03.11.2012 Views

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

IST Integrated Project No 026920<br />

Partners:<br />

Work Package: WP5<br />

Activities: 5.1<br />

Type of document: Report<br />

Date: 04 June 2007<br />

CTI, DS2, EDEV CPL / EDF Group, Iberdrola, SEPC, TUD, URL<br />

Responsible: EDEV CPL / EDF Group<br />

Circulation:<br />

� Public<br />

� Confidential<br />

� Restricted<br />

File name: OP2_WP5_D27 Version: 1.0<br />

Title: First draft of the OPERA specification version 2<br />

D27 : FIRST DRAFT OF THE OPERA SPECIFICATION VERSION 2<br />

Copyright<br />

© Copyright 2007 The OPERA Consortium


EC/IST FP6 Project No 026920<br />

Work Package: WP5<br />

Type of document: Report<br />

Date: 04 June 2007<br />

File name: OP2_WP5_D27 Version: 1.0<br />

Title: First draft of the OPERA specification version 2<br />

Document History<br />

Vers. Issue Date Content <strong>and</strong> changes<br />

1.0 04.06.07 Creation of the first version of the document<br />

Document Authors<br />

Partners Contributors<br />

CTI Manu Sharma<br />

DS2 Luis Manuel Torres, Salvador Iranzo, Marcos Martinez,<br />

Serafin Arroyo<br />

EDEV CPL / EDF Group Laurent Feltin, Eric Perrier<br />

Iberdrola Inigo Berganza<br />

SEPC Philippe Conq<br />

TUD Le Phu Do<br />

University Ramon Llull<br />

(URL)<br />

Document Approvers<br />

Partners Approvers<br />

EDEV CPL / EDF Group Laurent Feltin<br />

Guiomar Corral, Josep M. Selga


4-June-07 P1901_PRO_016_r0<br />

IEEE P1901<br />

Draft St<strong>and</strong>ard for Broadb<strong>and</strong> over Power Line Networks:<br />

<strong>Medium</strong> <strong>Access</strong> <strong>Control</strong> <strong>and</strong> <strong>Physical</strong> <strong>Layer</strong> Specifications<br />

Proposal for the IEEE 1901<br />

<strong>Access</strong> Power Line Networks St<strong>and</strong>ard<br />

Date: 2007-06-04<br />

Author(s):<br />

Name Company Address Phone email<br />

Laurent Feltin OPERA<br />

Inigo Berganza OPERA<br />

Luis M. Torres OPERA<br />

Serafin Arroyo UPA<br />

Guiomar Corral OPERA<br />

Salvador<br />

Iranzo<br />

OPERA<br />

Le Phu Do OPERA<br />

Eric Perrier OPERA<br />

José Maria<br />

EDEV CPL Technologie<br />

1 avenue du Général de Gaulle<br />

92140 Clamart, France<br />

Iberdrola S.A.<br />

Avda San Adrián 48<br />

48003 Bilbao, Spain<br />

Design of Systems on Silicon<br />

(DS2)<br />

C/ Charles Robert Darwin 2<br />

Parc Tecnològic<br />

46980, Paterna, Valencia, Spain<br />

Universal Powerline Association<br />

3 Bridge Street<br />

Kings Cliffe, Peterborough<br />

PE8 6XH, United Kingdom<br />

Enginyeria La Salle - Universitat<br />

Ramon Llull<br />

Postal address c/ Quatre Camins,<br />

2 08022 – Barcelona, Spain<br />

Design of Systems on Silicon<br />

(DS2)<br />

C/ Charles Robert Darwin 2<br />

Parc Tecnològic<br />

46980, Paterna, Valencia, Spain<br />

Technische Universitaet Dresden<br />

Chair for Telecommunications<br />

01062 Dresden, Germany<br />

EDEV CPL Technologie<br />

1 avenue du Général de Gaulle<br />

92140 Clamart, France<br />

OPERA Enginyeria La Salle - Universitat<br />

Ramon Llull<br />

+33 1 41 33 95 14 laurent.feltin@edev-cpl.fr<br />

+34 944665525 iberganza@iberdrola.es<br />

+34 96 136 60 04 luismanuel.torres@ds2.es<br />

+44 (0)1780470003<br />

serafin.arroyo@universalpow<br />

erlineassociation.com<br />

+34 93 290 24 23 guiomar@salle.url.edu<br />

+34 96 136 60 04 salvador.iranzo@ds2.es<br />

+49 351 463-39244 dolephu@ifn.et.tu-dresden.de<br />

+33 1 41 33 95 11 eric.perrier@edev-cpl.fr<br />

+34 93 290 24 23 jmselga@salle.url.edu<br />

Submission page 1 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Selga Postal address c/ Quatre Camins,<br />

2 08022 – Barcelona, Spain<br />

Ralf Lehnert OPERA<br />

Agustin<br />

Badenes<br />

OPERA<br />

Manu Sharma OPERA<br />

Philippe Conq OPERA<br />

Eric Morel Ilevo-Schneider Electric<br />

Powerline<br />

Communications<br />

Technische Universitaet Dresden<br />

Chair for Telecommunications<br />

01062 Dresden, Germany<br />

Design of Systems on Silicon<br />

(DS2)<br />

C/ Charles Robert Darwin 2<br />

Parc Tecnològic<br />

46980, Paterna, Valencia, Spain<br />

Current Technologies<br />

International GmBHPostal<br />

address : Gewerbepark, 5506<br />

Maegenwil, Switzerl<strong>and</strong><br />

ILEVO – Schneider Electric<br />

Powerline Communications 59,<br />

Chemin du vieux chêne, F38240<br />

Meylan, France<br />

59, Chemin du vieux chêne,<br />

F38240 Meylan, France<br />

Ichiro Shimizu ITOCHU Corporation 5-1, Kita-Aoyama 2-chome,<br />

Minato-ku, Tokyo 107-8077,<br />

Japan<br />

Yukio<br />

Akegamiyama<br />

Toyo Network Systems<br />

Co., Ltd.<br />

Ram Rao Ambient Corporation<br />

Brian Donnelly<br />

Abstract:<br />

Corinex Communications<br />

Corp.<br />

1-1,Koyato2-chome,Samukawamachi,Koza-gun,Kanagawa<br />

253-<br />

0198,Japan<br />

79 Chapel Street<br />

Newton, MA 02458<br />

USA<br />

905 West Pender Street<br />

Vancouver, BC V6C 1L6<br />

Canada,<br />

+49 351 463-33942 ralf.lehnert@tu-dresden.de<br />

+34 96 136 60 04 agustin.badenes@ds2.es<br />

+41-62-544-1912 msharma@currentgroup.com<br />

+33 4 76 60 59 56<br />

+33 (0)4 76 60 59<br />

56<br />

philippe.conq@fr.schneiderelectric.com <br />

eric.morel@schneiderelectric.com<br />

+81-33497-7237 shimizu-i@itochu.co.jp<br />

+81 467 74 1176 akegamiy@t-ns.co.jp<br />

+1-617-332-0004 ram.rao@ambientcorp.com<br />

+1 778 371 7697 brian.donnelly@corinex.com<br />

This is a complete proposal for the IEEE P1901 <strong>Access</strong> Broadb<strong>and</strong> over Power Line st<strong>and</strong>ard submitted<br />

by the OPERA (Open PLC European Research Alliance) <strong>and</strong> UPA (Universal Powerline Association).<br />

Submission page 2 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The proposal fulfills all the requirements described in the document<br />

“P1901_0205_r2_AC_unified_req.doc”, <strong>and</strong> also follows the rules <strong>and</strong> conditions described in the Call for<br />

proposals document “P1901_0269_r1_AC_Call_for_submissions.doc”.<br />

This document will be part of the down-selection process of the P1901 group as described in the<br />

document “P1901_0098_r8_Downselect_Process_final.doc”, for the St<strong>and</strong>ard for Broadb<strong>and</strong> over Power<br />

Line Networks: <strong>Medium</strong> <strong>Access</strong> <strong>Control</strong> <strong>and</strong> <strong>Physical</strong> <strong>Layer</strong> Specifications, <strong>Access</strong>.<br />

Notice: This document has been prepared to assist the IEEE P1901 working group. It is offered as a basis for discussion <strong>and</strong> is not binding on<br />

the contributing individual(s) or organization(s). The material in this document is subject to change in form <strong>and</strong> content after further study. The<br />

contributor(s) reserve(s) the right to add, amend, or withdraw material contained herein.<br />

Release: The contributor grants a free, irrevocable license to The Institute of Electrical <strong>and</strong> Electronics Engineers, Inc. (“IEEE”), a corporation<br />

with offices at 445 Hoes Lane, Piscataway, NJ 08855-1331, to incorporate material contained in this contribution, <strong>and</strong> any modifications<br />

thereof, in the creation of an IEEE St<strong>and</strong>ards publication; to copyright in the IEEE’s name any IEEE St<strong>and</strong>ards publication even though it may<br />

include portions of this contribution; <strong>and</strong> at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE<br />

St<strong>and</strong>ards publication. The contributor also acknowledges <strong>and</strong> accepts that this contribution may be made public by the IEEE P1901 working<br />

group.<br />

Submission page 3 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Draft St<strong>and</strong>ard for<br />

Broadb<strong>and</strong> over Power Line Networks: <strong>Medium</strong><br />

<strong>Access</strong> <strong>Control</strong> (<strong>MAC</strong>)<br />

<strong>and</strong> <strong>Physical</strong> <strong>Layer</strong> (<strong>PHY</strong>) specifications<br />

Copyright © 2007 by the IEEE.<br />

Three Park Avenue<br />

New York, NY 10016-5997, USA<br />

All rights reserved.<br />

This document is an unapproved draft of a proposed IEEE St<strong>and</strong>ard. As such, this document is subject to change.<br />

USE AT YOUR OWN RISK! Because this is an unapproved draft, this document must not be utilized for any<br />

conformance/compliance purposes. Permission is hereby granted for IEEE St<strong>and</strong>ards Committee participants to<br />

reproduce this document for<br />

purposes of international st<strong>and</strong>ardization consideration. Prior to adoption of this document, in whole or in part, by<br />

another st<strong>and</strong>ards development organization, permission must first be obtained from the IEEE St<strong>and</strong>ards Activities<br />

Department. Other entities seeking permission to reproduce this document, in whole or in part, must obtain<br />

permission from the IEEE<br />

St<strong>and</strong>ards Activities Department.<br />

IEEE St<strong>and</strong>ards Activities Department<br />

445 Hoes Lane<br />

Piscataway, NJ 08854, USA<br />

Submission page 4 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

1 INTRODUCTION .............................................................................................................................................. 19<br />

1.1 SCOPE ........................................................................................................................................................ 19<br />

1.2 OVERVIEW ............................................................................................................................................... 19<br />

1.3 REFERENCES............................................................................................................................................ 19<br />

1.4 DOCUMENT CONVENTIONS................................................................................................................. 20<br />

1.5 DEFINITIONS............................................................................................................................................ 21<br />

1.6 ABBREVIATIONS AND ACRONYMS ................................................................................................... 25<br />

2 GENERAL DESCRIPTION ............................................................................................................................... 31<br />

2.1 GENERAL DESCRIPTION OF THE ARCHITECTURE......................................................................... 32<br />

2.2 NODE DESCRIPTION............................................................................................................................... 32<br />

2.2.1 HE ....................................................................................................................................................... 33<br />

2.2.2 Time Division Repeaters..................................................................................................................... 33<br />

2.2.3 CPE ..................................................................................................................................................... 33<br />

2.3 <strong>MAC</strong> overview............................................................................................................................................ 33<br />

2.4 QoS overview.............................................................................................................................................. 34<br />

2.5 Security overview........................................................................................................................................ 34<br />

2.6 NETWORK REFERENCE MODEL.......................................................................................................... 35<br />

3 <strong>PHY</strong>..................................................................................................................................................................... 36<br />

Submission page 5 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.1 OVERVIEW ............................................................................................................................................... 37<br />

3.2 <strong>PHY</strong> LAYER FRAME................................................................................................................................ 37<br />

3.3 FORWARD ERROR CORRECTION........................................................................................................38<br />

3.3.1 Delimiters............................................................................................................................................ 38<br />

3.3.2 Data payload........................................................................................................................................ 42<br />

3.4 MAPPING MODES.................................................................................................................................... 46<br />

3.4.1 HURTO mapping................................................................................................................................ 46<br />

3.4.2 Adaptive mapping ............................................................................................................................... 47<br />

3.5 TRELLIS CODED MODULATION (4D-TCM) ....................................................................................... 48<br />

3.5.1 Bit Extraction ...................................................................................................................................... 48<br />

3.5.2 Scrambling .......................................................................................................................................... 50<br />

3.5.3 Bit conversion ..................................................................................................................................... 53<br />

3.5.4 Constellation encoder.......................................................................................................................... 54<br />

3.6 SUBCARRIER MODULATION................................................................................................................ 55<br />

3.7 OFDM MODULATION ............................................................................................................................. 57<br />

3.7.1 <strong>Control</strong> <strong>and</strong> Data symbols................................................................................................................... 58<br />

3.7.2 Time domain windowing .................................................................................................................... 59<br />

3.8 REFERENCE SIGNALS ............................................................................................................................ 61<br />

Submission page 6 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.8.1 Channel reference symbol................................................................................................................... 61<br />

3.8.2 Synchronization symbol...................................................................................................................... 61<br />

3.8.3 Start Of Transmission (SOT) .............................................................................................................. 61<br />

3.8.4 Channel estimation symbols................................................................................................................ 63<br />

3.9 CARRIER FREQUENCY .......................................................................................................................... 65<br />

3.10 COMMUNICATION MODES................................................................................................................... 65<br />

3.11 <strong>PHY</strong> PARAMETER SPECIFICATION .....................................................................................................65<br />

3.12 CLOCK SYNCHRONIZATION ................................................................................................................ 66<br />

3.12.1 General ................................................................................................................................................ 66<br />

3.12.2 Clock synchronisation concept............................................................................................................ 66<br />

3.12.3 System reference clock error tolerance ............................................................................................... 66<br />

3.13 TRANSMITTER ELECTRICAL SPECIFICATION................................................................................. 66<br />

3.13.1 Transmit PSD...................................................................................................................................... 66<br />

3.13.2 Modulation error vector magnitude..................................................................................................... 67<br />

3.13.3 Power <strong>Control</strong> ..................................................................................................................................... 67<br />

3.14 RECEIVER ELECTRICAL SPECIFICATION ......................................................................................... 68<br />

3.14.1 Receiver Input Impedance................................................................................................................... 68<br />

3.14.2 Receiver Input Referred Noise............................................................................................................ 69<br />

Submission page 7 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.14.3 Receiver Input Signal.......................................................................................................................... 69<br />

3.15 <strong>PHY</strong> service specification (<strong>PHY</strong> SAP) ....................................................................................................... 69<br />

3.15.1 <strong>PHY</strong> service primitives ....................................................................................................................... 69<br />

3.15.2 <strong>PHY</strong> service primitives parameters..................................................................................................... 70<br />

3.15.3 <strong>PHY</strong>-DATA.req .................................................................................................................................. 71<br />

3.15.4 <strong>PHY</strong>-DATA.cnf .................................................................................................................................. 72<br />

3.15.5 <strong>PHY</strong>-DATA.ind .................................................................................................................................. 72<br />

3.15.6 <strong>PHY</strong>-MNT-SNR.ind ........................................................................................................................... 73<br />

3.15.7 <strong>PHY</strong>-MNT-BPC-SET.req ................................................................................................................... 73<br />

3.15.8 <strong>PHY</strong>-MNT-BPC-SET.cnf ................................................................................................................... 74<br />

3.15.9 <strong>PHY</strong>-MNT-BPC-GET.req .................................................................................................................. 75<br />

3.15.10 <strong>PHY</strong>-MNT-BPC-GET.cnf............................................................................................................... 75<br />

3.15.11 <strong>PHY</strong>-MNT-RXGAIN-GET.req....................................................................................................... 76<br />

3.15.12 <strong>PHY</strong>-MNT-RXGAIN-GET.cnf....................................................................................................... 76<br />

3.15.13 <strong>PHY</strong>-MNT-TXGAIN-GET.req....................................................................................................... 77<br />

3.15.14 <strong>PHY</strong>-MNT-TXGAIN-GET.cnf....................................................................................................... 77<br />

3.15.15 <strong>PHY</strong>-MNT-TXGAIN-SET.req ....................................................................................................... 78<br />

3.15.16 <strong>PHY</strong>-MNT-TXGAIN-SET.cnf ....................................................................................................... 78<br />

Submission page 8 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.17 <strong>PHY</strong>-MNT-POWMASK-GET.req.................................................................................................. 79<br />

3.15.18 <strong>PHY</strong>-MNT-POWMASK-GET.cnf.................................................................................................. 79<br />

3.15.19 <strong>PHY</strong>-MNT-POWMASK-SET.req .................................................................................................. 80<br />

3.15.20 <strong>PHY</strong>-MNT-POWMASK-SET.cnf .................................................................................................. 80<br />

3.15.21 <strong>PHY</strong>-MNT-SYNC.ind .................................................................................................................... 81<br />

3.15.22 <strong>PHY</strong>-MNT-SYNC.req .................................................................................................................... 81<br />

3.15.23 <strong>PHY</strong>-MNT-SYNC.cnf .................................................................................................................... 82<br />

4 <strong>MAC</strong>.................................................................................................................................................................... 82<br />

4.1 OVERVIEW ............................................................................................................................................... 82<br />

4.1.1 Contention free medium access examples ..........................................................................................83<br />

4.1.2 Contention medium access example ................................................................................................... 85<br />

4.2 <strong>MAC</strong> STATES MANAGEMENT .............................................................................................................. 86<br />

4.2.1 Master side .......................................................................................................................................... 86<br />

4.2.2 Slave side ............................................................................................................................................ 88<br />

4.2.3 Transition state diagrams .................................................................................................................... 90<br />

4.3 FRAME FORMATS ................................................................................................................................... 92<br />

4.3.1 Distributor Frame ................................................................................................................................ 94<br />

4.3.2 Data Frame.......................................................................................................................................... 96<br />

Submission page 9 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.3.3 Silence Frame...................................................................................................................................... 96<br />

4.3.4 Channel Estimation Frame.................................................................................................................. 97<br />

4.3.5 Polling Frame...................................................................................................................................... 99<br />

4.3.6 TDR Polling Frame ........................................................................................................................... 100<br />

4.3.7 CSMA Frame .................................................................................................................................... 101<br />

4.3.8 <strong>Access</strong> Frame .................................................................................................................................... 102<br />

4.3.9 <strong>Access</strong> Reply Frame.......................................................................................................................... 102<br />

4.3.10 Non-returnable Data Frame............................................................................................................... 104<br />

4.3.11 Clock Frame...................................................................................................................................... 104<br />

4.4 <strong>MAC</strong> DELIMITERS................................................................................................................................. 106<br />

4.4.1 Token announce ................................................................................................................................ 106<br />

4.4.2 Token ................................................................................................................................................ 111<br />

4.5 TOKEN LOSS RECOVERY.................................................................................................................... 127<br />

4.6 <strong>MAC</strong> PARAMETERS SPECIFICATION................................................................................................ 131<br />

4.7 <strong>MAC</strong> service specification (<strong>MAC</strong> SAP)................................................................................................... 133<br />

4.7.1 <strong>MAC</strong> service primitives .................................................................................................................... 133<br />

4.7.2 <strong>MAC</strong>-DATA.req ............................................................................................................................... 134<br />

4.7.3 <strong>MAC</strong>-DATA.cnf ............................................................................................................................... 135<br />

Submission page 10 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.4 <strong>MAC</strong>-DATA.ind ............................................................................................................................... 135<br />

4.7.5 <strong>MAC</strong>-ACK.req.................................................................................................................................. 136<br />

4.7.6 <strong>MAC</strong>-ACK.cnf.................................................................................................................................. 136<br />

4.7.7 <strong>MAC</strong>-ACK.ind.................................................................................................................................. 137<br />

4.7.8 <strong>MAC</strong>-MNT-TOKEN.req .................................................................................................................. 137<br />

