IEEE 802.1ah-2008
$109.42
IEEE Standard for Local and metropolitan area networks — Virtual Bridged Local Area Networks Amendment 7: Provider Backbone Bridges
Published By | Publication Date | Number of Pages |
IEEE | 2008 | 121 |
Amendment Standard – Superseded. This amendment defines an architecture and bridge protocols for interconnection of multiple Provider Bridged Networks, allowing a Provider to support up tot 2^20 service instances.
PDF Catalog
PDF Pages | PDF Title |
---|---|
1 | IEEE Std 802.1ah-2008 Front Cover |
4 | Abstract/Keyword |
6 | Introduction Notice to users Laws and regulations Copyrights Updating of IEEE documents Errata Interpretations |
7 | Patents Participants |
9 | CONTENTS |
11 | Figures |
12 | Tables |
13 | Important Notice |
14 | 1. Overview 1.1 Scope |
15 | 2. Normative references |
17 | 3. Definitions |
19 | 4. Abbreviations |
21 | 5. Conformance 5.2 Conformant components and equipment 5.3 Protocol Implementation Conformance Statement (PICS) 5.7 I-component conformance |
22 | 5.7.1 I-component options 5.8 B-component conformance 5.8.1 B-component options |
23 | 5.11 Backbone Edge Bridge conformance |
25 | 6. Support of the MAC Service in VLANs 6.1.4 Service access points, interface stacks, and ports 6.6 Internal Sublayer Service 6.6.1 Service primitives and parameters |
27 | 6.8 Enhanced Internal Sublayer Service 6.8.1 Service primitives |
29 | 6.9 Support of the EISS 6.9.1 Data indications 6.9.2 Data requests 6.10 Support of the EISS by Provider Instance Ports |
31 | 6.10.1 Data indications |
32 | 6.10.2 Data requests 6.10.3 Priority Code Point encoding 6.11 Support of the EISS by Customer Backbone Ports |
34 | 6.11.1 Data indications |
35 | 6.11.2 Data requests |
36 | 6.11.3 Priority Code Point decoding 6.11.4 Regenerating priority 6.18 Backbone Service Instance Multiplex Entity |
38 | 6.18.1 Demultiplexing direction 6.18.2 Multiplexing direction |
39 | 6.18.3 Priority Code Point encoding 6.18.4 Status parameters |
41 | 7. Principles of network operation 7.4 Locating end stations |
43 | 8. Principles of bridge operation 8.8 The Filtering Database 8.8.3 Dynamic Filtering Entries 8.8.8 Querying the Filtering Database 8.8.11 Connection_Identifier |
45 | 9. Tagged frame format 9.5 Tag Protocol Identification |
46 | 9.8 Backbone Service Instance Tag Control Information |
49 | 12. Bridge management 12.2 Managed objectsVLAN-aware bridge objects 12.3 Data types 12.7 Filtering Database 12.7.7 General Filtering Database operations |
50 | 12.8 Bridge Protocol Entity |
51 | 12.14 CFM entities |
55 | 12.15 Backbone Core Bridge management 12.16 Backbone Edge Bridge management |
57 | 12.16.1 BEB configuration managed object |
60 | 12.16.2 BEB/PB/VLAN Bridge Port configuration managed object |
61 | 12.16.3 VIP configuration managed object |
62 | 12.16.4 PIP configuration managed object |
68 | 12.16.5 CBP Configuration managed object |
71 | 13. The Multiple Spanning Tree Protocol (MSTP) 13.12 Port Role assignments 13.19 Multiple Spanning Tree state machines |
73 | 13.21 State machine timers 13.21.1 pseudoInfoHelloWhen 13.25 State machine conditions and parameters 13.25.18 enableBPDUrx |
74 | 13.25.19 enableBPDUtx 13.25.20 pseudoRootId 13.25.21 isL2gp 13.26 State machine procedures 13.26.6 checkBPDUConsistency() 13.26.7 preparePseudoInfo() |
75 | 13.27 The Port Timers state machine 13.28 Port Receive state machine 13.31 Port Transmit state machine |
76 | 13.32 Port Information state machine |
77 | 13.37 Port Receive Pseudo Information state machine |
79 | 13.40 Virtual Instance Port Spanning Tree operation |
81 | 18. Principles of Connectivity Fault Management operation |
83 | 19. CFM Entity operation 19.4 Maintenance Point addressing |
85 | 20. Connectivity Fault Management protocols 20.26.1 ProcessLBM() 20.42.1 ProcessLTM() |
87 | 25. Support of the MAC Service by Provider Backbone Bridged Networks |
89 | 25.1 Service transparency 25.2 Customer service interface 25.3 Port-based service interface |
91 | 25.4 S-tagged service interface |
94 | 25.5 I-tagged service interface |
96 | 25.6 Service instance segregation 25.7 Service instance selection and identification 25.8 Service priority and drop eligibility selection |
97 | 25.9 Service access protection |
99 | 25.9.1 Class II redundant LANs access protection |
100 | 25.9.2 Class III simple redundant LANs and nodes access protection |
101 | 26. Principles of Provider Backbone Bridged Network operation 26.1 Provider Backbone Bridged Network overview |
102 | 26.2 Provider Backbone Bridged Network example |
104 | 26.3 Backbone VLAN connectivity |
105 | 26.4 Backbone addressing |
106 | 26.4.1 Learning individual backbone addresses at a PIP 26.4.2 Translating backbone destination addresses at a CBP |
107 | 26.4.3 Backbone addressing considerations for CFM Maintenance Points 26.5 Detection of connectivity loops through attached networks |
108 | 26.6 Scaling of Provider Backbone Bridges 26.6.1 Hierarchal PBBNs 26.6.2 Peer PBBNs 26.7 Network Management |
109 | 26.8 Connectivity Fault Management in Provider Backbone Bridges |
111 | 26.8.1 CFM over Port-based and S-tagged Service Interfaces |
112 | 26.8.2 Connectivity Fault Management over I-tagged Service Interfaces |
114 | 26.8.3 Connectivity Fault Management over hierarchal E-NNI |
115 | 26.8.4 Connectivity Fault Management over peer E-NNI |
117 | Annex A (normative) PICS proforma |
121 | Annex B (informative) Shared and independent VLAN learning |