintenance Domains and Maintenance Associations
22.2.2 Creating MEPs <\/td>\n<\/tr>\n
1272<\/td>\n22.2.3 Creating MIPs <\/td>\n<\/tr>\n
1273<\/td>\n22.2.4 CFM configuration errors <\/td>\n<\/tr>\n
1274<\/td>\n22.3 MPs, Ports, and MD Level assignment
22.4 Stations and Connectivity Fault Management <\/td>\n<\/tr>\n
1275<\/td>\n22.5 Scalability of Connectivity Fault Management <\/td>\n<\/tr>\n
1276<\/td>\n22.6 CFM in Provider Bridges
22.6.1 Maintenance Points and C-VLAN components <\/td>\n<\/tr>\n
1277<\/td>\n22.6.2 Maintenance C-VLAN on a Port-based service interface <\/td>\n<\/tr>\n
1278<\/td>\n22.6.3 Maintenance C-VLAN on a C-tagged service interface
22.6.4 Maintenance Points and Port-mapping S-VLAN components <\/td>\n<\/tr>\n
1279<\/td>\n22.7 Management Port MEPs and CFM in the enterprise environment <\/td>\n<\/tr>\n
1281<\/td>\n22.8 Implementing CFM on Bridges that implement earlier revisions of IEEE Std 802.1Q <\/td>\n<\/tr>\n
1283<\/td>\n23. MAC status propagation <\/td>\n<\/tr>\n
1284<\/td>\n23.1 Model of operation <\/td>\n<\/tr>\n
1285<\/td>\n23.1.1 MAC Status Shim <\/td>\n<\/tr>\n
1286<\/td>\n23.1.2 Relationship of Connectivity Fault Management to the MAC Status Shim
23.2 MAC status protocol (MSP) overview <\/td>\n<\/tr>\n
1290<\/td>\n23.3 MAC status protocol state machines <\/td>\n<\/tr>\n
1292<\/td>\n23.4 State machine timers
23.4.1 linkNotifyWhen
23.4.2 linkNotifyWhile
23.4.3 macNotifyWhile
23.4.4 macRecoverWhile
23.5 MSP performance parameters
23.5.1 LinkNotify <\/td>\n<\/tr>\n
1293<\/td>\n23.5.2 LinkNotifyWait
23.5.3 LinkNotifyRetry
23.5.4 MACNotify
23.5.5 MACNotifyTime
23.5.6 MACRecoverTime
23.6 State machine variables
23.6.1 BEGIN
23.6.2 addConfirmed
23.6.3 disableMAC
23.6.4 disabledMAC
23.6.5 disableMSS
23.6.6 lossConfirmed <\/td>\n<\/tr>\n
1294<\/td>\n23.6.7 macOperational
23.6.8 mssOperational
23.6.9 prop
23.6.10 rxAck
23.6.11 rxAdd
23.6.12 rxAddConfirm
23.6.13 rxLoss
23.6.14 rxLossConfirm
23.6.15 txAck
23.6.16 txAdd
23.6.17 txAddConfirm
23.6.18 txLoss <\/td>\n<\/tr>\n
1295<\/td>\n23.6.19 txLossConfirm
23.7 State machine procedures
23.8 Status Transition state machine
23.9 Status Notification state machine
23.10 Receive Process <\/td>\n<\/tr>\n
1296<\/td>\n23.11 Transmit Process
23.12 Management of MSP <\/td>\n<\/tr>\n
1297<\/td>\n23.13 MSPDU transmission, addressing, and protocol identification
23.13.1 Destination MAC Address
23.13.2 Source MAC Address
23.13.3 Priority <\/td>\n<\/tr>\n
1298<\/td>\n23.13.4 EtherType use and encoding
23.14 Representation and encoding of octets
23.15 MSPDU structure
23.15.1 Protocol Version <\/td>\n<\/tr>\n
1299<\/td>\n23.15.2 Packet Type
23.16 Validation of received MSPDUs
23.17 Other MSP participants <\/td>\n<\/tr>\n
1300<\/td>\n24. Bridge performance
24.1 Guaranteed Port Filtering Rate
24.2 Guaranteed Bridge Relaying Rate
24.3 RSTP performance requirements <\/td>\n<\/tr>\n
1302<\/td>\n25. Support of the MAC Service by Provider Backbone Bridged Networks <\/td>\n<\/tr>\n
1304<\/td>\n25.1 Service transparency
25.2 Customer service interface <\/td>\n<\/tr>\n
1305<\/td>\n25.3 Port-based service interface <\/td>\n<\/tr>\n
1306<\/td>\n25.4 S-tagged service interface <\/td>\n<\/tr>\n
1308<\/td>\n25.5 I-tagged service interface <\/td>\n<\/tr>\n
1310<\/td>\n25.6 Service instance segregation
25.7 Service instance selection and identification <\/td>\n<\/tr>\n
1311<\/td>\n25.8 Service priority and drop eligibility selection
25.9 Service access protection <\/td>\n<\/tr>\n
1313<\/td>\n25.9.1 Class II redundant LANs access protection <\/td>\n<\/tr>\n
1314<\/td>\n25.9.2 Class III simple redundant LANs and nodes access protection <\/td>\n<\/tr>\n
1315<\/td>\n25.10 Support of the MAC Service by a PBB-TE Region <\/td>\n<\/tr>\n
1316<\/td>\n25.10.1 Provisioning TESIs <\/td>\n<\/tr>\n
1317<\/td>\n25.10.2 ESP forwarding behavior <\/td>\n<\/tr>\n
1318<\/td>\n25.11 Transparent service interface <\/td>\n<\/tr>\n
1320<\/td>\n26. Principles of Provider Backbone Bridged Network operation
26.1 Provider Backbone Bridged Network overview <\/td>\n<\/tr>\n
1321<\/td>\n26.2 Provider Backbone Bridged Network example <\/td>\n<\/tr>\n
1323<\/td>\n26.3 Backbone VLAN connectivity <\/td>\n<\/tr>\n
1324<\/td>\n26.4 Backbone addressing
26.4.1 Learning individual backbone addresses at a PIP <\/td>\n<\/tr>\n
1325<\/td>\n26.4.2 Translating backbone destination addresses at a CBP
