GB/Z 15629.1-2000 Information technology systems - Telecommunications and information exchange - Specific requirements for local area networks and metropolitan area networks - Part 1: Overview of local area network standards
Some standard content:
GB/Z15629.1—2000
This guidance technical document is equivalent to ISO/IECTR8802-1:1997 "Telecommunications and information exchange between information technology systems
Specific requirements for local area networks and metropolitan area networks Part 1: Overview of local area network standards". This guidance technical document is for reference only. Suggestions and opinions on this guidance technical document should be reported to the standardization administrative department of the State Council.
Appendix A of this guidance technical document is a suggestive appendix. This guidance technical document comprehensively describes the local area network standard set. Appendix A of this guidance technical document is a suggestive appendix. This guidance technical document is proposed by the Ministry of Information Industry of the People's Republic of China. This guidance technical document is under the jurisdiction of the China Electronics Technology Standardization Institute. The drafting unit of this guidance technical document: China Electronics Technology Standardization Institute. The main drafters of this guidance technical document: Luo Renhong and Huang Jiaying. 81
GE/Z15629.1-2000
ISO/IEC Foreword
ISO () (International Organization for Standardization) and IEC (International Electrotechnical Commission) are specialized organizations for standardization worldwide. National member bodies (which are members of ISO or IEC) participate in the development of international standards for specific technical areas through technical committees established by international organizations. ISO and IEC technical committees cooperate in areas of common interest. Other official and non-governmental international organizations in contact with ISO and IEC may also participate in the development of standards. For the field of information technology, ISO and EC have established a joint technical committee, namely ISO/IEC "TC1. The main task of the technical committee is to develop international standards, but in exceptional cases, the technical committee can propose one of the following types of technical reports:
, -1 type: when despite repeated efforts, it is still impossible to obtain the support required for the publication of a standard., -2 type: the project under discussion is still in the technical development stage. - Type 3: When the data collected by the technical committee is different from the data officially published as an international standard (for example, the level of technological development). Type 1 and Type 2 technical reports should be submitted for review within 3 years after publication to decide whether to convert them into international standards. Type 3 technical reports do not have to be reviewed unless the data they provide is considered no longer valid and useful. ISO/IECTR8802-1 is a Type 3 technical report. It was developed by the SC6 Inter-system Communication and Information Exchange "Sub-Technical Committee" of the ISO/IECJTC1\Information Technology\Joint Technical Committee. 32
GB/Z15629.1-2000
This guidance technical document introduces the technical requirements for promoting communication with local area networks (1.AN ) is a set of standards established for the interconnection of information processing systems connected by a single broadcast domain. IAN is a peer-to-peer communication network provided by a single broadcast domain, which enables all end stations to exchange information. Therefore, it does not provide privacy itself. LAN is usually owned, used and operated by a single organization and belongs to the scope of a single management domain. This guidance technical document provides reference information for all standards related to local area networks; in particular, information about GB/T15629 (ISO)/IEC8802) technology and FDDI. 83
National Standardization Guidance Technical Document of the People's Republic of China Information Technology Telecommunication and information exchange between sysiemsLocal and metropolitan area networks.-Specific requirements.-Part 1:Overview of Local Area Network standards1Scope
GB/Z 15629.12000
idt ISO/IEC TR 8802-1:1997
This guidance document introduces the set of standards that describe local area networks, especially those that use a 48-bit address format. The various technologies described in this guidance document have the ability to provide adequate support for the MAC services specified in ISO/IEC15802-1.
