{"id":81021,"date":"2024-10-17T18:50:29","date_gmt":"2024-10-17T18:50:29","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-802-17-2004\/"},"modified":"2024-10-24T19:45:27","modified_gmt":"2024-10-24T19:45:27","slug":"ieee-802-17-2004","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-802-17-2004\/","title":{"rendered":"IEEE 802.17 2004"},"content":{"rendered":"

New IEEE Standard – Inactive – Superseded. This standard defines the medium access control characteristics, physical layer interface methods and layer management parameters for the resilient packet ring (RPR) access method for ring topologies. A set of protocols for detecting and initializing the shared ring configuration, recovering from failures, and regulating fair access to the shared medium are also described. Specifications are provided for interface to a number of physical layers, supporting data rates up to 10 Gb\/s. System considerations and management information base (MIB) specifications are also provided in this standard.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std 802.17-2004 Cover Page <\/td>\n<\/tr>\n
2<\/td>\nInformation technology\u2014Telecommunications and information exchange between systems\u2014Local and metropolitan area networks\u2014Specific requirements\u2014Part 17: Resilient packet ring (RPR) access method and physical layer specifications <\/td>\n<\/tr>\n
4<\/td>\nIntroduction
Notice to users
Errata
Interpretations
Patents <\/td>\n<\/tr>\n
5<\/td>\nParticipants <\/td>\n<\/tr>\n
8<\/td>\nCONTENTS <\/td>\n<\/tr>\n
26<\/td>\n1. Overview
1.1 Scope
1.2 Purpose <\/td>\n<\/tr>\n
27<\/td>\n1.3 RPR features <\/td>\n<\/tr>\n
28<\/td>\n1.4 Document structure <\/td>\n<\/tr>\n
30<\/td>\n2. Normative references <\/td>\n<\/tr>\n
32<\/td>\n3. Terms, definitions, and notation
3.1 Conformance levels
3.2 Terms and definitions <\/td>\n<\/tr>\n
38<\/td>\n3.3 Service definition method and notation <\/td>\n<\/tr>\n
39<\/td>\n3.3.1 Classification of service primitives
3.4 State machines <\/td>\n<\/tr>\n
40<\/td>\n3.4.1 State table notation <\/td>\n<\/tr>\n
42<\/td>\n3.5 Arithmetic and logical operators
3.6 Numerical representation <\/td>\n<\/tr>\n
43<\/td>\n3.7 Field notations
3.7.1 Use of italics
3.7.2 Field conventions <\/td>\n<\/tr>\n
44<\/td>\n3.7.3 Field value conventions
3.8 Bit numbering and ordering <\/td>\n<\/tr>\n
45<\/td>\n3.9 Byte sequential formats <\/td>\n<\/tr>\n
46<\/td>\n3.10 Left-to-right ordering
3.11 Representation of MAC addresses <\/td>\n<\/tr>\n
47<\/td>\n3.12 Mapping of numeric data values to fields
3.13 Informative notes <\/td>\n<\/tr>\n
48<\/td>\n3.14 Conventions for C code used in state machines
3.15 Ringlet orientation conventions <\/td>\n<\/tr>\n
50<\/td>\n4. Abbreviations and acronyms <\/td>\n<\/tr>\n
52<\/td>\n5. Architecture overview
5.1 Terminology <\/td>\n<\/tr>\n
53<\/td>\n5.2 Layer model <\/td>\n<\/tr>\n
54<\/td>\n5.3 Ring structure <\/td>\n<\/tr>\n
55<\/td>\n5.4 Station structure <\/td>\n<\/tr>\n
56<\/td>\n5.5 MAC architecture
5.5.1 Datapath connectivity <\/td>\n<\/tr>\n
57<\/td>\n5.5.2 Ringlet selection <\/td>\n<\/tr>\n
58<\/td>\n5.5.3 MAC datapath flows <\/td>\n<\/tr>\n
59<\/td>\n5.5.4 Receive rules
5.6 MAC service
5.6.1 MAC data primitives <\/td>\n<\/tr>\n
60<\/td>\n5.6.2 Service classes