26.4.3 Backbone addressing considerations for CFM Maintenance Points <\/td>\n<\/tr>\n
1326<\/td>\n26.5 Detection of connectivity loops through attached networks
26.6 Scaling of Provider Backbone Bridges
26.6.1 Hierarchal PBBNs <\/td>\n<\/tr>\n
1327<\/td>\n26.6.2 Peer PBBNs
26.7 Network Management
26.8 Connectivity Fault Management in Provider Backbone Bridges <\/td>\n<\/tr>\n
1333<\/td>\n26.8.1 CFM over Port-based and S-tagged Service Interfaces <\/td>\n<\/tr>\n
1334<\/td>\n26.8.2 Connectivity Fault Management over I-tagged Service Interfaces
26.8.3 Connectivity Fault Management over hierarchal E-NNI
26.8.4 Connectivity Fault Management over peer E-NNI <\/td>\n<\/tr>\n
1335<\/td>\n26.9 Connectivity Fault Management in a PBB-TE Region
26.9.1 Addressing PBB-TE MEPs
26.9.2 TESI identification <\/td>\n<\/tr>\n
1336<\/td>\n26.9.3 PBB-TE MEP placement in a Bridge Port
26.9.4 PBB-TE MIP placement in a Bridge Port
26.9.5 TESI Maintenance Domains <\/td>\n<\/tr>\n
1337<\/td>\n26.9.6 PBB-TE enhancements of the CFM protocols <\/td>\n<\/tr>\n
1339<\/td>\n26.9.7 Addressing Infrastructure Segment MEPs
26.9.8 Infrastructure Segment identification <\/td>\n<\/tr>\n
1340<\/td>\n26.9.9 Infrastructure Segment MEP placement in a Bridge Port
26.9.10 Infrastructure Segment Maintenance Domains
26.9.11 IPS extensions to Continuity Check operation <\/td>\n<\/tr>\n
1342<\/td>\n26.10 Protection switching for point-to-point TESIs
26.10.1 Introduction <\/td>\n<\/tr>\n
1343<\/td>\n26.10.2 1:1 point-to-point TESI protection switching <\/td>\n<\/tr>\n
1345<\/td>\n26.10.3 Protection Switching state machines <\/td>\n<\/tr>\n
1351<\/td>\n26.11 Infrastructure Protection Switching in PBB-TE Region <\/td>\n<\/tr>\n
1352<\/td>\n26.11.1 Infrastructure Segment monitoring <\/td>\n<\/tr>\n
1353<\/td>\n26.11.2 1:1 IPS <\/td>\n<\/tr>\n
1356<\/td>\n26.11.3 IPS Control entity <\/td>\n<\/tr>\n
1357<\/td>\n26.11.4 1:1 IPS state machines
26.11.5 M:1 IPS <\/td>\n<\/tr>\n
1363<\/td>\n26.12 Mismatch defect <\/td>\n<\/tr>\n
1364<\/td>\n26.13 Signaling VLAN registrations among I-components <\/td>\n<\/tr>\n
1365<\/td>\n27. Shortest Path Bridging (SPB) <\/td>\n<\/tr>\n
1367<\/td>\n27.1 Protocol design requirements <\/td>\n<\/tr>\n
1368<\/td>\n27.2 Protocol support <\/td>\n<\/tr>\n
1369<\/td>\n27.3 Protocol design goals
27.4 ISIS-SPB VLAN configuration <\/td>\n<\/tr>\n
1371<\/td>\n27.4.1 SPT Region and ISIS-SPB adjacency determination <\/td>\n<\/tr>\n
1372<\/td>\n27.5 ISIS-SPB information <\/td>\n<\/tr>\n
1373<\/td>\n27.6 Calculating CIST connectivity <\/td>\n<\/tr>\n
1374<\/td>\n27.7 Connectivity between regions in the same domain
27.8 Calculating SPT connectivity <\/td>\n<\/tr>\n
1375<\/td>\n27.8.1 ISIS-SPB overload
27.9 Loop prevention <\/td>\n<\/tr>\n
1376<\/td>\n27.10 SPVID and SPSourceID allocation <\/td>\n<\/tr>\n
1377<\/td>\n27.11 Allocation of VIDs to FIDs <\/td>\n<\/tr>\n
1378<\/td>\n27.12 SPBV SPVID translation
27.13 VLAN topology management <\/td>\n<\/tr>\n
1379<\/td>\n27.14 Individual addresses and SPBM <\/td>\n<\/tr>\n
1380<\/td>\n27.14.1 Loop mitigation
27.14.2 Loop prevention <\/td>\n<\/tr>\n
1381<\/td>\n27.15 SPBM group addressing <\/td>\n<\/tr>\n
1382<\/td>\n27.16 Backbone service instance topology management <\/td>\n<\/tr>\n
1383<\/td>\n27.17 Equal cost shortest paths, ECTs, and load spreading
27.18 Connectivity Fault Management for SPBM <\/td>\n<\/tr>\n
1384<\/td>\n27.18.1 SPBM Maintenance Association types
27.18.2 SPBM MEP placement in a Bridge Port
27.18.3 SPBM MIP placement in a Bridge Port
27.18.4 SPBM modifications of the CFM protocols <\/td>\n<\/tr>\n
1386<\/td>\n27.19 Using SPBV and SPBM
27.19.1 Shortest Path Bridging\u2014VID <\/td>\n<\/tr>\n
1388<\/td>\n27.19.2 Shortest Path Bridging\u2014MAC <\/td>\n<\/tr>\n
1390<\/td>\n27.20 Security considerations <\/td>\n<\/tr>\n
1391<\/td>\n28. ISIS-SPB Link State Protocol
28.1 ISIS-SPB control plane MAC <\/td>\n<\/tr>\n
1392<\/td>\n28.2 Formation and maintenance of ISIS-SPB adjacencies <\/td>\n<\/tr>\n
1393<\/td>\n28.3 Loop prevention
28.4 The Agreement Digest <\/td>\n<\/tr>\n
1394<\/td>\n28.4.1 Agreement Digest Format Identifier
28.4.2 Agreement Digest Format Capabilities
28.4.3 Agreement Digest Convention Identifier
28.4.4 Agreement Digest Convention Capabilities <\/td>\n<\/tr>\n
1395<\/td>\n28.4.5 Agreement Digest Edge Count