Therefore, the scope of this guidance document is limited to those standards that describe the processes and procedures of the data link layer and physical layer of the OSI basic reference model and are considered to be related to local area networks. This guidance document itself does not describe new service or protocol definitions. Its purpose is to determine the ins and outs of various types of local area networks. It includes both the standards that describe FDDI and the various technologies described by the GB/T15629 (ISO/IEC8802) standard set. 2 Reference standards
The provisions contained in the following standards constitute the provisions of this guidance document by reference in this guidance document. The versions shown are valid when this guidance document is published. All standards will be revised, and parties using this guidance document should explore the possibility of using the latest versions of the following standards. Note: In order to be consistent with the numbering scheme used by IEEE for LAN/MAN standards, ISO/IECITCI agreed in January 1993 to modify the existing I.AN/MAN standard numbering scheme. The introduction of the new scheme for new standards and the renumbering of existing standards are in progress. This guidance technical document retains the relevant interpolation for consistency with international standards and ease of reference. Appendix A describes in detail the new numbering scheme of ISO/IECJTC1 for LAN/MAN standards and explains how to implement this scheme. GB/T9387.11998 Information technology Open Systems Interconnection Basic Reference Model Part 1: Basic Model (idtISO/IEC7498-1:1994)
Information processing systems Open Systems Interconnection Basic Reference Model Part 3: Naming and addressing GB/T 9387.3-1995
(idt ISO 7498-3:1989)
GB/T15629.4-1997 Information processing systems Flat Area Network Part 4: Token passing bus access method and physical layer specification (idt ISO/IEC 8802-4: 1990)
GB/T16678.1-1996 Information processing systems Fiber Distributed Data Interface (FDDI) Part 1: Token Ring Physical Layer Protocol (PHY) (idtISO 9314-1:1989) Information processing systems Fiber Distributed Data Interface (FDDI) Part 2: Token Ring Media Access Control (MAC) (idtISO9314-2:1989) GB/T 16678.3---1996 Information processing systems Fiber Distributed Data Interface (FDDI) Part 3: Token Ring Physical Layer Media Dependent Part (PMD) (idtISO/1EC9314-3:1990) GB/T 17175. 4--1997
Information technology Open Systems Interconnection Management Information Structure Part 4: Guidelines for the definition of managed objects (idt ISO/IEC 10165-4:1992)
GB/T 17547---1998
Information technology Open Systems Interconnection Data Link Service Definition (idt ISO/IEC8886:1996) Information technology Telecommunications and information exchange between systems GB/T 17968---2000
Elements of management information related to the ()SI data link layer standard (idt ISO/IEC10742:1994) IS()/IEC8802-2:19941) Information technology Telecommunications and information exchange between systems Specific requirements for local and metropolitan area networks Part 2: Logical link control
ISO/IEC 8802-3:19961)
Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Particular requirements
Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications
ISO/IEC 8802-5:19951
Information technology LAN and MAN specific requirements Part 5: Token ring access method and physical layer specifications
Information technology LAN and MAN specific requirements Part 6: Distributed queue dual bus ISO/IEC 8802-6:19941
(DQDB) access method and physical layer specification
ISO/IEC8802-9:1996 Information technology Local and metropolitan area network specific requirements Part 9: Integrated services (IS) LAN interface at the media access control (MAC) and physical (PHY) layersISO/IEC8802-12:2) Information technology Local and metropolitan area network specific requirements Part 12: On-demand priority access method, physical layer and repeater specifications
ISO/IEC9314-6:2) Information technology Fiber Distributed Data Interface (FDDI) Part 6: Station Management (SMT)
IS(/IECTR9577:1996 Information technology Protocol identification within the network layerISO/IEC 10038:1993
Information technology telecommunications and information exchange between systems Media access control (MAC)
Local area networks
Bridges (Future publication as ISO/IEC 15802-3) Information technology telecommunications and information exchange between systems ISO/IEC 11575:1995
Provisioning and mapping of OSI data link services
ISO)/IEC 11801:1995 Information technology Generic cabling for user premises ISO/IEC TR 11802-1:1997 Information technology telecommunications and information exchange between systems Local and metropolitan area networks Technical reports and guidelines Part 1: Structure and encoding of logical link control addresses in local area networks (formerly ISO/IEC TR 10178)
ISO/IECTR11802-2:1996 Information technology systems - Telecommunications and information exchange - Local and metropolitan area networks - Technical reports and guidelines - Part 2: Standard MAC group addresses (formerly ISO/IECTR10735)
ISO/IEC15802-1:1994 Information technology systems - Telecommunications and information exchange - Local and metropolitan area networks - Common specifications - Part 1: Media access control (MAC) service definition (formerly ISO/IE C10039) IS)/IEC15802-4:1994 Information technology systems for telecommunications and information exchange between local and metropolitan area networks - Common specifications - Part 4: System loading protocol
ISO/IEC15802-5:2) Information technology systems for telecommunications and information exchange between local and metropolitan area networks - Common specifications - Part 5: Remote MAC bridge
1) The equivalent version of GI3/T15629.2-1995 is ISO/IEC8802-2:1989. The equivalent version of GB/T15629.3-1995 is 1S0/IEC8802-3:1990. The equivalent version of GB/T15629.5--1996 is ISO/IEC8802-5:1992. For ease of reference, these three national standards are listed in brackets after the international standards in the text of this guidance technical document. 2) To be published.
