Standard Details
Technical and editorial errors identified by the IEEE 802.1 Working Group’s maintenance activity are corrected in this corrigendum to IEEE Std 802.1BA-2011.
Standards Committee | |
Status |
Active
|
Board Approval |
2016-06-30
|
History |
Published Date:2016-07-22
|
Additional Resources Details
PAR |
Working Group Details
Working Group |
802.1 WG - Higher Layer LAN Protocols Working Group
|
Working Group Chair |
Glenn Parsons
|
Standards Committee | |
Society | |
IEEE Program Manager | |
Active Projects |
This standard specifies Bridges that interconnect individual LANs, each supporting the IEEE 802 MAC Service using a different or identical media access control method, to provide Bridged Networks and VLANs.
|
P802.1CQ - Standard for Local and Metropolitan Area Networks: Multicast and Local Address Assignment
This standard specifies protocols, procedures, and management objects for locally-unique assignment of 48-bit and 64-bit addresses in IEEE 802 networks. Peer-to-peer address claiming and address server capabilities are specified.
|
|
This amendment specifies a Unified Modeling Language (UML)-based information model and a YANG data model that allows configuration and status reporting for bridges and bridge components with regards to topology discovery (as specified by this standard) with the capabilities currently specified in clauses 10 (LLDP management) and 11 (LLDP MIB definitions). Additionally, this amendment will address errors or omissions to existing features.
|
|
This project adds support of the Internal Sublayer Service by the IEEE Std 802.15.3 MAC entity.
|
|
This amendment specifies a Unified Modeling Language (UML)-based information model and YANG data models that allow configuration and status reporting for bridges and bridge components (as specified by this standard) with the capabilities currently specified in clauses 12.29 (scheduled traffic), 12.30 (frame preemption) and 12.31 (per-stream filtering and policing) of this standard. It further defines the relationship between the information and data model and models for the other management capabilities specified in this standard. Additionally, this amendment will address errors or omissions to existing features related to the aforementioned clauses.
|
|
This amendment specifies a Unified Modeling Language (UML) based information model for the capabilities currently specified in clauses 9 and 10 of this standard. A YANG data model and a Management Information Base (MIB) module both based on that UML model support configuration and status reporting. Additionally, this amendment addresses errors or omissions to existing features.
|
|
This amendment specifies procedures and managed objects that add new stream identification functions. Additionally this amendment addresses errors and clarifications.
|
|
This standard specifies procedures and managed objects for Quality of Service (QoS) features specified in IEEE Std 802.1Q, such as per-stream filtering and policing, queuing, transmission selection, flow control and preemption, in a network system which is not a bridge.
|
|
This standard defines time-sensitive networking profiles for industrial automation. The profiles select features, options, configurations, defaults, protocols, and procedures of bridges, end stations, and LANs to build industrial automation networks.
|
|
This standard specifies Bridges that interconnect individual LANs, each supporting the IEEE 802 MAC Service using a different or identical media access control method, to provide Bridged Networks and VLANs.
|
|
This amendment specifies protocols, procedures, and managed objects for a Resource Allocation Protocol (RAP) that uses the Link-local Registration Protocol (LRP) and supports and provides backwards compatibility with the stream reservation and quality of service capabilities, controls and protocols specified in IEEE Std 802.1Q. RAP provides support for accurate latency calculation and reporting, can use redundant paths established by other protocols, and is not limited to bridged networks.
|
|
This standard defines profiles of IEEE Std 802.1Q and IEEE Std 802.1CB that provide Time-Sensitive Networking (TSN) quality of service features for non-fronthaul shared service provider networks. The standard also provides use cases, and informative guidance for network operators on how to configure their networks for those use cases.
|
|
This standard specifies profiles for secure, highly reliable, deterministic latency, automotive in-vehicle bridged IEEE 802.3 Ethernet networks based on IEEE 802.1 Time-Sensitive Networking (TSN) standards and IEEE 802.1 Security standards.
|
|
The scope of this standard is to define a protocol and management elements, suitable for advertising information to stations attached to the same IEEE 802 LAN, for the purpose of populating physical topology and device discovery management information databases. The protocol facilitates the identification of stations connected by IEEE 802 LANs/MANs, their points of interconnection, and access points for management protocols. This standard defines a protocol that a) Advertises connectivity and management information about the local station to adjacent stations on the same IEEE 802 LAN. b) Receives network management information from adjacent stations on the same IEEE 802 LAN. c) Operates with all IEEE 802 access protocols and network media. d) Establishes a network management information schema and object definitions that are suitable for storing connection information about adjacent stations. e) Provides compatibility with the IETF PTOPO MIB (IETF RFC 2922 [B9]).
