{"id":82016,"date":"2024-10-18T03:00:28","date_gmt":"2024-10-18T03:00:28","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-802-17-2011\/"},"modified":"2024-10-24T19:48:50","modified_gmt":"2024-10-24T19:48:50","slug":"ieee-802-17-2011","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-802-17-2011\/","title":{"rendered":"IEEE 802.17 2011"},"content":{"rendered":"

Revision Standard – Active. This standard defines the medium access control characteristics, physical layer interface methods and layer management parameters for the resilient packet ring (RPR) access method for ring topologies. A set of protocols for detecting and initializing the shared ring configuration, recovering from failures, and regulating fair access to the shared medium are also described. Specifications are provided for interface to a number of physical layers, supporting data rates up to 10 Gb\/s. System considerations and management information base (MIB) specifications are also provided in this standard. The PDF of the standard is available at no cost compliments of the GETIEEE802 group located at http:\/\/standards.ieee.org\/about\/get\/802\/support.html<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std 802.17\u2122-2011, front cover <\/td>\n<\/tr>\n
3<\/td>\nTitle page
\n <\/td>\n<\/tr>\n
6<\/td>\nIntroduction
Notice to users
Laws and regulations
Copyrights
Updating of IEEE documents
Errata
Interpretations <\/td>\n<\/tr>\n
7<\/td>\nPatents
Participants <\/td>\n<\/tr>\n
9<\/td>\nContents <\/td>\n<\/tr>\n
20<\/td>\nList of tables <\/td>\n<\/tr>\n
23<\/td>\nList of figures <\/td>\n<\/tr>\n
27<\/td>\nImportant notice
\n
1. Overview
1.1 Scope
1.2 Purpose <\/td>\n<\/tr>\n
28<\/td>\n1.3 RPR features
1.4 Document structure <\/td>\n<\/tr>\n
30<\/td>\n2. Normative references <\/td>\n<\/tr>\n
32<\/td>\n3. Terms, definitions, and notation
3.1 Conformance levels
3.2 Terms and definitions <\/td>\n<\/tr>\n
39<\/td>\n3.3 Service definition method and notation
3.3.1 Classification of service primitives <\/td>\n<\/tr>\n
40<\/td>\n3.4 State machines
3.4.1 State table notation <\/td>\n<\/tr>\n
42<\/td>\n3.5 Arithmetic and logical operators
3.6 Numerical representation
3.7 Field notations
3.7.1 Use of italics <\/td>\n<\/tr>\n
43<\/td>\n3.7.2 Field conventions
3.7.3 Field value conventions <\/td>\n<\/tr>\n
44<\/td>\n3.8 Bit numbering and ordering
3.9 Byte-sequential formats <\/td>\n<\/tr>\n
45<\/td>\n3.10 Left-to-right ordering <\/td>\n<\/tr>\n
46<\/td>\n3.11 Representation of MAC addresses
3.12 Mapping of numeric data values to fields <\/td>\n<\/tr>\n
47<\/td>\n3.13 Informative notes
3.14 Conventions for C code used in state machines
3.15 Ringlet orientation conventions <\/td>\n<\/tr>\n
48<\/td>\n4. Abbreviations and acronyms <\/td>\n<\/tr>\n
50<\/td>\n5. Architecture overview
5.1 Terminology <\/td>\n<\/tr>\n
51<\/td>\n5.2 Layer model <\/td>\n<\/tr>\n
52<\/td>\n5.3 Ring structure
5.4 Station structure <\/td>\n<\/tr>\n
53<\/td>\n5.5 MAC architecture
5.5.1 Datapath connectivity <\/td>\n<\/tr>\n
54<\/td>\n5.5.2 Ringlet selection <\/td>\n<\/tr>\n
55<\/td>\n5.5.3 MAC datapath flows <\/td>\n<\/tr>\n
56<\/td>\n5.5.4 Receive rules
5.6 MAC service
5.6.1 MAC data primitives <\/td>\n<\/tr>\n
57<\/td>\n5.6.2 Service classes <\/td>\n<\/tr>\n
58<\/td>\n5.6.3 MAC flow control primitives
5.7 Frame transmissions
5.7.1 Unicast transmissions <\/td>\n<\/tr>\n
59<\/td>\n5.7.2 Flooded transmissions <\/td>\n<\/tr>\n
60<\/td>\n5.7.3 Multicast transmissions
5.8 Frame formats
5.9 Frame transmissions
5.9.1 Local-source\/local-destination transmissions <\/td>\n<\/tr>\n