3 Abbreviations
GB/Z15629.12000
This guiding technical document uses the following abbreviations. CSMA/CD Carrier Sense Multiple Access with Collision Detection DLS Data Link Service
Distributed Queued Dual Bus
Destination Service Access Point
Fiber Distributed Data Interface
Local Area Network
Logical Link Control
Media Access Control
Metropolitan Area Network
Management Conformance Summary
Management Information·Conformance Statement
Managed Objects·-Conformance Statement
Managed Relationship Conformance Statement
Physical Layer
Protocol Implementation Conformance Statement
Physical Layer Media Related Parts
Station Management
Subnet Access Protocol
Source Service Access Point
4 Local Area Network Technologies
4.1 Introduction
The LAN technologies considered in this guidance technical document are shown in Table 1. Table 1 Local area network technology and its related standards
LAN technology
CSMA/CD
Jinbei transmission bus
Jinbei transmission ring
Priority by band
Integrated services
Data transmission rate
10 Mbit/s/100 Mbit/s
5 Mbit/s/10 Mbit/s
4 Mbit/s/16 Mhit/s
No upper limit defined
100 Mbit/s
Up to 20.48 Mbit/s
100 Mbit/s
ISO/IEC 8802-3 (GE/T 15629.3--1995)ISO/IEC 8802-4IGB/T 15629.4-1997ISO/IEC8842-5(G3/T15629.51996)150/1E0 8802-6
1S0/IEC 8802-12
IS0/IFC 8802 9
IS0/1FC: 9314-7-~9314-3(150/1EC 9314-6)TG/16678.1-~16678.3
These standards are organized in the architectural approach of the OSI basic reference model + in the case of 88021.AN, organized into the media-related aspects of the physical layer (PHY) and the formats and protocols used by the specific media access control sublayer (MAC). Figure 1 shows the dependencies of the various technologies in this overall architecture. This family of standards covers the physical layer and data link layer defined by the open system interconnection reference model. It includes a set of media access technologies and associated physical media, each of which is suitable for a specific application or system goal.
ISO/IEC
8802-3
4.2 LAN technology
GB/Z15629.1—2000
ISO/IEC8802-2|GB/T15629.21995ISO/IEC
8802--4
SO/IEc
ISO/IEC
ISO/EC
8802-6
8802·5
8802-9
ISO/IEC
8802-12
Figure 1 Relationship of LAN standard family
FISO/IEC
Physical layer
LAN includes various physical layer standards, physical media and media access control methods. The following is a brief description of the LAN technologies identified in Table 1; however, for the exact details of each I.A.N. technology, refer to the relevant standards (see Chapter 2). 4.2.1 CSMA/CD
This I.A.N. technology, Carrier Sense Multiple Access with Collision, controls access to the medium by means of a common transmission medium shared by two or more stations. To transmit, a station waits (postpones) for a period of silence on the medium (i.e., no other station is transmitting) and then sends a predetermined message in bit-serial form. After initiating transmission, if this message collides with a message from another station, each sending station intentionally sends a few additional bytes to ensure that the collision is propagated throughout the system. Thereafter, the station remains silent for a random period of time (backoff) before attempting to transmit again. The CSMA/CD LAN technology is defined for use with 50Q coaxial cable (10BASE5 and 10BASE2), unshielded twisted pair (10BASE-T), and fiber-optic cable (FOIRL and 10BASE-F). 100BASE-T combines ISO/1EC8802-3 (GB/T15629.3) CSMA/CDMAC with a family of 100Mbit/s physical layers. Although the MAC is easily extended to new performance levels, new physical layer standards are still needed for 100Mbit/s operation, including 100BASE-T4, 100BASE-TX, and 100BASE-FX.
4.2.2 Token Passing Bus
This LAN technology controls access to the media by using tokens sent by the bus. This token allows the holder to send information to the bus. Token bus LAN technology is defined for use with broadband coaxial cable, baseband coaxial cable, and optical cable. 4.2.3 Token passing ring
In a token passing ring, stations are connected serially to form a logical ring on which data and control information are sent and received. Access to the ring is controlled by a signaling sequence called a "token" that flows from station to station around the ring.
