{"id":112088,"date":"2024-10-18T16:21:15","date_gmt":"2024-10-18T16:21:15","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-802-1q-2012\/"},"modified":"2024-10-24T22:03:42","modified_gmt":"2024-10-24T22:03:42","slug":"ieee-802-1q-2012","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-802-1q-2012\/","title":{"rendered":"IEEE 802.1Q 2012"},"content":{"rendered":"

– Active. This standard specifies how the MAC Service is supported by Virtual Bridged Local Area Networks, the principles of operation of those networks, and the operation of VLAN-aware Bridges, including management, protocols, and algorithms. It Incorporates: IEEE Std 802.1Q-2011, IEEE Std 802.1Qbe-2011, IEEE Std 802.1Qbc-2011,IEEE Std 802.1Qbb-2011, IEEE Std 802.1Qaz-2011, IEEE Std 802.1Qbf-2011,IEEE Std 802.1Qbg-2012, IEEE Std 802.1aq-2012, and IEEE Std 802.1Q-2011\/Cor 2-2012)<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std 802.1Q\u2122, 2012 Edition <\/td>\n<\/tr>\n
15<\/td>\nContents <\/td>\n<\/tr>\n
48<\/td>\nFigures <\/td>\n<\/tr>\n
55<\/td>\nTables <\/td>\n<\/tr>\n
61<\/td>\nIMPORTANT NOTICE
1. Overview <\/td>\n<\/tr>\n
62<\/td>\n1.1 Scope
1.2 Purpose
1.3 Introduction <\/td>\n<\/tr>\n
68<\/td>\n1.4 VLAN aims and benefits <\/td>\n<\/tr>\n
70<\/td>\n2. Normative references <\/td>\n<\/tr>\n
74<\/td>\n3. Definitions <\/td>\n<\/tr>\n
92<\/td>\n4. Abbreviations <\/td>\n<\/tr>\n
97<\/td>\n5. Conformance
5.1 Requirements terminology
5.2 Conformant components and equipment <\/td>\n<\/tr>\n
98<\/td>\n5.3 Protocol Implementation Conformance Statement (PICS)
5.4 VLAN-aware Bridge component requirements <\/td>\n<\/tr>\n
105<\/td>\n5.5 C-VLAN component conformance
5.6 S-VLAN component conformance <\/td>\n<\/tr>\n
106<\/td>\n5.7 I-component conformance <\/td>\n<\/tr>\n
107<\/td>\n5.8 B-component conformance <\/td>\n<\/tr>\n
108<\/td>\n5.9 VLAN Bridge conformance
5.10 Provider Bridge conformance <\/td>\n<\/tr>\n
109<\/td>\n5.11 System requirements for Priority-based Flow Control <\/td>\n<\/tr>\n
110<\/td>\n5.12 Backbone Edge Bridge conformance
5.13 VLAN-unaware Bridge component requirements
5.14 TPMR component conformance <\/td>\n<\/tr>\n
111<\/td>\n5.15 TPMR conformance <\/td>\n<\/tr>\n
112<\/td>\n5.16 T-component conformance
5.17 End station requirements for MMRP, MVRP, and MSRP <\/td>\n<\/tr>\n
114<\/td>\n5.18 VLAN-aware end station requirements for Connectivity Fault Management
5.19 End station requirements\u2014forwarding and queuing for time-sensitive streams <\/td>\n<\/tr>\n
115<\/td>\n5.20 End station requirements for congestion notification
5.21 MAC-specific bridging methods <\/td>\n<\/tr>\n
116<\/td>\n5.22 Edge Virtual Bridging (EVB) Bridge requirements
5.23 Edge Virtual Bridging (EVB) station requirements <\/td>\n<\/tr>\n
119<\/td>\n6. Support of the MAC Service <\/td>\n<\/tr>\n
120<\/td>\n6.1 Basic architectural concepts and terms <\/td>\n<\/tr>\n
123<\/td>\n6.2 Provision of the MAC service <\/td>\n<\/tr>\n
124<\/td>\n6.3 Support of the MAC service <\/td>\n<\/tr>\n
125<\/td>\n6.4 Preservation of the MAC service
6.5 Quality of service maintenance <\/td>\n<\/tr>\n
131<\/td>\n6.6 Internal Sublayer Service <\/td>\n<\/tr>\n
135<\/td>\n6.7 Support of the Internal Sublayer Service by specific MAC procedures <\/td>\n<\/tr>\n
141<\/td>\n6.8 Enhanced Internal Sublayer Service <\/td>\n<\/tr>\n
143<\/td>\n6.9 Support of the EISS <\/td>\n<\/tr>\n
148<\/td>\n6.10 Support of the ISS\/EISS by Provider Instance Ports <\/td>\n<\/tr>\n
152<\/td>\n6.11 Support of the EISS by Customer Backbone Ports <\/td>\n<\/tr>\n
155<\/td>\n6.12 Protocol VLAN classification <\/td>\n<\/tr>\n
158<\/td>\n6.13 Support of the ISS for attachment to a Provider Bridged Network <\/td>\n<\/tr>\n
160<\/td>\n6.14 Support of the ISS within a system <\/td>\n<\/tr>\n
161<\/td>\n6.15 Support of the ISS by additional technologies
6.16 Filtering services in Bridged Local Area Networks <\/td>\n<\/tr>\n
164<\/td>\n6.17 EISS Multiplex Entity <\/td>\n<\/tr>\n
165<\/td>\n6.18 Backbone Service Instance Multiplex Entity <\/td>\n<\/tr>\n
169<\/td>\n6.19 TESI Multiplex Entity <\/td>\n<\/tr>\n
170<\/td>\n6.20 Support of the ISS with signaled priority <\/td>\n<\/tr>\n
171<\/td>\n6.21 Infrastructure Segment Multiplex Entity <\/td>\n<\/tr>\n
173<\/td>\n7. Principles of network operation
7.1 Network overview <\/td>\n<\/tr>\n