61<\/td>\n5.9.2 Local-source multicast transmissions <\/td>\n<\/tr>\n
62<\/td>\n5.9.3 Local-source unknown-unicast transmissions
5.9.4 Remote-source unicast transmissions <\/td>\n<\/tr>\n
63<\/td>\n5.9.5 Remote-source multicast transmissions <\/td>\n<\/tr>\n
64<\/td>\n5.10 Spatial reuse
5.11 Bandwidth allocation <\/td>\n<\/tr>\n
65<\/td>\n5.11.1 Allocation enforcement
5.11.2 Allocation consistency <\/td>\n<\/tr>\n
67<\/td>\n5.12 Fairness
5.12.1 Equal-weighted fairness <\/td>\n<\/tr>\n
68<\/td>\n5.12.2 Fairness frame distribution
5.12.3 Multi-choke fairness frame distribution
5.13 Transit-queuing options <\/td>\n<\/tr>\n
69<\/td>\n5.14 Fault response methods
5.14.1 Fault response mechanisms <\/td>\n<\/tr>\n
70<\/td>\n5.14.2 Protection hierarchy <\/td>\n<\/tr>\n
71<\/td>\n5.14.3 Wrap then steer
5.15 Topology discovery <\/td>\n<\/tr>\n
72<\/td>\n5.16 Frame ordering
5.16.1 Strict and relaxed transmissions
5.17 Operations, administration, and maintenance (OAM)
5.17.1 Echo operations <\/td>\n<\/tr>\n
73<\/td>\n5.17.2 Flushing previously sourced traffic
5.17.3 Management information base (MIB) <\/td>\n<\/tr>\n
74<\/td>\n5.18 Spatially aware sublayer
5.19 Protected inter-ring connection <\/td>\n<\/tr>\n
75<\/td>\n6. Medium access control (MAC) service and reference model
6.1 Overview
6.2 Terminology and variables <\/td>\n<\/tr>\n
76<\/td>\n6.3 Overview of MAC services
6.3.1 Service types <\/td>\n<\/tr>\n
77<\/td>\n6.3.2 Service classes <\/td>\n<\/tr>\n
78<\/td>\n6.4 MAC services to the client layer
6.4.1 MA_DATA.request <\/td>\n<\/tr>\n
82<\/td>\n6.4.2 MA_DATA.indication <\/td>\n<\/tr>\n
84<\/td>\n6.4.3 MA_CONTROL.request <\/td>\n<\/tr>\n
85<\/td>\n6.4.4 MA_CONTROL.indication <\/td>\n<\/tr>\n
87<\/td>\n6.5 MAC compliance test points <\/td>\n<\/tr>\n
88<\/td>\n6.5.1 1 Gb\/s PacketPHY
6.5.2 10 Gb\/s PacketPHY
6.5.3 SONET\/SDH
6.6 MAC reference model <\/td>\n<\/tr>\n
89<\/td>\n6.6.1 MAC control sublayer <\/td>\n<\/tr>\n
90<\/td>\n6.6.2 MAC datapath sublayer <\/td>\n<\/tr>\n
91<\/td>\n6.6.3 Flow of data within the MAC <\/td>\n<\/tr>\n
93<\/td>\n6.6.4 Reconciliation sublayer
6.6.5 Medium access control <\/td>\n<\/tr>\n
94<\/td>\n6.6.6 Operations, administration, and maintenance (OAM)
6.6.7 MAC layer management entity (MLME) <\/td>\n<\/tr>\n
95<\/td>\n6.7 Protocol Implementation Conformance Statement (PICS) proforma for Clause 6
6.7.1 Introduction
6.7.2 Identification <\/td>\n<\/tr>\n
96<\/td>\n6.7.3 PICS tables for Clause 6 <\/td>\n<\/tr>\n
97<\/td>\n7. Medium access control datapath
7.1 Datapath overview <\/td>\n<\/tr>\n
98<\/td>\n7.2 Terminology and variables
7.2.1 Common state machine definitions <\/td>\n<\/tr>\n
100<\/td>\n7.2.2 Common state machine variables <\/td>\n<\/tr>\n
103<\/td>\n7.2.3 Common state machine routines <\/td>\n<\/tr>\n
105<\/td>\n7.2.4 Variables and literals defined in other clauses <\/td>\n<\/tr>\n
107<\/td>\n7.2.5 Flow count variables <\/td>\n<\/tr>\n
109<\/td>\n7.3 Service classes <\/td>\n<\/tr>\n
110<\/td>\n7.3.1 Service class classA <\/td>\n<\/tr>\n
111<\/td>\n7.3.2 Service class classB <\/td>\n<\/tr>\n
112<\/td>\n7.3.3 Service class classC
7.3.4 Reclamation
7.4 Datapaths
7.4.1 Add paths <\/td>\n<\/tr>\n
113<\/td>\n7.4.2 Transit paths <\/td>\n<\/tr>\n
114<\/td>\n7.4.3 Passthrough mode
7.4.4 Protection datapaths <\/td>\n<\/tr>\n
119<\/td>\n7.5 Rate control
7.5.1 MAC shaper overview <\/td>\n<\/tr>\n
120<\/td>\n7.5.2 Add queue flow control <\/td>\n<\/tr>\n
121<\/td>\n7.5.3 IdleShaper state machine <\/td>\n<\/tr>\n
123<\/td>\n7.5.4 MacControlShaper state machine <\/td>\n<\/tr>\n
124<\/td>\n7.5.5 ClassAShaper state machine <\/td>\n<\/tr>\n
