{"id":136567,"date":"2024-10-19T07:52:48","date_gmt":"2024-10-19T07:52:48","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-802-1q-2014\/"},"modified":"2024-10-25T00:02:44","modified_gmt":"2024-10-25T00:02:44","slug":"ieee-802-1q-2014","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-802-1q-2014\/","title":{"rendered":"IEEE 802.1Q 2014"},"content":{"rendered":"

Revision Standard – Active. This standard specifies how the Media Access Control (MAC) Service is supported by Bridged Networks, the principles of operation of those networks, and the operation of MAC Bridges and VLAN Bridges, including management, protocols, and algorithms<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std 802.1Q\u2122-2014 Cover <\/td>\n<\/tr>\n
3<\/td>\nTitle page <\/td>\n<\/tr>\n
5<\/td>\nImportant Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n
8<\/td>\nParticipants <\/td>\n<\/tr>\n
10<\/td>\nHistorical participants <\/td>\n<\/tr>\n
17<\/td>\nIntroduction <\/td>\n<\/tr>\n
19<\/td>\nContents <\/td>\n<\/tr>\n
50<\/td>\nFigures <\/td>\n<\/tr>\n
57<\/td>\nTables <\/td>\n<\/tr>\n
63<\/td>\nIMPORTANT NOTICE
1. Overview <\/td>\n<\/tr>\n
64<\/td>\n1.1 Scope
1.2 Purpose
1.3 Introduction <\/td>\n<\/tr>\n
71<\/td>\n2. Normative references <\/td>\n<\/tr>\n
74<\/td>\n3. Definitions <\/td>\n<\/tr>\n
94<\/td>\n4. Abbreviations <\/td>\n<\/tr>\n
99<\/td>\n5. Conformance
5.1 Requirements terminology
5.2 Conformant components and equipment <\/td>\n<\/tr>\n
100<\/td>\n5.3 Protocol Implementation Conformance Statement (PICS)
5.4 VLAN Bridge component requirements <\/td>\n<\/tr>\n
101<\/td>\n5.4.1 VLAN Bridge component options <\/td>\n<\/tr>\n
105<\/td>\n5.4.2 Multiple VLAN Registration Protocol (MVRP) requirements <\/td>\n<\/tr>\n
106<\/td>\n5.4.3 VLAN Bridge requirements for congestion notification
5.4.4 Multiple Stream Registration Protocol (MSRP) requirements <\/td>\n<\/tr>\n
107<\/td>\n5.4.5 Shortest Path Bridging (SPB) operation (optional) <\/td>\n<\/tr>\n
108<\/td>\n5.5 C-VLAN component conformance
5.5.1 C-VLAN component options
5.6 S-VLAN component conformance <\/td>\n<\/tr>\n
109<\/td>\n5.6.1 S-VLAN component options
5.6.2 S-VLAN component requirements for Provider Backbone Bridge Traffic Engineering (PBB-TE)
5.6.3 S-VLAN component requirements for PBB-TE IPS <\/td>\n<\/tr>\n
110<\/td>\n5.6.4 S-VLAN component requirements for ECMP with flow filtering
5.7 I-component conformance
5.7.1 I-component options
5.8 B-component conformance <\/td>\n<\/tr>\n
111<\/td>\n5.8.1 B-component options
5.8.2 B-component requirements for PBB-TE
5.8.3 B-component requirements for PBB-TE IPS <\/td>\n<\/tr>\n
112<\/td>\n5.8.4 B-component requirements for ECMP with flow filtering
5.9 C-VLAN Bridge conformance
5.9.1 C-VLAN Bridge options
5.10 Provider Bridge conformance
5.10.1 S-VLAN Bridge conformance <\/td>\n<\/tr>\n
113<\/td>\n5.10.2 Provider Edge Bridge conformance
5.11 System requirements for Priority-based Flow Control (PFC)
5.12 Backbone Edge Bridge (BEB) conformance <\/td>\n<\/tr>\n
114<\/td>\n5.12.1 BEB requirements for PBB-TE
5.13 MAC Bridge component requirements
5.13.1 MAC Bridge component options <\/td>\n<\/tr>\n
115<\/td>\n5.14 MAC Bridge conformance
5.14.1 MAC Bridge options
5.15 TPMR component conformance
5.15.1 TPMR component options <\/td>\n<\/tr>\n
116<\/td>\n5.16 TPMR conformance
5.16.1 TPMR options
5.17 T-component conformance
5.17.1 T-component options
5.18 End station requirements for MMRP, MVRP, and MSRP <\/td>\n<\/tr>\n
117<\/td>\n5.18.1 MMRP requirements and options
5.18.2 MVRP requirements and options <\/td>\n<\/tr>\n
118<\/td>\n5.18.3 MSRP requirements and options
5.19 VLAN-aware end station requirements for CFM <\/td>\n<\/tr>\n
119<\/td>\n5.20 End station requirements\u2014FQTSS
5.21 End station requirements for congestion notification <\/td>\n<\/tr>\n
120<\/td>\n5.22 MAC-specific bridging methods
5.23 EVB Bridge requirements <\/td>\n<\/tr>\n
121<\/td>\n5.24 EVB station requirements
5.24.1 Edge relay (ER) requirements <\/td>\n<\/tr>\n
123<\/td>\n6. Support of the MAC Service <\/td>\n<\/tr>\n
124<\/td>\n6.1 Basic architectural concepts and terms
6.2 Provision of the MAC Service <\/td>\n<\/tr>\n
125<\/td>\n6.2.1 Point-to-point, multipoint-to-multipoint, and rooted-multipoint connectivity
6.3 Support of the MAC Service <\/td>\n<\/tr>\n
126<\/td>\n6.4 Preservation of the MAC Service
6.5 Quality of service (QoS) maintenance
6.5.1 Service availability <\/td>\n<\/tr>\n
127<\/td>\n6.5.2 Frame loss
6.5.3 Frame misordering <\/td>\n<\/tr>\n
128<\/td>\n6.5.4 Frame duplication <\/td>\n<\/tr>\n
129<\/td>\n6.5.5 Transit delay <\/td>\n<\/tr>\n
130<\/td>\n6.5.6 Frame lifetime
6.5.7 Undetected frame error rate
6.5.8 Maximum Service Data Unit Size
6.5.9 Priority <\/td>\n<\/tr>\n
131<\/td>\n6.5.10 Throughput <\/td>\n<\/tr>\n
132<\/td>\n6.6 Internal Sublayer Service (ISS)
6.6.1 Control primitives and parameters
6.7 Support of the ISS by specific MAC procedures
6.7.1 Support of the ISS by IEEE Std 802.3 (Ethernet)
6.8 Enhanced Internal Sublayer Service (EISS) <\/td>\n<\/tr>\n
133<\/td>\n6.8.1 Service primitives <\/td>\n<\/tr>\n
134<\/td>\n6.8.2 Status parameters
6.8.3 Point-to-point parameters
6.8.4 Control primitives and parameters
6.9 Support of the EISS <\/td>\n<\/tr>\n
136<\/td>\n6.9.1 Data indications <\/td>\n<\/tr>\n
137<\/td>\n6.9.2 Data requests
6.9.3 Priority Code Point encoding <\/td>\n<\/tr>\n
139<\/td>\n6.9.4 Regenerating priority <\/td>\n<\/tr>\n
140<\/td>\n6.10 Support of the ISS\/EISS by PIPs <\/td>\n<\/tr>\n
142<\/td>\n6.10.1 Data indications <\/td>\n<\/tr>\n
143<\/td>\n6.10.2 Data requests
6.10.3 Priority Code Point encoding <\/td>\n<\/tr>\n
144<\/td>\n6.11 Support of the EISS by CBPs <\/td>\n<\/tr>\n
145<\/td>\n6.11.1 Data indications <\/td>\n<\/tr>\n
146<\/td>\n6.11.2 Data requests <\/td>\n<\/tr>\n
147<\/td>\n6.11.3 Priority Code Point decoding
6.11.4 Regenerating priority
6.12 Protocol VLAN classification <\/td>\n<\/tr>\n
149<\/td>\n6.12.1 Protocol Templates
6.12.2 Protocol Group Identifiers
6.12.3 Protocol Group Database <\/td>\n<\/tr>\n
150<\/td>\n6.13 Support of the ISS for attachment to a PBN <\/td>\n<\/tr>\n
151<\/td>\n6.13.1 Data requests <\/td>\n<\/tr>\n
152<\/td>\n6.13.2 Data indications
6.14 Support of the ISS within a system
6.15 Support of the ISS by additional technologies <\/td>\n<\/tr>\n
153<\/td>\n6.16 Filtering services in Bridged Networks
6.16.1 Purpose(s) of filtering service provision
6.16.2 Goals of filtering service provision
6.16.3 Users of filtering services <\/td>\n<\/tr>\n
154<\/td>\n6.16.4 Basis of service
6.16.5 Categories of service
6.16.6 Service configuration <\/td>\n<\/tr>\n
155<\/td>\n6.16.7 Service definition for Extended Filtering Services <\/td>\n<\/tr>\n
156<\/td>\n6.17 EISS Multiplex Entity <\/td>\n<\/tr>\n
157<\/td>\n6.18 Backbone Service Instance Multiplex Entity <\/td>\n<\/tr>\n
158<\/td>\n6.18.1 Demultiplexing direction <\/td>\n<\/tr>\n
159<\/td>\n6.18.2 Multiplexing direction <\/td>\n<\/tr>\n
160<\/td>\n6.18.3 Priority Code Point encoding
6.18.4 Status parameters
6.19 TESI Multiplex Entity <\/td>\n<\/tr>\n
161<\/td>\n6.20 Support of the ISS with signaled priority <\/td>\n<\/tr>\n
162<\/td>\n6.20.1 Data indications
6.20.2 Data requests
6.21 Infrastructure Segment Multiplex Entity <\/td>\n<\/tr>\n
164<\/td>\n7. Principles of Virtual Bridged Network operation
7.1 Network overview <\/td>\n<\/tr>\n
165<\/td>\n7.2 Use of VLANs
7.3 Active topology <\/td>\n<\/tr>\n
166<\/td>\n7.4 VLAN topology <\/td>\n<\/tr>\n
167<\/td>\n7.5 Locating end stations
7.6 Ingress, forwarding, and egress rules <\/td>\n<\/tr>\n
169<\/td>\n8. Principles of Bridge operation
8.1 Bridge operation
8.1.1 Relay <\/td>\n<\/tr>\n
170<\/td>\n8.1.2 Filtering and relaying information
8.1.3 Duplicate frame prevention
8.1.4 Traffic segregation <\/td>\n<\/tr>\n
171<\/td>\n8.1.5 Traffic reduction
8.1.6 Traffic expediting
8.1.7 Conversion of frame formats <\/td>\n<\/tr>\n
172<\/td>\n8.2 Bridge architecture <\/td>\n<\/tr>\n
174<\/td>\n8.3 Model of operation <\/td>\n<\/tr>\n
177<\/td>\n8.4 Active topologies, learning, and forwarding <\/td>\n<\/tr>\n
179<\/td>\n8.5 Bridge Port Transmit and Receive
8.5.1 Bridge Port connectivity <\/td>\n<\/tr>\n
180<\/td>\n8.5.2 TPMR Port connectivity
8.5.3 Support of Higher Layer Entities <\/td>\n<\/tr>\n
181<\/td>\n8.6 The Forwarding Process <\/td>\n<\/tr>\n
182<\/td>\n8.6.1 Active topology enforcement <\/td>\n<\/tr>\n
183<\/td>\n8.6.2 Ingress filtering
8.6.3 Frame filtering <\/td>\n<\/tr>\n
186<\/td>\n8.6.4 Egress filtering
8.6.5 Flow classification and metering <\/td>\n<\/tr>\n
187<\/td>\n8.6.6 Queuing frames <\/td>\n<\/tr>\n
188<\/td>\n8.6.7 Queue management <\/td>\n<\/tr>\n
189<\/td>\n8.6.8 Transmission selection <\/td>\n<\/tr>\n
191<\/td>\n8.7 The Learning Process <\/td>\n<\/tr>\n
192<\/td>\n8.7.1 Default filtering utility criteria
8.7.2 Enhanced filtering utility criteria
8.7.3 Ageing of Dynamic Filtering Entries <\/td>\n<\/tr>\n
193<\/td>\n8.8 The Filtering Database (FDB) <\/td>\n<\/tr>\n
196<\/td>\n8.8.1 Static Filtering Entries <\/td>\n<\/tr>\n
197<\/td>\n8.8.2 Static VLAN Registration Entries <\/td>\n<\/tr>\n
