03.11.2012 Views

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IST Integrated Project No 026920<br />

Partners:<br />

Work Package: WP5<br />

Activities: 5.1<br />

Type of document: Report<br />

Date: 04 June 2007<br />

CTI, DS2, EDEV CPL / EDF Group, Iberdrola, SEPC, TUD, URL<br />

Responsible: EDEV CPL / EDF Group<br />

Circulation:<br />

� Public<br />

� Confidential<br />

� Restricted<br />

File name: OP2_WP5_D27 Version: 1.0<br />

Title: First draft of the OPERA specification version 2<br />

D27 : FIRST DRAFT OF THE OPERA SPECIFICATION VERSION 2<br />

Copyright<br />

© Copyright 2007 The OPERA Consortium


EC/IST FP6 Project No 026920<br />

Work Package: WP5<br />

Type of document: Report<br />

Date: 04 June 2007<br />

File name: OP2_WP5_D27 Version: 1.0<br />

Title: First draft of the OPERA specification version 2<br />

Document History<br />

Vers. Issue Date Content <strong>and</strong> changes<br />

1.0 04.06.07 Creation of the first version of the document<br />

Document Authors<br />

Partners Contributors<br />

CTI Manu Sharma<br />

DS2 Luis Manuel Torres, Salvador Iranzo, Marcos Martinez,<br />

Serafin Arroyo<br />

EDEV CPL / EDF Group Laurent Feltin, Eric Perrier<br />

Iberdrola Inigo Berganza<br />

SEPC Philippe Conq<br />

TUD Le Phu Do<br />

University Ramon Llull<br />

(URL)<br />

Document Approvers<br />

Partners Approvers<br />

EDEV CPL / EDF Group Laurent Feltin<br />

Guiomar Corral, Josep M. Selga


4-June-07 P1901_PRO_016_r0<br />

IEEE P1901<br />

Draft St<strong>and</strong>ard for Broadb<strong>and</strong> over Power Line Networks:<br />

<strong>Medium</strong> <strong>Access</strong> <strong>Control</strong> <strong>and</strong> <strong>Physical</strong> <strong>Layer</strong> Specifications<br />

Proposal for the IEEE 1901<br />

<strong>Access</strong> Power Line Networks St<strong>and</strong>ard<br />

Date: 2007-06-04<br />

Author(s):<br />

Name Company Address Phone email<br />

Laurent Feltin OPERA<br />

Inigo Berganza OPERA<br />

Luis M. Torres OPERA<br />

Serafin Arroyo UPA<br />

Guiomar Corral OPERA<br />

Salvador<br />

Iranzo<br />

OPERA<br />

Le Phu Do OPERA<br />

Eric Perrier OPERA<br />

José Maria<br />

EDEV CPL Technologie<br />

1 avenue du Général de Gaulle<br />

92140 Clamart, France<br />

Iberdrola S.A.<br />

Avda San Adrián 48<br />

48003 Bilbao, Spain<br />

Design of Systems on Silicon<br />

(DS2)<br />

C/ Charles Robert Darwin 2<br />

Parc Tecnològic<br />

46980, Paterna, Valencia, Spain<br />

Universal Powerline Association<br />

3 Bridge Street<br />

Kings Cliffe, Peterborough<br />

PE8 6XH, United Kingdom<br />

Enginyeria La Salle - Universitat<br />

Ramon Llull<br />

Postal address c/ Quatre Camins,<br />

2 08022 – Barcelona, Spain<br />

Design of Systems on Silicon<br />

(DS2)<br />

C/ Charles Robert Darwin 2<br />

Parc Tecnològic<br />

46980, Paterna, Valencia, Spain<br />

Technische Universitaet Dresden<br />

Chair for Telecommunications<br />

01062 Dresden, Germany<br />

EDEV CPL Technologie<br />

1 avenue du Général de Gaulle<br />

92140 Clamart, France<br />

OPERA Enginyeria La Salle - Universitat<br />

Ramon Llull<br />

+33 1 41 33 95 14 laurent.feltin@edev-cpl.fr<br />

+34 944665525 iberganza@iberdrola.es<br />

+34 96 136 60 04 luismanuel.torres@ds2.es<br />

+44 (0)1780470003<br />

serafin.arroyo@universalpow<br />

erlineassociation.com<br />

+34 93 290 24 23 guiomar@salle.url.edu<br />

+34 96 136 60 04 salvador.iranzo@ds2.es<br />

+49 351 463-39244 dolephu@ifn.et.tu-dresden.de<br />

+33 1 41 33 95 11 eric.perrier@edev-cpl.fr<br />

+34 93 290 24 23 jmselga@salle.url.edu<br />

Submission page 1 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Selga Postal address c/ Quatre Camins,<br />

2 08022 – Barcelona, Spain<br />

Ralf Lehnert OPERA<br />

Agustin<br />

Badenes<br />

OPERA<br />

Manu Sharma OPERA<br />

Philippe Conq OPERA<br />

Eric Morel Ilevo-Schneider Electric<br />

Powerline<br />

Communications<br />

Technische Universitaet Dresden<br />

Chair for Telecommunications<br />

01062 Dresden, Germany<br />

Design of Systems on Silicon<br />

(DS2)<br />

C/ Charles Robert Darwin 2<br />

Parc Tecnològic<br />

46980, Paterna, Valencia, Spain<br />

Current Technologies<br />

International GmBHPostal<br />

address : Gewerbepark, 5506<br />

Maegenwil, Switzerl<strong>and</strong><br />

ILEVO – Schneider Electric<br />

Powerline Communications 59,<br />

Chemin du vieux chêne, F38240<br />

Meylan, France<br />

59, Chemin du vieux chêne,<br />

F38240 Meylan, France<br />

Ichiro Shimizu ITOCHU Corporation 5-1, Kita-Aoyama 2-chome,<br />

Minato-ku, Tokyo 107-8077,<br />

Japan<br />

Yukio<br />

Akegamiyama<br />

Toyo Network Systems<br />

Co., Ltd.<br />

Ram Rao Ambient Corporation<br />

Brian Donnelly<br />

Abstract:<br />

Corinex Communications<br />

Corp.<br />

1-1,Koyato2-chome,Samukawamachi,Koza-gun,Kanagawa<br />

253-<br />

0198,Japan<br />

79 Chapel Street<br />

Newton, MA 02458<br />

USA<br />

905 West Pender Street<br />

Vancouver, BC V6C 1L6<br />

Canada,<br />

+49 351 463-33942 ralf.lehnert@tu-dresden.de<br />

+34 96 136 60 04 agustin.badenes@ds2.es<br />

+41-62-544-1912 msharma@currentgroup.com<br />

+33 4 76 60 59 56<br />

+33 (0)4 76 60 59<br />

56<br />

philippe.conq@fr.schneiderelectric.com <br />

eric.morel@schneiderelectric.com<br />

+81-33497-7237 shimizu-i@itochu.co.jp<br />

+81 467 74 1176 akegamiy@t-ns.co.jp<br />

+1-617-332-0004 ram.rao@ambientcorp.com<br />

+1 778 371 7697 brian.donnelly@corinex.com<br />

This is a complete proposal for the IEEE P1901 <strong>Access</strong> Broadb<strong>and</strong> over Power Line st<strong>and</strong>ard submitted<br />

by the OPERA (Open PLC European Research Alliance) <strong>and</strong> UPA (Universal Powerline Association).<br />

Submission page 2 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The proposal fulfills all the requirements described in the document<br />

“P1901_0205_r2_AC_unified_req.doc”, <strong>and</strong> also follows the rules <strong>and</strong> conditions described in the Call for<br />

proposals document “P1901_0269_r1_AC_Call_for_submissions.doc”.<br />

This document will be part of the down-selection process of the P1901 group as described in the<br />

document “P1901_0098_r8_Downselect_Process_final.doc”, for the St<strong>and</strong>ard for Broadb<strong>and</strong> over Power<br />

Line Networks: <strong>Medium</strong> <strong>Access</strong> <strong>Control</strong> <strong>and</strong> <strong>Physical</strong> <strong>Layer</strong> Specifications, <strong>Access</strong>.<br />

Notice: This document has been prepared to assist the IEEE P1901 working group. It is offered as a basis for discussion <strong>and</strong> is not binding on<br />

the contributing individual(s) or organization(s). The material in this document is subject to change in form <strong>and</strong> content after further study. The<br />

contributor(s) reserve(s) the right to add, amend, or withdraw material contained herein.<br />

Release: The contributor grants a free, irrevocable license to The Institute of Electrical <strong>and</strong> Electronics Engineers, Inc. (“IEEE”), a corporation<br />

with offices at 445 Hoes Lane, Piscataway, NJ 08855-1331, to incorporate material contained in this contribution, <strong>and</strong> any modifications<br />

thereof, in the creation of an IEEE St<strong>and</strong>ards publication; to copyright in the IEEE’s name any IEEE St<strong>and</strong>ards publication even though it may<br />

include portions of this contribution; <strong>and</strong> at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE<br />

St<strong>and</strong>ards publication. The contributor also acknowledges <strong>and</strong> accepts that this contribution may be made public by the IEEE P1901 working<br />

group.<br />

Submission page 3 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Draft St<strong>and</strong>ard for<br />

Broadb<strong>and</strong> over Power Line Networks: <strong>Medium</strong><br />

<strong>Access</strong> <strong>Control</strong> (<strong>MAC</strong>)<br />

<strong>and</strong> <strong>Physical</strong> <strong>Layer</strong> (<strong>PHY</strong>) specifications<br />

Copyright © 2007 by the IEEE.<br />

Three Park Avenue<br />

New York, NY 10016-5997, USA<br />

All rights reserved.<br />

This document is an unapproved draft of a proposed IEEE St<strong>and</strong>ard. As such, this document is subject to change.<br />

USE AT YOUR OWN RISK! Because this is an unapproved draft, this document must not be utilized for any<br />

conformance/compliance purposes. Permission is hereby granted for IEEE St<strong>and</strong>ards Committee participants to<br />

reproduce this document for<br />

purposes of international st<strong>and</strong>ardization consideration. Prior to adoption of this document, in whole or in part, by<br />

another st<strong>and</strong>ards development organization, permission must first be obtained from the IEEE St<strong>and</strong>ards Activities<br />

Department. Other entities seeking permission to reproduce this document, in whole or in part, must obtain<br />

permission from the IEEE<br />

St<strong>and</strong>ards Activities Department.<br />

IEEE St<strong>and</strong>ards Activities Department<br />

445 Hoes Lane<br />

Piscataway, NJ 08854, USA<br />

Submission page 4 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

1 INTRODUCTION .............................................................................................................................................. 19<br />

1.1 SCOPE ........................................................................................................................................................ 19<br />

1.2 OVERVIEW ............................................................................................................................................... 19<br />

1.3 REFERENCES............................................................................................................................................ 19<br />

1.4 DOCUMENT CONVENTIONS................................................................................................................. 20<br />

1.5 DEFINITIONS............................................................................................................................................ 21<br />

1.6 ABBREVIATIONS AND ACRONYMS ................................................................................................... 25<br />

2 GENERAL DESCRIPTION ............................................................................................................................... 31<br />

2.1 GENERAL DESCRIPTION OF THE ARCHITECTURE......................................................................... 32<br />

2.2 NODE DESCRIPTION............................................................................................................................... 32<br />

2.2.1 HE ....................................................................................................................................................... 33<br />

2.2.2 Time Division Repeaters..................................................................................................................... 33<br />

2.2.3 CPE ..................................................................................................................................................... 33<br />

2.3 <strong>MAC</strong> overview............................................................................................................................................ 33<br />

2.4 QoS overview.............................................................................................................................................. 34<br />

2.5 Security overview........................................................................................................................................ 34<br />

2.6 NETWORK REFERENCE MODEL.......................................................................................................... 35<br />

3 <strong>PHY</strong>..................................................................................................................................................................... 36<br />

Submission page 5 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.1 OVERVIEW ............................................................................................................................................... 37<br />

3.2 <strong>PHY</strong> LAYER FRAME................................................................................................................................ 37<br />

3.3 FORWARD ERROR CORRECTION........................................................................................................38<br />

3.3.1 Delimiters............................................................................................................................................ 38<br />

3.3.2 Data payload........................................................................................................................................ 42<br />

3.4 MAPPING MODES.................................................................................................................................... 46<br />

3.4.1 HURTO mapping................................................................................................................................ 46<br />

3.4.2 Adaptive mapping ............................................................................................................................... 47<br />

3.5 TRELLIS CODED MODULATION (4D-TCM) ....................................................................................... 48<br />

3.5.1 Bit Extraction ...................................................................................................................................... 48<br />

3.5.2 Scrambling .......................................................................................................................................... 50<br />

3.5.3 Bit conversion ..................................................................................................................................... 53<br />

3.5.4 Constellation encoder.......................................................................................................................... 54<br />

3.6 SUBCARRIER MODULATION................................................................................................................ 55<br />

3.7 OFDM MODULATION ............................................................................................................................. 57<br />

3.7.1 <strong>Control</strong> <strong>and</strong> Data symbols................................................................................................................... 58<br />

3.7.2 Time domain windowing .................................................................................................................... 59<br />

3.8 REFERENCE SIGNALS ............................................................................................................................ 61<br />

Submission page 6 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.8.1 Channel reference symbol................................................................................................................... 61<br />

3.8.2 Synchronization symbol...................................................................................................................... 61<br />

3.8.3 Start Of Transmission (SOT) .............................................................................................................. 61<br />

3.8.4 Channel estimation symbols................................................................................................................ 63<br />

3.9 CARRIER FREQUENCY .......................................................................................................................... 65<br />

3.10 COMMUNICATION MODES................................................................................................................... 65<br />

3.11 <strong>PHY</strong> PARAMETER SPECIFICATION .....................................................................................................65<br />

3.12 CLOCK SYNCHRONIZATION ................................................................................................................ 66<br />

3.12.1 General ................................................................................................................................................ 66<br />

3.12.2 Clock synchronisation concept............................................................................................................ 66<br />

3.12.3 System reference clock error tolerance ............................................................................................... 66<br />

3.13 TRANSMITTER ELECTRICAL SPECIFICATION................................................................................. 66<br />

3.13.1 Transmit PSD...................................................................................................................................... 66<br />

3.13.2 Modulation error vector magnitude..................................................................................................... 67<br />

3.13.3 Power <strong>Control</strong> ..................................................................................................................................... 67<br />

3.14 RECEIVER ELECTRICAL SPECIFICATION ......................................................................................... 68<br />

3.14.1 Receiver Input Impedance................................................................................................................... 68<br />

3.14.2 Receiver Input Referred Noise............................................................................................................ 69<br />

Submission page 7 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.14.3 Receiver Input Signal.......................................................................................................................... 69<br />

3.15 <strong>PHY</strong> service specification (<strong>PHY</strong> SAP) ....................................................................................................... 69<br />

3.15.1 <strong>PHY</strong> service primitives ....................................................................................................................... 69<br />

3.15.2 <strong>PHY</strong> service primitives parameters..................................................................................................... 70<br />

3.15.3 <strong>PHY</strong>-DATA.req .................................................................................................................................. 71<br />

3.15.4 <strong>PHY</strong>-DATA.cnf .................................................................................................................................. 72<br />

3.15.5 <strong>PHY</strong>-DATA.ind .................................................................................................................................. 72<br />

3.15.6 <strong>PHY</strong>-MNT-SNR.ind ........................................................................................................................... 73<br />

3.15.7 <strong>PHY</strong>-MNT-BPC-SET.req ................................................................................................................... 73<br />

3.15.8 <strong>PHY</strong>-MNT-BPC-SET.cnf ................................................................................................................... 74<br />

3.15.9 <strong>PHY</strong>-MNT-BPC-GET.req .................................................................................................................. 75<br />

3.15.10 <strong>PHY</strong>-MNT-BPC-GET.cnf............................................................................................................... 75<br />

3.15.11 <strong>PHY</strong>-MNT-RXGAIN-GET.req....................................................................................................... 76<br />

3.15.12 <strong>PHY</strong>-MNT-RXGAIN-GET.cnf....................................................................................................... 76<br />

3.15.13 <strong>PHY</strong>-MNT-TXGAIN-GET.req....................................................................................................... 77<br />

3.15.14 <strong>PHY</strong>-MNT-TXGAIN-GET.cnf....................................................................................................... 77<br />

3.15.15 <strong>PHY</strong>-MNT-TXGAIN-SET.req ....................................................................................................... 78<br />

3.15.16 <strong>PHY</strong>-MNT-TXGAIN-SET.cnf ....................................................................................................... 78<br />

Submission page 8 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.17 <strong>PHY</strong>-MNT-POWMASK-GET.req.................................................................................................. 79<br />

3.15.18 <strong>PHY</strong>-MNT-POWMASK-GET.cnf.................................................................................................. 79<br />

3.15.19 <strong>PHY</strong>-MNT-POWMASK-SET.req .................................................................................................. 80<br />

3.15.20 <strong>PHY</strong>-MNT-POWMASK-SET.cnf .................................................................................................. 80<br />

3.15.21 <strong>PHY</strong>-MNT-SYNC.ind .................................................................................................................... 81<br />

3.15.22 <strong>PHY</strong>-MNT-SYNC.req .................................................................................................................... 81<br />

3.15.23 <strong>PHY</strong>-MNT-SYNC.cnf .................................................................................................................... 82<br />

4 <strong>MAC</strong>.................................................................................................................................................................... 82<br />

4.1 OVERVIEW ............................................................................................................................................... 82<br />

4.1.1 Contention free medium access examples ..........................................................................................83<br />

4.1.2 Contention medium access example ................................................................................................... 85<br />

4.2 <strong>MAC</strong> STATES MANAGEMENT .............................................................................................................. 86<br />

4.2.1 Master side .......................................................................................................................................... 86<br />

4.2.2 Slave side ............................................................................................................................................ 88<br />

4.2.3 Transition state diagrams .................................................................................................................... 90<br />

4.3 FRAME FORMATS ................................................................................................................................... 92<br />

4.3.1 Distributor Frame ................................................................................................................................ 94<br />

4.3.2 Data Frame.......................................................................................................................................... 96<br />

Submission page 9 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.3.3 Silence Frame...................................................................................................................................... 96<br />

4.3.4 Channel Estimation Frame.................................................................................................................. 97<br />

4.3.5 Polling Frame...................................................................................................................................... 99<br />

4.3.6 TDR Polling Frame ........................................................................................................................... 100<br />

4.3.7 CSMA Frame .................................................................................................................................... 101<br />

4.3.8 <strong>Access</strong> Frame .................................................................................................................................... 102<br />

4.3.9 <strong>Access</strong> Reply Frame.......................................................................................................................... 102<br />

4.3.10 Non-returnable Data Frame............................................................................................................... 104<br />

4.3.11 Clock Frame...................................................................................................................................... 104<br />

4.4 <strong>MAC</strong> DELIMITERS................................................................................................................................. 106<br />

4.4.1 Token announce ................................................................................................................................ 106<br />

4.4.2 Token ................................................................................................................................................ 111<br />

4.5 TOKEN LOSS RECOVERY.................................................................................................................... 127<br />

4.6 <strong>MAC</strong> PARAMETERS SPECIFICATION................................................................................................ 131<br />

4.7 <strong>MAC</strong> service specification (<strong>MAC</strong> SAP)................................................................................................... 133<br />

4.7.1 <strong>MAC</strong> service primitives .................................................................................................................... 133<br />

4.7.2 <strong>MAC</strong>-DATA.req ............................................................................................................................... 134<br />

4.7.3 <strong>MAC</strong>-DATA.cnf ............................................................................................................................... 135<br />

Submission page 10 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.4 <strong>MAC</strong>-DATA.ind ............................................................................................................................... 135<br />

4.7.5 <strong>MAC</strong>-ACK.req.................................................................................................................................. 136<br />

4.7.6 <strong>MAC</strong>-ACK.cnf.................................................................................................................................. 136<br />

4.7.7 <strong>MAC</strong>-ACK.ind.................................................................................................................................. 137<br />

4.7.8 <strong>MAC</strong>-MNT-TOKEN.req .................................................................................................................. 137<br />

4.7.9 <strong>MAC</strong>-MNT-TOKEN.ind .................................................................................................................. 138<br />

4.7.10 <strong>MAC</strong>-MNT-TOKEN.cnf .................................................................................................................. 138<br />

4.7.11 <strong>MAC</strong>-MNT-RESOURCES.req......................................................................................................... 139<br />

4.7.12 <strong>MAC</strong>-MNT-RESOURCES.ind......................................................................................................... 139<br />

4.7.13 <strong>MAC</strong>-MNT-RESOURCES.cnf......................................................................................................... 140<br />

4.7.14 <strong>MAC</strong>-MNT-CHANEST-FRAME.req............................................................................................... 141<br />

4.7.15 <strong>MAC</strong>-MNT-CHANEST-REQ.req .................................................................................................... 141<br />

4.7.16 <strong>MAC</strong>-MNT-CHANEST-REQ.ind .................................................................................................... 142<br />

4.7.17 <strong>MAC</strong>-MNT-NHOPS.req................................................................................................................... 142<br />

4.7.18 <strong>MAC</strong>-MNT-NHOPS.cnf................................................................................................................... 143<br />

4.7.19 <strong>MAC</strong>-MNT-CHANGE.req ............................................................................................................... 143<br />

4.7.20 <strong>MAC</strong>-MNT-CHANGE.cnf ............................................................................................................... 144<br />

4.7.21 <strong>MAC</strong>-MNT-TXSYMB.ind ............................................................................................................... 144<br />

Submission page 11 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.22 <strong>MAC</strong>-MNT-CHANSTATS.req......................................................................................................... 145<br />

4.7.23 <strong>MAC</strong>-MNT-CHANSTATS.cnf......................................................................................................... 145<br />

4.7.24 <strong>MAC</strong>-MNT-NEWMID.ind ............................................................................................................... 146<br />

4.7.25 <strong>MAC</strong>-MNT-LINK-STATUS.req ...................................................................................................... 146<br />

4.7.26 <strong>MAC</strong>-MNT-LINK-STATUS.cnf ...................................................................................................... 147<br />

5 LLC ................................................................................................................................................................... 147<br />

5.1 INTRODUCTION..................................................................................................................................... 147<br />

5.2 BURST HEADER..................................................................................................................................... 148<br />

5.2.1 Burst header with data....................................................................................................................... 148<br />

5.2.2 Burst header without data.................................................................................................................. 151<br />

5.3 BURST STRUCTURE.............................................................................................................................. 153<br />

5.3.1 Unencrypted Burst Structure............................................................................................................. 153<br />

5.3.2 Encrypted Burst Structure ................................................................................................................. 156<br />

5.4 Packet ACK Protocol ................................................................................................................................ 157<br />

5.4.1 Transmission window management .................................................................................................. 158<br />

5.4.2 Packet ACK Protocol: Group Encoding............................................................................................ 158<br />

5.4.3 Packet ACK Protocol: Run-Length Encoding .................................................................................. 161<br />

5.4.4 Transmission of PAP information..................................................................................................... 163<br />

Submission page 12 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

5.5 LLC service specification (LLC SAP)...................................................................................................... 163<br />

5.5.1 LLC service primitives...................................................................................................................... 163<br />

5.5.2 LLC-DATA.req................................................................................................................................. 164<br />

5.5.3 LLC-DATA.cnf................................................................................................................................. 164<br />

5.5.4 LLC-DATA.ind................................................................................................................................. 165<br />

5.5.5 LLC-MNT-ACKMODE.req ............................................................................................................. 165<br />

6 CONVERGENCE LAYER............................................................................................................................... 166<br />

6.1 OVERVIEW ............................................................................................................................................. 166<br />

6.2 PACKET FORMAT.................................................................................................................................. 166<br />

6.2.1 Maximum <strong>and</strong> Minimum Packet length............................................................................................ 167<br />

6.2.2 OVLAN Fields.................................................................................................................................. 168<br />

6.2.3 BPL service class .............................................................................................................................. 168<br />

6.2.4 PB Field............................................................................................................................................. 169<br />

6.2.5 Octet alignment ................................................................................................................................. 169<br />

6.3 CONVERGENCE LAYER SERVICE PRIMITIVES.............................................................................. 171<br />

6.3.1 Multi-port transfer requests............................................................................................................... 172<br />

6.4 BROADCAST/MULTICAST HANDLER FUNCTIONAL REQUIREMENTS .................................... 172<br />

7 BRIDGING FUNCTION.................................................................................................................................. 173<br />

Submission page 13 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

7.1 General ...................................................................................................................................................... 173<br />

7.2 IEEE 802.1D conformance ....................................................................................................................... 173<br />

7.3 IEEE 802.1Q conformance ....................................................................................................................... 174<br />

7.4 OVLAN Function...................................................................................................................................... 174<br />

7.4.1 General .............................................................................................................................................. 174<br />

7.4.2 Frame admittance <strong>and</strong> OVLAN assignment ..................................................................................... 175<br />

7.4.3 OVLAN Ingress filtering .................................................................................................................. 176<br />

7.4.4 OVLAN Egress filtering ................................................................................................................... 176<br />

7.4.5 OVLAN management ....................................................................................................................... 176<br />

7.5 Sending broadcast/multicast Ethernet frames ........................................................................................... 176<br />

7.6 PB field ..................................................................................................................................................... 177<br />

7.6.1 Bridging between BPL ports............................................................................................................. 177<br />

7.6.2 Bridging from a non-BPL port to a BPL port ................................................................................... 177<br />

7.7 BPL service class transmission ................................................................................................................. 177<br />

7.8 Filtering multicast management messages from a BPL port..................................................................... 177<br />

7.9 Filtering multicast management messages from the management port..................................................... 178<br />

8 QOS SERVICES............................................................................................................................................... 178<br />

8.1 INTRODUCTION..................................................................................................................................... 178<br />

Submission page 14 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

8.2 SERVICE CLASS DEFINITION ............................................................................................................. 179<br />

8.2.1 Priority .............................................................................................................................................. 179<br />

8.2.2 Max Subcell <strong>Access</strong> Time................................................................................................................. 179<br />

8.2.2.1 Configuration .................................................................................................................................... 180<br />

8.2.3 Resource reservation type ................................................................................................................. 180<br />

8.2.3.1 Configuration .................................................................................................................................... 180<br />

8.2.4 Service reliability .............................................................................................................................. 181<br />

8.2.4.1 Configuration .................................................................................................................................... 181<br />

8.2.5 Example of a service class definition................................................................................................ 181<br />

8.2.6 Provisioning Service Class Definitions to slaves.............................................................................. 183<br />

8.3 CONGESTION MANAGEMENT ........................................................................................................... 183<br />

8.3.1 Configuration .................................................................................................................................... 184<br />

8.4 CONNECTION ADMISSION CONTROL.............................................................................................. 184<br />

8.5 Traffic Shaping.......................................................................................................................................... 185<br />

8.5.1 QOS Requirements............................................................................................................................ 185<br />

9 LAYER MANAGEMENT................................................................................................................................ 186<br />

9.1 CONTROL PROTOCOLS........................................................................................................................ 186<br />

9.1.1 CCP (Communication <strong>Control</strong> Protocol) Description....................................................................... 186<br />

Submission page 15 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

9.1.2 Adaptive Bit-Loading Protocol (ABLP) ........................................................................................... 192<br />

9.1.3 <strong>Access</strong> Protocol................................................................................................................................. 197<br />

9.1.4 Port Solver Protocol .......................................................................................................................... 202<br />

10 SECURITY ................................................................................................................................................... 279<br />

10.1 LOW LEVEL ENCRYPTION AND INTEGRITY.................................................................................. 279<br />

10.1.1 Overview........................................................................................................................................... 279<br />

10.1.2 Detailed encryption process .............................................................................................................. 280<br />

10.2 AAA protocol............................................................................................................................................ 286<br />

10.3 Key Hierarchies......................................................................................................................................... 292<br />

10.4 Establishing the keys................................................................................................................................. 293<br />

11 SYSTEM PARAMETERS............................................................................................................................ 294<br />

11.1 GENERAL PARAMETERS..................................................................................................................... 294<br />

11.2 AGC (AUTOMATIC GAIN CONTROL) PARAMETERS..................................................................... 298<br />

11.3 RADIUS PARAMETERS ........................................................................................................................ 299<br />

11.4 CLASS OF SERVICE (COS) PARAMETER.......................................................................................... 300<br />

11.5 QUALITY OF SERVICE (QOS) PARAMETERS .................................................................................. 302<br />

11.5.1 Slave Node Parameters (CPE)........................................................................................................... 303<br />

11.5.2 Master Node Parameters (HE or REPEATER)................................................................................. 303<br />

Submission page 16 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

11.6 PROFILES PARAMETERS..................................................................................................................... 304<br />

11.7 TRANSLATION TABLE PARAMETERS.............................................................................................. 309<br />

11.8 <strong>MAC</strong> FILTER PARAMETERS................................................................................................................ 310<br />

11.9 NTP PARAMETERS................................................................................................................................ 311<br />

11.10 SNMP PARAMETERS ........................................................................................................................ 312<br />

11.11 STP PARAMETERS ............................................................................................................................ 312<br />

11.12 VOIP PARAMETERS.......................................................................................................................... 315<br />

11.12.1 Dial Plan Configuration ................................................................................................................ 322<br />

11.12.2 Country Specific Parameters......................................................................................................... 324<br />

11.12.3 Tone pattern configuration............................................................................................................ 327<br />

11.13 VLAN NETWORK............................................................................................................................... 327<br />

11.14 OVLAN PARAMETERS ..................................................................................................................... 330<br />

11.15 CUSTOM VLAN/OVLAN PARAMETERS........................................................................................ 331<br />

11.15.1 Custom VLAN Parameters............................................................................................................ 332<br />

11.15.2 Custom OVLAN Parameters......................................................................................................... 337<br />

11.16 ACCESS PROTOCOL PARAMETERS .............................................................................................. 341<br />

12 CONFIGURATION...................................................................................................................................... 344<br />

12.1 MIB ........................................................................................................................................................... 344<br />

Submission page 17 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

12.1.1 SNMP Management .......................................................................................................................... 344<br />

12.1.2 MIB-II for IEEE P1901..................................................................................................................... 345<br />

12.1.3 IEEE P1901 Private MIB .................................................................................................................. 346<br />

12.2 AUTO-CONFIGURATION AND PROVISIONING............................................................................... 358<br />

12.2.1 Auto-configuration purpose .............................................................................................................. 358<br />

12.2.2 Auto-configuration process overview ............................................................................................... 358<br />

12.2.3 <strong>Access</strong> Protocol................................................................................................................................. 360<br />

12.2.4 Auto-configuration at Modem Boot.................................................................................................. 361<br />

12.2.5 PTTP Protocol................................................................................................................................... 362<br />

12.2.6 Translation Table .............................................................................................................................. 371<br />

12.2.7 Auto-configuration & Networking.................................................................................................... 372<br />

12.2.8 DHCP Support .................................................................................................................................. 375<br />

12.2.9 RADIUS Support .............................................................................................................................. 376<br />

12.3 Auto-configuration Parameters ................................................................................................................. 377<br />

12.3.1 Parameter Types................................................................................................................................ 377<br />

12.3.2 Parameter Format .............................................................................................................................. 377<br />

12.3.3 Auto-configuration parameter list ..................................................................................................... 378<br />

ANNEX A MIB DEFINITION IN ASN.1 FORMAT (NORMATIVE) ............................................................ 394<br />

Submission page 18 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

ANNEX B Performance (InforMative) ............................................................................................................... 442<br />

B.1 Data stream ............................................................................................................................................... 442<br />

B.2 Delimiters.................................................................................................................................................. 444<br />

1 INTRODUCTION<br />

This document is the technical specification of the IEEE P1901 technology.<br />

1.1 SCOPE<br />

This document specifies a physical layer (<strong>PHY</strong>), medium access control (<strong>MAC</strong>), LLC layer <strong>and</strong> convergence layer<br />

for data transmission over the electrical BPLs for <strong>Access</strong> Networks.<br />

1.2 OVERVIEW<br />

The purpose of this document is to specify a BPL data transmission system based on Orthogonal Frequency<br />

Division Multiplexing (OFDM) for providing <strong>Access</strong> services.<br />

Specifically this specification,<br />

- Describes a <strong>PHY</strong> capable of achieving rates in excess of 200 Mbps<br />

- Describes a Master-Slave <strong>MAC</strong> optimised for the <strong>Access</strong> BPL environment<br />

- Describes the QoS mechanisms available to support b<strong>and</strong>width <strong>and</strong> latency guarantees<br />

- Describes the security procedures used to provide data privacy over the BPL medium<br />

The description is written from the transmitter perspective to ensure interoperability between devices <strong>and</strong> allow<br />

different implementations. Some minimal requirements about the receiver behaviour are also given.<br />

1.3 REFERENCES<br />

The following st<strong>and</strong>ards contain provisions which, through references in this text, constitute normative provisions<br />

of this specification. At the time of publication, the editions indicated were valid. All st<strong>and</strong>ards are subject to<br />

Submission page 19 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

revision, <strong>and</strong> parties to agreements based on this st<strong>and</strong>ard are encouraged to investigate the possibility of applying<br />

the most recent revisions of the st<strong>and</strong>ards listed below.<br />

• ANSI X9.42: 2003. Agreement of Symmetric Keys Using Discrete Logarithm Cryptography<br />

• IEEE 802.3 St<strong>and</strong>ards for Local <strong>and</strong> Metropolitan Area Networks – Residential Ethernet<br />

• IEEE 802.1p St<strong>and</strong>ards for Local <strong>and</strong> Metropolitan Area Networks - Traffic Class Expediting <strong>and</strong> Dynamic<br />

Multicast Filtering<br />

• IEEE 802.1D St<strong>and</strong>ards for Local <strong>and</strong> Metropolitan Area Networks – <strong>MAC</strong> bridges<br />

• IEEE 802.1q St<strong>and</strong>ards for Local <strong>and</strong> Metropolitan Area Networks - Virtual Bridged Local Area Networks<br />

• IEEE 802.1w St<strong>and</strong>ards for Local <strong>and</strong> Metropolitan Area Networks - Rapid Reconfiguration of Spanning<br />

Tree<br />

• IEEE 802.11i St<strong>and</strong>ards for Local <strong>and</strong> Metropolitan Area Networks – <strong>Medium</strong> <strong>Access</strong> <strong>Control</strong> (<strong>MAC</strong>)<br />

Security Enhancements<br />

• RFC 3610 - Counter with CBC-<strong>MAC</strong> (CCM)<br />

• NIST 800-38A - 2001, Recommendation for Block Cipher Modes of Operation<br />

• FIPS PUB 198 - The Keyed-hash Message Authentication Code<br />

• FIPS 197 – Advanced Encryption St<strong>and</strong>ard (AES)<br />

1.4 DOCUMENT CONVENTIONS<br />

This document is divided into sections <strong>and</strong> appendices. The document body (all sections) is normative (except for<br />

italicised text); each appendix is identified as in its title as normative or informative.<br />

Text formatted in italics is not part of the specification. It is for clarification only.<br />

Binary numbers are indicated by the prefix 0b followed by the binary digits, for example, 0b0101. Hexadecimal<br />

numbers are indicated by the prefix 0x.<br />

Formal requirements are indicated with ‘shall’ in the main body of this document.<br />

Options are indicated with ‘may’ in the main body of this document. If an option is incorporated in an<br />

implementation, it shall be done as specified in this document.<br />

⎡⎤ ⋅ denotes rounding to the closest higher or equal integer<br />

Submission page 20 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

⎣⎦ ⋅ denotes rounding to the closest lower or equal integer<br />

1.5 DEFINITIONS<br />

Active slave An Active slave regularly gets transmission opportunities via the reception of<br />

data tokens from its master.<br />

Bridge port Ports of the bridging block. There are three types of bridge ports: BPL ports,<br />

non-BPL ports <strong>and</strong> the management port. BPL ports are the bridge ports that<br />

are directly mapped onto the completed entries of the Port Solver Table. Non-<br />

BPL ports are any other external ports of the node (e.g. Ethernet, USB,<br />

WIFI,…). The management port is used for the exchange of management<br />

messages between the bridging block <strong>and</strong> the layer management.<br />

Bridging block A functional block which is placed above the convergence layer. This block<br />

makes uses of st<strong>and</strong>ard 802.1D bridging to perform a layer-2 interconnection<br />

between the bridge ports of a node.<br />

Broadcast A transmission that is addressed to all the units of a layer-2 Local Area<br />

Network. It corresponds to the transmission of an Ethernet frame with an<br />

Ethernet Broadcast Destination address. It might be carried over the broadcast<br />

port or can be transmitted consecutively over unicast ports.<br />

Broadcast port Specific LLC port which value is 127. Transmission over the broadcast port<br />

makes use of the HURTO modulation.<br />

Burst A <strong>MAC</strong> Service Data Unit passed to the <strong>MAC</strong> layer by the LLC layer. A Burst<br />

includes one or several complete or fragmented packets destined to the same<br />

port.<br />

Channel<br />

Estimation Frame<br />

A Channel Estimation MPDU which does not contain any data payload. A<br />

Channel Estimation Frame starts with a Token Announce followed by a<br />

specific sequence of symbols used for channel estimation. It is not terminated<br />

by a token.<br />

CPE A BPL unit which only behaves as a slave node.<br />

Data Payload Burst payload which is adaptive modulated or HURTO modulated, depending<br />

on the channel conditions.<br />

Submission page 21 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Delimiter A delimiter is a 22 byte block which is HURTO modulated over one single<br />

symbol. There are three types of delimiters: the Burst Header (LLC), the Token<br />

Announce <strong>and</strong> the Token (<strong>MAC</strong>).<br />

FDR A BPL unit which combines a HE <strong>and</strong> either a CPE or a TDR.<br />

FMN (Flow Master<br />

Node)<br />

Is the node that guarantees the QoS of a certain traffic flow. The QC shall be<br />

always the FMN of the highest service classs of the BPL cell.<br />

Frame An MPDU passed by the <strong>MAC</strong> layer to the <strong>PHY</strong> layer. It can be a regular<br />

MPDU or a Channel Estimation MPDU.<br />

HE A BPL unit which only behaves as a master node. It is the root of a BPL cell.<br />

Contrarily to a TDR, the master part of a HE is not linked to a slave part from<br />

which the right to communicate depends.<br />

Idle slave An Idle slave does not get any transmission opportunities from its master.<br />

However, it is regularly polled by its master. (see polling).<br />

Master A node responsible for controlling access of its slaves to the network.<br />

Message Management Protocol Data Units generated by the <strong>Layer</strong> Management block.<br />

Management messages are IEEE 802.3 SNAP encapsulated <strong>and</strong> provided to the<br />

bridging block before being subsequently transmitted onto the bridge ports.<br />

Management messages are either unicast or multicast. Multicast management<br />

messages are transmitted over the broadcast port using HURTO modulation.<br />

Unicast management messages are transmitted over the unicast port using the<br />

adequate mapping (adaptive or HURTO).<br />

Mode A mode is defined by a symbol type, a carrier center frequency <strong>and</strong> an optional<br />

power mask<br />

MPDU Mac Protocol Data Unit delivered by the <strong>MAC</strong> layer to the <strong>PHY</strong> layer. The<br />

<strong>MAC</strong> layer generates two kinds of MPDUs: regular MPDUs <strong>and</strong> Channel<br />

Estimation MPDUs. A Channel Estimation MPDU does not contain any data<br />

payload (see Channel Estimation Frame definition). A regular MPDU can<br />

contain zero, one or several bursts addressed to one or several ports. A regular<br />

MPDU starts with a Token Announce delimiter <strong>and</strong> is terminated by a Token<br />

delimiter. There are 6 types of regular MPDUs: data, polling, access, access<br />

reply, silence <strong>and</strong> non-returnable. The type of the regular MPDU corresponds<br />

to the type of the Token terminating the regular MPDU.<br />

Submission page 22 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Multicast A transmission that is addressed to a group of units of a LAN segment. It is<br />

making use of an Ethernet Multicast Destination address. It might be carried<br />

over port 127 using HURTO mode, consecutively over unicast ports or can be<br />

transmitted over native multicast ports.<br />

Node A logical element which implements this specification.<br />

Packet An LLC Service Data Unit passed by the Convergence layer to the LLC layer.<br />

Each Ethernet frame received from the Convergence layer is converted into<br />

one single packet.<br />

<strong>PHY</strong>-signal <strong>PHY</strong>-signals are specific signals used as PPDU headers. <strong>PHY</strong>-signals include<br />

the SOT, SYNC <strong>and</strong> CREF signals.<br />

BPL cell A set of units composed by a HE <strong>and</strong> the units under the direct or indirect<br />

control of that HE. A BPL cell is operating under the same symbol type <strong>and</strong> the<br />

same carrier center frequency.<br />

BPL subcell A set of units composed by a master <strong>and</strong> the units under the direct control of<br />

that master<br />

BPL sub-tree A set of units composed by a TDR <strong>and</strong> the units under the direct or indirect<br />

control of that TDR.<br />

Polling Process under which a master regularly checks the status of its Idle slaves<br />

(CPEs or TDRs) . There are four types of polling identified by the type of the<br />

polling token. By using the Alive polling token, the master can detect if a slave<br />

is not connected anymore (Unregistered slave). By using the Active polling<br />

token, the master can detect if a slave is requiring transmission opportunities of<br />

a service class different from 7 (Active slave). In a similar way, using the Alive<br />

polling token, the TDR can detect if its own slave is not connected anymore<br />

(Unregistered slave). By using the Active polling token, the TDR can detect if<br />

its own slave is requiring transmission opportunities of a service class different<br />

from 7 (Active slave).,<br />

Port LLC 7-bit address identifier. Communication between node A <strong>and</strong> B requires<br />

opening a Local Port on node A <strong>and</strong> B. The Local Port on node A is defined as<br />

the Remote Port on node B <strong>and</strong> vice-versa. Transmission is performed onto a<br />

Local Port whereas reception is performed from a Remote Port. From a<br />

receiver st<strong>and</strong>point, a Remote Port is not unique: a remote node is uniquely<br />

identified by its Remote Port <strong>and</strong> its <strong>MAC</strong> address. Port entries are managed<br />

via the Port Solver Protocol <strong>and</strong> the Announce Messages. Port 127 is used as<br />

the broadcast port. Authorized port values are 9 to 126.<br />

Submission page 23 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Port Solver Table Addressing table used by the LLC layer. It contains entries with the association<br />

between <strong>MAC</strong> addresses of the distant nodes <strong>and</strong> ports. The entries are<br />

complete when both the local <strong>and</strong> first remote ports are assigned or incomplete<br />

when only the local port is assigned <strong>and</strong> the remote port is set to 0xFF. A<br />

second remote port is also available to perform native multicast transmissions<br />

QC (QoS<br />

<strong>Control</strong>ler)<br />

QC is the node that distributes the access to the channel among all the nodes<br />

present in a PLC cell, sharing the same NID or not. It can be defined as the<br />

master of the PLC cell. Any node can become a QC. The QC cannot be fixed<br />

by the user <strong>and</strong> it is decided by the nodes. The QC shall be the FMN of the<br />

high priority data traffic of the BPL cell.<br />

Registered slave A slave whose access to the network has been authorized via the <strong>Access</strong><br />

Protocol. A Registered slave can be Active or Alive.<br />

REP Refers to either TDR or FDR<br />

Slave A node for which transmission opportunities are controlled by its master.<br />

These transmission opportunities are specified as Validity Periods carried in<br />

some specific tokens delivered by the master. Slaves which are part of a TDR<br />

can delegate these transmission opportunities to their associated internal master<br />

(see TDR definition).<br />

SOT A specific <strong>PHY</strong>-signal which starts all PPDUs. It is also used as a positive<br />

acknowledgement of a polling request.<br />

Spatial reuse A feature which enables simultaneous node transmissions within non<br />

interfering BPL sub-trees of a single BPL cell. This feature relies on the nonreturnable<br />

token <strong>and</strong> the Cluster Discovery Protocol<br />

OFDM Symbol Transmitted signal for that portion of time when the modulating amplitude <strong>and</strong><br />

phase state is held constant on each of the equally-spaced subcarriers in the<br />

signal.<br />

Symbol type One from three different kinds of OFDM symbol, according to its duration.<br />

TDR A BPL unit made of both an internal master part <strong>and</strong> a slave part which never<br />

operate at the same time. A TDR behaves either as a master or as a slave at<br />

different time periods. Contrarily to a HE, the master part of a TDR is not a<br />

permanent master which has permanent control of its transmission<br />

opportunities. The right to communicate of the master part of a TDR depends<br />

on the Validity Period assigned to its associated slave part.<br />

Submission page 24 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Tonemap Table that contains the amount of bits that shall be transmitted by each<br />

subcarrier.<br />

Token The token is the <strong>MAC</strong> delimiter which terminates a regular MPDU. There are<br />

ten types of tokens: data <strong>and</strong> distributor token are used to propose transmission<br />

opportunities to one or more distant node, access/access reply tokens are used<br />

to discover Unregistered slaves, polling <strong>and</strong> TDR token are used for the slave<br />

<strong>and</strong> TDR states polling respectively, non-returnable token is used for allocating<br />

simultaneous transmission opportunities to several slaves (spatial reuse),<br />

silence token is used for sending a regular MPDU <strong>and</strong> keeping control of the<br />

medium after the transmission of this MPDU, CSMA token allow the priorized<br />

contention for the following transmission to every node that demodulate it, <strong>and</strong><br />

clock token allow the synchronization in time of every node in the BPL cell.<br />

Unicast A transmission that is addressed to a unique recipient.<br />

Unregistered slave An Unregistered slave is not managed by any master. A master can detect such<br />

slaves via the exchange of an access frame <strong>and</strong> an access reply frame.<br />

Visibility From a node to another node, when the first node is able to demodulate the<br />

token announce sent by the second node.<br />

Word A data unit of 32-bits<br />

1.6 ABBREVIATIONS AND ACRONYMS<br />

4D Four Dimensional<br />

AAA Authorization – Authentication – Accounting<br />

ABLP Adaptive Bit-Loading Protocol<br />

ABR Available Bit Rate<br />

ACK ACKnowledge<br />

Submission page 25 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

AFE Analogue Front End<br />

AGC Automatic Gain <strong>Control</strong><br />

ANSI American National St<strong>and</strong>ards Institute<br />

APL Aggregated Payload Length<br />

ARQ Automatic Repeat Request<br />

ARP Address Resolution Protocol<br />

ATM Asynchronous Transfer Mode<br />

BE Best Effort<br />

BER Bit Error Rate<br />

BH Burst Header<br />

BNDA Border Node Designation Acknowledge<br />

BNDP Border Node Designation Protocol<br />

BPC Bits Per subCarrier<br />

BPDU Bridge Protocol Data Unit<br />

BPS Bits Per Symbol<br />

CAC Connection Admission <strong>Control</strong><br />

CBR Constant Bit Rate<br />

CCITT Comité Consultatif International Téléphonique et Télégraphique<br />

Submission page 26 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

CDP Cluster Discovery Protocol<br />

CLPDU Convergence <strong>Layer</strong> Protocol Data Unit<br />

CP Cyclic Prefix<br />

CPE Customer Premises Equipment<br />

CRC Cyclic Redundancy Check<br />

CSM Class of Service Monitor<br />

CTS Clear To Send<br />

CW CodeWord<br />

DAC Digital to Analogue Converter<br />

DES Data Encryption St<strong>and</strong>ard<br />

DS DownStream<br />

DSP Digital Signal Processing<br />

EMC Electromagnetic Compatibility<br />

FCMP Fair Congestion Management Policy<br />

FEC Forward Error Correction<br />

FIPS Federal Information Processing St<strong>and</strong>ards<br />

FFT Fast Fourier Transform<br />

FTP File Transfer Protocol<br />

Submission page 27 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

FMN Flow Master Node<br />

FW Firmware<br />

HE Head End<br />

HURTO High Ultra Reliable Transmission for Ofdm<br />

IEEE Institute of Electrical <strong>and</strong> Electronics Engineers<br />

ICI Inter Carrier Interference<br />

IDFT Inverse Discrete Fourier Transform<br />

IDP Interference Detection Packet<br />

IQ In-phase <strong>and</strong> Quadrature<br />

ISI Inter Symbol Interference<br />

ISO International Organization for St<strong>and</strong>ardization<br />

LLC Logical Link <strong>Control</strong><br />

LP Local Port<br />

LPDU LLC Protocol Data Unit<br />

LSB Least Significant Byte<br />

LSDU LLC Service Data Unit<br />

LV Low Voltage<br />

<strong>MAC</strong> Media <strong>Access</strong> <strong>Control</strong><br />

Submission page 28 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

MIC Message Integrity Check<br />

MID Master Identification<br />

MPDU <strong>MAC</strong> Protocol Data Unit<br />

MSB Most Significant Byte<br />

MSDU <strong>MAC</strong> Service Data Unit<br />

MTU Maximum Transfer Unit<br />

MV <strong>Medium</strong> Voltage<br />

OFDM Orthogonal Frequency Division Multiplexing<br />

OPERA Open PLC European Research Alliance<br />

CCP Communication <strong>Control</strong> Protocol<br />

OSI Open Systems Interconnection<br />

OUI Organizationally Unique Identifier<br />

OVLAN Optimized VLAN<br />

PAP Packet ACK Protocol<br />

PAR Peak to Average Ratio<br />

PBPS <strong>Physical</strong> Bits Per Symbol<br />

PCMP Priority Congestion Management Policy<br />

PDU Protocol Data Unit<br />

Submission page 29 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

<strong>PHY</strong> <strong>PHY</strong>sical layer<br />

BPL BPL Communications<br />

PN Pseudo Noise<br />

PPDU <strong>Physical</strong> Protocol Data Unit<br />

PSD Power Spectral Density<br />

PST Port Solver Table<br />

QC QoS <strong>Control</strong>ler<br />

QoS Quality of Service<br />

REP Repeater<br />

RP Remote Port<br />

RS Reed Solomon<br />

RTS Request To Send<br />

RX Reception<br />

SNAP SubNetwork <strong>Access</strong> Protocol<br />

SNR Signal to Noise Ratio<br />

SLA Service Level Agreement<br />

SOT Start of Transmission<br />

STP Spanning Tree Protocol<br />

Submission page 30 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

TA Token Announce<br />

TCM Trellis Coded Modulation<br />

TCP Transfer <strong>Control</strong> Protocol<br />

TDD Time Division Duplexing<br />

TDMA Time Division Multiple <strong>Access</strong><br />

TDR Time Division Repeater<br />

TO TimeOut<br />

TX Transmission<br />

UDP User Datagram Protocol<br />

UPA Universal BPL Association<br />

US UpStream<br />

VBR Variable Bit Rate<br />

VLAN Virtual Local Area Network<br />

VoIP Voice over IP<br />

2 GENERAL DESCRIPTION<br />

An access BPL network consists of a number of user terminals (CPEs) that transmit/receive traffic in a shared<br />

medium to/from a centralized station (HE). If the signal is too attenuated to reach all CPEs from the same HE,<br />

repeaters (REP) can be inserted in the network in order to retransmit the signal <strong>and</strong> thus increase the coverage.<br />

Repeaters can be either TDR or FDR. From this description, the type of topologies to be found in BPL access<br />

Submission page 31 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

networks are tree-like topologies, like the one depicted in Figure 1, where a central node, called a HE,<br />

concentrates all of the upstream <strong>and</strong> downstream traffic, although other topologies, as the ring shape topologies,<br />

are also common. All kinds of structures in <strong>Medium</strong> Voltage (MV) <strong>and</strong> Low Voltage (LV) can be reduced to a<br />

HE plus Repeaters structure.<br />

CPE<br />

REP<br />

CPE<br />

HE<br />

Submission page 32 UPA-OPERA<br />

REP<br />

CPE CPE<br />

Figure 1 Typical <strong>Access</strong> Scenario<br />

2.1 GENERAL DESCRIPTION OF THE ARCHITECTURE<br />

2.2 NODE DESCRIPTION<br />

A BPL network can be made either of:<br />

• one BPL cell,<br />

• several BPL cells if they are interconnected via Frequency Division repeaters (FDR). FDR are made of<br />

a combination of one HE <strong>and</strong> one CPE or TDR operating in different modes.<br />

In an access BPL network, there is usually one HE, placed in the MV/LV substation, that concentrates the<br />

upstream <strong>and</strong> downstream traffic from/to all the CPEs of all the connected BPL cells.<br />

CPE<br />

HE<br />

REP<br />

REP<br />

REP<br />

CPE


4-June-07 P1901_PRO_016_r0<br />

A BPL cell is composed from a <strong>Medium</strong> <strong>Access</strong> <strong>Control</strong> point of view by a HE <strong>and</strong> the set of units (CPEs or<br />

TDRs) under the direct or indirect control of that HE operating under the same symbol type <strong>and</strong> the same carrier<br />

frequency. Itis composed of:<br />

1. One HE<br />

2. From zero to several TDRs<br />

3. One (or several) CPE(s)<br />

To gguarantee the required performance in terms of Quality of Service, the nodes can be also divided in three<br />

types by means of their function to assure the Quality of Service: QoS <strong>Control</strong>lers (QCs), assumed to be a HE in<br />

a typical BPL cell, Flow Master Nodes (FMN), that are the nodes that assures the resources needed by a certain<br />

class of service traffic flow, <strong>and</strong> End Points that have no management tasks regarding QoS assurance. The QCs<br />

are also the FMN of the higest service class in the BPL cell. More information about QoS can be found in<br />

section 8.<br />

2.2.1 HE<br />

The HE is the central node that controls the entire BPL cell. It assigns resources to all nodes of the BPL cell<br />

through the use of the token, according to the QoS requirements of the flows circulating on the BPL cell. The<br />

HE will always be the master of any node directly connected to it.<br />

2.2.2 Time Division Repeaters<br />

A TDR is used to increase the coverage in areas too far from the cell’s HE. TDRs are connected to the HE or to<br />

other TDRs that act as their master node. TDRs share the channel allocated to them by their master node <strong>and</strong><br />

distribute it among their slave nodes according to the traffic flows <strong>and</strong> service classes in the BPL cell <strong>and</strong> the<br />

origin <strong>and</strong> destination of them. The TDR will be the slave of the HE or of another TDR, <strong>and</strong> will be the master<br />

of its slaves.<br />

2.2.3 CPE<br />

CPEs are BPL units installed in the customer’s household. A CPE must subscribe to the network before being<br />

able to access the channel. Subscribing to the network means selecting a master node that assigns channel<br />

access time. In order to subscribe to the network, a validation process is run that acknowledges that the CPE is<br />

valid. After being accepted into the network, the CPE automatically downloads a file (auto-configuration<br />

process) detailing the parameters to use, such as the user profile <strong>and</strong> other configuration parameters. The CPE is<br />

always a slave.<br />

2.3 <strong>MAC</strong> overview<br />

In an IEEE P1901 pre-established network the access to the channel is managed in a hierarchical way. The HE<br />

(that is usually the QC <strong>and</strong> the FMN for the higest service class) schedules the use of the channel by its slaves<br />

depending on the current traffic flows <strong>and</strong> its previously accepted QoS requirements. The access to the channel<br />

can be managed by the HE using two main procedures.<br />

Submission page 33 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

1. Sending indidually to each of the slaves a data or distributor frame, containg data from the HE to the slaves<br />

<strong>and</strong> finished by a token that contains the next slave or list of slaves that shall use the channel when the first<br />

transmission is finished in a predetermined order. The amount of channel time assigned by the HE <strong>and</strong> can<br />

be fixed for a timing interval or not. In the first case the channel allocation can be synchronous with the<br />

mains or not. In the second case if a node does not use the entire assigned time, the right to transmit is<br />

immeadiately given to the following node in the list or returned to the HE.:<br />

2. Sending a CSMA token, that opens a priorized contention among the nodes that receive it. The winner of<br />

the contention shall obtain the right to transmit for the given amount of time, <strong>and</strong> then, the right to transmit<br />

is returned to the HE.<br />

By means of the first procedure, a timing interval can be programmed where different slaves can allocate their<br />

transmissions.<br />

2.4 QoS overview<br />

IEEE P1901 provides various mechanisms to assure the QoS of the traffic flows in the BPL cell. Traffic flows<br />

are session oriented <strong>and</strong> tagged with certain service class that implies certain requirements in terms of latency<br />

<strong>and</strong> b<strong>and</strong>with, jointly with a requirement in terms of level of assurance of the reserved resources.<br />

A slave requiring to transmit certain type of traffic shall first classify it in one of the eight available service<br />

classes, each one with a preprogrammed latency, b<strong>and</strong>width <strong>and</strong> level of assurance of the required resources,<br />

that can be Variable Bit Rate (VBR), Constant Bit Rate (CBR), Available Bit Rate (ABR) or Best Effort. The<br />

mapping from Service Classes to the B<strong>and</strong>with, Latency <strong>and</strong> Type of Traffic is common <strong>and</strong> known by all<br />

nodes in the BPL cell.<br />

Then, by means of the Connection Admission <strong>Control</strong> (CAC) protocol, the requirements to transmit the traffic<br />

flow are solicited to the Flow Master Node of this service class, <strong>and</strong> can be accepted <strong>and</strong> a session ID shall be<br />

assigned to it, or rejected.<br />

In the case where the maximum capacity of the channel is reached, several congestion policies can be applied<br />

by the QC <strong>and</strong> FMNs to admit, reject or drop current sessions in the BPL cell (See 8.3).<br />

2.5 Security overview<br />

IEEE P1901 specification provides a state-of-art security mechanism including CTR 128 bits AES encryption<br />

with individual key for each CLPDU or fragment of CLPDU, integrity mechanisms by means of CBC 128 bits<br />

AES also performed individually for each CLPDU or fragment CLPDU, integrity protection of <strong>MAC</strong> addess,<br />

RADIUS <strong>and</strong> 802.1X based key distribution <strong>and</strong> AAA protocol, etc.<br />

Recommendations from 802.11i st<strong>and</strong>ard have been specially taken into account to design the security<br />

specification of IEEE P1901. More details are disclosed in section 10.<br />

Submission page 34 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

2.6 NETWORK REFERENCE MODEL<br />

This specification defines <strong>PHY</strong>, <strong>MAC</strong>, LLC <strong>and</strong> Convergence <strong>Layer</strong> functionality as well as minimal bridging<br />

requirements to be supported by all compliant implementations. It also defines layer management functions.<br />

Finally, it also contains specifications for Security <strong>and</strong> Configuration, including MIBs <strong>and</strong> autoconfiguration<br />

issues.<br />

Figure 2 System Reference Model<br />

Submission page 35 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

This document specifies Packet Management, LLC, <strong>MAC</strong> <strong>and</strong> <strong>PHY</strong> behaviour. End-to-end services are<br />

provided by protocol layers not specified in this document.<br />

At an application level the system appears as a black box between information packet interfaces <strong>and</strong> the BPL.<br />

The Bridging function is m<strong>and</strong>atory <strong>and</strong> described in section 7. From a bridging st<strong>and</strong>point, the layer<br />

management block is connected to the bridging function via a management port. The Convergence <strong>Layer</strong> is<br />

seen as a set of BPL ports.<br />

The Convergence layer performs the Ethernet Frame to Packet conversion. This function performs the<br />

conversion between Ethernet II/802.3 frames (802.1 p/q tagged or untagged) <strong>and</strong> 32-bit aligned packets. On the<br />

transmission path, the converter also sets the priority <strong>and</strong> the OVLAN tag, if needed. The Broadcast/Multicast<br />

h<strong>and</strong>ling is also done at this level.<br />

The LLC layer provides peer convergence layers with the ability to exchange LLC service data units<br />

(LSDUs=packets). Given a maximum size constraint on the LPDU payload provided by the layer management,<br />

the LLC segments <strong>and</strong>/or groups packets into LPDU payloads (burst payloads) to be transferred over the same<br />

transmission port. When several packets are present within a burst payload, inter-packets headers are appended.<br />

In relation with the layer management, the LLC also deals with encryption/decryption of burst payloads. The<br />

LLC will append the burst header to a burst payload.<br />

The <strong>MAC</strong> layer provides peer LLC layers with the ability to exchange <strong>MAC</strong> service data units<br />

(MSDUs=LPDUs=burst). On the transmission path, the <strong>MAC</strong> layer performs the grouping of bursts=MSDU<br />

into an MPDU. The <strong>MAC</strong> layer also provides the layer management with the ability to generate specific<br />

MPDUs=frames for performing background tasks: silence management, channel estimation, node status polling<br />

<strong>and</strong> node discovery. The <strong>MAC</strong> layer h<strong>and</strong>les 7 types of frames (data, silence, channel estimation, polling,<br />

access, access reply <strong>and</strong> non-returnable data). All these frames start with a token announce delimiter. Except for<br />

the channel estimation frame, all the other frames are terminated with a token delimiter which content depends<br />

on the type of the frame.<br />

The <strong>PHY</strong> layer performs the OFDM modulation <strong>and</strong> the digital signal processing (DSP) needed to transmit the<br />

MPDU over the BPL channel. It also adds the FEC redundancy.<br />

3 <strong>PHY</strong><br />

This section specifies the <strong>Physical</strong> <strong>Layer</strong> Entity for an Orthogonal Frequency Division Multiplexing (OFDM)<br />

system. OFDM has been chosen as the modulation technique because of its inherent adaptability in the presence<br />

of frequency selective channels, its resilience to jammer signals, its robustness to impulsive noise <strong>and</strong> its<br />

capacity of achieving high spectral efficiencies.<br />

Submission page 36 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.1 OVERVIEW<br />

The diagram in Figure 3 shows an example <strong>PHY</strong> layer of a transmitter.<br />

On the transmitter side, the <strong>PHY</strong> layer receives its inputs from the Media <strong>Access</strong> <strong>Control</strong> <strong>Layer</strong>. Two separate<br />

bit streams are shown because of the different encoding for data <strong>and</strong> control information. The delimiters shall be<br />

interleaved by the <strong>Control</strong> Interleaving block <strong>and</strong> mapped by the HURTO Mapping block; while the data stream<br />

shall be mapped using the HURTO Mapping block or the Adaptive Mapping block, depending on the reliability<br />

level required for the transmission. The outputs of both Mapping blocks lead into the Scrambler, which is<br />

followed by 4D-TCM (Four Dimensional Trellis Coded Modulation) encoding. The next step is the OFDM<br />

Modulation, which is composed of the Subcarrier Modulator, the IDFT (Inverse Discrete Fourier Transform),<br />

the Cyclic Prefix generator <strong>and</strong> the symbol windowing operation structure. The resulting digital signal is<br />

converted to an analog signal by means of a DAC <strong>and</strong> IQ modulated, before passing to the amplifying <strong>and</strong><br />

filtering stages.<br />

Delimiters<br />

Data<br />

payload<br />

CRC<br />

Data<br />

Reed-Solomon<br />

Encoder<br />

<strong>Control</strong><br />

Reed-Solomon<br />

Encoder<br />

<strong>Control</strong><br />

Interleaving<br />

3.2 <strong>PHY</strong> LAYER FRAME<br />

Adaptive<br />

Mapping<br />

HURTO<br />

Mapping<br />

Subcarrier<br />

Cyclic<br />

Scrambler 4D TCM<br />

IDFT<br />

Window<br />

Modulator<br />

Prefix<br />

Power Line<br />

Figure 3 Transmission <strong>PHY</strong> layer<br />

Figure 4 shows the symbols that are transmitted in a PPDU.<br />

Submission page 37 UPA-OPERA<br />

DAC<br />

IQ mod<br />

Amplifiers<br />

Filters


4-June-07 P1901_PRO_016_r0<br />

SOT<br />

Synchronization<br />

symbol<br />

Channel reference<br />

symbol<br />

maximum 243 symbols<br />

Figure 4 PPDU<br />

<strong>Control</strong> <strong>and</strong> data<br />

symbols<br />

The maximum duration of a PPDU is 243 symbols (counting from the synchronization symbol to the last<br />

symbol of the frame). A receiver shall be able to h<strong>and</strong>le a maximum duration PPDU.<br />

The gap between the last non-zero sample of the SOT <strong>and</strong> the first non-zero sample of the synchronization<br />

symbol shall be 2.75 ± 0.25 µs.<br />

The time between two consecutive PPDUs is fixed <strong>and</strong> known by all modems as the INTER PPDU SPACE 1<br />

(see 3.11 <strong>and</strong> 4.6). Only when scheduling the token by means of a Distributor Frame, the time can be reduced<br />

<strong>and</strong> is called INTER PPDU SPACE 2 (see 3.11 <strong>and</strong> 4.6).<br />

3.3 FORWARD ERROR CORRECTION<br />

3.3.1 Delimiters<br />

There are several types of delimiters that will be explained in 4.4 <strong>and</strong> 5.2. Delimiters are mapped to one OFDM<br />

symbol, so they will always have the same size.<br />

Three main calculations will be made over a delimiter as is shown in Figure 5.<br />

3.3.1.1 CRC-CCITT<br />

176 bits 192 bits 288 bits Frame 288 bits<br />

RS (12,8)<br />

CRC-16<br />

control<br />

Encoder<br />

Interleaver<br />

Figure 5 Delimiter encoding<br />

A CRC-CCITT is applied to the incoming 176 bits length delimiter applying the polynomial generator:<br />

Submission page 38 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

16 12<br />

g ( x)<br />

= x + x + x<br />

Equation 1<br />

The CRC check called CRC(x), can be obtained as the remainder of the division between I(x)*x16 <strong>and</strong> g(x),<br />

where I(x) is a binary coefficients polynomial given by:<br />

Therefore the CRC is expressed as:<br />

The resulting frame will be:<br />

Submission page 39 UPA-OPERA<br />

5<br />

+ 1<br />

I +<br />

175<br />

174<br />

2<br />

( x)<br />

= I 175 x + I 174 x + .... + I 2 x + I 1 x I 0<br />

Equation 2<br />

CRC +<br />

15<br />

14<br />

( x)<br />

= CRC15<br />

x + CRC14<br />

x + .... + CRC1x<br />

CRC0<br />

Equation 3<br />

16<br />

191 190<br />

18 17 16<br />

15<br />

T ( x)<br />

= I(<br />

x)<br />

x + CRC(<br />

x)<br />

= I175x<br />

+ I174<br />

x + .... + I 2 x + I1x<br />

+ I 0 x + CRC15x<br />

+ ... + CRC0<br />

Equati<br />

on 4<br />

A total of sixteen bits resulting from the CRC algorithm are then appended to the delimiter.<br />

The transformation is shown in the following figure:<br />

I 175 I 174 I 2 I 1 I 0<br />

I 175 I 174 I 2 I 1 I 0 CRC 15 CRC 0<br />

Figure 6 Delimiter CRC


4-June-07 P1901_PRO_016_r0<br />

3.3.1.2 Reed-Solomon Delimiter Coding<br />

Delimiters are composed by six RS codewords from (n=12,k=8,t=2) RS code.<br />

Four (n-k=4) parity symbols p3, p2, p1, p0 shall be appended to k=8 message symbols m7, m6, … , m0 to form a<br />

Reed-Solomon codeword m7, m6, … , m0, p3, p2, … , p0, where symbol m7 is the first four bits symbol in time<br />

out of the Reed-Solomon encoder. Each RS symbol is composed of four bits.<br />

The parity symbols shall be computed from the message symbols using the Equation 5:<br />

Where the message polynomial is:<br />

RS ( x)<br />

= M ( x)<br />

x<br />

mod g(<br />

x)<br />

Submission page 40 UPA-OPERA<br />

4<br />

Equation 5<br />

M +<br />

7 6<br />

( x)<br />

= m7<br />

x + m6x<br />

+ ... + m1x<br />

m0<br />

Equation 6<br />

The parity symbols are expressed as the following polynomial;<br />

RS +<br />

3 2<br />

( x)<br />

= p3x<br />

+ p2x<br />

+ p1x<br />

p0<br />

Equation 7<br />

The field generator binary polynomial that generates each RS symbol is given by:<br />

And the code generator polynomial is given by:<br />

4<br />

f ( x)<br />

= x + x + 1<br />

Equation 8


4-June-07 P1901_PRO_016_r0<br />

1<br />

2<br />

3<br />

4<br />

g ( x)<br />

= ( x −α<br />

)( x −α<br />

)( x −α<br />

)( x −α<br />

)<br />

Equation 9<br />

The RS binary symbol representation for delimiters of α 0 is 0b0001, where the left most bit of this RS symbol is<br />

the most significant bit (MSB). This way, the binary representation of each of the redundancy symbols<br />

generated on the Galois field GF(2 4 ) denoted as p3, p2, p1, p0 will be represented as RSX15, RSX14, RSX13, <strong>and</strong><br />

RSX12 for the symbol p3, RSX11, RSX10, RSX9, <strong>and</strong> RSX8 for the symbol p2, RSX7, RSX6, RSX5, <strong>and</strong> RSX4 for the<br />

symbol p1 <strong>and</strong> RSX3, RSX2, RSX1, <strong>and</strong> RSX0 for the symbol p0, where X denotes the RS codeword number.<br />

The following figure shows the final binary level representation of the delimiter:<br />

I 175 I 174 I 144 RS1 15 RS1 0<br />

I143 I142 I112 RS215 RS20 I 15<br />

I 14<br />

CRC 0 RS6 15 RS6 0<br />

Figure 7 Reed Solomon bit format<br />

The first bit to be transmitted is the leftmost of the first codeword (I175), followed by the rest of the bits of the<br />

RS codeword. Then, the second codeword, <strong>and</strong> so on. This is illustrated in<br />

175<br />

174<br />

3.3.1.3 Delimiter Interleaving<br />

I<br />

I<br />

... RS1<br />

I ... RS2<br />

I ....... RS5<br />

I ... RS6<br />

0<br />

143<br />

Submission page 41 UPA-OPERA<br />

0<br />

111<br />

Figure 8 Reed Solomon bit order<br />

After RS encoding, the six resulting RS codewords shall be interleaved with interleaving depth of six RS<br />

codewords <strong>and</strong> 4 bits granularity, in such a way that the first four bits of each RS codeword shall be sent first to<br />

the interleaver, then, the second 4 bits of each of the six RS codewords <strong>and</strong> so on. We can group the bits in<br />

nibbles for clarity:<br />

0<br />

15<br />

0


4-June-07 P1901_PRO_016_r0<br />

Figure 9 illustrates this interleaving<br />

N<br />

63<br />

N<br />

N<br />

N<br />

1<br />

0<br />

= ( I<br />

N 64 = ( I147<br />

, I<br />

= ( RS1<br />

, RS1<br />

60<br />

N 71 N 70 N 61 N 60<br />

N 59 N 58 N 49 N 48<br />

N 11 N 10 N 1 N 0<br />

N<br />

71<br />

15<br />

:<br />

= ( RS1<br />

, RS1<br />

, RS1<br />

, RS1<br />

)<br />

= ( RS6<br />

, RS6<br />

, RS6<br />

, RS6<br />

)<br />

7<br />

= ( RS6<br />

, RS6<br />

, RS6<br />

, RS6<br />

)<br />

Submission page 42 UPA-OPERA<br />

3<br />

175<br />

3<br />

, I<br />

:<br />

:<br />

174<br />

146<br />

14<br />

6<br />

2<br />

2<br />

, I<br />

Equation 10<br />

173<br />

, I<br />

)<br />

, I145,<br />

I144<br />

)<br />

, RS1<br />

, RS1<br />

13<br />

1<br />

5<br />

1<br />

172<br />

Figure 9 Frame control interleaving<br />

0<br />

12<br />

4<br />

0<br />

)<br />

N 71 N 59 N 23 N 11<br />

N 70 N 58 N 22 N 10<br />

N 60 N 48 N 12 N 0<br />

With reference to the right half of Figure 9 the transmission order is row-wise, starting with the first row <strong>and</strong><br />

from left to right, then the second row, <strong>and</strong> so on. In other words, the MSB of N71 will be the first to be<br />

transmitted, after N71, the next will be N59, <strong>and</strong> N0 will be last.<br />

3.3.2 Data payload<br />

The data payload, delimited by a burst header, shall be encoded by a variable rate 8-bit symbol Reed Solomon<br />

encoder. The RS data mode is set from the fields “FEC redundancy” <strong>and</strong> “FEC payload” of the burst header.<br />

The “FEC redundancy” value will determine which of the four RS data modes is used. The generator<br />

polynomial <strong>and</strong> redundancy of each of the available modes is given in Table 1:<br />

RS data mode g(x) RS data code


4-June-07 P1901_PRO_016_r0<br />

0 2<br />

3<br />

8<br />

g ( x)<br />

= ( x −α<br />

)( x −α<br />

)( x −α<br />

)...( x −α<br />

) (k0+8,k0,t=4)<br />

1 2<br />

3<br />

12<br />

g ( x)<br />

= ( x −α<br />

)( x −α<br />

)( x −α<br />

)...( x −α<br />

) (k1+12, k1,t=6)<br />

2 2<br />

3<br />

16<br />

g ( x)<br />

= ( x −α<br />

)( x −α<br />

)( x −α<br />

)...( x −α<br />

) (k2+16, k2,t=8)<br />

3 2<br />

3<br />

20<br />

g ( x)<br />

= ( x −α<br />

)( x − α )( x −α<br />

)...( x − α )<br />

Table 1 RS data polynomials<br />

(k3+20, k3,t=10)<br />

The “FEC payload” field in each burst header contains the number of 32-bit words that will be coded per RS<br />

codeword, <strong>and</strong> therefore determines the amount of payload bytes per codeword (ki).<br />

Maximum <strong>and</strong> minimum value for this field is given depending on the mode in Table 2:<br />

RS data<br />

mode<br />

Redundancy<br />

words<br />

Max payload in words<br />

Min payload in words<br />

HURTO Adaptive<br />

0 2 61 2 34<br />

1 3 60 3 33<br />

2 4 59 4 32<br />

3 5 58 5 31<br />

Table 2 RS data payload<br />

Each data payload shall be coded following a different RS coding scheme that will be configured in each Burst<br />

header. The selected coding scheme is a shortened Reed-Solomon code that can be processed as a systematic<br />

RS(255, 255-2*ti,ti) by adding 255-(ki+2ti) bytes set to zero before the information bits. After the RS coding<br />

procedure these null bytes shall be discarded, leading to RS codewords of n = ki+2t bytes<br />

Submission page 43 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

When the data payload length is not an integer number of Reed-Solomon codewords, the last Reed Solomon<br />

codeword will have a special coding given by the formula:<br />

[ ( 4*<br />

APL)<br />

mod( k + 2*<br />

t)<br />

] − 2t<br />

klastcw =<br />

i<br />

Equation 11<br />

Where APL is the data payload length in number of 32-bit words including RS coding parity bits.<br />

For the last codeword, no minimum value in k is applied.<br />

The incoming data payload shall be grouped in L groups of ki bytes, where ki has been taken from the “FEC<br />

payload” field in burst header, <strong>and</strong> a last group of klastcw bytes, calculated from Equation 11, as can be seen in<br />

the following figure:<br />

L Blocks<br />

I L*ki+klastcw-1 I L*ki+klastcw-2 I (L-1)*ki+klastcw RS1 2*t-1 RS1 0<br />

I (L-1)*ki+klastcw-1 I (L-1)*ki+klastcw-2 I (L-2)*ki+klastcw RS2 2*t-1 RS2 0<br />

I ki+klastcw-1 I ki+klastcw-2 I klastcw RSL 2*t-1 RSL 0<br />

I klastcw-1 I klastcw-2 I 0 RS(L+1) 2*t-1 RS(L+1) 0<br />

klastcw bytes<br />

k i bytes<br />

Figure 10 Reed Solomon byte grouping<br />

Submission page 44 UPA-OPERA<br />

2*t bytes<br />

2*t bytes


4-June-07 P1901_PRO_016_r0<br />

L is given by the formula:<br />

⎢<br />

L = ⎢<br />

⎣<br />

( ) ⎥ ki<br />

+ 2*<br />

t ⎦<br />

Submission page 45 UPA-OPERA<br />

4*<br />

APL<br />

Equation 12<br />

For each Reed-Solomon codeword, as in delimiter coding, (n-k) parity symbols pn-k-1, pn-k-2, … , p0 shall be<br />

appended to k message symbols mk-1, mk-2, … , m0 to form a Reed-Solomon codeword mk-1, mk-2, … , m0, pn-k-1,<br />

pn-k-2, … , p0, where symbol mk-1 is the first in time out of the Reed-Solomon encoder <strong>and</strong> the first in time of the<br />

uncoded data payload. Each of the symbols belongs to the Galois Field GF(2 8 ), <strong>and</strong> it is then represented in its<br />

binary form with eight bits. On the other h<strong>and</strong>, n <strong>and</strong> k variables depend on the selected RS data mode, taken<br />

from Table 1 <strong>and</strong> Table 2. The parity symbols shall be computed from the message symbols using the equation:<br />

Where<br />

Is the message polynomial,<br />

P<br />

M<br />

n−k<br />

P(<br />

x)<br />

= M ( x)<br />

x mod g(<br />

x)<br />

Equation 13<br />

k −1<br />

k −2<br />

( x)<br />

= mk<br />

− 1 x + mk<br />

−2<br />

x + ... + m1x<br />

+ m0<br />

Equation 14<br />

n−k<br />

−1<br />

n−k<br />

−2<br />

( x)<br />

= pn<br />

− k −1<br />

x + pn−<br />

k −2<br />

x + ... + p1x<br />

+ p0<br />

Equation 15<br />

Is the parity polynomial <strong>and</strong> g(x) is the code generator polynomial of the Reed-Solomon code, given by Table 1<br />

The field generator polynomial associated with the Reed-Solomon code is given by:<br />

8 4 3<br />

f ( x)<br />

= x + x + x + x<br />

Equation 16<br />

⎥<br />

2<br />

+ 1


4-June-07 P1901_PRO_016_r0<br />

The binary representation of α 0 is 0b00000001, where the left most bit of this RS symbol is the most significant<br />

bit (MSB).<br />

3.4 MAPPING MODES<br />

Once obtained a delimiter or a data payload, one from two different mapping procedures shall be used. The<br />

mapping mode is indicated with the field HURTO in the burst header (see section 5.2). HURTO mapping is<br />

fixed. Adaptive mapping will be done following a table (called bit-loading table) with information on how<br />

many coded bits will be allocated in each of the 1536 subcarriers in a symbol<br />

3.4.1 HURTO mapping<br />

HURTO mode shall be used in all delimiters <strong>and</strong> in the data payload if it is indicated in the HURTO field in the<br />

burst header.<br />

First, groups of 288 consecutive bits are made. Each of these groups is replicated eight times, in order to obtain<br />

groups of 2304 bits. The bit allocation table will be set to 2 bits per subcarrier for all the 1536 subcarriers of an<br />

OFDM symbol, <strong>and</strong> each resulting 2304 bits groups shall complete an entire OFDM symbol. 4D-TCM<br />

encoding will be done, with a reset in convolutional encoder each 288 incoming bits.<br />

In the data payload case with the HURTO bit set in the burst header, the last group will be completed with<br />

zeroes, if necessary.<br />

Submission page 46 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

<strong>Control</strong><br />

frame or<br />

HURTO<br />

data<br />

frame<br />

Frame after block coding.<br />

MSB is up.<br />

3.4.2 Adaptive mapping<br />

zero<br />

filling if<br />

needed<br />

288<br />

bits<br />

length<br />

Submission page 47 UPA-OPERA<br />

288<br />

bits<br />

length<br />

288<br />

bits<br />

length<br />

Number of groups will be one<br />

for control frame <strong>and</strong> no zero<br />

filling will be done. Transmission order<br />

will be up to down, MSB first.<br />

Figure 11 HURTO mapping<br />

Frame to encode by 4DTCM<br />

after scrambling<br />

2304bits<br />

length<br />

When the HURTO bit is unset in the burst header, the data payload will be mapped following the bit allocation<br />

table, which sets how many coded (after 4D-TCM) bits will be allocated in each subcarrier.<br />

When adaptive mapping is used, there must be at least 24 subcarriers with 2 or more information bits.


