throbber
IEEE
`Std 802.3u-1995
`
`SUPPLEMENT TO 802.3:
`
`Feature
`
`Subclause
`
`Status
`
`Support
`
`Value/comment
`
`Followed by 4 Unformatted
`Pages. First Unformatted Page
`contains most significant 11
`bits of OUI (bits 23:13) with
`MSB in U10;
`Second Unformatted Page con-
`tains next most significant 11
`bits of OUI (bits 12:2), with
`MSB in U10;
`Third Unformatted Page con-
`tains the least significant 2 bits
`of OUI (bits 1:0) with MSB in
`U10, bits U8:0 contains user-
`defined code specific to OUI;
`Fourth Unformatted Page con-
`tains user-defined code specific
`to OUI
`
`Followed by 4 Unformatted
`Pages. First Unformatted Page
`contains most significant 11
`bits of PHY ID (2.15:5) with
`MSB in U10;
`Second Unformatted Page con-
`tains PHY ID bits 2.4:0 to
`3.15:10, with MSB in U10;
`Third Unformatted Page con-
`tains PHY ID bits 3.9:0, with
`MSB in U10, and U0 contains
`user-defined code specific to
`PHY ID;
`Fourth Unformatted Page con-
`tains user-defined code specific
`to PHY ID
`
`Transmission of M10 to M0
`equals 1, not permitted
`
`Item
`
`12
`
`Organizationally Unique Iden-
`tifier Message Code
`
`28C.6
`
`NP:M
`
`13
`
`PHY Identifier Message Code
`
`28C.7
`
`NP:M
`
`14
`
`Auto-Negotiation reserved
`code 2
`
`28C.8
`
`NP:M
`
`280
`
`
`
`This is an Archive IEEE Standard. It has been superseded by a later version of this standard.
`
`Page 301
`
` Dell Inc.
` Exhibit 1009 (Part 4 of 5)
`
`

`
`CSMA/CD
`
`28.6 Auto-Negotiation expansion
`
`IEEE
`Std 802.3u-1995
`
`Auto-Negotiation is designed in a way that allows it to be easily expanded as new technologies are devel-
`oped. When a new technology is developed, the following things must be done to allow Auto-Negotiation to
`support it:
`
`The appropriate Selector Field value to contain the new technology must be selected and allocated.
`a)
`b) A Technology bit must be allocated for the new technology within the chosen Selector Field value.
`c)
`The new technology’s relative priority within the technologies supported within a Selector Field
`value must be established.
`
`Code space allocations are enumerated in annexes 28A, 28B, and 28C. Additions and insertions to the
`annexes are allowed. No changes to existing bits already defined are allowed.
`
`281
`
`
`
`This is an Archive IEEE Standard. It has been superseded by a later version of this standard.
`
`Page 302
`
`

`
`
`
`
`
`
`
`
`CSMA/CD
`
`IEEE
`Std 802.3u-1995
`
`29. System considerations for multi-segment 100BASE-T networks
`
`29.1 Overview
`
`This clause provides information on building 100BASE-T networks. The 100BASE-T technology is
`designed to be deployed in both homogenous 100 Mb/s networks and heterogeneous 10/100 Mb/s mixed
`CSMA/CD networks. Network topologies can be developed within a single 100BASE-T collision domain,
`but maximum flexibility is achieved by designing multiple collision domain networks that are joined by
`bridges and/or routers configured to provide a range of service levels to DTEs. For example, a combined
`100BASE-T/10BASE-T system built with repeaters and bridges can deliver dedicated 100 Mb/s, shared
`100 Mb/s, dedicated 10 Mb/s, and shared 10 Mb/s service to DTEs. The effective bandwidth of shared ser-
`vices is controlled by the number of DTEs that share the service.
`
`Linking multiple 100BASE-T collision domains with bridges maximizes flexibility. Bridged topology
`designs can provide single bandwidth (figure 29-1) or multiple bandwidth (figure 29-2) services.
