{"id":81487,"date":"2024-10-17T18:55:13","date_gmt":"2024-10-17T18:55:13","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-802-1aq-2012\/"},"modified":"2024-10-24T19:46:55","modified_gmt":"2024-10-24T19:46:55","slug":"ieee-802-1aq-2012","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-802-1aq-2012\/","title":{"rendered":"IEEE 802.1aq 2012"},"content":{"rendered":"

Amendment Standard – Active. This amendment to IEEE Std 802.1Q-2011 specifies shortest path bridging of unicast and multicast frames, including protocols to calculate multiple active topologies that can share learned station information, and support of a virtual local area network (VLAN) by multiple, per topology VLAN identifiers (VIDs).<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std 802.1aq Front Cover <\/td>\n<\/tr>\n
3<\/td>\nTitle page
\n <\/td>\n<\/tr>\n
6<\/td>\nIntroduction
Notice to users
Laws and regulations
Copyrights
Updating of IEEE documents <\/td>\n<\/tr>\n
7<\/td>\nErrata
Patents
Participants <\/td>\n<\/tr>\n
9<\/td>\nContents <\/td>\n<\/tr>\n
13<\/td>\nFigures <\/td>\n<\/tr>\n
15<\/td>\nTables <\/td>\n<\/tr>\n
17<\/td>\nImportant notice
\n <\/td>\n<\/tr>\n
18<\/td>\n1. Overview
1.3 Introduction <\/td>\n<\/tr>\n
19<\/td>\n2. Normative references <\/td>\n<\/tr>\n
20<\/td>\n3. Definitions <\/td>\n<\/tr>\n
22<\/td>\n4. Abbreviations <\/td>\n<\/tr>\n
23<\/td>\n5. Conformance
5.4 VLAN-aware Bridge component requirements
5.4.1 VLAN-aware Bridge component options <\/td>\n<\/tr>\n
24<\/td>\n5.4.5 Shortest Path Bridging operation (optional)
5.5 C-VLAN component conformance <\/td>\n<\/tr>\n
25<\/td>\n5.6 S-VLAN component conformance
5.6.1 S-VLAN component options <\/td>\n<\/tr>\n
26<\/td>\n6. Support of the MAC Service
6.5 Quality of service maintenance
6.5.1 Service availability
6.5.3 Frame misordering
6.5.4 Frame duplication <\/td>\n<\/tr>\n
28<\/td>\n6.9 Support of the EISS <\/td>\n<\/tr>\n
29<\/td>\n6.9.1 Data indications <\/td>\n<\/tr>\n
30<\/td>\n6.9.2 Data requests <\/td>\n<\/tr>\n
31<\/td>\n7. Principles of network operation
7.1 Network overview
7.2 Use of VLANs <\/td>\n<\/tr>\n
32<\/td>\n7.3 Active topology
7.4 7.3 VLAN topology <\/td>\n<\/tr>\n
33<\/td>\n7.5 7.4 Locating end stations <\/td>\n<\/tr>\n
35<\/td>\n7.6 7.5 Ingress, forwarding, and egress rules <\/td>\n<\/tr>\n
37<\/td>\n8. Principles of bridge operation
8.1 Bridge operation
8.1.1 Relay <\/td>\n<\/tr>\n
38<\/td>\n8.1.2 Filtering and relaying information
8.1.3 Duplicate frame prevention
8.2 Bridge architecture
8.3 Model of operation <\/td>\n<\/tr>\n
39<\/td>\n8.4 Active topologies, learning, and forwarding <\/td>\n<\/tr>\n
41<\/td>\n8.6 The Forwarding Process
8.6.1 Active topology enforcement <\/td>\n<\/tr>\n
42<\/td>\n8.7 The Learning Process <\/td>\n<\/tr>\n
43<\/td>\n8.7.3 Ageing of Dynamic Filtering Entries
8.8 The Filtering Database <\/td>\n<\/tr>\n
44<\/td>\n8.8.1 Static Filtering Entries <\/td>\n<\/tr>\n
45<\/td>\n8.8.2 Static VLAN Registration Entries