5.6.3 MAC flow control primitives <\/td>\n<\/tr>\n
61<\/td>\n5.7 Frame transmissions
5.7.1 Unicast transmissions
5.7.2 Flooded transmissions <\/td>\n<\/tr>\n
63<\/td>\n5.7.3 Multicast transmissions
5.8 Frame formats
5.9 Frame transmissions <\/td>\n<\/tr>\n
64<\/td>\n5.9.1 Local-source\/local-destination transmissions <\/td>\n<\/tr>\n
65<\/td>\n5.9.2 Local-source multicast transmissions <\/td>\n<\/tr>\n
66<\/td>\n5.9.3 Local-source unknown-unicast transmissions <\/td>\n<\/tr>\n
67<\/td>\n5.9.4 Remote-source unicast transmissions <\/td>\n<\/tr>\n
68<\/td>\n5.9.5 Remote-source multicast transmissions
5.10 Spatial reuse <\/td>\n<\/tr>\n
69<\/td>\n5.11 Bandwidth allocation
5.11.1 Allocation enforcement <\/td>\n<\/tr>\n
70<\/td>\n5.11.2 Allocation consistency <\/td>\n<\/tr>\n
72<\/td>\n5.12 Fairness
5.12.1 Equal-weighted fairness <\/td>\n<\/tr>\n
73<\/td>\n5.12.2 Fairness frame distribution
5.12.3 Multi-choke fairness frame distribution
5.13 Transit-queuing options <\/td>\n<\/tr>\n
74<\/td>\n5.14 Fault response methods <\/td>\n<\/tr>\n
75<\/td>\n5.14.1 Fault response mechanisms <\/td>\n<\/tr>\n
76<\/td>\n5.14.2 Protection hierarchy <\/td>\n<\/tr>\n
77<\/td>\n5.14.3 Wrap then steer
5.15 Topology discovery
5.16 Frame ordering
5.16.1 Strict and relaxed transmissions <\/td>\n<\/tr>\n
78<\/td>\n5.17 Operations, administration, and maintenance (OAM)
5.17.1 Echo operations <\/td>\n<\/tr>\n
79<\/td>\n5.17.2 Flushing previously sourced traffic
5.17.3 Management information base (MIB) <\/td>\n<\/tr>\n
80<\/td>\n6. Medium access control (MAC) service and reference model
6.1 Overview
6.2 Terminology and variables <\/td>\n<\/tr>\n
81<\/td>\n6.3 Overview of MAC services
6.3.1 Service types <\/td>\n<\/tr>\n
82<\/td>\n6.3.2 Service classes
6.4 MAC services to the client layer <\/td>\n<\/tr>\n
83<\/td>\n6.4.1 MA_DATA.request <\/td>\n<\/tr>\n
86<\/td>\n6.4.2 MA_DATA.indication <\/td>\n<\/tr>\n
88<\/td>\n6.4.3 MA_CONTROL.request <\/td>\n<\/tr>\n
89<\/td>\n6.4.4 MA_CONTROL.indication <\/td>\n<\/tr>\n
91<\/td>\n6.5 MAC compliance test points <\/td>\n<\/tr>\n
92<\/td>\n6.5.1 1 Gb\/s PacketPHY
6.5.2 10 Gb\/s PacketPHY
6.5.3 SONET\/SDH <\/td>\n<\/tr>\n
93<\/td>\n6.6 MAC reference model
6.6.1 MAC control sublayer
6.6.2 MAC datapath sublayer <\/td>\n<\/tr>\n
96<\/td>\n6.6.3 Flow of data within the MAC <\/td>\n<\/tr>\n
98<\/td>\n6.6.4 Reconciliation sublayer
6.6.5 Medium access control <\/td>\n<\/tr>\n
99<\/td>\n6.6.6 Operations, administration, and maintenance (OAM)
6.6.7 MAC layer management entity (MLME) <\/td>\n<\/tr>\n
100<\/td>\n6.7 Protocol Implementation Conformance Statement (PICS) proforma for Clause 6
6.7.1 Introduction
6.7.2 Identification <\/td>\n<\/tr>\n
101<\/td>\n6.7.3 PICS tables for Clause 6 <\/td>\n<\/tr>\n
102<\/td>\n7. Medium access control datapath
7.1 Datapath overview <\/td>\n<\/tr>\n
103<\/td>\n7.2 Terminology and variables
7.2.1 Common state machine definitions <\/td>\n<\/tr>\n
104<\/td>\n7.2.2 Common state machine variables <\/td>\n<\/tr>\n
107<\/td>\n7.2.3 Common state machine routines <\/td>\n<\/tr>\n
110<\/td>\n7.2.4 Variables and literals defined in other clauses <\/td>\n<\/tr>\n
111<\/td>\n7.2.5 Flow count variables <\/td>\n<\/tr>\n
114<\/td>\n7.3 Service classes
7.3.1 Service class classA <\/td>\n<\/tr>\n