`
`Collision Domain 4
`
`DTE
`
`DTE
`
`Repeater
`
`DTE
`
`DTE
`
`Collision Domain 1
`
`DTE
`
`DTE
`
`DTE
`
`DTE
`
`Repeater
`
`Multi-Port
`Bridge
`
`Repeater
`
`DTE
`
`DTE
`
`DTE
`
`DTE
`
`Collision Domain 3
`
`Collision Domain 2
`
`DTE
`
`DTE
`
`Repeater
`
`DTE
`
`DTE
`
`Figure 29-1—100 Mb/s multiple collision domain topology using multi-port bridge
`
`Individual collision domains can be linked by single devices (as shown in figures 29-1 and 29-2) or by mul-
`tiple devices from any of several transmission systems. The design of multiple-collision-domain networks is
`governed by the rules defining each of the transmission systems incorporated into the design.
`
`The design of shared bandwidth 10 Mb/s collision domains is defined in clause 13; the design of shared
`bandwidth 100 Mb/s CSMA/CD collision domains is defined in the following subclauses.
`
`281
`
`
`
`This is an Archive IEEE Standard. It has been superseded by a later version of this standard.
`
`Page 303
`
`

`
`
`
`
`
`
`
`
`IEEE
`Std 802.3u-1995
`
`SUPPLEMENT TO 802.3:
`
`Dedicated 100 Mb/s
`
`Shared 100 Mb/s
`
`DTE 1
`
`DTE 2
`
`DTE 3
`
`DTE 4
`
`DTE 5
`
`100 Mb/s
`
`100 Mb/s
`
`100BASE-T Repeater
`
`100 Mb/s
`
`Multi-Port
`Bridge
`
`10 Mb/s
`
`10 Mb/s
`
`10 Mb/s
`
`10BASE-T Repeater
`
`DTE 6
`
`DTE 7
`
`DTE 8
`
`DTE 9
`
`DTE 10
`
`Dedicated 10 Mb/s
`
`Shared 10 Mb/s
`
`Figure 29-2—Multiple bandwidth, multiple collision domain topology using
`multi-port bridge
`
`29.1.1 Single collision domain multi-segment networks
`
`This clause provides information on building 100 Mb/s CSMA/CD multi-segment networks within a single
`collision domain. The proper operation of a CSMA/CD network requires the physical size and number of
`repeaters to be limited in order to meet the round-trip propagation delay requirements of 4.2.3.2.3 and
`4.4.2.1 and IPG requirements specified in 4.4.2.1.
`
`This clause provides two network models. Transmission System Model 1 is a set of configurations that have
`been validated under conservative rules and have been qualified as meeting the requirements set forth above.
`Transmission System Model 2 is a set of calculation aids that allow those configuring a network to test a pro-
`posed configuration against a simple set of criteria that allows it to be qualified. Transmission System Model
`2 validates an additional broad set of topologies that are fully functional and do not fit within the simpler, but
`more restrictive rules of Model 1.
`
`The physical size of a CSMA/CD network is limited by the characteristics of individual network compo-
`nents. These characteristics include the following:
`
`a) Media lengths and their associated propagation time delay
`b) Delay of repeater units (start-up, steady-state, and end of event)
`c) Delay of MAUs and PHYs (start-up, steady-state, and end of event)
`d)
`Interpacket gap shrinkage due to repeater units
`e) Delays within the DTE associated with the CSMA/CD access method
`f)
`Collision detect and deassertion times associated with the MAUs and PHYs
`
`Table 29-1 summarizes the delays for 100BASE-T media segments. For more detailed information on the
`delays associated with individual 100BASE-T components, see
`
`MII:
`100BASE-T4:
`100BASE-TX:
`100BASE-FX:
`
`annex 22A
`23.11
`annex 24A
`annex 24A
`
`282
`
`
`
`This is an Archive IEEE Standard. It has been superseded by a later version of this standard.
`
`Page 304
`
`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`CSMA/CD
`
`Repeater:
`
`27.3
`
`IEEE
`Std 802.3u-1995
`
`Table 29-1—Delays for network media segments Model 1
`
`Media type
`
`Balanced cable Link Segment 100BASE-T
`
`Fiber Link Segment
`
`29.1.2 Repeater usage
`
`Maximum
`number of
`PHYs per
`segment
`
`2
`
`2
`
`Maximum
`segment
`length (m)
`
`Maximum medium
`round-trip delay per
`segment (BT)
`
`100
`
`412
`
`114
`
`412
`
`Repeaters are the means used to connect segments of a network medium together into a single collision
`domain. Different physical signaling systems (e.g., 100BASE-T4, 100BASE-TX, 100BASE-FX) can be joined
`into a common collision domain using repeaters. Bridges can also be used to connect different signaling sys-
`tems; however, if a bridge is so used, each system connected to the bridge will be a separate collision domain.