127<\/td>\n7.5.6 ClassBShaper state machine <\/td>\n<\/tr>\n
130<\/td>\n7.5.7 Fairness eligible shaper state machines <\/td>\n<\/tr>\n
136<\/td>\n7.5.8 DownstreamShaper state machine <\/td>\n<\/tr>\n
138<\/td>\n7.6 Receive operation
7.6.1 Receive operation for strict data frames <\/td>\n<\/tr>\n
140<\/td>\n7.6.2 Reception in wrapping systems <\/td>\n<\/tr>\n
141<\/td>\n7.6.3 Receive operation state machines <\/td>\n<\/tr>\n
171<\/td>\n7.6.4 WrongRinglet state machine <\/td>\n<\/tr>\n
172<\/td>\n7.7 Transmit operation <\/td>\n<\/tr>\n
173<\/td>\n7.7.1 Ringlet selection <\/td>\n<\/tr>\n
185<\/td>\n7.7.2 Determination of cleave point <\/td>\n<\/tr>\n
186<\/td>\n7.7.3 Setting of ttl and ttlBase <\/td>\n<\/tr>\n
189<\/td>\n7.7.4 StageQueueSelection state machine <\/td>\n<\/tr>\n
194<\/td>\n7.7.5 DataAddCount state machine <\/td>\n<\/tr>\n
196<\/td>\n7.7.6 ControlAddCount state machine <\/td>\n<\/tr>\n
198<\/td>\n7.7.7 Single queue MAC design <\/td>\n<\/tr>\n
201<\/td>\n7.7.8 Dual queue MAC design <\/td>\n<\/tr>\n
205<\/td>\n7.7.9 TransmitCount state machine <\/td>\n<\/tr>\n
208<\/td>\n7.7.10 TransmitRoute state machine <\/td>\n<\/tr>\n
210<\/td>\n7.8 Protocol Implementation Conformance Statement (PICS) proforma for Clause 7
7.8.1 Introduction
7.8.2 Identification <\/td>\n<\/tr>\n
211<\/td>\n7.8.3 PICS tables for Clause 7 <\/td>\n<\/tr>\n
215<\/td>\n8. MAC physical interface
8.1 Overview
8.1.1 Objectives <\/td>\n<\/tr>\n
216<\/td>\n8.1.2 Relationship to other standards
8.2 MAC physical layer service interface
8.2.1 PHY_DATA.request <\/td>\n<\/tr>\n
217<\/td>\n8.2.2 PHY_DATA.indication <\/td>\n<\/tr>\n
218<\/td>\n8.2.3 PHY_LINK_STATUS.indication <\/td>\n<\/tr>\n
219<\/td>\n8.2.4 Mapping of PHY_READY.indication
8.3 PacketPHY physical layer interfaces and PHYs
8.3.1 PacketPHY reconciliation sublayers <\/td>\n<\/tr>\n
220<\/td>\n8.3.2 PacketPHYs <\/td>\n<\/tr>\n
221<\/td>\n8.4 SONET\/SDH physical layer interfaces and PHYs <\/td>\n<\/tr>\n
222<\/td>\n8.4.1 SONET\/SDH reconciliation sublayers
8.4.2 SONET\/SDH adaptation sublayers <\/td>\n<\/tr>\n
224<\/td>\n8.4.3 SONET\/SDH physical layer entities (PHYs) <\/td>\n<\/tr>\n
226<\/td>\n8.5 Protocol Implementation Conformance Statement (PICS) proforma for Clause 8
8.5.1 Introduction
8.5.2 Identification <\/td>\n<\/tr>\n
227<\/td>\n8.5.3 Major capabilities\/options
8.5.4 PICS tables for Clause 8 <\/td>\n<\/tr>\n
229<\/td>\n9. Frame formats
9.1 Overview
9.2 Data frame format
9.2.1 Data frame sizes <\/td>\n<\/tr>\n
230<\/td>\n9.2.2 Data frame fields <\/td>\n<\/tr>\n
231<\/td>\n9.3 Control frame format
9.3.1 Control frame sizes <\/td>\n<\/tr>\n
232<\/td>\n9.3.2 Control frame fields <\/td>\n<\/tr>\n
234<\/td>\n9.4 Fairness frame format
9.4.1 Fairness frame sizes
9.4.2 Fairness frame fields <\/td>\n<\/tr>\n
235<\/td>\n9.5 Idle frame format
9.5.1 Idle frame sizes
9.5.2 Idle frame fields <\/td>\n<\/tr>\n
236<\/td>\n9.6 baseControl subfields <\/td>\n<\/tr>\n
238<\/td>\n9.7 extendedControl subfields <\/td>\n<\/tr>\n
240<\/td>\n9.8 Protocol Implementation Conformance Statement (PICS) proforma for Clause 9
9.8.1 Introduction
9.8.2 Identification <\/td>\n<\/tr>\n
241<\/td>\n9.8.3 PICS tables for Clause 9 <\/td>\n<\/tr>\n
242<\/td>\n10. Fairness
10.1 Overview
10.1.1 Fairness instances <\/td>\n<\/tr>\n
245<\/td>\n10.1.2 Services and features
10.1.3 Fairness algorithm overview <\/td>\n<\/tr>\n
256<\/td>\n10.2 Terms, definitions, variables, and routines
10.2.1 Common state machine definitions <\/td>\n<\/tr>\n
257<\/td>\n10.2.2 Common state machine variables <\/td>\n<\/tr>\n
261<\/td>\n10.2.3 Common state machine routines <\/td>\n<\/tr>\n