|
|
This standard specifies Bridges that interconnect individual LANs, each supporting the IEEE 802 MAC Service using a different or identical media access control method, to provide Bridged Networks and VLANs.
|
|
This standard specifies protocols, procedures, and managed objects for a Link-local Registration Protocol (LRP) to replicate a registration database from one end to the other of a point-to-point link and to replicate changes to parts of that database. A facility is provided to purge the replicated database if the source becomes unresponsive. Provision is made for a proxy system to operate LRP on behalf of a controlled system. LRP is optimized for databases on the order of 1 Mbyte.
|
|
This amendment specifies privacy enhancements that complement existing IEEE Std 802.1AE MAC Security capabilities, and reduce the ability of external observers to correlate user data frames, their sizes, transmission timing and transmission frequency with users identities and activities. It specifies an encapsulation format that allows one or more user data frames and padding octets to be carried within the confidentiality protected data of consolidating frames, hiding the users MAC addresses and original frame sizes. The transmitter can balance the privacy improvement against the loss of efficiency and delay by controlling the sizes of consolidating frames and when they are transmitted. YANG configuration and operational state models are defined both for the existing functionality of IEEE Std 802.1AE and for the functionality to be added by this project. An SNMP MIB will be defined for the added functionality. This amendment also describes privacy considerations for the use, design, and deployment of bridged networks. This project includes technical and editorial corrections to existing IEEE Std 802.1AE functionality.
|
|
This amendment specifies YANG modules that contain the EtherType information, including a compact human-readable name and description. The name and description for an initial set of EtherTypes are defined for inclusion in the IEEE Registration Authority EtherType public listing. This amendment also addresses errors and omissions in IEEE Std 802 description of existing functionality.
|
|
This amendment specifies protocols, procedures, and managed objects for hot standby without use of the Best Master Clock Algorithm (BMCA), for time-aware systems, including:
- A function that transforms the synchronized times of two generalized Precision Time Protocol (gPTP) domains into one synchronized time for use by applications;
- A function that directs the synchronized time of one gPTP domain into a different gPTP domain; and
- Mechanisms that determine whether a gPTP domain has sufficient quality to be used for hot standby.
This amendment also addresses errors and omissions in the description of existing functionality.
|
|
This standard specifies Bridges that interconnect individual LANs, each supporting the IEEE 802 MAC Service using a different or identical media access control method, to provide Bridged Networks and VLANs.
|
|
This amendment specifies a YANG data model that allows configuring and state reporting for all managed objects of the base standard. This amendment specifies a Unified Modeling Language (UML)-based figure to explain the managed objects and the associated YANG data model.
|
|
Existing Standards |
IEEE Std 802-2001, IEEE Standards for Local and Metropolitan Area Networks: Overview and Architecture, provides an overview to the family of IEEE 802 Standards. It defines
compliance with the family of IEEE 802 Standards; it describes the relationship of the IEEE 802
Standards to the Open Systems Interconnection Basic Reference Model [ISO/IEC 7498-1:1994]
and explains the relationship of these standards to the higher layer protocols; it provides a standard for the structure of LAN MAC addresses; and it provides a standard for identification of public, private, and standard protocols.
|
Management information and procedures applicable across the entire family of IEEE 802 LAN/MAN standards within the architectural framework for LAN/MAN Management specified in IEEE Std 802-1990 are identified. Common management information, such as attributes to represent MAC address and managed objects to represent configurable gauges, are specified. The need of developers of LAN/MAN management specifications for common procedures to develop, describe, and register management information is addressed.
|
|
Administratively withdrawn January 2011. Extensions to the behavior of ISO/IEC 10038 (IEEE 802.1D) media access control (MAC) Bridges, in order to facilitate interoperability in bridged local area networks (LANs) comprising CSMA/CD networks interconnected with other types of LAN using MAC Bridges, where the CSMA/CD networks contain a mixture of ISO/IEC 8802-3 and Ethernet V2.0 end stations, are specified. Additionally, guidelines are provided for the development of nonstandard 802 protocols, with particular emphasis on conversion of existing Ethernet protocols and the behavior to be expected from a Bridge, for the purpose of avoiding future incompatibilities.
|
|
This IEEE Standards product is part of the 802 family on LAN/MAN. This standard defines an architecture for Virtual Bridged LANs, the services provided in Virtual Bridged LANs, and the protocols and algorithms involved in the provision of those services.