4.7.9 <strong>MAC</strong>-MNT-TOKEN.ind .................................................................................................................. 138<br />

4.7.10 <strong>MAC</strong>-MNT-TOKEN.cnf .................................................................................................................. 138<br />

4.7.11 <strong>MAC</strong>-MNT-RESOURCES.req......................................................................................................... 139<br />

4.7.12 <strong>MAC</strong>-MNT-RESOURCES.ind......................................................................................................... 139<br />

4.7.13 <strong>MAC</strong>-MNT-RESOURCES.cnf......................................................................................................... 140<br />

4.7.14 <strong>MAC</strong>-MNT-CHANEST-FRAME.req............................................................................................... 141<br />

4.7.15 <strong>MAC</strong>-MNT-CHANEST-REQ.req .................................................................................................... 141<br />

4.7.16 <strong>MAC</strong>-MNT-CHANEST-REQ.ind .................................................................................................... 142<br />

4.7.17 <strong>MAC</strong>-MNT-NHOPS.req................................................................................................................... 142<br />

4.7.18 <strong>MAC</strong>-MNT-NHOPS.cnf................................................................................................................... 143<br />

4.7.19 <strong>MAC</strong>-MNT-CHANGE.req ............................................................................................................... 143<br />

4.7.20 <strong>MAC</strong>-MNT-CHANGE.cnf ............................................................................................................... 144<br />

4.7.21 <strong>MAC</strong>-MNT-TXSYMB.ind ............................................................................................................... 144<br />

Submission page 11 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.22 <strong>MAC</strong>-MNT-CHANSTATS.req......................................................................................................... 145<br />

4.7.23 <strong>MAC</strong>-MNT-CHANSTATS.cnf......................................................................................................... 145<br />

4.7.24 <strong>MAC</strong>-MNT-NEWMID.ind ............................................................................................................... 146<br />

4.7.25 <strong>MAC</strong>-MNT-LINK-STATUS.req ...................................................................................................... 146<br />

4.7.26 <strong>MAC</strong>-MNT-LINK-STATUS.cnf ...................................................................................................... 147<br />

5 LLC ................................................................................................................................................................... 147<br />

5.1 INTRODUCTION..................................................................................................................................... 147<br />

5.2 BURST HEADER..................................................................................................................................... 148<br />

5.2.1 Burst header with data....................................................................................................................... 148<br />

5.2.2 Burst header without data.................................................................................................................. 151<br />

5.3 BURST STRUCTURE.............................................................................................................................. 153<br />

5.3.1 Unencrypted Burst Structure............................................................................................................. 153<br />

5.3.2 Encrypted Burst Structure ................................................................................................................. 156<br />

5.4 Packet ACK Protocol ................................................................................................................................ 157<br />

5.4.1 Transmission window management .................................................................................................. 158<br />

5.4.2 Packet ACK Protocol: Group Encoding............................................................................................ 158<br />

5.4.3 Packet ACK Protocol: Run-Length Encoding .................................................................................. 161<br />

5.4.4 Transmission of PAP information..................................................................................................... 163<br />

Submission page 12 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

5.5 LLC service specification (LLC SAP)...................................................................................................... 163<br />

5.5.1 LLC service primitives...................................................................................................................... 163<br />

5.5.2 LLC-DATA.req................................................................................................................................. 164<br />

5.5.3 LLC-DATA.cnf................................................................................................................................. 164<br />

5.5.4 LLC-DATA.ind................................................................................................................................. 165<br />

5.5.5 LLC-MNT-ACKMODE.req ............................................................................................................. 165<br />

6 CONVERGENCE LAYER............................................................................................................................... 166<br />

6.1 OVERVIEW ............................................................................................................................................. 166<br />

6.2 PACKET FORMAT.................................................................................................................................. 166<br />

6.2.1 Maximum <strong>and</strong> Minimum Packet length............................................................................................ 167<br />

6.2.2 OVLAN Fields.................................................................................................................................. 168<br />

6.2.3 BPL service class .............................................................................................................................. 168<br />

6.2.4 PB Field............................................................................................................................................. 169<br />

6.2.5 Octet alignment ................................................................................................................................. 169<br />

6.3 CONVERGENCE LAYER SERVICE PRIMITIVES.............................................................................. 171<br />

6.3.1 Multi-port transfer requests............................................................................................................... 172<br />

6.4 BROADCAST/MULTICAST HANDLER FUNCTIONAL REQUIREMENTS .................................... 172<br />

7 BRIDGING FUNCTION.................................................................................................................................. 173<br />

Submission page 13 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

7.1 General ...................................................................................................................................................... 173<br />

7.2 IEEE 802.1D conformance ....................................................................................................................... 173<br />

7.3 IEEE 802.1Q conformance ....................................................................................................................... 174<br />

7.4 OVLAN Function...................................................................................................................................... 174<br />

7.4.1 General .............................................................................................................................................. 174<br />

7.4.2 Frame admittance <strong>and</strong> OVLAN assignment ..................................................................................... 175<br />

7.4.3 OVLAN Ingress filtering .................................................................................................................. 176<br />

7.4.4 OVLAN Egress filtering ................................................................................................................... 176<br />

7.4.5 OVLAN management ....................................................................................................................... 176<br />

7.5 Sending broadcast/multicast Ethernet frames ........................................................................................... 176<br />

7.6 PB field ..................................................................................................................................................... 177<br />

7.6.1 Bridging between BPL ports............................................................................................................. 177<br />

7.6.2 Bridging from a non-BPL port to a BPL port ................................................................................... 177<br />

7.7 BPL service class transmission ................................................................................................................. 177<br />

7.8 Filtering multicast management messages from a BPL port..................................................................... 177<br />

7.9 Filtering multicast management messages from the management port..................................................... 178<br />

8 QOS SERVICES............................................................................................................................................... 178<br />

8.1 INTRODUCTION..................................................................................................................................... 178<br />

Submission page 14 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

8.2 SERVICE CLASS DEFINITION ............................................................................................................. 179<br />

8.2.1 Priority .............................................................................................................................................. 179<br />

8.2.2 Max Subcell <strong>Access</strong> Time................................................................................................................. 179<br />

8.2.2.1 Configuration .................................................................................................................................... 180<br />

8.2.3 Resource reservation type ................................................................................................................. 180<br />

8.2.3.1 Configuration .................................................................................................................................... 180<br />

8.2.4 Service reliability .............................................................................................................................. 181<br />

8.2.4.1 Configuration .................................................................................................................................... 181<br />

8.2.5 Example of a service class definition................................................................................................ 181<br />

8.2.6 Provisioning Service Class Definitions to slaves.............................................................................. 183<br />

8.3 CONGESTION MANAGEMENT ........................................................................................................... 183<br />

8.3.1 Configuration .................................................................................................................................... 184<br />

8.4 CONNECTION ADMISSION CONTROL.............................................................................................. 184<br />

8.5 Traffic Shaping.......................................................................................................................................... 185<br />

8.5.1 QOS Requirements............................................................................................................................ 185<br />

9 LAYER MANAGEMENT................................................................................................................................ 186<br />

9.1 CONTROL PROTOCOLS........................................................................................................................ 186<br />

9.1.1 CCP (Communication <strong>Control</strong> Protocol) Description....................................................................... 186<br />

Submission page 15 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

9.1.2 Adaptive Bit-Loading Protocol (ABLP) ........................................................................................... 192<br />

9.1.3 <strong>Access</strong> Protocol................................................................................................................................. 197<br />

9.1.4 Port Solver Protocol .......................................................................................................................... 202<br />

10 SECURITY ................................................................................................................................................... 279<br />

10.1 LOW LEVEL ENCRYPTION AND INTEGRITY.................................................................................. 279<br />

10.1.1 Overview........................................................................................................................................... 279<br />

10.1.2 Detailed encryption process .............................................................................................................. 280<br />

10.2 AAA protocol............................................................................................................................................ 286<br />

10.3 Key Hierarchies......................................................................................................................................... 292<br />

10.4 Establishing the keys................................................................................................................................. 293<br />

11 SYSTEM PARAMETERS............................................................................................................................ 294<br />

11.1 GENERAL PARAMETERS..................................................................................................................... 294<br />

11.2 AGC (AUTOMATIC GAIN CONTROL) PARAMETERS..................................................................... 298<br />

11.3 RADIUS PARAMETERS ........................................................................................................................ 299<br />

11.4 CLASS OF SERVICE (COS) PARAMETER.......................................................................................... 300<br />

11.5 QUALITY OF SERVICE (QOS) PARAMETERS .................................................................................. 302<br />

11.5.1 Slave Node Parameters (CPE)........................................................................................................... 303<br />

11.5.2 Master Node Parameters (HE or REPEATER)................................................................................. 303<br />

Submission page 16 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

11.6 PROFILES PARAMETERS..................................................................................................................... 304<br />

11.7 TRANSLATION TABLE PARAMETERS.............................................................................................. 309<br />

11.8 <strong>MAC</strong> FILTER PARAMETERS................................................................................................................ 310<br />

11.9 NTP PARAMETERS................................................................................................................................ 311<br />

11.10 SNMP PARAMETERS ........................................................................................................................ 312<br />

11.11 STP PARAMETERS ............................................................................................................................ 312<br />

11.12 VOIP PARAMETERS.......................................................................................................................... 315<br />

11.12.1 Dial Plan Configuration ................................................................................................................ 322<br />

11.12.2 Country Specific Parameters......................................................................................................... 324<br />

11.12.3 Tone pattern configuration............................................................................................................ 327<br />

11.13 VLAN NETWORK............................................................................................................................... 327<br />

11.14 OVLAN PARAMETERS ..................................................................................................................... 330<br />

11.15 CUSTOM VLAN/OVLAN PARAMETERS........................................................................................ 331<br />

11.15.1 Custom VLAN Parameters............................................................................................................ 332<br />

11.15.2 Custom OVLAN Parameters......................................................................................................... 337<br />

11.16 ACCESS PROTOCOL PARAMETERS .............................................................................................. 341<br />

12 CONFIGURATION...................................................................................................................................... 344<br />

12.1 MIB ........................................................................................................................................................... 344<br />

Submission page 17 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

12.1.1 SNMP Management .......................................................................................................................... 344<br />

12.1.2 MIB-II for IEEE P1901..................................................................................................................... 345<br />

12.1.3 IEEE P1901 Private MIB .................................................................................................................. 346<br />

12.2 AUTO-CONFIGURATION AND PROVISIONING............................................................................... 358<br />

12.2.1 Auto-configuration purpose .............................................................................................................. 358<br />

12.2.2 Auto-configuration process overview ............................................................................................... 358<br />

12.2.3 <strong>Access</strong> Protocol................................................................................................................................. 360<br />

12.2.4 Auto-configuration at Modem Boot.................................................................................................. 361<br />

12.2.5 PTTP Protocol................................................................................................................................... 362<br />

12.2.6 Translation Table .............................................................................................................................. 371<br />

12.2.7 Auto-configuration & Networking.................................................................................................... 372<br />

12.2.8 DHCP Support .................................................................................................................................. 375<br />

12.2.9 RADIUS Support .............................................................................................................................. 376<br />

12.3 Auto-configuration Parameters ................................................................................................................. 377<br />

12.3.1 Parameter Types................................................................................................................................ 377<br />

12.3.2 Parameter Format .............................................................................................................................. 377<br />

12.3.3 Auto-configuration parameter list ..................................................................................................... 378<br />

ANNEX A MIB DEFINITION IN ASN.1 FORMAT (NORMATIVE) ............................................................ 394<br />

Submission page 18 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

ANNEX B Performance (InforMative) ............................................................................................................... 442<br />

B.1 Data stream ............................................................................................................................................... 442<br />

B.2 Delimiters.................................................................................................................................................. 444<br />

1 INTRODUCTION<br />

This document is the technical specification of the IEEE P1901 technology.<br />

1.1 SCOPE<br />

This document specifies a physical layer (<strong>PHY</strong>), medium access control (<strong>MAC</strong>), LLC layer <strong>and</strong> convergence layer<br />

for data transmission over the electrical BPLs for <strong>Access</strong> Networks.<br />

1.2 OVERVIEW<br />

The purpose of this document is to specify a BPL data transmission system based on Orthogonal Frequency<br />

Division Multiplexing (OFDM) for providing <strong>Access</strong> services.<br />

Specifically this specification,<br />

- Describes a <strong>PHY</strong> capable of achieving rates in excess of 200 Mbps<br />

- Describes a Master-Slave <strong>MAC</strong> optimised for the <strong>Access</strong> BPL environment<br />

- Describes the QoS mechanisms available to support b<strong>and</strong>width <strong>and</strong> latency guarantees<br />

- Describes the security procedures used to provide data privacy over the BPL medium<br />

The description is written from the transmitter perspective to ensure interoperability between devices <strong>and</strong> allow<br />

different implementations. Some minimal requirements about the receiver behaviour are also given.<br />

1.3 REFERENCES<br />

The following st<strong>and</strong>ards contain provisions which, through references in this text, constitute normative provisions<br />

of this specification. At the time of publication, the editions indicated were valid. All st<strong>and</strong>ards are subject to<br />

Submission page 19 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

revision, <strong>and</strong> parties to agreements based on this st<strong>and</strong>ard are encouraged to investigate the possibility of applying<br />

the most recent revisions of the st<strong>and</strong>ards listed below.<br />

• ANSI X9.42: 2003. Agreement of Symmetric Keys Using Discrete Logarithm Cryptography<br />

• IEEE 802.3 St<strong>and</strong>ards for Local <strong>and</strong> Metropolitan Area Networks – Residential Ethernet<br />

• IEEE 802.1p St<strong>and</strong>ards for Local <strong>and</strong> Metropolitan Area Networks - Traffic Class Expediting <strong>and</strong> Dynamic<br />

Multicast Filtering<br />

• IEEE 802.1D St<strong>and</strong>ards for Local <strong>and</strong> Metropolitan Area Networks – <strong>MAC</strong> bridges<br />

• IEEE 802.1q St<strong>and</strong>ards for Local <strong>and</strong> Metropolitan Area Networks - Virtual Bridged Local Area Networks<br />

• IEEE 802.1w St<strong>and</strong>ards for Local <strong>and</strong> Metropolitan Area Networks - Rapid Reconfiguration of Spanning<br />

Tree<br />

• IEEE 802.11i St<strong>and</strong>ards for Local <strong>and</strong> Metropolitan Area Networks – <strong>Medium</strong> <strong>Access</strong> <strong>Control</strong> (<strong>MAC</strong>)<br />

Security Enhancements<br />

• RFC 3610 - Counter with CBC-<strong>MAC</strong> (CCM)<br />

• NIST 800-38A - 2001, Recommendation for Block Cipher Modes of Operation<br />

• FIPS PUB 198 - The Keyed-hash Message Authentication Code<br />

• FIPS 197 – Advanced Encryption St<strong>and</strong>ard (AES)<br />

1.4 DOCUMENT CONVENTIONS<br />

This document is divided into sections <strong>and</strong> appendices. The document body (all sections) is normative (except for<br />

italicised text); each appendix is identified as in its title as normative or informative.<br />

Text formatted in italics is not part of the specification. It is for clarification only.<br />

Binary numbers are indicated by the prefix 0b followed by the binary digits, for example, 0b0101. Hexadecimal<br />

numbers are indicated by the prefix 0x.<br />

Formal requirements are indicated with ‘shall’ in the main body of this document.<br />

Options are indicated with ‘may’ in the main body of this document. If an option is incorporated in an<br />

implementation, it shall be done as specified in this document.<br />

⎡⎤ ⋅ denotes rounding to the closest higher or equal integer<br />

Submission page 20 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

⎣⎦ ⋅ denotes rounding to the closest lower or equal integer<br />

1.5 DEFINITIONS<br />

Active slave An Active slave regularly gets transmission opportunities via the reception of<br />

data tokens from its master.<br />

Bridge port Ports of the bridging block. There are three types of bridge ports: BPL ports,<br />

non-BPL ports <strong>and</strong> the management port. BPL ports are the bridge ports that<br />

are directly mapped onto the completed entries of the Port Solver Table. Non-<br />

BPL ports are any other external ports of the node (e.g. Ethernet, USB,<br />

WIFI,…). The management port is used for the exchange of management<br />

messages between the bridging block <strong>and</strong> the layer management.<br />

Bridging block A functional block which is placed above the convergence layer. This block<br />

makes uses of st<strong>and</strong>ard 802.1D bridging to perform a layer-2 interconnection<br />

between the bridge ports of a node.<br />

Broadcast A transmission that is addressed to all the units of a layer-2 Local Area<br />

Network. It corresponds to the transmission of an Ethernet frame with an<br />

Ethernet Broadcast Destination address. It might be carried over the broadcast<br />

port or can be transmitted consecutively over unicast ports.<br />

Broadcast port Specific LLC port which value is 127. Transmission over the broadcast port<br />

makes use of the HURTO modulation.<br />

Burst A <strong>MAC</strong> Service Data Unit passed to the <strong>MAC</strong> layer by the LLC layer. A Burst<br />

includes one or several complete or fragmented packets destined to the same<br />

port.<br />

Channel<br />

Estimation Frame<br />

A Channel Estimation MPDU which does not contain any data payload. A<br />

Channel Estimation Frame starts with a Token Announce followed by a<br />

specific sequence of symbols used for channel estimation. It is not terminated<br />

by a token.<br />

CPE A BPL unit which only behaves as a slave node.<br />

Data Payload Burst payload which is adaptive modulated or HURTO modulated, depending<br />

on the channel conditions.<br />

Submission page 21 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Delimiter A delimiter is a 22 byte block which is HURTO modulated over one single<br />

symbol. There are three types of delimiters: the Burst Header (LLC), the Token<br />

Announce <strong>and</strong> the Token (<strong>MAC</strong>).<br />

FDR A BPL unit which combines a HE <strong>and</strong> either a CPE or a TDR.<br />

FMN (Flow Master<br />

Node)<br />

Is the node that guarantees the QoS of a certain traffic flow. The QC shall be<br />

always the FMN of the highest service classs of the BPL cell.<br />

Frame An MPDU passed by the <strong>MAC</strong> layer to the <strong>PHY</strong> layer. It can be a regular<br />

MPDU or a Channel Estimation MPDU.<br />

HE A BPL unit which only behaves as a master node. It is the root of a BPL cell.<br />

Contrarily to a TDR, the master part of a HE is not linked to a slave part from<br />

which the right to communicate depends.<br />

Idle slave An Idle slave does not get any transmission opportunities from its master.<br />

However, it is regularly polled by its master. (see polling).<br />

Master A node responsible for controlling access of its slaves to the network.<br />

Message Management Protocol Data Units generated by the <strong>Layer</strong> Management block.<br />

Management messages are IEEE 802.3 SNAP encapsulated <strong>and</strong> provided to the<br />

bridging block before being subsequently transmitted onto the bridge ports.<br />

Management messages are either unicast or multicast. Multicast management<br />

messages are transmitted over the broadcast port using HURTO modulation.<br />

Unicast management messages are transmitted over the unicast port using the<br />

adequate mapping (adaptive or HURTO).<br />

Mode A mode is defined by a symbol type, a carrier center frequency <strong>and</strong> an optional<br />

power mask<br />

MPDU Mac Protocol Data Unit delivered by the <strong>MAC</strong> layer to the <strong>PHY</strong> layer. The<br />

<strong>MAC</strong> layer generates two kinds of MPDUs: regular MPDUs <strong>and</strong> Channel<br />

Estimation MPDUs. A Channel Estimation MPDU does not contain any data<br />

payload (see Channel Estimation Frame definition). A regular MPDU can<br />

contain zero, one or several bursts addressed to one or several ports. A regular<br />

MPDU starts with a Token Announce delimiter <strong>and</strong> is terminated by a Token<br />

delimiter. There are 6 types of regular MPDUs: data, polling, access, access<br />

reply, silence <strong>and</strong> non-returnable. The type of the regular MPDU corresponds<br />

to the type of the Token terminating the regular MPDU.<br />

Submission page 22 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Multicast A transmission that is addressed to a group of units of a LAN segment. It is<br />

making use of an Ethernet Multicast Destination address. It might be carried<br />

over port 127 using HURTO mode, consecutively over unicast ports or can be<br />

transmitted over native multicast ports.<br />

Node A logical element which implements this specification.<br />

Packet An LLC Service Data Unit passed by the Convergence layer to the LLC layer.<br />