115<\/td>\n7.3.2 Service class classB <\/td>\n<\/tr>\n
116<\/td>\n7.3.3 Service class classC
7.3.4 Reclamation <\/td>\n<\/tr>\n
117<\/td>\n7.4 Datapaths
7.4.1 Add paths <\/td>\n<\/tr>\n
118<\/td>\n7.4.2 Transit paths
7.4.3 Passthrough mode <\/td>\n<\/tr>\n
119<\/td>\n7.4.4 Protection datapaths <\/td>\n<\/tr>\n
123<\/td>\n7.5 Rate control
7.5.1 MAC shaper overview <\/td>\n<\/tr>\n
124<\/td>\n7.5.2 Add queue flow control <\/td>\n<\/tr>\n
125<\/td>\n7.5.3 IdleShaper state machine <\/td>\n<\/tr>\n
127<\/td>\n7.5.4 MacControlShaper state machine <\/td>\n<\/tr>\n
129<\/td>\n7.5.5 ClassAShaper state machine <\/td>\n<\/tr>\n
132<\/td>\n7.5.6 ClassBShaper state machine <\/td>\n<\/tr>\n
135<\/td>\n7.5.7 Fairness eligible shaper state machines <\/td>\n<\/tr>\n
142<\/td>\n7.5.8 DownstreamShaper state machine <\/td>\n<\/tr>\n
144<\/td>\n7.6 Receive operation
7.6.1 Receive operation for strict data frames <\/td>\n<\/tr>\n
146<\/td>\n7.6.2 Reception in wrapping systems <\/td>\n<\/tr>\n
147<\/td>\n7.6.3 Receive operation state machines <\/td>\n<\/tr>\n
177<\/td>\n7.6.4 WrongRinglet state machine <\/td>\n<\/tr>\n
179<\/td>\n7.7 Transmit operation
7.7.1 Ringlet selection <\/td>\n<\/tr>\n
191<\/td>\n7.7.2 Determination of cleave point <\/td>\n<\/tr>\n
192<\/td>\n7.7.3 Setting of ttl and ttlBase <\/td>\n<\/tr>\n
194<\/td>\n7.7.4 StageQueueSelection state machine <\/td>\n<\/tr>\n
199<\/td>\n7.7.5 DataAddCount state machine <\/td>\n<\/tr>\n
201<\/td>\n7.7.6 ControlAddCount state machine <\/td>\n<\/tr>\n
204<\/td>\n7.7.7 Single queue MAC design <\/td>\n<\/tr>\n
207<\/td>\n7.7.8 Dual queue MAC design <\/td>\n<\/tr>\n
211<\/td>\n7.7.9 TransmitCount state machine <\/td>\n<\/tr>\n
213<\/td>\n7.7.10 TransmitRoute state machine <\/td>\n<\/tr>\n
216<\/td>\n7.8 Protocol Implementation Conformance Statement (PICS) proforma for Clause 7
7.8.1 Introduction
7.8.2 Identification <\/td>\n<\/tr>\n
217<\/td>\n7.8.3 PICS tables for Clause 7 <\/td>\n<\/tr>\n
222<\/td>\n8. MAC physical interface
8.1 Overview
8.1.1 Objectives <\/td>\n<\/tr>\n
223<\/td>\n8.1.2 Relationship to other standards
8.2 MAC physical layer service interface
8.2.1 PHY_DATA.request <\/td>\n<\/tr>\n
224<\/td>\n8.2.2 PHY_DATA.indication <\/td>\n<\/tr>\n
225<\/td>\n8.2.3 PHY_LINK_STATUS.indication <\/td>\n<\/tr>\n
226<\/td>\n8.2.4 Mapping of PHY_READY.indication
8.3 PacketPHY physical layer interfaces and PHYs
8.3.1 PacketPHY reconciliation sublayers <\/td>\n<\/tr>\n
227<\/td>\n8.3.2 PacketPHYs <\/td>\n<\/tr>\n
228<\/td>\n8.4 SONET\/SDH physical layer interfaces and PHYs <\/td>\n<\/tr>\n
229<\/td>\n8.4.1 SONET\/SDH reconciliation sublayers
8.4.2 SONET\/SDH adaptation sublayers <\/td>\n<\/tr>\n
231<\/td>\n8.4.3 SONET\/SDH physical layer entities (PHYs) <\/td>\n<\/tr>\n
233<\/td>\n8.5 Protocol Implementation Conformance Statement (PICS) proforma for Clause 8
8.5.1 Introduction
8.5.2 Identification <\/td>\n<\/tr>\n
234<\/td>\n8.5.3 Major capabilities\/options
8.5.4 PICS tables for Clause 8 <\/td>\n<\/tr>\n
236<\/td>\n9. Frame formats
9.1 Overview
9.2 Data frame format
9.2.1 Data frame sizes <\/td>\n<\/tr>\n
237<\/td>\n9.2.2 Data frame fields <\/td>\n<\/tr>\n
238<\/td>\n9.3 Control frame format
9.3.1 Control frame sizes <\/td>\n<\/tr>\n
239<\/td>\n9.3.2 Control frame fields <\/td>\n<\/tr>\n