4-June-07 P1901_PRO_016_r0<br />

Normal<br />

Data<br />

Frame<br />

Frame after block<br />

coding. msb is up.<br />

Transmission order will be<br />

top to bottom, msb first.<br />

Figure 12 Adaptive mapping<br />

Submission page 48 UPA-OPERA<br />

BPS<br />

Bits<br />

Zero filling<br />

if needed<br />

BPS in the figure means the number of necessary data bits to fill an entire OFDM symbol with a certain bitloading.<br />

A mathematical expression of this definition is shown in Equation 17. The last symbol shall be padded<br />

with zeros before scrambling, if necessary, until an integer number of symbols is used.<br />

3.5 TRELLIS CODED MODULATION (4D-TCM)<br />

Once obtained a delimiter or data payload that will fill a integer number of OFDM symbols, a 16 state 4dimensional<br />

truncated trellis code is used for error correction. This code will be applied over groups of 1536<br />

subcarriers <strong>and</strong> reset each OFDM symbol, except in HURTO mode, where the 4D-TCM encoder will be reset<br />

each 192 subcarriers out, or, in other words, each 288 bits in.<br />

3.5.1 Bit Extraction<br />

Data bits from both delimiters <strong>and</strong> data payload shall be extracted according to a bit-loading table bj, with<br />

j=0…1535, righter bits first, in groups of z bits. In the case of HURTO mapping bj= 2 ∀j ∈ [0..1535]. Due to<br />

the constellation expansion associated with coding <strong>and</strong> the 4-dimensional nature of the code, zi will be<br />

calculated from a given pair (x,y) of two consecutive bj, where bj is the number of coded bits that subcarrier j<br />

will transmit.<br />

Due to the heavy impairments of the BPL channel, or regional regulations, some subcarriers can be set not to carry<br />

any information. This case is denoted with a bit loading bj = 0 for such subcarriers. When the two consecutive<br />

subcarriers x <strong>and</strong> y that form a symbol of the four dimensional code are set to zero, no bit extraction is performed,<br />

<strong>and</strong> the following pair of subcarriers is taken into account. On the other h<strong>and</strong>, when only one of the two subcarriers


4-June-07 P1901_PRO_016_r0<br />

is set to zero, a special bit extraction is performed to obtain the word called t’, including the insertion of two zeroes<br />

in position 0 <strong>and</strong> 2 of the final t’ word to be introduced in the codec. Similarly, when only one of the two subcarriers<br />

is set to one, the word t’ includes the insertion of one zero in position 2. If both subcarriers are set to one, the word<br />

t’ includes the insertion of two zeroes in position 0 <strong>and</strong> 2. Note that combinations of one subcarrier with 1 <strong>and</strong><br />

another subcarrier with 0 are not allowed.<br />

The extracted group will be noted as t’ <strong>and</strong> calculated from the following table:<br />

Condition Binary word/comment<br />

x ≥ 2 y ≥<br />

x = 0 y ≥<br />

x ≥ 2 y =<br />

x = 1 y ≥<br />

2<br />

2<br />

0<br />

2<br />

x ≥ 2 y = 1<br />

( t t ... t t t )<br />

t z z−1<br />

´ = t Where<br />

Submission page 49 UPA-OPERA<br />

4<br />

z '= z = x + y −1<br />

( t t ... t 0 t 0)<br />

t´ z z−1<br />

2 1<br />

= Where<br />

z ' = z + 2 = y + 1<br />

( t t ... t 0 t 0)<br />

t´ z z−1<br />

2 1<br />

= Where<br />

z ' = z + 2 = x + 1<br />

( t t ... t 0 t )<br />

t z z −1<br />

´ = t Where<br />

3<br />

z ' = z + 1 = x + y<br />

( t t ... t 0 t )<br />

t z z −1<br />

´ = t Where<br />

3<br />

z ' = z + 1 = x + y<br />

x = 1 y = 1<br />

( 0 0)<br />

t t = Where<br />

´ 1<br />

3<br />

2<br />

2<br />

2<br />

1<br />

1<br />

1


4-June-07 P1901_PRO_016_r0<br />

x = 0 y =<br />

0<br />

Table 3 Bit extraction<br />

z ' = z + 2 = x + y + 1<br />

Bit extraction not necessary, no message bits<br />

being sent<br />

Since the maximum number of bits in a group will be 19, a 19 bits wide word called t´ will be formed from each<br />

two subcarriers, filling most significant bits with zeroes when z´ < 19. This word will be scrambled with a<br />

pseudor<strong>and</strong>om word generator.<br />

The bits per symbol (BPS) is defined by:<br />

3.5.2 Scrambling<br />

BPS = ∑ z<br />

i<br />

∀i<br />

∈ Symbol<br />

Submission page 50 UPA-OPERA<br />

i<br />

Equation 17<br />

Each of the bits from the pseudor<strong>and</strong>om generator shall be generated with the same polynomial structure<br />

initialized with different seeds for each bit (where bit 0 is the least significant bit).<br />

The pseudor<strong>and</strong>om sequence generator shall be the 10-bit PN generator with characteristic polynomial given by<br />

Equation 18.<br />

( x)<br />

f = +<br />

3 10<br />

1+ x x<br />

Equation 18<br />

At the beginning of each symbol, the registers of the PN generators shall be set with the corresponding seeds<br />

given by Table 4<br />

PN Seed


4-June-07 P1901_PRO_016_r0<br />

0 0x2bf<br />

1 0x3f0<br />

2 0x3ff<br />

3 0x28d<br />

4 0x2d7<br />

5 0x017<br />

6 0x1e4<br />

7 0x3d8<br />

8 0x337<br />

9 0x1f1<br />

10 0x2a3<br />

11 0x3f3<br />

12 0x000<br />

13 0x11f<br />

14 0x329<br />

15 0x177<br />

16 0x331<br />

17 0x119<br />

Submission page 51 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

18 0x350<br />

Table 4 Scrambling seed values<br />

All the pseudor<strong>and</strong>om generators will advance once for each pair of extracted carriers. If no bit extraction is<br />

performed (x=y=0) the pseudor<strong>and</strong>om generators will not advance. The structure of each pseudor<strong>and</strong>om<br />

generator that generates a u word from the extracted t’ word is shown in Figure 13<br />

The symbol number value shall be 1 for the channel reference symbol, <strong>and</strong> shall be incremented by 1 for every<br />

symbol there after.<br />

u 19<br />

OUTPUT<br />

BIT 18 (MSB)<br />

OUTPUT<br />

BIT 0 (LSB)<br />

u 1<br />

t´ 19<br />

10 9 8 7 6 5 4 3 2 1<br />

PN GENERATOR 0<br />

10 9 8 7 6 5 4 3 2 1<br />

Symbol number (MSB)<br />

Symbol number (LSB)<br />

t´ 1<br />

Figure 13 Scrambling<br />

PN GENERATOR 18<br />

Submission page 52 UPA-OPERA<br />

XOR


4-June-07 P1901_PRO_016_r0<br />

3.5.3 Bit conversion<br />

The binary word u = (uz´, uz´-1,… u1) determines two binary words v’=(v’z´-y,…,v ’ 0) <strong>and</strong> w’=( w’y-1,…,w’0),<br />

which are used to look up two constellations points in the encoder constellation table. As a first step, v <strong>and</strong> w<br />

are obtained from u, as shown in Figure 14. Finally, v’ <strong>and</strong> w’ are obtained from v <strong>and</strong> w. For the usual case of<br />

x≥2 <strong>and</strong> y≥2, z´=z=x+y-1, <strong>and</strong> v´=v <strong>and</strong> w´=w contain x <strong>and</strong> y bits respectively. For the special cases when<br />

x=0 <strong>and</strong> y≥2, z´=z+2=y+1, v´=v=(v1,v0) <strong>and</strong> w´=w=(wy-1,…,w0), when y=0 <strong>and</strong> x≥2, z´=z+2=x+1,<br />

w´=v=(v1,v0) <strong>and</strong> v´=w=(wx-1,…,w0), when x=1 <strong>and</strong> y≥2, z´=z+1=y, v´=v=(v1) <strong>and</strong> w´=w=(wy-1,…,w0), when<br />

y=1 <strong>and</strong> x≥2, z´=z+1=x, w´=v=(v1) <strong>and</strong> v´=w=(wx-1,…,w0) <strong>and</strong> when x=1 <strong>and</strong> y=1, z´=z+2=3, v´=(w1) <strong>and</strong><br />

w´=(w0).<br />

The bits (u3, u2, u1) determine (v1,v0) <strong>and</strong> (w1,w0) according to following figure:<br />

u z´<br />

u z´-1<br />

u z´-y+3<br />

u z´-y+2<br />

u z´-y+1<br />

u 4<br />

u 3<br />

u 2<br />

u 1<br />

Convolutional<br />

Encoder<br />

v1=u1⊕u3 v0=u3 w1=u0⊕u1⊕u2⊕u3 w0=u2⊕u3 Submission page 53 UPA-OPERA<br />

u 2<br />

u 1<br />

u 0<br />

Figure 14 Conversion of u to v <strong>and</strong> w<br />

The convolutional encoder shown in Figure 14 is a systematic encoder as shown in Figure 15. At the beginning<br />

of the encoding of each subcarrier group (1536 or 192 when HURTO mode is active), the convolutional encoder<br />

state is initialized to (0,0,0,0). No special operation to terminate the code is performed.<br />

w y-1<br />

w y-2<br />

w 2<br />

v z´-y<br />

v z´-y-1<br />

v 2<br />

v 1<br />

v 0<br />

w 1<br />

w 0


4-June-07 P1901_PRO_016_r0<br />

u 2<br />

u 1<br />

S 2<br />

Delay<br />

S 1<br />

Delay Delay Delay<br />

Submission page 54 UPA-OPERA<br />

S 3<br />

Figure 15 Convolutional encoder<br />

The remaining bits of v <strong>and</strong> w are obtained from the less significant <strong>and</strong> more significant parts of (uz´, uz´-1,…,<br />

u4), respectively. When x≥2 <strong>and</strong> y≥2, v´=v=(uz´-y+2, uz´-y+1,..., u4,v1,v0) <strong>and</strong> w´=w=(uz´, uz´-1,…, uz´-y+3,w1,w0).<br />

When x=0 or y=0 (but not both), v= (v1, v0), <strong>and</strong> it will be assigned to the zero loading subcarrier (v´ when only<br />

x=0 but not y <strong>and</strong> w´ when y=0 but not x). w will have y bits in the first case <strong>and</strong> x bits in the second, <strong>and</strong> will<br />

be assigned to the non zero loading subcarrier.<br />

When x=1 or y=1 (but not both), v1 will be assigned to the 1 loading subcarrier (v´ when only x=1 but not y <strong>and</strong><br />

w´ when y=1 but not x), v0 is dropped. w will have y bits in the first case <strong>and</strong> x bits in the second, <strong>and</strong> will be<br />

assigned to the non zero loading subcarrier.<br />

When x=1 <strong>and</strong> y=1, v´=(w1) <strong>and</strong> w’=(w0)<br />

The binary word v´ is input first to the constellation encoder, <strong>and</strong> the binary word w´ last.<br />

3.5.4 Constellation encoder<br />

Each of the two resulting binary words after 4D-TCM process, called v’ <strong>and</strong> w’, represent an amplitude ak <strong>and</strong><br />

an increment to previous phase, called Δbk that will perform a new constellation point to be transmitted in one<br />

subcarrier. The first word to be processed <strong>and</strong> transmitted will be v’ <strong>and</strong> then w’. Since the mapping process to<br />

amplitude <strong>and</strong> phase increment will be the same for v’ <strong>and</strong> w’, we consider the following description based in a<br />

binary word called I that can be v’ or w’ indistinctly.<br />

In the following table, mapping for each bit-loading <strong>and</strong> the pair (ak, Δbk) <strong>and</strong> its relationship with the binary<br />

word I is shown.<br />

Bit-loading ak Δbk<br />

S 0<br />

u 2<br />

u 1<br />

u 0


4-June-07 P1901_PRO_016_r0<br />

1 0,0,0,0 0,0,0,0,0, I0<br />

2 0,0,0,0 0,0,0,0,I1, I1⊕I0<br />

3 0,0,0,I1 0,0,0,0,I2, I0<br />

4 0,0,0,I1 0,0,0,I2, I2⊕I3, I0<br />

5 0,0,I4, I1 0,0,0,I2, I2⊕I3, I0<br />

6 0,0,I5, I1 0,0,I2, I2⊕I3, I3⊕I4, I0<br />

7 0,I6,I6⊕I5, I1 0,0,I2, I2⊕I3, I3⊕I4, I0<br />

8 0,I7, I7⊕I6, I1 0,I2, I2⊕I3, I3⊕I4, I4⊕I5, I0<br />

9 I8, I8⊕I7, I8⊕I7⊕I6, I1 0,I2, I2⊕I3, I3⊕I4, I4⊕I5, I0<br />

10 I9, I9⊕I8, I9⊕I8⊕I7, I1 I2, I2⊕I3, I3⊕I4, I4⊕I5, I5⊕I6, I0<br />

Table 5 Constellation encoder<br />

Where the binary word I will be first v´<strong>and</strong> then w´ till end all the 1536 subcarriers.<br />

If no bit extraction is performed (x=y=0) the output of the constellation encoder shall be ak= (0,0,0,0) <strong>and</strong> Δbk<br />

=(0,0,0,0,0,0) for both subcarriers.<br />

3.6 SUBCARRIER MODULATION<br />

Each subcarrier of the <strong>Control</strong> or Data OFDM symbols shall be modulated using the ADPSK (Amplitude<br />

Differential Phase Shift Keying) modulation.<br />

Equation 19 defines the ADPSK constellation of M phases <strong>and</strong> N rings (MxN ADPSK):<br />

s<br />

k<br />

jθk<br />

( A a ) e<br />

=<br />

λ +<br />

Submission page 55 UPA-OPERA<br />

k


4-June-07 P1901_PRO_016_r0<br />

Where:<br />

Equation 19<br />

• k is the time index representing the k-th OFDM symbol. Index 0 corresponds to the channel reference<br />

symbol (see 3.8.1).<br />

• s k is the modulator output for a given subcarrier.<br />

• λ is the factor to normalize the constellation to unit power:<br />

λ =<br />

A<br />

2<br />

+<br />

⎛ 2N<br />

−1⎞<br />

( N −1)<br />

⎜ A + ⎟<br />

⎝ 6 ⎠<br />

Submission page 56 UPA-OPERA<br />

1<br />

Equation 20<br />

• a k , ak ∈{ 0, 1,<br />

Κ , N −1}<br />

, represents the information coded in the amplitude, as supplied by the<br />

constellation encoder (see 3.5.4).<br />

• θ k st<strong>and</strong>s for the absolute phase of the modulated signal obtained as follows:<br />

( θ ( 2π<br />

k 1 ) bk<br />

) mod π<br />

+<br />

θ k<br />

2<br />

M Δ<br />

= −<br />

Equation 21<br />

Equation 21 applies for k>0 only. bk<br />

Δbk ∈ 0, 1,<br />

Κ , M −1<br />

, represents the information coded in the<br />

phase increment, as supplied by the constellation encoder (see 3.5.4).<br />

Δ , { }<br />

A is a shaping parameter <strong>and</strong> represents the ring offset from the centre of the constellation.<br />

Parameters M, N <strong>and</strong> A are determined by the number of bits per subcarrier indicated by the bit-loading table<br />

according to Table 6.<br />

Bit-loading Constellation M N A Bits coded in the Bits coded in


4-June-07 P1901_PRO_016_r0<br />

points phase increment the amplitude<br />

2 4 4 1 1 2 0<br />

3 8 4 2 0.8 2 1<br />

4 16 8 2 1.7 3 1<br />

5 32 8 4 1.7 3 2<br />

6 64 16 4 2.5 4 2<br />

7 128 16 8 2.6 4 3<br />

8 256 32 8 5 5 3<br />

9 512 32 16 4.6 5 4<br />

10 1024 64 16 8.6 6 4<br />

Table 6 Constellation parameters<br />

The 4D-TCM provides the a k <strong>and</strong> Δ bk<br />

values to the ADPSK Modulator according to the bit-loading table. If<br />

the bit-loading table indicates that a subcarrier does not carry any information (0 bits per subcarrier) this<br />

subcarrier shall be modulated using 2 bits.<br />

3.7 OFDM MODULATION<br />

This section describes how the input constellations are grouped to create OFDM symbols. Special symbols for<br />

synchronization <strong>and</strong> SOT are also described.<br />

The signals will be described in a complex base-b<strong>and</strong> signal notation. Different implementations may be<br />

possible, if the signal transmitted to the channel is the same.<br />

Submission page 57 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.7.1 <strong>Control</strong> <strong>and</strong> Data symbols<br />

There shall be three symbol types that will define the signal b<strong>and</strong>width used by the system. The three types of<br />

symbols will be referred to as Type I (30 MHz signal b<strong>and</strong>width), Type II (20 MHz signal b<strong>and</strong>width) <strong>and</strong> Type<br />

III (10 MHz signal b<strong>and</strong>width). The symbols are defined based on three system clocks that will define the signal<br />

b<strong>and</strong>width. A node shall be operating in one of the three types at a given time. Specifically, symbol types are<br />

not mixed in a PPDU, <strong>and</strong> the transition from the use of a symbol type to a different one can take in the order of<br />

seconds.<br />

Table 7 lists some timing parameters of the OFDM modulation.<br />

Parameter Type I Type II Type III Units<br />

System clock 40 26 . 6<br />

) 13 . 3<br />

) MHz<br />

NSD: Number subcarriers 1536 1536 1536 Carriers<br />

NIDFT: IDFT interval 2048 2048 2048 Samples<br />

TIDFT: IDFT interval 51.2 76.8 153.6 μs<br />

NCP: Cyclic prefix 800 532 268 Samples<br />

TCP: Cyclic prefix 20 19.95 20.1 μs<br />

NSYM: Symbol interval 2848 2580 2316 Samples<br />

TSYM: Symbol interval 71.2 96.75 173.7 μs<br />

Table 7 OFDM modulation parameters<br />

The stream of complex numbers coming from the subcarrier modulator is divided into groups of NSD=1536 to<br />

form OFDM symbols.<br />

If a complex 2048-point IDFT is used, the 1536 subcarriers shall be mapped in the way shown in Figure 16.<br />

Submission page 58 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Frequency<br />

Domain<br />

Inputs<br />

Null<br />

#1<br />

#2<br />

.<br />

.<br />

#768<br />

Null<br />

.<br />

.<br />

Null<br />

#769<br />

.<br />

.<br />

#1536<br />

Null<br />

.<br />

.<br />

.<br />

.<br />

.<br />

.<br />

0<br />

1<br />

2<br />

.<br />

.<br />

768<br />

769<br />

.<br />

.<br />

1278<br />

1279<br />

.<br />

.<br />

2046<br />

2047<br />

Submission page 59 UPA-OPERA<br />

IDFT<br />

0<br />

1<br />

2<br />

.<br />

.<br />

768<br />

769<br />

.<br />

.<br />

1278<br />

1279<br />

.<br />

.<br />

2046<br />

2047<br />

Figure 16 Subcarrier mapping<br />

.<br />

.<br />

.<br />

.<br />

.<br />

.<br />

Time<br />

Domain<br />

Outputs<br />

After the inverse Fourier transform, the symbol is cyclically extended by NCP samples to create the “cyclic<br />

prefix”.<br />

3.7.2 Time domain windowing<br />

The symbol may be multiplied by a windowing function to smooth transitions between the symbols. However,<br />

the binding requirement is the spectral mask as detailed in 3.13. Time domain windowing is just one way to<br />

achieve that goal. The implementer may use other methods to achieve the same goal such as time domain<br />

filtering. Therefore the transition shape <strong>and</strong> duration (NW) are not specified here. In the particular case where<br />

NW=0 the window degenerates into a rectangular pulse of value 1 <strong>and</strong> duration NSYM. In the general case where<br />

NW>0 the window extends over more than one symbol (NSYM+NW) <strong>and</strong> the symbols overlap as shown in Figure<br />

17. The general expression for the windowing function is given in Equation 22.<br />

⎧<br />

⎪<br />

w(<br />

n)<br />

= ⎨<br />

⎪ f ( N<br />

⎪<br />

⎩<br />

W<br />

f ( n)<br />

1<br />

+ N<br />

SYM<br />

0<br />

− n −1)<br />

Equation 22<br />

And the windowing function fulfils the following condition:<br />

N<br />

SYM<br />

f(n) +<br />

f(N w - n -1)<br />

= 1<br />

0 ≤ n < NW<br />

N w ≤ n < N SYM<br />

≤ n < NW<br />

+ N<br />

elsewhere<br />

SYM


4-June-07 P1901_PRO_016_r0<br />

N W<br />

NCP<br />

Equation 23<br />

Submission page 60 UPA-OPERA<br />

N SYM<br />

N IFFT<br />

Figure 17 Windowing<br />

The maximum duration of the window (Nw) depends on the symbol Type used:<br />

• Type I: 128 samples<br />

• Type II: 128 samples<br />

• Type III: 64 samples<br />

The OFDM symbol can be expressed in mathematical form as inEquation 24.<br />

s<br />

768<br />

2046<br />

⎧<br />

⎛ j2πk<br />

⎞<br />

⎛ j2πk<br />

( n)<br />

= k SYM wSYM<br />

( n)<br />

⎨∑<br />

c(<br />

k,<br />

i)<br />

exp⎜<br />

( n − N CP − N W ) ⎟ + ∑ c(<br />

k − 510,<br />

i)<br />

exp⎜<br />

( n − N<br />

⎩ k = 1 ⎝ 2048<br />

⎠ k = 1279<br />

⎝ 2048<br />

Equation 24<br />

i<br />

Where<br />

− i is the i-th OFDM symbol; i = 0, 1, …<br />

− n is the sample index; 0 ≤ n < NSYM+NW<br />

− kSYM is a normalization factor, that shall be chosen in order to meet the PSD <strong>and</strong> modulation accuracy<br />

requirements.<br />

− wSYM(n) is a windowing function<br />

− c(k,i) is the k+iNSD complex value from the subcarrier modulation block<br />

CP<br />

− N<br />

W<br />

⎞⎫<br />

) ⎟⎬<br />

⎠⎭


4-June-07 P1901_PRO_016_r0<br />

Several of these symbols are concatenated in a burst as expressed in Equation 25<br />

3.8 REFERENCE SIGNALS<br />

3.8.1 Channel reference symbol<br />

s ( n)<br />

= ∑ si<br />

( n − iN SYM )<br />

i<br />

Equation 25<br />

The channel reference symbol comes before the data <strong>and</strong> control symbols. The channel reference symbol<br />

followsEquation 24 with<br />

c( k,<br />

i)<br />

= exp( jφk<br />

)<br />

Equation 26<br />

where φk is a r<strong>and</strong>om phase picked from a uniform distributed r<strong>and</strong>om variable between [0,2π[. The channel<br />

reference symbol gives the initial reference for the subcarrier modulation (3.6)<br />

3.8.2 Synchronization symbol<br />

The synchronization symbol comes before the channel reference symbol. The synchronization symbol follows<br />

Equation 24 with<br />

c(<br />

k,<br />

i)<br />

⎧<br />

= ⎨<br />

⎩<br />

2 exp(<br />

Submission page 61 UPA-OPERA<br />

0<br />

jφ<br />

)<br />

k<br />

Equation 27<br />

k<br />

k<br />

even<br />

where φk is a r<strong>and</strong>om phase picked from a uniform distributed r<strong>and</strong>om variable between [0,2π[.<br />

3.8.3 Start Of Transmission (SOT)<br />

A start of transmission signal shall always be sent before the synchronization symbol. The SOT is also used as<br />

response to the different polling frames (See 4.3.5 <strong>and</strong> 4.3.6). In reception the SOT may be used for AGC. The<br />

odd


4-June-07 P1901_PRO_016_r0<br />

description of the SOT generation is always based on a 40 MHz clock, independently of the symbol type used<br />

by the node. The number of active subcarriers in the SOT depends on the symbol type used.<br />

The SOT is composed of OFDM symbols that may be generated with a complex 256-point IDFT as shown in<br />

Equation 28.<br />

Where<br />

s<br />

D,<br />

i<br />

− kD is a normalization factor<br />

N ⎧ D 2<br />

255<br />

⎛ j2πk<br />

⎞<br />

⎛ j2πk<br />

⎞⎫<br />

( n)<br />

= kDw<br />

D ( n)<br />

⎨∑<br />

c(<br />

k)<br />

exp⎜<br />

n⎟<br />

+ ∑c(<br />

k)<br />

exp⎜<br />

n⎟⎬<br />

⎩ k=<br />

1 ⎝ 256 ⎠ k=<br />

255−N<br />

D 2 ⎝ 256 ⎠⎭<br />

Equation 28<br />

− wD(n) is a windowing function, that follows Equation 22 <strong>and</strong> Equation 23. The duration of the windowing<br />

function is between 6.4 μs <strong>and</strong> 8 μs depending on the transition duration <strong>and</strong> is depicted in Figure 18.<br />

N W≤64 samples<br />

N SYM=N IFFT=256 samples<br />

Figure 18 SOT Windowing<br />

− ND is 192 (Type I), 128 (Type II) or 64 (Type III), so that the frequencies occupied by the SOT are the same<br />

as for the data <strong>and</strong> control symbols.<br />

− c(k) = exp(jφk) where φk is a r<strong>and</strong>om phase picked from a uniform distributed r<strong>and</strong>om variable between<br />

[0,2π[<br />

Six of these symbols are concatenated to form the SOT.<br />

Submission page 62 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

s<br />

SOT<br />

( n)<br />

=<br />

Submission page 63 UPA-OPERA<br />

5<br />

∑<br />

i=<br />

0<br />

s<br />

D,<br />

i<br />

Equation 29<br />

( n − 256i)<br />

Therefore the maximum duration of the SOT (if the maximum window size is used) will be 40 μs.<br />

3.8.4 Channel estimation symbols<br />

The channel estimation symbols are used to estimate the channel quality at the receiver side. After the channel<br />

estimation the receiver may send a new bit-loading table to the transmitter (see 9.1.2). These symbols shall be<br />

known by the transmitter <strong>and</strong> the receiver to allow a correct estimation under all conditions. Therefore, a<br />

pseudor<strong>and</strong>om sequence generator shall be used as the modulator input instead of the output from the 4D-TCM<br />

encoder.<br />

The pseudor<strong>and</strong>om sequence generator shall be the 11-bit PN generator with characteristic polynomial given by<br />

Equation 30.<br />

( x)<br />

f = +<br />

2 11<br />

1+ x x<br />

Equation 30<br />

This symbol shall be modulated using 2 bits per subcarrier. Therefore, two 11-bit PN generators with different<br />

seeds shall be used. Figure 19 explains how the Δ bk<br />

value is formed. The SYMBOL NUMBER value is 1 for<br />

the channel reference symbol, <strong>and</strong> is incremented by 1 for every symbol there after.


4-June-07 P1901_PRO_016_r0<br />

SYMBOL NUMBER<br />

(BIT 1)<br />

Δ b k (BIT 1)<br />

OUTPUT<br />

BIT 1 (MSB)<br />

OUTPUT<br />

BIT 0 (LSB)<br />

Δ b k (BIT 0, LSB)<br />

PN GENERATOR 1<br />

11 10 9 8 7 6 5 4 3 2 1<br />

PN GENERATOR 0<br />

11 10 9 8 7 6 5 4 3 2 1<br />

SYMBOL NUMBER<br />

(BIT 0, LSB)<br />

Submission page 64 UPA-OPERA<br />

XOR<br />

Figure 19 Channel estimation symbol generation<br />

At the beginning of each Channel estimation symbol, the registers of the PN generators shall be set with the<br />

corresponding seed given by Table 8. So, the value to be modulated in the phase increment of the first valid<br />

subcarrier of the OFDM symbol will be determined by the seeds <strong>and</strong> the appropriate symbol number. The<br />

contents of the registers of the PN generators shall be updated before calculating the phase increment for each<br />

of the next subcarriers.<br />

Since two bits of the symbol number are XORed with the output of the PN generators, four different symbols<br />

will be generated. These four symbols will be repeated four times to create a sixteen-symbol sequence.<br />

Seed<br />

PN Generator 1 0x25E<br />

PN Generator 0 0x3C1<br />

Table 8 PN generator seeds


4-June-07 P1901_PRO_016_r0<br />

3.9 CARRIER FREQUENCY<br />

The complex baseb<strong>and</strong> digital signal is converted to analog signal <strong>and</strong> IQ modulated. I(t) <strong>and</strong> Q(t) are the inphase<br />

<strong>and</strong> quadrature analog signals corresponding to the real <strong>and</strong> imaginary components of the complex<br />

baseb<strong>and</strong> signal respectively. The actual transmitted signal is related to them by the following relation:<br />

( t)<br />

= I(<br />

t)<br />

cos( 2πf<br />

t)<br />

− Q(<br />

t)<br />

sin( 2πf<br />

t)<br />

rTX c<br />

c<br />

Equation 31<br />

f c denotes the carrier centre frequency, which must be a multiple of 156.25 KHz.<br />

3.10 COMMUNICATION MODES<br />

f<br />

Transmission modes can be defined by specifying a carrier frequency ( c ), <strong>and</strong> symbol Type (I, II or III) <strong>and</strong>,<br />

optionally, a power mask. Any two nodes that use a common communication mode shall be able to<br />

communicate.<br />

The carrier frequency shall be higher than the b<strong>and</strong>width of the baseb<strong>and</strong> signal in negative frequencies in order<br />

to avoid ICI <strong>and</strong> shall place the signal b<strong>and</strong>width in frequencies up to 100 MHz.<br />

3.11 <strong>PHY</strong> PARAMETER SPECIFICATION<br />

Table 9 contains the values for the <strong>PHY</strong> parameters.<br />

Parameter Value Description<br />

INTER PPDU SPACE 1 189 μs See 3.2 <strong>and</strong> 4.1<br />

INTER PPDU SPACE 2 126 μs See 3.2 <strong>and</strong> 4.1<br />

Table 9 <strong>PHY</strong> parameter specification<br />

Submission page 65 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.12 CLOCK SYNCHRONIZATION<br />

3.12.1 General<br />

Clock frequency synchronization shall be performed <strong>and</strong> must be accurate enough to allow for maximum bit<br />

loading 10 bits on all subcarriers.<br />

3.12.2 Clock synchronisation concept<br />

With the exception of the HE of a BPL cell, all BPL nodes belonging to the same BPL cell must adapt their<br />

clock frequency until a unique common clock frequency is reached. This common clock frequency is the<br />

reference clock frequency dictated by the HE. All other nodes (Repeaters <strong>and</strong> CPEs) of the BPL cell will<br />

synchronize their clock frequency to this reference clock frequency.<br />

Both transmitter <strong>and</strong> receiver of a BPL node shall use the same common clock frequency.<br />

3.12.3 System reference clock error tolerance<br />

Without noticeable loss of performance, BPL nodes shall be able to cope with a relative clock frequency error<br />

of up to twice the maximum absolute frequency error of the system reference clock. The absolute frequency<br />

error of the system reference clock in any BPL equipment shall not exceed ±100 ppm.<br />

3.13 TRANSMITTER ELECTRICAL SPECIFICATION<br />

The following specification establishes the minimum transmitter technical requirements for interoperability<br />

maintaining full performance. Unless otherwise stated, transmitter specifications assume a 50 Ω load between<br />

line <strong>and</strong> neutral terminals. All transmitter output voltages as well as spurious transmissions are specified as the<br />

voltage measured at the line terminal with respect to the neutral terminal.<br />

3.13.1 Transmit PSD<br />

The PSD in the emission point must be compliant with regulations in effect in the country where the system is<br />

used.<br />

The ripple in the working b<strong>and</strong> shall be less than ±1 dB.<br />

Besides there will be a transmit spectrum mask that will depend on the regulation of each country or area. All<br />

nodes shall use a configurable power masking with 1 dB of granularity in order to be compliant with that mask,<br />

achieving notches with at least 35 dBs deep<br />

Submission page 66 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The transmitter must provide means to modify the transmission power of each subcarrier with a granularity of at<br />

least 6 dB. Once the transmitter introduces the notches in the transmitted signal, other mechanisms like the<br />

ABLP (see 9.1.2) will automatically adapt accordingly.<br />

3.13.2 Modulation error vector magnitude<br />

Modulation errors may be caused by quantization in the digital processing <strong>and</strong> by linear <strong>and</strong> non-linear<br />

distortion in the analogue processing of a BPL transmitter.<br />

The normalized mean modulation error vector magnitude is defined as the RMS value of the modulation error<br />

vector magnitude divided by the RMS value of the modulation vector.<br />

• N denotes the number of subcarriers.<br />

•<br />

•<br />

S(<br />

k)<br />

denotes the measured complex symbol of the k-th subcarrier.<br />

S0 ( k)<br />

denotes the ideal complex symbol of the k-th subcarrier.<br />

The RMS error vector magnitude may be expressed as:<br />

EVM<br />

=<br />

1<br />

N<br />

∑<br />

k=<br />

1<br />

( k)<br />

− S ( k)<br />

Submission page 67 UPA-OPERA<br />

N<br />

1<br />

N<br />

S<br />

N<br />

∑<br />

k=<br />

1<br />

S<br />

0<br />

0<br />

( k)<br />

Equation 32<br />

<strong>and</strong> can be measured with a multi-tone error vector magnitude meter.<br />

The EVM shall not exceed 1%<br />

3.13.3 Power <strong>Control</strong><br />

2<br />

2<br />

⋅100%<br />

This specification allows for the optional implementation of a Power <strong>Control</strong> mechanism, using the BPS <strong>and</strong> Rx<br />

Att information supplied in the ABLP packet (9.1.2.4) <strong>and</strong> the Power <strong>Control</strong> bits in the Token Announce (See<br />

4.4.1). The target of the power control is to transmit the lowest power that attains a given performance.<br />

Therefore a node may adjust its transmission power until the desired value of BPS is reached. The process is<br />

depicted in Figure 20.


4-June-07 P1901_PRO_016_r0<br />

Power <strong>Control</strong><br />

task<br />

Check currently<br />

negotiated bps<br />

Lower than<br />

Th_bottom?<br />

Periodically or not<br />

Yes<br />

Submission page 68 UPA-OPERA<br />

No<br />

Greater than<br />

Th_top?<br />

Yes<br />

Increase Txg Decrease Txg<br />

Figure 20 Power control algorithm<br />

3.14 RECEIVER ELECTRICAL SPECIFICATION<br />

Unless otherwise stated, all signals are specified as the voltage measured at the line terminal with respect to the<br />

neutral terminal.<br />

3.14.1 Receiver Input Impedance<br />

When not transmitting, the system shall present a minimum impedance of 40 Ω in the working b<strong>and</strong>, measured<br />

between line <strong>and</strong> neutral terminals.<br />

No


4-June-07 P1901_PRO_016_r0<br />

3.14.2 Receiver Input Referred Noise<br />

The system shall present an IRN level lower than –148 dBm/Hz when it sets the maximum reception gain.<br />

3.14.3 Receiver Input Signal<br />

The receiver shall maintain full performance with a signal input level of 8 Vpp.<br />

The ripple introduced by the system in the working b<strong>and</strong> shall be less than ±1 dB.<br />

The sensitivity of the receiver is defined as follows:<br />

For an input signal with flat spectrum <strong>and</strong> using Type I OFDM symbols, the minimum input level at which the<br />

system shall receive 2 Mbps of UDP traffic with 0% PLR is:<br />

• 0.17 mVrms<br />

• -137 dBm/Hz referred to 50 Ω<br />

3.15 <strong>PHY</strong> service specification (<strong>PHY</strong> SAP)<br />

3.15.1 <strong>PHY</strong> service primitives<br />

The following table shows <strong>PHY</strong> DATA <strong>and</strong> MNT primitives:<br />

Primitive Type<br />

Submission page 69 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

<strong>PHY</strong>-DATA.req Request<br />

<strong>PHY</strong>-DATA.cnf Confirm<br />

<strong>PHY</strong>-DATA.ind Indicate<br />

<strong>PHY</strong>-MNT-SNR.ind Indication<br />

<strong>PHY</strong>-MNT-BPC-SET.req Request<br />

<strong>PHY</strong>-MNT-BPC-SET.cnf Confirm<br />

<strong>PHY</strong>-MNT-BPC-GET.req Request<br />

<strong>PHY</strong>-MNT-BPC-GET.cnf Confirm<br />

<strong>PHY</strong>-MNT-RXGAIN-GET.req Request<br />

<strong>PHY</strong>-MNT-RXGAIN-GET.cnf Confirm<br />

<strong>PHY</strong>-MNT-TXGAIN-SET.req Request<br />

<strong>PHY</strong>-MNT-TXGAIN-SET.cnf Confirm<br />

<strong>PHY</strong>-MNT-TXGAIN-GET.req Request<br />

<strong>PHY</strong>-MNT-TXGAIN-GET.cnf Confirm<br />

<strong>PHY</strong>-MNT-POWMASK-GET.req Request<br />

<strong>PHY</strong>-MNT-POWMASK-GET.cnf Confirm<br />

<strong>PHY</strong>-MNT-POWMASK-SET.req Request<br />

<strong>PHY</strong>-MNT-POWMASK-SET.cnf Confirm<br />

<strong>PHY</strong>-MNT-SYNC.ind Indication<br />

<strong>PHY</strong>-MNT-SYNC.req Request<br />

<strong>PHY</strong>-MNT-SYNC.cnf Confirm<br />

3.15.2 <strong>PHY</strong> service primitives parameters<br />

Table 10 <strong>PHY</strong> SAP primitives<br />

The following table shows <strong>PHY</strong> DATA <strong>and</strong> MNT parameters:<br />

Parameter Associated Primitive Value<br />

Submission page 70 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

MPDU <strong>PHY</strong>-DATA.req<br />

<strong>PHY</strong>-DATA.ind<br />

<strong>MAC</strong> Protocol Data Unit<br />

snr_measure, port <strong>PHY</strong>-MNT-SNR.ind SNR measure with remote<br />

node in Rx<br />

Rx port of the remote<br />

transmitter node<br />

bpc_type, port, tonemap <strong>PHY</strong>-MNT-BPC-SET.req<br />

Tx, Rx<br />

<strong>PHY</strong>-MNT-BPC-SET.cnf<br />

Tx or Rx port<br />

<strong>PHY</strong>-MNT-BPC-GET.cnf<br />

Updated tonemap<br />

bpc_type, port <strong>PHY</strong>-MNT-BPC-GET.req Tx, Rx<br />

Local Tx or Rx port<br />

port <strong>PHY</strong>-MNT-RXGAIN-GET.req Local Rx port<br />

port <strong>PHY</strong>-MNT-TXGAIN-GET.req<br />

<strong>PHY</strong>-MNT-TXGAIN-SET.cnf<br />

<strong>PHY</strong>-MNT-POWMASK-GET.req<br />

<strong>PHY</strong>-MNT-POWMASK-SET.cnf<br />

<strong>PHY</strong>-MNT-LINK-STATUS.req<br />

<strong>PHY</strong>-MNT-LINK-STATUS.cnf<br />

Local Tx port<br />

port, gain <strong>PHY</strong>-MNT-RXGAIN-GET.cnf Local Rx port<br />

[0-7] Rx gain level<br />

port, gain <strong>PHY</strong>-MNT-TXGAIN-GET.cnf<br />

Local Tx port<br />

<strong>PHY</strong>-MNT-TXGAIN-SET.req<br />

Tx gain<br />

port, pow_mask <strong>PHY</strong>-MNT-POWMASK-GET.cnf<br />

Local Tx port<br />

<strong>PHY</strong>-MNT-POWMASK-SET.req<br />

Tx power mask<br />

sync_type, mode <strong>PHY</strong>-MNT-SYNC.ind [sync|sync _lost]<br />

The Tx / Rx signal mode<br />

mode, timeout <strong>PHY</strong>-MNT-SYNC.req The Tx / Rx signal mode<br />

Time to sense the channel<br />

Mode, result <strong>PHY</strong>-MNT-SYNC.cnf The Tx/Rx signal mode<br />

Success/fail<br />

Legend : Tx = Transmission Rx = Reception<br />

3.15.3 <strong>PHY</strong>-DATA.req<br />

3.15.3.1 Function<br />

Table 11 <strong>PHY</strong> SAP parameters<br />

This primitive requests a transfer of a MPDU from a local <strong>MAC</strong> layer entity.<br />

Submission page 71 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.3.2 Semantics of the service primitive<br />

<strong>PHY</strong>-DATA.req(MPDU):<br />

• MPDU: <strong>MAC</strong> Protocol Data Unit<br />

3.15.3.3 When generated<br />

The primitive is generated by the <strong>MAC</strong> layer entity when a MPDU is to be transferred.<br />

3.15.3.4 Effect of receipt<br />

The <strong>PHY</strong> layer entity starts the sending of the MPDU.<br />

3.15.4 <strong>PHY</strong>-DATA.cnf<br />

3.15.4.1 Function<br />

This primitive has local significance <strong>and</strong> provides the <strong>MAC</strong> layer with status information (sending finished) of the<br />

corresponding preceeding <strong>PHY</strong>-DATA.req primitive.<br />

3.15.4.2 Semantics of the service primitive<br />

This primitive has no parameters.<br />

3.15.4.3 When generated<br />

The primitive is passed from the <strong>PHY</strong> layer entity to the <strong>MAC</strong> layer entity to indicate that the previous MPDU has<br />

been sent <strong>and</strong> the <strong>PHY</strong> layer is available to send new MPDUs.<br />

3.15.4.4 Effect of receipt<br />

The <strong>MAC</strong> layer entity is aware that the <strong>PHY</strong> is available to send new MPDUs, <strong>and</strong> can issue new <strong>PHY</strong>-DATA.req<br />

primitives.<br />

3.15.5 <strong>PHY</strong>-DATA.ind<br />

3.15.5.1 Function<br />

This primitive defines the transfer of a received MPDU from the <strong>PHY</strong> layer entity to the <strong>MAC</strong> layer entity.<br />

Submission page 72 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.5.2 Semantics of the service primitive<br />

<strong>PHY</strong>-DATA.ind(MPDU):<br />

• MPDU: <strong>MAC</strong> Protocol Data Unit.<br />

3.15.5.3 When generated<br />

The primitive is passed from the <strong>PHY</strong> layer entity to the <strong>MAC</strong> layer entity to indicate the arrival of a MPDU.<br />

3.15.5.4 Effect of receipt<br />

The <strong>MAC</strong> layer entity processes the newly received MPDU.<br />

3.15.6 <strong>PHY</strong>-MNT-SNR.ind<br />

3.15.6.1 Function<br />

This primitive indicates that the <strong>Physical</strong> layer entity has done a SNR measure with another node, <strong>and</strong> defines the<br />

transfer of the SNR measure to the Management layer entity.<br />

3.15.6.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-SNR.ind (snr_measure, port):<br />

• snr_measure: SNR measure with remote node in reception<br />

• port: reception port of the remote transmitter node<br />

3.15.6.3 When generated<br />

The primitive is generated when the node measures the SNR with another node which transmitted an SNR frame.<br />

3.15.6.4 Effect of receipt<br />

The Management layer entity will decide if the tonemap must be changed for that port depending on the new<br />

snr_measure <strong>and</strong> the current tonemap. If the tonemap must change, an ABLP message shall be sent to the other<br />

node by means of the ETH.req primitive.<br />

3.15.7 <strong>PHY</strong>-MNT-BPC-SET.req<br />

3.15.7.1 Function<br />

This primitive request the change of the tonemap used to transmit/receive to/from a remote node.<br />

Submission page 73 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.7.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-BPC-SET.req (bpc_type, port, tonemap)<br />

• bpc_type: tx, rx (transmission, reception)<br />

• port: transmission or reception port<br />

• tonemap: updated tonemap to be used<br />

3.15.7.3 When generated<br />

The primitive is generated when the transmission/reception tonemap table with a node must be changed according<br />

to the ABLP protocol<br />

3.15.7.4 Effect of receipt<br />

The tonemap used by the Physiscal layer to transmit/receive to/from a remote node is changed.<br />

3.15.8 <strong>PHY</strong>-MNT-BPC-SET.cnf<br />

3.15.8.1 Function<br />

This primitive informs the Management layer that the tonemap has been updated.<br />

3.15.8.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-BPC-SET.cnf (bpc_type, port, tonemap)<br />

• bpc_type: tx, rx (transmission, reception)<br />

• port: transmission or reception port<br />

• tonemap: updated tonemap<br />

3.15.8.3 When generated<br />

The primitive is generated by the <strong>Physical</strong> layer to confirm the Management layer that the tonemap has been<br />

updated.<br />

3.15.8.4 Effect of receipt<br />

Management layer can use the updated tonemap for throughput <strong>and</strong> class of service calculations.<br />

Submission page 74 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.9 <strong>PHY</strong>-MNT-BPC-GET.req<br />

3.15.9.1 Function<br />

This primitive requests the tonemap used to transmit/receive to/from a remote node.<br />

3.15.9.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-BPC-GET.req (bpc_type, port) :<br />

• bpc_type: tx, rx<br />

• port: local transmission or reception port<br />

3.15.9.3 When generated<br />

The primitive is generated when the Management layer needs to know the current tonemap used to transmit/receive<br />

to/from a remote node.<br />

3.15.9.4 Effect of receipt<br />

The current tonemap is read by the <strong>Physical</strong> layer <strong>and</strong> passed to the Management layer by means of the <strong>PHY</strong>-MNT-<br />

BPC-GET.cnf primitive.<br />

3.15.10 <strong>PHY</strong>-MNT-BPC-GET.cnf<br />

3.15.10.1 Function<br />

This primitive indicates the result of the previously requested tonemap.<br />

3.15.10.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-BPC-GET.cnf (bpc_type, port, tonemap)<br />

• bpc_type: tx, rx<br />

• port: local transmission or reception port<br />

• tonemap: current tonemap<br />

3.15.10.3 When generated<br />

The primitive is passed by the <strong>Physical</strong> layer entity to the Management layer entity to provide the requested<br />

tonemap.<br />

Submission page 75 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.10.4 Effect of receipt<br />

The Maganement layer receives the tonemap.<br />

3.15.11 <strong>PHY</strong>-MNT-RXGAIN-GET.req<br />

3.15.11.1 Function<br />

This primitive requests the <strong>Physical</strong> layer the reception gain being used to receive from a remote node.<br />

3.15.11.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-RXGAIN-GET.req (port):<br />

• port: reception port<br />

3.15.11.3 When generated<br />

The primitive is generated when the Management layer needs to know the reception gain being used in reception<br />

with another node.<br />

3.15.11.4 Effect of receipt<br />

The current reception gain is obtained by the <strong>Physical</strong> layer <strong>and</strong> passed to the Management layer by means of the<br />

<strong>PHY</strong>-MNT-RXGAIN-GET.cnf primitive.<br />

3.15.12 <strong>PHY</strong>-MNT-RXGAIN-GET.cnf<br />

3.15.12.1 Function<br />

This primitive indicates the result of the previously requested reception gain.<br />

3.15.12.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-RXGAIN-GET.cnf (port, gain):<br />

• port: reception port<br />

• gain: reception gain level<br />

3.15.12.3 When generated<br />

The primitive is passed by the <strong>Physical</strong> layer entity to the Management layer entity to provide the requested<br />

reception gain.<br />

Submission page 76 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.12.4 Effect of receipt<br />

The Maganement layer gets the reception gain. It can be used in protocols such as the <strong>Access</strong> protocol or the Net<br />

Configuration protocol.<br />

3.15.13 <strong>PHY</strong>-MNT-TXGAIN-GET.req<br />

3.15.13.1 Function<br />

This primitive requests the <strong>Physical</strong> layer the transmission gain being used to transmit to a remote node.<br />

3.15.13.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-TXGAIN-GET.req (port):<br />

• port: local transmission port<br />

3.15.13.3 When generated<br />

The primitive is generated when the Management layer needs to know the transmission gain being used in<br />

transmission with another node.<br />

3.15.13.4 Effect of receipt<br />

The current transmission gain is obtained by the <strong>Physical</strong> layer <strong>and</strong> passed to the Management layer by means of the<br />

<strong>PHY</strong>-MNT-TXGAIN-GET.cnf primitive.<br />

3.15.14 <strong>PHY</strong>-MNT-TXGAIN-GET.cnf<br />

3.15.14.1 Function<br />

This primitive indicates the result of the previously requested transmission gain.<br />

3.15.14.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-TXGAIN-GET.cnf (port, gain):<br />

• port: local transmission port<br />

• gain: transmission gain level<br />

3.15.14.3 When generated<br />

The primitive is passed by the <strong>Physical</strong> layer entity to the Management layer entity to provide the requested<br />

transmission gain.<br />

Submission page 77 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.14.4 Effect of receipt<br />

The Maganement layer gets the transmission gain.<br />

3.15.15 <strong>PHY</strong>-MNT-TXGAIN-SET.req<br />

3.15.15.1 Function<br />

This primitive request the change of the transmission gain used to transmit to a remote node.<br />

3.15.15.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-TXGAIN-SET.req (port, gain):<br />

• port: local transmission port<br />

• gain: transmission gain level<br />

3.15.15.3 When generated<br />

This primitive must be generated when the Management layer wants to change the transmission gain with a given<br />

node.<br />

3.15.15.4 Effect of receipt<br />

The <strong>Physical</strong> layer updates the transmission gain with the indicated port. It shall confirm the action.<br />

3.15.16 <strong>PHY</strong>-MNT-TXGAIN-SET.cnf<br />

3.15.16.1 Function<br />

This primitive acknowledges the previously requested action.<br />

3.15.16.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-TXGAIN-SET.cnf (port):<br />

• Port: local transmission port.<br />

3.15.16.3 When generated<br />

This primitive is generated by the <strong>Physical</strong> layer when it updates the transmission gain.<br />

Submission page 78 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.16.4 Effect of receipt<br />

The Management layer receives the confirmation of the change.<br />

3.15.17 <strong>PHY</strong>-MNT-POWMASK-GET.req<br />

3.15.17.1 Function<br />

This primitive requests the <strong>Physical</strong> layer the power mask being used to transmit to a remote node.<br />

3.15.17.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-POWMASK-GET.req (port):<br />

• port: local transmission port<br />

3.15.17.3 When generated<br />

The primitive is generated when the Management layer want to know the power mask being used in transmission<br />

with another node.<br />

3.15.17.4 Effect of receipt<br />

The current power mask is obtained by the <strong>Physical</strong> layer <strong>and</strong> passed to the Management layer by means of the<br />

<strong>PHY</strong>-MNT-POWMASK-GET.cnf primitive<br />

3.15.18 <strong>PHY</strong>-MNT-POWMASK-GET.cnf<br />

3.15.18.1 Function<br />

This primitive indicates the result of the previously requested power mask.<br />

3.15.18.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-POWMASK-GET.cnf (port, pow_mask):<br />

• port: local transmission port<br />

• pow_mask: transmission power mask<br />

3.15.18.3 When generated<br />

The primitive is passed by the <strong>Physical</strong> layer entity to the Management layer entity to provide the requested power<br />

mask.<br />

Submission page 79 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.18.4 Effect of receipt<br />

The Maganement layer receives the power mask.<br />

3.15.19 <strong>PHY</strong>-MNT-POWMASK-SET.req<br />

3.15.19.1 Function<br />

This primitive request the change of the power mask used to transmit to a remote node.<br />

3.15.19.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-POWMASK-SET.req (port, pow_mask)<br />

• port: local transmission port<br />

• pow_mask: transmission power mask<br />

3.15.19.3 When generated<br />

This primitive must be generated when the Management layer wants to change the transmission power mask with a<br />

given node.<br />

3.15.19.4 Effect of receipt<br />

The <strong>Physical</strong> layer updates the transmission power mask with the indicated port. It shall confirm the action.<br />

3.15.20 <strong>PHY</strong>-MNT-POWMASK-SET.cnf<br />

3.15.20.1 Function<br />

This primitive acknowledges the previously requested action.<br />

3.15.20.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-POWMASK-SET.cnf (port):<br />

• port: local transmission port.<br />

3.15.20.3 When generated<br />

This primitive is generated by the <strong>Physical</strong> layer when it updates the transmission power mask.<br />

Submission page 80 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.20.4 Effect of receipt<br />

The Management layer receives the confirmation of the change.<br />

3.15.21 <strong>PHY</strong>-MNT-SYNC.ind<br />

3.15.21.1 Function<br />

This primitive is generated by the <strong>Physical</strong> layer to notify a synchronization detection event to the Management<br />

layer. It provides status information.<br />

3.15.21.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-SYNC.ind (sync_type, mode) :<br />

• sync_type= [sync|sync_loss]<br />

• mode: the transmission/reception signal mode<br />

3.15.21.3 When generated<br />

The primitive is passed by the <strong>Physical</strong> layer to the Management layer to inform about a synchronization event. This<br />

event can be positive (synchronization symbol detected) or negative (synchronization symbol not detected when it<br />

was expected).<br />

3.15.21.4 Effect of receipt<br />

When receiving a "sync" event, the Management layer can infer that a synchronization symbol has been detected in<br />

the transmission mode “mode”. When receiving a “sync_loss” event, the Management layer can infer that an<br />

expected synchronization symbol has not been detected. This information can be used by the Management layer to<br />

take decisions regarding the configuration of the BPL cell.<br />

3.15.22 <strong>PHY</strong>-MNT-SYNC.req<br />

3.15.22.1 Function<br />

This primitive requests the <strong>Physical</strong> layer to detect synchronization symbols.<br />

3.15.22.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-SYNC.req (mode,timeout) :<br />

• mode: the transmission/reception signal mode.<br />

• timeout: maximum time to sense the channel<br />

Submission page 81 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.22.3 When generated<br />

The primitive is generated by the Management layer to detect if there is activity in the channel using the given<br />

transmission mode.<br />

3.15.22.4 Effect of receipt<br />

The <strong>Physical</strong> layer senses the channel during the “timeout” time. When a synchronization symbol is detected or the<br />

“timeout” expires, the result is notified to the Management layer by means of the <strong>PHY</strong>-MNT-SYNC.cnf primitive.<br />

3.15.23 <strong>PHY</strong>-MNT-SYNC.cnf<br />

3.15.23.1 Function<br />

This primitive acknowledges the previously requested action <strong>and</strong> provides the requested information.<br />

3.15.23.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-SYNC.cnf (mode, result):<br />

• mode: transmission/reception signal mode<br />

• result: success/fail<br />

3.15.23.3 When generated<br />

The <strong>Physical</strong> layer generates this primitive when a synchronization symbol is detected (success) or when the<br />

“timeout” expires (fail).<br />

3.15.23.4 Effect of receipt<br />

This information is required by the Net Configuration protocol to check if there are other nodes in the channel.<br />

<strong>PHY</strong>-MNT- <strong>PHY</strong>-MNT-LINK-STATUS.req<br />

4 <strong>MAC</strong><br />

4.1 OVERVIEW<br />

The IEEE P1901 <strong>MAC</strong> is based on a TDMA/TDD <strong>MAC</strong> with hybrid resource sharing mechanisms built on top<br />

of an OFDM <strong>PHY</strong> layer. Data are encapsulated inside OFDM symbols.<br />

The control <strong>and</strong> data symbols transmitted consecutively by a single node constitute a transmission frame.<br />

Submission page 82 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The channel access is done through the use of a special <strong>MAC</strong> element called a token. Master nodes decide the<br />

type of frame that their slave nodes are going to transmit next, based on the type of token included in the current<br />

frame, or the kind of channel access the slave nodes can perform. Tokens have several intended uses, depending<br />

on the type of token, <strong>and</strong> the actions to be undertaken upon its reception also depend on the type of token.<br />

The master node manages the type of channel access, contention free access to the channel with a<br />

predetermined decision about which of its slaves will be allowed to transmit data, in what order, <strong>and</strong> for how<br />

long, or a contention based access of the slaves to the channel.These decisions will be published by the use of<br />

different types of tokens. In both schemes the final result is a node holding a token. The holder of the token has<br />

the right to access the medium for a specific time <strong>and</strong> after that time it has to assign the token to the next<br />

destination node. By the control of the frequency of the token occupancy <strong>and</strong> the length of the time the node is<br />

allowed to hold the token, it is possible to guarantee the requested QoS.<br />

4.1.1 Contention free medium access examples<br />

One of the simplest ways of distribute the channel among several users is the use of Data Frames. Let’s the<br />

following scenario:<br />

CPE<br />

N3<br />

Submission page 83 UPA-OPERA<br />

HE<br />

N1<br />

TDRep<br />

N2<br />

CPE<br />

N4<br />

Figure 21 Simple <strong>Access</strong> Topology example<br />

The Data Token has a specific destination node, which, upon its reception, must enter transmission mode. This<br />

destination node might then return the token to its master, or transmit it to its own slaves, in the case of a Time<br />

Division Repeater. A tipical transmission using data tokens can be seen in the following figure:


4-June-07 P1901_PRO_016_r0<br />

N1 TX<br />

N2 TX<br />

N3 TX<br />

N4 TX<br />

Data PPDU<br />

Token<br />

for N2<br />

Downstream token<br />

Upstream token<br />

IPPDU1<br />

Token<br />

for N3<br />

IPPDU1<br />

Submission page 84 UPA-OPERA<br />

Token<br />

for N2<br />

Time<br />

IPPDU1<br />

Token<br />

for N4<br />

Figure 22 Transmission sequence<br />

When N2 receives the token from its master, it is this node that must decide what nodes will follow: in this case,<br />

it transmits it to each of its slaves, <strong>and</strong> finally returns it to its master. Any other kind of sequence would be<br />

possible, <strong>and</strong> it is the master, at each level, who decides how the token, <strong>and</strong> thus the slots of time, will be<br />

divided amongst the rest of the nodes.<br />

On the other h<strong>and</strong>, the order of transmission can be predesigned using the so called distributor token. The<br />

transmission sequence can took place in the following topology:<br />

Figure 23 Topology example<br />

IPPDU1<br />

Token<br />

for N2<br />

IPPDU1<br />

Token<br />

for N1


4-June-07 P1901_PRO_016_r0<br />

The following diagram ¡Error! No se encuentra el origen de la referencia.depicts a transmission sequence<br />

using this kind of token. As it is outlined in the above diagram, a transmission sequence starts with a Distributor<br />

Token. This type of token assigns the channel to a list of nodes. The Data Token is used by slaves to release the<br />

token to the next detination node. Further sections describe this diagram in more detail.<br />

List Info<br />

Dst1 = Slave 1 Validity1 SessionId1<br />

Dst2 = Slave 4 Validity2 SessionId2<br />

IPPDUS1<br />

Dst3 = Slave 3 Validity3 SessionId3<br />

Dst4 = Slave 2 Validity4 SessionId4<br />

IPPDUS2 IPPDUS2 IPPDUS2<br />

IPPDUS2<br />

MASTER<br />

DISTRIBUTOR<br />

TOKEN<br />

Slave 1<br />

Slave 4 DATA<br />

TOKEN to Slave 2<br />

Slave 3<br />

Slave 2<br />

DATA TOKEN<br />

To Slave 4<br />

DATA<br />

From SessionId1<br />

≤ Valitdity1<br />

DATA<br />

≤ Valitdity2<br />

From SessionId2<br />

DATA TOKEN to Slave 3<br />

DATA<br />

From SessionId3<br />

≤ Validity3<br />

Figure 24: Transmission Sequence<br />

DATA<br />

From SessionId4<br />

≤ Validity4<br />

DATA TOKEN<br />

to MASTER<br />

Submission page 85 UPA-OPERA<br />

DISTRIBUTOR<br />

TOKEN<br />

Using the previously described channel access, a programmed timming interval can be set, synchronized or not<br />

with the mains meriod using the clock token, where several nodes in a preestablished order can transmit.<br />

4.1.2 Contention medium access example<br />

In the previous examples, the destination of the token, <strong>and</strong> so, the next token holder is explicity defined in the<br />

information that the token contains. In the case of CSMA or <strong>Access</strong> Replay frame, the next token holder is not<br />

predefined by the node that transmit the token, but a priorized contention period is open to decide the node that<br />

will be the next token holder.<br />

Asume again the topology described in Figure 23.


4-June-07 P1901_PRO_016_r0<br />

The HE send a CSMA frame ended with a CSMA token, <strong>and</strong> a priorized contention period is open for all the<br />

nodes that can heard this token:<br />

S<br />

O<br />

T<br />

CSMA Token<br />

CSMA PPDU<br />

IPPDU1<br />

P0min<br />

P0max P1min<br />

Backoff<br />

slot time<br />

Backoff time<br />

CONTENTION WINDOW<br />

P1max P2min<br />

P2max P3min<br />

Submission page 86 UPA-OPERA<br />

S<br />

O<br />

T<br />

Figure 25: CSMA Frame<br />

PPDU<br />

Contention winner Node<br />

Each of the nodes will contend putting an SOT in a r<strong>and</strong>om position inside a predetermined range of the contention<br />

window. The range is determined by the state of the node <strong>and</strong> the service class of the traffic that want to transmit<br />

among other, as explained in section 6. The node that was able to send the SOT before any one, will win the right to<br />

transmit a frame.<br />

4.2 <strong>MAC</strong> STATES MANAGEMENT<br />

<strong>MAC</strong> states include node states which are specific states managed both on the master side <strong>and</strong> the slave side.<br />

They correspond to specific actions described here below.<br />

4.2.1 Master side<br />

From a master st<strong>and</strong>point, a slave can be in three different states: Active, Idle, <strong>and</strong> Unregistered. These states<br />

are related to the following master-side actions (see Figure 26 <strong>and</strong> Figure 27 ):<br />

� Active: A master shall regularly transmit a data token to Active slaves. If a slave returns a data token<br />

without using any of the time resources originally granted, the master may list this slave as Idle. The<br />

master may also list the slave as Idle, if the only data sent has priority 7 (reserved for control packets).<br />

P3max<br />

Token


4-June-07 P1901_PRO_016_r0<br />

� Idle: No data token is transmitted to an Idle slave, that is to say this slave does not get any scheduled<br />

transmission opportunity until it is required. This feature reduces the transmission of empty frames by non<br />

active slaves <strong>and</strong> it also increases the network performance, since the transmission opportunities not given<br />

to Idle slaves can be used by other Active users. A master shall regularly transmit Polling Frames to an Idle<br />

slave. This management is done in a different way <strong>and</strong> with different token depending on the type of the<br />

slaves: TDRs or CPEs.<br />

o When the Idle slave is a CPE, the master shall poll it to check if it has data to transmit from a<br />

service class different from number 7 (See 8). If yes, it must be considered Active again. If<br />

answer is no, it shall be considered registered, although it has no data of higher service class to<br />

transmit. When the CPE has no activity, that means, no data is transmitted during long times,<br />

must be considered as Unregistered. This information is obtained by means of two different<br />

types of Polling Tokens: Active Polling Tokens <strong>and</strong> Alive Polling Tokens respectively. Up to<br />

32 CPEs can be polled with only one of these Polling Frames.<br />

� Active Polling Tokens shall be regularly transmitted by the master to manage<br />

transitions from Idle to Active. A slave which replies to an Active Polling Token shall<br />

be listed as Active by its master. A master is constrained to transmit an Active Polling<br />

Token with a maximum interval equal to MAX_ACTIVE_POLL_INTERVAL.<br />

� Alive Polling Tokens shall be regularly transmitted by the master to manage transitions<br />

from Idle to Unregistered. A master is constrained to transmit an Alive Polling Token<br />

with a maximum interval equal to MAX_ALIVE_POLL_INTERVAL. A slave which<br />

does not reply to a number of Alive polling tokens equal to MAX_ALIVE_TOKENS<br />

shall be listed as Unregistered.<br />

o When the slave is a TDR, the master shall only consider it as Idle when neither it nor any of the<br />

slaves in its BPL sub-tree are transmitting or receiving data of service class 1 to 6; this<br />

information is available in the field Frame Priority sent in the Data Token (see 0). The<br />

management of idle TDRs from the master side is slightly different from idle CPEs, although<br />

the concept stays the same. The reason for these differences is that TDRs shall provide some<br />

periodic services to the users in their BPL sub-tree <strong>and</strong> to other non-registered users within<br />

their visibility area apart from notifying if they have traffic to send. The master shall send a<br />

TDR Polling Frame to every Idle TDR connected to it as a slave, with a maximum interval<br />

equal to MAX_ACTIVE_POLL_INTERVAL.<br />

The master shall give enough validity in this polling token for the TDR to send at least an<br />

<strong>Access</strong> Frame every <strong>MAC</strong>_ACCESS_INTERVAL, as many Polling Frames to CPEs as<br />

required (from 0 to 4, depending on the number of banks needed) every<br />

MAX_ACTIVE_POLL_INTERVAL <strong>and</strong> as many TDR Polling Frames as TDRs connected to<br />

it as slaves every MAX_ACTIVE_POLL_INTERVAL. The validity should be calculated from<br />

the topology information provided by the Cluster Discovery Protocol (see 0).<br />

A TDR that does not reply a number of consecutive TDR Polling Tokens equal to<br />

MAX_ALIVE_TOKENS shall be listed as Unregistered.<br />

Submission page 87 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Note: If a master has pending downstream data for an Idle slave belonging to a service class different from<br />

7, the master may automatically switch the status of this slave into Active <strong>and</strong> start giving it transmission<br />

opportunities.<br />

� Unregistered: An Unregistered slave is not explicitly managed by a master. However, the master is<br />

constrained to regularly broadcast access frames to discover/recover Unregistered slaves. The maximum<br />

transmission interval of these access frames is MAX_ACCESS_INTERVAL.<br />

The HE should also turn Idle itself when it has no users or all its users are Idle during a period, in order to<br />

reduce to the minimum the electromagnetic interference <strong>and</strong> the power consumption.<br />

This requirement implies stopping all <strong>MAC</strong> activity when the whole network is idle except for the transmissions<br />

of <strong>Access</strong> Frames <strong>and</strong> Active, Alive <strong>and</strong> TDR Polling Frames, which shall be made at least within the specified<br />

intervals.<br />

The HE shall switch to Active status, when any of these situations occurs:<br />

• automatically, if it has data from service class different from 7 to transmit to any user,<br />

• after sending an Active Polling Frame or a TDR Polling Frame, if any of its slaves (TDRs <strong>and</strong>/or CPEs)<br />

replies affirmatively <strong>and</strong><br />

• after sending an <strong>Access</strong> Request Frame if any user replies to it, so that the <strong>Access</strong> Protocol process can<br />

be started.<br />

4.2.2 Slave side<br />

4.2.2.1 CPE side<br />

From a slave st<strong>and</strong>point, a CPE can be in two different states: Registered or Unregistered (see Figure 28 )<br />

� Unregistered: This is the initial state of a slave. An unregistered slave is only authorized to answer access<br />

frames as required by the access protocol. When the access protocol process is completed <strong>and</strong> successful,<br />

the slave enters the Registered state.<br />

� Registered: The following specific requirements apply to this state:<br />

o A Registered CPE shall never reply to access frames from its current master. It might reply to<br />

access frames from another master if it wishes to change its current master.<br />

o A Registered CPE shall not reply to an Active polling token if it has no need for network<br />

resources.<br />

o A Registered CPE that wishes to continue in that state shall always reply to an Alive polling<br />

token.<br />

o A Registered CPE which has not received any Alive polling token or Data token for more than<br />

MAX_ALIVE_TOKENS*MAX_ALIVE POLL_INTERVAL shall enter the Unregistered state.<br />

The counting of this time interval shall be initialized at the end of the last polling slot in which<br />

the slave has asserted a SOT or at the reception of the last Data Token received by the<br />

Registered slave, whichever is later.<br />

Submission page 88 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.2.2.2 TDR side<br />

From a slave st<strong>and</strong>point, a TDR can be in two different states: Registered or Unregistered (see Figure 27).<br />

� Unregistered: This is the initial state of a slave. An unregistered slave is only authorized to answer access<br />

frames as required by the access protocol. When the access protocol process is completed <strong>and</strong> successful,<br />

the slave enters the Registered state.<br />

� Registered: The following specific requirements apply to this state:<br />

o A Registered TDR shall never reply to access frames from its current master. It might reply to<br />

access frames from another master if it wishes to change its current master.<br />

o A Registered TDR, at the reception of a TDR Polling Frame, shall ensure to transmit <strong>Access</strong><br />

Frames, Polling Frames <strong>and</strong> TDR Polling Frames for all its slaves in the maximum specified<br />

intervals (see 4.6). Afterwards, the TDR shall reply to the TDR Polling Frame sent by the<br />

master indicating whether it wants to be Active or it wants to stay Idle but still Registered.<br />

o An Registered TDR, in Idle state, shall not transmit any Data Token. It shall no transmit any<br />

data either, except for service class 7 traffic. Nevertheless, the TDR could transmit data in the<br />

TDR Polling Reply Frame when it indicates that it wants to be Active again, if it has enough<br />

remaining validity for it.<br />

o A Registered TDR which has not received any TDR Polling Token or Data Token for more<br />

than MAX_ALIVE_TOKENS*MAX_ACTIVE POLL_INTERVAL shall enter the Unregistered state.<br />

The counting of this time interval shall be initialized at the end of the TDR Polling Reply<br />

symbol sent or at the reception of the last Data Token received by the Registered slave,<br />

whichever is later.<br />

Submission page 89 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.2.3 Transition state diagrams<br />

Legend<br />

Slave state (master side)<br />

Transition event<br />

Master actions associated to the state<br />

No response to<br />

MAX_ALIVE_TOKENS<br />

Alive polling tokens<br />

Idle<br />

Master regularly sends Active<br />

polling tokens <strong>and</strong> Alive polling<br />

tokens to this slave. No data token<br />

is transmitted to this slave.<br />

Master does not manage this state.<br />

Regularly, the master broadcasts an access frame<br />

to discover/recover Unregistered nodes.<br />

Unregistered<br />

The slave replies<br />

to an Active polling token<br />

The slave does<br />

not make use of the time<br />

granted by<br />

its master<br />

Figure 26 CPE states – Master side<br />

<strong>Access</strong> protocol<br />

completed<br />

Submission page 90 UPA-OPERA<br />

Active<br />

Master sends data<br />

tokens to this slave.<br />

No polling token<br />

is sent to this slave


4-June-07 P1901_PRO_016_r0<br />

Legend<br />

TDR state (master side)<br />

Transition event<br />

Master actions associated to the state<br />

No response to<br />

MAX_ALIVE_TOKENS<br />

TDR polling tokens<br />

Idle<br />

Master regularly sends TDR polling<br />

tokens to this TDR. No data token is<br />

transmitted to this TDR.<br />

Master does not manage this state.<br />

Regularly, the master broadcasts an access frame<br />

to discover/recover Unregistered nodes.<br />

Unregistered<br />

The TDR replies affirmatively<br />

to a TDR polling token<br />

The TDR does<br />

not make use of the time<br />

granted by<br />

its master<br />

Figure 27 TDR states – Master side<br />

<strong>Access</strong> protocol<br />

completed<br />

Submission page 91 UPA-OPERA<br />

Active<br />

Master sends data<br />

tokens to this TDR.<br />

No polling token<br />

is sent to this TDR.


4-June-07 P1901_PRO_016_r0<br />

Legend<br />

Slave state (slave side)<br />

Transition event<br />

Slave actions associated to the state<br />

4.3 FRAME FORMATS<br />

No response to/ No reception of<br />

Alive Polling tokens for<br />

MAX_ALIVE_TOKENS*MAX_ALIVE_POLL_INTERVAL<br />

Unregistered<br />

Registered<br />

Figure 28 Slave states – Slave side<br />

The slave shall only reply to<br />

access frames as required by<br />

the access protocol<br />

<strong>Access</strong> protocol<br />

process completed<br />

The slave shall never reply to access<br />

frames from its master. It might answer access<br />

frames from another master if it wishes to change<br />

of master.<br />

A frame corresponds to an MPDU passed by the <strong>MAC</strong> layer to the <strong>PHY</strong> layer. There are two types of MPDUs:<br />

regular MPDUs <strong>and</strong> Channel Estimation MPDUs.<br />

Regular MPDUs can encapsulate bursts provided by the LLC layer.<br />

Channel Estimation MPDUs are directly triggered by the <strong>MAC</strong> layer; they carry a specific signal sequence<br />

generated by the <strong>PHY</strong> layer: Channel Estimation MPDUs do not encapsulate any burst provided by the LLC<br />

layer.<br />

Regular MPDU:<br />

Submission page 92 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

MPDU<br />

Burst<br />

TA BH Data 1 BH Data 2 BH Data 3 Token<br />

Figure 29 Regular MPDU format<br />

The structure of a regular MPDU is depicted in Figure 29. The MPDU is of variable size <strong>and</strong> it is composed by:<br />

- A token announce (TA) delimiter: The token announce defines, amongst other things, which is the<br />

current transmitter <strong>and</strong> what is the maximum transmission time of the current frame (Token Announce<br />

Validity).<br />

- A sequence of bursts, each burst being composed of a Burst Header delimiter followed by data payload.<br />

The bursts included in a transmission frame can have different destination nodes. Burst addressed to a<br />

particular node shall be transmitted in order according to their Burst Id (see 5.2). Bursts to different<br />

destinations can be transmitted in any order. The destination port of the burst is included in the Burst<br />

Header, as well as information such as transfer control, encryption, used FEC, etc. The number of<br />

bursts in a regular MPDU ranges from zero to the maximum allowed by the assigned validity (see<br />

4.4.1).<br />

- A token delimiter.<br />

The type of a regular MPDU is defined by the type of token terminating in the frame. The types of regular<br />

MPDUs are:<br />

1. Distributor Frame<br />

2. Data Frame<br />

3. Silence Frame<br />

4. Polling Frame<br />

5. TDR Polling Frame<br />

6. CSMA Frame<br />

7. <strong>Access</strong> frame<br />

8. <strong>Access</strong> Reply frame<br />

9. Non-returnable Data frame<br />

10. Clock Frame<br />

Channel Estimation MPDU<br />

Submission page 93 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

All MPDUs follow the sequence described above except for the Channel Estimation Frame: this frame does not<br />

contain neither bursts nor token. It starts with a Token Announce delimiter followed by a sequence of channel<br />

estimation symbols.<br />

4.3.1 Distributor Frame<br />

This frame ends with a Distributor Token. This Token assigns the channel to a list of nodes (distribution list)<br />

indicating the transmission order of the nodes, the session allowed to transmit <strong>and</strong> the channel time assigned to<br />

each of them.<br />

Nodes included in the distributor list shall transmit in the indicated order. First node on the distribution list<br />

starts transmitting using the session (see 8.1) <strong>and</strong> for the maximum time indicated in the Distributor Token.<br />

When it ends transmitting, it assigns the channel to the subsequent node on the distribution list using the Data<br />

Token.<br />

When second node on the distribution list receives a Data Token from the first node, it starts transmitting from<br />

the session <strong>and</strong> for the maximum time indicated in the Distributor Token. When this node ends transmitting, it<br />

assigns the channel to the third node on the distribution list. This process is repeated until the last node on the<br />

distribution list returns the channel to the Master node. At this point, the master will be able to transmit a new<br />

frame of the desired type.<br />

Master node can configure the distribution list with a maximum number of five nodes.<br />

The holder token node can assign the channel to the desired nodes during its assigned channel time. In this way,<br />

a repeater node can transmit another Distributor token to its slave nodes or it can assign the channel to a CPE.<br />

Following time diagram shows the described process in a scenario with four nodes (see Figure 23).<br />

Submission page 94 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

List Info<br />

Dst1 = Slave 1 Validity1 SessionId1<br />

Dst2 = Slave 4 Validity2 SessionId2<br />

Dst3 = Slave 3 Validity3 SessionId3<br />

Dst4 = Slave 2 Validity4 SessionId4<br />

MASTER<br />

DISTRIBUTOR<br />

TOKEN<br />

Slave 1<br />

Slave 4 DATA<br />

TOKEN to EP2<br />

Slave 3<br />

Slave 2<br />

IPDUS1 IPPDUS2 IPPDUS2 IPPDUS2<br />

IPPDUS2<br />

DATA TOKEN<br />

To Slave 4<br />

DATA<br />

From SessionId1<br />

≤ Valitdity1<br />

DATA<br />

≤ Valitdity2<br />

From SessionId2<br />

DATA TOKEN to Slave 3<br />

DATA<br />

From SessionId3<br />

≤ Validity3<br />

Figure 30 Example of transmission sequence<br />

DATA<br />

From SessionId4<br />

≤ Validity4<br />

DATA TOKEN<br />

to MASTER<br />

Submission page 95 UPA-OPERA<br />

DISTRIBUTOR<br />

TOKEN<br />

In the above example, Master node assigns the channel to nodes SLAVE 1, SLAVE 4, SLAVE 3 <strong>and</strong> SLAVE 2.<br />

The channel allocation scheduling is decided by the QoS in order to grant the allocated resources to each node.<br />

SLAVE 1 node starts transmitting after the reception of the Distributor token. SLAVE 1 has the right to use the<br />

channel for the maximum time assigned in the Distributor Token (Validity). During this time SLAVE 1 is<br />

allowed transmitting from the flow indicated in the Distritubor Token (SessionId). This value identifies the flow<br />

(source <strong>MAC</strong>, destination <strong>MAC</strong> <strong>and</strong> service class of the allowed flow). The resources reservation protocol <strong>and</strong><br />

the assignation of an identifier for each accepted flow is detailed at the QoS section.<br />

When the holder token node ends transmitting, it releases the token to the next node. In this way, if it has not<br />

enough data packet to use all the assigned channel time, it assigns the channel immediately to the next node, not<br />

wasting the remaining channel time.<br />

If a node has not direct visibility to the next destination node on the distribution list, it has to return the token to<br />

the Master. Then, Master will transmit a new Distributor Token assigning the channel to the next nodes on the<br />

distribution list.<br />

Token holder node checks before start transmitting if next transmission is point to point (a single destination<br />

node) or if it is point to multipoint (different destination nodes). Master node assigns the token to a node to<br />

transmit from a given session identifier. Each node has its own table with information about sessions requested.<br />

This table indicates the destination node/s of that flow/s. If session identifier has the zero value, node can


4-June-07 P1901_PRO_016_r0<br />

transmit to different nodes in the same transmission. Usually, this type of transmission will be only performed<br />

for low service class traffic.<br />

As it is described in the above time diagram, Inter PPDU Space (IPPDUSx) depends on the type of the next<br />

frame to be transmitted. In the <strong>MAC</strong> Parameters Section, it is detailed the value of each Inter PPDU Space.<br />

4.3.2 Data Frame<br />

When a data frame is transmitted from a master to one of its slaves (the direction of the token is downstream),<br />

the data token at the end of the data frame will indicate for how long the slave is allowed to transmit. This<br />

length of time is known as the token validity, <strong>and</strong> is expressed as a number of symbols. The maximum length of<br />

the data frame is limited by the validity.<br />

Upon transmitting a data token, the node will enter reception mode.<br />

When a CPE receives a data token, it may transmit a data frame for as long as the received data token validity<br />

indicated. At the end of the frame, a data token is transmitted indicating the end of the transmission. At this<br />

point, the master node will take over the channel again.<br />

When a Time Division Repeater (TDR) receives a data token from its master node, it schedules the<br />

transmissions between itself <strong>and</strong> the master node <strong>and</strong> also distributes new tokens among its slaves, for as long<br />

as the received data token validity indicated.<br />

The validity does not need to be fully used by the receiving node, <strong>and</strong> it will not be wasted: the validity only<br />

sets the maximum length of time between the transmission of a token downstream <strong>and</strong> the return of this token,<br />

<strong>and</strong> it does not reflect the actual length.<br />

4.3.3 Silence Frame<br />

A node transmits the silence frame when it does not want to transmit the token to another node at the end of the<br />

frame or when no other kind of frames can be sent (or need to be sent). A silence frame may contain bursts with<br />

payload data. Upon transmitting a silence token, the node shall transmit a new frame.<br />

For instance, the silence frame may be used by a HE node that is alone in the network. In that situation it shall<br />

send periodical access frames, <strong>and</strong> silence frames will cover the rest of the time. Another use is when the bursts<br />

to be transmitted do not fit in one single MPDU. In such a case it is possible to transmit several consecutive<br />

silence frames <strong>and</strong> a final data frame to pass the token to another node.<br />

Upon reception of a silence token, no action needs to be done.<br />

Submission page 96 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.3.4 Channel Estimation Frame<br />

Periodically, every node has to send a channel estimation frame so that nodes communicating with that node<br />

can estimate their channel <strong>and</strong> adjust their bit-loading table.<br />

A channel estimation frame is composed by a token announce followed by a known pseudo-r<strong>and</strong>om sequence of<br />

16 symbols. A channel estimation frame is not addressed to any specific node. Any node which receives a<br />

Channel Estimation frame shall consider this frame if the transmitter <strong>MAC</strong> address included in the Token<br />

Announce is part of a completed entry in the port solver table (see 9.1.4.1).<br />

A channel estimation process may lead to the transmission of a bit-loading table calculated upon the reception<br />

of a Channel Estimation Frame. The Adaptive Bit-Loading Protocol is used for the transfer of this bit-loading<br />

table <strong>and</strong> its acknowledgement (see section 9.1.2). Every node is responsible for evaluating the appropriate time<br />

to return the calculated bit-loading table. For instance, if there are major changes in the new calculated bitloading<br />

table with respect to the previous one, the node can immediately return the new bit-loading table before<br />

any other transmission is considered. If the new bit-loading table has undergone no changes, the node shall not<br />

return any bit-loading table.<br />

4.3.4.1 Transmission of channel estimation frames by TDRs <strong>and</strong> CPEs<br />

TDRs <strong>and</strong> CPEs shall ask permission to their master to transmit a channel estimation frame. The channel<br />

estimation frame sent by a TDR may be used by the master <strong>and</strong> the slaves of the TDR to estimate the channel<br />

from the TDR. The channel estimation frame sent by a CPE may be used by the master of the CPE to estimate<br />

the channel from the CPE. A TDR shall not transmit channel estimation frames within its validity period unless<br />

the Allow channel estimation frame field received within the data token was set to 1 by its master, but can grant<br />

rights to transmit channel estimation frames to its slaves.<br />

As shown in Figure 31, the channel estimation process can be initiated either by the TDR or CPE (referred as<br />

slaves) or its master.<br />

Submission page 97 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

1<br />

Send CE frame next=1<br />

in Data Token<br />

Slave initiated<br />

2<br />

Master<br />

Allow CE frame=1<br />

in Data Token<br />

Slave<br />

CE frame<br />

3<br />

4<br />

Unicast Bit-loading<br />

table<br />

for uplink<br />

CE=Channel Estimation<br />

Allow CE frame=1<br />

in Data Token<br />

Master initiated<br />

Submission page 98 UPA-OPERA<br />

1<br />

Master<br />

Slave<br />

CE frame<br />

2<br />

Figure 31 Transmission of channel estimation frames by TDRs <strong>and</strong> CPEs<br />

� Channel estimation initiated by the slave:<br />

3<br />

Unicast Bit-loading<br />

table<br />

for uplink<br />

A slave shall periodically evaluate that it is time to send a new channel estimation frame. A slave shall not ask<br />

permission to send a channel estimation frame more than once every MIN_INTERVAL_FOR_CE_REQUESTS<br />

(default value is 3 seconds <strong>and</strong> corresponds to the minimum number of seconds between two requests from the<br />

same slave for an uplink channel estimation).<br />

A slave may ask permission to send a channel estimation frame by setting the “Send Channel Estimation Frame<br />

Next” to 1 in the data token to its master. The master may accept or reject this request by setting the “Allow<br />

Channel Estimation Frame” to 1 (Accept) or 0 (Reject) in the next data token it returns to this slave. Upon<br />

reception of a data token with “Allow Channel Estimation Frame” set to 1, the slave shall transmit a Channel<br />

Estimation Frame. At the end of the transmission the slave shall enter reception mode, <strong>and</strong> the next transmitter<br />

will be the master.<br />

� Channel estimation initiated by the master:<br />

The channel estimation process also allows the master for asking the slave to send a channel estimation frame.<br />

In this case, the master directly sets the “Allow Channel Estimation” to 1 in the data token sent to the slave. The<br />

process is then executed in the same way as mentioned above.<br />

A master may request a slave to transmit a Channel Estimation frame as often as it deems necessary.