8.8.3 Dynamic Filtering Entries <\/td>\n<\/tr>\n
46<\/td>\n8.8.4 MAC Address Registration Entries <\/td>\n<\/tr>\n
47<\/td>\n8.8.8 Allocation of VIDs to FIDs <\/td>\n<\/tr>\n
49<\/td>\n8.9 MST, SPB, and ESP configuration information <\/td>\n<\/tr>\n
50<\/td>\n8.9.1 MST Configuration Table
8.9.2 MST configuration identification
8.9.3 FID to MSTID Allocation Table <\/td>\n<\/tr>\n
51<\/td>\n8.9.4 SPT Configuration Identification
8.10 Spanning Tree Protocol Entity <\/td>\n<\/tr>\n
52<\/td>\n8.13 Addressing
8.13.3 Use of LLC by Spanning Tree Protocol Entities
8.13.5 Group MAC Addresses for spanning tree protocolsentity <\/td>\n<\/tr>\n
54<\/td>\n8.13.9 Points of attachment and connectivity for Higher Layer Entities <\/td>\n<\/tr>\n
55<\/td>\n9. Tagged frame format
9.7 Backbone Service Instance Tag Control Information <\/td>\n<\/tr>\n
56<\/td>\n12. Bridge management
12.1 Management functions
12.1.1 Configuration management
12.2 VLAN-aware bridge objects
12.3 Data Types
12.7 Filtering Database
12.7.7 General Filtering Database operations
12.10 Bridge VLAN managed objects
12.10.1 Bridge VLAN Configuration managed object <\/td>\n<\/tr>\n
59<\/td>\n12.10.3 The VLAN Learning Constraints managed object
12.12 MST configuration entities
12.12.1 The MSTI List
12.12.3 The MST Configuration Table <\/td>\n<\/tr>\n
60<\/td>\n12.13 Provider Bridge management
12.25 Shortest Path Bridging managed objects
12.25.1 The SPB System managed object <\/td>\n<\/tr>\n
63<\/td>\n12.25.2 The SPB MTID Static managed object <\/td>\n<\/tr>\n
65<\/td>\n12.25.3 The SPB Topology Instance Dynamic managed object
12.25.4 The SPB ECT Static Entry managed object <\/td>\n<\/tr>\n
67<\/td>\n12.25.5 The SPB ECT Dynamic Entry managed object
12.25.6 The SPB Adjacency Static Entry managed object <\/td>\n<\/tr>\n
68<\/td>\n12.25.7 The SPB Adjacency Dynamic Entry managed object <\/td>\n<\/tr>\n
69<\/td>\n12.25.8 The SPB Topology Node Table managed object <\/td>\n<\/tr>\n
70<\/td>\n12.25.9 The SPB Topology ECT Table managed object <\/td>\n<\/tr>\n
71<\/td>\n12.25.10 The SPB Topology Edge Table managed object
12.25.11 The SPBM Topology Service Table managed object <\/td>\n<\/tr>\n
73<\/td>\n12.25.12 The SPBV Topology Service Table managed object <\/td>\n<\/tr>\n
74<\/td>\n13. Spanning Tree Protocols <\/td>\n<\/tr>\n
75<\/td>\n13.1 Protocol design requirements <\/td>\n<\/tr>\n
76<\/td>\n13.2 Protocol support requirements
13.2.1 MSTP support requirements <\/td>\n<\/tr>\n
77<\/td>\n13.2.2 SPB support requirements
13.3 Protocol design goals
13.4 RSTP overview <\/td>\n<\/tr>\n
78<\/td>\n13.4.1 Computation of the active topology <\/td>\n<\/tr>\n
80<\/td>\n13.4.2 Example topologies <\/td>\n<\/tr>\n
83<\/td>\n13.5 MSTP overview <\/td>\n<\/tr>\n
84<\/td>\n13.5.1 Example topologies <\/td>\n<\/tr>\n
87<\/td>\n13.5.2 Relationship of MSTP to RSTP
13.5.3 Modeling an MST or SPT Region as a single bridge <\/td>\n<\/tr>\n