|
|
This standard extends the architecture, protocols, and algorithms specified in IEEE Std 802.1Q, 1998 Edition, to allow data traffic belonging to different VLANs to be allocated to different spanning trees, while retaining interoperability with bridges conformant to that prior specification.
|
|
This amendment to IEEE 802.1Q,1998 Edition is intended to document maintenance items identified in the text of IEEE Std 802.1Q, 1998 Edition.IEEE Std 802.1u-2001 identifies any proposed changes to IEEE Std 802.1Q, 1998 Edition that have arisen as a consequence of maintenance activity. The changes are documented in the usual form for an amendment to IEEE 802 standards; i.e., as an explicit set of editing instructions that, if correctly applied to the text of IEEE Std 802.1Q,1998 Edition, will create a corrected document.
|
|
This amendment to IEEE Std 802.1Q,1998 Edition describes enhancements to allow for classification of incoming packets by methods other than source port. Specifically, it defines rules for classification based on data-link layer protocol identification. The document identifies proposed changes to the text of IEEE Std 802.1Q,1998 Edition that have arisen as a consequence of this activity. These are documented in the usual form for amendments to IEEE 802 standards; i.e., as an explicit set of editing instructions that, if correctly applied to the text of IEEE Std 802.1Q,1998 Edition, will create a corrected document.
|
|
IEEE Std 802-2001, IEEE Local and Metropolitan Area Networks: Overview and Architecture, provides an overview to the family of IEEE 802 Standards. This amendment to IEEE Std 802 identifies a set of Ethertypes that may be used for prototype and vendor specific use, and defines how the Ethertypes should be used.
|
|
This document defines a protocol and a set of managed objects that can be used for discovering the physical topology from adjacent stations in 802 LANs.
|
|
This amendment enables a service provider to use the architecture and protocols of IEEE Std 802.1Q to offer the equivalent of separate LANs, Bridged Local Area Networks, or Virtual Bridged Local Area Networks to a number of customers, while requiring no cooperation between the customers, and minimal cooperation between each customer and the service provider.
|
|
IEEE Std 802.1D-2004, IEEE Standard for Local and Metropolitan Area Networks: Media Access Control (MAC) Bridges. The PDF of this standard is available at no charge compliments of the IEEE 802 Working group. Visit https://ieeexplore.ieee.org/browse/standards/get-program/page for details.
|
|
IEEE Std 802-2001, IEEE Local and Metropolitan Area Networks: Overview and Architecture, provides an overview to the family of IEEE 802 standards. This amendment to IEEE Std 802-2001 specifies an Object Identifier hierarchy used within IEEE 802 for uniform allocation of Object Identifiers used in IEEE 802 standards.
|
|
This standard specifies how the MAC Service is supported by Virtual Bridged Local Area Networks, the principles of operation of those networks, and the operation of VLAN-aware Bridges, including management, protocols, and algorithms.
|
|
Revision of IEEE Std 802.1X-2001 Port-based network access control makes use of the physical access characteristics of IEEE 802 Local Area Networks (LAN) infrastructures in order to provide a means of authenticating and authorizing devices attached to a LAN port that has point-to-point connection characteristics, and of preventing access to that port in cases in which the authentication and authorization process fails.
|
|
This standard specifies how all or part of a network can be secured transparently to peer protocol entities that use the MAC Service provided by IEEE 802? LANs to communicate. MAC security (MACsec) provides connectionless user data confidentiality, frame data integrity, and data origin authenticity.
|
|
This amendment specifies protocols, procedures, and managed objects to support connectivity fault management. These allow discovery and verification of the path, through bridges and LANs, taken for frames addressed to and from specified network users. Connectivity faults can be detected and isolated to an individual bridge or LAN.
|
|
This amendment defines an architecture and bridge protocols for interconnection of multiple Provider Bridged Networks, allowing a Provider to support up tot 2^20 service instances.
|
|
This amendment to IEEE Std 802.1Q specifies the function of a MAC Relay with two MACs, and the protocols and procedures to support its operation. A MAC Relay is transparent to all frame-based media independent protocols except those explicitly addressed to this device. It is remotely manageable through at least one of its external MACs, and signals a failure of either MAC's LAN through the other MAC.
|
|
This amendment specifies a set of protocols that replaces the GARP, GMRP, and GVRP protocols specified in earlier versions of IEEE Std 802.1Q.
|
|
This amendment includes management information base (MIB) definitions in IEEE Std 802.1Q.