Each Ethernet frame received from the Convergence layer is converted into<br />

one single packet.<br />

<strong>PHY</strong>-signal <strong>PHY</strong>-signals are specific signals used as PPDU headers. <strong>PHY</strong>-signals include<br />

the SOT, SYNC <strong>and</strong> CREF signals.<br />

BPL cell A set of units composed by a HE <strong>and</strong> the units under the direct or indirect<br />

control of that HE. A BPL cell is operating under the same symbol type <strong>and</strong> the<br />

same carrier center frequency.<br />

BPL subcell A set of units composed by a master <strong>and</strong> the units under the direct control of<br />

that master<br />

BPL sub-tree A set of units composed by a TDR <strong>and</strong> the units under the direct or indirect<br />

control of that TDR.<br />

Polling Process under which a master regularly checks the status of its Idle slaves<br />

(CPEs or TDRs) . There are four types of polling identified by the type of the<br />

polling token. By using the Alive polling token, the master can detect if a slave<br />

is not connected anymore (Unregistered slave). By using the Active polling<br />

token, the master can detect if a slave is requiring transmission opportunities of<br />

a service class different from 7 (Active slave). In a similar way, using the Alive<br />

polling token, the TDR can detect if its own slave is not connected anymore<br />

(Unregistered slave). By using the Active polling token, the TDR can detect if<br />

its own slave is requiring transmission opportunities of a service class different<br />

from 7 (Active slave).,<br />

Port LLC 7-bit address identifier. Communication between node A <strong>and</strong> B requires<br />

opening a Local Port on node A <strong>and</strong> B. The Local Port on node A is defined as<br />

the Remote Port on node B <strong>and</strong> vice-versa. Transmission is performed onto a<br />

Local Port whereas reception is performed from a Remote Port. From a<br />

receiver st<strong>and</strong>point, a Remote Port is not unique: a remote node is uniquely<br />

identified by its Remote Port <strong>and</strong> its <strong>MAC</strong> address. Port entries are managed<br />

via the Port Solver Protocol <strong>and</strong> the Announce Messages. Port 127 is used as<br />

the broadcast port. Authorized port values are 9 to 126.<br />

Submission page 23 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Port Solver Table Addressing table used by the LLC layer. It contains entries with the association<br />

between <strong>MAC</strong> addresses of the distant nodes <strong>and</strong> ports. The entries are<br />

complete when both the local <strong>and</strong> first remote ports are assigned or incomplete<br />

when only the local port is assigned <strong>and</strong> the remote port is set to 0xFF. A<br />

second remote port is also available to perform native multicast transmissions<br />

QC (QoS<br />

<strong>Control</strong>ler)<br />

QC is the node that distributes the access to the channel among all the nodes<br />

present in a PLC cell, sharing the same NID or not. It can be defined as the<br />

master of the PLC cell. Any node can become a QC. The QC cannot be fixed<br />

by the user <strong>and</strong> it is decided by the nodes. The QC shall be the FMN of the<br />

high priority data traffic of the BPL cell.<br />

Registered slave A slave whose access to the network has been authorized via the <strong>Access</strong><br />

Protocol. A Registered slave can be Active or Alive.<br />

REP Refers to either TDR or FDR<br />

Slave A node for which transmission opportunities are controlled by its master.<br />

These transmission opportunities are specified as Validity Periods carried in<br />

some specific tokens delivered by the master. Slaves which are part of a TDR<br />

can delegate these transmission opportunities to their associated internal master<br />

(see TDR definition).<br />

SOT A specific <strong>PHY</strong>-signal which starts all PPDUs. It is also used as a positive<br />

acknowledgement of a polling request.<br />

Spatial reuse A feature which enables simultaneous node transmissions within non<br />

interfering BPL sub-trees of a single BPL cell. This feature relies on the nonreturnable<br />

token <strong>and</strong> the Cluster Discovery Protocol<br />

OFDM Symbol Transmitted signal for that portion of time when the modulating amplitude <strong>and</strong><br />

phase state is held constant on each of the equally-spaced subcarriers in the<br />

signal.<br />

Symbol type One from three different kinds of OFDM symbol, according to its duration.<br />

TDR A BPL unit made of both an internal master part <strong>and</strong> a slave part which never<br />

operate at the same time. A TDR behaves either as a master or as a slave at<br />

different time periods. Contrarily to a HE, the master part of a TDR is not a<br />

permanent master which has permanent control of its transmission<br />

opportunities. The right to communicate of the master part of a TDR depends<br />

on the Validity Period assigned to its associated slave part.<br />

Submission page 24 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Tonemap Table that contains the amount of bits that shall be transmitted by each<br />

subcarrier.<br />

Token The token is the <strong>MAC</strong> delimiter which terminates a regular MPDU. There are<br />

ten types of tokens: data <strong>and</strong> distributor token are used to propose transmission<br />

opportunities to one or more distant node, access/access reply tokens are used<br />

to discover Unregistered slaves, polling <strong>and</strong> TDR token are used for the slave<br />

<strong>and</strong> TDR states polling respectively, non-returnable token is used for allocating<br />

simultaneous transmission opportunities to several slaves (spatial reuse),<br />

silence token is used for sending a regular MPDU <strong>and</strong> keeping control of the<br />

medium after the transmission of this MPDU, CSMA token allow the priorized<br />

contention for the following transmission to every node that demodulate it, <strong>and</strong><br />

clock token allow the synchronization in time of every node in the BPL cell.<br />

Unicast A transmission that is addressed to a unique recipient.<br />

Unregistered slave An Unregistered slave is not managed by any master. A master can detect such<br />

slaves via the exchange of an access frame <strong>and</strong> an access reply frame.<br />

Visibility From a node to another node, when the first node is able to demodulate the<br />

token announce sent by the second node.<br />

Word A data unit of 32-bits<br />

1.6 ABBREVIATIONS AND ACRONYMS<br />

4D Four Dimensional<br />

AAA Authorization – Authentication – Accounting<br />

ABLP Adaptive Bit-Loading Protocol<br />

ABR Available Bit Rate<br />

ACK ACKnowledge<br />

Submission page 25 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

AFE Analogue Front End<br />

AGC Automatic Gain <strong>Control</strong><br />

ANSI American National St<strong>and</strong>ards Institute<br />

APL Aggregated Payload Length<br />

ARQ Automatic Repeat Request<br />

ARP Address Resolution Protocol<br />

ATM Asynchronous Transfer Mode<br />

BE Best Effort<br />

BER Bit Error Rate<br />

BH Burst Header<br />

BNDA Border Node Designation Acknowledge<br />

BNDP Border Node Designation Protocol<br />

BPC Bits Per subCarrier<br />

BPDU Bridge Protocol Data Unit<br />

BPS Bits Per Symbol<br />

CAC Connection Admission <strong>Control</strong><br />

CBR Constant Bit Rate<br />

CCITT Comité Consultatif International Téléphonique et Télégraphique<br />

Submission page 26 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

CDP Cluster Discovery Protocol<br />

CLPDU Convergence <strong>Layer</strong> Protocol Data Unit<br />

CP Cyclic Prefix<br />

CPE Customer Premises Equipment<br />

CRC Cyclic Redundancy Check<br />

CSM Class of Service Monitor<br />

CTS Clear To Send<br />

CW CodeWord<br />

DAC Digital to Analogue Converter<br />

DES Data Encryption St<strong>and</strong>ard<br />

DS DownStream<br />

DSP Digital Signal Processing<br />

EMC Electromagnetic Compatibility<br />

FCMP Fair Congestion Management Policy<br />

FEC Forward Error Correction<br />

FIPS Federal Information Processing St<strong>and</strong>ards<br />

FFT Fast Fourier Transform<br />

FTP File Transfer Protocol<br />

Submission page 27 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

FMN Flow Master Node<br />

FW Firmware<br />

HE Head End<br />

HURTO High Ultra Reliable Transmission for Ofdm<br />

IEEE Institute of Electrical <strong>and</strong> Electronics Engineers<br />

ICI Inter Carrier Interference<br />

IDFT Inverse Discrete Fourier Transform<br />

IDP Interference Detection Packet<br />

IQ In-phase <strong>and</strong> Quadrature<br />

ISI Inter Symbol Interference<br />

ISO International Organization for St<strong>and</strong>ardization<br />

LLC Logical Link <strong>Control</strong><br />

LP Local Port<br />

LPDU LLC Protocol Data Unit<br />

LSB Least Significant Byte<br />

LSDU LLC Service Data Unit<br />

LV Low Voltage<br />

<strong>MAC</strong> Media <strong>Access</strong> <strong>Control</strong><br />

Submission page 28 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

MIC Message Integrity Check<br />

MID Master Identification<br />

MPDU <strong>MAC</strong> Protocol Data Unit<br />

MSB Most Significant Byte<br />

MSDU <strong>MAC</strong> Service Data Unit<br />

MTU Maximum Transfer Unit<br />

MV <strong>Medium</strong> Voltage<br />

OFDM Orthogonal Frequency Division Multiplexing<br />

OPERA Open PLC European Research Alliance<br />

CCP Communication <strong>Control</strong> Protocol<br />

OSI Open Systems Interconnection<br />

OUI Organizationally Unique Identifier<br />

OVLAN Optimized VLAN<br />

PAP Packet ACK Protocol<br />

PAR Peak to Average Ratio<br />

PBPS <strong>Physical</strong> Bits Per Symbol<br />

PCMP Priority Congestion Management Policy<br />

PDU Protocol Data Unit<br />

Submission page 29 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

<strong>PHY</strong> <strong>PHY</strong>sical layer<br />

BPL BPL Communications<br />

PN Pseudo Noise<br />

PPDU <strong>Physical</strong> Protocol Data Unit<br />

PSD Power Spectral Density<br />

PST Port Solver Table<br />

QC QoS <strong>Control</strong>ler<br />

QoS Quality of Service<br />

REP Repeater<br />

RP Remote Port<br />

RS Reed Solomon<br />

RTS Request To Send<br />

RX Reception<br />

SNAP SubNetwork <strong>Access</strong> Protocol<br />

SNR Signal to Noise Ratio<br />

SLA Service Level Agreement<br />

SOT Start of Transmission<br />

STP Spanning Tree Protocol<br />

Submission page 30 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

TA Token Announce<br />

TCM Trellis Coded Modulation<br />

TCP Transfer <strong>Control</strong> Protocol<br />

TDD Time Division Duplexing<br />

TDMA Time Division Multiple <strong>Access</strong><br />

TDR Time Division Repeater<br />

TO TimeOut<br />

TX Transmission<br />

UDP User Datagram Protocol<br />

UPA Universal BPL Association<br />

US UpStream<br />

VBR Variable Bit Rate<br />

VLAN Virtual Local Area Network<br />

VoIP Voice over IP<br />

2 GENERAL DESCRIPTION<br />

An access BPL network consists of a number of user terminals (CPEs) that transmit/receive traffic in a shared<br />

medium to/from a centralized station (HE). If the signal is too attenuated to reach all CPEs from the same HE,<br />

repeaters (REP) can be inserted in the network in order to retransmit the signal <strong>and</strong> thus increase the coverage.<br />

Repeaters can be either TDR or FDR. From this description, the type of topologies to be found in BPL access<br />

Submission page 31 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

networks are tree-like topologies, like the one depicted in Figure 1, where a central node, called a HE,<br />

concentrates all of the upstream <strong>and</strong> downstream traffic, although other topologies, as the ring shape topologies,<br />

are also common. All kinds of structures in <strong>Medium</strong> Voltage (MV) <strong>and</strong> Low Voltage (LV) can be reduced to a<br />

HE plus Repeaters structure.<br />

CPE<br />

REP<br />

CPE<br />

HE<br />

Submission page 32 UPA-OPERA<br />

REP<br />

CPE CPE<br />

Figure 1 Typical <strong>Access</strong> Scenario<br />

2.1 GENERAL DESCRIPTION OF THE ARCHITECTURE<br />

2.2 NODE DESCRIPTION<br />

A BPL network can be made either of:<br />

• one BPL cell,<br />

• several BPL cells if they are interconnected via Frequency Division repeaters (FDR). FDR are made of<br />

a combination of one HE <strong>and</strong> one CPE or TDR operating in different modes.<br />

In an access BPL network, there is usually one HE, placed in the MV/LV substation, that concentrates the<br />

upstream <strong>and</strong> downstream traffic from/to all the CPEs of all the connected BPL cells.<br />

CPE<br />

HE<br />

REP<br />

REP<br />

REP<br />

CPE


4-June-07 P1901_PRO_016_r0<br />

A BPL cell is composed from a <strong>Medium</strong> <strong>Access</strong> <strong>Control</strong> point of view by a HE <strong>and</strong> the set of units (CPEs or<br />

TDRs) under the direct or indirect control of that HE operating under the same symbol type <strong>and</strong> the same carrier<br />

frequency. Itis composed of:<br />

1. One HE<br />

2. From zero to several TDRs<br />

3. One (or several) CPE(s)<br />

To gguarantee the required performance in terms of Quality of Service, the nodes can be also divided in three<br />

types by means of their function to assure the Quality of Service: QoS <strong>Control</strong>lers (QCs), assumed to be a HE in<br />

a typical BPL cell, Flow Master Nodes (FMN), that are the nodes that assures the resources needed by a certain<br />

class of service traffic flow, <strong>and</strong> End Points that have no management tasks regarding QoS assurance. The QCs<br />

are also the FMN of the higest service class in the BPL cell. More information about QoS can be found in<br />

section 8.<br />

2.2.1 HE<br />

The HE is the central node that controls the entire BPL cell. It assigns resources to all nodes of the BPL cell<br />

through the use of the token, according to the QoS requirements of the flows circulating on the BPL cell. The<br />

HE will always be the master of any node directly connected to it.<br />

2.2.2 Time Division Repeaters<br />

A TDR is used to increase the coverage in areas too far from the cell’s HE. TDRs are connected to the HE or to<br />

other TDRs that act as their master node. TDRs share the channel allocated to them by their master node <strong>and</strong><br />

distribute it among their slave nodes according to the traffic flows <strong>and</strong> service classes in the BPL cell <strong>and</strong> the<br />

origin <strong>and</strong> destination of them. The TDR will be the slave of the HE or of another TDR, <strong>and</strong> will be the master<br />

of its slaves.<br />

2.2.3 CPE<br />

CPEs are BPL units installed in the customer’s household. A CPE must subscribe to the network before being<br />

able to access the channel. Subscribing to the network means selecting a master node that assigns channel<br />

access time. In order to subscribe to the network, a validation process is run that acknowledges that the CPE is<br />

valid. After being accepted into the network, the CPE automatically downloads a file (auto-configuration<br />

process) detailing the parameters to use, such as the user profile <strong>and</strong> other configuration parameters. The CPE is<br />

always a slave.<br />

2.3 <strong>MAC</strong> overview<br />

In an IEEE P1901 pre-established network the access to the channel is managed in a hierarchical way. The HE<br />

(that is usually the QC <strong>and</strong> the FMN for the higest service class) schedules the use of the channel by its slaves<br />

depending on the current traffic flows <strong>and</strong> its previously accepted QoS requirements. The access to the channel<br />

can be managed by the HE using two main procedures.<br />

Submission page 33 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

1. Sending indidually to each of the slaves a data or distributor frame, containg data from the HE to the slaves<br />

<strong>and</strong> finished by a token that contains the next slave or list of slaves that shall use the channel when the first<br />

transmission is finished in a predetermined order. The amount of channel time assigned by the HE <strong>and</strong> can<br />

be fixed for a timing interval or not. In the first case the channel allocation can be synchronous with the<br />

mains or not. In the second case if a node does not use the entire assigned time, the right to transmit is<br />

immeadiately given to the following node in the list or returned to the HE.:<br />

2. Sending a CSMA token, that opens a priorized contention among the nodes that receive it. The winner of<br />

the contention shall obtain the right to transmit for the given amount of time, <strong>and</strong> then, the right to transmit<br />

is returned to the HE.<br />

By means of the first procedure, a timing interval can be programmed where different slaves can allocate their<br />

transmissions.<br />

2.4 QoS overview<br />

IEEE P1901 provides various mechanisms to assure the QoS of the traffic flows in the BPL cell. Traffic flows<br />

are session oriented <strong>and</strong> tagged with certain service class that implies certain requirements in terms of latency<br />

<strong>and</strong> b<strong>and</strong>with, jointly with a requirement in terms of level of assurance of the reserved resources.<br />

A slave requiring to transmit certain type of traffic shall first classify it in one of the eight available service<br />

classes, each one with a preprogrammed latency, b<strong>and</strong>width <strong>and</strong> level of assurance of the required resources,<br />

that can be Variable Bit Rate (VBR), Constant Bit Rate (CBR), Available Bit Rate (ABR) or Best Effort. The<br />

mapping from Service Classes to the B<strong>and</strong>with, Latency <strong>and</strong> Type of Traffic is common <strong>and</strong> known by all<br />

nodes in the BPL cell.<br />

Then, by means of the Connection Admission <strong>Control</strong> (CAC) protocol, the requirements to transmit the traffic<br />

flow are solicited to the Flow Master Node of this service class, <strong>and</strong> can be accepted <strong>and</strong> a session ID shall be<br />

assigned to it, or rejected.<br />

In the case where the maximum capacity of the channel is reached, several congestion policies can be applied<br />

by the QC <strong>and</strong> FMNs to admit, reject or drop current sessions in the BPL cell (See 8.3).<br />

2.5 Security overview<br />

IEEE P1901 specification provides a state-of-art security mechanism including CTR 128 bits AES encryption<br />

with individual key for each CLPDU or fragment of CLPDU, integrity mechanisms by means of CBC 128 bits<br />

AES also performed individually for each CLPDU or fragment CLPDU, integrity protection of <strong>MAC</strong> addess,<br />

RADIUS <strong>and</strong> 802.1X based key distribution <strong>and</strong> AAA protocol, etc.<br />

Recommendations from 802.11i st<strong>and</strong>ard have been specially taken into account to design the security<br />

specification of IEEE P1901. More details are disclosed in section 10.<br />

Submission page 34 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

2.6 NETWORK REFERENCE MODEL<br />

This specification defines <strong>PHY</strong>, <strong>MAC</strong>, LLC <strong>and</strong> Convergence <strong>Layer</strong> functionality as well as minimal bridging<br />

requirements to be supported by all compliant implementations. It also defines layer management functions.<br />

Finally, it also contains specifications for Security <strong>and</strong> Configuration, including MIBs <strong>and</strong> autoconfiguration<br />

issues.<br />

Figure 2 System Reference Model<br />

Submission page 35 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

This document specifies Packet Management, LLC, <strong>MAC</strong> <strong>and</strong> <strong>PHY</strong> behaviour. End-to-end services are<br />

provided by protocol layers not specified in this document.<br />

At an application level the system appears as a black box between information packet interfaces <strong>and</strong> the BPL.<br />

The Bridging function is m<strong>and</strong>atory <strong>and</strong> described in section 7. From a bridging st<strong>and</strong>point, the layer<br />

management block is connected to the bridging function via a management port. The Convergence <strong>Layer</strong> is<br />

seen as a set of BPL ports.<br />

The Convergence layer performs the Ethernet Frame to Packet conversion. This function performs the<br />

conversion between Ethernet II/802.3 frames (802.1 p/q tagged or untagged) <strong>and</strong> 32-bit aligned packets. On the<br />

transmission path, the converter also sets the priority <strong>and</strong> the OVLAN tag, if needed. The Broadcast/Multicast<br />

h<strong>and</strong>ling is also done at this level.<br />

The LLC layer provides peer convergence layers with the ability to exchange LLC service data units<br />

(LSDUs=packets). Given a maximum size constraint on the LPDU payload provided by the layer management,<br />

the LLC segments <strong>and</strong>/or groups packets into LPDU payloads (burst payloads) to be transferred over the same<br />

transmission port. When several packets are present within a burst payload, inter-packets headers are appended.<br />