A station wishing to transmit must wait until it receives a token. The station then changes the token to "start-of-message", sends its message, and once it has completed sending the message releases a new token for use by other stations on the ring. Token ring is specified for operation on shielded and unshielded twisted pair media at data rates of 4 Mbit/s and 16 Mbit/s. 4.2.4 Distributed Queued Dual Bus
DQDB is defined for the ability to operate in a local area and to interoperate with other LAN technologies. In particular, DQDB has the ability to use the 48-bit MAC address format, which is why it is included in this guidance document. However, DQDB is more commonly encountered in urban areas, which introduces the concept of metropolitan area network (MAN), which requires the development of high-speed technology to support connectionless data services. Since DQDBMAN will be used in a variety of different environments, a variety of different physical layer protocols are needed. Some physical layer protocols that utilize existing underlying transmission standards have been specified, with the intention of making all physical layer specifications based on a common framework. 4.2.5 Priority on Demand
Priority on Demand LAN consists of three main components: end nodes, repeaters, and network links. Typical end nodes are personal computers or larger computers, or they can be special devices such as bridges. Repeaters are network controllers that manage on-demand priority access methods. Link segments provide interconnection between individual repeaters and their connected end nodes or other repeaters. Priority access on demand is a priority-based round-robin arbitration method in which a central network controller (repeater) regularly polls its 87
GB/Z15629.7—2000
connected ports to determine which port has a transmission request pending and whether the transmission request is of normal priority (e.g., for data files) or high priority (e.g., for real-time voice, video, or data). This media access protocol provides a method for stations (end nodes) to communicate with each other on a centrally controlled I.AN, which provides several different link media options, including 100Q balanced cable (4-UPT and 2-TP), 150Q shielded balanced cable (STP), and optical fiber.
4.2.6 Integrated Services LAN Interface
The ISLAN interface is an integrated voice, data, and video interface that provides packet services and isochronous digital channels to desktop systems over an unshielded telephone twisted pair (UTP) on a full-duplex interface. Integrated services are provided to terminal equipment through an interface called access unit (AU). AU allows two completely different application technologies. First: the interface can be connected to an independent LAN, in which the AU provides the entire path. Second: the ISI.AN serves as an access interface into the main network of the integrated services digital network including 1SO/gate EC:8802xL.AN.FDDI network.
A connects to the terminal equipment with a star topology of point-to-point links. These links carry packet data, voice and broadband data bit streams and other services (such as fax, image or video services provided on isochronous channels). The specification can support multiple transmission rates of 4.096Mbit/s in the form of isochronous frames delivered at 8kHz. This isochronous frame specification is provided for 4.96Mbit/s and 20.48Mbit/s time division multiplexed bearers using 64 and 320 time slots, each containing one octet.
4.2.7 Fiber Distributed Data Interface
The physical media dependent part (PMD) provides a digital baseband channel for point-to-point communication between nodes on the FDDI network. It provides all the services required to transport a properly encoded digital bit stream. For its specific definition and description, see GB/T16678.3. The physical layer protocol (PHY) provides a connection between the PMD and the data link layer (MAC). It provides clock synchronization with the upstream data stream, and provides symbol encoding and decoding, as well as a summary of the symbol boundaries required for information transmitted to and from the higher layer. For the specific definition and characteristic characterization of PHY, see GB/T16678.1.
4.3 Cabling issues
For the implementation of the LAN applications mentioned in Table 1, ISO/IEC11801 provides an application-independent solution. This standard specifies the category cabling for user premises that supports all major applications. Specific definitions and characteristic characterizations can be found in this standard. 5 Data Link Layer
5.1 Introduction
For the GB/T15629 (ISO/IEC8802) local area network specification, it is very useful to divide the data link layer of the OSI basic reference model into two sublayers. Therefore, the data link layer is refined into the logical link control sublayer and the media access control sublayer. 5.2 Providing and supporting data link layer services
GB/T17547 contains the definition of OSI generic data link service (DL.S), so the service definition elements in LLC can be regarded as a collection of this generic service definition. The OSI DLS definition describes the characteristics of each data link communication instance between DLS users. At the data link service access point between each IJI.S user and a single DLS provider, it is expressed abstractly in terms of exchanged source language and parameters. In this respect, the service definition contained in LLC is no different. ISO/IEC 11575 seeks to unify generic ILS definitions with specific instances of data link layer services (e.g., LLC), and includes mappings between SILS and LLC Types 1 and 2. The main goal is to achieve this mapping without requiring any changes to the protocol itself; in particular, it is not intended to restrict the development of new protocols. It accepts the fact that the LLC Type 1 and Type 2 service definitions contained in ISO/IEC 8802-2 (GB/T 15629.2) differ in some details while performing functions similar to those of the LLC service. It attempts to identify areas where the mapping of DLS to the ISO/IEC 8802-2 (GB/T 15629.2) text may be affected, and to indicate how the ISO/IEC 8802-2 (GB/T 15629.2) text would need to be changed if the DLS mapping were to be merged into ISO/IEC 8802-2 (GB/T 15629.2) to replace the existing LLC service definitions. 88