|
|
This amendment to IEEE Std 802.1Q-2011 specifies shortest path bridging of unicast and multicast frames, including protocols to calculate multiple active topologies that can share learned station information, and support of a virtual local area network (VLAN) by multiple, per topology VLAN identifiers (VIDs). (Additional downloads for this standard are attached or can be downloaded at http://standards.ieee.org/downloads/802.1/index.html)
|
|
The MAC service provided by all IEEE 802(R) MACs along with the Internal Sublayer Service (ISS) that is provided by IEEE 802 MACs to the relay function of a Media Access Control(MAC) Bridge are defined in this standard.
|
|
This standard defines a protocol and procedures for the transport of timing over bridged and virtual bridged local area networks. It includes the transport of synchronized time, the selection of the timing source (i.e., best master), and the indication of the occurrence and magnitude of timing impairments (i.e., phase and frequency discontinuities). The PDF of this standard is available at the IEEEGET program. The "IEEE Get Program" grants public access to view and download individual PDFs of select standards at no charge. Visit https://ieeexplore.ieee.org/browse/standards/get-program/page for details.
|
|
This amendment specifies protocols, procedures, and managed objects, usable by existing higher layer mechanisms, that allow network resources to be reserved for specific traffic streams traversing a bridged local area network. (The PDF of this standard is available at not cost compliments of the GETIEEE802 program located at https://ieeexplore.ieee.org/browse/standards/get-program/page)
|
|
This amendment specifies protocols, procedures and managed objects that support congestion management of long-lived data flows within network domains of limited bandwidth-delay product. This is achieved by enabling bridges to signal congestion to end stations capable of transmission rate limiting to avoid frame loss.
|
|
This amendment extends the connectivity fault management capabilities introduced in IEEE Std 802.1ag-2007 to include tools to facilitate diagnosis and isolation of faults sensitive to, or caused by, particular data patterns in frames transmitted by a service user.
|
|
This standard provides an overview to the family of IEEE 802? standards. It describes the reference models for the IEEE 802 standards and explains the relationship of these standards to the higher layer protocols; it provides a standard for the structure of IEEE 802 MAC addresses; it provides a standard for identification of public, private, prototype, and standard protocols; it specifies an object identifier hierarchy used within IEEE 802 for uniform allocation of object identifiers used in IEEE 802 standards; and it specifies a method for higher layer protocol identification. (The PDF of this standard is available at no charge compliments of the IEEE GET Program. Visit https://ieeexplore.ieee.org/browse/standards/get-program/page/series?id=68 for more details.)
|
|
Link Aggregation allows one or more links to be aggregated together to form a Link Aggregation Group, such that a Media Access Control (MAC) Client can treat the Link Aggregation Group as if it were a single link. To this end, it specifies the establishment of data terminal equip?ment (DTE) to DTE logical links, consisting of N parallel instances of full duplex point-to-point links operating at the same data rate. This standard defines the MAC independent Link Aggregation capability, and general information relevant to specific MAC types that support link aggregation.
|
|
This amendment specifies changes to IEEE Std 802.1Q-2005, as amended by IEEE Std 802.1ad-2005, IEEE Std 802.1ag-2007, IEEE Std 802.1ak-2007, IEEE Std 802.1ah-2008, and IEEE Std 802.1ap-2008, that support provisioning systems that explicitly select traffic engineered paths within Provider Backbone Bridged Networks. Changes are applied to the base text of IEEE Std 802.1Q-2005 as amended by IEEE Std 802.1ad-2005, IEEE Std 802.1ak-2007, IEEE Std 802.1ag-2007, IEEE Std 802.1ah-2008, and IEEE Std 802.1ap-2008.
|
|
This corrigendum to IEEE Std 802.1Q corrects errors in the MRP protocol specification.
|
|
This amendment to IEEE Std 802.1Q-2011 specifies protocols, procedures, and managed objects that enable flow control per traffic class on IEEE 802(R) point-to-point full duplex links. This is achieved by a mechanism similar to IEEE 802.3 Annex 31B PAUSE, but operating on individual priorities.
|
|
Port-based network access control allows a network administrator to restrict the use of IEEE 802 LAN service access points (ports) to secure communication between authenticated and authorized devices. This standard specifies a common architecture, functional elements, and protocols that support mutual authentication between the clients of ports attached to the same LAN and that secure communication between the ports, including the media access method independent protocols that are used to discover and establish the security associations used by IEEE 802.1AE MAC Security.