28.4.6 The Computed Topology Digest <\/td>\n<\/tr>\n
1396<\/td>\n28.5 Symmetric shortest path tie breaking <\/td>\n<\/tr>\n
1397<\/td>\n28.6 Symmetric ECT framework <\/td>\n<\/tr>\n
1398<\/td>\n28.7 Symmetric ECT <\/td>\n<\/tr>\n
1399<\/td>\n28.8 ECT Algorithm details <\/td>\n<\/tr>\n
1400<\/td>\n28.9 ECT Migration
28.9.1 Use of a new ECT Algorithm in SPBV <\/td>\n<\/tr>\n
1401<\/td>\n28.9.2 Use of a new ECT Algorithm in SPBM <\/td>\n<\/tr>\n
1402<\/td>\n28.10 MAC Address registration
28.11 Circuit IDs and Port Identifiers <\/td>\n<\/tr>\n
1403<\/td>\n28.12 ISIS-SPB TLVs
28.12.1 MT-Capability TLV
28.12.2 SPB MCID sub-TLV <\/td>\n<\/tr>\n
1404<\/td>\n28.12.3 SPB Digest sub-TLV <\/td>\n<\/tr>\n
1405<\/td>\n28.12.4 SPB Base VLAN-Identifiers sub-TLV <\/td>\n<\/tr>\n
1406<\/td>\n28.12.5 SPB Instance sub-TLV <\/td>\n<\/tr>\n
1407<\/td>\n28.12.6 SPB Instance Opaque ECT Algorithm sub-TLV <\/td>\n<\/tr>\n
1409<\/td>\n28.12.7 SPB Link Metric sub-TLV <\/td>\n<\/tr>\n
1410<\/td>\n28.12.8 SPB Adjacency Opaque ECT Algorithm sub-TLV
28.12.9 SPBV MAC address sub-TLV <\/td>\n<\/tr>\n
1412<\/td>\n28.12.10 SPBM Service Identifier and Unicast Address (ISID-ADDR) sub-TLV <\/td>\n<\/tr>\n
1414<\/td>\n29. DDCFM operations and protocols
29.1 Principles of DDCFM operation
29.1.1 Data-driven and data-dependent faults (DDFs)
29.1.2 Basic principle to diagnose and isolate DDFs <\/td>\n<\/tr>\n
1417<\/td>\n29.2 DDCFM Entity operation
29.2.1 DDCFM implementation <\/td>\n<\/tr>\n
1418<\/td>\n29.2.2 Forward Path Test Reflection Responder <\/td>\n<\/tr>\n
1419<\/td>\n29.2.3 Reflection Responder related parameters <\/td>\n<\/tr>\n
1420<\/td>\n29.2.4 Reflection Target and RFM Receiver
29.2.5 Return path test related parameters <\/td>\n<\/tr>\n
1421<\/td>\n29.2.6 Decapsulator Responder <\/td>\n<\/tr>\n
1422<\/td>\n29.2.7 SFM Originator
29.3 DDCFM protocols
29.3.1 Reflection Responder variables <\/td>\n<\/tr>\n
1424<\/td>\n29.3.2 RR Filter Procedures <\/td>\n<\/tr>\n
1425<\/td>\n29.3.3 RR Encapsulation Procedures <\/td>\n<\/tr>\n
1426<\/td>\n29.3.4 RR Transmit procedure <\/td>\n<\/tr>\n
1427<\/td>\n29.3.5 Reflection Responder related state machines <\/td>\n<\/tr>\n
1428<\/td>\n29.3.6 RFM Receiver variables <\/td>\n<\/tr>\n
1429<\/td>\n29.3.7 RFM Receiver procedure <\/td>\n<\/tr>\n
1430<\/td>\n29.3.8 Decapsulator Responder variables
29.3.9 Decapsulator Responder procedures <\/td>\n<\/tr>\n
1432<\/td>\n29.3.10 Decapsulator Responder state machine
29.4 Encoding of DDCFM Protocol Data Units
29.4.1 RFM and SFM Header
29.4.2 RFM format <\/td>\n<\/tr>\n
1433<\/td>\n29.4.3 SFM format <\/td>\n<\/tr>\n
1435<\/td>\n30. Principles of congestion notification
30.1 Congestion notification design requirements <\/td>\n<\/tr>\n
1437<\/td>\n30.2 Quantized Congestion Notification protocol <\/td>\n<\/tr>\n
1438<\/td>\n30.2.1 The CP Algorithm <\/td>\n<\/tr>\n
1439<\/td>\n30.2.2 Basic Reaction Point algorithm <\/td>\n<\/tr>\n
1440<\/td>\n30.2.3 RP algorithm with timer <\/td>\n<\/tr>\n
1441<\/td>\n30.3 Congestion Controlled Flow <\/td>\n<\/tr>\n
1442<\/td>\n30.4 Congestion Notification Priority Value
30.5 Congestion Notification Tag
30.6 Congestion Notification Domain <\/td>\n<\/tr>\n
1443<\/td>\n30.7 Multicast data <\/td>\n<\/tr>\n
1444<\/td>\n30.8 Congestion notification and additional tags <\/td>\n<\/tr>\n
1446<\/td>\n31. Congestion notification entity operation
31.1 Congestion aware Bridge Forwarding Process
31.1.1 Congestion Point <\/td>\n<\/tr>\n
1447<\/td>\n31.1.2 Congestion Point ingress multiplexer
31.2 Congestion aware end station functions <\/td>\n<\/tr>\n
1448<\/td>\n31.2.1 Output flow segregation <\/td>\n<\/tr>\n
1449<\/td>\n31.2.2 Per-CNPV station function <\/td>\n<\/tr>\n
1451<\/td>\n31.2.3 Flow Select Database
31.2.4 Flow multiplexer
31.2.5 CNM demultiplexer
31.2.6 Input flow segregation <\/td>\n<\/tr>\n
1452<\/td>\n31.2.7 End station input queue
31.2.8 Reception selection <\/td>\n<\/tr>\n
1453<\/td>\n32. Congestion notification protocol
32.1 Congestion Notification Domain operations
32.1.1 Congestion Notification Domain defense <\/td>\n<\/tr>\n
1455<\/td>\n32.1.2 Automatic Congestion Notification Domain recognition
32.1.3 Variables controlling Congestion Notification Domain defense <\/td>\n<\/tr>\n
1456<\/td>\n32.2 CN component variables <\/td>\n<\/tr>\n
1457<\/td>\n32.2.1 cngMasterEnable
32.2.2 cngCnmTransmitPriority
32.2.3 cngDiscardedFrames