241<\/td>\n9.4 Fairness frame format
9.4.1 Fairness frame sizes
9.4.2 Fairness frame fields <\/td>\n<\/tr>\n
242<\/td>\n9.5 Idle frame format
9.5.1 Idle frame sizes
9.5.2 Idle frame fields <\/td>\n<\/tr>\n
243<\/td>\n9.6 baseControl sub-fields <\/td>\n<\/tr>\n
245<\/td>\n9.7 extendedControl sub-fields <\/td>\n<\/tr>\n
247<\/td>\n9.8 Protocol Implementation Conformance Statement (PICS) proforma for Clause 9
9.8.1 Introduction
9.8.2 Identification <\/td>\n<\/tr>\n
248<\/td>\n9.8.3 PICS tables for Clause 9 <\/td>\n<\/tr>\n
250<\/td>\n10. Fairness
10.1 Overview <\/td>\n<\/tr>\n
251<\/td>\n10.1.1 Fairness instances <\/td>\n<\/tr>\n
253<\/td>\n10.1.2 Services and features
10.1.3 Fairness algorithm overview <\/td>\n<\/tr>\n
264<\/td>\n10.2 Terms, definitions, variables, and routines
10.2.1 Common state machine definitions <\/td>\n<\/tr>\n
265<\/td>\n10.2.2 Common state machine variables <\/td>\n<\/tr>\n
269<\/td>\n10.2.3 Common state machine routines
10.2.4 Variables and routines defined in other clauses <\/td>\n<\/tr>\n
270<\/td>\n10.3 Frame formats
10.3.1 Fairness frame format <\/td>\n<\/tr>\n
271<\/td>\n10.3.2 Fairness differential delay (FDD) frame format <\/td>\n<\/tr>\n
272<\/td>\n10.4 Fairness state machines
10.4.1 PerByte state machine <\/td>\n<\/tr>\n
276<\/td>\n10.4.2 PerAgingInterval state machine <\/td>\n<\/tr>\n
280<\/td>\n10.4.3 AggressiveRateAdjust state machine <\/td>\n<\/tr>\n
282<\/td>\n10.4.4 ConservativeRateAdjust state machine <\/td>\n<\/tr>\n
285<\/td>\n10.4.5 PerAdvertisingInterval state machine <\/td>\n<\/tr>\n
289<\/td>\n10.4.6 PerReportingInterval state machine <\/td>\n<\/tr>\n
291<\/td>\n10.4.7 ActiveWeightsComputation state machine <\/td>\n<\/tr>\n
293<\/td>\n10.4.8 FairnessFrameReceive state machine <\/td>\n<\/tr>\n
296<\/td>\n10.4.9 FddFrameTransmit state machine <\/td>\n<\/tr>\n
298<\/td>\n10.4.10 FrttComputation state machine <\/td>\n<\/tr>\n
304<\/td>\n10.5 Explanation of aging and rates (informative) <\/td>\n<\/tr>\n
307<\/td>\n10.6 Protocol Implementation Conformance Statement (PICS) proforma for Clause 10
10.6.1 Introduction
10.6.2 Identification <\/td>\n<\/tr>\n
308<\/td>\n10.6.3 PICS tables for Clause 10 <\/td>\n<\/tr>\n
310<\/td>\n11. Topology discovery and protection
11.1 Overview <\/td>\n<\/tr>\n
311<\/td>\n11.1.1 Protocol overview <\/td>\n<\/tr>\n
312<\/td>\n11.1.2 Topology database maintenance <\/td>\n<\/tr>\n
313<\/td>\n11.1.3 Context containment <\/td>\n<\/tr>\n
314<\/td>\n11.1.4 Secondary MAC addresses
11.1.5 LRTT measurement protocol <\/td>\n<\/tr>\n
315<\/td>\n11.1.6 Fault response mechanisms <\/td>\n<\/tr>\n
317<\/td>\n11.2 Terminology and variables
11.2.1 Terminology <\/td>\n<\/tr>\n
318<\/td>\n11.2.2 Common state machine definitions <\/td>\n<\/tr>\n
319<\/td>\n11.2.3 Common state machine variables <\/td>\n<\/tr>\n
321<\/td>\n11.2.4 ringInfo fields <\/td>\n<\/tr>\n
322<\/td>\n11.2.5 myTopoInfo fields <\/td>\n<\/tr>\n
323<\/td>\n11.2.6 topoEntry[rid][hops] fields <\/td>\n<\/tr>\n
325<\/td>\n11.2.7 Common state machine routines <\/td>\n<\/tr>\n
326<\/td>\n11.2.8 Variables and routines defined in other clauses <\/td>\n<\/tr>\n
327<\/td>\n11.2.9 Defect indications <\/td>\n<\/tr>\n
328<\/td>\n11.3 Frame formats
11.3.1 Topology and protection (TP) frame format <\/td>\n<\/tr>\n