(The "IEEE Get Program" grants public access to view and download individual PDFs of select standards at no charge. Visit https://ieeexplore.ieee.org/browse/standards/get-program/page for details.)
|
|
Profiles that select features, options, configurations, defaults, protocols and procedures of bridges, stations and LANs that are necessary to build networks that are capable of transporting time-sensitive audio and/or video data streams are defined in this standard. (This PDF of this standard is available as part of the IEEE Get program. Through the IEEE SA and industry support, select IEEE standards are available for download at no charge. For more details go to our web page at https://ieeexplore.ieee.org/browse/standards/get-program/page.)
|
|
This amendment to IEEE Std 802.1Q defines enhancements to the forwarding and queueing functions of a VLAN Bridge to support the transmission of time sensitive data streams.
|
|
This standard specifies how the MAC Service is supported by Virtual Bridged Local Area Networks, the principles of operation of those networks, and the operation of VLAN-aware Bridges, including management, protocols, and algorithms.
Incorporates IEEE Std 802.1Q-2005, IEEE Std 802.1ad-2005, IEEE Std 802.1ak-2007, IEEE Std 802.1ag-2007, IEEE Std 802.1ah-2008, IEEE Std 802-1Q-2005/Cor-1-2008, IEEE Std 802.1ap-2008, IEEE Std 802.1Qaw-2009, IEEE Std 802.1Qay-2009, IEEE Std 802.1aj-2009, IEEE Std 802.1Qav-2009, IEEE Std Qau-2010, and IEEE Std Qat-2010.
|
|
This document defines a protocol and a set of managed objects that can be used for discovering the physical topology from adjacent stations in IEEE 802 LANs.
|
|
A secure device identifier (DevID) is cryptographically bound to a device and supports authentication of the device?s identity. Locally significant identities can be securely associated with an initial manufacturer-provisioned DevID and used in provisioning and authentication protocols to allow a network administrator to establish the trustworthiness of a device and select appropriate policies for transmission and reception of data and control protocols to and from the device.
|
|
This amendment to IEEE Std 802.1Q-2011 specifies the use of service virtual local area networks (S-VLANs) to provide customer service interfaces in one Provider Bridged Network for customer interface local area networks (LANs) attached to another Provider Bridged Network.
|
|
This amendment to IEEE Std 802.1Q-2011 specifies protocols, procedures, and managed objects to support topology change signaling to alter the binding (held in an I-Component) of Customer addresses to Backbone addresses on a per-I-SID basis. This is accomplished by extending the use of the Multiple Registration Protocol (MRP).
|
|
This amendment to IEEE Std 802.1Q-2011 specifies localized protection of selected Traffic Engineered Service Instances traversing a common sequence of Provider Network Ports.
|
|
This amendment to IEEE Std 802.1Q-2011 defines enhancements to transmission selection to support allocation of bandwidth amongst traffic classes, plus a protocol for controlling the application of Data Center Bridging features.
|
|
This amendment to IEEE Std 802.1Q-2011 specifies protocols, procedures, and managed objects that
-- Provide for the discovery, configuration, and control of a pair of direct-attached limited-function Service VLAN (S-VLAN) components to extend the services of a customer bridge to remote ports and enable coexistence of multiple services onstation-resident ports (e.g., embedded bridging).
-- Provide for discovery, configuration, and control of a Reflective Relay Service for a bridge port.
-- Provide for discovery of, and coordinated configuration of, edge relays (ERs) and other devices that utilize the reflective relay service.
-- Provide for dynamic profile-driven port configuration. (Additional files are attached or can be found at http://standards.ieee.org/downloads/802.1/
|
|
Link Aggregation allows one or more links to be aggregated together to form a Link Aggregation Group, such that a Media Access Control (MAC) Client can treat the Link Aggregation Group as if it were a single link. To this end, it specifies the establishment of data terminal equipment (DTE) to DTE logical links, consisting of N parallel instances of full-duplex, point-to-point links operating at the same data rate. The MAC independent Link Aggregation capability, and general information relevant to specific MAC types that support Link Aggregation, are defined in this standard.
|
|
This amendment specifies the GCM-AES-256 Cipher Suite as an option in addition to the existing mandatory to implement Default Cipher Suite, GCM-AES-128.
|
|
Routing algorithms and relay behavior supporting equal cost multipath forwarding in shortest path bridged VLANs are specified in this amendment to IEEE Std 802.1Q.
|
|
This corrigendum to IEEE Std 802.1AS - 2011 corrects minor errors, bugs, ambiguities, and inconsistencies that were missed when the document was balloted. It does not contain new material.