6 Media Access Control Sublayer
6.1 Introduction
GB/Z 15629.1—2000
The development of various concepts related to the MAC layer has been closely related to the development of different LAN technologies. In fact, each LAN standard describes the MAC service interface for specific requirements. There is a lot of commonality in these definitions, and to some extent a separate generic MAC service description definition is considered appropriate, which has formed the standard ISO/IEC15802-1. Many differences are obvious, especially with respect to GB/T15629.4ISO/IEC8802-4), which will be discussed below. 6.2 Providing and supporting MAC services
6.2.1 Connectionless Mode Service
ISO/IEC15802-1 defines MAC service (connectionless mode service) in the local area network architecture. This service is defined in terms of primitive actions and events of the service, parameters associated with each primitive action and event, their mutual relationship and valid sequence. Its purpose is to define the characteristics of the conceptual service and provide guidance for the development of MAC protocols and OSI protocols that utilize MAC services. MAC service provides transparent data transmission between MAC service users and makes the method of utilizing supporting communication resources invisible. In particular, by not placing any restrictions on the content, format or encoding of information of MAC service user data exceeding the maximum number of octets that can be supplied in user/provider interaction, MAC service provides independence between the underlying MAC and physical layers and MAC service users, and provides transparency in the transmission of information. ISO/IEC15802-1 introduces and discusses the quality of the service and classifies the parameters according to MAC performance and other MAC service characteristics. Each parameter is given and defined in each type of service quality example. They include: - Transit delay;
Residual error rate;
-Probability of lost information;
Priority.
The content of MAC quality of service is discussed more fully in ISO/IEC10038, which includes the following additional parameters in addition to the parameters listed above:
Service availability;
Frame missequence;
Frame repetition;
Frame lifetime,
Maximum supported service data unit size; "-Throughput.
Combining all the parameters listed above, a comprehensive review of MAC quality of service parameters is provided within the scope of quality of service maintenance. 6.2.2 Confirmed connectionless mode service
The GB/T15629.4 (ISO/IEC8802-4) protocol uses primitive actions and events that are not available in ISO/IEC15802-1 to provide its users with a confirmed connectionless service. In particular, it describes support for requests passed across service boundaries. Primitive action of local confirmation. There are currently no different definitions to describe confirmed connectionless MAC services, and this definition is included in the protocol specification of GB/T15629.4 (ISO/IEC8802-4).
6.348-bit MAC address format
The various network technologies described in this guidance technical document use the 48-bit MAC address format. This address is applicable globally and provides a unique identifier. The registration agency for globally managed addresses is the American National Standards Institute Accredited Standards Committee, namely the IEEE Standards Committee.
The definition of the address format and the precise details and its hexadecimal representation are described in IS0/IEC15802-1. Using the hexadecimal representation of the 48-bit MAC address at the MAC service boundary will isolate the specific requirements of various MAC technologies. 89
GB/Z 15629. 1 -2000
The 48 bits are divided into two parts: The first 24 bits correspond to the organizational unique identifier assigned by the IEEE Standards Committee, except that the assignee can choose between group addressing or single addressing by modifying the single/group address bits. The second 24 bits of the address are locally managed by the assignee to provide uniqueness.
In addition, this address format allows local management of addresses by modifying the global/locally managed address bits. 6.4 Standard MAC Group Addresses
There are some MAC group addresses that form part of the operation of published standard protocols (for example: the Spanning Tree Bridge Protocol of ISO/IEC10038; all Level 1 Intermediate System Addresses of ISO/IEC10589). It is recognized that if this It is beneficial for group addresses to be allocated from an approved, allocated block of MAC group addresses. ISO/IEC TR11802-2 provides a record of the approved allocated values from this standard's MAC group address block, and also provides a record of MAC addresses used in various standards that are not part of the standard's group MAC address block.
Note that this guidance document does not include MAC group addresses for vendor-specific proprietary protocols, which should be allocated outside the vendor's globally managed address block. 7 Logical Link Control Sublayer
7.1 Provision and support of 1.LC services
ISO/IEC 8802-2 (1.IC) contains both service descriptions and the protocol elements that implement the logical link control sublayer's kinetic characteristics, protocols and services. This sublayer is located between the MAC sublayer of the data link layer and the network layer. Service definitions are provided in an abstract manner through primitives that express logical exchanges of information and control. It also provides a description of peer-to-peer coordination procedures, which are specified for transferring information and control between any pair of data link layer service access points. These procedures are independent of specific LAN technologies because they themselves utilize the underlying generic MAC services.