4-June-07 P1901_PRO_016_r0<br />

4.3.4.2 Transmission of channel estimation frames by the HE<br />

The process for the HE is different since it is the only node in the BPL cell that does not have a master.<br />

The HE can send a Channel Estimation Frame as often as it deems necessary. At the end of the transmission of<br />

a Channel Estimation frame by the HE, it is the HE which keeps the control of the medium.<br />

The channel estimation frame sent by a HE may be used by the slaves of the HE to estimate the channel from<br />

the HE. Each slave will have the opportunity to return the new calculated unicast bit-loading table (via the<br />

ABLP protocol) as soon as it receives a data token from its master. However, as described above, the slave shall<br />

not necessarily return the unicast bit-loading table as soon as it receives a data token following a Channel<br />

Estimation frame.<br />

4.3.5 Polling Frame<br />

As described in 4.2.1, polling frames are used by the master to manage CPE state transitions from Idle to<br />

Active or Idle to Unregistered.<br />

Polling frames are frames terminated by a Polling Token. Polling Tokens are addressed to several CPE at the<br />

same time via the Polling Destination Bank/Polling Destination Ports fields of the Polling Token (see 4.4.2.4,<br />

Polling Token). A Polling Token is followed by a polling response sequence made of polling slots. The number<br />

of polling slots included in this sequence corresponds to the number of bits set to 1 in the Polling Destination<br />

Ports field of the polling token (max = 32). First bit set to 1 (going from the Least to the Most Significant bit)<br />

corresponds to the first polling slot in the polling response sequence <strong>and</strong> so forth. Upon reception of a polling<br />

token, a CPE which is addressed by this token shall assert a SOT in its corresponding polling slot if that answer<br />

to the polling token is affirmative. It shall not respond if the answer to the polling token is negative.<br />

Figure 32 shows a typical polling scheme in which three CPEs are polled. CPE 1 <strong>and</strong> CPE 3 assert a SOT in<br />

their corresponding polling slots (affirmative response) while CPE 2 does not respond to the polling token<br />

(negative response). Polling slots have duration equal to Size Poll Window. Two polling slots are separated by a<br />

gap of Offset Poll Window. The last polling slot of the Polling Response Sequence is not followed by this gap:<br />

the TX-RX Switch time shall be initiated immediately after the transmission of the last polling slot<br />

Submission page 99 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Polling Token addressed<br />

to Slaves 1,2 <strong>and</strong> 3<br />

Master<br />

TX<br />

Slave1<br />

TX<br />

Slave2<br />

TX<br />

Slave3<br />

TX<br />

Polling PPDU<br />

IPPDUS1<br />

Time<br />

Size Poll<br />

Window<br />

Submission page 100 UPA-OPERA<br />

Polling<br />

Slot 1<br />

S<br />

O<br />

T<br />

Figure 32 Polling scheme<br />

Offset Poll<br />

Window<br />

Size Poll<br />

Window<br />

Polling<br />

Slot 2<br />

Offset Poll<br />

Window<br />

Size Poll<br />

Window<br />

Polling<br />

Slot 3<br />

As described in 4.2.1, there are two types of Polling Tokens transmitted by a master to CPEs:<br />

• Active Polling Token<br />

• Alive Polling Token<br />

These Polling Tokens are identified by the Polling Type field (see 4.4.2.4, Polling Token).<br />

S<br />

O<br />

T<br />

IPPDUS1<br />

Note: Active Polling Tokens provide an Idle CPE with the ability to recover the Active state <strong>and</strong> get<br />

transmission opportunities. The master transmits data tokens only to those slaves that are considered Active.<br />

Alive Polling Tokens provide the master with the ability to detect slaves with no activity (e.g.: turned off).<br />

These ones become Unregistered <strong>and</strong> are not polled anymore.<br />

4.3.6 TDR Polling Frame<br />

As described in 4.3.5, master shall periodically poll its Idle TDRs <strong>and</strong> give them opportunity to poll their own<br />

Idle slaves (CPEs <strong>and</strong>/or TDRs) <strong>and</strong> transmit <strong>Access</strong> Frames. TDR Polling Frames have the same format as a<br />

Data Frame except for the last symbol, which is a TDR Polling Token instead of a Data Token. TDR Polling


4-June-07 P1901_PRO_016_r0<br />

Tokens are addressed to a single port <strong>and</strong> when they are generated by the master, they shall have enough<br />

validity for the polled TDR to transmit Active <strong>and</strong> Alive Polling Frames, TDR Polling Frames <strong>and</strong> <strong>Access</strong><br />

Frames within the maximum intervals.<br />

This kind of frame is also used by the TDR to indicate whether it wants to be Active or stay Idle; in this case<br />

this frame can only contain service class 7 traffic, except if it is an Active TDR Polling Reply Frame, case in<br />

which any data can be transmitted, according to the remaining validity.<br />

4.3.7 CSMA Frame<br />

The aim of this type of frame is to provide the nodes which do not have access to the channel, an opportunity to<br />

gain access. This type of frame is addressed to:<br />

• Idle nodes that have data packets to send in order to change them into active ones.<br />

• Idle nodes that generates bursty traffic<br />

When a node receives a CSMA token <strong>and</strong> wants to transmit, it must contend for the channel. This contention is<br />

performed through a Backoff. If the node wins the contention it starts transmitting; otherwise, the node waits for<br />

another CSMA token.<br />

Each node will contend for channel access with a different value depending on its contention priority;<br />

contention is prioritized in the following way:-<br />

• High Service class Data traffic <strong>and</strong> idle state: in order to minimize the probability of collision between<br />

nodes that are in the same case each of them will select a r<strong>and</strong>om value in the range [P1min, P1max]. In<br />

this case, the <strong>MAC</strong> must configure the node to transmit only packets with service class 7. The idea is to<br />

only send the Resource Request Packet <strong>and</strong> not send the High Service class Data traffic to avoid<br />

glitches in the audio or the video application.<br />

• Idle node with control packets: this contention range [P2min, P2max] is reserved in order the idle<br />

nodes send the control packets.<br />

• Idle node with Bursty Traffic: this contention range [P3min, P3max] is reserved for nodes with very<br />

low throughput of low service class data traffic.<br />

Submission page 101 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.3.8 <strong>Access</strong> Frame<br />

S<br />

O<br />

T<br />

CSMA Token<br />

CSMA PPDU<br />

IPPDUS1<br />

P0min<br />

P0max P1min<br />

Backoff<br />

slot time<br />

Backoff time<br />

CONTENTION WINDOW<br />

P1max P2min<br />

P2max P3min<br />

Submission page 102 UPA-OPERA<br />

S<br />

O<br />

T<br />

PPDU<br />

Contention winner Node<br />

P3max<br />

Token<br />

Figure 33: Use of CSMA Token to assign channel time to the contention winner node<br />

A master shall periodically transmit <strong>Access</strong> tokens inviting Unregistered slaves or Registered slaves that want<br />

to change masters to subscribe to the network. An <strong>Access</strong> Token does not have a specific destination, <strong>and</strong> thus it<br />

is possible that no slave will answer to this request. Upon receiving an access frame, an Unregistered slave or a<br />

Registered slave that decides to reply must send an access reply frame as described in 4.3.6.<br />

4.3.9 <strong>Access</strong> Reply Frame<br />

The access reply frame is sent by an Unregistered slave that wishes to enter the network, or a Registered slave<br />

that wishes to change its current master. The transmission of an <strong>Access</strong> Reply Frame is triggered by the<br />

reception of an <strong>Access</strong> Frame.


4-June-07 P1901_PRO_016_r0<br />

Master<br />

TX<br />

Slave<br />

TX<br />

S<br />

O<br />

T<br />

<strong>Access</strong> Token<br />

<strong>Access</strong> PPDU<br />

IPPDUS1<br />

Backoff time: slave selects slot 5<br />

Submission page 103 UPA-OPERA<br />

Time<br />

Backoff<br />

slot time<br />

S<br />

O<br />

T<br />

Figure 34 <strong>Access</strong> Reply scheme<br />

<strong>Access</strong> Reply PPDU<br />

<strong>Access</strong> Reply<br />

Token<br />

The <strong>Access</strong> Reply Frame is preceded by a contention. The contention method used is the backoff contention<br />

method: all contending nodes select a r<strong>and</strong>om amount of time to wait before beginning the transmission. The<br />

SOT can be transmitted in one of 16 slots. Each node that intends to send an <strong>Access</strong> Reply PPDU will select a<br />

r<strong>and</strong>om number between 1 <strong>and</strong> 16 with a uniform distribution <strong>and</strong> schedule the transmission of the PPDU in the<br />

appropriate slot (slot 1 corresponds to the first slot after the TX-RX switch time has expired). The size of each<br />

slot is BACKOFF_SLOT_TIME. After the backoff time has expired, the <strong>Access</strong> Reply PPDU must be<br />

transmitted. If a SOT (beginning of an <strong>Access</strong> Reply PPDU) is heard before the time has expired, another node<br />

has won the contention <strong>and</strong> the transmission of the access reply frame should be deferred until a new access<br />

frame is received. A new r<strong>and</strong>om slot will be selected the next time. Particularly, the backoff process is not<br />

affected by the loss of a contention, <strong>and</strong> the process will be carried out in the same manner, except that the<br />

r<strong>and</strong>om slot will be selected again.<br />

If no SOT is heard before starting the transmission of the own SOT, the whole transmission of the access reply<br />

frame will take place. Its structure is identical to a data frame, except for the final token type.<br />

The master, upon receiving an access reply frame, will consider, taking into account Radius, QoS or any other<br />

criteria defined, accepting this node as its slave. The response will be sent as an access packet (see 9.1.3.1). If a<br />

node that transmitted an <strong>Access</strong> Reply PPDU does not receive a reply from the master in ACCEPTATION_TO it<br />

will begin the process again.


4-June-07 P1901_PRO_016_r0<br />

4.3.10 Non-returnable Data Frame<br />

The non-returnable data frame is a frame transmitted from a master to many (up to eight) of its slaves (usually<br />

TDRs). The non-returnable data token transmitted at the end of the frame indicates which are the destination<br />

nodes <strong>and</strong> for how long they will be allowed to transmit. This length of time is known as the token validity, <strong>and</strong><br />

is expressed as a number of symbols. The non-returnable data frame can only be sent by a master if Cluster<br />

Discovery Protocol (See 0) messages have been received from the TDRs that are slaves to it.<br />

Upon transmitting a non-returnable data token, the master will ignore any signals received until the validity<br />

time is finished. At this point, the master will transmit a new frame. No frame will be expected by the<br />

transmitter of the non-returnable data frame.<br />

Upon reception of the non-returnable data frame, the slaves (usually TDRs) will start transmitting new frames.<br />

However, they must not transmit any data in the upstream (data for the master that sent the non-returnable data<br />

frame), or any channel estimation frames.<br />

The non-returnable data frame allows the simultaneous transmission of data <strong>and</strong> tokens of several isolated<br />

clusters, thus allowing for spatial reuse.<br />

4.3.11 Clock Frame<br />

The Clock frame is used to synchronize all nodes of a BPL cell.<br />

Every node shall have an internal timer derived from a 312.5 kHz clock. The periodic timer shall count down from a<br />

maximum value to zero. The maximum timer value (Tmax) shall be adapted to span 9 mains periods to allow enough<br />

numerical accuracy. This value is transmitted in the Clock token together with the remaining cycles (TimerValue)<br />

which shall be the value of the timer in the moment the Clock token is transmitted.<br />

The information transmitted in the Clock frame shall be the remaining cycles for reaching the end of the timer<br />

period. This information is used in the receiver node to calculate the delay between its timer <strong>and</strong> the transmitter<br />

timer. The delay with the master shall be used to compensate the own timer. The Clock frame shall be transmitted<br />

only from masters to its direct slaves. Therefore, when a node receives a Clock frame, it shall check that it comes<br />

from its direct master before using the information. The master/slave tree topology allows the propagation of the<br />

information.<br />

The mains frequency is not a stable value <strong>and</strong> fluctuates depending on the energy dem<strong>and</strong>. So, the maximum timer<br />

value shall be continuously corrected to follow the mains variations. Tmax can be obtained in two different ways:<br />

1. Using a zero-cross point detection circuit.<br />

2. Using the MaximumCorrectionValue field of the Clock token. This field allows a slave to synchronize with<br />

the network clock without using a zero-cross point detection circuit.<br />

From Tmax the value of the actual mains periord (Tmains) can be calculated in the following way:<br />

Submission page 104 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Tmax<br />

Tmains =<br />

9<br />

Equation 33<br />

This periodic timer shall be used to divide the mains period in fixed duration time slots called Qs. The Qs shall be<br />

obtained directly from the periodic timer (Ti) as it is shown in Equation 34.<br />

( T mod T ) >> 6<br />

Q = i mains<br />

Equation 34<br />

The duration of a Q is 204.8 μs, <strong>and</strong> the number of Qs (mains period divisions) will be different depending on the<br />

mains frequency. For example 98 in the case of 50 Hz <strong>and</strong> 82 in the case of 60 Hz, assuming there is no deviation<br />

from the nominal frequency.<br />

The MPDU of a Clock frame shall be composed by a Token Announce <strong>and</strong> a Clock token delimiter. The transmitter<br />

of a Clock frame shall know exactly the frame size (in symbols) before start transmitting, in order to calculate the<br />

delay added in the transmission of that frame. This delay shall be compensated in the transmitted remaining cycles<br />

(TimerValue field of the Clock token).<br />

The Clock frame shall be transmitted every CLOCK_PERIOD_TIME.<br />

The following figures show the described timing references:<br />

0 V<br />

Q @ 50 Hz<br />

Q @ 60 Hz<br />

50 Hz Mains<br />

60 Hz Mains<br />

9<br />

7<br />

9<br />

6<br />

9<br />

5<br />

9<br />

4<br />

...<br />

8<br />

1<br />

8<br />

1<br />

8<br />

0<br />

8<br />

0<br />

7<br />

9<br />

7<br />

9<br />

7<br />

8<br />

7<br />

8<br />

Figure 35 Qs Vs mains period<br />

Submission page 105 UPA-OPERA<br />

...<br />

...<br />

3<br />

3<br />

2 1 0<br />

2 1 0


4-June-07 P1901_PRO_016_r0<br />

4.4 <strong>MAC</strong> DELIMITERS<br />

Figure 36: Clock frame timming reference<br />

As described in 4.3, the <strong>MAC</strong> layer generates two types of MPDUs: regular MPDUs <strong>and</strong> Channel Estimation<br />

MPDUs. These MPDUs make use of two <strong>MAC</strong> delimiters:<br />

• Token Announce<br />

• Token<br />

Note: <strong>MAC</strong> delimiters are processed by the <strong>PHY</strong> layer as described in 3.3.1.<br />

4.4.1 Token announce<br />

The Token Announce is sent in the initial sequence of every transmission frame. The Token Announce has the<br />

following fields:<br />

- Preamble – 32 bits. The preamble is equal to 0x90471D2D. The preamble is used to distinguish the<br />

different types of control symbols.<br />

- Type – 4 bits. In this case, Type should be ANNOUNCE(3).<br />

- Validity – 12 bits. Maximum number of symbols that will be transmitted in the current transmission<br />

after this Token Announce Symbol. The maximum number that can be used is MAX_TA_VALIDITY<br />

- <strong>Access</strong> Id – 16 bits. This id must be set to 0x0001.<br />

Submission page 106 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

- Channel Estimation Frame – 1 bit. If this frame is a Channel Estimation Frame, Channel<br />

Estimation Frame must be set to 1. Otherwise, Channel Estimation Frame must be set to 0.<br />

- Power <strong>Control</strong> bits – 5 bits. From left to right:<br />

� Bit 4. Set to 1 on booting <strong>and</strong> after the transmission gain is increased. Set to 0 fifteen<br />

seconds after it was set to 1.<br />

� Bit 3. Set to 1 if the node cannot decrease its transmission gain due to own reasons. For<br />

example: low throughput. Set to 0 otherwise.<br />

� Bit 2. Set to 1 if the node is not going to decrease its transmission gain due to other<br />

nodes reasons, but if those external circumstances end then the transmission gain could<br />

be decreased (depending on bit 3). For example: when another equipment has bit 3 to 1<br />

<strong>and</strong> the node wants to isolate from it. Set to 0 otherwise.<br />

� Bit 1. Set to 1 if the power control task is on. Set to 0 otherwise.<br />

� Bit 0. Set to 1 if transmission gain has been decreased <strong>and</strong> isolation is expected. Set to<br />

0 if transmission gain has its maximum (initial) value.<br />

If power control is not implemented this field shall be set to 0b01000<br />

- <strong>MAC</strong> Mode – 3 bits. Must be set to 0b001 for <strong>Access</strong>.<br />

- Type of Node – 3 bits. See below<br />

- ACCRQ – 1 bit. If this frame is an <strong>Access</strong> Frame, ACCRQ must be set to 1. Otherwise, ACCRQ<br />

must be set to 0. Using this field, a node that is searching for a master only needs to receive the TA<br />

to know that it is an <strong>Access</strong> frame.<br />

- MID – 21 bits. Master Id. It is used to detect if there is interference from other BPL cell. The<br />

problem of interference appears when there is more than one node allocating the channel in time.<br />

This can happen when there are two BPL cells, each one having its own HE, <strong>and</strong> the transmissions<br />

from some nodes in one of them can be received by some nodes in the other BPL cell.<br />

The first problem is to know if a node is being interfered because there is more than one HE in the<br />

channel. To solve this issue all the nodes that share the token must identify themselves as members<br />

of the same BPL cell.<br />

The HE of the BPL cell must transmit an identifier, so called Master Id [MID], <strong>and</strong> each node that<br />

depends directly or indirectly (because is in the HE’s BPL cell) must copy the MID.<br />

The transmission of the MID is splitted between 2 symbols, the Token Announce <strong>and</strong> the <strong>Access</strong> or<br />

CSMA Token<br />

In the Token Announce, 21 bits are sent, with the following structure:<br />

Submission page 107 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 37 Master ID in Token Announce<br />

In the <strong>Access</strong> or CSMA token, additional 32 bits to complete the Master ID will be sent<br />

Figure 38 Master ID in <strong>Access</strong> Token<br />

So to complete the whole MID an <strong>Access</strong> Token must be received, but most of the decisions can be<br />

taken only with the information received in the Token Announce.<br />

When a node detects that its master has change the MID it shall change it immediately.<br />

� Force master field (3 bits)<br />

This field shall be used to establish priorities in the network coordination rules between <strong>Access</strong><br />

<strong>and</strong> IH BPL cells. Values shall be:<br />

• 0x0 – 0x1 for <strong>Access</strong> MV BPL cell.<br />

• 0x2 – 0x4 for <strong>Access</strong> LV BPL cell.<br />

• 0x6 – 0x7 Reserved for IH cells.<br />

� Negotiation field (1 bit)<br />

Submission page 108 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

It is used to change the priority of a MID in the coordination rules depending on the scenarios.<br />

Default value shall be 1. The following rules shall be respected:<br />

• A node with the same MID except for the Negotiation field shall consider it as the same<br />

MID. In this case, the Negotiation field shall not be considered in the network<br />

coordination rules.<br />

• A node with different MID (Force Master, Reserved field or Identification field) shall<br />

consider the Negotiation field in the network coordination rules.<br />

The next 2 rules assert that the Negotiation field will be set to the same value into the same<br />

BPL cell if a change is made by a single node:<br />

• If the Negotiation field changes from 1 to 0 in a node, its master shall set the<br />

Negotiation field to 0.<br />

• If the Negotiation field changes in a node, its slaves shall set the same Negotiation field<br />

value.<br />

Only the HE can change the Negotiation field from 0 to 1 again. The HE shall change the<br />

Negotiation field from 0 to 1 after 120 seconds from the change from 1 to 0.<br />

� Reserved field (1 bit)<br />

For future use.<br />

� Identification field (48 bits)<br />

By default it should be the Mac Address of the HE stored in reverse order. It shall not be assumed<br />

by any protocol that the MasterId includes a <strong>MAC</strong> address.<br />

For example, the <strong>MAC</strong> 0x00139D0002A8 will produce the Identification Field 0xA802009D1300<br />

- <strong>MAC</strong> – 48 bits. This is the <strong>MAC</strong> address of transmitter.<br />

Submission page 109 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

7<br />

6<br />

5<br />

4<br />

90<br />

47<br />

1D<br />

2D<br />

Type Validity [11:8]<br />

Validity [7:0]<br />

<strong>Access</strong> Id [7:0]<br />

MID [15:8]<br />

MID [7:0]<br />

Submission page 110 UPA-OPERA<br />

3<br />

<strong>Access</strong> Id [15:8]<br />

Ch. Est. Fr.<br />

Always MUST be<br />

set to 0<br />

Always MUST be set to 0<br />

Power <strong>Control</strong> bits<br />

Always MUST be<br />

set to 0<br />

Always MUST be set to 0<br />

<strong>MAC</strong> Mode<br />

TypeOfNode[2]<br />

Type of Node [1:0] MID [20:16] ACCRQ<br />

The field Type has the following meanings:<br />

3 ANNOUNCE<br />

The field Type of Node has the following meanings:<br />

0 HE<br />

1 CPE<br />

2 TDR<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

<strong>MAC</strong>[0]<br />

<strong>MAC</strong>[1]<br />

<strong>MAC</strong>[2]<br />

<strong>MAC</strong>[3]<br />

<strong>MAC</strong>[4]<br />

<strong>MAC</strong>[5]<br />

Figure 39 Token Announce<br />

2<br />

1<br />

0<br />

preamble


4-June-07 P1901_PRO_016_r0<br />

4.4.2 Token<br />

There are ten kinds of Token:<br />

- Distributor Token<br />

- Data Token<br />

- Silence Token<br />

- Polling Token<br />

- TDR Polling Token<br />

- CSMA Token<br />

- <strong>Access</strong> Token<br />

- <strong>Access</strong> Reply Token<br />

- Non-returnable Data Token<br />

- Clock Token<br />

The field Type has the following meanings:<br />

Token Type Value<br />

DATA 0<br />

NON-RETURNABLE 2<br />

CLOCK 3<br />

POLLING 5<br />

TDR POLLING 7<br />

DISTRIBUTOR TOKEN 8<br />

CSMA 9<br />

Submission page 111 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

SILENCE 11<br />

ACCESS_REQUEST 13<br />

ACCESS_REPLY 14<br />

The field Type of Node has the following meanings:<br />

0 HE<br />

1 CPE<br />

2 TDR<br />

The field Direction has the following meaning:<br />

0 DOWNSTREAM<br />

1 UPSTREAM<br />

4.4.2.1 Distributor Token<br />

The Distributor Token has the following fields:<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

- Type – 4 bits. Type shall be DISTRIBUTOR (8)<br />

- DstPortx – Destination Port 1 to 5. – 7x5 bits. These are the next token holders (Distribution List). The<br />

destination port equals to the Local Port assigned by the Distributor Token sender to each node. See<br />

Submission page 112 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

¡Error! No se encuentra el origen de la referencia. for more information on the Port Solver protocol. If<br />

this field is equal 0, the destination node is the Master node.<br />

- Info Size – 1 bit. This field indicates the size of the Session Id <strong>and</strong> Validity fields. If it is set to 0, the size of<br />

the SessionId equals 5 bits <strong>and</strong> Validity equals 6 bits. In that case, the Distributor Token carries information<br />

for 5 destination nodes. If it is set to 1, the size of SessionId <strong>and</strong> Validity equal 8 bits. In that case, this token<br />

carries only information for 4 destination nodes. Master will use this subtype of Distributor token if it has<br />

more than 32 opened sessions.<br />

- Validityx – (6x5 bits) or (8x4 bits). Channel time assigned for each of the nodes on the distribution list. This<br />

is the maximum channel time the DstPortx can use before send the token to the next node on the list. This<br />

value is indicated in multiples of 8 symbols.<br />

- SessionIdx – (5x5 bits) or (8x4). This value indicates the flow from which the DstPortx is allowed<br />

transmitting.<br />

- Recovery Mode – 1 bit. Indicates the token loss recovery mode selected by the Master. See section X. It<br />

indicates if the in charged of recovering a token loss is the Distributor Token sender (if set to 0) or each of<br />

the nodes on the distribution list (if set to 1).<br />

- Sequence Number – 3 bits. Identifier of the current Distributor Token.<br />

- Disruption Token – 1 bit. This bit informs to the destination nodes of the Distributor token that the<br />

transmitter node is the new QC of the network <strong>and</strong> it wants to become the master of them.<br />

- Silence Mode – 1bit. Transmitter node indicates it is going to enter in intermittent transmission.<br />

Following diagrams shows the Distributor Token structure if Info Size = 0;<br />

Submission page 113 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 40 Distributor Token Info Size = 0<br />

Following diagrams shows the Distributor Token structure if Info Size = 1;<br />

Submission page 114 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.4.2.2 Data token<br />

The Data Token has the following fields:<br />

Figure 41 Distributor Token Info Size = 0<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

- Type – 4 bits. Type shall be DATA (0)<br />

- Direction – 1 bit. See above.<br />

- Transmission in HURTO – 1 bit. Indicates whether the transmission from Token Transmitter to Destination<br />

Port is using HURTO or not.<br />

- Allow Channel Estimation Frame– 1 bit. From Master to Slave. If it is set to 1, the Slave receiving this<br />

token must send a Channel Estimation Frame. See 4.3.3 for more information.<br />

- Send Channel Estimation Frame next – 1 bit. From Slave to Master. The Slave is requesting to send a<br />

Channel Estimation Frame. See 4.3.3 for more information.<br />

Submission page 115 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

- Single Validity – 4 bits. It is expressed in slots (each slot is composed of 16 symbols). The Single Validity is<br />

an indication from the master on the validity that may be assigned for individual transmission. This<br />

information is only used as an example of how to distribute the token validity. However, the receiving node<br />

does not have to follow that distribution. In that case the receiving node may change the Single Validity to a<br />

new value, according to the validity that it assigns in the Data Token. Individual transmission means the<br />

transmission from a TDR to a CPE or a CPE to its TDR. This field is not used by CPEs. The relevant field<br />

for CPEs is the Validity. The Single Validity includes all symbols transmitted after the TA. The minimum<br />

Single Validity is 1.<br />

- Validity – 12 bits. From Master to Slave. This indicates the maximum validity that the slave will be<br />

allowed to use before returning the token. It is expressed as a number of symbols. The master shall start a<br />

timer after the transmission of the Token Announce by the slave with the duration of the Validity it has<br />

assigned, <strong>and</strong> expect to receive the token back before this timer expires. If the slave is a repeater, the<br />

Validity includes the time needed for the repeater to communicate with its slaves.<br />

- Destination Port – 7 bits. Local Port assigned to the intended receiver of the Data Token. See 9.1.4 for more<br />

information on the Port Solver protocol.<br />

- Session Id – 8 bits. Identify a specific flow reserved by the CAC protocol that should have priority over<br />

other flows registered or best-effort traffic.<br />

- Frame Service class – 8 bits. Only used from slave to master. The Frame Service class field in the token is<br />

used to convey the information of the service classes that have been transmitted within the frame, when the<br />

token is directed towards its master node <strong>and</strong> also all the service classes detected in the previous upstream<br />

transmissios. CPEs use this field to indicate the service classes sent in their transmission <strong>and</strong> TDRs gather<br />

the service class information of their slaves <strong>and</strong> the service class information from their own transmissions.<br />

Therefore, the HE has the information of all the priorities transmitted in the network. When the token is<br />

transmitted towards slave nodes, this field is not used. If bit X is equal to 1, there is at least one packet in<br />

this frame with service class X.<br />

- Unused frame symbols - 13 bits. Unused symbols in the current frame, compared to the Validity indicated<br />

in the token announce of the same transmission frame.<br />

- Received words - 16 bits. The Received Words Field is used to communicate to the token receiver the<br />

number of 32-bit words that have been received from that destination since the last time, so that the<br />

b<strong>and</strong>width limitation algorithm can respond. Counting shall be performed over complete received packets<br />

when they are passed to the Convergence <strong>Layer</strong>.<br />

- Number of Downstream Nodes – 8 bits From a CPE to its master, the Number of Downstream Nodes is<br />

equal to 0. From a TDR to its master, the Number of Downstream Nodes is equal to the number of nodes in<br />

its BPL subtree minus 1.<br />

- Maximum Number of Hops – 4 bits. From a CPE to its master, the Maximum Number of Hops is equal to 0.<br />

A TDR will set the Maximum Number of Hops as the maximum value of number of hops amongst those<br />

received by the nodes hanging from it plus 1.When this field is set to 31 means that there are 32 hops or<br />

more.<br />

- Distributor Sequence Number – 3 bits. Identifier of the current Distributor Token when this Data Token<br />

belongs to an scheduded chain of transmissions generated by a Distributor Token.<br />

Submission page 116 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

7<br />

Reserved<br />

6<br />

Type<br />

Single Validity<br />

Always MUST be set to 0<br />

5<br />

Reserved<br />

Always MUST be set to 0<br />

4<br />

5F<br />

73<br />

EE<br />

E2<br />

Validity [7:0]<br />

Submission page 117 UPA-OPERA<br />

3<br />

Destination Port<br />

Frame Priority<br />

Session ID [7:0]<br />

Always MUST be set to 0<br />

Unused Frame Symbols [7:0]<br />

Received words [15:8]<br />

Received words [7:0]<br />

Number of Downstream Nodes<br />

Reserved<br />

Reserved<br />

Always MUST be set to 0<br />

Distributor Sequence Number Always MUST be set to 0<br />

4.4.2.3 Silence Token<br />

2<br />

Direction Reserved<br />

Transmission<br />

in HURTO<br />

Validity [11:8]<br />

Unused Frame Symbols [12:8]<br />

Maximum Number of Hops<br />

No Destination<br />

Port<br />

Figure 42 Data Token<br />

The Silence Token includes the following fields of the data token:<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

- Type – 4 bits. Type shall be SILENCE (11).<br />

1<br />

Alow Channel<br />

Estimation Fr.<br />

0<br />

Send Ch. Est.<br />

Fr. Next<br />

Always MUST be set to 0<br />

preamble<br />

- Unused frame symbols (13 bits). Unused symbols in the current frame, compared to the Validity indicated<br />

in the token announce of the same transmission frame.


4-June-07 P1901_PRO_016_r0<br />

7<br />

6<br />

Type<br />

Always MUST be set to 0<br />

4.4.2.4 Polling Token<br />

The Polling Token has the following fields:<br />

5<br />

4<br />

5F<br />

73<br />

EE<br />

E2<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Unused Frame Symbols [7:0]<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Figure 43 Silence Token<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

- Type – 4 bits. In this case, Type shall be POLLING (5).<br />

Submission page 118 UPA-OPERA<br />

3<br />

2<br />

Always MUST be set to 0<br />

Unused Frame Symbols [12:8]<br />

1<br />

0<br />

preamble<br />

- Polling Type – 1 bit. (The Polling Type could be equal to ACTIVE(1) or ALIVE(0). When Polling Type is<br />

ACTIVE, the Polling Token is requesting which nodes have data to be sent. When Polling Type is ALIVE,<br />

the Polling Token is requesting which nodes are alive.<br />

- Polling Destination Bank – 2 bits. The total number of destination ports of this Polling Token is divided<br />

into 4 banks. The Polling Destination Bank is to know the destination bank of this polling. The first<br />

available port is port 9.<br />

0 � 9 - 40 ports<br />

1 � 41 - 72 ports


4-June-07 P1901_PRO_016_r0<br />

2 � 73 - 104 ports<br />

3 � 105 - 126 ports<br />

- Unused frame symbols (13 bits). Unused symbols in the current frame, compared to the Validity indicated<br />

in the token announce of the same transmission frame.<br />

- Polling Destination Ports – 32 bits. Destination Ports of Polling Destination Bank of this Polling Token.<br />

Each bit represents one port.<br />

To cover all the possible ports, the field Polling Destination Bank, selects one of the four possible groups of<br />

ports. In order to poll port X (X>=9), Polling Destination Bank equals (X-9) / 32. The bit that represents<br />

port X in Polling Destination Ports field is bit (X-9) mod 32. A bit set to 1 means that this user is being<br />

polled. Only ports in the same Polling Destination Bank can be polled simultaneously<br />

7<br />

1<br />

6<br />

Type<br />

Always MUST be set to 0<br />

4.4.2.5 TDR Polling Token<br />

The TDR Polliing Token has the following fields:<br />

5<br />

4<br />

5F<br />

73<br />

EE<br />

E2<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Unused Frame Symbols [7:0]<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Submission page 119 UPA-OPERA<br />

3<br />

Polling Type<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Unused Frame Symbols [12:8]<br />

Polling Destination Ports<br />

Polling Destination Ports<br />

Polling Destination Ports<br />

Polling Destination Ports<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Figure 44 Polling Token<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

2<br />

1<br />

Polling Destination Bank<br />

0<br />

Always MUST be<br />

set to 0<br />

preamble


4-June-07 P1901_PRO_016_r0<br />

- Type – 4 bits. Type shall be TDR POLLING (7)<br />

- Direction – 1 bit. DOWNSTREAM (0) means that this TDR Polling Token is sent by a master to poll a<br />

TDR. UPSTREAM (1) means that it is a TDR Polling Reply Token, sent by a TDR to its master.<br />

- Reply – 1 bit. If Reply is ACTIVE (1), the TDR indicates that it wants to be Active <strong>and</strong> receive transmission<br />

opportunities. If it is IDLE (0), the TDR stays as Idle.<br />

- Single Validity – 4 bits. It is expressed in slots (each slot is composed of 16 symbols). The Single Validity is<br />

an indication from the master on the validity that may be assigned for individual transmission. This<br />

information is only used as an example of how to distribute the token validity. However, the receiving node<br />

does not have to follow that distribution. In that case the receiving node may change the Single Validity to a<br />

new value, according to the validity that it assigns in the Data Token. Individual transmission means the<br />

transmission from a TDR to a CPE or a CPE to its TDR. The Single Validity includes all symbols<br />

transmitted after the TA. The minimum Single Validity is 1.<br />

- Validity – 12 bits. From Master to Slave. This indicates the maximum validity that the TDR will be allowed<br />

to use before returning the token. It is expressed as a number of symbols. The master shall start a timer after<br />

the transmission of the Token Announce by the slave with the duration of the Validity it has assigned, <strong>and</strong><br />

expect to receive the token back before this timer expires.<br />

- Destination Port – 7 bits. Local Port assigned to the intended receiver of the Data Token. See 9.1.4 for more<br />

information on the Port Solver protocol.<br />

- Unused frame symbols – 13 bits. Unused symbols in the current frame, compared to the Validity indicated<br />

in the token announce of the same transmission frame.<br />

- Number of Downstream Nodes – 8 bits From a TDR to its master, the Number of Downstream Nodes is<br />

equal to the number of nodes in its BPL subtree minus 1 (0 if it has no slaves).<br />

- Maximum Number of Hops – 4 bits. A TDR will set the Maximum Number of Hops as the maximum value<br />

of number of hops amongst those received by the nodes hanging from it plus 1 (0 if it has no slaves). When<br />

this field is set to 31 means that there are 32 hops or more.<br />

7<br />

Reserved<br />

6<br />

Type<br />

Always MUST be set to 0<br />

5<br />

4<br />

Submission page 120 UPA-OPERA<br />

5F<br />

73<br />

EE<br />

E2<br />

Validity[7:0]<br />

3<br />

Direction<br />

Always MUST be set to 0<br />

Destination Port<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Unused Frame Symbols [7:0]<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Number of Downstreams Nodes<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

2<br />

Reply<br />

Single Validity Validity[11:8]<br />

Unused Frame Symbols [12:8]<br />

Always MUST be set to 0 Maximum number of Hops<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

1<br />

0<br />

Always MUST be set to 0<br />

preamble


4-June-07 P1901_PRO_016_r0<br />

4.4.2.6 CSMA Token<br />

The CSMA Token has the following fields:<br />

Figure 45 TDR Polling Token<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

- Type – 4 bits. Type shall be CSMA (9).<br />

- Type of Node – 2 bits.<br />

- Number of Hops – 4 bits. For a HE, the Number of Hops is equal to 0. For the rest of nodes, the Number of<br />

Hops is equal to the Number of Hops read in CSMA Token from its Master + 1. In a CPE, this field is not<br />

used. When this field is set to 31 means that there are 32 hops or more.<br />

- Validity – 7 bits. This indicates the maximum validity that the slave will be allowed to use before returning<br />

the token. It is expressed as a multiple of 8 symbols.<br />

- Unused frame symbols (13 bits). Unused symbols in the current frame, compared to the Validity indicated<br />

in the token announce of the same transmission frame.<br />

- MID (2nd part) – 32 bits. Last 4 bytes of the MasterId (The 21st first bits are allocated in the Token<br />

Announce).<br />

Following fields configure the contention window:<br />

- P0min (2 bits).<br />

- SizeP0 (4 bits). Size of the contention range for the priority 0. This value fixes the P0max = P0min+SizeP0.<br />

- SizSlave 1 (4 bits). Size of the contention range for the priority 1.<br />

- SizSlave 2 (4 bits). Size of the contention range for the priority 2.<br />

- SizSlave 3 (4 bits). Size of the contention range for the priority 3.<br />

- Allowed Ports (32 bits). Nodes allowed contending for the channel. Each bit represents one port. To cover<br />

all the possible ports, the field Destination Bank(2bits), selects one of the four possible groups of ports. In<br />

order to allow contentending to port X (X>=9), Destination Bank equals (X-9) / 32. The bit that represents<br />

port X in Allowed Ports field is bit (X-9) mod 32. A bit set to 1 means that this port is allowed to contend.<br />

- Subtype (2 bits). Type of CSMA token.<br />

• Normal = 0: Contention window is configured as it<br />

• AllNodes = 2: This subtype indicates that all nodes can contend for the channel. Thus, the<br />

AllowedPorts information must be ignored.<br />

Submission page 121 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

7<br />

6<br />

Type<br />

5<br />

4<br />

5F<br />

73<br />

EE<br />

Submission page 122 UPA-OPERA<br />

3<br />

E2<br />

Always MUST be<br />

set to 0<br />

MasterId[3]<br />

Always MUST be set to 0<br />

2<br />

Type of Node<br />

1<br />

0<br />

Always MUST be<br />

set to 0<br />

P0min[1:0]<br />

MasterId[4]<br />

Validity [7:0]<br />

SizeP0[4:0]<br />

SizeP1[4]<br />

SizeP1[3:0]<br />

MasterId[5][7:4]<br />

MasterId[5][3:0]<br />

MasterId[6][7:4]<br />

MasterId[6][3:0]<br />

Number of Hops<br />

Always MUST be set to<br />

Unused Frame Symbols [12:8]<br />

Unused Frame Symbols [7:0]<br />

Always MUST be<br />

set to 0<br />

SizeP3[4:0]<br />

SizeP2[4:3]<br />

SizeP2[2:0] Destination Bank[1:0] Subtype[2:0]<br />

4.4.2.7 <strong>Access</strong> Token<br />

The <strong>Access</strong> Token has the following fields:<br />

AllowedPorts[31:24]<br />

AllowedPorts[23:16]<br />

AllowedPorts[15:8]<br />

AllowedPorts[7:0]<br />

Always MUST be set to 0<br />

Figure 46: CSMA token structure<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

- Type – 4 bits. Type shall be ACCESS_REQUEST (13).<br />

- Direction –1 bit. Shall be set to DOWNSTREAM (0)<br />

- Type of Node – 2 bits. See above.<br />

- Validity – 12 bits. From Master to Slave. This indicates the maximum validity that the slave will be<br />

allowed to use before returning the token. It is expressed as a number of symbols.<br />

preamble<br />

- Number of Hops – 4 bits. For a Head End, the Number of Hops is equal to 0. For a TDR, the Number of<br />

Hops is equal to the Number of Hops read in <strong>Access</strong> Token from its Master + 1. When this field is set to 31<br />

means that there are 32 hops or more.<br />

-


4-June-07 P1901_PRO_016_r0<br />

- Unused frame symbols (13 bits). Unused symbols in the current frame, compared to the Validity indicated<br />

in the token announce of the same transmission frame.<br />

- MID (2nd part) – 32 bits. Last 4 bytes of the MasterId (The 21st first bits are allocated in the Token<br />

Announce).<br />

- <strong>MAC</strong> Address – 48 bits. Own <strong>MAC</strong> address.<br />

- Equivalent speed – 8 bits. This value gives an indication of the throughput to the backbone that can be<br />

achieved connecting to the network through this node. The value is calculated from the equivalent BPS.<br />

⎢ BPSeq<br />

−120⎥<br />

Equivalent _ speed = ⎢ ⎥<br />

⎣ 60 ⎦<br />

Equation 35<br />

If the node is directly linked to the backbone the field will be set to 255. If the node is one hop from the<br />

backbone the equivalent BPS are equal to the average of the downstream <strong>and</strong> upstream BPS of the node<br />

with its master.<br />

BPSup<br />

+ BPSdown<br />

BPS eq =<br />

= BPS<br />

2<br />

Equation 36<br />

If there is more than one hop to the backbone the equivalent BPS are calculated from the BPS value<br />

obtained from the master <strong>and</strong> the own equivalent BPS.<br />

BPS<br />

i<br />

eq<br />

=<br />

1<br />

BPS<br />

Equation 37<br />

i 1<br />

eq<br />

+ −<br />

1<br />

1<br />

BPS<br />

Values for the equivalent speed obtained from the previous formulas shall be between 1 <strong>and</strong> 254. A value of<br />

zero in this field means that the repeater has not been able to calculate it. The BPS information obtained<br />

from the access token, combined with the BPS calculated by the new slave in the link may be used in order<br />

to decide which is the best master to be connected to.<br />

Submission page 123 UPA-OPERA<br />

own<br />

eq<br />

own<br />

eq


4-June-07 P1901_PRO_016_r0<br />

7<br />

6<br />

Type<br />

MasterId[3][7:4]<br />

MasterId[3][3:0]<br />

MasterId[4][3:0]<br />

MasterId[5][3:0]<br />

MasterId[6][3:0]<br />

Always MUST be set to 0<br />

4.4.2.8 <strong>Access</strong> Reply Token<br />

The <strong>Access</strong> Token has the following fields:<br />

5<br />

4<br />

5F<br />

73<br />

EE<br />

E2<br />

Always MUST be set to 0<br />

Validity [7:0]<br />

Unused Frame Symbols [7:0]<br />

<strong>MAC</strong> [0]<br />

<strong>MAC</strong> [1]<br />

<strong>MAC</strong> [2]<br />

<strong>MAC</strong> [3]<br />

<strong>MAC</strong> [4]<br />

<strong>MAC</strong> [5]<br />

3<br />

Equivalent Speed<br />

Always MUST be set to 0<br />

Direction Type of Node<br />

Submission page 124 UPA-OPERA<br />

2<br />

Validity [11:8]<br />

Number of Hops<br />

Unused Frame Symbols [12:8]<br />

Figure 47 <strong>Access</strong> Token<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

- Type – 4 bits. Type shall be ACCESS_REPLY (14).<br />

- Direction –1 bit. Shall be set to UPSTREAM (1).<br />

- Type of Node – 2 bits. See above.<br />

1<br />

MasterId[4][7:4]<br />

MasterId[5][7:4]<br />

MasterId[6][7:4]<br />

- MID – 32 bits. Part of the Master ID not included in the Token Announce.<br />

0<br />

Always MUST be<br />

set to 0<br />

preamble<br />

- Disconnect – 1bit. If this field is set to 0, the token is a normal ACCESS REPLY TOKEN, used to achieve<br />

access to the network through a master. If it is set to 1, the token becomes an ACCESS REPLY<br />

DISCONNECTION TOKEN, used to leave a master.<br />

- Destination Port – 7 bits. Local Port assigned to the master.


4-June-07 P1901_PRO_016_r0<br />

- Number of Hops – 4 bits. For a Head End, the Number of Hops is equal to 0. For a TDR, the Number of<br />

Hops is equal to the Number of Hops read in <strong>Access</strong> Token from its Master + 1. In a CPE, this field is not<br />

used. When this field is set to 31 means that there are 32 hops or more.<br />

- Unused frame symbols (13 bits). Unused symbols in the current frame, compared to the Validity indicated<br />

in the token announce of the same transmission frame.<br />

- <strong>MAC</strong> Address – 48 bits. The <strong>MAC</strong> address of the master the access reply token is addressed to.<br />

4.4.2.9 Non-returnable data token<br />

The Non-returnable Data Token has the following fields:<br />

Figure 48 <strong>Access</strong> Reply Token<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

- Type – 4 bits. Type shall be NON-RETURNABLE (2)<br />

- Single Validity – 4 bits. See description in 0<br />

- Validity – 12 bits. Same meaning as in the Data Token (See 0). Since this token is non-returnable, the<br />

validity will be fully used.<br />

Submission page 125 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

- Destination Port 0 to 7 – 8x7 bits. Local Port of the intended receiver of the Data Token. If Destination Port<br />

X is not used, it shall be set to 0. At least one of the destination ports shall be different to 0.<br />

The implementation of this type of token is optional.<br />

7<br />

Always MUST be<br />

set to 0<br />

Always MUST be<br />

set to 0<br />

6<br />

Type<br />

Single Validity<br />

Always MUST be<br />

set to 0<br />

Always MUST be<br />

set to 0<br />

Always MUST be set to 0<br />

Always MUST be<br />

set to 0<br />

Always MUST be<br />

set to 0<br />

Always MUST be<br />

set to 0<br />

Always MUST be<br />

set to 0<br />

4.4.2.10 Clock Token<br />

The Clock Token has the following fields:<br />

5<br />

4<br />

5F<br />

73<br />

EE<br />

E2<br />

Submission page 126 UPA-OPERA<br />

3<br />

Destination Port 0<br />

Validity [7:0]<br />

Destination Port 1<br />

Always MUST be set to 0<br />

2<br />

Validity [11:8]<br />

Destination Port 2<br />

Destination Port 3<br />

Unused Frame Symbols [12:8]<br />

Unused Frame Symbols [7:0]<br />

Destination Port 4<br />

Destination Port 5<br />

Destination Port 6<br />

Destination Port 7<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Figure 49 Non-returnable Data Token<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

- Type – 4 bits. Type shall be CLOCK (3)<br />

- Reset – 1 bit. If set to 1 all nodes reset the timers <strong>and</strong> data.<br />

- Grid Frequency – 2 bits: 00 = 50 Hz , 01= 60Hz, 11 = Other.<br />

1<br />

0<br />

preamble<br />

- MaximumlTimerValue – 16 bits: number of cycles of a 312.5 kHz clock used by the Master to count 9


4-June-07 P1901_PRO_016_r0<br />

mains periods.<br />

- TimerValue - 16 bits: number of cycles in the Master to reach the end of the current main period.<br />

- Period Counter – 16 bits: counter of main periods.<br />

7<br />

6<br />

Type<br />

4.5 TOKEN LOSS RECOVERY<br />

5<br />

4<br />

5F<br />

73<br />

EE<br />

E2<br />

Always MUST be<br />

set to 0<br />

MaximumTimerValue[15:8]<br />

MaximumTimerValue[7:0]<br />

TimerValue[15:8]<br />

TimerValue[7:0]<br />

PeriodCounter[15:8]<br />

PeriodCounter[7:0]<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Submission page 127 UPA-OPERA<br />

3<br />

Figure 50: Clock Token<br />

2<br />

Reset Grid Frequency<br />

1<br />

0<br />

preamble<br />

The Token uses a very robust modulation scheme that increases the possibility of correct demodulation even in very<br />

noise environment. Still, token may be lost, do not detected by the receiver node/s, due to impulsive noise. Fast<br />

detection mechanisms are therefore essential for efficient communication.<br />

Depending on the token distribution policy implemented in the network, two possible token loss recovey policies<br />

may be possible.<br />

The simplest one relies in the direct distribution of Data Token from HE or TDR to its CPEs.


4-June-07 P1901_PRO_016_r0<br />

In this case, a token loss occurs when the master node transmits a frame <strong>and</strong> the intended token receiver does not<br />

detect the token or when the master does not detect the token sent by one of its slaves. In case of token loss, the<br />

master node shall detect that the token has been lost.<br />

Using the validity associated to every transmitted token, the master node shall generate a new frame whenever the<br />

validity assigned in a token to one of its slaves expires without receiving back the token. Only HE <strong>and</strong> TDR<br />

implement this feature.<br />

When a Token Distributor is used to share the channel, the Token Loss Recovery policy becomes more complex,<br />

but equally efficient.<br />

There are two different modes to recover a token lost when using Distributor Tokens:<br />

1. Master node is the only node in charged of recovering a token lost. In this mode, the node that sends the<br />

Distributor token must monitor the channel during all the validity time assigned in the token in order to<br />

detect in each moment if the channel owner transmits.<br />

When Master transmits a Distributor Token checks that the first node on the distribution list starts<br />

transmitting. If Master does not detect the Token Announce from the expected node, it can retransmit the<br />

Distributor Token lost or a new Distributor Token. In that way, the only overhead included in this simple<br />

acknowledgement mechanism is the retransmission of the token, instead of waiting for the maximum time<br />

assigned to the first slave.<br />

If first slave detects the Distributor Token, it starts transmitting <strong>and</strong> assigns the channel to the second<br />

destination slave. This process will be monitorized by the Master. If Master node detects the first slave<br />

assigns the channel to the next slave, it will check if the second slave starts transmitting. If Master does not<br />

detect the Token Announce from that slave, it transmits a new Distributor Token. This Distributor Token<br />

can include the slave that lost the token or can continue in the next slave on the distribution list.<br />

Master shall repeat all this process till the last destination slave returns the channel to the Master.<br />

Master node shall know in each moment which is the channel owner slave, when it has to start transmitting,<br />

<strong>and</strong> when it has to release the token to the next slave.<br />

Following diagram shows the monitoring process performed by the Master in order to recover a token lost:<br />

Submission page 128 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 51: Distributor Token Lost Monitoring Process<br />

Submission page 129 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

MASTER<br />

DISTRIBUTOR<br />

TOKEN<br />

Slave 1<br />

Slave 4<br />

Slave 3<br />

Slave 2<br />

Check Slave 1 starts<br />

transmitting<br />

Check Slave 1 releases<br />

token before Validity1<br />

DATA TOKEN<br />

to Slave 4<br />

Slave 4 does not start<br />

transmitting after Slave 1<br />

transmission. Transmit<br />

new Distributor Token<br />

Token lost<br />

Check Slave 4 releases<br />

token before Validity2<br />

timeout<br />

Check Slave 4 starts<br />

transmitting<br />

DISTRIBUTOR<br />

TOKEN<br />

DATA<br />

TOKEN to Slave 3<br />

Check Slave 3 releases<br />

token before Validity3<br />

timeout<br />

Check Slave 3 starts<br />

transmitting<br />

Check Slave 2 starts<br />

transmitting<br />

DATA<br />

TOKEN to Slave 2<br />

Figure 52: Recovery Token Lost by Master node<br />

Check Slave 2 returns<br />

token before Validity4<br />

timeout<br />

DATA TOKEN<br />

to MASTER<br />

DISTRIBUTOR<br />

TOKEN<br />

2. Each node on the distribution list transmits in its assigned slot time if it does not receive the token from the<br />

previous node on the distribution list.<br />

In this mode, nodes on the distribution list needs to receive the Distributor Token to know when they have<br />

to transmit. Upon the reception of a Distributor token, each node starts transmitting in their slot time if the<br />

previous node on the list does not assign to it the channel. If previous node on the list ends transmitting, it<br />

assigns the channel to the subsequent node on the list. If this token is lost, next node shall start transmitting<br />

in its slot time.<br />

This mode can be very dangerous because if all the nodes on the distribution list lose the Distritubor token,<br />

Master node does not transmit till the end of the total channel time assigned in that token.<br />

From the other h<strong>and</strong>, this mode can be very interesting in a scenario with no visibility between slave nodes.<br />

In that case, slave nodes cannot assign the channel to the next node on the list because they have no direct<br />

visibility. This functionality reduces the overhead due to the Master does not transmit to assign the channel<br />

to the next node.<br />

Submission page 130 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 53: Recovery Token Lost by each node<br />

The node that sends a Distributor Token selects the token loss recovery mode indicating the selected option in the<br />

token.<br />

4.6 <strong>MAC</strong> PARAMETERS SPECIFICATION<br />

INTER FRAME SPACE 1 189 µs Time distance between the end of a<br />

Distributor Frame <strong>and</strong> the beginning of<br />

the transmission of the first node of the<br />

distribution list. See 4.3.1.<br />

INTER FRAME SPACE 2 126 µs Time distance between the end of a<br />

Data Frame <strong>and</strong> the beginning of the<br />

transmission of the next node on the<br />

distribution list. See 4.3.1.<br />

Table 12 contains the values for the <strong>MAC</strong> parameters.<br />

Submission page 131 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Parameter Value Description<br />

Number of channel estimation<br />

symbols per frame<br />

Maximum number of simultaneous<br />

polling users<br />

16 See 4.3.4<br />

32 Maximum number of users that can be<br />

polled with one single polling frame.<br />

See 4.3.5 <strong>and</strong> 4.3.6<br />

Offset poll windows 61.2 us See 4.3.5 <strong>and</strong> 4.3.6<br />

Size poll window 81.2 us See 4.3.5 <strong>and</strong> 4.3.6<br />

MIN_TA_VALIDITY 1 Symbol See 4.4.1<br />

MAX_TA_VALIDITY 240 Symbols See 4.4.1<br />

MIN_TOKEN_VALIDITY 16 symbols See 0<br />

MAX_TOKEN_VALIDITY 4095 symbols See 0<br />

BACKOFF_SLOT_TIME 35.625 us See 4.3.5 <strong>and</strong> 4.3.6<br />

Backoff maximum number of slots 16 See 4.3.5 <strong>and</strong> 4.3.6<br />

MAX_ACTIVE_POLL_INTERVA<br />

L<br />

2 seconds See 4.2<br />

MAX_CSMA_TOKEN_PERIOD 0.5 seconds See 4.4.2.6<br />

MAX_ALIVE_TOKENS 100 tokens See 4.2<br />

MAX_ALIVE_POLL_INTERVAL 5 seconds See 4.2<br />

MAX_ACCESS_INTERVAL 5 seconds See 4.2<br />

Submission page 132 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Channel Estimation Maximum Period 10 seconds Channel Estimation Frame should be<br />

sent at least every Channel Estimation<br />

Maximum Period.<br />

ACCEPTATION_TO 5 seconds See 4.3.9<br />

INTER FRAME SPACE 1 189 µs Time distance between the end of a<br />

Distributor Frame <strong>and</strong> the beginning of<br />

the transmission of the first node of the<br />

distribution list. See 4.3.1.<br />

INTER FRAME SPACE 2 126 µs Time distance between the end of a<br />

Data Frame <strong>and</strong> the beginning of the<br />

transmission of the next node on the<br />

distribution list. See 4.3.1.<br />

Table 12 <strong>MAC</strong> parameter specification<br />

4.7 <strong>MAC</strong> service specification (<strong>MAC</strong> SAP)<br />

4.7.1 <strong>MAC</strong> service primitives<br />

Following table shows <strong>MAC</strong>-DATA, <strong>MAC</strong>-ACK <strong>and</strong> <strong>MAC</strong>-MNT primitives:<br />

Primitive Type<br />

Submission page 133 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.2 <strong>MAC</strong>-DATA.req<br />

4.7.2.1 Function<br />

<strong>MAC</strong>-DATA.req Request<br />

<strong>MAC</strong>-DATA.cnf Confirm<br />

<strong>MAC</strong>-DATA.ind Indication<br />

<strong>MAC</strong>-ACK.req Request<br />

<strong>MAC</strong>-ACK.cnf Confirm<br />

<strong>MAC</strong>-ACK.ind Indication<br />

<strong>MAC</strong>-MNT-TOKEN.req Request<br />

<strong>MAC</strong>-MNT-TOKEN.ind Indicate<br />

<strong>MAC</strong>-MNT-TOKEN.cnf Confirm<br />

<strong>MAC</strong>-MNT-RESOURCES.req Request<br />

<strong>MAC</strong>-MNT-RESOURCES.ind Indication<br />

<strong>MAC</strong>-MNT-RESOURCES.cnf Confirm<br />

<strong>MAC</strong>-MNT-CHANEST-FRAME.req Request<br />

<strong>MAC</strong>-MNT-CHANEST-REQ.req Request<br />

<strong>MAC</strong>-MNT-CHANEST-REQ.ind Indication<br />

<strong>MAC</strong>-MNT-NHOPS.req Request<br />

<strong>MAC</strong>-MNT-NHOPS.cnf Confirm<br />

<strong>MAC</strong>-MNT-CHANGE.req Request<br />

<strong>MAC</strong>-MNT-CHANGE.cnf Confirm<br />

<strong>MAC</strong>-MNT-TXSYMB.ind Indication<br />

<strong>MAC</strong>-MNT-CHANSTATS.req Request<br />

<strong>MAC</strong>-MNT-CHANSTATS.cnf Confirm<br />

<strong>MAC</strong>-MNT-NEWMID.ind Indication<br />

<strong>PHY</strong>-MNT-LINK-STATUS.req Request<br />

<strong>PHY</strong>-MNT-LINK-STATUS.cnf Confirm<br />

Table 13 <strong>MAC</strong> sevice primitives<br />

This primitive requests a transfer of a LPDU from a local LLC layer entity.<br />

4.7.2.2 Semantics of the service primitive<br />

<strong>MAC</strong>-DATA.req(LPDU):<br />

- LPDU: LLC Protocol Data Unit (MSDU)<br />

Submission page 134 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.2.3 When generated<br />

The primitive is generated by the LLC layer entity when a LPDU is to be transferred.<br />

4.7.2.4 Effect of receipt<br />

The <strong>MAC</strong> layer entity starts the sending of the LPDU.<br />

4.7.3 <strong>MAC</strong>-DATA.cnf<br />

4.7.3.1 Function<br />

This primitive has local significance <strong>and</strong> provides the LLC layer with status information (sending finished) of the<br />

corresponding preceeding <strong>PHY</strong>-DATA.req primitive.<br />

4.7.3.2 Semantics of the service primitive<br />

This primitive has no parameters.<br />

4.7.3.3 When generated<br />

The primitive is passed from the <strong>MAC</strong> layer entity to the LLC layer entity to indicate that the previous LPDU has<br />

been sent.<br />

4.7.3.4 Effect of receipt<br />

The LLC layer entity is aware that the <strong>MAC</strong> is available to send new MPDUs, <strong>and</strong> can issue new <strong>MAC</strong>-DATA.req<br />

primitives.<br />

4.7.4 <strong>MAC</strong>-DATA.ind<br />

4.7.4.1 Function<br />

This primitive defines the transfer of a LPDU from the <strong>MAC</strong> layer entity to the LLC layer entity.<br />

4.7.4.2 Semantics of the service primitive<br />

<strong>MAC</strong>-DATA.ind(LPDU, lpdu_seq_number)<br />

- LPDU: LLC Protocol Data Unit<br />

- lpdu_seq_number: a sequence number that uniquily identifies this LPDU.<br />

Submission page 135 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.4.3 When generated<br />

The primitive is passed from the <strong>MAC</strong> layer entity to the LLC layer entity to indicate the arrival of a LPDU.<br />

4.7.4.4 Effect of receipt<br />

The LLC layer entity processes the newly received LPDU.<br />

4.7.5 <strong>MAC</strong>-ACK.req<br />

4.7.5.1 Function<br />

This primitive requests the acknowledgment of a previously received LPDU.<br />

4.7.5.2 Semantics of the service primitive<br />

<strong>MAC</strong>-ACK.req(lpdu_seq_number):<br />

- lpdu_seq_number: the sequence number of the LPDU to be acknowledged.<br />

4.7.5.3 When generated<br />

This primitive is generated by the LLC layer entity when a previously received LPDU is to be acknowledged.<br />

4.7.5.4 Effect of receipt<br />

The <strong>MAC</strong> layer entity stores the lpdu_seq_number to be acknowledged, <strong>and</strong> will send the acknowledgment in the<br />

proper subsequent MPDU.<br />

4.7.6 <strong>MAC</strong>-ACK.cnf<br />

4.7.6.1 Function<br />

This primitive has local significance <strong>and</strong> provides the LLC layer with status information (acknowledgment sent) of<br />

the corresponding preceeding <strong>MAC</strong>-ACK.req primitive.<br />

4.7.6.2 Semantics of the service primitive<br />

This primitive has no parameters.<br />

Submission page 136 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.6.3 When generated<br />

This primitive is passed from the <strong>MAC</strong> suplayer entity to the LLC layer entity to indicate that the previously<br />

requested LPDU acknowledgment has been sent.<br />

4.7.6.4 Effect of receipt<br />

The LLC layer entity is aware that the previously requested LPDU acknowledgment has been sent <strong>and</strong> can issue<br />

new <strong>MAC</strong>-ACK.req primitives<br />

4.7.7 <strong>MAC</strong>-ACK.ind<br />

4.7.7.1 Function<br />

This primitive indicates the LLC layer entity that an LPDU acknowledgment has been received.<br />

4.7.7.2 Semantics of the service primitive<br />

<strong>MAC</strong>-ACK.ind(lpdu_seq_number):<br />

- lpdu_seq_number: the sequence number of the acknowledged LPDU.<br />

4.7.7.3 When generated<br />

This primitive is passed from the <strong>MAC</strong> layer entity to the LLC layer entity to indicate that an LPDU<br />

acknowledgment has been received.<br />

4.7.7.4 Effect of receipt<br />

The LLC marks the corresponding LPDU as correctly acknowledged by the peer LLC entity.<br />

4.7.8 <strong>MAC</strong>-MNT-TOKEN.req<br />

4.7.8.1 Function<br />

This primitive requests the sending of a token.<br />

4.7.8.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-TOKEN.req(token):<br />

- token (see 4.4.2): <strong>MAC</strong> delimiter: Distributor token, Data token, Silence token, <strong>Access</strong> Token, <strong>Access</strong><br />

Reply token, Polling token, TDR Polling token, Non-returnable Data token, CSMA token, Clock token<br />

Submission page 137 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.8.3 When generated<br />

This primitive is generated by the Management layer to send the token to other nodes, or to send special tokens.<br />

This primitive is used to schedule the access to the channel.<br />

4.7.8.4 Effect of receipt<br />

The <strong>MAC</strong> layer sends the requested token inside the current MPDU.<br />

4.7.9 <strong>MAC</strong>-MNT-TOKEN.ind<br />

4.7.9.1 Function<br />

This primitive indicates the reception of a token, <strong>and</strong> defines the transfer of the information received in the token to<br />

the Management layer.<br />

4.7.9.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-TOKEN.ind(token):<br />

- token (see 4.4.2): <strong>MAC</strong> delimiter: Distributor token, Data token, Silence token, <strong>Access</strong> Token, <strong>Access</strong><br />

Reply token, Polling token, TDR Polling token, Non-returnable Data token, CSMA token, Clock token<br />

4.7.9.3 When generated<br />

This primitive is generated by the <strong>MAC</strong> layer to indicate the reception of a token <strong>and</strong> provides the corresponding<br />

information used by the Management layer entity in protocols such as <strong>Access</strong> Protocol or QoS.<br />

4.7.9.4 Effect of receipt<br />

Depending on the token parameter, the Management layer entity may perform different actions (see sections 4, 8, 9<br />

<strong>and</strong> 11).<br />

4.7.10 <strong>MAC</strong>-MNT-TOKEN.cnf<br />

4.7.10.1 Function<br />

This primitive is generated by the <strong>MAC</strong> layer to inform about the result of the <strong>MAC</strong>-MNT-TOKEN.req primitive.<br />

That is, if the required token has been successfully sent.<br />

4.7.10.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-TOKEN.cnf (token, result):<br />

Submission page 138 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

- token: Requested token (see 4.4.2). Distributor token, Data token, Silence token, <strong>Access</strong> token, <strong>Access</strong><br />

Reply token, Polling token, TDR Polling token, Non-returnable Data token, CSMA token, Clock token<br />

- result: [SUCCESS|FAIL]. FAIL can be produced if the nodes losses a contention after a CSMA token.<br />

4.7.10.3 When generated<br />

The primitive is generated by the <strong>MAC</strong> layer to confirm the result of trying to send the requested token.<br />

4.7.10.4 Effect of receipt<br />

The Management layer entity shall take the proper actions taking into account the result parameter (see sections 4,<br />

8, 9, 10).<br />

4.7.11 <strong>MAC</strong>-MNT-RESOURCES.req<br />

4.7.11.1 Function<br />

This primitive requests the allocation or release of local <strong>MAC</strong> resources.<br />

4.7.11.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-RESOURCES.req (<strong>MAC</strong>, type, service_class, latency, BW) :<br />

- <strong>MAC</strong>: <strong>MAC</strong> address of the traffic source<br />

- type: type of request. [ALLOCATE|FREE]<br />

- service_class: Service class of the traffic flow<br />

- latency: latency requirement of the flow<br />

- BW: b<strong>and</strong>width requirement of the flow<br />

4.7.11.3 When generated<br />

The primitive is generated by the Management layer entity to allocate resources for one traffic flow, or free them.<br />

4.7.11.4 Effect of receipt<br />

If there are enough resources, they are allocated. The primitive <strong>MAC</strong>-MNT-RESOURCES.conf indicates the status<br />

of this allocation.<br />

4.7.12 <strong>MAC</strong>-MNT-RESOURCES.ind<br />

4.7.12.1 Function<br />

This primitive indicates a change of the resources that a traffic flow can use.<br />

Submission page 139 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.12.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-RESOURCES.ind(<strong>MAC</strong>, type, prio, latency, BW):<br />

- <strong>MAC</strong>: <strong>MAC</strong> address of the traffic source.<br />

- type: type of indication. [NO_RESOURCES|RESOURCES_CHANGE].<br />

- service_class: service class of the traffic flow<br />

- latency: latency requirement of the flow<br />

- BW: b<strong>and</strong>width requirement of the flow. (BW can be lower than requested when type is<br />

RESOURCES_CHANGE)<br />

4.7.12.3 When generated<br />

The primitive is passed by the <strong>MAC</strong> layer entity to the Management layer entity to indicate that the resources of a<br />

traffic flow have changed.<br />

4.7.12.4 Effect of receipt<br />

The Management layer is aware of the change in the resources allocated to the traffic flow, <strong>and</strong> shall take this result<br />

into account when performing the CAC protocol.<br />

4.7.13 <strong>MAC</strong>-MNT-RESOURCES.cnf<br />

4.7.13.1 Function<br />

This primitive indicates the result of the previously requested allocation of local resources.<br />

4.7.13.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-RESOURCES.cnf (<strong>MAC</strong>, type, service_class, latency, BW):<br />

- <strong>MAC</strong>: <strong>MAC</strong> address of the traffic source.<br />

- type: type of confirmation. [OK|NO_RESOURCES]<br />

- service_class: service_class of the traffic flow<br />

- latency: latency requirement of the flow<br />

- BW: b<strong>and</strong>width requirement of the flow. (BW can be lower than requested when type is OK).<br />

4.7.13.3 When generated<br />

The primitive is passed by the <strong>MAC</strong> layer entity to the Management layer entity to indicate the result of the<br />

previously requested allocation of local resources.<br />

4.7.13.4 Effect of receipt<br />

The Management layer is aware of the result of the previous <strong>MAC</strong>-MNT-RESOURCES.req primitive, <strong>and</strong> shall<br />

take this result into account when performing the CAC protocol.<br />

Submission page 140 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.14 <strong>MAC</strong>-MNT-CHANEST-FRAME.req<br />

4.7.14.1 Function<br />

This primitive requests the transmission of a Channel Estimation frame to the local <strong>MAC</strong> layer entity.<br />

4.7.14.2 Semantics of the service primitive<br />

This primitive has no parameters.<br />

4.7.14.3 When generated<br />

The primitive can be generated in two situations:<br />

- The Management layer periodically shall issue this primitive.<br />

- A <strong>MAC</strong>-MNT-CHANEST-REQ.ind primitive has been received.<br />

4.7.14.4 Effect of receipt<br />

The <strong>MAC</strong> layer entity shall transmit a Channel Estimation frame.<br />

4.7.15 <strong>MAC</strong>-MNT-CHANEST-REQ.req<br />

4.7.15.1 Function<br />

This primitive requests the sending of a Channel Estimation frame petition to a given node.<br />

4.7.15.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-CHANEST-REQ.req (dest_<strong>MAC</strong>) :<br />

- dest_<strong>MAC</strong>: <strong>MAC</strong> address of the node that is requested to send the Channel Estimation frame.<br />

4.7.15.3 When generated<br />

This primitive shall be generated by the Management layer when it considers that the tonemap used to receive<br />

transmissions from a given node may have changed.<br />

4.7.15.4 Effect of receipt<br />

The <strong>MAC</strong> layer entity shall fill a Data token addressed to the dest_<strong>MAC</strong> address with the Channel Estimation<br />

Frame Request set to 1.<br />

Submission page 141 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.16 <strong>MAC</strong>-MNT-CHANEST-REQ.ind<br />

4.7.16.1 Function<br />

This primitive indicates the Management layer that a Channel Estimation frame request from a node has been<br />

received.<br />

4.7.16.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-CHANEST-REQ.ind(src_<strong>MAC</strong>):<br />

- src_<strong>MAC</strong>: <strong>MAC</strong> address of the requester.<br />

4.7.16.3 When generated<br />

The primitive is generated by the <strong>MAC</strong> layer entity to indicate that a node has requested the transmission of a<br />

Channel Estimation frame.<br />

4.7.16.4 Effect of receipt<br />

When receiving this primitive, the Management layer entity shall decide to issue the <strong>MAC</strong>-MNT-CHANEST-<br />

FRAME.req in order to transmit the Channel Estimation frame.<br />

4.7.17 <strong>MAC</strong>-MNT-NHOPS.req<br />

4.7.17.1 Function<br />

This primitive requests the <strong>MAC</strong> layer for the number of hops that the node is from a master.<br />

4.7.17.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-NHOPS.req(<strong>MAC</strong>):<br />

- <strong>MAC</strong>: <strong>MAC</strong> address of the master<br />

4.7.17.3 When generated<br />

The primitive is generated when the Management layer needs to know the number of hops from a master node.<br />

4.7.17.4 Effect of receipt<br />

The <strong>MAC</strong> layer obtains the number of hops <strong>and</strong> passes this information to the Management layer by means of the<br />

<strong>MAC</strong>-MNT-NHOPS.cnf primitive.<br />

Submission page 142 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.18 <strong>MAC</strong>-MNT-NHOPS.cnf<br />

4.7.18.1 Function<br />

This primitive indicates the result of the previously requested number of hops.<br />

4.7.18.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-NHOPS.cnf(nhops):<br />

- nhops: number of hops between local node <strong>and</strong> requested master.<br />

4.7.18.3 When generated<br />

The primitive is passed by the <strong>MAC</strong> layer entity to the Management layer entity to provide the number of hops.<br />

4.7.18.4 Effect of receipt<br />

The Management layer uses this number of hops in several management <strong>and</strong> configuration protocols.<br />

4.7.19 <strong>MAC</strong>-MNT-CHANGE.req<br />

4.7.19.1 Function<br />

This primitive is used to change the role of the node (master/slave) in the PLC cell.<br />

4.7.19.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-CHANGE.req (role, new_master):<br />

- role: [MASTER|SLAVE]<br />

- new_master: <strong>MAC</strong> address of the node that has to be considered as the new master. This parameter shall be<br />

used when the role is SLAVE.<br />

4.7.19.3 When generated<br />

The primitive is issued by the Management layer entity in the framework of the Coordination tools (see ¡Error! No<br />

se encuentra el origen de la referencia.).<br />

4.7.19.4 Effect of receipt<br />

The <strong>MAC</strong> layer shall play the role indicated in the parameters.<br />

Submission page 143 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.20 <strong>MAC</strong>-MNT-CHANGE.cnf<br />

4.7.20.1 Function<br />

This primitive is used to inform that the requested change has been done.<br />

4.7.20.2 Semantics of the service primitive<br />

This primitive has no parameters.<br />

4.7.20.3 When generated<br />

It is generated by the <strong>MAC</strong> layer when the role has been changed.<br />

4.7.20.4 Effect of receipt<br />

The Management layer receives the confirmation of the change.<br />

4.7.21 <strong>MAC</strong>-MNT-TXSYMB.ind<br />

4.7.21.1 Function<br />

This primitive is used to inform the Management layer about the number of information symbols transmitted to a<br />

given node.<br />

4.7.21.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-TXSYMB.ind (num_symb, port):<br />

- num_symb: number of symbols transmitted.<br />

- port: local transmission port<br />

4.7.21.3 When generated<br />

This primitive is generated by the <strong>MAC</strong> layer entity after each transmission.<br />

4.7.21.4 Effect of receipt<br />

Upon the reception of this primitive, the Management layer can estimate the required b<strong>and</strong>width by a traffic flow. It<br />

can also estimate the latencies that the traffic flow is suffering.<br />

Submission page 144 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.22 <strong>MAC</strong>-MNT-CHANSTATS.req<br />

4.7.22.1 Function<br />

This primitive is used to gather <strong>MAC</strong> statistics about the channel state.<br />

4.7.22.2 Semantics of the service primitive<br />

This primitive has no parameters.<br />

4.7.22.3 When generated<br />

The primitive is generated by the Management layer when it needs to know the statistics to perform the functions<br />

described in sections 8, 9 <strong>and</strong> 11.<br />

4.7.22.4 Effect of receipt<br />

The <strong>MAC</strong> layer entity communicates the required information by means of the <strong>MAC</strong>-MNT-CHANSTATS.cnf<br />

primitive.<br />

4.7.23 <strong>MAC</strong>-MNT-CHANSTATS.cnf<br />

4.7.23.1 Function<br />

This primitive is used by the <strong>MAC</strong> layer to communicate the required statistics.<br />

4.7.23.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-CHANSTATS.cnf (stats):<br />

- stats: composed by this information:<br />

o cont_win: number of won contention attempts<br />

o cont_attemp: number of contention attempts<br />

o num_nodes: number of detected nodes<br />

o used_val_rate: vector (one value per priotity): % of the assigned validity that has been used by the<br />

slaves<br />

o req_val_rate: vector (one value per service class): % of the available validity that has been<br />

requested<br />

o empy_CSMA: number of unsued CSMA tokens by the slaves<br />

o CSMA_usage: % of the assigned validity in CSMA tokens that has been used by the slaves<br />

4.7.23.3 When generated<br />

It is generated as a response to the <strong>MAC</strong>-MNT-CHANSTATS.req primitive.<br />

Submission page 145 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.23.4 Effect of receipt<br />

The Management layer can use the information to perform the functions described in sections 8, 9 <strong>and</strong> 11.<br />

4.7.24 <strong>MAC</strong>-MNT-NEWMID.ind<br />

4.7.24.1 Function<br />

This primitive is used to notify the Management layer that a different MID has been detected.<br />

4.7.24.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-NEWMID.ind (new_mid):<br />

- new_mid: new MID detected<br />

4.7.24.3 When generated<br />

This primitive is generated by the <strong>MAC</strong> layer entity when it detects in the channel a MID different than the own<br />

MID.<br />

4.7.24.4 Effect of receipt<br />

The Management layer entity uses this information to perform the coordination among different BPL Cells.<br />

4.7.25 <strong>MAC</strong>-MNT-LINK-STATUS.req<br />

4.7.25.1 Function<br />

This primitive requests to the <strong>MAC</strong> layer the link status of the communication with certain <strong>MAC</strong>.<br />

4.7.25.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-LINK-STATUS.req (<strong>MAC</strong>):<br />

• <strong>MAC</strong>: <strong>MAC</strong> address<br />

4.7.25.3 When generated<br />

The primitive is generated when the Management layer needs to know the status of certain link.<br />

Submission page 146 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.25.4 Effect of receipt<br />

The current link status is obtained by the <strong>MAC</strong> layer <strong>and</strong> passed to the Management layer by means of the <strong>MAC</strong>-<br />

MNT-LINK-STATUS.req primitive.<br />

4.7.26 <strong>MAC</strong>-MNT-LINK-STATUS.cnf<br />

4.7.26.1 Function<br />

This primitive indicates the link status of the communication with certain <strong>MAC</strong>.<br />

4.7.26.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-LINK-STATUS.cnf (<strong>MAC</strong>,link_status):<br />

• <strong>MAC</strong>: <strong>MAC</strong> address<br />

• Link Status: Linked (1) or not linked (0)<br />

4.7.26.3 When generated<br />

The primitive is generated when the Management layer needs to know the status of certain link.<br />

4.7.26.4 Effect of receipt<br />

The Maganement layer gets the link status.<br />

5 LLC<br />

5.1 INTRODUCTION<br />

The LLC layer receives packets (Convergence <strong>Layer</strong> PDUs) from the Convergence <strong>Layer</strong> <strong>and</strong> transmits LLC PDUs<br />

to the <strong>MAC</strong> layer. LLC tasks are:<br />

• Segmentation <strong>and</strong> grouping of packets (CLPDUs) to create the payloads of the bursts.<br />

• The addition of an inter-packet header to every packet or fragment of packet<br />

• The addition of an LLC delimiter (Burst Header) to the payload of every burst payload.<br />

• The addition of the CCMP Header at the beginning of each burst when burst is set as encrypted.<br />

• The addition of a Message Integrity Check (MIC) to every fragment of packet or packet when burst is set as<br />

encrypted.<br />

Submission page 147 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• The addition of a Cyclic Reduncancy Check (CRC) to every fragment of packet or packet when burst is set<br />

as unencripted.<br />

• The Packet ACK Protocol (PAP) for sequence control <strong>and</strong> selective acknowledgement of packets<br />

(CLPDUs).<br />

5.2 BURST HEADER<br />

There are two types of burst header, one with data <strong>and</strong> other one without data.<br />

5.2.1 Burst header with data<br />

The Burst Header is the LLC Delimiter which precedes every burst. It has the following fields:<br />

- Preamble – 32 bits. Always set to 0xBDADC3.<br />

- TMI – 4 bits. Tonemap ID. Tonemap used in the data encoding. TMI 0 is reserved for HURTO mapping.<br />

- Version – 3 bits. Set to 0.<br />

- Transmission Port – 7 bits. Local Port of the intended receiver of the Burst.<br />

- APL – 14 bits. Aggregated Payload Length. Length of the payload in 32-bit words of the current burst,<br />

including RS FEC redundancy. The APL will be defined by the RS FEC redundancy used <strong>and</strong> the length of<br />

the data included in the burst.<br />

- FEC payload – 6 bits. RS Fordward Error Correction codeword payload length in 32-bit words. The RS<br />

FEC codeword payload allowed values are indicated in Table 2. The FEC Redundancy + FEC payload has<br />

to be less or equal to 63 words.<br />

- FEC Redundancy – 2 bits. RS Fordward Error Correction codeword redundancy length:<br />

o 0: 8 redundancy bytes (2 words)<br />

o 1: 12 redundancy bytes (3 words)<br />

o 2: 16 redundancy bytes (4 words)<br />

o 3: 20 redundancy bytes (5 words)<br />

- BPS –14 bits. Bits Per Symbol for the current burst. It depends on the encoding used for the current<br />

transmission. Possible values range from 24 to 14592. The BPS calculation (See Equation 17) includes the<br />

RS redundancy <strong>and</strong> excludes the 4D-TCM. With the BPS <strong>and</strong> APL values nodes that are not the destination<br />

of the burst, but that may be the destination of subsequent bursts in the same frame, may calculate the burst<br />

duration in symbols in order to know when the next burst header or token is going to be placed.<br />

- HURTO – 1 bit. It shall be set to 1 when the burst is transmitted in HURTO mode.<br />

- Dummy Hdr– 1 bit. It shall be set to 1 if the burst is not carrying data symbols.<br />

Submission page 148 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

- PAP Code Type – 1 bit. Packet ACK Protocol Codification Type. It is set to 0 when Run-Length Encoding<br />

is used <strong>and</strong> set to 1 when GroupEncoding is used.<br />

• Crypto AES– 1 bit. Shall be set to 1 when the burst is encrypted.<br />

- ACK Info – 1 bit. Shall be set to 1 when the burst header contains Packet ACK Protocol information (see<br />

5.4).<br />

- PAP Info – 55 bits. The meaning of these bits depends on PAP Code Type. See section 5.4<br />

- PAP Port – 7 bits. Local Port over which the ACK contained in the Burst Header takes effect.<br />

- PAP Init – 1 bit. The first packet that requires ACK (Req ACK field in the Interpacket Header) in the burst<br />

has the lowest packet id stored in transmission buffer. The receiver cannot request retransmissions of<br />

previous packets ids.<br />

- PAP Reset – 1 bit. Reset the reception buffer.<br />

- PAP Last Received Packet – 12 bits. Last received packet information used by Packet ACK Protocol. See<br />

section 5.4<br />

- Service class – 8 bits. Indicates the service classes belonging to the packets contained in the burst. If bit X is<br />

equal to 1, there is at least one packet in this burst with service class X.<br />

Submission page 149 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

7<br />

6<br />

Version<br />

Transmission Port [1:0]<br />

Reserved<br />

Reserved<br />

Reserved<br />

PAP Info [38:36]<br />

PAP Info [3:0]<br />

5<br />

FEC Payload<br />

BPS [5:0]<br />

4<br />

BD<br />

AD<br />

C3<br />

APL [7:0]<br />

BPS [13:6]<br />

PRIORITY<br />

Submission page 150 UPA-OPERA<br />

3<br />

2<br />

TMI<br />

Transmission Port [6:2]<br />

APL [13:8]<br />

1<br />

0<br />

FEC Redundancy<br />

PAP Init<br />

HURTO DUMMY Hdr PAP Code Type ACK Info<br />

PAP Info [53:47]<br />

PAP Port<br />

PAP Info [46:39]<br />

Always must be 0 Always must be 0<br />

PAP Info [35:28]<br />

PAP Info [27:20]<br />

PAP Info [19:12]<br />

PAP Info [11:4]<br />

PAP Last Received Packet [7:0]<br />

Figure 54 Burst Header<br />

The Burst Header contains two independent pieces of information:<br />

Reserved<br />

PAP Last Received Packet [11:8]<br />

PAP Reset<br />

PAP Info [54]<br />

Crypto AES<br />

preamble<br />

- Information about the data burst being transmitted, which destination port is Transmission Port<br />

- Information about PAP Information, which destination port is PAP Port.<br />

For this reason, the receiver of data burst could be different from receiver of PAP information.<br />

For example, in the following figure:


4-June-07 P1901_PRO_016_r0<br />

Port_4<br />

Port_3<br />

Node A Node B<br />

A burst header sent from node A could have:<br />

Node C<br />

Submission page 151 UPA-OPERA<br />

Port_1<br />

Port_2<br />

Figure 55: Example of PAP destination<br />

- A PAP Port equal to port_3 to send PAP information about data previously received from node B in a data burst<br />

whose Burst Header contained in the Transmission Port field the value port_1.<br />

- Transmission Port equal to port_4 to send data to node C.<br />

For further details about ports, see section 9.1.4.<br />

5.2.2 Burst header without data<br />

The Burst Header without data is used when information about Packet ACK Protocol should be sent in the<br />

following situations:<br />

- There is no data to be sent.


