{"id":81818,"date":"2024-10-17T18:58:47","date_gmt":"2024-10-17T18:58:47","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-802-1q-2011\/"},"modified":"2024-10-24T19:48:04","modified_gmt":"2024-10-24T19:48:04","slug":"ieee-802-1q-2011","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-802-1q-2011\/","title":{"rendered":"IEEE 802.1Q 2011"},"content":{"rendered":"

Revision Standard – Active. This standard specifies how the MAC Service is supported by Virtual Bridged Local Area Networks, the principles of operation of those networks, and the operation of VLAN-aware Bridges, including management, protocols, and algorithms. Incorporates IEEE Std 802.1Q-2005, IEEE Std 802.1ad-2005, IEEE Std 802.1ak-2007, IEEE Std 802.1ag-2007, IEEE Std 802.1ah-2008, IEEE Std 802-1Q-2005\/Cor-1-2008, IEEE Std 802.1ap-2008, IEEE Std 802.1Qaw-2009, IEEE Std 802.1Qay-2009, IEEE Std 802.1aj-2009, IEEE Std 802.1Qav-2009, IEEE Std Qau-2010, and IEEE Std Qat-2010. The PDF of this standard is available at no cost, compliments of the IEEE 802 group. http:\/\/grouper.ieee.org\/groups\/802\/1\/<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nCover <\/td>\n<\/tr>\n
3<\/td>\nTitle page
\n <\/td>\n<\/tr>\n
6<\/td>\nIntroduction <\/td>\n<\/tr>\n
7<\/td>\nNotice to users
Laws and regulations <\/td>\n<\/tr>\n
8<\/td>\nCopyrights
Updating of IEEE documents
Errata
Interpretations
Patents <\/td>\n<\/tr>\n
9<\/td>\nParticipants <\/td>\n<\/tr>\n
11<\/td>\nHistorical participants <\/td>\n<\/tr>\n
16<\/td>\nContents <\/td>\n<\/tr>\n
36<\/td>\nFigures <\/td>\n<\/tr>\n
41<\/td>\nTables <\/td>\n<\/tr>\n
45<\/td>\nImportant notice
\n
1. Overview <\/td>\n<\/tr>\n
46<\/td>\n1.1 Scope
1.2 Purpose
1.3 Introduction <\/td>\n<\/tr>\n
51<\/td>\n1.4 VLAN aims and benefits <\/td>\n<\/tr>\n
52<\/td>\n2. Normative references <\/td>\n<\/tr>\n
55<\/td>\n3. Definitions <\/td>\n<\/tr>\n
70<\/td>\n4. Abbreviations <\/td>\n<\/tr>\n
74<\/td>\n5. Conformance
5.1 Requirements terminology
5.2 Conformant components and equipment <\/td>\n<\/tr>\n
75<\/td>\n5.3 Protocol Implementation Conformance Statement (PICS)
5.4 VLAN-aware Bridge component requirements <\/td>\n<\/tr>\n
81<\/td>\n5.5 C-VLAN component conformance
5.6 S-VLAN component conformance <\/td>\n<\/tr>\n
82<\/td>\n5.7 I-component conformance <\/td>\n<\/tr>\n
83<\/td>\n5.8 B-component conformance <\/td>\n<\/tr>\n
84<\/td>\n5.9 VLAN Bridge conformance
5.10 Provider Bridge conformance <\/td>\n<\/tr>\n
85<\/td>\n5.11 Backbone Edge Bridge conformance
5.12 VLAN-unaware Bridge component requirements
5.13 TPMR component conformance <\/td>\n<\/tr>\n
86<\/td>\n5.14 TPMR conformance
5.15 T-component conformance <\/td>\n<\/tr>\n
87<\/td>\n5.16 End station requirements for MMRP, MVRP, and MSRP <\/td>\n<\/tr>\n
88<\/td>\n5.17 VLAN-aware end station requirements for Connectivity Fault Management <\/td>\n<\/tr>\n
89<\/td>\n5.18 End station requirements\u2014forwarding and queuing for time-sensitive streams
5.19 End station requirements for congestion notification <\/td>\n<\/tr>\n
90<\/td>\n5.20 MAC-specific bridging methods <\/td>\n<\/tr>\n
