Shopping Cart

No products in the cart.

IEEE 802.1ah-2008

$109.42

IEEE Standard for Local and metropolitan area networks — Virtual Bridged Local Area Networks Amendment 7: Provider Backbone Bridges

Published By Publication Date Number of Pages
IEEE 2008 121
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

Amendment Standard – Superseded. This amendment defines an architecture and bridge protocols for interconnection of multiple Provider Bridged Networks, allowing a Provider to support up tot 2^20 service instances.

PDF Catalog

PDF Pages PDF Title
1 IEEE Std 802.1ah-2008 Front Cover
4 Abstract/Keyword
6 Introduction
Notice to users
Laws and regulations
Copyrights
Updating of IEEE documents
Errata
Interpretations
7 Patents
Participants
9 CONTENTS
11 Figures
12 Tables
13 Important Notice
14 1. Overview
1.1 Scope
15 2. Normative references
17 3. Definitions
19 4. Abbreviations
21 5. Conformance
5.2 Conformant components and equipment
5.3 Protocol Implementation Conformance Statement (PICS)
5.7 I-component conformance
22 5.7.1 I-component options
5.8 B-component conformance
5.8.1 B-component options
23 5.11 Backbone Edge Bridge conformance
25 6. Support of the MAC Service in VLANs
6.1.4 Service access points, interface stacks, and ports
6.6 Internal Sublayer Service
6.6.1 Service primitives and parameters
27 6.8 Enhanced Internal Sublayer Service
6.8.1 Service primitives
29 6.9 Support of the EISS
6.9.1 Data indications
6.9.2 Data requests
6.10 Support of the EISS by Provider Instance Ports
31 6.10.1 Data indications
32 6.10.2 Data requests
6.10.3 Priority Code Point encoding
6.11 Support of the EISS by Customer Backbone Ports
34 6.11.1 Data indications
35 6.11.2 Data requests
36 6.11.3 Priority Code Point decoding
6.11.4 Regenerating priority
6.18 Backbone Service Instance Multiplex Entity
38 6.18.1 Demultiplexing direction
6.18.2 Multiplexing direction
39 6.18.3 Priority Code Point encoding
6.18.4 Status parameters
41 7. Principles of network operation
7.4 Locating end stations
43 8. Principles of bridge operation
8.8 The Filtering Database
8.8.3 Dynamic Filtering Entries
8.8.8 Querying the Filtering Database
8.8.11 Connection_Identifier
45 9. Tagged frame format
9.5 Tag Protocol Identification
46 9.8 Backbone Service Instance Tag Control Information
49 12. Bridge management
12.2 Managed objectsVLAN-aware bridge objects
12.3 Data types
12.7 Filtering Database
12.7.7 General Filtering Database operations
50 12.8 Bridge Protocol Entity
51 12.14 CFM entities
55 12.15 Backbone Core Bridge management
12.16 Backbone Edge Bridge management
57 12.16.1 BEB configuration managed object
60 12.16.2 BEB/PB/VLAN Bridge Port configuration managed object
61 12.16.3 VIP configuration managed object
62 12.16.4 PIP configuration managed object
68 12.16.5 CBP Configuration managed object
71 13. The Multiple Spanning Tree Protocol (MSTP)
13.12 Port Role assignments
13.19 Multiple Spanning Tree state machines
73 13.21 State machine timers
13.21.1 pseudoInfoHelloWhen
13.25 State machine conditions and parameters
13.25.18 enableBPDUrx
74 13.25.19 enableBPDUtx
13.25.20 pseudoRootId
13.25.21 isL2gp
13.26 State machine procedures
13.26.6 checkBPDUConsistency()
13.26.7 preparePseudoInfo()
75 13.27 The Port Timers state machine
13.28 Port Receive state machine
13.31 Port Transmit state machine
76 13.32 Port Information state machine
77 13.37 Port Receive Pseudo Information state machine
79 13.40 Virtual Instance Port Spanning Tree operation
81 18. Principles of Connectivity Fault Management operation
83 19. CFM Entity operation
19.4 Maintenance Point addressing
85 20. Connectivity Fault Management protocols
20.26.1 ProcessLBM()
20.42.1 ProcessLTM()
87 25. Support of the MAC Service by Provider Backbone Bridged Networks
89 25.1 Service transparency
25.2 Customer service interface
25.3 Port-based service interface
91 25.4 S-tagged service interface
94 25.5 I-tagged service interface
96 25.6 Service instance segregation
25.7 Service instance selection and identification
25.8 Service priority and drop eligibility selection
97 25.9 Service access protection
99 25.9.1 Class II redundant LANs access protection
100 25.9.2 Class III simple redundant LANs and nodes access protection
101 26. Principles of Provider Backbone Bridged Network operation
26.1 Provider Backbone Bridged Network overview
102 26.2 Provider Backbone Bridged Network example
104 26.3 Backbone VLAN connectivity
105 26.4 Backbone addressing
106 26.4.1 Learning individual backbone addresses at a PIP
26.4.2 Translating backbone destination addresses at a CBP
107 26.4.3 Backbone addressing considerations for CFM Maintenance Points
26.5 Detection of connectivity loops through attached networks
108 26.6 Scaling of Provider Backbone Bridges
26.6.1 Hierarchal PBBNs
26.6.2 Peer PBBNs
26.7 Network Management
109 26.8 Connectivity Fault Management in Provider Backbone Bridges
111 26.8.1 CFM over Port-based and S-tagged Service Interfaces
112 26.8.2 Connectivity Fault Management over I-tagged Service Interfaces
114 26.8.3 Connectivity Fault Management over hierarchal E-NNI
115 26.8.4 Connectivity Fault Management over peer E-NNI
117 Annex A (normative) PICS proforma
121 Annex B (informative) Shared and independent VLAN learning
IEEE 802.1ah-2008
$109.42