330<\/td>\n11.3.2 Topology checksum (TC) frame format <\/td>\n<\/tr>\n
331<\/td>\n11.3.3 Loop round trip time request frame format <\/td>\n<\/tr>\n
332<\/td>\n11.3.4 Loop round trip time response frame format <\/td>\n<\/tr>\n
333<\/td>\n11.3.5 ATD frame format <\/td>\n<\/tr>\n
335<\/td>\n11.4 Defined ATT encodings
11.4.1 Weight ATT <\/td>\n<\/tr>\n
336<\/td>\n11.4.2 Station bandwidth ATT
11.4.3 Station settings ATT <\/td>\n<\/tr>\n
337<\/td>\n11.4.4 Station name ATT
11.4.5 Management address ATT <\/td>\n<\/tr>\n
338<\/td>\n11.4.6 Station interface index ATT
11.4.7 Secondary MAC ATT
11.4.8 Organization-specific ATT <\/td>\n<\/tr>\n
339<\/td>\n11.5 Topology database
11.5.1 Topology database structure <\/td>\n<\/tr>\n
345<\/td>\n11.5.2 Attribute updates
11.5.3 Lower level representation of topology database <\/td>\n<\/tr>\n
346<\/td>\n11.5.4 Topology change sequence <\/td>\n<\/tr>\n
348<\/td>\n11.6 State machines
11.6.1 State machine functions <\/td>\n<\/tr>\n
350<\/td>\n11.6.2 ReceiveMonitor state machine <\/td>\n<\/tr>\n
352<\/td>\n11.6.3 TopologyControl state machine <\/td>\n<\/tr>\n
356<\/td>\n11.6.4 ParseTpFrame state machine <\/td>\n<\/tr>\n
361<\/td>\n11.6.5 ProtectionUpdate state machine <\/td>\n<\/tr>\n
370<\/td>\n11.6.6 TopologyValidation state machine <\/td>\n<\/tr>\n
377<\/td>\n11.6.7 TransmitTpFrame state machine <\/td>\n<\/tr>\n
379<\/td>\n11.6.8 ReceiveTpFrame state machines <\/td>\n<\/tr>\n
381<\/td>\n11.6.9 TransmitTcFrame state machine <\/td>\n<\/tr>\n
383<\/td>\n11.6.10 ReceiveTcFrame state machine <\/td>\n<\/tr>\n
385<\/td>\n11.6.11 Transmit rules for ATD frames
11.6.12 Receive rules for ATD frames <\/td>\n<\/tr>\n
386<\/td>\n11.6.13 SecondaryUpdate state machine <\/td>\n<\/tr>\n
393<\/td>\n11.6.14 TimingLrttFrame state machine <\/td>\n<\/tr>\n
398<\/td>\n11.7 Protocol Implementation Conformance Statement (PICS) proforma for Clause 11
11.7.1 Introduction
11.7.2 Identification <\/td>\n<\/tr>\n
399<\/td>\n11.7.3 PICS tables for Clause 11 <\/td>\n<\/tr>\n
404<\/td>\n12. Operations, administration, and maintenance (OAM)
12.1 Overview
12.1.1 Protocol overview <\/td>\n<\/tr>\n
405<\/td>\n12.1.2 OAM functions supported by RPR
12.1.3 Fault management <\/td>\n<\/tr>\n
406<\/td>\n12.1.4 Echo operations
12.1.5 Flush operations <\/td>\n<\/tr>\n
407<\/td>\n12.1.6 Organization-specific operations
12.2 Terminology and variables
12.2.1 Common state machine definitions
12.2.2 Common variables <\/td>\n<\/tr>\n
408<\/td>\n12.2.3 Common routines
12.2.4 Literals and routines defined in other clauses
12.3 OAM frame formats <\/td>\n<\/tr>\n
409<\/td>\n12.3.1 Echo request\/response payload <\/td>\n<\/tr>\n
410<\/td>\n12.3.2 Flush frame
12.3.3 Organization specific frame <\/td>\n<\/tr>\n
412<\/td>\n12.4 OAM service primitives
12.4.1 Echo MA_CONTROL.request <\/td>\n<\/tr>\n
413<\/td>\n12.4.2 Echo MA_CONTROL.indication
12.4.3 Flush MA_CONTROL.request <\/td>\n<\/tr>\n
414<\/td>\n12.4.4 Flush MA_CONTROL.indication <\/td>\n<\/tr>\n
415<\/td>\n12.4.5 Organization specific MA_CONTROL.request <\/td>\n<\/tr>\n
416<\/td>\n12.4.6 Organization specific MA_CONTROL.indication
12.5 OAM state machines
12.5.1 OamFrameTransmit state machine <\/td>\n<\/tr>\n
418<\/td>\n12.5.2 OamFrameReceive state machine <\/td>\n<\/tr>\n