32.2.4 cngErroredPortList
32.3 Congestion notification per-CNPV variables
32.3.1 cncpDefModeChoice <\/td>\n<\/tr>\n
1458<\/td>\n32.3.2 cncpAlternatePriority
32.3.3 cncpAutoAltPri
32.3.4 cncpAdminDefenseMode
32.3.5 cncpCreation
32.3.6 cncpLldpInstanceChoice
32.3.7 cncpLldpInstanceSelector <\/td>\n<\/tr>\n
1459<\/td>\n32.4 CND defense per-Port per-CNPV variables
32.4.1 cnpdDefModeChoice
32.4.2 cnpdAdminDefenseMode <\/td>\n<\/tr>\n
1460<\/td>\n32.4.3 cnpdAutoDefenseMode
32.4.4 cnpdLldpInstanceChoice
32.4.5 cnpdLldpInstanceSelector
32.4.6 cnpdAlternatePriority
32.4.7 cnpdXmitCnpvCapable
32.4.8 cnpdXmitReady <\/td>\n<\/tr>\n
1461<\/td>\n32.4.9 cncpDoesEdge
32.4.10 cnpdAcceptsCnTag
32.4.11 cnpdRcvdCnpv
32.4.12 cnpdRcvdReady
32.4.13 cnpdIsAdminDefMode <\/td>\n<\/tr>\n
1462<\/td>\n32.4.14 cnpdDefenseMode
32.5 Congestion Notification Domain defense procedures
32.5.1 DisableCnpvRemapping()
32.5.2 TurnOnCnDefenses()
32.5.3 TurnOffCnDefenses() <\/td>\n<\/tr>\n
1463<\/td>\n32.6 Congestion Notification Domain defense state machine
32.7 Congestion notification protocol <\/td>\n<\/tr>\n
1464<\/td>\n32.8 Congestion Point variables <\/td>\n<\/tr>\n
1465<\/td>\n32.8.1 cpMacAddress
32.8.2 cpId
32.8.3 cpQSp
32.8.4 cpQLen
32.8.5 cpQLenOld
32.8.6 cpW
32.8.7 cpQOffset
32.8.8 cpQDelta <\/td>\n<\/tr>\n
1466<\/td>\n32.8.9 cpFb
32.8.10 cpEnqued
32.8.11 cpSampleBase
32.8.12 cpDiscardedFrames
32.8.13 cpTransmittedFrames
32.8.14 cpTransmittedCnms
32.8.15 cpMinHeaderOctets
32.9 Congestion Point procedures <\/td>\n<\/tr>\n
1467<\/td>\n32.9.1 Random
32.9.2 NewCpSampleBase()
32.9.3 EM_UNITDATA.request (parameters) <\/td>\n<\/tr>\n
1468<\/td>\n32.9.4 GenerateCnmPdu() <\/td>\n<\/tr>\n
1469<\/td>\n32.10 Reaction Point per-Port per-CNPV variables
32.10.1 rpppMaxRps
32.10.2 rpppCreatedRps
32.10.3 rpppRpCentiseconds
32.11 Reaction Point group variables <\/td>\n<\/tr>\n
1470<\/td>\n32.11.1 rpgEnable
32.11.2 rpgTimeReset
32.11.3 rpgByteReset
32.11.4 rpgThreshold
32.11.5 rpgMaxRate
32.11.6 rpgAiRate
32.11.7 rpgHaiRate
32.11.8 rpgGd
32.11.9 rpgMinDecFac <\/td>\n<\/tr>\n
1471<\/td>\n32.11.10 rpgMinRate
32.12 Reaction Point timer
32.12.1 RpWhile
32.13 Reaction Point variables
32.13.1 rpEnabled
32.13.2 rpByteCount
32.13.3 rpByteStage <\/td>\n<\/tr>\n
1472<\/td>\n32.13.4 rpTimeStage
32.13.5 rpTargetRate
32.13.6 rpCurrentRate
32.13.7 rpFreeze
32.13.8 rpLimiterRate
32.13.9 rpFb
32.14 Reaction Point procedures <\/td>\n<\/tr>\n
1473<\/td>\n32.14.1 ResetCnm
32.14.2 TestRpTerminate
32.14.3 TransmitDataFrame
32.14.4 ReceiveCnm <\/td>\n<\/tr>\n
1474<\/td>\n32.14.5 ProcessCnm
32.14.6 AdjustRates
32.15 RP rate control state machine <\/td>\n<\/tr>\n
1476<\/td>\n32.16 Congestion notification and encapsulation interworking function <\/td>\n<\/tr>\n
1478<\/td>\n33. Encoding of congestion notification Protocol Data Units
33.1 Structure, representation, and encoding
33.2 Congestion Notification Tag format <\/td>\n<\/tr>\n
1479<\/td>\n33.2.1 Flow Identifier
33.3 Congestion Notification Message <\/td>\n<\/tr>\n
1480<\/td>\n33.4 Congestion Notification Message PDU format
33.4.1 Version
33.4.2 ReservedV <\/td>\n<\/tr>\n
1481<\/td>\n33.4.3 Quantized Feedback
33.4.4 Congestion Point Identifier
33.4.5 cnmQOffset
33.4.6 cnmQDelta
33.4.7 Encapsulated priority
33.4.8 Encapsulated destination MAC address
33.4.9 Encapsulated MSDU length
33.4.10 Encapsulated MSDU <\/td>\n<\/tr>\n
1482<\/td>\n33.4.11 CNM Validation <\/td>\n<\/tr>\n
1483<\/td>\n34. Forwarding and queuing for time-sensitive streams
34.1 Overview
34.2 Detection of SRP domains <\/td>\n<\/tr>\n
1484<\/td>\n34.3 The bandwidth availability parameters
34.3.1 Relationships among bandwidth availability parameters <\/td>\n<\/tr>\n
1485<\/td>\n34.3.2 Bandwidth availability parameter management
34.4 Deriving actual bandwidth requirements from the size of the MSDU <\/td>\n<\/tr>\n
1486<\/td>\n34.5 Mapping priorities to traffic classes for time-sensitive streams <\/td>\n<\/tr>\n
1488<\/td>\n34.6 End station behavior
34.6.1 Talker behavior <\/td>\n<\/tr>\n
1489<\/td>\n34.6.2 Listener behavior <\/td>\n<\/tr>\n
1490<\/td>\n35. Stream Reservation Protocol (SRP) <\/td>\n<\/tr>\n
1491<\/td>\n35.1 Multiple Stream Registration Protocol (MSRP) <\/td>\n<\/tr>\n
1492<\/td>\n35.1.1 MSRP and Shared Media
35.1.2 Behavior of end stations <\/td>\n<\/tr>\n
1494<\/td>\n35.1.3 Behavior of Bridges
35.1.4 Stream Reservation Protocol (SRP) Domains and status parameters
35.2 Definition of the MSRP application <\/td>\n<\/tr>\n
1495<\/td>\n35.2.1 Definition of internal state variables <\/td>\n<\/tr>\n
1497<\/td>\n35.2.2 Definition of MRP elements <\/td>\n<\/tr>\n
1508<\/td>\n35.2.3 Provision and support of Stream registration service <\/td>\n<\/tr>\n
1512<\/td>\n35.2.4 MSRP Attribute Propagation <\/td>\n<\/tr>\n
1516<\/td>\n35.2.5 Operational reporting and statistics
35.2.6 Encoding <\/td>\n<\/tr>\n
1517<\/td>\n35.2.7 Attribute value support requirements <\/td>\n<\/tr>\n
1518<\/td>\n36. Priority-based Flow Control
36.1 Priority-based Flow Control operation
36.1.1 Overview <\/td>\n<\/tr>\n
1519<\/td>\n36.1.2 PFC primitives <\/td>\n<\/tr>\n
1520<\/td>\n36.1.3 Detailed specification of PFC operation <\/td>\n<\/tr>\n
1521<\/td>\n36.2 PFC aware system queue functions <\/td>\n<\/tr>\n
1522<\/td>\n36.2.1 PFC Initiator
36.2.2 PFC Receiver <\/td>\n<\/tr>\n
1524<\/td>\n37. Enhanced Transmission Selection (ETS)
37.1 Overview
37.1.1 Relationship to other transmission selection algorithms
37.2 ETS configuration parameters
37.3 ETS algorithm <\/td>\n<\/tr>\n
1525<\/td>\n37.4 Legacy configuration <\/td>\n<\/tr>\n
1526<\/td>\n38. Data Center Bridging eXchange Protocol (DCBX)
38.1 Overview
38.2 Goals
38.3 Types of DCBX attributes
38.3.1 Informational attributes
38.4 DCBX and LLDP <\/td>\n<\/tr>\n
1527<\/td>\n38.4.1 Asymmetric attribute passing <\/td>\n<\/tr>\n
1528<\/td>\n38.4.2 Symmetric attribute passing <\/td>\n<\/tr>\n
1530<\/td>\n39. Multiple I-SID Registration Protocol
39.1 MIRP overview <\/td>\n<\/tr>\n
1531<\/td>\n39.1.1 Behavior of I-components <\/td>\n<\/tr>\n
1532<\/td>\n39.1.2 Behavior of B-components
39.2 Definition of the MIRP application
39.2.1 Definition of MRP protocol elements <\/td>\n<\/tr>\n
1535<\/td>\n39.2.2 Alternate MIRP model for B-components <\/td>\n<\/tr>\n
1537<\/td>\n39.2.3 Use of \u201cnew\u201d declaration capability
39.2.4 Attribute value support requirements
39.2.5 MRP Message filtering <\/td>\n<\/tr>\n
1538<\/td>\n40. Edge Virtual Bridging (EVB) <\/td>\n<\/tr>\n
1540<\/td>\n40.1 EVB architecture without S-channels <\/td>\n<\/tr>\n
1541<\/td>\n40.2 EVB architecture with S-channels <\/td>\n<\/tr>\n
1543<\/td>\n40.3 Asymmetric EVB architecture without S-channels
40.4 EVB status parameters <\/td>\n<\/tr>\n
1544<\/td>\n40.4.1 EVBMode = Not supported
40.4.2 EVBMode = EVB Bridge
40.4.3 EVBMode = EVB station <\/td>\n<\/tr>\n
1546<\/td>\n41. VSI discovery and configuration protocol (VDP)
41.1 VSI manager ID TLV definition
41.1.1 TLV type
41.1.2 TLV information string length <\/td>\n<\/tr>\n
1547<\/td>\n41.1.3 VSI Manager ID
41.2 VDP association TLV definitions
41.2.1 TLV type <\/td>\n<\/tr>\n
1548<\/td>\n41.2.2 TLV information string length
41.2.3 Status
41.2.4 VSI Type ID (VTID)
41.2.5 VSI Type Version
41.2.6 VSIID format <\/td>\n<\/tr>\n
1549<\/td>\n41.2.7 VSIID
41.2.8 Filter Info format <\/td>\n<\/tr>\n
1550<\/td>\n41.2.9 Filter Info field <\/td>\n<\/tr>\n
1553<\/td>\n41.2.10 VDP TLV type and Status semantics <\/td>\n<\/tr>\n
1554<\/td>\n41.3 Organizationally defined TLV definitions
41.3.1 TLV type
41.3.2 TLV information string length
41.3.3 Organizationally unique identifier (OUI) or Company ID (CID)
41.3.4 Organizationally defined information
41.4 Validation rules for VDP TLVs <\/td>\n<\/tr>\n
1555<\/td>\n41.5 VDP state machines
41.5.1 State machine conventions
41.5.2 Bridge VDP state machine <\/td>\n<\/tr>\n
1556<\/td>\n41.5.3 Station VDP state machine <\/td>\n<\/tr>\n
1557<\/td>\n41.5.4 VDP state machine timers
41.5.5 VDP state machine variables and parameters <\/td>\n<\/tr>\n
1559<\/td>\n41.5.6 Command-Response TLV field references in state machines <\/td>\n<\/tr>\n
1560<\/td>\n41.5.7 VDP state machine procedures <\/td>\n<\/tr>\n
1562<\/td>\n42. S-Channel Discovery and Configuration Protocol (CDCP)
42.1 CDCP discovery and configuration
42.2 CDCP state machine overview <\/td>\n<\/tr>\n
1563<\/td>\n42.3 CDCP configuration state machine <\/td>\n<\/tr>\n
1564<\/td>\n42.4 CDCP configuration variables
42.4.1 AdminChnCap <\/td>\n<\/tr>\n
1565<\/td>\n42.4.2 AdminRole
42.4.3 AdminSVIDWants
42.4.4 LastLocalSVIDPool
42.4.5 LastRemoteSVIDList
42.4.6 LastSVIDWants
42.4.7 LocalSVIDPool
42.4.8 OperChnCap
42.4.9 OperRole <\/td>\n<\/tr>\n
1566<\/td>\n42.4.10 OperSVIDList
42.4.11 RemoteChnCap
42.4.12 RemoteRole
42.4.13 RemoteSVIDList
42.4.14 schState
42.5 CDCP configuration procedures
42.5.1 SetSVIDRequest (OperRole, AdminSVIDWants, OperSVIDList) <\/td>\n<\/tr>\n
1567<\/td>\n42.5.2 RxSVIDConfig (OperSVIDList, LastRemoteSVIDList)
42.5.3 TxSVIDConfig (OperChnCap, RemoteChnCap, LastLocalSVIDPool, RemoteSVIDList, OperSVIDList) <\/td>\n<\/tr>\n
1568<\/td>\n43. Edge Control Protocol (ECP)
43.1 Edge control protocol operation <\/td>\n<\/tr>\n
1569<\/td>\n43.2 Edge Control Sublayer Service (ECSS)
43.3 Edge control protocol (ECP) and state machine
43.3.1 State machine conventions
43.3.2 Overview <\/td>\n<\/tr>\n
1570<\/td>\n43.3.3 Edge control protocol data unit (ECPDU) <\/td>\n<\/tr>\n
1571<\/td>\n43.3.4 ECP transmit state machine
43.3.5 ECP receive state machine <\/td>\n<\/tr>\n
1572<\/td>\n43.3.6 ECP state machine timers <\/td>\n<\/tr>\n
1573<\/td>\n43.3.7 ECP state machine variables and parameters <\/td>\n<\/tr>\n
1574<\/td>\n43.3.8 ECP state machine procedures <\/td>\n<\/tr>\n
1575<\/td>\n44. Equal Cost Multiple Paths
44.1 SPBM ECMP
44.1.1 ECMP Operation <\/td>\n<\/tr>\n
1576<\/td>\n44.1.2 ECMP ECT Algorithm <\/td>\n<\/tr>\n
1578<\/td>\n44.1.3 Loop prevention for ECMP
44.2 Support for Flow Filtering <\/td>\n<\/tr>\n
1579<\/td>\n44.2.1 Flow filtering tag <\/td>\n<\/tr>\n
1580<\/td>\n44.2.2 F-TAG processing <\/td>\n<\/tr>\n
1581<\/td>\n44.2.3 Forwarding process extension for flow filtering <\/td>\n<\/tr>\n
1582<\/td>\n44.2.4 TTL Loop mitigation
44.2.5 Connectivity Fault Management for ECMP with flow filtering <\/td>\n<\/tr>\n
1584<\/td>\n44.2.6 Operation with selective support for flow filtering <\/td>\n<\/tr>\n
1585<\/td>\nAnnex A
PICS proforma\u2014Bridge implementations
A.1 Introduction
A.2 Abbreviations and special symbols
A.2.1 Status symbols
A.2.2 General abbreviations <\/td>\n<\/tr>\n
1586<\/td>\nA.3 Instructions for completing the PICS proforma
A.3.1 General structure of the PICS proforma
A.3.2 Additional information
A.3.3 Exception information <\/td>\n<\/tr>\n
1587<\/td>\nA.3.4 Conditional status <\/td>\n<\/tr>\n
1588<\/td>\nA.4 PICS proforma for IEEE Std 802.1Q\u2014Bridge implementations
A.4.1 Implementation identification
A.4.2 Protocol summary, IEEE Std 802.1Q <\/td>\n<\/tr>\n
1589<\/td>\nA.5 Major capabilities <\/td>\n<\/tr>\n
1593<\/td>\nA.6 Media Access Control methods
A.7 Relay and filtering of frames <\/td>\n<\/tr>\n
1595<\/td>\nA.8 Basic Filtering Services <\/td>\n<\/tr>\n
1596<\/td>\nA.9 Addressing <\/td>\n<\/tr>\n
1598<\/td>\nA.10 Rapid Spanning Tree Protocol <\/td>\n<\/tr>\n
1599<\/td>\nA.11 BPDU encoding <\/td>\n<\/tr>\n
1600<\/td>\nA.12 Implementation parameters <\/td>\n<\/tr>\n
1601<\/td>\nA.13 Performance
A.14 Bridge management <\/td>\n<\/tr>\n
1611<\/td>\nA.15 Remote management
A.16 Expedited traffic classes <\/td>\n<\/tr>\n
1612<\/td>\nA.17 Extended Filtering Services
A.18 Multiple Spanning Tree Protocol <\/td>\n<\/tr>\n
1614<\/td>\nA.19 VLAN support <\/td>\n<\/tr>\n
1618<\/td>\nA.20 MMRP <\/td>\n<\/tr>\n
1619<\/td>\nA.21 MVRP <\/td>\n<\/tr>\n
1620<\/td>\nA.22 MRP
A.23 Connectivity Fault Management <\/td>\n<\/tr>\n
1627<\/td>\nA.24 Management Information Base (MIB) <\/td>\n<\/tr>\n
1629<\/td>\nA.25 Protection Switching <\/td>\n<\/tr>\n
1630<\/td>\nA.26 Data-driven and data-dependent connectivity fault management
A.27 TPMR <\/td>\n<\/tr>\n
1631<\/td>\nA.28 MSP
A.29 Forwarding and queuing for time-sensitive streams <\/td>\n<\/tr>\n
1632<\/td>\nA.30 Congestion notification <\/td>\n<\/tr>\n
1633<\/td>\nA.31 Stream Reservation Protocol <\/td>\n<\/tr>\n
1636<\/td>\nA.32 MIRP <\/td>\n<\/tr>\n
1637<\/td>\nA.33 Priority-based Flow Control
A.34 Enhanced Transmission Selection <\/td>\n<\/tr>\n
1639<\/td>\nA.35 DCBX
A.36 Infrastructure Protection Switching (IPS)
A.37 Shortest Path Bridging <\/td>\n<\/tr>\n
1641<\/td>\nA.38 EVB Bridge <\/td>\n<\/tr>\n
1642<\/td>\nA.39 EVB station <\/td>\n<\/tr>\n
1644<\/td>\nA.40 Edge relay <\/td>\n<\/tr>\n
1646<\/td>\nA.41 VEB and VEPA edge relay components <\/td>\n<\/tr>\n
1647<\/td>\nA.42 VDP, CDCP, and ECP <\/td>\n<\/tr>\n
1648<\/td>\nAnnex B
PICS proforma\u2014End station implementations
B.1 Introduction
B.2 Abbreviations and special symbols
B.2.1 Status symbols
B.2.2 General abbreviations <\/td>\n<\/tr>\n
1649<\/td>\nB.3 Instructions for completing the PICS proforma
B.3.1 General structure of the PICS proforma
B.3.2 Additional information
B.3.3 Exception information <\/td>\n<\/tr>\n
1650<\/td>\nB.3.4 Conditional status <\/td>\n<\/tr>\n
1651<\/td>\nB.4 PICS proforma for IEEE Std 802.1Q\u2014End station implementations
B.4.1 Implementation identification
B.4.2 Protocol summary, IEEE Std 802.1Q <\/td>\n<\/tr>\n
1652<\/td>\nB.5 Major capabilities <\/td>\n<\/tr>\n
1653<\/td>\nB.6 MMRP <\/td>\n<\/tr>\n
1654<\/td>\nB.7 MVRP
B.8 MRP <\/td>\n<\/tr>\n
1655<\/td>\nB.9 Forwarding and queuing for time-sensitive streams
B.10 SRP (Stream Reservation Protocol) <\/td>\n<\/tr>\n
1658<\/td>\nB.11 Congestion notification <\/td>\n<\/tr>\n
1659<\/td>\nB.12 Priority-based Flow Control <\/td>\n<\/tr>\n
1660<\/td>\nB.13 Enhanced Transmission Selection
B.14 DCBX <\/td>\n<\/tr>\n
1661<\/td>\nAnnex C
DMN (Designated MSRP Node) Implementations
C.1 Designated MSRP nodes on CSNs
C.1.1 Coordinated Shared Network (CSN) characteristics <\/td>\n<\/tr>\n
1662<\/td>\nC.1.2 Designated MSRP Node handling on CSN
C.1.3 MSRPDU handling on a CSN <\/td>\n<\/tr>\n
1664<\/td>\nC.1.4 CSN bandwidth fluctuations
C.2 Designated MSRP Node on MoCA
C.2.1 DMN Selection on MoCA Network <\/td>\n<\/tr>\n
1668<\/td>\nC.2.2 MoCA network bandwidth management <\/td>\n<\/tr>\n
1669<\/td>\nC.3 Designated MSRP Nodes on IEEE 802.11 media
C.3.1 MSRP Handling <\/td>\n<\/tr>\n
1674<\/td>\nC.3.2 BSS DMN selection
C.3.3 BSS network bandwidth management <\/td>\n<\/tr>\n
1678<\/td>\nAnnex D
(normative)
IEEE 802.1 Organizationally Specific TLVs
D.1 Requirements of the IEEE 802.1 Organizationally Specific TLV sets <\/td>\n<\/tr>\n
1679<\/td>\nD.2 Organizationally Specific TLV definitions
D.2.1 Port VLAN ID TLV
D.2.2 Port And Protocol VLAN ID TLV <\/td>\n<\/tr>\n
1680<\/td>\nD.2.3 VLAN Name TLV <\/td>\n<\/tr>\n
1681<\/td>\nD.2.4 Protocol Identity TLV <\/td>\n<\/tr>\n
1682<\/td>\nD.2.5 VID Usage Digest TLV
D.2.6 Management VID TLV <\/td>\n<\/tr>\n
1683<\/td>\nD.2.7 Link Aggregation TLV <\/td>\n<\/tr>\n
1684<\/td>\nD.2.8 Congestion Notification TLV <\/td>\n<\/tr>\n
1685<\/td>\nD.2.9 ETS Configuration TLV <\/td>\n<\/tr>\n
1687<\/td>\nD.2.10 ETS Recommendation TLV <\/td>\n<\/tr>\n
1688<\/td>\nD.2.11 Priority-based Flow Control Configuration TLV <\/td>\n<\/tr>\n
1689<\/td>\nD.2.12 Application Priority TLV <\/td>\n<\/tr>\n
1690<\/td>\nD.2.13 EVB TLV <\/td>\n<\/tr>\n
1694<\/td>\nD.2.14 CDCP TLV <\/td>\n<\/tr>\n
1696<\/td>\nD.3 IEEE 802.1 Organizationally Specific TLV management
D.3.1 IEEE 802.1 Organizationally Specific TLV selection management
D.3.2 IEEE 802.1 managed objects\u2014TLV variables <\/td>\n<\/tr>\n
1698<\/td>\nD.4 PICS proforma for IEEE 802.1 Organizationally Specific TLV extensions,
D.4.1 Implementation identification
D.4.2 Protocol summary, IEEE Std 802.1Q <\/td>\n<\/tr>\n
1699<\/td>\nD.4.3 Major capabilities and options <\/td>\n<\/tr>\n
1701<\/td>\nD.5 IEEE 802.1\/LLDP extension MIB
D.5.1 Internet Standard Management Framework
D.5.2 Structure of the IEEE 802.1\/LLDP extension MIB <\/td>\n<\/tr>\n
1709<\/td>\nD.5.3 Relationship to other MIBs
D.5.4 Security considerations for IEEE 802.1 LLDP extension MIB module <\/td>\n<\/tr>\n
1711<\/td>\nD.5.5 IEEE 802.1 LLDP extension MIB module\u2014version 2 , <\/td>\n<\/tr>\n
1779<\/td>\nD.5.6 EVB extensions to the IEEE 802.1 LLDP extension MIB module <\/td>\n<\/tr>\n
1788<\/td>\nAnnex E
(normative)
Notational conventions used in state diagrams <\/td>\n<\/tr>\n
1790<\/td>\nAnnex F
Shared and Independent VLAN Learning
F.1 Requirements for Shared and Independent Learning <\/td>\n<\/tr>\n
1791<\/td>\nF.1.1 Connecting independent VLANs
F.1.2 Duplicate MAC Addresses <\/td>\n<\/tr>\n
1793<\/td>\nF.1.3 Asymmetric VLANs and Rooted-Multipoint connectivity <\/td>\n<\/tr>\n
1797<\/td>\nF.1.4 Shared Learning and Shortest Path Bridging VID Mode <\/td>\n<\/tr>\n
1798<\/td>\nF.1.5 Generic constraints on SVL and IVL use <\/td>\n<\/tr>\n
1800<\/td>\nAnnex G
MAC method dependent aspects of VLAN support
G.1 Example tagged IEEE 802.3 Ethertype-encoded frame format
G.2 Padding and frame size considerations
G.2.1 Treatment of PAD fields in IEEE 802.3 frames <\/td>\n<\/tr>\n
1801<\/td>\nG.2.2 Maximum PDU size
G.2.3 Minimum PDU size <\/td>\n<\/tr>\n
1802<\/td>\nAnnex H
Interoperability considerations
H.1 Requirements for interoperability
H.1.1 Static filtering requirements
H.1.2 Configuration requirements for VLAN-tagging <\/td>\n<\/tr>\n