`
`Two types of repeaters are defined for 100BASE-T (see clause 27). Class I repeaters are principally used to
`connect unlike physical signaling systems and have internal delays such that only one Class I repeater can
`reside within a single collision domain when maximum cable lengths are used (see figure 29-4). Class II
`repeaters typically provide ports for only one physical signaling system type (e.g., 100BASE-TX but not
`100BASE-T4) and have smaller internal delays so that two such repeaters may reside within a given colli-
`sion domain when maximum cable lengths are used (see figure 29-6). Cable length can be sacrificed to add
`additional repeaters in a collision domain (see 29.3).
`
`29.2 Transmission System Model 1
`
`The following network topology constraints apply to networks using Transmission System Model 1.
`
`a) All balanced cable (copper) segments less than or equal to 100 m each.
`b)
`Fiber segments less than or equal to 412 m each.
`c) MII cables for 100BASE-T shall not exceed 0.5 m each. When evaluating system topology, MII
`cable delays need not be accounted for separately. Delays attributable to the MII are incorporated
`into DTE and repeater component delays.
`
`29.3 Transmission System Model 2
`
`The physical size and number of topological elements in a 100BASE-T network is limited primarily by
`round-trip collision delay. A network configuration must be validated against collision delay using a network
`model. Since there are a limited number of topology models for any 100BASE-T collision domain, the mod-
`eling process is quite straightforward and can easily be done either manually or with a spreadsheet.
`
`The model proposed here is derived from the one presented in 13.4. Modifications have been made to
`accommodate adjustments for DTE, repeater, and cable speeds.
`
`283
`
`
`
`This is an Archive IEEE Standard. It has been superseded by a later version of this standard.
`
`Page 305
`
`

`
`
`
`
`IEEE
`Std 802.3u-1995
`
`SUPPLEMENT TO 802.3:
`
`DTE w/MII
`
`DTE w/MII
`
`See table 29-2 for maximum segment length.
`
`Figure 29-3—Model 1: Two DTEs, no repeater
`
`Repeater Set
`
`A
`
`B
`
`DTE
`
`DTE
`
`A+B = collision domain diameter
`
`See table 29-2 for maximum collision domain diameter.
`
`Figure 29-4—Model 1: Single repeater
`
`Repeater Set
`
`B
`
`Repeater Set
`
`A
`
`C
`
`DTE
`DTE
`A+B+C= collision domain diameter
`
`See table 29-2 for maximum collision domain diameter.
`
`Figure 29-5—System Model 1: Two Class II repeaters
`
`284
`
`
`
`This is an Archive IEEE Standard. It has been superseded by a later version of this standard.
`
`Page 306
`
`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`CSMA/CD
`
`IEEE
`Std 802.3u-1995
`
`a
`Table 29-2—Maximum Model 1 collision domain diameter
`
`
`Model
`
`DTE-DTE (see figure 29-3)
`
`One Class I repeater (see figure 29-4)
`
`One Class II repeater (see figure 29-4)
`
`Two Class II repeaters (see figure 29-5)
`
`Balance
`d cable
`(copper)
`
`100
`
`200
`
`200
`
`205
`
`Fiber
`
`Balanced cable & fiber
`(T4 and FX)
`
`Balanced cable & fiber
`(TX and FX)
`
`412
`
`272
`
`320
`
`228
`
`na
`
`b
`
`231
`
`b,c
`
`304
`
`d,c
`236.3
`
`na
`
`260.8
`
`308.8
`
`216.2
`
`b
`
`b
`
`d
`
`a
`In meters, no margin.
`b
`Assumes 100 m of balanced cable and one fiber link.
`c
`This entry included for completeness. It may be impractical to construct a T4 to FX class II repeater.
`d
`Assumes 105 m of balanced cable and one fiber link.