174<\/td>\n7.2 Use of VLANs
7.3 Active topology <\/td>\n<\/tr>\n
175<\/td>\n7.4 VLAN topology <\/td>\n<\/tr>\n
176<\/td>\n7.5 Locating end stations
7.6 Ingress, forwarding, and egress rules <\/td>\n<\/tr>\n
178<\/td>\n8. Principles of bridge operation
8.1 Bridge operation <\/td>\n<\/tr>\n
181<\/td>\n8.2 Bridge architecture <\/td>\n<\/tr>\n
182<\/td>\n8.3 Model of operation <\/td>\n<\/tr>\n
185<\/td>\n8.4 Active topologies, learning, and forwarding <\/td>\n<\/tr>\n
186<\/td>\n8.5 Bridge Port Transmit and Receive <\/td>\n<\/tr>\n
189<\/td>\n8.6 The Forwarding Process <\/td>\n<\/tr>\n
200<\/td>\n8.7 The Learning Process <\/td>\n<\/tr>\n
201<\/td>\n8.8 The Filtering Database <\/td>\n<\/tr>\n
214<\/td>\n8.9 MST, SPB, and ESP configuration information <\/td>\n<\/tr>\n
216<\/td>\n8.10 Spanning Tree Protocol Entity <\/td>\n<\/tr>\n
217<\/td>\n8.11 MRP Entities
8.12 Bridge Management Entity
8.13 Addressing <\/td>\n<\/tr>\n
228<\/td>\n9. Tagged frame format
9.1 Purpose of tagging
9.2 Representation and encoding of tag fields <\/td>\n<\/tr>\n
229<\/td>\n9.3 Tag format
9.4 Tag Protocol Identifier (TPID) formats
9.5 Tag Protocol Identification <\/td>\n<\/tr>\n
230<\/td>\n9.6 VLAN Tag Control Information <\/td>\n<\/tr>\n
231<\/td>\n9.7 Backbone Service Instance Tag Control Information <\/td>\n<\/tr>\n
233<\/td>\n10. Multiple Registration Protocol (MRP) and Multiple MAC Registration Protocol (MMRP)
10.1 MRP overview <\/td>\n<\/tr>\n
236<\/td>\n10.2 MRP architecture <\/td>\n<\/tr>\n
237<\/td>\n10.3 MRP Attribute Propagation (MAP) <\/td>\n<\/tr>\n
239<\/td>\n10.4 Requirements to be met by MRP
10.5 Requirements for interoperability between MRP Participants <\/td>\n<\/tr>\n
241<\/td>\n10.6 Protocol operation <\/td>\n<\/tr>\n
245<\/td>\n10.7 Protocol specification <\/td>\n<\/tr>\n
259<\/td>\n10.8 Structure and encoding of MRP Protocol Data Units <\/td>\n<\/tr>\n
266<\/td>\n10.9 Multiple MAC Registration Protocol (MMRP)\u2014Purpose <\/td>\n<\/tr>\n
267<\/td>\n10.10 Model of operation <\/td>\n<\/tr>\n
270<\/td>\n10.11 Default Group filtering behavior and MMRP propagation <\/td>\n<\/tr>\n
271<\/td>\n10.12 Definition of the MMRP application <\/td>\n<\/tr>\n
276<\/td>\n11. VLAN topology management
11.1 Static and dynamic VLAN configuration <\/td>\n<\/tr>\n
277<\/td>\n11.2 Multiple VLAN Registration Protocol <\/td>\n<\/tr>\n
285<\/td>\n12. Bridge management
12.1 Management functions <\/td>\n<\/tr>\n
286<\/td>\n12.2 VLAN-aware bridge objects <\/td>\n<\/tr>\n
287<\/td>\n12.3 Data types <\/td>\n<\/tr>\n
288<\/td>\n12.4 Bridge Management Entity <\/td>\n<\/tr>\n
293<\/td>\n12.5 MAC entities
12.6 Forwarding process <\/td>\n<\/tr>\n
303<\/td>\n12.7 Filtering Database <\/td>\n<\/tr>\n
308<\/td>\n12.8 Bridge Protocol Entity <\/td>\n<\/tr>\n
315<\/td>\n12.9 MRP Entities <\/td>\n<\/tr>\n
317<\/td>\n12.10 Bridge VLAN managed objects <\/td>\n<\/tr>\n
329<\/td>\n12.11 MMRP entities <\/td>\n<\/tr>\n
330<\/td>\n12.12 MST configuration entities <\/td>\n<\/tr>\n
335<\/td>\n12.13 Provider Bridge management <\/td>\n<\/tr>\n
342<\/td>\n12.14 CFM entities <\/td>\n<\/tr>\n
359<\/td>\n12.15 Backbone Core Bridge management
12.16 Backbone Edge Bridge management <\/td>\n<\/tr>\n
374<\/td>\n12.17 DDCFM entities <\/td>\n<\/tr>\n
385<\/td>\n12.18 PBB-TE Protection Switching managed objects <\/td>\n<\/tr>\n
388<\/td>\n12.19 TPMR managed objects <\/td>\n<\/tr>\n
398<\/td>\n12.20 Management entities for forwarding and queueing for time-sensitive streams <\/td>\n<\/tr>\n
399<\/td>\n12.21 Congestion notification managed objects <\/td>\n<\/tr>\n
404<\/td>\n12.22 SRP entities <\/td>\n<\/tr>\n
406<\/td>\n12.23 Priority-based Flow Control objects <\/td>\n<\/tr>\n
407<\/td>\n12.24 1:1 PBB-TE Infrastructure Protection Switching (IPS) managed objects <\/td>\n<\/tr>\n
411<\/td>\n12.25 Shortest Path Bridging managed objects <\/td>\n<\/tr>\n
425<\/td>\n12.26 Edge Virtual Bridging management <\/td>\n<\/tr>\n
438<\/td>\n12.27 Edge Control Protocol management <\/td>\n<\/tr>\n
439<\/td>\n13. Spanning Tree Protocols <\/td>\n<\/tr>\n
440<\/td>\n13.1 Protocol design requirements <\/td>\n<\/tr>\n
441<\/td>\n13.2 Protocol support requirements <\/td>\n<\/tr>\n
442<\/td>\n13.3 Protocol design goals
13.4 RSTP overview <\/td>\n<\/tr>\n
448<\/td>\n13.5 MSTP overview <\/td>\n<\/tr>\n
453<\/td>\n13.6 SPB overview <\/td>\n<\/tr>\n