The services provided by LLC types 1 and 2 can be well mapped to generic OSI data link services (GB/T17547). ISO/IEC11575 specifies the general principles for mapping between OSI data link services and the main features of the mapping of LLC types 1 and 2. LLC type 3 is able to utilize local acknowledgment, and there is currently no such service definition for the data link services described above. The protocol data units exchanged by LLC also utilize MAC sublayer services in turn. LLC Type 1 and 2 map directly to the connectionless mode MAC service defined in ISO/IEC 15802-1; LLC Type 3 is able to utilize local acknowledgement, a service not currently described in ISO/IEC 15802-1 but described by service primitives in GB/T 15629.4 (ISO/IEC 8802-4, Token Passing Bus). 7.1.1 LLC Type 1 Connectionless Mode Operation
LLC Type 1 provides a data link connectionless mode service with minimal protocol complexity, so that any required recovery mechanisms or sequencing services must be provided elsewhere. The use of this type of service does not guarantee the delivery of each data link layer frame sent. This style of operation does not require the establishment of a data link connection, and there are no acknowledgement mechanisms, flow control or error recovery procedures provided by the service. 7.1.2 LLC Type 2 Connection Mode Operation
LLC Type 2 provides a data link connection-side trial service over the entire I.AN, comparable to existing non-LAN data link control procedures (e.g., GB/T 14399, LAPB). This service includes support for sequential delivery and a set of data link layer error recovery techniques. For this new operation, a data link connection is established before exchanging information. While exchanging information, a reception confirmation is passed in the opposite direction. 1.3I.1.C3 type confirmed connectionless operation ISO/IEC8802-2 (GB/T15629.2) describes the 1.LC3 type operation, which describes a service that confirms the information sent while maintaining the simplicity of the LI.C1 type protocol. The confirmation scheme allows only one confirmation of a single message; the mechanism to ensure the ordering is minimized, and a basic retransmission mechanism is also provided. In addition, the type 3 operation allows one end system to probe another end system for data. ISO/IEC8802-2 (GB/T15629.2) believes that the completeness and adequacy of this service definition has yet to be determined and further research is required.
1) IEEE Registration Authority, Standards Division, 445 Hoes Lane, PO Box 1331, Piscataway NJ B855-331, USA, 90
7.2 Logical Link Control Address
GB/Z 15629. 1 -- 2000
LLC protocol data units contain addressing information, which consists of a destination service access point (DSAP) and a source service access point (SSAP). Each field is further subdivided: DSAP is divided into address type flag bits (bits) and actual address, while SSAP is divided into command/response identification bits (bits) and actual address. In general, a single actual address identifies a protocol or a group of protocols operating on the ILC sublayer.
ISO/IEC8802-2(GB/T15629.2) LLC addressing terminology and conventions are introduced and defined. ISO/IEC TR11802-1 discusses this in detail and gives the current LLC address allocation table for single address values and group address values. Private and proprietary protocols are not eligible for inclusion in ISO/IEC TR11802-1, but in a LAN environment, the use of SNAP encoding is recognized and described in an appendix to ISO/IEC TR11802-1. For the case where the network layer protocol operates above the LLC sublayer, full protocol identification may require the application of ISO/IEC TR9577, which discusses network layer protocol identification in detail. 8 Internetworking
8.1 Transparent Bridging
ISO/IEC 10038 describes and defines various mechanisms that can be used to connect all types of 8802 LANs using MAC bridges. Each LAN has an independent MAC, but by using bridges, end systems connected to different LANs can be interconnected as if they were all connected to a single LAN. The bridge operates below the MAC service boundary and is transparent to the protocols operating above this boundary. The communicating end systems do not directly address the bridge, except for end systems used for management. In a LAN environment, frames sent between end systems carry the MAC address of the peer end system in their destination address field, rather than the MAC address of the bridge. The operation of the bridge depends on the existence and operation of the internal sublayer services provided by each MAC entity to the central MAC relay entity within the bridge. The bridge will observe the appropriate MAC procedures and protocols for each LAN to which it is connected. The mapping of internal sublayer services to specific MAC procedures for each 8802 MAC type and FDDI MAC type is defined. The bridge has three major operating elements: the ability to relay and filter frames; the maintenance of the information required to make frame filtering and relaying decisions; and the means to manage them.