262<\/td>\n10.2.4 Variables and routines defined in other clauses <\/td>\n<\/tr>\n
263<\/td>\n10.3 Frame formats
10.3.1 Fairness frame format <\/td>\n<\/tr>\n
264<\/td>\n10.3.2 Fairness differential delay (FDD) frame format
10.4 Fairness state machines <\/td>\n<\/tr>\n
265<\/td>\n10.4.1 PerByte state machine <\/td>\n<\/tr>\n
268<\/td>\n10.4.2 PerAgingInterval state machine <\/td>\n<\/tr>\n
272<\/td>\n10.4.3 AggressiveRateAdjust state machine <\/td>\n<\/tr>\n
274<\/td>\n10.4.4 ConservativeRateAdjust state machine <\/td>\n<\/tr>\n
277<\/td>\n10.4.5 PerAdvertisingInterval state machine <\/td>\n<\/tr>\n
281<\/td>\n10.4.6 PerReportingInterval state machine <\/td>\n<\/tr>\n
282<\/td>\n10.4.7 ActiveWeightsComputation state machine <\/td>\n<\/tr>\n
284<\/td>\n10.4.8 FairnessFrameReceive state machine <\/td>\n<\/tr>\n
287<\/td>\n10.4.9 FddFrameTransmit state machine <\/td>\n<\/tr>\n
288<\/td>\n10.4.10 FrttComputation state machine <\/td>\n<\/tr>\n
294<\/td>\n10.5 Explanation of aging and rates (informative) <\/td>\n<\/tr>\n
297<\/td>\n10.6 Protocol Implementation Conformance Statement (PICS) proforma for Clause 10
10.6.1 Introduction
10.6.2 Identification <\/td>\n<\/tr>\n
298<\/td>\n10.6.3 PICS tables for Clause 10 <\/td>\n<\/tr>\n
300<\/td>\n11. Topology discovery and protection
11.1 Overview <\/td>\n<\/tr>\n
301<\/td>\n11.1.1 Protocol overview <\/td>\n<\/tr>\n
302<\/td>\n11.1.2 Topology database maintenance <\/td>\n<\/tr>\n
303<\/td>\n11.1.3 Context containment <\/td>\n<\/tr>\n
304<\/td>\n11.1.4 Secondary MAC addresses
11.1.5 LRTT measurement protocol <\/td>\n<\/tr>\n
305<\/td>\n11.1.6 Fault response mechanisms <\/td>\n<\/tr>\n
306<\/td>\n11.2 Terminology and variables
11.2.1 Terminology <\/td>\n<\/tr>\n
307<\/td>\n11.2.2 Common state machine definitions <\/td>\n<\/tr>\n
308<\/td>\n11.2.3 Common state machine variables <\/td>\n<\/tr>\n
310<\/td>\n11.2.4 ringInfo fields <\/td>\n<\/tr>\n
311<\/td>\n11.2.5 myTopoInfo fields <\/td>\n<\/tr>\n
313<\/td>\n11.2.6 topoEntry[rid][hops] fields <\/td>\n<\/tr>\n
314<\/td>\n11.2.7 Common state machine routines <\/td>\n<\/tr>\n
316<\/td>\n11.2.8 Variables and routines defined in other clauses
11.2.9 Defect indications <\/td>\n<\/tr>\n
318<\/td>\n11.3 Frame formats
11.3.1 Topology and protection (TP) frame format <\/td>\n<\/tr>\n
319<\/td>\n11.3.2 Topology checksum (TC) frame format <\/td>\n<\/tr>\n
321<\/td>\n11.3.3 Loop round-trip time request frame format <\/td>\n<\/tr>\n
322<\/td>\n11.3.4 Loop round-trip time response frame format
11.3.5 ATD frame format <\/td>\n<\/tr>\n
324<\/td>\n11.4 Defined ATT encodings
11.4.1 Weight ATT <\/td>\n<\/tr>\n
325<\/td>\n11.4.2 Station bandwidth ATT
11.4.3 Station settings ATT <\/td>\n<\/tr>\n
326<\/td>\n11.4.4 Station name ATT
11.4.5 Management address ATT <\/td>\n<\/tr>\n
327<\/td>\n11.4.6 Station interface index ATT
11.4.7 Secondary MAC ATT <\/td>\n<\/tr>\n
328<\/td>\n11.4.8 Organization-specific ATT <\/td>\n<\/tr>\n
329<\/td>\n11.5 Topology database
11.5.1 Topology database structure <\/td>\n<\/tr>\n
333<\/td>\n11.5.2 Attribute updates
11.5.3 Lower level representation of topology database <\/td>\n<\/tr>\n
334<\/td>\n11.5.4 Topology change sequence <\/td>\n<\/tr>\n
336<\/td>\n11.6 State machines
11.6.1 State machine functions <\/td>\n<\/tr>\n
337<\/td>\n11.6.2 ReceiveMonitor state machine <\/td>\n<\/tr>\n
339<\/td>\n11.6.3 TopologyControl state machine <\/td>\n<\/tr>\n
343<\/td>\n11.6.4 ParseTpFrame state machine <\/td>\n<\/tr>\n
347<\/td>\n11.6.5 ProtectionUpdate state machine <\/td>\n<\/tr>\n
356<\/td>\n11.6.6 TopologyValidation state machine <\/td>\n<\/tr>\n