198<\/td>\n8.8.3 Dynamic Filtering Entries
8.8.4 MAC Address Registration Entries <\/td>\n<\/tr>\n
199<\/td>\n8.8.5 Dynamic VLAN Registration Entries
8.8.6 Default Group filtering behavior <\/td>\n<\/tr>\n
201<\/td>\n8.8.7 Dynamic Reservation Entries
8.8.8 Allocation of VIDs to FIDs <\/td>\n<\/tr>\n
202<\/td>\n8.8.9 Querying the FDB <\/td>\n<\/tr>\n
205<\/td>\n8.8.10 Determination of the member set for a VID <\/td>\n<\/tr>\n
206<\/td>\n8.8.11 Permanent Database
8.8.12 Connection_Identifier
8.9 MST, SPB, and ESP configuration information <\/td>\n<\/tr>\n
207<\/td>\n8.9.1 MST Configuration Table <\/td>\n<\/tr>\n
208<\/td>\n8.9.2 MST configuration identification
8.9.3 FID to MSTI Allocation Table
8.9.4 SPT Configuration Identification <\/td>\n<\/tr>\n
209<\/td>\n8.10 Spanning Tree Protocol Entity
8.11 MRP entities
8.12 Bridge Management Entity <\/td>\n<\/tr>\n
210<\/td>\n8.13 Addressing
8.13.1 End stations
8.13.2 Bridge Ports
8.13.3 Use of LLC by Spanning Tree Protocol Entities <\/td>\n<\/tr>\n
211<\/td>\n8.13.4 Reserved MAC addresses
8.13.5 Group MAC addresses for spanning tree entity <\/td>\n<\/tr>\n
213<\/td>\n8.13.6 Group MAC addresses for MRP Applications
8.13.7 Bridge Management Entities <\/td>\n<\/tr>\n
214<\/td>\n8.13.8 Unique identification of a Bridge
8.13.9 Points of attachment and connectivity for Higher Layer Entities <\/td>\n<\/tr>\n
217<\/td>\n8.13.10 VLAN attachment and connectivity for Higher Layer Entities <\/td>\n<\/tr>\n
218<\/td>\n8.13.11 CFM entities <\/td>\n<\/tr>\n
220<\/td>\n9. Tagged frame format
9.1 Purpose of tagging
9.2 Representation and encoding of tag fields <\/td>\n<\/tr>\n
221<\/td>\n9.3 Tag format
9.4 TPID formats
9.5 Tag Protocol identification <\/td>\n<\/tr>\n
222<\/td>\n9.6 VLAN Tag Control Information (TCI) <\/td>\n<\/tr>\n
223<\/td>\n9.7 Backbone Service Instance Tag Control Information (I-TAG TCI) <\/td>\n<\/tr>\n
225<\/td>\n10. Multiple Registration Protocol (MRP) and Multiple MAC Registration Protocol (MMRP)
10.1 MRP overview <\/td>\n<\/tr>\n
228<\/td>\n10.2 MRP architecture <\/td>\n<\/tr>\n
229<\/td>\n10.3 MRP Attribute Propagation (MAP) <\/td>\n<\/tr>\n
230<\/td>\n10.3.1 MAP Context <\/td>\n<\/tr>\n
231<\/td>\n10.4 Requirements to be met by MRP <\/td>\n<\/tr>\n
232<\/td>\n10.5 Requirements for interoperability between MRP Participants <\/td>\n<\/tr>\n
233<\/td>\n10.6 Protocol operation <\/td>\n<\/tr>\n
237<\/td>\n10.7 Protocol specification <\/td>\n<\/tr>\n
238<\/td>\n10.7.1 Notational conventions and abbreviations <\/td>\n<\/tr>\n
240<\/td>\n10.7.2 Registrar Administrative Controls
10.7.3 Applicant Administrative Controls
10.7.4 Protocol timers <\/td>\n<\/tr>\n
241<\/td>\n10.7.5 Protocol event definitions <\/td>\n<\/tr>\n
244<\/td>\n10.7.6 Protocol Action definitions <\/td>\n<\/tr>\n
246<\/td>\n10.7.7 Applicant state machine <\/td>\n<\/tr>\n
247<\/td>\n10.7.8 Registrar state machine
10.7.9 LeaveAll state machine <\/td>\n<\/tr>\n
248<\/td>\n10.7.10 PeriodicTransmission state machine
10.7.11 Timer values <\/td>\n<\/tr>\n
249<\/td>\n10.7.12 Operational reporting and statistics
10.7.13 Interoperability considerations <\/td>\n<\/tr>\n
250<\/td>\n10.8 Structure and encoding of Multiple Registration Protocol Data Units (MRPDUs)
10.8.1 Structure <\/td>\n<\/tr>\n
252<\/td>\n10.8.2 Encoding of MRPDU parameters <\/td>\n<\/tr>\n
255<\/td>\n10.8.3 Packing and parsing MRPDUs <\/td>\n<\/tr>\n
257<\/td>\n10.9 Multiple MAC Registration Protocol (MMRP)\u2014Purpose <\/td>\n<\/tr>\n
258<\/td>\n10.10 Model of operation <\/td>\n<\/tr>\n
259<\/td>\n10.10.1 Propagation of Group Membership information <\/td>\n<\/tr>\n
260<\/td>\n10.10.2 Propagation of Group service requirement information
10.10.3 Source pruning
10.10.4 Use of Group service requirement registration by end stations
10.11 Default Group filtering behavior and MMRP propagation <\/td>\n<\/tr>\n
262<\/td>\n10.12 Definition of the MMRP application
10.12.1 Definition of MRP elements <\/td>\n<\/tr>\n
264<\/td>\n10.12.2 Provision and support of Extended Filtering Services <\/td>\n<\/tr>\n
266<\/td>\n10.12.3 Use of \u201cnew\u201d declaration capability
10.12.4 Attribute value support requirements <\/td>\n<\/tr>\n
268<\/td>\n11. VLAN topology management
11.1 Static and dynamic VLAN configuration <\/td>\n<\/tr>\n
269<\/td>\n11.2 Multiple VLAN Registration Protocol (MVRP)
11.2.1 MVRP overview <\/td>\n<\/tr>\n
271<\/td>\n11.2.2 VLAN registration service definition <\/td>\n<\/tr>\n
272<\/td>\n11.2.3 Definition of the MVRP application <\/td>\n<\/tr>\n
275<\/td>\n11.2.4 VID translation table
11.2.5 Use of \u201cnew\u201d declaration capability
11.2.6 New-Only Participant and Registrar Administrative Controls
11.2.7 Attribute value support requirements <\/td>\n<\/tr>\n
276<\/td>\n12. Bridge management
12.1 Management functions
12.1.1 Configuration Management <\/td>\n<\/tr>\n
277<\/td>\n12.1.2 Fault Management
12.1.3 Performance Management
12.1.4 Security Management
12.1.5 Accounting Management
12.2 VLAN Bridge objects <\/td>\n<\/tr>\n
278<\/td>\n12.3 Data types <\/td>\n<\/tr>\n
279<\/td>\n12.4 Bridge Management Entity
12.4.1 Bridge Configuration <\/td>\n<\/tr>\n
282<\/td>\n12.4.2 Port configuration <\/td>\n<\/tr>\n
284<\/td>\n12.5 MAC entities
12.5.1 ISS Port Number table managed object (optional)
12.6 Forwarding process <\/td>\n<\/tr>\n
285<\/td>\n12.6.1 The Port Counters
12.6.2 Priority handling <\/td>\n<\/tr>\n
293<\/td>\n12.6.3 Traffic Class Table <\/td>\n<\/tr>\n
294<\/td>\n12.7 Filtering Database (FDB)
12.7.1 The Filtering Database object <\/td>\n<\/tr>\n
295<\/td>\n12.7.2 A Static Filtering Entry object <\/td>\n<\/tr>\n
296<\/td>\n12.7.3 A Dynamic Filtering Entry object
12.7.4 A MAC Address Registration Entry object
12.7.5 A VLAN Registration Entry object
12.7.6 Permanent Database object <\/td>\n<\/tr>\n
297<\/td>\n12.7.7 General FDB operations <\/td>\n<\/tr>\n
299<\/td>\n12.8 Bridge Protocol Entity
12.8.1 The Protocol Entity <\/td>\n<\/tr>\n
302<\/td>\n12.8.2 Bridge Port <\/td>\n<\/tr>\n
306<\/td>\n12.9 MRP Entities
12.9.1 The MRP Timer object <\/td>\n<\/tr>\n
307<\/td>\n12.9.2 The MRP Attribute Type object <\/td>\n<\/tr>\n
308<\/td>\n12.9.3 Periodic state machine objects <\/td>\n<\/tr>\n
309<\/td>\n12.10 Bridge VLAN managed objects
12.10.1 Bridge VLAN Configuration managed object <\/td>\n<\/tr>\n
314<\/td>\n12.10.2 VLAN Configuration managed object <\/td>\n<\/tr>\n
316<\/td>\n12.10.3 The VID to FID allocation managed object <\/td>\n<\/tr>\n
318<\/td>\n12.11 MMRP entities
12.11.1 MMRP Configuration managed object <\/td>\n<\/tr>\n
320<\/td>\n12.12 MST configuration entities
12.12.1 The MSTI List <\/td>\n<\/tr>\n
321<\/td>\n12.12.2 The FID to MSTID Allocation Table <\/td>\n<\/tr>\n
322<\/td>\n12.12.3 The MST Configuration Table <\/td>\n<\/tr>\n
324<\/td>\n12.13 Provider Bridge management <\/td>\n<\/tr>\n
325<\/td>\n12.13.1 Provider Bridge Port Type managed object <\/td>\n<\/tr>\n
326<\/td>\n12.13.2 Customer Edge Port Configuration managed object <\/td>\n<\/tr>\n
329<\/td>\n12.13.3 Remote Customer Access Port Configuration managed object <\/td>\n<\/tr>\n
331<\/td>\n12.14 CFM entities <\/td>\n<\/tr>\n
332<\/td>\n12.14.1 Maintenance Domain list managed object <\/td>\n<\/tr>\n
334<\/td>\n12.14.2 CFM Stack managed object
12.14.3 Default MD Level managed object <\/td>\n<\/tr>\n
336<\/td>\n12.14.4 Configuration Error List managed object
12.14.5 Maintenance Domain managed object <\/td>\n<\/tr>\n
339<\/td>\n12.14.6 Maintenance Association managed object <\/td>\n<\/tr>\n
341<\/td>\n12.14.7 Maintenance association Endpoint managed object <\/td>\n<\/tr>\n
348<\/td>\n12.15 Backbone Core Bridge (BCB) management
12.16 Backbone Edge Bridge (BEB) management <\/td>\n<\/tr>\n
350<\/td>\n12.16.1 BEB configuration managed object <\/td>\n<\/tr>\n
353<\/td>\n12.16.2 BEB\/PB\/VLAN Bridge Port configuration managed object <\/td>\n<\/tr>\n
354<\/td>\n12.16.3 VIP configuration managed object <\/td>\n<\/tr>\n
355<\/td>\n12.16.4 PIP configuration managed object <\/td>\n<\/tr>\n
362<\/td>\n12.16.5 CBP Configuration managed object <\/td>\n<\/tr>\n
364<\/td>\n12.17 DDCFM entities <\/td>\n<\/tr>\n
365<\/td>\n12.17.1 DDCFM Stack managed object
12.17.2 Reflection Responder managed object <\/td>\n<\/tr>\n
369<\/td>\n12.17.3 RFM Receiver managed object <\/td>\n<\/tr>\n
370<\/td>\n12.17.4 Decapsulator Responder managed object <\/td>\n<\/tr>\n
372<\/td>\n12.17.5 SFM Originator managed object <\/td>\n<\/tr>\n
375<\/td>\n12.18 PBB-TE Protection Switching managed objects
12.18.1 TE protection group list managed object <\/td>\n<\/tr>\n
376<\/td>\n12.18.2 TE protection group managed object <\/td>\n<\/tr>\n
378<\/td>\n12.19 TPMR managed objects <\/td>\n<\/tr>\n
379<\/td>\n12.19.1 TPMR management entity <\/td>\n<\/tr>\n
381<\/td>\n12.19.2 MAC and PHY entities
12.19.3 Forwarding Process <\/td>\n<\/tr>\n
386<\/td>\n12.19.4 MAC Status Propagation Entity (MSPE) <\/td>\n<\/tr>\n
388<\/td>\n12.20 Management entities for FQTSS
12.20.1 The Bandwidth Availability Parameter Table <\/td>\n<\/tr>\n
389<\/td>\n12.20.2 The Transmission Selection Algorithm Table
