802-171 Topology/Protection Comment Resolution Summary Jason Fan, Section Editor Jim Kao, Technical Editor

Slides:



Advertisements
Similar presentations
Virtual Trunk Protocol
Advertisements

Overview of the SDE Protocol Presented by Ken Alonge Chair,
1 Introducing the Specifications of the Metro Ethernet Forum.
Chapter 9: Access Control Lists
Doc.: IEEE /0497 r0 Submission May 2008 Allan Thomson, Cisco SystemsSlide 1 D2.0 Location Changes Summary Date: Authors:
Chapter 9 Local Area Network Technology
1 September 2003 IEEE Draft 2.5 OAM Comment Resolution Las Vegas, NV - September 2003 Section Editor: Glenn Parsons Technical Editors: Leon Bruckman,
NVO3 NVA Gap Analysis Linda Dunbar Donald Eastlake.
VLAN Trunking Protocol (VTP) W.lilakiatsakun. VLAN Management Challenge (1) It is not difficult to add new VLAN for a small network.
1 Chapter Overview Creating Sites and Subnets Configuring Intersite Replication Troubleshooting Active Directory Replication.
Geneva, Switzerland, 13 July 2013 IEEE 1588 revision Silvana Rodrigues, Director of System Engineering, IDT Joint IEEE-SA and.
Bob SultanMay 9, 2002IEEE RPRWG IEEE Resilient Packet Ring Draft D0.2 Section 1 Comment Resolution May, 2002 Ottawa, Canada
Multiple Links Failover Mechanism for RPR Interconnected Rings IEEE WG Orlando, Florida USA March 11~16, 2007.
VLAN Trunking Protocol (VTP)
© 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice SISP Training Documentation Template.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 9: Access Control Lists Routing & Switching.
Exploring Microsoft Office XP - Microsoft Word 2002 Chapter 71 Exploring Microsoft Word Chapter 7 The Expert User: Workgroups, Forms, Master Documents,
Harry Peng 1May, 2003 P802.17D2.1 CRG PHY CRG Report May Montreal, Quebec Harry Peng: technical editor Rhett Brikovskis: section editor.
Yang Shi, Chris Elliott, Yong Zhang IETF 73 rd 18 Nov 2008, Minneapolis CAPWAP WG MIB Drafts Report.
Yang Shi (Richard), Yong Zhang IETF 74 th 26 March 2009, San Francisco CAPWAP WG MIB Drafts Report.
Session # Maintenance Task Group Closing Plenary Report IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE maint-11/0019.
March 2006 CAPWAP Protocol Specification Update March 2006
Land Matrix Data Editing Guidelines. Major Tasks Updating Existing Deals Improving the data of deals that are already in the database Adding New Deals.
Switching Topic 3 VTP. Agenda VTP basics Components Frames and advertisements Domains and revision numbers VTP operations VTP pruning VTP issues.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 VLAN Trunking Protocol Cisco Networking Academy.
WG 2 Progress Report at TP#9 Group Name: oneM2M TP #9 Source: WG2 leadership Meeting Date: /21 Agenda Item: WG Reports.
Doc.: IEEE leci SGLECIM November 2010 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPAN) Submission Title:
Session 1 Module 1: Introduction to Data Integrity
UML (Unified Modeling Language)
Yan Wang Proposed amendments of control frames for c Yan Wang Huawei technologies.
PHYDate may 2002 PHY Comment Resolution Summary Clause 7 –Technical binding 1 –Technical non-binding17 –Editorial10 –Total 28 Annex B –Technical.
7/27/2004IETF San-Diego Plenary meeting 8/2004 EPON MIBs Lior Khermosh – Passave Technologies
July 2007 CAPWAP Protocol Specification Editors' Report July 2007
16 January ???1 Section 2 (MAC) CRG Summary John Lemon Steve Wood David James.
1 15-Mar-16 VLAN Trunking protocol CCNA Exploration Semester 3 Chapter 4.
802.17c Protected Inter-Ring Connection Rafi Ram - Corrigent Systems March 2008.
WG5 – MAS#22 Status Report Group Name: WG5 MAS (Management, Abstraction & Semantics) Source: Tim Carey(Alcatel-Lucent, WG5 Vice Chair) Meeting Date:
Exploration 3 Chapter 4. What is VTP? VTP allows a network manager to configure a switch so that it will propagate VLAN configurations to other switches.
Session # Maintenance Task Group Opening Report IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE maint-11/0020.
Doc.: IEEE /065r1 Submission February 2000 Tom Siep, Texas InstrumentsSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Data Integrity & Indexes / Session 1/ 1 of 37 Session 1 Module 1: Introduction to Data Integrity Module 2: Introduction to Indexes.
Chap 4 – Implement VTP Learning Objectives
IEEE 802.1AS REV D5.0 Review Comments
Software Project Configuration Management
Working in the Forms Developer Environment
802.1AX -- Link Aggregation: Editor’s Report: July 2017 Version 3
nnnnn, iii_xxxxx_vv Section 2 Comment Resolution Summary Jim Mollenauer Steve Wood Dave Meyer Med Belhadj May 9, nnnnn, iii_xxxxx_vv.
Constraints and Triggers
IEEE 802.1AS REV D5.0 Review Comments
Physical Structure of GDB
P802.11aq Waiver request regarding IEEE RAC comments
P802.11aq Waiver request regarding IEEE RAC comments
VLAN Trunking Protocol
Atlanta Jan 2003 PHY Comment Resolution Harry Peng
Layer Management and MIBs Sections Report
802-1AX-2014-Cor-1-d0-5 Sponsor Ballot Comments Version 1
Submission Title: [Draft Standard Overview]
Summary of Unresolved General Comments for 2/14 TGs Telecon
March 2013 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Comment Resolution Suggestions Date Submitted:
Automating and Validating Edits
TGn Closing Report – March ‘06
March 2013 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Comment Resolution Suggestions Date Submitted:
Synchronization related comment resolution
P802.11aq Waiver request regarding IEEE RAC comments
P802.11aq Waiver request regarding IEEE RAC comments
TGn Editor Report Oct 2006 Date: Authors: October 2006
TGi Draft 1 Clause – 8.5 Comments
August 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Still More LB156 Comment Resolutions Date.
Paul Unbehagen Big Switch Networks Scott Fincher Extreme Networks
Presentation transcript:

