{"id":438361,"date":"2024-10-20T08:03:31","date_gmt":"2024-10-20T08:03:31","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-802-1q-2022-6\/"},"modified":"2024-10-26T15:07:27","modified_gmt":"2024-10-26T15:07:27","slug":"ieee-802-1q-2022-6","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-802-1q-2022-6\/","title":{"rendered":"IEEE 802.1Q-2022"},"content":{"rendered":"

Revision Standard – Active. This standard specifies how the Media Access Control (MAC) Service is supported by Bridged Networks, the principles of operation of those networks, and the operation of MAC Bridges and VLAN Bridges, including management, protocols, and algorithms.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std 802.1Q\u2122-2022 Front cover
Back Cover <\/td>\n<\/tr>\n
2<\/td>\nTitle page <\/td>\n<\/tr>\n
4<\/td>\nImportant Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n
8<\/td>\nParticipants <\/td>\n<\/tr>\n
18<\/td>\nIntroduction <\/td>\n<\/tr>\n
20<\/td>\nContents <\/td>\n<\/tr>\n
61<\/td>\nFigures <\/td>\n<\/tr>\n
69<\/td>\nTables <\/td>\n<\/tr>\n
75<\/td>\nBridges and Bridged Networks
1. Overview
1.1 Scope
1.2 Purpose <\/td>\n<\/tr>\n
76<\/td>\n1.3 Introduction <\/td>\n<\/tr>\n
84<\/td>\n2. Normative references <\/td>\n<\/tr>\n
88<\/td>\n3. Definitions <\/td>\n<\/tr>\n
110<\/td>\n4. Abbreviations <\/td>\n<\/tr>\n
116<\/td>\n5. Conformance
5.1 Requirements terminology
5.2 Conformant components and equipment <\/td>\n<\/tr>\n
117<\/td>\n5.3 Protocol Implementation Conformance Statement (PICS)
5.4 VLAN Bridge component requirements <\/td>\n<\/tr>\n
118<\/td>\n5.4.1 VLAN Bridge component options <\/td>\n<\/tr>\n
120<\/td>\n5.4.1.1 Multiple Spanning Tree (MST) operation (optional)
5.4.1.2 Port-and-Protocol-based VLAN classification (optional) <\/td>\n<\/tr>\n
121<\/td>\n5.4.1.3 Multiple MAC Registration Protocol (MMRP) operation (optional)
5.4.1.4 Connectivity Fault Management (CFM) (optional) <\/td>\n<\/tr>\n
122<\/td>\n5.4.1.5 Forwarding and Queuing Enhancements for time-sensitive streams (FQTSS)\u2014 requirements
5.4.1.6 ETS Bridge requirements <\/td>\n<\/tr>\n
123<\/td>\n5.4.1.7 DCBX Bridge requirements
5.4.1.8 Per-Stream Filtering and Policing (PSFP) requirements
5.4.1.9 Cyclic queuing and forwarding (CQF) requirements
5.4.1.10 Asynchronous Traffic Shaping (ATS) requirements
5.4.1.10 Stream reservation remote management (optional) <\/td>\n<\/tr>\n
124<\/td>\n5.4.2 Multiple VLAN Registration Protocol (MVRP) requirements
5.4.3 VLAN Bridge requirements for congestion notification <\/td>\n<\/tr>\n
125<\/td>\n5.4.4 Multiple Stream Registration Protocol (MSRP) requirements
5.4.5 Shortest Path Bridging (SPB) operation (optional) <\/td>\n<\/tr>\n
126<\/td>\n5.4.5.1 SPBM ECMP operation (optional)
5.4.5.2 SPBM ECMP operation with flow filtering (optional)
5.4.6 Path Control and Reservation (PCR) (optional) <\/td>\n<\/tr>\n
127<\/td>\n5.5 C-VLAN component conformance
5.5.1 C-VLAN component options
5.5.2 TE-MSTID (optional) <\/td>\n<\/tr>\n
128<\/td>\n5.6 S-VLAN component conformance
5.6.1 S-VLAN component options
5.6.2 S-VLAN component requirements for Provider Backbone Bridge Traffic Engineering (PBB-TE) <\/td>\n<\/tr>\n
129<\/td>\n5.6.3 S-VLAN component requirements for PBB-TE IPS
5.6.4 S-VLAN component requirements for ECMP with flow filtering
5.7 I-component conformance
5.7.1 I-component options <\/td>\n<\/tr>\n
130<\/td>\n5.8 B-component conformance
5.8.1 B-component options
5.8.2 B-component requirements for PBB-TE <\/td>\n<\/tr>\n
131<\/td>\n5.8.3 B-component requirements for PBB-TE IPS
5.8.4 B-component requirements for ECMP with flow filtering
5.9 C-VLAN Bridge conformance
5.9.1 C-VLAN Bridge options
5.10 Provider Bridge conformance <\/td>\n<\/tr>\n
132<\/td>\n5.10.1 S-VLAN Bridge conformance
5.10.2 Provider Edge Bridge conformance
5.11 System requirements for Priority-based Flow Control (PFC)
5.12 Backbone Edge Bridge (BEB) conformance <\/td>\n<\/tr>\n
133<\/td>\n5.12.1 BEB requirements for PBB-TE
5.13 MAC Bridge component requirements
5.13.1 MAC Bridge component options <\/td>\n<\/tr>\n
134<\/td>\n5.13.1.1 Per-Stream Filtering and Policing (PSFP) requirements
5.13.1.2 Cyclic queuing and forwarding requirements
5.13.1.3 Asynchronous Traffic Shaping (ATS) requirements
5.14 MAC Bridge conformance
5.14.1 MAC Bridge options <\/td>\n<\/tr>\n
135<\/td>\n5.15 TPMR component conformance
5.15.1 TPMR component options
5.16 TPMR conformance <\/td>\n<\/tr>\n
136<\/td>\n5.16.1 TPMR options
5.17 T-component conformance
5.17.1 T-component options
5.18 End station requirements for MMRP, MVRP, and MSRP
5.18.1 MMRP requirements and options <\/td>\n<\/tr>\n
137<\/td>\n5.18.2 MVRP requirements and options
5.18.3 MSRP requirements and options <\/td>\n<\/tr>\n
138<\/td>\n5.19 VLAN-aware end station requirements for CFM
5.20 End station requirements\u2014FQTSS <\/td>\n<\/tr>\n
139<\/td>\n5.21 End station requirements for congestion notification
5.22 MAC-specific bridging methods <\/td>\n<\/tr>\n
140<\/td>\n5.23 EVB Bridge requirements
5.24 EVB station requirements <\/td>\n<\/tr>\n
141<\/td>\n5.24.1 Edge relay (ER) requirements <\/td>\n<\/tr>\n
142<\/td>\n5.24.1.1 VEB ER requirements
5.24.1.2 VEPA ER requirements
5.25 End station requirements\u2014enhancements for scheduled traffic <\/td>\n<\/tr>\n
143<\/td>\n5.26 End station requirements\u2014enhancements for frame preemption
5.27 End station requirements\u2014PSFP
5.28 End station requirements\u2014Cyclic queuing and forwarding
5.29 TSN CNC station requirements <\/td>\n<\/tr>\n
144<\/td>\n5.30 VDP-NVO3 requirements
5.30.1 VDP-NVO3 nNVE requirements
5.30.2 VDP-NVO3 tNVE requirements
5.31 End station requirements\u2014ATS <\/td>\n<\/tr>\n
145<\/td>\n6. Support of the MAC Service <\/td>\n<\/tr>\n
146<\/td>\n6.1 Basic architectural concepts and terms
6.2 Provision of the MAC Service <\/td>\n<\/tr>\n
147<\/td>\n6.2.1 Point-to-point, multipoint-to-multipoint, and rooted-multipoint connectivity
6.3 Support of the MAC Service <\/td>\n<\/tr>\n
148<\/td>\n6.4 Preservation of the MAC Service
6.5 Quality of service (QoS) maintenance
6.5.1 Service availability <\/td>\n<\/tr>\n
149<\/td>\n6.5.2 Frame loss
6.5.3 Frame misordering <\/td>\n<\/tr>\n
150<\/td>\n6.5.4 Frame duplication
6.5.4.1 Loop prevention <\/td>\n<\/tr>\n
151<\/td>\n6.5.4.2 Loop mitigation
6.5.5 Transit delay
6.5.6 Frame lifetime <\/td>\n<\/tr>\n
152<\/td>\n6.5.7 Undetected frame error rate
6.5.8 Maximum Service Data Unit Size
6.5.9 Priority <\/td>\n<\/tr>\n
153<\/td>\n6.5.10 Throughput <\/td>\n<\/tr>\n
154<\/td>\n6.6 Internal Sublayer Service (ISS)
6.7 Support of the ISS by specific MAC procedures
6.7.1 Support of the ISS by IEEE Std 802.3 (Ethernet)
6.7.2 Frame preemption <\/td>\n<\/tr>\n
155<\/td>\n6.8 Enhanced Internal Sublayer Service (EISS)
6.8.1 Service primitives <\/td>\n<\/tr>\n
156<\/td>\n6.8.2 Status parameters
6.8.3 Point-to-point parameters
6.8.4 Control primitives and parameters <\/td>\n<\/tr>\n
157<\/td>\n6.9 Support of the EISS <\/td>\n<\/tr>\n
158<\/td>\n6.9.1 Data indications <\/td>\n<\/tr>\n
159<\/td>\n6.9.2 Data requests
6.9.3 Priority Code Point encoding <\/td>\n<\/tr>\n
161<\/td>\n6.9.4 Regenerating priority <\/td>\n<\/tr>\n
162<\/td>\n6.10 Support of the ISS\/EISS by PIPs <\/td>\n<\/tr>\n
164<\/td>\n6.10.1 Data indications <\/td>\n<\/tr>\n
165<\/td>\n6.10.2 Data requests
6.10.3 Priority Code Point encoding <\/td>\n<\/tr>\n
166<\/td>\n6.11 Support of the EISS by CBPs <\/td>\n<\/tr>\n
167<\/td>\n6.11.1 Data indications <\/td>\n<\/tr>\n
168<\/td>\n6.11.2 Data requests <\/td>\n<\/tr>\n
169<\/td>\n6.11.3 Priority Code Point decoding
6.11.4 Regenerating priority
6.12 Protocol VLAN classification <\/td>\n<\/tr>\n
171<\/td>\n6.12.1 Protocol Templates
6.12.2 Protocol Group Identifiers
6.12.3 Protocol Group Database <\/td>\n<\/tr>\n
172<\/td>\n6.13 Support of the ISS for attachment to a PBN <\/td>\n<\/tr>\n
173<\/td>\n6.13.1 Data requests
6.13.2 Data indications <\/td>\n<\/tr>\n
174<\/td>\n6.14 Support of the ISS within a system
6.15 Support of the ISS by additional technologies
6.16 Filtering services in Bridged Networks <\/td>\n<\/tr>\n
175<\/td>\n6.16.1 Purpose(s) of filtering service provision
6.16.1.1 Administrative control
6.16.1.2 Throughput and end station load
6.16.2 Goals of filtering service provision
6.16.3 Users of filtering services
6.16.4 Basis of service <\/td>\n<\/tr>\n
176<\/td>\n6.16.5 Categories of service
6.16.6 Service configuration
6.16.7 Service definition for Extended Filtering Services <\/td>\n<\/tr>\n
177<\/td>\n6.16.7.1 Dynamic registration and deregistration services <\/td>\n<\/tr>\n
178<\/td>\n6.17 EISS Multiplex Entity <\/td>\n<\/tr>\n
179<\/td>\n6.18 Backbone Service Instance Multiplex Entity <\/td>\n<\/tr>\n
180<\/td>\n6.18.1 Demultiplexing direction <\/td>\n<\/tr>\n
181<\/td>\n6.18.2 Multiplexing direction
6.18.3 Priority Code Point encoding
6.18.4 Status parameters <\/td>\n<\/tr>\n
182<\/td>\n6.19 TESI Multiplex Entity <\/td>\n<\/tr>\n
183<\/td>\n6.20 Support of the ISS with signaled priority
6.20.1 Data indications <\/td>\n<\/tr>\n
184<\/td>\n6.20.2 Data requests
6.21 Infrastructure Segment Multiplex Entity <\/td>\n<\/tr>\n
185<\/td>\n6.22 PDU and protocol discrimination and media <\/td>\n<\/tr>\n
186<\/td>\n7. Principles of Virtual Bridged Network operation
7.1 Network overview <\/td>\n<\/tr>\n
187<\/td>\n7.2 Use of VLANs
7.3 Active topology <\/td>\n<\/tr>\n
188<\/td>\n7.4 VLAN topology <\/td>\n<\/tr>\n
189<\/td>\n7.5 Locating end stations <\/td>\n<\/tr>\n
190<\/td>\n7.6 Ingress, forwarding, and egress rules <\/td>\n<\/tr>\n
191<\/td>\n8. Principles of Bridge operation
8.1 Bridge operation
8.1.1 Relay <\/td>\n<\/tr>\n
192<\/td>\n8.1.2 Filtering and relaying information
8.1.3 Duplicate frame prevention
8.1.4 Traffic segregation <\/td>\n<\/tr>\n
193<\/td>\n8.1.5 Traffic reduction
8.1.6 Traffic expediting
8.1.7 Conversion of frame formats <\/td>\n<\/tr>\n
194<\/td>\n8.2 Bridge architecture <\/td>\n<\/tr>\n
196<\/td>\n8.3 Model of operation <\/td>\n<\/tr>\n
200<\/td>\n8.4 Active topologies, learning, and forwarding <\/td>\n<\/tr>\n
201<\/td>\n8.5 Bridge Port Transmit and Receive
8.5.1 Bridge Port connectivity <\/td>\n<\/tr>\n
202<\/td>\n8.5.2 TPMR Port connectivity <\/td>\n<\/tr>\n
203<\/td>\n8.5.3 Support of Higher Layer Entities
8.6 The Forwarding Process <\/td>\n<\/tr>\n
204<\/td>\n8.6.1 Active topology enforcement <\/td>\n<\/tr>\n
205<\/td>\n8.6.1.1 Requirements for the use of reflective relay <\/td>\n<\/tr>\n
206<\/td>\n8.6.2 Ingress filtering
8.6.3 Frame filtering <\/td>\n<\/tr>\n
208<\/td>\n8.6.3.1 Virtual edge port aggregator (VEPA) filtering <\/td>\n<\/tr>\n
209<\/td>\n8.6.4 Egress filtering
8.6.5 Flow classification and metering <\/td>\n<\/tr>\n
210<\/td>\n8.6.5.1 General flow classification and metering
8.6.5.2 Per-stream classification and metering <\/td>\n<\/tr>\n
211<\/td>\n8.6.5.2.1 PSFP support <\/td>\n<\/tr>\n
212<\/td>\n8.6.5.2.2 ATS support
8.6.5.3 Stream filtering <\/td>\n<\/tr>\n
214<\/td>\n8.6.5.3.1 Maximum SDU Size Filtering
8.6.5.4 Stream gating <\/td>\n<\/tr>\n
216<\/td>\n8.6.5.5 Flow metering <\/td>\n<\/tr>\n
217<\/td>\n8.6.5.6 ATS eligibility time assignment <\/td>\n<\/tr>\n
218<\/td>\n8.6.6 Queuing frames <\/td>\n<\/tr>\n
219<\/td>\n8.6.7 Queue management <\/td>\n<\/tr>\n
220<\/td>\n8.6.8 Transmission selection <\/td>\n<\/tr>\n
221<\/td>\n8.6.8.1 Strict priority algorithm
8.6.8.2 Credit-based shaper algorithm <\/td>\n<\/tr>\n
223<\/td>\n8.6.8.3 ETS algorithm
8.6.8.4 Enhancements for scheduled traffic <\/td>\n<\/tr>\n
226<\/td>\n8.6.8.5 ATS transmission selection algorithm
8.6.9 Scheduled traffic state machines <\/td>\n<\/tr>\n
227<\/td>\n8.6.9.1 Cycle Timer state machine <\/td>\n<\/tr>\n
228<\/td>\n8.6.9.2 List Execute state machine
8.6.9.2.1 ExecuteOperation()
8.6.9.2.2 SetGateStates() <\/td>\n<\/tr>\n
229<\/td>\n8.6.9.3 List Config state machine
8.6.9.3.1 SetConfigChangeTime() <\/td>\n<\/tr>\n
230<\/td>\n8.6.9.4 State machine variables
8.6.9.4.1 AdminBaseTime
8.6.9.4.2 AdminControlList
8.6.9.4.3 AdminCycleTime
8.6.9.4.4 AdminCycleTimeExtension
8.6.9.4.5 AdminGateStates
8.6.9.4.6 AdminControlListLength <\/td>\n<\/tr>\n
231<\/td>\n8.6.9.4.7 ConfigChange
8.6.9.4.8 ConfigPending
8.6.9.4.9 ConfigChangeTime
8.6.9.4.10 CurrentTime
8.6.9.4.11 CycleStart
8.6.9.4.12 CycleStartTime
8.6.9.4.13 ExitTimer
8.6.9.4.14 GateEnabled <\/td>\n<\/tr>\n
232<\/td>\n8.6.9.4.15 ListPointer
8.6.9.4.16 Tick
8.6.9.4.17 OperBaseTime
8.6.9.4.18 OperControlList
8.6.9.4.19 OperCycleTime
8.6.9.4.20 OperCycleTimeExtension
8.6.9.4.21 OperGateStates <\/td>\n<\/tr>\n
233<\/td>\n8.6.9.4.22 OperControlListLength
8.6.9.4.23 TimeInterval
8.6.10 Stream gate control state machines <\/td>\n<\/tr>\n
234<\/td>\n8.6.10.1 ExecuteStreamGateOperation()
8.6.10.2 SetStreamGateStates()
8.6.10.3 StreamGateListPointer
8.6.10.4 StreamGateAdminGateStates
8.6.10.5 StreamGateOperGateStates
8.6.10.6 AdminIPV <\/td>\n<\/tr>\n
235<\/td>\n8.6.10.7 OperIPV
8.6.10.8 IntervalOctetsLeft
8.6.11 ATS Scheduler state machines
8.6.11.1 ATS Scheduler Clocks
8.6.11.2 Relationship between ATS Scheduler Clocks and Transmission Selection Clocks <\/td>\n<\/tr>\n
236<\/td>\n8.6.11.3 ProcessFrame(frame)
8.6.11.3.1 arrivalTime(frame) <\/td>\n<\/tr>\n
237<\/td>\n8.6.11.3.2 AssignAndProceed(frame,eligibilityTime)
8.6.11.3.3 BucketEmptyTime
8.6.11.3.4 bucketFullTime
8.6.11.3.5 CommittedBurstSize <\/td>\n<\/tr>\n
238<\/td>\n8.6.11.3.6 CommittedInformationRate
8.6.11.3.7 Discard(frame)
8.6.11.3.8 eligibilityTime
8.6.11.3.9 emptyToFullDuration
8.6.11.3.10 GroupEligibilityTime
8.6.11.3.11 length(frame)
8.6.11.3.12 lengthRecoveryDuration
8.6.11.3.13 MaxResidenceTime
8.6.11.3.14 schedulerEligibilityTime <\/td>\n<\/tr>\n
239<\/td>\n8.7 The Learning Process
8.7.1 Default filtering utility criteria
8.7.2 Enhanced filtering utility criteria <\/td>\n<\/tr>\n
240<\/td>\n8.7.3 Ageing of Dynamic Filtering Entries
8.8 The Filtering Database (FDB) <\/td>\n<\/tr>\n
243<\/td>\n8.8.1 Static Filtering Entries <\/td>\n<\/tr>\n
244<\/td>\n8.8.2 Static VLAN Registration Entries <\/td>\n<\/tr>\n
245<\/td>\n8.8.3 Dynamic Filtering Entries <\/td>\n<\/tr>\n
246<\/td>\n8.8.4 MAC Address Registration Entries
8.8.5 Dynamic VLAN Registration Entries <\/td>\n<\/tr>\n
247<\/td>\n8.8.6 Default Group filtering behavior <\/td>\n<\/tr>\n
248<\/td>\n8.8.7 Dynamic Reservation Entries
8.8.8 Allocation of VIDs to FIDs <\/td>\n<\/tr>\n
249<\/td>\n8.8.9 Querying the FDB <\/td>\n<\/tr>\n
253<\/td>\n8.8.10 Determination of the member set for a VID
8.8.11 Permanent Database
8.8.12 Connection_Identifier <\/td>\n<\/tr>\n
254<\/td>\n8.9 MST, SPB, and ESP configuration information <\/td>\n<\/tr>\n
255<\/td>\n8.9.1 MST Configuration Table
8.9.2 MST configuration identification
8.9.3 FID to MSTI Allocation Table
8.9.4 SPT Configuration Identification <\/td>\n<\/tr>\n
256<\/td>\n8.10 Spanning Tree Protocol Entity
8.11 MRP entities <\/td>\n<\/tr>\n
257<\/td>\n8.12 Bridge Management Entity
8.13 Addressing
8.13.1 End stations
8.13.2 Bridge Ports <\/td>\n<\/tr>\n
258<\/td>\n8.13.3 Use of LLC by Spanning Tree Protocol Entities
8.13.4 Reserved MAC addresses
8.13.5 Group MAC addresses for spanning tree entity <\/td>\n<\/tr>\n
259<\/td>\n8.13.5.1 Group MAC addresses for spanning tree protocols
8.13.5.2 Group MAC addresses for SPB <\/td>\n<\/tr>\n
260<\/td>\n8.13.6 Group MAC addresses for MRP Applications <\/td>\n<\/tr>\n
261<\/td>\n8.13.7 Bridge Management Entities
8.13.8 Unique identification of a Bridge
8.13.9 Points of attachment and connectivity for Higher Layer Entities <\/td>\n<\/tr>\n
265<\/td>\n8.13.10 VLAN attachment and connectivity for Higher Layer Entities <\/td>\n<\/tr>\n
266<\/td>\n8.13.11 CFM entities <\/td>\n<\/tr>\n
268<\/td>\n9. Tagged frame format
9.1 Purpose of tagging
9.2 Representation and encoding of tag fields <\/td>\n<\/tr>\n
269<\/td>\n9.3 Tag format
9.4 TPID formats
9.5 Tag Protocol identification <\/td>\n<\/tr>\n
270<\/td>\n9.6 VLAN Tag Control Information (TCI) <\/td>\n<\/tr>\n
271<\/td>\n9.7 Backbone Service Instance Tag Control Information (I-TAG TCI) <\/td>\n<\/tr>\n
273<\/td>\n10. Multiple Registration Protocol (MRP) and Multiple MAC Registration Protocol (MMRP)
10.1 MRP overview <\/td>\n<\/tr>\n
276<\/td>\n10.2 MRP architecture <\/td>\n<\/tr>\n
277<\/td>\n10.3 MRP Attribute Propagation (MAP) <\/td>\n<\/tr>\n
278<\/td>\n10.3.1 MAP Context
10.3.1.1 MAD and Port role changes <\/td>\n<\/tr>\n
279<\/td>\n10.4 Requirements to be met by MRP
10.5 Requirements for interoperability between MRP Participants <\/td>\n<\/tr>\n
281<\/td>\n10.6 Protocol operation <\/td>\n<\/tr>\n
285<\/td>\n10.7 Protocol specification <\/td>\n<\/tr>\n
286<\/td>\n10.7.1 Notational conventions and abbreviations <\/td>\n<\/tr>\n
287<\/td>\n10.7.2 Registrar Administrative Controls <\/td>\n<\/tr>\n
288<\/td>\n10.7.3 Applicant Administrative Controls
10.7.4 Protocol timers
10.7.4.1 jointimer
10.7.4.2 leavetimer
10.7.4.3 leavealltimer
10.7.4.4 periodictimer <\/td>\n<\/tr>\n
289<\/td>\n10.7.5 Protocol event definitions
10.7.5.1 Begin!
10.7.5.2 Flush!
10.7.5.3 Re-declare!
10.7.5.4 New!
10.7.5.5 Join!
10.7.5.6 Lv!
10.7.5.7 tx!
10.7.5.8 txLA! <\/td>\n<\/tr>\n
290<\/td>\n10.7.5.9 txLAF!
10.7.5.10 periodic!
10.7.5.11 periodicEnabled!
10.7.5.12 periodicDisabled!
10.7.5.13 Message reception events
10.7.5.14 rNew!
10.7.5.15 rJoinIn!
10.7.5.16 rJoinMt!
10.7.5.17 rLv!
10.7.5.18 rIn! <\/td>\n<\/tr>\n
291<\/td>\n10.7.5.19 rMt!
10.7.5.20 rLA!
10.7.5.21 leavetimer!
10.7.5.22 leavealltimer!
10.7.5.23 periodictimer!