12.20.3 The Priority Regeneration Override Table
12.21 Congestion Notification managed objects <\/td>\n<\/tr>\n
390<\/td>\n12.21.1 CN component managed object
12.21.2 CN component priority managed object <\/td>\n<\/tr>\n
391<\/td>\n12.21.3 CN Port priority managed object <\/td>\n<\/tr>\n
392<\/td>\n12.21.4 Congestion Point managed object <\/td>\n<\/tr>\n
393<\/td>\n12.21.5 Reaction Point port priority managed object
12.21.6 Reaction Point group managed object <\/td>\n<\/tr>\n
394<\/td>\n12.22 Stream Reservation Protocol (SRP) entities
12.22.1 SRP Bridge Base Table
12.22.2 SRP Bridge Port Table <\/td>\n<\/tr>\n
395<\/td>\n12.22.3 SRP Latency Parameter Table
12.22.4 SRP Stream Table
12.22.5 SRP Reservations Table <\/td>\n<\/tr>\n
396<\/td>\n12.23 Priority-based Flow Control objects <\/td>\n<\/tr>\n
397<\/td>\n12.24 1:1 PBB-TE IPS managed objects
12.24.1 IPG list managed object <\/td>\n<\/tr>\n
398<\/td>\n12.24.2 IPG managed object <\/td>\n<\/tr>\n
401<\/td>\n12.25 Shortest Path Bridging managed objects <\/td>\n<\/tr>\n
402<\/td>\n12.25.1 The SPB System managed object <\/td>\n<\/tr>\n
404<\/td>\n12.25.2 The SPB MTID Static managed object <\/td>\n<\/tr>\n
405<\/td>\n12.25.3 The SPB Topology Instance Dynamic managed object <\/td>\n<\/tr>\n
406<\/td>\n12.25.4 The SPB ECT Static Entry managed object <\/td>\n<\/tr>\n
407<\/td>\n12.25.5 The SPB ECT Dynamic Entry managed object <\/td>\n<\/tr>\n
408<\/td>\n12.25.6 The SPB Adjacency Static Entry managed object <\/td>\n<\/tr>\n
409<\/td>\n12.25.7 The SPB Adjacency Dynamic Entry managed object <\/td>\n<\/tr>\n
410<\/td>\n12.25.8 The SPBM BSI Static Entry managed object <\/td>\n<\/tr>\n
411<\/td>\n12.25.9 The SPB Topology Node Table managed object <\/td>\n<\/tr>\n
412<\/td>\n12.25.10 The SPB Topology ECT Table managed object <\/td>\n<\/tr>\n
413<\/td>\n12.25.11 The SPB Topology Edge Table managed object <\/td>\n<\/tr>\n
414<\/td>\n12.25.12 The SPBM Topology Service Table managed object <\/td>\n<\/tr>\n
415<\/td>\n12.25.13 The SPBV Topology Service Table managed object <\/td>\n<\/tr>\n
416<\/td>\n12.25.14 The ECMP ECT Static Entry managed object <\/td>\n<\/tr>\n
417<\/td>\n12.26 Edge Virtual Bridging (EVB) management <\/td>\n<\/tr>\n
420<\/td>\n12.26.1 EVB system base table <\/td>\n<\/tr>\n
422<\/td>\n12.26.2 SBP table entry <\/td>\n<\/tr>\n
423<\/td>\n12.26.3 VSI table entry <\/td>\n<\/tr>\n
425<\/td>\n12.26.4 S-channel configuration and management <\/td>\n<\/tr>\n
428<\/td>\n12.26.5 ER management <\/td>\n<\/tr>\n
429<\/td>\n12.27 Edge Control Protocol (ECP) management
12.27.1 ECP table entry <\/td>\n<\/tr>\n
430<\/td>\n13. Spanning tree protocols <\/td>\n<\/tr>\n
431<\/td>\n13.1 Protocol design requirements <\/td>\n<\/tr>\n
432<\/td>\n13.2 Protocol support requirements
13.2.1 MSTP support requirements
13.2.2 SPB support requirements <\/td>\n<\/tr>\n
433<\/td>\n13.3 Protocol design goals
13.4 RSTP overview <\/td>\n<\/tr>\n
434<\/td>\n13.4.1 Computation of the active topology <\/td>\n<\/tr>\n
435<\/td>\n13.4.2 Example topologies <\/td>\n<\/tr>\n
438<\/td>\n13.5 MSTP overview <\/td>\n<\/tr>\n
439<\/td>\n13.5.1 Example topologies <\/td>\n<\/tr>\n
442<\/td>\n13.5.2 Relationship of MSTP to RSTP
13.5.3 Modeling an MST or SPT Region as a single Bridge <\/td>\n<\/tr>\n
443<\/td>\n13.6 SPB overview <\/td>\n<\/tr>\n
444<\/td>\n13.7 Compatibility and interoperability
13.7.1 Designated Port selection
13.7.2 Force Protocol Version <\/td>\n<\/tr>\n
445<\/td>\n13.8 MST Configuration Identifier (MCID) <\/td>\n<\/tr>\n
446<\/td>\n13.9 Spanning tree priority vectors <\/td>\n<\/tr>\n
448<\/td>\n13.10 CIST Priority Vector calculations <\/td>\n<\/tr>\n
450<\/td>\n13.11 MST Priority Vector calculations <\/td>\n<\/tr>\n
452<\/td>\n13.12 Port Role assignments <\/td>\n<\/tr>\n
453<\/td>\n13.13 Stable connectivity <\/td>\n<\/tr>\n
454<\/td>\n13.14 Communicating spanning tree information <\/td>\n<\/tr>\n
455<\/td>\n13.15 Changing spanning tree information <\/td>\n<\/tr>\n
456<\/td>\n13.16 Changing Port States with RSTP or MSTP <\/td>\n<\/tr>\n
457<\/td>\n13.16.1 Subtree connectivity and priority vectors
13.16.2 Root Port transition to Forwarding
13.16.3 Designated Port transition to Forwarding <\/td>\n<\/tr>\n
459<\/td>\n13.16.4 Master Port transition to Forwarding <\/td>\n<\/tr>\n
461<\/td>\n13.17 Changing Port States with SPB <\/td>\n<\/tr>\n
464<\/td>\n13.17.1 Agreement Digest
13.18 Managing spanning tree topologies <\/td>\n<\/tr>\n
465<\/td>\n13.19 Updating learned station location information <\/td>\n<\/tr>\n
467<\/td>\n13.20 Managing reconfiguration <\/td>\n<\/tr>\n
468<\/td>\n13.21 Partial and disputed connectivity
13.22 In-service upgrades <\/td>\n<\/tr>\n
470<\/td>\n13.23 Fragile Bridges
13.24 Spanning tree protocol state machines <\/td>\n<\/tr>\n
472<\/td>\n13.25 State machine timers <\/td>\n<\/tr>\n
473<\/td>\n13.25.1 edgeDelayWhile
13.25.2 fdWhile
13.25.3 helloWhen
13.25.4 mdelayWhile
13.25.5 rbWhile
13.25.6 rcvdInfoWhile <\/td>\n<\/tr>\n
474<\/td>\n13.25.7 rrWhile
13.25.8 tcDetected
13.25.9 tcWhile
13.25.10 pseudoInfoHelloWhen
13.26 Per Bridge variables <\/td>\n<\/tr>\n
475<\/td>\n13.26.1 agreementDigest
13.26.2 BridgeIdentifier
13.26.3 BridgePriority
13.26.4 BridgeTimes <\/td>\n<\/tr>\n
476<\/td>\n13.26.5 ForceProtocolVersion
13.26.6 MigrateTime
13.26.7 MstConfigId
13.26.8 AuxMstConfigId
13.26.9 rootPortId
13.26.10 rootPriority
13.26.11 rootTimes
13.26.12 TxHoldCount
13.27 Per port variables <\/td>\n<\/tr>\n
479<\/td>\n13.27.1 AdminEdge
13.27.2 ageingTime
13.27.3 agree
13.27.4 agreed
13.27.5 agreedAbove
13.27.6 agreedDigest
13.27.7 agreedDigestValid
13.27.8 agreeDigest
13.27.9 agreeDigestValid <\/td>\n<\/tr>\n
480<\/td>\n13.27.10 agreedMisorder
13.27.11 agreedN
13.27.12 agreedND
13.27.13 agreedPriority
13.27.14 agreedTopology
13.27.15 agreementOutstanding
13.27.16 agreeN
13.27.17 agreeND
13.27.18 AutoEdge <\/td>\n<\/tr>\n
481<\/td>\n13.27.19 AutoIsolate
13.27.20 designatedPriority
13.27.21 designatedTimes
13.27.22 disputed
13.27.23 enableBPDUrx
13.27.24 enableBPDUtx
13.27.25 ExternalPortPathCost
13.27.26 isL2gp <\/td>\n<\/tr>\n
482<\/td>\n13.27.27 isolate
13.27.28 fdbFlush
13.27.29 forward
13.27.30 forwarding
13.27.31 infoInternal
13.27.32 infoIs
13.27.33 InternalPortPathCost <\/td>\n<\/tr>\n
483<\/td>\n13.27.34 learn
13.27.35 learning
13.27.36 master
13.27.37 mastered
13.27.38 mcheck
13.27.39 msgPriority
13.27.40 msgTimes <\/td>\n<\/tr>\n
484<\/td>\n13.27.41 neighbourPriority
13.27.42 newInfo
13.27.43 newInfoMsti
13.27.44 operEdge
13.27.45 portEnabled
13.27.46 portId
13.27.47 portPriority <\/td>\n<\/tr>\n
485<\/td>\n13.27.48 portTimes
13.27.49 proposed
13.27.50 proposing
13.27.51 pseudoRootId
13.27.52 rcvdBPDU
13.27.53 rcvdInfo
13.27.54 rcvdInternal
13.27.55 rcvdMsg
13.27.56 rcvdRSTP
13.27.57 rcvdSTP
13.27.58 rcvdTc
13.27.59 rcvdTcAck <\/td>\n<\/tr>\n
486<\/td>\n13.27.60 rcvdTcn
13.27.61 reRoot
13.27.62 reselect
13.27.63 restrictedDomainRole
13.27.64 restrictedRole
13.27.65 restrictedTcn
13.27.66 role
13.27.67 selected
13.27.68 selectedRole <\/td>\n<\/tr>\n
487<\/td>\n13.27.69 sendRSTP
13.27.70 sync
13.27.71 synced
13.27.72 tcAck
13.27.73 tcProp
13.27.74 tick
13.27.75 txCount
13.27.76 updtInfo
13.28 State machine conditions and parameters <\/td>\n<\/tr>\n
488<\/td>\n13.28.1 allSptAgree
13.28.2 allSynced
13.28.3 allTransmitReady
13.28.4 BestAgreementPriority
13.28.5 cist
13.28.6 cistRootPort <\/td>\n<\/tr>\n
489<\/td>\n13.28.7 cistDesignatedPort
13.28.8 EdgeDelay
13.28.9 forwardDelay
13.28.10 FwdDelay
13.28.11 HelloTime
13.28.12 MaxAge
13.28.13 msti
13.28.14 mstiDesignatedOrTCpropagatingRootPort
13.28.15 mstiMasterPort
13.28.16 operPointToPoint
13.28.17 rcvdAnyMsg
13.28.18 rcvdCistMsg <\/td>\n<\/tr>\n
490<\/td>\n13.28.19 rcvdMstiMsg
13.28.20 reRooted
13.28.21 rstpVersion
13.28.22 spt
13.28.23 stpVersion
13.28.24 updtCistInfo
13.28.25 updtMstiInfo
13.29 State machine procedures <\/td>\n<\/tr>\n
491<\/td>\n13.29.1 betterorsameInfo(newInfoIs)
13.29.2 clearAllRcvdMsgs()
13.29.3 clearReselectTree() <\/td>\n<\/tr>\n
492<\/td>\n13.29.4 disableForwarding()
13.29.5 disableLearning()
13.29.6 enableForwarding()
13.29.7 enableLearning()
13.29.8 fromSameRegion()
13.29.9 newTcDetected()
13.29.10 newTcWhile() <\/td>\n<\/tr>\n
493<\/td>\n13.29.11 pseudoRcvMsgs()
13.29.12 rcvInfo() <\/td>\n<\/tr>\n
494<\/td>\n13.29.13 rcvMsgs()
13.29.14 rcvAgreements()
13.29.15 recordAgreement() <\/td>\n<\/tr>\n
495<\/td>\n13.29.16 recordDispute()
13.29.17 recordMastered()
13.29.18 recordPriority()
13.29.19 recordProposal()
13.29.20 recordTimes() <\/td>\n<\/tr>\n
496<\/td>\n13.29.21 setReRootTree()
13.29.22 setSelectedTree()
13.29.23 setSyncTree()
13.29.24 setTcFlags()
13.29.25 setTcPropTree()
13.29.26 syncMaster()
13.29.27 txConfig() <\/td>\n<\/tr>\n
497<\/td>\n13.29.28 txRstp()
13.29.29 txTcn()
13.29.30 updtAgreement() <\/td>\n<\/tr>\n
498<\/td>\n13.29.31 updtBPDUVersion()
13.29.32 updtDigest() <\/td>\n<\/tr>\n
499<\/td>\n13.29.33 updtRcvdInfoWhile() <\/td>\n<\/tr>\n
500<\/td>\n13.29.34 updtRolesTree() <\/td>\n<\/tr>\n
501<\/td>\n13.29.35 uptRolesDisabledTree() <\/td>\n<\/tr>\n
502<\/td>\n13.30 The Port Timers state machine