Topology/Protection Comment Resolution Summary Jason Fan, Section Editor Jim Kao, Technical Editor

jf_report_top_prot_013/13/ Clause 10 and Annex K 302 comments –79 technical binding –70 technical non-binding –153 editorial Adhoc group resolution (technicals) –129 accepted, accepted/mod, accepted/dup –23 superceded –0 rejected –4 punted to WG (4 technical binding) –3 withdrawn Editorial license requested

jf_report_top_prot_013/13/ Issues Covered: Highlights Revised protection state machine added –Protection behavior with FS and SF on span corrected –Protection rules to be reorganized Topology database update state machine added Topology validation state machine added –Additional specification of topology validation checks –Instability defect timer set to 10 * slow TP frame periodic timer Uniform edge status determination and reporting for steering and wrapping State machine handling for passthrough Specification of criteria for entry and exit of context containment and other relevant modifications

jf_report_top_prot_013/13/ Issues Covered: Highlights Wrap/steer preferred modified to wrap/steer configured, defect triggered to higher layers on configuration mismatch Sequence number check will be per span of the station TLVs –Rules addded for discarding/updating/triggering TLVs –Vendor-specific TLV modified to organization-specific –TLVs added for station management address and interface index –Station bandwidth TLV made optional with default of 0 –Station name TLV given range of 0 to 127 bytes –TLV timer range given range of 1 to 10 seconds with 1 second resolution and 1 second default

jf_report_top_prot_013/13/ Issues Covered: Highlights MIB attributes added for some TBDs Determination of values for some existing MIB attributes to be specified MAC editors to modify receive state machine to reset link keepalive timer for valid received SCFF Consistency with Clause 6 on handling of control frames across edge span PICS and use of saintly words Annex K –Scenarios to be added on modification of wrapping ring to steering ring and vice versa, passthrough mode, duplicate MAC address checking, and too many stations on ring checking –Existing scenarios to be deleted –List of scenarios to be filled in to be specified

jf_report_top_prot_013/13/ Main Issues List Topology database update in passthrough mode scenarios Context containment entrance and exit criteria and mechanisms Simulation and/or reference implementation Timer settings and ranges/resolution TLV update Scope of new features: secondary MAC address? PICS General editorial modifications

jf_report_top_prot_013/13/ Punts 4 punts to WG – 644 (TB), 760 (TB), 870 (TB), 887 (TB) Punted from Intro –151 (TB) Accepted/modified Punted from MAC –316, 317 (TB), 319, 320 (TB), 321 (TB) All superceded by 887