`
`29.3.1 Round-trip collision delay
`
`For a network to be valid, it must be possible for any two DTEs on the network to contend for the network at
`the same time. Each station attempting to transmit must be notified of the contention by the returned “colli-
`sion” signal within the “collision window” (see 4.1.2.2 and 5.2.2.1.2). Additionally, the maximum length
`fragment created must contain less than 512 bits after the start-of-frame delimiter (SFD). These require-
`ments limit the physical diameter (maximum distance between DTEs) of a network. The maximum round-
`trip delay must be qualified between all pairs of DTEs in the network. In practice this means that the qualifi-
`cation must be done between those that, by inspection of the topology, are candidates for the longest delay.
`The following network modeling methodology is provided to assist that calculation.
`
`29.3.1.1 Worst-case path delay value (PDV) selection
`
`The worst-case path through a network to be validated shall be identified by examination of aggregate DTE
`delays, cable delays, and repeater delays. The worst case consists of the path between the two DTEs at oppo-
`site ends of the network that have the longest round-trip time. Figures 29-6 and 29-7 show schematic repre-
`sentatins of one-repeater and two-repeater paths.
`
`PHY
`
`PHY
`
`DTE
`
`R E P E A T E R
`
`DTE
`
`PHY
`
`PHY
`
`= MII cable
`
`= Media cable
`
`Figure 29-6—System Model 2: Single repeater
`
`29.3.1.2 Worst-case PDV calculation
`
`Once a set of paths is chosen for calculation, each shall be checked for validity against the following formula:
`
`PDV =
`
`link delays (LSDV) +
`
`repeater delays + DTE delays + safety margin
`
`285
`
`
`
`This is an Archive IEEE Standard. It has been superseded by a later version of this standard.
`
`Page 307
`
`(cid:229)
`(cid:229)
`

`
`SUPPLEMENT TO 802.3:
`
`End
`Segment
`
`PHY
`
`PHY
`
`DTE
`
`R E P E A T E R
`
`Inter-
`Repeater
`Link
`
`PHY
`
`PHY
`
`R E P E A T E R
`
`IEEE
`Std 802.3u-1995
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`End
`Segment
`
`DTE
`
`PHY
`
`PHY
`
`= MII cable
`
`= Media cable
`
`Figure 29-7—System Model 2-2: Two repeaters
`
`Values for the formula variables are determined by the following method:
`
`a) Determine the delay for each link segment (Link Segment Delay Value, or LSDV), including inter-
`repeater links, using the formula
`
`LSDV=2 (for round-trip delay)
`
` segment length
`
` cable delay for this segment
`
`NOTES
`1—Length is the sum of the cable lengths between the PHY interfaces at the repeater and the farthest DTE for
`End Segments plus the sum of the cable lengths between the repeater PHY interfaces for Inter-Repeater Links.
`All measurements are in meters.
`2—Cable delay is the delay specified by the manufacturer or the maximum value for the type of cable used as
`shown in table 29-3. For this calculation, cable delay must be specified in bit times per meter (BT/m). Table 29-
`4 can be used to convert values specified relative to the speed of light (%c) or nanoseconds per meter (ns/m).
`3—When actual cable lengths or propagation delays are not known, use the Max delay in bit times as specified
`in table 29-3 for copper cables. Delays for fiber should be calculated, as the value found in table 29-3 will be
`too large for most applications.
`
`Sum together the LSDVs for all segments in the path.
`b)
`c) Determine the delay for each repeater in the path. If model-specific data are not available from the
`manufacturer, determine the class of each repeater (I or II) and enter the appropriate default value
`from table 29-3.
`d) MII cables for 100BASE-T shall not exceed 0.5 m each. When evaluating system topology, MII
`cable delays need not be accounted for separately. Delays attributable to the MII are incorporated
`into DTE and repeater component delays.
`e) Use the DTE delay value shown in table 29-3 unless your equipment manufacturer defines a differ-
`ent value.
`Decide on appropriate safety margin—0 to 5 bit times—for the PDV calculation. Safety margin is
`used to provide additional margin to accommodate unanticipated delay elements, such as extra-long
`connecting cable runs between wall jacks and DTEs. (A safety margin of 4 BT is recommended.)
`Insert the values obtained through the calculations above into the following formula to calculate the
`PDV. (Some configurations may not use all the elements of the formula.)
`
`g)
`
`f)
`
`PDV =
`
`link delays (LSDV) +
`
`repeater delays + DTE delay + safety margin
`
`h)
`i)
`
`If the PDV is less than 512, the path is qualified in terms of worst-case delay.