13.31 Port Receive state machine <\/td>\n<\/tr>\n
503<\/td>\n13.32 Port Protocol Migration state machine
13.33 Bridge Detection state machine <\/td>\n<\/tr>\n
504<\/td>\n13.34 Port Transmit state machine <\/td>\n<\/tr>\n
505<\/td>\n13.35 Port Information state machine <\/td>\n<\/tr>\n
506<\/td>\n13.36 Port Role Selection state machine
13.37 Port Role Transitions state machine <\/td>\n<\/tr>\n
511<\/td>\n13.38 Port State Transition state machine <\/td>\n<\/tr>\n
512<\/td>\n13.38.1 Port State transitions for the CIST and MSTIs
13.38.2 Port State transitions for SPTs <\/td>\n<\/tr>\n
513<\/td>\n13.39 Topology Change state machine <\/td>\n<\/tr>\n
514<\/td>\n13.40 Layer 2 Gateway Port Receive state machine
13.41 CEP spanning tree operation
13.41.1 PEP operPointToPointMAC and operEdge <\/td>\n<\/tr>\n
515<\/td>\n13.41.2 updtRolesTree()
13.41.3 setReRootTree(), setSyncTree(), setTcPropTree()
13.41.4 allSynced, reRooted
13.41.5 Configuration parameters <\/td>\n<\/tr>\n
516<\/td>\n13.42 Virtual Instance Port (VIP) spanning tree operation <\/td>\n<\/tr>\n
517<\/td>\n14. Encoding of Bridge Protocol Data Units (BPDUs)
14.1 BPDU Structure
14.1.1 Transmission and representation of octets <\/td>\n<\/tr>\n
519<\/td>\n14.1.2 Common BPDU fields
14.2 Encoding of parameter types
14.2.1 Encoding of Protocol Identifiers
14.2.2 Encoding of Protocol Version Identifiers
14.2.3 Encoding of BPDU types
14.2.4 Encoding of flags
14.2.5 Encoding of Bridge Identifiers <\/td>\n<\/tr>\n
520<\/td>\n14.2.6 Encoding of External Root Path Cost and Internal Root Path Cost
14.2.7 Encoding of Port Identifiers <\/td>\n<\/tr>\n
521<\/td>\n14.2.8 Encoding of Timer Values
14.2.9 Encoding of Port Role values
14.2.10 Encoding of Length Values
14.2.11 Encoding of Hop Counts
14.3 Transmission of BPDUs <\/td>\n<\/tr>\n
522<\/td>\n14.4 Encoding and decoding of STP Configuration, RST, MST, and SPT BPDUs <\/td>\n<\/tr>\n
523<\/td>\n14.4.1 MSTI Configuration Messages <\/td>\n<\/tr>\n
524<\/td>\n14.5 Validation of received BPDUs <\/td>\n<\/tr>\n
525<\/td>\n14.6 Validation and interoperability <\/td>\n<\/tr>\n
527<\/td>\n15. Support of the MAC Service by PBNs
15.1 Service transparency <\/td>\n<\/tr>\n
528<\/td>\n15.2 Customer service interfaces
15.3 Port-based service interface <\/td>\n<\/tr>\n
529<\/td>\n15.4 C-tagged service interface <\/td>\n<\/tr>\n
530<\/td>\n15.5 S-tagged service interface <\/td>\n<\/tr>\n
531<\/td>\n15.6 Remote customer service interfaces (RCSIs) <\/td>\n<\/tr>\n
534<\/td>\n15.7 Service instance segregation
15.8 Service instance selection and identification <\/td>\n<\/tr>\n
535<\/td>\n15.9 Service priority selection <\/td>\n<\/tr>\n
536<\/td>\n15.10 Service access protection <\/td>\n<\/tr>\n
537<\/td>\n16. Principles of Provider Bridged Network (PBN) operation
16.1 PBN overview <\/td>\n<\/tr>\n
538<\/td>\n16.2 Provider Bridged Network (PBN) <\/td>\n<\/tr>\n
541<\/td>\n16.3 Service instance connectivity <\/td>\n<\/tr>\n
542<\/td>\n16.4 Service provider learning of customer end station addresses
16.5 Detection of connectivity loops through attached networks <\/td>\n<\/tr>\n
543<\/td>\n16.6 Network management <\/td>\n<\/tr>\n
544<\/td>\n17. Management Information Base (MIB)
17.1 Internet Standard Management Framework
17.2 Structure of the MIB <\/td>\n<\/tr>\n
545<\/td>\n17.2.1 Structure of the IEEE8021-TC-MIB <\/td>\n<\/tr>\n
547<\/td>\n17.2.2 Structure of the IEEE8021-BRIDGE-MIB <\/td>\n<\/tr>\n
552<\/td>\n17.2.3 Structure of the IEEE8021-SPANNING-TREE MIB <\/td>\n<\/tr>\n
554<\/td>\n17.2.4 Structure of the IEEE8021-Q-BRIDGE-MIB <\/td>\n<\/tr>\n
561<\/td>\n17.2.5 Structure of the IEEE8021-PB-MIB <\/td>\n<\/tr>\n
562<\/td>\n17.2.6 Structure of the IEEE8021-MSTP-MIB <\/td>\n<\/tr>\n
565<\/td>\n17.2.7 Structure of the IEEE8021-CFM-MIB <\/td>\n<\/tr>\n
571<\/td>\n17.2.8 Structure of the IEEE8021-PBB-MIB <\/td>\n<\/tr>\n
574<\/td>\n17.2.9 Structure of the IEEE8021-DDCFM-MIBs <\/td>\n<\/tr>\n
576<\/td>\n17.2.10 Structure of the IEEE8021-PBBTE-MIB <\/td>\n<\/tr>\n
579<\/td>\n17.2.11 Structure of the TPMR MIB <\/td>\n<\/tr>\n
581<\/td>\n17.2.12 Structure of the IEEE8021-FQTSS-MIB <\/td>\n<\/tr>\n
582<\/td>\n17.2.13 Structure of the Congestion Notification MIB <\/td>\n<\/tr>\n
584<\/td>\n17.2.14 Structure of the IEEE8021-SRP-MIB <\/td>\n<\/tr>\n
586<\/td>\n17.2.15 Structure of the MVRP extension MIB
17.2.16 Structure of the MIRP MIB <\/td>\n<\/tr>\n
587<\/td>\n17.2.17 Structure of the PFC MIB
17.2.18 Structure of the IEEE80221-TEIPS MIB <\/td>\n<\/tr>\n
589<\/td>\n17.2.19 Structure of the IEEE8021-SPB-MIB <\/td>\n<\/tr>\n
593<\/td>\n17.2.20 Structure of the IEEE8021-EVB-MIB <\/td>\n<\/tr>\n
596<\/td>\n17.2.21 Structure of the IEEE8021-ECMP-MIB <\/td>\n<\/tr>\n
597<\/td>\n17.3 Relationship to other MIBs
17.3.1 Relationship of the IEEE8021-TC-MIB to other MIB modules <\/td>\n<\/tr>\n
598<\/td>\n17.3.2 Relationship of the IEEE8021-BRIDGE-MIB to other MIB modules <\/td>\n<\/tr>\n
600<\/td>\n17.3.3 Relationship of the IEEE8021-RSTP MIB to other MIB modules
17.3.4 Relationship of the IEEE8021-Q-BRIDGE-MIB to other MIB modules <\/td>\n<\/tr>\n
602<\/td>\n17.3.5 Relationship of the IEEE8021-PB-BRIDGE MIB to other MIB modules
17.3.6 Relationship of the IEEE8021-MSTP-MIB to other MIB modules
17.3.7 Relationship of the IEEE8021-CFM-MIB to other MIB modules <\/td>\n<\/tr>\n
603<\/td>\n17.3.8 Relationship of the IEEE8021-PBB-MIB to other MIB modules <\/td>\n<\/tr>\n
605<\/td>\n17.3.9 Relationship of the IEEE8021-DDCFM to other MIB modules
17.3.10 Relationship of the IEEE8021-PBBTE-MIB to other MIB modules
17.3.11 Relationship of the TPMR MIB to other MIB modules <\/td>\n<\/tr>\n
606<\/td>\n17.3.12 Relationship of the IEEE8021-FQTSS-MIB to other MIB modules
17.3.13 Relationship of the IEEE802-CN-MIB to other MIB modules
17.3.14 Relationship of the IEEE8021-SRP-MIB to other MIB modules
17.3.15 Relationship of the IEEE8021-MVRPX-MIB to other MIB modules <\/td>\n<\/tr>\n
607<\/td>\n17.3.16 Relationship of the IEEE8021-MIRP-MIB to other MIB modules
17.3.17 Relationship of the PFC MIB to other MIB modules
17.3.18 Relationship of the IEEE8021-TEIPS-MIB to other MIB modules
17.3.19 Relationship of the of the IEEE8021-SPB-MIB to other MIB modules
17.3.20 Relationship of the IEEE8021-EVB-MIB to other MIB modules
17.3.21 Relationship of the of the IEEE8021-ECMP-MIB to other MIB modules <\/td>\n<\/tr>\n
608<\/td>\n17.4 Security considerations
17.4.1 Security considerations of the IEEE8021-TC-MIB
17.4.2 Security considerations of the IEEE8021-BRIDGE-MIB <\/td>\n<\/tr>\n
609<\/td>\n17.4.3 Security considerations of the IEEE8021-SPANNING-TREE MIB <\/td>\n<\/tr>\n
610<\/td>\n17.4.4 Security considerations of the IEEE8021-Q-BRIDGE-MIB <\/td>\n<\/tr>\n
611<\/td>\n17.4.5 Security considerations of the IEEE8021-PB-MIB
17.4.6 Security considerations of the IEEE8021-MSTP-MIB
17.4.7 Security considerations of the IEEE8021-CFM-MIB <\/td>\n<\/tr>\n
614<\/td>\n17.4.8 Security considerations of the IEEE8021-PBB-MIB
17.4.9 Security considerations of the IEEE8021-DDCFM-MIB <\/td>\n<\/tr>\n
615<\/td>\n17.4.10 Security considerations of the IEEE8021-PBBTE-MIB <\/td>\n<\/tr>\n
616<\/td>\n17.4.11 Security considerations of the TPMR MIB
17.4.12 Security considerations of the IEEE8021-FQTSS-MIB <\/td>\n<\/tr>\n
617<\/td>\n17.4.13 Security considerations of the Congestion Notification MIB <\/td>\n<\/tr>\n
618<\/td>\n17.4.14 Security considerations of the IEEE8021-SRP-MIB <\/td>\n<\/tr>\n
619<\/td>\n17.4.15 Security considerations of the IEEE8021-MVRPX-MIB
17.4.16 Security considerations of the IEEE8021-MIRP-MIB <\/td>\n<\/tr>\n
620<\/td>\n17.4.17 Security considerations for the PFC MIB
17.4.18 Security considerations of the IEEE8021-TEIPS-MIB
17.4.19 Security considerations of the IEEE8021-SPB-MIB <\/td>\n<\/tr>\n
621<\/td>\n17.4.20 Security considerations of the IEEE8021-EVB-MIB <\/td>\n<\/tr>\n
622<\/td>\n17.4.21 Security considerations of the IEEE8021-ECMP-MIB <\/td>\n<\/tr>\n
623<\/td>\n17.5 Dynamic component and Port creation
17.5.1 Overview of the dynamically created Bridge entities <\/td>\n<\/tr>\n
624<\/td>\n17.5.2 Component creation <\/td>\n<\/tr>\n
625<\/td>\n17.5.3 Port creation <\/td>\n<\/tr>\n
635<\/td>\n17.6 MIB operations for service interface configuration
17.6.1 Provisioning PBN service interfaces <\/td>\n<\/tr>\n
638<\/td>\n17.6.2 Provisioning Backbone Bridged Network service interfaces <\/td>\n<\/tr>\n
644<\/td>\n17.7 MIB modules,
17.7.1 Definitions for the IEEE8021-TC-MIB module <\/td>\n<\/tr>\n
655<\/td>\n17.7.2 Definitions for the IEEE8021-BRIDGE-MIB module <\/td>\n<\/tr>\n
695<\/td>\n17.7.3 Definitions for the IEEE8021-SPANNING-TREE-MIB module <\/td>\n<\/tr>\n
713<\/td>\n17.7.4 Definitions for the IEEE8021-Q-BRIDGE-MIB module <\/td>\n<\/tr>\n
759<\/td>\n17.7.5 Definitions for the IEEE8021-PB-MIB module <\/td>\n<\/tr>\n
777<\/td>\n17.7.6 Definitions for the IEEE8021-MSTP-MIB module <\/td>\n<\/tr>\n
806<\/td>\n17.7.7 Definitions for the CFM MIB modules <\/td>\n<\/tr>\n
888<\/td>\n17.7.8 Definitions for the IEEE8021-PBB-MIB module <\/td>\n<\/tr>\n
911<\/td>\n17.7.9 Definitions for the IEEE8021-DDCFM-MIB module <\/td>\n<\/tr>\n