In relation with the layer management, the LLC also deals with encryption/decryption of burst payloads. The<br />

LLC will append the burst header to a burst payload.<br />

The <strong>MAC</strong> layer provides peer LLC layers with the ability to exchange <strong>MAC</strong> service data units<br />

(MSDUs=LPDUs=burst). On the transmission path, the <strong>MAC</strong> layer performs the grouping of bursts=MSDU<br />

into an MPDU. The <strong>MAC</strong> layer also provides the layer management with the ability to generate specific<br />

MPDUs=frames for performing background tasks: silence management, channel estimation, node status polling<br />

<strong>and</strong> node discovery. The <strong>MAC</strong> layer h<strong>and</strong>les 7 types of frames (data, silence, channel estimation, polling,<br />

access, access reply <strong>and</strong> non-returnable data). All these frames start with a token announce delimiter. Except for<br />

the channel estimation frame, all the other frames are terminated with a token delimiter which content depends<br />

on the type of the frame.<br />

The <strong>PHY</strong> layer performs the OFDM modulation <strong>and</strong> the digital signal processing (DSP) needed to transmit the<br />

MPDU over the BPL channel. It also adds the FEC redundancy.<br />

3 <strong>PHY</strong><br />

This section specifies the <strong>Physical</strong> <strong>Layer</strong> Entity for an Orthogonal Frequency Division Multiplexing (OFDM)<br />

system. OFDM has been chosen as the modulation technique because of its inherent adaptability in the presence<br />

of frequency selective channels, its resilience to jammer signals, its robustness to impulsive noise <strong>and</strong> its<br />

capacity of achieving high spectral efficiencies.<br />

Submission page 36 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.1 OVERVIEW<br />

The diagram in Figure 3 shows an example <strong>PHY</strong> layer of a transmitter.<br />

On the transmitter side, the <strong>PHY</strong> layer receives its inputs from the Media <strong>Access</strong> <strong>Control</strong> <strong>Layer</strong>. Two separate<br />

bit streams are shown because of the different encoding for data <strong>and</strong> control information. The delimiters shall be<br />

interleaved by the <strong>Control</strong> Interleaving block <strong>and</strong> mapped by the HURTO Mapping block; while the data stream<br />

shall be mapped using the HURTO Mapping block or the Adaptive Mapping block, depending on the reliability<br />

level required for the transmission. The outputs of both Mapping blocks lead into the Scrambler, which is<br />

followed by 4D-TCM (Four Dimensional Trellis Coded Modulation) encoding. The next step is the OFDM<br />

Modulation, which is composed of the Subcarrier Modulator, the IDFT (Inverse Discrete Fourier Transform),<br />

the Cyclic Prefix generator <strong>and</strong> the symbol windowing operation structure. The resulting digital signal is<br />

converted to an analog signal by means of a DAC <strong>and</strong> IQ modulated, before passing to the amplifying <strong>and</strong><br />

filtering stages.<br />

Delimiters<br />

Data<br />

payload<br />

CRC<br />

Data<br />

Reed-Solomon<br />

Encoder<br />

<strong>Control</strong><br />

Reed-Solomon<br />

Encoder<br />

<strong>Control</strong><br />

Interleaving<br />

3.2 <strong>PHY</strong> LAYER FRAME<br />

Adaptive<br />

Mapping<br />

HURTO<br />

Mapping<br />

Subcarrier<br />

Cyclic<br />

Scrambler 4D TCM<br />

IDFT<br />

Window<br />

Modulator<br />

Prefix<br />

Power Line<br />

Figure 3 Transmission <strong>PHY</strong> layer<br />

Figure 4 shows the symbols that are transmitted in a PPDU.<br />

Submission page 37 UPA-OPERA<br />

DAC<br />

IQ mod<br />

Amplifiers<br />

Filters


4-June-07 P1901_PRO_016_r0<br />

SOT<br />

Synchronization<br />

symbol<br />

Channel reference<br />

symbol<br />

maximum 243 symbols<br />

Figure 4 PPDU<br />

<strong>Control</strong> <strong>and</strong> data<br />

symbols<br />

The maximum duration of a PPDU is 243 symbols (counting from the synchronization symbol to the last<br />

symbol of the frame). A receiver shall be able to h<strong>and</strong>le a maximum duration PPDU.<br />

The gap between the last non-zero sample of the SOT <strong>and</strong> the first non-zero sample of the synchronization<br />

symbol shall be 2.75 ± 0.25 µs.<br />

The time between two consecutive PPDUs is fixed <strong>and</strong> known by all modems as the INTER PPDU SPACE 1<br />

(see 3.11 <strong>and</strong> 4.6). Only when scheduling the token by means of a Distributor Frame, the time can be reduced<br />

<strong>and</strong> is called INTER PPDU SPACE 2 (see 3.11 <strong>and</strong> 4.6).<br />

3.3 FORWARD ERROR CORRECTION<br />

3.3.1 Delimiters<br />

There are several types of delimiters that will be explained in 4.4 <strong>and</strong> 5.2. Delimiters are mapped to one OFDM<br />

symbol, so they will always have the same size.<br />

Three main calculations will be made over a delimiter as is shown in Figure 5.<br />

3.3.1.1 CRC-CCITT<br />

176 bits 192 bits 288 bits Frame 288 bits<br />

RS (12,8)<br />

CRC-16<br />

control<br />

Encoder<br />

Interleaver<br />

Figure 5 Delimiter encoding<br />

A CRC-CCITT is applied to the incoming 176 bits length delimiter applying the polynomial generator:<br />

Submission page 38 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

16 12<br />

g ( x)<br />

= x + x + x<br />

Equation 1<br />

The CRC check called CRC(x), can be obtained as the remainder of the division between I(x)*x16 <strong>and</strong> g(x),<br />

where I(x) is a binary coefficients polynomial given by:<br />

Therefore the CRC is expressed as:<br />

The resulting frame will be:<br />

Submission page 39 UPA-OPERA<br />

5<br />

+ 1<br />

I +<br />

175<br />

174<br />

2<br />

( x)<br />

= I 175 x + I 174 x + .... + I 2 x + I 1 x I 0<br />

Equation 2<br />

CRC +<br />

15<br />

14<br />

( x)<br />

= CRC15<br />

x + CRC14<br />

x + .... + CRC1x<br />

CRC0<br />

Equation 3<br />

16<br />

191 190<br />

18 17 16<br />

15<br />

T ( x)<br />

= I(<br />

x)<br />

x + CRC(<br />

x)<br />

= I175x<br />

+ I174<br />

x + .... + I 2 x + I1x<br />

+ I 0 x + CRC15x<br />

+ ... + CRC0<br />

Equati<br />

on 4<br />

A total of sixteen bits resulting from the CRC algorithm are then appended to the delimiter.<br />

The transformation is shown in the following figure:<br />

I 175 I 174 I 2 I 1 I 0<br />

I 175 I 174 I 2 I 1 I 0 CRC 15 CRC 0<br />

Figure 6 Delimiter CRC


4-June-07 P1901_PRO_016_r0<br />

3.3.1.2 Reed-Solomon Delimiter Coding<br />

Delimiters are composed by six RS codewords from (n=12,k=8,t=2) RS code.<br />

Four (n-k=4) parity symbols p3, p2, p1, p0 shall be appended to k=8 message symbols m7, m6, … , m0 to form a<br />

Reed-Solomon codeword m7, m6, … , m0, p3, p2, … , p0, where symbol m7 is the first four bits symbol in time<br />

out of the Reed-Solomon encoder. Each RS symbol is composed of four bits.<br />

The parity symbols shall be computed from the message symbols using the Equation 5:<br />

Where the message polynomial is:<br />

RS ( x)<br />

= M ( x)<br />

x<br />

mod g(<br />

x)<br />

Submission page 40 UPA-OPERA<br />

4<br />

Equation 5<br />

M +<br />

7 6<br />

( x)<br />

= m7<br />

x + m6x<br />

+ ... + m1x<br />

m0<br />

Equation 6<br />

The parity symbols are expressed as the following polynomial;<br />

RS +<br />

3 2<br />

( x)<br />

= p3x<br />

+ p2x<br />

+ p1x<br />

p0<br />

Equation 7<br />

The field generator binary polynomial that generates each RS symbol is given by:<br />

And the code generator polynomial is given by:<br />

4<br />

f ( x)<br />

= x + x + 1<br />

Equation 8


4-June-07 P1901_PRO_016_r0<br />

1<br />

2<br />

3<br />

4<br />

g ( x)<br />

= ( x −α<br />

)( x −α<br />

)( x −α<br />

)( x −α<br />

)<br />

Equation 9<br />

The RS binary symbol representation for delimiters of α 0 is 0b0001, where the left most bit of this RS symbol is<br />

the most significant bit (MSB). This way, the binary representation of each of the redundancy symbols<br />

generated on the Galois field GF(2 4 ) denoted as p3, p2, p1, p0 will be represented as RSX15, RSX14, RSX13, <strong>and</strong><br />

RSX12 for the symbol p3, RSX11, RSX10, RSX9, <strong>and</strong> RSX8 for the symbol p2, RSX7, RSX6, RSX5, <strong>and</strong> RSX4 for the<br />

symbol p1 <strong>and</strong> RSX3, RSX2, RSX1, <strong>and</strong> RSX0 for the symbol p0, where X denotes the RS codeword number.<br />

The following figure shows the final binary level representation of the delimiter:<br />

I 175 I 174 I 144 RS1 15 RS1 0<br />

I143 I142 I112 RS215 RS20 I 15<br />

I 14<br />

CRC 0 RS6 15 RS6 0<br />

Figure 7 Reed Solomon bit format<br />

The first bit to be transmitted is the leftmost of the first codeword (I175), followed by the rest of the bits of the<br />

RS codeword. Then, the second codeword, <strong>and</strong> so on. This is illustrated in<br />

175<br />

174<br />

3.3.1.3 Delimiter Interleaving<br />

I<br />

I<br />

... RS1<br />

I ... RS2<br />

I ....... RS5<br />

I ... RS6<br />

0<br />

143<br />

Submission page 41 UPA-OPERA<br />

0<br />

111<br />

Figure 8 Reed Solomon bit order<br />

After RS encoding, the six resulting RS codewords shall be interleaved with interleaving depth of six RS<br />

codewords <strong>and</strong> 4 bits granularity, in such a way that the first four bits of each RS codeword shall be sent first to<br />

the interleaver, then, the second 4 bits of each of the six RS codewords <strong>and</strong> so on. We can group the bits in<br />

nibbles for clarity:<br />

0<br />

15<br />

0


4-June-07 P1901_PRO_016_r0<br />

Figure 9 illustrates this interleaving<br />

N<br />

63<br />

N<br />

N<br />

N<br />

1<br />

0<br />

= ( I<br />

N 64 = ( I147<br />

, I<br />

= ( RS1<br />

, RS1<br />

60<br />

N 71 N 70 N 61 N 60<br />

N 59 N 58 N 49 N 48<br />

N 11 N 10 N 1 N 0<br />

N<br />

71<br />

15<br />

:<br />

= ( RS1<br />

, RS1<br />

, RS1<br />

, RS1<br />

)<br />

= ( RS6<br />

, RS6<br />

, RS6<br />

, RS6<br />

)<br />

7<br />

= ( RS6<br />

, RS6<br />

, RS6<br />

, RS6<br />

)<br />

Submission page 42 UPA-OPERA<br />

3<br />

175<br />

3<br />

, I<br />

:<br />

:<br />

174<br />

146<br />

14<br />

6<br />

2<br />

2<br />

, I<br />

Equation 10<br />

173<br />

, I<br />

)<br />

, I145,<br />

I144<br />

)<br />

, RS1<br />

, RS1<br />

13<br />

1<br />

5<br />

1<br />

172<br />

Figure 9 Frame control interleaving<br />

0<br />

12<br />

4<br />

0<br />

)<br />

N 71 N 59 N 23 N 11<br />

N 70 N 58 N 22 N 10<br />

N 60 N 48 N 12 N 0<br />

With reference to the right half of Figure 9 the transmission order is row-wise, starting with the first row <strong>and</strong><br />

from left to right, then the second row, <strong>and</strong> so on. In other words, the MSB of N71 will be the first to be<br />

transmitted, after N71, the next will be N59, <strong>and</strong> N0 will be last.<br />

3.3.2 Data payload<br />

The data payload, delimited by a burst header, shall be encoded by a variable rate 8-bit symbol Reed Solomon<br />

encoder. The RS data mode is set from the fields “FEC redundancy” <strong>and</strong> “FEC payload” of the burst header.<br />

The “FEC redundancy” value will determine which of the four RS data modes is used. The generator<br />

polynomial <strong>and</strong> redundancy of each of the available modes is given in Table 1:<br />

RS data mode g(x) RS data code


4-June-07 P1901_PRO_016_r0<br />

0 2<br />

3<br />

8<br />

g ( x)<br />

= ( x −α<br />

)( x −α<br />

)( x −α<br />

)...( x −α<br />

) (k0+8,k0,t=4)<br />

1 2<br />

3<br />

12<br />

g ( x)<br />

= ( x −α<br />

)( x −α<br />

)( x −α<br />

)...( x −α<br />

) (k1+12, k1,t=6)<br />

2 2<br />

3<br />

16<br />

g ( x)<br />

= ( x −α<br />

)( x −α<br />

)( x −α<br />

)...( x −α<br />

) (k2+16, k2,t=8)<br />

3 2<br />

3<br />

20<br />

g ( x)<br />

= ( x −α<br />

)( x − α )( x −α<br />

)...( x − α )<br />

Table 1 RS data polynomials<br />

(k3+20, k3,t=10)<br />

The “FEC payload” field in each burst header contains the number of 32-bit words that will be coded per RS<br />

codeword, <strong>and</strong> therefore determines the amount of payload bytes per codeword (ki).<br />

Maximum <strong>and</strong> minimum value for this field is given depending on the mode in Table 2:<br />

RS data<br />

mode<br />

Redundancy<br />

words<br />

Max payload in words<br />

Min payload in words<br />

HURTO Adaptive<br />

0 2 61 2 34<br />

1 3 60 3 33<br />

2 4 59 4 32<br />

3 5 58 5 31<br />

Table 2 RS data payload<br />

Each data payload shall be coded following a different RS coding scheme that will be configured in each Burst<br />

header. The selected coding scheme is a shortened Reed-Solomon code that can be processed as a systematic<br />

RS(255, 255-2*ti,ti) by adding 255-(ki+2ti) bytes set to zero before the information bits. After the RS coding<br />

procedure these null bytes shall be discarded, leading to RS codewords of n = ki+2t bytes<br />

Submission page 43 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

When the data payload length is not an integer number of Reed-Solomon codewords, the last Reed Solomon<br />

codeword will have a special coding given by the formula:<br />

[ ( 4*<br />

APL)<br />

mod( k + 2*<br />

t)<br />

] − 2t<br />

klastcw =<br />

i<br />

Equation 11<br />

Where APL is the data payload length in number of 32-bit words including RS coding parity bits.<br />

For the last codeword, no minimum value in k is applied.<br />

The incoming data payload shall be grouped in L groups of ki bytes, where ki has been taken from the “FEC<br />

payload” field in burst header, <strong>and</strong> a last group of klastcw bytes, calculated from Equation 11, as can be seen in<br />

the following figure:<br />

L Blocks<br />

I L*ki+klastcw-1 I L*ki+klastcw-2 I (L-1)*ki+klastcw RS1 2*t-1 RS1 0<br />

I (L-1)*ki+klastcw-1 I (L-1)*ki+klastcw-2 I (L-2)*ki+klastcw RS2 2*t-1 RS2 0<br />

I ki+klastcw-1 I ki+klastcw-2 I klastcw RSL 2*t-1 RSL 0<br />

I klastcw-1 I klastcw-2 I 0 RS(L+1) 2*t-1 RS(L+1) 0<br />

klastcw bytes<br />

k i bytes<br />

Figure 10 Reed Solomon byte grouping<br />

Submission page 44 UPA-OPERA<br />

2*t bytes<br />

2*t bytes


4-June-07 P1901_PRO_016_r0<br />

L is given by the formula:<br />

⎢<br />

L = ⎢<br />

⎣<br />

( ) ⎥ ki<br />

+ 2*<br />

t ⎦<br />

Submission page 45 UPA-OPERA<br />

4*<br />

APL<br />

Equation 12<br />

For each Reed-Solomon codeword, as in delimiter coding, (n-k) parity symbols pn-k-1, pn-k-2, … , p0 shall be<br />

appended to k message symbols mk-1, mk-2, … , m0 to form a Reed-Solomon codeword mk-1, mk-2, … , m0, pn-k-1,<br />

pn-k-2, … , p0, where symbol mk-1 is the first in time out of the Reed-Solomon encoder <strong>and</strong> the first in time of the<br />

uncoded data payload. Each of the symbols belongs to the Galois Field GF(2 8 ), <strong>and</strong> it is then represented in its<br />

binary form with eight bits. On the other h<strong>and</strong>, n <strong>and</strong> k variables depend on the selected RS data mode, taken<br />

from Table 1 <strong>and</strong> Table 2. The parity symbols shall be computed from the message symbols using the equation:<br />

Where<br />

Is the message polynomial,<br />

P<br />

M<br />

n−k<br />

P(<br />

x)<br />

= M ( x)<br />

x mod g(<br />

x)<br />

Equation 13<br />

k −1<br />

k −2<br />

( x)<br />

= mk<br />

− 1 x + mk<br />

−2<br />

x + ... + m1x<br />

+ m0<br />

Equation 14<br />

n−k<br />

−1<br />

n−k<br />

−2<br />

( x)<br />

= pn<br />

− k −1<br />

x + pn−<br />

k −2<br />

x + ... + p1x<br />

+ p0<br />

Equation 15<br />

Is the parity polynomial <strong>and</strong> g(x) is the code generator polynomial of the Reed-Solomon code, given by Table 1<br />

The field generator polynomial associated with the Reed-Solomon code is given by:<br />

8 4 3<br />

f ( x)<br />

= x + x + x + x<br />

Equation 16<br />

⎥<br />

2<br />

+ 1


4-June-07 P1901_PRO_016_r0<br />

The binary representation of α 0 is 0b00000001, where the left most bit of this RS symbol is the most significant<br />

bit (MSB).<br />

3.4 MAPPING MODES<br />

Once obtained a delimiter or a data payload, one from two different mapping procedures shall be used. The<br />

mapping mode is indicated with the field HURTO in the burst header (see section 5.2). HURTO mapping is<br />

fixed. Adaptive mapping will be done following a table (called bit-loading table) with information on how<br />

many coded bits will be allocated in each of the 1536 subcarriers in a symbol<br />

3.4.1 HURTO mapping<br />

HURTO mode shall be used in all delimiters <strong>and</strong> in the data payload if it is indicated in the HURTO field in the<br />

burst header.<br />

First, groups of 288 consecutive bits are made. Each of these groups is replicated eight times, in order to obtain<br />

groups of 2304 bits. The bit allocation table will be set to 2 bits per subcarrier for all the 1536 subcarriers of an<br />

OFDM symbol, <strong>and</strong> each resulting 2304 bits groups shall complete an entire OFDM symbol. 4D-TCM<br />

encoding will be done, with a reset in convolutional encoder each 288 incoming bits.<br />

In the data payload case with the HURTO bit set in the burst header, the last group will be completed with<br />

zeroes, if necessary.<br />

Submission page 46 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

<strong>Control</strong><br />

frame or<br />

HURTO<br />

data<br />

frame<br />

Frame after block coding.<br />

MSB is up.<br />

3.4.2 Adaptive mapping<br />

zero<br />

filling if<br />

needed<br />

288<br />

bits<br />

length<br />

Submission page 47 UPA-OPERA<br />

288<br />

bits<br />

length<br />

288<br />

bits<br />

length<br />

Number of groups will be one<br />

for control frame <strong>and</strong> no zero<br />

filling will be done. Transmission order<br />

will be up to down, MSB first.<br />

Figure 11 HURTO mapping<br />

Frame to encode by 4DTCM<br />

after scrambling<br />

2304bits<br />

length<br />

When the HURTO bit is unset in the burst header, the data payload will be mapped following the bit allocation<br />

table, which sets how many coded (after 4D-TCM) bits will be allocated in each subcarrier.<br />

When adaptive mapping is used, there must be at least 24 subcarriers with 2 or more information bits.