420<\/td>\n12.6 Performance monitoring
12.6.1 Performance monitoring counters <\/td>\n<\/tr>\n
421<\/td>\n12.6.2 Available and unavailable seconds <\/td>\n<\/tr>\n
422<\/td>\n12.7 Protocol Implementation Conformance Statement (PICS) proforma for Clause 12
12.7.1 Introduction
12.7.2 Identification <\/td>\n<\/tr>\n
423<\/td>\n12.7.3 PICS tables for Clause 12 <\/td>\n<\/tr>\n
426<\/td>\n13. Layer management entity interface
13.1 Overview of the management model
13.2 MLME service interface <\/td>\n<\/tr>\n
427<\/td>\n13.2.1 MLME_GET.request
13.2.2 MLME_SET.request <\/td>\n<\/tr>\n
428<\/td>\n13.2.3 MLME_EVENT.indication <\/td>\n<\/tr>\n
429<\/td>\n13.2.4 MLME_RESET.request <\/td>\n<\/tr>\n
430<\/td>\n13.3 MLME services
13.3.1 RPR interface configuration <\/td>\n<\/tr>\n
431<\/td>\n13.3.2 Topology discovery monitoring
13.3.3 Performance and accounting measurements <\/td>\n<\/tr>\n
434<\/td>\n13.4 Protocol Implementation Conformance Statement (PICS) proforma for Clause 13
13.4.1 Introduction
13.4.2 Identification <\/td>\n<\/tr>\n
435<\/td>\n13.4.3 PICS tables for Clause 13 <\/td>\n<\/tr>\n
436<\/td>\nAnnex A (informative) Bibliography <\/td>\n<\/tr>\n
438<\/td>\nAnnex B (normative) PacketPHY reconciliation sublayers
B.1 Overview
B.2 1 Gb\/s PacketPHY reconciliation sublayer (PRS-1) <\/td>\n<\/tr>\n
439<\/td>\nB.2.1 General requirements <\/td>\n<\/tr>\n
443<\/td>\nB.2.2 GMII data stream
B.2.3 GMII functional specifications <\/td>\n<\/tr>\n
444<\/td>\nB.2.4 Electrical characteristics
B.3 10 Gb\/s PacketPHY Reconciliation Sublayer (PRS-10)
B.3.1 General requirements <\/td>\n<\/tr>\n
449<\/td>\nB.3.2 XGMII data stream
B.3.3 Functional specifications <\/td>\n<\/tr>\n
450<\/td>\nB.3.4 Electrical characteristics
B.3.5 XGXS and XAUI <\/td>\n<\/tr>\n
451<\/td>\nB.4 Protocol Implementation Conformance Statement (PICS) proforma for Annex B
B.4.1 Introduction
B.4.2 Identification <\/td>\n<\/tr>\n
452<\/td>\nB.4.3 Major capabilities\/options
B.4.4 PICS tables for Annex B <\/td>\n<\/tr>\n
454<\/td>\nAnnex C (normative) SONET\/SDH reconciliation sublayers
C.1 Overview <\/td>\n<\/tr>\n
455<\/td>\nC.1.1 Relationship to other sublayers
C.1.2 SRS and GRS interfaces <\/td>\n<\/tr>\n
456<\/td>\nC.1.3 Link status signals <\/td>\n<\/tr>\n
457<\/td>\nC.1.4 Electrical specifications <\/td>\n<\/tr>\n
458<\/td>\nC.2 Physical frame format for SRS and GRS
C.2.1 SRS physical frame format
C.2.2 GRS physical frame format <\/td>\n<\/tr>\n
460<\/td>\nC.3 SRS and GRS using the 8-bit SPI-3 interface
C.3.1 General requirements <\/td>\n<\/tr>\n
464<\/td>\nC.3.2 Mapping of SPI-3 signals to service interface primitives <\/td>\n<\/tr>\n
465<\/td>\nC.3.3 SRS and GRS 8-bit SPI datastream <\/td>\n<\/tr>\n
466<\/td>\nC.3.4 Functional specifications
C.3.5 Electrical specifications
C.4 SRS and GRS using the 32-bit SPI-3 interface
C.4.1 General requirements <\/td>\n<\/tr>\n
469<\/td>\nC.4.2 Mapping of SPI-3 signals to service interface primitives <\/td>\n<\/tr>\n
473<\/td>\nC.4.3 SRS and GRS 32-bit SPI datastream
C.4.4 Functional specifications
C.4.5 Electrical timing specifications
C.5 SRS and GRS using the SPI-4 Phase 1 interface
C.5.1 General requirements <\/td>\n<\/tr>\n
477<\/td>\nC.5.2 Mapping of SPI-4 signals to service interface primitives <\/td>\n<\/tr>\n