`Late collisions and/or CRC errors are indicators that path delays exceed 512 BT.
`
`286
`
`
`
`This is an Archive IEEE Standard. It has been superseded by a later version of this standard.
`
`Page 308
`


`(cid:229)
`(cid:229)
`

`
`CSMA/CD
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IEEE
`Std 802.3u-1995
`
`Table 29-3—Network component delays, Transmission System Model 2
`
`Component
`
`Round-trip delay in bit
`times per meter
`
`Two TX/FX DTEs
`Two T4 DTEs
`One T4 and one TX/FX
`a
`DTE
`Cat 3 cable segment
`Cat 4 cable segment
`Cat 5 cable segment
`STP cable segment
`Fiber optic cable segment
`Class I repeater
`Class II repeater with all
`ports TX/FX
`Class II repeater with any
`port T4
`
`1.14
`1.14
`1.112
`1.112
`1.0
`
`Maximum round-trip
`delay in bit times
`100
`138
`127
`
`114 (100 m)
`114 (100 m)
`111.2 (100 m)
`111.2 (100 m)
`412 (412 m)
`140
`92
`
`67
`
`a
`
`Worst-case values are used (TX/FX values for MAC transmit start and MDI input to colli-
`sion detect; T4 value for MDI input to MDI output).
`
`Table 29-4—Conversion table for cable delays
`
`Speed relative to c
`0.4
`0.5
`0.51
`0.52
`0.53
`0.54
`0.55
`0.56
`0.57
`0.58
`0.5852
`0.59
`0.6
`0.61
`0.62
`0.63
`0.64
`0.65
`0.654
`0.66
`0.666
`0.67
`0.68
`0.69
`0.7
`0.8
`0.9
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ns/m
`8.34
`6.67
`6.54
`6.41
`6.29
`6.18
`6.06
`5.96
`5.85
`5.75
`5.70
`5.65
`5.56
`5.47
`5.38
`5.29
`5.21
`5.13
`5.10
`5.05
`5.01
`4.98
`4.91
`4.83
`4.77
`4.17
`3.71
`
`BT/m
` 0.834
` 0.667
` 0.654
` 0.641
` 0.629
` 0.618
` 0.606
` 0.596
` 0.585
` 0.575
` 0.570
` 0.565
` 0.556
` 0.547
` 0.538
` 0.529
` 0.521
` 0.513
` 0.510
` 0.505
` 0.501
` 0.498
` 0.491
` 0.483
` 0.477
` 0.417
` 0.371
`
`287
`
`
`
`This is an Archive IEEE Standard. It has been superseded by a later version of this standard.
`
`Page 309
`
`

`
`
`
`This is an Archive IEEE Standard. It has been superseded by a later version of this standard.
`
`Page 310
`
`

`
`
`
`
`
`
`
`
`
`
`
`CSMA/CD
`
`IEEE
`Std 802.3u-1995
`
`30. Layer Management for 10 Mb/s and 100 Mb/s
`
`30.1 Overview
`
`This clause provides the Layer Management specification for DTEs, repeaters, and MAUs based on the
`CSMA/CD access method. The clause is produced from the ISO framework additions to clause 5, Layer
`Management; clause 19, Repeater Management; and clause 20, MAU Management. It incorporates additions
`to the objects, attributes, and behaviors to support 100 Mb/s CSMA/CD.
`
`The layout of this clause takes the same form as 5.1, 5.2, and clauses 19 and 20, although with equivalent
`subclauses grouped together. It identifies a common management model and framework applicable to IEEE
`802.3 managed elements, and it identifies those elements and defines their managed objects, attributes, and
`behaviors in a protocol-independent language. It also includes a formal GDMO definition of the protocol
`encodings for CMIP and ISO/IEC 15802-2: 1995 [IEEE 802.1B].
`
`NOTE—The arcs (that is, object identifier values) defined in annex 30A, the formal GDMO definitions, deprecate the
`arcs previously defined in Annexes D1 (Layer Management), D2 (Repeater Management), and D3 (MAU Management).
`See IEEE Std 802.1F-1993, annex C.4.
`
`This clause provides the Layer Management specification for DTEs, repeaters, and MAUs based on the
`CSMA/CD access method. It defines facilities comprised of a set of statistics and actions needed to provide
`IEEE 802.3 Management services. The information in this clause should be used in conjunction with the
`Procedural Model defined in 4.2.7–4.2.10. The Procedural Model provides a formal description of the rela-
`tionship between the CSMA/CD Layer Entities and the Layer Management facilities.