88<\/td>\n13.6 SPB overview <\/td>\n<\/tr>\n
89<\/td>\n13.7 13.6 Compatibility and interoperability
13.7.1 13.6.1 Designated Port selection
13.7.2 13.6.2 Force Protocol Version <\/td>\n<\/tr>\n
90<\/td>\n13.8 13.7 MST Configuration Identifier <\/td>\n<\/tr>\n
91<\/td>\n13.9 13.8 Spanning Tree Priority Vectors <\/td>\n<\/tr>\n
93<\/td>\n13.10 13.9 CIST Priority Vector calculations <\/td>\n<\/tr>\n
95<\/td>\n13.11 13.10 MST Priority Vector calculations <\/td>\n<\/tr>\n
97<\/td>\n13.12 13.11 Port Role assignments <\/td>\n<\/tr>\n
98<\/td>\n13.13 13.12 Stable connectivity <\/td>\n<\/tr>\n
99<\/td>\n13.14 13.13 Communicating Spanning Tree information <\/td>\n<\/tr>\n
100<\/td>\n13.15 13.14 Changing Spanning Tree information <\/td>\n<\/tr>\n
101<\/td>\n13.16 13.15 Changing Port States with RSTP or MSTP <\/td>\n<\/tr>\n
102<\/td>\n13.16.1 13.15.1 Subtree connectivity and priority vectors
13.16.2 13.15.2 Root Port transition to Forwarding
13.16.3 13.15.3 Designated Port transition to Forwarding <\/td>\n<\/tr>\n
103<\/td>\n13.16.4 13.15.4 Master Port transition to Forwarding <\/td>\n<\/tr>\n
106<\/td>\n13.17 Changing Port States with SPB <\/td>\n<\/tr>\n
108<\/td>\n13.17.1 Agreement Digest <\/td>\n<\/tr>\n
109<\/td>\n13.18 13.16 Managing spanning tree topologies <\/td>\n<\/tr>\n
110<\/td>\n13.19 13.17 Updating learned station location information <\/td>\n<\/tr>\n
112<\/td>\n13.20 13.18 Managing reconfiguration <\/td>\n<\/tr>\n
113<\/td>\n13.21 13.19 Partial and disputed connectivity
13.22 13.20 In-service upgrades <\/td>\n<\/tr>\n
114<\/td>\n13.23 13.21 Fragile bridges <\/td>\n<\/tr>\n
115<\/td>\n13.24 13.22 Spanning tree protocol state machines <\/td>\n<\/tr>\n
117<\/td>\n13.25 13.23 State machine timers <\/td>\n<\/tr>\n
118<\/td>\n13.25.1 13.23.1 edgeDelayWhile
13.25.2 13.23.2 fdWhile
13.25.3 13.23.3 helloWhen
13.25.4 13.23.4 mdelayWhile
13.25.5 13.23.5 rbWhile
13.25.6 13.23.6 rcvdInfoWhile <\/td>\n<\/tr>\n
119<\/td>\n13.25.7 13.23.7 rrWhile
13.25.8 13.23.8 tcDetected
13.25.9 13.23.9 tcWhile
13.25.10 13.23.10 pseudoInfoHelloWhen
13.26 13.24 Per bridge variables <\/td>\n<\/tr>\n
120<\/td>\n13.26.1 agreementDigest
13.26.2 13.24.1 BridgeIdentifier
13.26.3 13.24.2 BridgePriority
13.26.4 13.24.3 BridgeTimes <\/td>\n<\/tr>\n
121<\/td>\n13.26.5 13.24.4 ForceProtocolVersion
13.26.6 13.24.5 MigrateTime
13.26.7 13.24.6 MstConfigId
13.26.8 AuxMstConfigId
13.26.9 13.24.7 rootPortId
13.26.10 13.24.8 rootPriority
13.26.11 13.24.9 rootTimes
13.26.12 13.24.10 TxHoldCount
13.27 13.25 Per port variables <\/td>\n<\/tr>\n
124<\/td>\n13.27.1 13.25.1 AdminEdge
13.27.2 13.25.2 ageingTime
13.27.3 13.25.3 agree
13.27.4 13.25.4 agreed
13.27.5 agreedAbove
13.27.6 agreedDigest
13.27.7 agreedDigestValid
13.27.8 agreeDigest
13.27.9 agreeDigestValid <\/td>\n<\/tr>\n
125<\/td>\n13.27.10 agreedMisorder
13.27.11 agreedN
13.27.12 agreedND
13.27.13 agreedPriority
13.27.14 agreedTopology
13.27.15 agreementOutstanding
13.27.16 agreeN
13.27.17 agreeND