10.7.6 Protocol Action definitions
10.7.6.1 MRPDU transmission actions <\/td>\n<\/tr>\n
292<\/td>\n10.7.6.2 sN
10.7.6.3 sJ, [sJ]
10.7.6.4 sL
10.7.6.5 s, [s]
10.7.6.6 sLA
10.7.6.7 periodic
10.7.6.8 Start leavetimer
10.7.6.9 Stop leavetimer
10.7.6.10 Start leavealltimer <\/td>\n<\/tr>\n
293<\/td>\n10.7.6.11 Start periodictimer
10.7.6.12 New
10.7.6.13 Join
10.7.6.14 Lv
10.7.7 Applicant state machine
10.7.8 Registrar state machine
10.7.9 LeaveAll state machine <\/td>\n<\/tr>\n
296<\/td>\n10.7.10 PeriodicTransmission state machine
10.7.11 Timer values <\/td>\n<\/tr>\n
297<\/td>\n10.7.12 Operational reporting and statistics
10.7.12.1 Failure to register
10.7.12.2 Peer tracking
10.7.13 Interoperability considerations <\/td>\n<\/tr>\n
298<\/td>\n10.7.14 External control
10.8 Structure and encoding of Multiple Registration Protocol Data Units (MRPDUs)
10.8.1 Structure
10.8.1.1 Transmission and representation of octets <\/td>\n<\/tr>\n
299<\/td>\n10.8.1.2 Structure definition <\/td>\n<\/tr>\n
300<\/td>\n10.8.2 Encoding of MRPDU parameters
10.8.2.1 Encoding of ProtocolVersion
10.8.2.2 Encoding of AttributeType
10.8.2.3 Encoding of AttributeLength <\/td>\n<\/tr>\n
301<\/td>\n10.8.2.4 Encoding of AttributeListLength
10.8.2.5 Encoding of AttributeEvent
10.8.2.6 Encoding of LeaveAllEvent
10.8.2.7 Encoding of FirstValue <\/td>\n<\/tr>\n
302<\/td>\n10.8.2.8 Encoding of VectorHeader
10.8.2.9 Encoding of EndMark
10.8.2.10 Encoding of Vector
10.8.2.10.1 Encoding of Vector ThreePackedEvents <\/td>\n<\/tr>\n
303<\/td>\n10.8.2.10.2 Encoding of Vector FourPackedEvents
10.8.3 Packing and parsing MRPDUs
10.8.3.1 Packing <\/td>\n<\/tr>\n
304<\/td>\n10.8.3.2 Handling of received MRPDUs
10.8.3.3 Discarding badly formed MRPDUs
10.8.3.4 Parsing
10.8.3.5 Handling of protocol versions <\/td>\n<\/tr>\n
305<\/td>\n10.9 Multiple MAC Registration Protocol (MMRP)\u2014Purpose <\/td>\n<\/tr>\n
306<\/td>\n10.10 MMRP Model of operation <\/td>\n<\/tr>\n
307<\/td>\n10.10.1 Propagation of Group Membership information <\/td>\n<\/tr>\n
308<\/td>\n10.10.2 Propagation of Group service requirement information
10.10.3 Source pruning
10.10.4 Use of Group service requirement registration by end stations
10.11 Default Group filtering behavior and MMRP propagation <\/td>\n<\/tr>\n
310<\/td>\n10.12 Definition of the MMRP application
10.12.1 Definition of MRP elements
10.12.1.1 Use of MAP Contexts by MMRP
10.12.1.2 Context identification in MMRP <\/td>\n<\/tr>\n
311<\/td>\n10.12.1.3 MMRP application address
10.12.1.4 MMRP application EtherType
10.12.1.5 MMRP ProtocolVersion
10.12.1.6 MMRP AttributeType definitions <\/td>\n<\/tr>\n
312<\/td>\n10.12.1.7 MMRP FirstValue definitions
10.12.1.8 MMRP AttributeLength definitions
10.12.1.9 MMRP AttributeListLength definitions
10.12.1.10 MMRP Vector definitions
10.12.2 Provision and support of Extended Filtering Services
10.12.2.1 Initiating MMRP registration and deregistration <\/td>\n<\/tr>\n
313<\/td>\n10.12.2.2 Registration and deregistration events
10.12.2.3 Administrative controls <\/td>\n<\/tr>\n
314<\/td>\n10.12.3 Use of \u201cnew\u201d declaration capability
10.12.4 Attribute value support requirements
10.12.5 Registrar Administrative Controls <\/td>\n<\/tr>\n
315<\/td>\n11. VLAN topology management
11.1 Static and dynamic VLAN configuration <\/td>\n<\/tr>\n
316<\/td>\n11.2 Multiple VLAN Registration Protocol (MVRP)
11.2.1 MVRP overview <\/td>\n<\/tr>\n
317<\/td>\n11.2.1.1 Behavior of end stations <\/td>\n<\/tr>\n
318<\/td>\n11.2.1.2 Behavior of Bridges
11.2.1.3 Use of the PVID and VID Set
11.2.2 VLAN registration service definition <\/td>\n<\/tr>\n
319<\/td>\n11.2.3 Definition of the MVRP application
11.2.3.1 Definition of MRP elements
11.2.3.1.1 MAP Context for MVRP in SST environments
11.2.3.1.2 MAP Contexts for MVRP in MST environments
11.2.3.1.3 MVRP application address
11.2.3.1.4 MVRP application EtherType
11.2.3.1.5 MVRP ProtocolVersion <\/td>\n<\/tr>\n
320<\/td>\n11.2.3.1.6 MVRP AttributeType definitions
11.2.3.1.7 MVRP FirstValue definitions
11.2.3.1.8 MVRP AttributeLength definitions
11.2.3.1.9 MVRP AttributeListLength definitions
11.2.3.1.10 MVRP Vector definitions
11.2.3.2 Provision and support of the VLAN registration service
11.2.3.2.1 Initiating VLAN membership declaration <\/td>\n<\/tr>\n
321<\/td>\n11.2.3.2.2 VLAN membership registration
11.2.3.2.3 Administrative controls <\/td>\n<\/tr>\n
322<\/td>\n11.2.4 VID translation table
11.2.5 Use of \u201cnew\u201d declaration capability
11.2.6 New-Only Participant and Registrar Administrative Controls
11.2.7 Attribute value support requirements <\/td>\n<\/tr>\n
323<\/td>\n12. Bridge management
12.1 Management functions
12.1.1 Configuration Management <\/td>\n<\/tr>\n
324<\/td>\n12.1.2 Fault Management
12.1.3 Performance Management
12.1.4 Security Management
12.1.5 Accounting Management
12.2 VLAN Bridge objects <\/td>\n<\/tr>\n
325<\/td>\n12.3 Data types <\/td>\n<\/tr>\n
326<\/td>\n12.4 Bridge Management Entity
12.4.1 Bridge Configuration
12.4.1.1 Discover Bridge
12.4.1.1.1 Purpose <\/td>\n<\/tr>\n
327<\/td>\n12.4.1.1.2 Inputs
12.4.1.1.3 Outputs
12.4.1.2 Read Bridge
12.4.1.2.1 Purpose
12.4.1.2.2 Inputs
12.4.1.2.3 Outputs <\/td>\n<\/tr>\n
328<\/td>\n12.4.1.3 Set Bridge Name
12.4.1.3.1 Purpose
12.4.1.3.2 Inputs
12.4.1.3.3 Outputs
12.4.1.4 Reset Bridge
12.4.1.4.1 Purpose
12.4.1.4.2 Inputs
12.4.1.4.3 Outputs
12.4.1.5 Bridge component configuration <\/td>\n<\/tr>\n
329<\/td>\n12.4.1.5.1 Component type enumeration
12.4.1.5.2 Component device capabilities
12.4.2 Port configuration <\/td>\n<\/tr>\n
330<\/td>\n12.4.2.1 Port type capabilities and enumeration <\/td>\n<\/tr>\n
331<\/td>\n12.4.2.2 Media-dependent overhead
12.5 MAC entities
12.5.1 ISS Port Number table managed object (optional) <\/td>\n<\/tr>\n
332<\/td>\n12.6 Forwarding process
12.6.1 The Port Counters
12.6.1.1 Read forwarding port counters
12.6.1.1.1 Purpose
12.6.1.1.2 Inputs
12.6.1.1.3 Outputs <\/td>\n<\/tr>\n
333<\/td>\n12.6.2 Priority handling
12.6.2.1 Read Port Default Priority
12.6.2.1.1 Purpose
12.6.2.1.2 Inputs
12.6.2.1.3 Outputs
12.6.2.2 Set Port Default Priority
12.6.2.2.1 Purpose
12.6.2.2.2 Inputs
12.6.2.2.3 Outputs <\/td>\n<\/tr>\n
334<\/td>\n12.6.2.3 Read Port Priority Regeneration Table
12.6.2.3.1 Purpose
12.6.2.3.2 Inputs
12.6.2.3.3 Outputs
12.6.2.4 Set Port Priority Regeneration Table
12.6.2.4.1 Purpose
12.6.2.4.2 Inputs
12.6.2.4.3 Outputs
12.6.2.5 Read Port Priority Code Point Selection
12.6.2.5.1 Purpose <\/td>\n<\/tr>\n
335<\/td>\n12.6.2.5.2 Inputs
12.6.2.5.3 Outputs
12.6.2.6 Set Port Priority Code Point Selection
12.6.2.6.1 Purpose
12.6.2.6.2 Inputs
12.6.2.6.3 Outputs
12.6.2.7 Read Priority Code Point Decoding Table
12.6.2.7.1 Purpose
12.6.2.7.2 Inputs
12.6.2.7.3 Outputs <\/td>\n<\/tr>\n
336<\/td>\n12.6.2.8 Set Priority Code Point Decoding Table
12.6.2.8.1 Purpose
12.6.2.8.2 Inputs
12.6.2.8.3 Outputs <\/td>\n<\/tr>\n
337<\/td>\n12.6.2.9 Read Priority Code Point Encoding Table
12.6.2.9.1 Purpose
12.6.2.9.2 Inputs
12.6.2.9.3 Outputs
12.6.2.10 Set Priority Code Point Encoding Table
12.6.2.10.1 Purpose
12.6.2.10.2 Inputs <\/td>\n<\/tr>\n
338<\/td>\n12.6.2.10.3 Outputs
12.6.2.11 Read Use_DEI Parameter
12.6.2.11.1 Purpose
12.6.2.11.2 Inputs
12.6.2.11.3 Outputs
12.6.2.12 Set Use_DEI Parameter
12.6.2.12.1 Purpose
12.6.2.12.2 Inputs
12.6.2.12.3 Outputs
12.6.2.13 Read Require Drop Encoding Parameter
12.6.2.13.1 Purpose
12.6.2.13.2 Inputs
12.6.2.13.3 Outputs <\/td>\n<\/tr>\n
339<\/td>\n12.6.2.14 Set Require Drop Encoding Parameter
12.6.2.14.1 Purpose
12.6.2.14.2 Inputs
12.6.2.14.3 Outputs
12.6.2.15 Read Service Access Priority Selection
12.6.2.15.1 Purpose
12.6.2.15.2 Inputs
12.6.2.15.3 Outputs
12.6.2.16 Set Service Access Priority Selection
12.6.2.16.1 Purpose
12.6.2.16.2 Inputs
12.6.2.16.3 Outputs
12.6.2.17 Read Service Access Priority Table
12.6.2.17.1 Purpose <\/td>\n<\/tr>\n
340<\/td>\n12.6.2.17.2 Inputs
12.6.2.17.3 Outputs
12.6.2.18 Set Service Access Priority Table
12.6.2.18.1 Purpose
12.6.2.18.2 Inputs
12.6.2.18.3 Outputs
12.6.3 Traffic Class Table
12.6.3.1 Read Port Traffic Class Table
12.6.3.1.1 Purpose
12.6.3.1.2 Inputs
12.6.3.1.3 Outputs <\/td>\n<\/tr>\n
341<\/td>\n12.6.3.2 Set Port Traffic Class Table
12.6.3.2.1 Purpose
12.6.3.2.2 Inputs
12.6.3.2.3 Outputs
12.7 Filtering Database (FDB)
12.7.1 The Filtering Database object
12.7.1.1 Read Filtering Database
12.7.1.1.1 Purpose
12.7.1.1.2 Inputs <\/td>\n<\/tr>\n
342<\/td>\n12.7.1.1.3 Outputs
12.7.1.2 Set Filtering Database Ageing Time
12.7.1.2.1 Purpose
12.7.1.2.2 Inputs
12.7.1.2.3 Outputs
12.7.2 A Static Filtering Entry object
12.7.3 A Dynamic Filtering Entry object <\/td>\n<\/tr>\n
343<\/td>\n12.7.4 A MAC Address Registration Entry object
12.7.5 A VLAN Registration Entry object
12.7.5.1 Static VLAN Registration Entry object
12.7.5.2 Dynamic VLAN Registration Entry object
12.7.6 Permanent Database object
12.7.6.1 Read Permanent Database
12.7.6.1.1 Purpose
12.7.6.1.2 Inputs <\/td>\n<\/tr>\n
344<\/td>\n12.7.6.1.3 Outputs
12.7.7 General FDB operations
12.7.7.1 Create Filtering Entry
12.7.7.1.1 Purpose
12.7.7.1.2 Inputs
12.7.7.1.3 Outputs
12.7.7.2 Delete Filtering Entry
12.7.7.2.1 Purpose
12.7.7.2.2 Inputs
12.7.7.2.3 Outputs <\/td>\n<\/tr>\n
345<\/td>\n12.7.7.3 Read Filtering Entry
12.7.7.3.1 Purpose
12.7.7.3.2 Inputs
12.7.7.3.3 Outputs
12.7.7.4 Read Filtering Entry range
12.7.7.4.1 Purpose
12.7.7.4.2 Inputs
12.7.7.4.3 Outputs <\/td>\n<\/tr>\n
346<\/td>\n12.8 Bridge Protocol Entity
12.8.1 The Protocol Entity
12.8.1.1 Read CIST Bridge Protocol Parameters
12.8.1.1.1 Purpose
12.8.1.1.2 Inputs
12.8.1.1.3 Outputs <\/td>\n<\/tr>\n
347<\/td>\n12.8.1.2 Read MSTI Bridge Protocol Parameters
12.8.1.2.1 Purpose
12.8.1.2.2 Inputs
12.8.1.2.3 Outputs
12.8.1.3 Set CIST Bridge Protocol Parameters
12.8.1.3.1 Purpose
12.8.1.3.2 Inputs <\/td>\n<\/tr>\n
348<\/td>\n12.8.1.3.3 Outputs
12.8.1.3.4 Procedure
12.8.1.4 Set MSTI Bridge Protocol Parameters
12.8.1.4.1 Purpose
12.8.1.4.2 Inputs <\/td>\n<\/tr>\n
349<\/td>\n12.8.1.4.3 Outputs
12.8.1.4.4 Procedure
12.8.2 Bridge Port
12.8.2.1 Read CIST Port Parameters
12.8.2.1.1 Purpose
12.8.2.1.2 Inputs
12.8.2.1.3 Outputs <\/td>\n<\/tr>\n
350<\/td>\n12.8.2.2 Read MSTI Port Parameters
12.8.2.2.1 Purpose
12.8.2.2.2 Inputs
12.8.2.2.3 Outputs <\/td>\n<\/tr>\n
351<\/td>\n12.8.2.3 Set CIST port parameters
12.8.2.3.1 Purpose
12.8.2.3.2 Inputs
12.8.2.3.3 Outputs <\/td>\n<\/tr>\n
352<\/td>\n12.8.2.3.4 Procedure
12.8.2.4 Set MSTI port parameters
12.8.2.4.1 Purpose
12.8.2.4.2 Inputs
12.8.2.4.3 Outputs
12.8.2.4.4 Procedure
12.8.2.5 Force BPDU Migration Check
12.8.2.5.1 Purpose
12.8.2.5.2 Inputs
12.8.2.5.3 Outputs <\/td>\n<\/tr>\n
353<\/td>\n12.8.2.5.4 Procedure
12.9 MRP Entities
12.9.1 The MRP Timer object
12.9.1.1 Read MRP Timers
12.9.1.1.1 Purpose
12.9.1.1.2 Inputs
12.9.1.1.3 Outputs
12.9.1.2 Set MRP Timers
12.9.1.2.1 Purpose
12.9.1.2.2 Inputs <\/td>\n<\/tr>\n
354<\/td>\n12.9.1.2.3 Outputs
12.9.2 The MRP Attribute Type object
12.9.2.1 Read MRP Applicant Controls
12.9.2.1.1 Purpose
12.9.2.1.2 Inputs
12.9.2.1.3 Outputs
12.9.2.2 Set MRP Applicant Controls
12.9.2.2.1 Purpose
12.9.2.2.2 Inputs
12.9.2.2.3 Outputs <\/td>\n<\/tr>\n
355<\/td>\n12.9.2.2.4 Procedures
12.9.3 Periodic state machine objects
12.9.3.1 Read Periodic state machine state
12.9.3.1.1 Purpose
12.9.3.1.2 Inputs
12.9.3.1.3 Outputs
12.9.3.2 Set Periodic state machine state
12.9.3.2.1 Purpose
12.9.3.2.2 Inputs
12.9.3.2.3 Outputs
12.10 Bridge VLAN managed objects <\/td>\n<\/tr>\n
356<\/td>\n12.10.1 Bridge VLAN Configuration managed object
12.10.1.1 Read Bridge VLAN Configuration
12.10.1.1.1 Purpose
12.10.1.1.2 Inputs
12.10.1.1.3 Outputs <\/td>\n<\/tr>\n
357<\/td>\n12.10.1.2 Configure PVID and VID Set values
12.10.1.2.1 Purpose
12.10.1.2.2 Inputs
12.10.1.2.3 Outputs
12.10.1.3 Configure Acceptable Frame Types parameters
12.10.1.3.1 Purpose
12.10.1.3.2 Inputs <\/td>\n<\/tr>\n
358<\/td>\n12.10.1.3.3 Outputs
12.10.1.4 Configure Enable Ingress Filtering parameters
12.10.1.4.1 Purpose
12.10.1.4.2 Inputs
12.10.1.4.3 Outputs
12.10.1.5 Reset Bridge
12.10.1.5.1 Purpose
12.10.1.5.2 Inputs
12.10.1.5.3 Outputs
12.10.1.6 Configure Restricted_VLAN_Registration parameters
12.10.1.6.1 Purpose
12.10.1.6.2 Inputs
12.10.1.6.3 Outputs <\/td>\n<\/tr>\n
359<\/td>\n12.10.1.7 Configure Protocol Group Database
12.10.1.7.1 Inputs
12.10.1.7.2 Outputs
12.10.1.8 VID Translation Configuration managed object
12.10.1.8.1 Read VID Translation Table Entry <\/td>\n<\/tr>\n
360<\/td>\n12.10.1.8.2 Configure VID Translation Table Entry
12.10.1.9 Egress VID Translation Configuration managed object
12.10.1.9.1 Read Egress VID Translation Table Entry
12.10.1.9.2 Configure Egress VID Translation Table Entry <\/td>\n<\/tr>\n
361<\/td>\n12.10.2 VLAN Configuration managed object
12.10.2.1 Read VLAN Configuration
12.10.2.1.1 Purpose
12.10.2.1.2 Inputs
12.10.2.1.3 Outputs
12.10.2.2 Create VLAN Configuration
12.10.2.2.1 Purpose
12.10.2.2.2 Inputs
12.10.2.2.3 Outputs <\/td>\n<\/tr>\n
362<\/td>\n12.10.2.3 Delete VLAN Configuration
12.10.2.3.1 Purpose
12.10.2.3.2 Inputs
12.10.2.3.3 Outputs
12.10.3 The VID to FID allocation managed object
12.10.3.1 Read VID to FID allocations
12.10.3.1.1 Purpose
12.10.3.1.2 Inputs
12.10.3.1.3 Outputs <\/td>\n<\/tr>\n
363<\/td>\n12.10.3.2 Read FID allocation for VID
12.10.3.2.1 Purpose
12.10.3.2.2 Inputs
12.10.3.2.3 Outputs
12.10.3.3 Read VIDs allocated to FID
12.10.3.3.1 Purpose
12.10.3.3.2 Inputs
12.10.3.3.3 Outputs
12.10.3.4 Set VID to FID allocation
12.10.3.4.1 Purpose
12.10.3.4.2 Inputs
12.10.3.4.3 Outputs <\/td>\n<\/tr>\n
364<\/td>\n12.10.3.4.4 Procedure
12.10.3.5 Delete VID to FID allocation
12.10.3.5.1 Purpose
12.10.3.5.2 Inputs
12.10.3.5.3 Outputs
12.10.3.5.4 Procedure
12.11 MMRP entities
12.11.1 MMRP Configuration managed object <\/td>\n<\/tr>\n
365<\/td>\n12.11.1.1 Read MMRP Configuration
12.11.1.1.1 Purpose
12.11.1.1.2 Inputs
12.11.1.1.3 Outputs
12.11.1.2 Notify MAC address registration failure
12.11.1.2.1 Purpose
12.11.1.2.2 Inputs
12.11.1.2.3 Outputs
12.11.1.3 Configure Restricted_MAC_Address_Registration parameters
12.11.1.3.1 Purpose
12.11.1.3.2 Inputs
12.11.1.3.3 Outputs <\/td>\n<\/tr>\n
366<\/td>\n12.12 MST configuration entities
12.12.1 The MSTI List
12.12.1.1 Read MSTI List
12.12.1.1.1 Purpose
12.12.1.1.2 Inputs
12.12.1.1.3 Outputs
12.12.1.2 Create MSTI
12.12.1.2.1 Purpose
12.12.1.2.2 Inputs
12.12.1.2.3 Outputs <\/td>\n<\/tr>\n
367<\/td>\n12.12.1.3 Delete MSTI
12.12.1.3.1 Purpose
12.12.1.3.2 Inputs
12.12.1.3.3 Outputs
12.12.2 The FID to MSTID Allocation Table
12.12.2.1 Read FID to MSTID allocations
12.12.2.1.1 Purpose
12.12.2.1.2 Inputs
12.12.2.1.3 Outputs <\/td>\n<\/tr>\n
368<\/td>\n12.12.2.2 Set FID to MSTID allocation
12.12.2.2.1 Purpose
12.12.2.2.2 Inputs
12.12.2.2.3 Outputs
12.12.2.2.4 Procedure
12.12.3 The MST Configuration Table
12.12.3.1 Read MST Configuration Table Element
12.12.3.1.1 Purpose
12.12.3.1.2 Inputs <\/td>\n<\/tr>\n
369<\/td>\n12.12.3.1.3 Outputs
12.12.3.2 Read VIDs assigned to MSTID
12.12.3.2.1 Purpose
12.12.3.2.2 Inputs
12.12.3.2.3 Outputs
12.12.3.3 Read MST Configuration Identifier
12.12.3.3.1 Purpose
12.12.3.3.2 Inputs
12.12.3.3.3 Outputs
12.12.3.4 Set MST Configuration Identifier Elements
12.12.3.4.1 Purpose
12.12.3.4.2 Inputs <\/td>\n<\/tr>\n
370<\/td>\n12.12.3.4.3 Outputs
12.13 Provider Bridge management <\/td>\n<\/tr>\n
371<\/td>\n12.13.1 Provider Bridge Port Type managed object
12.13.1.1 Read Provider Bridge Port Type
12.13.1.1.1 Purpose
12.13.1.1.2 Inputs
12.13.1.1.3 Outputs <\/td>\n<\/tr>\n
372<\/td>\n12.13.1.2 Configure Provider Bridge Port Type
12.13.1.2.1 Purpose
12.13.1.2.2 Inputs
12.13.1.2.3 Outputs
12.13.2 Customer Edge Port Configuration managed object <\/td>\n<\/tr>\n
373<\/td>\n12.13.2.1 Read C-VID Registration Table Entry
12.13.2.1.1 Purpose
12.13.2.1.2 Inputs
12.13.2.1.3 Outputs
12.13.2.2 Configure C-VID Registration Table Entry
12.13.2.2.1 Purpose
12.13.2.2.2 Inputs
12.13.2.2.3 Outputs
12.13.2.3 Read Provider Edge Port Configuration
12.13.2.3.1 Purpose
12.13.2.3.2 Inputs
12.13.2.3.3 Outputs <\/td>\n<\/tr>\n
374<\/td>\n12.13.2.4 Set Provider Edge Port Configuration
12.13.2.4.1 Purpose
12.13.2.4.2 Inputs
12.13.2.4.3 Outputs
12.13.2.5 Read Service Priority Regeneration Table
12.13.2.5.1 Purpose
12.13.2.5.2 Inputs
12.13.2.5.3 Outputs <\/td>\n<\/tr>\n
375<\/td>\n12.13.2.6 Set Service Priority Regeneration Table
12.13.2.6.1 Purpose
12.13.2.6.2 Inputs
12.13.2.6.3 Outputs
12.13.3 Remote Customer Access managed object <\/td>\n<\/tr>\n
376<\/td>\n12.13.3.1 Read Internal Interface Table Entry
12.13.3.1.1 Purpose
12.13.3.1.2 Inputs
12.13.3.1.3 Outputs
12.13.3.2 Configure Internal Interface Table Entry
12.13.3.2.1 Purpose <\/td>\n<\/tr>\n
377<\/td>\n12.13.3.2.2 Inputs
12.13.3.2.3 Outputs
12.14 CFM entities
12.14.1 Maintenance Domain list managed object <\/td>\n<\/tr>\n
378<\/td>\n12.14.1.1 Read Maintenance Domain list
12.14.1.1.1 Purpose
12.14.1.1.2 Inputs
12.14.1.1.3 Outputs <\/td>\n<\/tr>\n
379<\/td>\n12.14.1.2 Create Maintenance Domain managed object
12.14.1.2.1 Purpose
12.14.1.2.2 Inputs
12.14.1.2.3 Outputs
12.14.1.3 Delete Maintenance Domain managed object
12.14.1.3.1 Purpose
12.14.1.3.2 Inputs
12.14.1.3.3 Outputs
12.14.2 CFM Stack managed object
12.14.2.1 Read CFM Stack managed object
12.14.2.1.1 Purpose
12.14.2.1.2 Inputs <\/td>\n<\/tr>\n
380<\/td>\n12.14.2.1.3 Outputs
12.14.3 Default MD Level managed object
12.14.3.1 Read Default MD Level managed object
12.14.3.1.1 Purpose
12.14.3.1.2 Input
12.14.3.1.3 Output <\/td>\n<\/tr>\n
381<\/td>\n12.14.3.2 Write Default MD Level managed object
12.14.3.2.1 Purpose
12.14.3.2.2 Inputs
12.14.3.2.3 Outputs
12.14.4 Configuration Error List managed object
12.14.4.1 Read Configuration Error List managed object
12.14.4.1.1 Purpose
12.14.4.1.2 Inputs <\/td>\n<\/tr>\n
382<\/td>\n12.14.4.1.3 Outputs
12.14.5 Maintenance Domain managed object
12.14.5.1 Read Maintenance Domain managed object
12.14.5.1.1 Purpose
12.14.5.1.2 Inputs
12.14.5.1.3 Outputs <\/td>\n<\/tr>\n
383<\/td>\n12.14.5.2 Write Maintenance Domain managed object
12.14.5.2.1 Purpose
12.14.5.2.2 Inputs
12.14.5.2.3 Outputs
12.14.5.3 Create Maintenance Association managed object
12.14.5.3.1 Purpose
12.14.5.3.2 Inputs <\/td>\n<\/tr>\n
384<\/td>\n12.14.5.3.3 Outputs
12.14.5.4 Delete Maintenance Association managed object
12.14.5.4.1 Purpose
12.14.5.4.2 Inputs
12.14.5.4.3 Outputs
12.14.6 Maintenance Association managed object <\/td>\n<\/tr>\n
385<\/td>\n12.14.6.1 Read Maintenance Association managed object
12.14.6.1.1 Purpose
12.14.6.1.2 Inputs
12.14.6.1.3 Outputs
12.14.6.2 Write Maintenance Association managed object
12.14.6.2.1 Purpose <\/td>\n<\/tr>\n
386<\/td>\n12.14.6.2.2 Inputs
12.14.6.2.3 Outputs
12.14.6.3 Create Maintenance association Endpoint managed object
12.14.6.3.1 Purpose
12.14.6.3.2 Inputs
12.14.6.3.3 Outputs <\/td>\n<\/tr>\n
387<\/td>\n12.14.6.4 Delete Maintenance association Endpoint managed object