4-June-07 P1901_PRO_016_r0<br />

Normal<br />

Data<br />

Frame<br />

Frame after block<br />

coding. msb is up.<br />

Transmission order will be<br />

top to bottom, msb first.<br />

Figure 12 Adaptive mapping<br />

Submission page 48 UPA-OPERA<br />

BPS<br />

Bits<br />

Zero filling<br />

if needed<br />

BPS in the figure means the number of necessary data bits to fill an entire OFDM symbol with a certain bitloading.<br />

A mathematical expression of this definition is shown in Equation 17. The last symbol shall be padded<br />

with zeros before scrambling, if necessary, until an integer number of symbols is used.<br />

3.5 TRELLIS CODED MODULATION (4D-TCM)<br />

Once obtained a delimiter or data payload that will fill a integer number of OFDM symbols, a 16 state 4dimensional<br />

truncated trellis code is used for error correction. This code will be applied over groups of 1536<br />

subcarriers <strong>and</strong> reset each OFDM symbol, except in HURTO mode, where the 4D-TCM encoder will be reset<br />

each 192 subcarriers out, or, in other words, each 288 bits in.<br />

3.5.1 Bit Extraction<br />

Data bits from both delimiters <strong>and</strong> data payload shall be extracted according to a bit-loading table bj, with<br />

j=0…1535, righter bits first, in groups of z bits. In the case of HURTO mapping bj= 2 ∀j ∈ [0..1535]. Due to<br />

the constellation expansion associated with coding <strong>and</strong> the 4-dimensional nature of the code, zi will be<br />

calculated from a given pair (x,y) of two consecutive bj, where bj is the number of coded bits that subcarrier j<br />

will transmit.<br />

Due to the heavy impairments of the BPL channel, or regional regulations, some subcarriers can be set not to carry<br />

any information. This case is denoted with a bit loading bj = 0 for such subcarriers. When the two consecutive<br />

subcarriers x <strong>and</strong> y that form a symbol of the four dimensional code are set to zero, no bit extraction is performed,<br />

<strong>and</strong> the following pair of subcarriers is taken into account. On the other h<strong>and</strong>, when only one of the two subcarriers


4-June-07 P1901_PRO_016_r0<br />

is set to zero, a special bit extraction is performed to obtain the word called t’, including the insertion of two zeroes<br />

in position 0 <strong>and</strong> 2 of the final t’ word to be introduced in the codec. Similarly, when only one of the two subcarriers<br />

is set to one, the word t’ includes the insertion of one zero in position 2. If both subcarriers are set to one, the word<br />

t’ includes the insertion of two zeroes in position 0 <strong>and</strong> 2. Note that combinations of one subcarrier with 1 <strong>and</strong><br />

another subcarrier with 0 are not allowed.<br />

The extracted group will be noted as t’ <strong>and</strong> calculated from the following table:<br />

Condition Binary word/comment<br />

x ≥ 2 y ≥<br />

x = 0 y ≥<br />

x ≥ 2 y =<br />

x = 1 y ≥<br />

2<br />

2<br />

0<br />

2<br />

x ≥ 2 y = 1<br />

( t t ... t t t )<br />

t z z−1<br />

´ = t Where<br />

Submission page 49 UPA-OPERA<br />

4<br />

z '= z = x + y −1<br />

( t t ... t 0 t 0)<br />

t´ z z−1<br />

2 1<br />

= Where<br />

z ' = z + 2 = y + 1<br />

( t t ... t 0 t 0)<br />

t´ z z−1<br />

2 1<br />

= Where<br />

z ' = z + 2 = x + 1<br />

( t t ... t 0 t )<br />

t z z −1<br />

´ = t Where<br />

3<br />

z ' = z + 1 = x + y<br />

( t t ... t 0 t )<br />

t z z −1<br />

´ = t Where<br />

3<br />

z ' = z + 1 = x + y<br />

x = 1 y = 1<br />

( 0 0)<br />

t t = Where<br />

´ 1<br />

3<br />

2<br />

2<br />

2<br />

1<br />

1<br />

1


4-June-07 P1901_PRO_016_r0<br />

x = 0 y =<br />

0<br />

Table 3 Bit extraction<br />

z ' = z + 2 = x + y + 1<br />

Bit extraction not necessary, no message bits<br />

being sent<br />

Since the maximum number of bits in a group will be 19, a 19 bits wide word called t´ will be formed from each<br />

two subcarriers, filling most significant bits with zeroes when z´ < 19. This word will be scrambled with a<br />

pseudor<strong>and</strong>om word generator.<br />

The bits per symbol (BPS) is defined by:<br />

3.5.2 Scrambling<br />

BPS = ∑ z<br />

i<br />

∀i<br />

∈ Symbol<br />

Submission page 50 UPA-OPERA<br />

i<br />

Equation 17<br />

Each of the bits from the pseudor<strong>and</strong>om generator shall be generated with the same polynomial structure<br />

initialized with different seeds for each bit (where bit 0 is the least significant bit).<br />

The pseudor<strong>and</strong>om sequence generator shall be the 10-bit PN generator with characteristic polynomial given by<br />

Equation 18.<br />

( x)<br />

f = +<br />

3 10<br />

1+ x x<br />

Equation 18<br />

At the beginning of each symbol, the registers of the PN generators shall be set with the corresponding seeds<br />

given by Table 4<br />

PN Seed


4-June-07 P1901_PRO_016_r0<br />

0 0x2bf<br />

1 0x3f0<br />

2 0x3ff<br />

3 0x28d<br />

4 0x2d7<br />

5 0x017<br />

6 0x1e4<br />

7 0x3d8<br />

8 0x337<br />

9 0x1f1<br />

10 0x2a3<br />

11 0x3f3<br />

12 0x000<br />

13 0x11f<br />

14 0x329<br />

15 0x177<br />

16 0x331<br />

17 0x119<br />

Submission page 51 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

18 0x350<br />

Table 4 Scrambling seed values<br />

All the pseudor<strong>and</strong>om generators will advance once for each pair of extracted carriers. If no bit extraction is<br />

performed (x=y=0) the pseudor<strong>and</strong>om generators will not advance. The structure of each pseudor<strong>and</strong>om<br />

generator that generates a u word from the extracted t’ word is shown in Figure 13<br />

The symbol number value shall be 1 for the channel reference symbol, <strong>and</strong> shall be incremented by 1 for every<br />

symbol there after.<br />

u 19<br />

OUTPUT<br />

BIT 18 (MSB)<br />

OUTPUT<br />

BIT 0 (LSB)<br />

u 1<br />

t´ 19<br />

10 9 8 7 6 5 4 3 2 1<br />

PN GENERATOR 0<br />

10 9 8 7 6 5 4 3 2 1<br />

Symbol number (MSB)<br />

Symbol number (LSB)<br />

t´ 1<br />

Figure 13 Scrambling<br />

PN GENERATOR 18<br />

Submission page 52 UPA-OPERA<br />

XOR


4-June-07 P1901_PRO_016_r0<br />

3.5.3 Bit conversion<br />

The binary word u = (uz´, uz´-1,… u1) determines two binary words v’=(v’z´-y,…,v ’ 0) <strong>and</strong> w’=( w’y-1,…,w’0),<br />

which are used to look up two constellations points in the encoder constellation table. As a first step, v <strong>and</strong> w<br />

are obtained from u, as shown in Figure 14. Finally, v’ <strong>and</strong> w’ are obtained from v <strong>and</strong> w. For the usual case of<br />

x≥2 <strong>and</strong> y≥2, z´=z=x+y-1, <strong>and</strong> v´=v <strong>and</strong> w´=w contain x <strong>and</strong> y bits respectively. For the special cases when<br />

x=0 <strong>and</strong> y≥2, z´=z+2=y+1, v´=v=(v1,v0) <strong>and</strong> w´=w=(wy-1,…,w0), when y=0 <strong>and</strong> x≥2, z´=z+2=x+1,<br />

w´=v=(v1,v0) <strong>and</strong> v´=w=(wx-1,…,w0), when x=1 <strong>and</strong> y≥2, z´=z+1=y, v´=v=(v1) <strong>and</strong> w´=w=(wy-1,…,w0), when<br />

y=1 <strong>and</strong> x≥2, z´=z+1=x, w´=v=(v1) <strong>and</strong> v´=w=(wx-1,…,w0) <strong>and</strong> when x=1 <strong>and</strong> y=1, z´=z+2=3, v´=(w1) <strong>and</strong><br />

w´=(w0).<br />

The bits (u3, u2, u1) determine (v1,v0) <strong>and</strong> (w1,w0) according to following figure:<br />

u z´<br />

u z´-1<br />

u z´-y+3<br />

u z´-y+2<br />

u z´-y+1<br />

u 4<br />

u 3<br />

u 2<br />

u 1<br />

Convolutional<br />

Encoder<br />

v1=u1⊕u3 v0=u3 w1=u0⊕u1⊕u2⊕u3 w0=u2⊕u3 Submission page 53 UPA-OPERA<br />

u 2<br />

u 1<br />

u 0<br />

Figure 14 Conversion of u to v <strong>and</strong> w<br />

The convolutional encoder shown in Figure 14 is a systematic encoder as shown in Figure 15. At the beginning<br />

of the encoding of each subcarrier group (1536 or 192 when HURTO mode is active), the convolutional encoder<br />

state is initialized to (0,0,0,0). No special operation to terminate the code is performed.<br />

w y-1<br />

w y-2<br />

w 2<br />

v z´-y<br />

v z´-y-1<br />

v 2<br />

v 1<br />

v 0<br />

w 1<br />

w 0


4-June-07 P1901_PRO_016_r0<br />

u 2<br />

u 1<br />

S 2<br />

Delay<br />

S 1<br />

Delay Delay Delay<br />

Submission page 54 UPA-OPERA<br />

S 3<br />

Figure 15 Convolutional encoder<br />

The remaining bits of v <strong>and</strong> w are obtained from the less significant <strong>and</strong> more significant parts of (uz´, uz´-1,…,<br />

u4), respectively. When x≥2 <strong>and</strong> y≥2, v´=v=(uz´-y+2, uz´-y+1,..., u4,v1,v0) <strong>and</strong> w´=w=(uz´, uz´-1,…, uz´-y+3,w1,w0).<br />

When x=0 or y=0 (but not both), v= (v1, v0), <strong>and</strong> it will be assigned to the zero loading subcarrier (v´ when only<br />

x=0 but not y <strong>and</strong> w´ when y=0 but not x). w will have y bits in the first case <strong>and</strong> x bits in the second, <strong>and</strong> will<br />

be assigned to the non zero loading subcarrier.<br />

When x=1 or y=1 (but not both), v1 will be assigned to the 1 loading subcarrier (v´ when only x=1 but not y <strong>and</strong><br />

w´ when y=1 but not x), v0 is dropped. w will have y bits in the first case <strong>and</strong> x bits in the second, <strong>and</strong> will be<br />

assigned to the non zero loading subcarrier.<br />

When x=1 <strong>and</strong> y=1, v´=(w1) <strong>and</strong> w’=(w0)<br />

The binary word v´ is input first to the constellation encoder, <strong>and</strong> the binary word w´ last.<br />

3.5.4 Constellation encoder<br />

Each of the two resulting binary words after 4D-TCM process, called v’ <strong>and</strong> w’, represent an amplitude ak <strong>and</strong><br />

an increment to previous phase, called Δbk that will perform a new constellation point to be transmitted in one<br />

subcarrier. The first word to be processed <strong>and</strong> transmitted will be v’ <strong>and</strong> then w’. Since the mapping process to<br />

amplitude <strong>and</strong> phase increment will be the same for v’ <strong>and</strong> w’, we consider the following description based in a<br />

binary word called I that can be v’ or w’ indistinctly.<br />

In the following table, mapping for each bit-loading <strong>and</strong> the pair (ak, Δbk) <strong>and</strong> its relationship with the binary<br />

word I is shown.<br />

Bit-loading ak Δbk<br />

S 0<br />

u 2<br />

u 1<br />

u 0


4-June-07 P1901_PRO_016_r0<br />

1 0,0,0,0 0,0,0,0,0, I0<br />

2 0,0,0,0 0,0,0,0,I1, I1⊕I0<br />

3 0,0,0,I1 0,0,0,0,I2, I0<br />

4 0,0,0,I1 0,0,0,I2, I2⊕I3, I0<br />

5 0,0,I4, I1 0,0,0,I2, I2⊕I3, I0<br />

6 0,0,I5, I1 0,0,I2, I2⊕I3, I3⊕I4, I0<br />

7 0,I6,I6⊕I5, I1 0,0,I2, I2⊕I3, I3⊕I4, I0<br />

8 0,I7, I7⊕I6, I1 0,I2, I2⊕I3, I3⊕I4, I4⊕I5, I0<br />

9 I8, I8⊕I7, I8⊕I7⊕I6, I1 0,I2, I2⊕I3, I3⊕I4, I4⊕I5, I0<br />

10 I9, I9⊕I8, I9⊕I8⊕I7, I1 I2, I2⊕I3, I3⊕I4, I4⊕I5, I5⊕I6, I0<br />

Table 5 Constellation encoder<br />

Where the binary word I will be first v´<strong>and</strong> then w´ till end all the 1536 subcarriers.<br />

If no bit extraction is performed (x=y=0) the output of the constellation encoder shall be ak= (0,0,0,0) <strong>and</strong> Δbk<br />

=(0,0,0,0,0,0) for both subcarriers.<br />

3.6 SUBCARRIER MODULATION<br />

Each subcarrier of the <strong>Control</strong> or Data OFDM symbols shall be modulated using the ADPSK (Amplitude<br />

Differential Phase Shift Keying) modulation.<br />

Equation 19 defines the ADPSK constellation of M phases <strong>and</strong> N rings (MxN ADPSK):<br />

s<br />

k<br />

jθk<br />

( A a ) e<br />

=<br />

λ +<br />

Submission page 55 UPA-OPERA<br />

k


4-June-07 P1901_PRO_016_r0<br />

Where:<br />

Equation 19<br />

• k is the time index representing the k-th OFDM symbol. Index 0 corresponds to the channel reference<br />

symbol (see 3.8.1).<br />

• s k is the modulator output for a given subcarrier.<br />

• λ is the factor to normalize the constellation to unit power:<br />

λ =<br />

A<br />

2<br />

+<br />

⎛ 2N<br />

−1⎞<br />

( N −1)<br />

⎜ A + ⎟<br />

⎝ 6 ⎠<br />

Submission page 56 UPA-OPERA<br />

1<br />

Equation 20<br />

• a k , ak ∈{ 0, 1,<br />

Κ , N −1}<br />

, represents the information coded in the amplitude, as supplied by the<br />

constellation encoder (see 3.5.4).<br />

• θ k st<strong>and</strong>s for the absolute phase of the modulated signal obtained as follows:<br />

( θ ( 2π<br />

k 1 ) bk<br />

) mod π<br />

+<br />

θ k<br />

2<br />

M Δ<br />

= −<br />

Equation 21<br />

Equation 21 applies for k>0 only. bk<br />

Δbk ∈ 0, 1,<br />

Κ , M −1<br />

, represents the information coded in the<br />

phase increment, as supplied by the constellation encoder (see 3.5.4).<br />

Δ , { }<br />

A is a shaping parameter <strong>and</strong> represents the ring offset from the centre of the constellation.<br />

Parameters M, N <strong>and</strong> A are determined by the number of bits per subcarrier indicated by the bit-loading table<br />

according to Table 6.<br />

Bit-loading Constellation M N A Bits coded in the Bits coded in


4-June-07 P1901_PRO_016_r0<br />

points phase increment the amplitude<br />

2 4 4 1 1 2 0<br />

3 8 4 2 0.8 2 1<br />

4 16 8 2 1.7 3 1<br />

5 32 8 4 1.7 3 2<br />

6 64 16 4 2.5 4 2<br />

7 128 16 8 2.6 4 3<br />

8 256 32 8 5 5 3<br />

9 512 32 16 4.6 5 4<br />

10 1024 64 16 8.6 6 4<br />

Table 6 Constellation parameters<br />

The 4D-TCM provides the a k <strong>and</strong> Δ bk<br />

values to the ADPSK Modulator according to the bit-loading table. If<br />

the bit-loading table indicates that a subcarrier does not carry any information (0 bits per subcarrier) this<br />

subcarrier shall be modulated using 2 bits.<br />

3.7 OFDM MODULATION<br />

This section describes how the input constellations are grouped to create OFDM symbols. Special symbols for<br />

synchronization <strong>and</strong> SOT are also described.<br />

The signals will be described in a complex base-b<strong>and</strong> signal notation. Different implementations may be<br />

possible, if the signal transmitted to the channel is the same.<br />

Submission page 57 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.7.1 <strong>Control</strong> <strong>and</strong> Data symbols<br />

There shall be three symbol types that will define the signal b<strong>and</strong>width used by the system. The three types of<br />

symbols will be referred to as Type I (30 MHz signal b<strong>and</strong>width), Type II (20 MHz signal b<strong>and</strong>width) <strong>and</strong> Type<br />

III (10 MHz signal b<strong>and</strong>width). The symbols are defined based on three system clocks that will define the signal<br />

b<strong>and</strong>width. A node shall be operating in one of the three types at a given time. Specifically, symbol types are<br />

not mixed in a PPDU, <strong>and</strong> the transition from the use of a symbol type to a different one can take in the order of<br />

seconds.<br />

Table 7 lists some timing parameters of the OFDM modulation.<br />

Parameter Type I Type II Type III Units<br />

System clock 40 26 . 6<br />

) 13 . 3<br />

) MHz<br />

NSD: Number subcarriers 1536 1536 1536 Carriers<br />

NIDFT: IDFT interval 2048 2048 2048 Samples<br />

TIDFT: IDFT interval 51.2 76.8 153.6 μs<br />

NCP: Cyclic prefix 800 532 268 Samples<br />

TCP: Cyclic prefix 20 19.95 20.1 μs<br />

NSYM: Symbol interval 2848 2580 2316 Samples<br />

TSYM: Symbol interval 71.2 96.75 173.7 μs<br />

Table 7 OFDM modulation parameters<br />

The stream of complex numbers coming from the subcarrier modulator is divided into groups of NSD=1536 to<br />

form OFDM symbols.<br />

If a complex 2048-point IDFT is used, the 1536 subcarriers shall be mapped in the way shown in Figure 16.<br />

Submission page 58 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Frequency<br />

Domain<br />

Inputs<br />

Null<br />

#1<br />

#2<br />

.<br />

.<br />

#768<br />

Null<br />

.<br />

.<br />

Null<br />

#769<br />

.<br />

.<br />

#1536<br />

Null<br />

.<br />

.<br />

.<br />

.<br />

.<br />

.<br />

0<br />

1<br />

2<br />

.<br />

.<br />

768<br />

769<br />

.<br />

.<br />

1278<br />

1279<br />

.<br />

.<br />

2046<br />

2047<br />

Submission page 59 UPA-OPERA<br />

IDFT<br />

0<br />

1<br />

2<br />

.<br />

.<br />

768<br />

769<br />

.<br />

.<br />

1278<br />

1279<br />

.<br />

.<br />

2046<br />

2047<br />

Figure 16 Subcarrier mapping<br />

.<br />

.<br />

.<br />

.<br />

.<br />

.<br />

Time<br />

Domain<br />

Outputs<br />

After the inverse Fourier transform, the symbol is cyclically extended by NCP samples to create the “cyclic<br />

prefix”.<br />

3.7.2 Time domain windowing<br />

The symbol may be multiplied by a windowing function to smooth transitions between the symbols. However,<br />

the binding requirement is the spectral mask as detailed in 3.13. Time domain windowing is just one way to<br />

achieve that goal. The implementer may use other methods to achieve the same goal such as time domain<br />

filtering. Therefore the transition shape <strong>and</strong> duration (NW) are not specified here. In the particular case where<br />