ISO/IEC11802-5 describes the interoperability issues between end systems in a mixed environment, which includes Ethernet V2.0 in addition to end systems that comply with ISO/IEC8802-3 (GB/T15629.3) and any other OSI-based LAN technology. The standard also provides generally accepted solutions. ISO/IEC15802-5 describes the operation of remote MAC bridges. Remote bridges are defined to interconnect non-LAN communication devices of a local bridged LAN and one or more remote bridged LANs. In addition, it also provides the interoperability of the MAC sublayer between end stations connected to any LAN in this configuration. 8.2 Source routing selectionwww.bzxz.net
The source routing selection bridge will establish the route for end system communication and then select the route for each frame. The acquisition and discovery of routes involve the communication process in the end system, which is the main difference between transparent bridging and source routing selection. Compared with the transparent bridge's spanning tree, which has a single working route between any pair of LANs, source routing selection brings the benefits of a richer and more flexible working network topology. 8.3 Source Routing Transparent Architecture
The Source Routing Transparent Bridge (SRT) architecture is described in ISO/IEC 10038 and ISO/IEC 8802-2/DAM51. It is used to connect multiple network segments to a single bridged network. SRT bridging allows a source to specify the path (bridged route) that a frame takes through the bridged network. In addition, the architecture allows end systems that require and use source routing, as well as end systems that do not require and do not use source routing, to coexist and interoperate on the bridged LAN. and communication. A source routing transparent bridge is a MAC bridge that performs source routing when routing information is provided in the received frame, and performs transparent bridging when routing information is not available in the frame. 9 System Loading Protocol
ISO/IEC15802-4 describes the services and procedures required for remote loading of a device in a LAN environment where the device is minimally configured. These procedures utilize L I.C1 type operation, and therefore useful in specific situations where full configuration management is not possible. The scope of application of this loading protocol is thus limited not only to specific environments where LLCI type operation can be used but also to specific conditions where minimal procedures are suitable. 10 Use of PICS proforma
The Protocol Implementation Conformance Statement (PICS) proforma is a description of the features and options that have been implemented for a particular protocol, so PICS has many uses:
, ... implementers use it as a checklist to reduce the risk of inconsistencies in a particular implementation - - as a detailed description of the capabilities of an implementation; - as a guarantee of interworking with another implementation. The FICS defines the standard for the protocol and therefore forms an integral part of most of the standards discussed in this guidance document.
11 Management
GB/T17968 describes the management information elements related to the OSI data link layer. It specifically specifies the managed object class definitions of the managed objects of the data link layer, the relationship between the managed objects and attributes and the layer operations and other objects and attributes of the layer, and the action type operations on the available attributes. This work is based on and follows the guidelines specified in GB/T17175 "Management Information Structure". Layer-specific managed object definitions will be supplemented in the revisions of the basic standards related to local area networks discussed in this guidance document.
The implementation conformance statement consists of four different entities: Management Conformance Profile (MCS); Management Information Conformance Statement (MICS), Managed Object Conformance Statement (MOCS) and Managed Relationship Conformance Statement (MRCS). These declarations provide mechanisms by which providers of claimed conforming implementations may provide information in a standard form for any of the following document sets, which specify the OSI Management Conformance Requirements (MCS), the Responsibilities of Managers in Management Information (MICS), the Conformance Requirements for any Managed Object Class (MOCS), and the Conformance Requirements for any Name Binding (MRCS).922 Source Routing
Source routing bridges will establish routes for end system communications and then select routes for individual frames. The acquisition and discovery of routes involves the communication process in the end system, which is the main difference between transparent bridging and source routing. Compared with the spanning tree of transparent bridging, which has a single working route between any pair of LANs, source routing brings the benefits of a richer and more flexible working network topology. 8.3 Source Routing Transparent Architecture
The content of the source routing transparent bridge (SRT) architecture can be found in ISO/IEC10038 and ISO/IEC8802-2/DAM51) end system bridge LAN source routing operation", which is used to connect multiple network segments to a single bridged network. SRT bridging allows a source to specify the path (bridged route) selected for a frame through the bridged network. In addition, the architecture allows end systems that need and use source routing and end systems that do not need and do not use source routing to coexist and interoperate on the bridged LAN. and communication. A source routing transparent bridge is a MAC bridge that performs source routing when routing information is provided in the received frame, and performs transparent bridging when routing information is not available in the frame. 9 System Loading Protocol
ISO/IEC15802-4 describes the services and procedures required for remote loading of a device in a LAN environment where the device is minimally configured. These procedures utilize L I.C1 type operation, and therefore useful in specific situations where full configuration management is not possible. The scope of application of this loading protocol is thus limited not only to specific environments where LLCI type operation can be used but also to specific conditions where minimal procedures are suitable. 10 Use of PICS proforma
The Protocol Implementation Conformance Statement (PICS) proforma is a description of the features and options that have been implemented for a particular protocol, so PICS has many uses:
, ... implementers use it as a checklist to reduce the risk of inconsistencies in a particular implementation - - as a detailed description of the capabilities of an implementation; - as a guarantee of interworking with another implementation. The FICS defines the standard for the protocol and therefore forms an integral part of most of the standards discussed in this guidance document.