12.14.6.4.1 Purpose
12.14.6.4.2 Inputs
12.14.6.4.3 Outputs
12.14.7 Maintenance association Endpoint managed object
12.14.7.1 Read Maintenance association Endpoint managed object
12.14.7.1.1 Purpose
12.14.7.1.2 Inputs
12.14.7.1.3 Outputs <\/td>\n<\/tr>\n
390<\/td>\n12.14.7.2 Write Maintenance association Endpoint managed object
12.14.7.2.1 Purpose
12.14.7.2.2 Inputs
12.14.7.2.3 Outputs
12.14.7.3 Transmit Loopback Messages
12.14.7.3.1 Purpose
12.14.7.3.2 Inputs <\/td>\n<\/tr>\n
391<\/td>\n12.14.7.3.3 Outputs
12.14.7.4 Transmit Linktrace Message
12.14.7.4.1 Purpose
12.14.7.4.2 Inputs
12.14.7.4.3 Outputs <\/td>\n<\/tr>\n
392<\/td>\n12.14.7.5 Read Linktrace Reply
12.14.7.5.1 Purpose
12.14.7.5.2 Inputs
12.14.7.5.3 Outputs <\/td>\n<\/tr>\n
393<\/td>\n12.14.7.6 Read MEP Database
12.14.7.6.1 Purpose
12.14.7.6.2 Inputs
12.14.7.6.3 Outputs <\/td>\n<\/tr>\n
394<\/td>\n12.14.7.7 Transmit MEP Fault Alarm
12.14.7.7.1 Purpose
12.14.7.7.2 Outputs
12.15 Backbone Core Bridge (BCB) management
12.16 Backbone Edge Bridge (BEB) management <\/td>\n<\/tr>\n
396<\/td>\n12.16.1 BEB configuration managed object
12.16.1.1 Read BEB configuration
12.16.1.1.1 Purpose
12.16.1.1.2 Inputs
12.16.1.1.3 Outputs <\/td>\n<\/tr>\n
397<\/td>\n12.16.1.2 Set BEB configuration
12.16.1.2.1 Purpose
12.16.1.2.2 Inputs <\/td>\n<\/tr>\n
398<\/td>\n12.16.1.2.3 Outputs
12.16.1.3 Create BEB component (optional)
12.16.1.3.1 Purpose
12.16.1.3.2 Inputs
12.16.1.3.3 Outputs
12.16.1.4 Delete BEB component (optional)
12.16.1.4.1 Purpose
12.16.1.4.2 Inputs
12.16.1.4.3 Outputs
12.16.1.5 Create BEB Bridge Port (optional)
12.16.1.5.1 Purpose
12.16.1.5.2 Inputs
12.16.1.5.3 Outputs <\/td>\n<\/tr>\n
399<\/td>\n12.16.1.6 Create BEB PIP (optional)
12.16.1.6.1 Purpose
12.16.1.6.2 Inputs
12.16.1.6.3 Outputs
12.16.1.7 Delete BEB Bridge Port (optional)
12.16.1.7.1 Purpose
12.16.1.7.2 Inputs
12.16.1.7.3 Outputs
12.16.1.8 Delete BEB PIP (optional)
12.16.1.8.1 Purpose
12.16.1.8.2 Inputs
12.16.1.8.3 Outputs <\/td>\n<\/tr>\n
400<\/td>\n12.16.2 BEB\/PB\/VLAN Bridge Port configuration managed object
12.16.2.1 Read BEB\/PB\/VLAN Bridge Port configuration
12.16.2.1.1 Purpose
12.16.2.1.2 Inputs
12.16.2.1.3 Outputs
12.16.3 VIP configuration managed object
12.16.3.1 Read VIP configuration
12.16.3.1.1 Purpose <\/td>\n<\/tr>\n
401<\/td>\n12.16.3.1.2 Inputs
12.16.3.1.3 Outputs
12.16.3.2 Set VIP configuration
12.16.3.2.1 Purpose
12.16.3.2.2 Inputs
12.16.3.2.3 Outputs
12.16.4 PIP configuration managed object <\/td>\n<\/tr>\n
402<\/td>\n12.16.4.1 Read PIP configuration
12.16.4.1.1 Purpose
12.16.4.1.2 Inputs
12.16.4.1.3 Outputs
12.16.4.2 Set PIP configuration (optional)
12.16.4.2.1 Purpose
12.16.4.2.2 Inputs
12.16.4.2.3 Outputs <\/td>\n<\/tr>\n
403<\/td>\n12.16.4.3 Read VIP to PIP mapping
12.16.4.3.1 Purpose
12.16.4.3.2 Inputs
12.16.4.3.3 Outputs
12.16.4.4 Set VIP to PIP mapping (optional)
12.16.4.4.1 Purpose
12.16.4.4.2 Inputs
12.16.4.4.3 Outputs
12.16.4.5 Read PIP Priority Code Point Selection
12.16.4.5.1 Purpose <\/td>\n<\/tr>\n
404<\/td>\n12.16.4.5.2 Inputs
12.16.4.5.3 Outputs
12.16.4.6 Set PIP Priority Code Point Selection
12.16.4.6.1 Purpose
12.16.4.6.2 Inputs
12.16.4.6.3 Outputs
12.16.4.7 Read PIP Priority Code Point Decoding Table
12.16.4.7.1 Purpose
12.16.4.7.2 Inputs
12.16.4.7.3 Outputs <\/td>\n<\/tr>\n
405<\/td>\n12.16.4.8 Set PIP Priority Code Point Decoding Table (optional)
12.16.4.8.1 Purpose
12.16.4.8.2 Inputs
12.16.4.8.3 Outputs
12.16.4.9 Read PIP Priority Code Point Encoding Table
12.16.4.9.1 Purpose <\/td>\n<\/tr>\n
406<\/td>\n12.16.4.9.2 Inputs
12.16.4.9.3 Outputs
12.16.4.10 Set PIP Priority Code Point Encoding Table (optional)
12.16.4.10.1 Purpose
12.16.4.10.2 Inputs <\/td>\n<\/tr>\n
407<\/td>\n12.16.4.10.3 Outputs
12.16.4.11 Read PIP Use_DEI parameter
12.16.4.11.1 Purpose
12.16.4.11.2 Inputs
12.16.4.11.3 Outputs
12.16.4.12 Set PIP Use_DEI parameter (optional)
12.16.4.12.1 Purpose
12.16.4.12.2 Inputs
12.16.4.12.3 Outputs
12.16.4.13 Read PIP Require Drop Encoding parameter
12.16.4.13.1 Purpose
12.16.4.13.2 Inputs
12.16.4.13.3 Outputs
12.16.4.14 Set PIP Require Drop Encoding parameter (optional)
12.16.4.14.1 Purpose <\/td>\n<\/tr>\n
408<\/td>\n12.16.4.14.2 Inputs
12.16.4.14.3 Outputs
12.16.5 CBP Configuration managed object
12.16.5.1 Read Backbone Service Instance table entry
12.16.5.1.1 Purpose
12.16.5.1.2 Inputs
12.16.5.1.3 Outputs <\/td>\n<\/tr>\n
409<\/td>\n12.16.5.2 Set Backbone Service Instance table entry
12.16.5.2.1 Purpose
12.16.5.2.2 Inputs
12.16.5.2.3 Outputs
12.16.5.3 TESI assignment managed object
12.16.5.3.1 Purpose
12.16.5.3.2 Inputs
12.16.5.3.3 Outputs <\/td>\n<\/tr>\n
410<\/td>\n12.16.5.4 Read Flow Filtering Control Table entry
12.16.5.4.1 Purpose
12.16.5.4.2 Inputs
12.16.5.4.3 Outputs
12.16.5.5 Set Flow Filtering Control Table entry
12.16.5.5.1 Purpose
12.16.5.5.2 Inputs
12.16.5.5.3 Outputs <\/td>\n<\/tr>\n
411<\/td>\n12.17 DDCFM entities
12.17.1 DDCFM Stack managed object
12.17.1.1 Read DDCFM Stack managed object
12.17.1.1.1 Purpose
12.17.1.1.2 Input
12.17.1.1.3 Outputs
12.17.2 Reflection Responder managed object <\/td>\n<\/tr>\n
412<\/td>\n12.17.2.1 Create Reflection Responder managed object
12.17.2.1.1 Purpose
12.17.2.1.2 Inputs
12.17.2.1.3 Outputs
12.17.2.2 Write Reflection Responder managed object\u2019s attributes
12.17.2.2.1 Purpose
12.17.2.2.2 Inputs <\/td>\n<\/tr>\n
413<\/td>\n12.17.2.2.3 Outputs
12.17.2.3 Read Reflection Responder managed object\u2019s attributes
12.17.2.3.1 Purpose
12.17.2.3.2 Input
12.17.2.3.3 Outputs <\/td>\n<\/tr>\n
414<\/td>\n12.17.2.4 Delete Reflection Responder managed object
12.17.2.4.1 Purpose
12.17.2.4.2 Input
12.17.2.4.3 Outputs
12.17.2.5 Activate Reflection Responder
12.17.2.5.1 Purpose
12.17.2.5.2 Inputs
12.17.2.5.3 Outputs <\/td>\n<\/tr>\n
415<\/td>\n12.17.2.6 Deactivate Reflection Responder
12.17.2.6.1 Purpose
12.17.2.6.2 Input
12.17.2.6.3 Outputs
12.17.3 RFM Receiver managed object
12.17.3.1 Create RFM Receiver managed object
12.17.3.1.1 Purpose
12.17.3.1.2 Inputs
12.17.3.1.3 Outputs
12.17.3.2 Delete RFM Receiver managed object
12.17.3.2.1 Purpose <\/td>\n<\/tr>\n
416<\/td>\n12.17.3.2.2 Input
12.17.3.2.3 Outputs
12.17.4 Decapsulator Responder managed object
12.17.4.1 Create Decapsulator Responder managed object
12.17.4.1.1 Purpose
12.17.4.1.2 Inputs
12.17.4.1.3 Outputs
12.17.4.2 Read Decapsulator Responder managed object
12.17.4.2.1 Purpose
12.17.4.2.2 Input <\/td>\n<\/tr>\n
417<\/td>\n12.17.4.2.3 Outputs
12.17.4.3 Write Decapsulator Responder managed object\u2019s attributes
12.17.4.3.1 Purpose
12.17.4.3.2 Inputs
12.17.4.3.3 Outputs
12.17.4.4 Delete Decapsulator Responder managed object
12.17.4.4.1 Purpose <\/td>\n<\/tr>\n
418<\/td>\n12.17.4.4.2 Input
12.17.4.4.3 Outputs
12.17.4.5 Activate Decapsulator Responder
12.17.4.5.1 Purpose
12.17.4.5.2 Input
12.17.4.5.3 Outputs
12.17.4.6 Deactivate Decapsulator Responder
12.17.4.6.1 Purpose
12.17.4.6.2 Input
12.17.4.6.3 Outputs
12.17.5 SFM Originator managed object <\/td>\n<\/tr>\n
419<\/td>\n12.17.5.1 Create SFM Originator managed object
12.17.5.1.1 Purpose
12.17.5.1.2 Inputs
12.17.5.1.3 Outputs
12.17.5.2 Read SFM Originator managed object
12.17.5.2.1 Purpose
12.17.5.2.2 Inputs
12.17.5.2.3 Outputs
12.17.5.3 Delete SFM Originator managed object
12.17.5.3.1 Purpose <\/td>\n<\/tr>\n
420<\/td>\n12.17.5.3.2 Inputs
12.17.5.3.3 Outputs
12.17.5.4 Write SFM Originator managed object\u2019s attribute
12.17.5.4.1 Purpose
12.17.5.4.2 Inputs
12.17.5.4.3 Outputs
12.17.5.5 Activate SFM Originator
12.17.5.5.1 Purpose
12.17.5.5.2 Input
12.17.5.5.3 Outputs
12.17.5.6 Deactivate SFM Originator
12.17.5.6.1 Purpose <\/td>\n<\/tr>\n
421<\/td>\n12.17.5.6.2 Input
12.17.5.6.3 Output
12.18 PBB-TE Protection Switching managed objects
12.18.1 TE protection group list managed object
12.18.1.1 Read TE protection group list
12.18.1.1.1 Purpose
12.18.1.1.2 Inputs
12.18.1.1.3 Outputs <\/td>\n<\/tr>\n
422<\/td>\n12.18.1.2 Create TE protection group managed object
12.18.1.2.1 Purpose
12.18.1.2.2 Inputs
12.18.1.2.3 Outputs
12.18.1.3 Delete TE protection group managed object
12.18.1.3.1 Purpose
12.18.1.3.2 Inputs
12.18.1.3.3 Outputs
12.18.2 TE protection group managed object <\/td>\n<\/tr>\n
423<\/td>\n12.18.2.1 Read TE protection group managed object
12.18.2.1.1 Purpose
12.18.2.1.2 Inputs
12.18.2.1.3 Outputs
12.18.2.2 Write TE protection group managed object
12.18.2.2.1 Purpose
12.18.2.2.2 Inputs <\/td>\n<\/tr>\n
424<\/td>\n12.18.2.2.3 Outputs
12.18.2.3 TE protection group administrative commands managed object
12.18.2.3.1 Purpose
12.18.2.3.2 Inputs
12.18.2.3.3 Outputs
12.19 TPMR managed objects <\/td>\n<\/tr>\n
425<\/td>\n12.19.1 TPMR management entity
12.19.1.1 TPMR configuration
12.19.1.1.1 Read TPMR <\/td>\n<\/tr>\n
426<\/td>\n12.19.1.1.2 Set TPMR Name
12.19.1.2 Port configuration
12.19.1.2.1 Read Port
12.19.1.2.2 Set Port Name <\/td>\n<\/tr>\n
427<\/td>\n12.19.2 MAC and PHY entities
12.19.3 Forwarding Process
12.19.3.1 The Port Counters
12.19.3.1.1 Read forwarding port counters <\/td>\n<\/tr>\n
428<\/td>\n12.19.3.2 Priority handling
12.19.3.2.1 Read Port Default Priority
12.19.3.2.2 Set Port Default Priority <\/td>\n<\/tr>\n
429<\/td>\n12.19.3.2.3 Read Port Priority Regeneration Table
12.19.3.2.4 Set Port Priority Regeneration Table
12.19.3.2.5 Read Port Priority Code Point Selection <\/td>\n<\/tr>\n
430<\/td>\n12.19.3.2.6 Set Port Priority Code Point Selection
12.19.3.2.7 Read Priority Code Point Decoding Table <\/td>\n<\/tr>\n
431<\/td>\n12.19.3.2.8 Read Use_DEI Parameter
12.19.3.2.9 Set Use_DEI Parameter
12.19.3.3 Traffic Class Table
12.19.3.3.1 Read Port Traffic Class Table
12.19.3.3.2 Set Port Traffic Class Table <\/td>\n<\/tr>\n
432<\/td>\n12.19.4 MAC Status Propagation Entity (MSPE)
12.19.4.1 MAC status propagation (MSP)
12.19.4.1.1 Read MSP performance parameters <\/td>\n<\/tr>\n
433<\/td>\n12.19.4.1.2 Set MSP performance parameters
12.19.4.1.3 Read MSP statistics <\/td>\n<\/tr>\n
434<\/td>\n12.20 Management entities for FQTSS
12.20.1 The Bandwidth Availability Parameter Table <\/td>\n<\/tr>\n
435<\/td>\n12.20.2 The Transmission Selection Algorithm Table
12.20.3 The Priority Regeneration Override Table
12.20.4 SR Class to Priority Mapping Table <\/td>\n<\/tr>\n
436<\/td>\n12.21 Congestion Notification managed objects
12.21.1 CN component managed object
12.21.2 CN component priority managed object <\/td>\n<\/tr>\n
438<\/td>\n12.21.2.1 Create CN component priority managed object
12.21.2.2 Delete CN component priority managed object
12.21.3 CN Port priority managed object <\/td>\n<\/tr>\n
439<\/td>\n12.21.4 Congestion Point managed object
12.21.5 Reaction Point port priority managed object <\/td>\n<\/tr>\n
440<\/td>\n12.21.6 Reaction Point group managed object
12.22 Stream Reservation Protocol (SRP) entities <\/td>\n<\/tr>\n
441<\/td>\n12.22.1 SRP Bridge Base Table
12.22.2 SRP Bridge Port Table <\/td>\n<\/tr>\n
442<\/td>\n12.22.3 SRP Latency Parameter Table
12.22.4 SRP Stream Table
12.22.5 SRP Reservations Table <\/td>\n<\/tr>\n
443<\/td>\n12.22.6 SRP Stream Preload Table
12.22.7 SRP Reservations Preload Table <\/td>\n<\/tr>\n
445<\/td>\n12.23 Priority-based Flow Control objects
12.24 1:1 PBB-TE IPS managed objects
12.24.1 IPG list managed object
12.24.1.1 Read IPG list
12.24.1.1.1 Purpose <\/td>\n<\/tr>\n
446<\/td>\n12.24.1.1.2 Inputs
12.24.1.1.3 Outputs
12.24.1.2 Create IPG managed object
12.24.1.2.1 Purpose
12.24.1.2.2 Inputs
12.24.1.2.3 Outputs
12.24.1.3 Delete IPG managed object
12.24.1.3.1 Purpose <\/td>\n<\/tr>\n
447<\/td>\n12.24.1.3.2 Inputs
12.24.1.3.3 Outputs
12.24.2 IPG managed object
12.24.2.1 Read IPG managed object
12.24.2.1.1 Purpose
12.24.2.1.2 Inputs
12.24.2.1.3 Outputs <\/td>\n<\/tr>\n
448<\/td>\n12.24.2.2 Write IPG managed object
12.24.2.2.1 Purpose
12.24.2.2.2 Inputs
12.24.2.2.3 Outputs
12.24.2.3 Apply administrative command to IPG managed object
12.24.2.3.1 Purpose <\/td>\n<\/tr>\n
449<\/td>\n12.24.2.3.2 Inputs
12.24.2.3.3 Outputs
12.25 Shortest Path Bridging managed objects <\/td>\n<\/tr>\n
450<\/td>\n12.25.1 The SPB System managed object <\/td>\n<\/tr>\n
451<\/td>\n12.25.1.1 Create SPB System Managed object
12.25.1.1.1 Purpose
12.25.1.1.2 Inputs
12.25.1.1.3 Outputs
12.25.1.2 Write SPB System managed object
12.25.1.2.1 Purpose
12.25.1.2.2 Inputs
12.25.1.2.3 Outputs <\/td>\n<\/tr>\n
452<\/td>\n12.25.1.3 Read SPB System managed object
12.25.1.3.1 Purpose
12.25.1.3.2 Inputs
12.25.1.3.3 Outputs
12.25.1.4 Delete SPB System managed object
12.25.1.4.1 Purpose
12.25.1.4.2 Inputs
12.25.1.5 Outputs
12.25.2 The SPB MTID Static managed object <\/td>\n<\/tr>\n
453<\/td>\n12.25.2.1 Create SPB MTID Static managed object
12.25.2.1.1 Purpose
12.25.2.1.2 Inputs
12.25.2.1.3 Outputs
12.25.2.2 Write SPB MTID Static managed object
12.25.2.2.1 Purpose
12.25.2.2.2 Inputs
12.25.2.2.3 Outputs
12.25.2.3 Read SPB MTID Static managed object
12.25.2.3.1 Purpose
12.25.2.3.2 Inputs
12.25.2.3.3 Outputs
12.25.2.4 Delete SPB MTID Static managed object
12.25.2.4.1 Purpose <\/td>\n<\/tr>\n
454<\/td>\n12.25.2.4.2 Inputs
12.25.2.4.3 Outputs
12.25.3 The SPB Topology Instance Dynamic managed object
12.25.3.1 Read SPB Topology Instance Dynamic managed object
12.25.3.1.1 Purpose
12.25.3.1.2 Inputs
12.25.3.1.3 Outputs
12.25.4 The SPB ECT Static Entry managed object <\/td>\n<\/tr>\n
455<\/td>\n12.25.4.1 Create SPB ECT Static Entry managed object
12.25.4.1.1 Purpose
12.25.4.1.2 Inputs
12.25.4.1.3 Outputs
12.25.4.2 Read SPB ECT Static Entry managed object
12.25.4.2.1 Purpose
12.25.4.2.2 Inputs
12.25.4.2.3 Outputs <\/td>\n<\/tr>\n
456<\/td>\n12.25.4.3 Delete SPB ECT Static Entry managed object
12.25.4.3.1 Purpose
12.25.4.3.2 Inputs
12.25.4.3.3 Outputs
12.25.5 The SPB ECT Dynamic Entry managed object
12.25.5.1 Read SPB ECT Dynamic Entry managed object
12.25.5.1.1 Purpose
12.25.5.1.2 Inputs
12.25.5.1.3 Outputs <\/td>\n<\/tr>\n
457<\/td>\n12.25.6 The SPB Adjacency Static Entry managed object
12.25.6.1 Write SPB Adjacency Static Entry managed object
12.25.6.1.1 Purpose
12.25.6.1.2 Inputs
12.25.6.1.3 Outputs
12.25.6.2 Read SPB Adjacency Static Entry managed object
12.25.6.2.1 Purpose
12.25.6.2.2 Inputs
12.25.6.2.3 Outputs <\/td>\n<\/tr>\n
458<\/td>\n12.25.7 The SPB Adjacency Dynamic Entry managed object
12.25.7.1 Read SPB Adjacency Dynamic Entry managed object
12.25.7.1.1 Purpose
12.25.7.1.2 Inputs
12.25.7.1.3 Outputs
12.25.8 The SPBM BSI Static Entry managed object <\/td>\n<\/tr>\n
459<\/td>\n12.25.8.1 Write SPBM BSI Static Entry managed object
12.25.8.1.1 Purpose
12.25.8.1.2 Inputs
12.25.8.1.3 Outputs
12.25.8.2 Read SPBM BSI Static Entry managed object
12.25.8.2.1 Purpose
12.25.8.2.2 Inputs <\/td>\n<\/tr>\n
460<\/td>\n12.25.8.2.3 Outputs
12.25.9 The SPB Topology Node Table managed object
12.25.9.1 Read SPB Topology Node Table managed object
12.25.9.1.1 Purpose
12.25.9.1.2 Inputs
12.25.9.1.3 Outputs <\/td>\n<\/tr>\n
461<\/td>\n12.25.10 The SPB Topology ECT Table managed object
12.25.10.1 Read SPB Topology ECT Table managed object
12.25.10.1.1 Purpose
12.25.10.1.2 Inputs
12.25.10.1.3 Outputs
12.25.11 The SPB Topology Edge Table managed object <\/td>\n<\/tr>\n
462<\/td>\n12.25.11.1 Read SPB Topology Edge Table managed object
12.25.11.1.1 Purpose
12.25.11.1.2 Inputs
12.25.11.1.3 Outputs
12.25.12 The SPBM Topology Service Table managed object <\/td>\n<\/tr>\n
463<\/td>\n12.25.12.1 Read SPBM Topology Service Table managed object
12.25.12.1.1 Purpose
12.25.12.1.2 Inputs
12.25.12.1.3 Outputs
12.25.13 The SPBV Topology Service Table managed object <\/td>\n<\/tr>\n
464<\/td>\n12.25.13.1 Read SPBV Topology Service Table managed object
12.25.13.1.1 Purpose
12.25.13.1.2 Inputs
12.25.13.1.3 Outputs
12.25.14 The ECMP ECT Static Entry managed object
12.25.14.1 Write ECMP ECT Static Entry managed object
12.25.14.1.1 Purpose
12.25.14.1.2 Inputs <\/td>\n<\/tr>\n
465<\/td>\n12.25.14.1.3 Outputs
12.25.14.2 Read ECMP ECT Static Entry managed object
12.25.14.2.1 Purpose
12.25.14.2.2 Inputs
12.25.14.2.3 Outputs
12.26 Edge Virtual Bridging (EVB) management <\/td>\n<\/tr>\n
468<\/td>\n12.26.1 EVB system base table
12.26.1.1 System identifiers <\/td>\n<\/tr>\n
469<\/td>\n12.26.1.2 System defaults for EVB <\/td>\n<\/tr>\n
470<\/td>\n12.26.2 SBP table entry <\/td>\n<\/tr>\n
471<\/td>\n12.26.3 VSI table entry <\/td>\n<\/tr>\n
472<\/td>\n12.26.4 S-channel configuration and management
12.26.4.1 UAP table entry <\/td>\n<\/tr>\n
473<\/td>\n12.26.4.2 S-channel interface table entry <\/td>\n<\/tr>\n
474<\/td>\n12.26.5 ER management
12.26.5.1 URP table entry <\/td>\n<\/tr>\n
475<\/td>\n12.27 Edge Control Protocol (ECP) management
12.27.1 ECP table entry <\/td>\n<\/tr>\n
476<\/td>\n12.28 Path Control and Reservation (PCR) management <\/td>\n<\/tr>\n
477<\/td>\n12.28.1 The PCR ECT Static Entry managed object
12.28.1.1 Create PCR ECT Static Entry managed object
12.28.1.1.1 Purpose
12.28.1.1.2 Inputs
12.28.1.1.3 Outputs <\/td>\n<\/tr>\n
478<\/td>\n12.28.1.2 Read PCR ECT Static Entry managed object
12.28.1.2.1 Purpose
12.28.1.2.2 Inputs
12.28.1.2.3 Outputs
12.28.1.3 Write PCR ECT Static Entry managed object
12.28.1.3.1 Purpose
12.28.1.3.2 Inputs
12.28.1.3.3 Outputs <\/td>\n<\/tr>\n
479<\/td>\n12.28.1.4 Delete PCR ECT Static Entry managed object
12.28.1.4.1 Purpose
12.28.1.4.2 Inputs
12.28.1.4.3 Outputs
12.28.2 The PCR Topology ECT Table managed object
12.28.2.1 Read PCR Topology ECT Table managed object
12.28.2.1.1 Purpose
12.28.2.1.2 Inputs
12.28.2.1.3 Outputs <\/td>\n<\/tr>\n
480<\/td>\n12.29 Managed objects for scheduled traffic
12.29.1 The Gate Parameter Table <\/td>\n<\/tr>\n
481<\/td>\n12.29.1.1 The queueMaxSDUTable structure and data types
12.29.1.1.1 queueMaxSDU
12.29.1.1.2 TransmissionOverrun
12.29.1.2 The gate control list structure and data types <\/td>\n<\/tr>\n
482<\/td>\n12.29.1.2.1 GateControlEntry
12.29.1.2.2 gateStatesValue
12.29.1.2.3 timeIntervalValue
12.29.1.3 RationalNumber
12.29.1.4 PTPtime
12.29.1.5 SupportedListMax
12.29.2 Timing points for scheduled traffic <\/td>\n<\/tr>\n
483<\/td>\n12.30 Managed objects for frame preemption
12.30.1 Frame Preemption Parameter table <\/td>\n<\/tr>\n
484<\/td>\n12.30.1.1 framePreemptionStatusTable structure and data types
12.30.1.1.1 framePreemptionAdminStatus
12.30.1.2 holdAdvance object
12.30.1.3 releaseAdvance object
12.30.1.4 preemptionActive object
12.30.1.5 holdRequest object <\/td>\n<\/tr>\n
485<\/td>\n12.31 Managed objects for per-stream classification and metering
12.31.1 The Stream Parameter Table
12.31.1.1 MaxStreamFilterInstances
12.31.1.2 MaxStreamGateInstances
12.31.1.3 MaxFlowMeterInstances <\/td>\n<\/tr>\n
486<\/td>\n12.31.1.4 SupportedListMax
12.31.1.5 MaxSchedulerInstances
12.31.1.6 MaxSchedulerGroupInstances
12.31.2 The Stream Filter Instance Table
12.31.2.1 StreamFilterInstance
12.31.2.2 stream_handle specification data type
12.31.2.3 priority specification data type
12.31.2.4 MaxSDUSize
12.31.2.5 StreamGateInstanceID <\/td>\n<\/tr>\n
487<\/td>\n12.31.2.6 FlowMeterInstanceID and FlowMeterEnable <\/td>\n<\/tr>\n
488<\/td>\n12.31.2.7 SchedulerInstanceID and SchedulerEnable
12.31.3 The Stream Gate Instance Table <\/td>\n<\/tr>\n
489<\/td>\n12.31.3.1 StreamGateInstance
12.31.3.2 The gate control list structure and data types
12.31.3.2.1 StreamGateStatesValue <\/td>\n<\/tr>\n
490<\/td>\n12.31.3.2.2 StreamGateControlEntry
12.31.3.2.3 IPV value
12.31.3.2.4 timeIntervalValue
12.31.3.3 The Internal priority value specification (IPV) data type
12.31.3.4 Representation of times <\/td>\n<\/tr>\n
491<\/td>\n12.31.4 The Flow Meter Instance Table
12.31.5 The Scheduler Instance Table
12.31.5.1 SchedulerInstanceID
12.31.5.2 CommittedBurstSize <\/td>\n<\/tr>\n
492<\/td>\n12.31.5.3 CommittedInformationRate
12.31.5.4 SchedulerGroupInstanceID
12.31.6 The Scheduler Group Instance Table <\/td>\n<\/tr>\n
493<\/td>\n12.31.6.1 SchedulerGroupInstanceID
12.31.6.2 MaxResidenceTime
12.31.7 The Scheduler Port Parameter Table
12.31.7.1 PortNumber
12.31.7.2 DiscardedFramesCount
12.31.8 The Scheduler Timing Characteristics Table
12.31.8.1 ReceptionPortNumber
12.31.8.2 TransmissionPortNumber <\/td>\n<\/tr>\n
494<\/td>\n12.31.8.3 ClockOffsetVariationMax
12.31.8.4 ClockRateDeviationMax
12.31.8.5 ArrivalRecognitionDelayMax
12.31.8.6 ProcessingDelayMin
12.31.8.7 ProcessingDelayMax <\/td>\n<\/tr>\n
495<\/td>\n12.32 Stream reservation remote management
12.32.1 Bridge Delay <\/td>\n<\/tr>\n
496<\/td>\n12.32.1.1 independentDelayMin\/Max
12.32.1.2 dependentDelayMin\/Max <\/td>\n<\/tr>\n
497<\/td>\n12.32.2 Propagation Delay
12.32.2.1 txPropagationDelay
12.32.3 Static Trees <\/td>\n<\/tr>\n
498<\/td>\n12.32.3.1 staticTreesSupported
12.32.4 MRP External Control
12.32.4.1 externalControl <\/td>\n<\/tr>\n
499<\/td>\n12.32.4.2 indicationList <\/td>\n<\/tr>\n
500<\/td>\n12.32.4.3 indicationListLength
12.32.4.4 indicationChangeCounter
12.32.4.5 adminRequestList <\/td>\n<\/tr>\n
501<\/td>\n12.32.4.6 adminRequestListLength
12.32.4.7 operRequestList
12.32.4.8 operRequestListLength <\/td>\n<\/tr>\n
502<\/td>\n13. Spanning tree protocols <\/td>\n<\/tr>\n
503<\/td>\n13.1 Protocol design requirements <\/td>\n<\/tr>\n
504<\/td>\n13.2 Protocol support requirements
13.2.1 MSTP support requirements
13.2.2 SPB support requirements <\/td>\n<\/tr>\n
505<\/td>\n13.3 Protocol design goals
13.4 RSTP overview <\/td>\n<\/tr>\n
506<\/td>\n13.4.1 Computation of the active topology <\/td>\n<\/tr>\n
507<\/td>\n13.4.2 Example topologies <\/td>\n<\/tr>\n
510<\/td>\n13.5 MSTP overview <\/td>\n<\/tr>\n
511<\/td>\n13.5.1 Example topologies <\/td>\n<\/tr>\n
514<\/td>\n13.5.2 Relationship of MSTP to RSTP
13.5.3 Modeling an MST or SPT Region as a single Bridge <\/td>\n<\/tr>\n
515<\/td>\n13.6 SPB overview <\/td>\n<\/tr>\n
516<\/td>\n13.7 Compatibility and interoperability
13.7.1 Designated Port selection
13.7.2 Force Protocol Version <\/td>\n<\/tr>\n
517<\/td>\n13.8 MST Configuration Identifier (MCID) <\/td>\n<\/tr>\n
518<\/td>\n13.9 Spanning tree priority vectors <\/td>\n<\/tr>\n
520<\/td>\n13.10 CIST Priority Vector calculations <\/td>\n<\/tr>\n
522<\/td>\n13.11 MST Priority Vector calculations <\/td>\n<\/tr>\n
524<\/td>\n13.12 Port Role assignments <\/td>\n<\/tr>\n
525<\/td>\n13.13 Stable connectivity <\/td>\n<\/tr>\n
526<\/td>\n13.14 Communicating spanning tree information <\/td>\n<\/tr>\n
527<\/td>\n13.15 Changing spanning tree information <\/td>\n<\/tr>\n
528<\/td>\n13.16 Changing Port States with RSTP or MSTP <\/td>\n<\/tr>\n
529<\/td>\n13.16.1 Subtree connectivity and priority vectors
13.16.2 Root Port transition to Forwarding
13.16.3 Designated Port transition to Forwarding <\/td>\n<\/tr>\n
531<\/td>\n13.16.4 Master Port transition to Forwarding <\/td>\n<\/tr>\n
533<\/td>\n13.17 Changing Port States with SPB <\/td>\n<\/tr>\n
535<\/td>\n13.17.1 Agreement Digest <\/td>\n<\/tr>\n
536<\/td>\n13.18 Managing spanning tree topologies <\/td>\n<\/tr>\n
537<\/td>\n13.19 Updating learned station location information <\/td>\n<\/tr>\n
539<\/td>\n13.20 Managing reconfiguration <\/td>\n<\/tr>\n
540<\/td>\n13.21 Partial and disputed connectivity
13.22 In-service upgrades <\/td>\n<\/tr>\n
542<\/td>\n13.23 Fragile Bridges
13.24 Spanning tree protocol state machines <\/td>\n<\/tr>\n
544<\/td>\n13.25 State machine timers <\/td>\n<\/tr>\n
545<\/td>\n13.25.1 edgeDelayWhile
13.25.2 fdWhile
13.25.3 helloWhen
13.25.4 mdelayWhile
13.25.5 rbWhile
13.25.6 rcvdInfoWhile <\/td>\n<\/tr>\n
546<\/td>\n13.25.7 rrWhile
13.25.8 tcDetected
13.25.9 tcWhile
13.25.10 pseudoInfoHelloWhen
13.26 Per Bridge variables <\/td>\n<\/tr>\n
547<\/td>\n13.26.1 agreementDigest
13.26.2 BridgeIdentifier
13.26.3 BridgePriority
13.26.4 BridgeTimes <\/td>\n<\/tr>\n
548<\/td>\n13.26.5 ForceProtocolVersion
13.26.6 MigrateTime
13.26.7 MstConfigId
13.26.8 AuxMstConfigId
13.26.9 rootPortId
13.26.10 rootPriority
13.26.11 rootTimes
13.26.12 TxHoldCount
13.27 Per port variables <\/td>\n<\/tr>\n
551<\/td>\n13.27.1 AdminEdge
13.27.2 ageingTime
13.27.3 agree
13.27.4 agreed
13.27.5 agreedAbove
13.27.6 agreedDigest
13.27.7 agreedDigestValid
13.27.8 agreeDigest
13.27.9 agreeDigestValid <\/td>\n<\/tr>\n
552<\/td>\n13.27.10 agreedMisorder
13.27.11 agreedN
13.27.12 agreedND
13.27.13 agreedPriority
13.27.14 agreedTopology
13.27.15 agreementOutstanding
13.27.16 agreeN
13.27.17 agreeND
13.27.18 AutoEdge <\/td>\n<\/tr>\n
553<\/td>\n13.27.19 AutoIsolate
13.27.20 designatedPriority
13.27.21 designatedTimes
13.27.22 disputed
13.27.23 enableBPDUrx
13.27.24 enableBPDUtx
13.27.25 ExternalPortPathCost
13.27.26 isL2gp <\/td>\n<\/tr>\n
554<\/td>\n13.27.27 isolate
13.27.28 fdbFlush
13.27.29 forward
13.27.30 forwarding
13.27.31 infoInternal
13.27.32 infoIs
13.27.33 InternalPortPathCost <\/td>\n<\/tr>\n
555<\/td>\n13.27.34 learn
13.27.35 learning
13.27.36 master
13.27.37 mastered
13.27.38 mcheck
13.27.39 msgPriority
13.27.40 msgTimes <\/td>\n<\/tr>\n
556<\/td>\n13.27.41 neighbourPriority
13.27.42 newInfo
13.27.43 newInfoMsti
13.27.44 operEdge
13.27.45 portEnabled
13.27.46 portId
13.27.47 portPriority <\/td>\n<\/tr>\n
557<\/td>\n13.27.48 portTimes
13.27.49 proposed
13.27.50 proposing
13.27.51 pseudoRootId
13.27.52 rcvdBPDU
13.27.53 rcvdInfo
13.27.54 rcvdInternal
13.27.55 rcvdMsg
13.27.56 rcvdRSTP
13.27.57 rcvdSTP
13.27.58 rcvdTc
13.27.59 rcvdTcAck <\/td>\n<\/tr>\n
558<\/td>\n13.27.60 rcvdTcn
13.27.61 reRoot
13.27.62 reselect
13.27.63 restrictedDomainRole
13.27.64 restrictedRole
13.27.65 restrictedTcn
13.27.66 role
13.27.67 selected
13.27.68 selectedRole <\/td>\n<\/tr>\n
559<\/td>\n13.27.69 sendRSTP
13.27.70 sync
13.27.71 synced
13.27.72 tcAck
13.27.73 tcProp
13.27.74 tick
13.27.75 txCount
13.27.76 updtInfo
13.28 State machine conditions and parameters <\/td>\n<\/tr>\n
560<\/td>\n13.28.1 allSptAgree
13.28.2 allSynced
13.28.3 allTransmitReady
13.28.4 BestAgreementPriority
13.28.5 cist
13.28.6 cistRootPort <\/td>\n<\/tr>\n
561<\/td>\n13.28.7 cistDesignatedPort
13.28.8 EdgeDelay
13.28.9 forwardDelay
13.28.10 FwdDelay
13.28.11 HelloTime
13.28.12 MaxAge
13.28.13 msti
13.28.14 mstiDesignatedOrTCpropagatingRootPort
13.28.15 mstiMasterPort
13.28.16 operPointToPoint
13.28.17 rcvdAnyMsg
13.28.18 rcvdCistMsg <\/td>\n<\/tr>\n
562<\/td>\n13.28.19 rcvdMstiMsg
13.28.20 reRooted
13.28.21 rstpVersion
13.28.22 spt
13.28.23 stpVersion
13.28.24 updtCistInfo
13.28.25 updtMstiInfo
13.29 State machine procedures <\/td>\n<\/tr>\n
563<\/td>\n13.29.1 betterorsameInfo(newInfoIs)
13.29.2 clearAllRcvdMsgs()
13.29.3 clearReselectTree() <\/td>\n<\/tr>\n
564<\/td>\n13.29.4 disableForwarding()
13.29.5 disableLearning()
13.29.6 enableForwarding()
13.29.7 enableLearning()
13.29.8 fromSameRegion()
13.29.9 newTcDetected()
13.29.10 newTcWhile() <\/td>\n<\/tr>\n
565<\/td>\n13.29.11 pseudoRcvMsgs()
13.29.12 rcvInfo() <\/td>\n<\/tr>\n
566<\/td>\n13.29.13 rcvMsgs()
13.29.14 rcvAgreements()
13.29.15 recordAgreement() <\/td>\n<\/tr>\n
567<\/td>\n13.29.16 recordDispute()
13.29.17 recordMastered()
13.29.18 recordPriority()
13.29.19 recordProposal()
13.29.20 recordTimes() <\/td>\n<\/tr>\n
568<\/td>\n13.29.21 setReRootTree()
13.29.22 setSelectedTree()
13.29.23 setSyncTree()
13.29.24 setTcFlags()
13.29.25 setTcPropTree()
13.29.26 syncMaster()
13.29.27 txConfig() <\/td>\n<\/tr>\n
569<\/td>\n13.29.28 txRstp()
13.29.29 txTcn()
13.29.30 updtAgreement() <\/td>\n<\/tr>\n
570<\/td>\n13.29.31 updtBPDUVersion()
13.29.32 updtDigest() <\/td>\n<\/tr>\n
571<\/td>\n13.29.33 updtRcvdInfoWhile() <\/td>\n<\/tr>\n
572<\/td>\n13.29.34 updtRolesTree() <\/td>\n<\/tr>\n
573<\/td>\n13.29.35 uptRolesDisabledTree()
13.30 The Port Timers state machine <\/td>\n<\/tr>\n
574<\/td>\n13.31 Port Receive state machine <\/td>\n<\/tr>\n
575<\/td>\n13.32 Port Protocol Migration state machine
13.33 Bridge Detection state machine <\/td>\n<\/tr>\n
576<\/td>\n13.34 Port Transmit state machine <\/td>\n<\/tr>\n
577<\/td>\n13.35 Port Information state machine <\/td>\n<\/tr>\n
578<\/td>\n13.36 Port Role Selection state machine
13.37 Port Role Transitions state machine <\/td>\n<\/tr>\n
583<\/td>\n13.38 Port State Transition state machine <\/td>\n<\/tr>\n
584<\/td>\n13.38.1 Port State transitions for the CIST and MSTIs
13.38.2 Port State transitions for SPTs <\/td>\n<\/tr>\n
585<\/td>\n13.39 Topology Change state machine <\/td>\n<\/tr>\n
586<\/td>\n13.40 Layer 2 Gateway Port Receive state machine
13.41 CEP spanning tree operation
13.41.1 PEP operPointToPointMAC and operEdge <\/td>\n<\/tr>\n
587<\/td>\n13.41.2 updtRolesTree()
13.41.3 setReRootTree(), setSyncTree(), setTcPropTree()
13.41.4 allSynced, reRooted
13.41.5 Configuration parameters <\/td>\n<\/tr>\n
588<\/td>\n13.42 Virtual Instance Port (VIP) spanning tree operation <\/td>\n<\/tr>\n
589<\/td>\n14. Encoding of Bridge Protocol Data Units (BPDUs)
14.1 BPDU Structure
14.1.1 Transmission and representation of octets
14.1.2 Common BPDU fields <\/td>\n<\/tr>\n
591<\/td>\n14.2 Encoding of parameter types
14.2.1 Encoding of Protocol Identifiers
14.2.2 Encoding of Protocol Version Identifiers
14.2.3 Encoding of BPDU types
14.2.4 Encoding of flags
14.2.5 Encoding of Bridge Identifiers <\/td>\n<\/tr>\n
592<\/td>\n14.2.6 Encoding of External Root Path Cost and Internal Root Path Cost
14.2.7 Encoding of Port Identifiers
14.2.8 Encoding of Timer Values
14.2.9 Encoding of Port Role values <\/td>\n<\/tr>\n
593<\/td>\n14.2.10 Encoding of Length Values
14.2.11 Encoding of Hop Counts
14.3 Transmission of BPDUs
14.4 Encoding and decoding of STP Configuration, RST, MST, and SPT BPDUs <\/td>\n<\/tr>\n
595<\/td>\n14.4.1 MSTI Configuration Messages <\/td>\n<\/tr>\n
596<\/td>\n14.5 Validation of received BPDUs <\/td>\n<\/tr>\n
597<\/td>\n14.6 Validation and interoperability <\/td>\n<\/tr>\n
598<\/td>\n15. Support of the MAC Service by PBNs
15.1 Service transparency <\/td>\n<\/tr>\n
599<\/td>\n15.2 Customer service interfaces
15.3 Port-based service interface <\/td>\n<\/tr>\n
600<\/td>\n15.4 C-tagged service interface <\/td>\n<\/tr>\n
601<\/td>\n15.5 S-tagged service interface <\/td>\n<\/tr>\n
602<\/td>\n15.6 Remote customer service interfaces (RCSIs) <\/td>\n<\/tr>\n
605<\/td>\n15.7 Service instance segregation
15.8 Service instance selection and identification <\/td>\n<\/tr>\n
606<\/td>\n15.9 Service priority selection
15.10 Service access protection <\/td>\n<\/tr>\n
607<\/td>\n16. Principles of Provider Bridged Network (PBN) operation
16.1 PBN overview <\/td>\n<\/tr>\n
608<\/td>\n16.2 Provider Bridged Network (PBN) <\/td>\n<\/tr>\n
611<\/td>\n16.3 Service instance connectivity <\/td>\n<\/tr>\n
612<\/td>\n16.4 Service provider learning of customer end station addresses
16.5 Detection of connectivity loops through attached networks <\/td>\n<\/tr>\n
613<\/td>\n16.6 Network management <\/td>\n<\/tr>\n
614<\/td>\n17. Management Information Base (MIB)
17.1 Internet Standard Management Framework
17.2 Structure of the MIB <\/td>\n<\/tr>\n
616<\/td>\n17.2.1 Structure of the IEEE8021-TC-MIB <\/td>\n<\/tr>\n
617<\/td>\n17.2.2 Structure of the IEEE8021-BRIDGE-MIB <\/td>\n<\/tr>\n
621<\/td>\n17.2.3 Structure of the IEEE8021-SPANNING-TREE MIB <\/td>\n<\/tr>\n
624<\/td>\n17.2.4 Structure of the IEEE8021-Q-BRIDGE-MIB <\/td>\n<\/tr>\n
629<\/td>\n17.2.5 Structure of the IEEE8021-PB-MIB <\/td>\n<\/tr>\n
631<\/td>\n17.2.6 Structure of the IEEE8021-MSTP-MIB <\/td>\n<\/tr>\n
634<\/td>\n17.2.7 Structure of the IEEE8021-CFM-MIB <\/td>\n<\/tr>\n
640<\/td>\n17.2.8 Structure of the IEEE8021-PBB-MIB <\/td>\n<\/tr>\n
643<\/td>\n17.2.9 Structure of the IEEE8021-DDCFM-MIBs <\/td>\n<\/tr>\n
645<\/td>\n17.2.10 Structure of the IEEE8021-PBBTE-MIB <\/td>\n<\/tr>\n
647<\/td>\n17.2.10.3 Using the MIB to query and configure protection groups
17.2.10.4 Using the MIB to prevent erroneous forwarding in the PBB-TE network <\/td>\n<\/tr>\n
648<\/td>\n17.2.11 Structure of the TPMR MIB <\/td>\n<\/tr>\n
650<\/td>\n17.2.12 Structure of the IEEE8021-FQTSS-MIB <\/td>\n<\/tr>\n
651<\/td>\n17.2.13 Structure of the IEEE8021-CN-MIB <\/td>\n<\/tr>\n
653<\/td>\n17.2.14 Structure of the IEEE8021-SRP-MIB <\/td>\n<\/tr>\n
655<\/td>\n17.2.15 Structure of the IEEE8021-MVRPX-MIB
17.2.16 Structure of the IEEE8021-MIRP-MIB <\/td>\n<\/tr>\n
656<\/td>\n17.2.17 Structure of the IEEE8021-PFC-MIB
17.2.18 Structure of the IEEE8021-TEIPS-MIB <\/td>\n<\/tr>\n
658<\/td>\n17.2.18.3 Using the TEIPS MIB to query and configure IPGs
17.2.19 Structure of the IEEE8021-SPB-MIB <\/td>\n<\/tr>\n
663<\/td>\n17.2.20 Structure of the IEEE8021-EVB-MIB <\/td>\n<\/tr>\n
667<\/td>\n17.2.21 Structure of the IEEE8021-ECMP-MIB <\/td>\n<\/tr>\n
668<\/td>\n17.2.22 Structure of the IEEE8021-ST-MIB <\/td>\n<\/tr>\n
669<\/td>\n17.2.23 Structure of the IEEE8021-Preemption-MIB
17.2.24 Structure of the IEEE8021-PSFP-MIB <\/td>\n<\/tr>\n
672<\/td>\n17.2.25 Structure of the IEEE8021-TSN-REMOTE-MANAGEMENT-MIB <\/td>\n<\/tr>\n
674<\/td>\n17.3 MIB module relationships
17.3.1 Relationship of the IEEE8021-TC-MIB to other MIB modules
17.3.2 Relationship of the IEEE8021-BRIDGE-MIB to other MIB modules
17.3.2.1 Relationship to the SNMPv2-MIB
17.3.2.2 Relationship to the IF-MIB <\/td>\n<\/tr>\n
676<\/td>\n17.3.2.3 FDB for IEEE 802.1D Bridges <\/td>\n<\/tr>\n
677<\/td>\n17.3.3 Relationship of the IEEE8021-RSTP MIB to other MIB modules
17.3.4 Relationship of the IEEE8021-Q-BRIDGE-MIB to other MIB modules
17.3.4.1 Relationship to the IF-MIB
17.3.4.1.1 ifStackTable
17.3.4.1.2 ifRcvAddressTable
17.3.4.2 Relationship to IEEE8021-BRIDGE-MIB <\/td>\n<\/tr>\n
678<\/td>\n17.3.4.2.1 ieee8021BridgeBase subtree
17.3.4.2.2 ieee8021BridgeTp subtree
17.3.4.2.3 ieee8021BridgeStatic subtree
17.3.4.2.4 Additions to the IEEE8021-BRIDGE-MIB <\/td>\n<\/tr>\n
679<\/td>\n17.3.5 Relationship of the IEEE8021-PB-BRIDGE MIB to other MIB modules
17.3.6 Relationship of the IEEE8021-MSTP-MIB to other MIB modules
17.3.7 Relationship of the IEEE8021-CFM-MIB to other MIB modules
17.3.7.1 Relationship to Interface MIB
17.3.7.2 IEEE8021-CFM-MIB and IEEE8021-CFM-V2-MIB <\/td>\n<\/tr>\n
680<\/td>\n17.3.8 Relationship of the IEEE8021-PBB-MIB to other MIB modules <\/td>\n<\/tr>\n
681<\/td>\n17.3.9 Relationship of the IEEE8021-DDCFM to other MIB modules
17.3.10 Relationship of the IEEE8021-PBBTE-MIB to other MIB modules <\/td>\n<\/tr>\n
682<\/td>\n17.3.11 Relationship of the IEEE8021-TPMR MIB to other MIB modules
17.3.12 Relationship of the IEEE8021-FQTSS-MIB to other MIB modules
17.3.13 Relationship of the IEEE802-CN-MIB to other MIB modules <\/td>\n<\/tr>\n
683<\/td>\n17.3.14 Relationship of the IEEE8021-SRP-MIB to other MIB modules
17.3.15 Relationship of the IEEE8021-MVRPX-MIB to other MIB modules
17.3.16 Relationship of the IEEE8021-MIRP-MIB to other MIB modules
17.3.17 Relationship of the IEEE8021-PFC-MIB to other MIB modules <\/td>\n<\/tr>\n
684<\/td>\n17.3.18 Relationship of the IEEE8021-TEIPS-MIB to other MIB modules
17.3.19 Relationship of the IEEE8021-SPB-MIB to other MIB modules
17.3.20 Relationship of the IEEE8021-EVB-MIB to other MIB modules
17.3.21 Relationship of the IEEE8021-ECMP-MIB to other MIB modules
17.3.22 Relationship of the IEEE8021-ST-MIB to other MIB modules <\/td>\n<\/tr>\n
685<\/td>\n17.3.23 Relationship of the IEEE8021-Preemption-MIB to other MIB modules
17.3.24 Relationship of IEEE8021-PSFP-MIB to other MIB modules
17.3.25 Relationship of IEEE8021-TSN-REMOTE-MANAGEMENT-MIB to other MIB modules
17.4 Security considerations
17.4.1 Security considerations of the IEEE8021-TC-MIB <\/td>\n<\/tr>\n
686<\/td>\n17.4.2 Security considerations of the IEEE8021-BRIDGE-MIB <\/td>\n<\/tr>\n
687<\/td>\n17.4.3 Security considerations of the IEEE8021-SPANNING-TREE MIB
17.4.4 Security considerations of the IEEE8021-Q-BRIDGE-MIB <\/td>\n<\/tr>\n
688<\/td>\n17.4.5 Security considerations of the IEEE8021-PB-MIB
17.4.6 Security considerations of the IEEE8021-MSTP-MIB <\/td>\n<\/tr>\n
689<\/td>\n17.4.7 Security considerations of the IEEE8021-CFM-MIB <\/td>\n<\/tr>\n
691<\/td>\n17.4.8 Security considerations of the IEEE8021-PBB-MIB <\/td>\n<\/tr>\n
692<\/td>\n17.4.9 Security considerations of the IEEE8021-DDCFM-MIB
17.4.10 Security considerations of the IEEE8021-PBBTE-MIB <\/td>\n<\/tr>\n
693<\/td>\n17.4.11 Security considerations of the IEEE8021-TPMR-MIB
17.4.12 Security considerations of the IEEE8021-FQTSS-MIB <\/td>\n<\/tr>\n
694<\/td>\n17.4.13 Security considerations of the IEEE8021-CN-MIB <\/td>\n<\/tr>\n
696<\/td>\n17.4.14 Security considerations of the IEEE8021-SRP-MIB
17.4.15 Security considerations of the IEEE8021-MVRPX-MIB <\/td>\n<\/tr>\n
697<\/td>\n17.4.16 Security considerations of the IEEE8021-MIRP-MIB
17.4.17 Security considerations of the IEEE8021-PFC-MIB
17.4.18 Security considerations of the IEEE8021-TEIPS-MIB <\/td>\n<\/tr>\n
698<\/td>\n17.4.19 Security considerations of the IEEE8021-SPB-MIB
17.4.20 Security considerations of the IEEE8021-EVB-MIB <\/td>\n<\/tr>\n
700<\/td>\n17.4.21 Security considerations of the IEEE8021-ECMP-MIB
17.4.22 Security considerations of the IEEE8021-ST-MIB <\/td>\n<\/tr>\n
701<\/td>\n17.4.23 Security considerations of the IEEE8021-Preemption-MIB
17.4.24 Security considerations of the IEEE8021-PSFP-MIB <\/td>\n<\/tr>\n
703<\/td>\n17.4.25 Security considerations of the IEEE8021-TSN-REMOTE-MANAGEMENT-MIB <\/td>\n<\/tr>\n
704<\/td>\n17.5 Dynamic component and Port creation
17.5.1 Overview of the dynamically created Bridge entities
17.5.1.1 Components
17.5.1.2 Bridge Ports
17.5.1.3 Internal LAN connections <\/td>\n<\/tr>\n
705<\/td>\n17.5.1.4 Provider Instance Ports (PIPs)
17.5.2 Component creation
17.5.2.1 MAC Bridge component creation
17.5.2.2 C-VLAN component creation
17.5.2.3 S-VLAN component creation <\/td>\n<\/tr>\n
706<\/td>\n17.5.2.4 B-component creation
17.5.2.5 I-component creation
17.5.2.6 ER creation
17.5.2.7 T-component creation
17.5.3 Port creation
17.5.3.1 Port creation on MAC Bridge components <\/td>\n<\/tr>\n
707<\/td>\n17.5.3.2 Port creation on C-VLAN components
17.5.3.2.1 Creating C-VLAN Ports
17.5.3.2.2 Creating SBPs <\/td>\n<\/tr>\n
708<\/td>\n17.5.3.2.3 Creating CEPs
17.5.3.2.4 Creating PEPs
17.5.3.3 Port creation on S-VLAN components
17.5.3.3.1 Creating PNPs <\/td>\n<\/tr>\n
709<\/td>\n17.5.3.3.2 Creating CNPs <\/td>\n<\/tr>\n
710<\/td>\n17.5.3.3.3 Creating a CEP
17.5.3.3.4 Creating an RCAP <\/td>\n<\/tr>\n
711<\/td>\n17.5.3.3.5 Creating an Uplink Access Port (UAP) <\/td>\n<\/tr>\n
712<\/td>\n17.5.3.4 Port creation on B-components
17.5.3.4.1 Creating PNPs
17.5.3.4.2 Creating CBPs <\/td>\n<\/tr>\n
713<\/td>\n17.5.3.5 Port creation on I-components
17.5.3.5.1 Creating CNPs
17.5.3.5.2 Creating VIPs <\/td>\n<\/tr>\n
714<\/td>\n17.5.3.5.3 Creating PIPs
17.5.3.6 Required post creation operations <\/td>\n<\/tr>\n
715<\/td>\n17.5.3.7 Port creation on ERs
17.5.3.7.1 Creating DRPs
17.5.3.7.2 Creating URPs <\/td>\n<\/tr>\n
716<\/td>\n17.6 MIB operations for service interface configuration
17.6.1 Provisioning PBN service interfaces <\/td>\n<\/tr>\n
717<\/td>\n17.6.1.1 Provisioning a Port-based service interface
17.6.1.2 Provisioning a C-tagged service interface <\/td>\n<\/tr>\n
718<\/td>\n17.6.1.3 Provisioning an S-tagged service interface <\/td>\n<\/tr>\n
719<\/td>\n17.6.2 Provisioning Backbone Bridged Network service interfaces <\/td>\n<\/tr>\n
722<\/td>\n17.6.2.1 Service type-independent provisioning of the B-component
17.6.2.2 Service type-independent provisioning of the I-component
17.6.2.2.1 Configuring the ieee8021PbbVipTable
17.6.2.2.2 Configuring the ieee8021PbbPipTable <\/td>\n<\/tr>\n
723<\/td>\n17.6.2.3 Service-dependent provisioning for an I-tagged service interface
17.6.2.4 Service-dependent provisioning a Port-based service interface
17.6.2.4.1 Configuring the B-component
17.6.2.4.2 Configuring the Port operating modes and I-component VID <\/td>\n<\/tr>\n
724<\/td>\n17.6.2.5 Service-dependent provisioning for an S-tagged service interfaces
17.6.2.5.1 Configuring the B-component
17.6.2.5.2 Configuring the I-component for S-tagged service interfaces <\/td>\n<\/tr>\n
725<\/td>\n17.7 MIB modules
17.7.1 Definitions for the IEEE8021-TC-MIB module <\/td>\n<\/tr>\n
734<\/td>\n17.7.2 Definitions for the IEEE8021-BRIDGE-MIB module <\/td>\n<\/tr>\n
767<\/td>\n17.7.3 Definitions for the IEEE8021-SPANNING-TREE-MIB module <\/td>\n<\/tr>\n
782<\/td>\n17.7.4 Definitions for the IEEE8021-Q-BRIDGE-MIB module <\/td>\n<\/tr>\n
820<\/td>\n17.7.5 Definitions for the IEEE8021-PB-MIB module <\/td>\n<\/tr>\n
835<\/td>\n17.7.6 Definitions for the IEEE8021-MSTP-MIB module <\/td>\n<\/tr>\n
859<\/td>\n17.7.7 Definitions for the CFM MIB modules
17.7.7.1 Definitions for the IEEE8021-CFM-MIB module <\/td>\n<\/tr>\n
913<\/td>\n17.7.7.2 Definitions for the IEEE8021-CFM-V2-MIB module <\/td>\n<\/tr>\n
927<\/td>\n17.7.8 Definitions for the IEEE8021-PBB-MIB module <\/td>\n<\/tr>\n
946<\/td>\n17.7.9 Definitions for the IEEE8021-DDCFM-MIB module <\/td>\n<\/tr>\n
961<\/td>\n17.7.10 Definitions for the IEEE8021-PBBTE-MIB module <\/td>\n<\/tr>\n
975<\/td>\n17.7.11 Definitions for the IEEE8021-TPMR-MIB module <\/td>\n<\/tr>\n
987<\/td>\n17.7.12 Definitions for the IEEE8021-FQTSS-MIB module <\/td>\n<\/tr>\n
999<\/td>\n17.7.13 Definitions for the IEEE8021-CN-MIB module <\/td>\n<\/tr>\n
1029<\/td>\n17.7.14 Definitions for the IEEE8021-SRP-MIB module <\/td>\n<\/tr>\n
1047<\/td>\n17.7.15 Definitions for the IEEE8021-MVRPX-MIB module <\/td>\n<\/tr>\n
1051<\/td>\n17.7.16 Definitions for the IEEE8021-MIRP-MIB module <\/td>\n<\/tr>\n
1056<\/td>\n17.7.17 Definitions for the IEEE8021-PFC-MIB module <\/td>\n<\/tr>\n
1059<\/td>\n17.7.18 Definitions for the IEEE8021-TEIPS-V2-MIB module <\/td>\n<\/tr>\n
1071<\/td>\n17.7.19 Definitions for the IEEE8021-SPB-MIB module <\/td>\n<\/tr>\n
1107<\/td>\n17.7.20 Definitions for the IEEE8021-EVB-MIB module <\/td>\n<\/tr>\n
1131<\/td>\n17.7.21 Definitions for the IEEE8021-ECMP-MIB module <\/td>\n<\/tr>\n
1138<\/td>\n17.7.22 Definitions for the IEEE8021-ST-MIB module <\/td>\n<\/tr>\n
1149<\/td>\n17.7.23 Definitions for the IEEE8021-Preemption-MIB module <\/td>\n<\/tr>\n
1154<\/td>\n17.7.24 Definitions for the IEEE8021-PSFP-MIB module <\/td>\n<\/tr>\n
1174<\/td>\n17.7.25 Definitions for the IEEE8021-TSN-REMOTE-MANAGEMENT-MIB module <\/td>\n<\/tr>\n
1183<\/td>\n18. Principles of Connectivity Fault Management operation <\/td>\n<\/tr>\n
1184<\/td>\n18.1 Maintenance Domains and DoSAPs <\/td>\n<\/tr>\n
1186<\/td>\n18.2 Service instances and MAs <\/td>\n<\/tr>\n
1187<\/td>\n18.3 Maintenance Domain Levels <\/td>\n<\/tr>\n
1191<\/td>\n19. CFM entity operation
19.1 Maintenance Points (MPs)
19.2 MA Endpoints (MEPs)
19.2.1 MEP identification <\/td>\n<\/tr>\n
1193<\/td>\n19.2.2 MEP functions
19.2.3 MEP architecture <\/td>\n<\/tr>\n
1195<\/td>\n19.2.4 MP Type Demultiplexer
19.2.5 MP Multiplexer
19.2.6 MP Level Demultiplexer
19.2.7 MP OpCode Demultiplexer
19.2.8 MEP Continuity Check Receiver <\/td>\n<\/tr>\n
1196<\/td>\n19.2.9 MEP Continuity Check Initiator
19.2.10 MP Loopback Responder <\/td>\n<\/tr>\n
1197<\/td>\n19.2.11 MEP Loopback Initiator
19.2.12 MEP Linktrace Initiator
19.2.13 MEP LTI SAP
19.2.14 MEP Linktrace SAP
19.2.15 MEP CCM Database
19.2.16 MEP Fault Notification Generator
19.2.17 MEP Decapsulator Responder (DR) <\/td>\n<\/tr>\n
1198<\/td>\n19.2.18 MEP RFM Receiver
19.3 MIP Half Function
19.3.1 MHF identification
19.3.2 MHF functions <\/td>\n<\/tr>\n
1199<\/td>\n19.3.3 MHF architecture
19.3.4 MHF Level Demultiplexer <\/td>\n<\/tr>\n
1200<\/td>\n19.3.5 MHF Type Demultiplexer
19.3.6 MHF OpCode Demultiplexer
19.3.7 MHF Multiplexer
19.3.8 MHF Loopback Responder
19.3.9 MHF Continuity Check Receiver
19.3.10 MIP CCM Database
19.3.11 MHF Linktrace SAP
19.3.12 MHF DR
19.3.13 MHF RFM Receiver <\/td>\n<\/tr>\n
1201<\/td>\n19.4 MP addressing
19.5 Linktrace Output Multiplexer (LOM) <\/td>\n<\/tr>\n
1202<\/td>\n19.6 Linktrace Responder <\/td>\n<\/tr>\n
1204<\/td>\n20. CFM protocols <\/td>\n<\/tr>\n
1205<\/td>\n20.1 Continuity Check protocol <\/td>\n<\/tr>\n
1207<\/td>\n20.1.1 MAC status reporting in the CCM
20.1.2 Defects and Fault Alarms
20.1.3 CCM reception <\/td>\n<\/tr>\n
1208<\/td>\n20.2 Loopback protocol
20.2.1 LBM transmission <\/td>\n<\/tr>\n
1209<\/td>\n20.2.2 LBM reception and LBR transmission <\/td>\n<\/tr>\n
1210<\/td>\n20.2.3 LBR reception
20.3 Linktrace protocol <\/td>\n<\/tr>\n
1211<\/td>\n20.3.1 LTM origination <\/td>\n<\/tr>\n
1212<\/td>\n20.3.2 LTM reception, forwarding, and replying <\/td>\n<\/tr>\n
1213<\/td>\n20.3.3 LTR reception <\/td>\n<\/tr>\n
1214<\/td>\n20.4 CFM state machines
20.5 CFM state machine timers
20.5.1 LTFwhile
20.5.2 CCIwhile <\/td>\n<\/tr>\n
1215<\/td>\n20.5.3 errorCCMwhile <\/td>\n<\/tr>\n
1216<\/td>\n20.5.4 xconCCMwhile
20.5.5 LBIwhile
20.5.6 FNGwhile
20.5.7 mmCCMwhile
20.5.8 mmLocwhile
20.5.9 mmFNGwhile
20.5.10 rMEPwhile
20.6 CFM procedures
20.6.1 CCMtime() <\/td>\n<\/tr>\n
1217<\/td>\n20.7 Maintenance Domain variable
20.7.1 mdLevel
20.8 MA variables
20.8.1 CCMinterval
20.9 MEP variables <\/td>\n<\/tr>\n
1218<\/td>\n20.9.1 MEPactive
20.9.2 enableRmepDefect
20.9.3 MAdefectIndication <\/td>\n<\/tr>\n
1219<\/td>\n20.9.4 allRMEPsDead
20.9.5 lowestAlarmPri
20.9.6 presentRDI
20.9.7 MEPprimaryVID
20.9.8 presentTraffic
20.9.9 presentmmLoc
20.9.10 ISpresentTraffic
20.9.11 ISpresentmmLoc <\/td>\n<\/tr>\n
1220<\/td>\n20.9.12 EpMEP
20.10 MEP Continuity Check Initiator variables
20.10.1 CCIenabled
20.10.2 CCIsentCCMs
20.10.3 MACstatusChanged
20.10.4 Npaths
20.10.5 flowHash[ ]
20.10.6 pathN <\/td>\n<\/tr>\n
1221<\/td>\n20.10.7 CCMcnt
20.11 MEP Continuity Check Initiator procedures
20.11.1 xmitCCM() <\/td>\n<\/tr>\n
1222<\/td>\n20.12 MEP Continuity Check Initiator state machine
20.13 MHF Continuity Check Receiver variables
20.13.1 MHFrecvdCCM
20.13.2 MHFCCMPDU <\/td>\n<\/tr>\n
1223<\/td>\n20.14 MHF Continuity Check Receiver procedures
20.14.1 MHFprocessCCM()
20.15 MHF Continuity Check Receiver state machine
20.16 MEP Continuity Check Receiver variables <\/td>\n<\/tr>\n
1224<\/td>\n20.16.1 CCMreceivedEqual
20.16.2 CCMequalPDU
20.16.3 CCMreceivedLow
20.16.4 CCMlowPDU
20.16.5 recvdMacAddress
20.16.6 recvdRDI
20.16.7 recvdInterval
20.16.8 recvdPortState
20.16.9 recvdInterfaceStatus <\/td>\n<\/tr>\n
1225<\/td>\n20.16.10 recvdSenderId
20.16.11 recvdFrame
20.16.12 CCMsequenceErrors
20.16.13 rcvdTrafficBit
20.17 MEP Continuity Check Receiver procedures
20.17.1 MEPprocessEqualCCM() <\/td>\n<\/tr>\n
1226<\/td>\n20.17.2 MEPprocessLowCCM()
20.18 MEP Continuity Check Receiver state machine
20.19 Remote MEP variables <\/td>\n<\/tr>\n
1227<\/td>\n20.19.1 rMEPCCMdefect
20.19.2 rMEPlastRDI and rMEPlastRDI[i]
20.19.3 rMEPlastPortState
20.19.4 rMEPlastInterfaceStatus <\/td>\n<\/tr>\n
1228<\/td>\n20.19.5 rMEPlastSenderId
20.19.6 rCCMreceived
20.19.7 rMEPmacAddress
20.19.8 rMEPportStatusDefect
20.19.9 rMEPinterfaceStatusDefect
20.19.10 lastPathN
20.20 Remote MEP state machine
20.21 Remote MEP Error variables <\/td>\n<\/tr>\n
1229<\/td>\n20.21.1 errorCCMreceived
20.21.2 errorCCMlastFailure <\/td>\n<\/tr>\n
1230<\/td>\n20.21.3 errorCCMdefect
20.22 Remote MEP Error state machine
20.23 MEP Cross Connect variables
20.23.1 xconCCMreceived
20.23.2 xconCCMlastFailure <\/td>\n<\/tr>\n
1231<\/td>\n20.23.3 xconCCMdefect
20.24 MEP Cross Connect state machine
20.25 MEP Mismatch variables
20.25.1 mmCCMreceived <\/td>\n<\/tr>\n
1232<\/td>\n20.25.2 mmCCMdefect
20.25.3 mmCCMTime
20.25.4 disableLocdefect
20.25.5 mmLocdefect
20.26 MEP Mismatch state machines
20.27 MP Loopback Responder variables
20.27.1 LBMreceived <\/td>\n<\/tr>\n
1233<\/td>\n20.27.2 LBMPDU <\/td>\n<\/tr>\n
1234<\/td>\n20.28 MP Loopback Responder procedures
20.28.1 ProcessLBM()
20.28.2 xmitLBR() <\/td>\n<\/tr>\n
1235<\/td>\n20.29 MP Loopback Responder state machine
20.30 MEP Loopback Initiator variables <\/td>\n<\/tr>\n
1236<\/td>\n20.30.1 LBMsToSend
20.30.2 nextLBMtransID
20.30.3 expectedLBRtransID
20.30.4 LBIactive
20.30.5 xmitReady
20.30.6 LBRreceived
20.30.7 LBRPDU
20.31 MEP Loopback Initiator transmit procedures <\/td>\n<\/tr>\n
1237<\/td>\n20.31.1 xmitLBM()
20.32 MEP Loopback Initiator transmit state machine
20.33 MEP Loopback Initiator receive procedures <\/td>\n<\/tr>\n
1238<\/td>\n20.33.1 ProcessLBR() <\/td>\n<\/tr>\n
1239<\/td>\n20.34 MEP Loopback Initiator receive state machine
20.35 MEP Fault Notification Generator variables
20.35.1 fngPriority
20.35.2 fngDefect
20.35.3 fngAlarmTime <\/td>\n<\/tr>\n
1240<\/td>\n20.35.4 fngResetTime
20.35.5 someRMEPCCMdefect
20.35.6 someMACstatusDefect
20.35.7 someRDIdefect
20.35.8 highestDefectPri
20.35.9 highestDefect
20.36 MEP Fault Notification Generator procedures <\/td>\n<\/tr>\n
1241<\/td>\n20.36.1 xmitFaultAlarm()
20.37 MEP Fault Notification Generator state machine
20.38 MEP Mismatch Fault Notification Generator variables <\/td>\n<\/tr>\n
1242<\/td>\n20.38.1 mfngAllowed
20.38.2 mmdefectIndication
20.38.3 mfngAlarmTime
20.38.4 mfngResetTime
20.39 MEP Mismatch Fault Notification Generator procedures
20.39.1 xmitFaultAlarm()
20.40 MEP Mismatch Fault Notification Generator state machine
20.41 MEP Linktrace Initiator variables <\/td>\n<\/tr>\n
1243<\/td>\n20.41.1 nextLTMtransID
20.41.2 ltmReplyList <\/td>\n<\/tr>\n
1244<\/td>\n20.41.2.1 ltrFlags
20.41.2.2 ltrReplyTTL
20.41.2.3 ltrLastEgressId
20.41.2.4 ltrNextEgressId
20.41.2.5 ltrRelayAction
20.41.2.6 ltrIngressAction
20.41.2.7 ltrIngressAddress
20.41.2.8 ltrIngressPortIdSubtype <\/td>\n<\/tr>\n
1245<\/td>\n20.41.2.9 ltrIngressPortId
20.41.2.10 ltrEgressAction
20.41.2.11 ltrEgressAddress
20.41.2.12 ltrEgressPortIdSubtype
20.41.2.13 ltrEgressPortId
20.41.2.14 ltrSenderIdTlv
20.41.2.15 ltrOrgSpecTlv
20.42 MEP Linktrace Initiator procedures
20.42.1 xmitLTM() <\/td>\n<\/tr>\n
1246<\/td>\n20.43 MEP Linktrace Initiator receive variables
20.43.1 LTRreceived
20.43.2 LTRPDU
20.44 MEP Linktrace Initiator receive procedures <\/td>\n<\/tr>\n
1247<\/td>\n20.44.1 ProcessLTR()
20.45 MEP Linktrace Initiator receive state machine
20.46 Linktrace Responder variables
20.46.1 nPendingLTRs <\/td>\n<\/tr>\n
1248<\/td>\n20.46.2 LTMreceived
20.46.3 LTMPDU
20.47 LTM Receiver procedures
20.47.1 ProcessLTM()
20.47.1.1 LTM paths through a Bridge <\/td>\n<\/tr>\n
1249<\/td>\n20.47.1.2 Ingress Port, vlan_identifier, and Egress Port determination <\/td>\n<\/tr>\n
1250<\/td>\n20.47.1.3 LTM is received by a Down MEP <\/td>\n<\/tr>\n
1251<\/td>\n20.47.1.4 LTM is received by a Down MHF or originated by an Up MEP <\/td>\n<\/tr>\n
1252<\/td>\n20.47.1.5 LTM is received by an Up MEP
20.47.1.6 LTM is received by an Up MHF
20.47.2 clearPendingLTRs()
20.47.3 ForwardLTM() <\/td>\n<\/tr>\n
1253<\/td>\n20.47.4 enqueLTR() <\/td>\n<\/tr>\n
1255<\/td>\n20.48 LTM Receiver state machine
20.49 LTR Transmitter procedure
20.49.1 xmitOldestLTR()
20.50 LTR Transmitter state machine
20.51 CFM PDU validation and versioning <\/td>\n<\/tr>\n
1256<\/td>\n20.51.1 Goals of CFM PDU versioning
20.51.2 PDU transmission <\/td>\n<\/tr>\n
1257<\/td>\n20.51.3 PDU validation
20.51.4 Validation pass
20.51.4.1 Validation pass operations required of an MP Level Demultiplexer
20.51.4.2 Validation pass operations required of MP components <\/td>\n<\/tr>\n
1258<\/td>\n20.51.4.3 Validation pass operations required of some receiving MP components
20.51.5 Execution pass <\/td>\n<\/tr>\n
1259<\/td>\n20.51.6 Future extensions
20.52 PDU identification
20.53 Use of transaction IDs and sequence numbers <\/td>\n<\/tr>\n
1261<\/td>\n21. Encoding of CFM PDUs
21.1 Structure, representation, and encoding
21.2 CFM encapsulation <\/td>\n<\/tr>\n
1262<\/td>\n21.3 CFM request and indication parameters
21.3.1 destination_address parameter
21.3.2 source_address parameter
21.4 Common CFM Header
21.4.1 MD Level
21.4.2 Version <\/td>\n<\/tr>\n
1263<\/td>\n21.4.3 OpCode
21.4.4 Flags <\/td>\n<\/tr>\n
1264<\/td>\n21.4.5 First TLV Offset
21.5 TLV format
21.5.1 General format for CFM TLVs
21.5.1.1 Type
21.5.1.2 Length
21.5.1.3 Value
21.5.2 Organization-Specific TLV <\/td>\n<\/tr>\n
1266<\/td>\n21.5.3 Sender ID TLV
21.5.3.1 Chassis ID Length
21.5.3.2 Chassis ID Subtype
21.5.3.3 Chassis ID
21.5.3.4 Management Address Domain Length <\/td>\n<\/tr>\n
1267<\/td>\n21.5.3.5 Management Address Domain
21.5.3.6 Management Address Length
21.5.3.7 Management Address
21.5.4 Port Status TLV <\/td>\n<\/tr>\n
1268<\/td>\n21.5.5 Interface Status TLV <\/td>\n<\/tr>\n
1269<\/td>\n21.5.6 Data TLV
21.5.7 End TLV
21.6 CCM format <\/td>\n<\/tr>\n
1270<\/td>\n21.6.1 Flags
21.6.1.1 RDI
21.6.1.2 Reserved
21.6.1.3 CCM Interval
21.6.1.4 Traffic field <\/td>\n<\/tr>\n
1271<\/td>\n21.6.2 First TLV Offset
21.6.3 Sequence Number
21.6.4 Maintenance association Endpoint Identifier
21.6.5 Maintenance Association Identifier <\/td>\n<\/tr>\n
1272<\/td>\n21.6.5.1 Maintenance Domain Name Format
21.6.5.2 Maintenance Domain Name Length <\/td>\n<\/tr>\n
1273<\/td>\n21.6.5.3 Maintenance Domain Name
21.6.5.4 Short MA Name Format <\/td>\n<\/tr>\n
1274<\/td>\n21.6.5.5 Short MA Name Length
21.6.5.6 Short MA Name
21.6.6 Defined by ITU-T G.8013\/Y.1731
21.6.7 Optional CCM TLVs
21.7 LBM and LBR formats <\/td>\n<\/tr>\n
1275<\/td>\n21.7.1 Flags
21.7.2 First TLV Offset
21.7.3 Loopback Transaction Identifier
21.7.4 Additional LBM\/LBR TLVs
21.7.5 PBB-TE MIP TLV <\/td>\n<\/tr>\n
1276<\/td>\n21.7.5.1 MIP MAC address
21.7.5.2 Reverse VID
21.7.5.3 Reverse MAC
21.8 LTM format <\/td>\n<\/tr>\n
1277<\/td>\n21.8.1 Flags
21.8.2 First TLV Offset
21.8.3 LTM Transaction Identifier
21.8.4 LTM TTL
21.8.5 Original MAC Address
21.8.6 Target MAC Address <\/td>\n<\/tr>\n
1278<\/td>\n21.8.7 Additional LTM TLVs
21.8.8 LTM Egress Identifier TLV
21.9 LTR format
21.9.1 Flags <\/td>\n<\/tr>\n
1279<\/td>\n21.9.2 First TLV Offset
21.9.3 LTR Transaction Identifier
21.9.4 Reply TTL <\/td>\n<\/tr>\n
1280<\/td>\n21.9.5 Relay Action
21.9.6 Additional LTR TLVs
21.9.7 LTR Egress Identifier TLV <\/td>\n<\/tr>\n
1281<\/td>\n21.9.7.1 Last Egress Identifier
21.9.7.2 Next Egress Identifier
21.9.8 Reply Ingress TLV
21.9.8.1 Ingress Action
21.9.8.2 Ingress MAC Address <\/td>\n<\/tr>\n
1282<\/td>\n21.9.8.3 Ingress Port ID Length
21.9.8.4 Ingress Port ID Subtype
21.9.8.5 Ingress Port ID
21.9.9 Reply Egress TLV
21.9.9.1 Egress Action <\/td>\n<\/tr>\n
1283<\/td>\n21.9.9.2 Egress MAC Address
21.9.9.3 Egress Port ID Length
21.9.9.4 Egress Port ID Subtype
21.9.9.5 Egress Port ID <\/td>\n<\/tr>\n
1284<\/td>\n22. CFM in systems
22.1 CFM shims in Bridges
22.1.1 Preliminary positioning of MPs <\/td>\n<\/tr>\n
1285<\/td>\n22.1.2 CFM and the Forwarding Process <\/td>\n<\/tr>\n
1287<\/td>\n22.1.3 Up\/Down separation of MPs <\/td>\n<\/tr>\n
1289<\/td>\n22.1.4 Service instances over multiple Bridges <\/td>\n<\/tr>\n
1291<\/td>\n22.1.5 Multiple VID service instances
22.1.6 Untagged CFM PDUs
22.1.7 MPs and non-VLAN-aware Bridges <\/td>\n<\/tr>\n
1292<\/td>\n22.1.8 MPs and other standards <\/td>\n<\/tr>\n
1294<\/td>\n22.1.9 CFM and IEEE 802.3 OAM
22.2 Maintenance Entity creation <\/td>\n<\/tr>\n
1295<\/td>\n22.2.1 Creating Maintenance Domains and MAs
22.2.2 Creating MEPs <\/td>\n<\/tr>\n
1297<\/td>\n22.2.3 Creating MIPs <\/td>\n<\/tr>\n
1298<\/td>\n22.2.4 CFM configuration errors <\/td>\n<\/tr>\n
1299<\/td>\n22.3 MPs, Ports, and MD Level assignment
22.4 Stations and CFM <\/td>\n<\/tr>\n
1300<\/td>\n22.5 Scalability of CFM <\/td>\n<\/tr>\n
1301<\/td>\n22.6 CFM in Provider Bridges
22.6.1 MPs and C-VLAN components
22.6.2 Maintenance C-VLAN on a Port-based service interface <\/td>\n<\/tr>\n
1303<\/td>\n22.6.3 Maintenance C-VLAN on a C-tagged service interface
22.6.4 MPs and Port-mapping S-VLAN components <\/td>\n<\/tr>\n
1305<\/td>\n22.7 Management Port MEPs and CFM in the enterprise environment <\/td>\n<\/tr>\n
1307<\/td>\n22.8 Implementing CFM on Bridges that implement earlier revisions of IEEE Std 802.1Q <\/td>\n<\/tr>\n
1308<\/td>\n23. MAC status propagation <\/td>\n<\/tr>\n
1310<\/td>\n23.1 Model of operation <\/td>\n<\/tr>\n
1311<\/td>\n23.1.1 MAC Status Shim (MSS)
23.1.2 Relationship of CFM to the MSS
23.2 MAC Status Protocol (MSP) overview <\/td>\n<\/tr>\n
1316<\/td>\n23.3 MSP state machines <\/td>\n<\/tr>\n
1317<\/td>\n23.4 State machine timers
23.4.1 linkNotifyWhen
23.4.2 linkNotifyWhile
23.4.3 macNotifyWhile
23.4.4 macRecoverWhile
23.5 MSP performance parameters <\/td>\n<\/tr>\n
1318<\/td>\n23.5.1 LinkNotify
23.5.2 LinkNotifyWait
23.5.3 LinkNotifyRetry
23.5.4 MACNotify
23.5.5 MACNotifyTime
23.5.6 MACRecoverTime
23.6 State machine variables
23.6.1 BEGIN
23.6.2 addConfirmed
23.6.3 disableMAC
23.6.4 disabledMAC
23.6.5 disableMSS
23.6.6 lossConfirmed <\/td>\n<\/tr>\n
1319<\/td>\n23.6.7 macOperational
23.6.8 mssOperational
23.6.9 prop
23.6.10 rxAck
23.6.11 rxAdd
23.6.12 rxAddConfirm
23.6.13 rxLoss
23.6.14 rxLossConfirm
23.6.15 txAck
23.6.16 txAdd
23.6.17 txAddConfirm
23.6.18 txLoss
23.6.19 txLossConfirm <\/td>\n<\/tr>\n
1320<\/td>\n23.7 State machine procedures
23.8 Status Transition state machine (STM)
23.9 Status Notification state machine (SNM)
23.10 Receive Process
23.11 Transmit Process <\/td>\n<\/tr>\n
1321<\/td>\n23.12 Management of MSP <\/td>\n<\/tr>\n
1322<\/td>\n23.13 MSPDU transmission, addressing, and protocol identification
23.13.1 Destination MAC Address
23.13.2 Source MAC Address
23.13.3 Priority
23.13.4 EtherType use and encoding <\/td>\n<\/tr>\n
1323<\/td>\n23.14 Representation and encoding of octets
23.15 MSPDU structure
23.15.1 Protocol Version
23.15.2 Packet Type <\/td>\n<\/tr>\n
1324<\/td>\n23.16 Validation of received MSPDUs
23.17 Other MSP participants <\/td>\n<\/tr>\n
1325<\/td>\n24. Bridge performance
24.1 Guaranteed Port Filtering Rate
24.2 Guaranteed Bridge Relaying Rate
24.3 RSTP performance requirements <\/td>\n<\/tr>\n
1327<\/td>\n25. Support of the MAC Service by PBBNs <\/td>\n<\/tr>\n
1329<\/td>\n25.1 Service transparency
25.2 Customer service interface <\/td>\n<\/tr>\n
1330<\/td>\n25.3 Port-based service interface <\/td>\n<\/tr>\n
1331<\/td>\n25.4 S-tagged service interface <\/td>\n<\/tr>\n
1333<\/td>\n25.5 I-tagged service interface <\/td>\n<\/tr>\n
1335<\/td>\n25.6 Service instance segregation
25.7 Service instance selection and identification
25.8 Service priority and drop eligibility selection <\/td>\n<\/tr>\n
1336<\/td>\n25.9 Service access protection <\/td>\n<\/tr>\n
1338<\/td>\n25.9.1 Class II redundant LANs access protection
25.9.2 Class III simple redundant LANs and nodes access protection <\/td>\n<\/tr>\n
1339<\/td>\n25.10 Support of the MAC Service by a PBB-TE Region <\/td>\n<\/tr>\n
1340<\/td>\n25.10.1 Provisioning TESIs <\/td>\n<\/tr>\n
1342<\/td>\n25.10.2 ESP forwarding behavior <\/td>\n<\/tr>\n
1343<\/td>\n25.11 Transparent service interface <\/td>\n<\/tr>\n
1345<\/td>\n26. Principles of Provider Backbone Bridged Network (PBBN) operation
26.1 PBBN overview <\/td>\n<\/tr>\n
1346<\/td>\n26.2 PBBN example <\/td>\n<\/tr>\n
1348<\/td>\n26.3 B-VLAN connectivity
26.4 Backbone addressing <\/td>\n<\/tr>\n
1349<\/td>\n26.4.1 Learning individual backbone addresses at a PIP <\/td>\n<\/tr>\n
1350<\/td>\n26.4.2 Translating backbone destination addresses at a CBP
26.4.3 Backbone addressing considerations for CFM MPs <\/td>\n<\/tr>\n
1351<\/td>\n26.5 Detection of connectivity loops through attached networks
26.6 Scaling of PBBs
26.6.1 Hierarchal PBBNs <\/td>\n<\/tr>\n
1352<\/td>\n26.6.2 Peer PBBNs
26.7 Network management
26.8 CFM in PBBs <\/td>\n<\/tr>\n
1357<\/td>\n26.8.1 CFM over Port-based and S-tagged service interfaces <\/td>\n<\/tr>\n
1358<\/td>\n26.8.2 CFM over I-tagged Service Interfaces
26.8.3 CFM over hierarchal E-NNI <\/td>\n<\/tr>\n
1359<\/td>\n26.8.4 CFM over peer E-NNI
26.9 CFM in a PBB-TE Region <\/td>\n<\/tr>\n
1360<\/td>\n26.9.1 Addressing PBB-TE MEPs
26.9.2 TESI identification
26.9.3 PBB-TE MEP placement in a Bridge Port <\/td>\n<\/tr>\n
1361<\/td>\n26.9.4 PBB-TE MIP placement in a Bridge Port
26.9.5 TESI Maintenance Domains
26.9.6 PBB-TE enhancements of the CFM protocols
26.9.6.1 Continuity Check protocol in a PBB-TE MA <\/td>\n<\/tr>\n
1362<\/td>\n26.9.6.2 Loopback protocol in a PBB-TE MA <\/td>\n<\/tr>\n
1363<\/td>\n26.9.6.3 Linktrace protocol in a PBB-TE MA
26.9.7 Addressing Infrastructure Segment MEPs <\/td>\n<\/tr>\n
1364<\/td>\n26.9.8 Infrastructure Segment identification
26.9.9 Infrastructure Segment MEP placement in a Bridge Port <\/td>\n<\/tr>\n
1366<\/td>\n26.9.10 Infrastructure Segment Maintenance Domains
26.9.11 IPS extensions to Continuity Check operation
26.10 Protection switching for point-to-point TESIs
26.10.1 Introduction <\/td>\n<\/tr>\n
1367<\/td>\n26.10.2 1:1 point-to-point TESI protection switching <\/td>\n<\/tr>\n
1370<\/td>\n26.10.3 Protection Switching state machines
26.10.3.1 Notational conventions used in state diagrams
26.10.3.2 State machine timers <\/td>\n<\/tr>\n
1371<\/td>\n26.10.3.2.1 WTRwhile
26.10.3.2.2 HoldOffWhile
26.10.3.3 Protection Switching variables <\/td>\n<\/tr>\n
1372<\/td>\n26.10.3.3.1 BEGIN
26.10.3.3.2 SF
26.10.3.3.3 SFH
26.10.3.3.4 LoP
26.10.3.3.5 FS
26.10.3.3.6 MStoProtection
26.10.3.3.7 MStoWorking <\/td>\n<\/tr>\n
1373<\/td>\n26.10.3.3.8 WTRTime
26.10.3.3.9 HoldOffTime
26.10.3.4 Protection Switching procedures for PBB-TE TESI Protection
26.10.3.4.1 mapDataToWorking()
26.10.3.4.2 mapDataToProtection() <\/td>\n<\/tr>\n
1374<\/td>\n26.10.3.5 Protection Switching state machine diagram <\/td>\n<\/tr>\n
1376<\/td>\n26.11 IPS in PBB-TE Region <\/td>\n<\/tr>\n
1377<\/td>\n26.11.1 Infrastructure Segment monitoring
26.11.2 1:1 IPS <\/td>\n<\/tr>\n
1378<\/td>\n26.11.2.1 Infrastructure Protection Group (IPG)
26.11.2.1.1 Nested IPGs <\/td>\n<\/tr>\n
1379<\/td>\n26.11.2.2 Protection Switching method
26.11.2.3 Hold-off timer <\/td>\n<\/tr>\n
1380<\/td>\n26.11.2.4 Reversion
26.11.2.4.1 Wait-to-restore timer
26.11.2.5 Administrative commands
26.11.3 IPS Control entity <\/td>\n<\/tr>\n
1381<\/td>\n26.11.4 1:1 IPS state machines
26.11.4.1 Procedures referenced by the 1:1 IPS state machines
26.11.4.1.1 mapDataToWorking() <\/td>\n<\/tr>\n
1382<\/td>\n26.11.4.1.2 mapDataToProtection()
26.11.5 M:1 IPS
26.11.5.1 M:1 IPS state machines <\/td>\n<\/tr>\n
1383<\/td>\n26.11.5.2 Notational conventions used in state diagrams
26.11.5.3 State machine timers <\/td>\n<\/tr>\n
1384<\/td>\n26.11.5.3.1 MWTRwhile
26.11.5.4 Variables referenced by M:1 IPS state machines
26.11.5.4.1 BEGIN
26.11.5.4.2 SF
26.11.5.4.3 SFH
26.11.5.4.4 stateChange <\/td>\n<\/tr>\n
1385<\/td>\n26.11.5.4.5 pri
26.11.5.4.6 crntPs
26.11.5.4.7 MWTRTime
26.11.5.4.8 allPsSFH
26.11.5.5 Procedures referenced by M:1 IPS state machines
26.11.5.5.1 highestPriOperPs()
26.11.5.5.2 setPs(n)
26.11.5.6 M:1 Hold-off state machine <\/td>\n<\/tr>\n
1387<\/td>\n26.11.5.7 Protection Segment Selection state machine
26.12 Mismatch defect <\/td>\n<\/tr>\n
1388<\/td>\n26.13 Signaling VLAN registrations among I-components <\/td>\n<\/tr>\n
1389<\/td>\n27. Shortest Path Bridging (SPB) <\/td>\n<\/tr>\n
1391<\/td>\n27.1 Protocol design requirements <\/td>\n<\/tr>\n
1392<\/td>\n27.2 Protocol support <\/td>\n<\/tr>\n
1393<\/td>\n27.3 Protocol design goals
27.4 ISIS-SPB VLAN configuration <\/td>\n<\/tr>\n
1394<\/td>\n27.4.1 SPT Region and ISIS-SPB adjacency determination <\/td>\n<\/tr>\n
1396<\/td>\n27.5 ISIS-SPB information <\/td>\n<\/tr>\n
1397<\/td>\n27.6 Calculating CIST connectivity <\/td>\n<\/tr>\n
1398<\/td>\n27.7 Connectivity between regions in the same domain
27.8 Calculating SPT connectivity <\/td>\n<\/tr>\n
1399<\/td>\n27.8.1 ISIS-SPB overload
27.9 Loop prevention
27.10 SPVID and SPSourceID allocation <\/td>\n<\/tr>\n
1401<\/td>\n27.11 Allocation of VIDs to FIDs <\/td>\n<\/tr>\n
1402<\/td>\n27.12 SPBV SPVID translation
27.13 VLAN topology management <\/td>\n<\/tr>\n
1403<\/td>\n27.14 Individual addresses and SPBM <\/td>\n<\/tr>\n
1404<\/td>\n27.14.1 Loop mitigation
27.14.2 Loop prevention
27.15 SPBM group addressing <\/td>\n<\/tr>\n
1406<\/td>\n27.16 Backbone service instance topology management <\/td>\n<\/tr>\n
1407<\/td>\n27.17 Equal cost shortest paths, ECTs, and load spreading
27.18 Connectivity Fault Management for SPBM
27.18.1 SPBM MA types <\/td>\n<\/tr>\n
1408<\/td>\n27.18.2 SPBM MEP placement in a Bridge Port <\/td>\n<\/tr>\n
1409<\/td>\n27.18.3 SPBM MIP placement in a Bridge Port
27.18.4 SPBM modifications of the CFM protocols
27.18.4.1 Continuity Check protocol in an SPBM MA
27.18.4.2 Loopback protocol in an SPBM MA
27.18.4.3 Linktrace protocol in an SPBM MA <\/td>\n<\/tr>\n
1410<\/td>\n27.19 Using SPBV and SPBM modes
27.19.1 Shortest Path Bridging\u2014VID <\/td>\n<\/tr>\n
1411<\/td>\n27.19.2 Shortest Path Bridging\u2014MAC <\/td>\n<\/tr>\n
1413<\/td>\n27.20 Security considerations <\/td>\n<\/tr>\n
1414<\/td>\n28. ISIS-SPB Link State Protocol
28.1 ISIS-SPB control plane MAC <\/td>\n<\/tr>\n
1415<\/td>\n28.2 Formation and maintenance of ISIS-SPB adjacencies <\/td>\n<\/tr>\n
1416<\/td>\n28.3 Loop prevention
28.4 The Agreement Digest
28.4.1 Agreement Digest Format Identifier <\/td>\n<\/tr>\n
1417<\/td>\n28.4.2 Agreement Digest Format Capabilities
28.4.3 Agreement Digest Convention Identifier
28.4.4 Agreement Digest Convention Capabilities <\/td>\n<\/tr>\n
1418<\/td>\n28.4.5 Agreement Digest Edge Count
28.4.6 The Computed Topology Digest <\/td>\n<\/tr>\n
1419<\/td>\n28.5 Symmetric shortest path tie breaking <\/td>\n<\/tr>\n
1420<\/td>\n28.6 Symmetric ECT framework <\/td>\n<\/tr>\n
1421<\/td>\n28.7 Symmetric ECT <\/td>\n<\/tr>\n
1422<\/td>\n28.8 Symmetric ECT Algorithm details <\/td>\n<\/tr>\n
1423<\/td>\n28.9 ECT Migration
28.9.1 Use of a new ECT Algorithm in SPBV <\/td>\n<\/tr>\n
1424<\/td>\n28.9.2 Use of a new ECT Algorithm in SPBM <\/td>\n<\/tr>\n
1425<\/td>\n28.10 MAC address registration
28.11 Circuit IDs and Port Identifiers
28.12 ISIS-SPB TLVs <\/td>\n<\/tr>\n
1426<\/td>\n28.12.1 MT-Capability TLV
28.12.2 SPB MCID sub-TLV <\/td>\n<\/tr>\n
1427<\/td>\n28.12.3 SPB Digest sub-TLV <\/td>\n<\/tr>\n
1428<\/td>\n28.12.4 SPB Base VLAN-Identifiers sub-TLV <\/td>\n<\/tr>\n
1429<\/td>\n28.12.5 SPB Instance sub-TLV <\/td>\n<\/tr>\n
1430<\/td>\n28.12.6 SPB Instance Opaque ECT Algorithm sub-TLV <\/td>\n<\/tr>\n
1431<\/td>\n28.12.6.1 ECMP ECT Algorithm sub-TLV <\/td>\n<\/tr>\n
1432<\/td>\n28.12.7 SPB Link Metric sub-TLV
28.12.8 SPB Adjacency Opaque ECT Algorithm sub-TLV <\/td>\n<\/tr>\n
1433<\/td>\n28.12.9 SPBV MAC address sub-TLV <\/td>\n<\/tr>\n
1434<\/td>\n28.12.10 SPBM Service Identifier and Unicast Address (ISID-ADDR) sub-TLV <\/td>\n<\/tr>\n
1437<\/td>\n29. DDCFM operations and protocols
29.1 Principles of DDCFM operation
29.1.1 Data-driven and data-dependent faults (DDFs)
29.1.2 Basic principle to diagnose and isolate DDFs
29.1.2.1 Forward path test (FPT) <\/td>\n<\/tr>\n
1439<\/td>\n29.1.2.2 Return path test (RPT)
29.1.2.3 Derived testing scenarios <\/td>\n<\/tr>\n
1440<\/td>\n29.2 DDCFM Entity operation
29.2.1 DDCFM implementation <\/td>\n<\/tr>\n
1441<\/td>\n29.2.2 FPT RR
29.2.2.1 RR Filter <\/td>\n<\/tr>\n
1442<\/td>\n29.2.2.2 RR Encapsulation
29.2.2.3 RR Transmit
29.2.3 RR-related parameters
29.2.3.1 RR identification
29.2.3.2 MA for RR
29.2.3.3 RR Filter definition <\/td>\n<\/tr>\n
1443<\/td>\n29.2.3.4 Sampling interval
29.2.3.5 Continue option
29.2.3.6 Duration for RR to remain active
29.2.3.7 Truncation flag
29.2.4 Reflection Target and RFM Receiver
29.2.5 RPT-related parameters <\/td>\n<\/tr>\n
1444<\/td>\n29.2.6 Decapsulator Responder (DR) <\/td>\n<\/tr>\n
1445<\/td>\n29.2.7 SFM Originator
29.3 DDCFM protocols
29.3.1 RR variables
29.3.1.1 RRcontinue
29.3.1.2 nPendingRFMs <\/td>\n<\/tr>\n
1446<\/td>\n29.3.1.3 dataReceived
29.3.1.4 dataFrame
29.3.1.5 nFilteredFrameList
29.3.1.6 filteredFrameList
29.3.1.7 nextFilteredFrame
29.3.1.8 RRtime
29.3.1.9 RRwhile
29.3.1.10 RRsampInt
29.3.1.11 RRsampWhile
29.3.1.12 RRmaxFrames
29.3.1.13 RRframeCount
29.3.1.14 filterMatched <\/td>\n<\/tr>\n
1447<\/td>\n29.3.1.15 RRactive
29.3.1.16 nextRFMtransID
29.3.1.17 maxDataTLVvalueSize
29.3.1.18 reflectedDataLength
29.3.2 RR Filter procedures
29.3.2.1 forwardFrame()
29.3.2.2 filterFrame()
29.3.2.3 loadFilteredFrameList() <\/td>\n<\/tr>\n
1448<\/td>\n29.3.3 RR Encapsulation procedures
29.3.3.1 processRRencap()
29.3.3.2 splitFilteredFrame()
29.3.3.3 constructRFM() <\/td>\n<\/tr>\n
1449<\/td>\n29.3.4 RR Transmit procedure
29.3.4.1 xmitRFM() <\/td>\n<\/tr>\n
1450<\/td>\n29.3.5 RR-related state machines
29.3.5.1 RR Filter state machine <\/td>\n<\/tr>\n
1451<\/td>\n29.3.5.2 RR Transmit state machine
29.3.6 RFM Receiver variables
29.3.6.1 RFMreceived <\/td>\n<\/tr>\n
1452<\/td>\n29.3.6.2 RFMPDU
29.3.7 RFM Receiver procedure
29.3.7.1 ReceiveRFM()
29.3.7.2 RFM Receiver state machine <\/td>\n<\/tr>\n
1453<\/td>\n29.3.8 DR variables
29.3.8.1 DRwhile
29.3.8.2 DRtime
29.3.8.3 SFMPDU
29.3.8.4 DRactive
29.3.8.5 SFMreceived
29.3.8.6 previousSFMtransId
29.3.8.7 SFMsequenceErrors
29.3.9 DR procedures
29.3.9.1 processSFM() <\/td>\n<\/tr>\n
1454<\/td>\n29.3.9.2 DropSFM() <\/td>\n<\/tr>\n
1455<\/td>\n29.3.10 Decapsulator Responder state machine
29.4 Encoding of DDCFM PDUs
29.4.1 RFM and SFM Header
29.4.2 RFM format
29.4.2.1 Flags
29.4.2.2 First TLV Offset <\/td>\n<\/tr>\n
1456<\/td>\n29.4.2.3 RFM Transaction Identifier
29.4.2.4 Reflected Data TLV
29.4.2.5 Additional RFM TLVs
29.4.3 SFM format
29.4.3.1 Flags
29.4.3.2 First TLV Offset <\/td>\n<\/tr>\n
1457<\/td>\n29.4.3.3 SFM Transaction Identifier
29.4.3.4 SFM Original Data TLV
29.4.3.5 Additional SFM TLVs <\/td>\n<\/tr>\n
1458<\/td>\n30. Principles of congestion notification
30.1 Congestion notification design requirements <\/td>\n<\/tr>\n
1460<\/td>\n30.2 Quantized Congestion Notification protocol (QCN) <\/td>\n<\/tr>\n
1461<\/td>\n30.2.1 The CP algorithm <\/td>\n<\/tr>\n
1462<\/td>\n30.2.2 Basic RP algorithm
30.2.2.1 Rate decreases <\/td>\n<\/tr>\n
1463<\/td>\n30.2.2.2 Rate increases
30.2.3 RP algorithm with timer <\/td>\n<\/tr>\n
1464<\/td>\n30.3 Congestion Controlled Flow (CCF) <\/td>\n<\/tr>\n
1465<\/td>\n30.4 Congestion Notification Priority Value (CNPV)
30.5 Congestion Notification tag (CN-TAG)
30.6 Congestion Notification Domain (CND) <\/td>\n<\/tr>\n
1466<\/td>\n30.7 Multicast data
30.8 Congestion notification and additional tags <\/td>\n<\/tr>\n
1468<\/td>\n31. Congestion notification entity operation
31.1 Congestion-aware Bridge Forwarding Process <\/td>\n<\/tr>\n
1469<\/td>\n31.1.1 Congestion Point (CP)
31.1.2 CP ingress multiplexer
31.2 Congestion-aware end station functions <\/td>\n<\/tr>\n
1471<\/td>\n31.2.1 Output flow segregation
31.2.2 Per-CNPV station function
31.2.2.1 Flow queue <\/td>\n<\/tr>\n
1472<\/td>\n31.2.2.2 Reaction Point (RP)
31.2.2.3 RP state machine
31.2.2.4 Rate Limiter <\/td>\n<\/tr>\n
1473<\/td>\n31.2.2.5 Flow Selection
31.2.3 Flow Select Database
31.2.4 Flow multiplexer
31.2.5 CNM demultiplexer <\/td>\n<\/tr>\n
1474<\/td>\n31.2.6 Input flow segregation
31.2.7 End station input queue
31.2.8 Reception selection <\/td>\n<\/tr>\n
1475<\/td>\n32. Congestion notification protocol
32.1 CND operations
32.1.1 CND defense <\/td>\n<\/tr>\n
1477<\/td>\n32.1.2 Automatic CND recognition
32.1.3 Variables controlling CND defense <\/td>\n<\/tr>\n
1478<\/td>\n32.2 CN component variables <\/td>\n<\/tr>\n
1479<\/td>\n32.2.1 cngMasterEnable
32.2.2 cngCnmTransmitPriority
32.2.3 cngDiscardedFrames
32.2.4 cngErroredPortList
32.3 Congestion notification per-CNPV variables
32.3.1 cncpDefModeChoice <\/td>\n<\/tr>\n
1480<\/td>\n32.3.2 cncpAlternatePriority
32.3.3 cncpAutoAltPri
32.3.4 cncpAdminDefenseMode
32.3.5 cncpCreation
32.3.6 cncpLldpInstanceChoice
32.3.7 cncpLldpInstanceSelector <\/td>\n<\/tr>\n
1481<\/td>\n32.4 CND defense per-Port per-CNPV variables
32.4.1 cnpdDefModeChoice
32.4.2 cnpdAdminDefenseMode <\/td>\n<\/tr>\n
1482<\/td>\n32.4.3 cnpdAutoDefenseMode
32.4.4 cnpdLldpInstanceChoice
32.4.5 cnpdLldpInstanceSelector
32.4.6 cnpdAlternatePriority
32.4.7 cnpdXmitCnpvCapable
32.4.8 cnpdXmitReady <\/td>\n<\/tr>\n
1483<\/td>\n32.4.9 cncpDoesEdge
32.4.10 cnpdAcceptsCnTag
32.4.11 cnpdRcvdCnpv
32.4.12 cnpdRcvdReady
32.4.13 cnpdIsAdminDefMode
32.4.14 cnpdDefenseMode <\/td>\n<\/tr>\n
1484<\/td>\n32.5 CND defense procedures
32.5.1 DisableCnpvRemapping()
32.5.2 TurnOnCnDefenses()
32.5.3 TurnOffCnDefenses()
32.6 CND defense state machine <\/td>\n<\/tr>\n
1485<\/td>\n32.7 Congestion notification protocol <\/td>\n<\/tr>\n
1486<\/td>\n32.8 CP variables <\/td>\n<\/tr>\n
1487<\/td>\n32.8.1 cpMacAddress
32.8.2 cpId
32.8.3 cpQSp
32.8.4 cpQLen
32.8.5 cpQLenOld
32.8.6 cpW
32.8.7 cpQOffset
32.8.8 cpQDelta
32.8.9 cpFb <\/td>\n<\/tr>\n
1488<\/td>\n32.8.10 cpEnqued
32.8.11 cpSampleBase
32.8.12 cpDiscardedFrames
32.8.13 cpTransmittedFrames
32.8.14 cpTransmittedCnms
32.8.15 cpMinHeaderOctets
32.9 CP procedures
32.9.1 Random
32.9.2 NewCpSampleBase() <\/td>\n<\/tr>\n
1489<\/td>\n32.9.3 EM_UNITDATA.request (parameters)
32.9.4 GenerateCnmPdu() <\/td>\n<\/tr>\n
1490<\/td>\n32.10 RP per-Port per-CNPV variables
32.10.1 rpppMaxRps
32.10.2 rpppCreatedRps <\/td>\n<\/tr>\n
1491<\/td>\n32.10.3 rpppRpCentiseconds
32.11 RP group variables
32.11.1 rpgEnable
32.11.2 rpgTimeReset
32.11.3 rpgByteReset <\/td>\n<\/tr>\n
1492<\/td>\n32.11.4 rpgThreshold
32.11.5 rpgMaxRate
32.11.6 rpgAiRate
32.11.7 rpgHaiRate
32.11.8 rpgGd
32.11.9 rpgMinDecFac
32.11.10 rpgMinRate
32.12 RP timer
32.12.1 RpWhile <\/td>\n<\/tr>\n
1493<\/td>\n32.13 RP variables
32.13.1 rpEnabled
32.13.2 rpByteCount
32.13.3 rpByteStage
32.13.4 rpTimeStage
32.13.5 rpTargetRate
32.13.6 rpCurrentRate
32.13.7 rpFreeze <\/td>\n<\/tr>\n
1494<\/td>\n32.13.8 rpLimiterRate
32.13.9 rpFb
32.14 RP procedures
32.14.1 ResetCnm
32.14.2 TestRpTerminate
32.14.3 TransmitDataFrame <\/td>\n<\/tr>\n
1495<\/td>\n32.14.4 ReceiveCnm
32.14.5 ProcessCnm
32.14.6 AdjustRates <\/td>\n<\/tr>\n
1496<\/td>\n32.15 RP rate control state machine <\/td>\n<\/tr>\n
1498<\/td>\n32.16 Congestion notification and encapsulation interworking function <\/td>\n<\/tr>\n
1500<\/td>\n33. Encoding of congestion notification PDUs
33.1 Structure, representation, and encoding
33.2 CN-TAG format <\/td>\n<\/tr>\n
1501<\/td>\n33.2.1 Flow Identifier
33.3 Congestion Notification Message (CNM)
33.4 Congestion Notification Message PDU format
33.4.1 Version
33.4.2 ReservedV <\/td>\n<\/tr>\n
1502<\/td>\n33.4.3 Quantized Feedback
33.4.4 Congestion Point Identifier
33.4.5 cnmQOffset
33.4.6 cnmQDelta <\/td>\n<\/tr>\n
1503<\/td>\n33.4.7 Encapsulated priority
33.4.8 Encapsulated destination MAC address
33.4.9 Encapsulated MSDU length
33.4.10 Encapsulated MSDU
33.4.11 CNM Validation <\/td>\n<\/tr>\n
1504<\/td>\n34. Forwarding and Queuing Enhancements for time-sensitive streams (FQTSS)
34.1 Overview
34.2 Detection of SRP domains <\/td>\n<\/tr>\n
1505<\/td>\n34.3 The bandwidth availability parameters
34.3.1 deltaBandwidth when lockClassBandwidth is false <\/td>\n<\/tr>\n
1506<\/td>\n34.3.2 deltaBandwidth when lockClassBandwidth is true
34.3.3 Bandwidth availability parameter management <\/td>\n<\/tr>\n
1507<\/td>\n34.4 Deriving actual bandwidth requirements from the size of the MSDU <\/td>\n<\/tr>\n
1508<\/td>\n34.5 Default SR class configuration <\/td>\n<\/tr>\n
1509<\/td>\n34.6 Transmission selection <\/td>\n<\/tr>\n
1510<\/td>\n34.6.1 Credit-based shaper
34.6.1.1 Talker behavior <\/td>\n<\/tr>\n
1511<\/td>\n34.6.1.2 Listener behavior
34.6.2 Strict priority <\/td>\n<\/tr>\n
1512<\/td>\n34.6.3 Scheduled traffic <\/td>\n<\/tr>\n
1513<\/td>\n35. Stream Reservation Protocol (SRP) <\/td>\n<\/tr>\n
1514<\/td>\n35.1 Multiple Stream Registration Protocol (MSRP) <\/td>\n<\/tr>\n
1515<\/td>\n35.1.1 MSRP and Shared Media <\/td>\n<\/tr>\n
1516<\/td>\n35.1.2 Behavior of end stations
35.1.2.1 Talkers <\/td>\n<\/tr>\n
1517<\/td>\n35.1.2.2 Listeners <\/td>\n<\/tr>\n
1518<\/td>\n35.1.3 Behavior of Bridges
35.1.3.1 Blocked Declarations
35.1.4 SRP domains and status parameters <\/td>\n<\/tr>\n
1519<\/td>\n35.2 Definition of the MSRP application
35.2.1 Definition of internal state variables
35.2.1.1 Port Media Type
35.2.1.2 Direction
35.2.1.3 Declaration Type <\/td>\n<\/tr>\n
1520<\/td>\n35.2.1.4 SRP parameters <\/td>\n<\/tr>\n
1521<\/td>\n35.2.2 Definition of MRP elements
35.2.2.1 MSRP application address <\/td>\n<\/tr>\n
1522<\/td>\n35.2.2.2 MSRP application EtherType
35.2.2.3 MSRP ProtocolVersion
35.2.2.4 MSRP AttributeType definitions
35.2.2.5 MSRP AttributeLength definitions <\/td>\n<\/tr>\n
1523<\/td>\n35.2.2.6 MSRP AttributeListLength definitions
35.2.2.7 MSRP Vector definitions
35.2.2.7.1 MSRP ThreePackedEvents <\/td>\n<\/tr>\n
1524<\/td>\n35.2.2.7.2 MSRP FourPackedEvents
35.2.2.8 MSRP FirstValue definitions (Stream reservations, original) <\/td>\n<\/tr>\n
1525<\/td>\n35.2.2.8.1 Structure definition <\/td>\n<\/tr>\n
1526<\/td>\n35.2.2.8.2 StreamID <\/td>\n<\/tr>\n
1527<\/td>\n35.2.2.8.3 DataFrameParameters
35.2.2.8.4 TSpec <\/td>\n<\/tr>\n
1529<\/td>\n35.2.2.8.5 PriorityAndRank
35.2.2.8.6 Accumulated Latency <\/td>\n<\/tr>\n
1530<\/td>\n35.2.2.8.7 FailureInformation
35.2.2.9 MSRP FirstValue definitions (Domain discovery) <\/td>\n<\/tr>\n
1531<\/td>\n35.2.2.9.1 Structure definition
35.2.2.9.2 SRclassID <\/td>\n<\/tr>\n
1532<\/td>\n35.2.2.9.3 SRclassPriority
35.2.2.9.4 SRclassVID
35.2.2.10 MSRP FirstValue definitions (Stream reservations, enhanced) <\/td>\n<\/tr>\n
1534<\/td>\n35.2.2.10.1 Structure definition <\/td>\n<\/tr>\n
1536<\/td>\n35.2.2.10.2 StreamID
35.2.2.10.3 StreamRank
35.2.2.10.4 EndStationInterfaces <\/td>\n<\/tr>\n
1537<\/td>\n35.2.2.10.5 DataFrameSpecification <\/td>\n<\/tr>\n
1540<\/td>\n35.2.2.10.6 TrafficSpecification and TSpecTimeAware <\/td>\n<\/tr>\n
1542<\/td>\n35.2.2.10.7 UserToNetworkRequirements <\/td>\n<\/tr>\n
1543<\/td>\n35.2.2.10.8 InterfaceCapabilities
35.2.2.10.9 StatusInfo <\/td>\n<\/tr>\n
1544<\/td>\n35.2.2.10.10 AccumulatedLatency
35.2.2.10.11 InterfaceConfiguration <\/td>\n<\/tr>\n
1545<\/td>\n35.2.2.10.12 FailedInterfaces
35.2.3 Provision and support of Stream registration service
35.2.3.1 Initiating MSRP registration and deregistration <\/td>\n<\/tr>\n
1547<\/td>\n35.2.3.1.1 REGISTER_STREAM.request <\/td>\n<\/tr>\n
1548<\/td>\n35.2.3.1.2 REGISTER_STREAM.indication
35.2.3.1.3 DEREGISTER_STREAM.request
35.2.3.1.4 DEREGISTER_STREAM.indication <\/td>\n<\/tr>\n
1549<\/td>\n35.2.3.1.5 REGISTER_ATTACH.request
35.2.3.1.6 REGISTER_ATTACH.indication
35.2.3.1.7 DEREGISTER_ATTACH.request
35.2.3.1.8 DEREGISTER_ATTACH.indication <\/td>\n<\/tr>\n
1550<\/td>\n35.2.4 MSRP Attribute Propagation
35.2.4.1 Stream importance <\/td>\n<\/tr>\n
1551<\/td>\n35.2.4.2 Stream bandwidth calculations
35.2.4.3 Talker attribute propagation <\/td>\n<\/tr>\n
1552<\/td>\n35.2.4.3.1 ProtocolVersion Translation <\/td>\n<\/tr>\n
1554<\/td>\n35.2.4.3.2 Talker Pruning
35.2.4.3.3 Talker Pruning Per Port
35.2.4.3.4 Talker VLAN Pruning
35.2.4.4 Listener attribute propagation <\/td>\n<\/tr>\n
1555<\/td>\n35.2.4.4.1 Incoming Listener attribute processing
35.2.4.4.2 Updating Queuing and Forwarding information <\/td>\n<\/tr>\n
1556<\/td>\n35.2.4.4.3 Merge Listener Declarations <\/td>\n<\/tr>\n
1557<\/td>\n35.2.4.4.4 ProtocolVersion Translation
35.2.4.4.5 Merge MaxLatency <\/td>\n<\/tr>\n
1558<\/td>\n35.2.4.4.6 Merge Listener Failures
35.2.4.5 MAP Context for MSRP
35.2.4.6 MaxLatency Comparison <\/td>\n<\/tr>\n
1559<\/td>\n35.2.5 Operational reporting and statistics
35.2.5.1 Dropped Stream Frame Counter
35.2.6 Encoding <\/td>\n<\/tr>\n
1560<\/td>\n35.2.7 Attribute value support requirements <\/td>\n<\/tr>\n
1561<\/td>\n36. Priority-based Flow Control (PFC)
36.1 PFC operation
36.1.1 Overview <\/td>\n<\/tr>\n
1562<\/td>\n36.1.2 PFC primitives <\/td>\n<\/tr>\n
1563<\/td>\n36.1.3 Detailed specification of PFC operation
36.1.3.1 Processing PFC M_CONTROL.requests
36.1.3.2 Processing PFC M_CONTROL.indications <\/td>\n<\/tr>\n
1564<\/td>\n36.1.3.3 Timing considerations
36.2 PFC-aware system queue functions
36.2.1 PFC Initiator
36.2.2 PFC Receiver <\/td>\n<\/tr>\n
1567<\/td>\n37. Enhanced Transmission Selection (ETS)
37.1 Overview
37.1.1 Relationship to other transmission selection algorithms
37.2 ETS configuration parameters
37.3 ETS algorithm <\/td>\n<\/tr>\n
1568<\/td>\n37.4 Legacy configuration <\/td>\n<\/tr>\n
1569<\/td>\n38. Data Center Bridging eXchange protocol (DCBX)
38.1 Overview
38.2 Goals
38.3 Types of DCBX attributes
38.3.1 Informational attributes
38.4 DCBX and LLDP <\/td>\n<\/tr>\n
1570<\/td>\n38.4.1 Asymmetric attribute passing
38.4.1.1 Overview
38.4.1.2 Asymmetric state variables <\/td>\n<\/tr>\n
1571<\/td>\n38.4.1.3 Asymmetric state machine
38.4.2 Symmetric attribute passing
38.4.2.1 Overview
38.4.2.2 Symmetric state variables <\/td>\n<\/tr>\n
1572<\/td>\n38.4.2.3 Symmetric state machine <\/td>\n<\/tr>\n
1573<\/td>\n39. Multiple I-SID Registration Protocol (MIRP)
39.1 MIRP overview <\/td>\n<\/tr>\n
1575<\/td>\n39.1.1 Behavior of I-components
39.1.2 Behavior of B-components
39.2 Definition of the MIRP application
39.2.1 Definition of MRP elements
39.2.1.1 S-VID and I-SID mapping in an I-Component
39.2.1.2 I-SID translation in a B-component <\/td>\n<\/tr>\n
1576<\/td>\n39.2.1.3 MAP Context for MIRP
39.2.1.4 MAP Context identification for MIRP <\/td>\n<\/tr>\n
1577<\/td>\n39.2.1.5 MIRP application addressing in an I-component
39.2.1.6 MIRP application addressing in a B-component
39.2.1.7 MIRP application EtherType
39.2.1.8 MIRP ProtocolVersion <\/td>\n<\/tr>\n
1578<\/td>\n39.2.1.9 MIRP AttributeType definitions
39.2.1.10 MIRP FirstValue definitions
39.2.1.11 Administrative controls
39.2.2 Alternate MIRP model for B-components <\/td>\n<\/tr>\n
1579<\/td>\n39.2.2.1 EISS Connectivity
39.2.2.2 Alternate MIRP MAP Context
39.2.2.3 Alternate MIRPDU addressing <\/td>\n<\/tr>\n
1580<\/td>\n39.2.3 Use of \u201cnew\u201d declaration capability
39.2.4 Attribute value support requirements
39.2.5 MRP Message filtering <\/td>\n<\/tr>\n
1581<\/td>\n40. Edge Virtual Bridging (EVB) <\/td>\n<\/tr>\n
1582<\/td>\n40.1 EVB architecture without S-channels <\/td>\n<\/tr>\n
1583<\/td>\n40.2 EVB architecture with S-channels <\/td>\n<\/tr>\n
1585<\/td>\n40.3 Asymmetric EVB architecture without S-channels <\/td>\n<\/tr>\n
1587<\/td>\n40.4 EVB status parameters
40.4.1 EVBMode = Not supported
40.4.2 EVBMode = EVB Bridge
40.4.3 EVBMode = EVB station <\/td>\n<\/tr>\n
1588<\/td>\n40.4.4 EVBMode = NVO3 Mode
40.5 EVB Status Parameter for NVO3 Mode Support
40.5.1 NVERole = nNVE
40.5.2 NVERole = tNVE <\/td>\n<\/tr>\n
1589<\/td>\n41. VSI Discovery and Configuration Protocol (VDP)
41.1 VSI manager ID TLV definition <\/td>\n<\/tr>\n
1590<\/td>\n41.1.1 TLV type
41.1.2 TLV information string length
41.1.3 VSI Manager ID
41.2 VDP association TLV definitions <\/td>\n<\/tr>\n
1591<\/td>\n41.2.1 TLV type
41.2.2 TLV information string length
41.2.3 Status <\/td>\n<\/tr>\n
1592<\/td>\n41.2.4 VSI Type ID (VTID)
41.2.5 VSI Type Version
41.2.6 VSIID format <\/td>\n<\/tr>\n
1593<\/td>\n41.2.7 VSIID
41.2.8 Filter Info format <\/td>\n<\/tr>\n
1594<\/td>\n41.2.9 Filter Info field <\/td>\n<\/tr>\n
1595<\/td>\n41.2.9.1 VID Filter Info format
41.2.9.2 MAC\/VID Filter Info format
41.2.9.3 GroupID\/VID Filter Info format <\/td>\n<\/tr>\n
1596<\/td>\n41.2.9.4 GroupID\/MAC\/VID Filter Info format
41.2.9.5 GroupID\/VID\/IPv4 Filter Info format <\/td>\n<\/tr>\n
1597<\/td>\n41.2.9.6 GroupID\/MAC\/VID\/IPv4 Filter Info format
41.2.9.7 GroupID\/VID\/IPv6 Filter Info format <\/td>\n<\/tr>\n
1598<\/td>\n41.2.9.8 GroupID\/MAC\/VID\/IPv6 Filter Info format
41.2.10 VDP TLV type and status semantics
41.2.10.1 Pre-Associate
41.2.10.2 Pre-Associate with Resource Reservation
41.2.10.3 Associate <\/td>\n<\/tr>\n
1599<\/td>\n41.2.10.4 De-Associate
41.3 Organizationally defined TLV definitions
41.3.1 TLV type
41.3.2 TLV information string length
41.3.3 Organizationally unique identifier (OUI) or Company ID (CID) <\/td>\n<\/tr>\n
1600<\/td>\n41.3.4 Organizationally defined information
41.4 Validation rules for VDP TLVs
41.5 VDP state machines
41.5.1 State machine conventions <\/td>\n<\/tr>\n
1601<\/td>\n41.5.2 Bridge VDP state machine <\/td>\n<\/tr>\n
1602<\/td>\n41.5.3 Station VDP state machine <\/td>\n<\/tr>\n
1603<\/td>\n41.5.4 VDP state machine timers
41.5.4.1 waitWhile
41.5.5 VDP state machine variables and parameters
41.5.5.1 bridgeExit
41.5.5.2 newCmd
41.5.5.3 NULL
41.5.5.4 operCmd
41.5.5.5 reinitKeepAlive <\/td>\n<\/tr>\n
1604<\/td>\n41.5.5.6 resourceCmdResult
41.5.5.7 resourceWaitDelay
41.5.5.8 Resp
41.5.5.9 respWaitDelay
41.5.5.10 rxCmd <\/td>\n<\/tr>\n
1605<\/td>\n41.5.5.11 rxResp
41.5.5.12 sysCmd
41.5.5.13 toutKeepAlive
41.5.5.14 vsiState
41.5.6 Command-Response TLV field references in state machines <\/td>\n<\/tr>\n
1606<\/td>\n41.5.7 VDP state machine procedures
41.5.7.1 buildDea()
41.5.7.2 resourceCmd(rxCmd, delay) <\/td>\n<\/tr>\n
1607<\/td>\n41.5.7.3 resourceFree()
41.5.7.4 TxTlv(tlv) <\/td>\n<\/tr>\n
1608<\/td>\n42. S-Channel Discovery and Configuration Protocol (CDCP)
42.1 CDCP discovery and configuration
42.2 CDCP state machine overview <\/td>\n<\/tr>\n
1609<\/td>\n42.3 CDCP configuration state machine <\/td>\n<\/tr>\n
1610<\/td>\n42.4 CDCP configuration variables
42.4.1 AdminChnCap <\/td>\n<\/tr>\n
1611<\/td>\n42.4.2 AdminRole
42.4.3 AdminSVIDWants
42.4.4 LastLocalSVIDPool
42.4.5 LastRemoteSVIDList
42.4.6 LastSVIDWants
42.4.7 LocalSVIDPool
42.4.8 OperChnCap
42.4.9 OperRole <\/td>\n<\/tr>\n
1612<\/td>\n42.4.10 OperSVIDList
42.4.11 RemoteChnCap
42.4.12 RemoteRole
42.4.13 RemoteSVIDList
42.4.14 schState
42.5 CDCP configuration procedures
42.5.1 SetSVIDRequest (OperRole, AdminSVIDWants, OperSVIDList) <\/td>\n<\/tr>\n
1613<\/td>\n42.5.2 RxSVIDConfig (OperSVIDList, LastRemoteSVIDList)
42.5.3 TxSVIDConfig (OperChnCap, RemoteChnCap, LastLocalSVIDPool, RemoteSVIDList, OperSVIDList) <\/td>\n<\/tr>\n
1614<\/td>\n43. Edge Control Protocol (ECP)
43.1 ECP operation <\/td>\n<\/tr>\n
1615<\/td>\n43.2 Edge Control Sublayer Service (ECSS)
43.3 ECP state machines
43.3.1 State machine conventions
43.3.2 Overview <\/td>\n<\/tr>\n
1616<\/td>\n43.3.3 Edge Control Protocol Data Unit (ECPDU)
43.3.3.1 EtherType
43.3.3.2 Version
43.3.3.3 Operation type
43.3.3.4 Subtype <\/td>\n<\/tr>\n
1617<\/td>\n43.3.3.5 Sequence Number
43.3.3.6 ULPDU
43.3.4 ECP transmit state machine <\/td>\n<\/tr>\n
1618<\/td>\n43.3.5 ECP receive state machine
43.3.6 ECP state machine timers <\/td>\n<\/tr>\n
1619<\/td>\n43.3.6.1 ackTimer
43.3.7 ECP state machine variables and parameters
43.3.7.1 ackReceived
43.3.7.2 ecpduReceived
43.3.7.3 lastSeq
43.3.7.4 maxRetries
43.3.7.5 portEnabled
43.3.7.6 requestReceived
43.3.7.7 retries
43.3.7.8 seqECPDU
43.3.7.9 sequence <\/td>\n<\/tr>\n
1620<\/td>\n43.3.7.10 txErrors
43.3.8 ECP state machine procedures
43.3.8.1 inc(counter)
43.3.8.2 transmitECPDU()
43.3.8.3 invokeIndication()
43.3.8.4 sendAck()
43.3.8.5 seqNum(pdu-type) <\/td>\n<\/tr>\n
1621<\/td>\n44. Equal Cost Multiple Paths (ECMP)
44.1 SPBM ECMP
44.1.1 ECMP Operation <\/td>\n<\/tr>\n
1622<\/td>\n44.1.2 ECMP ECT Algorithm <\/td>\n<\/tr>\n
1624<\/td>\n44.1.3 Loop prevention for ECMP
44.2 Support for Flow Filtering <\/td>\n<\/tr>\n
1625<\/td>\n44.2.1 Flow filtering tag (F-TAG) <\/td>\n<\/tr>\n
1626<\/td>\n44.2.2 F-TAG processing
44.2.2.1 Data indications <\/td>\n<\/tr>\n
1627<\/td>\n44.2.2.2 Data requests
44.2.3 Forwarding process extension for flow filtering <\/td>\n<\/tr>\n
1628<\/td>\n44.2.4 TTL Loop mitigation
44.2.5 CFM for ECMP with flow filtering <\/td>\n<\/tr>\n
1629<\/td>\n44.2.5.1 ECMP path MEP placement in a Bridge Port
44.2.5.2 Continuity Check protocol in an ECMP path MA <\/td>\n<\/tr>\n
1630<\/td>\n44.2.6 Operation with selective support for flow filtering <\/td>\n<\/tr>\n
1631<\/td>\n45. Path Control and Reservation (PCR)
45.1 Explicit trees <\/td>\n<\/tr>\n
1635<\/td>\n45.1.1 Tree structures <\/td>\n<\/tr>\n
1636<\/td>\n45.1.2 Explicit ECT Algorithms <\/td>\n<\/tr>\n
1638<\/td>\n45.1.3 ISIS-PCR VLAN configuration <\/td>\n<\/tr>\n
1642<\/td>\n45.1.4 Use of VIDs for strict explicit trees <\/td>\n<\/tr>\n
1643<\/td>\n45.1.5 MAC addresses and ISIS-PCR
45.1.6 Filtering Database entries for explicit trees <\/td>\n<\/tr>\n
1644<\/td>\n45.1.7 ISIS-PCR support
45.1.8 Attributes for path computation <\/td>\n<\/tr>\n
1646<\/td>\n45.1.9 Topology sub-TLV <\/td>\n<\/tr>\n
1649<\/td>\n45.1.10 Hop sub-TLV <\/td>\n<\/tr>\n
1653<\/td>\n45.1.11 Administrative Group sub-TLV
45.1.12 Bandwidth Constraint sub-TLV <\/td>\n<\/tr>\n
1654<\/td>\n45.2 Reservation
45.2.1 Bandwidth Assignment sub-TLV <\/td>\n<\/tr>\n
1655<\/td>\n45.2.2 Timestamp sub-TLV <\/td>\n<\/tr>\n
1656<\/td>\n45.2.3 Precedence ordering
45.3 Redundancy
45.3.1 Loop-free alternates for unicast data flows <\/td>\n<\/tr>\n
1657<\/td>\n45.3.2 Static redundant trees <\/td>\n<\/tr>\n
1658<\/td>\n45.3.3 Maximally Redundant Trees (MRTs) <\/td>\n<\/tr>\n
1660<\/td>\n45.3.4 MRTs with centralized GADAG computation <\/td>\n<\/tr>\n
1665<\/td>\n46. Time-Sensitive Networking (TSN) configuration
46.1 Overview of TSN configuration
46.1.1 User\/Network Interface (UNI)
46.1.2 Modeling of user\/network configuration information
46.1.3 TSN configuration models <\/td>\n<\/tr>\n
1666<\/td>\n46.1.3.1 Fully distributed model
46.1.3.2 Centralized network\/distributed user model <\/td>\n<\/tr>\n
1668<\/td>\n46.1.3.3 Fully centralized model <\/td>\n<\/tr>\n
1670<\/td>\n46.1.4 Stream transformation <\/td>\n<\/tr>\n
1672<\/td>\n46.2 User\/network configuration information
46.2.1 Data types <\/td>\n<\/tr>\n
1673<\/td>\n46.2.2 Protocol integration <\/td>\n<\/tr>\n
1674<\/td>\n46.2.3 Talker <\/td>\n<\/tr>\n
1675<\/td>\n46.2.3.1 StreamID
46.2.3.1.1 MacAddress
46.2.3.1.2 UniqueID
46.2.3.2 StreamRank
46.2.3.2.1 Rank <\/td>\n<\/tr>\n
1676<\/td>\n46.2.3.3 EndStationInterfaces
46.2.3.3.1 MacAddress
46.2.3.3.2 InterfaceName <\/td>\n<\/tr>\n
1677<\/td>\n46.2.3.4 DataFrameSpecification <\/td>\n<\/tr>\n
1678<\/td>\n46.2.3.4.1 IEEE802-MacAddresses
46.2.3.4.2 IEEE802-VlanTag <\/td>\n<\/tr>\n
1679<\/td>\n46.2.3.4.3 IPv4-tuple <\/td>\n<\/tr>\n
1680<\/td>\n46.2.3.4.4 IPv6-tuple <\/td>\n<\/tr>\n
1681<\/td>\n46.2.3.5 TrafficSpecification
46.2.3.5.1 Interval <\/td>\n<\/tr>\n
1682<\/td>\n46.2.3.5.2 MaxFramesPerInterval
46.2.3.5.3 MaxFrameSize
46.2.3.5.4 TransmissionSelection
46.2.3.5.5 EarliestTransmitOffset <\/td>\n<\/tr>\n
1683<\/td>\n46.2.3.5.6 LatestTransmitOffset
46.2.3.5.7 Jitter
46.2.3.6 UserToNetworkRequirements
46.2.3.6.1 NumSeamlessTrees <\/td>\n<\/tr>\n
1684<\/td>\n46.2.3.6.2 MaxLatency <\/td>\n<\/tr>\n
1685<\/td>\n46.2.3.7 InterfaceCapabilities
46.2.3.7.1 VlanTagCapable <\/td>\n<\/tr>\n
1686<\/td>\n46.2.3.7.2 CB-StreamIdenTypeList
46.2.3.7.3 CB-SequenceTypeList
46.2.4 Listener <\/td>\n<\/tr>\n
1687<\/td>\n46.2.5 Status <\/td>\n<\/tr>\n
1688<\/td>\n46.2.5.1 StatusInfo
46.2.5.1.1 TalkerStatus <\/td>\n<\/tr>\n
1689<\/td>\n46.2.5.1.2 ListenerStatus
46.2.5.1.3 FailureCode
46.2.5.2 AccumulatedLatency <\/td>\n<\/tr>\n
1691<\/td>\n46.2.5.2.1 AccumulatedLatency
46.2.5.3 InterfaceConfiguration <\/td>\n<\/tr>\n
1692<\/td>\n46.2.5.3.1 IEEE802-MacAddresses
46.2.5.3.2 IEEE802-VlanTag
46.2.5.3.3 IPv4-tuple <\/td>\n<\/tr>\n
1693<\/td>\n46.2.5.3.4 IPv6-tuple
46.2.5.3.5 TimeAwareOffset
46.2.5.4 FailedInterfaces
46.3 YANG for TSN user\/network configuration <\/td>\n<\/tr>\n
1694<\/td>\n47. Asynchronous Traffic Shaping (ATS) in end stations
47.1 Talker transmission behavior
47.1.1 ATS traffic class model in Talkers
47.1.2 Simplified ProcessFrame(frame) procedure
47.1.3 System clock functions and processing delays <\/td>\n<\/tr>\n
1695<\/td>\n47.2 Scheduler parameter consistency <\/td>\n<\/tr>\n
1696<\/td>\n48. YANG Data Models <\/td>\n<\/tr>\n
1697<\/td>\n48.1 YANG Framework <\/td>\n<\/tr>\n
1698<\/td>\n48.1.1 Interface Management (IETF RFC 8343) Model <\/td>\n<\/tr>\n
1699<\/td>\n48.2 IEEE 802.1Q YANG models
48.2.1 VLAN Bridge components model <\/td>\n<\/tr>\n
1702<\/td>\n48.2.2 Two-Port MAC Relay (TPMR) model <\/td>\n<\/tr>\n
1703<\/td>\n48.2.3 Customer VLAN Bridge model <\/td>\n<\/tr>\n
1704<\/td>\n48.2.4 Provider Bridge model <\/td>\n<\/tr>\n
1707<\/td>\n48.2.5 CFM Model <\/td>\n<\/tr>\n
1709<\/td>\n48.2.5.1 CFM model support of CFM Operations <\/td>\n<\/tr>\n
1711<\/td>\n48.2.6 Stream filters and stream gates model <\/td>\n<\/tr>\n
1712<\/td>\n48.2.7 Asynchronous Traffic Shaping (ATS) model <\/td>\n<\/tr>\n
1713<\/td>\n48.3 Structure of the YANG models <\/td>\n<\/tr>\n
1714<\/td>\n48.3.1 VLAN Bridge components model
48.3.2 Two-Port MAC Relay model
48.3.3 Customer VLAN Bridge model
48.3.4 Provider Bridge model <\/td>\n<\/tr>\n
1715<\/td>\n48.3.5 CFM model
48.3.6 Stream filters and stream gates model
48.3.7 Asynchronous Traffic Shaping (ATS) model <\/td>\n<\/tr>\n
1717<\/td>\n48.4 Security considerations
48.4.1 Security considerations of the VLAN Bridge components model <\/td>\n<\/tr>\n
1718<\/td>\n48.4.2 Security considerations of the Two-Port MAC Relay model
48.4.3 Security considerations of the Customer VLAN Bridge model
48.4.4 Security considerations of the Provider Bridge model <\/td>\n<\/tr>\n
1719<\/td>\n48.4.5 Security considerations of the CFM model
48.4.6 Security considerations of the Stream filters and stream gates model
48.4.7 Security considerations of the Asynchronous Traffic Shaping model <\/td>\n<\/tr>\n
1720<\/td>\n48.5 YANG schema tree definitions
48.5.1 Schema for the ieee802-types YANG module
48.5.2 Schema for the ieee802-dot1q-types YANG module
48.5.3 Schema for the ieee802-dot1q-tsn-types YANG module
48.5.4 Schema for the ieee802-dot1q-bridge YANG module <\/td>\n<\/tr>\n
1724<\/td>\n48.5.5 Schema for the ieee802-dot1q-tpmr YANG module
48.5.6 Schema for the ieee802-dot1q-pb YANG module
48.5.7 Schema for the ieee802-dot1q-cfm-types YANG module <\/td>\n<\/tr>\n
1725<\/td>\n48.5.8 Schema for the ieee802-dot1q-cfm YANG module <\/td>\n<\/tr>\n
1727<\/td>\n48.5.9 Schema for the ieee802-dot1q-cfm-bridge YANG module <\/td>\n<\/tr>\n
1728<\/td>\n48.5.10 Schema for the ieee802-dot1q-cfm-alarm YANG module
48.5.11 Schema for the ieee802-dot1q-stream-filters-gates YANG module <\/td>\n<\/tr>\n
1729<\/td>\n48.5.12 Schema for the ieee802-dot1q-ats YANG module <\/td>\n<\/tr>\n
1730<\/td>\n48.6 YANG modules
48.6.1 The ieee802-types YANG module <\/td>\n<\/tr>\n
1735<\/td>\n48.6.2 The ieee802-dot1q-types YANG module <\/td>\n<\/tr>\n
1749<\/td>\n48.6.3 The ieee802-dot1q-tsn-types YANG module <\/td>\n<\/tr>\n
1768<\/td>\n48.6.4 The ieee802-dot1q-bridge YANG module <\/td>\n<\/tr>\n
1793<\/td>\n48.6.5 The ieee802-dot1q-tpmr YANG module <\/td>\n<\/tr>\n
1798<\/td>\n48.6.6 The ieee802-dot1q-pb YANG module <\/td>\n<\/tr>\n
1801<\/td>\n48.6.7 The ieee802-dot1q-cfm-types YANG module <\/td>\n<\/tr>\n
1812<\/td>\n48.6.8 The ieee802-dot1q-cfm YANG module <\/td>\n<\/tr>\n
1831<\/td>\n48.6.9 The ieee802-dot1q-cfm-bridge YANG module <\/td>\n<\/tr>\n
1839<\/td>\n48.6.10 The ieee802-dot1q-cfm-alarm YANG module <\/td>\n<\/tr>\n
1841<\/td>\n48.6.11 The ieee802-dot1q-stream-filters-gates YANG module <\/td>\n<\/tr>\n
1847<\/td>\n48.6.12 The ieee802-dot1q-ats YANG module <\/td>\n<\/tr>\n
1852<\/td>\nAnnex A (normative) PICS proforma\u2014Bridge implementations
A.1 Introduction
A.2 Abbreviations and special symbols
A.2.1 Status symbols
A.2.2 General abbreviations <\/td>\n<\/tr>\n
1853<\/td>\nA.3 Instructions for completing the PICS proforma
A.3.1 General structure of the PICS proforma
A.3.2 Additional information
A.3.3 Exception information <\/td>\n<\/tr>\n
1854<\/td>\nA.3.4 Conditional status
A.3.4.1 Conditional items
A.3.4.2 Predicates <\/td>\n<\/tr>\n
1855<\/td>\nA.4 PICS proforma for IEEE Std 802.1Q\u2014Bridge implementations
A.4.1 Implementation identification
A.4.2 Protocol summary, IEEE Std 802.1Q <\/td>\n<\/tr>\n
1856<\/td>\nA.5 Major capabilities <\/td>\n<\/tr>\n
1861<\/td>\nA.6 Media access control methods <\/td>\n<\/tr>\n
1862<\/td>\nA.7 Relay and filtering of frames <\/td>\n<\/tr>\n
1863<\/td>\nA.8 Basic Filtering Services <\/td>\n<\/tr>\n
1864<\/td>\nA.9 Addressing <\/td>\n<\/tr>\n
1866<\/td>\nA.10 Rapid Spanning Tree Protocol (RSTP) <\/td>\n<\/tr>\n
1868<\/td>\nA.11 BPDU encoding
A.12 Implementation parameters <\/td>\n<\/tr>\n
1869<\/td>\nA.13 Performance <\/td>\n<\/tr>\n
1870<\/td>\nA.14 Bridge management <\/td>\n<\/tr>\n
1880<\/td>\nA.15 Remote management <\/td>\n<\/tr>\n
1881<\/td>\nA.16 Expedited traffic classes
A.17 Extended Filtering Services <\/td>\n<\/tr>\n
1882<\/td>\nA.18 Multiple Spanning Tree Protocol (MSTP) <\/td>\n<\/tr>\n
1884<\/td>\nA.19 VLAN support <\/td>\n<\/tr>\n
1887<\/td>\nA.20 Multiple MAC Registration Protocol (MMRP) <\/td>\n<\/tr>\n
1888<\/td>\nA.21 Multiple VLAN Registration Protocol (MVRP) <\/td>\n<\/tr>\n
1889<\/td>\nA.22 Multiple Registration Protocol (MRP) <\/td>\n<\/tr>\n
1890<\/td>\nA.23 Connectivity Fault Management (CFM) <\/td>\n<\/tr>\n
1895<\/td>\nA.24 Management Information Base (MIB) <\/td>\n<\/tr>\n
1898<\/td>\nA.25 Protection Switching (PS)
A.26 Data-driven and data-dependent connectivity fault management (DDCFM)
A.27 Two-Port MAC Relay (TPMR) <\/td>\n<\/tr>\n
1899<\/td>\nA.28 MAC Status Protocol (MSP) <\/td>\n<\/tr>\n
1900<\/td>\nA.29 Forwarding and Queuing Enhancements for time-sensitive streams (FQTSS)
A.30 Congestion notification <\/td>\n<\/tr>\n
1901<\/td>\nA.31 Stream Reservation Protocol (SRP) <\/td>\n<\/tr>\n
1905<\/td>\nA.32 Multiple I-SID Registration Protocol (MIRP) <\/td>\n<\/tr>\n
1906<\/td>\nA.33 Priority-based Flow Control (PFC)
A.34 Enhanced Transmission Selection (ETS) <\/td>\n<\/tr>\n
1907<\/td>\nA.35 Data Center Bridging eXchange protocol (DCBX)
A.36 Infrastructure Protection Switching (IPS) <\/td>\n<\/tr>\n
1908<\/td>\nA.37 Shortest Path Bridging (SPB)
A.38 EVB Bridge <\/td>\n<\/tr>\n
1909<\/td>\nA.39 EVB station <\/td>\n<\/tr>\n
1910<\/td>\nA.40 Edge relay (ER) <\/td>\n<\/tr>\n
1912<\/td>\nA.41 VEB and VEPA ER components
A.42 VDP, CDCP, and ECP <\/td>\n<\/tr>\n
1913<\/td>\nA.43 Path Control and Reservation <\/td>\n<\/tr>\n
1914<\/td>\nA.44 Scheduled traffic
A.45 Frame preemption <\/td>\n<\/tr>\n
1915<\/td>\nA.46 Per-Stream Filtering and Policing <\/td>\n<\/tr>\n
1916<\/td>\nA.47 YANG <\/td>\n<\/tr>\n
1917<\/td>\nA.48 Stream reservation remote management (SRRM) <\/td>\n<\/tr>\n
1918<\/td>\nA.49 TSN Centralized Network Configuration (CNC) station <\/td>\n<\/tr>\n
1919<\/td>\nA.50 VDP for NVO3 nNVE Devices <\/td>\n<\/tr>\n
1920<\/td>\nA.51 VDP for NVO3 tNVE Devices <\/td>\n<\/tr>\n
1921<\/td>\nA.52 Asynchronous Traffic Shaping <\/td>\n<\/tr>\n
1922<\/td>\nAnnex B (normative) PICS proforma\u2014End station implementations
B.1 Introduction
B.2 Abbreviations and special symbols
B.2.1 Status symbols
B.2.2 General abbreviations <\/td>\n<\/tr>\n
1923<\/td>\nB.3 Instructions for completing the PICS proforma
B.3.1 General structure of the PICS proforma
B.3.2 Additional information
B.3.3 Exception information <\/td>\n<\/tr>\n
1924<\/td>\nB.3.4 Conditional status
B.3.4.1 Conditional items
B.3.4.2 Predicates <\/td>\n<\/tr>\n
1925<\/td>\nB.4 PICS proforma for IEEE Std 802.1Q\u2014End station implementations
B.4.1 Implementation identification
B.4.2 Protocol summary, IEEE Std 802.1Q <\/td>\n<\/tr>\n
1926<\/td>\nB.5 Major capabilities <\/td>\n<\/tr>\n
1927<\/td>\nB.6 Multiple MAC Registration Protocol (MMRP) <\/td>\n<\/tr>\n
1928<\/td>\nB.7 Multiple VLAN Registration Protocol (MVRP)
B.8 Multiple Registration Protocol (MRP) <\/td>\n<\/tr>\n
1929<\/td>\nB.9 Forwarding and Queuing Enhancements for time-sensitive streams (FQTSS) <\/td>\n<\/tr>\n
1930<\/td>\nB.10 Stream Reservation Protocol (SRP) <\/td>\n<\/tr>\n
1933<\/td>\nB.11 Congestion notification <\/td>\n<\/tr>\n
1935<\/td>\nB.12 Priority-based Flow Control (PFC)
B.13 Enhanced Transmission Selection (ETS)
B.14 Data Center Bridging eXchange protocol (DCBX) <\/td>\n<\/tr>\n
1936<\/td>\nB.15 Scheduled traffic
B.16 Frame Preemption
B.17 Per-Stream Filtering and Policing <\/td>\n<\/tr>\n
1937<\/td>\nB.18 Asynchronous Traffic Shaping <\/td>\n<\/tr>\n
1938<\/td>\nAnnex C (normative) Designated MSRP Node (DMN) Implementations
C.1 DMNs on CSNs
C.1.1 CSN characteristics <\/td>\n<\/tr>\n
1939<\/td>\nC.1.2 DMN handling on CSN
C.1.2.1 DMN selection and migration <\/td>\n<\/tr>\n
1940<\/td>\nC.1.3 MSRPDU handling on a CSN <\/td>\n<\/tr>\n
1941<\/td>\nC.1.4 CSN bandwidth fluctuations
C.2 DMN on MoCA
C.2.1 DMN Selection on MoCA Network
C.2.1.1 DMN-capable node discovery <\/td>\n<\/tr>\n
1942<\/td>\nC.2.1.2 IEEE DMN Device Attribute IE <\/td>\n<\/tr>\n
1943<\/td>\nC.2.1.3 DMN selection and confirmation <\/td>\n<\/tr>\n
1945<\/td>\nC.2.2 MoCA network bandwidth management <\/td>\n<\/tr>\n
1946<\/td>\nC.3 DMNs on IEEE 802.11 media <\/td>\n<\/tr>\n
1947<\/td>\nC.3.1 MSRP handling <\/td>\n<\/tr>\n
1950<\/td>\nC.3.2 BSS DMN selection <\/td>\n<\/tr>\n
1951<\/td>\nC.3.3 BSS network bandwidth management
C.3.3.1 MSRPDU Encapsulation\/De-encapsulation
C.3.3.2 QoS Maintenance Report <\/td>\n<\/tr>\n
1952<\/td>\nC.3.3.3 SRP TSpec to IEEE 802.11 TSPEC mapping <\/td>\n<\/tr>\n
1954<\/td>\nAnnex D (normative) IEEE 802.1 Organizationally Specific TLVs
D.1 Requirements of the IEEE 802.1 Organizationally Specific TLV sets <\/td>\n<\/tr>\n
1955<\/td>\nD.2 Organizationally Specific TLV definitions
D.2.1 Port VLAN ID TLV
D.2.1.1 port VLAN identifier (PVID)
D.2.1.2 Port VLAN ID TLV usage rules
D.2.2 Port And Protocol VLAN ID TLV <\/td>\n<\/tr>\n
1956<\/td>\nD.2.2.1 flags
D.2.2.2 port and protocol VLAN identifier (PPVID)
D.2.2.3 Port And Protocol VLAN ID TLV usage rules
D.2.3 VLAN Name TLV <\/td>\n<\/tr>\n
1957<\/td>\nD.2.3.1 TLV information string length
D.2.3.2 VLAN ID (VID)
D.2.3.3 VLAN name length
D.2.3.4 VLAN name
D.2.3.5 VLAN Name TLV usage rules
D.2.4 Protocol Identity TLV
D.2.4.1 TLV information string length
D.2.4.2 protocol identity length
D.2.4.3 protocol identity <\/td>\n<\/tr>\n
1958<\/td>\nD.2.4.4 Protocol Identity TLV usage rules
D.2.5 VID Usage Digest TLV
D.2.5.1 VID Usage Digest
D.2.6 Management VID TLV
D.2.6.1 Management VID <\/td>\n<\/tr>\n
1959<\/td>\nD.2.7 Congestion Notification TLV
D.2.7.1 TLV type
D.2.7.2 TLV information string length
D.2.7.3 Per-priority CNPV indicators
D.2.7.4 Per-priority Ready indicators <\/td>\n<\/tr>\n
1960<\/td>\nD.2.8 ETS Configuration TLV
D.2.8.1 TLV type
D.2.8.2 TLV information string length
D.2.8.3 Willing
D.2.8.4 Credit-based Shaper
D.2.8.5 Max TCs
D.2.8.6 Priority Assignment Table <\/td>\n<\/tr>\n
1961<\/td>\nD.2.8.7 TC Bandwidth Table
D.2.8.8 TSA Assignment Table <\/td>\n<\/tr>\n
1962<\/td>\nD.2.9 ETS Recommendation TLV
D.2.9.1 TLV type
D.2.9.2 TLV information string length
D.2.9.3 Priority Assignment Table
D.2.9.4 TC Bandwidth Table
D.2.9.5 TSA Assignment Table <\/td>\n<\/tr>\n
1963<\/td>\nD.2.10 Priority-based Flow Control Configuration TLV
D.2.10.1 TLV type
D.2.10.2 TLV information string length
D.2.10.3 Willing
D.2.10.4 MBC
D.2.10.5 PFC cap <\/td>\n<\/tr>\n
1964<\/td>\nD.2.10.6 PFC Enable
D.2.11 Application Priority TLV
D.2.11.1 TLV type
D.2.11.2 TLV information string length <\/td>\n<\/tr>\n
1965<\/td>\nD.2.11.3 Application Priority Table
D.2.12 EVB TLV <\/td>\n<\/tr>\n
1966<\/td>\nD.2.12.1 OUI
D.2.12.2 Subtype
D.2.12.3 EVB Bridge status <\/td>\n<\/tr>\n
1967<\/td>\nD.2.12.4 EVB station status <\/td>\n<\/tr>\n
1969<\/td>\nD.2.12.5 R
D.2.12.6 RTE (retransmission exponent)
D.2.12.7 EVB Mode
D.2.12.8 ROL (remote or local) and RWD (resource wait delay) <\/td>\n<\/tr>\n
1970<\/td>\nD.2.12.9 ROL (remote or local) and RKA (reinit keep alive)
D.2.12.10 NVE Role
D.2.13 CDCP TLV
D.2.13.1 OUI
D.2.13.2 Subtype <\/td>\n<\/tr>\n
1971<\/td>\nD.2.13.3 Role
D.2.13.4 RES1
D.2.13.5 SComp
D.2.13.6 Res2
D.2.13.7 ChnCap
D.2.13.8 SCID\/SVID <\/td>\n<\/tr>\n
1972<\/td>\nD.2.14 Application VLAN TLV
D.2.14.1 TLV type
D.2.14.2 TLV information string length
D.2.14.3 Application VLAN Table <\/td>\n<\/tr>\n
1973<\/td>\nD.3 IEEE 802.1 Organizationally Specific TLV management
D.3.1 IEEE 802.1 Organizationally Specific TLV selection management <\/td>\n<\/tr>\n
1974<\/td>\nD.3.2 IEEE 802.1 managed objects\u2014TLV variables
D.3.2.1 Port VLAN ID TLV managed objects
D.3.2.2 Port And Protocol VLAN ID TLV managed objects
D.3.2.3 VLAN Name TLV managed objects
D.3.2.4 Protocol Identity TLV managed objects
D.3.2.5 VID Usage Digest TLV managed objects
D.3.2.6 Management VID TLV managed objects
D.3.2.7 Link Aggregation TLV managed objects
D.3.2.8 Congestion Notification TLV managed objects
D.3.2.9 EVB TLV managed objects
D.3.2.10 CDCP TLV managed objects <\/td>\n<\/tr>\n
1975<\/td>\nD.4 PICS proforma for IEEE 802.1 Organizationally Specific TLV extensions
D.4.1 Implementation identification
D.4.2 Protocol summary, IEEE Std 802.1Q <\/td>\n<\/tr>\n
1976<\/td>\nD.4.3 Major capabilities and options <\/td>\n<\/tr>\n
1978<\/td>\nD.5 IEEE 802.1\/LLDP extension MIB
D.5.1 Internet Standard Management Framework
D.5.2 Structure of the IEEE 802.1\/LLDP extension MIB <\/td>\n<\/tr>\n
1985<\/td>\nD.5.3 Relationship to other MIBs <\/td>\n<\/tr>\n
1986<\/td>\nD.5.4 Security considerations for IEEE 802.1 LLDP extension MIB module <\/td>\n<\/tr>\n
1988<\/td>\nD.5.5 IEEE 802.1 LLDP extension MIB module\u2014version 2 <\/td>\n<\/tr>\n
2048<\/td>\nD.5.6 EVB extensions to the IEEE 802.1 LLDP extension MIB module <\/td>\n<\/tr>\n
2055<\/td>\nAnnex E (normative) Notational conventions used in state diagrams <\/td>\n<\/tr>\n
2057<\/td>\nAnnex F (informative) Shared and Independent VLAN Learning (SVL and IVL)
F.1 Requirements for Shared and Independent Learning <\/td>\n<\/tr>\n
2058<\/td>\nF.1.1 Connecting independent VLANs <\/td>\n<\/tr>\n
2059<\/td>\nF.1.2 Duplicate MAC addresses <\/td>\n<\/tr>\n
2060<\/td>\nF.1.3 Asymmetric VLANs and Rooted-Multipoint connectivity
F.1.3.1 Multi-netted Server <\/td>\n<\/tr>\n
2061<\/td>\nF.1.3.2 Rooted-Multipoint <\/td>\n<\/tr>\n
2063<\/td>\nF.1.4 Shared learning and Shortest Path Bridging VID (SPBV) mode <\/td>\n<\/tr>\n
2065<\/td>\nF.1.5 Generic constraints on SVL and IVL use <\/td>\n<\/tr>\n
2066<\/td>\nAnnex G (informative) MAC method-dependent aspects of VLAN support
G.1 Example tagged IEEE 802.3 EtherType-encoded frame format
G.2 Padding and frame size considerations
G.2.1 Treatment of PAD fields in IEEE 802.3 frames <\/td>\n<\/tr>\n
2067<\/td>\nG.2.2 Maximum PDU size
G.2.3 Minimum PDU size <\/td>\n<\/tr>\n
2068<\/td>\nG.3 Tag insertion and removal for LLC media <\/td>\n<\/tr>\n
2069<\/td>\nG.4 IEEE 802.11 and PMPN media
G.4.1 IEEE 802.11 Portal convergence
G.4.2 Point-to-Multipoint Network convergence: multiple connections
G.4.3 Point-to-Multipoint Network convergence: single connection <\/td>\n<\/tr>\n
2070<\/td>\nAnnex H (informative) Interoperability considerations
H.1 Requirements for interoperability
H.1.1 Static filtering requirements
H.1.2 Configuration requirements for VLAN-tagging <\/td>\n<\/tr>\n
2071<\/td>\nH.2 Homogeneous VLAN-aware networks
H.2.1 Consistency of static VLAN filtering <\/td>\n<\/tr>\n
2072<\/td>\nH.2.2 Consistent view of the \u201cuntagged VLAN(s)\u201d on a given LAN <\/td>\n<\/tr>\n
2073<\/td>\nH.3 Heterogeneous networks: Intermixing MAC Bridges (M) and VLAN Bridges (V)
H.3.1 Example: Adding a VLAN Bridge to provide filtering to a MAC Bridged Network <\/td>\n<\/tr>\n
2074<\/td>\nH.3.2 Example: Adding a MAC Bridge to a (previously) Homogeneous VLAN Bridged Network
H.4 Intermixing Port-based classification and Port-and-Protocol-based classification or future enhancements in VLAN Bridges <\/td>\n<\/tr>\n
2075<\/td>\nH.4.1 Example: Intermixing Protocol-based ingress rules
H.4.2 Differing views of untagged traffic on a given LAN <\/td>\n<\/tr>\n
2076<\/td>\nAnnex I (informative) Priority and drop precedence
I.1 Traffic types <\/td>\n<\/tr>\n
2077<\/td>\nI.2 Managing latency and throughput
I.3 Traffic type to traffic class mapping <\/td>\n<\/tr>\n
2079<\/td>\nI.4 Traffic types and priority values <\/td>\n<\/tr>\n
2080<\/td>\nI.5 Supporting the credit-based shaper algorithm <\/td>\n<\/tr>\n
2081<\/td>\nI.6 Supporting drop precedence
I.7 Priority Code Point allocation <\/td>\n<\/tr>\n
2082<\/td>\nI.8 Interoperability <\/td>\n<\/tr>\n
2084<\/td>\nAnnex J (informative) CFM protocol design and use
J.1 Origin of CFM
J.2 Deployment of CFM <\/td>\n<\/tr>\n
2085<\/td>\nJ.3 MD Level allocation alternative
J.4 Relationship of IEEE Std 802.1Q CFM to other standards <\/td>\n<\/tr>\n
2086<\/td>\nJ.5 Interpreting Linktrace results <\/td>\n<\/tr>\n
2087<\/td>\nJ.6 MP addressing: Individual and Shared MP addresses <\/td>\n<\/tr>\n
2088<\/td>\nJ.6.1 Individual MP address model
J.6.2 Shared MP address model and the CFM Port <\/td>\n<\/tr>\n
2091<\/td>\nAnnex K (informative) TPMR use cases
K.1 Use case 1\u2014TPMR as User to Network Interface (UNI) demarcation device <\/td>\n<\/tr>\n
2092<\/td>\nK.2 Use case 2\u2014TPMRs with aggregated links
K.3 Use case 3\u2014Multiple TPMRs <\/td>\n<\/tr>\n
2093<\/td>\nK.4 Special cases <\/td>\n<\/tr>\n
2096<\/td>\nAnnex L (informative) Operation of the credit-based shaper algorithm
L.1 Overview of credit-based shaper operation <\/td>\n<\/tr>\n
2101<\/td>\nL.2 \u201cClass measurement intervals\u201d in Bridges <\/td>\n<\/tr>\n
2102<\/td>\nL.3 Determining worst-case latency contribution and buffering requirements <\/td>\n<\/tr>\n
2103<\/td>\nL.3.1 Interference delay
L.3.1.1 Queuing delay <\/td>\n<\/tr>\n
2108<\/td>\nL.3.1.2 Fan-in delay <\/td>\n<\/tr>\n
2109<\/td>\nL.3.1.3 Permanent delay <\/td>\n<\/tr>\n
2111<\/td>\nL.3.2 Maximum interference delay and maximum buffer requirement <\/td>\n<\/tr>\n
2112<\/td>\nL.4 Operation of credit-based shaper in Coordinated Shared Network (CSN) <\/td>\n<\/tr>\n
2113<\/td>\nAnnex M (normative) Support for PFC in link layers without MAC Control
M.1 Overview
M.2 PFC PDU format <\/td>\n<\/tr>\n
2114<\/td>\nAnnex N (informative) Buffer requirements for PFC
N.1 Overview
N.2 Delay model <\/td>\n<\/tr>\n
2117<\/td>\nN.3 Interface Delay
N.4 Cable Delay
N.5 Higher Layer Delay <\/td>\n<\/tr>\n
2118<\/td>\nN.6 Computation example <\/td>\n<\/tr>\n
2119<\/td>\nAnnex O (informative) Preserving the integrity of FCS fields in MAC Bridges
O.1 Background <\/td>\n<\/tr>\n
2120<\/td>\nO.2 Basic mathematical ideas behind CRC and FCS <\/td>\n<\/tr>\n
2121<\/td>\nO.3 Detection Lossless Circuit approach <\/td>\n<\/tr>\n
2122<\/td>\nO.4 Algorithmic modification of an FCS
O.4.1 Data changed, length unchanged <\/td>\n<\/tr>\n
2123<\/td>\nO.4.2 Length changed, original data unchanged <\/td>\n<\/tr>\n
2124<\/td>\nO.4.3 Preservation of detectability <\/td>\n<\/tr>\n
2125<\/td>\nO.5 Conclusions <\/td>\n<\/tr>\n
2126<\/td>\nAnnex P (informative) Frame duplication and misordering
P.1 Background
P.2 Frame duplication <\/td>\n<\/tr>\n
2127<\/td>\nP.3 Frame misordering <\/td>\n<\/tr>\n
2128<\/td>\nP.4 Other considerations <\/td>\n<\/tr>\n
2129<\/td>\nAnnex Q (informative) Traffic scheduling
Q.1 Motivation <\/td>\n<\/tr>\n
2130<\/td>\nQ.2 Using gate operations to create protected windows <\/td>\n<\/tr>\n
2131<\/td>\nQ.3 Availability of PTP
Q.4 Scheduled traffic and end stations
Q.5 CycleTimeExtension variables <\/td>\n<\/tr>\n
2132<\/td>\nAnnex R (informative) Preemption and IEEE 802.1AE MAC Security <\/td>\n<\/tr>\n
2134<\/td>\nAnnex S (informative) Preemption and scheduled traffic
S.1 Scheduling used in isolation
S.2 Preemption used in isolation <\/td>\n<\/tr>\n
2135<\/td>\nS.3 Scheduling and preemption used in combination, no HOLD\/RELEASE
S.4 Scheduling and preemption used in combination with HOLD\/RELEASE
S.5 Bandwidth allocation and express traffic <\/td>\n<\/tr>\n
2137<\/td>\nAnnex T (informative) Cyclic queuing and forwarding
T.1 Overview of CQF <\/td>\n<\/tr>\n
2138<\/td>\nT.2 An approach to CQF implementation <\/td>\n<\/tr>\n
2139<\/td>\nT.3 Use of Per-Stream Filtering and Policing for CQF
T.3.1 Stream filter configuration
T.3.2 Stream gate configuration <\/td>\n<\/tr>\n
2140<\/td>\nT.4 Use of traffic scheduling for CQF <\/td>\n<\/tr>\n
2141<\/td>\nT.5 Timing considerations
T.5.1 Choice of T <\/td>\n<\/tr>\n
2142<\/td>\nT.5.2 Cycle interleaving <\/td>\n<\/tr>\n
2144<\/td>\nT.5.3 Cycle alignment between adjacent Ports <\/td>\n<\/tr>\n
2145<\/td>\nAnnex U (informative) TSN configuration examples
U.1 Examples for time-aware talker <\/td>\n<\/tr>\n
2146<\/td>\nU.1.1 Using enhancements for scheduled traffic <\/td>\n<\/tr>\n
2147<\/td>\nU.1.2 Using strict priority <\/td>\n<\/tr>\n
2148<\/td>\nU.1.3 Using per-stream scheduling <\/td>\n<\/tr>\n
2149<\/td>\nU.2 Example of workflow for fully centralized models <\/td>\n<\/tr>\n
2153<\/td>\nAnnex V (informative) Asynchronous Traffic Shaping delay analysis framework
V.1 General assumptions
V.2 End-to-end delay modeling approach <\/td>\n<\/tr>\n
2154<\/td>\nV.3 Buffering delays <\/td>\n<\/tr>\n
2156<\/td>\nV.4 Media-dependent delays
V.5 Bridge\u2014Internal arrival time recognition delays
V.6 Bridge\u2014Internal processing delays <\/td>\n<\/tr>\n
2157<\/td>\nV.7 Bridge\u2014Internal clock offset variations
V.8 Inter-device clock rate deviations <\/td>\n<\/tr>\n
2158<\/td>\nV.9 Combined delay bounds <\/td>\n<\/tr>\n
2159<\/td>\nAnnex W (informative) Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Local and Metropolitan Area Networks–Bridges and Bridged Networks (Published)<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2022<\/td>\n2163<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":438367,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-438361","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/438361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/438367"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=438361"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=438361"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=438361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}