NW=0 the window degenerates into a rectangular pulse of value 1 <strong>and</strong> duration NSYM. In the general case where<br />

NW>0 the window extends over more than one symbol (NSYM+NW) <strong>and</strong> the symbols overlap as shown in Figure<br />

17. The general expression for the windowing function is given in Equation 22.<br />

⎧<br />

⎪<br />

w(<br />

n)<br />

= ⎨<br />

⎪ f ( N<br />

⎪<br />

⎩<br />

W<br />

f ( n)<br />

1<br />

+ N<br />

SYM<br />

0<br />

− n −1)<br />

Equation 22<br />

And the windowing function fulfils the following condition:<br />

N<br />

SYM<br />

f(n) +<br />

f(N w - n -1)<br />

= 1<br />

0 ≤ n < NW<br />

N w ≤ n < N SYM<br />

≤ n < NW<br />

+ N<br />

elsewhere<br />

SYM


4-June-07 P1901_PRO_016_r0<br />

N W<br />

NCP<br />

Equation 23<br />

Submission page 60 UPA-OPERA<br />

N SYM<br />

N IFFT<br />

Figure 17 Windowing<br />

The maximum duration of the window (Nw) depends on the symbol Type used:<br />

• Type I: 128 samples<br />

• Type II: 128 samples<br />

• Type III: 64 samples<br />

The OFDM symbol can be expressed in mathematical form as inEquation 24.<br />

s<br />

768<br />

2046<br />

⎧<br />

⎛ j2πk<br />

⎞<br />

⎛ j2πk<br />

( n)<br />

= k SYM wSYM<br />

( n)<br />

⎨∑<br />

c(<br />

k,<br />

i)<br />

exp⎜<br />

( n − N CP − N W ) ⎟ + ∑ c(<br />

k − 510,<br />

i)<br />

exp⎜<br />

( n − N<br />

⎩ k = 1 ⎝ 2048<br />

⎠ k = 1279<br />

⎝ 2048<br />

Equation 24<br />

i<br />

Where<br />

− i is the i-th OFDM symbol; i = 0, 1, …<br />

− n is the sample index; 0 ≤ n < NSYM+NW<br />

− kSYM is a normalization factor, that shall be chosen in order to meet the PSD <strong>and</strong> modulation accuracy<br />

requirements.<br />

− wSYM(n) is a windowing function<br />

− c(k,i) is the k+iNSD complex value from the subcarrier modulation block<br />

CP<br />

− N<br />

W<br />

⎞⎫<br />

) ⎟⎬<br />

⎠⎭


4-June-07 P1901_PRO_016_r0<br />

Several of these symbols are concatenated in a burst as expressed in Equation 25<br />

3.8 REFERENCE SIGNALS<br />

3.8.1 Channel reference symbol<br />

s ( n)<br />

= ∑ si<br />

( n − iN SYM )<br />

i<br />

Equation 25<br />

The channel reference symbol comes before the data <strong>and</strong> control symbols. The channel reference symbol<br />

followsEquation 24 with<br />

c( k,<br />

i)<br />

= exp( jφk<br />

)<br />

Equation 26<br />

where φk is a r<strong>and</strong>om phase picked from a uniform distributed r<strong>and</strong>om variable between [0,2π[. The channel<br />

reference symbol gives the initial reference for the subcarrier modulation (3.6)<br />

3.8.2 Synchronization symbol<br />

The synchronization symbol comes before the channel reference symbol. The synchronization symbol follows<br />

Equation 24 with<br />

c(<br />

k,<br />

i)<br />

⎧<br />

= ⎨<br />

⎩<br />

2 exp(<br />

Submission page 61 UPA-OPERA<br />

0<br />

jφ<br />

)<br />

k<br />

Equation 27<br />

k<br />

k<br />

even<br />

where φk is a r<strong>and</strong>om phase picked from a uniform distributed r<strong>and</strong>om variable between [0,2π[.<br />

3.8.3 Start Of Transmission (SOT)<br />

A start of transmission signal shall always be sent before the synchronization symbol. The SOT is also used as<br />

response to the different polling frames (See 4.3.5 <strong>and</strong> 4.3.6). In reception the SOT may be used for AGC. The<br />

odd


4-June-07 P1901_PRO_016_r0<br />

description of the SOT generation is always based on a 40 MHz clock, independently of the symbol type used<br />

by the node. The number of active subcarriers in the SOT depends on the symbol type used.<br />

The SOT is composed of OFDM symbols that may be generated with a complex 256-point IDFT as shown in<br />

Equation 28.<br />

Where<br />

s<br />

D,<br />

i<br />

− kD is a normalization factor<br />

N ⎧ D 2<br />

255<br />

⎛ j2πk<br />

⎞<br />

⎛ j2πk<br />

⎞⎫<br />

( n)<br />

= kDw<br />

D ( n)<br />

⎨∑<br />

c(<br />

k)<br />

exp⎜<br />

n⎟<br />

+ ∑c(<br />

k)<br />

exp⎜<br />

n⎟⎬<br />

⎩ k=<br />

1 ⎝ 256 ⎠ k=<br />

255−N<br />

D 2 ⎝ 256 ⎠⎭<br />

Equation 28<br />

− wD(n) is a windowing function, that follows Equation 22 <strong>and</strong> Equation 23. The duration of the windowing<br />

function is between 6.4 μs <strong>and</strong> 8 μs depending on the transition duration <strong>and</strong> is depicted in Figure 18.<br />

N W≤64 samples<br />

N SYM=N IFFT=256 samples<br />

Figure 18 SOT Windowing<br />

− ND is 192 (Type I), 128 (Type II) or 64 (Type III), so that the frequencies occupied by the SOT are the same<br />

as for the data <strong>and</strong> control symbols.<br />

− c(k) = exp(jφk) where φk is a r<strong>and</strong>om phase picked from a uniform distributed r<strong>and</strong>om variable between<br />

[0,2π[<br />

Six of these symbols are concatenated to form the SOT.<br />

Submission page 62 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

s<br />

SOT<br />

( n)<br />

=<br />

Submission page 63 UPA-OPERA<br />

5<br />

∑<br />

i=<br />

0<br />

s<br />

D,<br />

i<br />

Equation 29<br />

( n − 256i)<br />

Therefore the maximum duration of the SOT (if the maximum window size is used) will be 40 μs.<br />

3.8.4 Channel estimation symbols<br />

The channel estimation symbols are used to estimate the channel quality at the receiver side. After the channel<br />

estimation the receiver may send a new bit-loading table to the transmitter (see 9.1.2). These symbols shall be<br />

known by the transmitter <strong>and</strong> the receiver to allow a correct estimation under all conditions. Therefore, a<br />

pseudor<strong>and</strong>om sequence generator shall be used as the modulator input instead of the output from the 4D-TCM<br />

encoder.<br />

The pseudor<strong>and</strong>om sequence generator shall be the 11-bit PN generator with characteristic polynomial given by<br />

Equation 30.<br />

( x)<br />

f = +<br />

2 11<br />

1+ x x<br />

Equation 30<br />

This symbol shall be modulated using 2 bits per subcarrier. Therefore, two 11-bit PN generators with different<br />

seeds shall be used. Figure 19 explains how the Δ bk<br />

value is formed. The SYMBOL NUMBER value is 1 for<br />

the channel reference symbol, <strong>and</strong> is incremented by 1 for every symbol there after.


4-June-07 P1901_PRO_016_r0<br />

SYMBOL NUMBER<br />

(BIT 1)<br />

Δ b k (BIT 1)<br />

OUTPUT<br />

BIT 1 (MSB)<br />

OUTPUT<br />

BIT 0 (LSB)<br />

Δ b k (BIT 0, LSB)<br />

PN GENERATOR 1<br />

11 10 9 8 7 6 5 4 3 2 1<br />

PN GENERATOR 0<br />

11 10 9 8 7 6 5 4 3 2 1<br />

SYMBOL NUMBER<br />

(BIT 0, LSB)<br />

Submission page 64 UPA-OPERA<br />

XOR<br />

Figure 19 Channel estimation symbol generation<br />

At the beginning of each Channel estimation symbol, the registers of the PN generators shall be set with the<br />

corresponding seed given by Table 8. So, the value to be modulated in the phase increment of the first valid<br />

subcarrier of the OFDM symbol will be determined by the seeds <strong>and</strong> the appropriate symbol number. The<br />

contents of the registers of the PN generators shall be updated before calculating the phase increment for each<br />

of the next subcarriers.<br />

Since two bits of the symbol number are XORed with the output of the PN generators, four different symbols<br />

will be generated. These four symbols will be repeated four times to create a sixteen-symbol sequence.<br />

Seed<br />

PN Generator 1 0x25E<br />

PN Generator 0 0x3C1<br />

Table 8 PN generator seeds


4-June-07 P1901_PRO_016_r0<br />

3.9 CARRIER FREQUENCY<br />

The complex baseb<strong>and</strong> digital signal is converted to analog signal <strong>and</strong> IQ modulated. I(t) <strong>and</strong> Q(t) are the inphase<br />

<strong>and</strong> quadrature analog signals corresponding to the real <strong>and</strong> imaginary components of the complex<br />

baseb<strong>and</strong> signal respectively. The actual transmitted signal is related to them by the following relation:<br />

( t)<br />

= I(<br />

t)<br />

cos( 2πf<br />

t)<br />

− Q(<br />

t)<br />

sin( 2πf<br />

t)<br />

rTX c<br />

c<br />

Equation 31<br />

f c denotes the carrier centre frequency, which must be a multiple of 156.25 KHz.<br />

3.10 COMMUNICATION MODES<br />

f<br />

Transmission modes can be defined by specifying a carrier frequency ( c ), <strong>and</strong> symbol Type (I, II or III) <strong>and</strong>,<br />

optionally, a power mask. Any two nodes that use a common communication mode shall be able to<br />

communicate.<br />

The carrier frequency shall be higher than the b<strong>and</strong>width of the baseb<strong>and</strong> signal in negative frequencies in order<br />

to avoid ICI <strong>and</strong> shall place the signal b<strong>and</strong>width in frequencies up to 100 MHz.<br />

3.11 <strong>PHY</strong> PARAMETER SPECIFICATION<br />

Table 9 contains the values for the <strong>PHY</strong> parameters.<br />

Parameter Value Description<br />

INTER PPDU SPACE 1 189 μs See 3.2 <strong>and</strong> 4.1<br />

INTER PPDU SPACE 2 126 μs See 3.2 <strong>and</strong> 4.1<br />

Table 9 <strong>PHY</strong> parameter specification<br />

Submission page 65 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.12 CLOCK SYNCHRONIZATION<br />

3.12.1 General<br />

Clock frequency synchronization shall be performed <strong>and</strong> must be accurate enough to allow for maximum bit<br />

loading 10 bits on all subcarriers.<br />

3.12.2 Clock synchronisation concept<br />

With the exception of the HE of a BPL cell, all BPL nodes belonging to the same BPL cell must adapt their<br />

clock frequency until a unique common clock frequency is reached. This common clock frequency is the<br />

reference clock frequency dictated by the HE. All other nodes (Repeaters <strong>and</strong> CPEs) of the BPL cell will<br />

synchronize their clock frequency to this reference clock frequency.<br />

Both transmitter <strong>and</strong> receiver of a BPL node shall use the same common clock frequency.<br />

3.12.3 System reference clock error tolerance<br />

Without noticeable loss of performance, BPL nodes shall be able to cope with a relative clock frequency error<br />

of up to twice the maximum absolute frequency error of the system reference clock. The absolute frequency<br />

error of the system reference clock in any BPL equipment shall not exceed ±100 ppm.<br />

3.13 TRANSMITTER ELECTRICAL SPECIFICATION<br />

The following specification establishes the minimum transmitter technical requirements for interoperability<br />

maintaining full performance. Unless otherwise stated, transmitter specifications assume a 50 Ω load between<br />

line <strong>and</strong> neutral terminals. All transmitter output voltages as well as spurious transmissions are specified as the<br />

voltage measured at the line terminal with respect to the neutral terminal.<br />

3.13.1 Transmit PSD<br />

The PSD in the emission point must be compliant with regulations in effect in the country where the system is<br />

used.<br />

The ripple in the working b<strong>and</strong> shall be less than ±1 dB.<br />

Besides there will be a transmit spectrum mask that will depend on the regulation of each country or area. All<br />

nodes shall use a configurable power masking with 1 dB of granularity in order to be compliant with that mask,<br />

achieving notches with at least 35 dBs deep<br />

Submission page 66 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The transmitter must provide means to modify the transmission power of each subcarrier with a granularity of at<br />

least 6 dB. Once the transmitter introduces the notches in the transmitted signal, other mechanisms like the<br />

ABLP (see 9.1.2) will automatically adapt accordingly.<br />

3.13.2 Modulation error vector magnitude<br />

Modulation errors may be caused by quantization in the digital processing <strong>and</strong> by linear <strong>and</strong> non-linear<br />

distortion in the analogue processing of a BPL transmitter.<br />

The normalized mean modulation error vector magnitude is defined as the RMS value of the modulation error<br />

vector magnitude divided by the RMS value of the modulation vector.<br />

• N denotes the number of subcarriers.<br />

•<br />

•<br />

S(<br />

k)<br />

denotes the measured complex symbol of the k-th subcarrier.<br />

S0 ( k)<br />

denotes the ideal complex symbol of the k-th subcarrier.<br />

The RMS error vector magnitude may be expressed as:<br />

EVM<br />

=<br />

1<br />

N<br />

∑<br />

k=<br />

1<br />

( k)<br />

− S ( k)<br />

Submission page 67 UPA-OPERA<br />

N<br />

1<br />

N<br />

S<br />

N<br />

∑<br />

k=<br />

1<br />

S<br />

0<br />

0<br />

( k)<br />

Equation 32<br />

<strong>and</strong> can be measured with a multi-tone error vector magnitude meter.<br />

The EVM shall not exceed 1%<br />

3.13.3 Power <strong>Control</strong><br />

2<br />

2<br />

⋅100%<br />

This specification allows for the optional implementation of a Power <strong>Control</strong> mechanism, using the BPS <strong>and</strong> Rx<br />

Att information supplied in the ABLP packet (9.1.2.4) <strong>and</strong> the Power <strong>Control</strong> bits in the Token Announce (See<br />

4.4.1). The target of the power control is to transmit the lowest power that attains a given performance.<br />

Therefore a node may adjust its transmission power until the desired value of BPS is reached. The process is<br />

depicted in Figure 20.


4-June-07 P1901_PRO_016_r0<br />

Power <strong>Control</strong><br />

task<br />

Check currently<br />

negotiated bps<br />

Lower than<br />

Th_bottom?<br />

Periodically or not<br />

Yes<br />

Submission page 68 UPA-OPERA<br />

No<br />

Greater than<br />

Th_top?<br />

Yes<br />

Increase Txg Decrease Txg<br />

Figure 20 Power control algorithm<br />

3.14 RECEIVER ELECTRICAL SPECIFICATION<br />

Unless otherwise stated, all signals are specified as the voltage measured at the line terminal with respect to the<br />

neutral terminal.<br />

3.14.1 Receiver Input Impedance<br />

When not transmitting, the system shall present a minimum impedance of 40 Ω in the working b<strong>and</strong>, measured<br />

between line <strong>and</strong> neutral terminals.<br />

No


4-June-07 P1901_PRO_016_r0<br />

3.14.2 Receiver Input Referred Noise<br />

The system shall present an IRN level lower than –148 dBm/Hz when it sets the maximum reception gain.<br />

3.14.3 Receiver Input Signal<br />

The receiver shall maintain full performance with a signal input level of 8 Vpp.<br />

The ripple introduced by the system in the working b<strong>and</strong> shall be less than ±1 dB.<br />

The sensitivity of the receiver is defined as follows:<br />

For an input signal with flat spectrum <strong>and</strong> using Type I OFDM symbols, the minimum input level at which the<br />

system shall receive 2 Mbps of UDP traffic with 0% PLR is:<br />

• 0.17 mVrms<br />

• -137 dBm/Hz referred to 50 Ω<br />

3.15 <strong>PHY</strong> service specification (<strong>PHY</strong> SAP)<br />

3.15.1 <strong>PHY</strong> service primitives<br />

The following table shows <strong>PHY</strong> DATA <strong>and</strong> MNT primitives:<br />

Primitive Type<br />

Submission page 69 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

<strong>PHY</strong>-DATA.req Request<br />

<strong>PHY</strong>-DATA.cnf Confirm<br />

<strong>PHY</strong>-DATA.ind Indicate<br />

<strong>PHY</strong>-MNT-SNR.ind Indication<br />

<strong>PHY</strong>-MNT-BPC-SET.req Request<br />

<strong>PHY</strong>-MNT-BPC-SET.cnf Confirm<br />

<strong>PHY</strong>-MNT-BPC-GET.req Request<br />

<strong>PHY</strong>-MNT-BPC-GET.cnf Confirm<br />

<strong>PHY</strong>-MNT-RXGAIN-GET.req Request<br />

<strong>PHY</strong>-MNT-RXGAIN-GET.cnf Confirm<br />

<strong>PHY</strong>-MNT-TXGAIN-SET.req Request<br />

<strong>PHY</strong>-MNT-TXGAIN-SET.cnf Confirm<br />

<strong>PHY</strong>-MNT-TXGAIN-GET.req Request<br />

<strong>PHY</strong>-MNT-TXGAIN-GET.cnf Confirm<br />

<strong>PHY</strong>-MNT-POWMASK-GET.req Request<br />

<strong>PHY</strong>-MNT-POWMASK-GET.cnf Confirm<br />

<strong>PHY</strong>-MNT-POWMASK-SET.req Request<br />

<strong>PHY</strong>-MNT-POWMASK-SET.cnf Confirm<br />

<strong>PHY</strong>-MNT-SYNC.ind Indication<br />

<strong>PHY</strong>-MNT-SYNC.req Request<br />

<strong>PHY</strong>-MNT-SYNC.cnf Confirm<br />

3.15.2 <strong>PHY</strong> service primitives parameters<br />

Table 10 <strong>PHY</strong> SAP primitives<br />

The following table shows <strong>PHY</strong> DATA <strong>and</strong> MNT parameters:<br />

Parameter Associated Primitive Value<br />

Submission page 70 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

MPDU <strong>PHY</strong>-DATA.req<br />

<strong>PHY</strong>-DATA.ind<br />

<strong>MAC</strong> Protocol Data Unit<br />

snr_measure, port <strong>PHY</strong>-MNT-SNR.ind SNR measure with remote<br />

node in Rx<br />

Rx port of the remote<br />

transmitter node<br />

bpc_type, port, tonemap <strong>PHY</strong>-MNT-BPC-SET.req<br />

Tx, Rx<br />

<strong>PHY</strong>-MNT-BPC-SET.cnf<br />

Tx or Rx port<br />

<strong>PHY</strong>-MNT-BPC-GET.cnf<br />

Updated tonemap<br />

bpc_type, port <strong>PHY</strong>-MNT-BPC-GET.req Tx, Rx<br />

Local Tx or Rx port<br />

port <strong>PHY</strong>-MNT-RXGAIN-GET.req Local Rx port<br />

port <strong>PHY</strong>-MNT-TXGAIN-GET.req<br />

<strong>PHY</strong>-MNT-TXGAIN-SET.cnf<br />

<strong>PHY</strong>-MNT-POWMASK-GET.req<br />

<strong>PHY</strong>-MNT-POWMASK-SET.cnf<br />

<strong>PHY</strong>-MNT-LINK-STATUS.req<br />

<strong>PHY</strong>-MNT-LINK-STATUS.cnf<br />

Local Tx port<br />

port, gain <strong>PHY</strong>-MNT-RXGAIN-GET.cnf Local Rx port<br />

[0-7] Rx gain level<br />

port, gain <strong>PHY</strong>-MNT-TXGAIN-GET.cnf<br />

Local Tx port<br />

<strong>PHY</strong>-MNT-TXGAIN-SET.req<br />

Tx gain<br />

port, pow_mask <strong>PHY</strong>-MNT-POWMASK-GET.cnf<br />

Local Tx port<br />

<strong>PHY</strong>-MNT-POWMASK-SET.req<br />

Tx power mask<br />

sync_type, mode <strong>PHY</strong>-MNT-SYNC.ind [sync|sync _lost]<br />

The Tx / Rx signal mode<br />

mode, timeout <strong>PHY</strong>-MNT-SYNC.req The Tx / Rx signal mode<br />

Time to sense the channel<br />

Mode, result <strong>PHY</strong>-MNT-SYNC.cnf The Tx/Rx signal mode<br />

Success/fail<br />

Legend : Tx = Transmission Rx = Reception<br />

3.15.3 <strong>PHY</strong>-DATA.req<br />

3.15.3.1 Function<br />

Table 11 <strong>PHY</strong> SAP parameters<br />

This primitive requests a transfer of a MPDU from a local <strong>MAC</strong> layer entity.<br />