454<\/td>\n13.7 Compatibility and interoperability <\/td>\n<\/tr>\n
455<\/td>\n13.8 MST Configuration Identifier <\/td>\n<\/tr>\n
456<\/td>\n13.9 Spanning Tree Priority Vectors <\/td>\n<\/tr>\n
458<\/td>\n13.10 CIST Priority Vector calculations <\/td>\n<\/tr>\n
460<\/td>\n13.11 MST Priority Vector calculations <\/td>\n<\/tr>\n
462<\/td>\n13.12 Port Role assignments <\/td>\n<\/tr>\n
463<\/td>\n13.13 Stable connectivity <\/td>\n<\/tr>\n
464<\/td>\n13.14 Communicating Spanning Tree information <\/td>\n<\/tr>\n
465<\/td>\n13.15 Changing Spanning Tree information <\/td>\n<\/tr>\n
466<\/td>\n13.16 Changing Port States with RSTP or MSTP <\/td>\n<\/tr>\n
471<\/td>\n13.17 Changing Port States with SPB <\/td>\n<\/tr>\n
473<\/td>\n13.18 Managing spanning tree topologies <\/td>\n<\/tr>\n
475<\/td>\n13.19 Updating learned station location information <\/td>\n<\/tr>\n
477<\/td>\n13.20 Managing reconfiguration <\/td>\n<\/tr>\n
478<\/td>\n13.21 Partial and disputed connectivity
13.22 In-service upgrades <\/td>\n<\/tr>\n
479<\/td>\n13.23 Fragile bridges <\/td>\n<\/tr>\n
480<\/td>\n13.24 Spanning tree protocol state machines <\/td>\n<\/tr>\n
482<\/td>\n13.25 State machine timers <\/td>\n<\/tr>\n
484<\/td>\n13.26 Per bridge variables <\/td>\n<\/tr>\n
486<\/td>\n13.27 Per port variables <\/td>\n<\/tr>\n
497<\/td>\n13.28 State machine conditions and parameters <\/td>\n<\/tr>\n
500<\/td>\n13.29 State machine procedures <\/td>\n<\/tr>\n
511<\/td>\n13.30 The Port Timers state machine <\/td>\n<\/tr>\n
512<\/td>\n13.31 Port Receive state machine <\/td>\n<\/tr>\n
513<\/td>\n13.32 Port Protocol Migration state machine
13.33 Bridge Detection state machine
13.34 Port Transmit state machine <\/td>\n<\/tr>\n
515<\/td>\n13.35 Port Information state machine <\/td>\n<\/tr>\n
516<\/td>\n13.36 Port Role Selection state machine
13.37 Port Role Transitions state machine <\/td>\n<\/tr>\n
520<\/td>\n13.38 Port State Transition state machine <\/td>\n<\/tr>\n
522<\/td>\n13.39 Topology Change state machine <\/td>\n<\/tr>\n
523<\/td>\n13.40 Layer 2 Gateway Port Receive state machine
13.41 Customer Edge Port Spanning Tree operation <\/td>\n<\/tr>\n
525<\/td>\n13.42 Virtual Instance Port Spanning Tree operation <\/td>\n<\/tr>\n
526<\/td>\n14. Encoding of Bridge Protocol Data Units (BPDUs)
14.1 BPDU Structure <\/td>\n<\/tr>\n
528<\/td>\n14.2 Encoding of parameter types <\/td>\n<\/tr>\n
530<\/td>\n14.3 Transmission of BPDUs <\/td>\n<\/tr>\n
531<\/td>\n14.4 Encoding and decoding of STP Configuration, RST, MST, and SPT BPDUs <\/td>\n<\/tr>\n
533<\/td>\n14.5 Validation of received BPDUs <\/td>\n<\/tr>\n
534<\/td>\n14.6 Validation and interoperability <\/td>\n<\/tr>\n
536<\/td>\n15. Support of the MAC Service by Provider Bridged Networks
15.1 Service transparency <\/td>\n<\/tr>\n
537<\/td>\n15.2 Customer service interfaces
15.3 Port-based service interface <\/td>\n<\/tr>\n
538<\/td>\n15.4 C-tagged service interface <\/td>\n<\/tr>\n
539<\/td>\n15.5 S-tagged service interface <\/td>\n<\/tr>\n
540<\/td>\n15.6 Remote customer service interfaces <\/td>\n<\/tr>\n
543<\/td>\n15.7 Service instance segregation
15.8 Service instance selection and identification <\/td>\n<\/tr>\n
544<\/td>\n15.9 Service priority selection <\/td>\n<\/tr>\n
545<\/td>\n15.10 Service access protection
15.11 Connectivity Fault Management
15.12 Data-driven and data-dependent connectivity fault management (DDCFM) <\/td>\n<\/tr>\n
546<\/td>\n16. Principles of Provider Bridged Network operation
16.1 Provider Bridged Network overview <\/td>\n<\/tr>\n
547<\/td>\n16.2 Provider Bridged Network <\/td>\n<\/tr>\n
550<\/td>\n16.3 Service instance connectivity <\/td>\n<\/tr>\n
551<\/td>\n16.4 Service provider learning of customer end station addresses
16.5 Detection of connectivity loops through attached networks <\/td>\n<\/tr>\n
552<\/td>\n16.6 Network management <\/td>\n<\/tr>\n
553<\/td>\n17. Management Information Base (MIB)
17.1 Internet Standard Management Framework
17.2 Structure of the MIB <\/td>\n<\/tr>\n
607<\/td>\n17.3 Relationship to other MIBs Relationship to other MIBs <\/td>\n<\/tr>\n
618<\/td>\n17.4 Security considerations <\/td>\n<\/tr>\n
632<\/td>\n17.5 Dynamic component and Port creation <\/td>\n<\/tr>\n
645<\/td>\n17.6 MIB operations for service interface configuration <\/td>\n<\/tr>\n
655<\/td>\n17.7 MIB modules <\/td>\n<\/tr>\n
1110<\/td>\n18. Principles of Connectivity Fault Management operation <\/td>\n<\/tr>\n
1111<\/td>\n18.1 Maintenance Domains and Domain Service Access Points <\/td>\n<\/tr>\n
1113<\/td>\n18.2 Service instances and Maintenance Associations <\/td>\n<\/tr>\n
1114<\/td>\n18.3 Maintenance Domain Levels <\/td>\n<\/tr>\n
1118<\/td>\n19. Connectivity Fault Management Entity operation
19.1 Maintenance Points
19.2 Maintenance association End Point <\/td>\n<\/tr>\n
1125<\/td>\n19.3 MIP Half Function <\/td>\n<\/tr>\n
1128<\/td>\n19.4 Maintenance Point addressing
19.5 Linktrace Output Multiplexer <\/td>\n<\/tr>\n
1129<\/td>\n19.6 Linktrace Responder <\/td>\n<\/tr>\n
1131<\/td>\n20. Connectivity Fault Management protocols <\/td>\n<\/tr>\n
1132<\/td>\n20.1 Continuity Check protocol <\/td>\n<\/tr>\n
1135<\/td>\n20.2 Loopback protocol <\/td>\n<\/tr>\n
1137<\/td>\n20.3 Linktrace protocol <\/td>\n<\/tr>\n
1141<\/td>\n20.4 Connectivity Fault Management state machines
20.5 CFM state machine timers <\/td>\n<\/tr>\n
1143<\/td>\n20.6 CFM procedures <\/td>\n<\/tr>\n
1144<\/td>\n20.7 Maintenance Domain variable
20.8 Maintenance Association variables
20.9 MEP variables <\/td>\n<\/tr>\n
1146<\/td>\n20.10 MEP Continuity Check Initiator variables <\/td>\n<\/tr>\n
1147<\/td>\n20.11 MEP Continuity Check Initiator procedures <\/td>\n<\/tr>\n
1148<\/td>\n20.12 MEP Continuity Check Initiator state machine
20.13 MHF Continuity Check Receiver variables <\/td>\n<\/tr>\n
1149<\/td>\n20.14 MHF Continuity Check Receiver procedures
20.15 MHF Continuity Check Receiver state machine <\/td>\n<\/tr>\n
1150<\/td>\n20.16 MEP Continuity Check Receiver variables <\/td>\n<\/tr>\n
1152<\/td>\n20.17 MEP Continuity Check Receiver procedures <\/td>\n<\/tr>\n
1153<\/td>\n20.18 MEP Continuity Check Receiver state machine
20.19 Remote MEP variables <\/td>\n<\/tr>\n
1155<\/td>\n20.20 Remote MEP state machine
20.21 Remote MEP Error variables <\/td>\n<\/tr>\n
1156<\/td>\n20.22 Remote MEP Error state machine
20.23 MEP Cross Connect variables <\/td>\n<\/tr>\n
1157<\/td>\n20.24 MEP Cross Connect state machine
20.25 MEP Mismatch variables <\/td>\n<\/tr>\n
1158<\/td>\n20.26 MEP Mismatch state machines
20.27 MP Loopback Responder variables <\/td>\n<\/tr>\n
1160<\/td>\n20.28 MP Loopback Responder procedures <\/td>\n<\/tr>\n
1161<\/td>\n20.29 MP Loopback Responder state machine
20.30 MEP Loopback Initiator variables <\/td>\n<\/tr>\n
1162<\/td>\n20.31 MEP Loopback Initiator transmit procedures <\/td>\n<\/tr>\n
1163<\/td>\n20.32 MEP Loopback Initiator transmit state machine
20.33 MEP Loopback Initiator receive procedures <\/td>\n<\/tr>\n
1164<\/td>\n20.34 MEP Loopback Initiator receive state machine
20.35 MEP Fault Notification Generator variables <\/td>\n<\/tr>\n
1166<\/td>\n20.36 MEP Fault Notification Generator procedures
20.37 MEP Fault Notification Generator state machine <\/td>\n<\/tr>\n
1167<\/td>\n20.38 MEP Mismatch Fault Notification Generator variables <\/td>\n<\/tr>\n
1168<\/td>\n20.39 MEP Mismatch Fault Notification Generator procedures
20.40 MEP Mismatch Fault Notification Generator state machine
20.41 MEP Linktrace Initiator variables <\/td>\n<\/tr>\n
1171<\/td>\n20.42 MEP Linktrace Initiator procedures <\/td>\n<\/tr>\n
1172<\/td>\n20.43 MEP Linktrace Initiator receive variables
20.44 MEP Linktrace Initiator receive procedures <\/td>\n<\/tr>\n
1173<\/td>\n20.45 MEP Linktrace Initiator receive state machine
20.46 Linktrace Responder variables <\/td>\n<\/tr>\n
1174<\/td>\n20.47 LTM Receiver procedures <\/td>\n<\/tr>\n
1180<\/td>\n20.48 LTM Receiver state machine
20.49 LTR Transmitter procedure
20.50 LTR Transmitter state machine <\/td>\n<\/tr>\n
1181<\/td>\n20.51 CFM PDU validation and versioning <\/td>\n<\/tr>\n
1184<\/td>\n20.52 PDU identification <\/td>\n<\/tr>\n
1185<\/td>\n20.53 Use of transaction IDs and sequence numbers <\/td>\n<\/tr>\n
1186<\/td>\n21. Encoding of CFM Protocol Data Units
21.1 Structure, representation, and encoding
21.2 CFM encapsulation <\/td>\n<\/tr>\n
1187<\/td>\n21.3 CFM request and indication parameters <\/td>\n<\/tr>\n
1188<\/td>\n21.4 Common CFM Header <\/td>\n<\/tr>\n
1189<\/td>\n21.5 TLV Format <\/td>\n<\/tr>\n
1194<\/td>\n21.6 Continuity Check Message format <\/td>\n<\/tr>\n
1199<\/td>\n21.7 Loopback Message and Loopback Reply formats <\/td>\n<\/tr>\n
1201<\/td>\n21.8 Linktrace Message Format <\/td>\n<\/tr>\n
1203<\/td>\n21.9 Linktrace Reply Format <\/td>\n<\/tr>\n
1209<\/td>\n22. Connectivity Fault Management in systems
22.1 CFM shims in Bridges <\/td>\n<\/tr>\n
1219<\/td>\n22.2 Maintenance Entity creation <\/td>\n<\/tr>\n
1224<\/td>\n22.3 MPs, Ports, and MD Level assignment
22.4 Stations and Connectivity Fault Management <\/td>\n<\/tr>\n
1225<\/td>\n22.5 Scalability of Connectivity Fault Management <\/td>\n<\/tr>\n
1226<\/td>\n22.6 CFM in Provider Bridges <\/td>\n<\/tr>\n
1229<\/td>\n22.7 Management Port MEPs and CFM in the enterprise environment <\/td>\n<\/tr>\n
1231<\/td>\n22.8 Implementing CFM on existing Bridges <\/td>\n<\/tr>\n
1233<\/td>\n23. MAC status propagation <\/td>\n<\/tr>\n
1234<\/td>\n23.1 Model of operation <\/td>\n<\/tr>\n
1236<\/td>\n23.2 MAC status protocol (MSP) overview <\/td>\n<\/tr>\n
1240<\/td>\n23.3 MAC status protocol state machines <\/td>\n<\/tr>\n
1242<\/td>\n23.4 State machine timers
23.5 MSP performance parameters <\/td>\n<\/tr>\n
1243<\/td>\n23.6 State machine variables <\/td>\n<\/tr>\n
1245<\/td>\n23.7 State machine procedures
23.8 Status Transition state machine
23.9 Status Notification state machine
23.10 Receive Process <\/td>\n<\/tr>\n
1246<\/td>\n23.11 Transmit Process
23.12 Management of MSP <\/td>\n<\/tr>\n
1247<\/td>\n23.13 MSPDU transmission, addressing, and protocol identification <\/td>\n<\/tr>\n
1248<\/td>\n23.14 Representation and encoding of octets
23.15 MSPDU structure <\/td>\n<\/tr>\n
1249<\/td>\n23.16 Validation of received MSPDUs
23.17 Other MSP participants <\/td>\n<\/tr>\n
1250<\/td>\n24. <\/td>\n<\/tr>\n
1251<\/td>\n25. Support of the MAC Service by Provider Backbone Bridged Networks <\/td>\n<\/tr>\n
1253<\/td>\n25.1 Service transparency
25.2 Customer service interface <\/td>\n<\/tr>\n
1254<\/td>\n25.3 Port-based service interface <\/td>\n<\/tr>\n
1255<\/td>\n25.4 S-tagged service interface <\/td>\n<\/tr>\n
1257<\/td>\n25.5 I-tagged service interface <\/td>\n<\/tr>\n
1259<\/td>\n25.6 Service instance segregation
25.7 Service instance selection and identification <\/td>\n<\/tr>\n
1260<\/td>\n25.8 Service priority and drop eligibility selection
25.9 Service access protection <\/td>\n<\/tr>\n
1264<\/td>\n25.10 Support of the MAC Service by a PBB-TE Region <\/td>\n<\/tr>\n
1267<\/td>\n25.11 Transparent service interface <\/td>\n<\/tr>\n
1269<\/td>\n26. Principles of Provider Backbone Bridged Network operation
26.1 Provider Backbone Bridged Network overview <\/td>\n<\/tr>\n
1270<\/td>\n26.2 Provider Backbone Bridged Network example <\/td>\n<\/tr>\n
1272<\/td>\n26.3 Backbone VLAN connectivity <\/td>\n<\/tr>\n
1273<\/td>\n26.4 Backbone addressing <\/td>\n<\/tr>\n
1275<\/td>\n26.5 Detection of connectivity loops through attached networks
26.6 Scaling of Provider Backbone Bridges <\/td>\n<\/tr>\n
1276<\/td>\n26.7 Network Management
26.8 Connectivity Fault Management in Provider Backbone Bridges <\/td>\n<\/tr>\n
1284<\/td>\n26.9 Connectivity Fault Management in a PBB-TE Region <\/td>\n<\/tr>\n
1291<\/td>\n26.10 Protection switching for point-to-point TESIs <\/td>\n<\/tr>\n
1300<\/td>\n26.11 Infrastructure Protection Switching in PBB-TE Region <\/td>\n<\/tr>\n
1312<\/td>\n26.12 Mismatch defect <\/td>\n<\/tr>\n
1313<\/td>\n26.13 Signaling VLAN registrations among I-components <\/td>\n<\/tr>\n
1314<\/td>\n27. Shortest Path Bridging (SPB) <\/td>\n<\/tr>\n
1316<\/td>\n27.1 Protocol design requirements <\/td>\n<\/tr>\n
1317<\/td>\n27.2 Protocol support
27.3 Protocol design goals
27.4 ISIS-SPB VLAN configuration <\/td>\n<\/tr>\n
1321<\/td>\n27.5 ISIS-SPB information
27.6 Calculating CIST connectivity <\/td>\n<\/tr>\n
1322<\/td>\n27.7 Connectivity between regions in the same domain <\/td>\n<\/tr>\n
1323<\/td>\n27.8 Calculating SPT connectivity <\/td>\n<\/tr>\n
1324<\/td>\n27.9 Loop prevention
27.10 SPVID and SPSourceID allocation <\/td>\n<\/tr>\n
1326<\/td>\n27.11 Allocation of VIDs to FIDs
27.12 SPBV SPVID translation <\/td>\n<\/tr>\n
1327<\/td>\n27.13 VLAN topology management <\/td>\n<\/tr>\n
1328<\/td>\n27.14 Individual addresses and SPBM <\/td>\n<\/tr>\n
1329<\/td>\n27.15 SPBM group addressing <\/td>\n<\/tr>\n
1330<\/td>\n27.16 Backbone service instance topology management <\/td>\n<\/tr>\n
1331<\/td>\n27.17 Equal cost shortest paths, ECTs, and load spreading
27.18 Using SPBV and SPBM <\/td>\n<\/tr>\n