`
`This management specification has been developed in accordance with the OSI management architecture as
`specified in the ISO Management Framework document, ISO/IEC 7498-4: 1989. It is independent of any
`particular management application or management protocol.
`
`The management facilities defined in this standard may be accessed both locally and remotely. Thus, the
`Layer Management specification provides facilities that can be accessed from within a station or can be
`accessed remotely by means of a peer-management protocol operating between application entities.
`
`In CSMA/CD no peer management facilities are necessary for initiating or terminating normal protocol
`operations or for handling abnormal protocol conditions. The monitoring of these activities is done by the
`carrier sense and collision detection mechanisms. Since these activities are necessary for normal operation
`of the protocol, they are not considered to be a function of Layer Management and are, therefore, not dis-
`cussed in this clause.
`
`Implementation of part or all of 10 Mb/s and 100 Mb/s Management is not a requirement for conformance to
`clauses 4, 7, 9, 22, 23, 24, 25, 26, 27, or 28.
`
`The intent of this standard is to furnish a management specification that can be used by the wide variety of
`different devices that may be attached to a network specified by ISO/IEC 8802-3. Thus, a comprehensive list
`of management facilities is provided.
`
`The improper use of some of the facilities described in this clause may cause serious disruption of the net-
`work. In accordance with ISO management architecture, any necessary security provisions should be pro-
`vided by the Agent in the Local System Environment. This can be in the form of specific security features or
`in the form of security features provided by the peer communication facilities.
`
`289
`
`
`
`This is an Archive IEEE Standard. It has been superseded by a later version of this standard.
`
`Page 311
`
`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IEEE
`Std 802.3u-1995
`
`30.1.1 Scope
`
`SUPPLEMENT TO 802.3:
`
`This clause includes selections from clauses 5, 19, and 20. It is intended to be an entirely equivalent specifi-
`cation for the management of 10 Mb/s DTEs, 10 Mb/s baseband repeater units, and 10 Mb/s integrated
`MAUs. It also includes the additions for management of 100 Mb/s DTEs, repeater units, embedded MAUs,
`and external PHYs connected with the MII. Implementations of management for 10 Mb/s DTEs, repeater
`units, and embedded MAUs should follow the requirements of this clause (e.g., a 10 Mb/s implementation
`should incorporate the attributes to indicate that it is not capable of 100 Mb/s operation).
`
`This clause defines a set of mechanisms that enable management of ISO/IEC 8802-3 10 Mb/s and 100 Mb/s
`DTEs, baseband repeater units, and integrated Medium Attachment Units (MAUs). In addition, for ports
`without integral MAUs, attributes are provided for characteristics observable from the AUI of the connected
`DTE or repeater. Direct management of AUI MAUs that are external to their respective DTEs or repeaters is
`beyond the scope of this standard. The managed objects within this standard are defined in terms of their
`behaviour, attributes, actions, notifications, and packages in accordance with IEEE 802.1 and ISO standards
`for network management. Managed objects are grouped into mandatory and optional packages.
`
`This specification is defined to be independent of any particular management application or management
`protocol. The means by which the managed objects defined in this standard are accessed is beyond the scope
`of this standard.
`
`30.1.2 Relationship to objects in IEEE Std 802.1F-1993
`
`The following managed object classes, if supported by an implementation, shall be as specified in IEEE Std
`802.1F-1993: ResourceTypeID, EWMAMetricMonitor.
`
`oResourceTypeID
`
`oEWMAMetricMonitor
`
`This object class is mandatory and shall be implemented as defined in
`IEEE Std 802.1F-1993. This object is bound to oMAC-Entity,
`oRepeater, and oMAU as defined by the NAMEBINDINGs in 30A.8.1.
`Note that the binding to oMAU is mandatory only when MII is present.
`The Entity Relationship Diagram, figure 30-3, shows these bindings
`pictorially.
`
`This object class is optional. When implemented, it shall be implemented
`as defined in IEEE Std 802.1F-1993, subject to the specific requirements
`described below. This object is bound to system as defined by the
`NAMEBINDINGs in 30A.1.1, 30A.3.1, and 30A.2.1.