|
|
This standard specifies the operation of Bridge Port Extenders, including management, protocols, and algorithms. Bridge Port Extenders operate in support of the MAC Service by Extended Bridges. (The PDF of this standard is available at no cost compliments of the GETIEEE802 program located at https://ieeexplore.ieee.org/browse/standards/get-program/page)
|
|
This corrigendum to IEEE Std 802.1Q-2011 corrects technical and editorial errors identified by the IEEE 802.1 Working Group's maintenance activity.
|
|
The optional use of Cipher Suites that make use of a 64-bit (PN) to allow more than 232 MACsec protected frames to be sent with a single Secure Association Key are specified by this amendment.
|
|
Enhancements to the forwarding process that support frame preemption are provided in this amendment to IEEE Std 802.1Q-2014.
|
|
Media Access Control security (MACsec) Key Agreement protocol (MKA) data elements and procedures that provide additional security and manageability capabilities, including the ability to maintain secure communication while the operation of MKA is suspended, when used in conjunction with MACsec Cipher Suites that support Extended Packet Numbering are added in this amendment. (The PDF of this standard is available at no cost compliments of the IEEE GET program. Additional downloads are attached or can be downloaded at https://ieeexplore.ieee.org/browse/standards/get-program/page)
|
|
Technical and editorial errors identified by the IEEE 802.1 Working Group's maintenance activity are corrected by this corrigendum.
|
|
Protocols, procedures, and managed objects to allow IEEE 802.11 media to provide internal connections within bridged networks, as well as access to bridged networks, are provided in this amendment.
|
|
Explicit path control, bandwidth reservation, and redundancy (protection, restoration) for data flows are specified in this amendment to IEEE Std 802.1Q-2014.
|
|
This standard specifies procedures, managed objects, and protocols for bridges and end systems that provide identification and replication of packets for redundant transmission, identification of duplicate packets, and elimination of duplicate packets. It is not concerned with the creation of the multiple paths over which the duplicates are transmitted.
|
|
The MAC Service and the Internal Sublayer Service (ISS) are defined in this standard. This standard specifies media-dependent convergence functions that map IEEE 802(R) MAC interfaces to the ISS. The MAC Service is derived from the ISS. (The PDF of this standard is available at no charge compliments of the IEEE GET Program https://ieeexplore.ieee.org/browse/standards/get-program/page)
|
|
Enhancements to the configuration of time-sensitive streams are provided by this amendment to IEEE Std 802.1Q-2018. (The PDF of this standard is available to you at no cost, compliments of the IEEE GET program https://ieeexplore.ieee.org/browse/standards/get-program/page)
|
|
MAC-independent Link Aggregation capability and general information relevant to specific MAC types are defined in this standard. Link Aggregation allows parallel full-duplex point-to-point links to be used as if they were a single link and also supports the use of multiple links as a resilient load sharing interconnect between multiple nodes in two separately administered networks. (The PDF of this standard is available at no cost compliments of the IEEE GET program. Additional downloads are attached or can be downloaded at https://ieeexplore.ieee.org/browse/standards/get-program/page)
|
|
This standard specifies how the Media Access Control (MAC) Service is supported by Bridged Networks, the principles of operation of those networks, and the operation of MAC Bridges and VLAN Bridges, including management, protocols, and algorithms. This revision includes the following amendments and corrigenda: IEEE 802.1Qbe-2011 IEEE 802.1Qbc-2011 IEEE 802.1Qbb-2011 IEEE 802.1Qaz-2011 IEEE 802.1Qbf-2011 IEEE 802.1Qbg-2012 IEEE 802.1aq-2012 IEEE 802.1Q-2011/Cor 2-2012 IEEE 802.1Qbp-2014./index.html)
|
|
Technical and editorial errors identified by the IEEE 802.1 Working Group?s maintenance activity are corrected by this corrigendum to IEEE 802.1AB(TM)-2009.
|
|
An access network (which connects terminals to their access routers) utilizing technologies based on the family of IEEE 802(R) standards is specified in this recommended practice. An access network reference model (NRM) that includes entities and reference points along with behavioral and functional descriptions of communications among those entities is provided in this recommended practice. (The PDF of this standard is available at no cost to you compliments of the IEEE GET program https://ieeexplore.ieee.org/browse/standards/get-program/page/series?id=68)
|
|
Enhancements to the set of TLVs used by the Data Center Bridging eXchange protocol (DCBX) for the purpose of simplifying the management of networks utilizing Data Center Bridging (DCB) features are defined in this amendment to IEEE Std 802.1Q-2014.