1803<\/td>\nH.2 Homogenous VLAN-aware networks
H.2.1 Consistency of static VLAN filtering <\/td>\n<\/tr>\n
1804<\/td>\nH.2.2 Consistent view of the \u201cuntagged VLAN(s)\u201d on a given LAN <\/td>\n<\/tr>\n
1805<\/td>\nH.3 Heterogeneous networks: Intermixing MAC Bridges (M) and VLAN Bridges (V)
H.3.1 Example: Adding a VLAN Bridge to provide filtering to a MAC Bridged Network <\/td>\n<\/tr>\n
1806<\/td>\nH.3.2 Example: Adding a MAC Bridge to a (previously) Homogenous VLAN Bridged Network
H.4 Intermixing Port-based classification and Port-and-Protocol-based classification or future enhancements in VLAN Bridges
H.4.1 Example: Intermixing Protocol-based ingress rules <\/td>\n<\/tr>\n
1807<\/td>\nH.4.2 Differing views of untagged traffic on a given LAN <\/td>\n<\/tr>\n
1808<\/td>\nAnnex I
Priority and drop precedence
I.1 Traffic types <\/td>\n<\/tr>\n
1809<\/td>\nI.2 Managing latency and throughput
I.3 Traffic type to traffic class mapping <\/td>\n<\/tr>\n
1811<\/td>\nI.4 Traffic types and priority values <\/td>\n<\/tr>\n
1812<\/td>\nI.5 Supporting the credit-based shaper algorithm <\/td>\n<\/tr>\n
1813<\/td>\nI.6 Supporting drop precedence <\/td>\n<\/tr>\n
1814<\/td>\nI.7 Priority code point allocation
I.8 Interoperability <\/td>\n<\/tr>\n
1816<\/td>\nAnnex J
Connectivity Fault Management protocol design and use
J.1 Origin of Connectivity Fault Management
J.2 Deployment of Connectivity Fault Management <\/td>\n<\/tr>\n
1817<\/td>\nJ.3 MD Level allocation alternative
J.4 Relationship of IEEE Std 802.1Q CFM to other standards <\/td>\n<\/tr>\n
1818<\/td>\nJ.5 Interpreting Linktrace results <\/td>\n<\/tr>\n
1819<\/td>\nJ.6 MP addressing: Individual and Shared MP addresses <\/td>\n<\/tr>\n
1820<\/td>\nJ.6.1 Individual MP address model
J.6.2 Shared MP address model and the CFM Port <\/td>\n<\/tr>\n
1824<\/td>\nAnnex K
TPMR use cases
K.1 Use case 1\u2014TPMR as User to Network Interface (UNI) demarcation device <\/td>\n<\/tr>\n
1825<\/td>\nK.2 Use case 2\u2014TPMRs with aggregated links
K.3 Use case 3\u2014Multiple TPMRs <\/td>\n<\/tr>\n
1826<\/td>\nK.4 Special cases <\/td>\n<\/tr>\n
1829<\/td>\nAnnex L
Operation of the credit-based shaper algorithm
L.1 Overview of credit-based shaper operation <\/td>\n<\/tr>\n
1832<\/td>\nL.2 \u201cClass measurement intervals\u201d in Bridges <\/td>\n<\/tr>\n
1834<\/td>\nL.3 Determining worst-case latency contribution and buffering requirements <\/td>\n<\/tr>\n
1835<\/td>\nL.3.1 Interference delay <\/td>\n<\/tr>\n
1844<\/td>\nL.3.2 Maximum interference delay and maximum buffer requirement
L.4 Operation of the credit-based shaper in a coordinated shared network <\/td>\n<\/tr>\n
1846<\/td>\nAnnex M
Support for PFC in link layers without MAC Control
M.1 Overview
M.2 PFC PDU Format <\/td>\n<\/tr>\n
1847<\/td>\nAnnex N
Buffer requirements for Priority-based Flow Control
N.1 Overview <\/td>\n<\/tr>\n
1848<\/td>\nN.2 Delay model <\/td>\n<\/tr>\n
1850<\/td>\nN.3 Interface Delay
N.4 Cable Delay
N.5 Higher Layer Delay <\/td>\n<\/tr>\n
1851<\/td>\nN.6 Computation example <\/td>\n<\/tr>\n
1852<\/td>\nAnnex O
Preserving the integrity of FCS fields in MAC Bridges
O.1 Background
O.2 Basic mathematical ideas behind CRC and FCS <\/td>\n<\/tr>\n
1854<\/td>\nO.3 Detection Lossless Circuit approach <\/td>\n<\/tr>\n
1855<\/td>\nO.4 Algorithmic modification of an FCS <\/td>\n<\/tr>\n
1858<\/td>\nO.5 Conclusions <\/td>\n<\/tr>\n
1859<\/td>\nAnnex P
Frame duplication and misordering
P.1 Background
P.2 Frame duplication <\/td>\n<\/tr>\n
1860<\/td>\nP.3 Frame misordering <\/td>\n<\/tr>\n
1861<\/td>\nP.4 Other considerations <\/td>\n<\/tr>\n
1862<\/td>\nAnnex Q
Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Draft Standard for Local and metropolitan area networks–Bridges and Bridged Networks<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\nN\/A<\/td>\n1865<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":129546,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-129544","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/129544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/129546"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=129544"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=129544"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=129544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}