4-June-07 P1901_PRO_016_r0<br />

- The Packet ACK Protocol information has too many errors if it is sent in a Burst Header because limitation<br />

of used PAP codification.<br />

Thefollowing are the fields with significant information:<br />

- Preamble – 32 bits. Always set to 0xBDADC3<br />

- TMI – 4 bits. Tonemap ID. Tonemap used in the data encoding. TMI 0 is reserved for HURTO mapping.<br />

- Version – 3 bits. Set to 0.<br />

- Dummy Hdr– 1 bit. It shall be set to 1 if the burst is not carrying data symbols.<br />

- PAP Code Type – 1 bit. Packet ACK Protocol Codification Type. It is set to 0 when Run-Length Encoding.<br />

And set to 1 when GroupEncoding.<br />

- ACK Info – 1 bit. Shall be set to 1 when the burst header contains Packet ACK Protocol information. See<br />

section 5.4.<br />

- PAP Info – 119 bits. The meaning of these bits depends on PAP Code Type. See section 5.4<br />

- PAP Port – 7 bits. Local Port over which the ACK contained in the Burst Header takes effect.<br />

- PAP Last Received Packet – 12 bits. Last received packet information used by Packet ACK Protocol. See<br />

section 5.4<br />

The rest of the fields shall be ignored in reception.<br />

Submission page 152 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

7<br />

PAP Info [60]<br />

6<br />

Version<br />

Reserved<br />

5<br />

PAP Info [73:70]<br />

PAP Info [3:0]<br />

5.3 BURST STRUCTURE<br />

4<br />

BD<br />

AD<br />

C3<br />

Submission page 153 UPA-OPERA<br />

3<br />

PAP Info [113:106]<br />

PAP Info [105:98]<br />

PAP Info [97:90]<br />

PAP Info [89:82]<br />

PAP Info [81:74]<br />

PAP Info [68:61]<br />

2<br />

TMI<br />

PAP Info [118:114]<br />

DUMMY Hdr PAP Code Type ACK Info<br />

PAP Port<br />

PAP Info [59:52]<br />

PAP Info [51:44]<br />

PAP Info [43:36]<br />

PAP Info [35:28]<br />

PAP Info [27:20]<br />

PAP Info [19:12]<br />

PAP Info [11:4]<br />

PAP Last Received Packet [7:0]<br />

PAP Last Received Packet [11:8]<br />

Figure 56: Burst Header without Data<br />

1<br />

0<br />

PAP Info [69]<br />

preamble<br />

Two possible burst structures are supported. First one is used in the case of unencrypted burst, <strong>and</strong> second one is<br />

devoted to encrypted bursts.<br />

5.3.1 Unencrypted Burst Structure<br />

When Cripto AES bit in the Burst Header is set to 0, the burst shall be composed by a Burst Header delimiter<br />

followed by a data payload including one or several fragmented <strong>and</strong>/or completed packets. A Burst Header delimiter<br />

without any following data payload is used to send PAP information when there are no data to be sent as described<br />

in section 5.2.2.<br />

Note: The Burst Header is a delimiter processed by the <strong>PHY</strong> layer as described in 3.3.1. It is transmitted in HURTO<br />

mode over one single symbol. The data payload is processed by the <strong>PHY</strong> layer as described in 3.3.2. The data<br />

payload may use HURTO or adaptive mapping. It can be transmitted over one or several symbols.<br />

The Unencrypted Burst could have the following structures:


4-June-07 P1901_PRO_016_r0<br />

Burst<br />

header<br />

symbol M data symbols<br />

HEADER<br />

HEADER<br />

HEADER<br />

First<br />

INTER-<br />

PACKET<br />

HEADER<br />

Completed<br />

PACKET<br />

CRC<br />

WORD<br />

N-<br />

INTER-<br />

PACKET<br />

HEADER<br />

Completed<br />

PACKET<br />

Submission page 154 UPA-OPERA<br />

…<br />

CRC<br />

WORD<br />

64 bits 32 bits 64 bits 32 bits<br />

First<br />

INTER-<br />

PACKET<br />

HEADER<br />

Fragmented<br />

PACKET<br />

PADDING<br />

CRC<br />

WORD<br />

64 bits 32 bits<br />

First<br />

INTER-<br />

PACKET<br />

HEADER<br />

Fragmented<br />

or Completed<br />

PACKET<br />

CRC<br />

WORD<br />

Second<br />

INTER-<br />

PACKET<br />

HEADER<br />

Completed<br />

PACKET<br />

CRC<br />

WORD<br />

N-<br />

INTER-<br />

PACKET<br />

HEADER<br />

Fragmented<br />

or Completed<br />

PACKET<br />

CRC<br />

WORD<br />

64 bits 32 bits 64 bits<br />

32 bits<br />

64 bits 32 bits<br />

For more information about the Burst Header see 5.2.<br />

PADDING<br />

PADDING<br />

PADDING<br />

Figure 57 Unencrypted Burst examples<br />

Each burst can contain more than one CLPDU. For more information about the CLPDU format see 6.2.<br />

The length of a burst is equal to a number of data symbols. The maximum length of a burst is 30 OFDM symbols,<br />

excluding the burst header. The maximum capacity of the burst in 32-bit words depends on the bit-loading table <strong>and</strong><br />

the number of data symbols.<br />

When one packet has to be divided into fragments, each fragment length must be multiple of 256 bytes, except the<br />

last fragment. No 32-bit words are added as padding in the last fragment to obtain 256 bytes. If one packet has<br />

length equal to X with X = Y * 256 + Z bytes, the packet could be sent in up to (Y+1) different bursts using<br />

fragmentation. If one packet has length equal to X bytes with X less than 256 bytes, this packet is sent with X bytes<br />

plus the needed padding to align it to 32-bit words. In any case, the only added padding is to be aligned to 32-bit<br />

words.<br />

The inter-packet header is used for disassembling bursts in reception. An inter-packet header shall always precede<br />

each packet or fragment of a packet.<br />

At the end of each fragment or packet, a 32-bits CRC of the preceding fragment or packet (excluding inter-packet<br />

header) shall be sent.<br />

…<br />

PADDING<br />

PADDING


4-June-07 P1901_PRO_016_r0<br />

Packet fragments shall only appear at the beginning or the end of the burst. Once a fragment of a packet is sent in a<br />

burst, the rest of the packet shall be sent before any other packet to the same Local Port (regardless of service class).<br />

Packets with the same destination port <strong>and</strong> same service class shall be transmitted in order. Within the same<br />

destination port, packets are transmitted according to their service class, with highest service class packets first (see<br />

8.2).<br />

The inter-packet header has the following structure:<br />

7 6<br />

Part of<br />

Packet<br />

Version<br />

- Preamble – 8 bits. Set to 0x5D<br />

5<br />

4<br />

Unfinished Last Packet ACK Req Packet Id [11:8]<br />

Length [5:0]<br />

5D<br />

Reserved<br />

Submission page 155 UPA-OPERA<br />

3<br />

Packet Id [7:0]<br />

Fragment Number<br />

CRC – 16 bits<br />

Figure 58 Inter-packet header<br />

2<br />

1<br />

Length [8:6]<br />

0<br />

Padding Last Word<br />

- Part of Packet – 1 bit. The first fragment in the burst is part of a previous packet. This field shall only be<br />

checked by the receiver in the first inter-packet header.<br />

- Unfinished – 1 bit. The last fragment in this burst is unfinished. To be set to one in the last inter-packet<br />

header if it is not a complete packet.<br />

- Last Packet – 1 bit. This is the last fragment or packet inside this burst.<br />

- ACK Req – 1 bit. The transmitter is waiting an ACK about this packet to free it. When it is set to 0, the<br />

transmitter frees this packet when this packet is sent <strong>and</strong> the receiver can not request retransmissions about<br />

it.<br />

- Packet Id – 12 bits. Unique identification of each packet.<br />

- Version – 2 bits. Version is set to 0.<br />

- Fragment number – 3 bits. Each packet could be divided into 6 fragments. This is the identification of each<br />

fragment: from 0 to 5.<br />

- Length – 9 bits. Length of the packet or fragment in words.<br />

Octet<br />

1<br />

2<br />

3<br />

4<br />

5<br />

6<br />

7<br />

8


4-June-07 P1901_PRO_016_r0<br />

- Padding Last Word – 2 bits. Number of padding bytes of the last word of the packet or fragment of a<br />

packet.<br />

- CRC – 16 bits. 16 bits CRC of the preceding 48-bits.<br />

5.3.2 Encrypted Burst Structure<br />

When Cripto AES bit in the Burst Header is set to 1, the burst shall be composed by a Burst Header delimiter<br />

followed by a CCMP Header of 64 bits length whose composition <strong>and</strong> fields are described in section 10.1. After the<br />

CCMP Header, data payload including one or several fragmented <strong>and</strong>/or completed packets is added to the burst.<br />

Each packet fragment or packet includes a Message Integrity Check (MIC) to preserve the integrity of each unit as<br />

described in section 10.1.<br />

The Encrypted Burst could have the following structures:<br />

Burst<br />

header<br />

symbol<br />

HEADER<br />

HEADER<br />

HEADER<br />

CCMP<br />

Header<br />

64 bits<br />

CCMP<br />

Header<br />

64 bits<br />

CCMP<br />

Header<br />

64 bits<br />

First<br />

INTER-<br />

PACKET<br />

HEADER<br />

Completed<br />

PACKET<br />

MIC<br />

M data symbols<br />

N-<br />

INTER-<br />

PACKET<br />

HEADER<br />

Completed<br />

PACKET<br />

64 bits 32 bits 64 bits 32 bits<br />

First<br />

INTER-<br />

PACKET<br />

HEADER<br />

64 bits<br />

First<br />

INTER-<br />

PACKET<br />

HEADER<br />

Fragmented<br />

or<br />

Completed<br />

PACKET<br />

PADDING<br />

PADDING<br />

MIC<br />

Second<br />

INTER-<br />

PACKET<br />

HEADER<br />

Submission page 156 UPA-OPERA<br />

…<br />

Fragmented<br />

PACKET<br />

Completed<br />

PACKET<br />

N-<br />

INTER-<br />

PACKET<br />

HEADER<br />

Fragmented<br />

or<br />

Completed<br />

PACKET<br />

64 bits 32 bits 64 bits<br />

32 bits<br />

64 bits 32 bits<br />

PADDING<br />

MIC<br />

Figure 59 Encrypted Burst examples<br />

Each MIC is calculated over the Burst Header, CCMP Header, its correspondent Interpacket Header, the packet or<br />

fragment of packet itself <strong>and</strong> the padding, but Burst Header <strong>and</strong> CCMP Header are sent only once at the beginning<br />

of the burst. More information about algorithms <strong>and</strong> field composition is given in section 10.1.<br />

Restrictions <strong>and</strong> rules regarding packet fragmentation in unencrypted burst remains the same for encrypted bursts.<br />

…<br />

PADDING<br />

PADDING<br />

PADDING<br />

MIC<br />

MIC<br />

32 bits<br />

MIC


4-June-07 P1901_PRO_016_r0<br />

5.4 Packet ACK Protocol<br />

The Packet ACK Protocol has the following functions:<br />

1) <strong>Control</strong> of sequence of received packets in the receiver<br />

2) Acknowledge of correct received packets <strong>and</strong> request of retransmission of no received or incorrect packets<br />

Each packet can be sent in one of the following modes:<br />

a) No ACK mode: The receiver cannot request any retransmission of this packet. The packet id is only used to<br />

reassembling fragments of one packet. The Req ACK bit in inter-packet header is set to 0 in this case.<br />

b) ACK mode: The receiver can do a sequence control, reassembling fragments of one packet <strong>and</strong> request<br />

retransmissions. The receiver is the responsible for sending ACKs to the transmitter about the receive<br />

packet. The Req ACK bit in inter-packet header is set to 1 in this case.<br />

The Packet ACK Protocol (PAP) uses fields located in the Burst Header or in the inter-packet header to perform the<br />

ACK algorithm:<br />

• ACK Info - 1 bit. Active when the Burst Header contains PAP information.<br />

• PAP Port – 7 bits: Local port of this PAP information<br />

• PAP Last Received Packet – 12 bits: Packet ID of last Received Packet . Used to decode PAP<br />

Information.<br />

• PAP Code Type – 1 bit: Packet ACK Protocol Codification Type. It is set to 0 when performing Run-<br />

Length Encoding <strong>and</strong> set to 1 when performing Group Encoding.<br />

• PAP Info – 119 bits in case of Burst Header without data. And 55 bits in case of Burst Header with<br />

data. . The meaning of these bits depends on PAP Code Type as explained below.<br />

• PAP Init – 1 bit. The receiver should move the reception buffer in order to have as first packet<br />

identification the first ACK Req packet identification from this burst.<br />

• Packet Id – 12 bits: Unique identification of each packet.<br />

• Fragment number – 3 bits: Each packet could be divided into 6 fragments. This is the identification of<br />

each fragment: from 0 to 5.<br />

• ACK Req – 1 bit. The transmitter is waiting an ACK about this packet to free it. When it is set to 0, the<br />

transmitter frees this packet when this packet is sent <strong>and</strong> the receiver can not request retransmissions<br />

about it.<br />

In case of ACK Req packets are transmitted, the receiver shall inform the transmitter about how the packets were<br />

received. Since the packet windows size is 2048 packets, 2048 bits shall be sent back to the transmitter so that it can<br />

free the correctly received packets <strong>and</strong> retransmit the packets that have been received incorrectly or not received.<br />

The feedback information shall be coded to fit in the allocated space. There are two types of encoding:<br />

Submission page 157 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

- Group Encoding (see 5.4.2)<br />

- Run-Length Encoding (see 5.4.3)<br />

The PAP codification could have some errors due to limited space left in the Burst Header. An error in PAP<br />

codification consists on requesting retransmission of a correct received packet. Errors in the PAP codification that<br />

acknowledge a not received packet or an incorrect received packet are forbidden.<br />

5.4.1 Transmission window management<br />

Packets can be transmitted without receiving acks while there are free positions in the transmission window. An<br />

occupied position in the transmission window is a sent packet whose ack has not been received. If all the positions<br />

in the transmission window are occupied, a timer (ACK_TIMER) shall be started. If no ack is received before the<br />

timer expires, the packets inside the transmission window shall be sent again. After MAX_RTX timeouts, the<br />

window shall be cleared (packets removed from the transmission memory) <strong>and</strong> the next burst that will be sent to the<br />

same destination shall have the PAP Init bit set to 1.<br />

5.4.2 Packet ACK Protocol: Group Encoding<br />

When using Group Encoding, the status of the received packets is coded in a compressed format. Status is not<br />

expressed by individual packets but by groups of packets.<br />

Groups shall be all the same length, <strong>and</strong> shall be formed starting from the most recently received packet id<br />

backwards to the oldest id.<br />

The PAP information depends on the PAP Code Type <strong>and</strong> on PAP Algorithm (PAP Info bits [1:0]):<br />

PAP Algorithm Description<br />

0 Algorithm A (see section 5.4.2.1)<br />

1 Algorithm B (see section 0)<br />

2 Algorithm C (see section 5.4.2.3)<br />

In all these algorithms, the following information is used:<br />

Table 14: PAP algorithm coding<br />

Submission page 158 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

PAP Info Bits Parameter Description<br />

[2] Polarity of the left-over bits The PAP Information per<br />

group is about a number of<br />

packet ids. The rest of packet<br />

ids are correctly received if<br />

“polarity of the left-over bits”<br />

is equal to 1. And incorrectly<br />

received if it is equal to 0.<br />

[8:3] Compression Ratio Number of packets<br />

represented by each bit<br />

Table 15: PAP algorithm information<br />

The difference between Algorithm A, B <strong>and</strong> C is that B <strong>and</strong> C needs extra information.<br />

In case of Burst with data, the bits in Burst Header are used depending on the chosen algorithm:<br />

- Algorithm A, the bits from [54:9] are used to describe the status of each group (Group Status)<br />

- Algorithm B <strong>and</strong> C:<br />

o Bits from [19:9] are used for parameter “offset”.<br />

o Bits from [54:20] are used to describe the status of each group (Group Status)<br />

In case of Burst without data, the bits in Burst Header are used depending on the chosen algorithm:<br />

- Algorithm A, the bits from [118:9] are used to describe the status of each group<br />

- Algorithm B <strong>and</strong> C:<br />

o Bits from [19:9] are used for parameter “offset”.<br />

o Bits from [118:20] are used to describe the status of each group (Group Status)<br />

5.4.2.1 Group Encoding: Algorithm A<br />

In this algorithm the receiver shall send 4 pieces of information to the transmitter.<br />

1. The last correctly received packet<br />

2. The number of packets in each group (compression ratio)<br />

3. The polarity of the left-over bits (1 shall mean received correctly/ 0 shall mean received incorrectly)<br />

4. The PAP coded bit: 46 bits in Burst Header with data or 111 bits in Burst Header without data.<br />

With this information the transmitter shall be able to reconstruct the receiver window <strong>and</strong> retransmit or free-up<br />

packets appropriately.<br />

The PAP informatioin decoder (transmitter) in order to reconstruct the status of the packets sent previously to the<br />

last correctly received shall take the first bit of the coded bits <strong>and</strong> replicate it a number of times, (given by the<br />

Submission page 159 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

compression ratio), until completing the window (2048 bits). The group porder goes from the most recently<br />

received to least recently received (see Figure 60)<br />

Polarity<br />

of lefover<br />

bits<br />

PAP<br />

Coded<br />

Bits<br />

[last bit]<br />

Compression<br />

ratio<br />

2048<br />

5.4.2.2 Packet ACK Protocol: Algorithm B<br />

PAP<br />

Coded<br />

Bits [1]<br />

Figure 60: Packet ACK Protocol: Algorithm A<br />

Last correctly<br />

received packet<br />

PAP<br />

Coded<br />

Bits [0]<br />

Submission page 160 UPA-OPERA<br />

ok<br />

Compression<br />

ratio<br />

Compression<br />

ratio<br />

This algorithm is similar to the algorithm A but one extra piece of information shall be sent:<br />

• An offset that shall indicate where the next transition (status change) after the last correctly received packet<br />

(not including the offset itself) occurs.<br />

In this algorithm, the status of the groups is described by 35 bits in Burst Header with data or 99 bits in Burst<br />

Header without data.<br />

With this information the PAP decoder (transmitter) shall take the previous packet to the last correctly received<br />

packet, <strong>and</strong> count backwards until the offset is reached <strong>and</strong>. It shall fill these spacespositions with either ones or<br />

zeros (depending on the polarity bit). After this, the decoding of the algorithm B shall be identical of that ofto the<br />

algorithm A. The process is described in the following figure:<br />

Polarity<br />

of lefover<br />

bits<br />

PAP<br />

Coded<br />

Bits<br />

[last bit]<br />

Compression<br />

ratio<br />

2048<br />

PAP<br />

Coded<br />

Bits [1]<br />

PAP<br />

Coded<br />

Bits [0]<br />

Compression<br />

ratio<br />

Compression<br />

ratio<br />

Figure 61: Packet ACK Protocol: Algorithm B<br />

1<br />

Last correctly<br />

received packet<br />

NOT<br />

PAP<br />

Coded<br />

Bits [0]<br />

Offset<br />

ok<br />

1


4-June-07 P1901_PRO_016_r0<br />

5.4.2.3 Grouping Encoding: Algorithm C<br />

This algorithm is a variation of the algorithm B. The receiver shall send the same amount of data than in algorithm<br />

B but the transmitter shall decode it in a different way.<br />

The PAP decoder (transmitter) shall take the information <strong>and</strong> assume that from the starting point (this is the last<br />

correctly received packet) to the offsets, the packets were incorrectly received. And from the offset, it shall start the<br />

decoding in the same way as in algorithms A <strong>and</strong> B.<br />

Polarity<br />

of lefover<br />

bits<br />

PAP<br />

Coded<br />

Bits<br />

[last bit]<br />

Compression<br />

ratio<br />

PAP<br />

Coded<br />

Bits [1]<br />

PAP<br />

Coded<br />

Bits [0]<br />

Compression<br />

ratio<br />

Compression<br />

ratio<br />

2048<br />

Figure 62: Packet ACK Protocol: Algorithm C<br />

5.4.3 Packet ACK Protocol: Run-Length Encoding<br />

Last correctly<br />

received packet<br />

Incorrect<br />

Offset<br />

When using Run-Length encoding the status of the received packets is compressed <strong>and</strong> transmitted by groups. But<br />

differently from Group Encoding because the length of each groups is variable.<br />

Instead of transmitting the status of each group, which is transmitted is the number of packets in each group (group<br />

length).Groupboundaries are marked by the status of the received packets. If one group represents packets that have<br />

been received correctly, the next group represents packets that have been received incorrectly or not received.<br />

The number of bits that inidcates the length of each group is variable <strong>and</strong> shall be chosen so that the number of<br />

packets whose status is reported is maximized.<br />

In case of Run-Length Encoding, the PAP information is divided in the following fields:<br />

PAP Info Bits Parameter Description<br />

[0] Status of last received packet<br />

Submission page 161 UPA-OPERA<br />

ok<br />

(0) If last received packet<br />

is incorrect<br />

(1) If last received packet<br />

1


4-June-07 P1901_PRO_016_r0<br />

is correct<br />

[4:1] Length width Number of bits used to<br />

express about the length of<br />

each group. The allowed<br />

values are from 1 to 11. The<br />

value 0 means that all packets<br />

are incorrect.<br />

[54:5] (Burst Header)<br />

[118:5] (Burst Header<br />

without Data)<br />

Group lengths This field is divided in<br />

subfields of Length width<br />

bits. Each of the subfields<br />

express the number of packets<br />

belonging to each group<br />

It is possible to have a Length width not big enough to express the length of one or more groups, this is, length ><br />

2 (Length width) – 1. In such case, the length of the group shall be expressed with the maximum value, 2 (Length width) – 1.<br />

The following group shall be expressed with length 0, <strong>and</strong> the group after it with the remainder, length mod (2 (Length<br />

width) – 1).<br />

When Length width is equal to 0 it means that all packets are incorrectly received or not received.<br />

Length width Number of Group<br />

Lengths in Burst<br />

Burst Header in a<br />

Burst with Data<br />

Number of Group<br />

Lengths in Burst<br />

Burst Header in a<br />

Burst without<br />

Data<br />

Length of group of last<br />

received packet<br />

1 50 114 Group Lengths [0]<br />

2 25 57 Group Lengths [1:0]<br />

3 16 38 Group Lengths [2:0]<br />

4 12 28 Group Lengths [3:0]<br />

5 10 22 Group Lengths [4:0]<br />

6 8 19 Group Lengths [5:0]<br />

7 7 16 Group Lengths [6:0]<br />

Submission page 162 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

8 6 14 Group Lengths [7:0]<br />

9 5 12 Group Lengths [8:0]<br />

10 5 11 Group Lengths [9:0]<br />

11 4 10 Group Lengths [10:0]<br />

See the following example with Length width equal to 11:<br />

Status of<br />

last<br />

received<br />

packet<br />

NOT<br />

Status of last<br />

received<br />

packet<br />

Group<br />

Lengths<br />

[43:33]<br />

Table 16: Run-Length encoding<br />

Status of last<br />

received<br />

packet<br />

Group<br />

Lengths<br />

[32:22]<br />

5.4.4 Transmission of PAP information<br />

2048<br />

NOT<br />

Status of last<br />

received<br />

packet<br />

Group<br />

Lengths<br />

[21:11]<br />

Figure 63: Run-Length encoding example<br />

Last correctly<br />

received packet<br />

Status of last<br />

received<br />

packet<br />

Group<br />

Lengths<br />

[10:0]<br />

If a node has PAP information to be sent <strong>and</strong> gains access to the channel, the PAP information shall be sent inside<br />

the Burst Header. If this node cannot transmit data symbols because of the assigned validity or because there are no<br />

data to be transmitted, a Burst Header without data in the payload shall be sent. Because one node can be receiving<br />

from more than one node, it could send more than one Burst Header without data in the payload.<br />

5.5 LLC service specification (LLC SAP)<br />

5.5.1 LLC service primitives<br />

Following table shows LLC DATA <strong>and</strong> MNT primitives:<br />

Submission page 163 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

5.5.2 LLC-DATA.req<br />

5.5.2.1 Function<br />

Primitive Type<br />

LLC-DATA.req Request<br />

LLC-DATA.cnf Confirm<br />

LLC-DATA.ind Indication<br />

LLC-MNT-ACKMODE.req Request<br />

Table 17 LLC service primitives<br />

This primitive requests a transfer of a Convergence layer PDU from a local Convergence layer entity.<br />

5.5.2.2 Semantics of the service primitive<br />

LLC-DATA.req (CPDU):<br />

- CPDU: Convergence layer Protocol Data Unit<br />

5.5.2.3 When generated<br />

This primitive is generated by the Convergence layer entity when a CPDU is to be transferred.<br />

5.5.2.4 Effect of receipt<br />

The LLC layer entity starts the sending of the CPDU.<br />

5.5.3 LLC-DATA.cnf<br />

5.5.3.1 Function<br />

This primitive has local significance <strong>and</strong> provides the Convergence layer with status information (sending finished)<br />

of the corresponding preceeding LLC-DATA.req primitive.<br />

5.5.3.2 Semantics of the service primitive<br />

This primitive has no parameters.<br />

Submission page 164 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

5.5.3.3 When generated<br />

The primitive is passed from the LLC layer entity to the Convergence layer entity to indicate that the previous<br />

CPDU has been sent.<br />

5.5.3.4 Effect of receipt<br />

The Convergence layer entity is aware that the LLC is available to send new CPDUs, <strong>and</strong> can issue new LLC-<br />

DATA.req primitives.<br />

5.5.4 LLC-DATA.ind<br />

5.5.4.1 Function<br />

This primitive defines the transfer of a CPDU from the LLC layer entity to the Convergence layer entity.<br />

5.5.4.2 Semantics of the service primitive<br />

LLC-DATA.ind (CPDU):<br />

- CPDU: Convergence layer Protocol Data Unit<br />

5.5.4.3 When generated<br />

The primitive is passed from the LLC layer entity to the Convergence layer entity to indicate the arrival of a CPDU.<br />

5.5.4.4 Effect of receipt<br />

The Convergence layer entity processes the newly received CPDU.<br />

5.5.5 LLC-MNT-ACKMODE.req<br />

5.5.5.1 Function<br />

This primitive requests the use or not of LLC ACKs for data transmission.<br />

5.5.5.2 Semantics of the service primitive<br />

LLC-MNT-ACKMODE.req (ack_mode, port) :<br />

- ack_mode = [yes|no]<br />

- port: local transmission port to remote peer node<br />

Submission page 165 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

5.5.5.3 When generated<br />

The primitive is generated by the Management layer to enable or disable the use of LLC ACKs to transmit data to a<br />

specified port.<br />

5.5.5.4 Effect of receipt<br />

The LLC layer will configure the port accordingly by means of ACK or no ACK transmission.<br />

6 CONVERGENCE LAYER<br />

6.1 OVERVIEW<br />

This section describes the mechanisms that are used to encapsulate packets coming from external interfaces before<br />

passing them to the LLC. Some modifications are made to the Ethernet packet from the external interfaces. So the<br />

main task of the Convergence layer is Ethernet packet formatting.<br />

6.2 PACKET FORMAT<br />

The IEEE 1901 Packet Format is derived from the IEEE 802.3 frame format without the following fields:<br />

- Preamble (PRE) - 7 bytes. The PRE is an alternating pattern of ones <strong>and</strong> zeros that tells receiving stations<br />

that a frame is coming, <strong>and</strong> that provides a means to synchronize the frame-reception portions of receiving<br />

physical layers with the incoming bit stream.<br />

- Start-of-frame delimiter (SFD) - 1 byte. The SOF is an alternating pattern of ones <strong>and</strong> zeros, ending with<br />

two consecutive 1-bits indicating that the next bit is the left-most bit in the left-most byte of the destination<br />

address.<br />

Additional fields are added to support BPL broadcast of packets <strong>and</strong> OVLANs, as explained below<br />

See the following figure to underst<strong>and</strong> the differences:<br />

IEEE Std 802.3 Packet Format<br />

IEEE 1901 Packet Format<br />

PRE SFD DA SA TPID TCI<br />

Type/<br />

EXT PB OVLAN Word DA SA TPID TCI<br />

Data<br />

PLW<br />

length<br />

Submission page 166 UPA-OPERA<br />

Type/<br />

length<br />

Data


4-June-07 P1901_PRO_016_r0<br />

The Packet Format has the following fields:<br />

- EXT – 16 bits. Reserved for extensions<br />

- PB – 48 bits. Previous Bridge ID<br />

Figure 64 Packet format<br />

- OVLAN – 32 bits with the following information:<br />

o PCF – 1 bit. Pre-classified Packet<br />

o PCP – 3 bit. Pre-classified Packet Priority<br />

o OVLANV - 1 bit.Valid OVLAN<br />

o OVLANID - 12 bits. OVLAN Identifier<br />

- DA – 48 bits. Destination <strong>MAC</strong> Address. The DA field identifies which station(s) should receive the<br />

frame.<br />

- SA – 48 bits. Source <strong>MAC</strong> Address. The SA identifies the sending station.<br />

- TPID – 16 bits. Optional field. Defined value of 8100 in hex. When a frame has the EtherType equal to<br />

8100, this frame carries the tag IEEE 802.1Q/802.1p, otherwise it will be filled with 0x0000.<br />

- TCI – 16 bits. Optional field. VLAN Tag <strong>Control</strong> Information field including user priority, Canonical<br />

format indicator <strong>and</strong> VLAN ID. This field is always present, even if the TPID is not 0x8100.<br />

- Len – 16 bits. IEEE Std 802.3-style Length/Type Field<br />

- Data – From 42 to 1500 bytes. The Data Payload of this packet.<br />

- PLW – From 0 to 3 bytes. Because the packet has to be 32 bit aligned, there are from 0 to 3 bytes of no<br />

valid data at the end of this packet. This field is called Padding Last Word.<br />

The incoming IEEE std 802.3 packet may have TCI field or not, but the TCI field is always present in the IEEE<br />

1901 packet format.<br />

6.2.1 Maximum <strong>and</strong> Minimum Packet length<br />

The maximum length of one packet is equal to 1536 octets.<br />

The minimum length of one packet is equal to 76 octets.<br />

Submission page 167 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

6.2.2 OVLAN Fields<br />

OVLAN fields are intended for OVLAN The OVLAN is a sort of Virtual LAN (VLAN), which functions<br />

independtly of IEEE 802.1Q. Jointly with IEEE 802.1Q functionality it provides a two-layer Virtual LAN<br />

functionality between BPL nodes. OVLAN functionality is described in Clause 7.4).<br />

The OVLAN fields are the following:<br />

- OVLANV - 1 bit. Valid OVLAN<br />

- OVLANID - 12 bits. OVLAN Identifier<br />

The OVLAN fields have the following meaning:<br />

- When OVLANV is equal to 0, the OVLANID is not used <strong>and</strong> the packet is not carrying OVLAN<br />

information.<br />

- When OVLANV is equal to 1, the OVLANID is equal to the tag, <strong>and</strong> the tag is used with the same sense as<br />

in IEEE 802.1Q. The only difference is the following:<br />

o The tag equal to 0 is a possible tag<br />

o The tag equal to 0xFFF is a tag that must be accepted by all the filters.<br />

As in IEEE 802.1Q where the TCI has priority information, the OVLAN word has two fields to know the priority of<br />

this packet:<br />

- PCF: Pre-classified Packet<br />

- PCP: Pre-classified Packet Priority<br />

If PCF is set to 1, the priority of this packet is equal to PCP value. The 802.1p or any other rule is not applied to<br />

decide the priority. Priority assignment is described in clause 8.<br />

In the case of nodes that do not perform OVLAN filtering, the OVLAN field will not be modified if the packet was<br />

received through a BPL interface. If the packet was received through other interfaces, the node will add the<br />

OVLAN fields with OVLANV = 1b0 <strong>and</strong> PCF = 1b0.<br />

6.2.3 BPL service class<br />

The OVLAN word has two fields that store the poweline service class of this packet. BPL service class is used in<br />

parallel to IEEE 802.1Q priority. The fields are:<br />

- PCF: Pre-classified Packet<br />

- PCP: Pre-classified Packet Service class<br />

Submission page 168 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

If PCF is set to 1, this indicates that PCP contains a valid BPL service class.<br />

For packets received through a non-BPL interface, PCF = 0. For packets received through a BPL interface PCF<br />

must be left unchanged.<br />

BPL service class can be calculated then by the QoS function (see 8.2).<br />

6.2.4 PB Field<br />

This field are used to avoid loops with broadcast packets.<br />

Broadcast packets can be sent in two ways through the BPL network:<br />

- Using the broadcast port. The broadcast packet is sent using the broadcast port <strong>and</strong> all nodes that have<br />

negotiated ports with the sender will receive it.<br />

- Using unicast ports. The broadcast packet is sent once per each negotiated port, except the port where it was<br />

received in the case it was a BPL port.<br />

In the case when a broadcast packet is sent using the broadcast port, these fields are used to avoid loops. In the other<br />

case, they are not necessary. In any case, they shall always be present in all packets.<br />

The meaning of the field (defined in 6.2) is the following:<br />

- PB: Previous Bridge ID. It shall contain the <strong>MAC</strong> address of the previous node that has transmitted this<br />

packet.<br />

When a packet enters the BPL network Previous Bridge ID shall be set to 0.<br />

In any retransmission, the Previous Bridge ID shall be filled with the ID of the last unit that transmitted the packet.<br />

When receiving a packet it shall be discarded when its Previous Bridge ID is equal to the <strong>MAC</strong> address of the node<br />

that has received the packet, because this indicates that the node has already received the packet before..<br />

6.2.5 Octet alignment<br />

The bytes from IEEE Std 802.3 are stored in 32 bits words in the following way:<br />

Byte<br />

3<br />

Byte<br />

2<br />

Submission page 169 UPA-OPERA<br />

Byte<br />

1<br />

Byte<br />

0<br />

Figure 65 Byte order


4-June-07 P1901_PRO_016_r0<br />

From IEEE 802.3 interface, the bytes are received in the following order: byte0, byte1, byte2 <strong>and</strong> byte3.<br />

And from this 32 bits word, the bytes are transmitted into the LLC interface in the following order: byte3, byte2,<br />

byte1, byte0. The packets are transmitted to the LLC in the way shown in Figure 66, starting from the top, since the<br />

LLC works with bytes.<br />

If we define N as the number of bytes in Data Payload plus the number of bytes of the Length/Type Field, then we<br />

can write N = 4*m + p; with m an integer value <strong>and</strong> p equal to 0, 1, 2 or 3. The number of bytes in PLW is equal to<br />

0 if p is equal to 0 or 4-p in the other cases, because the packet is 32 bit aligned.<br />

Submission page 170 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

bits<br />

7 6<br />

Reserved<br />

Reserved<br />

5<br />

4<br />

Data (from byte [6] to [4*m – 3])<br />

PLW (0 bytes if p is equal to 0 OR (4-p) bytes if p is different from 0)<br />

Last Word Data (from byte [4*m-2] to [4*m+p-3])<br />

FCS[3]<br />

FCS[2]<br />

FCS[1]<br />

FCS[0]<br />

Submission page 171 UPA-OPERA<br />

3<br />

PB[1]<br />

PB[0]<br />

Extensions[1]<br />

Extensions[0]<br />

PB[5]<br />

PB[4]<br />

PB[3]<br />

PB[2]<br />

OVLANID[7:0]<br />

OVLANV OVLANID[11:8]<br />

PCP PCF<br />

Reserved<br />

DA[3]<br />

DA[2]<br />

DA[1]<br />

DA[0]<br />

SA[1]<br />

SA[0]<br />

DA[5]<br />

DA[4]<br />

SA[5]<br />

SA[4]<br />

SA[3]<br />

SA[2]<br />

TCI[7:0]<br />

TCI[15:8]<br />

TPID[7:0]<br />

TPID[15:8]<br />

Data[1]<br />

Data[0]<br />

Lenght[0]<br />

Length[1]<br />

Data[5]<br />

Data[4]<br />

Data[3]<br />

Data[2]<br />

Figure 66 Packet byte order to the LLC<br />

6.3 CONVERGENCE LAYER SERVICE PRIMITIVES<br />

The bridging block communicates with the convergence layer through 3 service primitives Eth.req, Eth.cnf <strong>and</strong><br />

Eth.ind:<br />

2<br />

1<br />

0<br />

Octet<br />

1<br />

2<br />

3<br />

4<br />

5<br />

6<br />

7<br />

8<br />

9<br />

10<br />

11<br />

12<br />

13<br />

14<br />

15<br />

16<br />

17<br />

18<br />

19<br />

20<br />

21<br />

22<br />

23<br />

24<br />

25<br />

26<br />

27<br />

28<br />

29<br />

30<br />

31<br />

32<br />

33<br />

34<br />

35<br />

36<br />

37<br />

38<br />

39<br />

40<br />

41<br />

42<br />

43<br />

44


4-June-07 P1901_PRO_016_r0<br />

Notes:<br />

• Eth.req (802.3/EthernetII frame, BPL local ports list, PB, OVLAN word): This primitive requests the<br />

transfer of an Ethernet frame from the local bridging block to a single peer bridging block or multiple peer<br />

bridging blocks in the case of multi-port transfer requests (see 6.3.1).<br />

• Eth.ind (802.3/EthernetII frame, BPL local port, LB, OVLAN word, Session ID): This primitive defines the<br />

transfer of an Ethernet frame from the convergence layer to the bridging block.<br />

• Eth.cnf: This primitive is used by the convergence layer to notify the bridging block of the results of the<br />

Eth.req primitive.<br />

• VLAN tag may be included in the 802.3/EthernetII frame<br />

• The OVLAN word includes PCF, PCP, OVLANV <strong>and</strong> OVLANID<br />

6.3.1 Multi-port transfer requests<br />

Multi-port transfer requests correspond to Eth.req service primitives including several BPL local ports as argument.<br />

Such requests are inherent to bridging in TDRs <strong>and</strong> HEs which manage several BPL ports. The multi-port requests<br />

are solicited by st<strong>and</strong>ard transparent bridging actions such as:<br />

1. Broadcast transmission: The IEEE 802.3 frame includes a Broadcast Ethernet address in its Destination<br />

Address field. The multi-port request concerns all the BPL ports managed by the bridging function except<br />

the one from which the Ethernet frame was received (if it was eventually received from a BPL port).<br />

2. Multicast transmission: The IEEE 802.3 frame includes a Multicast Ethernet address in its Destination<br />

Address field. The multi-port request might concern a subset of the BPL ports managed by the bridging<br />

function or a single native multicast BPL port associated.<br />

3. Bridge flooding: The bridging block could not find any association of a unicast Ethernet Destination<br />

addresses with a specific bridge port, the request is then flooded to all the bridge ports. The multi-port<br />

request concerns all the BPL ports managed by the bridging function.<br />

6.4 BROADCAST/MULTICAST HANDLER FUNCTIONAL REQUIREMENTS<br />

The convergence layer shall include a broadcast/multicast h<strong>and</strong>ler that shall perform the following functions:<br />

1. H<strong>and</strong>ling transfer of multicast management messages: Management messages can be unicast or multicast as<br />

described in section 7.4. Multicast management messages can be received from the bridging fundtion through<br />

primitives which are either single port requests or multi-port requests. Any multicast management message<br />

received through these requests shall be transferred over the broadcast port using HURTO modulation.<br />

2. Management of multi-port transfer requests which do not carry multicast management messages: upon<br />

reception of such multi-port transfer request from the convergence layer, the block shall compute the best<br />

method for h<strong>and</strong>ling the transfer. If the multi-port request concerns all the local ports of the Port Solver Table or<br />

if the request includes a broadcast/multicast Ethernet Destination Address, depending on the bit-loading tables<br />

associated to each local port, the block might consider transferring the Ethernet frame over the broadcast local<br />

Submission page 172 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

port using HURTO modulation. In the other cases, the multi-port request will result in several consecutive LLC<br />

service requests related to each unicast local port, or in the use of a native multicast local port.<br />

3. Broadcasts loop back avoidance: on the reception path, upon reception of a packet over the broadcast local port<br />

(127), the module shall discard any packet which is detected as previously transmitted (that is, the <strong>MAC</strong> address<br />

contained in the PB field of the packet is equal to the <strong>MAC</strong> address of the node).<br />

4. On the reception path, upon reception of a packet over the broadcast local port (127), the local port passed<br />

within the Eth.ind primitive shall be the one assigned to the remote node from which the request was received.<br />

7 BRIDGING FUNCTION<br />

7.1 General<br />

The bridging function interconnects bridge ports. There are two types of bridge ports: BPL ports <strong>and</strong> non-BPL ports<br />

<strong>and</strong> the management port. BPL ports are the bridge ports that represent a remote PL unit <strong>and</strong> are directly mapped<br />

onto the completed entries of the Port Solver Table. Non-BPL ports are any other external ports of the unit (e.g.<br />

Ethernet, USB, WIFI,…).<br />

The bridging function is based in st<strong>and</strong>ards IEEE 802.1D <strong>and</strong> IEEE 802.1Q as described below.<br />

From a bridging st<strong>and</strong>point, the convergence layer is seen as a set of bridge ports called “BPL ports” which are both<br />

transmission <strong>and</strong> reception unicast <strong>and</strong> native multicast ports. The bridging block of a node h<strong>and</strong>les as many BPL<br />

unicast ports as there completed entries in the Port Solver Table of this node, in addition to the native multicast<br />

ports that has a valid value in such Port Solver Table. The identifier of a BPL port corresponds to the value of the<br />

local port attached to a remote node, that can be a native multicast or an unicast port. The status (open/close) <strong>and</strong> the<br />

identifier of the BPL ports are mapped onto the status <strong>and</strong> identifiers of the local ports defined in the Port Solver<br />

Table.<br />

There is also a BPL management entity that can access all the ports in the same conditions as the higher layer<br />

entities as described in IEEE 802.1D.<br />

*Note: The port solver table includes complete entries <strong>and</strong> incomplete entries. Complete entries correspond to local<br />

port which are associated to solved remote port <strong>and</strong> <strong>MAC</strong> addresses. Incomplete entries correspond to local ports<br />

which associated unicast remote port are still not solved via the Port Solver Protocol.A complete entry may have<br />

an additional native multicast remote port associated.<br />

7.2 IEEE 802.1D conformance<br />

The bridging function shall conform to:<br />

a) IEEE Std 802.1D, with Basic Filtering Services support requirements<br />

Submission page 173 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

b) IEEE Std 802.1D Management (clause 14 of IEEE 802.1D-2004) requirements<br />

c) IEEE Std 802.1D Remote Management (clause 5.2 of IEEE 802.1D-2004) requirements<br />

as modified by the provisions of this st<strong>and</strong>ard<br />

The permanent filtering database, as defined in IEEE 802.1D-2004 clause 7.9 shall have a minimum size of 8<br />

entries.<br />

The dynamic filtering database, as defined in IEEE 802.1D-2004 clause 7.9 shall have a minimum size of 64<br />

entries.<br />

7.3 IEEE 802.1Q conformance<br />

The bridging function shall support VLAN according to IEEE Std 802.1Q requirements for VLAN-aware bridges,<br />

as modified by the provisions of this st<strong>and</strong>ard.<br />

The bridging function shall support a minimum of 32 VLANs.<br />

7.4 OVLAN Function<br />

7.4.1 General<br />

The OVLAN functionality is based on IEEE 802.1Q Virtual LAN (VLAN), but does not substitute the IEEE<br />

802.1Q functionality. Instead, if enabled, it shall work independtly of IEEE 802.1Q functionality.<br />

OVLAN function is is aimed to:<br />

• Avoid packets from one customer leaking into a neighbor customer (for security reasons).<br />

• Avoid packets from one BPL sub-network (for example, an LV cell) leaking into another BPL sub-network<br />

(for security reasons <strong>and</strong> in order to avoid the problem of bridge tables filling up with unnecessary <strong>MAC</strong><br />

addresses).<br />

In such cases, as IEEE 802.1Q VIDs are limited to less than 4096, a large network can rapidly run out of VLANs<br />

numbers if they are used for customer isolation, OVLAN should be used, leaving IEEE 802.1Q for its traditional<br />

VLAN purposes.<br />

The following processes are defined for OVLAN function<br />

Submission page 174 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

a) Frame admittance <strong>and</strong> OVLAN assignment<br />

b) OVLAN Ingress filtering<br />

c) OVLAN Egress filtering<br />

Each PL port has a list of OVLAN IDs which represent the OVLANS to which the port belongs (OVLAN_list)<br />

7.4.2 Frame admittance <strong>and</strong> OVLAN assignment<br />

7.4.2.1 Non PL ports<br />

The OVLAN parameters of a non PL port are:<br />

- OVLAN enabled / disabled<br />

- POVID (Port OVLAN identifier)<br />

If one port is OVLAN enabled, all incoming frames are assigned an OVLAN ID which is exactly the POVID of<br />

such port.<br />

7.4.2.2 PL PORTS<br />

The OVLAN parameters of a pl port are:<br />

- OVLAN enabled / disabled<br />

- Tagged only<br />

- POVID (Port OVLAN identifier)<br />

All packets coming from a port are discarded if <strong>and</strong> only if:<br />

a) The OVLAN is enabled for such port , tagged only parameter is set <strong>and</strong> the frame does not carry a valid OVLAN<br />

ID.<br />

The OVLAN ID of a frame is assigned the value of the POVID of the port if <strong>and</strong> only if:<br />

b) The OVLAN is enabled, tagged only parameter is not set <strong>and</strong> the frame does not carry a valid OVLAN ID.<br />

In the rest of cases the frames are admitted unchanged.<br />

Submission page 175 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

7.4.3 OVLAN Ingress filtering<br />

If any frame coming into the bridge has a valid OVLAN identifier, OVLAN is enabled <strong>and</strong> its OVLAN identifier is<br />

not included in the OVLAN list for such port, the frame is discarded, unless the frame has FFF as identifier. It is<br />

passed otherwise.<br />

7.4.4 OVLAN Egress filtering<br />

If any frame going out of the bridge has a valid OVLAN identifier <strong>and</strong> this OVLAN identifier is not included the<br />

OVLAN list for such port, the frame is discarded, unless the frame has FFF as identifier. It is passed otherwise.<br />

7.4.5 OVLAN management<br />

If a unit has OVLAN functionality, OVLAN parameters per port (OVLAN enabled / disabled, tagged only, POVID,<br />

<strong>and</strong> OVLAN_list) shall be modifiable by a management process.<br />

The management process shall be executable remotely.<br />

7.5 Sending broadcast/multicast Ethernet frames<br />

When sending a broadcast/multicast Ethernet frame or when flooding the ports of the bridge, two main ways to<br />

transmit multicast IEEE 802.3 frame con be configured.<br />

In the first option the bridging function shall provide the list of BPL ports related to this transfer as part of the<br />

Eth.req service primitive<br />

In the second option, the bridging function shall provide a native multicast BPL port related to this transfer as part<br />

of the Eth.req service primitive.<br />

The bridging function shall also support management of associations of multicast groups to native ports.<br />

The association of a multicast group to a native multicast port is done in two stages:<br />

a) The remote nodes belonging to a multicast group are associated to the native multicast port<br />

For this, the unit shall send Port Solver Protocol Multicast Port packets to the nodes selected to become associated<br />

to the native multicast port. The aim of such packets is to add in the Port Solver Table of each destination node that<br />

wants to join the multicast flow the selected Local native multicast Port as Second Remote Port (RP2).<br />

Submission page 176 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

b) In the forwarding tables, the list of individual unicast ports associated to the multicast group is substituted by the<br />

native multicast port.<br />

If a multicast group is associated to a native multicast port, any incorporation of a new node to such multicast group<br />

shall result in an association of such node to the native multicast port, as described in (a).<br />

Conversely, if a node is removed from a multicast group <strong>and</strong> such multicast group is associated to a native multicast<br />

port, the node shall be removed from the associated native multicast port. This shall be done by sending a Port<br />

Solver Protocol Multicast Port carrying as local native multicast port the so called invalid port. (0xFF).<br />

These actions (adding or removing a node from a native multicast port, <strong>and</strong> incorporation of the native multicast<br />

ports to the forwarding tables) shall be supported as a result of a management action <strong>and</strong> may, optionally, be done<br />

as a consequence of operation of group management protocols, such as IGMP or GMRP.<br />

7.6 PB field<br />

7.6.1 Bridging between BPL ports<br />

When bridging between BPL ports (HE or TDR feature), the bridging function shall return within the Eth.req a PB<br />

argument equal to the ID from which the packet has been received.<br />

7.6.2 Bridging from a non-BPL port to a BPL port<br />

When bridging from a non BPL-port to a BPL port, the PB argument of the Eth.req shall be set to 0.<br />

7.7 BPL service class transmission<br />

When bridging between BPL ports , if PCF=1 within the OVLAN argument of the received Eth.ind, the PCF <strong>and</strong><br />

PCP values (subfield of the OVLAN word argument) included in the subsequent Eth.req shall be kept unchanged.<br />

7.8 Filtering multicast management messages from a BPL port<br />

BPL Management messages are IEEE 802.2 SNAP encapsulated data units carried over an Ethernet frame which<br />

can be either unicast or multicast. Multicast management messages make use of one of the two following multicast<br />

addresses (referred as management multicast addresses): the STP multicast address 0x0180C2000000 (primarily<br />

used by the STP protocol but also used for some BPL management messages) or the IEEE P1901 specific multicast<br />

address: 0x01139D000000. Any Ethernet frame including a management multicast address shall be filtered by the<br />

bridging function <strong>and</strong> not retransmitted to any other port. Upon reception of management messages destined to the<br />

above two mentioned multicast addresses, the bridging function shall provide these frames to the management port.<br />

Submission page 177 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

7.9 Filtering multicast management messages from the management port<br />

BPL Multicast management messages from the management port shall only be flooded to the BPL ports (non-BPL<br />

ports excluded).<br />

8 QOS SERVICES<br />

8.1 INTRODUCTION<br />

This section describes mechanisms for applying specific guarantees in terms of b<strong>and</strong>width, latency <strong>and</strong> reliability to<br />

some flows. It is also possible to define a policy upon congestion. Any flow requiring such guarantees must initiate<br />

a connection through a Connection Admission <strong>Control</strong> procedure using protocol described in 0.<br />

The mechanisms described here below are designed for flows circulating from the HE to a CPE or vice versa. These<br />

mechanisms have not been designed to support QoS for flows between CPEs,<br />

The QOS services described here below rely on the configuration of several components:<br />

1. Service classes. (Must be declared in all the masters of a BPL cell).<br />

2. Classifier module: this module maps flows onto service classes (preconfigured in all the nodes).<br />

3. Congestion management (declared in all the masters).<br />

4. Traffic specifications, published through the CAC procedure. Pre-determined traffic specifications must be<br />

declared in CPEs.<br />

Note: A flow is a unidirectional data stream exchanged between two BPL units <strong>and</strong> carried over the same service<br />

class.<br />

BPL network uses a shared medium <strong>and</strong> provides differentiated control of the medium to h<strong>and</strong>le data transfers with<br />

QoS requirements. QoS services carry out end-to-end traffic delivery providing QoS transport on a per-user basis.<br />

The BPL cell master node will be in charge of schedule <strong>and</strong> guarantee the QoS of the BPL cell, <strong>and</strong> must assign<br />

resources to cell nodes based on the configured b<strong>and</strong>width limit <strong>and</strong> the resources reservations requests made. This<br />

node shall be named QC (quality controller).<br />

Also, there are others figures in the BPL cell which are the Flow Master Nodes (FMNs). A FMN is defined as the<br />

BPL node in charge of guarantee QoS requirement for a registered flow. This node will be the QC <strong>and</strong> also can be<br />

the BPL repeaters which will distribute the resouces given by the QC to the nodes connected to it.<br />

Submission page 178 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The FMN must receive the resource reservations requests using the CAC protocol (See section 0) <strong>and</strong> must decide if<br />

it has enough resources to assign to the incoming request or if it has to request more resources to the BPL master<br />

node.<br />

With this mechanism, we will have a complementary tool to limit the b<strong>and</strong>width. This information will be<br />

interesting to known if a new traffic of a service class can be started <strong>and</strong> the requirements for that traffic <strong>and</strong> service<br />

class can be assured.<br />

8.2 SERVICE CLASS DEFINITION<br />

Up to eight service classes can be defined within a BPL cell. Services classes are globally defined over a BPL<br />

subcell. Four service parameters are necessary to fully describe a service class: priority, subcell_access_time,<br />

resource reservation type <strong>and</strong> service reliability.<br />

8.2.1 Priority<br />

Service classes are directly mapped onto priorities. A priority uniquely identifies a service class. That is why all the<br />

other service parameters are configured <strong>and</strong> mapped from this priority parameter. Priorities shall have values from<br />

0 to 7, 0 being the lowest priority. If packets have to be dropped at the transmitter because of lack of resources, then<br />

the lower priority packets shall be dropped before the higher priority packets. When there are data of different<br />

priorities addressed to the same destination, higher priority data shall be transmitted earlier than lower priority data.<br />

8.2.1.1 Configuration<br />

Priority parameter is determined by the Classifier module operating at the bridging block level. The classifier<br />

analyses all the frames received from a bridge port (BPL port, non-BPL port, management port) <strong>and</strong> assigns a<br />

priority to each Ethernet frame transmitted to the convergence layer via the Eth.req primitive (see 6.3). The<br />

Classifier operates according to some predetermined <strong>and</strong>/or configurable rules (see 11.4). Any frame received from<br />

the management port shall be mapped to priority 7 (that is: service class 7).<br />

Note: For each Eth.req primitives delivered by the bridging block, a priority is submitted as part of the OVLAN<br />

word argument (PCP bits). The PCF bit of this OVLAN word might be set to 1 meaning that the priority is to be<br />

seamlessly bridged through the intermediate nodes of the BPL cell. This priority information is summarized within<br />

the Priority field of any Burst Header <strong>and</strong> the Frame Priority field of every upstream data token.<br />

8.2.2 Max Subcell <strong>Access</strong> Time<br />

The Max_Subcell_<strong>Access</strong>_Time corresponds to the max duration for a flow to access the channel on the subcell<br />

level. It is a latency requirement for the scheduler to be configured within any master of a BPL cell.<br />

Four Max_Subcell_<strong>Access</strong>_Time are defined at the master level. The minimum value of the<br />

Max_Subcell_<strong>Access</strong>_Time is used as the reference step from which the three other Max_Subcell_<strong>Access</strong>_Time are<br />

derived by multiplying by 2, 4 or 8 this reference step.<br />

Submission page 179 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

8.2.2.1 Configuration<br />

The reference step shall be configured within any master of a BPL cell. This parameter is configured using the<br />

QOS_LATENCY_STEP parameter (min 20ms, max 400ms).<br />

Mapping a Max_Subcell_<strong>Access</strong>_Time to a priority: Such a mapping shall be declared within each master by using<br />

the QOS_LATENCY.prio+1 parameter.<br />

8.2.3 Resource reservation type<br />

This parameter is related to the type of claimed guarantees provided in terms of node resources <strong>and</strong> time resources.<br />

It can take three values:<br />

• Type Best Effort: No guarantees on the node <strong>and</strong> time resources. This type will be mapped with the nonguaranteed<br />

service classes. Resources are granted on a Best Effort basis.<br />

• Type ABR (Available Bit-Rate): Requests ask for node <strong>and</strong> time resources for which a minimum b<strong>and</strong>width<br />

can be guaranteed with a peak over the minimum. The peak can be limited by the network capability or the<br />

node limit b<strong>and</strong>width.<br />

• Type VBR (Variable Bit-Rate):Requests ask for node <strong>and</strong> time resources for which an average b<strong>and</strong>width<br />

can be guaranteed with a maximum variation around this average.<br />

• Type CBR (Constant Bit-Rate):Requests ask for individual guarantees in terms of node <strong>and</strong> time resources.<br />

The granted node <strong>and</strong> time resources are not shared. The claimed b<strong>and</strong>width is guaranteed.<br />

Note: Any class which is associated to an ABR, VBR or CBR type corresponds to a connected service requiring<br />

initiation of a Connection Admission <strong>Control</strong> Procedure. By extension, CBR, VBR or ABR flows are called<br />

connected flows unlike Best Effort flows which are non connected flows.<br />

A maximum upstream <strong>and</strong> downstream b<strong>and</strong>width limitation applies to all the Best Effort <strong>and</strong> ABR flows of the<br />

same node (see 12).<br />

CBR <strong>and</strong> VBR traffic shall be reserved for operator services such as VoIP <strong>and</strong> video streaming services (IPTV,<br />

VOD, …), <strong>and</strong> shall be out of the b<strong>and</strong>width limitation. To accept or deny these services, the FMN must assure that<br />

network resources will be available <strong>and</strong> mechanisms for AAA services shall be used in order to authenticate the<br />

service can be used by the node.<br />

8.2.3.1 Configuration<br />

Mapping a Resource Reservation Type to a priority: Such a mapping shall be declared within each master by using<br />

the QOS_PRIORSV.prio+1 parameter.<br />

Submission page 180 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

8.2.4 Service reliability<br />

This parameter defines if the ACK mode is enabled (see section 5.4) within the service class.<br />

8.2.4.1 Configuration<br />

Mapping Service Reliability to a priority: Such a mapping shall be declared within each master by using the<br />

QOS_PRIOACK.prio+1 parameter.<br />

8.2.5 Example of a service class definition<br />

The service class definition shall be the same for all nodes in the BPL cell, <strong>and</strong> must determine univocally the the<br />

relationship between priority, maximum subcell access time, resource reservation <strong>and</strong> service reliability<br />

characteristics.<br />

This service class definition must be used by QoS to determine the priorization between flows <strong>and</strong> resources<br />

reservation in the network, <strong>and</strong> will provide criteria to allow or deny new flows or to drop existent flows to allow<br />

new flows which higher service class.<br />

Table 18 shows an example of possible relationship between service classes, priorities, Max_Subcell_<strong>Access</strong>_Time,<br />

Service Reliability <strong>and</strong> Resource Reservation Type.<br />

Submission page 181 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Service<br />

Class<br />

Resource<br />

reservation<br />

Priority MaxSubcell<br />

<strong>Access</strong><br />

Time<br />

7 Best Effort 7 240 No<br />

6 CBR 6 30 No<br />

5 VBR 5 60 Yes<br />

4 VBR 4 120 Yes<br />

3 VBR 3 120 No<br />

2 ABR 2 120 Yes<br />

1 Best Effort 1 240 No<br />

0 Best Effort 0 240 No<br />

Table 18 Definition of Service Classes: example<br />

Service<br />

Reliability<br />

(ACK<br />

enabled)<br />

The definition of service classes as described in table 1 could be used to implement QoS services for applications as<br />

described in Table 19.<br />

Submission page 182 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Service Class Application<br />

Examples<br />

7 Management<br />

messages<br />

6 VoIP<br />

5 Video, Games<br />

4 Data Highprio<br />

3 Data Highprio<br />

2 Data Highprio<br />

1 Data Lowprio<br />

0 Data Lowprio<br />

Table 19 Mapping applications to service classes: example<br />

8.2.6 Provisioning Service Class Definitions to slaves<br />

As detailed in 0, nodes that wish to request a resource reservation through the Connection Admission <strong>Control</strong><br />

procedure must make a reference to the requested service class. As a matter of fact, it is necessary for the slaves to<br />

have an idea of the service class definitions. The description of the available service classes will be obtained<br />

through the Autoconfiguration process.<br />

8.3 CONGESTION MANAGEMENT<br />

The mission of CM is to manage the accepted connections in congested networks (due to a sudden drop in the<br />

channel quality, for example). There are two possible policies that can be configured in the system:<br />

• Fair Congestion Management Policy (FCMP): all traffic flows are treated equally. Therefore, if the<br />

traffic scheduler cannot meet the b<strong>and</strong>width <strong>and</strong> latency requirements from users, it will decrease the<br />

performance of all active flows equally until new b<strong>and</strong>width <strong>and</strong> latency definitions can be supported.<br />

Submission page 183 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• Priority Congestion Management Policy (PCMP): lower priority traffic performance is decreased in<br />

order to guarantee higher priority traffic SLA. Therefore, access to the channel is denied to lower service<br />

types first, until SLA of higher service types can be maintained.<br />

• “Quality Service” Congestion Management Policy (QSCMP): The congestion manager will act like as<br />

Priority Congestion Management but uses the service class <strong>and</strong> the quality session parameters to perform<br />

the scheduling <strong>and</strong> the acceptance criteria for new sessions. The sessions with higher quality session values<br />

will have more probabilities to be scheduled accomplishing its requirements when network is congested.<br />

Quality Session parameter can be also a mixture of priority <strong>and</strong> age, or an arbitrary parameter defined by<br />

the network operator.<br />

8.3.1 Configuration<br />

The Congestion Management can be configured using the Auto-configuration protocol. In this section, we<br />

enumerate the auto-configuration parameters that modify the behavior of the Congestion Management. For more<br />

information, see 11.<br />

QOS_BW_POLICY = [0|1|2] configures the CM in which the QoS manages the network in the event of congestion<br />

(0 configures the CM in FCMP mode; 1 configures the CM in PCMP mode; 2 configures the CM in QSCMP<br />

mode).<br />

8.4 CONNECTION ADMISSION CONTROL<br />

Initiation of a Connection Admission <strong>Control</strong> (CAC) procedure is required for any connected flow. The mission of<br />

the Connection Admission <strong>Control</strong> is to ensure that the BPL network can deliver the agreed services <strong>and</strong> guarantees<br />

to new flows while maintaining the requested performance of already accepted flows.<br />

The Connection Admission <strong>Control</strong> functionality is embedded inall the network. The CAC protocol might be used<br />

in the following two scenarios:<br />

• Before the transmission of a connected flow, the CAC shall be used to reserve resources on the nodes in the<br />

system that collaborates in the communication of the new flow (from the node initiating the flow to the<br />

nodethat shall guarantee the flow). The CAC requests made to commit resources for a given Service Class<br />

may be new or updates from previous reservations.<br />

• At the end of the transmission of a connected flow, resources may be released. Release of resources may be<br />

done explicitly by transmitting a CAC Stop message indicating traffic flow is not longer needed, or may be<br />

done when a timer, MAX_CAC_DRP_TO expires since the last time a Data Token with the Session ID of<br />

the traffic was received by the node.<br />

In the CAC protocol, the exchanged parameters to verify whether or not the BPL network can guarantee the<br />

required service shall include the required b<strong>and</strong>width, <strong>and</strong> the maximum latency dem<strong>and</strong>ed by the new node.<br />

Submission page 184 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

8.5 Traffic Shaping<br />

QoS apply traffic shaping in two different ways. Each one is applied based on the service class of traffic:<br />

• Limit b<strong>and</strong>width: Is applied for best-effort <strong>and</strong> ABR service classes. Is based on the credit assignation for<br />

this service classes. This credit is assigned per-user <strong>and</strong> is renewed periodically. If the credit is not used<br />

during the period time, it’s lost <strong>and</strong> can not be used in the next period.<br />

• Guaranteed b<strong>and</strong>width: Is applied for VBR <strong>and</strong> CBR service classes. Traffic must be allowed prior to<br />

transmit <strong>and</strong> a reservation is made for this type of traffic using the CAC protocol. Channel time is assigned<br />

based on the resources reservation to meet b<strong>and</strong>width <strong>and</strong> latency requirements. Due to the explicit<br />

reservation of resources, nodes shall have mechanisms to allocate buffer space to support the incoming<br />

traffic.<br />

8.5.1 QOS Requirements<br />

To provide QoS requirements is needed support from <strong>MAC</strong> layer in order to identify the network usage by each<br />

node <strong>and</strong> the traffic service classes in the network. This support must be provided as <strong>MAC</strong> primitives <strong>and</strong> will be:<br />

• Transmitted priorities by a CPE. Must be a set of bits <strong>and</strong> each bit must be mapped to a priority<br />

• Transmitted priorities by BPL subcell/cell masters.<br />

• Single transmission Channel time: Must be the transmission time used for individual transmissions for each<br />

node in the BPL cell.<br />

• Transmitted data: Data transmitted since last time the token was received, so that b<strong>and</strong>width limitation<br />

algorithm can be reconfigured dynamically.<br />

• Unused channel time: The percentage of network resources assigned to this node available in the network.<br />

Other QoS facilities should be implemented in order to guarantee QoS requirements:<br />

• BPL node shall be able to define service classes with or without <strong>MAC</strong> Level acknowledgment capabilities.<br />

• BPL node shall be able to assign resources in a per-user <strong>and</strong> per-service basis to guarantee constant,<br />

variable or peak rate traffic requirements.<br />

• BPL node shall be able to transmit to a subset of possible receivers nodes in order to guarantee unique<br />

channel usage per-user.<br />

• BPL node shall configure MTU per-user in order to guarantee minimum transmission time per-user.<br />

• BPL node should be able to avoid transmission of lower priorities to guarantee preferential treatment of<br />

higher priorities in a per-flow basis.<br />

Submission page 185 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Furthermore, there are <strong>MAC</strong> primitives to give the QoS scheduler an idea of the BPL topology. These primitives<br />

collect information in the Upstream direction. These primitives allows to compute correctly the Validity field. These<br />

parameters are:<br />

• Maximum Number of Hops in the network<br />

• Number of Downstream Nodes<br />

9 LAYER MANAGEMENT<br />

9.1 CONTROL PROTOCOLS<br />

9.1.1 CCP (Communication <strong>Control</strong> Protocol) Description<br />

The exchange of management messages between IEEE P1901 nodes needs a special <strong>and</strong> homogeneous structure in<br />

order to simplify implementation <strong>and</strong> clarify information exchanges between nodes. Such information will have as<br />

source <strong>and</strong> destination IEEE P1901 nodes, <strong>and</strong> will be used for internal management.<br />

The structure of the packet that will be exchanged by two BPL nodes will follow the scheme presented in Figure 67:<br />

TPID<br />

DSAP<br />

SSAP<br />

CTL<br />

OUI0<br />

OUI1<br />

OUI2<br />

Type0<br />

Type1<br />

Length<br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

TCI<br />

Figure 67 Management packet<br />

The management information will be encapsulated using SNAP as depicted in Figure 67 into a regular Ethernet<br />

Frame. Using SNAP with an assigned OUI, it is possible to create specific protocols for IEEE P1901 nodes.<br />

Encapsulated fields will be described in the following table:<br />

Field Length Description<br />

Submission page 186 UPA-OPERA<br />

Data<br />

DSAP 1 byte Destination Service <strong>Access</strong> Point


4-June-07 P1901_PRO_016_r0<br />

SSAP 1 byte Source Service <strong>Access</strong> Point<br />

CTL 1 byte <strong>Control</strong> field<br />

OUI0 1 byte Organizationally Unique Identifier Byte 0<br />

OUI1 1 byte Organizationally Unique Identifier Byte 1<br />

OUI2 1 byte Organizationally Unique Identifier Byte 2<br />

Type0 1 byte Ethertype byte 0<br />

Type1 1 byte Ethertype byte 1<br />

Table 20 Management packet field description<br />

For the internal BPL protocols that IEEE P1901 stations will exchange, the described fields must have the following<br />

values:<br />

Field Length Value<br />

DSAP 1 byte 0xAA<br />

SSAP 1 byte 0xAA<br />

CTL 1 byte 0x3<br />

OUI0 1 byte 0x00<br />

OUI1 1 byte 0x13<br />

OUI2 1 byte 0x9D<br />

Type0 1 byte See Table 22<br />

Submission page 187 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Type1 1 byte See Table 22<br />

Table 21 Management packet field values<br />

Table 22 includes the used types <strong>and</strong> subtypes for m<strong>and</strong>atory BPL protocols. Description of each one will be<br />

provided in the following sections. In general, with Type0 a Specific protocol is set <strong>and</strong> with Type1 a message type<br />

that makes sense into the protocol is announced. In the following table, messages of each BPL protocol are<br />

described, providing information about the content of each type field for each message.<br />

Type0 Protocol Type1 Description<br />

0x06 Adaptive Bit-Loading Protocol 0x01 BPC<br />

0x07 Port Solver Protocol 0x01 <strong>Access</strong> message<br />

0x02 Anounce Message<br />

0x03 Multicast message<br />

0x04 Multicast ACK message<br />

0x0b <strong>Access</strong> Protocol 0x01 Petition Status<br />

0x05 Connection Admission <strong>Control</strong><br />

Protocol<br />

P Sub_Type P.(1 bit) is the most<br />

significant bit of Type1.<br />

Sub_Type (7 bits)<br />

0 0x01 Resources Reservation<br />

Request<br />

0 0x02 Resources Reservation<br />

Reply<br />

0 0x03 Resources Reservation<br />

Change<br />

Submission page 188 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

0x07 Parametric Translation Table<br />

protocol<br />

0 0x04 Resources Reservation<br />

Change Confirmation.<br />

0 0x05 Resources Reservation<br />

Dropped<br />

0 0x06 Resources Reservation<br />

stop<br />

See 12.2.5<br />

0x0a Cluster Discovery Protocol 0x01 CDP message<br />

0x0b Automatic management of crosstalks 0x01 IDP<br />

0x02 BNDP<br />

0x03 BNDA<br />

Table 22 Management packet protocol types<br />

In some cases it is foreseen that the management information that has to be sent may not fit in one single packet. A<br />

mechanism is provided to split the information in several packets using sub-tables. The general format of those<br />

packets follows in Table 23:<br />

Bytes Fields Length<br />

0 Sub-table number 1 bytes<br />

1 Number of sub-tables 1 bytes<br />

2 Number of entries of the sub-table 1 byte<br />

3 - 8 Sender <strong>MAC</strong> address 6 byte<br />

Submission page 189 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

9 Entry size 1 byte<br />

10 - 521 Entries 512 bytes<br />

Maximum<br />

Table 23 Packet format<br />

The sub-table number shall be 1 for the first packet, <strong>and</strong> the sub-tables shall be sent in order. Entries can have<br />

variable length to allow for forward compatibility. The entry size is expressed in bytes. A node receiving entries<br />

with a size bigger than what it expects shall only take the values in the entries that it knows how to interpret <strong>and</strong><br />

shall look for the next entry taking into account the entry size received in the packet.<br />

The final structure, including information about Bridging <strong>and</strong> VLAN, <strong>and</strong> aligned in bytes shall be transmitted<br />

through the BPL in the order presented in the following figure:<br />

Submission page 190 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

bits 7 6<br />

Reserved<br />

Reserved<br />

5<br />

4<br />

3<br />

2<br />

1<br />

0<br />

LB[3]<br />

LB[2]<br />

LB[1]<br />

LB[0]<br />

PB[1]<br />

PB[0]<br />

LB[5]<br />

LB[4]<br />

PB[5]<br />

PB[4]<br />

PB[3]<br />

PB[2]<br />

OVLANID[7:0]<br />

OVLANV OVLANID[11:8]<br />

PCP PCF<br />

Reserved<br />

DA[3]<br />

DA[2]<br />

DA[1]<br />

DA[0]<br />

SA[1]<br />

SA[0]<br />

DA[5]<br />

DA[4]<br />

SA[5]<br />

SA[4]<br />

SA[3]<br />

SA[2]<br />

TCI[7:0]<br />

TCI[15:8]<br />

TPID[7:0]<br />

TPID[15:8]<br />

SSAP<br />

DSAP<br />

Lenght[1]<br />

Length[0]<br />

OUI[2]<br />

OUI[1]<br />

OUI[0]<br />

CTL<br />

Data[1]<br />

Data[0]<br />

TYPE1<br />

TYPE0<br />

Data from byte 2 to N<br />

Submission page 191 UPA-OPERA<br />

PLW<br />

Figure 68 Management packet structure<br />

When VLANs are active, all CCP packets must use the power-line reserved VLAN tag 1.<br />

Other st<strong>and</strong>ard protocols like spanning tree, will follow the IEEE 802 st<strong>and</strong>ard.<br />

Octet<br />

1<br />

2<br />

3<br />

4<br />

5<br />

6<br />

7<br />

8<br />

9<br />

10<br />

11<br />

12<br />

13<br />

14<br />

15<br />

16<br />

17<br />

18<br />

19<br />

20<br />

21<br />

22<br />

23<br />

24<br />

25<br />

26<br />

27<br />

28<br />

29<br />

30<br />

31<br />

32<br />

33<br />

34<br />

35<br />

36<br />

37<br />

38<br />

39<br />

40<br />

41<br />

42<br />

43<br />

44


4-June-07 P1901_PRO_016_r0<br />

9.1.2 Adaptive Bit-Loading Protocol (ABLP)<br />

9.1.2.1 Overview<br />

The Adaptive Bit-Loading Protocol (ABLP) is responsible for the interchange of tonemap information between the<br />

different nodes of an established BPL network.<br />

Tonemap negotiation is unidirectional <strong>and</strong> needs direct visibility between the involved nodes. One node sends the<br />

tonemap configuration <strong>and</strong> the other accepts it. The same tonemap shall be used by receiver nodes in order to<br />

underst<strong>and</strong> the received data.<br />

A pair of nodes can establish two different logical links identified in the reception side by the pair transmitter’s<br />

<strong>MAC</strong> <strong>and</strong> First Remote Port (RP1) <strong>and</strong> transmitter’s <strong>MAC</strong> <strong>and</strong> Second Remote Port (RP2). The link determined by<br />

the transmitter’s <strong>MAC</strong> <strong>and</strong> the Second Remote Port is usually devoted to Multicast Transmissions, <strong>and</strong> may have a<br />

different tonemap from the link determined by the pair transmitter‘s <strong>MAC</strong> <strong>and</strong> First Remote Port (RP1) (See<br />

9.1.2.1). In this case, the negotiation will be independent for each one of the links.<br />

Tonemap negotiation includes:<br />

- The tonemap.<br />

- The tonemap ID (TMI) associated to the included tonemap.<br />

- And, optionally, cycle selection (CS) configuration.<br />

Cycle selection configuration can be included to indicate that current tonemap has been designated to be used only<br />

during a specific part of the cycle defined as a multiple of Qs (See 4.4.2.10). In that case, nodes will need to<br />

negotiate several tonemaps to cover the the entire cycle.<br />

9.1.2.2 Protocol<br />

The ABLP defines two different packets:<br />

- The ABLP Tonemap information packet (ABLP_inf).<br />

- And the ABLP Tonemap acknowledgement packet (ABLP_ack).<br />

The ABLP_ack is used by the ABLP_inf packet transmitter to know if the tonemap configuration has been received<br />

<strong>and</strong> accepted by the transmitter node. In case that acknowledgment does not arrive, the ABLP_inf packet transmitter<br />

shall send a new ABLP_inf packet. The ABLP_inf packet transmitter shall start a timer after the transmission of the<br />

packet.<br />

The loss of an ABLP_inf packet or the ABLP_ack packet shall not cause a tonemap mismatch (different tonemaps<br />

with the same TMI in transmitter <strong>and</strong> receiver). Current tonemaps shall not share TMI with new tonemaps <strong>and</strong> shall<br />

not be immediately discarded after sending the new packet. The loss of an ABLP_inf packet will imply the use of<br />

previous tonemap configuration <strong>and</strong> the transmission of a new ABLP_inf packet.<br />

On the other h<strong>and</strong>, although the ABLP_ack packet is lost, the new tonemap configuration can be used. However, a<br />

new ABLP_inf packet shall be sent (timeout) with the objective of finishing the negotiation.<br />

Submission page 192 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The ABLP_ack packet shall include the same TMI <strong>and</strong> sequence number as the transmitted ABLP_inf packet. The<br />

sequence number shall be increased with every transmitted ABLP_inf packet. The reception of the ABLP_ack<br />

implies that the receiver has accepted the new tonemap configuration.<br />

9.1.2.3 ABLP_inf packet format<br />

Figure 69: Example of successful tonemap negotiation<br />

ABLP_inf packets shall be sent in HURTO mapping mode. The use of a different mapping could result in the<br />

impossibility to negotiate new tonemaps if current tonemap configuration is inadequate.<br />

ABLP_inf packets use the CCP with Type0 0x01 <strong>and</strong> Type1 0x01. The packet format can be seen in Figure 70.<br />