479<\/td>\nC.5.3 SRS and GRS 64-bit SPI datastream
C.5.4 Functional specifications
C.5.5 Electrical specifications
C.6 SRS and GRS using SPI-4.2 interface <\/td>\n<\/tr>\n
480<\/td>\nC.6.1 General requirements <\/td>\n<\/tr>\n
483<\/td>\nC.6.2 Mapping of SPI-4 signals to service interface primitives <\/td>\n<\/tr>\n
484<\/td>\nC.6.3 SRS and GRS SPI-4.2 datastream
C.6.4 Functional specifications
C.6.5 Electrical specifications <\/td>\n<\/tr>\n
485<\/td>\nC.7 Protocol Implementation Conformance Statement (PICS) proforma for Annex C
C.7.1 Introduction
C.7.2 Identification <\/td>\n<\/tr>\n
486<\/td>\nC.7.3 Major capabilities\/options
C.7.4 PICS tables for Annex C <\/td>\n<\/tr>\n
490<\/td>\nAnnex D (normative) SNMP MIB definitions
D.1 Introduction
D.2 The SNMP management framework
D.3 Security considerations <\/td>\n<\/tr>\n
491<\/td>\nD.4 MIB Structure <\/td>\n<\/tr>\n
492<\/td>\nD.4.1 Structure of the MIB <\/td>\n<\/tr>\n
493<\/td>\nD.5 Relationship to other MIBs
D.5.1 Relationship to the Interfaces MIB
D.5.2 Relationship to PHY MIBs <\/td>\n<\/tr>\n
497<\/td>\nD.6 Definitions for the RPR MIB <\/td>\n<\/tr>\n
614<\/td>\nAnnex E (normative) CRC and parity calculations
E.1 Cyclic redundancy check 16-bit (CRC16) algorithmic definition
E.1.1 Serial CRC16 calculation <\/td>\n<\/tr>\n
615<\/td>\nE.1.2 CRC16 calculations
E.1.3 Protected header-field changes <\/td>\n<\/tr>\n
616<\/td>\nE.1.4 Illustration of CRC16 checks
E.2 Cyclic redundancy check 32-bit (CRC32) algorithmic definition <\/td>\n<\/tr>\n
617<\/td>\nE.2.1 Serial CRC32 calculation <\/td>\n<\/tr>\n
618<\/td>\nE.2.2 Exchanged ExorSum calculations
E.2.3 Payload CRC stomping <\/td>\n<\/tr>\n
619<\/td>\nE.2.4 Illustration of CRC32 checks <\/td>\n<\/tr>\n
620<\/td>\nE.3 Parity algorithmic definition
E.3.1 Parity calculation
E.3.2 Illustration of fairness-frame checks <\/td>\n<\/tr>\n
621<\/td>\nE.4 Protocol Implementation Conformance Statement (PICS) proforma for Annex E
E.4.1 Introduction
E.4.2 Identification <\/td>\n<\/tr>\n
622<\/td>\nE.4.3 PICS tables for Annex E <\/td>\n<\/tr>\n
624<\/td>\nAnnex F (informative) 802.1D and 802.1Q bridging conformance
F.1 Bridging overview
F.1.1 802 bridging reference model <\/td>\n<\/tr>\n
625<\/td>\nF.1.2 RPR support of the MAC service <\/td>\n<\/tr>\n
626<\/td>\nF.1.3 Transmission between local and remote end stations <\/td>\n<\/tr>\n
627<\/td>\nF.1.4 Maintaining filtering integrity of the 802 bridged network <\/td>\n<\/tr>\n
631<\/td>\nF.1.5 RPR support for basic bridging model with spatial reuse for local hosts <\/td>\n<\/tr>\n
632<\/td>\nF.1.6 Duplication\/misordering prevention
F.1.7 MAC client invocation of optional RPR service parameters
F.1.8 RPR requirements for 802.1D and 802.1Q bridging conformance <\/td>\n<\/tr>\n
633<\/td>\nF.2 Architectural model of an 802.1D compliant RPR bridge
F.2.1 Bridge relay entity <\/td>\n<\/tr>\n
634<\/td>\nF.2.2 Ports
F.2.3 Higher layer entities
F.3 RPR MAC Internal Sublayer Service
F.3.1 RPR MAC support of Internal Sublayer Service <\/td>\n<\/tr>\n
637<\/td>\nF.3.2 RPR MAC support of Enhanced Internal Sublayer Service <\/td>\n<\/tr>\n
640<\/td>\nF.4 Bridge protocol entity interactions
F.5 MAC client transmission requirements <\/td>\n<\/tr>\n