929<\/td>\n17.7.10 Definitions for the IEEE8021-PBBTE-MIB module <\/td>\n<\/tr>\n
946<\/td>\n17.7.11 Definitions for the IEEE8021-TPMR-MIB module <\/td>\n<\/tr>\n
960<\/td>\n17.7.12 Definitions for the IEEE8021-FQTSS-MIB module <\/td>\n<\/tr>\n
971<\/td>\n17.7.13 Definitions for the IEEE8021-CN-MIB module <\/td>\n<\/tr>\n
1007<\/td>\n17.7.14 Definitions for the IEEE8021-SRP-MIB module <\/td>\n<\/tr>\n
1023<\/td>\n17.7.15 Definitions for the IEEE8021-MVRPX-MIB module <\/td>\n<\/tr>\n
1028<\/td>\n17.7.16 Definitions for the IEEE8021-MIRP-MIB module <\/td>\n<\/tr>\n
1034<\/td>\n17.7.17 Definitions for the IEEE8021-PFC-MIB module <\/td>\n<\/tr>\n
1038<\/td>\n17.7.18 Definitions for the IEEE8021-TEIPS-V2-MIB module <\/td>\n<\/tr>\n
1052<\/td>\n17.7.19 Definitions for the IEEE8021-SPB-MIB module <\/td>\n<\/tr>\n
1089<\/td>\n17.7.20 Definitions for the IEEE8021-EVB-MIB module <\/td>\n<\/tr>\n
1118<\/td>\n17.7.21 Definitions for the IEEE8021-ECMP-MIB module <\/td>\n<\/tr>\n
1126<\/td>\n18. Principles of Connectivity Fault Management operation <\/td>\n<\/tr>\n
1127<\/td>\n18.1 Maintenance Domains and DoSAPs <\/td>\n<\/tr>\n
1129<\/td>\n18.2 Service instances and MAs <\/td>\n<\/tr>\n
1130<\/td>\n18.3 Maintenance Domain Levels <\/td>\n<\/tr>\n
1134<\/td>\n19. CFM entity operation
19.1 Maintenance Points <\/td>\n<\/tr>\n
1135<\/td>\n19.2 MA Endpoints (MEPs)
19.2.1 MEP identification <\/td>\n<\/tr>\n
1136<\/td>\n19.2.2 MEP functions
19.2.3 MEP architecture <\/td>\n<\/tr>\n
1138<\/td>\n19.2.4 MP Type Demultiplexer
19.2.5 MP Multiplexer
19.2.6 MP Level Demultiplexer
19.2.7 MP OpCode Demultiplexer <\/td>\n<\/tr>\n
1139<\/td>\n19.2.8 MEP Continuity Check Receiver
19.2.9 MEP Continuity Check Initiator <\/td>\n<\/tr>\n
1140<\/td>\n19.2.10 MP Loopback Responder
19.2.11 MEP Loopback Initiator
19.2.12 MEP Linktrace Initiator
19.2.13 MEP LTI SAP
19.2.14 MEP Linktrace SAP
19.2.15 MEP CCM Database
19.2.16 MEP Fault Notification Generator <\/td>\n<\/tr>\n
1141<\/td>\n19.2.17 MEP Decapsulator Responder (DR)
19.2.18 MEP RFM Receiver
19.3 MIP Half Function
19.3.1 MHF identification
19.3.2 MHF functions <\/td>\n<\/tr>\n
1142<\/td>\n19.3.3 MHF architecture
19.3.4 MHF Level Demultiplexer
19.3.5 MHF Type Demultiplexer
19.3.6 MHF OpCode Demultiplexer
19.3.7 MHF Multiplexer
19.3.8 MHF Loopback Responder <\/td>\n<\/tr>\n
1143<\/td>\n19.3.9 MHF Continuity Check Receiver
19.3.10 MIP CCM Database <\/td>\n<\/tr>\n
1144<\/td>\n19.3.11 MHF Linktrace SAP
19.3.12 MHF DR
19.3.13 MHF RFM Receiver
19.4 MP addressing <\/td>\n<\/tr>\n
1145<\/td>\n19.5 Linktrace Output Multiplexer (LOM)
19.6 Linktrace Responder <\/td>\n<\/tr>\n
1147<\/td>\n20. CFM protocols <\/td>\n<\/tr>\n
1148<\/td>\n20.1 Continuity Check protocol <\/td>\n<\/tr>\n
1150<\/td>\n20.1.1 MAC status reporting in the CCM
20.1.2 Defects and Fault Alarms <\/td>\n<\/tr>\n
1151<\/td>\n20.1.3 CCM reception
20.2 Loopback protocol <\/td>\n<\/tr>\n
1152<\/td>\n20.2.1 LBM transmission
20.2.2 LBM reception and LBR transmission <\/td>\n<\/tr>\n
1153<\/td>\n20.2.3 LBR reception
20.3 Linktrace protocol <\/td>\n<\/tr>\n
1154<\/td>\n20.3.1 LTM origination <\/td>\n<\/tr>\n
1155<\/td>\n20.3.2 LTM reception, forwarding, and replying <\/td>\n<\/tr>\n
1156<\/td>\n20.3.3 LTR reception <\/td>\n<\/tr>\n
1157<\/td>\n20.4 CFM state machines
20.5 CFM state machine timers <\/td>\n<\/tr>\n
1159<\/td>\n20.5.1 LTFwhile
20.5.2 CCIwhile
20.5.3 errorCCMwhile
20.5.4 xconCCMwhile
20.5.5 LBIwhile
20.5.6 FNGwhile
20.5.7 mmCCMwhile
20.5.8 mmLocwhile
20.5.9 mmFNGwhile
20.5.10 rMEPwhile <\/td>\n<\/tr>\n
1160<\/td>\n20.6 CFM procedures
20.6.1 CCMtime()
20.7 Maintenance Domain variable
20.7.1 mdLevel
20.8 MA variables
20.8.1 CCMinterval
20.9 MEP variables <\/td>\n<\/tr>\n
1161<\/td>\n20.9.1 MEPactive
20.9.2 enableRmepDefect <\/td>\n<\/tr>\n
1162<\/td>\n20.9.3 MAdefectIndication
20.9.4 allRMEPsDead
20.9.5 lowestAlarmPri
20.9.6 presentRDI
20.9.7 MEPprimaryVID
20.9.8 presentTraffic
20.9.9 presentmmLoc <\/td>\n<\/tr>\n
1163<\/td>\n20.9.10 ISpresentTraffic
20.9.11 ISpresentmmLoc
20.9.12 EpMEP
20.10 MEP Continuity Check Initiator variables
20.10.1 CCIenabled
20.10.2 CCIsentCCMs
20.10.3 MACstatusChanged
20.10.4 Npaths <\/td>\n<\/tr>\n
1164<\/td>\n20.10.5 flowHash[ ]
20.10.6 pathN
20.10.7 CCMcnt
20.11 MEP Continuity Check Initiator procedures
20.11.1 xmitCCM() <\/td>\n<\/tr>\n
1165<\/td>\n20.12 MEP Continuity Check Initiator state machine
20.13 MHF Continuity Check Receiver variables <\/td>\n<\/tr>\n
1166<\/td>\n20.13.1 MHFrecvdCCM
20.13.2 MHFCCMPDU
20.14 MHF Continuity Check Receiver procedures
20.14.1 MHFprocessCCM()
20.15 MHF Continuity Check Receiver state machine
20.16 MEP Continuity Check Receiver variables <\/td>\n<\/tr>\n
1167<\/td>\n20.16.1 CCMreceivedEqual
20.16.2 CCMequalPDU
20.16.3 CCMreceivedLow
20.16.4 CCMlowPDU
20.16.5 recvdMacAddress
20.16.6 recvdRDI
20.16.7 recvdInterval <\/td>\n<\/tr>\n
1168<\/td>\n20.16.8 recvdPortState
20.16.9 recvdInterfaceStatus
20.16.10 recvdSenderId
20.16.11 recvdFrame
20.16.12 CCMsequenceErrors
20.16.13 rcvdTrafficBit
20.17 MEP Continuity Check Receiver procedures
20.17.1 MEPprocessEqualCCM() <\/td>\n<\/tr>\n
1169<\/td>\n20.17.2 MEPprocessLowCCM()
20.18 MEP Continuity Check Receiver state machine <\/td>\n<\/tr>\n
1170<\/td>\n20.19 Remote MEP variables
20.19.1 rMEPCCMdefect
20.19.2 rMEPlastRDI and rMEPlastRDI[i] <\/td>\n<\/tr>\n
1171<\/td>\n20.19.3 rMEPlastPortState
20.19.4 rMEPlastInterfaceStatus
20.19.5 rMEPlastSenderId
20.19.6 rCCMreceived
20.19.7 rMEPmacAddress
20.19.8 rMEPportStatusDefect
20.19.9 rMEPinterfaceStatusDefect
20.19.10 lastPathN <\/td>\n<\/tr>\n
1172<\/td>\n20.20 Remote MEP state machine
20.21 Remote MEP Error variables <\/td>\n<\/tr>\n
1173<\/td>\n20.21.1 errorCCMreceived
20.21.2 errorCCMlastFailure
20.21.3 errorCCMdefect
20.22 Remote MEP Error state machine
20.23 MEP Cross Connect variables <\/td>\n<\/tr>\n
1174<\/td>\n20.23.1 xconCCMreceived
20.23.2 xconCCMlastFailure
20.23.3 xconCCMdefect
20.24 MEP Cross Connect state machine <\/td>\n<\/tr>\n
1175<\/td>\n20.25 MEP Mismatch variables
20.25.1 mmCCMreceived
20.25.2 mmCCMdefect
20.25.3 mmCCMTime
20.25.4 disableLocdefect
20.25.5 mmLocdefect <\/td>\n<\/tr>\n
1176<\/td>\n20.26 MEP Mismatch state machines <\/td>\n<\/tr>\n
1177<\/td>\n20.27 MP Loopback Responder variables
20.27.1 LBMreceived
20.27.2 LBMPDU
20.28 MP Loopback Responder procedures
20.28.1 ProcessLBM() <\/td>\n<\/tr>\n
1178<\/td>\n20.28.2 xmitLBR()
20.29 MP Loopback Responder state machine <\/td>\n<\/tr>\n
1179<\/td>\n20.30 MEP Loopback Initiator variables
20.30.1 LBMsToSend
20.30.2 nextLBMtransID
20.30.3 expectedLBRtransID
20.30.4 LBIactive
20.30.5 xmitReady
20.30.6 LBRreceived
20.30.7 LBRPDU <\/td>\n<\/tr>\n
1180<\/td>\n20.31 MEP Loopback Initiator transmit procedures
20.31.1 xmitLBM() <\/td>\n<\/tr>\n
1181<\/td>\n20.32 MEP Loopback Initiator transmit state machine
20.33 MEP Loopback Initiator receive procedures
20.33.1 ProcessLBR() <\/td>\n<\/tr>\n
1182<\/td>\n20.34 MEP Loopback Initiator receive state machine
20.35 MEP Fault Notification Generator variables
20.35.1 fngPriority <\/td>\n<\/tr>\n
1183<\/td>\n20.35.2 fngDefect
20.35.3 fngAlarmTime
20.35.4 fngResetTime
20.35.5 someRMEPCCMdefect
20.35.6 someMACstatusDefect
20.35.7 someRDIdefect
20.35.8 highestDefectPri
20.35.9 highestDefect <\/td>\n<\/tr>\n
1184<\/td>\n20.36 MEP Fault Notification Generator procedures
20.36.1 xmitFaultAlarm()
20.37 MEP Fault Notification Generator state machine <\/td>\n<\/tr>\n
1185<\/td>\n20.38 MEP Mismatch Fault Notification Generator variables
20.38.1 mfngAllowed
20.38.2 mmdefectIndication
20.38.3 mfngAlarmTime
20.38.4 mfngResetTime
20.39 MEP Mismatch Fault Notification Generator procedures
20.39.1 xmitFaultAlarm() <\/td>\n<\/tr>\n
1186<\/td>\n20.40 MEP Mismatch Fault Notification Generator state machine
20.41 MEP Linktrace Initiator variables
20.41.1 nextLTMtransID <\/td>\n<\/tr>\n
1187<\/td>\n20.41.2 ltmReplyList <\/td>\n<\/tr>\n
1188<\/td>\n20.42 MEP Linktrace Initiator procedures <\/td>\n<\/tr>\n
1189<\/td>\n20.42.1 xmitLTM()
20.43 MEP Linktrace Initiator receive variables
20.43.1 LTRreceived <\/td>\n<\/tr>\n
1190<\/td>\n20.43.2 LTRPDU
20.44 MEP Linktrace Initiator receive procedures
20.44.1 ProcessLTR()
20.45 MEP Linktrace Initiator receive state machine <\/td>\n<\/tr>\n
1191<\/td>\n20.46 Linktrace Responder variables
20.46.1 nPendingLTRs
20.46.2 LTMreceived
20.46.3 LTMPDU
20.47 LTM Receiver procedures
20.47.1 ProcessLTM() <\/td>\n<\/tr>\n
1195<\/td>\n20.47.2 clearPendingLTRs() <\/td>\n<\/tr>\n
1196<\/td>\n20.47.3 ForwardLTM()
20.47.4 enqueLTR() <\/td>\n<\/tr>\n
1198<\/td>\n20.48 LTM Receiver state machine
20.49 LTR Transmitter procedure
20.49.1 xmitOldestLTR()
20.50 LTR Transmitter state machine <\/td>\n<\/tr>\n
1199<\/td>\n20.51 CFM PDU validation and versioning
20.51.1 Goals of CFM PDU versioning
20.51.2 PDU transmission <\/td>\n<\/tr>\n
1200<\/td>\n20.51.3 PDU validation
20.51.4 Validation pass <\/td>\n<\/tr>\n
1201<\/td>\n20.51.5 Execution pass <\/td>\n<\/tr>\n
1202<\/td>\n20.51.6 Future extensions
20.52 PDU identification <\/td>\n<\/tr>\n