Figure 70: ABLP_inf packet<br />

ABLP_inf packets use 0x01139D000000 multicast address as destination <strong>MAC</strong> address.<br />

Submission page 193 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Source <strong>MAC</strong> address is set to the ABLP_inf packet transmitter node <strong>MAC</strong> address. The ABLP_inf data is shown in<br />

Figure 71.<br />

Description:<br />

Figure 71: ABLP_inf Data<br />

a) Remote Port: Remote Port assigned by the ABLP_inf packet transmitter to the link with the ABLP_inf<br />

packet destination node. May be the First or the Second Remote Port.<br />

b) TMI: Tonemap ID assigned to the included tonemap. From 0 to 255. If the H bit is set to 1, this value shall<br />

be set to 0.<br />

c) Local Port: Local Port assigned by the ABLP_inf packet transmitter to the link with the ABLP_inf packet<br />

destination node.<br />

d) Flags:<br />

1) H bit: use HURTO mapping. When this bit is set to 1, Tonemap Format <strong>and</strong> Tonemap fields shall<br />

not be included <strong>and</strong>, additionally, TMI <strong>and</strong> BPS fields shall be set to 0.<br />

2) C bit: use cycle selection (CS). When this bit is set to 1, CS Format <strong>and</strong> CS fields shall be included.<br />

The rest of bits are reserved <strong>and</strong> shall be set to 0.<br />

e) BPS: Bits Per Symbol value calculated from the tonemap included in the packet (see Equation 17). If H bit<br />

is set to 1, this value shall be set to 0.<br />

f) Rx Att: difference, in 3 dB steps, between the maximum reception gain <strong>and</strong> the gain used during channel<br />

estimation.<br />

g) Sequence Number: ABLP_inf packet sequence number. From 0 to 65535.<br />

h) Dest <strong>MAC</strong>: destination node <strong>MAC</strong> address.<br />

Submission page 194 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

i) CRC: CRC-32-IEEE 802.3 calculation. The complete ABLP_inf data is used, considering as 0 the CRC<br />

field.<br />

j) Tonemap Format: information about the format used in the Tonemap field.<br />

k) Tonemap: tonemap data. Tonemap data field shall be in the format set in Tonemap Format field.<br />

l) CS Format: information about the format used in the CS field.<br />

m) CS: cycle selection data. CS field shall be in the format set in the CS Format field.<br />

9.1.2.3.1 Tonemap format details<br />

Tonemap basic format is defined here. This format shall be used when Tonemap Format field value is set to 1<br />

(0x0001). Format description:<br />

- Tonemap sets the value for 1536 subcarriers.<br />

- Every subcarrier uses 4 bits to describe subcarrier bit-loading value.<br />

- Tonemap field length is 768 octects.<br />

- The first octet contains the first subcarrier (lowest frequency subcarrier) bit-loading value in the least<br />

significant bits <strong>and</strong> the second subcarrier bit-loading value in the more significant bits.<br />

- The second octet contains the third <strong>and</strong> fourth subcarrier bit-loading values; the third octet contains the fifth<br />

<strong>and</strong> sixth values, <strong>and</strong> so on.<br />

9.1.2.3.2 Cycle Selection details<br />

CS basic format is defined here. This format shall be used when CS Format field first octet is set to 1 (0x01). CS<br />

Format field second octet represents the number of octet pairs in the CS field. See Figure 72.<br />

Figure 72: CS Format field<br />

Therefore, CS field length is two times the Zone Count value. Each two octets define a part of the cycle when the<br />

tonemap can be used. The first octet represents the start <strong>and</strong> the second octet st<strong>and</strong>s for the end (both included).<br />

Start <strong>and</strong> end values shall be defined by a synchronized Q value (see 4.3.11).<br />

Submission page 195 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

9.1.2.4 ABLP_ack packet<br />

ABLP_ack packets shall be sent in HURTO mapping mode. ABLP_ack packets use the CCP with Type0 0x01 <strong>and</strong><br />

Type1 0x04. The packet format can be seen in Figure 75¡Error! No se encuentra el origen de la referencia..<br />

Figure 73: ABLP_ack packet<br />

ABLP_ack packets use 0x01139D000000 multicast address as destination <strong>MAC</strong> address.<br />

Source <strong>MAC</strong> is set to the ABLP_ack packet transmitter <strong>MAC</strong> address.<br />

The ABLP_ack data format is shown in Figure 74¡Error! No se encuentra el origen de la referencia..<br />

Description:<br />

Figure 74: ABLP_ack Data<br />

a) Remote Port: Remote Port assigned by the ABLP_ack packet transmitter to the link with the ABLP_ack<br />

packet destination node. May be the First or the Second Remote Port.<br />

b) TMI: acknowledged Tonemap ID.<br />

Submission page 196 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

c) Local Port: Local Port assigned by the ABLP_ack packet transmitter to the link with the ABLP_ack packet<br />

destination node.<br />

d) Sequence Number: acknowledged ABLP_inf packet sequence number.<br />

e) Dest <strong>MAC</strong>: destination node <strong>MAC</strong> address.<br />

9.1.3 <strong>Access</strong> Protocol<br />

<strong>Access</strong> protocol defines a protocol for connecting nodes in point-multipoint BPL networks within master-slave<br />

architecture.<br />

In this protocol we will define the way to establish a connection from a slave to a master of the network.<br />

Each master node may periodically send an access frame, as explained in 4.3.5, to the network, <strong>and</strong> wait for a<br />

response to add the responding slave to their own list <strong>and</strong> then start the AAA (Authorization – Authentication –<br />

Accounting) protocol to decide if the node is authorized to connect to the network via this master or not.<br />

On the other side, when a slave receives an access token it decides to reply or not with an access reply frame, as<br />

explained in 4.3.9.<br />

When a slave wants to send an access reply frame it must start a back-off period, as it is explained in 4.3.9. If no<br />

other access reply frame is detected during that period, the node may send an access reply frame.<br />

Once a master receives an access reply frame from a slave it must send an access protocol packet accepting or<br />

rejecting the slave.<br />

9.1.3.1 <strong>Access</strong> Protocol packet format<br />

This packet shall be sent from the master to a slave that sent <strong>and</strong> access reply frame, to indicate if the slave is<br />

accepted or not. The packet is formatted as an CCP packet <strong>and</strong> the structure is shown in Figure 75.<br />

The response contained in the packet can be of three different types:<br />

• ACCEPT: The slave node has been accepted<br />

• REJECT: The slave node has been rejected because the AAA process has resulted in rejection.<br />

• FAILED: The slave node has been rejected because the AAA process has failed <strong>and</strong> the master does<br />

not have enough information to accept or reject the node.<br />

The packet uses the CCP with Type0=0x03 <strong>and</strong> Type1=0x01.<br />

Submission page 197 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

In Figure 75 we can see the entire packet format:<br />

TPID<br />

0xAA<br />

0xAA<br />

0x03<br />

0x00<br />

0x13<br />

0x9D<br />

0x03<br />

0x01<br />

Slave <strong>MAC</strong><br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

TCI<br />

Submission page 198 UPA-OPERA<br />

Length<br />

Figure 75 <strong>Access</strong> protocol packet<br />

Master <strong>MAC</strong><br />

The packet is sent using the broadcast port (127). The value of the packet fields shall be:<br />

• Dest <strong>MAC</strong> is set 0x0180C2000000.<br />

• Src <strong>MAC</strong> is set to the master <strong>MAC</strong> address.<br />

• Slave <strong>MAC</strong> is set to the slave <strong>MAC</strong> address<br />

• Master <strong>MAC</strong> is set to the master <strong>MAC</strong> address<br />

• The Info field is 1 byte <strong>and</strong> can have the following values:<br />

o REJECT: 0x00<br />

o ACCEPT: 0x01<br />

o FAILED: 0x02<br />

9.1.3.2 Timing diagrams<br />

In the following timeline diagrams we will show the sequence of messages that can be produced in access protocol<br />

between master <strong>and</strong> slave <strong>and</strong> the messages sent.<br />

We will divide this section in different cases that can occur.<br />

Case 01: Master accepts Slave<br />

Info


4-June-07 P1901_PRO_016_r0<br />

ACCESS_TOKEN_SENT<br />

ACCESS_TOKEN_REPLY_RECEIVED<br />

AAA PROCESS STARTs<br />

SLAVE ACCEPTED<br />

ACCEPT_PACKET_SENT<br />

Case 02: A Master rejects a Slave<br />

MASTER SLAVE<br />

Figure 76 <strong>Access</strong> protocol: Master accepts Slave<br />

ACCESS_TOKEN_SENT<br />

ACCESS_TOKEN_REPLY_RECEIVED<br />

AAA PROCESS STARTs<br />

SLAVE REJECTED<br />

REJECT_PACKET_SENT<br />

MASTER SLAVE<br />

Figure 77 <strong>Access</strong> protocol: Master rejects Slave<br />

ACCESS_TOKEN_RECEIVED<br />

REPLY_ACCESS_TOKEN<br />

MASTER_REGISTRATION<br />

ACCESS PROTOCOL<br />

COMPLETED<br />

ACCESS_TOKEN_RECEIVED<br />

REPLY_ACCESS_TOKEN<br />

ACCESS PROTOCOL RESTART<br />

Case 03 Master rejects Slave due to different reasons from not acceptation (protocol has failed)<br />

Submission page 199 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Case 04: Slave response is lost<br />

ACCESS_TOKEN_SENT<br />

ACCESS_TOKEN_REPLY_RECEIVED<br />

AAA PROCESS STARTs<br />

SLAVE REJECTED<br />

FAILED_PACKET_SENT<br />

MASTER SLAVE<br />

Figure 78 <strong>Access</strong> protocol: registration failed<br />

ACCESS_TOKEN_SENT<br />

ACCESS_TOKEN_SENT<br />

SLAVE ACCEPTED<br />

ACCEPT_PACKET_SENT<br />

MASTER SLAVE<br />

ACCESS_TOKEN_RECEIVED<br />

REPLY_ACCESS_TOKEN<br />

ACCESS PROTOCOL RESTART<br />

ACCESS_TOKEN_RECEIVED<br />

REPLY_ACCESS_TOKEN<br />

ACCESS_TOKEN_RECEIVED<br />

REPLY_ACCESS_TOKEN<br />

MASTER_REGISTRATION<br />

ACCESS PROTOCOL<br />

COMPLETED<br />

Figure 79 <strong>Access</strong> protocol: Slave response is lost<br />

Case 05: Master acceptation packet is lost. Protocol starts again after expiring timers waiting for master reply.<br />

Submission page 200 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

ACCESS_TOKEN_SENT<br />

SLAVE ACCEPTED<br />

ACCEPT_PACKET_SENT<br />

ACCESS_TOKEN_SENT<br />

ACCESS_TOKEN_SENT<br />

SLAVE ACCEPTED<br />

ACCEPT_PACKET_SENT<br />

Case 06: Master accepts Slave 1. Slave 2 lost contention<br />

ACCESS_TOKEN_SENT<br />

SLAVE ACCEPTED<br />

ACCEPT_PACKET_SENT<br />

Case 07: Slave decides not to log in a Master<br />

MASTER SLAVE<br />

ACCESS_TOKEN_RECEIVED<br />

REPLY_ACCESS_TOKEN<br />

TIMEOUT<br />

ACCESS PROTOCOL RESTART<br />

ACCESS_TOKEN_RECEIVED<br />

REPLY_ACCESS_TOKEN<br />

MASTER_REGISTRATION<br />

ACCESS PROTOCOL<br />

COMPLETED<br />

Figure 80 <strong>Access</strong> protocol: Master acceptation packet is lost<br />

MASTER SLAVE 1<br />

MASTER_REGISTRATION<br />

ACCESS PROTOCOL<br />

COMPLETED<br />

Figure 81 <strong>Access</strong> protocol: two slaves contend<br />

SLAVE 2<br />

ACCESS_TOKEN_RECEIVED<br />

REPLY_ACCESS_TOKEN<br />

ACCESS PROTOCOL RESTART<br />

Submission page 201 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

9.1.4 Port Solver Protocol<br />

Figure 82 <strong>Access</strong> protocol: Slave decides not to log in a Master<br />

To allow data transmission from node A to node B a connection must be created between them. This connection<br />

will allow sending data between A <strong>and</strong> B.<br />

This connection is composed by two unidirectional links: one from A to B <strong>and</strong> another from B to A. These links are<br />

entries in the Port Solver Table (PST). That is, a connection between A <strong>and</strong> B is fully established when in A’s PST<br />

there is a complete entry (with all its data) regarding B, <strong>and</strong> in B’s PST there is a complete entry regarding A.<br />

The objective of the protocol is to complete the remote port (RP) field of the PST entries.<br />

9.1.4.1 Port Solver Table<br />

The Token Announce is used to know the transmitter. In the Token Announce, there is the <strong>MAC</strong> address of the<br />

transmitter. For more information about the Token Announce see 4.4.1.<br />

The way to identify the receiver at the transmitter side is with the Local Port. The Local Port is included in the<br />

Transmission Port field of the burst header. The transmitter may have up to two Local Ports to identify two flows<br />

between the transmitter <strong>and</strong> a single receiver. The second Local Port is intended to be used for multicast purposes.<br />

At the receiver side, the information in the Transmission Port field of the burst header will be the Remote Port. The<br />

relation between Remote Port <strong>and</strong> <strong>MAC</strong> address of transmitter in order to identify that it is the intended receiver<br />

shall be stored in a table (referred to as the Port Solver Table). To get more information about Burst Header see 5.2.<br />

Submission page 202 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The transmitter can send bursts to up to 119 ports. The correct range of Local Port is the following:<br />

- From 9 to 126 are possible Local Ports.<br />

- Port 127 is the Broadcast Port. All receivers have to receive the burst with Transmission Port equal to 127.<br />

The Port Solver Table has 118 entries <strong>and</strong> each entry has the following information:<br />

- <strong>MAC</strong> address of all transmitters that are visible for this node. The <strong>MAC</strong> address of the transmitter can be<br />

read in the received Token Announce<br />

- First Remote Port (RP1). The RP1 will be set to a default invalid value (0xFF) until the Port Solver Protocol<br />

takes place. The RP1 of transmitters that do not transmit data directly to this node (for instance, the RP1 of<br />

a CPE for another CPE) will keep the default value. This RP1 is intended to be used fro unicast<br />

communications.<br />

- Second Remote Port (RP2). The RP2 will be set to a default value (0xFF) until a Multicast message of the<br />

Port Solver Protocol containing the Local Port using by the multicast flow transmitter is received.(See<br />

9.1.4.3.2)<br />

- Local Port (LP)<br />

The Port Solver Table will have therefore completed entries (with a valid RP1) <strong>and</strong> incomplete entries (with a RP1<br />

equal to 0xFF). The RP2 is not taken into account to decide if an entry is completed or not. When receiving from a<br />

<strong>MAC</strong> address with a completed entry in the Port Solver Table, the receiver shall decode any burst with<br />

Transmission Port field in the burst header equal to:<br />

- The First Remote Port associated to this <strong>MAC</strong> address<br />

- The Broadcast Port.<br />

If RP2 is also completed in the entry, the receiver shall decode also any burst with Transmission Port in the burst<br />

header equal to:<br />

- The Second Remote Port associated to this <strong>MAC</strong> address<br />

When First Remote Port is using Mode ACK, the next sent ACK has ACK Port equal to Local Port.<br />

Second Remote Port does not support ACK mode.<br />

Port Solver Table entries are deleted if no TA is received from the corresponding <strong>MAC</strong> address during 60 seconds<br />

(ageing).<br />

9.1.4.1.1 Unicast Communication example<br />

The following example is useful to underst<strong>and</strong> the meaning of each field in the case of unicast communication<br />

between two nodes:<br />

Submission page 203 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

9<br />

Node A Node B<br />

Figure 83 Ports example<br />

To transmit a burst from A to B, the Transmission Port field is equal to 9.<br />

To transmit a burst from B to A, the Transmission Port field is equal to 15.<br />

In B the Port Solver Table has the following entry:<br />

• <strong>MAC</strong> address equal to A <strong>MAC</strong> address<br />

• Local Port equal to 15.<br />

• First Remote Port equal to 9.<br />

In A the Port Solver Table has the following entry:<br />

• <strong>MAC</strong> address equal to B <strong>MAC</strong> address<br />

• Local Port equal to 9.<br />

• First Remote Port equal to 15.<br />

The first remote port exchange process is described in section 9.1.4.2.<br />

9.1.4.1.2 Multicast Communication example<br />

The second remote port is intended to support native multicast using BPL by means of identify a physical unique<br />

link that will have its own tonemap <strong>and</strong> particular management, as described in section 9.1.2.1<br />

In the following draw, node A has three links stablished. First one is a unicast link with node B, second another<br />

unicast link with node C <strong>and</strong> finally, a multicast link with nodes B <strong>and</strong> C. The local reference in node A for each of<br />

the links is its assigned Local Port, in this case 9, 10 <strong>and</strong> 12 respectively.<br />

Submission page 204 UPA-OPERA<br />

15


4-June-07 P1901_PRO_016_r0<br />

12<br />

12<br />

9<br />

Node A Node B<br />

10<br />

Figure 84: Native Multicast example<br />

In Node A the Port Solver Table has the following entries:<br />

• <strong>MAC</strong> address equal to Node B <strong>MAC</strong> address<br />

• Local Port equal to 9<br />

• Remote Port 1 equal to 15<br />

• <strong>MAC</strong> address equal to Node C <strong>MAC</strong> address<br />

• Local Port equal to 10<br />

• Remote Port 1 equal to 14<br />

In Node B the Port Solver Table will have the following entry:<br />

• <strong>MAC</strong> address equal to Node A <strong>MAC</strong> address<br />

• Local Port equal to 15<br />

• Remote Port 1 equal to 9<br />

• Remote Port 2 equal to 12<br />

In Node C the Port Solver Table will have the following entry:<br />

• <strong>MAC</strong> address equal to Node A <strong>MAC</strong> address<br />

Node C<br />

Submission page 205 UPA-OPERA<br />

15<br />

14


4-June-07 P1901_PRO_016_r0<br />

• Local Port equal to 14<br />

• Remote Port 1 equal to 10<br />

• Remote Port 2 equal to 12<br />

When a burst with a Transmission Port field set to 12 is sent by Node A will be demodulated by Node B <strong>and</strong> Node<br />

C using the tonemap for the second port, which will be common for Node B <strong>and</strong> Node C in the reception. (See<br />

section 9.1.2) This way, the information will be sent only once.<br />

9.1.4.2 First Port exchange process<br />

The first port (RP1) exchange process is only executed between the master <strong>and</strong> the corresponding slaves. The<br />

protocol is always started by the master, after completion of the access protocol. The slave node cannot send the<br />

port solver message because it needs the token to transmit any packet, <strong>and</strong> to recognize that the token is addressed<br />

to it, it must know its RP1 with the master; that is, it has to complete the entry in its PST correspondent to the <strong>MAC</strong><br />

address of its master.<br />

To complete all the fields of an entry correspondent to a given <strong>MAC</strong> address, the first remote transmission port<br />

must be communicated by the node with that <strong>MAC</strong> address. A h<strong>and</strong>-shake protocol is used.<br />

The node that wants to complete the entry sends a Port Solver Message (PSM) addressed to the <strong>MAC</strong> address of the<br />

PST entry. When a node receives a PSM, it answers with another PSM (Figure 85). The main contents of the PSM<br />

are the LP <strong>and</strong> the flag field. The flag field is set to zero by default. The flag field must be set to 1 when a PSM is<br />

received <strong>and</strong> the correspondent entry is already completed (Figure 87). A received PSM with this flag set to 1 will<br />

not require an answer.<br />

Node A Node B<br />

Node B entry added<br />

Entry: (<strong>MAC</strong> B, LP 3, RP1 -)<br />

Entry: (<strong>MAC</strong> B, LP 3, RP1 5)<br />

PSM(LP 3, 0)<br />

PSM(LP 5, 1)<br />

Node A entry added<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 -)<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3)<br />

Figure 85 Port Solver Protocol Messages Exchange to complete First remote Port<br />

If a response to PSM is not received, the entry will not be completed <strong>and</strong> a new PSM must be sent (Figure 86,<br />

Figure 87). There is a minimum time between PSM retransmissions. If the entry remains in the PST, the protocol<br />

must be followed until its success.<br />

Submission page 206 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 86 Port Solver Protocol Messages Exchange to complete First remote Port<br />

Submission page 207 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Node A Node B<br />

Node B entry added<br />

Entry: (<strong>MAC</strong> B, LP 3, RP1 -)<br />

Entry: (<strong>MAC</strong> B, LP 3, RP1 -)<br />

Entry: (<strong>MAC</strong> B, LP 3, RP1 5)<br />

PSM(LP 3, 0)<br />

PSM(LP 3, 0)<br />

PSM(LP 3, 0)<br />

PSM(LP 5, 1)<br />

PSM(LP 3, 0)<br />

PSM(LP 5, 1)<br />

Node A entry added<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 -)<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3)<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3)<br />

Figure 87 Port Solver Protocol Messages Exchange to complete First remote Port<br />

Every time a PSM is received, the correspondent entry in the PST must be updated because the first remote port can<br />

change.<br />

Every time the LP is changed, the RP1 must be set to an invalid value <strong>and</strong> the protocol started.<br />

9.1.4.3 Second Port exchange process<br />

The second port (RP2) exchange process is only executed when the unicast link between origin <strong>and</strong> destination of<br />

multicast flow has been previously established. The protocol is always started by the origin of the multicast flow,<br />

that, through higher level exchange of packets, respond to the petition of inclusion or exclusion of certain node,<br />

identified by the Local Port assigned to the previously established unicast link, into a multicast flow, identified by a<br />

Local Port in the traffic origin.The response will be to trigger the Second Port (RP2) exchange process.<br />

The origin of the multicast flow wil send a Posrt Solver Multicast Message (PSMM) addressed to the <strong>MAC</strong> address<br />

of the destination of the multicast flow. When a node receives a PSMM, it answers with a Port Solver Multicast<br />

ACK Message (PSMAM) to acknowledge the reception of the Local Port assigned in the transmission side to the<br />

Submission page 208 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

multicast flow desired, <strong>and</strong> the RP2 (Second Remote Port) field of the entry indexed by the multicast origin <strong>MAC</strong><br />

will be filled with this number.<br />

Since this time, when receiving from a <strong>MAC</strong> address with a entry that contains RP1 <strong>and</strong> RP2 in the Port Solver<br />

Table, the receiver shall decode any burst with Transmission Port field in the burst header equal to RP1 <strong>and</strong> RP2.<br />

The main contents of the PSMM are the LP assigned in the origin of the multicast flow <strong>and</strong> the flag field. The flag<br />

field is set to zero by default. A received PSMM with this flag set to 1 shall not require an answer.<br />

Node A Node B<br />

Node B wants to join<br />

multicast flow<br />

With LP associated 12<br />

Node B will receive data<br />

transmitted by port 3 <strong>and</strong> port<br />

12 from Node A<br />

PSMM(LP 12, 0)<br />

PSMAM<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 -)<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 12)<br />

Figure 88 Port Solver Protocol Messages Exchange to complete Second remote Port<br />

Submission page 209 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Node A Node B<br />

Node B wants to join<br />

multicast flow<br />

With LP associated 12<br />

Node B will receive data<br />

transmitted by port 3 <strong>and</strong><br />

port 12 from Node A<br />

PSMM(LP 12, 0)<br />

PSMM(LP 12, 0)<br />

PSMM(LP 12, 0)<br />

PSMM(LP 12, 0)<br />

PSMAM<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 -)<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 12)<br />

Figure 89: Port Solver Protocol Messages Exchange to complete Second remote Port<br />

Node A Node B<br />

Node B wants to join<br />

multicast flow<br />

With LP associated 12<br />

Node B will receive data<br />

transmitted by port 3 <strong>and</strong> port<br />

12 from Node A<br />

PSMM(LP 12, 0)<br />

PSMM(LP 12, 0)<br />

PSMM(LP 12, 0)<br />

PSMAM<br />

PSMM(LP 12, 0)<br />

PSMAM<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 -)<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 12)<br />

Figure 90: Port Solver Protocol Messages Exchange to complete Second remote Port<br />

If a response to PSMM is not received, Node A will not known is Node B is in the group or not, <strong>and</strong> a Time Out is<br />

done in the transmitter to send again the PSMM.<br />

Submission page 210 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

In the case of leaving a group, the protocol messages exchange will be the same, but replacing the LP associated by<br />

an invalid identifier (0xFF), as can be seen in the following figure:<br />

Node A Node B<br />

Node B wants to leave<br />

multicast flow<br />

With LP associated 12<br />

Node B will receive data<br />

transmitted only by port 3<br />

from Node A<br />

PSMM(LP 0xFF, 0)<br />

PSMAM<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 12)<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 -)<br />

Figure 91: Port Solver Protocol Exchange to delete Second Remote Port<br />

Node A Node B<br />

Node B wants to leave<br />

multicast flow<br />

With LP associated 12<br />

Node B will receive data<br />

transmitted only by port 3<br />

from Node A<br />

PSMM(LP 0xFF, 0)<br />

PSMM(LP 0xFF, 0)<br />

PSMM(LP 0xFF, 0)<br />

PSMM(LP 0xFF, 0)<br />

PSMAM<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 12)<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 -)<br />

Figure 92 Port Solver Protocol Messages Exchange to delete Second Remote Port<br />

Submission page 211 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Node A Node B<br />

Node B wants to leave<br />

multicast flow<br />

With LP associated 12<br />

Node B will receive data<br />

transmitted only by port 3<br />

from Node A<br />

PSMM(LP 0xFF, 0)<br />

PSMM(LP 0xFF, 0)<br />

PSMM(LP 0xFF, 0)<br />

PSMAM<br />

PSMM(LP 0xFF, 0)<br />

PSMAM<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 12)<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 -)<br />

Figure 93: Port Solver Protocol Messages Exchange to delete Second Remote Port<br />

Every time a PSMM is received, the correspondent entry of RP2 in the PST must be updated.<br />

Every time the LP is changed, the RP2 must be set to an invalid value <strong>and</strong> the protocol started.<br />

9.1.4.3.1 Port Solver Packet format<br />

The PSM is encapsulated using the CCP with Type0 0x02 <strong>and</strong> Type1 0x01 (Figure 94). The Port Solver packet will<br />

be sent through broadcast port 127.<br />

TPID<br />

0xAA<br />

0xAA<br />

0x03<br />

0x00<br />

0x13<br />

0x9D<br />

0x02<br />

0x01<br />

Length<br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

TCI<br />

Figure 94 Port solver packet<br />

Port Solver Protocol Data<br />

Submission page 212 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Destination <strong>MAC</strong> must be the STP multicast address (0x0180C2000000) because PSMs are exchanged prior to the<br />

STP protocol. The packet shall be transmitted using the broadcast port (127). The PSM data fields are:<br />

Bytes PSM data fields Length<br />

0 – 5 Source <strong>MAC</strong> 6 bytes<br />

6 – 11 Destination <strong>MAC</strong> 6 bytes<br />

12 Assigned LP 1 byte<br />

13 Info 1 byte<br />

Table 24 Port solver packet fields<br />

The format of the Info field is depicted in ¡Error! No se encuentra el origen de la referencia.:<br />

Figure 95 Info field format<br />

Bits number 1 to 4 are devoted to set the message type of the Capability Exchange Protocol (See section 0)<br />

9.1.4.3.2 Port Solver Multicast Message (PSMM) format<br />

The PSMM is encapsulated using the CCP with Type0 0x02 <strong>and</strong> Type1 0x03 (Figure 94). The Port Solver Multicast<br />

Message will be sent through broadcast port 127.<br />

Submission page 213 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 96 Port solver Multicast Message<br />

Destination <strong>MAC</strong> must be the STP multicast address (0x0180C2000000) because PSMMs are exchanged prior to<br />

the STP protocol. The packet shall be transmitted using the broadcast port (127). The PSMM data fields are:<br />

Bytes PSM data fields Length<br />

0 – 5 Source <strong>MAC</strong> 6 bytes<br />

6 – 11 Destination <strong>MAC</strong> 6 bytes<br />

12 Assigned Multicast LP 1 byte<br />

13 Info 1 byte<br />

Table 25 Port solverMulticast Message fields<br />

The format of the Info field is depicted in ¡Error! No se encuentra el origen de la referencia.:<br />

Figure 97 Info field format<br />

Bits number 1 to 4 are devoted to set the message type of the Capability Exchange Protocol (See section 0)<br />

Submission page 214 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

9.1.4.3.3 Port Solver Multicast Acknowledge Message (PSMAM) format<br />

The PSMAM is encapsulated using the CCP with Type0 0x02 <strong>and</strong> Type1 0x04 (Figure 94). The Port Solver<br />

Multicast Message will be sent through broadcast port 127.<br />

Figure 98 Port solver ACK Multicast Message<br />

Destination <strong>MAC</strong> must be the STP multicast address (0x0180C2000000) because PSMAMs are exchanged prior to<br />

the STP protocol. The packet shall be transmitted using the broadcast port (127). The PSMAM data fields are:<br />

Bytes PSM data fields Length<br />

0 – 5 Source <strong>MAC</strong> 6 bytes<br />

6 – 11 Destination <strong>MAC</strong> 6 bytes<br />

12 Acknowledged Multicast<br />

LP<br />

1 byte<br />

13 Info 1 byte<br />

Table 26 Port solverMulticast Message fields<br />

The format of the Info field is depicted in ¡Error! No se encuentra el origen de la referencia.:<br />

Submission page 215 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 99 Info field format<br />

Bits number 1 to 4 are devoted to set the message type of the Capability Exchange Protocol (See section 0)<br />

9.1.4.4 Periodic publication of Port Solver information<br />

Each Announce Time period (30 seconds) each node sends an Announce Message (AnM) publishing Port Solver<br />

information. This message contains a list with pairs of values (entry <strong>MAC</strong> address <strong>and</strong> assigned LP).<br />

Upon the reception of an AnM, the PST shall be modified in the following cases:<br />

• The sender <strong>MAC</strong> address is in a completed entry of the PST <strong>and</strong> the AnM LP value associated to the node<br />

<strong>MAC</strong> address is different from the PST RP value associated to the sender <strong>MAC</strong> address � the RP shall be<br />

updated (see Figure 100)<br />

• The sender <strong>MAC</strong> address is in the PST but the <strong>MAC</strong> address of the node is not in the AnM � Set PST RP<br />

value associated to the sender <strong>MAC</strong> address to 0xFF (see Figure 101)<br />

• The sender <strong>MAC</strong> address is in a incomplete entry of the PST, <strong>and</strong> the sender is either slave or master of the<br />

receiving node � the RP shall be updated<br />

AnM from A<br />

<strong>MAC</strong> D LP 11<br />

<strong>MAC</strong> C LP 10<br />

<strong>MAC</strong> B LP 9<br />

PST in C<br />

Rx AnM from A<br />

<strong>MAC</strong> A LP 11<br />

<strong>MAC</strong> D LP 10<br />

<strong>MAC</strong> B LP 9<br />

RP 12 10<br />

Submission page 216 UPA-OPERA<br />

C<br />

RP 255<br />

RP 255<br />

Figure 100 Announce Messages


4-June-07 P1901_PRO_016_r0<br />

AnM from A<br />

<strong>MAC</strong> D LP 11<br />

<strong>MAC</strong> E LP 10<br />

<strong>MAC</strong> B LP 9<br />

PST in C<br />

This message does not require any acknowledgement.<br />

9.1.4.4.1 Announce message format<br />

Rx AnM from A<br />

<strong>MAC</strong> A LP 11<br />

<strong>MAC</strong> D LP 10<br />

<strong>MAC</strong> B LP 9<br />

RP 12 255<br />

Submission page 217 UPA-OPERA<br />

C<br />

RP 255<br />

RP 255<br />

Figure 101 Announce Messages<br />

The Announce Message is encapsulated using the CCP with Type0 0x02 <strong>and</strong> Type1 0x02 (Figure 102). The<br />

Announce Message packet will be sent through broadcast port 127.<br />

TPID<br />

0xAA<br />

0xAA<br />

0x03<br />

0x00<br />

0x13<br />

0x9D<br />

0x02<br />

0x02<br />

Length<br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

TCI<br />

Figure 102 Announce packet format<br />

Destination <strong>MAC</strong> must be the STP multicast address (0x0180C2000000).<br />

Announce Message Data<br />

The PST can be fragmented in several AnMs (identified by a sub-table number) if the entries do not fit in one.<br />

The AnM data fields are:


4-June-07 P1901_PRO_016_r0<br />

Bytes AnM data fields Length<br />

0 Sub-table number 1 bytes<br />

1 Number of sub-tables 1 bytes<br />

2 Number of entries of the sub-table 1 byte<br />

3 - 8 Sender <strong>MAC</strong> address 6 byte<br />

9 Entry size 1 byte<br />

10 - 521 Entries 512 bytes<br />

Maximum<br />

The Table data is a list of consecutive pairs in the form:<br />

9.1.4.5 Capabilities Exchange protocol<br />

9.1.4.5.1 Overview<br />

Table 27 Announce message fields<br />

Entry fields Length<br />

<strong>MAC</strong> address 6 bytes<br />

LP 1 byte<br />

Table 28 Announce message entries<br />

In a BPL cell, nodes shall coexist with different capabilities <strong>and</strong> with other nodes from diverse vendors. Besides,<br />

they shall be able to communicate with each other, regardless their differences.<br />

The Capabilities Exchange protocol is a mechanism to exchange information about node capabilities. Every node in<br />

the BPL network shall know the capabilities of each node that has negotiated BPL ports with it.<br />

Submission page 218 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

However, the processing of such information in order to negotiate the best possible features used in the<br />

communications network is beyond the aim of this protocol.<br />

From the point of view of packet format <strong>and</strong> message exchange, this protocol is an extension of the Port Solver<br />

protocol (PSP). It uses reserved fields in Port Solver Messages (PSMs) to place node capabilities information, <strong>and</strong><br />

shall not prevent the ordinary working of the PSP protocol. Some additions shall be applied to the PSM exchange<br />

mechanism in order to fulfill the features of the Capabilities Exchange protocol.<br />

The Capabilities Exchange protocol shall be flexible enough, not only to provide the exchange of specific<br />

capabilities from different vendors, but also to allow the exchange of a st<strong>and</strong>ard set of minimum capabilities<br />

common for all vendors. Moreover, it shall be easily extensible to include new capabilities, which shall not prevent<br />

backwards compatibility.<br />

This protocol should be efficient, regarding the channel use, to minimize the impact of the overhead of the protocol<br />

in the application data throughput of the whole network.<br />

9.1.4.5.2 Protocol<br />

The protocol is composed by two main stages:<br />

• First stage: Two nodes shall exchange the information about the maximum capabilities they can perform<br />

<strong>and</strong> the capabilities they are running at that time. In this stage, it is used an ACK-based protocol whose<br />

objective is to fill two local tables in each node indexed by <strong>MAC</strong> address:<br />

o Node Capability Table (NCT): It shall contain the maximum capabilities of each known node.<br />

o Performed Capability Table (PCT): It shall contain the capabilities that each known node is running<br />

at that time.<br />

The implementation of these two tables should be done in a single table with the contents described in<br />

section 0 <strong>and</strong> 0. The two tables are divided into four sections:<br />

o Common capabilities<br />

o Chip related capabilities<br />

o Reference Design related capabilities<br />

o Firmware related capabilities<br />

The first section (Common) shall be common for all systems, independent of the vendor. The last three ones<br />

(Chip, Reference Design <strong>and</strong> Firmware related) shall depend on the vendor. The maximum number of<br />

entries of each section shall be 64, with an unlimited size per entry.<br />

• Second stage: It shall take place only if the running capabilities of a node change. This node shall indicate<br />

all nodes the new capabilities that it is performing at that time. This second stage may be either ACK-based<br />

or not, with a first information message <strong>and</strong> a received ACK from the destination, depending on the content<br />

of the ACK expected field. If it is 1, an ACK is expected. If not, no ACK is expected from the receiver.<br />

9.1.4.5.3 Messages<br />

Submission page 219 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

One of the two possible schemes explained below can be used to send the vendor dependent information within the<br />

maximum capabilities messages (MAX_CAP_MSG(xxx)):<br />

• Indexed scheme: Only the vendor related information shall be sent, <strong>and</strong> the maximum capabilities shall be<br />

inferred by the receiver. As a result, less data shall be transferred by the Capabilities Exchange protocol,<br />

minimizing the overhead.<br />

• Enumerated scheme: Node vendor <strong>and</strong> capabilities shall be sent as an enumeration.<br />

In case a node does not underst<strong>and</strong> the indexed scheme, it shall send a NACK to the sender in response. In any case,<br />

the common capabilities section is always sent in the message using an enumerated scheme.<br />

The information within the running capabilities messages (RUN_CAP_MSG) shall be sent in a different way. First,<br />

a field containing the default mode shall be sent. This field shall indicate what shall be the value for a running<br />

capability that is not sent in the message. The possible values can be two:<br />

• Maximum capability.<br />

• Minimum capability.<br />

Once the default field content is clear, the running capabilities that do not match with this default value shall be sent<br />

using a group of two fields. The first one shall indicate the position of the capability in the NCT, <strong>and</strong> the second<br />

one, its value. In addition to the information itself, a message mode shall be filled, indicating whether the node has<br />

changed its running capabilities, or it is a simply information message to the others nodes.<br />

9.1.4.5.3.1 Capability Element (CapE)<br />

A capability element is a structure composed by several <strong>and</strong> variable number of fields. All protocol messages are<br />

built using this structure. Four can be the protocol messages to be composed:<br />

• MAX_CAP_MSG(xxx): This message shall contain the maximum capabilities that a node can perform. It<br />

shall be divided into two main sections. The first one is the common capabilities section, which includes all<br />

these capabilities that are vendor independent, <strong>and</strong> have been previously approved by all vendors as a<br />

st<strong>and</strong>ard. The second one is the vendor capabilities section that shall be divided into three subsections.<br />

Either these subsections can be transmitted entirely (enumerated scheme) or sent using only an index<br />

(indexed scheme), enough for the receiver to underst<strong>and</strong> all the capabilities related to each subsection. In<br />

this case, the indication (xxx) shall be substituted by a 1 in the position relative to each of the subsections.<br />

That is, if only the Chip related capabilities are sent using the index, the indication becomes (100). The<br />

subsections are the following:<br />

o Chip related capabilities: All the capabilities that depend directly on the chip. If sent by index, it<br />

shall be indicated with a 1 in the first position of the index indicator. A list of Chip related<br />

capabilities is presented in section 0.<br />

o Firmware related capabilities: All the capabilities that depend on the Firmware version. If sent by<br />

index, it shall be indicated with a 1 in the second position of the index indicator. A list of Firmware<br />

related capabilities is presented in section 0.<br />

o Reference Design related capabilities: All the capabilities that depend on the Reference Design. If<br />

sent by index, it shall be indicated with a 1 in the third position of the index indicator. A list of<br />

Reference Design related capabilities is presented in section 0.<br />

• RUN_CAP_MSG: In this message, the running but not the maximum capabilities of the node shall be sent.<br />

Its objective is to fill the PCT. The first field shall notate the transmission mode, where the nature of the<br />

message, if it is a simply informational message or includes a notification of change in the running<br />

Submission page 220 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

capabilities, is transmitted. A second field telling the default value for the running capabilities that are not<br />

explicitly indicated in the message shall be sent. This default value can be the highest possible capability of<br />

the node or the lowest possible one. Then, the position of the capability in the NCT using a section indicator<br />

(Common, Chip, Firmware or Reference Design subsection) followed by the position of the capability in<br />

the section of the NCT shall be sent, associated with a value for this capability, that shall be wrote in the<br />

PCT.<br />

• ACK_CAP_ANN: Acknowledge of all sections of a MAX_CAP_MSG (xxx) message <strong>and</strong> also a previous<br />

RUN_CAP_MSG if they were sent with the ACK expected field set to 1. A sender cannot send two<br />

messages that expect two different ACKs. If a composed message with a MAX_CAP_MSG(xxx) <strong>and</strong> a<br />

RUN_CAP_MSG is sent, only an ACK_CAP_ANN shall be expected. If the sender decides to send both<br />

messages separately, first it shall expect the ACK_CAP_ANN for the MAX_CAP_MSG(xxx); <strong>and</strong> then, it<br />

shall transmit the RUN_CAP_MSG <strong>and</strong> expect another ACK_CAP_ANN for it. If some section of the<br />

MAX_CAP_MSG has not been correctly decoded, i.e. the index is not recognized by the destination node,<br />

(<strong>and</strong> cannot fill the NCT using only this data) then the message sent in response shall be a<br />

NACK_CAP_ANN (xxx) instead, with a 1 in the non-correctly decoded section.<br />

• NACK_CAP_ANN(xxx): One or more sections of the MAX_CAP_MSG(xxx) section sent by index have<br />

not been recognized by the receptor, because no index found, or table structure not known.<br />

Each type of Capabilities Exchange protocol message shall be identified by a field called MSG_TYPE. Please refer<br />

to section 0 for further details on this issue.<br />

Those messages can be composed encapsulating several of them into one Port Solver Message (PSM); therefore it is<br />

saved some overhead due to protocol encapsulation.<br />

Each one of the messages <strong>and</strong> how to compose them is discussed in the following subsections.<br />

9.1.4.5.3.2 MAX_CAP_MSG message<br />

This message shall begin with one field devoted to indicate the number of sets of maximum capabilities that are sent<br />

in the message.<br />

Depending on the decision performed in the node, it shall transmit the MAX_CAP_MSG message with either its<br />

maximum capabilities only (Single Node Publication) or the maximum capabilities of all the nodes it knows (All<br />

Known Nodes Publication). Although only the Single Node Publication method should be used, it is also possible to<br />

use the All Known Nodes Publication method.<br />

In the first case (Single Node Publication), this field shall be set to 1, <strong>and</strong> in the second case (All Known Nodes<br />

Publication), it shall be set to the number of known nodes with a complete filled NCT plus one.<br />

Submission page 221 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The second section shall include the data themselves <strong>and</strong> can contain the maximum capabilities of either one or<br />

several nodes.<br />

Each set of maximum capabilities shall be preceded by the <strong>MAC</strong> address of the node that can perform this set of<br />

capabilities.<br />

The different maximum capabilities that can be present in a BPL cell shall be divided into two different groups:<br />

• Common capabilities (vendor independent capabilities)<br />

• Vendor dependent capabilities<br />

Common capabilities shall be always sent in the messages. They are sent by means of a variable-length set of fields,<br />

whose contents <strong>and</strong> meaning will be determined by the protocol.<br />

The vendor dependent capabilities shall be divided themselves in capabilities associated with:<br />

• Chip version.<br />

• Reference design.<br />

• Firmware.<br />

Common capabilities shall not require a division among chip, firmware or reference design related capabilities,<br />

because these capabilities shall be the same for all types of nodes <strong>and</strong> vendors.<br />

On the other h<strong>and</strong>, vendor dependent capabilities shall be divided into the three described sections, because a<br />

solution may present different vendors for each part of the system; one vendor for the chip, other for the firmware<br />

<strong>and</strong> a third one for the reference design, <strong>and</strong> each vendor may sent its own information inside the vendor dependent<br />

section.<br />

The Maximum Capabilities section of the MAX_CAP_MSG message shall follow this division also, with two main<br />

sections, where the first one shall be the common capabilities section <strong>and</strong> the second one the vendor dependent<br />

section.<br />

The common capabilities section shall be simply composed by a first field of length in bytes, <strong>and</strong> a second variablelength<br />

field that shall include the fields that will be determined by the protocol. There are up to 64 entries in the<br />

NCT <strong>and</strong> PCT for common capabilities.<br />

The vendor dependent capabilities section shall be subdivided into three main subsections: Chip, Reference Design<br />

<strong>and</strong> Firmware. For each subsection, two possible schemes of sending capabilities shall be allowed: Indexed <strong>and</strong><br />

Enumerated.<br />

When using the Indexed scheme, it is only required to send a part of sender’s NCT to fill the entire NCT in the<br />

receiver.<br />

The second one shall be simply an enumeration of each of the capabilities that a node has.<br />

Submission page 222 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

An indexed section shall be simply an enumeration covering only the minimum possible set of capabilities. This<br />

minimum set shall depend on the vendor. The proposed set is the following:<br />

Section Set of capabilities to be an index<br />

Chip Chip Vendor<br />

Chip Version<br />

Reference Design RD Vendor<br />

RD Family<br />

RD Version<br />

Firmware FW Vendor<br />

FW Family<br />

FW Version<br />

Table 29 Proposed vendor dependent capabilities indexes<br />

As the vendor may be different for each section, it shall be indicated in each of the sections.<br />

The number of enumerated capabilities may change from node to node depending on the version of each one, but<br />

the capabilities order shall remain the same.<br />

The following figure presents an example of Maximum Capabilities section, where N sets of capabilities are sent.<br />

Inside each set, the three sections described below can be found, <strong>and</strong>, in this example, the enumerated mode is used,<br />

containing all the proposed fields. The common section is empty, because the contents <strong>and</strong> meaning of its fields are<br />

not determined yet. As a result, the length_of the common field is set to 0:<br />

Submission page 223 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

MSG_TYPE = 0x1<br />

#CAPSET = N<br />

L<strong>MAC</strong>_SET<br />

LENGTH_COMMON_SET<br />

COMMON_CAP_1<br />

COMMON_CAP_2<br />

…<br />

COMMON_CAP_i<br />

LENGTH_CHIP_SET<br />

CHIP_VENDOR<br />

CHIP_CAP_1<br />

CHIP_CAP_2<br />

…<br />

CHIP_CAP_j<br />

Figure 103 MAX_CAP_MSG structure for N sets using enumerated mode<br />

In the following table, each field of the message is described:<br />

LENGTH_RD_SET<br />

RD_VENDOR<br />

RD_CAP_1<br />

RD_CAP_2<br />

…<br />

RD_CAP_k<br />

LENGTH_FW_SET<br />

FW_VENDOR<br />

FW_CAP_1<br />

Field Name Length (in<br />

bytes)<br />

FW_CAP_2<br />

…<br />

FW_CAP_l<br />

Default<br />

Value<br />

Submission page 224 UPA-OPERA<br />

L<strong>MAC</strong>_SET<br />

LENGTH_COMMON_SET<br />

COMMON_CAP_1<br />

Description<br />

COMMON_CAP_2<br />

…<br />

COMMON_CAP_i<br />

LENGTH_CHIP_SET<br />

MSG_TYPE 1 0x1 MAX_CAP_MSG message<br />

#CAP_SET 1 1 Number of capabilities sets included<br />

in this message<br />

L<strong>MAC</strong>_SET 6 - <strong>MAC</strong> address of the node that can<br />

perform the capabilities described in<br />

the message<br />

LENGTH_COMMON 1 0 Length of the common capabilities<br />

section. Set to 0 until the common<br />

capabilites are determined by the<br />

protocol.<br />

COMMON_CAP_i - - Common capabilities. To be<br />

determined.<br />

LENGTH_CHIP 1 1 Number of bytes, excluding the<br />

LENGTH_CHIP field that are<br />

included in the CHIP section of the<br />

message<br />

CHIP_VENDOR 1 - Chip vendor. To be determined.<br />

CHIP_CAP_j - - Other Chip related capabilities<br />

(vendor dependent). To be<br />

CHIP_VENDOR<br />

CHIP_CAP_1<br />

CHIP_CAP_2<br />

…<br />

CHIP_CAP_j<br />

LENGTH_RD_SET<br />

RD_VENDOR<br />

RD_CAP_1<br />

RD_CAP_2<br />

…<br />

RD_CAP_k<br />

LENGTH_FW_SET<br />

FW_VENDOR<br />

FW_CAP_1<br />

FW_CAP_2<br />

…<br />

FW_CAP_l


4-June-07 P1901_PRO_016_r0<br />

determined.<br />

LENGTH_RD 1 1 Number of bytes, excluding the<br />

LENGTH_RD field that are<br />

included in the REFERENCE<br />

DESIGN section of the message<br />

RD_VENDOR 1 - Reference Design vendor. To be<br />

determined.<br />

RD_CAP_k - - Other Reference Design related<br />

capabilities (vendor dependent). To<br />

be determined.<br />

LENGTH_FW 1 1 Number of bytes, excluding the<br />

LENGTH_FW field that are<br />

included in the FIRMWARE<br />

section of the message<br />

FW_VENDOR 1 - Firmware vendor. To be<br />

determined.<br />

FW_CAP_l - - Other Firmware related capabilities<br />

(vendor dependent). To be<br />

determined.<br />

Table 30 MAX_CAP_MSG message fields<br />

In the following figure, an example of transmission of N sets of maximum capabilities using indexed scheme in all<br />

three sections is shown. It should be kept in mind that the indexed scheme can be set individually to each section<br />

<strong>and</strong> set, <strong>and</strong> that is applied only to the vendor dependent sections.<br />

1 byte<br />

MSG_TYPE = 0x1<br />

#CAPSET = N<br />

L<strong>MAC</strong>_SET<br />

LENGTH_COMMON_SET<br />

COMMON_CAP_1<br />

Maximum Capabilities of Set 1 Maximum Capabilities of Set N<br />

COMMON_CAP_2<br />

…<br />

COMMON_CAP_i<br />

LENGTH_CHIP_SET<br />

CHIP_VENDOR<br />

CHIP_VERSION<br />

LENGTH_RD_SET<br />

RD_VENDOR<br />

RD_FAMILY<br />

RD_VERSION<br />

LENGTH_FW_SET<br />

FW_VENDOR<br />

FW_FAMILY<br />

FW_VERSION<br />

Figure 104 Example of Maximum Capabilities exchange using the indexed shceme for every subsection<br />

Submission page 225 UPA-OPERA<br />

L<strong>MAC</strong>_SET<br />

LENGTH_COMMON_SET<br />

COMMON_CAP_1<br />

COMMON_CAP_2<br />

…<br />

COMMON_CAP_i<br />

LENGTH_CHIP_SET<br />

CHIP_VENDOR<br />

CHIP_VERSION<br />

LENGTH_RD_SET<br />

RD_VENDOR<br />

RD_FAMILY<br />

RD_VERSION<br />

LENGTH_FW_SET<br />

FW_VENDOR<br />

FW_FAMILY<br />

FW_VERSION


4-June-07 P1901_PRO_016_r0<br />

RUN_CAP_MSG message<br />

This message shall contain information about the capabilities that a node is running at that time. Additionally, by<br />

means of the MESSAGE_MODE field, a change of previous sent running capabilities can be indicated. Four are the<br />

supported message modes that apply only to a running capabilities set from a concrete node:<br />

Info mode with ACK: Indicates that the following sections contain information about the maximum <strong>and</strong> running<br />

capabilities, <strong>and</strong> that an ACK is required for this message.<br />

Info mode without ACK: Indicates that the following sections contain information about the maximum <strong>and</strong> running<br />

capabilities, <strong>and</strong> that NO ACK is required for this message.<br />

Change Mode with ACK: Indicates that the running capabilities have changed <strong>and</strong> are sent in the following section.<br />

An ACK of this message is expected by the sender.<br />

Change Mode without ACK: Indicates that the running capabilities have changed <strong>and</strong> are sent in the following<br />

section. No ACK of this message is expected by the sender.<br />

The running capabilities are transmitted by means of a field that indicates what is the default value for the<br />

capabilities that are not included explicitly in this message (highest possible capability of the node or lower possible<br />

capability of the node), <strong>and</strong> several two fields groups where the first one is a reference to a capability in the NCT<br />

(including section <strong>and</strong> position) <strong>and</strong> the second field is the value related to this capability. The number of groups<br />

describing each of the running capabilities that are different from the default value shall be set in the<br />

NUM_RUN_CAP field.<br />

If a value for a capability is longer than a byte, the same reference shall be sent followed by the first byte, then the<br />

same reference followed by the second byte <strong>and</strong> so on, up to complete the number of desired bytes for the capability<br />

value.<br />

In the following figure it is shown an example of a Running Capability section carrying running capabilities from N<br />

nodes, where the first set contain an explicit description of three running capabilities <strong>and</strong> the Nth set contains a<br />

description of four running capabilities.<br />

MSG_TYPE = 0x2<br />

#CAP_SET = N<br />

L<strong>MAC</strong>_SET<br />

MSG__MODE<br />

DEF_MODE<br />

#RUN_CAP<br />

CAP_REF_1<br />

CAP_VALUE_1<br />

CAP_REF_2<br />

CAP_VALUE_2<br />

...<br />

Figure 105 Example of Running Capability Section<br />

CAP_REF_i<br />

CAP_VALUE_i<br />

Submission page 226 UPA-OPERA<br />

L<strong>MAC</strong>_SET<br />

MSG__MODE<br />

DEF_MODE<br />

#RUN_CAP<br />

CAP_REF_1<br />

CAP_VALUE_1<br />

CAP_REF_2<br />

CAP_VALUE_2<br />

...<br />

CAP_REF_i<br />

CAP_VALUE_1


4-June-07 P1901_PRO_016_r0<br />

Field Name Length (in<br />

bytes)<br />

Default<br />

Value<br />

Description<br />

MSG_TYPE 1 0x2 RUN_CAP_MSG message<br />

#CAP_SET 1 1 Number of Running Capabilities<br />

individually described<br />

L<strong>MAC</strong>_SET 6 - <strong>MAC</strong> address of the node that is<br />

performing the capabilities<br />

described in the message<br />

MSG_MODE 1 0 0 – INFO message with ACK<br />

1 – INFO message without ACK<br />

2 – Change notification message<br />

with ACK<br />

3 – Change notification message<br />

without ACK<br />

DEF_MODE 1 0 0 – Highest Possible<br />

1 – Lower Possible<br />

#RUN_CAP 1 1 Number of running capabilities that<br />

will be described in this message<br />

CAP_REF_i 1 0 Bits 1 to 0:<br />

00 – Common Section<br />

01 – Chip Section<br />

10 – Reference Design Section<br />

Submission page 227 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

11 – Firmware Section<br />

Bits 7 to 2: Position of the<br />

capability in the section of the NCT<br />

CAP_VALUE_i 1 - Value of the referenced capability<br />

Table 31 RUN_CAP_MSG message fields<br />

ACK_CAP_ANN message<br />

MSG_TYPE = 0x4<br />

#CAP_ACK = N<br />

L<strong>MAC</strong>_ACK_1<br />

L<strong>MAC</strong>_ACK_2<br />

Figure 106 ACK_CAP_ANN message structure<br />

The structure of the ACK_CAP_ANN message is very simple. It shall be composed by a first field, 1 byte wide,<br />

with the number of ACKs that composes the message, followed by the <strong>MAC</strong> addresses of the nodes whose<br />

capabilities have been received correctly.<br />

Field Name Length (in<br />

bytes)<br />

Default<br />

Value<br />

Submission page 228 UPA-OPERA<br />

L<strong>MAC</strong>_ACK_N<br />

Description<br />

MSG_TYPE 1 0x4 ACK_CAP_ANN message<br />

#CAP_ACK 1 1 Number of ACKs contained in the<br />

message


4-June-07 P1901_PRO_016_r0<br />

L<strong>MAC</strong>_ACK_i 6 - <strong>MAC</strong> address of the node whose<br />

capabilities have been received<br />

corretly<br />

Table 32 ACK_CAP_ANN message fields<br />

NACK_CAP_ANN message<br />

MSG_TYPE = 0x8<br />

#CAP_NACK = N<br />

L<strong>MAC</strong>_NACK_1<br />

NACK_SECTION_1<br />

L<strong>MAC</strong>_NACK_2<br />

Figure 107 NACK_CAP_ANN message structure<br />

NACK_SECTION_2<br />

The structure of the NACK_CAP_ANN message is very simple. It shall be composed by a first field, 1 byte wide,<br />

with the number of NACKs that composes the message, followed by the <strong>MAC</strong> addresses of the nodes whose<br />

capabilities have not been received correctly. After each L<strong>MAC</strong> field, the NACK_SECTION field, 1 byte wide,<br />

containing the section that has not been correctly decoded shall be included.<br />

Field Name Length (in<br />

bytes)<br />

Default<br />

Value<br />

Description<br />

MSG_TYPE 1 0x8 NACK_CAP_ANN message<br />

#CAP_NACK 1 1 Number of NACKs contained in the<br />

message<br />

L<strong>MAC</strong>_NACK_i 6 - <strong>MAC</strong> address of the node whose<br />

capabilities have NOT been<br />

received correctly<br />

Submission page 229 UPA-OPERA<br />

L<strong>MAC</strong>_NACK_N<br />

NACK_SECTION_N


4-June-07 P1901_PRO_016_r0<br />

NACK_SECTION_i 1 - Bit 0: if set to 1 means that CHIP<br />

section not correctly decoded.<br />

Table 33 NACK_CAP_ANN message fields<br />

Aggregated messages<br />

Bit 1: if set to 1 means that<br />

REFERENCE DESIGN section not<br />

correctly decoded.<br />

Bit 2: if set to 1 means that<br />

FIRMWARE section not correctly<br />

decoded.<br />

In order to make the protocol more efficient, a message aggregation can be performed. It shall consist on changing<br />

the MSG_TYPE field code by the aggregation of up to three different messages types, as shown in Table 38. The<br />

order of the submessages in the final structure shall follow the scheme presented in the following figure, where<br />

some examples are proposed:<br />

Submission page 230 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

1 byte<br />

Figure 108 Agregated protocol messages <strong>and</strong> its MSG_TYPE codes<br />

It must be stated that, in each of the submessages, the MSG_TYPE field shall be deprecated <strong>and</strong> substituted by the<br />

new MSG_TYPE content at the beginning of the resulting message.<br />

Node Capability Table<br />

The Node Capability Table shall be resident in each node <strong>and</strong> contains, indexed by <strong>MAC</strong> address, the maximum<br />

<strong>and</strong> running capabilities of each of the known nodes.<br />

Each node shall contain a NCT per known node in the network, indexed by <strong>MAC</strong> address. This table shall contain<br />

four different sections each one with specific fields:<br />

Common capabilities section<br />

Chip section<br />

Reference design<br />

Submission page 231 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Firmware<br />

In each section, for each of the possible capabilities, two fields have to be filled. The first one shall be the maximum<br />

capability the node can perform. The second one shall be the real level of such capability that is performing at that<br />

time.<br />

Common capabilities section<br />

For the moment, this part of the table is empty, until the common capabilites are determined by the st<strong>and</strong>ard. The<br />

index shall be used to make a reference to a capability when transmitting the running capabilities as described in<br />

section 0.<br />

Chip related fields<br />

In the following table, the fields index, field name, length, default value <strong>and</strong> description, are presented. The index<br />

shall be used to make a reference to a capability when transmitting the running capabilities as described in section 0.<br />

Index Field Name Length<br />

(in bits)<br />

Default<br />

Value<br />

Description<br />

1 Chip Vendor 8 - Chip vendor. To be<br />

determined.<br />

2 Chip Capability j - - Other Chip related<br />

capabilities (vendor<br />

dependent). To be<br />

determined.<br />

Table 34 Chip related fields<br />

…<br />

Reference Design related fields<br />

In the following table, the fields index, field name, length, default value <strong>and</strong> description, are presented. The index<br />

shall be used to make a reference to a capability when transmitting the running capabilities as described in section 0.<br />

Submission page 232 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Index Field Name Length<br />

(in bits)<br />

Default<br />

Value<br />

Description<br />

1 RD Vendor 8 - Reference Design vendor.<br />

To be determined.<br />

2 RD Capability k - - Other Reference Design<br />

related capabilities (vendor<br />

dependent). To be<br />

determined.<br />

…<br />

Table 35 Reference Design related fields<br />

Firmware related fields<br />

In the following table, the fields index, field name, length, default value <strong>and</strong> description, are presented. The index<br />

shall be used to make a reference to a capability when transmitting the running capabilities as described in section 0.<br />

Index Field Name Length<br />

(in bits)<br />

Default<br />

Value<br />

Description<br />

1 FW Vendor 8 - Firmware vendor. To be<br />

determined.<br />

2 FW Capability l - - Other Firmware related<br />

capabilities (vendor<br />

dependent). To be<br />

determined.<br />

…<br />

Table 36 Firmware related fields<br />

Performed Capability Table<br />

Submission page 233 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The PCT shall contain, for each possible capability, a value that indicates if the capability is performed or not, <strong>and</strong><br />

the grade of functionality that is running at the time.<br />

The PCT shall also be divided into four sections corresponding to the above mentioned groups of capabilities:<br />

Common, Chip, Reference Design <strong>and</strong> Firmware related.<br />

The common capabilities section is empty until a decision on which capabilities must be considered common for all<br />

vendors is reached. The table is structured as follows:<br />

Capability Section Index Value Default<br />

High<br />

Value<br />

Chip Vendor Chip<br />

Related<br />

1 - - -<br />

Chip Capability<br />

j<br />

…<br />

2 - - -<br />

RD Vendor RD<br />

Related<br />

1 - - -<br />

RD Capability k 2 - - -<br />

…<br />

FW Vendor FW<br />

Related<br />

1 - - -<br />

FW Capability l 2 - - -<br />

…<br />

Table 37 PCT values for the proposed capabilities<br />

Default<br />

Low<br />

Value<br />

As the RUN_CAP_MSG is decoded, the position in the PCT shall be located using the CAP_RUN_REF field<br />

content, <strong>and</strong> then, the correspondent value shall be extracted from the following field called CAP_VALUE. After<br />

Submission page 234 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

decoding all the pairs CAP_RUN_REF/CAP_VALUE, some entries in the value column of the PCT may be empty.<br />

Then, depending on the DEF_MODE, the capabilities shall be set to the default high or default low value.<br />

An optimal implementation of both tables should reduce them up to a simple one, because both tables are indexed<br />

by <strong>MAC</strong> address <strong>and</strong> the capabilities are the same. They are presented separately for the sake of clarity.<br />

Capabilities Exchange protocol stages <strong>and</strong> modes<br />

Several capability publishing modes are available. They can be indicated using a local variable in each node<br />

(CAP_PUBLICATION_MODE ):<br />

Single Node Publication: only the capabilities of the node that transmits the MAX_CAP_MSG(xxx) message shall<br />

be included in such message. CAP_PUBLICATION_MODE shall be set to 1.<br />

All Known Nodes Publication: All the capabilities from every node known by the transmitter of the<br />

MAX_CAP_MSG(xxx) message, including their own capabilities, shall be included in the message.<br />

CAP_PUBLICATION_MODE shall be set to 2.<br />

No Capability Publication: No MAX_CAP_MSG(xxx) message will be transmitted. CAP_PUBLICATION_MODE<br />

shall be set to 0. This mode should not be used.<br />

The preferred mode should be the Single Node Publication because of its simplicity.<br />

The Capabilities Exchange protocol shall start each time a new node is discovered <strong>and</strong> a data link is established with<br />

it. If the NCT related with such node is empty, or incomplete, then the message exchange shall begin. Otherwise, no<br />

operation shall be performed.<br />

Packet format<br />

The Port Solver protocol is extended to include the exchange of capabilities information.<br />

Port Solver packet expansion<br />

The Port Solver Message (PSM) is defined previously as follows:<br />

Submission page 235 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Dest <strong>MAC</strong><br />

Src <strong>MAC</strong><br />

Figure 109 Port Solver Message structure<br />

TPID<br />

TCI<br />

Length<br />

0xAA<br />

0xAA<br />

0x3<br />

0x00<br />

0x13<br />

Submission page 236 UPA-OPERA<br />

0x9D<br />

0x02<br />

The destination <strong>and</strong> source <strong>MAC</strong> addresses of the packets shall be filled as all the Port Solver messages: in the Dest<br />

<strong>MAC</strong>, the Spanning tree <strong>MAC</strong> (0x0180C2000000), <strong>and</strong> in the src <strong>MAC</strong> the <strong>MAC</strong> address of the node that<br />

originates the message.<br />

The PSM message is extended to include also CapE messages. Therefore, it is used a special content for the INFO<br />

field. Then, if a node detects a PSM with an INFO field with the bits 1 to 4 set to something different from zero, it<br />

shall assume that the PSM includes also a CapE message.<br />

The values of bits 1 to 4 of the INFO field <strong>and</strong> the message sent is shown in the following table:<br />

Message INFO[4:1]<br />

PSM without capabilities information 0x0<br />

MAX_CAP_MSG 0x1<br />

RUN_CAP_MSG 0x2<br />

ACK_CAP_ANN 0x4<br />

NACK_CAP_ANN 0x8<br />

MAX_CAP_MSG+RUN_CAP_MSG 0x3<br />

MAX_CAP_MSG+RUN_CAP_MSG+ACK_CAP_ANN 0x7<br />

0x01<br />

Source <strong>MAC</strong><br />

Destination <strong>MAC</strong><br />

Assigned LP<br />

Info


4-June-07 P1901_PRO_016_r0<br />

MAX_CAP_MSG+RUN_CAP_MSG+ACK_CAP_ANN+NACK_CAP_ANN 0xF<br />

MAX_CAP_MSG+ACK_CAP_ANN 0x5<br />

MAX_CAP_MSG+ACK_CAP_ANN+ NACK_CAP_ANN 0xD<br />

MAX_CAP_MSG+NACK_CAP_ANN 0x9<br />

MAX_CAP_MSG+RUN_CAP_MSG+NACK_CAP_ANN 0xB<br />

RUN_CAP_MSG+ACK_CAP_ANN 0x6<br />

RUN_CAP_MSG+NACK_CAP_ANN 0xA<br />

RUN_CAP_MSG+ACK_CAP_ANN+NACK_CAP_ANN 0xE<br />

ACK_CAP_ANN+NACK_CAP_ANN 0xC<br />

Table 38 Message type <strong>and</strong> content of bits 1-3 of INFO field in PSM<br />

In case of composed messages, the order of each message in the final structure shall be, from left to right, the same<br />

as the shown in the table.<br />

The INFO field shall remain as follows:<br />

Figure 110 INFO field<br />

Port Solver protocol flow expansion<br />

First stage of the Capabilities Exchange protocol<br />

Submission page 237 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The Port Solver protocol is exp<strong>and</strong>ed repeating the ports information <strong>and</strong> including CapE information.<br />

As a result, the Port Solver protocol becomes a more reliable port exchange method, due to the inclusion of an ACK<br />

for each trasaction.<br />

Therefore, the message exchange shall be as the one shown in the following figures for the described cases:<br />

Submission page 238 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 111 Compressed normal work using Port Solver Protocol. All indexes recognized.<br />

Figure 112 Normal asynchronous work using PSM. All indexes recognized.<br />

Submission page 239 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 113 Normal work using PSM. Some indexes not recognized.<br />

Submission page 240 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 114 Normal work using PSM. Not all indexes recognized. MAX_CAP_MSG lost.<br />

Submission page 241 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 115 Normal work. Not all indexes recognized. NACK_CAP_INDEX lost.<br />

Submission page 242 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 116 Normal work. Not all indexes recognized. ACK_CAP_ANN lost.<br />

Submission page 243 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 117 Compressed work using PSM. All indexes recognized. MAX_CAP_MSG+ACK_CAP_ANN lost.<br />

Second stage of the Capabilities Exchange protocol<br />

This second stage is asynchronous with the PSP messages, because it depends on when a node decides to change its<br />

running capabilities.<br />

Submission page 244 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The running capabilities message shall be the same as the one used in the first stage of the protocol, just repeating<br />

the previously negotiated ports in its content.<br />

The RUN_CAP_MSG may expect or not an ACK from its destination, depending on the content of the<br />

MESSAGE_MODE field, as described in section 0.<br />

When a broadcast destination address is used, a dummy port named 255, which will be ignored by the receiver,<br />

shall be set in the message.<br />

The protocol behaviour in the case of RUN_CAP_MSG with an ACK required is described in the following figures:<br />

Submission page 245 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 118 Running capabilities change <strong>and</strong> associated protocol. Normal mode.<br />

Submission page 246 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 119 Running capabilities change <strong>and</strong> ACK_CAP_ANN loss<br />

Submission page 247 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 120 Running capabilities change <strong>and</strong> RUN_CAP_MSG loss<br />

Adding a new capability<br />

To add a new capability, a new entry shall be added in the adequate NCT section <strong>and</strong> assigned to it a high <strong>and</strong> low<br />

default value, <strong>and</strong> an index. The index shall be formed by two bits that indicate the section where the new<br />

Submission page 248 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

capabilitity is included (Common, Chip, Reference Design or Firmware) <strong>and</strong> a number that shall be consecutive to<br />

the last assigned. In the case of a capability that belongs to a vendor dependent section, it shall be the vendor who<br />

assigns a new index number to the new capability. In case of the common section, the new capabilities will be<br />

determined by the protocol.<br />

In case the new capability needs more than one byte to inform about its status, this information shall be sent byte by<br />

byte with the uniqe filed index preceding each byte.<br />

The new capability shall be sent in the same order that has been assigned in the NCT in the enumerated<br />

MAX_CAP_MSG(000) messages, <strong>and</strong> using its index <strong>and</strong> section in the RUN_CAP_MSG messages.<br />

Cluster Discovery Protocol<br />

The use of the Cluster Discovery Protocol (from here onwards, CDP) is limited to TDRs. Its use is not m<strong>and</strong>atory.<br />

The non-use of this protocol will result in the impossibility of its master to send non-returnable tokens.<br />

A master must be able to determine if the nodes that are hanging from it may be divided in isolated clusters. In order<br />

to achieve this it is necessary for every alive node to transmit information in the upstream direction, in order to<br />

know which nodes are visible for each node. This is achieved through the Cluster Discovery Protocol. This protocol<br />

also gives information of the exact network topology.<br />

CPEs are already sending the information regarding which nodes are visible with the periodic Announce Messages<br />

(see 9.1.4.4). They do not need to send any other information in the upstream.<br />

However, a TDR X needs to send the following information to their masters:<br />

List of nodes that are visible from X (this would be the same as the information in the periodic Announce Message<br />

sent by X);<br />

List of nodes that belong to its BPL subtree: this includes CPEs <strong>and</strong> TDRs which are under the direct or indirect<br />

control of X;<br />

List of nodes external to the BPL subtree of X that are visible from all the nodes belonging to its BPL subtree.<br />

In order to transmit the information in points 2 <strong>and</strong> 3 the Cluster Discovery Protocol is used. This protocol simply<br />

consists in the periodic transmission from a TDR to its master of all this information. The information is recursive,<br />

because in order to form this packet, the TDR must have previously received the information from its slaves in<br />

order to include it.<br />

The protocol will start in the first TDR (the one with only end-users hanging from it), once it has received at least<br />

one Periodic Announce Message from all of its slaves. The TDR will recollect this information, <strong>and</strong> send to its<br />

master a new packet. Every TDR in the chain will repeat this. Any TDR as well as the Head End might use the<br />

Submission page 249 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

information received to determine that there are isolated clusters, <strong>and</strong> that it can perform spatial reuse by the use of<br />

the non-returnable token (see 4.4.2.9)<br />

Cluster Discovery Protocol message format<br />

The CDP Message is encapsulated using the CCP with Type0 0x0a <strong>and</strong> Type1 0x01 (Figure 102). The CDP packet<br />

will be sent through unicast port, as it is specifically addressed to the master node. The destination <strong>MAC</strong> will be the<br />

master node destination <strong>MAC</strong>.<br />

TPID<br />

0xAA<br />

0xAA<br />

0x03<br />

0x00<br />

0x13<br />

0x9D<br />

0x0A<br />

0x01<br />

Length<br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

TCI<br />

Figure 121 Cluster discovery packet format<br />

Cluster Discovery Protocol Data<br />

The information can be fragmented in several packets (identified by a sub-table number) if the entries do not fit in<br />

one.<br />

The CDP data fields are:<br />

Bytes CDP data fields Length<br />

0 Sub-table number 1 bytes<br />

1 Number of sub-tables 1 bytes<br />

2 Number of entries of the sub-table 1 byte<br />

3 – 8 Sender <strong>MAC</strong> address 6 byte<br />

9 Entry size (in bytes) 1 byte<br />

10 - 521 Entries 512 bytes<br />

Submission page 250 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Table 39 Cluster discovery packet fields<br />

Maximum<br />

The Entries in the above table have the following format, although they could be extended:<br />

Table 40 Cluster discovery entries<br />

The Dependency field will be set to 1 if the corresponding <strong>MAC</strong> belongs to the same BPL subtree. Otherwise, it<br />

will be set to 0.<br />

The Cluster Discovery Protocol packet shall be sent at least when changes in the topology <strong>and</strong> visibility are<br />

detected; nevertheless this information can be transmitted periodically.<br />

To increase the packet intelligibility <strong>and</strong> to simplify the subsequent algorithms, the order of the entries in a sub-table<br />

<strong>and</strong> the order of sub-tables in the CDP packet are predetermined:<br />

In a sub-table, all entries belonging to the same BPL subtree shall appear together <strong>and</strong> at the beginning of the subtable,<br />

after them, there will be entries with only visibility dependency.<br />

Every TDR shall place its sub-table at the beginning of the CDP packet <strong>and</strong> encapsulate the CDP packets received<br />

from other TDRs, slaves of its, without altering their sub-table order. There is no restriction in the order how the<br />

CDP packets received from TDRs belonging to the same hierchary level shall be encapsulated.<br />

Connection Admission <strong>Control</strong> Protocol (CAC)<br />

The Connection Admission <strong>Control</strong> Protocol Messages are sent whenever one or several new flow(s) register into<br />

the BPL network to reserve the type of traffic that should be assigned, <strong>and</strong> also when there are changes in the traffic<br />

requirements for any of the flows, so that new resources can be committed or released. If reservation parameters<br />

change during the duration of the current session, an update of the parameters is necessary.<br />

There are six types of CAC messages:<br />

Entry fields Length<br />

<strong>MAC</strong> address 6 bytes<br />

Dependency 1 byte<br />

CAC_Req : Request to the master for the desired resources.<br />

Submission page 251 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

CAC_Rsp ; Reponse from the master.<br />

CAC_Chg ; Inform the master of a change in the allocated resources.<br />

CAC_Chg_Rsp ; Contains the response to a CAC_Req.<br />

CAC_Drp: Master or Repeater tells a node it shall cancel its reservation.<br />

CAC_Stp: Inform the FMN that a traffic flow has stopped (thus that its resources can be freed).<br />

Flow Master Node (FMN) is defined as the BPL node in charge of guarantee QoS requirement for a registered<br />

flow. All CAC_Req messages are transmitted from the source node which request flow to the BPL subcell master of<br />

the node. This request may be propagated to the HE, in this situation FMN of the requested flow will be network<br />

HE, or could be blocked by an intermediate node if this node decides to be the FMN of the requested flow.<br />

Destination <strong>MAC</strong> address of CAC messages:<br />

CAC_Req/CAC_Chg/CAC_Stp messages are transmitted by a BPL node <strong>and</strong> it shall be addressed to its BPL<br />

subcell master, these messages will be propagated in the network hop by hop until arrive to the FMN of the flow.<br />

These messages have as source <strong>MAC</strong> the <strong>MAC</strong> of the node that request the flow <strong>and</strong> as destination <strong>MAC</strong> the <strong>MAC</strong><br />

of the BPL subcell master.<br />

CAC_Rsp/CAC_Chg_Rsp/CAC_Drp messages are transmitted by the FMN in downstream to the node which<br />

request the flow. CCP source address will be the <strong>MAC</strong> of the FMN <strong>and</strong> the destination <strong>MAC</strong>, the address of the<br />

directly connected slave that is part of the requested flow.<br />

CAC_Req<br />

The CAC_Req message is transmitted to request QoS Resources to be committed in order to satisfy the agreed<br />

quality parameters. It may be originated from any node except network HE. There are two subtypes Slave<br />

CAC_Req <strong>and</strong> Master CAC_Req.<br />

CAC_Req sequence is triggered by a CPE or Repeater node upon detection of a specific flow or statically after node<br />

configuration. A node requesting resources must trigger a CAC_Req sequence by sending a CAC_Req message to<br />

its master node. Master node then decides if can guarantee requested flow <strong>and</strong> can reply the request with a<br />

CAC_Rsp message, in this case Master node will become the FMN of the requested flow (the node that should<br />

guarantee flow requirements). In order to guarantee requested flow guarantees, FMN can trigger a new CAC_Req<br />

message to its master or use existing resources to guarantee the flow.<br />

If a node decides to be the FMN of a specific user flow, it must be the FMN of the totality of flows for this user.<br />

Submission page 252 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

A node that decides to be a FMN of a flow shall select a session ID for this flow <strong>and</strong> communicate this session ID to<br />

all the nodes that are part of the flow path using a CAC_Rsp message.<br />

CAC_Req packet contains the list of traffic from one node requesting resources.<br />

Figure 122 CAC Req Message<br />

Information present in this packet (<strong>and</strong> in the reply) will be needed by any nodes present between the node requester<br />

<strong>and</strong> FMN.<br />

Bytes CAC_Req data fields Length<br />

0 Entry Length in bytes 1 byte<br />

1 Num entries 1 byte<br />

2-<br />

Num_entries*Entry_Length+2<br />

CAC_Req Entry Field 19 bytes<br />

Num_entries*Entry_Length+3 Num hop 1 byte<br />

Num_entries*Entry_Length+4<br />

- 9<br />

Table 41 CAC_Req Data Fields<br />

Mac i 6 bytes<br />

Mac i + 1 6 bytes<br />

NumHop : Initially set to 0, each node taking part of the path between the requester node <strong>and</strong> the FMN should<br />

increment this number <strong>and</strong> place its Mac in the locations reserved below. If NumHop reaches 255, no further<br />

increment is performed.<br />

Submission page 253 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Mac i : Macs of nodes taking part of the path from the requester node to the FMN. It is necessary to know the path<br />

to send the reply packet from the FMN to the requester node.<br />

Data Field Description Size (Bytes)<br />

Mac SrcReq <strong>MAC</strong> of the requester node 6<br />

Mac DstReq <strong>MAC</strong> of the destination<br />

traffic flow<br />

Request ID <strong>MAC</strong> source of the request<br />

<strong>and</strong> the request ID form a<br />

unique identifier of the<br />

request. If a CAC_Req<br />

message is lost but resource<br />

has been partially allocated in<br />

some nodes of the flow path,<br />

request should be resent again<br />

after a timeout<br />

(MAX_CAC_TO). Resources<br />

shall not be allocated again.<br />

Service Class Service Class of the traffic<br />

flow<br />

Latency<br />

(ms)<br />

Latency requirements of the<br />

flow<br />

B<strong>and</strong>width B<strong>and</strong>width requested 2<br />

Table 42 CAC_Req Message Entry Field<br />

CAC_Rsp<br />

Submission page 254 UPA-OPERA<br />

6<br />

1<br />

1<br />

2


4-June-07 P1901_PRO_016_r0<br />

The CAC_Rsp message is transmitted by a FMN to accept or deny requested resources. This packet is sent by the<br />

master <strong>and</strong> is destined to the requester but will go down throughTDRs placed on the way (if they exist).<br />

Figure 123 CAC Rsp Message<br />

The CAC Reservation Response payload must have the following fields:<br />

Bytes CAC_Rsp data fields Length<br />

0 Entry Length in bytes 1 byte<br />

1 Num entries 1 byte<br />

2 -<br />

Num_entries*Entry_Length+2<br />

CAC_Rsp Entry Field 19 bytes<br />

Num_entries*Entry_Length+3 Num hop 1 byte<br />

Num_entries*Entry_Length+4<br />

-<br />

Num_entries*Entry_Length+9<br />

Table 43 CAC_Rsp Data Fields<br />

Mac i 6 bytes<br />

Mac i + 1 6 bytes<br />

Submission page 255 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

And each entry of CAC Reservation Response must have the following fields:<br />

Data Field Description Size (Bytes)<br />

Mac SrcReq <strong>MAC</strong> of the requester node 6<br />

Mac DstReq <strong>MAC</strong> of the destination<br />

traffic flow<br />

Ack Status (accepted or not) of the<br />

flow based on calculation of<br />

available b<strong>and</strong>width <strong>and</strong><br />

b<strong>and</strong>width requested.<br />

Session ID Session ID assigned to this<br />

flow. Used if Ack status is<br />

accepted.<br />

Service Class Service Class of the traffic<br />

flow<br />

Latency<br />

(ms)<br />

Latency assigned 2<br />

B<strong>and</strong>width B<strong>and</strong>width assigned 2<br />

Table 44 CAC_Rsp Message Entry Field<br />

CAC_Chg<br />

Submission page 256 UPA-OPERA<br />

6<br />

1<br />

1<br />

1


4-June-07 P1901_PRO_016_r0<br />

CAC_Chg message must be used when:<br />

A resource parameter has changed <strong>and</strong> the node has to communicate the change to its FMN.<br />