Submission page 71 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.3.2 Semantics of the service primitive<br />

<strong>PHY</strong>-DATA.req(MPDU):<br />

• MPDU: <strong>MAC</strong> Protocol Data Unit<br />

3.15.3.3 When generated<br />

The primitive is generated by the <strong>MAC</strong> layer entity when a MPDU is to be transferred.<br />

3.15.3.4 Effect of receipt<br />

The <strong>PHY</strong> layer entity starts the sending of the MPDU.<br />

3.15.4 <strong>PHY</strong>-DATA.cnf<br />

3.15.4.1 Function<br />

This primitive has local significance <strong>and</strong> provides the <strong>MAC</strong> layer with status information (sending finished) of the<br />

corresponding preceeding <strong>PHY</strong>-DATA.req primitive.<br />

3.15.4.2 Semantics of the service primitive<br />

This primitive has no parameters.<br />

3.15.4.3 When generated<br />

The primitive is passed from the <strong>PHY</strong> layer entity to the <strong>MAC</strong> layer entity to indicate that the previous MPDU has<br />

been sent <strong>and</strong> the <strong>PHY</strong> layer is available to send new MPDUs.<br />

3.15.4.4 Effect of receipt<br />

The <strong>MAC</strong> layer entity is aware that the <strong>PHY</strong> is available to send new MPDUs, <strong>and</strong> can issue new <strong>PHY</strong>-DATA.req<br />

primitives.<br />

3.15.5 <strong>PHY</strong>-DATA.ind<br />

3.15.5.1 Function<br />

This primitive defines the transfer of a received MPDU from the <strong>PHY</strong> layer entity to the <strong>MAC</strong> layer entity.<br />

Submission page 72 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.5.2 Semantics of the service primitive<br />

<strong>PHY</strong>-DATA.ind(MPDU):<br />

• MPDU: <strong>MAC</strong> Protocol Data Unit.<br />

3.15.5.3 When generated<br />

The primitive is passed from the <strong>PHY</strong> layer entity to the <strong>MAC</strong> layer entity to indicate the arrival of a MPDU.<br />

3.15.5.4 Effect of receipt<br />

The <strong>MAC</strong> layer entity processes the newly received MPDU.<br />

3.15.6 <strong>PHY</strong>-MNT-SNR.ind<br />

3.15.6.1 Function<br />

This primitive indicates that the <strong>Physical</strong> layer entity has done a SNR measure with another node, <strong>and</strong> defines the<br />

transfer of the SNR measure to the Management layer entity.<br />

3.15.6.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-SNR.ind (snr_measure, port):<br />

• snr_measure: SNR measure with remote node in reception<br />

• port: reception port of the remote transmitter node<br />

3.15.6.3 When generated<br />

The primitive is generated when the node measures the SNR with another node which transmitted an SNR frame.<br />

3.15.6.4 Effect of receipt<br />

The Management layer entity will decide if the tonemap must be changed for that port depending on the new<br />

snr_measure <strong>and</strong> the current tonemap. If the tonemap must change, an ABLP message shall be sent to the other<br />

node by means of the ETH.req primitive.<br />

3.15.7 <strong>PHY</strong>-MNT-BPC-SET.req<br />

3.15.7.1 Function<br />

This primitive request the change of the tonemap used to transmit/receive to/from a remote node.<br />

Submission page 73 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.7.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-BPC-SET.req (bpc_type, port, tonemap)<br />

• bpc_type: tx, rx (transmission, reception)<br />

• port: transmission or reception port<br />

• tonemap: updated tonemap to be used<br />

3.15.7.3 When generated<br />

The primitive is generated when the transmission/reception tonemap table with a node must be changed according<br />

to the ABLP protocol<br />

3.15.7.4 Effect of receipt<br />

The tonemap used by the Physiscal layer to transmit/receive to/from a remote node is changed.<br />

3.15.8 <strong>PHY</strong>-MNT-BPC-SET.cnf<br />

3.15.8.1 Function<br />

This primitive informs the Management layer that the tonemap has been updated.<br />

3.15.8.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-BPC-SET.cnf (bpc_type, port, tonemap)<br />

• bpc_type: tx, rx (transmission, reception)<br />

• port: transmission or reception port<br />

• tonemap: updated tonemap<br />

3.15.8.3 When generated<br />

The primitive is generated by the <strong>Physical</strong> layer to confirm the Management layer that the tonemap has been<br />

updated.<br />

3.15.8.4 Effect of receipt<br />

Management layer can use the updated tonemap for throughput <strong>and</strong> class of service calculations.<br />

Submission page 74 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.9 <strong>PHY</strong>-MNT-BPC-GET.req<br />

3.15.9.1 Function<br />

This primitive requests the tonemap used to transmit/receive to/from a remote node.<br />

3.15.9.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-BPC-GET.req (bpc_type, port) :<br />

• bpc_type: tx, rx<br />

• port: local transmission or reception port<br />

3.15.9.3 When generated<br />

The primitive is generated when the Management layer needs to know the current tonemap used to transmit/receive<br />

to/from a remote node.<br />

3.15.9.4 Effect of receipt<br />

The current tonemap is read by the <strong>Physical</strong> layer <strong>and</strong> passed to the Management layer by means of the <strong>PHY</strong>-MNT-<br />

BPC-GET.cnf primitive.<br />

3.15.10 <strong>PHY</strong>-MNT-BPC-GET.cnf<br />

3.15.10.1 Function<br />

This primitive indicates the result of the previously requested tonemap.<br />

3.15.10.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-BPC-GET.cnf (bpc_type, port, tonemap)<br />

• bpc_type: tx, rx<br />

• port: local transmission or reception port<br />

• tonemap: current tonemap<br />

3.15.10.3 When generated<br />

The primitive is passed by the <strong>Physical</strong> layer entity to the Management layer entity to provide the requested<br />

tonemap.<br />

Submission page 75 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.10.4 Effect of receipt<br />

The Maganement layer receives the tonemap.<br />

3.15.11 <strong>PHY</strong>-MNT-RXGAIN-GET.req<br />

3.15.11.1 Function<br />

This primitive requests the <strong>Physical</strong> layer the reception gain being used to receive from a remote node.<br />

3.15.11.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-RXGAIN-GET.req (port):<br />

• port: reception port<br />

3.15.11.3 When generated<br />

The primitive is generated when the Management layer needs to know the reception gain being used in reception<br />

with another node.<br />

3.15.11.4 Effect of receipt<br />

The current reception gain is obtained by the <strong>Physical</strong> layer <strong>and</strong> passed to the Management layer by means of the<br />

<strong>PHY</strong>-MNT-RXGAIN-GET.cnf primitive.<br />

3.15.12 <strong>PHY</strong>-MNT-RXGAIN-GET.cnf<br />

3.15.12.1 Function<br />

This primitive indicates the result of the previously requested reception gain.<br />

3.15.12.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-RXGAIN-GET.cnf (port, gain):<br />

• port: reception port<br />

• gain: reception gain level<br />

3.15.12.3 When generated<br />

The primitive is passed by the <strong>Physical</strong> layer entity to the Management layer entity to provide the requested<br />

reception gain.<br />

Submission page 76 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.12.4 Effect of receipt<br />

The Maganement layer gets the reception gain. It can be used in protocols such as the <strong>Access</strong> protocol or the Net<br />

Configuration protocol.<br />

3.15.13 <strong>PHY</strong>-MNT-TXGAIN-GET.req<br />

3.15.13.1 Function<br />

This primitive requests the <strong>Physical</strong> layer the transmission gain being used to transmit to a remote node.<br />

3.15.13.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-TXGAIN-GET.req (port):<br />

• port: local transmission port<br />

3.15.13.3 When generated<br />

The primitive is generated when the Management layer needs to know the transmission gain being used in<br />

transmission with another node.<br />

3.15.13.4 Effect of receipt<br />

The current transmission gain is obtained by the <strong>Physical</strong> layer <strong>and</strong> passed to the Management layer by means of the<br />

<strong>PHY</strong>-MNT-TXGAIN-GET.cnf primitive.<br />

3.15.14 <strong>PHY</strong>-MNT-TXGAIN-GET.cnf<br />

3.15.14.1 Function<br />

This primitive indicates the result of the previously requested transmission gain.<br />

3.15.14.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-TXGAIN-GET.cnf (port, gain):<br />

• port: local transmission port<br />

• gain: transmission gain level<br />

3.15.14.3 When generated<br />

The primitive is passed by the <strong>Physical</strong> layer entity to the Management layer entity to provide the requested<br />

transmission gain.<br />

Submission page 77 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.14.4 Effect of receipt<br />

The Maganement layer gets the transmission gain.<br />

3.15.15 <strong>PHY</strong>-MNT-TXGAIN-SET.req<br />

3.15.15.1 Function<br />

This primitive request the change of the transmission gain used to transmit to a remote node.<br />

3.15.15.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-TXGAIN-SET.req (port, gain):<br />

• port: local transmission port<br />

• gain: transmission gain level<br />

3.15.15.3 When generated<br />

This primitive must be generated when the Management layer wants to change the transmission gain with a given<br />

node.<br />

3.15.15.4 Effect of receipt<br />

The <strong>Physical</strong> layer updates the transmission gain with the indicated port. It shall confirm the action.<br />

3.15.16 <strong>PHY</strong>-MNT-TXGAIN-SET.cnf<br />

3.15.16.1 Function<br />

This primitive acknowledges the previously requested action.<br />

3.15.16.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-TXGAIN-SET.cnf (port):<br />

• Port: local transmission port.<br />

3.15.16.3 When generated<br />

This primitive is generated by the <strong>Physical</strong> layer when it updates the transmission gain.<br />

Submission page 78 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.16.4 Effect of receipt<br />

The Management layer receives the confirmation of the change.<br />

3.15.17 <strong>PHY</strong>-MNT-POWMASK-GET.req<br />

3.15.17.1 Function<br />

This primitive requests the <strong>Physical</strong> layer the power mask being used to transmit to a remote node.<br />

3.15.17.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-POWMASK-GET.req (port):<br />

• port: local transmission port<br />

3.15.17.3 When generated<br />

The primitive is generated when the Management layer want to know the power mask being used in transmission<br />

with another node.<br />

3.15.17.4 Effect of receipt<br />

The current power mask is obtained by the <strong>Physical</strong> layer <strong>and</strong> passed to the Management layer by means of the<br />

<strong>PHY</strong>-MNT-POWMASK-GET.cnf primitive<br />

3.15.18 <strong>PHY</strong>-MNT-POWMASK-GET.cnf<br />

3.15.18.1 Function<br />

This primitive indicates the result of the previously requested power mask.<br />

3.15.18.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-POWMASK-GET.cnf (port, pow_mask):<br />

• port: local transmission port<br />

• pow_mask: transmission power mask<br />

3.15.18.3 When generated<br />

The primitive is passed by the <strong>Physical</strong> layer entity to the Management layer entity to provide the requested power<br />

mask.<br />

Submission page 79 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.18.4 Effect of receipt<br />

The Maganement layer receives the power mask.<br />

3.15.19 <strong>PHY</strong>-MNT-POWMASK-SET.req<br />

3.15.19.1 Function<br />

This primitive request the change of the power mask used to transmit to a remote node.<br />

3.15.19.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-POWMASK-SET.req (port, pow_mask)<br />

• port: local transmission port<br />

• pow_mask: transmission power mask<br />

3.15.19.3 When generated<br />

This primitive must be generated when the Management layer wants to change the transmission power mask with a<br />

given node.<br />

3.15.19.4 Effect of receipt<br />

The <strong>Physical</strong> layer updates the transmission power mask with the indicated port. It shall confirm the action.<br />

3.15.20 <strong>PHY</strong>-MNT-POWMASK-SET.cnf<br />

3.15.20.1 Function<br />

This primitive acknowledges the previously requested action.<br />

3.15.20.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-POWMASK-SET.cnf (port):<br />

• port: local transmission port.<br />

3.15.20.3 When generated<br />

This primitive is generated by the <strong>Physical</strong> layer when it updates the transmission power mask.<br />

Submission page 80 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.20.4 Effect of receipt<br />

The Management layer receives the confirmation of the change.<br />

3.15.21 <strong>PHY</strong>-MNT-SYNC.ind<br />

3.15.21.1 Function<br />

This primitive is generated by the <strong>Physical</strong> layer to notify a synchronization detection event to the Management<br />

layer. It provides status information.<br />

3.15.21.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-SYNC.ind (sync_type, mode) :<br />

• sync_type= [sync|sync_loss]<br />

• mode: the transmission/reception signal mode<br />

3.15.21.3 When generated<br />

The primitive is passed by the <strong>Physical</strong> layer to the Management layer to inform about a synchronization event. This<br />

event can be positive (synchronization symbol detected) or negative (synchronization symbol not detected when it<br />

was expected).<br />

3.15.21.4 Effect of receipt<br />

When receiving a "sync" event, the Management layer can infer that a synchronization symbol has been detected in<br />

the transmission mode “mode”. When receiving a “sync_loss” event, the Management layer can infer that an<br />

expected synchronization symbol has not been detected. This information can be used by the Management layer to<br />

take decisions regarding the configuration of the BPL cell.<br />

3.15.22 <strong>PHY</strong>-MNT-SYNC.req<br />

3.15.22.1 Function<br />

This primitive requests the <strong>Physical</strong> layer to detect synchronization symbols.<br />

3.15.22.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-SYNC.req (mode,timeout) :<br />

• mode: the transmission/reception signal mode.<br />

• timeout: maximum time to sense the channel<br />

Submission page 81 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

3.15.22.3 When generated<br />

The primitive is generated by the Management layer to detect if there is activity in the channel using the given<br />

transmission mode.<br />

3.15.22.4 Effect of receipt<br />

The <strong>Physical</strong> layer senses the channel during the “timeout” time. When a synchronization symbol is detected or the<br />

“timeout” expires, the result is notified to the Management layer by means of the <strong>PHY</strong>-MNT-SYNC.cnf primitive.<br />

3.15.23 <strong>PHY</strong>-MNT-SYNC.cnf<br />

3.15.23.1 Function<br />

This primitive acknowledges the previously requested action <strong>and</strong> provides the requested information.<br />

3.15.23.2 Semantics of the service primitive<br />

<strong>PHY</strong>-MNT-SYNC.cnf (mode, result):<br />

• mode: transmission/reception signal mode<br />

• result: success/fail<br />

3.15.23.3 When generated<br />

The <strong>Physical</strong> layer generates this primitive when a synchronization symbol is detected (success) or when the<br />

“timeout” expires (fail).<br />

3.15.23.4 Effect of receipt<br />

This information is required by the Net Configuration protocol to check if there are other nodes in the channel.<br />

<strong>PHY</strong>-MNT- <strong>PHY</strong>-MNT-LINK-STATUS.req<br />

4 <strong>MAC</strong><br />

4.1 OVERVIEW<br />

The IEEE P1901 <strong>MAC</strong> is based on a TDMA/TDD <strong>MAC</strong> with hybrid resource sharing mechanisms built on top<br />

of an OFDM <strong>PHY</strong> layer. Data are encapsulated inside OFDM symbols.<br />

The control <strong>and</strong> data symbols transmitted consecutively by a single node constitute a transmission frame.<br />

Submission page 82 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The channel access is done through the use of a special <strong>MAC</strong> element called a token. Master nodes decide the<br />

type of frame that their slave nodes are going to transmit next, based on the type of token included in the current<br />

frame, or the kind of channel access the slave nodes can perform. Tokens have several intended uses, depending<br />

on the type of token, <strong>and</strong> the actions to be undertaken upon its reception also depend on the type of token.<br />

The master node manages the type of channel access, contention free access to the channel with a<br />

predetermined decision about which of its slaves will be allowed to transmit data, in what order, <strong>and</strong> for how<br />

long, or a contention based access of the slaves to the channel.These decisions will be published by the use of<br />

different types of tokens. In both schemes the final result is a node holding a token. The holder of the token has<br />

the right to access the medium for a specific time <strong>and</strong> after that time it has to assign the token to the next<br />

destination node. By the control of the frequency of the token occupancy <strong>and</strong> the length of the time the node is<br />

allowed to hold the token, it is possible to guarantee the requested QoS.<br />

4.1.1 Contention free medium access examples<br />

One of the simplest ways of distribute the channel among several users is the use of Data Frames. Let’s the<br />

following scenario:<br />

CPE<br />

N3<br />

Submission page 83 UPA-OPERA<br />

HE<br />

N1<br />

TDRep<br />

N2<br />

CPE<br />

N4<br />

Figure 21 Simple <strong>Access</strong> Topology example<br />

The Data Token has a specific destination node, which, upon its reception, must enter transmission mode. This<br />

destination node might then return the token to its master, or transmit it to its own slaves, in the case of a Time<br />

Division Repeater. A tipical transmission using data tokens can be seen in the following figure:


4-June-07 P1901_PRO_016_r0<br />

N1 TX<br />

N2 TX<br />

N3 TX<br />

N4 TX<br />

Data PPDU<br />

Token<br />

for N2<br />

Downstream token<br />

Upstream token<br />

IPPDU1<br />

Token<br />

for N3<br />

IPPDU1<br />

Submission page 84 UPA-OPERA<br />

Token<br />

for N2<br />

Time<br />

IPPDU1<br />

Token<br />

for N4<br />

Figure 22 Transmission sequence<br />

When N2 receives the token from its master, it is this node that must decide what nodes will follow: in this case,<br />

it transmits it to each of its slaves, <strong>and</strong> finally returns it to its master. Any other kind of sequence would be<br />

possible, <strong>and</strong> it is the master, at each level, who decides how the token, <strong>and</strong> thus the slots of time, will be<br />

divided amongst the rest of the nodes.<br />

On the other h<strong>and</strong>, the order of transmission can be predesigned using the so called distributor token. The<br />

transmission sequence can took place in the following topology:<br />

Figure 23 Topology example<br />

IPPDU1<br />

Token<br />

for N2<br />

IPPDU1<br />

Token<br />

for N1


4-June-07 P1901_PRO_016_r0<br />

The following diagram ¡Error! No se encuentra el origen de la referencia.depicts a transmission sequence<br />

using this kind of token. As it is outlined in the above diagram, a transmission sequence starts with a Distributor<br />

Token. This type of token assigns the channel to a list of nodes. The Data Token is used by slaves to release the<br />

token to the next detination node. Further sections describe this diagram in more detail.<br />

List Info<br />

Dst1 = Slave 1 Validity1 SessionId1<br />

Dst2 = Slave 4 Validity2 SessionId2<br />

IPPDUS1<br />

Dst3 = Slave 3 Validity3 SessionId3<br />

Dst4 = Slave 2 Validity4 SessionId4<br />

IPPDUS2 IPPDUS2 IPPDUS2<br />

IPPDUS2<br />

MASTER<br />

DISTRIBUTOR<br />

TOKEN<br />

Slave 1<br />

Slave 4 DATA<br />

TOKEN to Slave 2<br />

Slave 3<br />

Slave 2<br />

DATA TOKEN<br />

To Slave 4<br />

DATA<br />

From SessionId1<br />

≤ Valitdity1<br />

DATA<br />

≤ Valitdity2<br />

From SessionId2<br />

DATA TOKEN to Slave 3<br />

DATA<br />

From SessionId3<br />

≤ Validity3<br />

Figure 24: Transmission Sequence<br />

DATA<br />

From SessionId4<br />

≤ Validity4<br />

DATA TOKEN<br />

to MASTER<br />

Submission page 85 UPA-OPERA<br />

DISTRIBUTOR<br />

TOKEN<br />

Using the previously described channel access, a programmed timming interval can be set, synchronized or not<br />

with the mains meriod using the clock token, where several nodes in a preestablished order can transmit.<br />

4.1.2 Contention medium access example<br />

In the previous examples, the destination of the token, <strong>and</strong> so, the next token holder is explicity defined in the<br />

information that the token contains. In the case of CSMA or <strong>Access</strong> Replay frame, the next token holder is not<br />

predefined by the node that transmit the token, but a priorized contention period is open to decide the node that<br />

will be the next token holder.<br />

Asume again the topology described in Figure 23.


