{"id":397131,"date":"2024-10-20T04:28:30","date_gmt":"2024-10-20T04:28:30","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-802-1ah-2008-2\/"},"modified":"2024-10-26T08:15:55","modified_gmt":"2024-10-26T08:15:55","slug":"ieee-802-1ah-2008-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-802-1ah-2008-2\/","title":{"rendered":"IEEE 802.1ah-2008"},"content":{"rendered":"
Amendment Standard – Superseded. This amendment defines an architecture and bridge protocols for interconnection of multiple Provider Bridged Networks, allowing a Provider to support up tot 2^20 service instances.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 802.1ah-2008 Front Cover <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Abstract\/Keyword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Introduction Notice to users Laws and regulations Copyrights Updating of IEEE documents Errata Interpretations <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Patents Participants <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Figures <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | Tables <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Important Notice <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 1. Overview 1.1 Scope <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 2. Normative references <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 3. Definitions <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 4. Abbreviations <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5. Conformance 5.2 Conformant components and equipment 5.3 Protocol Implementation Conformance Statement (PICS) 5.7 I-component conformance <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 5.7.1 I-component options 5.8 B-component conformance 5.8.1 B-component options <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.11 Backbone Edge Bridge conformance <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 6. Support of the MAC Service in VLANs 6.1.4 Service access points, interface stacks, and ports 6.6 Internal Sublayer Service 6.6.1 Service primitives and parameters <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 6.8 Enhanced Internal Sublayer Service 6.8.1 Service primitives <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 6.9 Support of the EISS 6.9.1 Data indications 6.9.2 Data requests 6.10 Support of the EISS by Provider Instance Ports <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 6.10.1 Data indications <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 6.10.2 Data requests 6.10.3 Priority Code Point encoding 6.11 Support of the EISS by Customer Backbone Ports <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 6.11.1 Data indications <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 6.11.2 Data requests <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 6.11.3 Priority Code Point decoding 6.11.4 Regenerating priority 6.18 Backbone Service Instance Multiplex Entity <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 6.18.1 Demultiplexing direction 6.18.2 Multiplexing direction <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 6.18.3 Priority Code Point encoding 6.18.4 Status parameters <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 7. Principles of network operation 7.4 Locating end stations <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 8. Principles of bridge operation 8.8 The Filtering Database 8.8.3 Dynamic Filtering Entries 8.8.8 Querying the Filtering Database 8.8.11 Connection_Identifier <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 9. Tagged frame format 9.5 Tag Protocol Identification <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 9.8 Backbone Service Instance Tag Control Information <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 12. Bridge management 12.2 Managed objectsVLAN-aware bridge objects 12.3 Data types 12.7 Filtering Database 12.7.7 General Filtering Database operations <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 12.8 Bridge Protocol Entity <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 12.14 CFM entities <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 12.15 Backbone Core Bridge management 12.16 Backbone Edge Bridge management <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 12.16.1 BEB configuration managed object <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 12.16.2 BEB\/PB\/VLAN Bridge Port configuration managed object <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 12.16.3 VIP configuration managed object <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 12.16.4 PIP configuration managed object <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | 12.16.5 CBP Configuration managed object <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 13. The Multiple Spanning Tree Protocol (MSTP) 13.12 Port Role assignments 13.19 Multiple Spanning Tree state machines <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 13.21 State machine timers 13.21.1 pseudoInfoHelloWhen 13.25 State machine conditions and parameters 13.25.18 enableBPDUrx <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 13.25.19 enableBPDUtx 13.25.20 pseudoRootId 13.25.21 isL2gp 13.26 State machine procedures 13.26.6 checkBPDUConsistency() 13.26.7 preparePseudoInfo() <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 13.27 The Port Timers state machine 13.28 Port Receive state machine 13.31 Port Transmit state machine <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 13.32 Port Information state machine <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 13.37 Port Receive Pseudo Information state machine <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 13.40 Virtual Instance Port Spanning Tree operation <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 18. Principles of Connectivity Fault Management operation <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 19. CFM Entity operation 19.4 Maintenance Point addressing <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | 20. Connectivity Fault Management protocols 20.26.1 ProcessLBM() 20.42.1 ProcessLTM() <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 25. Support of the MAC Service by Provider Backbone Bridged Networks <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | 25.1 Service transparency 25.2 Customer service interface 25.3 Port-based service interface <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 25.4 S-tagged service interface <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 25.5 I-tagged service interface <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 25.6 Service instance segregation 25.7 Service instance selection and identification 25.8 Service priority and drop eligibility selection <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | 25.9 Service access protection <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | 25.9.1 Class II redundant LANs access protection <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | 25.9.2 Class III simple redundant LANs and nodes access protection <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 26. Principles of Provider Backbone Bridged Network operation 26.1 Provider Backbone Bridged Network overview <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | 26.2 Provider Backbone Bridged Network example <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | 26.3 Backbone VLAN connectivity <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 26.4 Backbone addressing <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 26.4.1 Learning individual backbone addresses at a PIP 26.4.2 Translating backbone destination addresses at a CBP <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | 26.4.3 Backbone addressing considerations for CFM Maintenance Points 26.5 Detection of connectivity loops through attached networks <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | 26.6 Scaling of Provider Backbone Bridges 26.6.1 Hierarchal PBBNs 26.6.2 Peer PBBNs 26.7 Network Management <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | 26.8 Connectivity Fault Management in Provider Backbone Bridges <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 26.8.1 CFM over Port-based and S-tagged Service Interfaces <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | 26.8.2 Connectivity Fault Management over I-tagged Service Interfaces <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | 26.8.3 Connectivity Fault Management over hierarchal E-NNI <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | 26.8.4 Connectivity Fault Management over peer E-NNI <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | Annex A (normative) PICS proforma <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | Annex B (informative) Shared and independent VLAN learning <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Local and metropolitan area networks — Virtual Bridged Local Area Networks Amendment 7: Provider Backbone Bridges<\/b><\/p>\n |