13.27.18 13.25.5 AutoEdge <\/td>\n<\/tr>\n
126<\/td>\n13.27.19 13.25.6 AutoIsolate
13.27.20 13.25.7 designatedPriority
13.27.21 13.25.8 designatedTimes
13.27.22 13.25.9 disputed
13.27.23 13.25.10 enableBPDUrx
13.27.24 13.25.11 enableBPDUtx
13.27.25 13.25.12 ExternalPortPathCost
13.27.26 13.25.19 isL2gp <\/td>\n<\/tr>\n
127<\/td>\n13.27.27 13.25.20 isolate
13.27.28 13.25.13 fdbFlush
13.27.29 13.25.14 forward
13.27.30 13.25.15 forwarding
13.27.31 13.25.16 infoInternal
13.27.32 13.25.17 infoIs <\/td>\n<\/tr>\n
128<\/td>\n13.27.33 13.25.18 InternalPortPathCost
13.27.34 13.25.21 learn
13.27.35 13.25.22 learning
13.27.36 13.25.23 master
13.27.37 13.25.24 mastered
13.27.38 13.25.25 mcheck
13.27.39 13.25.26 msgPriority <\/td>\n<\/tr>\n
129<\/td>\n13.27.40 13.25.27 msgTimes
13.27.41 neighbourPriority
13.27.42 13.25.28 newInfo
13.27.43 13.25.29 newInfoMsti
13.27.44 13.25.30 operEdge
13.27.45 13.25.31 portEnabled
13.27.46 13.25.32 portId <\/td>\n<\/tr>\n
130<\/td>\n13.27.47 13.25.33 portPriority
13.27.48 13.25.34 portTimes
13.27.49 13.25.35 proposed
13.27.50 13.25.36 proposing
13.27.51 13.25.37 pseudoRootId
13.27.52 13.25.38 rcvdBPDU
13.27.53 13.25.39 rcvdInfo
13.27.54 13.25.40 rcvdInternal
13.27.55 13.25.41 rcvdMsg
13.27.56 13.25.42 rcvdRSTP <\/td>\n<\/tr>\n
131<\/td>\n13.27.57 13.25.43 rcvdSTP
13.27.58 13.25.44 rcvdTc
13.27.59 13.25.45 rcvdTcAck
13.27.60 13.25.46 rcvdTcn
13.27.61 13.25.47 reRoot
13.27.62 13.25.48 reselect
13.27.63 restrictedDomainRole
13.27.64 13.25.49 restrictedRole
13.27.65 13.25.50 restrictedTcn
13.27.66 13.25.51 role <\/td>\n<\/tr>\n
132<\/td>\n13.27.67 13.25.52 selected
13.27.68 13.25.53 selectedRole
13.27.69 13.25.54 sendRSTP
13.27.70 13.25.55 sync
13.27.71 13.25.56 synced
13.27.72 13.25.57 tcAck
13.27.73 13.25.58 tcProp
13.27.74 13.25.59 tick
13.27.75 13.25.60 txCount
13.27.76 13.25.61 updtInfo <\/td>\n<\/tr>\n
133<\/td>\n13.28 13.26 State machine conditions and parameters
13.28.1 allSptAgree
13.28.2 13.26.1 allSynced
13.28.3 13.26.2 allTransmitReady <\/td>\n<\/tr>\n
134<\/td>\n13.28.4 BestAgreementPriority
13.28.5 13.26.3 cist
13.28.6 13.26.4 cistRootPort
13.28.7 13.26.5 cistDesignatedPort
13.28.8 13.26.6 EdgeDelay
13.28.9 13.26.7 forwardDelay
13.28.10 13.26.8 FwdDelay
13.28.11 13.26.9 HelloTime
13.28.12 13.26.11 MaxAge
13.28.13 13.26.10 msti
13.28.14 13.26.12 mstiDesignatedOrTCpropagatingRootPort
13.28.15 13.26.13 mstiMasterPort <\/td>\n<\/tr>\n
135<\/td>\n13.28.16 13.26.14 operPointToPoint
13.28.17 13.26.15 rcvdAnyMsg
13.28.18 13.26.16 rcvdCistMsg
13.28.19 13.26.17 rcvdMstiMsg
13.28.20 13.26.18 reRooted
13.28.21 13.26.19 rstpVersion
13.28.22 spt
13.28.23 13.26.20 stpVersion
13.28.24 13.26.21 updtCistInfo
13.28.25 13.26.22 updtMstiInfo
13.29 13.27 State machine procedures <\/td>\n<\/tr>\n
136<\/td>\n13.29.1 13.27.1 betterorsameInfo(newInfoIs) <\/td>\n<\/tr>\n
137<\/td>\n13.29.2 13.27.2 clearAllRcvdMsgs()
13.29.3 13.27.3 clearReselectTree()
13.29.4 13.27.4 disableForwarding()
13.29.5 13.27.5 disableLearning()
13.29.6 13.27.6 enableForwarding()
13.29.7 13.27.7 enableLearning()
13.29.8 13.27.8 fromSameRegion()
13.29.9 13.27.9 newTcDetected() <\/td>\n<\/tr>\n
138<\/td>\n13.29.10 13.27.10 newTcWhile()
13.29.11 13.27.11 pseudoRcvMsgs()
13.29.12 13.27.12 rcvInfo() <\/td>\n<\/tr>\n
139<\/td>\n13.29.13 13.27.13 rcvMsgs()
13.29.14 rcvAgreements()
13.29.15 13.27.14 recordAgreement() <\/td>\n<\/tr>\n
140<\/td>\n13.29.16 13.27.15 recordDispute()
13.29.17 13.27.16 recordMastered()
13.29.18 13.27.17 recordPriority()
13.29.19 13.27.18 recordProposal() <\/td>\n<\/tr>\n
141<\/td>\n13.29.20 13.27.19 recordTimes()
13.29.21 13.27.20setReRootTree()
13.29.22 13.27.21 setSelectedTree()
13.29.23 13.27.22 setSyncTree()
13.29.24 13.27.23 setTcFlags()
13.29.25 13.27.24 setTcPropTree()
13.29.26 13.27.25 syncMaster()
13.29.27 13.27.26 txConfig() <\/td>\n<\/tr>\n
142<\/td>\n13.29.28 13.27.27 txRstp()
13.29.29 13.27.28 txTcn()
13.29.30 updtAgreement() <\/td>\n<\/tr>\n
143<\/td>\n13.29.31 13.27.29 updtBPDUVersion()
13.29.32 updtDigest() <\/td>\n<\/tr>\n
144<\/td>\n13.29.33 13.27.30 updtRcvdInfoWhile() <\/td>\n<\/tr>\n
145<\/td>\n13.29.34 13.27.31 updtRolesTree() <\/td>\n<\/tr>\n
146<\/td>\n13.29.35 13.27.32 uptRolesDisabledTree() <\/td>\n<\/tr>\n
147<\/td>\n13.30 13.28 The Port Timers state machine
13.31 13.29 Port Receive state machine <\/td>\n<\/tr>\n
148<\/td>\n13.32 13.30 Port Protocol Migration state machine
13.33 13.31 Bridge Detection state machine <\/td>\n<\/tr>\n
149<\/td>\n13.34 13.32 Port Transmit state machine <\/td>\n<\/tr>\n
150<\/td>\n13.35 13.33 Port Information state machine <\/td>\n<\/tr>\n
151<\/td>\n13.36 13.34 Port Role Selection state machine
13.37 13.35 Port Role Transitions state machine <\/td>\n<\/tr>\n
155<\/td>\n13.38 13.36 Port State Transition state machine
13.38.1 13.36.1 Port State transitions for the CIST and MSTIs
13.38.2 Port State transitions for SPTs <\/td>\n<\/tr>\n
157<\/td>\n13.39 13.37 Topology Change state machine <\/td>\n<\/tr>\n
158<\/td>\n13.40 13.38 Layer 2 Gateway Port Receive state machine
13.41 13.39 Customer Edge Port Spanning Tree operation
13.41.1 13.39.1 Provider Edge Port operPointToPointMAC and operEdge <\/td>\n<\/tr>\n
159<\/td>\n13.41.2 13.39.2 updtRolesTree()
13.41.3 13.39.3 setReRootTree(), setSyncTree(), setTcPropTree()
13.41.4 13.39.4 allSynced, reRooted
13.41.5 13.39.5 Configuration parameters <\/td>\n<\/tr>\n
160<\/td>\n13.42 13.40 Virtual Instance Port Spanning Tree operation <\/td>\n<\/tr>\n
161<\/td>\n14. Encoding of Bridge Protocol Data Units (BPDUs)Use of BPDUs by MSTP
14.1 BPDU Structure
14.1.1 Transmission and representation of octets <\/td>\n<\/tr>\n
163<\/td>\n14.1.2 Common BPDU fields Components
14.2 Encoding of parameter types
14.2.1 Encoding of Port Role valuesProtocol Identifiers <\/td>\n<\/tr>\n
164<\/td>\n14.2.2 Allocation and encoding of Bridge IdentifiersEncoding of Protocol Version Identifiers
14.2.3 Allocation and encoding of Port IdentifiersEncoding of BPDU types
14.2.4 Encoding of External Root Path Costflags
14.2.5 Encoding of Internal Root Path CostBridge Identifiers <\/td>\n<\/tr>\n
165<\/td>\n14.2.6 Encoding of Hop CountsExternal Root Path Cost and Internal Root Path Cost
14.2.7 Encoding of Port Identifiers <\/td>\n<\/tr>\n
166<\/td>\n14.2.8 Encoding of Timer Values
14.2.9 Encoding of Port Role values
14.2.10 Encoding of Length Values
14.2.11 Encoding of Hop Counts <\/td>\n<\/tr>\n
167<\/td>\n14.3 14.5 Transmission of BPDUs
14.4 14.6 Encoding and decoding of STP Configuration, RST, and MST, and SPT BPDUs <\/td>\n<\/tr>\n
169<\/td>\n14.4.1 14.6.1MSTI Configuration Messages <\/td>\n<\/tr>\n
170<\/td>\n14.5 14.4 Validation of received BPDUs <\/td>\n<\/tr>\n
171<\/td>\n14.6 Validation and interoperability <\/td>\n<\/tr>\n
173<\/td>\n17. Management Information Base (MIB)
17.2 Structure of the MIB
17.2.4 Structure of the IEEE8021-Q-BRIDGE-MIB <\/td>\n<\/tr>\n
174<\/td>\n17.2.5 Structure of the IEEE8021-PB MIB
17.2.6 Structure of the IEEE8021-MSTP MIB <\/td>\n<\/tr>\n
175<\/td>\n17.2.19 Structure of the IEEE8021-SPB-MIB <\/td>\n<\/tr>\n
178<\/td>\n17.3 Relationship to other MIBs
17.3.5 Relationship of the IEEE8021-PB-BRIDGE MIB to other MIB modules
17.3.19 Relationship of the of the IEEE8021-SPB-MIB to other MIB modules
17.4 Security considerations
17.4.19 Security considerations of the IEEE8021-SPB MIB <\/td>\n<\/tr>\n
179<\/td>\n17.7 MIB modules
17.7.4 Definitions for the IEEE8021-Q-BRIDGE MIB module <\/td>\n<\/tr>\n
219<\/td>\n17.7.5 Definitions for the IEEE8021-PB MIB module <\/td>\n<\/tr>\n
234<\/td>\n17.7.6 Definitions for the IEEE8021-MSTP MIB module <\/td>\n<\/tr>\n
259<\/td>\n17.7.19 SPB MIB module <\/td>\n<\/tr>\n
289<\/td>\n20. Connectivity Fault Management protocols
20.2.2 Loopback Message reception and Loopback Reply transmission
20.28.2 xmitLBR() <\/td>\n<\/tr>\n
291<\/td>\n27. Shortest Path Bridging (SPB) <\/td>\n<\/tr>\n
293<\/td>\n27.1 Protocol design requirements <\/td>\n<\/tr>\n
294<\/td>\n27.2 Protocol support
27.3 Protocol design goals <\/td>\n<\/tr>\n
295<\/td>\n27.4 ISIS-SPB VLAN configuration <\/td>\n<\/tr>\n
296<\/td>\n27.4.1 SPT Region and ISIS-SPB adjacency determination <\/td>\n<\/tr>\n
298<\/td>\n27.5 ISIS-SPB information
27.6 Calculating CIST connectivity <\/td>\n<\/tr>\n
299<\/td>\n27.7 Connectivity between regions in the same domain <\/td>\n<\/tr>\n
300<\/td>\n27.8 Calculating SPT connectivity
27.8.1 ISIS-SPB overload <\/td>\n<\/tr>\n
301<\/td>\n27.9 Loop prevention
27.10 SPVID and SPSourceID allocation <\/td>\n<\/tr>\n
303<\/td>\n27.11 Allocation of VIDs to FIDs
27.12 SPBV SPVID translation <\/td>\n<\/tr>\n
304<\/td>\n27.13 VLAN topology management <\/td>\n<\/tr>\n
305<\/td>\n27.14 Individual addresses and SPBM
27.14.1 Loop mitigation <\/td>\n<\/tr>\n
306<\/td>\n27.14.2 Loop prevention
27.15 SPBM group addressing <\/td>\n<\/tr>\n
307<\/td>\n27.16 Backbone service instance topology management <\/td>\n<\/tr>\n