If the FMN receives a Reservation Change from an open Session Id, it updates the resources requested, the FMN<br />

has to answer with a Reservation Change Confirmation Packet, indicating if the new resources requested are<br />

accepted or not. If the requester node does not receive the acknowledgement of the packet sent, when a timeout<br />

expires, it will send a new Reservation Change Packet.<br />

Figure 124 CAC Change Message<br />

The CAC Change payload must have the following fields:<br />

Table 45 CAC_Chg Data Fields<br />

Bytes CAC_Chg data fields Length<br />

0 Entry Length in bytes 1 byte<br />

1 Num Entries 1 byte<br />

2 -<br />

Num_entries*Entry_Length+2<br />

CAC_Chg Entry Field 3 bytes<br />

Submission page 257 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

And each entry of CAC Change must have the following fields:<br />

Data Field Description Size (Bytes)<br />

Session ID Session ID assigned to this<br />

flow.<br />

Latency Latency requirements of the<br />

flow<br />

B<strong>and</strong>width B<strong>and</strong>width requested 1<br />

Table 46 CAC_Chg Message Entry Field<br />

CAC_Chg_Rsp<br />

CAC_Chg_Rsp message is sent by the FMN of a flow to communicate if a flow has been correctly allocated.<br />

Figure 125 CAC Change Response Message<br />

The CAC Change payload must have the following fields:<br />

Submission page 258 UPA-OPERA<br />

1<br />

1


4-June-07 P1901_PRO_016_r0<br />

Bytes CAC_Chg_Rsp data fields Length<br />

0 Entry Length in bytes 1 byte<br />

1 Num Entries 1 byte<br />

2 -<br />

Num_entries*Entry_Length+2<br />

Table 47 CAC_Chg_Rsp Data Fields<br />

CAC_Chg Entry Field 3 bytes<br />

And each entry of CAC Change Response must have the following fields:<br />

Data Field Description Size (Bytes)<br />

Session ID Session ID assigned to this<br />

flow.<br />

ACK Status (accepted or not) of the<br />

flow based on calculation of<br />

available b<strong>and</strong>width <strong>and</strong><br />

b<strong>and</strong>width requested.<br />

Latency Latency assigned 2<br />

B<strong>and</strong>width B<strong>and</strong>width assigned 2<br />

Table 48 CAC Chg Rsp Entry Fields<br />

CAC_Drp<br />

Submission page 259 UPA-OPERA<br />

1<br />

1


4-June-07 P1901_PRO_016_r0<br />

In a congestion situation, the FMN has to deny resources even to an accepted Session Id. In this case, the FMN<br />

sends a Reservation Dropped Packet to indicate to a node that its traffic with the indicated Session Id has been<br />

dropped due to congestion.<br />

Figure 126 CAC Drop Message<br />

The CAC Drop payload must have the following fields:<br />

Table 49 CAC_Drp Data Fields<br />

Bytes CAC_Drp data fields Length<br />

0 Entry Length in bytes 1 byte<br />

1 Num Entries 1 byte<br />

2 CAC Drp Entry Field 1 byte<br />

And each entry of CAC Drop message must have the following fields:<br />

Data Field Description Size (Bytes)<br />

Submission page 260 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Table 50 CAC Drop Entry Fields<br />

CAC_Stp<br />

Session ID Session ID assigned to this<br />

flow.<br />

The reservation Stop must be used by requester nodes when:<br />

The node doesn’t transmit a flow anymore <strong>and</strong> informs the FMN that the resources allocated to its Session Id can be<br />

freed.<br />

The reservation Stop must be used by a node that is included in the flow path when:<br />

It detect that requester node is no longer connected to the node.<br />

CAC_Stp message doesn´t need to be confirmed by the FMN because requester node knows if FMN is trying to<br />

guarantee Session ID traffic (Node receives data tokens for this Session ID).In this case, node shall resend CAC_Stp<br />

message again after MAX_CAC_STP_TO time.<br />

Submission page 261 UPA-OPERA<br />

1


4-June-07 P1901_PRO_016_r0<br />

Figure 127 CAC Stop Message<br />

The CAC Stop payload must have the following fields:<br />

Table 51 CAC Stp Data Fields<br />

Bytes CAC_Stp data fields Length<br />

0 Entry Length in bytes 1 byte<br />

1 Num Entries 1 byte<br />

2 CAC Stp Entry Field 1 byte<br />

And each entry of CAC Stop message must have the following fields:<br />

Table 52 CAC Stp Entry Fields<br />

Data Field Description Size (Bytes)<br />

Session ID Session ID assigned to this<br />

flow.<br />

Connection Admission <strong>Control</strong> protocol scenarios.<br />

Submission page 262 UPA-OPERA<br />

1


4-June-07 P1901_PRO_016_r0<br />

Figure 128 CAC Protocol Scenario 1<br />

¡Error! No se encuentra el origen de la referencia. CPE Request resources to its direct master. REP node<br />

propagate CAC_Req message <strong>and</strong> the Network HE becomes the FMN of the flow. A session ID will be assigned by<br />

the HE to the flow in all the flow path.<br />

Figure 129 CAC Protocol Scenario 2<br />

¡Error! No se encuentra el origen de la referencia. REP node receives a CAC_Req message from a CPE. REP node<br />

decides to be the FMN of this flow because it has enough resources. CAC_Req message shall not be propagated to<br />

the HE.<br />

Submission page 263 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 130 CAC Protocol Scenario 3<br />

¡Error! No se encuentra el origen de la referencia. depicts a scenario where a CAC_Req packet does not reach the<br />

TDR, it is lost. After a MAX_CAC_TO time-out, the CAC_Req packet will be resent.<br />

Submission page 264 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

MAX_CAC_TO<br />

CPE TDR HE<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Req<br />

CAC_Rsp<br />

Figure 131 CAC Protocol Scenario 4<br />

Figure 131 Resources are partially allocated for a session ID. CAC_Req message shall be resent after<br />

MAX_CAC_TO timeout but REP shall not resend it because REP resources have been allocated previously, <strong>and</strong><br />

TDREP must send the CAC_Rsp with the session_id to the node<br />

Submission page 265 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

CPE TDR HE<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Stp<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Stp<br />

Figure 132 CAC Protocol Scenario 5<br />

Figure 132 Resources may be freed using CAC_Stp message. Message shall be propagated to FMN.<br />

Submission page 266 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

CPE TDR HE<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Stp<br />

MAX_CAC_STP_TO<br />

CAC_Stp<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Stp<br />

Figure 133 CAC Protocol Scenario 6<br />

Figure 133 Resources may be freed using CAC_Stp message. If Message CAC_Stp is lost. message shall be resent<br />

after <strong>MAC</strong>_CAC_STP_TO time if node is still receiving requested resource.<br />

Submission page 267 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

CPE TDR HE<br />

CAC_Req<br />

CAC_Rsp<br />

TDR detect CPE is<br />

disconnected<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Stp<br />

Figure 134 CAC Protocol Scenario 7<br />

Figure 134 REP node detect a node is no longer connected. It shall free all resources allocated for the node subcell.<br />

Submission page 268 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

CPE TDR HE<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Drp<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Drp<br />

Figure 135 CAC Protocol Scenario 8<br />

Figure 135 FMN are not able to guarantee all the resources allocated. It chooses less service class flow <strong>and</strong> sends a<br />

CAC_Drp message to inform the requester node that this flow can not be guarantee.<br />

Submission page 269 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

MAX_CAC_DRP_TO<br />

CPE TDR HE<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Drp<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Drp<br />

Figure 136 CAC Protocol Scenario 9<br />

Figure 136 CAC_Drp message is lost. CPE node will deregister flow after MAX_CAC_DRP_TO time without<br />

receiving the resource (Tokens with a register Session ID).<br />

Automatic Management of Crosstalks between not Synchronized Systems<br />

This section describes a mechanism to avoid crosstalk that may be implemented but is not m<strong>and</strong>atory.<br />

Once the nodes realize that there is more than one master in the channel by means of the Master Id (see 4.4.1), it is<br />

necessary to take some measures to avoid such interferences.<br />

The solution is to coordinate both BPL cells, <strong>and</strong> the simplest way to do it is subordinate one of the BPL cells. Next,<br />

the algorithm is explained:<br />

MID hierarchy<br />

When the crosstalk is detected, then the nodes must decide which BPL cell must subordinate.<br />

Submission page 270 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The rule shall be “the lowest MID, the best”, analyzing the MID as a number.<br />

Then, one of the nodes of the worse BPL cell will register in the neighbor network using the <strong>Access</strong> Protocol, <strong>and</strong> it<br />

will act as master of its BPL cell, distributing the token.<br />

If one node does not perform this protocol it does not copy the MID inherited from its master, instead it fixes the<br />

local MID to one of these values:<br />

0x1FFFFF. Nodes that have not completed the <strong>Access</strong> Protocol.<br />

0x130001. Nodes that have finished the <strong>Access</strong> Protocol.<br />

Border node designation<br />

The border node is the modem that will act as a bridge between the networks passing the token.<br />

Once the interference is detected, the network with higher MID must decide which node within the BPL cell, will<br />

perform registration.<br />

Designation Rules<br />

The master will select the Border Node with the following criteria:<br />

Less hops, higher priority. This is, if the interference is detected by several nodes, the HE has preference over the<br />

rest of the nodes; next TDRs placed one hop away; next repeaters with two hops, etc.<br />

CPEs do not perform this protocol, only HEs <strong>and</strong> TDRs do. A node that detects only a CPE of a neighbor BPL cell<br />

does not apply for becoming border node.<br />

Notification protocol<br />

To centralize the decision, the HE of the BPL cell decides which node will perform negotiation, interchanging CCP<br />

packets. Since the interference will not be detected by all the nodes simultaneously, a guard time may be kept before<br />

designating the border node in order to know all the information.<br />

If any node detects the interference (sniffing a better MID), it transmits an Interference Detection Packet (IDP),<br />

containing the own <strong>MAC</strong>, the neighbor <strong>MAC</strong> sniffed, the MID sniffed, the local number of hops <strong>and</strong> the identity of<br />

the node detected (HE or TDR). When the packet is received by a node, it has to check if is coming from one of its<br />

slaves, then the information is copied <strong>and</strong> retransmitted to its master, then the packet will arrive finally to the HE of<br />

the BPL cell. To avoid flooding the network, the IDPs have to be sent with a minimum period of 10 seconds<br />

Submission page 271 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

between them, except if the node detects a better node to register to, this is new information that has to be<br />

transmitted immediately (for instance a node reported that was detecting a TDR but afterwards detects a HE, or<br />

another MID better than the transmitted one).<br />

Among all the IDPs received, the HE decides which node must become border node sending a Border Node<br />

Designation Packet (BNDP), containing the <strong>MAC</strong> of the Border Node. This is a broadcast packet that has to be<br />

relayed by all the nodes of the network because the destination might be several hops away from the master. When<br />

the packet is received by a node coming from its master <strong>and</strong> it is not the designated border node, it has to built a<br />

new BNDP to notify its slaves (only for TDR with at least one slave).<br />

The designated border node must send a Border Node Designation Acknowledge (BNDA), to confirm that the<br />

information has been received, <strong>and</strong> it is transmitted towards the master in the same way than the IDP. The BNDA<br />

must be received by the HE in a specific period of time (5 seconds). If the time expires a new BNDA to the same<br />

node is delivered. After 3 consecutive timeouts not receiving the BNDA, a new node (if exists) must be designated<br />

as Border Node.<br />

Crosstalk Management Frames Format<br />

IDP<br />

The IDP Message is encapsulated using the CCP with Type0 0x0b <strong>and</strong> Type1 0x01 (Figure 137).<br />

0xAA<br />

0xAA<br />

0x03<br />

0x00<br />

0x13<br />

0x9D<br />

0x0B<br />

0x01<br />

Length<br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

Figure 137 IDP Packet<br />

TPID<br />

TCI<br />

IDP Data<br />

The packet is sent using the broadcast port (127). The value of the packet fields shall be:<br />

Dest <strong>MAC</strong> is set 0x0180C2000000.<br />

Src <strong>MAC</strong> is set to the local <strong>MAC</strong> address.<br />

The IDP data fields are:<br />

Submission page 272 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Table 53 Interference detection packet fields<br />

Bytes IDP data fields Length<br />

0-5 Sender <strong>MAC</strong> address 6 bytes<br />

6-11 Sniffed <strong>MAC</strong> address 6 bytes<br />

12-14 MID sniffed 3 bytes<br />

15 Local Number of hops 1 byte<br />

16 Type of Node sniffed 1 byte<br />

In the Local Number of hops field, a value of 255 hops means 255 or more hops.<br />

The field Type of Node contains the same information allocated in the Token Announce (although announce the<br />

detection of a slave is forbidden by the protocol).<br />

Table 54 Type of node in IDP<br />

BNDP<br />

0 HE<br />

1 CPE<br />

2 TDR<br />

The BNDP Message is encapsulated using the CCP with Type0 0x0b <strong>and</strong> Type1 0x02 (Figure 138).<br />

Submission page 273 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

TPID<br />

0xAA<br />

0xAA<br />

0x03<br />

0x00<br />

0x13<br />

0x9D<br />

0x0B<br />

0x02<br />

Length<br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

Figure 138 BNDP Packet<br />

TCI<br />

BNDP Data<br />

The packet is sent using the broadcast port (127). The value of the packet fields shall be:<br />

Dest <strong>MAC</strong> is set 0x0180C2000000.<br />

Src <strong>MAC</strong> is set to the local <strong>MAC</strong> address.<br />

The BNDP data fields are:<br />

Table 55 BNDP packet fields<br />

BNDA<br />

Bytes BNDP data fields Length<br />

0-5 Border Node <strong>MAC</strong> address 6 bytes<br />

The BNDA Message is encapsulated using the CCP with type 0x0b <strong>and</strong> subtype 0x03 (Figure 139).<br />

TPID<br />

0xAA<br />

0xAA<br />

0x03<br />

0x00<br />

0x13<br />

0x9D<br />

0x0B<br />

0x03<br />

Length<br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

TCI<br />

BNDA Data<br />

Submission page 274 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 139 BNDA Packet<br />

The packet is sent using the broadcast port (127). The value of the packet fields shall be:<br />

Dest <strong>MAC</strong> is set 0x0180C2000000.<br />

Src <strong>MAC</strong> is set to the local <strong>MAC</strong> address.<br />

The BNDA data fields are:<br />

Table 56 BNDA packet fields<br />

Border node registration<br />

Bytes BNDA data fields Length<br />

0-5 Border Node <strong>MAC</strong> address 6 bytes<br />

Once the border node is designated by the HE (can be itself), it starts its attempt for registration in the neighbor BPL<br />

cell as it is described in the <strong>Access</strong> Protocol.<br />

Master selection<br />

The border node will select the master to register based in the following criteria:<br />

First HE (of the neighbor BPL cell)<br />

Second repeaters.<br />

Successful registration<br />

If the modem succeeds, as it has changed BPL cell it copies the MID of its new BPL cell, in this way any node<br />

knows that the node is token dependant from the neighbor network.<br />

Submission page 275 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

A node performing the registration in the neighbor BPL cell will have a MID different <strong>and</strong> it will be different from<br />

0x1FFFFF <strong>and</strong> 0x130001. Under these conditions the node must be accepted avoiding any authentication process,<br />

also the master node knows that is not a node from its network <strong>and</strong> must avoid transmit any data through the BPL<br />

port.<br />

Failing registration<br />

The maximum time specified for the registration of the border node is 120 seconds<br />

When the timer expires, the HE has to select a new border node to complete negotiation. The HE is the node that<br />

monitories the registration timer, in this way no new packets are needed, even if the border node designated is<br />

switched off the HE restarts the protocol by itself.<br />

The formerly designated border node has to activate the registration timer like the master <strong>and</strong> when the timer<br />

expires it assumes that it is not border node anymore until a new BNDP is received.<br />

Intermittent transmission<br />

To perform successfully the negotiation among BPL cells it is necessary to get free interference periods, because the<br />

transmissions within the own BPL cell will ruin the registration.<br />

A HE can decide by itself to stop the transmissions within its network avoiding new token generation, but any other<br />

node cannot because its master will regenerate the token.<br />

When the HE receives a BNDA it starts a period so called “INTERMITTENT TRANSMISSION” [IT].<br />

During the status of Border Node a modem can generate as many BNDAs as needed to complete the negotiation.<br />

The default silence time 2 sec, followed by a normal transmission period of 1 sec. It will have 5 silence periods. So<br />

the overall IT will last 15 seconds.<br />

SPANNING TREE<br />

In a network, a spanning tree is a path or collection of paths that represent connections between nodes. To be called<br />

a spanning tree, the tree must cover every possible path in a network. A minimal spanning tree is one that covers all<br />

possible paths, does so with as few segments as possible, <strong>and</strong> makes sure there are no loops (closed paths) in the<br />

network.<br />

The IEEE 802.1 recommendations provide an algorithm for finding a spanning tree in any network.<br />

Submission page 276 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

STP packets will be transmitted through the corresponding unicast ports.<br />

IEEE 802.1D (Spanning Tree Protocol)<br />

The 802.1D recommendation describes the Spanning Tree algorithm <strong>and</strong> protocol. In this document, the calculation<br />

of the tree elements <strong>and</strong> the messages exchanged between bridges for this purpose are exposed. This specification is<br />

fully compliant with this st<strong>and</strong>ard.<br />

The implementation of IEEE 802.1D is a must for network compatibility.<br />

For specific information on message types <strong>and</strong> their fields <strong>and</strong> the algorithm to h<strong>and</strong>le them, refer to IEEE Std 802.1<br />

<strong>and</strong> IEEE Std 802.1D (Spanning Tree).<br />

Ports can be Ethernet or BPL. Every new BPL connection is added to the bridge as a new port. Ports can be deleted<br />

when the BPL connection is lost for some physical reason. Some ports, such as Ethernet ports, are always present.<br />

Each port carries out the STP.<br />

Default timers <strong>and</strong> field values<br />

The IEEE recommendation is relatively flexible in some aspects, such as default timer values <strong>and</strong> other message<br />

fields, so that they can be tuned for different network sizes <strong>and</strong> <strong>Medium</strong> <strong>Access</strong> technologies. The values adopted<br />

by this specification for these parameters are:<br />

hello: time between each BPDU that is sent on a port.<br />

Default: 2 seconds<br />

Range: [1, 10] seconds<br />

forward delay: time spent in the listening <strong>and</strong> learning states.<br />

Default: 15 seconds<br />

Range: [4, 30] seconds<br />

max age: maximum length of time a bridge port saves its configuration.<br />

Default: 20 seconds<br />

Submission page 277 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Range: [6, 40] seconds<br />

Priority: The greater the number, the less priority.<br />

Table 57 STP priority<br />

IEEE 802.1w (Rapid STP)<br />

MV Master 0x9010<br />

MV Repeater 0x9020<br />

LV Master 0x9030<br />

LV Repeater 0x9040<br />

LV Slave 0x9050<br />

Rapid Spanning Tree Protocol (RSTP; IEEE 802.1w) is an amendment to 802.1D. This version offers a significant<br />

reduction in the time taken to reconfigure the active topology of the Bridged LAN in the face of changes to the<br />

physical topology or its configuration parameters. The strategy to reach this performance is based on a h<strong>and</strong>shake<br />

mechanism between bridges that enables a fast transition to forwarding, thus bypassing the listening <strong>and</strong> learning<br />

states <strong>and</strong> timers.<br />

The two versions of the algorithm <strong>and</strong> protocol are capable of interoperating within the same Bridged LAN; hence,<br />

it is not necessary for implementations to support both versions of the Spanning Tree algorithm <strong>and</strong> protocol.<br />

In view of the improved performance offered, it is recommended that the Rapid Spanning Tree algorithm <strong>and</strong><br />

Protocol be supported in preference to the original version.<br />

For specific information on message types <strong>and</strong> their format, the migration protocol <strong>and</strong> the RSTP algorithm, refer to<br />

IEEE Std 802.1D, 1998 Edition; Clause 17 (Rapid Spanning Tree Algorithm <strong>and</strong> Protocol), also found as 802.1w.<br />

Default timers <strong>and</strong> field values<br />

migration delay (mdelay): indicates that the protocol migration is ongoing. It is used to avoid re-entry. If any BPDU<br />

of the other type is received while mdelay is running, it is ignored in terms of protocol migration. mdelay is set to 3<br />

seconds.<br />

Submission page 278 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Point-to-point ports <strong>and</strong> edge ports<br />

In order to achieve fast convergence on a port, the protocol relies upon two new variables: edge ports <strong>and</strong> link type.<br />

All BPL ports can be assumed to be point-to-point ports. Ethernet ports can be considered edge ports, unless another<br />

bridge is connected to the same segment. Anyway, since the st<strong>and</strong>ard establishes that the first BPDU coming into an<br />

edge port removes its edge port status, it can be assumed at startup that all ports are c<strong>and</strong>idate to directly transition<br />

to forwarding:<br />

Ethernet ports start in forwarding state (edge ports).<br />

BPL ports, even though they start in blocking state, are ready for h<strong>and</strong>shake <strong>and</strong> rapid transition to forwarding<br />

(point-to-point).<br />

STP <strong>and</strong> VLANs<br />

If VLANs are active, STP packets must use the management VLAN inside the power-line network.<br />

Common STP<br />

Ethernet interfaces must support the possibility of being configured to remove/add the VLAN tag to the<br />

outgoing/incoming STP packets. That is, the VLAN tag of the STP packets going out the BPL network is removed.<br />

On the other h<strong>and</strong>, VLAN tag must be added to the incoming STP packets, so as to make sure that STP packets<br />

inside the power-line network use the management VLAN.<br />

10 SECURITY<br />

10.1 LOW LEVEL ENCRYPTION AND INTEGRITY<br />

10.1.1 Overview<br />

Encryption <strong>and</strong> Integrity are two key features needed by any communication device to guarantee security <strong>and</strong><br />

privacy in the message exchange.<br />

For encryption IEEE P1901 uses as basic building block the Advanced Encryption St<strong>and</strong>ard (AES) according to<br />

FIPS-97(2002).<br />

AES is a block cipher algorithm while higher layers have to deal with variable length packets. To be able to encrypt<br />

these variable length packets IEEE P1901 uses the operation mode known as Counter Mode (CTR) defined in<br />

Submission page 279 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

NIST800-38A “Recommendations for Block Cipher Modes of Operation. Methods <strong>and</strong> Techniques”. By the use of<br />

CTR IEEE P1901 achieves confidentiality for messages of arbitrary length.<br />

Nevertheless it is still necessary to provide message integrity against tampering. For this purpose IEEE P1901 uses<br />

the operation mode known as CCM (Counter with CBC-<strong>MAC</strong> (Message Authentication Check)) that avoids the use<br />

of a separate mechanism for providing message integrity. CCM mode of operation combines CTR mode of<br />

encryption with the CBC-<strong>MAC</strong> mode of authentication. CCM is defined in RFC 3610 <strong>and</strong> has been used <strong>and</strong><br />

studied for a long time <strong>and</strong> has well-understood cryptographic properties. The interesting point is that the same<br />

encryption key can be used for both processes in conjunction with other parameters, thus leading, in effect, to two<br />

separated keys.<br />

CCM is only defined for 128-bit block ciphers <strong>and</strong>, though it is a generic mode applicable to any many ciphers, in<br />

IETF RFC3610 it is defined for use with 128-bit AES.<br />

CCM has two parameters (M <strong>and</strong> L). M indicates the length of the MIC (Message Integrity Check) <strong>and</strong> L indicates<br />

the length of the message itself. For the selected algorithm M is equal to 4 (thus indicating that the Message<br />

Integrity Check (MIC) produced is 4 bytes long) <strong>and</strong> L is equal to 2 (thus indicating that the length of the message<br />

is at most 2^16 bytes as is exactly the maximum length of a burst).<br />

Encryption <strong>and</strong> Integrity are both based on AES blocks <strong>and</strong> needs a different initialization variables <strong>and</strong> modes to<br />

work. The information about the initial state for desencryption <strong>and</strong> integrity check is transported in the CCMP<br />

Header.<br />

Encryption <strong>and</strong> Integrity are applied when the burst is set as encrypted <strong>and</strong> over each one of the packets or packet<br />

fragments inside the burst payload independently, but using the common initial state contained in the CCMP<br />

Header, that is transmitted only once each burst at the beginning of the payload.<br />

Each MIC is calculated over the Burst Header, CCMP Header, the Interpacket Header added by the LLC layer <strong>and</strong><br />

the packet or fragment of a packet including the padding, <strong>and</strong> then appended to this structure, althought Burst<br />

Header <strong>and</strong> CCMP Header are only transmitted once at the beginning of the Burst.<br />

The encryption algorithm is also applied in a fragment packet or packet basis. Burst Header, CCMP Header <strong>and</strong><br />

Interpacket Headers shall be sent in clear, <strong>and</strong> the encryption is applied over the fragment packet or packet<br />

including its padding <strong>and</strong> the appended MIC.<br />

10.1.2 Detailed encryption process<br />

As has been described before, Encryption <strong>and</strong> Integrity algorithms are applied in a packet or fragment of packet<br />

basis, but using common initial state information for each Burst contained in the CCMP Header.<br />

Submission page 280 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The Crypto bit, located at the byte 15, 6th bit of the Burst Header, when set to 1, indicates that encryption is used in<br />

this Burst. Therefore, the CCMP header is appended after the Burst Header <strong>and</strong> the MIC is placed after each<br />

fragment of packet or packet, including its padding. Each MIC will be calculated over the Burst Header, CCMP<br />

Header (structures that are common for all MIC calculations inside the same Burst), Interpacket Header <strong>and</strong> the<br />

fragment packet or packet including its padding.<br />

Although for the calculation of each MIC Burst Header <strong>and</strong> CCMP Header are taken into account, these fields shall<br />

be transmitted only once per Burst.<br />

Each one of the generated MICs <strong>and</strong> its correspondent fragment packet or packet including its padding shall be<br />

encrypted using the CTR AES algorithm.<br />

In the following figure an Encrypted Burst construction is depicted:<br />

PADDING<br />

Figure 140: Construction of an Encrypted Burst<br />

The CCMP header is inserted between Burst Header <strong>and</strong> the first Interpacket Header <strong>and</strong> it is not to be encrypted<br />

although shall be protected by every MIC. A representation of the CCMP header is shown in Figure 141. It shall<br />

contain the following fields:<br />

- Packet Number (PN) - 48 bits. Packets or segment of packets are numbered by the use of a PN. The PN is<br />

incremented by a positive number at each successive packet or fragment of a packet transmission. PN shall<br />

never repeat for a series of encrypted packets using the same temporal key. PN provides replay protection<br />

<strong>and</strong> enables the receiver to derive the value of the nonce that was used in the encryption <strong>and</strong> integrity<br />

algorithms.PN is represented as an array of 6 octets. PN5 is the most significant octet of the PN, <strong>and</strong> PN0 is<br />

Submission page 281 UPA-OPERA<br />

PADDING<br />

PADDING


4-June-07 P1901_PRO_016_r0<br />

the least significant. The Packet Number sent in the CCMP Header is the one correspondent to the first<br />

packet or fragment of a packet sent in the Burst.<br />

- Rsvd – 8 bits. Reserved bits set to 0 <strong>and</strong> ignored on reception.<br />

- KeyID - 8 bits. 5 bits are reserved <strong>and</strong> set to 0. Bit 5 is set to 1. Bits 6–7 of the Key ID octet are for the Key<br />

ID subfield. The Key ID subfield allows for operating with different keys.<br />

The CCMP Header shall be the following structure:<br />

1 byte<br />

PN0 PN1 Rsvd KeyID PN2 PN3 PN4 PN5<br />

Rsvd 1 KeyID<br />

Submission page 282 UPA-OPERA<br />

1 bit<br />

b0 b4 b5 b6 b7<br />

Figure 141: CCMP Header Structure<br />

CCM requires for encryption <strong>and</strong> message integrity checking, an unique Nonce value, a number which never<br />

repeats during a given life time, for each packet protected by a given temporal key. CCM requires a fresh temporal<br />

key for every session.<br />

The PN is combined with other fields to produce a 13-octet long Nonce as corresponds to setting the parameter L to<br />

2 as indicated in IETF RFC 3610. This Nonce is represented in Figure 142.


4-June-07 P1901_PRO_016_r0<br />

The Nonce shall be the following fields:<br />

Figure 142: Nonce Structure<br />

- Nonce priority – 8 bits. This field is different from the priority field in the burst header <strong>and</strong> is for future<br />

capability. The Nonce Priority Octet field shall be 0 <strong>and</strong> is reserved for future use.<br />

- Source Address – 48 bits. It is taken from the <strong>MAC</strong> address of the transmitter included in the Token<br />

Announce (Section 4.4.1).<br />

- PN – 48 bits. It is calculated adding to the PN of the CCMP Header the number of the first packet or<br />

fragment of packet of the Burst minus one.<br />

This Nonce is used to produce two 128-bit words: B0 <strong>and</strong> A0 (IETF RFC 3610 <strong>and</strong> NIST 800-38c).<br />

The initial CCMP block B0 (128-bit block), needed for the calculation of the MIC, has the following fields:<br />

- Flag B0 – 8 bits. Fix content (IETF RFC 3610 <strong>and</strong> <strong>and</strong> NIST 800-38c). It indicates that the MIC is 32 bits<br />

long. See Table 58.<br />

- Nonce – 104 bits. See Figure 142<br />

- DLen – 16 bits. Length in bytes of the data to be encrypted. The DLen is the taken from the Length field of<br />

the Inter Packet Header (Figure 58).<br />

Submission page 283 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 143: CCM Block B0 used for MIC calculation<br />

The initial counter block A0 (128-bit block), needed for the encryption process, has the following fields:<br />

- Flag A0 – 8 bits. Fix content (IETF RFC 3610 <strong>and</strong> <strong>and</strong> NIST 800-38c). See Table 1.<br />

- Nonce – 104 bits. See Figure 142.<br />

- Counter – 16 bits. Counter that starts at the value of one at the beginning of the encryption process <strong>and</strong> is<br />

incremented for each encrypted 128-bit block.<br />

1 byte<br />

1 byte<br />

6 bytes 6 bytes<br />

FlagA0 Priority Source Address PN<br />

104 bits Nonce<br />

Figure 144: Counter Block A0 used to initialize the encryption<br />

Counter<br />

FlagsA0 <strong>and</strong> FlagsB0 are 8-bit words with a fix contents (IETF RFC 3610 <strong>and</strong> <strong>and</strong> NIST 800-38c) as indicated as<br />

follows.<br />

Bit Number Contents of Flag A0 Contents of Flag B0<br />

7 Reserved (Always 0) Reserved (Always 0)<br />

6 Reserved (Always 0) 1<br />

5-3 0 (M-2)/2 (001)<br />

2-0 L-1 (001) L-1 (001)<br />

Submission page 284 UPA-OPERA<br />

2 bytes


4-June-07 P1901_PRO_016_r0<br />

Table 58: Flag A0 <strong>and</strong> B0 Contents<br />

The Burst Header, CCMP header <strong>and</strong> Interpacket Headers shall be transmitted unencrypted. In the calculation of<br />

each MIC, the Burst Header plus the CCMP header <strong>and</strong> the Interpacket Header are more than 128 bits long.<br />

Because of this fact, it is necessary, for the proper calculation of the first MIC, to add some padding at the end of<br />

the Interpacket Header to get three 128-bit blocks. The padding bits shall not be transmitted. This padding is only<br />

used for MIC calculation. Padding bits are not used for encryption. The procedure is shown in Figure 145.<br />

Figure 145: Encryption <strong>and</strong> Integrity process for the first packet<br />

In the case of the second <strong>and</strong> subsequent packets, the MIC calculation shall remain the same, but in the encryption,<br />

the Burst Header <strong>and</strong> CCMP Header will not be included in the resulting Encrypted message. The padding bits shall<br />

not be transmitted. This padding is only used for MIC calculation. Padding bits are not used for encryption. The<br />

procedure is shown in Figure 146.<br />

Submission page 285 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 146: Encryption <strong>and</strong> Integrity process for all but the first packet<br />

The MIC is computed in both cases using CBC-<strong>MAC</strong>, which encrypts a starting block B0 <strong>and</strong> then successively<br />

XORs subsequent blocks <strong>and</strong> encrypts the result. Although the result is a MIC of 128 bits, the lower 96 bits are<br />

discarded, <strong>and</strong> a final 32-bit MIC is obtained.<br />

Once the MIC has been computed <strong>and</strong> appended to the plaintext data, the encryption takes place using Counter<br />

Mode (CTR).<br />

10.2 AAA protocol<br />

In section 9.1.3 the access method used in IEEE P1901 has been described. Nevertheless, for the sake of security,<br />

section 9.1.3 is to be complemented with the AAA protocol that is described in the present section.<br />

The access <strong>and</strong> authentication control system of IEEE P1901 follows closely the one described in IEEE802.1X<br />

which in turn relies on the Extensible Authentication Protocol (EAP) [RFC3748] over LAN (EAPOL). IEEE802.1X<br />

provides the description of EAPOL.<br />

The purpose of IEEE 802.1X is to implement access control at the point at which a user joins the network. In the<br />

process of application of IEEE 802.1X the network entities can take one of three roles: Supplicant, Authenticator<br />

<strong>and</strong> Authentication Server (AS).<br />

The device asking for connection to the network is known as the Supplicant <strong>and</strong> in IEEE P1901 can be either a CPE<br />

or a TDR. The Authenticator can be either the HE or a TDR. The Authentication Server will normally be<br />

centralized.<br />

The IEEE 802.1X access control mechanisms apply to the association between a CPE or TDR <strong>and</strong> a Master.<br />

Submission page 286 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

In IEEE 802.1X an access <strong>and</strong> authentication dialog is defined for the case of authenticator initiated exchange. This<br />

dialog is formed by the following sequence of messages:<br />

• Message A: Authenticator to Supplicant<br />

o EAPOL with Code field: Request (1) <strong>and</strong> Type field: Identity (1)<br />

• Message B: Supplicant to Authenticator<br />

o EAPOL with Code field: Response (2) <strong>and</strong> Type field: Identity (1)<br />

• Message C: Authenticator to Supplicant<br />

o EAPOL with Code field: Request (1) <strong>and</strong> Type field: Challenge (4)<br />

• Message D: Supplicant to Authenticator<br />

o EAPOL with Code field: Response (2) <strong>and</strong> Type field: Challenge (4)<br />

• Message E: Authenticator to Supplicant<br />

o EAPOL with Code field: Success (3) or Failure (4)<br />

In IEEE P1901 Message A of the previous dialog should be implemented by the use of the <strong>Access</strong> Frame described<br />

in section 4.3.8., Message B should be implemented by the use of the <strong>Access</strong> Reply Frame described in section<br />

4.3.9 <strong>and</strong> Message E should be implemented by the use of the <strong>Access</strong> Protocol Packet described in section 9.1.3.<br />

Messages C <strong>and</strong> D serve for the purpose of authentication. With message C the Authenticator sends a r<strong>and</strong>om<br />

challenge of 16 octets to the Supplicant <strong>and</strong> message D is the response of the Supplicant to this challenge. This<br />

Response is a 16-octet MD5 hash calculated over the r<strong>and</strong>om challenge <strong>and</strong> the secret shared by the Supplicant <strong>and</strong><br />

the Authentication Server <strong>and</strong> other fields [RFC 2865]. This secret should be the Serial Number of the Supplicant.<br />

IEEE 802.1X states that “The EAPOL encapsulation used with IEEE802.3/Ethernet can be applied to other LAN<br />

technologies that share the same basic frame format as Ethernet” as is the case of IEEE P1901 technology. As a<br />

consequence, the format of Messages C <strong>and</strong> D in IEEE P1901, which follows the rules of EAPOL packets, are<br />

encapsulated in CLPDUs. The formats are the following:<br />

Submission page 287 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Packet Body<br />

Description<br />

Nr. Of<br />

octets<br />

Contents<br />

PAE Ethernet Type 2 0x88-8E<br />

EAPOL Protocol Version 1 0x02<br />

Packet Body Length 2 0x007F<br />

Code 1<br />

Identifier 1<br />

Message C: Request (1)<br />

Message D: Response (2)<br />

Requests must modify the Identifier<br />

Responses must match them<br />

Length in octets 2 0x007F<br />

Type 1<br />

Default: 0x04 (MD5 Challenge)<br />

Open to other hash functions<br />

Value size 1 Default: 0x10<br />

Value<br />

Default:<br />

16<br />

This content is included in the payload of a CCP packet.<br />

Table 59: Message C <strong>and</strong> D format<br />

Message C: R<strong>and</strong>om Number<br />

Message D: Hash<br />

All of the previous messages, except for Message A, have to be transferred from the Authenticator to the AS or the<br />

other way around. This transfer is done in IEEE P1901 by the use of EAP over Radius [RFC 3579] although Radius<br />

as a server [RFC2865] does not form part of this specification.<br />

The Format of the EAP over Radius messages follows completely the st<strong>and</strong>ard [ RFC2865] [RFC3579].<br />

The IEEE P1901 <strong>Access</strong> Reply Frame is converted into a “Radius <strong>Access</strong>-Request/EAP” packet. From the <strong>Access</strong><br />

Reply Frame the Authenticator creates a st<strong>and</strong>ardized EAP-Response /Identity packet <strong>and</strong> encapsulates it within a<br />

RADIUS <strong>Access</strong>-Request packet.<br />

Submission page 288 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The format of this EAP-Response/Identity packet to be encapsulated in the RADIUS <strong>Access</strong>-Request is the already<br />

indicated for Messages C <strong>and</strong> D but the Packet Body is the following:<br />

Packet Body<br />

Description<br />

Nr. Of<br />

octets<br />

Contents<br />

Code 1 Response (0x02)<br />

Identifier 1<br />

Requests must modify the Identifier<br />

Responses must match them<br />

Length in octets 2 0x000C<br />

Type 1 0x01 (Identity)<br />

Value size 1 0x06<br />

Value 6 <strong>MAC</strong> Address of the supplicant<br />

Table 60: Packet Body Format for EAP-Response/Identity packet fro messages C <strong>and</strong> D<br />

The Response to the previous message by the AS is an “<strong>Access</strong>-Challenge/EAP” packet which the authenticator<br />

will convert into Message C for transmission to the Supplicant just decapsulating it.<br />

Message D (EAP-Response/Challenge) shall be encapsulated by the Authenticator into a RADIUS <strong>Access</strong>-<br />

Request/EAP.<br />

And the response to the previous message will be a “Radius <strong>Access</strong>-Accept (or Reject)/EAP” packet which the<br />

authenticator will convert into Message E for transmission to the Supplicant by forming an IEEE P1901 “<strong>Access</strong><br />

Protocol Packet” as indicated in section 9.1.3, which has also the possibility to signal “Failed” besides Accept or<br />

Reject. This would happen in case of failure of the dialog between the Authenticator <strong>and</strong> the Authentication Server.<br />

The Format of the RADIUS packet encapsulating an EAP message is the following [RFC2865]:<br />

Submission page 289 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Attribute Attribute<br />

Table 61: RADIUS packet encapsulating an EAP message<br />

In the case of Radius <strong>Access</strong>-Request/EAP packet it is necessary to add to the previous message structure the<br />

following Attributes:<br />

Submission page 290 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Attribute Attribute Attribute<br />

Table 62: RADIUS <strong>Access</strong>-request/EAP Attributes<br />

The User Name Attribute must be sent even if the String is already included in the EAP Attribute. This last<br />

Attribute must [RFC3579 ]also be included in the <strong>Access</strong>-Accept.<br />

Exactly one RADIUS packet is encapsulated in the UDP Data field, where the UDP Destination Port field indicates<br />

1812 (decimal). When a reply is generated, the source <strong>and</strong> destination ports are reversed.<br />

Figure 147 is a representation of the access <strong>and</strong> authentication dialog used in IEEE P1901.<br />

Submission page 291 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 147: Representation of the access <strong>and</strong> authentication dialog used in IEEE P1901.<br />

At the end of the dialog the Supplicant is already authenticated but the keys for encryption <strong>and</strong> for integrity<br />

checking are still not established. This is the subject of the next section.<br />

10.3 Key Hierarchies<br />

There are two key hierarchies in IEEE P1901: Pairwise Key Hierarchy <strong>and</strong> Group Key Hierarchy.<br />

It is assumed that there is a Pairwise Master Key (PMK) that is assumed to be in possession of the Supplicant <strong>and</strong><br />

the Authenticator by some “out of b<strong>and</strong> means” <strong>and</strong> which distribution is not the subject of this specification, <strong>and</strong> a<br />

Group Master Key (GMK) which is generated at r<strong>and</strong>om by the HE or by some other higher level entity.<br />

From the PMK the following temporal keys are derived for use in conjunction with the AES-CCMP algorithm:<br />

- Data Encryption/Integrity key (128 bits)<br />

- EAPOL-Key Encryption key (128 bits)<br />

Submission page 292 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

- EAPOL-Key Integrity key (128 bits)<br />

From the GMK the following temporal key is derived:<br />

- Group Encryption/Integrity key (128 bits)<br />

The EAPOL keys are used to protect key h<strong>and</strong>shakes.<br />

These hierarchies are conformant to the st<strong>and</strong>ard IEEE802.11i.<br />

10.4 Establishing the keys<br />

To compute the Pairwise Temporal Keys (PTK) the 4-Way H<strong>and</strong>shake is used [IEEE 802.11i].<br />

As indicated in Figure 148 the procedure implies the use of 4 messages that use the EAPOL-key format<br />

Figure 148: Schematics of the 4-way h<strong>and</strong>shake<br />

Submission page 293 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

In this dialog Supplicant <strong>and</strong> Master exchange two Nonces that allow to derive the PTK; Supplicant <strong>and</strong><br />

Authenticator prove knowledge of the PMK to the other one <strong>and</strong> both synchronize to turn on the encryption keys for<br />

unicast packets. Message 3 may also be used to send the GTK (Group Transient Key).By this way the Supplicant<br />

<strong>and</strong> the Authenticator have established a secure channel using encryption in both directions.<br />

11 SYSTEM PARAMETERS<br />

11.1 GENERAL PARAMETERS<br />

• GENERAL_USE_AUTOCONF = [YES | NO]<br />

Parameter: YES enables autoconf, NO disables it.<br />

SNMP: no<br />

M<strong>and</strong>atory: yes<br />

This should be the first parameter in the auto-configuration file. If this parameter is disabled, when downloading<br />

the file, all the parameters will be stored in non-volatile memory, <strong>and</strong> next boot-up will be in local settings boot<br />

mode. In case of enabled, except a few parameters that must be necessarily saved in non-volatile memory, the<br />

others will not be stored in the non-volatile memory, <strong>and</strong> next boot-up will be in Auto-configuration mode. By<br />

default, it is enabled.<br />

• GENERAL_TYPE = [HE | CPE | TDREPEATER]<br />

Parameter: Possible values are: HE (Head End), CPE (Customer Premises Equipment) <strong>and</strong> TDREPEATER (Time<br />

Division Repeater).<br />

SNMP: plSysNodeType<br />

M<strong>and</strong>atory: yes<br />

Configures the type of node. A node can be configured as a HE (Head End), a CPE (Customer Premises<br />

Equipment) or a TDREPEATER (Time Division Repeater). The default value is CPE.<br />

• GENERAL_FW_TYPE = [MV | LV | EU]<br />

Parameter: Possible values are: MV (<strong>Medium</strong> Voltage), LV (Low Voltage) <strong>and</strong> EU (End User).<br />

Submission page 294 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

SNMP: no<br />

M<strong>and</strong>atory: yes<br />

Configures the firmware type of the node. The following firmware types can be configured: MV (<strong>Medium</strong><br />

Voltage), LV (Low Voltage) <strong>and</strong> EU (End User). This parameter affects the QoS <strong>and</strong> VLAN/OVLAN<br />

configuration. The default value is LV.<br />

• GENERAL_SIGNAL_MODE = [1 … m]<br />

Parameter: Configures the physical mode used by the modem. This value can reach from 1 to m, depending on the<br />

range of frequency used.<br />

SNMP: plBasicMode<br />

M<strong>and</strong>atory: yes<br />

Configures the physical mode used by the modem. The valid modes depend on the range of frequency used.<br />

• GENERAL_SIGNAL_MODE_LIST.i = [1 … m]<br />

Parameter: This value can reach from 1 to m, depending on the range of frequency used.<br />

SNMP: plBasicSearchModes<br />

M<strong>and</strong>atory: yes<br />

Configures i-mode of the mode list for the modem to search with the SearchLink protocol (i = 1 … 12). The<br />

valid modes depend on the range of frequency used. The mode list is scanned to select the range of frequencies<br />

that will be taken into account by the modem.<br />

GENERAL_AUTHENTICATION = [RADIUS | AUTHLIST | NONE]<br />

Parameter: There are three possible values: RADIUS, ATHLIST <strong>and</strong> NONE. If RADIUS is selected, a RADIUS<br />

server will be in charge of accepting new users <strong>and</strong> assigning the profile. If AUTHLIST is selected, authentication<br />

will be done by checking a list provided in the auto-configuration file. If NONE is selected, all the users will be<br />

accepted<br />

SNMP: no<br />

Submission page 295 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

M<strong>and</strong>atory: yes<br />

Selects one of the following authentication methods:<br />

RADIUS server. In this case, a RADIUS server will be in charge of accepting new users <strong>and</strong> assigning the profile.<br />

Authorization list. In this case, authentication will be done by checking a list provided in the auto-configuration file.<br />

This option avoids the installation of a RADIUS server.<br />

No authentication. In this case, no authentication method is used at all. Therefore, all the users will be accepted.<br />

By default, no authentication is used.<br />

• GENERAL_STP = [YES | NO]<br />

Parameter: Enables (YES) or disables (NO) the Spanning Tree Protocol in the node.<br />

SNMP: plStpEnable<br />

M<strong>and</strong>atory: yes<br />

Enables or disables the Spanning Tree Protocol in the node. Enabled by default.<br />

• GENERAL_COMMON_STP_EXTA = [YES | NO]<br />

Parameter: Enables (YES) or disables (NO) the Common STP feature in the Ethernet interface A (EXTA).<br />

SNMP: no<br />

M<strong>and</strong>atory: no<br />

Enables or disables the Common STP feature in the Ethernet interface A (EXTA). This parameter only makes<br />

sense to be used if VLANs are enabled. If it is enabled, STP packets will be released <strong>and</strong> accepted through<br />

EXTA without VLAN tag (even if VLANs are enabled). If it is disabled, STP packets will be released with the<br />

management VLAN tag (if VLANs are active).<br />

WARNING: with this parameter enabled, all packets without VLAN will be accepted through EXTA.<br />

Submission page 296 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• GENERAL_COMMON_STP_EXTB = [YES | NO]<br />

Parameter: Enables (YES) or disables (NO) the Common STP feature in the Ethernet interface B (EXTB).<br />

SNMP: no<br />

M<strong>and</strong>atory: no<br />

Enables or disables the Common STP feature in the Ethernet interface B (EXTB). This parameter only makes<br />

sense to be used if VLANs are enabled. If it is enabled, STP packets will be released <strong>and</strong> accepted through<br />

EXTB without VLAN tag (even if VLANs are enabled). If it is disabled, STP packets will be released with the<br />

management VLAN tag (if VLANs are active).<br />

WARNING: with this parameter enabled, all packets without VLAN will be accepted through EXTB.<br />

• GENERAL_IP_ADDRESS = <br />

Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by dots).<br />

SNMP: plSysStaticIPAddress<br />

M<strong>and</strong>atory: no<br />

Configures the IP address to be used when booting up with DHCP disabled.<br />

• GENERAL_IP_NETMASK = <br />

Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by dots).<br />

SNMP: plSysStaticNetMask<br />

M<strong>and</strong>atory: no<br />

Configures the IP network mask to be used when booting up with DHCP disabled.<br />

• GENERAL_IP_GATEWAY = <br />

Submission page 297 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by dots).<br />

SNMP: plSysStaticDefaultGW<br />

M<strong>and</strong>atory: no<br />

Configures the default gateway IP address to be used when booting up with DHCP disabled.<br />

• GENERAL_IP_USE_DHCP = [YES | NO]<br />

Parameter: If Yes DHCP is used, if NO DHCP is not used.<br />

SNMP: plSysUseDHCP<br />

M<strong>and</strong>atory: no<br />

Enables or disables the DHCP protocol in the modem. If DHCP is enabled, network configuration parameters<br />

(IP address, network mask <strong>and</strong> default gateway IP address) will be obtained from a DHCP server when booting<br />

up. If it is disabled, the network configuration parameters saved in the non-volatile memory will be used<br />

instead.<br />

11.2 AGC (AUTOMATIC GAIN CONTROL) PARAMETERS<br />

The following parameters must be h<strong>and</strong>led with special care. A bad configuration of them can produce lost of<br />

communication with the modem through BPL.<br />

• AGC_TX_GAIN = [0 | 1]<br />

o Parameter: Selecting 1, the default value, 12 dB are added to the reference gain. In case of 0 value,<br />

no extra gain is added (0 dB).<br />

o SNMP: plBasicTXAGCGain<br />

o M<strong>and</strong>atory: no<br />

It configures the transmission gain. Two gain values, 0 <strong>and</strong> 12 dB, can be added to the reference gain. By default,<br />

12 dB are selected.<br />

• AGC_RX_ENABLE = [0 | 1]<br />

Submission page 298 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: Enables (1) or disables (0) the hardware AGC.<br />

o SNMP: plBasicRXAGCEnable<br />

o M<strong>and</strong>atory: no<br />

Enables or disables the reception HW AGC. It is enabled by default.<br />

• AGC_RX_FIX_GAIN = [0 … 7]<br />

o Parameter: Eight values, from 0 to 7, are possible. Those values represent gains from 0 to 42 dB,<br />

respectively, added to the reference gain in steps of 6 dB.<br />

o SNMP: plBasicRXAGCGain<br />

o M<strong>and</strong>atory: no<br />

It sets a fixed value for the reception gain. This value is only taken into account if the HW AGC is disabled.<br />

Eight gain values, from 0 to 42 dB, can be added to the reference gain.<br />

• AGC_MAX_RX_GAIN = [0 … 7]<br />

o Parameter: Eight values, from 0 to 7, are possible. Those values represent gains from 0 to 42 dB,<br />

respectively, added to the reference gain in steps of 6 dB. The default value is 7 (42 dB).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the maximum reception gain for the HW AGC. Eight gain values, from 0 to 42 dB, can be<br />

added to the reference gain. The default value is 42 dB.<br />

• AGC_MIN_RX_GAIN = [0 … 7]<br />

o Parameter: Eight values, from 0 to 7, are possible. Those values represent gains from 0 to 42 dB,<br />

respectively, added to the reference gain in steps of 6 dB. The default value is 7 (42 dB).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the minimum reception gain for the HW AGC. Eight gain values, from 0 to 42 dB, can be added<br />

to the reference gain. The default value is 0 dB.<br />

11.3 RADIUS PARAMETERS<br />

• RADIUS_SERVER_IP = <br />

Submission page 299 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This autoconfiguration parameter specifies the RADIUS server IP address. The access-request of the<br />

RADIUS procedure is submitted to the RADIUS server via the network using this IP address.<br />

• RADIUS_SERVER_PORT = ddddd<br />

o Parameter: Port number<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

It specifies the RADIUS client UDP port. The access-request of the RADIUS procedure is submitted to the<br />

RADIUS server via the network as a UDP communication to the IP address set before <strong>and</strong> sent to the UDP<br />

port of this parameter.<br />

• RADIUS_SHARED_SECRET = <br />

o Parameter: ‘shared_secret’ (string, limited to 16 characters, of the shared secret)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

It sets the RADIUS shared secret, which is limited to 16 characters. The forwarding server decrypts the<br />

User-Password, if present, using the shared secret. Once the RADIUS server receives the request, it<br />

validates the sending client. A request from a client for which the RADIUS server does not have a shared<br />

secret MUST be silently discarded<br />

All three parameters must be set up in order for the RADIUS client to work properly.<br />

11.4 CLASS OF SERVICE (COS) PARAMETER<br />

Using the auto-configuration file, 2 classes of service criteria can be defined, assigning priorities from 0 to 7.<br />

• COS_CUSTOM_CRITERION_OFFSET.i = [1 … 531]<br />

o Parameter: Values from 1 to 531 are possible.<br />

o SNMP: no<br />

Submission page 300 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o M<strong>and</strong>atory: no<br />

Custom i-criterion frame offset, in bytes (i = 1, 2).<br />

• COS_CUSTOM_CRITERION_PATTERN.i = 0xXXXXXXXXXXXXXXXX<br />

o Parameter: The value must be specified with 16 hexadecimal digits.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Custom i-criterion 8-byte pattern (i = 1, 2).<br />

• COS_CUSTOM_CRITERION_BITMASK.i = 0xXXXXXXXXXXXXXXXX<br />

o Parameter: The value must be specified with 16 hexadecimal digits.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Custom i-criterion 8-byte bitmask (i = 1, 2).<br />

• COS_CUSTOM_CRITERION_CLASSES_OFFSET.i = [1 … 531]<br />

o Parameter: Values from 1 to 531 are possible.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Custom i-criterion classes frame offset, in bytes (i = 1, 2).<br />

• COS_CUSTOM_CRITERION_CLASSES_BITMASK.i i = 0xXXXXXXXXXXXXXXXX<br />

o Parameter: The value must be specified with 16 hexadecimal digits.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Custom i-criterion classes 8-byte bitmask (i = 1, 2).<br />

• COS_CUSTOM_CRITERION_CLASSES_PATTERN.i.j i=0xXXXXXXXXXXXXXXXX<br />

o Parameter: The value must be specified with 16 hexadecimal digits<br />

o SNMP: no<br />

Submission page 301 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o M<strong>and</strong>atory: no<br />

Custom i-criterion j-class 8-byte pattern (i = 1, 2; j = 1 … 8).<br />

• COS_CUSTOM_CRITERION_CLASSES_PRIO.i.j = [0 … 7]<br />

o Parameter: Values from 0 to 7 are allowed.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Priority assigned the packets that match the custom i-criterion j-class priority (i = 1, 2; j = 1 … 8).<br />

• COS_CRITERION.k = [8021P | TOS | CUSTOM1 | CUSTOM2]<br />

o Parameter: There are two predefined criteria (8021P, based on IEEE 802.1p VLAN tag priority<br />

field, <strong>and</strong> TOS, based on IP type of service), <strong>and</strong> two custom criteria (CUSTOM1 <strong>and</strong> CUSTOM2),<br />

defined with the parameters above (COS_CUSTOM_CRITERION_xxx).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

k-criterion definition (k = 1, 2). Assigns up to 2 criteria to classify traffic. There are two predefined criteria<br />

(one based on IEEE 802.1p VLAN tag priority field, <strong>and</strong> another based on IP type of service), <strong>and</strong> two<br />

custom criteria, defined with the parameters above (COS_CUSTOM_CRITERION_xxx).<br />

• COS_DEFAULT_PRIO = [0 … 7]<br />

o Parameter: Values from 0 to 7 are allowed.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Configures the CoS default priority, i.e. the priority assigned to packets that do not match any criterion.<br />

11.5 QUALITY OF SERVICE (QOS) PARAMETERS<br />

• QOS_ENABLE = [YES | NO]<br />

o Parameter: Enables (YES) or disables (NO) the quality of service in the node.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Submission page 302 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Enables or disables the quality of service in the node. If this parameter is disabled, all other parameters<br />

related to QoS will not be configured.<br />

• QOS_PRIOACK.prio+1 = [0 | 1]<br />

o Parameter: This list enables (1) or disables (0) the <strong>Layer</strong> 2 ACK protocol depending on the<br />

priority level transmitted by the modem (priority levels: prio = 0 … 7).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This list enables or disables the <strong>Layer</strong> 2 ACK protocol depending on the priority level transmitted by the<br />

modem (can be useful for those applications with hard settings in latency but not in PLR) (priority levels:<br />

prio = 0 … 7). The ACK policy is carried out as follows:<br />

o The highest priority of all the outgoing frames present in the output buffers of the modem is<br />

obtained.<br />

o If the <strong>Layer</strong> 2 ACK protocol is enabled for such a priority, the ACKs will be enabled for all<br />

priorities.<br />

o If the <strong>Layer</strong> 2 ACK protocol is disabled for such a priority, the ACKs will be disabled for all<br />

priorities.<br />

The <strong>Layer</strong> 2 ACK protocol is enabled for all the priorities by default.<br />

11.5.1 Slave Node Parameters (CPE)<br />

• QOS_UPBWLIMIT = [YES | NO]<br />

o Parameter: Enables (YES) or disables (NO) the transmission b<strong>and</strong>width limitation in a slave.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Enables or disables the transmission b<strong>and</strong>width limitation in a slave. Enabled by default. If disabled, the<br />

user will transmit data constantly without restrictions. Every time it receives a resource allocation message<br />

to use the channel, there will be no limit imposed by the slave when transmitting data back to its master.<br />

11.5.2 Master Node Parameters (HE or REPEATER)<br />

• QOS_LATENCY_STEP = [20 … 400]<br />

o Parameter: Values in ms, from 20 to 400.<br />

o SNMP: no<br />

Submission page 303 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o M<strong>and</strong>atory: yes<br />

It configures the minimum latency step for the different slaves when using QoS.<br />

• QOS_BW_POLICY = [0 | 1]<br />

o Parameter: A value of 0 corresponds to Fair mode, <strong>and</strong> 1 to Priority-based mode.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Selects the policy in which the QoS manages the excess of b<strong>and</strong>width: Fair or Priority-based mode.<br />

• QOS_LATENCY.prio+1 = [1 | 2 | 4 | 8]<br />

o Parameter: Priority levels: prio = 0 … 7. Possible values are: 1, 2, 4 <strong>and</strong> 8.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This list configures the latency for each priority level in QOS_LATENCY_STEP units (priority levels: prio<br />

= 0 … 7).<br />

11.6 PROFILES PARAMETERS<br />

A profile is set of configurable parameters that are saved as a whole. A number is assigned to each profile, <strong>and</strong><br />

when a modem is assigned one profile, it will use all the parameters that are saved in this profile.<br />

To define a profile all parameters must be set up, even if not working with VLANs. In this case, the values are<br />

not used <strong>and</strong> can be 1 for instance.<br />

• PROFILE_MAX_TXPUT_TX.i = N (in kbps)<br />

o Parameter: Number (32 bits size) of kbps<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Maximum transmission throughput (from the slave point of view: upstream) for users with profile i. A<br />

modem that uses the profile ‘i’ will have a transmission throughput limited to this value.<br />

Submission page 304 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• PROFILE_MAX_TXPUT_RX.i N (in kbps)<br />

M<strong>and</strong>atory: yes<br />

o Parameter: Number (32 bits size) of kbps<br />

o SNMP: no<br />

Maximum reception throughput (from the EU point of view: downstream) for users with profile i. A modem that<br />

uses the profile ‘i’ will have the reception throughput limited to this value.<br />

• PROFILE_UPBWLIMIT.i = [YES|NO]<br />

o Parameter: ‘yes’ (to limit the upstream) or ‘no’ (to not limit the upstream)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

In a Master or a TD Repeater, this parameter is used to limit the upstream (slave’s transmission) for users<br />

with profile i. This parameter is set to ‘yes’ by default.<br />

If set to ‘no’, the user will receive resource allocation messages constantly. Every time the master node has<br />

transmitted all required resource allocation messages to all the slaves with limit up b<strong>and</strong>width enabled, then<br />

it will transmit resource allocation messages to the slaves without up b<strong>and</strong>width limit until the rest of the<br />

slaves can receive resource allocation messages again.<br />

• PROFILE_DWBWLIMIT.i = [YES|NO]<br />

o Parameter: ‘yes’ (to limit the downstream) or ‘no’ (to not limit the downstream)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

In a Master or a TD Repeater, this parameter is used to limit the downstream (slave’s reception) for users<br />

with profile i. This parameter is set to ‘yes’ by default.<br />

If disabled, the master node will never stop transmitting data to that user. Every time the master node has<br />

transmitted all required data to all slaves with down b<strong>and</strong>width limit, then it will transmit data to the slaves<br />

without down b<strong>and</strong>width limit until the rest of slaves can receive again.<br />

• PROFILE_PRIORITIES.i = [0x00-0xFF]<br />

o Parameter: ‘0xXX’ (hexadecimal number from 00 to FF) each bit represents a priority, that can be<br />

set (1) or not (0).i.e. 0x85 priorities 7, 2 <strong>and</strong> 0 are allowed.<br />

Submission page 305 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This parameter indicates the priorities allowed for a user of profile i. This is useful to prioritise some<br />

transmission above others <strong>and</strong> to give some quality of service to the different modems.<br />

At this parameter each bit represents a priority, that can be set or not. The default value is 0x85, so<br />

priorities 7, 2 <strong>and</strong> 0 are allowed. To include another priority, it is necessary to set the appropriate bit in the<br />

profile priorities flag. In any case, the maximum <strong>and</strong> minimum priorities are always set even if they are not<br />

configured (0x81).<br />

• PROFILE_MNMT_VLAN.i = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

If VLANs are used, this value indicates the management VLAN for that user.<br />

• PROFILE_DATA_VLAN.i = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

If VLANs are used, this value indicates the Data VLAN for that user.<br />

• PROFILE_VOIP_VLAN.i = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

If VLANs are used, this valued indicates the VoIP VLAN for that user.<br />

• PROFILE_VLAN_ADD_TAG.i.j = [2-4093] or parametric<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Submission page 306 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

With this parameter a filter list is created. The list can be ‘allowed’ or ‘forbidden’. A user that uses the<br />

profile ‘i’ will add the filter list as allowed or forbidden.<br />

This parameter is of table type, with up to 16 VLAN in the filter list. When the list is ‘allowed’, these tags<br />

are added to the base configuration. Otherwise, if the list is changed to forbidden, the base tags are removed<br />

<strong>and</strong> only the tags defined here are included, for security reasons.<br />

• PROFILE_VLAN_IS_ALLOWED_IFACE_USER.i = [yes/no]<br />

M<strong>and</strong>atory: no<br />

o Parameter: ‘yes’ (to set the list as allowed) or ‘no’ (to set the list as forbidden)<br />

o SNMP: no<br />

This parameter is the complementary of the previous one <strong>and</strong> indicates if the tags on the list are allowed or<br />

forbidden for the user with the profile i. When the list is ‘allowed’ (setting ‘yes’ as value of the parameter) the tags<br />

are additive to the base configuration, when the list is ‘forbidden’ (setting ‘no’ as value of the parameter), the list is<br />

reseted <strong>and</strong> only tags defined with PROFILE_VLAN_ADD_TAG will be in the list.<br />

• PROFILE_VLAN_TAGGED_ONLY_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to drop input packets without VLAN tag) or ‘no’ (to not drop input packets<br />

without VLAN tag)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter indicates whether or not to drop input packets without a VLAN tag from the user with<br />

profile i (PL interface).<br />

• PROFILE_VLAN_OUTFORMAT_TAG_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to send packets with VLAN tag) or ‘no’ (to not send packets with VLAN tag)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter indicates whether or not to send packets with a VLAN tag to the user interface with this<br />

profile.<br />

• PROFILE_OVLAN_ADD_TAG.i.j = [2-4094] or parametric<br />

o Parameter: Number from 2 to 4094 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

o SNMP: no<br />

Submission page 307 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o M<strong>and</strong>atory: yes<br />

With this parameter a filter list is created. The list can be ‘allowed’ or ‘forbidden’. A user that uses the<br />

profile ‘i’ will add the filter list as allowed or forbidden.<br />

This parameter is of table type, with up to 16 OVLAN in the filter list. When the list is ‘allowed’, these tags<br />

are added to the base configuration. Otherwise, if the list is changed to forbidden, the base tags are removed<br />

<strong>and</strong> only the tags defined here are included, for security reasons.<br />

• PROFILE_OVLAN_IS_ALLOWED_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to mark the list as allowed) or ‘no’ (to mark the list as forbidden)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter is the complementary of the previous one <strong>and</strong> indicates if the tags on the list are allowed or<br />

forbidden for the user with the profile i. When the list is ‘allowed’ (setting ‘yes’ as value of the parameter)<br />

the tags are additive to the base configuration, when the list is ‘forbidden’ (setting ‘no’ as value of the<br />

parameter), the list is reset <strong>and</strong> only tags defined with PROFILE_OVLAN_ADD_TAG will be in the list.<br />

• PROFILE_OVLAN_TAGGED_ONLY_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to drop input packets without OVLAN tag) or ‘no’ (to not drop input packets<br />

without OVLAN tag)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter indicates whether or not to drop input packets without a OVLAN tag from the user with<br />

profile i (PL interface).<br />

• PROFILE_OVLAN_OUTFORMAT_TAG_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to send packets with OVLAN tag) or ‘no’ (to not send packets with OVLAN<br />

tag)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter indicates whether or not to send packets with a VLAN tag to the user interface with this<br />

profile.<br />

Submission page 308 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

11.7 TRANSLATION TABLE PARAMETERS<br />

The translation table contains information about the VLAN/OVLANs used for all nodes hanging from HV/MV<br />

equipment. This table is necessary because the autoconfiguration file of equipment is a parametric file, that is,<br />

there are several symbolic values that should be translated into concrete values.<br />

• TRANSLATION_MNMT_VLAN = [2-4093]<br />

o Parameter: Number from 2 to 4093<br />

o SNMP: none<br />

o M<strong>and</strong>atory: yes<br />

Tag number of the Management VLAN. This parameter is m<strong>and</strong>atory when using VLANs in the network.<br />

• TRANSLATION_DATA_VLAN.i = [2-4093]<br />

o Parameter: Number from 2 to 4093<br />

o SNMP: none<br />

o M<strong>and</strong>atory: yes<br />

Tag number of the Data i-operator VLAN (i=1, 2, 3…). Up to 16 different tags can be set.<br />

• TRANSLATION_VOIP_VLAN.i = [2-4093]<br />

o Parameter: Number from 2 to 4093<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

Tag number of the VOIP i-operator VLAN (I=1,2,3,…) Up to 16 different tags can be set.<br />

• TRANSLATION_ROOTPATH_OVLAN = [2-4094]<br />

o Parameter: Number from 2 to 4094<br />

o SNMP: none<br />

o M<strong>and</strong>atory: yes<br />

Tag number of the default OVLAN. This parameter is m<strong>and</strong>atory when using OVLANs in the network.<br />

Submission page 309 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

11.8 <strong>MAC</strong> FILTER PARAMETERS<br />

• <strong>MAC</strong>_INGRESS_FILTERING_ENABLE = [YES | NO]<br />

o Parameter: Enables (YES) or disables (NO) <strong>MAC</strong> ingress filtering in Ethernet interfaces.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Enables or disables <strong>MAC</strong> ingress filtering in Ethernet interfaces (EXTA <strong>and</strong> EXTB). If enabled, only the<br />

incoming frames whose source <strong>MAC</strong> address is contained in the allowed <strong>MAC</strong> list will be processed by the<br />

bridge. If disabled, any <strong>MAC</strong> incoming frame will be processed, regardless its source address.<br />

• <strong>MAC</strong>_INGRESS_FILTERING_MAX_ALLOWED = [1 … 4]<br />

o Parameter: Values from 1 to 4 are possible.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the maximum number of <strong>MAC</strong> addresses contained in the allowed <strong>MAC</strong> list for <strong>MAC</strong> ingress<br />

filtering.<br />

• <strong>MAC</strong>_INGRESS_FILTERING_MODE = [FIXED | AUTO]<br />

o Parameter: Two possible values: FIXED or AUTO. If FIXED is selected, the allowed <strong>MAC</strong> list<br />

must be filled entering each <strong>MAC</strong> address manually. If AUTO is selected, the allowed <strong>MAC</strong> list is<br />

automatically filled with any new source <strong>MAC</strong> address learnt by the bridge.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Selects one of the following <strong>MAC</strong> ingress-filtering modes:<br />

o Fixed. In this case, the allowed <strong>MAC</strong> list must be filled entering each <strong>MAC</strong> address manually.<br />

o Automatic. In this case, the allowed <strong>MAC</strong> list is automatically filled with any new source <strong>MAC</strong><br />

address learnt by the bridge. Until the list is not full, the filtering is not actually performed. Once<br />

the list is full, the filtering is enabled <strong>and</strong> any frame with source <strong>MAC</strong> address not contained in the<br />

list will be discarded.<br />

In both modes, the own <strong>MAC</strong> address is never filtered, i.e. it is implicitly contained in the allowed <strong>MAC</strong><br />

list, although not taken into account when computing the number of allowed addresses.<br />

• <strong>MAC</strong>_INGRESS_FILTERING_FIXED_<strong>MAC</strong>.i 0xXXXXXXXXXXXX<br />

Submission page 310 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: The value must be specified with 12 hexadecimal digits.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures i-<strong>MAC</strong> address of the allowed <strong>MAC</strong> list for <strong>MAC</strong> ingress filtering when fixed <strong>MAC</strong> ingressfiltering<br />

mode is selected (i = 1 … 4).<br />

11.9 NTP PARAMETERS<br />

For complete information about NTP (Network Time Protocol) please refer to RFC 958.<br />

• NTP_ENABLE = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) the NTP feature.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Enables or disables the NTP feature.<br />

• NTP_SERVER_IP = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the NTP server IP address.<br />

• NTP_TIMEZONE = [-12 … 12] * 60<br />

o Parameter: This value must be specified in minutes (in 60-minute steps) relative to Universal<br />

Time (UT). A value of 0 corresponds to UT.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the timezone for the NTP clock server. This value is relative to Universal Time (UT), also known as<br />

Greenwich Mean Time (GMT).<br />

• NTP_DST = [YES | NO]<br />

Submission page 311 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: If the value is YES, the time correction for daylight savings time is applied. Not<br />

applied if NO.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

If this parameter is enabled, the time correction for daylight savings time is applied. Not applied if disabled.<br />

11.10 SNMP PARAMETERS<br />

For complete information about SNMP (Simple Network Management Protocol) please refer to RFC 1157.<br />

• SNMP_TRAP_IP_ADDRESS = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Configures the IP address to which traps are sent when produced.<br />

• SNMP_TRAP_COMMUNITY_NAME = community<br />

o Parameter: This parameter is a string (up to 25 characters) (e.g.<br />

“SNMP_TRAP_COMMUNITY_NAME = public”).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

It configures the trap community access.<br />

11.11 STP PARAMETERS<br />

For complete information about STP (Spanning Tree Protocol) <strong>and</strong> RSTP (Rapid STP) please refer to IEEE 802.1d<br />

<strong>and</strong> IEEE 802.1w st<strong>and</strong>ards, respectively.<br />

• STP_PRIO = [0 … 65535]<br />

o Parameter: Valid values range from 0 to 65535.<br />

o SNMP: no<br />

Submission page 312 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o M<strong>and</strong>atory: no<br />

Configures the 2-byte field which, added to the <strong>MAC</strong> address, is used by the STP st<strong>and</strong>ard to decide the<br />

root path (Bridge Identifier Priority, part of BridgeIdentifier, in IEEE 802.1d). The default values,<br />

depending on the node features, are the following (in hexadecimal):<br />

o 0x9010: MV MASTER<br />

o 0x9010: MV MASTER<br />

o 0x9020: MV TDREPEATER<br />

o 0x9030: LV MASTER<br />

o 0x9040: LV TDREPEATER<br />

o 0x9050: LV CPE<br />

• STP_PORT.i = [EXTA | EXTB | BPL]<br />

o Parameter: Three possible values: EXTA, EXTB <strong>and</strong> BPL (i = 1,2 or 3).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This list configures the type of port to be used in association with STP_PORT_PRIO.i <strong>and</strong><br />

STP_PORT_COST.i parameters. (i = 1 … 3). All these parameters are lists, whose elements are associated<br />

by the same i-index. Ethernet interfaces A <strong>and</strong> B, <strong>and</strong> the BPL ports can be selected. In case of BPL, all<br />

ports will be h<strong>and</strong>led as an aggregate, i.e. the priority <strong>and</strong> cost will be the same for all BPL ports.<br />

• STP_PORT_PRIO.i = [0 … 255]<br />

o Parameter: Valid values range from 0 to 255 (i = 1,2 or 3).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This list configures the priority assigned to each port, needed if their costs are equal (i = 1 … 3). The default<br />

value for all ports is 80.<br />

• STP_PORT_COST.i = [0 … 4294967295]<br />

o Parameter: Valid values range from 0 to 4294967295 (i = 1,2 or 3).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Submission page 313 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

This list configures the cost associated with each port (PortPathCost in IEEE 802.1d) (i = 1 … 3). The<br />

default values, depending on the port type, are the following:<br />

o 2000000: Ethernet interface A (EXTA)<br />

o 2000000: Ethernet interface B (EXTB)<br />

o 4000000: BPL ports<br />

• STP_HELLO_TIME = [10 … 40]<br />

o Parameter: Valid values range from 10 to 40.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Hello time expressed in decisecs (HelloTime in IEEE 802.1d). The default value is 20 decisecs.<br />

• STP_MAX_AGE = [10 … 40]<br />

o Parameter: Valid values range from 10 to 40.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Maximum age time expressed in decisecs (MaxAge in IEEE 802.1d). The default value is 200 decisecs.<br />

• STP_FORWARD_DELAY = [40 … 300]<br />

o Parameter: Valid values range from 40 to 300.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Forward delay time expressed in decisecs (forwardDelay in IEEE 802.1d). The default value is 150<br />

decisecs.<br />

• STP_FRONTIER = [EXTA | EXTB | NONE]<br />

o Parameter: Valid values are: EXTA (Ethernet interface A), EXTB (Ethernet interface B) <strong>and</strong><br />

NONE (Spanning Tree Frontier disabled).<br />

o SNMP: plStpFrontier<br />

o M<strong>and</strong>atory: no<br />

Submission page 314 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Selects the interface where Spanning Tree Frontier is enabled or disables it. This feature drops all the STP<br />

messages on an external (Ethernet) interface.<br />

• STP_MODE = [STP | RSTP]<br />

o Parameter: Possible values: STP selects STP or RSTP selects RSTP.<br />

o SNMP: plStpProtocolVersion<br />

o M<strong>and</strong>atory: yes<br />

Selects STP protocol version, either STP (version < 2, IEEE 802.1d) or RSTP (version ≥ 2, IEEE 802.1w)<br />

(rstpVersion <strong>and</strong> stpVersion in IEEE 802.1d). The RSTP version is compatible with STP on a per-port<br />

basis.<br />

11.12 VOIP PARAMETERS<br />

For complete information about VoIP protocols please refer to ITU H.323, RFC 3261 (SIP) <strong>and</strong> RFC 2705 (MGCP)<br />

st<strong>and</strong>ards.<br />

• VOIP_ENABLE = [ENABLED | DISABLED]<br />

o Parameter: This parameter enables (ENABLED) or disables (DISABLED) the VoIP service.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter enables or disables the VoIP service.<br />

• VOIP_GATEKEEPERIP = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

IP address of the H.323 gatekeeper.<br />

• VOIP_LINE1NUMBER = number<br />

o Parameter: This parameter is a string (maximum string length is 20 characters) (e.g.<br />

“VOIP_LINE1NUMBER = 612345678”).<br />

o SNMP: no<br />

Submission page 315 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o M<strong>and</strong>atory: no<br />

Configures the telephone number for H.323.<br />

• VOIP_DIALPLAN = ([0 … 9, ‘T’, ‘X’, ‘.’, ‘|’])<br />

o Parameter: This parameter is a string with maximum length is 200 characters (e.g.<br />

“VOIP_DIALPLAN = (9XXXXXXXX|6XXXXXXXX|00X.T)”.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the dial plan matching string for H.323. Please see section 11.12.1 for details.<br />

• VOIP_INBANDDTMF = [ENABLED | DISABLED]<br />

o Parameter: This parameter enables (ENABLED) or disables (DISABLED) in-b<strong>and</strong> DTMF feature.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter enables or disables in-b<strong>and</strong> DTMF feature.<br />

• VOIP_OUTOFBANDDTMF = [ENABLED | DISABLED]<br />

o Parameter: This parameter enables (ENABLED) or disables (DISABLED) out-of-b<strong>and</strong> DTMF<br />

feature.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter enables or disables out-of-b<strong>and</strong> DTMF feature.<br />

• VOIP_KEYPADTYPE = [KEYPADTYPE_NONE | KEYPADTYPE_H225 |<br />

KEYPADTYPE_H245ALPHANUMERIC | KEYPADTYPE_H245SIGNAL |<br />

KEYPADTYPE_RFC2833]<br />

o Parameter: This parameter is a string (up to 30 characters). Valid values are the following:<br />

o KEYPADTYPE_H225: H.225/Q.931 User Info field (Keypad facility information element)<br />

o KEYPADTYPE_H245ALPHANUMERIC: H.245 User Input Indication (UII) Alphanumeric<br />

message<br />

o KEYPADTYPE_H245SIGNAL: H.245 User Input Indication (UII) Signal Type message<br />

o KEYPADTYPE_RFC2833: RTP stream as defined in RFC 2833<br />

Submission page 316 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o SNMP: no<br />

o KEYPADTYPE_NONE: no out-of-b<strong>and</strong> signalling<br />

o M<strong>and</strong>atory: no<br />

Configures the different 'keypad types' defined by H.323 in order to codify the out-of-b<strong>and</strong> DTMF<br />

signaling.<br />

• VOIP_CALLSIGPORT1 = [1025 … 65530]<br />

o Parameter: Valid values range from 1025 to 65530.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the modem signaling port for H.323.<br />

• VOIP_G711USS = [YES | NO]<br />

o Parameter: Selects whether silence suppression for G.711 μ-law is enabled (YES) or not (NO).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

It selects whether silence suppression for G.711 μ-law is enabled or not.<br />

• VOIP_G711UPACK = [2 … 4]<br />

o Parameter: Valid values range from 2 (20 ms) to 4 (40 ms).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the specific packet size in 10-ms units for G.711 μ-law.<br />

• VOIP_G711ASS = [YES | NO]<br />

o Parameter: Selects whether silence suppression for G.711 A-law is enabled (YES) or not (NO).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Selects whether silence suppression for G.711 A-law is enabled or not.<br />

Submission page 317 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• VOIP_G711APACK = [2 … 4]<br />

o Parameter: Valid values range from 2 (20 ms) to 4 (40 ms).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the specific packet size in 10-ms units for G.711 A-law.<br />

• VOIP_JB_TYPE = [FIXED | ADAPTIVE]<br />

o Parameter: Selects either adaptive (ADAPTIVE) or fixed (FIXED) jitter buffer.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Selects either adaptive or fixed jitter buffer.<br />

• VOIP_FJB_DELAY = [1 … 10] * 10<br />

o Parameter: Valid values range from 10 to 100 ms.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the fixed jitter buffer delay in ms.<br />

• VOIP_AJB_MAXDELAY = [1 … 19] * 10<br />

o Parameter: Valid values range from 10 to 190 ms.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the adaptive jitter buffer maximum delay in ms.<br />

• VOIP_G729ON = [YES | NO]<br />

o Parameter: Selects whether G.729 codec is enabled (YES) or not (NO).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Selects whether G.729 codec is enabled or not.<br />

Submission page 318 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• VOIP_G729SS = [YES | NO]<br />

o Parameter: Selects whether G.729 silence enabled is supported (YES) or not (NO).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Selects whether silence suppression for G.729 is enabled or not.<br />

• VOIP_G729PACK = [2 … 4]<br />

o Parameter: Valid values range from 2 (20 ms) to 4 (40 ms).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the specific packet size in 10-ms units for G.729.<br />

• VOIP_ALTERNATEGK = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) alternate gatekeeper feature for H.323.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Enables or disables alternate gatekeeper feature for H.323.<br />

• VOIP_ALTGKIP = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

IP address of the H.323 alternative gatekeeper.<br />

• VOIP_GKDISCOVERY = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) gatekeeper discovery feature for H.323.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Submission page 319 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Enables or disables gatekeeper discovery feature for H.323.<br />

• VOIP_FULLRRQ1 = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) full gatekeeper registration request for<br />

H.323.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Enables or disables full gatekeeper registration request for H.323.<br />

• VOIP_TIMETOLIVE = [≥ 60]<br />

o Parameter: The minimum valid value is 60 seconds.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Value in seconds for the H.323 time-to-live parameter (time after which the registration with the gatekeeper<br />

shall expire). This parameter is related to the time between two consecutive registration requests to the<br />

gatekeeper. Using a value greater than 1200 is recommended in order not to interfere with the polling<br />

feature.<br />

• VOIP_FASTCONNECT = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) fast connect signalling feature for<br />

H.323.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Enables or disables fast connect signalling feature for H.323.<br />

• VOIP_H245TUNNEL = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) H.245 tunnelling signalling feature for<br />

H.323.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Enables or disables H.245 tunnelling signalling feature for H.323.<br />

• VOIP_COUNTRY = [XX | ES | PT | GB | JP | FR | SG | RU | AU]<br />

Submission page 320 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: This parameter is a string (up to 20 characters). Valid values are: The USA (XX), Spain<br />

(ES), Portugal (PT), The United Kingdom (GB), Japan (JP), France (FR), Singapore (SG), Russia<br />