|
|
Ethernet Data Encryption devices (EDEs) are specified in this amendment. An EDE is a two-port bridge that uses MACsec to provide secure connectivity for attached customer bridges, or for attached provider bridges. EDEs may allow the customer (or provider) bridges to continue to use a VLAN Identifier (VID) in transmitted frames to select
|
|
Technical and editorial corrections are provided by this corrigendum to IEEE Std 802.1AS.
|
|
This document defines a protocol and a set of managed objects that can be used for discovering the physical topology from adjacent stations in IEEE 802(R) LANs. (The PDF of this standard is available at no cost compliments of the IEEE GET program. Additional downloads are attached or can be downloaded at https://ieeexplore.ieee.org/browse/standards/get-program/page)
|
|
Enhancements to the forwarding process that supports scheduled traffic is provided in this amendment to IEEE Std 802.1Q-2014. Additional downloads are attached or can be downloaded at http://standards.ieee.org/downloads/802.1/index.html)
|
|
Correction of technical and editorial errors identified by the IEEE 802.1 maintenance activity are presented in this document.
|
|
The use of traffic scheduling and per-stream filtering and policing to support cyclic queuing and forwarding are described in this amendment to IEEE Std 802.1Q-2014.
|
|
Enhancements to the forwarding process that support per-stream filtering and policing are provided in this amendment to IEEE Std 802.1Q-2014.
|
|
This international standard specifies how the Media Access Control (MAC) Service is supported by Bridged Networks, the principles of operation of those networks, and the operation of MAC Bridges and VLAN Bridges, including management, protocols, and algorithms
|
|
Technical and editorial corrections are provided in this corrigendum to IEEE Std 802.1AX-2014.
|
|
This standard defines profiles that select features, options, configurations, defaults, protocols, and procedures of bridges, stations, and LANs that are necessary to build networks that are capable of transporting fronthaul streams, which are time sensitive. (The PDF of this standard is available at not cost compliments of the IEEE GET Program at https://ieeexplore.ieee.org/browse/standards/get-program/page)
|
|
Extensions to the Virtual Station Interface (VSI) Discovery and Configuration Protocol (VDP) to support using the protocol between an end station and a device doing encapsulation/decapsulation for Network Virtualization Overlays Over Layer 3 (NVO3) are specified in this amendment to IEEE Std 802.1Q-2018. The extensions include adding format types [e.g., Internet Protocol (IP) addresses] and enhancing indication of migration events. (The PDF of this standard is available at no cost compliments of the IEEE GET program)
|
|
A YANG data model in support of configuration and operational status information for a subset of Bridging capabilities is provided in this amendment to IEEE Std 802.1Q?-2018. (The PDF of this standard is available at no cost to you compliments of the IEEE GET program https://ieeexplore.ieee.org/browse/standards/get-program/page)
|
|
The YANG data model specified in this amendment to IEEE Std 802.1X?-2010 allows configuration and status reporting for port-based network access control, in the scenarios described in Clause 7 of this standard and Clause 11 of IEEE Std 802.1AE?-2018, using the information model previously specified in this standard. (The PDF of this standard is available at no cost to you compliments of the IEEE GET program https://ieeexplore.ieee.org/browse/standards/get-program/page)
|
|
This Recommended Practice specifies a privacy threat model for IEEE 802(TM) technologies and provides recommendations on how to protect against privacy threats. It promotes a consistent approach to the mitigation of privacy threats by IEEE 802 protocol developers.
|
|
How Uniform Resource Name (URN) values are allocated in IEEE 802(R) standards is described in this amendment to IEEE Std 802(R)-2014. (The PDF of this standard is available at no cost compliments of the IEEE GET program at http://ieeexplore.ieee.org/browse/standards/get-program/page/)
|
|
Link Aggregation allows parallel point-to-point links to be used as if they were a single link and also supports the use of multiple links as a resilient load-sharing interconnect between multiple nodes in two separately administered networks. This standard defines a MAC-independent Link Aggregation capability and provides general information relevant to specific MAC types.
|
|
This standard specifies how the Media Access Control (MAC) Service is supported by Bridged Networks, the principles of operation of those networks, and the operation of MAC Bridges and VLAN Bridges, including management, protocols, and algorithms. (The PDF of this standard is available at no cost to you compliments of the IEEE GET program https://ieeexplore.ieee.org/browse/standards/get-program/page)
|
|
Profiles that select features, options, configurations, defaults, protocols and procedures of bridges, stations and LANs that are necessary to build networks that are capable of transporting time-sensitive audio and/or video data streams are defined in this standard.