1203<\/td>\n20.53 Use of transaction IDs and sequence numbers <\/td>\n<\/tr>\n
1204<\/td>\n21. Encoding of CFM PDUs
21.1 Structure, representation, and encoding
21.2 CFM encapsulation <\/td>\n<\/tr>\n
1205<\/td>\n21.3 CFM request and indication parameters
21.3.1 destination_address parameter
21.3.2 source_address parameter <\/td>\n<\/tr>\n
1206<\/td>\n21.4 Common CFM Header
21.4.1 MD Level
21.4.2 Version
21.4.3 OpCode <\/td>\n<\/tr>\n
1207<\/td>\n21.4.4 Flags
21.4.5 First TLV Offset
21.5 TLV format
21.5.1 General format for CFM TLVs <\/td>\n<\/tr>\n
1208<\/td>\n21.5.2 Organization-Specific TLV <\/td>\n<\/tr>\n
1209<\/td>\n21.5.3 Sender ID TLV <\/td>\n<\/tr>\n
1211<\/td>\n21.5.4 Port Status TLV
21.5.5 Interface Status TLV <\/td>\n<\/tr>\n
1212<\/td>\n21.5.6 Data TLV
21.5.7 End TLV <\/td>\n<\/tr>\n
1213<\/td>\n21.6 CCM format
21.6.1 Flags <\/td>\n<\/tr>\n
1214<\/td>\n21.6.2 First TLV Offset
21.6.3 Sequence Number <\/td>\n<\/tr>\n
1215<\/td>\n21.6.4 Maintenance association Endpoint Identifier
21.6.5 Maintenance Association Identifier <\/td>\n<\/tr>\n
1217<\/td>\n21.6.6 Defined by ITU-T Y.1731 (02\/2008)
21.6.7 Optional CCM TLVs <\/td>\n<\/tr>\n
1218<\/td>\n21.7 LBM and LBR formats
21.7.1 Flags
21.7.2 First TLV Offset
21.7.3 Loopback Transaction Identifier
21.7.4 Additional LBM\/LBR TLVs <\/td>\n<\/tr>\n
1219<\/td>\n21.7.5 PBB-TE MIP TLV <\/td>\n<\/tr>\n
1220<\/td>\n21.8 LTM format
21.8.1 Flags
21.8.2 First TLV Offset
21.8.3 LTM Transaction Identifier <\/td>\n<\/tr>\n
1221<\/td>\n21.8.4 LTM TTL
21.8.5 Original MAC Address
21.8.6 Target MAC Address
21.8.7 Additional LTM TLVs
21.8.8 LTM Egress Identifier TLV <\/td>\n<\/tr>\n
1222<\/td>\n21.9 LTR format
21.9.1 Flags <\/td>\n<\/tr>\n
1223<\/td>\n21.9.2 First TLV Offset
21.9.3 LTR Transaction Identifier
21.9.4 Reply TTL
21.9.5 Relay Action
21.9.6 Additional LTR TLVs <\/td>\n<\/tr>\n
1224<\/td>\n21.9.7 LTR Egress Identifier TLV
21.9.8 Reply Ingress TLV <\/td>\n<\/tr>\n
1225<\/td>\n21.9.9 Reply Egress TLV <\/td>\n<\/tr>\n
1228<\/td>\n22. CFM in systems
22.1 CFM shims in Bridges
22.1.1 Preliminary positioning of MPs <\/td>\n<\/tr>\n
1229<\/td>\n22.1.2 CFM and the Forwarding Process <\/td>\n<\/tr>\n
1231<\/td>\n22.1.3 Up\/Down separation of MPs <\/td>\n<\/tr>\n
1233<\/td>\n22.1.4 Service instances over multiple Bridges <\/td>\n<\/tr>\n
1235<\/td>\n22.1.5 Multiple VID service instances
22.1.6 Untagged CFM PDUs
22.1.7 MPs and non-VLAN aware Bridges <\/td>\n<\/tr>\n
1236<\/td>\n22.1.8 MPs and other standards <\/td>\n<\/tr>\n
1238<\/td>\n22.1.9 CFM and IEEE 802.3-2012 Clause 57 OAM
22.2 Maintenance Entity creation <\/td>\n<\/tr>\n
1239<\/td>\n22.2.1 Creating Maintenance Domains and MAs
22.2.2 Creating MEPs <\/td>\n<\/tr>\n
1241<\/td>\n22.2.3 Creating MIPs <\/td>\n<\/tr>\n
1242<\/td>\n22.2.4 CFM configuration errors <\/td>\n<\/tr>\n
1243<\/td>\n22.3 MPs, Ports, and MD Level assignment
22.4 Stations and CFM <\/td>\n<\/tr>\n
1244<\/td>\n22.5 Scalability of CFM <\/td>\n<\/tr>\n
1245<\/td>\n22.6 CFM in Provider Bridges
22.6.1 MPs and C-VLAN components <\/td>\n<\/tr>\n
1246<\/td>\n22.6.2 Maintenance C-VLAN on a Port-based service interface <\/td>\n<\/tr>\n
1247<\/td>\n22.6.3 Maintenance C-VLAN on a C-tagged service interface
22.6.4 MPs and Port-mapping S-VLAN components <\/td>\n<\/tr>\n
1249<\/td>\n22.7 Management Port MEPs and CFM in the enterprise environment <\/td>\n<\/tr>\n
1250<\/td>\n22.8 Implementing CFM on Bridges that implement earlier revisions of IEEE Std 802.1Q <\/td>\n<\/tr>\n
1252<\/td>\n23. MAC status propagation <\/td>\n<\/tr>\n
1253<\/td>\n23.1 Model of operation <\/td>\n<\/tr>\n
1254<\/td>\n23.1.1 MAC Status Shim (MSS) <\/td>\n<\/tr>\n
1255<\/td>\n23.1.2 Relationship of CFM to the MSS
23.2 MAC Status Protocol (MSP) overview <\/td>\n<\/tr>\n
1260<\/td>\n23.3 MSP state machines <\/td>\n<\/tr>\n
1261<\/td>\n23.4 State machine timers
23.4.1 linkNotifyWhen
23.4.2 linkNotifyWhile
23.4.3 macNotifyWhile
23.4.4 macRecoverWhile
23.5 MSP performance parameters <\/td>\n<\/tr>\n
1262<\/td>\n23.5.1 LinkNotify
23.5.2 LinkNotifyWait
23.5.3 LinkNotifyRetry
23.5.4 MACNotify
23.5.5 MACNotifyTime
23.5.6 MACRecoverTime
23.6 State machine variables
23.6.1 BEGIN
23.6.2 addConfirmed
23.6.3 disableMAC
23.6.4 disabledMAC <\/td>\n<\/tr>\n
1263<\/td>\n23.6.5 disableMSS
23.6.6 lossConfirmed
23.6.7 macOperational
23.6.8 mssOperational
23.6.9 prop
23.6.10 rxAck
23.6.11 rxAdd
23.6.12 rxAddConfirm
23.6.13 rxLoss
23.6.14 rxLossConfirm
23.6.15 txAck
23.6.16 txAdd <\/td>\n<\/tr>\n
1264<\/td>\n23.6.17 txAddConfirm
23.6.18 txLoss
23.6.19 txLossConfirm
23.7 State machine procedures
23.8 Status Transition state machine (STM) <\/td>\n<\/tr>\n
1265<\/td>\n23.9 Status Notification state machine (SNM)
23.10 Receive Process
23.11 Transmit Process
23.12 Management of MSP <\/td>\n<\/tr>\n
1266<\/td>\n23.13 MSPDU transmission, addressing, and protocol identification
23.13.1 Destination MAC Address
23.13.2 Source MAC Address <\/td>\n<\/tr>\n
1267<\/td>\n23.13.3 Priority
23.13.4 EtherType use and encoding
23.14 Representation and encoding of octets
23.15 MSPDU structure <\/td>\n<\/tr>\n
1268<\/td>\n23.15.1 Protocol Version
23.15.2 Packet Type
23.16 Validation of received MSPDUs
23.17 Other MSP participants <\/td>\n<\/tr>\n
1269<\/td>\n24. Bridge performance
24.1 Guaranteed Port Filtering Rate
24.2 Guaranteed Bridge Relaying Rate
24.3 RSTP performance requirements <\/td>\n<\/tr>\n
1271<\/td>\n25. Support of the MAC Service by PBBNs <\/td>\n<\/tr>\n
1273<\/td>\n25.1 Service transparency
25.2 Customer service interface <\/td>\n<\/tr>\n
1274<\/td>\n25.3 Port-based service interface <\/td>\n<\/tr>\n
1275<\/td>\n25.4 S-tagged service interface <\/td>\n<\/tr>\n
1277<\/td>\n25.5 I-tagged service interface <\/td>\n<\/tr>\n
1279<\/td>\n25.6 Service instance segregation
25.7 Service instance selection and identification <\/td>\n<\/tr>\n
1280<\/td>\n25.8 Service priority and drop eligibility selection
25.9 Service access protection <\/td>\n<\/tr>\n
1282<\/td>\n25.9.1 Class II redundant LANs access protection <\/td>\n<\/tr>\n
1283<\/td>\n25.9.2 Class III simple redundant LANs and nodes access protection <\/td>\n<\/tr>\n
1284<\/td>\n25.10 Support of the MAC Service by a PBB-TE Region <\/td>\n<\/tr>\n
1285<\/td>\n25.10.1 Provisioning TESIs <\/td>\n<\/tr>\n
1286<\/td>\n25.10.2 ESP forwarding behavior <\/td>\n<\/tr>\n
1287<\/td>\n25.11 Transparent service interface <\/td>\n<\/tr>\n
1289<\/td>\n26. Principles of Provider Backbone Bridged Network (PBBN) operation
26.1 PBBN overview <\/td>\n<\/tr>\n
1290<\/td>\n26.2 PBBN example <\/td>\n<\/tr>\n
1292<\/td>\n26.3 B-VLAN connectivity <\/td>\n<\/tr>\n
1293<\/td>\n26.4 Backbone addressing <\/td>\n<\/tr>\n
1294<\/td>\n26.4.1 Learning individual backbone addresses at a PIP
26.4.2 Translating backbone destination addresses at a CBP <\/td>\n<\/tr>\n
1295<\/td>\n26.4.3 Backbone addressing considerations for CFM MPs
26.5 Detection of connectivity loops through attached networks
26.6 Scaling of PBBs <\/td>\n<\/tr>\n
1296<\/td>\n26.6.1 Hierarchal PBBNs
26.6.2 Peer PBBNs
26.7 Network management <\/td>\n<\/tr>\n
1297<\/td>\n26.8 CFM in PBBs <\/td>\n<\/tr>\n
1302<\/td>\n26.8.1 CFM over Port-based and S-tagged service interfaces <\/td>\n<\/tr>\n
1303<\/td>\n26.8.2 CFM over I-tagged Service Interfaces
26.8.3 CFM over hierarchal E-NNI
26.8.4 CFM over peer E-NNI <\/td>\n<\/tr>\n
1304<\/td>\n26.9 CFM in a PBB-TE Region
26.9.1 Addressing PBB-TE MEPs <\/td>\n<\/tr>\n
1305<\/td>\n26.9.2 TESI identification
26.9.3 PBB-TE MEP placement in a Bridge Port
26.9.4 PBB-TE MIP placement in a Bridge Port
26.9.5 TESI Maintenance Domains <\/td>\n<\/tr>\n
1306<\/td>\n26.9.6 PBB-TE enhancements of the CFM protocols <\/td>\n<\/tr>\n
1308<\/td>\n26.9.7 Addressing Infrastructure Segment MEPs
26.9.8 Infrastructure Segment identification <\/td>\n<\/tr>\n
1309<\/td>\n26.9.9 Infrastructure Segment MEP placement in a Bridge Port
26.9.10 Infrastructure Segment Maintenance Domains
26.9.11 IPS extensions to Continuity Check operation <\/td>\n<\/tr>\n
1311<\/td>\n26.10 Protection switching for point-to-point TESIs
26.10.1 Introduction <\/td>\n<\/tr>\n
1312<\/td>\n26.10.2 1:1 point-to-point TESI protection switching <\/td>\n<\/tr>\n
1315<\/td>\n26.10.3 Protection Switching state machines <\/td>\n<\/tr>\n
1320<\/td>\n26.11 IPS in PBB-TE Region <\/td>\n<\/tr>\n
1321<\/td>\n26.11.1 Infrastructure Segment monitoring <\/td>\n<\/tr>\n
1322<\/td>\n26.11.2 1:1 IPS <\/td>\n<\/tr>\n
1325<\/td>\n26.11.3 IPS Control entity <\/td>\n<\/tr>\n
1326<\/td>\n26.11.4 1:1 IPS state machines
26.11.5 M:1 IPS <\/td>\n<\/tr>\n
1332<\/td>\n26.12 Mismatch defect <\/td>\n<\/tr>\n
1333<\/td>\n26.13 Signaling VLAN registrations among I-components <\/td>\n<\/tr>\n
1334<\/td>\n27. Shortest Path Bridging (SPB) <\/td>\n<\/tr>\n
1336<\/td>\n27.1 Protocol design requirements <\/td>\n<\/tr>\n
1337<\/td>\n27.2 Protocol support <\/td>\n<\/tr>\n
1338<\/td>\n27.3 Protocol design goals
27.4 ISIS-SPB VLAN configuration <\/td>\n<\/tr>\n
1340<\/td>\n27.4.1 SPT Region and ISIS-SPB adjacency determination <\/td>\n<\/tr>\n
1341<\/td>\n27.5 ISIS-SPB information <\/td>\n<\/tr>\n
1342<\/td>\n27.6 Calculating CIST connectivity <\/td>\n<\/tr>\n