362<\/td>\n11.6.7 TransmitTpFrame state machine <\/td>\n<\/tr>\n
364<\/td>\n11.6.8 ReceiveTpFrame state machines <\/td>\n<\/tr>\n
366<\/td>\n11.6.9 TransmitTcFrame state machine <\/td>\n<\/tr>\n
368<\/td>\n11.6.10 ReceiveTcFrame state machine <\/td>\n<\/tr>\n
369<\/td>\n11.6.11 Transmit rules for ATD frames <\/td>\n<\/tr>\n
370<\/td>\n11.6.12 Receive rules for ATD frames <\/td>\n<\/tr>\n
371<\/td>\n11.6.13 SecondaryUpdate state machine <\/td>\n<\/tr>\n
376<\/td>\n11.6.14 TimingLrttFrame state machine <\/td>\n<\/tr>\n
381<\/td>\n11.7 Protocol Implementation Conformance Statement (PICS) proforma for Clause 11
11.7.1 Introduction
11.7.2 Identification <\/td>\n<\/tr>\n
382<\/td>\n11.7.3 PICS tables for Clause 11 <\/td>\n<\/tr>\n
386<\/td>\n12. Operations, administration, and maintenance (OAM)
12.1 Overview
12.1.1 Protocol overview <\/td>\n<\/tr>\n
387<\/td>\n12.1.2 OAM functions supported by RPR
12.1.3 Fault management <\/td>\n<\/tr>\n
388<\/td>\n12.1.4 Echo operations
12.1.5 Flush operations <\/td>\n<\/tr>\n
389<\/td>\n12.1.6 Organization-specific operations
12.1.7 SAS notify operations
12.1.8 PIRC management operations
12.2 Terminology and variables
12.2.1 Common state machine definitions
12.2.2 Common variables <\/td>\n<\/tr>\n
390<\/td>\n12.2.3 Common routines
12.2.4 Literals and routines defined in other clauses <\/td>\n<\/tr>\n
391<\/td>\n12.3 OAM frame formats
12.3.1 Echo request\/response payload <\/td>\n<\/tr>\n
392<\/td>\n12.3.2 Flush frame <\/td>\n<\/tr>\n
393<\/td>\n12.3.3 Organization-specific frame <\/td>\n<\/tr>\n
394<\/td>\n12.3.4 SAS notify frame <\/td>\n<\/tr>\n
395<\/td>\n12.3.5 PIRC frame <\/td>\n<\/tr>\n
397<\/td>\n12.4 OAM service primitives
12.4.1 Echo MA_CONTROL.request <\/td>\n<\/tr>\n
398<\/td>\n12.4.2 Echo MA_CONTROL.indication
12.4.3 Flush MA_CONTROL.request <\/td>\n<\/tr>\n
399<\/td>\n12.4.4 Flush MA_CONTROL.indication
12.4.5 Organization-specific MA_CONTROL.request <\/td>\n<\/tr>\n
400<\/td>\n12.4.6 Organization-specific MA_CONTROL.indication <\/td>\n<\/tr>\n
401<\/td>\n12.4.7 SAS notify MA_CONTROL.request <\/td>\n<\/tr>\n
402<\/td>\n12.5 OAM state machines
12.5.1 OamFrameTransmit state machine <\/td>\n<\/tr>\n
403<\/td>\n12.5.2 OamFrameReceive state machine <\/td>\n<\/tr>\n
406<\/td>\n12.6 Performance monitoring
12.6.1 Performance monitoring counters <\/td>\n<\/tr>\n
407<\/td>\n12.6.2 Available and unavailable seconds <\/td>\n<\/tr>\n
408<\/td>\n12.7 Protocol Implementation Conformance Statement (PICS) proforma for Clause 12
12.7.1 Introduction
12.7.2 Identification <\/td>\n<\/tr>\n
409<\/td>\n12.7.3 PICS tables for Clause 12 <\/td>\n<\/tr>\n
412<\/td>\n13. Layer management entity interface
13.1 Overview of the management model
13.2 MLME service interface <\/td>\n<\/tr>\n
413<\/td>\n13.2.1 MLME_GET.request
13.2.2 MLME_SET.request <\/td>\n<\/tr>\n
414<\/td>\n13.2.3 MLME_EVENT.indication <\/td>\n<\/tr>\n
415<\/td>\n13.2.4 MLME_RESET.request <\/td>\n<\/tr>\n
416<\/td>\n13.3 MLME services
13.3.1 RPR interface configuration <\/td>\n<\/tr>\n
417<\/td>\n13.3.2 Topology discovery monitoring
13.3.3 Performance and accounting measurements <\/td>\n<\/tr>\n
420<\/td>\n13.4 Protocol Implementation Conformance Statement (PICS) proforma for Clause 13
13.4.1 Introduction
13.4.2 Identification <\/td>\n<\/tr>\n
421<\/td>\n13.4.3 PICS tables for Clause 13 <\/td>\n<\/tr>\n
422<\/td>\n14. Spatially aware sublayer
14.1 Spatially aware sublayer overview <\/td>\n<\/tr>\n
423<\/td>\n14.2 Terminology and variables
14.2.1 Common definitions
14.2.2 Common state machine variables <\/td>\n<\/tr>\n
424<\/td>\n14.2.3 Common state machine routines