`
`Implementations of IEEE 802.3 Management that support the oEWMAMetricMonitor managed object class
`are required to support values of granularity period as small as one second. Implementations are required to
`support at least one sequence of low and high thresholds. The granularity period may be set to equal to the
`moving time period as a minimal conformant implementation.
`
`30.1.3 Systems management overview
`
`Within the ISO Open Systems Interconnection (OSI) architecture, the need to handle the special problems of
`initializing, terminating, and monitoring ongoing activities and assisting in their operations, as well as han-
`dling abnormal conditions, is recognized. These needs are collectively addressed by the systems manage-
`ment component of the OSI architecture.
`
`A management protocol is required for the exchange of information between systems on a network. This
`management standard is independent of any particular management protocol.
`
`290
`
`
`
`This is an Archive IEEE Standard. It has been superseded by a later version of this standard.
`
`Page 312
`
`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`CSMA/CD
`
`IEEE
`Std 802.3u-1995
`
`This management standard, in conjunction with the management standards of other layers, provides the
`means to perform various management functions. IEEE 802.3 Management collects information needed
`from the MAC and Physical Layers and the devices defined in IEEE 802.3. It also provides a means to exer-
`cise control over those elements.
`
`The relationship between the various management entities and the layer entities according to the ISO model
`is shown in figure 30-1.
`
`30.1.4 Management model
`
`This standard describes management of DTEs, repeaters, and integrated MAUs in terms of a general model
`of management of resources within the open systems environment. The model, which is described in ISO/
`IEC 10040: 1992, is briefly summarized here.
`
`Management is viewed as a distributed application modeled as a set of interacting management processes.
`These processes are executed by systems within the open environment. A managing system executes a man-
`aging process that invokes management operations. A managed system executes a process that is receptive to
`these management operations and provides an interface to the resources to be managed. A managed object is
`the abstraction of a resource that represents its properties as seen by (and for the purpose of) management.
`Managed objects respond to a defined set of management operations. Managed objects are also capable of
`emitting a defined set of notifications. This interaction of processes is shown in figure 30-1.
`
`Manager
`
`Communicating
`Management Operations
`
`Notifications
`
`Agent
`
`Performing
`Management
`Operations
`
`Notifications
`Emitted
`
`Local system environment
`
`Managed
`Objects
`
`NOTE—Figure 1 of ISO/IEC 10040 has been reproduced with the permission of ISO. Copies of the complete
`standard may be obtained from the International Organization for Standardization, Case Postale 56, 1 rue de
`Varembé, CH-1211, Genève 20, Switzerland/Suisse.
`
`Figure 30-1—Interaction between manager, agent, and objects
`
`A managed object is a management view of a resource. The resource may be a logical construct, function,
`physical device, or anything subject to management. Managed objects are defined in terms of four types of
`elements:
`
`a)
`b)
`c)
`d)
`
`Attributes. Data-like properties (as seen by management) of a managed object.
`
`
`Actions. Operations that a managing process may perform on an object or its attributes.
`
`Notifications. Unsolicited reports of events that may be generated by an object.
`
`Behaviour. The way in which managed objects, attributes, and actions interact with the actual
`resources they model and with each other.
`
`The above items are defined in 30.3, 30.4, 30.5, and 30.6 of this clause in terms of the template requirements
`of ISO/IEC 10165-4: 1991.
`
`291
`
`
`
`This is an Archive IEEE Standard. It has been superseded by a later version of this standard.
`
`Page 313
`
`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IEEE
`Std 802.3u-1995
`
`SUPPLEMENT TO 802.3:
`
`Some of the functions and resources within 802.3 devices are appropriate targets for management. They
`have been identified by specifying managed objects that provide a management view of the functions or
`resources. Within this general model, the 802.3 device is viewed as a managed device. It performs functions
`as defined by the applicable standard for such a device. Managed objects providing a view of those functions
`and resources appropriate to the management of the device are specified. The purpose of this standard is to
`define the object classes associated with the devices in terms of their attributes, operations, notifications, and
`behaviour.
`
`30.2 Managed objects
`
`30.2.1 Introduction
`
`This clause identifies the Managed Object classes for IEEE 802.3 components within a managed system. It
`also identifies which managed objects and packages are applicable to which components.