1343<\/td>\n27.7 Connectivity between regions in the same domain
27.8 Calculating SPT connectivity <\/td>\n<\/tr>\n
1344<\/td>\n27.8.1 ISIS-SPB overload
27.9 Loop prevention <\/td>\n<\/tr>\n
1345<\/td>\n27.10 SPVID and SPSourceID allocation <\/td>\n<\/tr>\n
1346<\/td>\n27.11 Allocation of VIDs to FIDs <\/td>\n<\/tr>\n
1347<\/td>\n27.12 SPBV SPVID translation
27.13 VLAN topology management <\/td>\n<\/tr>\n
1348<\/td>\n27.14 Individual addresses and SPBM <\/td>\n<\/tr>\n
1349<\/td>\n27.14.1 Loop mitigation
27.14.2 Loop prevention <\/td>\n<\/tr>\n
1350<\/td>\n27.15 SPBM group addressing <\/td>\n<\/tr>\n
1351<\/td>\n27.16 Backbone service instance topology management <\/td>\n<\/tr>\n
1352<\/td>\n27.17 Equal cost shortest paths, ECTs, and load spreading
27.18 Connectivity Fault Management for SPBM <\/td>\n<\/tr>\n
1353<\/td>\n27.18.1 SPBM MA types
27.18.2 SPBM MEP placement in a Bridge Port
27.18.3 SPBM MIP placement in a Bridge Port <\/td>\n<\/tr>\n
1354<\/td>\n27.18.4 SPBM modifications of the CFM protocols <\/td>\n<\/tr>\n
1355<\/td>\n27.19 Using SPBV and SPBM modes
27.19.1 Shortest Path Bridging\u2014VID <\/td>\n<\/tr>\n
1357<\/td>\n27.19.2 Shortest Path Bridging\u2014MAC <\/td>\n<\/tr>\n
1359<\/td>\n27.20 Security considerations <\/td>\n<\/tr>\n
1360<\/td>\n28. ISIS-SPB Link State Protocol
28.1 ISIS-SPB control plane MAC <\/td>\n<\/tr>\n
1361<\/td>\n28.2 Formation and maintenance of ISIS-SPB adjacencies <\/td>\n<\/tr>\n
1362<\/td>\n28.3 Loop prevention
28.4 The Agreement Digest <\/td>\n<\/tr>\n
1363<\/td>\n28.4.1 Agreement Digest Format Identifier
28.4.2 Agreement Digest Format Capabilities
28.4.3 Agreement Digest Convention Identifier <\/td>\n<\/tr>\n
1364<\/td>\n28.4.4 Agreement Digest Convention Capabilities
28.4.5 Agreement Digest Edge Count
28.4.6 The Computed Topology Digest <\/td>\n<\/tr>\n
1365<\/td>\n28.5 Symmetric shortest path tie breaking <\/td>\n<\/tr>\n
1366<\/td>\n28.6 Symmetric ECT framework <\/td>\n<\/tr>\n
1367<\/td>\n28.7 Symmetric ECT <\/td>\n<\/tr>\n
1368<\/td>\n28.8 ECT Algorithm details <\/td>\n<\/tr>\n
1369<\/td>\n28.9 ECT Migration <\/td>\n<\/tr>\n
1370<\/td>\n28.9.1 Use of a new ECT Algorithm in SPBV
28.9.2 Use of a new ECT Algorithm in SPBM <\/td>\n<\/tr>\n
1371<\/td>\n28.10 MAC address registration
28.11 Circuit IDs and Port Identifiers <\/td>\n<\/tr>\n
1372<\/td>\n28.12 ISIS-SPB TLVs
28.12.1 MT-Capability TLV <\/td>\n<\/tr>\n
1373<\/td>\n28.12.2 SPB MCID sub-TLV
28.12.3 SPB Digest sub-TLV <\/td>\n<\/tr>\n
1374<\/td>\n28.12.4 SPB Base VLAN-Identifiers sub-TLV <\/td>\n<\/tr>\n
1375<\/td>\n28.12.5 SPB Instance sub-TLV <\/td>\n<\/tr>\n
1377<\/td>\n28.12.6 SPB Instance Opaque ECT Algorithm sub-TLV <\/td>\n<\/tr>\n
1378<\/td>\n28.12.7 SPB Link Metric sub-TLV <\/td>\n<\/tr>\n
1379<\/td>\n28.12.8 SPB Adjacency Opaque ECT Algorithm sub-TLV
28.12.9 SPBV MAC address sub-TLV <\/td>\n<\/tr>\n
1381<\/td>\n28.12.10 SPBM Service Identifier and Unicast Address (ISID-ADDR) sub-TLV <\/td>\n<\/tr>\n
1384<\/td>\n29. DDCFM operations and protocols
29.1 Principles of DDCFM operation
29.1.1 Data-driven and data-dependent faults (DDFs)
29.1.2 Basic principle to diagnose and isolate DDFs <\/td>\n<\/tr>\n
1387<\/td>\n29.2 DDCFM Entity operation
29.2.1 DDCFM implementation <\/td>\n<\/tr>\n
1388<\/td>\n29.2.2 FPT RR <\/td>\n<\/tr>\n
1389<\/td>\n29.2.3 RR-related parameters <\/td>\n<\/tr>\n
1390<\/td>\n29.2.4 Reflection Target and RFM Receiver
29.2.5 RPT-related parameters <\/td>\n<\/tr>\n
1391<\/td>\n29.2.6 Decapsulator Responder (DR) <\/td>\n<\/tr>\n
1392<\/td>\n29.2.7 SFM Originator
29.3 DDCFM protocols
29.3.1 RR variables <\/td>\n<\/tr>\n
1394<\/td>\n29.3.2 RR Filter procedures <\/td>\n<\/tr>\n
1395<\/td>\n29.3.3 RR Encapsulation procedures <\/td>\n<\/tr>\n
1396<\/td>\n29.3.4 RR Transmit procedure <\/td>\n<\/tr>\n
1397<\/td>\n29.3.5 RR-related state machines <\/td>\n<\/tr>\n
1399<\/td>\n29.3.6 RFM Receiver variables
29.3.7 RFM Receiver procedure <\/td>\n<\/tr>\n
1400<\/td>\n29.3.8 DR variables <\/td>\n<\/tr>\n
1401<\/td>\n29.3.9 DR procedures <\/td>\n<\/tr>\n
1402<\/td>\n29.3.10 Decapsulator Responder state machine
29.4 Encoding of DDCFM PDUs
29.4.1 RFM and SFM Header <\/td>\n<\/tr>\n
1403<\/td>\n29.4.2 RFM format <\/td>\n<\/tr>\n
1404<\/td>\n29.4.3 SFM format <\/td>\n<\/tr>\n
1406<\/td>\n30. Principles of congestion notification
30.1 Congestion notification design requirements <\/td>\n<\/tr>\n
1408<\/td>\n30.2 Quantized Congestion Notification protocol (QCN) <\/td>\n<\/tr>\n
1409<\/td>\n30.2.1 The CP algorithm <\/td>\n<\/tr>\n
1410<\/td>\n30.2.2 Basic RP algorithm <\/td>\n<\/tr>\n
1411<\/td>\n30.2.3 RP algorithm with timer <\/td>\n<\/tr>\n
1412<\/td>\n30.3 Congestion Controlled Flow (CCF) <\/td>\n<\/tr>\n
1413<\/td>\n30.4 Congestion Notification Priority Value (CNPV)
30.5 Congestion Notification tag (CN-TAG)
30.6 Congestion Notification Domain (CND) <\/td>\n<\/tr>\n
1414<\/td>\n30.7 Multicast data
30.8 Congestion notification and additional tags <\/td>\n<\/tr>\n
1416<\/td>\n31. Congestion notification entity operation
31.1 Congestion aware Bridge Forwarding Process <\/td>\n<\/tr>\n
1417<\/td>\n31.1.1 Congestion Point (CP)
31.1.2 CP ingress multiplexer
31.2 Congestion aware end station functions <\/td>\n<\/tr>\n
1418<\/td>\n31.2.1 Output flow segregation <\/td>\n<\/tr>\n
1419<\/td>\n31.2.2 Per-CNPV station function <\/td>\n<\/tr>\n
1421<\/td>\n31.2.3 Flow Select Database
31.2.4 Flow multiplexer
31.2.5 CNM demultiplexer
31.2.6 Input flow segregation <\/td>\n<\/tr>\n
1422<\/td>\n31.2.7 End station input queue
31.2.8 Reception selection <\/td>\n<\/tr>\n
1423<\/td>\n32. Congestion notification protocol
32.1 CND operations
32.1.1 CND defense <\/td>\n<\/tr>\n
1425<\/td>\n32.1.2 Automatic CND recognition
32.1.3 Variables controlling CND defense <\/td>\n<\/tr>\n
1426<\/td>\n32.2 CN component variables <\/td>\n<\/tr>\n
1427<\/td>\n32.2.1 cngMasterEnable
32.2.2 cngCnmTransmitPriority
32.2.3 cngDiscardedFrames
32.2.4 cngErroredPortList
32.3 Congestion notification per-CNPV variables
32.3.1 cncpDefModeChoice <\/td>\n<\/tr>\n
1428<\/td>\n32.3.2 cncpAlternatePriority
32.3.3 cncpAutoAltPri
32.3.4 cncpAdminDefenseMode
32.3.5 cncpCreation
32.3.6 cncpLldpInstanceChoice
32.3.7 cncpLldpInstanceSelector <\/td>\n<\/tr>\n
1429<\/td>\n32.4 CND defense per-Port per-CNPV variables
32.4.1 cnpdDefModeChoice
32.4.2 cnpdAdminDefenseMode <\/td>\n<\/tr>\n
1430<\/td>\n32.4.3 cnpdAutoDefenseMode
32.4.4 cnpdLldpInstanceChoice
32.4.5 cnpdLldpInstanceSelector
32.4.6 cnpdAlternatePriority
32.4.7 cnpdXmitCnpvCapable
32.4.8 cnpdXmitReady <\/td>\n<\/tr>\n
1431<\/td>\n32.4.9 cncpDoesEdge
32.4.10 cnpdAcceptsCnTag
32.4.11 cnpdRcvdCnpv
32.4.12 cnpdRcvdReady
32.4.13 cnpdIsAdminDefMode <\/td>\n<\/tr>\n
1432<\/td>\n32.4.14 cnpdDefenseMode
32.5 CND defense procedures
32.5.1 DisableCnpvRemapping()
32.5.2 TurnOnCnDefenses()
32.5.3 TurnOffCnDefenses()
32.6 CND defense state machine <\/td>\n<\/tr>\n
1433<\/td>\n32.7 Congestion notification protocol <\/td>\n<\/tr>\n
1434<\/td>\n32.8 CP variables <\/td>\n<\/tr>\n
1435<\/td>\n32.8.1 cpMacAddress
32.8.2 cpId
32.8.3 cpQSp
32.8.4 cpQLen
32.8.5 cpQLenOld
32.8.6 cpW
32.8.7 cpQOffset
32.8.8 cpQDelta
32.8.9 cpFb <\/td>\n<\/tr>\n
1436<\/td>\n32.8.10 cpEnqued
32.8.11 cpSampleBase
32.8.12 cpDiscardedFrames
32.8.13 cpTransmittedFrames
32.8.14 cpTransmittedCnms
32.8.15 cpMinHeaderOctets
32.9 CP procedures
32.9.1 Random
32.9.2 NewCpSampleBase() <\/td>\n<\/tr>\n
1437<\/td>\n32.9.3 EM_UNITDATA.request (parameters)
32.9.4 GenerateCnmPdu() <\/td>\n<\/tr>\n
1438<\/td>\n32.10 RP per-Port per-CNPV variables
32.10.1 rpppMaxRps
32.10.2 rpppCreatedRps <\/td>\n<\/tr>\n
1439<\/td>\n32.10.3 rpppRpCentiseconds
32.11 RP group variables
32.11.1 rpgEnable
32.11.2 rpgTimeReset
32.11.3 rpgByteReset <\/td>\n<\/tr>\n
1440<\/td>\n32.11.4 rpgThreshold
32.11.5 rpgMaxRate
32.11.6 rpgAiRate
32.11.7 rpgHaiRate
32.11.8 rpgGd
32.11.9 rpgMinDecFac
32.11.10 rpgMinRate
32.12 RP timer <\/td>\n<\/tr>\n
1441<\/td>\n32.12.1 RpWhile
32.13 RP variables
32.13.1 rpEnabled
32.13.2 rpByteCount
32.13.3 rpByteStage
32.13.4 rpTimeStage
32.13.5 rpTargetRate <\/td>\n<\/tr>\n
1442<\/td>\n32.13.6 rpCurrentRate
32.13.7 rpFreeze
32.13.8 rpLimiterRate
32.13.9 rpFb
32.14 RP procedures
32.14.1 ResetCnm <\/td>\n<\/tr>\n
1443<\/td>\n32.14.2 TestRpTerminate
32.14.3 TransmitDataFrame
32.14.4 ReceiveCnm <\/td>\n<\/tr>\n
1444<\/td>\n32.14.5 ProcessCnm
32.14.6 AdjustRates
32.15 RP rate control state machine <\/td>\n<\/tr>\n
1446<\/td>\n32.16 Congestion notification and encapsulation interworking function <\/td>\n<\/tr>\n
1448<\/td>\n33. Encoding of congestion notification PDUs
33.1 Structure, representation, and encoding
33.2 CN-TAG format <\/td>\n<\/tr>\n
1449<\/td>\n33.2.1 Flow Identifier
33.3 Congestion Notification Message (CNM) <\/td>\n<\/tr>\n
1450<\/td>\n33.4 Congestion Notification Message PDU format
33.4.1 Version
33.4.2 ReservedV <\/td>\n<\/tr>\n
1451<\/td>\n33.4.3 Quantized Feedback
33.4.4 Congestion Point Identifier
33.4.5 cnmQOffset
33.4.6 cnmQDelta
33.4.7 Encapsulated priority
33.4.8 Encapsulated destination MAC address
33.4.9 Encapsulated MSDU length