14.2.4 Variables and literals defined in other clauses <\/td>\n<\/tr>\n
425<\/td>\n14.2.5 SAS database fields <\/td>\n<\/tr>\n
427<\/td>\n14.2.6 SAS statistics counters
14.3 SAS association database
14.3.1 Logical representation of SAS tables <\/td>\n<\/tr>\n
429<\/td>\n14.3.2 Static unicast entries
14.3.3 Static multicast entries
14.3.4 Dynamic entries <\/td>\n<\/tr>\n
430<\/td>\n14.3.5 Mapping of VIDs to FIDs
14.4 SDB operations
14.4.1 SAS learning process <\/td>\n<\/tr>\n
431<\/td>\n14.4.2 Querying the SDB
14.4.3 SDB entry removal <\/td>\n<\/tr>\n
432<\/td>\n14.5 SAS operations
14.5.1 Principles of unicast operation <\/td>\n<\/tr>\n
433<\/td>\n14.5.2 Principles of multicast operation <\/td>\n<\/tr>\n
435<\/td>\n14.5.3 Transmit operation <\/td>\n<\/tr>\n
438<\/td>\n14.5.4 SAS receive operation <\/td>\n<\/tr>\n
441<\/td>\n14.6 Protocol Implementation Conformance Statement (PICS) proforma for Clause 14
14.6.1 Introduction
14.6.2 Identification <\/td>\n<\/tr>\n
442<\/td>\n14.6.3 PICS tables for Clause 14 <\/td>\n<\/tr>\n
444<\/td>\n15. Protected inter-ring connection
15.1 Protected inter-ring connection overview
15.1.1 PIRC stations <\/td>\n<\/tr>\n
445<\/td>\n15.1.2 PIRC load balancing
15.1.3 PIRC misconfiguration detection
15.1.4 PIRC failure conditions
15.1.5 PIRC maintenance commands <\/td>\n<\/tr>\n
446<\/td>\n15.1.6 PIRC reversion mode
15.1.7 PIRC protection hierarchy
15.1.8 PIRC ring-interconnection forwarding states
15.2 Terminology and variables
15.2.1 Common state machine definitions <\/td>\n<\/tr>\n
447<\/td>\n15.2.2 Common state machine variables
15.2.3 Common state machine routines <\/td>\n<\/tr>\n
448<\/td>\n15.2.4 Variables and literals defined in other clauses <\/td>\n<\/tr>\n
449<\/td>\n15.3 PIRC database
15.3.1 pircProv provisioning database <\/td>\n<\/tr>\n
450<\/td>\n15.3.2 pircInfo dynamic information database
15.3.3 pircMateMsg mate information database
15.4 State machines
15.4.1 PircMateMsgReceive state machine <\/td>\n<\/tr>\n
451<\/td>\n15.4.2 PircControl state machine <\/td>\n<\/tr>\n
453<\/td>\n15.4.3 PircProtectionUpdate state machine <\/td>\n<\/tr>\n
457<\/td>\n15.4.4 PircMateMsgTransmit state machine <\/td>\n<\/tr>\n
458<\/td>\n15.5 PIRC operations
15.5.1 PIRC receive operation <\/td>\n<\/tr>\n
460<\/td>\n15.5.2 PIRC transmit operation <\/td>\n<\/tr>\n
462<\/td>\n15.6 Protocol Implementation Conformance Statement (PICS) proforma for Clause 15
15.6.1 Introduction
15.6.2 Identification <\/td>\n<\/tr>\n
463<\/td>\n15.6.3 PICS tables for Clause 15 <\/td>\n<\/tr>\n
464<\/td>\nAnnex A (informative) Bibliography <\/td>\n<\/tr>\n
466<\/td>\nAnnex B (normative) PacketPHY reconciliation sublayers
\n
B.1 Overview
B.2 1 Gb\/s PacketPHY reconciliation sublayer (PRS-1) <\/td>\n<\/tr>\n
467<\/td>\nB.2.1 General requirements <\/td>\n<\/tr>\n
471<\/td>\nB.2.2 GMII data stream
B.2.3 GMII functional specifications <\/td>\n<\/tr>\n
472<\/td>\nB.2.4 Electrical characteristics
B.3 10 Gb\/s PacketPHY Reconciliation Sublayer (PRS-10)
B.3.1 General requirements <\/td>\n<\/tr>\n
477<\/td>\nB.3.2 XGMII data stream
B.3.3 Functional specifications <\/td>\n<\/tr>\n
478<\/td>\nB.3.4 Electrical characteristics
B.3.5 XGXS and XAUI <\/td>\n<\/tr>\n
479<\/td>\nB.4 Protocol Implementation Conformance Statement (PICS) proforma for Annex B
B.4.1 Introduction
B.4.2 Identification <\/td>\n<\/tr>\n
480<\/td>\nB.4.3 Major capabilities\/options
B.4.4 PICS tables for Annex B <\/td>\n<\/tr>\n
482<\/td>\nAnnex C (normative) SONET\/SDH reconciliation sublayers
\n
C.1 Overview
C.1.1 Relationship to other sublayers
C.1.2 SRS and GRS interfaces <\/td>\n<\/tr>\n