(RU) <strong>and</strong> Australia (AU). The default country is Spain (ES).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures telephony tones (dial, network busy, busy <strong>and</strong> ring-back tones) <strong>and</strong> phone line (physical) parameters<br />

(line impedance, ring waveform <strong>and</strong> line feed voltage) for the specified country. The default country is Spain.<br />

Please see section 11.12.2 for details.<br />

The following four parameters are provided to be able to configure tones for countries that are not available through<br />

the VOIP_COUNTRY parameter. If the country is available, there is no need to use these parameters. In any case,<br />

these parameters overwrite the VOIP_COUNTRY settings.<br />

• VOIP_TONE_DIALTONE = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />

o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_DIALTONE =<br />

425@-10#ON”).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Dial tone configuration pattern. Please see section 11.12.3 for details.<br />

• VOIP_TONE_NETWORKBUSY = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />

o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_BUSY = 425@-<br />

10#ON(200),OFF(200),R”).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Network busy tone configuration pattern. Please see section11.12.3 for details.<br />

• VOIP_TONE_BUSY = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />

o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_BUSY = 425@-<br />

10#ON(200),OFF(200),R”).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Submission page 321 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Busy tone configuration pattern. Please see section 11.12.3 for details.<br />

• VOIP_TONE_RINGBACK = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />

o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_RINGBACK =<br />

425@-10#ON(1500),OFF(3000),R”).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Ring-back tone configuration pattern. Please see section 11.12.3 for details.<br />

• VOIP_RTP_TOS = 0xXX<br />

o Parameter: value must be specified with 2 hexadecimal digits.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the 8-bit bitmap of the type of service field in the IP header of the RTP packets.<br />

• VOIP_CALLSIG_TOS 0xXX<br />

o Parameter: value must be specified with 2 hexadecimal digits.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the 8-bit bitmap of the type of service field in the IP header of the VoIP signalling packets for<br />

H.323.<br />

11.12.1 Dial Plan Configuration<br />

A dial plan gives the unit a map to determine when a complete number has been entered <strong>and</strong> should be passed to the<br />

gatekeeper for resolution into an IP address. Dial plans are expressed using the same syntax used by MGCP NCS<br />

specification.<br />

The dialled numbers that do not match the specified dial plan do not initiate an outgoing call from the VoIP modem.<br />

The formal syntax of the dial plan is described using the following notation:<br />

Digit ::= "0" | "1" | "2" | "3" | "4" | "5" | "6" | "7" | "8" | "9"<br />

Submission page 322 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Timer ::= "T" | "t"<br />

Letter ::= Digit | Timer | "#" | "*" | "A" | "a" | "B" | "b" | "C" | "c" | "D" | "d"<br />

Range ::= "X" | "x" -- matches any digit<br />

| "[" Letters "]" -- matches any of the specified letters<br />

Letters ::= Subrange | Subrange Letters<br />

Subrange ::= Letter -- matches the specified letter<br />

| Digit "-" Digit -- matches any digit between first <strong>and</strong> last<br />

Position ::= Letter | Range<br />

StringElement ::= Position -- matches any occurrence of the position<br />

| Position "." -- matches an arbitrary number of occurrences including 0<br />

String ::= StringElement | StringElement String<br />

StringList ::= String | String "|" StringList<br />

DialPlan ::= "(" StringList ")"<br />

A dial plan, according to this syntax, is defined either by a string (not case-sensitive) or by a list of strings.<br />

Regardless of the above syntax a timer is only allowed if it appears in the last position in a string (12T3 is not<br />

valid). Each string is an alternate numbering scheme. The unit will process the dial plan by comparing the current<br />

dial string against the dial plan. If the result is under-qualified (partially matches at least one entry) then it will do<br />

nothing further; if the result matches or is overqualified (no further digits could possibly produce a match) then it<br />

sends the string to the gatekeeper <strong>and</strong> clears the dial string.<br />

The timer T is activated when it is all that is required to produce a match. The period of timer T is 4 seconds. For<br />

example, a dial plan of (xxxT|xxxxx) will match immediately if 5 digits are entered <strong>and</strong> it will also match after a 4<br />

second pause when 3 digits are entered.<br />

Submission page 323 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

11.12.2 Country Specific Parameters<br />

These are the country-specific parameters configured from “VOIP_COUNTRY”. Some of them (tone-related<br />

parameters) can be latter overwritten (thanks to VOIP_TONE_DIALTONE, VOIP_TONE_RINGBACK,<br />

VOIP_TONE_BUSY <strong>and</strong> VOIP_TONE_NETWORKBUSY). The others (line feed voltage, ring signal waveform<br />

<strong>and</strong> line impedance) can’t be changed.<br />

Default parameters:<br />

These are the ones being used for any country not specified in the list below (they are USA parameters):<br />

DIALTONE = 350@-13+440@-13#ON(300),OFF(0),R<br />

RINGBACK = 440@-13+480@-19#2000(ON),4000(OFF),R<br />

BUSY = 480@-24+620@-24#500(ON),500(OFF),R<br />

NETWORKBUSY = 480@-24+620@-24#250(ON),250(OFF),R<br />

LINE FEED VOLTAGE = 48 V DC<br />

RING SIGNAL = 48 V DC + 35 Vrms AC # 2000(ON),4000(OFF),R<br />

LINE IMPEDANCE = 600 ohm<br />

Countries:<br />

NOTE: If some country does not specify all of the possible parameters that is because these parameters get the<br />

“default” value shown above.<br />

SPAIN:<br />

DIALTONE = 425@-10#ON(3000),OFF(0),R<br />

NETWORKBUSY = 425@-10#ON(200),OFF(200),R<br />

BUSY = 425@-10#ON(200),OFF(200),R<br />

Submission page 324 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

RINGBACK = 425@-10#ON(1500),OFF(3000),R<br />

PORTUGAL:<br />

UK:<br />

DIALTONE = 425@-10#ON(3000),OFF(0),R<br />

NETWORKBUSY = 425@-10#ON(200),OFF(200),R<br />

BUSY = 425@-10#ON(200),OFF(200),R<br />

RINGBACK = 425@-10#ON(1000),OFF(5000),R<br />

RING SIGNAL = 48 V DC + 35 Vrms AC # 1000(ON),5000(OFF),R<br />

DIALTONE = 350@-18+440@-18#ON(3000),OFF(0),R<br />

NETWORKBUSY = 400@-14#ON(400),OFF(400),R<br />

BUSY = 400@-14#ON(400),OFF(400),R<br />

RINGBACK = 400@-15+450@-15#ON(400),OFF(200),ON(400),OFF(2000),R<br />

JAPAN:<br />

DIALTONE = 400@-15#ON(3000),OFF(0),R<br />

NETWORKBUSY = 400@-5#ON(500),OFF(500),R<br />

BUSY = 400@-5#ON(500),OFF(500),R<br />

RINGBACK = 400@-10#ON(1000),OFF(2000),R<br />

FRANCE:<br />

Submission page 325 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

DIALTONE = 440@-13#ON(3000),OFF(0),R<br />

NETWORKBUSY = 440@-13#ON(500),OFF(500),R<br />

BUSY = 440@-13#ON(500),OFF(500),R<br />

RINGBACK = 440@-13#ON(1500),OFF(3500),R<br />

SINGAPORE:<br />

DIALTONE = 425@-15#ON(3000),OFF(0),R<br />

NETWORKBUSY = 425@-10#ON(750),OFF(750),R<br />

BUSY = 425@-10#ON(750),OFF(750),R<br />

RINGBACK = 425@-10#ON(400),OFF(200),R<br />

RUSSIA:<br />

DIALTONE = 425@-10#ON(400),OFF(400),R<br />

RINGBACK = 425@-10#ON(800),OFF(3200),R<br />

AUSTRALIA:<br />

DIALTONE = 425@-10#ON(3000),OFF(0),R<br />

NETWORKBUSY = 425@-10#ON(200),OFF(200),R<br />

BUSY = 425@-10#ON(400),OFF(400),R<br />

RINGBACK = 425@-10#ON(400),OFF(200),ON(400),OFF(2000),R<br />

LINE IMPEDANCE = 220 ohm + 820 ohm || 120 nF<br />

Submission page 326 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

11.12.3 Tone pattern configuration<br />

The different available tones can be configured using the following ring cadence pattern:<br />

freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R. Only the following frequencies (in Hz) are possible:<br />

350, 400, 425, 440, 480, 572, 620, 682, 697, 770, 852, 941, 1209, 1336, 1400, 1477, 1633, 2060, 2130, 2450, 2750<br />

<strong>and</strong> 2600. An example will help to explain this string:<br />

950@-25+420@-10#ON(330),OFF(30),IDLE(1000),R:<br />

This will create the following tone:<br />

• The tone will be the addition of two frequencies: 950Hz with a power of –25dBm plus 420Hz with a power of –<br />

10dBm<br />

• It will be ON during 330 msecs.<br />

• Then it will be OFF during 30 msecs.<br />

• And then it will be IDLE for 1000 msecs. This IDLE number it is not m<strong>and</strong>atory in the string.<br />

• R means that the sequence ON, OFF, IDLE will be repeated continuously.<br />

To configure a continuous tone of 1400Hz <strong>and</strong> –10dBm, the following string should be used:<br />

• 1400@-10#ON(3000),OFF(0),R<br />

Therefore, the m<strong>and</strong>atory symbols are:<br />

• @ to separate frequency <strong>and</strong> power.<br />

• # to separate the tone frequency <strong>and</strong> power from the sound cadence.<br />

• , to separate the ON(xx), OFF(xx) <strong>and</strong> IDLE(xx) parameters.<br />

Besides, the tone may be an addition of two different frequencies <strong>and</strong> powers using the + symbol.<br />

11.13 VLAN NETWORK<br />

• VLAN_ENABLE = [yes|no]<br />

o Parameter: ‘yes’ (to enable VLAN use) or ‘no’ (to disable VLAN use)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Submission page 327 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

This autoconfiguration parameter enables or disables the use of VLAN. Normally this parameter is not<br />

needed because the modem itself discovers the use of VLAN, but it is necessary in case of booting from<br />

local settings.<br />

• VLAN_MNMT_TAG = [2-4093] | %<br />

o Parameter: Number from 2 to 4093) or ‘%Parameter_name’ (parametric value preceded by a %)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This parameter indicates the management VLAN_ID (VID) of high-level management protocols (Telnet,<br />

Ping, …). Often a parametric value is used, <strong>and</strong> so the appropriate parameter will be taken from the<br />

translation table (for example, writing ‘$VLAN_DATA_2’).<br />

• VLAN_MNMT_PRIO = [0-7]<br />

o Parameter: Number from 0 to 7.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This autoconfiguration parameter sets the VLAN priority for the high-level management (Telnet, Ping, …)<br />

packets.<br />

• VLAN_DATA_TAG = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This parameter is used at the EU nodes. It configures the VLAN_ID (VID) for the data packets (packets<br />

coming from the external interfaces). The value set can be a value (from 2 to 4093) or a parametric value. In<br />

this last case, the adequate value will be taken from the translation table.<br />

• VLAN_DATA_PRIO = [0-6]<br />

o Parameter: Number from 0 to 6.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This parameter is used at the EU nodes. It configures the VLAN priority for the data packets (packets<br />

coming from the external interfaces).<br />

Submission page 328 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• VLAN_VOIP_TAG = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name‘ (parametric value preceded by a %)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter configures the VLAN_ID (VID) for the VoIP packets (packets coming from the external<br />

interfaces). The value set can be a value (from 2 to 4093) or a parametric value. In this last case, the<br />

adequate value will be taken from the translation table.<br />

• VLAN_VOIP_PRIO = [0-7]<br />

o Parameter: Number from 0 to 7<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This autoconfiguration parameter sets the VLAN priority for the VoIP packets.<br />

• VLAN_VSIG_PRIO = [0-7]<br />

o Parameter: Number from 0 to 7<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

It configures the VLAN priority for the VoIP signalling packets.<br />

• VLAN_TRUNK.i = [2-4093]<br />

o Parameter: Number from 2 to 4093)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This parameter is usable at LV <strong>and</strong> MV nodes. It configures a list of VLAN trunks different from the ones<br />

inside the translation table that must be allowed in the node interfaces. It is necessary to configure these<br />

trunks for private VLANs between EUs in all intermediary equipment.<br />

• VLAN_RETAG_EXTA_SRC = [0 | 2-4095]<br />

o Parameter: ‘0’ (in order to disable retagging in interface) number from 2 to 4095.<br />

o SNMP: no<br />

Submission page 329 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o M<strong>and</strong>atory: yes<br />

Autoconfiguration parameter used for VLAN retagging: External (Ethernet) interface A (EXTA) source tag.<br />

With 0, the retagging is disabled in EXTA interface.<br />

• VLAN_RETAG_EXTA_DST = [0 | 2-4095]<br />

o Parameter: ‘0’ (in order to disable retagging in interface) or number from 2 to 4095<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Autoconfiguration parameter used for the VLAN retagging: External (Ethernet) interface A (EXTA)<br />

destination tag. With 0, the retagging is disabled in EXTA interface.<br />

• VLAN_RETAG_EXTB_SRC = [0 | 2-4095]<br />

o Parameter: ‘0’ (in order to disable retagging in interface) or number from 2 to 4095<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Autoconfiguration parameter used for the VLAN retagging: External (Ethernet) interface B (EXTB) source<br />

tag. With 0, the retagging is disabled in EXTB interface.<br />

• VLAN_RETAG_EXTB_DST = [0 | 2-4095]<br />

o Parameter: ‘0’ (in order to disable retagging in interface) or number from 2 to 4095<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Autoconfiguration parameter used for the VLAN retagging: External (Ethernet) interface B (EXTB)<br />

destination tag. With 0, the retagging is disabled in EXTB interface.<br />

11.14 OVLAN PARAMETERS<br />

The OVLAN parameters are used to configure the basic OVLAN configuration, which avoids the visibility between<br />

different customers in the access network. They are similar to the VLAN parameters specified above.<br />

• OVLAN_ENABLE = [yes|no]<br />

o Parameter: ‘yes’ (to enable OVLAN use) or ‘no’ (to disable OVLAN use)<br />

Submission page 330 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o SNMP: none<br />

o M<strong>and</strong>atory: yes<br />

This autoconfiguration parameter enables or disables the use of OVLAN filtering.<br />

• OVLAN_DATA_TAG = [2-4094] | %ROOTPATH_OVLAN<br />

o Parameter: Number from 2 to 4093 or ‘%ROOTPATH_OVLAN’ (use the OVLAN Rootpath<br />

value)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: yes<br />

This parameters specifies of the OVLAN ID assigned to the packets coming from the external interface. It<br />

should be the same as in the translation table to perform the basic OVLAN operation in all equipment<br />

except the one connected to the backbone, which will have the ALL_VLAN tag (4095).<br />

• OVLAN_TRUNK.i = [2-4094]<br />

o Parameter: Number from 2 to 4094<br />

o SNMP: none<br />

o M<strong>and</strong>atory: yes<br />

This parameter is used in LV <strong>and</strong> MV nodes, <strong>and</strong> it configures a list of OVLAN trunks different from the<br />

one inside the translation table that must be allowed in the node interfaces. It is necessary to configure<br />

these trunks for private OVLANs between EUs in all intermediary equipment.<br />

11.15 CUSTOM VLAN/OVLAN PARAMETERS<br />

• USE_CUSTOM_VLAN_OVLAN = [yes/no]<br />

o Parameter: ‘yes’ (to enable the custom VLAN/OVLAN use) or ‘no’ (to disable the custom<br />

VLAN/OVLAN use)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter enables other VLAN/OVLAN parameters. If set to ‘yes’, it will configure the parameters<br />

that are set in the auto-configuration file. The connection will be lost if the new parameters are not properly<br />

configured in the auto-configuration file. It is necessary to specify several parameters with care or no<br />

connection will be possible between the modems.<br />

Submission page 331 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

As a general rule, this configuration overrides the basic VLAN/OVLAN configuration. In order to decrease<br />

the risk of loosing connection, the VLAN/OVLAN filtering follows these rules:<br />

• When the list is allowed, the tags specified here are added to the existing ones. This solution<br />

simplifies the configuration <strong>and</strong> decreases the risk of miss-configuration.<br />

• When the list is forbidden, the lists are reset before inserting the tags specified here, due to the same<br />

reasons.<br />

The VLAN/OVLAN custom configuration must be complemented with the profile parameters referred to the<br />

VLAN/OVLAN, to configure interfaces different from EXTA, EXTB, ROOT <strong>and</strong> OTHERS.<br />

11.15.1 Custom VLAN Parameters<br />

• VLAN_TAGGED_ONLY_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to enable tag only in interface root) or ‘no’ (to disable tag only in interface root)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

If this parameter is set to ‘yes’, the modem will drop packets without a VLAN tag entering the root<br />

interface (IFACE_ROOT).<br />

• VLAN_TAGGED_ONLY_IFACE_EXTA = [yes/no]<br />

o Parameter: ‘yes’ (to enable tag only in Ethernet A) or ‘no’ (to disable tag only in Ethernet A)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

If this parameter is set, the modem will drop packets without a VLAN tag entering external (Ethernet)<br />

interface A.<br />

• VLAN_TAGGED_ONLY_IFACE_EXTB = [yes/no]<br />

o Parameter: ‘yes’ (to enable tag only in Ethernet B) or ‘no’ (to disable tag only in Ethernet B)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

It this parameter is set, the modem will drop packets without a VLAN tag entering external (Ethernet) interface B.<br />

• VLAN_TAGGED_ONLY_IFACE_PL_X= [yes/no]<br />

Being X = 0 to 127 (BPL port)<br />

Submission page 332 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: ‘yes’ (to enable tag only in BPL port X) or ‘no’ (to disable tag only in BPL port X)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

If this parameter is set, the modem will drop packets without a VLAN tag entering BPL interfaces (PL_X).<br />

• VLAN_OUTFORMAT_TAG_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to tag output in root interface) or ‘no’ (to disable tag output in root interface)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

It this parameter is set, the modem will introduce a VLAN tag when sending packets to the root interface<br />

(IFACE_ROOT).<br />

• VLAN_OUTFORMAT_TAG_IFACE_EXTA = [yes/no]<br />

o Parameter: ‘yes’ (to tag output in Ethernet A) or ‘no’ (to disable tag output in Ethernet A)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

It this parameter is set, the modem will introduce a VLAN tag when sending packets to the external (Ethernet)<br />

interface A.<br />

• VLAN_OUTFORMAT_TAG_IFACE_EXTB = [yes/no]<br />

o Parameter: ‘yes’ (to tag output in Ethernet B) or ‘no’ (to disable tag output in Ethernet B)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

It this parameter is set, the modem will introduce a VLAN tag when sending packets to external (Ethernet) interface<br />

B.<br />

• VLAN_OUTFORMAT_TAG_IFACE_PL_X = [yes/no]<br />

Being X = 0 to 127 (BPL port)<br />

o Parameter: ‘yes’ (to tag output in BPL port X) or ‘no’ (to disable tag output in BPL port X)<br />

o SNMP: none<br />

Submission page 333 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o M<strong>and</strong>atory: no<br />

It this parameter is set, the modem will introduce a VLAN tag when sending packets to BPL port (PL_X).<br />

• VLAN_PVID_PL_X = [2-4095]<br />

Being X = 0 to 127 (BPL port)<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This autoconfiguration parameter specifies the 802.1Q VLAN tag for tagging untagged packets from the BPL port<br />

(PL_X).<br />

• VLAN_PVID_EXTA = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This autoconfiguration parameter specifies the 802.1Q VLAN tag for tagging untagged packets from the external<br />

interface A (EXTA).<br />

• VLAN_PVID_EXTB = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This autoconfiguration parameter specifies the 802.1Q VLAN tag for tagging untagged packets from the external<br />

interface B (EXTB).<br />

• VLAN_PVID_FW = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This autoconfiguration parameter specifies the 802.1Q VLAN tag for tagging untagged packets from the firmware<br />

interface (FW).<br />

Submission page 334 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• VLAN_DEFAULT_PRIO_PL_X = [0-7]<br />

Being X = 0 to 127 (BPL port)<br />

o Parameter: Number from 0 to 7<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter configures the 802.1p priority for tagging untagged packets from the BPL interface (PL_X).<br />

• VLAN_DEFAULT_PRIO_EXTA = [0-7]<br />

o Parameter: Number from 0 to 7<br />

o SNMP: none<br />

This parameter configures the 802.1p priority for tagging untagged packets from external (Ethernet) interface A<br />

(EXTA).<br />

• VLAN_DEFAULT_PRIO_EXTB = [0-7]<br />

o Parameter: Number from 0 to 7<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter configures the 802.1p priority for tagging untagged packets from external (Ethernet)<br />

interface B (EXTB).<br />

• VLAN_DEFAULT_PRIO_FW = [0-7]<br />

o Parameter: Number from 0 to 7<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter configures the 802.1p priority for tagging untagged packets from firmware interface (FW).<br />

• VLAN_IS_ALLOWED_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

Submission page 335 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

This parameter characterizes the VLAN list for the root interface. Root interface (IFACE_ROOT) list is allowed tag<br />

if configured as ‘yes’ or forbidden if configured as ‘no’.<br />

• VLAN_LIST_IFACE_ROOT.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter is a list of root interface (IFACE_ROOT) VLAN IDs. Up to 16 values can be configured.<br />

• VLAN_IS_ALLOWED_IFACE_EXTA = [yes/no]<br />

o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter characterizes the VLAN list for the external (Ethernet) interface A. The external (Ethernet) interface<br />

A list contains allowed tags if configured as ‘yes’ or forbidden if configured as ‘no’.<br />

• VLAN_LIST_IFACE_EXTA.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter is a list of VLAN IDs for external (Ethernet) interface A. Up to 16 values can be configured.<br />

• VLAN_IS_ALLOWED_IFACE_EXTB = [yes/no]<br />

o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter characterizes the VLAN list for the external (Ethernet) interface B. The external (Ethernet) interface<br />

B list contains allowed tags if configured as ‘yes’ or forbidden if configured as ‘no’.<br />

• VLAN_LIST_IFACE_EXTB.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

Submission page 336 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter is a list of VLAN IDs for external (Ethernet) interface B. Up to 16 values can be configured.<br />

• VLAN_IS_ALLOWED_IFACE_PL_X = [yes/no]<br />

Being X = 0 to 127 (BPL port)<br />

o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter characterizes the VLAN list for the powelrline interface X. The BPL interface list contains allowed<br />

tags if configured as ‘yes’ or forbidden if configured as ‘no’.<br />

• VLAN_LIST_IFACE_PL_X.i = [2-4095]<br />

Being X = 0 to 127 (BPL port)<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter is a list of VLAN IDs for BPL interface X.<br />

11.15.2 Custom OVLAN Parameters<br />

• OVLAN_TAGGED_ONLY_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to accept only tagged packets at root interface) or ‘no’ (to accept any packet at<br />

root interface)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

If this parameter is set to ‘yes’, the modem will drop packets without a OVLAN tag entering the root interface<br />

(IFACE_ROOT).<br />

Submission page 337 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• OVLAN_TAGGED_ONLY_IFACE_PL_X = [yes/no]<br />

Being X = 0 to 127 (BPL port)<br />

o Parameter: ‘yes’ (to accept only tagged packets at other interfaces) or ‘no’ (to accept any packet at<br />

other interfaces)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

If this parameter is set to ‘yes’, the modem will drop packets without a OVLAN tag entering BPL ports (PL_X).<br />

• OVLAN_OUTFORMAT_TAG_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to introduce a tag in output packets at root interface) or ‘no’ (to not introduce a<br />

tag in output packets at root interface)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

If this parameter is set, the modem will introduce a OVLAN tag when sending packets to the root interface<br />

(IFACE_ROOT).<br />

• OVLAN_OUTFORMAT_TAG_IFACE_PL_X = [yes/no]<br />

Being X = 0 to 127 (BPL port)<br />

o Parameter: ‘yes’ (to introduce a tag in output packets at BPL ports) or ‘no’ (to not introduce a tag<br />

in output packets at BPL ports)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

If this parameter is set, the modem will introduce a OVLAN tag when sending packets to BPL ports (PL_X).<br />

• OVLAN_POVID_PL_X = [2-4095]<br />

Being X = 0 to 127 (BPL port)<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

Submission page 338 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

This autoconfiguration parameter specifies the OVLAN tag for tagging untagged packets from the BPL port X<br />

(PL_X).<br />

• OVLAN_POVID_EXTA = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This autoconfiguration parameter specifies the OVLAN tag for tagging untagged packets from the external interface<br />

A (EXTA).<br />

• OVLAN_POVID_EXTB = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This autoconfiguration parameter specifies the OVLAN tag for tagging untagged packets from the external interface<br />

B (EXTB).<br />

• OVLAN_POVID_FW = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This autoconfiguration parameter specifies the OVLAN tag for tagging untagged packets from the firmware<br />

interface (FW).<br />

• OVLAN_IS_ALLOWED_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to set the root interface list as allowed) or ‘no’ (to set the root interface list as<br />

forbidden)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter characterizes the OVLAN list for the root interface. Root interface (IFACE_ROOT) list is allowed<br />

tag if configured as ‘yes’ or forbidden if configured as ‘no’.<br />

• OVLAN_LIST_IFACE_ROOT.i = [2-4095]<br />

Submission page 339 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter is a list of root interface (IFACE_ROOT) OVLAN tags.<br />

• OVLAN_IS_ALLOWED_IFACE_EXTA = [yes/no]<br />

o Parameter: ‘yes’ (to set the Ethernet A interface list as allowed) or ‘no’ (to set the Ethernet A<br />

interface list as forbidden)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter characterizes the OVLAN list for the external (Ethernet) interface A. The external (Ethernet)<br />

interface A list contains allowed tags if configured as ‘yes’ or forbidden if configured as ‘no’.<br />

• OVLAN_LIST_IFACE_EXTA.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter is a list of OVLAN tags for external (Ethernet) interface A.<br />

• OVLAN_IS_ALLOWED_IFACE_EXTB = [yes/no]<br />

o Parameter: ‘yes’ (to set the Ethernet B interface list as allowed) or ‘no’ (to set the Ethernet B<br />

interface list as forbidden)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter characterizes the OVLAN list for the external (Ethernet) interface B,. The external (Ethernet)<br />

interface B list contains allowed tags if configured as ‘yes’ or forbidden if configured as ‘no’.<br />

• OVLAN_LIST_IFACE_EXTB.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

Submission page 340 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

This parameter is a list of OVLAN tags for external (Ethernet) interface B. Up to 16 values can be configured.<br />

• OVLAN_IS_ALLOWED_IFACE_PL_X = [yes/no]<br />

Being X = 0 to 127 (BPL port)<br />

o Parameter: ‘yes’ (to set the BPL interface list as allowed) or ‘no’ (to set the BPL interface list as<br />

forbidden)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter characterizes the OVLAN list for the BPL Interface X. The list contains allowed tags if configured<br />

as ‘yes’ or forbidden if configured as ‘no’.<br />

• OVLAN_LIST_IFACE_PL_X.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter is a list of OVLAN tags for external BPL interface X.<br />

11.16 ACCESS PROTOCOL PARAMETERS<br />

Parameters for the slave:<br />

• AP_MIN_NUMBER_HOPS = [0|1|…]<br />

o Parameter: Number from 0<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter configures the main criterion for connecting to a master, the minimum number of hops that<br />

the master has to be separated to the backbone. ‘0’ means that it can connect to the master connected to the<br />

backbone (no hop), ‘1’ means that it can connect to masters with one hop to the backbone (TDrepeaters),<br />

<strong>and</strong> so on.<br />

• AP_FORBID_MASTER.i = 0xXXXXXXXXXXXX<br />

Submission page 341 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: ‘0xXXXXXXXXXXXX’ (<strong>MAC</strong> address of forbidden master)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This parameter is a list of the <strong>MAC</strong> addressees of the masters this equipment has to avoid. The equipment<br />

will not connect to a master on this list, even if there are no other masters available.<br />

• AP_PREFER_MASTER = 0xXXXXXXXXXXXX<br />

o Parameter: ‘0xXXXXXXXXXXXX’ (<strong>MAC</strong> address of preferred master)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This parameter specifies a <strong>MAC</strong> address of a master that is preferred by the equipment. If the node can<br />

detect the master with this <strong>MAC</strong> address <strong>and</strong> it is not restricted (it is not forbidden <strong>and</strong> the number of hops<br />

is the adequate), it will try to connect to it regardless of any other parameter. If fails to connect to this prefer<br />

master, it will use the usual algorithm to decide to which master connect.<br />

• AP_FIX_MASTER = ‘0xXXXXXXXXXXXX’<br />

o Parameter: 0xXXXXXXXXXXXX (<strong>MAC</strong> address of fixed master)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This parameter specifies the only one master to which the node can connect. If this <strong>MAC</strong> address is not<br />

detected in the network, the node will not connect to any other one, so this parameter can be dangerous<br />

because if not properly configured can produce slaves unable to connect.<br />

• AP_CHECK_BEST_MASTER_ENABLE = [yes|no]<br />

o Parameter: ‘yes’ (to enable checking of best master periodically after connecting with one) or ‘no’<br />

(to disable the checking of better masters after connecting to one).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Once the node is connected to the network (after choosing <strong>and</strong> being accepted by a master) it is possible to<br />

repeat periodically the search of a better master. This parameter enables or disables the periodical check of<br />

the best master of the access protocol.<br />

• AP_CHECK_BEST_MASTER_PERIOD = <br />

Submission page 342 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: Number of minutes<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter configures how much time has to pass to search for a better master. This process is periodic,<br />

<strong>and</strong> the time is in minutes.<br />

• AP_CURRENT_MASTER_MIN_BPS = <br />

o Parameter: Number of bits per symbol (0-14592)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter is also used in the period search for a better master. The node will only change to a better<br />

master if the number of bits per symbol with the current master is lower than the<br />

‘AP_CURRENT_MASTER_MIN_BPS’ value.<br />

• AP_NEW_MASTER_MIN_BPS = <br />

o Parameter: Number of bits per symbol (0-14592)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

At the period search for a better master, no every master will be considered. Only the masters with a number<br />

of bits per symbol greater than ‘AP_NEW_MASTER_MIN_BPS’ will be eligible.<br />

Parameters for the master: The master will receive petitions of the slaves that want to connect to it. There are<br />

different policies about what to do in this case:<br />

- Accept any petition. The slave will be allowed to connect through this master.<br />

- Deny any petition. No slave will be allowed to connect through this master.<br />

- Use the Radius. The RADIUS will be the one that decides to accept of reject the connection of a<br />

slave.<br />

- Use an authorization list. This is a list of the <strong>MAC</strong>s of the slaves that will be allowed to connect<br />

through this master. The following parameters configures this list.<br />

• ACCESSP_AUTHLIST_<strong>MAC</strong>.i = 0xXXXXXXXXXXXX<br />

o Parameter: ‘0xXXXXXXXXXXXX’ (<strong>MAC</strong> address authorized to connect)<br />

o SNMP: no<br />

Submission page 343 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o M<strong>and</strong>atory: no<br />

This parameter is a list of the <strong>MAC</strong> address of the modems that will be allowed to connect through this<br />

master. The length of the list is 128 (i=1…128).<br />

• ACCESSP_AUTHLIST_PROFILE.i = [1-16]<br />

o Parameter: Number of the profile related to a <strong>MAC</strong> authorized)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

If a slave is accepted via the authorization list it will use the parameters of one profile. This<br />

autoconfiguration parameter indicates which profile will be associated with each slave. The length of the list<br />

is 128 (i=1…128).<br />

• ACCESSP_AUTHLIST_FWTYPE.i = [MV|LV|EU]<br />

o Parameter: ‘MV’ (medium voltage) or ‘LV’ (low voltage) or ‘EU’ (End User)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

If a slave is accepted via the authorization list it will have a firmware type This autoconfiguration parameter<br />

indicates which firmware type will be associated with each slave. The length of the list is 128 (i=1…128).<br />

12 CONFIGURATION<br />

12.1 MIB<br />

12.1.1 SNMP Management<br />

SNMP (Simple Network Management Protocol) refers to a group of specifications for the management of<br />

communication networks: the protocol, the data base definition <strong>and</strong> the modules. For more information, consult the<br />

SNMP st<strong>and</strong>ards RFC 1155 (Structure <strong>and</strong> Identification of Management Information for TCP/IP-based Internets),<br />

RFC 1157 (Simple Network Management Protocol), RFC 1213, Management Information Base).<br />

Each resource to be managed in a device is represented by an object. The MIB is a structured collection of these<br />

objects. For SNMP, the MIB is a database structure, or a database definition. Each system in a network to be<br />

managed must maintain a MIB that reflects the status of the managed resources in that system.<br />

Submission page 344 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

All managed objects in the SNMP environment are arranged in a hierarchical or tree structure. The leaf objects of<br />

the tree are the actual managed objects, each of which represents some resource, activity or related information that<br />

is to be managed.<br />

SNMP <strong>and</strong> thus MIB support are optional in this specification.<br />

12.1.2 MIB-II for IEEE P1901<br />

The structure MIB-II is located under the node mgmt. This node contains the definition of the management<br />

information base approved by the IAB. MIB-II is an extension of the previously defined MIB-I. Under the node<br />

‘mib-2’, IEEE P1901 nodes must support the following structures in RFC 1213:<br />

• system(1): General information about the system:<br />

o Description of the entity – hardware, operating system, etc.<br />

o Level of OSI reference model to which the managed object pertains.<br />

o Time since the last initialization of the system.<br />

• interfaces(2): Information about the network interfaces of the managed entity, including information <strong>and</strong><br />

statistics about the events in each. There is an “interfaces” table in which each row corresponds to a<br />

network interface. The information for a given interface:<br />

o <strong>Physical</strong> address<br />

o Type of interface<br />

o Speed<br />

o Status<br />

o Number of transmitted <strong>and</strong> received octets<br />

The implementation of the following nodes is optional.<br />

• at(3): Translation of addresses IP – <strong>MAC</strong>.<br />

• ip(4): Information about the configuration of the IP protocol over the device. Among others, the nodes<br />

under the ‘ip’ node contain information about:<br />

o Number of packets discarded because of errors in the IP header, because of errors in the addresses,<br />

because of not finding a correct route, etc.<br />

o Number of accepted packets.<br />

o IP address of the interfaces <strong>and</strong> network mask of the network.<br />

• icmp(5): Information about the Internet <strong>Control</strong> Message Protocol (ICMP).<br />

Submission page 345 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• tcp(6): General information about the TCP protocol working in the managed node.<br />

• udp(7): General information about the UDP protocol.<br />

• snmp(11): Information about the execution of the SNMP protocol in the entity.<br />

All fundamentals for the MIB-II can be found in RFC 1213, <strong>and</strong> no further information will be shown in this<br />

document.<br />

12.1.3 IEEE P1901 Private MIB<br />

This section walks through the IEEE P1901 Private MIB.<br />

Under the ‘.iso.org.dod.internet.private.enterprises’ node in the st<strong>and</strong>ard MIB, in position number 6798, the node<br />

assigned to DS2 (ds2 OBJECT IDENTIFIER ::= {enterprises 6798}) is allocated <strong>and</strong> in turn, under this node, the<br />

IEEE P1901 MIB branch has position 3 (IEEE P1901 OBJECT_IDENTIFIER ::= {ds2 3}) <strong>and</strong> contains all objects<br />

that are not supported in the st<strong>and</strong>ard MIB-II but can be remotely managed in an IEEE P1901 node.<br />

Internally the IEEE P1901 (3) branch is composed of 8 sub-branches.<br />

• plSystem: Generic information about the system.<br />

• plBasic: Information about the general BPL configuration.<br />

• plPhy: Information related to the physical layer indexed by node address.<br />

• pl<strong>MAC</strong>: Objects related to the <strong>Medium</strong> <strong>Access</strong> <strong>Control</strong>.<br />

• plQoS: Objects related to Quality of Service.<br />

• plOVLAN: Objects related to OVLAN.<br />

• plStatistics: Statistics counters.<br />

• plTraps: Trap information.<br />

• plStp: STP information.<br />

• plSecurity: Security configuration.<br />

Submission page 346 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plSystem (1)<br />

enterprises (1)<br />

plBasic (2)<br />

plPhy (3)<br />

ds2 (6798)<br />

pl<strong>MAC</strong> (4)<br />

IEEE P1901 (3)<br />

plQoS (5)<br />

plOVLAN (6)<br />

Figure 149 IEEE P1901 MIB tree<br />

12.1.3.1 The IEEE P1901 MIB Description<br />

plStatistics (7)<br />

plSecurity (10)<br />

plStp (9)<br />

plTraps (8)<br />

This section shows the IEEE P1901 MIB <strong>and</strong> contains a brief description of every object inside each branch under<br />

the ‘IEEE P1901’ node. The MIB definition in ASN.1 format can be found in ANNEX A.<br />

Note that not every OID can be accessed for get/set operations; read-only OIDs only accept ‘get’ operations, readwrite<br />

OIDs accept both ‘get’ <strong>and</strong> ‘set’ operations, <strong>and</strong> nonaccessible OIDs accept neither of them (indicated in the<br />

table above). In addition, every OID with an enable/disable meaning accepts an integer ‘1’ for enabling <strong>and</strong> an<br />

integer ‘0’ for disabling.<br />

plSystem<br />

• plSystemTable<br />

Almost every table in the IEEE P1901 MIB is indexed by the card number, so there will be a copy<br />

of this object in these tables; their explanation is equivalent to this one.<br />

o plSysCard: Used as an index to get/set system characteristic data for a specific BPL card. This<br />

could be seen as useless because every BPL card has its own IP address, but it has been included to<br />

support future improvements in IEEE P1901 technology where a single node will have a single IP<br />

address, independent of the number of cards it will hold. But at present, this index is always a fixed<br />

‘1’ value.<br />

o plSysNodeType: Node type. An IEEE P1901 BPL card can act as a master, slave or repeater, <strong>and</strong><br />

therefore this OID can hold the values of 0:Master, 1:Slave <strong>and</strong> 2:Repeater.<br />

Submission page 347 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o plSysFWVersion: Shows a string describing the firmware version running in the IEEE P1901<br />

modem.<br />

o plSysHWVersion: Shows a string describing the hardware version built inside the modem.<br />

o plSysReset: Performs a system reset when receiving a ‘set’ with a ‘1’.<br />

o plSysFactoryReset: Performs a system reset when receiving a ‘set’ with a ‘1’ <strong>and</strong> restores the<br />

factory configuration parameters.<br />

o plSysUseDHCP: Enables (1) or disables (0) the DHCP protocol in the modem. If DHCP is<br />

enabled, network configuration parameters (IP address, netmask <strong>and</strong> gateway IP address) will be<br />

obtained from a DHCP server; if it is disabled, the network configuration parameters saved in the<br />

modem will be used.<br />

o plSysStaticIPAddress: Holds the IP address to be used when DHCP is disabled.<br />

o plSysStaticNetMask: Holds the network mask to be used when DHCP is disabled.<br />

o plSysStaticDefaultGW: Holds the default gateway IP address to be used when DHCP is disabled.<br />

o plSysSaveAsPermanent: When a ‘1’ integer value is passed to this OID, all node parameters that<br />

could have changed <strong>and</strong> are liable to be saved are stored in non-volatile memory for using them as<br />

the current system configuration. As soon as these parameters are saved, the system is reconfigured<br />

to use the new parameters.<br />

o plSysConfUpload: This OID accepts a string in this format:<br />

where:<br />

“PROT IP CONFIG_FILE USER PASSWD“<br />

PROT Value of 0 for uploading the configuration by TFTP, or 1 to upload it by FTP.<br />

IP IP address of the TFTP or FTP server.<br />

CONFIG_FILE Name of the file where the uploaded configuration will be stored.<br />

USER User login for FTP, not necessary if TFTP is being used.<br />

PASSWD User password for FTP, not necessary if TFTP is being used.<br />

Table 63 Upload file parameters<br />

This way, the system performs an upload of the active configuration to a TFTP or FTP server. The<br />

configuration file name string size can be up to 60 characters long.<br />

Submission page 348 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o plSysConfDownload: This OID accepts a string in this format:<br />

where:<br />

“PROT IP CONFIG_FILE USER PASSWD“<br />

PROT Value of 0 for downloading the configuration file by TFTP, or 1 to download it by FTP.<br />

IP IP address of the TFTP or FTP server.<br />

CONFIG_FILE Name of the file to be downloaded.<br />

USER User login for FTP, not necessary if TFTP is being used.<br />

PASSWD User password for FTP, not necessary if TFTP is being used.<br />

Table 64 Download configuration file parameters<br />

This way, the system performs a download of a new configuration file from a FTP or TFTP server.<br />

The configuration file name string size can be up to 60 characters long.<br />

o plSysUpgradeStatus: This OID is read-only <strong>and</strong> shows an integer number, which is a special code<br />

for showing the current status of the upgrade in progress. The codes for this OID are:<br />

0 Last upgrade was performed correctly.<br />

-1 No FLASH upgrade has been performed since the last boot.<br />

-2 Last upgrade failed checking CRC.<br />

-3 Last upgrade failed due to src was incorrect.<br />

-4 Last upgrade failed due to destination (FLASH sector) was incorrect.<br />

-5 Last upgrade failed due to file was for an incorrect HW product.<br />

-6 Last upgrade failed due to file was for an incorrect HW Revision.<br />

-7 Last upgrade failed due to file was for an incorrect ASIC.<br />

Submission page 349 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

-8 Last upgrade failed due to file was for an incorrect flash region.<br />

-9 Last upgrade failed due to file was for an incorrect SW product.<br />

-10 Last upgrade failed due to file size exceeds the flash section size.<br />

-11 Last upgrade failed due to flash section is read-only.<br />

-12 Last upgrade failed downloading/uploading file.<br />

-13 Last upgrade failed due to another upgrade process is running.<br />

-14 Last upgrade failed due to download buffer could not be allocated.<br />

-15 Last upgrade failed due to the region used at upgrade process is invalid.<br />

-16 Warning. The file used is not full compatible.<br />

-17 Last upgrade failed due to the upgrade thread could not be created.<br />

-18 Last upgrade failed due to file was for an incorrect SW version.<br />

-19 Last upgrade failed due to Board Description Data is not set.<br />

-20 Last upgrade failed with other error (unknown).<br />

-21 Last upgrade failed due to file not found.<br />

1 A FLASH upgrade process is starting.<br />

2 A FLASH upgrade process is downloading/uploading file.<br />

3 A FLASH upgrade process is checking CRC.<br />

4 A FLASH upgrade process is finishing.<br />

Submission page 350 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plBasic<br />

99 A FLASH upgrade process is in unknown status.<br />

Table 65 Upgrade status code list<br />

o plSysUpdate: This OID accepts a string in this format:<br />

where:<br />

“PROT IP CONFIG_FILE USER PASSWD“<br />

PROT Value of 0 for downloading the firmware by TFTP, or 1 to download it by FTP.<br />

IP IP address of the TFTP or FTP server.<br />

CONFIG_FILE Name of the file to be downloaded.<br />

TYPE Type of file 1:FW imag, 2 Loader image, etc.<br />

USER User login for FTP, not necessary if TFTP is being used.<br />

PASSWD User password for FTP, not necessary if TFTP is being used.<br />

Table 66 Update system parameters<br />

This way, the system performs an update of the firmware, loader or whatever part of the code in a<br />

modem from a TFTP or FTP server. The configuration file name string size can be up to 60<br />

characters long.<br />

o plSysDNSAddress: Holds the DNS IP address.<br />

o plSnmpROComunityName: Holds the community name string.<br />

o plSnmpRWComunityName: Holds the community name string.<br />

o plSnmpTrapDest: Holds the IP address to send the traps to.<br />

• plBasicTable<br />

Submission page 351 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o plBasicCard: Card index.<br />

o plBasicMode: <strong>Physical</strong> mode used by the modem. These values can reach from 1 to M, depending<br />

on the range of frequency used.<br />

o plBasicCentralFrequency: Mode central frequency value in KHz.<br />

o plBasicB<strong>and</strong>width: Mode b<strong>and</strong>width in MHz.<br />

o plBasicTXAGCEnable: Enables/disables transmission AGC. This AGC feature controls<br />

transmission gains automatically <strong>and</strong> dynamically.<br />

o plBasicRXAGCEnable: Enables/disables reception AGC.<br />

o plBasicTXAGCGain: Sets/gets the transmission gain, <strong>and</strong> it can accept two values, ‘0’ <strong>and</strong> ‘1’.<br />

These values have a ‘distance’ of 12 dB <strong>and</strong> act over the AFE amplifiers.<br />

o plBasicRXAGCGain: Sets/gets the gain in reception, in a range of values from ‘0’ to ‘7’ in steps<br />

of 6 dB.<br />

o plBasicTXPowerMaskLB: Sets/gets the system powermask in the low half b<strong>and</strong> of frequencies in<br />

the whole b<strong>and</strong>width used by the IEEE P1901 node, from carrier numbers 1 to 768. The value is a<br />

768-character long string, each character corresponding to a carrier, that is, the first character<br />

corresponds to carrier number 1 <strong>and</strong> so on. These characters have a special coding, <strong>and</strong> its meaning<br />

has to be split into two sub-codes, e.g.:<br />

0100 0110<br />

First 4 bits coded in steps of 6 dB for coarse attenuation.<br />

Last 4 bits specially coded for fine attenuation.<br />

The coding for the last 4 bits can be deduced from this graph:<br />

Submission page 352 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plPhy<br />

Figure 150 Power mask encoding graphic<br />

o plBasicTXPowerMaskHB: Sets/gets the system powermask in the high half b<strong>and</strong> frequencies of<br />

the whole b<strong>and</strong>width used by the IEEE P1901 node, from carrier numbers 769 to 1536. The<br />

explanation of the value of this OID is equivalent to the previous one.<br />

o plBasicMaster<strong>MAC</strong>: Shows the <strong>MAC</strong> address of the current master of the node.<br />

• plPhyBy<strong>MAC</strong>Table<br />

o plPhyBy<strong>MAC</strong>Card: Card index.<br />

o plPhyBy<strong>MAC</strong><strong>MAC</strong>: <strong>Physical</strong> (<strong>MAC</strong>) address that also serves as an index. This means that all of<br />

the following OIDs will refer to a single <strong>MAC</strong> address. These <strong>MAC</strong> addresses are those that have<br />

been learned by the <strong>MAC</strong> protocol or configured manually. Other tables could be also indexed by<br />

<strong>MAC</strong>, <strong>and</strong> all of them would mean that the value shown affects that <strong>MAC</strong>.<br />

o plPhyBy<strong>MAC</strong>TXBPC: For all practical purposes, these are the tonemap associated to the indexed<br />

<strong>MAC</strong> in transmission. The value is a 768-character long string with numbers from 2 to 10, each<br />

number representing the number of bits per symbol of each carrier. Each byte contains two carriers<br />

(4 bits each).<br />

Note: All BPC OIDs are the result of applying the Adaptive Bitloading ProtoCol, for which BPC is<br />

the acronym.<br />

Submission page 353 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

pl<strong>MAC</strong><br />

o plPhyBy<strong>MAC</strong>TXBPCAggregated: Holds the aggregated BPC value in transmission, which is a<br />

value from 288 to 14592. Although the maximum number of bits per carrier is 10 <strong>and</strong> the number<br />

of carriers is 1536, the physical throughput requires making a subtraction of 0.5 bits for each BPC<br />

value, which is used by the FEC algorithm. Therefore, 1536 times 9.5 results in 14592.<br />

o plPhyBy<strong>MAC</strong>TXPhySpeed: <strong>Physical</strong> speed in transmission in Mbits per second.<br />

o plPhyBy<strong>MAC</strong>RXBPC: These are the BPCs associated to the indexed <strong>MAC</strong> in reception. The<br />

value is a 768-character long string with numbers ranging from 2 to 10, each number representing<br />

the number of bits per symbol for each carrier. Each byte contains two carriers (4 bits each).<br />

o plPhyBy<strong>MAC</strong>RXBPCAggregated: Shows the aggregated BPC value in reception, which is a<br />

value from 288 to 14592. Although the maximum number of bits per carrier is 10 <strong>and</strong> the number<br />

of carriers is 1536, the physical throughput requires making a subtraction of 0.5 bits for each BPC<br />

value, which is used by the FEC algorithm. Therefore, 1536 times 9.5 results in 14592.<br />

o plPhyBy<strong>MAC</strong>RXPhySpeed: <strong>Physical</strong> speed in reception in Mbits per second.<br />

o plPhyBy<strong>MAC</strong>SNR: Shows the measured channel SNR. The value shown is a 768-character long<br />

string where each character is a number that shows the SNR value in units of 0.5 dB.<br />

o plPhyBy<strong>MAC</strong>CFR: Shows the measured channel CFR. The value shown is a 768-character long<br />

string where each character is a number that shows the CFR value in units of 1 dB.<br />

o plPhyBy<strong>MAC</strong>ACK: Enables/disables the level 2 ACKs feature.<br />

o plPhyBy<strong>MAC</strong>Cipher: Enables/disables the cipher feature.<br />

o plPhyBy<strong>MAC</strong>TxHURTO: Forces HURTO mode in transmission for a ‘set’ operation, or<br />

indicates if the modem is transmitting in HURTO mode to the indexed <strong>MAC</strong> for a ‘get’ operation.<br />

o plPhyBy<strong>MAC</strong>RxHURTO: Forces HURTO mode in reception for a ‘set’ operation, or indicates if<br />

the modem is receiving in HURTO mode from the indexed <strong>MAC</strong> for a ‘get’ operation.<br />

o plPhyBy<strong>MAC</strong>IsActive: Used to check if a node, whose <strong>MAC</strong> is the index, is active (1) or not (0).<br />

o plPhyBy<strong>MAC</strong>RXTimeLastActivity: Indicates the number of seconds since the last time the<br />

indexed <strong>MAC</strong> showed BPL activity.<br />

• plPhyRXSNRThresholdTable<br />

o plPhyRXSNRThresholdCard: Card index.<br />

o plPhyRXSNRThresholdIndex: The IEEE P1901 modems have 9 levels of SNR thresholds for<br />

changing the BPCs to be used when these levels are reached. This OID is an index with fixed<br />

values from 1 to 10 to refer to the BPCs to be used when a certain SNR value is reached. For<br />

instance, if data is requested (see the OID below) for the index 6, it will return the SNR value from<br />

which 6 BPCs will be used.<br />

o plPhyRXSNRThreshold: SNR threshold value in units of 0.5 dB for a determinate threshold index<br />

in the above OID.<br />

Submission page 354 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plQoS<br />

• pl<strong>MAC</strong>Table<br />

o pl<strong>MAC</strong>Card: Card index.<br />

o pl<strong>MAC</strong><strong>Access</strong>Protocol: Enables/disables the <strong>Access</strong> Protocol mode, which has been implemented<br />

to allow a node to automatically learn the <strong>MAC</strong> addresses of the nodes that are liable to connect<br />

with it.<br />

o pl<strong>MAC</strong>NumConnectedNodes: Shows the number of nodes successfully connected, that is, with its<br />

link solved by the Port Solver Protocol.<br />

o pl<strong>MAC</strong>NumSlaves: Shows the number of configured slaves if the nodeis a master.<br />

• pl<strong>MAC</strong>ConnectedNodesTable<br />

o pl<strong>MAC</strong>ConnectedNodesCard: Card index.<br />

o pl<strong>MAC</strong>ConnectedNodesIndex: This index will refer to a connected node, a number ranging from<br />

0 to the value shown by pl<strong>MAC</strong>NumConnectedNodes (see above).<br />

o pl<strong>MAC</strong>ConnectedNodes<strong>MAC</strong>: <strong>MAC</strong> address of the indexed connected node.<br />

• pl<strong>MAC</strong>SlavesTable<br />

o pl<strong>MAC</strong>SlavesCard: Card index.<br />

o pl<strong>MAC</strong>SlavesIndex: This index will refer to a slave node, a number ranging from 0 to the value<br />

shown by pl<strong>MAC</strong>NumSlaves (see above).<br />

o pl<strong>MAC</strong>Slaves<strong>MAC</strong>: <strong>MAC</strong> address of the indexed slave node.<br />

• plQoSMasterGeneralMinOneWayLat<br />

If the modem is a master, this OID shows the minimum latency configured in the modem in milliseconds.<br />

• plQoSMasterGeneralBwMngrPolicy<br />

This OID shows the policy to be followed by a master in assigning a certain b<strong>and</strong>width to its attached<br />

slaves. If a 0 is returned, the master is configured to assign b<strong>and</strong>width in a fair policy, while if a 1 is<br />

returned, the b<strong>and</strong>width is assigned in a priority-based policy.<br />

• plQoSPriorityManagementTable<br />

o plQoSPriorityManagementCard: Card index.<br />

o plQoSPriorityManagementPrio: Priority value, from 1 to 8.<br />

Submission page 355 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o plQoSPriorityManagementLatency: Latency coding value for the priority. Allowed coding<br />

values are 0, 1, 2, 4 <strong>and</strong> 8<br />

o plQoSPriorityManagementTimmingInterval: A fixed scheduling repeated each programmable<br />

Timming Interval is set, <strong>and</strong> the slaves will have a fixed amount of assigned time to transmit. This<br />

scheduling may be synchronized with the mains.<br />

• plQoSPerUserTable<br />

plOVLAN<br />

o plQoSPerUserCard: Card index.<br />

o plQoSPerUser<strong>MAC</strong>: <strong>Physical</strong> <strong>MAC</strong> address of the user hanging from the master. Used as index.<br />

o plQoSPerUserTXMaxXput: Shows the maximum throughput allowed in transmission for a user in<br />

kilobits per second.<br />

o plQoSPerUserRXMaxXput: Shows the maximum throughput allowed in reception for a user in<br />

kilobits per second.<br />

o plQoSPerUserPriorityAllowedUp: Shows the allowed priorities for transmission <strong>and</strong> reception in<br />

upstream for a user. The returned value is a number from 0 to 255, which is a number<br />

corresponding to the allowed priorities’ 8-bit mask coding, i.e., a value of 16 (0010000b) would<br />

mean that priority 5 is the only one allowed.<br />

o plQoSPerUserPriorityAllowedDown: Shows the allowed priorities for transmission <strong>and</strong> reception<br />

in downstream for a user. The returned value is a number from 0 to 255, which is a number<br />

corresponding to the allowed priorities’ 8-bit mask coding, i.e., a value of 17 (0010001b) would<br />

mean that priorities 5 <strong>and</strong> 1 are the only ones allowed.<br />

This node has the same structure <strong>and</strong> OID that the dot1qVlan MIB branch.<br />

plStatistics<br />

• plStatisticsTable<br />

o plStatisticsCard: Card index.<br />

o plStatisticsBPLInputWords: Number of words received by the BPL physical interface.<br />

o plStatisticsBPLInputPackets: Number of packets received by the BPL physical interface.<br />

o plStatisticsBPLInputIncorrigible: Number of incorrigible packets received by the BPL physical<br />

interface.<br />

o plStatisticsBPLInputFECBlocksTotal: Number of FEC blocks received by the BPL physical<br />

interface.<br />

o plStatisticsBPLInputFECBlocksCorrected: Number of FEC blocks received <strong>and</strong> corrected by the<br />

BPL physical interface.<br />

o plStatisticsBPLInputPktsReceived: Number of packets received by the BPL physical interface.<br />

Submission page 356 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o plStatisticsBPLInputPktsRcvComplete: Number of packets received complete by the BPL<br />

physical interface.<br />

o plStatisticsBPLInputPktsRcvIncomplete: Number of packets received incomplete by the BPL<br />

physical interface.<br />

o plStatisticsBPLOutputWords: Number of words transmitted through the BPL physical interface.<br />

o plStatisticsBPLOutputPkts: Number of packets transmitted through the BPL physical interface.<br />

plTraps<br />

• plTrapsPhyTable<br />

o plTrapsPhyCard: Card index.<br />

o plTrapsPhyTrapToHURTOEnable: Enables/disables trap generation when entering HURTO<br />

mode.<br />

o plTrapsPhyTrapFromHURTOEnable: Enables/disables trap generation when leaving HURTO<br />

mode.<br />

• plTraps<strong>MAC</strong>Table<br />

o plTraps<strong>MAC</strong>Card: Card index.<br />

o plTraps<strong>MAC</strong>TrapPeerDetectedEnable: Enables/disables trap generation when detecting a peer<br />

modem.<br />

o plTraps<strong>MAC</strong>TrapPeerDisappearedEnable: Enables/disables trap generation when a peer modem<br />

disappears.<br />

• plTrapsBridgeTable<br />

o plTrapsBridgeCard: Card index.<br />

o plTrapsBridgeTrapNewRootEnable: Enables/disables trap generation when a new root is<br />

assigned. The trap is sent from a node when this node becomes root.<br />

o plTrapsBridgeTopologyChangeEnable: Enables/disables trap generation when network topology<br />

changes.<br />

• plTrapsConfFailTable<br />

o plTrapsConfFailCard: Card Index.<br />

o plTrapsConfDonwloadFailEnable : Enables/disables the trap generation when a configuration file<br />

download fails.<br />

o plTrapsConfUploadFailEnable : Enables/disables the trap generation when a configuration file<br />

upload fails.<br />

plStp<br />

• plStpTable<br />

Submission page 357 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o plStpCard: Card index.<br />

o plStpEnable: Enables/disables the Spanning Tree protocol.<br />

o plStpProtocolVersion: Chooses either using STP (IEEE 802.1d) or RSTP (IEEE 802.1w). The<br />

RSTP version is compatible to STP on a per-port basis. Values: “STP”, RSTP”.<br />

o plStpPtpExtA: Sets the point-to-point flag on EXTA. This port will be considered point-to-point,<br />

thus c<strong>and</strong>idate for rapid transition to forwarding. Set by default when EXTA is connected to<br />

backplane.<br />

o plStpPtpExtB: Sets the point-to-point flag on EXTB. This port will be considered point-to-point,<br />

thus c<strong>and</strong>idate for rapid transition to forwarding. Set by default when EXTB is connected to<br />

backplane.<br />

o plStpFrontier: Enables/disables the Spanning Tree Frontier . This feature drops all the STP<br />

messages on an EXT interface. Values: “NONE”, “EXTA”, EXTB”.<br />

plSecurity<br />

o plSecurityConsoleSerial: Enables or disables the serial console access to the modem.<br />

o plSecurityConsoleTelnet: Enables or disables the telnet console access to the modem.<br />

o plSecurityConsoleAuthTable: Table containing the IP addresses from which telnet clients may<br />

access this<br />

12.2 AUTO-CONFIGURATION AND PROVISIONING<br />

12.2.1 Auto-configuration purpose<br />

The purpose of the auto-configuration process is the complete automation of the deployment of the BPL network:<br />

• <strong>Medium</strong> Voltage equipment<br />

• Low Voltage Repeaters <strong>and</strong> Home Gateways<br />

• CPEs<br />

With the auto-configuration mechanism no prior pre-configuration of any modem is required.<br />

12.2.2 Auto-configuration process overview<br />

The objective of the auto-configuration process is the centralized management of a BPL network using<br />

configuration files stored in a centralized database that are transferred to each node when it boots. These files<br />

contain all of the information that a node needs to know to work as expected.<br />

Below is a brief description of the process:<br />

Submission page 358 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

1. Every node starts with the same default factory configuration: <strong>Access</strong> CPE.<br />

2. Using PTTP (explained later in this document 12.2.5) the modem discovers if it is booting in a network<br />

with VLANs or not. If a network has been built using VLANs it is necessary to know the Management VLAN of<br />

that network segment for the DHCP request to reach the backbone. The information passed between modems<br />

during PTTP is called the translation table.<br />

3. Using DHCP protocol, each node gets their IP configuration (IP address, netmask <strong>and</strong> gateway), the phone<br />

number (in the case of VoIP CPEs), the name of their corresponding auto-configuration file <strong>and</strong> the IP address of<br />

the TFTP server where the auto-configuration file is.<br />

4. Using TFTP protocol, the nodes download the auto-configuration file <strong>and</strong> configure the node accordingly.<br />

The four points mentioned above are the main ones, but there is another point to consider:<br />

In order to achieve a secure network, BPL authentication is introduced. When a new slave is trying to<br />

access the BPL network <strong>and</strong> connecting to a master or a repeater, the master or repeater may perform a<br />

RADIUS request to authenticate the user. See section 12.2.9 for more information.<br />

Below there is an example of the actions involved in the auto-configuration of a slave modem:<br />

Radius Server<br />

TFTP Server<br />

DHCP Server<br />

Master<br />

PLC<br />

Slave<br />

Master<br />

Slave<br />

Searchlink<br />

<strong>Access</strong><br />

Protocol<br />

Radius<br />

Request<br />

Master<br />

Slave<br />

<strong>MAC</strong><br />

Authentication<br />

RadiusReply<br />

with Profile<br />

<strong>Access</strong><br />

Grant<br />

Master<br />

Slave<br />

PSP Negotiation<br />

STP<br />

PTTP<br />

Request<br />

Submission page 359 UPA-OPERA<br />

Master<br />

Slave<br />

PTTP<br />

Reply<br />

Gets Translation Table<br />

with Mgmt VLAN<br />

DHCP<br />

Request<br />

Figure 151 Autoconfiguration of a slave modem<br />

Slave<br />

TFTP<br />

Request<br />

DHCP<br />

Reply<br />

Gets IP address +<br />

Name of Configuration<br />

File<br />

Slave<br />

Downloads<br />

Configuration File


4-June-07 P1901_PRO_016_r0<br />

If the node is the first modem in the network <strong>and</strong> connected directly through the Ethernet port to the backbone, the<br />

process is slightly different:<br />

1. This node starts with the same default factory configuration: <strong>Access</strong> CPE.<br />

2. Using DHCP protocol, the node gets their IP configuration (IP address, netmask <strong>and</strong> gateway, <strong>and</strong> the name<br />

of their corresponding auto-configuration file). Also there is another parameter called pttp-code that indicates if<br />

VLAN is used <strong>and</strong> the value of the management VLAN if needed. Once this parameter is obtained the PTTP<br />

protocol finishes. Important: the DHCP server must ask this node in the VLAN #1 or without VLAN. In other<br />

words, the node performs DHCP requests without VLAN <strong>and</strong> with VLAN #1 alternately.<br />

3. Using TFTP protocol, the nodes download the auto-configuration file <strong>and</strong> configure the node accordingly.<br />

The figure below shows an example of this case:<br />

Radius Server<br />

TFTP Server<br />

DHCP Server<br />

Ethernet<br />

12.2.3 <strong>Access</strong> Protocol<br />

DHCP<br />

Request<br />

VLAN 1<br />

Slave<br />

DHCP<br />

DHCP<br />

Reply<br />

VLAN 1<br />

Slave<br />

Gets Mgmt VLAN from<br />

DHCP reply<br />

Gets IP address +<br />

Name of Configuration<br />

File<br />

TFTP<br />

Request<br />

VLAN X<br />

Submission page 360 UPA-OPERA<br />

Slave<br />

TFTP<br />

Reply<br />

VLAN X<br />

Downloads Configuration<br />

File + Translation Table<br />

Figure 152 Autoconfiguration of a HE<br />

HE<br />

HE Node Configured<br />

as master<br />

The access protocol mechanism controls the access of slaves to the BPL network. The master or repeater queries the<br />

Radius server (if Radius authentication is enabled) when a new slave is detected.<br />

Only nodes that link to a Master or repeater need to be in the Radius database:<br />

• CPEs


4-June-07 P1901_PRO_016_r0<br />

• TD Repeaters<br />

The Radius server checks:<br />

• The <strong>MAC</strong> address of the slave applying for authentication<br />

• The <strong>MAC</strong> address of the master placing the request<br />

The Radius server replies:<br />

• Accept / Reject<br />

• Profile number<br />

The profile number relates to the QoS <strong>and</strong> VLAN settings for the given slave (Radius user).<br />

If <strong>Access</strong> Protocol authentication is disabled, all slaves get access to the network with the default settings (profile<br />

1).<br />

A third type of authentication is possible: Authlist. In this mode, the autoconfiguration file of the master contains all<br />

the slaves that are allowed to connect <strong>and</strong> their associated profile.<br />

12.2.4 Auto-configuration at Modem Boot<br />

autoconfiguration parameters on booting. When any node boots, there may be a parameter stored in the non-volatile<br />

memory called GENERAL_USE_AUTOCONF. When this value is YES, the node boots in auto-configuration<br />

mode. When this value is NO, the node boots from local settings.<br />

Inside the autoconfiguration boot mode there are two possibilities depending on whether or not PTTP is performed.<br />

12.2.4.1 Autoconfiguration PTTP Boot<br />

send PTTP requests. When this protocol ends, the modem has the minimum information to successfully connect to<br />

the backbone <strong>and</strong> execute DHCP <strong>and</strong> TFTP.<br />

The node then performs a DHCP request to get an IP configuration, the phone number (if required) <strong>and</strong> the name of<br />

the auto-configuration file, as well as the TFTP server where the file is located. Then it downloads the file <strong>and</strong><br />

configures the node accordingly.<br />

12.2.4.2 Autoconfiguration no PTTP Boot<br />

In this autoconfiguration boot modality, the modem has been already configured somehow (see section 12.2.5 for<br />

more information) to successfully execute DHCP <strong>and</strong> TFTP so it skips PTTP.<br />

Submission page 361 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

This mode requires pre-configuration <strong>and</strong> it is only recommended in the first node of the BPL network, the node<br />

that connects to the backbone, because this node cannot get the information for booting from any other node.<br />

However, there is defined a DHCP extension to solve this issue without pre-configuration. See section 12.2.8.<br />

12.2.4.3 Boot from local settings<br />

When a node starts in local settings boot mode, it collects all of the configured parameters from the non-volatile<br />

memory <strong>and</strong> configures the node accordingly. There are some basic parameters that are always configured in this<br />

mode:<br />

• GENERAL_TYPE: Node type – HE, CPE, or TDREPEATER.<br />

• GENERAL_IP_USE_DHCP: Use DHCP – yes or no. If this parameter is set to no, the IP configuration<br />

parameters <strong>and</strong> the phone number are also configured from non-volatile memory.<br />

All of the other parameters are only configured if they have been downloaded from a file first, <strong>and</strong> a<br />

GENERAL_USE_AUTOCONF = no line was in that auto-configuration file. This is equivalent to performing a<br />

Save as Permanent.<br />

12.2.5 PTTP Protocol<br />

The PTTP (Parametric Translation Table Protocol) is used to transfer the translation table (explained later in this<br />

document) between modems at booting. The PTTP uses the CCP<br />

12.2.5.1 General description<br />

The Parametric translation table protocol takes place every time a node boots. The aim of this protocol is to obtain<br />

from the nearest active node a table with the values of certain auto-configuration parameters. When the node<br />

downloads the auto-configuration file it uses the obtained values to translate all the parametric values contained in<br />

the file.<br />

The translation table contains information about the different VLAN <strong>and</strong> OVLAN tags used in the network, as well<br />

as information about the QoS settings. If the network is not using VLAN tags, this information is also contained in<br />

the translation table. Due to this, it is necessary to perform the protocol before the DHCP request.<br />

Once the translation table is obtained, the node is able to perform the DHCP request successfully <strong>and</strong> download <strong>and</strong><br />

interpret the auto-configuration file, translating the parametric values contained on it.<br />

12.2.5.2 Protocol description<br />

The Translation Table protocol is client-server. Each node belonging to the network at boot time represents the<br />

client side. Each configured node in the network excluding End Users nodes performs the server side of the<br />

protocol.<br />

The usual sequence of packet exchanging is described:<br />

Submission page 362 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

1. The client starts sending a Read ReQuest (RRQ) packet through all active interfaces.<br />

2. The closest server receives the RRQ packet <strong>and</strong> it sends the first block of the Translation Table to the client<br />

with a DATA packet with block number 1.<br />

3. The client answers with an ACK packet of the block number 1.<br />

4. The server sends the next block of DATA.<br />

5. The client replies with another ACK<br />

6. Steps 4 <strong>and</strong> 5 are repeated until the translation table is sent completely.<br />

7. The server sends an empty DATA packet to finish the protocol.<br />

8. The client replies with an ACK to this empty packet <strong>and</strong> closes the connection.<br />

9. The server receives the last ACK <strong>and</strong> closes the connection.<br />

The following figure shows this sequence:<br />

Submission page 363 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Open connection<br />

Learn source <strong>MAC</strong><br />

address<br />

Last data block<br />

received (empty)<br />

Close connection<br />

Client<br />

<strong>MAC</strong>_x<br />

PTTP.DATA(N)<br />

Empty<br />

PTTP.RRQ<br />

DST: DS2 Multicast<br />

SRC: <strong>MAC</strong>_x<br />

Preforwarded to<br />

active ports<br />

PTTP.DATA(1)<br />

DST: <strong>MAC</strong>_x<br />

SRC: <strong>MAC</strong>_y<br />

PTTP.ACK(1)<br />

DST: <strong>MAC</strong>_y<br />

SRC: <strong>MAC</strong>_x<br />

PTTP.DATA(2)<br />

PTTP.ACK(2)<br />

PTTP.ACK(N)<br />

Figure 153 Usual PTTP operation.<br />

Server<br />

<strong>MAC</strong>_y<br />

Open connection<br />

Learn source <strong>MAC</strong><br />

address<br />

Last block ACK<br />

received<br />

Close connection<br />

Since PTTP protocol operates directly over BPL <strong>and</strong> Ethernet protocols, it must h<strong>and</strong>le itself lost <strong>and</strong> duplicated<br />

packets. PTTP implements the stop-<strong>and</strong>-wait protocol described before. For this purpose, two timers are needed per<br />

each connection: DATA <strong>and</strong> ACK timers. The DATA timer is in the client, whereas the ACK timer is located in the<br />

server.<br />

If a duplicated DATA or ACK message arrives, it is simply discarded, because its Block Number field will not<br />

match the expected one. If a DATA or ACK message is lost, the ACK timer will expire in the server <strong>and</strong> this will<br />

retransmit the last DATA message.<br />

There is defined a Maximum Number of Retransmissions, which in case of being exceeded, the connection will be<br />

closed on the server side. Moreover, the connection will be closed on the client side too, because its DATA timer<br />

will expire.<br />

Submission page 364 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

If the initial RRQ packet is lost, the DATA timer will expire too, <strong>and</strong> the connection will not be open.<br />

In case of DATA timer expiration, the client would not get its translation table <strong>and</strong> will not be configured. For that<br />

reason, it must retry sending another RRQ message again to request the translation table.<br />

DATA timer value should be several times the ACK timer. Concretely, this value must be slightly greater than the<br />

product of the Maximum Number of Retransmissions <strong>and</strong> the ACK timer:<br />

DATA_Timer > Max_Retransmissions · ACK_Timer<br />

The reason for using this value is to avoid useless retransmissions by the server, because the client might have<br />

closed its connection, due to DATA timer timeout, before the server did. Thus, in case of DATA timer expiration,<br />

the server should close the connection before the client.<br />

The following figure shows the mechanism of ACK timer expiration <strong>and</strong> data block retransmission:<br />

Submission page 365 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Client Server<br />

PTTP.ACK(i-1)<br />

PTTP.DATA(i)<br />

PTTP.DATA(i)<br />

PTTP.ACK(i)<br />

PTTP.DATA(i)<br />

PTTP.ACK(i)<br />

PTTP.DATA(i+1)<br />

ACK Timer expired<br />

Retransmit last<br />

data block<br />

ACK Timer expired<br />

Retransmit last<br />

data block<br />

Figure 154 ACK timer expiration <strong>and</strong> data block retransmission.<br />

The following figure shows the mechanism of DATA timer expiration <strong>and</strong> Maximum Number of Retransmissions<br />

exceeded, whose consequence is the connection closing:<br />

Submission page 366 UPA-OPERA<br />

ACK Timer<br />

ACK Timer


4-June-07 P1901_PRO_016_r0<br />

DATA Timer<br />

DATA Timer<br />

expired<br />

Close connection<br />

Client Server<br />

PTTP.ACK(i-1)<br />

PTTP.DATA(i)<br />

PTTP.DATA(i)<br />

PTTP.ACK(i)<br />

PTTP.DATA(i)<br />

PTTP.DATA(i)<br />

ACK Timer expired<br />

Retransmit last<br />

data block<br />

ACK Timer expired<br />

Retransmit last<br />

data block<br />

ACK Timer expired<br />

Retransmit last<br />

data block<br />

Maximum Number<br />

of Retransmissions<br />

exceeded<br />

Close connection<br />

Figure 155 DATA timer expiration <strong>and</strong> Maximum Number of Retransmissions exceeded.<br />

12.2.5.3 PTTP Packets Format<br />

All the packets used by the PTTP protocol are encapsulated with the CCP format, with Type0 0x07. The Type1<br />

field indicates the type of packet within the PTTP protocol:<br />

• 0x06 RRQ (Establish connection)<br />

• 0x07 Data<br />

• 0x08 Data Ack<br />

Submission page 367 UPA-OPERA<br />

ACK Timer<br />

ACK Timer<br />

ACK Timer<br />

Max_Retransmissions · ACK_Timer


4-June-07 P1901_PRO_016_r0<br />

The data field contains the block number <strong>and</strong>/or data to transmit.<br />

12.2.5.3.1 RRQ packet<br />

0xAA<br />

0xAA<br />

0x03<br />

0x00<br />

0x13<br />

0x9D<br />

0x07<br />

0x06<br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

Submission page 368 UPA-OPERA<br />

TPID<br />

TCI<br />

Length<br />

Figure 156 PTTP RRQ packet format<br />

The destination address is the Multicast address 0x01139D000000 defined by the CCP protocol. When a node<br />

receives such a packet, it must not be forwarded.<br />

12.2.5.3.2 DATA packet<br />

TPID<br />

0xAA<br />

0xAA<br />

0x03<br />

0x00<br />

0x13<br />

0x9D<br />

0x07<br />

0x07<br />

Length<br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

TCI<br />

Block Number<br />

Data (0-1024 bytes)<br />

Figure 157 PTTP DATA packet format<br />

The destination <strong>and</strong> source address are the client <strong>and</strong> server <strong>MAC</strong> addresses respectively.<br />

The Type1 field indicates this is a data packet. Next to this field, it is the data block number, <strong>and</strong> finally the data<br />

block. The data field can be empty if the DATA packet is the last packet of the transfer.<br />

12.2.5.3.3 DATA ACK packet


4-June-07 P1901_PRO_016_r0<br />

Figure 158 PTTP DATA ACK packet format<br />

The destination <strong>and</strong> source address are the server <strong>and</strong> client <strong>MAC</strong> addresses respectively.<br />

The Type1 field indicates this is a data ack packet. Next to this field, it is the acknowledged data block number.<br />

12.2.5.4 Translation Table DATA format<br />

The Translation Table data follows a specific format. It is a set of one or more parameter items. A parameter item is<br />

defined as follows:<br />

Size<br />

TT Parameter Item (4 + n bytes)<br />

ParameterCode Index<br />

ParameterValue<br />

1 byte 2 bytes<br />

1 byte<br />

0 ... n bytes<br />

Figure 159 Translation Table parameter item<br />

The field Size is the number of bytes of the rest of parameter item (ParameterCode + Index + ParameterValue).<br />

The minimum value is thus 4. If the value is 0, it means that no more parameters are sent. It is m<strong>and</strong>atory to finish<br />

the Data block with a 0-size byte.<br />

The ParameterCode is a 2-byte field. The first byte is reserved for future extensions. It defaults to 0x00. The second<br />

byte is the parameter code. The whole field identifies one <strong>and</strong> only one parameter.<br />

The Index byte contains the index for list parameters (from 1 to 127). It is 0 for scalar parameters.<br />

The ParameterValue contains the value for that parameter. Its format depends on the ParameterCode <strong>and</strong> may be of<br />

any type such as int8, int16, int32, string…<br />

The next parameters are available:<br />

Submission page 369 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

TRANSLATION TABLE<br />

PARAMETER<br />

PARAMETER<br />

SIZE (IN<br />

BYTES)<br />

PARAMETER CODE<br />

(IN HEXADECIMAL)<br />

PARAMETER TYPE<br />

TRANSLATION_USE_VLAN 1 0x00 01 Boolean<br />

TRANSLATION_MNMT_VLAN 2 0x00 02 Int16<br />

TRANSLATION_DATA_VLAN.i 2 0x00 03 Int16<br />

TRANSLATION_VOIP_VLAN.i 2 0x00 04 Int16<br />

TRANSLATION_ROOTPATH_OVLAN 2 0x00 05 Int16<br />

TRANSLATION_MAX_TXTPUT_TX.i 4 0x00 06 Int32<br />

TRANSLATION_MAX_TXTPUT_RX.i 4 0x00 07 Int32<br />

Table 67 Translation table parameters<br />

When the Data block exceeds the maximum length of 1024 bytes, it is fragmented <strong>and</strong> transferred in different<br />

DATA packets. No padding is needed for the last packet in case the Data field is smaller than 1024 bytes.<br />

The big endian format is used in the entire Data block to preserve the net order.<br />

The Figure 160 shows a complete data block.<br />

Parameter1<br />

4 + n1 bytes<br />

Parameter2<br />

TT Data block<br />

Parameter3 . . . ParameterN<br />

4 + n2 bytes 4 + n3 bytes 4 + nN bytes<br />

Figure 160 Full Translation Table Data block<br />

12.2.5.5 VLAN configuration while doing PTTP<br />

Submission page 370 UPA-OPERA<br />

0x00<br />

1 byte<br />

In order to discover the type of network where the node is booting, the PTTP petitions are made as described below:


4-June-07 P1901_PRO_016_r0<br />

• Step 1: A PTTP request is made without VLANs <strong>and</strong> waits for a response. If there is response, stay without<br />

VLAN.<br />

• Step 2: Then it switches to VLAN mode <strong>and</strong> makes a PTTP request using VLAN tag #1 (reserved in the<br />

IEEE P1901 network) <strong>and</strong> waits for response. If there is response, stay with VLAN.<br />

Step 3: Back to step 1.<br />

To accomplish this, the VLAN #1 must be accepted in the node that acts as PTTP master.<br />

12.2.5.6 PTTP packets forwarding<br />

When a node receives a PTTP RRQ packet, the packet is not treated as multicast to avoid packet storms.<br />

In transmission, the request is forwarded to all active interfaces in order to reach any active PTTP available server.<br />

12.2.6 Translation Table<br />

The translation table allows particularizing configuration files for a given network sector. Auto-configuration file is<br />

parametric, <strong>and</strong> the same for a given user category. Different sectors have different Translation Tables <strong>and</strong> each<br />

node combines its configuration file with the translation table to obtain its particular setting in VLAN/OVLAN <strong>and</strong><br />

QoS terms.<br />

The parameters cointained in the translation table are shown in 12.2.5.4.<br />

The next figure shows the use of the translation table.<br />

Configuration File<br />

VLAN= %DTVL<br />

Translation table<br />

Translation table<br />

%DTVL =13 %DTVL =14<br />

User A<br />

Sector 1<br />

S S<br />

VLAN=13 VLAN=14<br />

Figure 161 Translation table example<br />

User A<br />

Sector 2<br />

Submission page 371 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

12.2.7 Auto-configuration & Networking<br />

12.2.7.1 VLAN Network<br />

The network model is described as follows:<br />

• The BPL network is a switched network with different VLAN tags.<br />

• BPL management protocols (PTTP, ABLP, etc.) use VLAN 1, while high-level management protocols<br />

(DHCP, TFTP, HTTP, NTP, SNMP, etc.) use the management VLAN configured by the auto-configuration<br />

procedure. The Management VLAN may be different in different LV cells.<br />

• The end user node receives untagged traffic from the external interface <strong>and</strong> this traffic is tagged with the<br />

correct Data VLAN according to the ISP operator that the customer belongs to. So there can be more than<br />

one Data VLAN per LV cell.<br />

• The end user node generates traffic from VoIP tagged with the correct VoIP VLAN according to the voice<br />

operator that the customer belongs to. So there can be more than one VoIP VLAN per LV cell.<br />

• It is possible to add private VLANs between specific customers that do not belong to any ISP or voice<br />

operator. In this case, VLAN trunks must be defined in the intermediary equipment in order to allow all of<br />

that tagged traffic.<br />

All of the traffic is tagged inside the BPL network.<br />

Each node must receive its VLAN configuration inside the auto-configuration file. In addition to this, <strong>and</strong> in order<br />

to reduce the number of auto-configuration files, there will be a translation table transferred between nodes which.<br />

The translation table contains information about the Management, Data <strong>and</strong> VoIP VLANs used in a LV cell.<br />

Submission page 372 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Internet MV Node Head-End<br />