33.4.10 Encapsulated MSDU <\/td>\n<\/tr>\n
1452<\/td>\n33.4.11 CNM Validation <\/td>\n<\/tr>\n
1453<\/td>\n34. Forwarding and Queuing Enhancements for time-sensitive streams (FQTSS)
34.1 Overview
34.2 Detection of SRP domains <\/td>\n<\/tr>\n
1454<\/td>\n34.3 The bandwidth availability parameters
34.3.1 Relationships among bandwidth availability parameters <\/td>\n<\/tr>\n
1455<\/td>\n34.3.2 Bandwidth availability parameter management
34.4 Deriving actual bandwidth requirements from the size of the MSDU <\/td>\n<\/tr>\n
1456<\/td>\n34.5 Mapping priorities to traffic classes for time-sensitive streams <\/td>\n<\/tr>\n
1458<\/td>\n34.6 End station behavior
34.6.1 Talker behavior <\/td>\n<\/tr>\n
1459<\/td>\n34.6.2 Listener behavior <\/td>\n<\/tr>\n
1460<\/td>\n35. Stream Reservation Protocol (SRP) <\/td>\n<\/tr>\n
1461<\/td>\n35.1 Multiple Stream Registration Protocol (MSRP) <\/td>\n<\/tr>\n
1462<\/td>\n35.1.1 MSRP and Shared Media
35.1.2 Behavior of end stations <\/td>\n<\/tr>\n
1464<\/td>\n35.1.3 Behavior of Bridges
35.1.4 SRP domains and status parameters
35.2 Definition of the MSRP application <\/td>\n<\/tr>\n
1465<\/td>\n35.2.1 Definition of internal state variables <\/td>\n<\/tr>\n
1467<\/td>\n35.2.2 Definition of MRP elements <\/td>\n<\/tr>\n
1477<\/td>\n35.2.3 Provision and support of Stream registration service <\/td>\n<\/tr>\n
1481<\/td>\n35.2.4 MSRP Attribute Propagation <\/td>\n<\/tr>\n
1486<\/td>\n35.2.5 Operational reporting and statistics
35.2.6 Encoding <\/td>\n<\/tr>\n
1487<\/td>\n35.2.7 Attribute value support requirements <\/td>\n<\/tr>\n
1488<\/td>\n36. Priority-based Flow Control (PFC)
36.1 PFC operation
36.1.1 Overview <\/td>\n<\/tr>\n
1489<\/td>\n36.1.2 PFC primitives <\/td>\n<\/tr>\n
1490<\/td>\n36.1.3 Detailed specification of PFC operation <\/td>\n<\/tr>\n
1491<\/td>\n36.2 PFC aware system queue functions <\/td>\n<\/tr>\n
1492<\/td>\n36.2.1 PFC Initiator
36.2.2 PFC Receiver <\/td>\n<\/tr>\n
1494<\/td>\n37. Enhanced Transmission Selection (ETS)
37.1 Overview
37.1.1 Relationship to other transmission selection algorithms
37.2 ETS configuration parameters
37.3 ETS algorithm <\/td>\n<\/tr>\n
1495<\/td>\n37.4 Legacy configuration <\/td>\n<\/tr>\n
1496<\/td>\n38. Data Center Bridging eXchange protocol (DCBX)
38.1 Overview
38.2 Goals
38.3 Types of DCBX attributes
38.3.1 Informational attributes
38.4 DCBX and LLDP <\/td>\n<\/tr>\n
1497<\/td>\n38.4.1 Asymmetric attribute passing <\/td>\n<\/tr>\n
1498<\/td>\n38.4.2 Symmetric attribute passing <\/td>\n<\/tr>\n
1500<\/td>\n39. Multiple I-SID Registration Protocol (MIRP)
39.1 MIRP overview <\/td>\n<\/tr>\n
1502<\/td>\n39.1.1 Behavior of I-components
39.1.2 Behavior of B-components
39.2 Definition of the MIRP application
39.2.1 Definition of MRP elements <\/td>\n<\/tr>\n
1505<\/td>\n39.2.2 Alternate MIRP model for B-components <\/td>\n<\/tr>\n
1507<\/td>\n39.2.3 Use of \u201cnew\u201d declaration capability
39.2.4 Attribute value support requirements
39.2.5 MRP Message filtering <\/td>\n<\/tr>\n
1508<\/td>\n40. Edge Virtual Bridging (EVB) <\/td>\n<\/tr>\n
1509<\/td>\n40.1 EVB architecture without S-channels <\/td>\n<\/tr>\n
1510<\/td>\n40.2 EVB architecture with S-channels <\/td>\n<\/tr>\n
1512<\/td>\n40.3 Asymmetric EVB architecture without S-channels
40.4 EVB status parameters <\/td>\n<\/tr>\n
1514<\/td>\n40.4.1 EVBMode = Not supported
40.4.2 EVBMode = EVB Bridge
40.4.3 EVBMode = EVB station <\/td>\n<\/tr>\n
1515<\/td>\n41. VSI Discovery and Configuration Protocol (VDP)
41.1 VSI manager ID TLV definition
41.1.1 TLV type
41.1.2 TLV information string length <\/td>\n<\/tr>\n
1516<\/td>\n41.1.3 VSI Manager ID
41.2 VDP association TLV definitions
41.2.1 TLV type <\/td>\n<\/tr>\n
1517<\/td>\n41.2.2 TLV information string length
41.2.3 Status <\/td>\n<\/tr>\n
1518<\/td>\n41.2.4 VSI Type ID (VTID)
41.2.5 VSI Type Version
41.2.6 VSIID format
41.2.7 VSIID <\/td>\n<\/tr>\n
1519<\/td>\n41.2.8 Filter Info format
41.2.9 Filter Info field <\/td>\n<\/tr>\n
1521<\/td>\n41.2.10 VDP TLV type and Status semantics <\/td>\n<\/tr>\n
1522<\/td>\n41.3 Organizationally defined TLV definitions <\/td>\n<\/tr>\n
1523<\/td>\n41.3.1 TLV type
41.3.2 TLV information string length
41.3.3 Organizationally unique identifier (OUI) or Company ID (CID)
41.3.4 Organizationally defined information
41.4 Validation rules for VDP TLVs
41.5 VDP state machines
41.5.1 State machine conventions <\/td>\n<\/tr>\n
1524<\/td>\n41.5.2 Bridge VDP state machine <\/td>\n<\/tr>\n
1525<\/td>\n41.5.3 Station VDP state machine <\/td>\n<\/tr>\n
1526<\/td>\n41.5.4 VDP state machine timers
41.5.5 VDP state machine variables and parameters <\/td>\n<\/tr>\n
1529<\/td>\n41.5.6 Command-Response TLV field references in state machines
41.5.7 VDP state machine procedures <\/td>\n<\/tr>\n
1531<\/td>\n42. S-Channel Discovery and Configuration Protocol (CDCP)
42.1 CDCP discovery and configuration
42.2 CDCP state machine overview <\/td>\n<\/tr>\n
1532<\/td>\n42.3 CDCP configuration state machine <\/td>\n<\/tr>\n
1533<\/td>\n42.4 CDCP configuration variables
42.4.1 AdminChnCap <\/td>\n<\/tr>\n
1534<\/td>\n42.4.2 AdminRole
42.4.3 AdminSVIDWants
42.4.4 LastLocalSVIDPool
42.4.5 LastRemoteSVIDList
42.4.6 LastSVIDWants
42.4.7 LocalSVIDPool
42.4.8 OperChnCap
42.4.9 OperRole <\/td>\n<\/tr>\n
1535<\/td>\n42.4.10 OperSVIDList
42.4.11 RemoteChnCap
42.4.12 RemoteRole
42.4.13 RemoteSVIDList
42.4.14 schState
42.5 CDCP configuration procedures
42.5.1 SetSVIDRequest (OperRole, AdminSVIDWants, OperSVIDList) <\/td>\n<\/tr>\n
1536<\/td>\n42.5.2 RxSVIDConfig (OperSVIDList, LastRemoteSVIDList)
42.5.3 TxSVIDConfig (OperChnCap, RemoteChnCap, LastLocalSVIDPool, RemoteSVIDList, OperSVIDList) <\/td>\n<\/tr>\n
1537<\/td>\n43. Edge Control Protocol (ECP)
43.1 ECP operation <\/td>\n<\/tr>\n
1538<\/td>\n43.2 Edge Control Sublayer Service (ECSS)
43.3 ECP state machines
43.3.1 State machine conventions
43.3.2 Overview <\/td>\n<\/tr>\n
1539<\/td>\n43.3.3 Edge Control Protocol Data Unit (ECPDU) <\/td>\n<\/tr>\n
1540<\/td>\n43.3.4 ECP transmit state machine <\/td>\n<\/tr>\n
1541<\/td>\n43.3.5 ECP receive state machine
43.3.6 ECP state machine timers <\/td>\n<\/tr>\n
1542<\/td>\n43.3.7 ECP state machine variables and parameters <\/td>\n<\/tr>\n
1543<\/td>\n43.3.8 ECP state machine procedures <\/td>\n<\/tr>\n
1544<\/td>\n44. Equal Cost Multiple Paths (ECMP)
44.1 SPBM ECMP
44.1.1 ECMP Operation <\/td>\n<\/tr>\n
1545<\/td>\n44.1.2 ECMP ECT Algorithm <\/td>\n<\/tr>\n
1547<\/td>\n44.1.3 Loop prevention for ECMP
44.2 Support for Flow Filtering <\/td>\n<\/tr>\n
1548<\/td>\n44.2.1 Flow filtering tag (F-TAG) <\/td>\n<\/tr>\n
1549<\/td>\n44.2.2 F-TAG processing <\/td>\n<\/tr>\n
1550<\/td>\n44.2.3 Forwarding process extension for flow filtering <\/td>\n<\/tr>\n
1551<\/td>\n44.2.4 TTL Loop mitigation
44.2.5 CFM for ECMP with flow filtering <\/td>\n<\/tr>\n
1553<\/td>\n44.2.6 Operation with selective support for flow filtering <\/td>\n<\/tr>\n
1554<\/td>\nAnnex A (normative) PICS proforma\u2014Bridge implementations <\/td>\n<\/tr>\n
1615<\/td>\nAnnex B (normative) PICS proforma\u2014End station implementations <\/td>\n<\/tr>\n
1629<\/td>\nAnnex C (normative) Designated MSRP Node (DMN) Implementations <\/td>\n<\/tr>\n
1646<\/td>\nAnnex D (normative) IEEE 802.1 Organizationally Specific TLVs <\/td>\n<\/tr>\n
1754<\/td>\nAnnex E (normative) Notational conventions used in state diagrams <\/td>\n<\/tr>\n
1756<\/td>\nAnnex F (informative) Shared and Independent VLAN Learning (SVL and IVL) <\/td>\n<\/tr>\n
1765<\/td>\nAnnex G (informative) MAC method-dependent aspects of VLAN support <\/td>\n<\/tr>\n
1767<\/td>\nAnnex H (informative) Interoperability considerations <\/td>\n<\/tr>\n
1773<\/td>\nAnnex I (informative) Priority and drop precedence <\/td>\n<\/tr>\n
1781<\/td>\nAnnex J (informative) CFM protocol design and use <\/td>\n<\/tr>\n
1789<\/td>\nAnnex K (informative) TPMR use cases <\/td>\n<\/tr>\n
1794<\/td>\nAnnex L (informative) Operation of the credit-based shaper algorithm <\/td>\n<\/tr>\n
1811<\/td>\nAnnex M (normative) Support for PFC in link layers without MAC Control <\/td>\n<\/tr>\n
1812<\/td>\nAnnex N (informative) Buffer requirements for PFC <\/td>\n<\/tr>\n
1817<\/td>\nAnnex O (informative) Preserving the integrity of FCS fields in MAC Bridges <\/td>\n<\/tr>\n
1824<\/td>\nAnnex P (informative) Frame duplication and misordering <\/td>\n<\/tr>\n
1827<\/td>\nAnnex Q (informative) <\/td>\n<\/tr>\n
1832<\/td>\nBack cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Local and metropolitan area networks–Bridges and Bridged Networks<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2014<\/td>\n1832<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":136570,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-136567","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/136567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/136570"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=136567"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=136567"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=136567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}