91<\/td>\n6. Support of the MAC Service <\/td>\n<\/tr>\n
92<\/td>\n6.1 Basic architectural concepts and terms <\/td>\n<\/tr>\n
95<\/td>\n6.2 Provision of the MAC service <\/td>\n<\/tr>\n
96<\/td>\n6.3 Support of the MAC service <\/td>\n<\/tr>\n
97<\/td>\n6.4 Preservation of the MAC service
6.5 Quality of service maintenance <\/td>\n<\/tr>\n
101<\/td>\n6.6 Internal Sublayer Service <\/td>\n<\/tr>\n
105<\/td>\n6.7 Support of the Internal Sublayer Service by specific MAC procedures <\/td>\n<\/tr>\n
111<\/td>\n6.8 Enhanced Internal Sublayer Service <\/td>\n<\/tr>\n
112<\/td>\n6.9 Support of the EISS <\/td>\n<\/tr>\n
117<\/td>\n6.10 Support of the ISS\/EISS by Provider Instance Ports <\/td>\n<\/tr>\n
121<\/td>\n6.11 Support of the EISS by Customer Backbone Ports <\/td>\n<\/tr>\n
124<\/td>\n6.12 Protocol VLAN classification <\/td>\n<\/tr>\n
127<\/td>\n6.13 Support of the ISS for attachment to a Provider Bridged Network <\/td>\n<\/tr>\n
129<\/td>\n6.14 Support of the ISS within a system <\/td>\n<\/tr>\n
130<\/td>\n6.15 Support of the ISS by additional technologies
6.16 Filtering services in Bridged Local Area Networks <\/td>\n<\/tr>\n
134<\/td>\n6.17 EISS Multiplex Entity <\/td>\n<\/tr>\n
135<\/td>\n6.18 Backbone Service Instance Multiplex Entity <\/td>\n<\/tr>\n
138<\/td>\n6.19 TESI Multiplex Entity <\/td>\n<\/tr>\n
139<\/td>\n6.20 Support of the ISS with signaled priority <\/td>\n<\/tr>\n
141<\/td>\n7. Principles of network operation
7.1 Network overview <\/td>\n<\/tr>\n
142<\/td>\n7.2 Use of VLANs <\/td>\n<\/tr>\n
143<\/td>\n7.3 VLAN topology
7.4 Locating end stations <\/td>\n<\/tr>\n
145<\/td>\n7.5 Ingress, forwarding, and egress rules <\/td>\n<\/tr>\n
147<\/td>\n8. Principles of bridge operation
8.1 Bridge operation <\/td>\n<\/tr>\n
150<\/td>\n8.2 Bridge architecture <\/td>\n<\/tr>\n
151<\/td>\n8.3 Model of operation <\/td>\n<\/tr>\n
154<\/td>\n8.4 Active topologies, learning, and forwarding <\/td>\n<\/tr>\n
155<\/td>\n8.5 Bridge Port Transmit and Receive <\/td>\n<\/tr>\n
157<\/td>\n8.6 The Forwarding Process <\/td>\n<\/tr>\n
166<\/td>\n8.7 The Learning Process
8.8 The Filtering Database <\/td>\n<\/tr>\n
181<\/td>\n8.9 MST and ESP configuration information <\/td>\n<\/tr>\n
182<\/td>\n8.10 Spanning Tree Protocol Entity <\/td>\n<\/tr>\n
183<\/td>\n8.11 MRP Entities
8.12 Bridge Management Entity
8.13 Addressing <\/td>\n<\/tr>\n
192<\/td>\n9. Tagged frame format
9.1 Purpose of tagging
9.2 Representation and encoding of tag fields <\/td>\n<\/tr>\n
193<\/td>\n9.3 Tag format
9.4 Tag Protocol Identifier (TPID) formats
9.5 Tag Protocol Identification <\/td>\n<\/tr>\n
194<\/td>\n9.6 VLAN Tag Control Information <\/td>\n<\/tr>\n
195<\/td>\n9.7 Backbone Service Instance Tag Control Information <\/td>\n<\/tr>\n
197<\/td>\n10. Multiple Registration Protocol (MRP) and Multiple MAC Registration Protocol (MMRP)
10.1 MRP overview <\/td>\n<\/tr>\n
200<\/td>\n10.2 MRP architecture <\/td>\n<\/tr>\n
201<\/td>\n10.3 MRP Attribute Propagation (MAP) <\/td>\n<\/tr>\n
203<\/td>\n10.4 Requirements to be met by MRP
10.5 Requirements for interoperability between MRP Participants <\/td>\n<\/tr>\n
205<\/td>\n10.6 Protocol operation <\/td>\n<\/tr>\n
209<\/td>\n10.7 Protocol specification <\/td>\n<\/tr>\n
222<\/td>\n10.8 Structure and encoding of MRP Protocol Data Units <\/td>\n<\/tr>\n
228<\/td>\n10.9 Multiple MAC Registration Protocol (MMRP)\u2014Purpose <\/td>\n<\/tr>\n
229<\/td>\n10.10 Model of operation <\/td>\n<\/tr>\n
232<\/td>\n10.11 Default Group filtering behavior and MMRP propagation <\/td>\n<\/tr>\n
234<\/td>\n10.12 Definition of the MMRP application <\/td>\n<\/tr>\n
239<\/td>\n11. VLAN topology management
11.1 Static and dynamic VLAN configuration <\/td>\n<\/tr>\n
240<\/td>\n11.2 Multiple VLAN Registration Protocol <\/td>\n<\/tr>\n
247<\/td>\n12. Bridge management
12.1 Management functions <\/td>\n<\/tr>\n
248<\/td>\n12.2 VLAN-aware bridge objects <\/td>\n<\/tr>\n
249<\/td>\n12.3 Data types <\/td>\n<\/tr>\n
250<\/td>\n12.4 Bridge Management Entity <\/td>\n<\/tr>\n
253<\/td>\n12.5 MAC entities
12.6 Forwarding process <\/td>\n<\/tr>\n
262<\/td>\n12.7 Filtering Database <\/td>\n<\/tr>\n
267<\/td>\n12.8 Bridge Protocol Entity <\/td>\n<\/tr>\n
274<\/td>\n12.9 MRP Entities <\/td>\n<\/tr>\n
277<\/td>\n12.10 Bridge VLAN managed objects <\/td>\n<\/tr>\n
287<\/td>\n12.11 MMRP entities <\/td>\n<\/tr>\n
288<\/td>\n12.12 MST configuration entities <\/td>\n<\/tr>\n
292<\/td>\n12.13 Provider Bridge management <\/td>\n<\/tr>\n
299<\/td>\n12.14 CFM entities <\/td>\n<\/tr>\n
315<\/td>\n12.15 Backbone Core Bridge management
12.16 Backbone Edge Bridge management <\/td>\n<\/tr>\n
330<\/td>\n12.17 DDCFM entities <\/td>\n<\/tr>\n
340<\/td>\n12.18 PBB-TE Protection Switching managed objects <\/td>\n<\/tr>\n
344<\/td>\n12.19 TPMR managed objects <\/td>\n<\/tr>\n
354<\/td>\n12.20 Management entities for forwarding and queueing for time-sensitive streams <\/td>\n<\/tr>\n
355<\/td>\n12.21 Congestion notification managed objects <\/td>\n<\/tr>\n
359<\/td>\n12.22 SRP entities <\/td>\n<\/tr>\n
363<\/td>\n13. Spanning Tree Protocols <\/td>\n<\/tr>\n
364<\/td>\n13.1 Protocol design requirements <\/td>\n<\/tr>\n
365<\/td>\n13.2 Protocol support requirements
13.3 Protocol design goals <\/td>\n<\/tr>\n
366<\/td>\n13.4 RSTP overview <\/td>\n<\/tr>\n
371<\/td>\n13.5 MSTP overview <\/td>\n<\/tr>\n
376<\/td>\n13.6 Compatibility and interoperability <\/td>\n<\/tr>\n
377<\/td>\n13.7 MST Configuration Identifier <\/td>\n<\/tr>\n
378<\/td>\n13.8 Spanning Tree Priority Vectors <\/td>\n<\/tr>\n
380<\/td>\n13.9 CIST Priority Vector calculations <\/td>\n<\/tr>\n
381<\/td>\n13.10 MST Priority Vector calculations <\/td>\n<\/tr>\n
383<\/td>\n13.11 Port Role assignments <\/td>\n<\/tr>\n
384<\/td>\n13.12 Stable connectivity <\/td>\n<\/tr>\n
385<\/td>\n13.13 Communicating Spanning Tree information <\/td>\n<\/tr>\n
386<\/td>\n13.14 Changing Spanning Tree information <\/td>\n<\/tr>\n
387<\/td>\n13.15 Changing Port States with RSTP or MSTP <\/td>\n<\/tr>\n
391<\/td>\n13.16 Managing spanning tree topologies <\/td>\n<\/tr>\n
393<\/td>\n13.17 Updating learned station location information <\/td>\n<\/tr>\n
394<\/td>\n13.18 Managing reconfiguration <\/td>\n<\/tr>\n
395<\/td>\n13.19 Partial and disputed connectivity
13.20 In-service upgrades <\/td>\n<\/tr>\n
396<\/td>\n13.21 Fragile bridges <\/td>\n<\/tr>\n
397<\/td>\n13.22 Spanning tree protocol state machines <\/td>\n<\/tr>\n
399<\/td>\n13.23 State machine timers <\/td>\n<\/tr>\n
401<\/td>\n13.24 Per bridge variables <\/td>\n<\/tr>\n
403<\/td>\n13.25 Per port variables <\/td>\n<\/tr>\n
412<\/td>\n13.26 State machine conditions and parameters <\/td>\n<\/tr>\n
414<\/td>\n13.27 State machine procedures <\/td>\n<\/tr>\n
423<\/td>\n13.28 The Port Timers state machine
13.29 Port Receive state machine <\/td>\n<\/tr>\n
424<\/td>\n13.30 Port Protocol Migration state machine
13.31 Bridge Detection state machine <\/td>\n<\/tr>\n
425<\/td>\n13.32 Port Transmit state machine <\/td>\n<\/tr>\n
426<\/td>\n13.33 Port Information state machine <\/td>\n<\/tr>\n
427<\/td>\n13.34 Port Role Selection state machine
13.35 Port Role Transitions state machine <\/td>\n<\/tr>\n
431<\/td>\n13.36 Port State Transition state machine <\/td>\n<\/tr>\n
432<\/td>\n13.37 Topology Change state machine <\/td>\n<\/tr>\n
433<\/td>\n13.38 Layer 2 Gateway Port Receive state machine
13.39 Customer Edge Port Spanning Tree operation <\/td>\n<\/tr>\n
435<\/td>\n13.40 Virtual Instance Port Spanning Tree operation <\/td>\n<\/tr>\n
436<\/td>\n14. Use of BPDUs by MSTP
14.1 BPDU Structure
14.2 Encoding of parameter types <\/td>\n<\/tr>\n
438<\/td>\n14.3 BPDU formats and parameters
14.4 Validation of received BPDUs <\/td>\n<\/tr>\n
439<\/td>\n14.5 Transmission of BPDUs <\/td>\n<\/tr>\n
440<\/td>\n14.6 Encoding and decoding of STP Configuration, RST, and MST BPDUs <\/td>\n<\/tr>\n
442<\/td>\n15. Support of the MAC Service by Provider Bridged Networks
15.1 Service transparency <\/td>\n<\/tr>\n
443<\/td>\n15.2 Customer service interfaces
15.3 Port-based service interface <\/td>\n<\/tr>\n
444<\/td>\n15.4 C-tagged service interface <\/td>\n<\/tr>\n
445<\/td>\n15.5 S-tagged service interface <\/td>\n<\/tr>\n
446<\/td>\n15.6 Service instance segregation
15.7 Service instance selection and identification <\/td>\n<\/tr>\n
447<\/td>\n15.8 Service priority selection
15.9 Service access protection <\/td>\n<\/tr>\n
448<\/td>\n15.10 Connectivity Fault Management
15.11 Data-driven and data-dependent connectivity fault management (DDCFM) <\/td>\n<\/tr>\n
449<\/td>\n16. Principles of Provider Bridged Network operation
16.1 Provider Bridged Network overview <\/td>\n<\/tr>\n
450<\/td>\n16.2 Provider Bridged Network <\/td>\n<\/tr>\n
451<\/td>\n16.3 Service instance connectivity <\/td>\n<\/tr>\n
452<\/td>\n16.4 Service provider learning of customer end station addresses
16.5 Detection of connectivity loops through attached networks <\/td>\n<\/tr>\n
453<\/td>\n16.6 Network management <\/td>\n<\/tr>\n
454<\/td>\n17. Management Information Base (MIB)
17.1 Internet Standard Management Framework
17.2 Structure of the MIB <\/td>\n<\/tr>\n
496<\/td>\n17.3 Relationship to other MIBs <\/td>\n<\/tr>\n
505<\/td>\n17.4 Security considerations <\/td>\n<\/tr>\n
516<\/td>\n17.5 Dynamic component and Port creation <\/td>\n<\/tr>\n
525<\/td>\n17.6 MIB operations for service interface configuration <\/td>\n<\/tr>\n
534<\/td>\n17.7 MIB modules <\/td>\n<\/tr>\n
888<\/td>\n18. Principles of Connectivity Fault Management operation <\/td>\n<\/tr>\n
889<\/td>\n18.1 Maintenance Domains and Domain Service Access Points <\/td>\n<\/tr>\n
891<\/td>\n18.2 Service instances and Maintenance Associations <\/td>\n<\/tr>\n
892<\/td>\n18.3 Maintenance Domain Levels <\/td>\n<\/tr>\n
896<\/td>\n19. Connectivity Fault Management Entity operation
19.1 Maintenance Points
19.2 Maintenance association End Point <\/td>\n<\/tr>\n
903<\/td>\n19.3 MIP Half Function <\/td>\n<\/tr>\n
906<\/td>\n19.4 Maintenance Point addressing
19.5 Linktrace Output Multiplexer <\/td>\n<\/tr>\n
907<\/td>\n19.6 Linktrace Responder <\/td>\n<\/tr>\n
909<\/td>\n20. Connectivity Fault Management protocols <\/td>\n<\/tr>\n
910<\/td>\n20.1 Continuity Check protocol <\/td>\n<\/tr>\n
913<\/td>\n20.2 Loopback protocol <\/td>\n<\/tr>\n
915<\/td>\n20.3 Linktrace protocol <\/td>\n<\/tr>\n
918<\/td>\n20.4 Connectivity Fault Management state machines <\/td>\n<\/tr>\n
920<\/td>\n20.5 CFM state machine timers <\/td>\n<\/tr>\n
921<\/td>\n20.6 CFM procedures
20.7 Maintenance Domain variable <\/td>\n<\/tr>\n
922<\/td>\n20.8 Maintenance Association variables
20.9 MEP variables <\/td>\n<\/tr>\n
924<\/td>\n20.10 MEP Continuity Check Initiator variables <\/td>\n<\/tr>\n
925<\/td>\n20.11 MEP Continuity Check Initiator procedures
20.12 MEP Continuity Check Initiator state machine <\/td>\n<\/tr>\n
926<\/td>\n20.13 MHF Continuity Check Receiver variables
20.14 MHF Continuity Check Receiver procedures
20.15 MHF Continuity Check Receiver state machine <\/td>\n<\/tr>\n
927<\/td>\n20.16 MEP Continuity Check Receiver variables <\/td>\n<\/tr>\n
929<\/td>\n20.17 MEP Continuity Check Receiver procedures <\/td>\n<\/tr>\n
930<\/td>\n20.18 MEP Continuity Check Receiver state machine
20.19 Remote MEP variables <\/td>\n<\/tr>\n
932<\/td>\n20.20 Remote MEP state machine
20.21 Remote MEP Error variables <\/td>\n<\/tr>\n
933<\/td>\n20.22 Remote MEP Error state machine
20.23 MEP Cross Connect variables <\/td>\n<\/tr>\n
934<\/td>\n20.24 MEP Cross Connect state machine
20.25 MEP Mismatch variables <\/td>\n<\/tr>\n
935<\/td>\n20.26 MEP Mismatch state machines
20.27 MP Loopback Responder variables <\/td>\n<\/tr>\n
937<\/td>\n20.28 MP Loopback Responder procedures <\/td>\n<\/tr>\n
938<\/td>\n20.29 MP Loopback Responder state machine
20.30 MEP Loopback Initiator variables <\/td>\n<\/tr>\n
939<\/td>\n20.31 MEP Loopback Initiator transmit procedures <\/td>\n<\/tr>\n
940<\/td>\n20.32 MEP Loopback Initiator transmit state machine <\/td>\n<\/tr>\n
941<\/td>\n20.33 MEP Loopback Initiator receive procedures
20.34 MEP Loopback Initiator receive state machine <\/td>\n<\/tr>\n
942<\/td>\n20.35 MEP Fault Notification Generator variables <\/td>\n<\/tr>\n
943<\/td>\n20.36 MEP Fault Notification Generator procedures
20.37 MEP Fault Notification Generator state machine
20.38 MEP Mismatch Fault Notification Generator variables <\/td>\n<\/tr>\n
945<\/td>\n20.39 MEP Mismatch Fault Notification Generator procedures
20.40 MEP Mismatch Fault Notification Generator state machine <\/td>\n<\/tr>\n
946<\/td>\n20.41 MEP Linktrace Initiator variables <\/td>\n<\/tr>\n
948<\/td>\n20.42 MEP Linktrace Initiator procedures <\/td>\n<\/tr>\n
949<\/td>\n20.43 MEP Linktrace Initiator receive variables
20.44 MEP Linktrace Initiator receive procedures
20.45 MEP Linktrace Initiator receive state machine <\/td>\n<\/tr>\n
950<\/td>\n20.46 Linktrace Responder variables
20.47 LTM Receiver procedures <\/td>\n<\/tr>\n
956<\/td>\n20.48 LTM Receiver state machine
20.49 LTR Transmitter procedure <\/td>\n<\/tr>\n
957<\/td>\n20.50 LTR Transmitter state machine <\/td>\n<\/tr>\n
958<\/td>\n20.51 CFM PDU validation and versioning <\/td>\n<\/tr>\n
961<\/td>\n20.52 PDU identification
20.53 Use of transaction IDs and sequence numbers <\/td>\n<\/tr>\n
963<\/td>\n21. Encoding of CFM Protocol Data Units
21.1 Structure, representation, and encoding
21.2 CFM encapsulation <\/td>\n<\/tr>\n
964<\/td>\n21.3 CFM request and indication parameters <\/td>\n<\/tr>\n
965<\/td>\n21.4 Common CFM Header <\/td>\n<\/tr>\n
966<\/td>\n21.5 TLV Format <\/td>\n<\/tr>\n
971<\/td>\n21.6 Continuity Check Message format <\/td>\n<\/tr>\n
976<\/td>\n21.7 Loopback Message and Loopback Reply formats <\/td>\n<\/tr>\n
978<\/td>\n21.8 Linktrace Message Format <\/td>\n<\/tr>\n
980<\/td>\n21.9 Linktrace Reply Format <\/td>\n<\/tr>\n
986<\/td>\n22. Connectivity Fault Management in systems
22.1 CFM shims in Bridges <\/td>\n<\/tr>\n
996<\/td>\n22.2 Maintenance Entity creation <\/td>\n<\/tr>\n
1001<\/td>\n22.3 MPs, Ports, and MD Level assignment
22.4 Stations and Connectivity Fault Management <\/td>\n<\/tr>\n
1002<\/td>\n22.5 Scalability of Connectivity Fault Management <\/td>\n<\/tr>\n
1003<\/td>\n22.6 CFM in Provider Bridges <\/td>\n<\/tr>\n
1005<\/td>\n22.7 Management Port MEPs and CFM in the enterprise environment <\/td>\n<\/tr>\n
1006<\/td>\n22.8 Implementing CFM on existing Bridges <\/td>\n<\/tr>\n
1009<\/td>\n23. MAC status propagation <\/td>\n<\/tr>\n
1010<\/td>\n23.1 Model of operation <\/td>\n<\/tr>\n
1012<\/td>\n23.2 MAC status protocol (MSP) overview <\/td>\n<\/tr>\n
1016<\/td>\n23.3 MAC status protocol state machines <\/td>\n<\/tr>\n
1018<\/td>\n23.4 State machine timers
23.5 MSP performance parameters <\/td>\n<\/tr>\n
1019<\/td>\n23.6 State machine variables <\/td>\n<\/tr>\n
1021<\/td>\n23.7 State machine procedures
23.8 Status Transition state machine
23.9 Status Notification state machine
23.10 Receive Process <\/td>\n<\/tr>\n
1022<\/td>\n23.11 Transmit Process
23.12 Management of MSP <\/td>\n<\/tr>\n
1023<\/td>\n23.13 MSPDU transmission, addressing, and protocol identification <\/td>\n<\/tr>\n
1024<\/td>\n23.14 Representation and encoding of octets
23.15 MSPDU structure <\/td>\n<\/tr>\n
1025<\/td>\n23.16 Validation of received MSPDUs
23.17 Other MSP participants <\/td>\n<\/tr>\n
1026<\/td>\n24. <\/td>\n<\/tr>\n
1027<\/td>\n25. Support of the MAC Service by Provider Backbone Bridged Networks <\/td>\n<\/tr>\n
1029<\/td>\n25.1 Service transparency
25.2 Customer service interface <\/td>\n<\/tr>\n
1030<\/td>\n25.3 Port-based service interface <\/td>\n<\/tr>\n
1031<\/td>\n25.4 S-tagged service interface <\/td>\n<\/tr>\n
1033<\/td>\n25.5 I-tagged service interface <\/td>\n<\/tr>\n
1035<\/td>\n25.6 Service instance segregation
25.7 Service instance selection and identification <\/td>\n<\/tr>\n
1036<\/td>\n25.8 Service priority and drop eligibility selection
25.9 Service access protection <\/td>\n<\/tr>\n
1040<\/td>\n25.10 Support of the MAC Service by a PBB-TE Region <\/td>\n<\/tr>\n
1043<\/td>\n25.11 Transparent service interface <\/td>\n<\/tr>\n
1045<\/td>\n26. Principles of Provider Backbone Bridged Network operation
26.1 Provider Backbone Bridged Network overview <\/td>\n<\/tr>\n
1046<\/td>\n26.2 Provider Backbone Bridged Network example <\/td>\n<\/tr>\n
1048<\/td>\n26.3 Backbone VLAN connectivity <\/td>\n<\/tr>\n
1049<\/td>\n26.4 Backbone addressing <\/td>\n<\/tr>\n
1051<\/td>\n26.5 Detection of connectivity loops through attached networks
26.6 Scaling of Provider Backbone Bridges <\/td>\n<\/tr>\n
1052<\/td>\n26.7 Network Management
26.8 Connectivity Fault Management in Provider Backbone Bridges <\/td>\n<\/tr>\n
1060<\/td>\n26.9 Connectivity Fault Management in a PBB-TE Region <\/td>\n<\/tr>\n
1064<\/td>\n26.10 Protection switching for point-to-point TESIs <\/td>\n<\/tr>\n
1073<\/td>\n26.11 Mismatch defect <\/td>\n<\/tr>\n
1075<\/td>\n27. <\/td>\n<\/tr>\n
1076<\/td>\n28. <\/td>\n<\/tr>\n
1077<\/td>\n29. DDCFM operations and protocols
29.1 Principles of DDCFM operation <\/td>\n<\/tr>\n
1080<\/td>\n29.2 DDCFM Entity operation <\/td>\n<\/tr>\n
1085<\/td>\n29.3 DDCFM protocols <\/td>\n<\/tr>\n
1095<\/td>\n29.4 Encoding of DDCFM Protocol Data Units <\/td>\n<\/tr>\n
1098<\/td>\n30. Principles of congestion notification
30.1 Congestion notification design requirements <\/td>\n<\/tr>\n
1100<\/td>\n30.2 Quantized Congestion Notification protocol <\/td>\n<\/tr>\n
1104<\/td>\n30.3 Congestion Controlled Flow <\/td>\n<\/tr>\n
1105<\/td>\n30.4 Congestion Notification Priority Value
30.5 Congestion Notification Tag
30.6 Congestion Notification Domain <\/td>\n<\/tr>\n
1106<\/td>\n30.7 Multicast data
30.8 Congestion notification and additional tags <\/td>\n<\/tr>\n
1108<\/td>\n31. Congestion notification entity operation
31.1 Congestion aware Bridge Forwarding Process <\/td>\n<\/tr>\n
1109<\/td>\n31.2 Congestion aware end station functions <\/td>\n<\/tr>\n
1115<\/td>\n32. Congestion notification protocol
32.1 Congestion Notification Domain operations <\/td>\n<\/tr>\n
1118<\/td>\n32.2 CN component variables <\/td>\n<\/tr>\n
1119<\/td>\n32.3 Congestion notification per-CNPV variables <\/td>\n<\/tr>\n
1121<\/td>\n32.4 CND defense per-Port per-CNPV variables <\/td>\n<\/tr>\n
1124<\/td>\n32.5 Congestion Notification Domain defense procedures <\/td>\n<\/tr>\n
1125<\/td>\n32.6 Congestion Notification Domain defense state machine
32.7 Congestion notification protocol <\/td>\n<\/tr>\n
1126<\/td>\n32.8 Congestion Point variables <\/td>\n<\/tr>\n
1128<\/td>\n32.9 Congestion Point procedures <\/td>\n<\/tr>\n
1131<\/td>\n32.10 Reaction Point per-Port per-CNPV variables
32.11 Reaction Point group variables <\/td>\n<\/tr>\n
1133<\/td>\n32.12 Reaction Point timer
32.13 Reaction Point variables <\/td>\n<\/tr>\n
1134<\/td>\n32.14 Reaction Point procedures <\/td>\n<\/tr>\n
1136<\/td>\n32.15 RP rate control state machine <\/td>\n<\/tr>\n
1138<\/td>\n32.16 Congestion notification and encapsulation interworking function <\/td>\n<\/tr>\n
1140<\/td>\n33. Encoding of congestion notification Protocol Data Units
33.1 Structure, representation, and encoding
33.2 Congestion Notification Tag format <\/td>\n<\/tr>\n
1141<\/td>\n33.3 Congestion Notification Message <\/td>\n<\/tr>\n
1142<\/td>\n33.4 Congestion Notification Message PDU format <\/td>\n<\/tr>\n
1145<\/td>\n34. Forwarding and queuing for time-sensitive streams
34.1 Overview
34.2 Detection of SRP domains <\/td>\n<\/tr>\n
1146<\/td>\n34.3 The bandwidth availability parameters <\/td>\n<\/tr>\n
1147<\/td>\n34.4 Deriving actual bandwidth requirements from the size of the MSDU <\/td>\n<\/tr>\n
1148<\/td>\n34.5 Mapping priorities to traffic classes for time-sensitive streams <\/td>\n<\/tr>\n
1150<\/td>\n34.6 End station behavior <\/td>\n<\/tr>\n
1152<\/td>\n35. Stream Registration Protocol (SRP) <\/td>\n<\/tr>\n
1153<\/td>\n35.1 Multiple Stream Registration Protocol (MSRP) <\/td>\n<\/tr>\n
1156<\/td>\n35.2 Definition of the MSRP application <\/td>\n<\/tr>\n
1179<\/td>\nAnnex A (normative) PICS proforma\u2014Bridge implementations <\/td>\n<\/tr>\n
1229<\/td>\nAnnex B (normative) PICS proforma\u2014End station implementations <\/td>\n<\/tr>\n
1241<\/td>\nAnnex C (normative) DMN (Designated MSRP Node) Implementations <\/td>\n<\/tr>\n
1258<\/td>\nAnnex D (normative) IEEE 802.1 Organizationally Specific TLVs <\/td>\n<\/tr>\n
1302<\/td>\nAnnex E (normative) Notational conventions used in state diagrams <\/td>\n<\/tr>\n
1304<\/td>\nAnnex F (informative) Shared and Independent VLAN Learning <\/td>\n<\/tr>\n
1313<\/td>\nAnnex G (informative) MAC method dependent aspects of VLAN support <\/td>\n<\/tr>\n
1315<\/td>\nAnnex H (informative) Interoperability considerations <\/td>\n<\/tr>\n
1323<\/td>\nAnnex I (informative) Priority and drop precedence <\/td>\n<\/tr>\n
1331<\/td>\nAnnex J (informative) Connectivity Fault Management protocol design and use <\/td>\n<\/tr>\n
1339<\/td>\nAnnex K (informative) TPMR use cases <\/td>\n<\/tr>\n
1344<\/td>\nAnnex L (informative) Operation of the credit-based shaper algorithm <\/td>\n<\/tr>\n
1361<\/td>\nAnnex M (informative) Bibliography
\n <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Local and metropolitan area networks–Media Access Control (MAC) Bridges and Virtual Bridged Local Area Networks<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2011<\/td>\n1364<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":81819,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-81818","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/81818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/81819"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=81818"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=81818"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=81818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}