11 Management
GB/T17968 describes the management information elements related to the OSI data link layer. It specifically specifies the managed object class definitions of the managed objects of the data link layer, the relationship between the managed objects and attributes and the layer operations and other objects and attributes of the layer, and the action type operations on the available attributes. This work is based on and follows the guidelines specified in GB/T17175 "Management Information Structure". Layer-specific managed object definitions will be supplemented in the revisions of the basic standards related to local area networks discussed in this guidance document.
The implementation conformance statement consists of four different entities: Management Conformance Profile (MCS); Management Information Conformance Statement (MICS), Managed Object Conformance Statement (MOCS) and Managed Relationship Conformance Statement (MRCS). These declarations provide mechanisms by which providers of claimed conforming implementations may provide information in a standard form for any of the following document sets, which specify the OSI Management Conformance Requirements (MCS), the Responsibilities of Managers in Management Information (MICS), the Conformance Requirements for any Managed Object Class (MOCS), and the Conformance Requirements for any Name Binding (MRCS).922 Source Routing
Source routing bridges will establish routes for end system communications and then select routes for individual frames. The acquisition and discovery of routes involves the communication process in the end system, which is the main difference between transparent bridging and source routing. Compared with the spanning tree of transparent bridging, which has a single working route between any pair of LANs, source routing brings the benefits of a richer and more flexible working network topology. 8.3 Source Routing Transparent Architecture
The content of the source routing transparent bridge (SRT) architecture can be found in ISO/IEC10038 and ISO/IEC8802-2/DAM51) end system bridge LAN source routing operation", which is used to connect multiple network segments to a single bridged network. SRT bridging allows a source to specify the path (bridged route) selected for a frame through the bridged network. In addition, the architecture allows end systems that need and use source routing and end systems that do not need and do not use source routing to coexist and interoperate on the bridged LAN. and communication. A source routing transparent bridge is a MAC bridge that performs source routing when routing information is provided in the received frame, and performs transparent bridging when routing information is not available in the frame. 9 System Loading Protocol
ISO/IEC15802-4 describes the services and procedures required for remote loading of a device in a LAN environment where the device is minimally configured. These procedures utilize L I.C1 type operation, and therefore useful in specific situations where full configuration management is not possible. The scope of application of this loading protocol is thus limited not only to specific environments where LLCI type operation can be used but also to specific conditions where minimal procedures are suitable. 10 Use of PICS proforma
The Protocol Implementation Conformance Statement (PICS) proforma is a description of the features and options that have been implemented for a particular protocol, so PICS has many uses:
, ... implementers use it as a checklist to reduce the risk of inconsistencies in a particular implementation - - as a detailed description of the capabilities of an implementation; - as a guarantee of interworking with another implementation. The FICS defines the standard for the protocol and therefore forms an integral part of most of the standards discussed in this guidance document.
11 Management
GB/T17968 describes the management information elements related to the OSI data link layer. It specifically specifies the managed object class definitions of the managed objects of the data link layer, the relationship between the managed objects and attributes and the layer operations and other objects and attributes of the layer, and the action type operations on the available attributes. This work is based on and follows the guidelines specified in GB/T17175 "Management Information Structure". Layer-specific managed object definitions will be supplemented in the revisions of the basic standards related to local area networks discussed in this guidance document.
The implementation conformance statement consists of four different entities: Management Conformance Profile (MCS); Management Information Conformance Statement (MICS), Managed Object Conformance Statement (MOCS) and Managed Relationship Conformance Statement (MRCS). These declarations provide mechanisms by which providers of claimed conforming implementations may provide information in a standard form for any of the following document sets, which specify the OSI Management Conformance Requirements (MCS), the Responsibilities of Managers in Management Information (MICS), the Conformance Requirements for any Managed Object Class (MOCS), and the Conformance Requirements for any Name Binding (MRCS).92
Tip: This standard content only shows part of the intercepted content of the complete standard. If you need the complete standard, please go to the top to download the complete standard document for free.