|
|
This standard specifies the operation of Bridge Port Extenders, including management, protocols, and algorithms. Bridge Port Extenders operate in support of the MAC Service by Extended Bridges.
|
|
An optional local medium access control (MAC) address space structure, known as the Structured Local Address Plan (SLAP), is provided in this amendment to IEEE Std 802?-2014 in order to allow multiple administrations to coexist. This structure designates a range of local MAC addresses for protocols using a Company ID (CID) assigned by the IEEE Registration Authority. Another range of local MAC addresses is designated for assignment by administrators. The amendment recommends a range of local MAC addresses for use by IEEE 802? protocols.(The PDF of this standard is available at no cost to you compliments of the IEEE GET program http://ieeexplore.ieee.org/servlet/opac?punumber=8016707.
|
|
A Secure Device Identifier (DevID) is cryptographically bound to a device and supports authentication of the device?s identity. An Initial Device Identifier (IDevID) provide by the supplier of a device can be supplemented by Local Device Identifiers (LDevIDs) facilitating enrollment (provisioning of authentication and authorization credentials) by local network administrators. (The PDF of this standard is available at no cost compliments of the IEEE GET Program at https://ieeexplore.ieee.org/browse/standards/get-program/page)
|
|
Explicit path control, bandwidth reservation, and redundancy (protection, restoration) for data flows are specified in this amendment to IEEE Std 802.1Q-2014.
|
|
A protocol and a set of managed objects that can be used for discovering the physical topology from adjacent stations in IEEE 802? LANs are defined in this document
|
|
Enhancements to the forwarding process that supports scheduled traffic is provided in this amendment to IEEE Std 802.1Q-2014.
|
|
Protocols, procedures, and managed objects for the transport of timing over local area networks are defined in this standard. It includes the transport of synchronized time, the selection of the timing source (i.e., best master), and the indication of the occurrence and magnitude of timing impairments (i.e., phase and frequency discontinuities).
|
|
This corrigendum to IEEE Std 802.1AC?-2016 corrects the value of the LLC Encapsulation EtherType.(The PDF of this standard is available at no cost to you compliments of the IEEE GET program https://ieeexplore.ieee.org/browse/standards/get-program/page)
|
|
YANG data model that supports configuration, status reporting, and monitoring for Connectivity Fault Management (CFM) for Two-Port MAC Relays, Customer VLAN Bridges, and Provider Bridges is further developed by this amendment to IEEE Std 802.1Q?-2018. See also IEEE Std 802.1Qcp?-2018 for the introduction of this YANG data model.
|
|
How all or part of a network can be secured transparently to peer protocol entities that use the MAC Service provided by IEEE 802? LANs to communicate is specified in this standard. MAC security (MACsec) provides connectionless user data confidentiality, frame data integrity, and data origin authenticity.(The PDF of this standard is available at no cost to you compliments of the IEEE GET program https://ieeexplore.ieee.org/browse/standards/get-program/page)
|
|
Port-based network access control allows a network administrator to restrict the use of IEEE 802(R) LAN service access points (ports) to secure communication between authenticated and authorized devices. This standard specifies a common architecture, functional elements, and protocols that support mutual authentication between the clients of ports attached to the same LAN and that secure communication between the ports, including the media access method independent protocols that are used to discover and establish the security associations used by IEEE 802.1AE(TM) MAC Security.
|
|
This amendment to IEEE Std 802.1Q-2018 specifies procedures and managed objects for a Bridge to perform asynchronous traffic shaping over full-duplex links with constant bit data rates.
|
|
Enhancements to fronthaul profiles are defined in this amendment to IEEE Std 802.1CM-2018 in order to address new developments in fronthaul interface standards and in related synchronization and syntonization standards
|
|
How all or part of a network can be secured transparently to peer protocol entities that use the MAC Service provided by IEEE 802(R) LANs to communicate is specified in this standard. AC security (MACsec) provides connectionless user data confidentiality, data frame integrity, and data origin authenticity.
|
|
Correction of technical and editorial errors identified by the IEEE 802.1 maintenance activity are presented in this document.
|
|
How all or part of a network can be secured transparently to peer protocol entities that use the MAC Service provided by IEEE 802? LANs to communicate is specified in this standard. MAC security (MACsec) provides connectionless user data confidentiality, frame data integrity, and data origin authenticity.
|
|
This standard specifies how the Media Access Control (MAC) Service is supported by Bridged Networks, the principles of operation of those networks, and the operation of MAC Bridges and VLAN Bridges, including management, protocols, and algorithms.
|