Router<br />

PSTN<br />

Opt Fiber<br />

MV Node<br />

MV link<br />

MV link<br />

Submission page 373 UPA-OPERA<br />

MV node<br />

L2 visibility area<br />

Head-End<br />

Repeater<br />

Repeater<br />

Repeater<br />

Repeater<br />

Figure 162 VLAN use inside the BPL network<br />

The figure above shows the use of VLAN inside the BPL network.<br />

12.2.7.2 noVLAN Network<br />

End<br />

User-1<br />

End<br />

User-2<br />

End<br />

User-3<br />

End<br />

User-4<br />

End<br />

User-5<br />

End<br />

User-6<br />

End<br />

User-7<br />

End<br />

User-8<br />

VoIP-Op1<br />

Data-Op2<br />

VoIP-Op3<br />

Data-Op1<br />

VoIP-Op4<br />

Data-Op3<br />

VoIP-Op1<br />

Data-Op2<br />

Private1<br />

Private1<br />

VoIP-Op1<br />

Data-Op3<br />

VoIP-Op4<br />

Data-Op1<br />

VoIP-Op1<br />

Data-Op2<br />

VoIP-Op1<br />

Data-Op1<br />

The use of VLANs is not m<strong>and</strong>atory but is advisable for privacy reasons. Nevertheless this privacy can be<br />

implemented with different tools or if the operator simply wants to establish a LAN.<br />

The node will perform its PTTP requests, switching between VLAN #1 <strong>and</strong> not using VLAN, <strong>and</strong> finally a master<br />

will answer with the translation table that will at least contain the parameter “USE VLAN = no”.<br />

Once the modem has received the translation table <strong>and</strong> does not need to configure anything with regard to VLANs,<br />

it can complete the following steps: DHCP, TFTP <strong>and</strong> configuration.<br />

12.2.7.3 OVLAN Configuration <strong>and</strong> Root Interface<br />

The basic OVLAN configuration in IEEE P1901 avoids the visibility between customers connected to the end-user<br />

nodes in a simple way. All of the customer data packets in the same LV cell are tagged with the Rootpath OVLAN<br />

tag. This tag is the only allowed tag in the entire path to the backbone. In the path from the backbone to the<br />

customers, the packets are tagged with the ALL_VLAN tag (4095) in equipment that is connected to the backbone,


4-June-07 P1901_PRO_016_r0<br />

<strong>and</strong> no tag is allowed in this path. However, packets with the ALL_VLAN tag are not filtered, so only packets from<br />

the backbone can be transmitted over the downstream path.<br />

12.2.7.4 User Profiles<br />

The use of profiles allows securely assigning resources to end-user modems based on <strong>MAC</strong> address. They also<br />

inform the master about the VLAN/OVLAN <strong>and</strong> QoS settings to be applied to the slave.<br />

12.2.7.5 User Profiles inside auto-configuration<br />

Inside a master’s auto-configuration file, there is a section with user profiles. These profiles contain the information<br />

a master needs to know to configure a port to a new slave that enters the network. The information is related to QoS<br />

<strong>and</strong> VLAN/OVLAN configuration.<br />

The figure shows an example on the use of user profiles to configure different QoS settings:<br />

User A<br />

Profile 1<br />

Configuration File<br />

#Profile 1<br />

BW = 500<br />

#Profile 2<br />

BW = 1000<br />

Radius Server<br />

M M<br />

S S<br />

User B<br />

Profile 2<br />

BW=500 BW=1000<br />

Figure 163 Radius profiles example<br />

There will be always an invited profile, profile number 1, applied to the users with no specific profile or if the<br />

corresponding profile is not available. This invited profile, as well as the other profiles, can be redefined with autoconfiguration.<br />

Submission page 374 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

12.2.7.6 Working with RADIUS Authentication<br />

When RADIUS authentication is active, the repeater or HE sends an <strong>Access</strong>-Request message to the RADIUS<br />

server, which checks if the <strong>MAC</strong> address corresponds to one that was accepted <strong>and</strong>, in that case, it responds with an<br />

<strong>Access</strong>-Accept message containing the profile number. Otherwise, the server replies with a RADIUS <strong>Access</strong>-<br />

Reject message <strong>and</strong> the authentication fails. If the authentication fails the slave will not join the BPL network.<br />

Once authentication is achieved, the slave is authorized <strong>and</strong> a QoS <strong>and</strong> VLAN/OVLAN configuration takes place<br />

between the master <strong>and</strong> slave. The master uses the profile number to get these parameters. The slave uses the<br />

parameters inside the downloaded auto-configuration file. The slave node downloads the file during its autoconfiguration<br />

process, after the RADIUS request on the master-side has been successful.<br />

12.2.7.7 Working without RADIUS Authentication<br />

If there is no RADIUS authentication, two ways of operation are possible.<br />

The first one is ‘NO AUTHENTICATION’. The master will configure a default QoS <strong>and</strong> VLAN/OVLAN<br />

configuration (the invited profile) for the slave.<br />

The other one is the use of an ‘AUTHORIZATION LIST’. With ‘ACCESSP_AUTHLIST_x’, up to 128 different<br />

users can be added with their related profiles. The user is searched for in that list, <strong>and</strong> if an entry matches with the<br />

new user, the QoS <strong>and</strong> VLAN/OVLAN configuration related to that entry is used for the new user. Otherwise, the<br />

user is rejected.<br />

12.2.8 DHCP Support<br />

12.2.8.1 DHCP Client<br />

The IEEE P1901 nodes perform a DHCP request with extended custom options. So not only the basic IP<br />

configuration (IP address, netmask <strong>and</strong> gateway) is requested, but the client also requests three custom options in<br />

order to obtain the auto-configuration file:<br />

• tftp-server-name: String with the IP address of the TFTP server.<br />

• extensions-path-name: String with the path <strong>and</strong> file name of the auto-configuration file inside the TFTP<br />

server.<br />

• PTTP-code: 32 bits integer that represents the PTTP behaviour:<br />

o 0: Boot without VLANs <strong>and</strong> skip PTTP.<br />

o 1: Keep on requesting PTTP (does nothing).<br />

o [2-4095]: Boot with Management VLAN = PTTP-code. Skip PTTP.<br />

Submission page 375 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

On the other h<strong>and</strong>, if the phone number has to be downloaded using DHCP, another custom option should be<br />

requested:<br />

• phone-number: Text with the phone number.<br />

12.2.8.2 DHCP Server<br />

A DHCP server that supports DHCP extensions is needed in order to provide the different IEEE P1901 nodes with<br />

the custom options requested.<br />

Warning: Although the two first custom options needed by the DHCP client are supposed to be st<strong>and</strong>ard,<br />

sometimes it is necessary to define the extensions-path-name option in the header of the dhcpd.conf file. The PTTPcode<br />

option is m<strong>and</strong>atory to define:<br />

option extensions-path-name code 18 = string;<br />

option PTTP-code code 120 = unsigned integer 32;<br />

It is also necessary to define the phone-number in the header of the dhcpd.conf file, if the phone number of some<br />

CPEs will be configured via DHCP:<br />

option phone-number code 135 = text;<br />

12.2.9 RADIUS Support<br />

Every IEEE P1901 master or repeater node may implement a RADIUS client in order to authenticate users (slaves)<br />

connected through the BPL to that node. The modem acts as a NAS, which requests authentication, gives<br />

authorization, <strong>and</strong> allocates resources.<br />

12.2.9.1 RADIUS Client<br />

The RADIUS client implemented in the IEEE P1901 nodes is configured through the auto-configuration file with<br />

three parameters:<br />

• RADIUS server IP address<br />

• RADIUS server UDP port<br />

• Shared secret password between client <strong>and</strong> server<br />

It also sends two RADIUS st<strong>and</strong>ard attributes within a RADIUS request:<br />

• <strong>MAC</strong> address of the slave trying to join the network as User name.<br />

Submission page 376 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• <strong>MAC</strong> address of the master as NAS-Identifier.<br />

12.3 Auto-configuration Parameters<br />

12.3.1 Parameter Types<br />

There are three types of parameters inside the auto-configuration file:<br />

1. Scalar: PARAMETER = value<br />

2. List: PARAMTER.index1 = value<br />

3. Table: PARAMETER.index1.index2 = value<br />

The first valid index for lists <strong>and</strong> tables is 1.<br />

12.3.2 Parameter Format<br />

The format of the parameters is:<br />

• PARAMETER_LABEL[.x][.y] = value<br />

for concrete parameter values<br />

• PARAMETER_LABEL[.x][.y] = %parametric_value<br />

for parametric parameter values<br />

For example, the following parameter could be inside an end-user auto-configuration file:<br />

• VLAN_DATA_TAG = 452<br />

or<br />

• VLAN_DATA_TAG = %DATA3<br />

In the second case, the parametric value must be translated to its correct value using the translation table.<br />

The following is a list with the syntax of the autoconfiguration parameters.<br />

It is important that the order in which these parameters appear in the auto-configuration file is preserved.<br />

Submission page 377 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

12.3.3 Auto-configuration parameter list<br />

12.3.3.1 General Parameters<br />

• GENERAL_USE_AUTOCONF = [YES | NO]<br />

o Parameter: YES enables autoconf, NO disables it.<br />

• GENERAL_TYPE = [HE | CPE | TDREPEATER]<br />

o Parameter: Possible values are: HE (Head End), CPE (Customer Premises Equipment) <strong>and</strong><br />

TDREPEATER (Time Division Repeater).<br />

• GENERAL_FW_TYPE = [MV | LV | EU]<br />

o Parameter: Possible values are: MV (<strong>Medium</strong> Voltage), LV (Low Voltage) <strong>and</strong> EU (End User).<br />

• GENERAL_SIGNAL_MODE = [1 … m]<br />

o Parameter: Configures the physical mode used by the modem. This value can reach from 1 to m,<br />

depending on the range of frequency used.<br />

• GENERAL_SIGNAL_MODE_LIST.i = [1 … m]<br />

o Parameter: This value can reach from 1 to m, depending on the range of frequency used.<br />

• GENERAL_AUTHENTICATION = [RADIUS | AUTHLIST | NONE]<br />

o Parameter: There are three possible values: RADIUS, ATHLIST <strong>and</strong> NONE. If RADIUS is<br />

selected, a RADIUS server will be in charge of accepting new users <strong>and</strong> assigning the profile. If<br />

AUTHLIST is selected, authentication will be done by checking a list provided in the autoconfiguration<br />

file. If NONE is selected, all the users will be accepted<br />

• GENERAL_STP = [YES | NO]<br />

o Parameter: Enables (YES) or disables (NO) the Spanning Tree Protocol in the node. Enabled by<br />

default.<br />

• GENERAL_COMMON_STP_EXTA = [YES | NO]<br />

o Parameter: Enables (YES) or disables (NO) the Common STP feature in the Ethernet interface A<br />

(EXTA).<br />

• GENERAL_COMMON_STP_EXTB = [YES | NO]<br />

o Parameter: Enables (YES) or disables (NO) the Common STP feature in the Ethernet interface B<br />

(EXTB).<br />

• GENERAL_IP_ADDRESS = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

Submission page 378 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• GENERAL_IP_NETMASK = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

• GENERAL_IP_GATEWAY = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

• GENERAL_IP_USE_DHCP = [YES | NO]<br />

o Parameter: If Yes DHCP is used, if NO DHCP is not used.<br />

12.3.3.2 AGC (Automatic Gain <strong>Control</strong>) Parameters<br />

• AGC_TX_GAIN = [0 | 1]<br />

o Parameter: Selecting 1, the default value, 12 dB are added to the reference gain. In case of 0 value,<br />

no extra gain is added (0 dB).<br />

• AGC_RX_ENABLE = [0 | 1]<br />

o Parameter: Enables (1) or disables (0) the hardware AGC.<br />

• AGC_RX_FIX_GAIN = [0 … 7]<br />

o Parameter: Eight values, from 0 to 7, are possible. Those values represent gains from 0 to 42 dB,<br />

respectively, added to the reference gain in steps of 6 dB.<br />

• AGC_MAX_RX_GAIN = [0 … 7]<br />

o Parameter: Eight values, from 0 to 7, are possible. Those values represent gains from 0 to 42 dB,<br />

respectively, added to the reference gain in steps of 6 dB. The default value is 7 (42 dB).<br />

• AGC_MIN_RX_GAIN = [0 … 7]<br />

o Parameter: Eight values, from 0 to 7, are possible. Those values represent gains from 0 to 42 dB,<br />

respectively, added to the reference gain in steps of 6 dB. The default value is 7 (42 dB).<br />

12.3.3.3 RADIUS Parameters<br />

• RADIUS_SERVER_IP = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

• RADIUS_SERVER_PORT = ddddd<br />

o Parameter: Port number<br />

Submission page 379 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• RADIUS_SHARED_SECRET = <br />

o Parameter: ‘shared_secret’ (string, limited to 16 characters, of the shared secret)<br />

12.3.3.4 Class of Service (CoS) Parameters<br />

• COS_CUSTOM_CRITERION_OFFSET.i = [1 … 531]<br />

o Parameter: Values from 1 to 531 are possible.<br />

• COS_CUSTOM_CRITERION_PATTERN.i = 0xXXXXXXXXXXXXXXXX<br />

o Parameter: The value must be specified with 16 hexadecimal digits.<br />

• COS_CUSTOM_CRITERION_BITMASK.i = 0xXXXXXXXXXXXXXXXX<br />

o Parameter: The value must be specified with 16 hexadecimal digits.<br />

• COS_CUSTOM_CRITERION_CLASSES_OFFSET.i = [1 … 531]<br />

o Parameter: Values from 1 to 531 are possible.<br />

• COS_CUSTOM_CRITERION_CLASSES_BITMASK.i i = 0xXXXXXXXXXXXXXXXX<br />

o Parameter: The value must be specified with 16 hexadecimal digits.<br />

• COS_CUSTOM_CRITERION_CLASSES_PATTERN.i.j i=0xXXXXXXXXXXXXXXXX<br />

o Parameter: The value must be specified with 16 hexadecimal digits<br />

• COS_CUSTOM_CRITERION_CLASSES_PRIO.i.j = [0 … 7]<br />

o Parameter: Values from 0 to 7 are allowed.<br />

• COS_CRITERION.k = [8021P | TOS | CUSTOM1 | CUSTOM2]<br />

o Parameter: There are two predefined criteria (8021P, based on IEEE 802.1p VLAN tag priority<br />

field, <strong>and</strong> TOS, based on IP type of service), <strong>and</strong> two custom criteria (CUSTOM1 <strong>and</strong> CUSTOM2),<br />

defined with the parameters above (COS_CUSTOM_CRITERION_xxx).<br />

• COS_DEFAULT_PRIO = [0 … 7]<br />

o Parameter: Values from 0 to 7 are allowed.<br />

12.3.3.5 Quality of Service (QoS) Parameters<br />

• QOS_ENABLE = [YES | NO]<br />

o Parameter: Enables (YES) or disables (NO) the quality of service in the node.<br />

• QOS_PRIOACK.prio+1 = [0 | 1]<br />

Submission page 380 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: This list enables (1) or disables (0) the <strong>Layer</strong> 2 ACK protocol depending on the<br />

priority level transmitted by the modem (priority levels: prio = 0 … 7).<br />

• QOS_PRIORSV.prio+1 = [CBR | VBR | BE]<br />

o Parameter: Type of reservation for each priority<br />

12.3.3.5.1 Slave Node Parameters (CPE)<br />

• QOS_UPBWLIMIT = [YES | NO]<br />

o Parameter: Enables (YES) or disables (NO) the transmission b<strong>and</strong>width limitation in a slave.<br />

• QOS_CLASSES.prio+1 = [VOIP | VIDEO | DATAH | DATAL]<br />

o Parameter: Sets the type of application for each service class<br />

12.3.3.5.2 Master Node Parameters (HE or REPEATER)<br />

• QOS_LATENCY_STEP = [20 … 400]<br />

o Parameter: Values in ms, from 20 to 400.<br />

• QOS_BW_POLICY = [0 | 1]<br />

o Parameter: A value of 0 corresponds to Fair mode, <strong>and</strong> 1 to Priority-based mode.<br />

• QOS_LATENCY.prio+1 = [1 | 2 | 4 | 8]<br />

o Parameter: Priority levels: prio = 0 … 7. Possible values are: 1, 2, 4 <strong>and</strong> 8.<br />

12.3.3.6 Profiles Parameters<br />

• PROFILE_MAX_TXPUT_TX.i = dddd (in kbps)<br />

o Parameter: Number of kbps)<br />

• PROFILE_MAX_TXPUT_RX.i = dddd (in kbps)<br />

o Parameter: Number of kbps)<br />

• PROFILE_PRIORITIES.i = [0x00-0xFF]<br />

o Parameter: ‘0xXX’ (hexadecimal number from 00 to FF)<br />

• PROFILE_MNMT_VLAN.i = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

• PROFILE_DATA_VLAN.i = [2-4093] | %<br />

Submission page 381 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

• PROFILE_VOIP_VLAN.i = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

• PROFILE_VLAN_ADD_TAG.i.j = [2-4093] or parametric<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

• PROFILE_VLAN_IS_ALLOWED_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to set the list as allowed) or ‘no’ (to set the list as forbidden)<br />

• PROFILE_VLAN_TAGGED_ONLY_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to drop input packets without VLAN tag) or ‘no’ (to not drop input packets<br />

without VLAN tag)<br />

• PROFILE_VLAN_OUTFORMAT_TAG_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to send packets with VLAN tag) or ‘no’ (to not send packets with VLAN tag)<br />

• PROFILE_OVLAN_ADD_TAG.i.j = [2-4094] or parametric<br />

o Parameter: Number from 2 to 4094 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

• PROFILE_OVLAN_IS_ALLOWED_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to mark the list as allowed) or ‘no’ (to mark the list as forbidden)<br />

• PROFILE_OVLAN_TAGGED_ONLY_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to drop input packets without OVLAN tag) or ‘no’ (to not drop input packets<br />

without OVLAN tag)<br />

• PROFILE_OVLAN_OUTFORMAT_TAG_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to send packets with OVLAN tag) or ‘no’ (to not send packets with OVLAN<br />

tag)<br />

• PROFILE_UPBWLIMIT.i = [YES|NO]<br />

o Parameter: ‘yes’ (to limit the upstream) or ‘no’ (to not limit the upstream)<br />

• PROFILE_DWBWLIMIT.i = [YES|NO]<br />

o Parameter: ‘yes’ (to limit the downstream) or ‘no’ (to not limit the downstream)<br />

12.3.3.7 Translation Table Parameters<br />

• TRANSLATION_MNMT_VLAN = [2-4093]<br />

Submission page 382 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: Number from 2 to 4093<br />

• TRANSLATION_DATA_VLAN.i = [2-4093]<br />

o Parameter: Number from 2 to 4093<br />

• TRANSLATION_VOIP_VLAN.i = [2-4093]<br />

o Parameter: Number from 2 to 4093<br />

• TRANSLATION_ROOTPATH_OVLAN = [2-4094]<br />

o Parameter: Number from 2 to 4094<br />

12.3.3.8 VLAN Parameters<br />

• VLAN_ENABLE = [yes|no]<br />

o Parameter: ‘yes’ (to enable VLAN use) or ‘no’ (to disable VLAN use)<br />

• VLAN_MNMT_TAG = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter name’ (parametric value preceded by a %)<br />

• VLAN_MNMT_PRIO = [0-7]<br />

o Parameter: Number from 0 to 7<br />

• VLAN_DATA_TAG = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

• VLAN_DATA_PRIO = [0-6]<br />

o Parameter: Number from 0 to 6<br />

• VLAN_VOIP_TAG = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name‘ (parametric value preceded by a %)<br />

• VLAN_VOIP_PRIO = [0-7]<br />

o Parameter: Number from 0 to 7<br />

• VLAN_VSIG_PRIO = [0-7]<br />

o Parameter: Number from 0 to 7<br />

• VLAN_TRUNK.i = [2-4093]<br />

o Parameter: Number from 2 to 4093<br />

Submission page 383 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• VLAN_RETAG_EXTA_SRC = [0 | 2-4095]<br />

o Parameter: ‘0’ (in order to disable retagging in interface) or Number from 2 to 4095.<br />

• VLAN_RETAG_EXTA_DST = [0 | 2-4095]<br />

o Parameter: ‘0’ (in order to disable retagging in interface) or Number from 2 to 4095<br />

• VLAN_RETAG_EXTB_SRC = [0 | 2-4095]<br />

o Parameter: ‘0’ (in order to disable retagging in interface) or Number from 2 to 4095<br />

• VLAN_RETAG_EXTB_DST = [0 | 2-4095]<br />

o Parameter: ‘0’ (in order to disable retagging in interface) or Number from 2 to 4095<br />

12.3.3.9 OVLAN Parameters<br />

• OVLAN_ENABLE = [yes|no]<br />

o Parameter: ‘yes’ (to enable OVLAN use) or ‘no’ (to disable OVLAN use)<br />

• OVLAN_DATA_TAG = [2-4094] | %ROOTPATH_OVLAN<br />

o Parameter: Number from 2 to 4093 or ‘%ROOTPATH_OVLAN’ (use the OVLAN Rootpath<br />

value)<br />

• OVLAN_TRUNK.i = [2-4094]<br />

o Parameter: Number from 2 to 4094<br />

12.3.3.10 <strong>Access</strong> Protocol Parameters<br />

• AP_MIN_NUMBER_HOPS = [0|1|…]<br />

o Parameter: Number from 0<br />

• AP_FORBID_MASTER.i = 0xXXXXXXXXXXXX<br />

o Parameter: ‘0xXXXXXXXXXXXX’ (<strong>MAC</strong> address of forbidden master)<br />

• AP_PREFER_MASTER = 0xXXXXXXXXXXXX<br />

o Parameter: ‘0xXXXXXXXXXXXX’ (<strong>MAC</strong> address of preferred master)<br />

• AP_FIX_MASTER = ‘0xXXXXXXXXXXXX’<br />

o Parameter: 0xXXXXXXXXXXXX (<strong>MAC</strong> address of fixed master)<br />

• AP_CHECK_BEST_MASTER_ENABLE = [yes|no]<br />

Submission page 384 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: ‘yes’ (to enable checking of best master periodically after connecting with one) or ‘no’<br />

(to disable the checking of better masters after connecting to one).<br />

• AP_CHECK_BEST_MASTER_PERIOD = <br />

o Parameter: Number of minutes<br />

• AP_CURRENT_MASTER_MIN_BPS = <br />

o Parameter: Number of bits per symbol<br />

• AP_NEW_MASTER_MIN_BPS = <br />

o Parameter: Number of bits per symbol<br />

• ACCESSP_AUTHLIST_<strong>MAC</strong>.i = 0xXXXXXXXXXXXX<br />

o Parameter: ‘0xXXXXXXXXXXXX’ (<strong>MAC</strong> address authorized to connect)<br />

• ACCESSP_AUTHLIST_PROFILE.i = [1-16]<br />

o Parameter: Number of the profile related to a <strong>MAC</strong> authorized<br />

• ACCESSP_AUTHLIST_FWTYPE.i = [MV|LV|EU]<br />

o Parameter: ‘MV’ (medium voltage) or ‘LV’ (low voltage) or ‘EU’ (End User)<br />

12.3.3.11 STP Parameters<br />

• STP_PRIO = [0 … 65535]<br />

o Parameter: Valid values range from 0 to 65535.<br />

• STP_PORT.i = [EXTA | EXTB | BPL]<br />

o Parameter: Three possible values: EXTA, EXTB <strong>and</strong> BPL (i = 1,2 or 3).<br />

• STP_PORT_PRIO.i = [0 … 255]<br />

o Parameter: Valid values range from 0 to 255 (i = 1,2 or 3).<br />

• STP_PORT_COST.i = [0 … 4294967295]<br />

o Parameter: Valid values range from 0 to 4294967295 (i = 1,2 or 3).<br />

• STP_HELLO_TIME = [10 … 40]<br />

o Parameter: Valid values range from 10 to 40.<br />

• STP_MAX_AGE = [10 … 40]<br />

o Parameter: Valid values range from 10 to 40.<br />

Submission page 385 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• STP_FORWARD_DELAY = [40 … 300]<br />

o Parameter: Valid values range from 40 to 300.<br />

• STP_FRONTIER = [EXTA | EXTB | NONE]<br />

o Parameter: Valid values are: EXTA (Ethernet interface A), EXTB (Ethernet interface B) <strong>and</strong><br />

NONE (Spanning Tree Frontier disabled).<br />

• STP_MODE = [STP | RSTP]<br />

o Parameter: Possible values: STP selects STP or RSTP selects RSTP.<br />

12.3.3.12 VoIP Parameters<br />

• VOIP_ENABLE = [ENABLED | DISABLED]<br />

o Parameter: This parameter enables (ENABLED) or disables (DISABLED) the VoIP service.<br />

• VOIP_GATEKEEPERIP = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

• VOIP_LINE1NUMBER = number<br />

o Parameter: This parameter is a string (maximum string length is 20 characters) (e.g.<br />

“VOIP_LINE1NUMBER = 612345678”).<br />

• VOIP_DIALPLAN = ([0 … 9, ‘T’, ‘X’, ‘.’, ‘|’])<br />

o Parameter: This parameter is a string with maximum length is 200 characters (e.g.<br />

“VOIP_DIALPLAN = (9XXXXXXXX|6XXXXXXXX|00X.T)”.<br />

• VOIP_INBANDDTMF = [ENABLED | DISABLED]<br />

o Parameter: This parameter enables (ENABLED) or disables (DISABLED) in-b<strong>and</strong> DTMF feature.<br />

• VOIP_OUTOFBANDDTMF = [ENABLED | DISABLED]<br />

o Parameter: This parameter enables (ENABLED) or disables (DISABLED) out-of-b<strong>and</strong> DTMF<br />

feature.<br />

• VOIP_KEYPADTYPE = [KEYPADTYPE_NONE | KEYPADTYPE_H225 |<br />

KEYPADTYPE_H245ALPHANUMERIC | KEYPADTYPE_H245SIGNAL |<br />

KEYPADTYPE_RFC2833]<br />

o Parameter: This parameter is a string (up to 30 characters). Valid values are the following:<br />

o KEYPADTYPE_H225: H.225/Q.931 User Info field (Keypad facility information element)<br />

Submission page 386 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o KEYPADTYPE_H245ALPHANUMERIC: H.245 User Input Indication (UII) Alphanumeric<br />

message<br />

o KEYPADTYPE_H245SIGNAL: H.245 User Input Indication (UII) Signal Type message<br />

o KEYPADTYPE_RFC2833: RTP stream as defined in RFC 2833<br />

o KEYPADTYPE_NONE: no out-of-b<strong>and</strong> signalling<br />

• VOIP_CALLSIGPORT1 = [1025 … 65530]<br />

o Parameter: Valid values range from 1025 to 65530.<br />

• VOIP_G711USS = [YES | NO]<br />

o Parameter: Selects whether silence suppression for G.711 μ-law is enabled (YES) or not (NO).<br />

• VOIP_G711UPACK = [2 … 4]<br />

o Parameter: Valid values range from 2 (20 ms) to 4 (40 ms).<br />

• VOIP_G711ASS = [YES | NO]<br />

o Parameter: Selects whether silence suppression for G.711 A-law is enabled (YES) or not (NO).<br />

• VOIP_G711APACK = [2 … 4]<br />

o Parameter: Valid values range from 2 (20 ms) to 4 (40 ms).<br />

• VOIP_JB_TYPE = [FIXED | ADAPTIVE]<br />

o Parameter: Selects either adaptive (ADAPTIVE) or fixed (FIXED) jitter buffer.<br />

• VOIP_FJB_DELAY = [1 … 10] * 10<br />

o Parameter: Valid values range from 10 to 100 ms.<br />

• VOIP_AJB_MAXDELAY = [1 … 19] * 10<br />

o Parameter: Valid values range from 10 to 190 ms.<br />

• VOIP_G729ON = [YES | NO]<br />

o Parameter: Selects whether G.729 codec is enabled (YES) or not (NO).<br />

• VOIP_G729SS = [YES | NO]<br />

o Parameter: Selects whether G.729 silence enabled is supported (YES) or not (NO).<br />

• VOIP_G729PACK = [2 … 4]<br />

o Parameter: Valid values range from 2 (20 ms) to 4 (40 ms).<br />

Submission page 387 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• VOIP_ALTERNATEGK = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) alternate gatekeeper feature for H.323.<br />

• VOIP_ALTGKIP = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

• VOIP_GKDISCOVERY = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) gatekeeper discovery feature for H.323.<br />

• VOIP_FULLRRQ1 = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) full gatekeeper registration request for<br />

H.323.<br />

• VOIP_TIMETOLIVE = [≥ 60]<br />

o Parameter: The minimum valid value is 60 seconds.<br />

• VOIP_FASTCONNECT = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) fast connect signalling feature for<br />

H.323.<br />

• VOIP_H245TUNNEL = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) H.245 tunnelling signalling feature for<br />

H.323.<br />

• VOIP_COUNTRY = [XX | ES | PT | GB | JP | FR | SG | RU | AU]<br />

o Parameter: This parameter is a string (up to 20 characters). Valid values are: The USA (XX), Spain<br />

(ES), Portugal (PT), The United Kingdom (GB), Japan (JP), France (FR), Singapore (SG), Russia<br />

(RU) <strong>and</strong> Australia (AU). The default country is Spain (ES).<br />

• VOIP_TONE_DIALTONE = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />

o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_DIALTONE =<br />

425@-10#ON”).<br />

• VOIP_TONE_NETWORKBUSY = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />

o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_BUSY = 425@-<br />

10#ON(200),OFF(200),R”).<br />

• VOIP_TONE_BUSY = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />

o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_BUSY = 425@-<br />

10#ON(200),OFF(200),R”).<br />

Submission page 388 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• VOIP_TONE_RINGBACK = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />

o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_RINGBACK =<br />

425@-10#ON(1500),OFF(3000),R”).<br />

• VOIP_RTP_TOS = 0xXX<br />

o Parameter: value must be specified with 2 hexadecimal digits.<br />

• VOIP_CALLSIG_TOS 0xXX<br />

o Parameter: value must be specified with 2 hexadecimal digits.<br />

12.3.3.13 NTP Parameters<br />

• NTP_ENABLE = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) the NTP feature.<br />

• NTP_SERVER_IP = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

• NTP_TIMEZONE = [-12 … 12] * 60<br />

o Parameter: This value must be specified in minutes (in 60-minute steps) relative to Universal<br />

Time (UT). A value of 0 corresponds to UT.<br />

• NTP_DST = [YES | NO]<br />

o Parameter: If the value is YES, the time correction for daylight savings time is applied. Not<br />

applied if NO.<br />

12.3.3.14 Custom VLAN/OVLAN Parameters<br />

• USE_CUSTOM_VLAN_OVLAN = [yes/no]<br />

o Parameter: ‘yes’ (to enable the custom VLAN/OVLAN use) or ‘no’ (to disable the custom<br />

VLAN/OVLAN use)<br />

• VLAN_TAGGED_ONLY_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to enable tag only in interface root) or ‘no’ (to disable tag only in interface root)<br />

• VLAN_TAGGED_ONLY_IFACE_EXTA = [yes/no]<br />

o Parameter: ‘yes’ (to enable tag only in Ethernet A) or ‘no’ (to disable tag only in Ethernet A)<br />

• VLAN_TAGGED_ONLY_IFACE_EXTB = [yes/no]<br />

o Parameter: ‘yes’ (to enable tag only in Ethernet B) or ‘no’ (to disable tag only in Ethernet B)<br />

Submission page 389 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• VLAN_TAGGED_ONLY_IFACE_PL_X = [yes/no]<br />

Being X from 0 to 128<br />

o Parameter: ‘yes’ (to enable tag only in BPL ports) or ‘no’ (to disable tag only in BPL ports)<br />

• VLAN_OUTFORMAT_TAG_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to tag output in root interface) or ‘no’ (to disable tag output in root interface)<br />

• VLAN_OUTFORMAT_TAG_IFACE_EXTA = [yes/no]<br />

o Parameter: ‘yes’ (to tag output in Ethernet A) or ‘no’ (to disable tag output in Ethernet A)<br />

• VLAN_OUTFORMAT_TAG_IFACE_EXTB = [yes/no]<br />

o Parameter: ‘yes’ (to tag output in Ethernet B) or ‘no’ (to disable tag output in Ethernet B)<br />

• VLAN_OUTFORMAT_TAG_IFACE_PL_X = [yes/no]<br />

Being X from 0 to 128<br />

o Parameter: ‘yes’ (to tag output in BPL ports) or ‘no’ (to disable tag output in BPL ports)<br />

• VLAN_PVID_PL = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• VLAN_PVID_EXTA = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• VLAN_PVID_EXTB = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• VLAN_PVID_FW = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• VLAN_DEFAULT_PRIO_PL_X = [0-7]<br />

Being X from 0 to 128<br />

o Parameter: Number from 0 to 7<br />

• VLAN_DEFAULT_PRIO_EXTA = [0-7]<br />

o Parameter: Number from 0 to 7<br />

• VLAN_DEFAULT_PRIO_EXTB = [0-7]<br />

Submission page 390 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: Number from 0 to 7<br />

• VLAN_DEFAULT_PRIO_FW = [0-7]<br />

o Parameter: Number from 0 to 7<br />

• VLAN_IS_ALLOWED_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />

• VLAN_LIST_IFACE_ROOT.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• VLAN_IS_ALLOWED_IFACE_EXTA = [yes/no]<br />

o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />

• VLAN_LIST_IFACE_EXTA.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• VLAN_IS_ALLOWED_IFACE_EXTB = [yes/no]<br />

o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />

• VLAN_LIST_IFACE_EXTB.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• VLAN_IS_ALLOWED_IFACE_PL_X = [yes/no]<br />

Being X from 0 to 128<br />

o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />

• VLAN_LIST_IFACE_PL_Xi = [2-4095]<br />

Being X from 0 to 128<br />

o Parameter: Number from 2 to 4095<br />

• OVLAN_TAGGED_ONLY_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to accept only tagged packets at root interface) or ‘no’ (to accept any packet at<br />

root interface)<br />

• OVLAN_TAGGED_ONLY_IFACE_PL_X= [yes/no]<br />

Being X from 0 to 128<br />

Submission page 391 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: ‘yes’ (to accept only tagged packets at BPL ports) or ‘no’ (to accept any packet at BPL<br />

ports)<br />

• OVLAN_OUTFORMAT_TAG_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to introduce a tag in output packets at root interface) or ‘no’ (to not introduce a<br />

tag in output packets at root interface)<br />

• OVLAN_OUTFORMAT_TAG_IFACE_PL_X = [yes/no]<br />

Being X from 0 to 128<br />

o Parameter: ‘yes’ (to introduce a tag in output packets at BPL ports) or ‘no’ (to not introduce a tag<br />

in output packets at BPL ports)<br />

• OVLAN_POVID_PL_X = [2-4095]<br />

Being X from 0 to 128<br />

o Parameter: Number from 2 to 4095<br />

• OVLAN_POVID_EXTA = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• OVLAN_POVID_EXTB = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• OVLAN_POVID_FW = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• OVLAN_IS_ALLOWED_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to set the root interface list as allowed) or ‘no’ (to set the root interface list as<br />

forbidden)<br />

• OVLAN_LIST_IFACE_ROOT.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• OVLAN_IS_ALLOWED_IFACE_EXTA = [yes/no]<br />

o Parameter: ‘yes’ (to set the Ethernet A interface list as allowed) or ‘no’ (to set the Ethernet A<br />

interface list as forbidden)<br />

• OVLAN_LIST_IFACE_EXTA.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• OVLAN_IS_ALLOWED_IFACE_EXTB = [yes/no]<br />

Submission page 392 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: ‘yes’ (to set the Ethernet B interface list as allowed) or ‘no’ (to set the Ethernet B<br />

interface list as forbidden)<br />

• OVLAN_LIST_IFACE_EXTB.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• OVLAN_IS_ALLOWED_IFACE_PL_X = [yes/no]<br />

Being X from 0 to 128<br />

o Parameter: ‘yes’ (to set the Ethernet B interface list as allowed) or ‘no’ (to set the Ethernet B<br />

interface list as forbidden)<br />

• OVLAN_LIST_IFACE_PL_X.i = [2-4095]<br />

Being X from 0 to 128<br />

o Parameter: Number from 2 to 4095<br />

12.3.3.15 SNMP parameters<br />

• SNMP_TRAP_IP_ADDRESS = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

• SNMP_TRAP_COMMUNITY_NAME = community<br />

o Parameter: This parameter is a string (up to 25 characters) (e.g.<br />

“SNMP_TRAP_COMMUNITY_NAME = public”).<br />

Submission page 393 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

ANNEX A MIB DEFINITION IN ASN.1 FORMAT (NORMATIVE)<br />

BPL-DEVICE-MIB DEFINITIONS ::= BEGIN<br />

IMPORTS<br />

NetworkAddress, IpAddress, Counter, Gauge, TimeTicks,<br />

enterprises<br />

STATUS,<br />

PhysAddress,<br />

OBJECT-TYPE,<br />

FROM RFC1155-SMI<br />

FROM RFC-1212<br />

FROM SNMPv2-SMI<br />

FROM RFC1213-MIB;<br />

iso OBJECT IDENTIFIER ::= { 1 }<br />

org OBJECT IDENTIFIER ::= { iso 3 }<br />

dod OBJECT IDENTIFIER ::= { org 6 }<br />

internet OBJECT IDENTIFIER ::= { dod 1 }<br />

private OBJECT IDENTIFIER ::= { internet 4 }<br />

enterprises OBJECT IDENTIFIER ::= { private 1 }<br />

IEEE P1901 OBJECT IDENTIFIER ::= { enterprises 20804 }<br />

v1 OBJECT IDENTIFIER ::= { IEEE P1901 1 }<br />

--<br />

Submission page 394 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

-- Object definition<br />

--<br />

-- Groups in v1 tree<br />

plSystem OBJECT IDENTIFIER ::= {v1 1}<br />

plBasic OBJECT IDENTIFIER ::= {v1 2}<br />

plPhy OBJECT IDENTIFIER ::= {v1 3}<br />

pl<strong>MAC</strong> OBJECT IDENTIFIER ::= {v1 4}<br />

plQoS OBJECT IDENTIFIER ::= {v1 5}<br />

plStatistics OBJECT IDENTIFIER ::= {v1 7}<br />

plTraps OBJECT IDENTIFIER ::= {v1 8}<br />

plStp OBJECT IDENTIFIER ::= {v1 10}<br />

plSecurity OBJECT IDENTIFIER ::= {v1 11}<br />

--<br />

-- Groups definition<br />

--<br />

--<br />

-- The plSystem Group<br />

--<br />

plSystemTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plSystemEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

Submission page 395 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

DESCRIPTION "Generic information about the IEEE P1901 system."<br />

::= { plSystem 1 }<br />

plSystemEntry OBJECT-TYPE<br />

SYNTAX plSystemEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION "System information gathered per card."<br />

INDEX { plSysCard }<br />

::= { plSystemTable 1 }<br />

plSystemEntry ::= SEQUENCE { plSysCard INTEGER,<br />

plSysNodeType INTEGER,<br />

plSysNodeMode INTEGER,<br />

plSysFWVersion IA5String (SIZE(0..128)),<br />

plSysHWVersion IA5String (SIZE(0..128)),<br />

plSysReset INTEGER,<br />

plSysFactoryReset INTEGER,<br />

plSysUseDHCP INTEGER,<br />

plSysStaticIPAddress IpAddress,<br />

plSysStaticNetMask IpAddress,<br />

plSysStaticDefaultGW IpAddress,<br />

plSysSaveAsPermanent INTEGER,<br />

plSysConfUpload IA5String (SIZE (0..256)),<br />

plSysConfDownload IA5String (SIZE (0..256)),<br />

plSysUpdateStatus INTEGER,<br />

plSysUpdate IA5String (SIZE(0..256)),<br />

Submission page 396 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plSysCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plSystemEntry 1 }<br />

plSysNodeType OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

}<br />

plSysDNSIPAddress IpAddress,<br />

plSysSnmpROComunityName DisplayString (SIZE(0..31)),<br />

plSysSnmpRWComunityName DisplayString (SIZE(0..31)),<br />

plSysSnmpTrapDest IpAddress<br />

DESCRIPTION "Node type: master -> 0<br />

::= { plSystemEntry 2 }<br />

plSysNodeMode OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

slave -> 1<br />

repeater -> 2"<br />

DESCRIPTION "Node mode: access -> 0<br />

Submission page 397 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

::= { plSystemEntry 3 }<br />

plSysFWVersion OBJECT-TYPE<br />

in-home -> 1<br />

medium-voltage -> 2"<br />

SYNTAX IA5String (SIZE(0..128))<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Firmware version"<br />

::= { plSystemEntry 5 }<br />

plSysHWVersion OBJECT-TYPE<br />

SYNTAX IA5String (SIZE(0..128))<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Hardware version"<br />

::= { plSystemEntry 6 }<br />

plSysReset OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "System reset"<br />

::= { plSystemEntry 7 }<br />

plSysFactoryReset OBJECT-TYPE<br />

SYNTAX INTEGER<br />

Submission page 398 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Restore factory parameters"<br />

::= { plSystemEntry 8 }<br />

plSysUseDHCP OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Use DHCP (1) or a fixed IP, netmask <strong>and</strong> gateway (0) instead"<br />

::= { plSystemEntry 9 }<br />

plSysStaticIPAddress OBJECT-TYPE<br />

SYNTAX IpAddress<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Default IP address if DHCP is disabled"<br />

::= { plSystemEntry 10 }<br />

plSysStaticNetMask OBJECT-TYPE<br />

SYNTAX IpAddress<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Default netmask if DHCP is disabled"<br />

::= { plSystemEntry 11 }<br />

plSysStaticDefaultGW OBJECT-TYPE<br />

SYNTAX IpAddress<br />

ACCESS read-write<br />

Submission page 399 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

STATUS current<br />

DESCRIPTION "Default gateway if DHCP is disabled"<br />

::= { plSystemEntry 12 }<br />

plSysSaveAsPermanent OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Saves changed objects as permanent"<br />

::= { plSystemEntry 14 }<br />

plSysConfUpload OBJECT-TYPE<br />

SYNTAX IA5String (SIZE(0..256))<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Uploads node local configuration to a server"<br />

::= { plSystemEntry 15 }<br />

plSysConfDownload OBJECT-TYPE<br />

SYNTAX IA5String (SIZE(0..256))<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Forces a configuration file download"<br />

::= { plSystemEntry 16 }<br />

plSysUpgradeStatus OBJECT-TYPE<br />

Submission page 400 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Status of the current upgrade: finished KO -> 0<br />

::= { plSystemEntry 19 }<br />

plSysUpdate OBJECT-TYPE<br />

SYNTAX IA5String (SIZE(0..256))<br />

ACCESS read-write<br />

STATUS current<br />

finished OK -> 1<br />

busy (in progress) -> 2"<br />

DESCRIPTION "Updates the selected flash section of a modem"<br />

::= { plSystemEntry 30 }<br />

plSysDNSIPAddress OBJECT-TYPE<br />

SYNTAX IpAddress<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "IP address of the DNS"<br />

::= { plSystemEntry 31 }<br />

plSysSnmpROComunityName OBJECT-TYPE<br />

SYNTAX DisplayString (SIZE(0..31))<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Community Name string”<br />

Submission page 401 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

--<br />

::= { plSystemEntry 32 }<br />

plSysSnmpRWComunityName OBJECT-TYPE<br />

SYNTAX DisplayString (SIZE(0..31))<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Community Name string”<br />

::= { plSystemEntry 33 }<br />

plSysSnmpTrapDest OBJECT-TYPE<br />

SYNTAX IpAddress<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Trap destination IP address”<br />

::= { plSystemEntry 34 }<br />

-- The plBasic Group<br />

--<br />

plBasicTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plBasicEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

::= { plBasic 1 }<br />

Submission page 402 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plBasicEntry OBJECT-TYPE<br />

SYNTAX plBasicEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { plBasicCard }<br />

::= { plBasicTable 1 }<br />

plBasicEntry ::= SEQUENCE { plBasicCard INTEGER,<br />

plBasicCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

}<br />

plBasicMode INTEGER,<br />

plBasicCentralFrequency INTEGER,<br />

plBasicB<strong>and</strong>width INTEGER,<br />

plBasicSearchModes IA5String,<br />

plBasicTXAGCEnable INTEGER,<br />

plBasicRXAGCEnable INTEGER,<br />

plBasicTXAGCGain INTEGER,<br />

plBasicRXAGCGain INTEGER,<br />

plBasicTXPowerMaskLB OCTET STRING (SIZE(769)),<br />

plBasicTXPowerMaskHB OCTET STRING (SIZE(769)),<br />

plBasicMaster<strong>MAC</strong> PhysAddress<br />

Submission page 403 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

DESCRIPTION "Node card number"<br />

::= { plBasicEntry 1 }<br />

plBasicMode OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "<strong>Physical</strong> mode (1..M)"<br />

::= { plBasicEntry 2 }<br />

plBasicCentralFrequency OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "B<strong>and</strong> Central Frequency in MHz"<br />

::= { plBasicEntry 3 }<br />

plBasicB<strong>and</strong>width OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Working Node B<strong>and</strong>width in MHz"<br />

::= { plBasicEntry 4 }<br />

plBasicSearchModes OBJECT-TYPE<br />

SYNTAX IA5String<br />

ACCESS read-write<br />

Submission page 404 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

STATUS current<br />

DESCRIPTION "List of modes used for searching"<br />

::= { plBasicEntry 5 }<br />

plBasicTXAGCEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "TX AGC: Enabled -> 1<br />

::= { plBasicEntry 6 }<br />

plBasicRXAGCEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

Disabled -> 0"<br />

DESCRIPTION "RX AGC: Enabled -> 1<br />

::= { plBasicEntry 7 }<br />

plBasicTXAGCGain OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "TX AGC Gain"<br />

::= { plBasicEntry 8 }<br />

Disabled -> 0"<br />

Submission page 405 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plBasicRXAGCGain OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "RX AGC Gain"<br />

::= { plBasicEntry 9 }<br />

plBasicTXPowerMaskLB OBJECT-TYPE<br />

SYNTAX OCTET STRING ( SIZE ( 769 ) )<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Low half Powermask"<br />

::= { plBasicEntry 10 }<br />

plBasicTXPowerMaskHB OBJECT-TYPE<br />

SYNTAX OCTET STRING ( SIZE ( 769 ) )<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "High half Powermask"<br />

::= { plBasicEntry 11 }<br />

plBasicMaster<strong>MAC</strong> OBJECT-TYPE<br />

SYNTAX PhysAddress<br />

ACCESS read-only<br />

Submission page 406 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

--<br />

STATUS current<br />

DESCRIPTION "<strong>MAC</strong> address of the master of current node"<br />

::= { plBasicEntry 12 }<br />

-- The plPhy Group<br />

--<br />

-- plPhyBy<strong>MAC</strong> Table<br />

plPhyBy<strong>MAC</strong>Table OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plPhyBy<strong>MAC</strong>Entry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION "<strong>Physical</strong> parameters"<br />

::= { plPhy 1 }<br />

plPhyBy<strong>MAC</strong>Entry OBJECT-TYPE<br />

SYNTAX plPhyBy<strong>MAC</strong>Entry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { plPhyBy<strong>MAC</strong>Card, plPhyBy<strong>MAC</strong><strong>MAC</strong> }<br />

::= { plPhyBy<strong>MAC</strong>Table 1 }<br />

plPhyBy<strong>MAC</strong>Entry ::= SEQUENCE { plPhyBy<strong>MAC</strong>Card INTEGER,<br />

plPhyBy<strong>MAC</strong><strong>MAC</strong> PhysAddress,<br />

plPhyBy<strong>MAC</strong>TXBPC OCTET STRING (SIZE(769)),<br />

plPhyBy<strong>MAC</strong>TXBPCAggregated INTEGER,<br />

Submission page 407 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plPhyBy<strong>MAC</strong>Card OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plPhyBy<strong>MAC</strong>Entry 1 }<br />

plPhyBy<strong>MAC</strong><strong>MAC</strong> OBJECT-TYPE<br />

SYNTAX PhysAddress<br />

ACCESS read-only<br />

STATUS current<br />

}<br />

plPhyBy<strong>MAC</strong>RXBPC OCTET STRING (SIZE(769)),<br />

plPhyBy<strong>MAC</strong>RXBPCAggregated INTEGER,<br />

plPhyBy<strong>MAC</strong>RXSNR OCTET STRING (SIZE(769)),<br />

plPhyBy<strong>MAC</strong>RXCFR OCTET STRING (SIZE(769)),<br />

plPhyBy<strong>MAC</strong>TXPhySpeed INTEGER,<br />

plPhyBy<strong>MAC</strong>RXPhySpeed INTEGER,<br />

plPhyBy<strong>MAC</strong>ACK INTEGER,<br />

plPhyBy<strong>MAC</strong>Cipher INTEGER,<br />

plPhyBy<strong>MAC</strong>TXHURTO INTEGER,<br />

plPhyBy<strong>MAC</strong>RXHURTO INTEGER,<br />

plPhyBy<strong>MAC</strong>IsActive INTEGER,<br />

plPhyBy<strong>MAC</strong>RXTimeLastActivity INTEGER<br />

Submission page 408 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

DESCRIPTION "<strong>MAC</strong> Address"<br />

::= { plPhyBy<strong>MAC</strong>Entry 2 }<br />

plPhyBy<strong>MAC</strong>TXBPC OBJECT-TYPE<br />

SYNTAX OCTET STRING ( SIZE ( 769 ) )<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "BPC in transmission for the low half b<strong>and</strong>"<br />

::= { plPhyBy<strong>MAC</strong>Entry 3 }<br />

plPhyBy<strong>MAC</strong>TXBPCAggregated OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "BPC Aggregated in transmission"<br />

::= { plPhyBy<strong>MAC</strong>Entry 5 }<br />

plPhyBy<strong>MAC</strong>RXBPC OBJECT-TYPE<br />

SYNTAX OCTET STRING ( SIZE ( 769 ) )<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "BPC in reception for the low half b<strong>and</strong>"<br />

::= { plPhyBy<strong>MAC</strong>Entry 6 }<br />

plPhyBy<strong>MAC</strong>RXBPCAggregated OBJECT-TYPE<br />

Submission page 409 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "BPC Aggregated in reception"<br />

::= { plPhyBy<strong>MAC</strong>Entry 8 }<br />

plPhyBy<strong>MAC</strong>RXSNR OBJECT-TYPE<br />

SYNTAX OCTET STRING ( SIZE ( 769 ) )<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Measured SNR"<br />

::= { plPhyBy<strong>MAC</strong>Entry 9 }<br />

plPhyBy<strong>MAC</strong>RXCFR OBJECT-TYPE<br />

SYNTAX OCTET STRING ( SIZE ( 769 ) )<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Measured CFR"<br />

::= { plPhyBy<strong>MAC</strong>Entry 10 }<br />

plPhyBy<strong>MAC</strong>TXPhySpeed OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "<strong>Physical</strong> speed in transmission"<br />

::= { plPhyBy<strong>MAC</strong>Entry 11 }<br />

Submission page 410 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plPhyBy<strong>MAC</strong>RXPhySpeed OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "<strong>Physical</strong> speed in reception"<br />

::= { plPhyBy<strong>MAC</strong>Entry 12 }<br />

plPhyBy<strong>MAC</strong>ACK OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "ACK enabled"<br />

::= { plPhyBy<strong>MAC</strong>Entry 13 }<br />

plPhyBy<strong>MAC</strong>Cipher OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Cipher enabled"<br />

::= { plPhyBy<strong>MAC</strong>Entry 14 }<br />

plPhyBy<strong>MAC</strong>TXHURTO OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "HURTO mode in transmission"<br />

::= { plPhyBy<strong>MAC</strong>Entry 15 }<br />

Submission page 411 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plPhyBy<strong>MAC</strong>RXHURTO OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "HURTO mode in reception"<br />

::= { plPhyBy<strong>MAC</strong>Entry 16 }<br />

plPhyBy<strong>MAC</strong>IsActive OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Checks if the node is active or not"<br />

::= { plPhyBy<strong>MAC</strong>Entry 17 }<br />

plPhyBy<strong>MAC</strong>RXTimeLastActivity OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Time since last BPL activity"<br />

::= { plPhyBy<strong>MAC</strong>Entry 18 }<br />

-- plPhyRXSNRThreshold Table<br />

plPhyRXSNRThresholdTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plPhyRXSNRThresholdEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

Submission page 412 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

::= { plWiscPhy 2 }<br />

plPhyRXSNRThresholdEntry OBJECT-TYPE<br />

SYNTAX plPhyRXSNRThresholdEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { plPhyRXSNRThresholdCard, plPhyRXSNRThresholdIndex }<br />

::= { plPhyRXSNRThresholdTable 1 }<br />

plPhyRXSNRThresholdEntry ::= SEQUENCE { plPhyRXSNRThresholdCard INTEGER,<br />

plPhyRXSNRThresholdCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plPhyRXSNRThresholdEntry 1 }<br />

plPhyRXSNRThresholdIndex OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS not-accessible<br />

STATUS current<br />

plPhyRXSNRThresholdIndex INTEGER,<br />

plPhyRXSNRThreshold INTEGER<br />

DESCRIPTION "SNR threshold value index (1..10)"<br />

}<br />

Submission page 413 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

--<br />

::= { plPhyRXSNRThresholdEntry 2 }<br />

plPhyRXSNRThreshold OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "SNR threshold value"<br />

::= { plPhyRXSNRThresholdEntry 3 }<br />

-- The pl<strong>MAC</strong> Group<br />

--<br />

-- pl<strong>MAC</strong> Table<br />

pl<strong>MAC</strong>Table OBJECT-TYPE<br />

SYNTAX SEQUENCE OF pl<strong>MAC</strong>Entry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

::= { pl<strong>MAC</strong> 1 }<br />

pl<strong>MAC</strong>Entry OBJECT-TYPE<br />

SYNTAX pl<strong>MAC</strong>Entry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { pl<strong>MAC</strong>Card }<br />

Submission page 414 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

::= { pl<strong>MAC</strong>Table 1 }<br />

pl<strong>MAC</strong>Entry ::= SEQUENCE { pl<strong>MAC</strong>Card INTEGER,<br />

pl<strong>MAC</strong>Card OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { pl<strong>MAC</strong>Entry 1 }<br />

pl<strong>MAC</strong><strong>Access</strong>Protocol OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

}<br />

pl<strong>MAC</strong><strong>Access</strong>Protocol INTEGER,<br />

pl<strong>MAC</strong>NumConnectedNodes INTEGER,<br />

pl<strong>MAC</strong>NumSlaves INTEGER<br />

DESCRIPTION "Autodiscovery mode enabled"<br />

::= { pl<strong>MAC</strong>Entry 2 }<br />

pl<strong>MAC</strong>NumConnectedNodes OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Number of nodes with link solved (PSP)"<br />

Submission page 415 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

::= { pl<strong>MAC</strong>Entry 3 }<br />

pl<strong>MAC</strong>NumSlaves OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Number of slaves configured in the master or repeater"<br />

::= { pl<strong>MAC</strong>Entry 4 }<br />

-- pl<strong>MAC</strong>ConnectedNodes Table<br />

pl<strong>MAC</strong>ConnectedNodesTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF pl<strong>MAC</strong>ConnectedNodesEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

::= { plWisc<strong>MAC</strong> 2 }<br />

pl<strong>MAC</strong>ConnectedNodesEntry OBJECT-TYPE<br />

SYNTAX pl<strong>MAC</strong>ConnectedNodesEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { pl<strong>MAC</strong>ConnectedNodesCard, pl<strong>MAC</strong>ConnectedNodesIndex }<br />

::= { pl<strong>MAC</strong>ConnectedNodesTable 1 }<br />

pl<strong>MAC</strong>ConnectedNodesEntry ::= SEQUENCE { pl<strong>MAC</strong>ConnectedNodesCard INTEGER,<br />

pl<strong>MAC</strong>ConnectedNodesIndex INTEGER,<br />

pl<strong>MAC</strong>ConnectedNodes<strong>MAC</strong> PhysAddress<br />

Submission page 416 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

pl<strong>MAC</strong>ConnectedNodesCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { pl<strong>MAC</strong>ConnectedNodesEntry 1 }<br />

pl<strong>MAC</strong>ConnectedNodesIndex OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node index"<br />

::= {pl<strong>MAC</strong>ConnectedNodesEntry 2}<br />

pl<strong>MAC</strong>ConnectedNodes<strong>MAC</strong> OBJECT-TYPE<br />

SYNTAX PhysAddress<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "<strong>MAC</strong> for the node index"<br />

::= {pl<strong>MAC</strong>ConnectedNodesEntry 3}<br />

-- pl<strong>MAC</strong>Slaves Table<br />

pl<strong>MAC</strong>SlavesTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF pl<strong>MAC</strong>SlavesEntry<br />

}<br />

Submission page 417 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

::= { plWisc<strong>MAC</strong> 3 }<br />

pl<strong>MAC</strong>SlavesEntry OBJECT-TYPE<br />

SYNTAX pl<strong>MAC</strong>SlavesEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { pl<strong>MAC</strong>SlavesCard, pl<strong>MAC</strong>SlavesIndex }<br />

::= { pl<strong>MAC</strong>SlavesTable 1 }<br />

pl<strong>MAC</strong>SlavesEntry ::= SEQUENCE { pl<strong>MAC</strong>SlavesCard INTEGER,<br />

pl<strong>MAC</strong>SlavesCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { pl<strong>MAC</strong>SlavesEntry 1 }<br />

pl<strong>MAC</strong>SlavesIndex OBJECT-TYPE<br />

SYNTAX INTEGER<br />

}<br />

pl<strong>MAC</strong>SlavesIndex INTEGER,<br />

pl<strong>MAC</strong>Slaves<strong>MAC</strong> PhysAddress<br />

Submission page 418 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

--<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Slaves index"<br />

::= { pl<strong>MAC</strong>SlavesEntry 2 }<br />

pl<strong>MAC</strong>Slaves<strong>MAC</strong> OBJECT-TYPE<br />

SYNTAX PhysAddress<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "<strong>MAC</strong> for the slave index"<br />

::= { pl<strong>MAC</strong>SlavesEntry 3 }<br />

-- The plQoS Group<br />

--<br />

plQoSMasterGeneralMinOneWayLat OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Latency in milliseconds"<br />

::= { plQoS 1 }<br />

plQoSMasterGeneralBwMngrPolicy OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

Submission page 419 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

DESCRIPTION "B<strong>and</strong>width ..."<br />

::= { plQoS 2 }<br />

-- plQoSPriorityManagement Table<br />

plQoSPriorityManagementTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plQoSPriorityManagementEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

::= { plQoS 3 }<br />

plQoSPriorityManagementEntry OBJECT-TYPE<br />

SYNTAX plQoSPriorityManagementEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION "QoS Priorities Management per card."<br />

INDEX { plQoSPriorityManagementCard, plQoSPriorityManagementPrio }<br />

::= { plQoSPriorityManagementTable 1 }<br />

plQoSPriorityManagementEntry ::= SEQUENCE {<br />

plQoSPriorityManagementCard INTEGER,<br />

plQoSPriorityManagementPrio INTEGER,<br />

plQoSPriorityManagementLatency INTEGER,<br />

plQoSPriorityManagementJitter INTEGER,<br />

plQoSPriorityManagementB<strong>and</strong>width INTEGER<br />

Submission page 420 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plQoSPriorityManagementCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plQoSPriorityManagementEntry 1 }<br />

plQoSPriorityManagementPrio OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Priority value (1..8)"<br />

::= { plQoSPriorityManagementEntry 2 }<br />

plQoSPriorityManagementLatency OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Latency value for the priority (0,1,2,4,8)"<br />

::= { plQoSPriorityManagementEntry 3 }<br />

plQoSPriorityManagementJitter OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Jitter value for the priority"<br />

::= { plQoSPriorityManagementEntry 4 }<br />

}<br />

Submission page 421 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plQoSPriorityManagementB<strong>and</strong>width OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "B<strong>and</strong>width for the priority"<br />

::= { plQoSPriorityManagementEntry 5 }<br />

-- plQoSPerUser Table<br />

plQoSPerUserTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plQoSPerUserEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

::= { plWiscQoS 4 }<br />

plQoSPerUserEntry OBJECT-TYPE<br />

SYNTAX plQoSPerUserEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION "User QoS management values per card."<br />

INDEX { plQoSPerUserCard, plQoSPerUser<strong>MAC</strong> }<br />

::= { plQoSPerUserTable 1 }<br />

plQoSPerUserEntry ::= SEQUENCE { plQoSPerUserCard INTEGER,<br />

plQoSPerUser<strong>MAC</strong> PhysAddress,<br />

plQoSPerUserTXMaxXput INTEGER,<br />

Submission page 422 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plQoSPerUserCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plQoSPerUserEntry 1 }<br />

plQoSPerUser<strong>MAC</strong> OBJECT-TYPE<br />

SYNTAX PhysAddress<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "User <strong>MAC</strong> address"<br />

::= { plQoSPerUserEntry 2 }<br />

plQoSPerUserTXMaxXput OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

}<br />

plQoSPerUserRXMaxXput INTEGER,<br />

plQoSPerUserPriorityAllowedUp INTEGER,<br />

plQoSPerUserPriorityAllowedDown INTEGER<br />

-- plQoSPerUserPriorityActive INTEGER<br />

DESCRIPTION "Maximum allowed throughput in transmission for a user"<br />

::= { plQoSPerUserEntry 3 }<br />

plQoSPerUserRXMaxXput OBJECT-TYPE<br />

SYNTAX INTEGER<br />

Submission page 423 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Maximum allowed throughput in reception for a user"<br />

::= { plQoSPerUserEntry 4 }<br />

plQoSPerUserPriorityAllowedUp OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Allowed priorities for transmission <strong>and</strong> reception in upstream for a user"<br />

::= { plQoSPerUserEntry 5 }<br />

plQoSPerUserPriorityAllowedDown OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Allowed priorities for transmission <strong>and</strong> reception in downstream for a<br />

user"<br />

::= { plQoSPerUserEntry 6 }<br />

-- plQoSPerUserPriorityActive OBJECT-TYPE<br />

-- SYNTAX INTEGER<br />

-- ACCESS read-only<br />

-- STATUS current<br />

-- DESCRIPTION "Active priorities for transmission <strong>and</strong> reception for a user"<br />

-- ::= { plQoSPerUserEntry 7 }<br />

--<br />

Submission page 424 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

-- The plStatistics Group<br />

--<br />

-- plStatistics Table<br />

plStatisticsTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plStatisticsEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION "Packets <strong>and</strong> Bytes Statistics by Interface"<br />

::= { plStatistics 1 }<br />

plStatisticsEntry OBJECT-TYPE<br />

SYNTAX plStatisticsEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { plStatisticsCard }<br />

::= { plStatisticsTable 1 }<br />

plStatisticsEntry ::= SEQUENCE {<br />

plStatisticsCard INTEGER,<br />

plStatisticsBPLInputWords INTEGER,<br />

plStatisticsBPLInputPackets INTEGER,<br />

plStatisticsBPLInputIncorrigible INTEGER,<br />

plStatisticsBPLInputFECBlocksTotal INTEGER,<br />

plStatisticsBPLInputFECBlocksCorrected INTEGER,<br />

Submission page 425 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plStatisticsCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plStatisticsEntry 1 }<br />

plStatisticsBPLInputWords OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Words received by BPL"<br />

::= { plStatisticsEntry 19 }<br />

plStatisticsBPLInputPackets OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Packets received by BPL"<br />

::= { plStatisticsEntry 20 }<br />

}<br />

plStatisticsBPLInputPktsReceived INTEGER,<br />

plStatisticsBPLInputPktsRcvComplete INTEGER,<br />

plStatisticsBPLInputPktsRcvIncomplete INTEGER,<br />

plStatisticsBPLOutputWords INTEGER,<br />

plStatisticsBPLOutputPkts INTEGER<br />

Submission page 426 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plStatisticsBPLInputIncorrigible OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Incorrigible packets received by BPL"<br />

::= { plStatisticsEntry 21 }<br />

plStatisticsBPLInputFECBlocksTotal OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Received FEC blocks by BPL"<br />

::= { plStatisticsEntry 22 }<br />

plStatisticsBPLInputFECBlocksCorrected OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "FEC blocks corrected by BPL"<br />

::= { plStatisticsEntry 23 }<br />

plStatisticsBPLInputPktsReceived OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

Submission page 427 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

DESCRIPTION "Received packets by BPL"<br />

::= { plStatisticsEntry 24 }<br />

plStatisticsBPLInputPktsRcvComplete OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Complete received packets by BPL"<br />

::= { plStatisticsEntry 25 }<br />

plStatisticsBPLInputPktsRcvIncomplete OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Incomplete received packets by BPL"<br />

::= { plStatisticsEntry 26 }<br />

plStatisticsBPLOutputWords OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Transmitted words by BPL"<br />

::= { plStatisticsEntry 27 }<br />

plStatisticsBPLOutputPkts OBJECT-TYPE<br />

SYNTAX INTEGER<br />

Submission page 428 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Transmitted packets by BPL"<br />

::= { plStatisticsEntry 28 }<br />

-- End of plStatistics Table<br />

--<br />

-- The plTraps Group<br />

--<br />

-- plTrapsPhy Table<br />

plTrapsPhyTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plTrapsPhyEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

::= { plTraps 1 }<br />

plTrapsPhyEntry OBJECT-TYPE<br />

SYNTAX plTrapsPhyEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { plTrapsPhyCard }<br />

::= { plPhyTable 1 }<br />

Submission page 429 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plTrapsPhyEntry ::= SEQUENCE { plTrapsPhyCard INTEGER,<br />

plTrapsPhyCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "node card number"<br />

::= { plTrapsPhyEntry 1 }<br />

plTrapsPhyTrapToHURTOEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

}<br />

plTrapsPhyTrapToHURTOEnable INTEGER,<br />

plTrapsPhyTrapFromHURTOEnable INTEGER<br />

DESCRIPTION "Enable/disable trap generation when entering HURTO mode"<br />

::= { plTrapsPhyEntry 2 }<br />

plTrapsPhyTrapFromHURTOEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Enable/disable trap generation when exiting HURTO mode"<br />

Submission page 430 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

::= { plTrapsPhyEntry 3 }<br />

-- plTraps<strong>MAC</strong> Table<br />

plTraps<strong>MAC</strong>Table OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plTraps<strong>MAC</strong>Entry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

::= { plWiscTraps 2 }<br />

plTraps<strong>MAC</strong>Entry OBJECT-TYPE<br />

SYNTAX plTraps<strong>MAC</strong>Entry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { plTraps<strong>MAC</strong>Card }<br />

::= { plTraps<strong>MAC</strong>Table 1 }<br />

plTraps<strong>MAC</strong>Entry ::= SEQUENCE { plTraps<strong>MAC</strong>Card INTEGER,<br />

plTraps<strong>MAC</strong>Card OBJECT-TYPE<br />

SYNTAX INTEGER<br />

}<br />

plTraps<strong>MAC</strong>PeerDetectedEnable INTEGER,<br />

plTraps<strong>MAC</strong>PeerDisappearedEnable INTEGER<br />

Submission page 431 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

---<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plTraps<strong>MAC</strong>Entry 1 }<br />

plTraps<strong>MAC</strong>PeerDetectedEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Enable/disable trap generation when detecting a peer"<br />

::= { plTraps<strong>MAC</strong>Entry 2 }<br />

plTraps<strong>MAC</strong>PeerDisappearedEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Enable/disable trap generation when dissapearing a peer"<br />

::= { plTraps<strong>MAC</strong>Entry 3 }<br />

-- plTrapsBridge Table<br />

---<br />

plTrapsBridgeTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plTrapsBridgeEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

Submission page 432 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

DESCRIPTION ""<br />

::= { plWiscTraps 3 }<br />

plTrapsBridgeEntry OBJECT-TYPE<br />

SYNTAX plTrapsBridgeEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { plTrapsBridgeCard }<br />

::= { plTrapsBridgeTable 1 }<br />

plTrapsBridgeEntry ::= SEQUENCE { plTrapsBridgeCard INTEGER,<br />

plTrapsBridgeCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plTrapsBridgeEntry 1 }<br />

plTrapsBridgeNewRootEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

}<br />

plTrapsBridgeNewRootEnable INTEGER,<br />

plTrapsBridgeTopologyChangeEnable INTEGER<br />

Submission page 433 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

---<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Enable/disable trap generation when a new root is assigned"<br />

::= { plTrapsBridgeEntry 2 }<br />

plTrapsBridgeTopologyChangeEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Enable/disable trap generation when topology changes"<br />

::= { plTrapsBridgeEntry 3 }<br />

-- plTrapsConfFail Table<br />

---<br />

plTrapsConfFailTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plTrapsConfFailEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

::= { plWiscTraps 4 }<br />

plTrapsConfFailEntry OBJECT-TYPE<br />

SYNTAX plTrapsConfFailEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

Submission page 434 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

INDEX { plTrapsConfFailCard }<br />

::= { plTrapsConfFailTable 1 }<br />

plTrapsConfFailEntry ::=SEQUENCE{<br />

plTrapsConfFailCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plTrapsConfFailEntry 1 }<br />

plTrapsConfDownloadFailEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

plTrapsConfFailCard INTEGER,<br />

plTrapsConfDownloadFailEnable INTEGER,<br />

plTrapsConfUploadFailEnable INTEGER,<br />

DESCRIPTION "Enable/disable trap generation when a configuration file download fails"<br />

::= { plTrapsConfFileEntry 2 }<br />

plTrapsConfUploadFailEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

Submission page 435 UPA-OPERA<br />

}


4-June-07 P1901_PRO_016_r0<br />

--<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Enable/disable trap generation when a configuration file upload fails"<br />

::= { plTrapsConfFileEntry 3 }<br />

-- The plStp Group<br />

--<br />

plStpTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plStpEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION "Information about Spanning Tree."<br />

::= { plWiscStp 1 }<br />

plStpEntry OBJECT-TYPE<br />

SYNTAX plStpEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION "System information gathered per card."<br />

INDEX { plStpCard }<br />

::= { plStpTable 1 }<br />

plStpEntry ::= SEQUENCE { plStpCard INTEGER,<br />

plStpEnable INTEGER,<br />

plStpProtocolVersion IA5String (SIZE(0..8)),<br />

Submission page 436 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plStpCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plStpEntry 1 }<br />

plStpEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

}<br />

plStpPtpExtA INTEGER,<br />

plStpPtpExtB INTEGER,<br />

plStpFrontier IA5String (SIZE(0..8))<br />

DESCRIPTION "0: STP Enabled, 1: STP Disabled"<br />

::= { plStpEntry 2 }<br />

plStpProtocolVersion OBJECT-TYPE<br />

SYNTAX IA5String (SIZE(0..8))<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "STP Protocol Version [STP|RSTP]"<br />

::= { plStpEntry 3 }<br />

plStpPtpExtA OBJECT-TYPE<br />

Submission page 437 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

--<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Set point-to-point flag for EXTA [0|1]"<br />

::= { plStpEntry 4 }<br />

plStpPtpExtB OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Set point-to-point flag for EXTB [0|1]"<br />

::= { plStpEntry 5 }<br />

plStpFrontier OBJECT-TYPE<br />

SYNTAX IA5String (SIZE(0..8))<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "STP Frontier enabled in [EXTA|EXTB|NONE]"<br />

::= { plStpEntry 6 }<br />

-- The plSecurity Group<br />

--<br />

plSecurityConsoleSerial OBJECT-TYPE<br />

SYNTAX INTEGER { enabled ( 1 ),<br />

Submission page 438 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

MAX-ACCESS read-write<br />

STATUS current<br />

disabled ( 0 ) }<br />

DESCRIPTION "Enable/disable access to the modems<br />

DEFVAL { enabled }<br />

::= { plSecurity 1 }<br />

serial port console."<br />

plSecurityConsoleTelnet OBJECT-TYPE<br />

SYNTAX INTEGER { enabled ( 1 ),<br />

MAX-ACCESS read-write<br />

STATUS current<br />

disabled ( 0 ) }<br />

DESCRIPTION "Enable/disable access to the modems<br />

telnet console."<br />

DEFVAL { disabled }<br />

::= { plSecurity 2 }<br />

plSecurityConsoleAuthTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF SecurityConsoleAuthEntry<br />

MAX-ACCESS not-accessible<br />

Submission page 439 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

STATUS current<br />

DESCRIPTION "Table of IP addresses form which<br />

::= { plSecurity 3 }<br />

plSecurityConsoleAuthEntry OBJECT-TYPE<br />

Telnet clients may access this modem."<br />

SYNTAX SecurityConsoleAuthEntry<br />

MAX-ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION "One entry of the table."<br />

INDEX { securityConsoleAuthNumber }<br />

::= { plSecurityConsoleAuthTable 1 }<br />

plSecurityConsoleAuthEntry ::= SEQUENCE {<br />

}<br />

plSecurityConsoleAuthNumber INTEGER,<br />

plSecurityConsoleAuthAddress IpAddress,<br />

plSecurityConsoleAuthRowStatus RowStatus<br />

plSecurityConsoleAuthNumber OBJECT-TYPE<br />

SYNTAX INTEGER (0..15)<br />

MAX-ACCESS not-accessible<br />

Submission page 440 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

END<br />

STATUS current<br />

DESCRIPTION "Number of this row."<br />

::= { plSecurityConsoleAuthEntry 1 }<br />

plSecurityConsoleAuthAddress OBJECT-TYPE<br />

SYNTAX IpAddress<br />

MAX-ACCESS read-create<br />

STATUS current<br />

DESCRIPTION "IP address of client."<br />

::= { plSecurityConsoleAuthEntry 2 }<br />

plSecurityConsoleAuthRowStatus OBJECT-TYPE<br />

SYNTAX RowStatus<br />

MAX-ACCESS read-create<br />

STATUS current<br />

DESCRIPTION "The status of this conceptual row."<br />

::= { plSecurityConsoleAuthEntry 3 }<br />

Submission page 441 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

ANNEX B PERFORMANCE (INFORMATIVE)<br />

The total bitrate transmitted by a BPL node is influenced by several factors. Considering <strong>PHY</strong> level, the maximum<br />

theoretical rates depend on the OFDM Symbol Type <strong>and</strong> spectral efficiency, which is bound by the bit-loading of<br />

each subcarrier.<br />

Approximate numerical values will be given for maximum bit rates, taking into account these factors:<br />

• OFDM symbol rate <strong>and</strong> cyclic prefix<br />

• Truncated 4D-TCM<br />

• Loss rate due to RS coding<br />

• CRC overhead (Delimiters)<br />

And specifically not considering these:<br />

• Zero filling<br />

• Special coding of last Reed-Solomon codewords<br />

• Overhead of reference signals when fitting OFDM symbols inside PPDU.<br />

For simplicity purposes, numerical values will only be given for the special cases in which all 1536 subcarriers have<br />

the same bit-loading. This makes calculations easier, but it should not be difficult to find corresponding numerical<br />

values for any possible bit-loading table.<br />

B.1 Data stream<br />

Data payload is adaptively or HURTO modulated.<br />

The cyclic prefix that each Symbol Type uses implies that actual data is only transmitted during the IDFT interval.<br />

The percentage of maximum <strong>PHY</strong> rate that is lost equals the percentage of cyclic prefix interval over total symbol<br />

interval (which is the sum of cyclic prefix <strong>and</strong> IDFT interval). The IDFT interval is fixed to 2048 samples for every<br />

Symbol Type.<br />

Truncated 4D-TCM operates on 768 pairs of subcarriers.<br />

For adaptive mapping, each pair of subcarriers gets a different coding according to its bit-loading: if we call z to<br />

z − 1<br />

the sum of the bit-loadings of both subcarriers, the coding rate for that pair of subcarriers is , except for the<br />

z<br />

Submission page 442 UPA-OPERA


S mode<br />

0<br />

S mode<br />

1<br />

S mode<br />

2<br />

S mode<br />

3<br />

4-June-07 P1901_PRO_016_r0<br />

case in which the bit-loadings for both subcarriers is zero (in this case there is no coding because no message in<br />

being sent on that pair of subcarriers). As bit-loadings can take the values 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 or 10, coding<br />

rates will range from 1/2 to 19/20 for each pair of subcarriers.<br />

For HURTO mapping, each subcarrier will get the same coding, with a bit-loading of 2, so the coding rate for each<br />

pair of subcarriers is 3/4. Additionally, HURTO mapping replicates eight times the message, which means a further<br />

coding rate of 1/8.<br />

Next table shows coded maximum data rates (in Mbps) for OFDM symbols with constant bit-loading for all<br />

subcarriers. Numbers shown take into account cyclic prefix <strong>and</strong> 4D-TCM.<br />

Bit-loading for all 1536 subcarriers (adaptive mapping) HURTO<br />

10 9 8 7 6 5 4 3 2 1<br />

Type I 204.94 183.37 161.80 140.22 118.65 97.08 75.51 53.93 32.36 10.79 4.04<br />

Type II 150.82 134.95 119.07 103.19 87.32 71.44 55.57 39.69 23.81 7.94 2.98<br />

Type III 84.01 75.16 66.32 57.48 48.64 39.79 30.95 22.11 13.26 4.42 1.66<br />

Table 68 Coded maximum bitrates for Data payload (constant bit-loading)<br />

Furthermore, RS coding implies an additional rate loss which depends on the code rate. For each of the four RS data<br />

modes (0 being the least <strong>and</strong> 3 the most robust one), adaptive mapping can produce a total of 28 different codes<br />

depending on the FEC payload, each one with a different data rate as given in Table 69.<br />

FEC payload (bytes)<br />

Code rate<br />

244 240 236 232 228 224 220 216 212 208 204 200 196 192 188 184 180 176 172 168 164 160 156 152 148 144 140 136<br />

0.968 0.968 0.967 0.967 0.966 0.966 0.965 0.964 0.964 0.963 0.962 0.962 0.961 0.960 0.959 0.958 0.957 0.957 0.956 0.955 0.953 0.952 0.951 0.950 0.949 0.947 0.946 0.944<br />

240 236 232 228 224 220 216 212 208 204 200 196 192 188 184 180 176 172 168 164 160 156 152 148 144 140 136 132<br />

0.952 0.952 0.951 0.950 0.949 0.948 0.947 0.946 0.945 0.944 0.943 0.942 0.941 0.940 0.939 0.938 0.936 0.935 0.933 0.932 0.930 0.929 0.927 0.925 0.923 0.921 0.919 0.917<br />

236 232 228 224 220 216 212 208 204 200 196 192 188 184 180 176 172 168 164 160 156 152 148 144 140 136 132 128<br />

0.937 0.935 0.934 0.933 0.932 0.931 0.930 0.929 0.927 0.926 0.925 0.923 0.922 0.920 0.918 0.917 0.915 0.913 0.911 0.909 0.907 0.905 0.902 0.900 0.897 0.895 0.892 0.889<br />

232 228 224 220 216 212 208 204 200 196 192 188 184 180 176 172 168 164 160 156 152 148 144 140 136 132 128 124<br />

0.921 0.919 0.918 0.917 0.915 0.914 0.912 0.911 0.909 0.907 0.906 0.904 0.902 0.900 0.898 0.896 0.894 0.891 0.889 0.886 0.884 0.881 0.878 0.875 0.872 0.868 0.865 0.86<br />

Table 69 RS coding rates for Data payload (adaptive)<br />

Submission page 443 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

HURTO mapping can use all the RS codes above plus codes with decreasing FEC payload until code rate is 0.5.<br />

The uncoded maximum bitrates for Data payload are the result of multiplying coded maximum bitrates by RS<br />

coding rate.<br />

B.2 Delimiters<br />

Delimiters are HURTO modulated for robust OFDM transmission.<br />

<strong>Control</strong> symbols have modulation <strong>and</strong> trellis coding schemes similar to HURTO data symbols, so the maximum<br />

coded data rate is the same.<br />

Delimiters use a specific RS code with rate 2/3. Additionally, a CRC-CCITT is applied which implies a rate loss of<br />

176/192.<br />

So in the same conditions as assumed for Data payload, the Delimiters data rate is given in Table 70<br />

Uncoded bitrate (Mbps)<br />

Type I 2.47<br />

Type II 1.82<br />

Type III 1.01<br />

Table 70 Coded maximum bitrates for Delimiters<br />

Submission page 444 UPA-OPERA


EC/IST FP6 Project No 026920<br />

Work Package: WP5<br />

Type of document: Report<br />

Date: 04 June 2007<br />

File name: OP2_WP5_D27 Version: 1.0<br />

Title: First draft of the OPERA specification version 2<br />

Copyright<br />

“Copyright <strong>and</strong> Reprint Permissions. You may freely reproduce all or part of this paper<br />

for non-commercial purposes, provided that the following conditions are fulfilled: (i) to<br />

cite the authors, as the copyright owners (ii) to cite the OPERA Project <strong>and</strong> mention<br />

that the European Commission co-finances it, by means of including this statement<br />

“OPERA. IST Integrated Project No 507667. Funded by EC” <strong>and</strong> (iii) not to alter the<br />

information.”

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!