308<\/td>\n27.17 Equal cost shortest paths, ECTs, and load spreading
27.18 Using SPBV and SPBM
27.18.1 Shortest Path Bridging\u2014VID <\/td>\n<\/tr>\n
310<\/td>\n27.18.2 Shortest Path Bridging\u2014MAC <\/td>\n<\/tr>\n
312<\/td>\n27.19 Security considerations <\/td>\n<\/tr>\n
313<\/td>\n28. ISIS-SPB Link State Protocol
28.1 ISIS-SPB control plane MAC <\/td>\n<\/tr>\n
314<\/td>\n28.2 Formation and maintenance of ISIS-SPB adjacencies <\/td>\n<\/tr>\n
315<\/td>\n28.3 Loop prevention
28.4 The Agreement Digest <\/td>\n<\/tr>\n
316<\/td>\n28.4.1 Agreement Digest Format Identifier
28.4.2 Agreement Digest Format Capabilities
28.4.3 Agreement Digest Convention Identifier
28.4.4 Agreement Digest Convention Capabilities <\/td>\n<\/tr>\n
317<\/td>\n28.4.5 Agreement Digest Edge Count
28.4.6 The Computed Topology Digest <\/td>\n<\/tr>\n
318<\/td>\n28.5 Symmetric shortest path tie breaking <\/td>\n<\/tr>\n
319<\/td>\n28.6 Symmetric ECT framework <\/td>\n<\/tr>\n
320<\/td>\n28.7 Symmetric ECT <\/td>\n<\/tr>\n
321<\/td>\n28.8 Predefined ECT Algorithm details <\/td>\n<\/tr>\n
322<\/td>\n28.9 ECT Migration
28.9.1 Use of a new ECT Algorithm in SPBV <\/td>\n<\/tr>\n
323<\/td>\n28.9.2 Use of a new ECT Algorithm in SPBM
28.10 MAC Address registration <\/td>\n<\/tr>\n
324<\/td>\n28.11 Circuit IDs and Port Identifiers
28.12 ISIS-SPB TLVs <\/td>\n<\/tr>\n
325<\/td>\n28.12.1 MT-Capability TLV
28.12.2 SPB MCID sub-TLV <\/td>\n<\/tr>\n
326<\/td>\n28.12.3 SPB Digest sub-TLV
28.12.4 SPB Base VLAN-Identifiers sub-TLV <\/td>\n<\/tr>\n
328<\/td>\n28.12.5 SPB Instance sub-TLV <\/td>\n<\/tr>\n
329<\/td>\n28.12.6 SPB Instance Opaque ECT Algorithm sub-TLV <\/td>\n<\/tr>\n
330<\/td>\n28.12.7 SPB Link Metric sub-TLV <\/td>\n<\/tr>\n
331<\/td>\n28.12.8 SPB Adjacency Opaque ECT Algorithm sub-TLV
28.12.9 SPBV MAC address sub-TLV <\/td>\n<\/tr>\n
333<\/td>\n28.12.10 SPBM Service Identifier and Unicast Address (ISID-ADDR) sub-TLV <\/td>\n<\/tr>\n
335<\/td>\nAnnex A (normative) PICS proforma\u2014Bridge implementations <\/td>\n<\/tr>\n
337<\/td>\nAnnex F (informative) Shared and Independent VLAN Learning <\/td>\n<\/tr>\n
340<\/td>\nAnnex M (informative) Bibliography
\n <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Local and metropolitan area networks–Media Access Control (MAC) Bridges and Virtual Bridged Local Area Networks–Amendment 20: Shortest Path Bridging<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2012<\/td>\n340<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":81488,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-81487","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/81487","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/81488"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=81487"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=81487"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=81487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}