1335<\/td>\n27.19 Security considerations <\/td>\n<\/tr>\n
1336<\/td>\n28. ISIS-SPB Link State Protocol
28.1 ISIS-SPB control plane MAC <\/td>\n<\/tr>\n
1337<\/td>\n28.2 Formation and maintenance of ISIS-SPB adjacencies <\/td>\n<\/tr>\n
1338<\/td>\n28.3 Loop prevention
28.4 The Agreement Digest <\/td>\n<\/tr>\n
1341<\/td>\n28.5 Symmetric shortest path tie breaking <\/td>\n<\/tr>\n
1342<\/td>\n28.6 Symmetric ECT framework <\/td>\n<\/tr>\n
1343<\/td>\n28.7 Symmetric ECT <\/td>\n<\/tr>\n
1344<\/td>\n28.8 Predefined ECT Algorithm details <\/td>\n<\/tr>\n
1345<\/td>\n28.9 ECT Migration <\/td>\n<\/tr>\n
1346<\/td>\n28.10 MAC Address registration <\/td>\n<\/tr>\n
1347<\/td>\n28.11 Circuit IDs and Port Identifiers
28.12 ISIS-SPB TLVs <\/td>\n<\/tr>\n
1358<\/td>\n29. DDCFM operations and protocols
29.1 Principles of DDCFM operation <\/td>\n<\/tr>\n
1361<\/td>\n29.2 DDCFM Entity operation <\/td>\n<\/tr>\n
1366<\/td>\n29.3 DDCFM protocols <\/td>\n<\/tr>\n
1376<\/td>\n29.4 Encoding of DDCFM Protocol Data Units <\/td>\n<\/tr>\n
1379<\/td>\n30. Principles of congestion notification
30.1 Congestion notification design requirements <\/td>\n<\/tr>\n
1381<\/td>\n30.2 Quantized Congestion Notification protocol <\/td>\n<\/tr>\n
1385<\/td>\n30.3 Congestion Controlled Flow <\/td>\n<\/tr>\n
1386<\/td>\n30.4 Congestion Notification Priority Value
30.5 Congestion Notification Tag
30.6 Congestion Notification Domain <\/td>\n<\/tr>\n
1387<\/td>\n30.7 Multicast data <\/td>\n<\/tr>\n
1388<\/td>\n30.8 Congestion notification and additional tags <\/td>\n<\/tr>\n
1389<\/td>\n31. Congestion notification entity operation
31.1 Congestion aware Bridge Forwarding Process <\/td>\n<\/tr>\n
1390<\/td>\n31.2 Congestion aware end station functions <\/td>\n<\/tr>\n
1396<\/td>\n32. Congestion notification protocol
32.1 Congestion Notification Domain operations <\/td>\n<\/tr>\n
1399<\/td>\n32.2 CN component variables <\/td>\n<\/tr>\n
1400<\/td>\n32.3 Congestion notification per-CNPV variables <\/td>\n<\/tr>\n
1402<\/td>\n32.4 CND defense per-Port per-CNPV variables <\/td>\n<\/tr>\n
1405<\/td>\n32.5 Congestion Notification Domain defense procedures <\/td>\n<\/tr>\n
1406<\/td>\n32.6 Congestion Notification Domain defense state machine
32.7 Congestion notification protocol <\/td>\n<\/tr>\n
1407<\/td>\n32.8 Congestion Point variables <\/td>\n<\/tr>\n
1409<\/td>\n32.9 Congestion Point procedures <\/td>\n<\/tr>\n
1412<\/td>\n32.10 Reaction Point per-Port per-CNPV variables
32.11 Reaction Point group variables <\/td>\n<\/tr>\n
1414<\/td>\n32.12 Reaction Point timer
32.13 Reaction Point variables <\/td>\n<\/tr>\n
1415<\/td>\n32.14 Reaction Point procedures <\/td>\n<\/tr>\n
1417<\/td>\n32.15 RP rate control state machine <\/td>\n<\/tr>\n
1419<\/td>\n32.16 Congestion notification and encapsulation interworking function <\/td>\n<\/tr>\n
1421<\/td>\n33. Encoding of congestion notification Protocol Data Units
33.1 Structure, representation, and encoding
33.2 Congestion Notification Tag format <\/td>\n<\/tr>\n
1422<\/td>\n33.3 Congestion Notification Message <\/td>\n<\/tr>\n
1423<\/td>\n33.4 Congestion Notification Message PDU format <\/td>\n<\/tr>\n
1426<\/td>\n34. Forwarding and queuing for time-sensitive streams
34.1 Overview
34.2 Detection of SRP domains <\/td>\n<\/tr>\n
1427<\/td>\n34.3 The bandwidth availability parameters <\/td>\n<\/tr>\n
1428<\/td>\n34.4 Deriving actual bandwidth requirements from the size of the MSDU <\/td>\n<\/tr>\n
1429<\/td>\n34.5 Mapping priorities to traffic classes for time-sensitive streams <\/td>\n<\/tr>\n
1431<\/td>\n34.6 End station behavior <\/td>\n<\/tr>\n
1433<\/td>\n35. Stream Registration Protocol (SRP) <\/td>\n<\/tr>\n
1434<\/td>\n35.1 Multiple Stream Registration Protocol (MSRP) <\/td>\n<\/tr>\n
1437<\/td>\n35.2 Definition of the MSRP application <\/td>\n<\/tr>\n
1461<\/td>\n36. Priority-based Flow Control
36.1 Priority-based Flow Control operation <\/td>\n<\/tr>\n
1464<\/td>\n36.2 PFC aware system queue functions <\/td>\n<\/tr>\n
1467<\/td>\n37. Enhanced Transmission Selection (ETS)
37.1 Overview
37.2 ETS configuration parameters
37.3 ETS algorithm <\/td>\n<\/tr>\n
1468<\/td>\n37.4 Legacy configuration <\/td>\n<\/tr>\n
1469<\/td>\n38. Data Center Bridging eXchange Protocol (DCBX)
38.1 Overview
38.2 Goals
38.3 Types of DCBX attributes
38.4 DCBX and LLDP <\/td>\n<\/tr>\n
1473<\/td>\n39. Multiple I-SID Registration Protocol
39.1 MIRP overview <\/td>\n<\/tr>\n
1475<\/td>\n39.2 Definition of the MIRP application <\/td>\n<\/tr>\n
1481<\/td>\n40. Edge Virtual Bridging (EVB) <\/td>\n<\/tr>\n
1483<\/td>\n40.1 EVB architecture without S-channels <\/td>\n<\/tr>\n
1484<\/td>\n40.2 EVB architecture with S-channels <\/td>\n<\/tr>\n
1486<\/td>\n40.3 Asymmetric EVB architecture without S-channels <\/td>\n<\/tr>\n
1488<\/td>\n41. VSI discovery and configuration protocol (VDP)
41.1 VSI manager ID TLV definition <\/td>\n<\/tr>\n
1489<\/td>\n41.2 VDP association TLV definitions <\/td>\n<\/tr>\n
1496<\/td>\n41.3 Organizationally defined TLV definitions
41.4 Validation rules for VDP TLVs <\/td>\n<\/tr>\n
1497<\/td>\n41.5 VDP state machines <\/td>\n<\/tr>\n
1504<\/td>\n42. S-Channel Discovery and Configuration Protocol (CDCP)
42.1 CDCP discovery and configuration
42.2 CDCP state machine overview <\/td>\n<\/tr>\n
1505<\/td>\n42.3 CDCP configuration state machine <\/td>\n<\/tr>\n
1506<\/td>\n42.4 CDCP configuration variables <\/td>\n<\/tr>\n
1508<\/td>\n42.5 CDCP configuration procedures <\/td>\n<\/tr>\n
1510<\/td>\n43. Edge Control Protocol (ECP)
43.1 Edge control protocol operation <\/td>\n<\/tr>\n
1511<\/td>\n43.2 Edge Control Sublayer Service (ECSS)
43.3 Edge control protocol (ECP) and state machine <\/td>\n<\/tr>\n
1517<\/td>\nAnnex A PICS proforma\u2014Bridge implementations
A.1 Introduction
A.2 Abbreviations and special symbols <\/td>\n<\/tr>\n
1518<\/td>\nA.3 Instructions for completing the PICS proforma <\/td>\n<\/tr>\n
1520<\/td>\nA.4 PICS proforma for IEEE Std 802.1Q\u2014Bridge implementations <\/td>\n<\/tr>\n
1521<\/td>\nA.5 Major capabilities <\/td>\n<\/tr>\n
1525<\/td>\nA.6 Media Access Control methods <\/td>\n<\/tr>\n
1526<\/td>\nA.7 Relay and filtering of frames <\/td>\n<\/tr>\n
1527<\/td>\nA.8 Basic Filtering Services <\/td>\n<\/tr>\n
1528<\/td>\nA.9 Addressing <\/td>\n<\/tr>\n
1530<\/td>\nA.10 Rapid Spanning Tree Protocol <\/td>\n<\/tr>\n
1532<\/td>\nA.11 BPDU encoding
A.12 Implementation parameters <\/td>\n<\/tr>\n
1533<\/td>\nA.13 Performance <\/td>\n<\/tr>\n
1534<\/td>\nA.14 Bridge management <\/td>\n<\/tr>\n
1543<\/td>\nA.15 Remote management <\/td>\n<\/tr>\n
1544<\/td>\nA.16 Expedited traffic classes
A.17 Extended Filtering Services
A.18 Multiple Spanning Tree Protocol <\/td>\n<\/tr>\n
1546<\/td>\nA.19 VLAN support <\/td>\n<\/tr>\n
1550<\/td>\nA.20 MMRP <\/td>\n<\/tr>\n
1551<\/td>\nA.21 MVRP <\/td>\n<\/tr>\n
1552<\/td>\nA.22 MRP <\/td>\n<\/tr>\n
1553<\/td>\nA.23 Connectivity Fault Management <\/td>\n<\/tr>\n
1559<\/td>\nA.24 Management Information Base (MIB) <\/td>\n<\/tr>\n
1561<\/td>\nA.25 Protection Switching <\/td>\n<\/tr>\n
1562<\/td>\nA.26 Data-driven and data-dependent connectivity fault management
A.27 TPMR <\/td>\n<\/tr>\n
1563<\/td>\nA.28 MSP
A.29 Forwarding and queuing for time-sensitive streams <\/td>\n<\/tr>\n
1564<\/td>\nA.30 Congestion notification <\/td>\n<\/tr>\n
1565<\/td>\nA.31 Stream Reservation Protocol <\/td>\n<\/tr>\n
1568<\/td>\nA.32 MIRP <\/td>\n<\/tr>\n
1569<\/td>\nA.33 Priority-based Flow Control
A.34 Enhanced Transmission Selection <\/td>\n<\/tr>\n
1570<\/td>\nA.35 DCBX
A.36 Shortest Path Bridging <\/td>\n<\/tr>\n
1571<\/td>\nA.37 EVB Bridge <\/td>\n<\/tr>\n
1572<\/td>\nA.38 EVB station <\/td>\n<\/tr>\n
1574<\/td>\nA.39 Edge relay <\/td>\n<\/tr>\n
1576<\/td>\nA.40 VEB and VEPA edge relay components <\/td>\n<\/tr>\n
1577<\/td>\nA.41 VDP, CDCP, and ECP <\/td>\n<\/tr>\n
1578<\/td>\nAnnex B PICS proforma\u2014End station implementations
B.1 Introduction
B.2 Abbreviations and special symbols <\/td>\n<\/tr>\n
1579<\/td>\nB.3 Instructions for completing the PICS proforma <\/td>\n<\/tr>\n
1581<\/td>\nB.4 PICS proforma for IEEE Std 802.1Q\u2014End station implementations <\/td>\n<\/tr>\n
1582<\/td>\nB.5 Major capabilities
B.6 MMRP <\/td>\n<\/tr>\n
1583<\/td>\nB.7 MVRP <\/td>\n<\/tr>\n
1584<\/td>\nB.8 MRP <\/td>\n<\/tr>\n
1585<\/td>\nB.9 Forwarding and queuing for time-sensitive streams
B.10 SRP (Stream Reservation Protocol) <\/td>\n<\/tr>\n
1588<\/td>\nB.11 Congestion notification <\/td>\n<\/tr>\n
1590<\/td>\nAnnex C DMN (Designated MSRP Node) Implementations
C.1 Designated MSRP nodes on CSNs <\/td>\n<\/tr>\n
1593<\/td>\nC.2 Designated MSRP Node on MoCA <\/td>\n<\/tr>\n
1598<\/td>\nC.3 Designated MSRP Nodes on IEEE 802.11 media <\/td>\n<\/tr>\n
1607<\/td>\nAnnex D IEEE 802.1 Organizationally Specific TLVs
D.1 Requirements of the IEEE 802.1 Organizationally Specific TLV sets <\/td>\n<\/tr>\n
1608<\/td>\nD.2 Organizationally Specific TLV definitions <\/td>\n<\/tr>\n
1624<\/td>\nD.3 IEEE 802.1 Organizationally Specific TLV management <\/td>\n<\/tr>\n
1625<\/td>\nD.4 IEEE 802.1\/LLDP extension MIB <\/td>\n<\/tr>\n
1708<\/td>\nD.5 PICS proforma for IEEE 802.1 Organizationally Specific TLV extensions <\/td>\n<\/tr>\n
1711<\/td>\nAnnex E Notational conventions used in state diagrams <\/td>\n<\/tr>\n
1713<\/td>\nAnnex F Shared and Independent VLAN Learning
F.1 Requirements for Shared and Independent Learning <\/td>\n<\/tr>\n
1722<\/td>\nF.2 Configuring the Global VLAN Learning Constraints <\/td>\n<\/tr>\n
1723<\/td>\nF.3 Interoperability <\/td>\n<\/tr>\n
1725<\/td>\nAnnex G MAC method dependent aspects of VLAN support
G.1 Example tagged IEEE 802.3 Ethertype-encoded frame format
G.2 Padding and frame size considerations <\/td>\n<\/tr>\n
1727<\/td>\nAnnex H Interoperability considerations
H.1 Requirements for interoperability <\/td>\n<\/tr>\n
1728<\/td>\nH.2 Homogenous IEEE 802.1Q networks <\/td>\n<\/tr>\n
1730<\/td>\nH.3 Heterogeneous networks: Intermixing IEEE 802.1D (D) and IEEE 802.1Q (Q) Bridges <\/td>\n<\/tr>\n
1731<\/td>\nH.4 Heterogeneous networks: GARP and MRP issues <\/td>\n<\/tr>\n
1733<\/td>\nH.5 Intermixing Port-based classification and Port-and-Protocol-based classification or future enhancements in IEEE Std 802.1Q <\/td>\n<\/tr>\n
1735<\/td>\nAnnex I Priority and drop precedence
I.1 Traffic types <\/td>\n<\/tr>\n
1736<\/td>\nI.2 Managing latency and throughput
I.3 Traffic type to traffic class mapping <\/td>\n<\/tr>\n
1738<\/td>\nI.4 Traffic types and priority values <\/td>\n<\/tr>\n
1739<\/td>\nI.5 Supporting the credit-based shaper algorithm <\/td>\n<\/tr>\n
1740<\/td>\nI.6 Supporting drop precedence <\/td>\n<\/tr>\n
1741<\/td>\nI.7 Priority code point allocation
I.8 Interoperability <\/td>\n<\/tr>\n
1743<\/td>\nAnnex J Connectivity Fault Management protocol design and use
J.1 Origin of Connectivity Fault Management
J.2 Deployment of Connectivity Fault Management <\/td>\n<\/tr>\n
1744<\/td>\nJ.3 MD Level allocation alternative
J.4 Relationship of IEEE Std 802.1Q CFM to other standards <\/td>\n<\/tr>\n
1745<\/td>\nJ.5 Interpreting Linktrace results <\/td>\n<\/tr>\n
1746<\/td>\nJ.6 MP addressing: Individual and Shared MP addresses <\/td>\n<\/tr>\n
1751<\/td>\nAnnex K TPMR use cases
K.1 Use case 1\u2014TPMR as User to Network Interface (UNI) demarcation device <\/td>\n<\/tr>\n
1752<\/td>\nK.2 Use case 2\u2014TPMRs with aggregated links
K.3 Use case 3\u2014Multiple TPMRs <\/td>\n<\/tr>\n
1753<\/td>\nK.4 Special cases <\/td>\n<\/tr>\n
1756<\/td>\nAnnex L Operation of the credit-based shaper algorithm
L.1 Overview of credit-based shaper operation <\/td>\n<\/tr>\n
1759<\/td>\nL.2 \u201cClass measurement intervals\u201d\u009d in Bridges <\/td>\n<\/tr>\n
1761<\/td>\nL.3 Determining worst-case latency contribution and buffering requirements <\/td>\n<\/tr>\n
1771<\/td>\nL.4 Operation of the credit-based shaper in a coordinated shared network <\/td>\n<\/tr>\n
1773<\/td>\nAnnex M Support for PFC in link layers without MAC Control
M.1 Overview
M.2 PFC PDU Format <\/td>\n<\/tr>\n
1774<\/td>\nAnnex N Buffer requirements for Priority-based Flow Control
N.1 Overview <\/td>\n<\/tr>\n
1775<\/td>\nN.2 Delay model <\/td>\n<\/tr>\n
1777<\/td>\nN.3 Interface Delay
N.4 Cable Delay
N.5 Higher Layer Delay <\/td>\n<\/tr>\n
1778<\/td>\nN.6 Computation example <\/td>\n<\/tr>\n
1779<\/td>\nAnnex O Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Local and metropolitan area networks–Media Access Control (MAC) Bridges and Virtual Bridges<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2012<\/td>\n1782<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":112089,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-112088","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/112088","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/112089"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=112088"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=112088"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=112088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}