`
`All counters defined in this specification are assumed to be wraparound counters. Wraparound counters are
`those that automatically go from their maximum value (or final value) to zero and continue to operate. These
`unsigned counters do not provide for any explicit means to return them to their minimum (zero), i.e., reset.
`Because of their nature, wraparound counters should be read frequently enough to avoid loss of information.
`Counters in 30.3, 30.4, 30.5 and 30.6 that have maximum increment rates specified for 10 Mb/s operation,
`and are appropriate to 100 Mb/s operation, have ten times the stated maximum increment rate for 100 Mb/s
`operation unless otherwise indicated.
`
`30.2.2 Overview of managed objects
`
`Managed objects provide a means to
`
`— Identify a resource
`— Control a resource
`— Monitor a resource
`
`30.2.2.1 Text description of managed objects
`
`In case of conflict, the formal behaviour definitions in 30.3, 30.4, 30.5, and 30.6 take precedence over the
`text descriptions in this subclause.
`
`oMACEntity
`
`oPHYEntity
`
`oRepeater
`
`The top-most managed object class of the DTE portion of the
`containment tree shown in figure 30-3. Note that this managed object
`class may be contained within another superior managed object class.
`Such containment is expected, but is outside the scope of this standard.
`
`Contained within oMACEntity. Many instances of oPHYEntity may
`coexist within one instance of oMACEntity; however, only one PHY
`may be active for data transfer to and from the MAC at any one time.
`oPHYEntity is the managed object that contains the MAU managed
`object in a DTE.
`
`The top-most managed object class of the repeater portion of the
`containment tree shown in figure 30-3. Note that this managed object
`class may be contained within another superior managed object class.
`Such containment is expected, but is outside the scope of this standard.
`
`292
`
`
`
`This is an Archive IEEE Standard. It has been superseded by a later version of this standard.
`
`Page 314
`
`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`CSMA/CD
`
`oRepeaterMonitor
`
`oGroup
`
`oRepeaterPort
`
`oMAU
`
`oAutoNegotiation
`
`oResourceTypeID
`
`IEEE
`Std 802.3u-1995
`
`A managed object class called out by IEEE Std 802.1F-1993. See 30.1.2,
`oEWMAMetricMonitor.
`
`The group managed object class is a view of a collection of repeater ports.
`
`The repeater port managed object class provides a view of the functional
`link between the data transfer service and a single PMA. The attributes
`associated with repeater port deal with the monitoring of traffic being
`handled by the repeater from the port and control of the operation of the
`port. The Port Enable/Disable function as reported by portAdminState is
`preserved across events involving loss of power. The oRepeaterPort
`managed object contains the MAU managed object in a repeater set.
`
`NOTE—Attachment to nonstandard PMAs is outside the scope of this standard.
`
`The managed object of that portion of the containment tree shown in
`figure 30-3. The attributes, notifications, and actions defined in this
`clause are contained within the MAU managed object. Neither counter
`values nor the value of MAUAdminState is required to be preserved
`across events involving the loss of power.
`
`The managed object of that portion of the containment tree shown in
`figure 30-3. The attributes, notifications, and actions defined in this
`clause are contained within the MAU managed object.
`
`A managed object class called out by IEEE Std 802.1F-1993. It is used
`within this clause to identify manufacturer, product, and revision of
`managed components that implement functions and interfaces defined
`within IEEE 802.3. The clause 22 MII specifies two registers to carry
`PHY Identifier (22.2.4.3.1), which provides succinct information
`sufficient to support oResourceTypeID.
`
`30.2.2.2 Functions to support management
`
`Functions are defined in clauses 5, 7, 22, 23, 24, 25, 26, 27, and 28 both to facilitate unmanaged operation
`and managed operation. The functions in these clauses that facilitate managed operation are referenced from
`the text of this management clause.
`
`30.2.2.2.1 DTE MAC sublayer functions
`
`For DTE MACs, with regard to reception-related error statistics a hierarchical order has been established
`such that when multiple error statuses can be associated with one frame, only one status is returned to the
`LLC. This hierarchy in descending order is as follows:
`
`— frameTooLong
`— alignmentError
`— frameCheckError
`— lengthError
`
`293
`
`
`
`This is an Archive IEEE Standard. It has been superseded by a later version of this standard.
`
`Page 315
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket