{"id":395866,"date":"2024-10-20T04:21:44","date_gmt":"2024-10-20T04:21:44","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-802-1s-2002-2\/"},"modified":"2024-10-26T08:08:06","modified_gmt":"2024-10-26T08:08:06","slug":"ieee-802-1s-2002-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-802-1s-2002-2\/","title":{"rendered":"IEEE 802.1s-2002"},"content":{"rendered":"

Amendment Standard – Superseded. This standard extends the architecture, protocols, and algorithms specified in IEEE Std 802.1Q, 1998 Edition, to allow data traffic belonging to different VLANs to be allocated to different spanning trees, while retaining interoperability with bridges conformant to that prior specification.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nCover Page <\/td>\n<\/tr>\n
2<\/td>\nTitle Page <\/td>\n<\/tr>\n
4<\/td>\nIntroduction <\/td>\n<\/tr>\n
6<\/td>\nParticipants <\/td>\n<\/tr>\n
8<\/td>\nCONTENTS <\/td>\n<\/tr>\n
12<\/td>\n1. Overview
1.1 Scope <\/td>\n<\/tr>\n
13<\/td>\n1.3 Relationship with ISO\/IEC 15802-3IEEE Std 802.1D <\/td>\n<\/tr>\n
14<\/td>\n2. References
3. Definitions <\/td>\n<\/tr>\n
15<\/td>\n4. Abbreviations <\/td>\n<\/tr>\n
16<\/td>\n5. Conformance
5.1 Static conformance requirements <\/td>\n<\/tr>\n
17<\/td>\n5.2 Options
6. Support of the MAC Service in VLANs
6.1 Support of the MAC service
6.2 Preservation of the MAC service <\/td>\n<\/tr>\n
18<\/td>\n6.3 Quality of service maintenance <\/td>\n<\/tr>\n
22<\/td>\n6.4 Enhanced Internal Sublayer Service provided within VLAN Bridges <\/td>\n<\/tr>\n
26<\/td>\n6.5 Support of the Internal Sublayer Service by IEEE Std 802.3 (CSMA\/CD) <\/td>\n<\/tr>\n
27<\/td>\n7. Principles of network operation
7.1 Network Overview <\/td>\n<\/tr>\n
28<\/td>\n7.2 Use of VLANs <\/td>\n<\/tr>\n
29<\/td>\n7.3 VLAN Topology
7.4 Locating end stations <\/td>\n<\/tr>\n
31<\/td>\n7.5 Ingress, Forwarding, and Egress Rules <\/td>\n<\/tr>\n
32<\/td>\n8. Principles of bridge operation
8.1 Bridge operation <\/td>\n<\/tr>\n
35<\/td>\n8.2 Bridge architecture <\/td>\n<\/tr>\n
37<\/td>\n8.3 Model of operation <\/td>\n<\/tr>\n
42<\/td>\n8.4 Port states and parameters <\/td>\n<\/tr>\n
44<\/td>\n8.5 Frame reception <\/td>\n<\/tr>\n
45<\/td>\n8.6 The Forwarding Process <\/td>\n<\/tr>\n
51<\/td>\n8.7 Frame transmission <\/td>\n<\/tr>\n
52<\/td>\n8.8 The Learning Process
8.9 VLAN classification <\/td>\n<\/tr>\n
56<\/td>\n8.10 The Filtering Database <\/td>\n<\/tr>\n
69<\/td>\n8.11 MST configuration information <\/td>\n<\/tr>\n
70<\/td>\n8.12 Spanning Tree Protocol Entity and GARP Protocol Entities <\/td>\n<\/tr>\n
71<\/td>\n8.13 Bridge Management
8.14 Addressing <\/td>\n<\/tr>\n
80<\/td>\n10. Use of GMRP in VLANs
10.1 Definition of a VLAN context
11. VLAN topology management
11.2 GARP VLAN Registration Protocol (GVRP) <\/td>\n<\/tr>\n
81<\/td>\n11.3 Conformance to GVRP
12. VLAN bridge management
12.1 Management functions <\/td>\n<\/tr>\n
82<\/td>\n12.2 Managed objects <\/td>\n<\/tr>\n
83<\/td>\n12.3 Data types
12.4 Bridge Management Entity <\/td>\n<\/tr>\n
87<\/td>\n12.5 MAC entities
12.6 Forwarding process <\/td>\n<\/tr>\n
91<\/td>\n12.7 Filtering Database <\/td>\n<\/tr>\n
95<\/td>\n12.8 Bridge Protocol Entity <\/td>\n<\/tr>\n
103<\/td>\n12.9 GARP Entities <\/td>\n<\/tr>\n
106<\/td>\n12.10 Bridge VLAN managed objects <\/td>\n<\/tr>\n
116<\/td>\n12.11 GMRP entities <\/td>\n<\/tr>\n
118<\/td>\n12.12 MST configuration entities <\/td>\n<\/tr>\n
122<\/td>\n13. The Multiple Spanning Tree Protocol (MSTP) <\/td>\n<\/tr>\n
123<\/td>\n13.1 Protocol Design Requirements
13.2 Protocol Support Requirements <\/td>\n<\/tr>\n
124<\/td>\n13.3 MSTP Overview <\/td>\n<\/tr>\n
130<\/td>\n13.4 Relationship of MSTP to RSTP
13.5 Modelling an MST Region as a single RSTP Bridge <\/td>\n<\/tr>\n
131<\/td>\n13.6 STP and RSTP compatibility <\/td>\n<\/tr>\n
132<\/td>\n13.7 MST Configuration Identification <\/td>\n<\/tr>\n
134<\/td>\n13.8 MST Regions
13.9 Spanning Tree Priority Vectors <\/td>\n<\/tr>\n
135<\/td>\n13.10 CIST Priority Vector Calculations <\/td>\n<\/tr>\n
137<\/td>\n13.11 MST Priority Vector Calculations <\/td>\n<\/tr>\n
139<\/td>\n13.12 Port Role Assignments
13.13 Stable Connectivity <\/td>\n<\/tr>\n
141<\/td>\n13.14 Communicating Spanning Tree Information <\/td>\n<\/tr>\n
142<\/td>\n13.15 Changing Spanning Tree Information <\/td>\n<\/tr>\n
143<\/td>\n13.16 Changing Port States <\/td>\n<\/tr>\n
148<\/td>\n13.17 Updating Learned Station Location Information <\/td>\n<\/tr>\n
149<\/td>\n13.18 MSTP and point-to-point links
13.19 Multiple Spanning Tree State Machines <\/td>\n<\/tr>\n
151<\/td>\n13.20 Notational Conventions used in State Diagrams
13.21 State Machine Timers <\/td>\n<\/tr>\n
152<\/td>\n13.22 State Machine Performance Parameters <\/td>\n<\/tr>\n
153<\/td>\n13.23 Per-Bridge Variables <\/td>\n<\/tr>\n
155<\/td>\n13.24 Per-Port Variables <\/td>\n<\/tr>\n
160<\/td>\n13.25 State Machine Conditions <\/td>\n<\/tr>\n
161<\/td>\n13.26 State Machine Procedures <\/td>\n<\/tr>\n
169<\/td>\n13.27 The Port Timers state machine <\/td>\n<\/tr>\n
170<\/td>\n13.28 Port Receive state machine
13.29 Port Protocol Migration state machine <\/td>\n<\/tr>\n
171<\/td>\n13.30 Port Transmit state machine <\/td>\n<\/tr>\n
172<\/td>\n13.31 Port Information state machine
13.32 Port Role Selection state machine <\/td>\n<\/tr>\n
173<\/td>\n13.33 Port Role Transitions state machine <\/td>\n<\/tr>\n
176<\/td>\n13.34 Port State Transition state machine
13.35 Topology Change state machine <\/td>\n<\/tr>\n
177<\/td>\n13.36 Performance <\/td>\n<\/tr>\n
179<\/td>\n14. Use of BPDUs by MSTP
14.1 BPDU Structure
14.2 Encoding of parameter types <\/td>\n<\/tr>\n
181<\/td>\n14.3 BPDU formats and parameters
14.4 Validation of received BPDUs <\/td>\n<\/tr>\n
182<\/td>\n14.5 Transmission of BPDUs
14.6 Encoding and decoding of STP Configuration, RST, and MST BPDUs <\/td>\n<\/tr>\n
186<\/td>\nAnnex A (normative) PICS proforma <\/td>\n<\/tr>\n
213<\/td>\nAnnex E (informative) Interoperability considerations <\/td>\n<\/tr>\n
214<\/td>\nAnnex G (informative) Differences between 802.1s and 802.1w state machines <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standards for Local and Metropolitan Area Networks – Amendment to 802.1Q Virtual Bridged Local Area Networks: Multiple Spanning Trees<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2002<\/td>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":395869,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-395866","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/395866","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/395869"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=395866"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=395866"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=395866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}