484<\/td>\nC.1.3 Link status signals <\/td>\n<\/tr>\n
485<\/td>\nC.1.4 Electrical specifications
C.2 Physical frame format for SRS and GRS
C.2.1 SRS physical frame format <\/td>\n<\/tr>\n
486<\/td>\nC.2.2 GRS physical frame format <\/td>\n<\/tr>\n
488<\/td>\nC.3 SRS and GRS using the 8-bit SPI-3 interface
C.3.1 General requirements <\/td>\n<\/tr>\n
491<\/td>\nC.3.2 Mapping of SPI-3 signals to service interface primitives <\/td>\n<\/tr>\n
493<\/td>\nC.3.3 SRS and GRS 8-bit SPI datastream
C.3.4 Functional specifications
C.3.5 Electrical specifications
C.4 SRS and GRS using the 32-bit SPI-3 interface
C.4.1 General requirements <\/td>\n<\/tr>\n
497<\/td>\nC.4.2 Mapping of SPI-3 signals to service interface primitives <\/td>\n<\/tr>\n
501<\/td>\nC.4.3 SRS and GRS 32-bit SPI datastream
C.4.4 Functional specifications
C.4.5 Electrical timing specifications
C.5 SRS and GRS using the SPI-4 Phase 1 interface
C.5.1 General requirements <\/td>\n<\/tr>\n
505<\/td>\nC.5.2 Mapping of SPI-4 signals to service interface primitives <\/td>\n<\/tr>\n
507<\/td>\nC.5.3 SRS and GRS 64-bit SPI datastream
C.5.4 Functional specifications
C.5.5 Electrical specifications
C.6 SRS and GRS using SPI-4.2 interface <\/td>\n<\/tr>\n
508<\/td>\nC.6.1 General requirements <\/td>\n<\/tr>\n
511<\/td>\nC.6.2 Mapping of SPI-4 signals to service interface primitives <\/td>\n<\/tr>\n
512<\/td>\nC.6.3 SRS and GRS SPI-4.2 datastream
C.6.4 Functional specifications
C.6.5 Electrical specifications <\/td>\n<\/tr>\n
513<\/td>\nC.7 Protocol Implementation Conformance Statement (PICS) proforma for Annex C
C.7.1 Introduction
C.7.2 Identification <\/td>\n<\/tr>\n
514<\/td>\nC.7.3 Major capabilities\/options
C.7.4 PICS tables for Annex C <\/td>\n<\/tr>\n
517<\/td>\nAnnex D (normative) SNMP MIB definitions
D.1 Introduction
D.2 The SNMP management framework
D.3 Security considerations <\/td>\n<\/tr>\n
519<\/td>\nD.4 MIB Structure
D.4.1 Structure of the MIB <\/td>\n<\/tr>\n
520<\/td>\nD.5 Relationship to other MIBs
D.5.1 Relationship to the Interfaces MIB <\/td>\n<\/tr>\n
523<\/td>\nD.5.2 Relationship to PHY MIBs
D.6 Definitions for the RPR MIB <\/td>\n<\/tr>\n
669<\/td>\nAnnex E (normative) CRC and parity calculations
E.1 Cyclic redundancy check 16-bit (CRC16) algorithmic definition
E.1.1 Serial CRC16 calculation <\/td>\n<\/tr>\n
670<\/td>\nE.1.2 CRC16 calculations
E.1.3 Protected header-field changes <\/td>\n<\/tr>\n
671<\/td>\nE.1.4 Illustration of CRC16 checks
E.2 Cyclic redundancy check 32-bit (CRC32) algorithmic definition <\/td>\n<\/tr>\n
672<\/td>\nE.2.1 Serial CRC32 calculation <\/td>\n<\/tr>\n
673<\/td>\nE.2.2 Exchanged ExorSum calculations
E.2.3 Payload CRC stomping <\/td>\n<\/tr>\n
674<\/td>\nE.2.4 Illustration of CRC32 checks <\/td>\n<\/tr>\n
675<\/td>\nE.3 Parity algorithmic definition
E.3.1 Parity calculation
E.3.2 Illustration of fairness-frame checks <\/td>\n<\/tr>\n
676<\/td>\nE.4 Protocol Implementation Conformance Statement (PICS) proforma for Annex E
E.4.1 Introduction
E.4.2 Identification <\/td>\n<\/tr>\n
677<\/td>\nE.4.3 PICS tables for Annex E <\/td>\n<\/tr>\n
678<\/td>\nAnnex F (informative) 802.1D and 802.1Q bridging conformance
F.1 Bridging overview
F.1.1 802 bridging reference model <\/td>\n<\/tr>\n
679<\/td>\nF.1.2 RPR support of the MAC service
F.1.3 Transmission between local and remote end stations <\/td>\n<\/tr>\n
681<\/td>\nF.1.4 Maintaining filtering integrity of the 802 bridged network <\/td>\n<\/tr>\n
685<\/td>\nF.1.5 RPR support for basic bridging model with spatial reuse for local hosts
F.1.6 Duplication\/misordering prevention <\/td>\n<\/tr>\n