641<\/td>\nF.6 MAC client reception requirements <\/td>\n<\/tr>\n
644<\/td>\nAnnex G (informative) Implementation guidelines
G.1 Sizing of secondary transit queue and addRateA1
G.1.1 Calculation of minimum size for secondary transit queue <\/td>\n<\/tr>\n
645<\/td>\nG.1.2 Calculation of maximum addRateA1 <\/td>\n<\/tr>\n
646<\/td>\nG.2 ClassA shaping effects on jitter
G.2.1 ClassA shaper characteristics
G.2.2 ClassA shaper behaviors <\/td>\n<\/tr>\n
647<\/td>\nG.2.3 ClassA clamped-credit shaper behaviors <\/td>\n<\/tr>\n
648<\/td>\nAnnex H (informative) C-code illustrations of CRC computations <\/td>\n<\/tr>\n
664<\/td>\nAnnex I (informative) Datapath scenarios
I.1 Duplicate frame scenarios
I.1.1 Unidirectional source bypass <\/td>\n<\/tr>\n
665<\/td>\nI.1.2 Unidirectional wrapped source bypass
I.1.3 Bidirectional destination bypass <\/td>\n<\/tr>\n
666<\/td>\nI.1.4 Bidirectional destination removals
I.1.5 Source and destination removals <\/td>\n<\/tr>\n
667<\/td>\nI.2 Reordered frame scenarios
I.2.1 Protection switch during bidirectional flood <\/td>\n<\/tr>\n
668<\/td>\nI.2.2 Cascading failures during bidirectional flood <\/td>\n<\/tr>\n
669<\/td>\nI.2.3 Protection switch during unicast transmission on steering system <\/td>\n<\/tr>\n
670<\/td>\nI.2.4 Cascading protection switch during unidirectional flood, wrapping <\/td>\n<\/tr>\n
672<\/td>\nAnnex J (informative) Spatial indications and shaping
J.1 Overview <\/td>\n<\/tr>\n
673<\/td>\nJ.2 Spatial bandwidth allocation
J.2.1 Single queue spatial allocation <\/td>\n<\/tr>\n
674<\/td>\nJ.2.2 Dual queue spatial allocation <\/td>\n<\/tr>\n
675<\/td>\nJ.2.3 Cumulative ringlet allocation <\/td>\n<\/tr>\n
676<\/td>\nJ.3 Spatial client queuing <\/td>\n<\/tr>\n
678<\/td>\nAnnex K (informative) Client-based OAM operations using echo and flush
K.1 Connectivity monitoring using echo request\/response
K.1.1 Background
K.1.2 Scope of operations
K.1.3 Connectivity monitor <\/td>\n<\/tr>\n
679<\/td>\nK.1.4 Failure declaration and clearing <\/td>\n<\/tr>\n
680<\/td>\nK.2 Resteering using flush
K.2.1 Background
K.2.2 Approach <\/td>\n<\/tr>\n
681<\/td>\nK.2.3 Using echo frames to flush steer protected rings <\/td>\n<\/tr>\n
682<\/td>\nIndex
A-B <\/td>\n<\/tr>\n
683<\/td>\nC-D <\/td>\n<\/tr>\n
684<\/td>\nE-G <\/td>\n<\/tr>\n
685<\/td>\nH-L <\/td>\n<\/tr>\n
686<\/td>\nM-O <\/td>\n<\/tr>\n
687<\/td>\nP-R <\/td>\n<\/tr>\n
688<\/td>\nS-T <\/td>\n<\/tr>\n
689<\/td>\nU-Z <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Information Technology – Telecommunications and Information Exchange Between Systems – Local and Metropolitan Area Networks – Specific Requirements – Part 17: Resilient Packet Ring (RPR) Access Method and Physical Layer Specifications<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2004<\/td>\n689<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":81022,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-81021","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/81021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/81022"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=81021"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=81021"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=81021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}