686<\/td>\nF.1.7 MAC client invocation of optional RPR service parameters
F.1.8 RPR requirements for 802.1D and 802.1Q bridging conformance <\/td>\n<\/tr>\n
687<\/td>\nF.2 Architectural model of an 802.1D compliant RPR bridge
F.2.1 Bridge relay entity
F.2.2 Ports
F.2.3 Higher layer entities <\/td>\n<\/tr>\n
688<\/td>\nF.3 RPR MAC Internal Sublayer Service
F.3.1 RPR MAC support of Internal Sublayer Service
F.3.2 RPR MAC support of Enhanced Internal Sublayer Service <\/td>\n<\/tr>\n
692<\/td>\nF.4 Bridge protocol entity interactions
F.5 MAC client transmission requirements <\/td>\n<\/tr>\n
693<\/td>\nF.6 MAC client reception requirements <\/td>\n<\/tr>\n
695<\/td>\nAnnex G (informative) Implementation guidelines
G.1 Sizing of secondary transit queue and addRateA1
G.1.1 Calculation of minimum size for secondary transit queue <\/td>\n<\/tr>\n
696<\/td>\nG.1.2 Calculation of maximum addRateA1
G.2 ClassA shaping effects on jitter
G.2.1 ClassA shaper characteristics <\/td>\n<\/tr>\n
697<\/td>\nG.2.2 ClassA shaper behaviors
G.2.3 ClassA clamped-credit shaper behaviors <\/td>\n<\/tr>\n
699<\/td>\nAnnex H (informative) C-code illustrations of CRC computations <\/td>\n<\/tr>\n
714<\/td>\nAnnex I (informative) Datapath scenarios
I.1 Duplicate frame scenarios
I.1.1 Unidirectional source bypass <\/td>\n<\/tr>\n
715<\/td>\nI.1.2 Unidirectional wrapped source bypass
I.1.3 Bidirectional destination bypass <\/td>\n<\/tr>\n
716<\/td>\nI.1.4 Bidirectional destination removals
I.1.5 Source and destination removals <\/td>\n<\/tr>\n
717<\/td>\nI.2 Reordered frame scenarios
I.2.1 Protection switch during bidirectional flood <\/td>\n<\/tr>\n
718<\/td>\nI.2.2 Cascading failures during bidirectional flood <\/td>\n<\/tr>\n
719<\/td>\nI.2.3 Protection switch during unicast transmission on steering system <\/td>\n<\/tr>\n
720<\/td>\nI.2.4 Cascading protection switch during unidirectional flood, wrapping <\/td>\n<\/tr>\n
721<\/td>\nAnnex J (informative) Spatial indications and shaping
J.1 Overview <\/td>\n<\/tr>\n
722<\/td>\nJ.2 Spatial bandwidth allocation
J.2.1 Single queue spatial allocation <\/td>\n<\/tr>\n
723<\/td>\nJ.2.2 Dual queue spatial allocation <\/td>\n<\/tr>\n
724<\/td>\nJ.2.3 Cumulative ringlet allocation <\/td>\n<\/tr>\n
725<\/td>\nJ.3 Spatial client queuing <\/td>\n<\/tr>\n
727<\/td>\nAnnex K (informative) Client-based OAM operations using echo and flush
K.1 Connectivity monitoring using echo request\/response
K.1.1 Background
K.1.2 Scope of operations
K.1.3 Connectivity monitor <\/td>\n<\/tr>\n
728<\/td>\nK.1.4 Failure declaration and clearing <\/td>\n<\/tr>\n
729<\/td>\nK.2 Resteering using flush
K.2.1 Background
K.2.2 Approach <\/td>\n<\/tr>\n
730<\/td>\nK.2.3 Using echo frames to flush steer protected rings <\/td>\n<\/tr>\n
731<\/td>\nIndex <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Information technology–Telecommunications and information exchange between systems Local and metropolitan area networks–Specific requirements Part 17: Resilient packet ring (RPR) access method and physical layer specifications<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2011<\/td>\n738<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":82017,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-82016","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/82016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/82017"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=82016"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=82016"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=82016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}