4-June-07 P1901_PRO_016_r0<br />

The HE send a CSMA frame ended with a CSMA token, <strong>and</strong> a priorized contention period is open for all the<br />

nodes that can heard this token:<br />

S<br />

O<br />

T<br />

CSMA Token<br />

CSMA PPDU<br />

IPPDU1<br />

P0min<br />

P0max P1min<br />

Backoff<br />

slot time<br />

Backoff time<br />

CONTENTION WINDOW<br />

P1max P2min<br />

P2max P3min<br />

Submission page 86 UPA-OPERA<br />

S<br />

O<br />

T<br />

Figure 25: CSMA Frame<br />

PPDU<br />

Contention winner Node<br />

Each of the nodes will contend putting an SOT in a r<strong>and</strong>om position inside a predetermined range of the contention<br />

window. The range is determined by the state of the node <strong>and</strong> the service class of the traffic that want to transmit<br />

among other, as explained in section 6. The node that was able to send the SOT before any one, will win the right to<br />

transmit a frame.<br />

4.2 <strong>MAC</strong> STATES MANAGEMENT<br />

<strong>MAC</strong> states include node states which are specific states managed both on the master side <strong>and</strong> the slave side.<br />

They correspond to specific actions described here below.<br />

4.2.1 Master side<br />

From a master st<strong>and</strong>point, a slave can be in three different states: Active, Idle, <strong>and</strong> Unregistered. These states<br />

are related to the following master-side actions (see Figure 26 <strong>and</strong> Figure 27 ):<br />

� Active: A master shall regularly transmit a data token to Active slaves. If a slave returns a data token<br />

without using any of the time resources originally granted, the master may list this slave as Idle. The<br />

master may also list the slave as Idle, if the only data sent has priority 7 (reserved for control packets).<br />

P3max<br />

Token


4-June-07 P1901_PRO_016_r0<br />

� Idle: No data token is transmitted to an Idle slave, that is to say this slave does not get any scheduled<br />

transmission opportunity until it is required. This feature reduces the transmission of empty frames by non<br />

active slaves <strong>and</strong> it also increases the network performance, since the transmission opportunities not given<br />

to Idle slaves can be used by other Active users. A master shall regularly transmit Polling Frames to an Idle<br />

slave. This management is done in a different way <strong>and</strong> with different token depending on the type of the<br />

slaves: TDRs or CPEs.<br />

o When the Idle slave is a CPE, the master shall poll it to check if it has data to transmit from a<br />

service class different from number 7 (See 8). If yes, it must be considered Active again. If<br />

answer is no, it shall be considered registered, although it has no data of higher service class to<br />

transmit. When the CPE has no activity, that means, no data is transmitted during long times,<br />

must be considered as Unregistered. This information is obtained by means of two different<br />

types of Polling Tokens: Active Polling Tokens <strong>and</strong> Alive Polling Tokens respectively. Up to<br />

32 CPEs can be polled with only one of these Polling Frames.<br />

� Active Polling Tokens shall be regularly transmitted by the master to manage<br />

transitions from Idle to Active. A slave which replies to an Active Polling Token shall<br />

be listed as Active by its master. A master is constrained to transmit an Active Polling<br />

Token with a maximum interval equal to MAX_ACTIVE_POLL_INTERVAL.<br />

� Alive Polling Tokens shall be regularly transmitted by the master to manage transitions<br />

from Idle to Unregistered. A master is constrained to transmit an Alive Polling Token<br />

with a maximum interval equal to MAX_ALIVE_POLL_INTERVAL. A slave which<br />

does not reply to a number of Alive polling tokens equal to MAX_ALIVE_TOKENS<br />

shall be listed as Unregistered.<br />

o When the slave is a TDR, the master shall only consider it as Idle when neither it nor any of the<br />

slaves in its BPL sub-tree are transmitting or receiving data of service class 1 to 6; this<br />

information is available in the field Frame Priority sent in the Data Token (see 0). The<br />

management of idle TDRs from the master side is slightly different from idle CPEs, although<br />

the concept stays the same. The reason for these differences is that TDRs shall provide some<br />

periodic services to the users in their BPL sub-tree <strong>and</strong> to other non-registered users within<br />

their visibility area apart from notifying if they have traffic to send. The master shall send a<br />

TDR Polling Frame to every Idle TDR connected to it as a slave, with a maximum interval<br />

equal to MAX_ACTIVE_POLL_INTERVAL.<br />

The master shall give enough validity in this polling token for the TDR to send at least an<br />

<strong>Access</strong> Frame every <strong>MAC</strong>_ACCESS_INTERVAL, as many Polling Frames to CPEs as<br />

required (from 0 to 4, depending on the number of banks needed) every<br />

MAX_ACTIVE_POLL_INTERVAL <strong>and</strong> as many TDR Polling Frames as TDRs connected to<br />

it as slaves every MAX_ACTIVE_POLL_INTERVAL. The validity should be calculated from<br />

the topology information provided by the Cluster Discovery Protocol (see 0).<br />

A TDR that does not reply a number of consecutive TDR Polling Tokens equal to<br />

MAX_ALIVE_TOKENS shall be listed as Unregistered.<br />

Submission page 87 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Note: If a master has pending downstream data for an Idle slave belonging to a service class different from<br />

7, the master may automatically switch the status of this slave into Active <strong>and</strong> start giving it transmission<br />

opportunities.<br />

� Unregistered: An Unregistered slave is not explicitly managed by a master. However, the master is<br />

constrained to regularly broadcast access frames to discover/recover Unregistered slaves. The maximum<br />

transmission interval of these access frames is MAX_ACCESS_INTERVAL.<br />

The HE should also turn Idle itself when it has no users or all its users are Idle during a period, in order to<br />

reduce to the minimum the electromagnetic interference <strong>and</strong> the power consumption.<br />

This requirement implies stopping all <strong>MAC</strong> activity when the whole network is idle except for the transmissions<br />

of <strong>Access</strong> Frames <strong>and</strong> Active, Alive <strong>and</strong> TDR Polling Frames, which shall be made at least within the specified<br />

intervals.<br />

The HE shall switch to Active status, when any of these situations occurs:<br />

• automatically, if it has data from service class different from 7 to transmit to any user,<br />

• after sending an Active Polling Frame or a TDR Polling Frame, if any of its slaves (TDRs <strong>and</strong>/or CPEs)<br />

replies affirmatively <strong>and</strong><br />

• after sending an <strong>Access</strong> Request Frame if any user replies to it, so that the <strong>Access</strong> Protocol process can<br />

be started.<br />

4.2.2 Slave side<br />

4.2.2.1 CPE side<br />

From a slave st<strong>and</strong>point, a CPE can be in two different states: Registered or Unregistered (see Figure 28 )<br />

� Unregistered: This is the initial state of a slave. An unregistered slave is only authorized to answer access<br />

frames as required by the access protocol. When the access protocol process is completed <strong>and</strong> successful,<br />

the slave enters the Registered state.<br />

� Registered: The following specific requirements apply to this state:<br />

o A Registered CPE shall never reply to access frames from its current master. It might reply to<br />

access frames from another master if it wishes to change its current master.<br />

o A Registered CPE shall not reply to an Active polling token if it has no need for network<br />

resources.<br />

o A Registered CPE that wishes to continue in that state shall always reply to an Alive polling<br />

token.<br />

o A Registered CPE which has not received any Alive polling token or Data token for more than<br />

MAX_ALIVE_TOKENS*MAX_ALIVE POLL_INTERVAL shall enter the Unregistered state.<br />

The counting of this time interval shall be initialized at the end of the last polling slot in which<br />

the slave has asserted a SOT or at the reception of the last Data Token received by the<br />

Registered slave, whichever is later.<br />

Submission page 88 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.2.2.2 TDR side<br />

From a slave st<strong>and</strong>point, a TDR can be in two different states: Registered or Unregistered (see Figure 27).<br />

� Unregistered: This is the initial state of a slave. An unregistered slave is only authorized to answer access<br />

frames as required by the access protocol. When the access protocol process is completed <strong>and</strong> successful,<br />

the slave enters the Registered state.<br />

� Registered: The following specific requirements apply to this state:<br />

o A Registered TDR shall never reply to access frames from its current master. It might reply to<br />

access frames from another master if it wishes to change its current master.<br />

o A Registered TDR, at the reception of a TDR Polling Frame, shall ensure to transmit <strong>Access</strong><br />

Frames, Polling Frames <strong>and</strong> TDR Polling Frames for all its slaves in the maximum specified<br />

intervals (see 4.6). Afterwards, the TDR shall reply to the TDR Polling Frame sent by the<br />

master indicating whether it wants to be Active or it wants to stay Idle but still Registered.<br />

o An Registered TDR, in Idle state, shall not transmit any Data Token. It shall no transmit any<br />

data either, except for service class 7 traffic. Nevertheless, the TDR could transmit data in the<br />

TDR Polling Reply Frame when it indicates that it wants to be Active again, if it has enough<br />

remaining validity for it.<br />

o A Registered TDR which has not received any TDR Polling Token or Data Token for more<br />

than MAX_ALIVE_TOKENS*MAX_ACTIVE POLL_INTERVAL shall enter the Unregistered state.<br />

The counting of this time interval shall be initialized at the end of the TDR Polling Reply<br />

symbol sent or at the reception of the last Data Token received by the Registered slave,<br />

whichever is later.<br />

Submission page 89 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.2.3 Transition state diagrams<br />

Legend<br />

Slave state (master side)<br />

Transition event<br />

Master actions associated to the state<br />

No response to<br />

MAX_ALIVE_TOKENS<br />

Alive polling tokens<br />

Idle<br />

Master regularly sends Active<br />

polling tokens <strong>and</strong> Alive polling<br />

tokens to this slave. No data token<br />

is transmitted to this slave.<br />

Master does not manage this state.<br />

Regularly, the master broadcasts an access frame<br />

to discover/recover Unregistered nodes.<br />

Unregistered<br />

The slave replies<br />

to an Active polling token<br />

The slave does<br />

not make use of the time<br />

granted by<br />

its master<br />

Figure 26 CPE states – Master side<br />

<strong>Access</strong> protocol<br />

completed<br />

Submission page 90 UPA-OPERA<br />

Active<br />

Master sends data<br />

tokens to this slave.<br />

No polling token<br />

is sent to this slave


4-June-07 P1901_PRO_016_r0<br />

Legend<br />

TDR state (master side)<br />

Transition event<br />

Master actions associated to the state<br />

No response to<br />

MAX_ALIVE_TOKENS<br />

TDR polling tokens<br />

Idle<br />

Master regularly sends TDR polling<br />

tokens to this TDR. No data token is<br />

transmitted to this TDR.<br />

Master does not manage this state.<br />

Regularly, the master broadcasts an access frame<br />

to discover/recover Unregistered nodes.<br />

Unregistered<br />

The TDR replies affirmatively<br />

to a TDR polling token<br />

The TDR does<br />

not make use of the time<br />

granted by<br />

its master<br />

Figure 27 TDR states – Master side<br />

<strong>Access</strong> protocol<br />

completed<br />

Submission page 91 UPA-OPERA<br />

Active<br />

Master sends data<br />

tokens to this TDR.<br />

No polling token<br />

is sent to this TDR.


4-June-07 P1901_PRO_016_r0<br />

Legend<br />

Slave state (slave side)<br />

Transition event<br />

Slave actions associated to the state<br />

4.3 FRAME FORMATS<br />

No response to/ No reception of<br />

Alive Polling tokens for<br />

MAX_ALIVE_TOKENS*MAX_ALIVE_POLL_INTERVAL<br />

Unregistered<br />

Registered<br />

Figure 28 Slave states – Slave side<br />

The slave shall only reply to<br />

access frames as required by<br />

the access protocol<br />

<strong>Access</strong> protocol<br />

process completed<br />

The slave shall never reply to access<br />

frames from its master. It might answer access<br />

frames from another master if it wishes to change<br />

of master.<br />

A frame corresponds to an MPDU passed by the <strong>MAC</strong> layer to the <strong>PHY</strong> layer. There are two types of MPDUs:<br />

regular MPDUs <strong>and</strong> Channel Estimation MPDUs.<br />

Regular MPDUs can encapsulate bursts provided by the LLC layer.<br />

Channel Estimation MPDUs are directly triggered by the <strong>MAC</strong> layer; they carry a specific signal sequence<br />

generated by the <strong>PHY</strong> layer: Channel Estimation MPDUs do not encapsulate any burst provided by the LLC<br />

layer.<br />

Regular MPDU:<br />

Submission page 92 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

MPDU<br />

Burst<br />

TA BH Data 1 BH Data 2 BH Data 3 Token<br />

Figure 29 Regular MPDU format<br />

The structure of a regular MPDU is depicted in Figure 29. The MPDU is of variable size <strong>and</strong> it is composed by:<br />

- A token announce (TA) delimiter: The token announce defines, amongst other things, which is the<br />

current transmitter <strong>and</strong> what is the maximum transmission time of the current frame (Token Announce<br />

Validity).<br />

- A sequence of bursts, each burst being composed of a Burst Header delimiter followed by data payload.<br />

The bursts included in a transmission frame can have different destination nodes. Burst addressed to a<br />

particular node shall be transmitted in order according to their Burst Id (see 5.2). Bursts to different<br />

destinations can be transmitted in any order. The destination port of the burst is included in the Burst<br />

Header, as well as information such as transfer control, encryption, used FEC, etc. The number of<br />

bursts in a regular MPDU ranges from zero to the maximum allowed by the assigned validity (see<br />

4.4.1).<br />

- A token delimiter.<br />

The type of a regular MPDU is defined by the type of token terminating in the frame. The types of regular<br />

MPDUs are:<br />

1. Distributor Frame<br />

2. Data Frame<br />

3. Silence Frame<br />

4. Polling Frame<br />

5. TDR Polling Frame<br />

6. CSMA Frame<br />

7. <strong>Access</strong> frame<br />

8. <strong>Access</strong> Reply frame<br />

9. Non-returnable Data frame<br />

10. Clock Frame<br />

Channel Estimation MPDU<br />

Submission page 93 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

All MPDUs follow the sequence described above except for the Channel Estimation Frame: this frame does not<br />

contain neither bursts nor token. It starts with a Token Announce delimiter followed by a sequence of channel<br />

estimation symbols.<br />

4.3.1 Distributor Frame<br />

This frame ends with a Distributor Token. This Token assigns the channel to a list of nodes (distribution list)<br />

indicating the transmission order of the nodes, the session allowed to transmit <strong>and</strong> the channel time assigned to<br />

each of them.<br />

Nodes included in the distributor list shall transmit in the indicated order. First node on the distribution list<br />

starts transmitting using the session (see 8.1) <strong>and</strong> for the maximum time indicated in the Distributor Token.<br />

When it ends transmitting, it assigns the channel to the subsequent node on the distribution list using the Data<br />

Token.<br />

When second node on the distribution list receives a Data Token from the first node, it starts transmitting from<br />

the session <strong>and</strong> for the maximum time indicated in the Distributor Token. When this node ends transmitting, it<br />

assigns the channel to the third node on the distribution list. This process is repeated until the last node on the<br />

distribution list returns the channel to the Master node. At this point, the master will be able to transmit a new<br />

frame of the desired type.<br />

Master node can configure the distribution list with a maximum number of five nodes.<br />

The holder token node can assign the channel to the desired nodes during its assigned channel time. In this way,<br />

a repeater node can transmit another Distributor token to its slave nodes or it can assign the channel to a CPE.<br />

Following time diagram shows the described process in a scenario with four nodes (see Figure 23).<br />

Submission page 94 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

List Info<br />

Dst1 = Slave 1 Validity1 SessionId1<br />

Dst2 = Slave 4 Validity2 SessionId2<br />

Dst3 = Slave 3 Validity3 SessionId3<br />

Dst4 = Slave 2 Validity4 SessionId4<br />

MASTER<br />

DISTRIBUTOR<br />

TOKEN<br />

Slave 1<br />

Slave 4 DATA<br />

TOKEN to EP2<br />

Slave 3<br />

Slave 2<br />

IPDUS1 IPPDUS2 IPPDUS2 IPPDUS2<br />

IPPDUS2<br />

DATA TOKEN<br />

To Slave 4<br />

DATA<br />

From SessionId1<br />

≤ Valitdity1<br />

DATA<br />

≤ Valitdity2<br />

From SessionId2<br />

DATA TOKEN to Slave 3<br />

DATA<br />

From SessionId3<br />

≤ Validity3<br />

Figure 30 Example of transmission sequence<br />

DATA<br />

From SessionId4<br />

≤ Validity4<br />

DATA TOKEN<br />

to MASTER<br />

Submission page 95 UPA-OPERA<br />

DISTRIBUTOR<br />

TOKEN<br />

In the above example, Master node assigns the channel to nodes SLAVE 1, SLAVE 4, SLAVE 3 <strong>and</strong> SLAVE 2.<br />

The channel allocation scheduling is decided by the QoS in order to grant the allocated resources to each node.<br />

SLAVE 1 node starts transmitting after the reception of the Distributor token. SLAVE 1 has the right to use the<br />

channel for the maximum time assigned in the Distributor Token (Validity). During this time SLAVE 1 is<br />

allowed transmitting from the flow indicated in the Distritubor Token (SessionId). This value identifies the flow<br />

(source <strong>MAC</strong>, destination <strong>MAC</strong> <strong>and</strong> service class of the allowed flow). The resources reservation protocol <strong>and</strong><br />

the assignation of an identifier for each accepted flow is detailed at the QoS section.<br />

When the holder token node ends transmitting, it releases the token to the next node. In this way, if it has not<br />

enough data packet to use all the assigned channel time, it assigns the channel immediately to the next node, not<br />

wasting the remaining channel time.<br />

If a node has not direct visibility to the next destination node on the distribution list, it has to return the token to<br />

the Master. Then, Master will transmit a new Distributor Token assigning the channel to the next nodes on the<br />

distribution list.<br />

Token holder node checks before start transmitting if next transmission is point to point (a single destination<br />

node) or if it is point to multipoint (different destination nodes). Master node assigns the token to a node to<br />

transmit from a given session identifier. Each node has its own table with information about sessions requested.<br />

This table indicates the destination node/s of that flow/s. If session identifier has the zero value, node can


4-June-07 P1901_PRO_016_r0<br />

transmit to different nodes in the same transmission. Usually, this type of transmission will be only performed<br />

for low service class traffic.<br />

As it is described in the above time diagram, Inter PPDU Space (IPPDUSx) depends on the type of the next<br />

frame to be transmitted. In the <strong>MAC</strong> Parameters Section, it is detailed the value of each Inter PPDU Space.<br />

4.3.2 Data Frame<br />

When a data frame is transmitted from a master to one of its slaves (the direction of the token is downstream),<br />

the data token at the end of the data frame will indicate for how long the slave is allowed to transmit. This<br />

length of time is known as the token validity, <strong>and</strong> is expressed as a number of symbols. The maximum length of<br />

the data frame is limited by the validity.<br />

Upon transmitting a data token, the node will enter reception mode.<br />

When a CPE receives a data token, it may transmit a data frame for as long as the received data token validity<br />

indicated. At the end of the frame, a data token is transmitted indicating the end of the transmission. At this<br />

point, the master node will take over the channel again.<br />

When a Time Division Repeater (TDR) receives a data token from its master node, it schedules the<br />

transmissions between itself <strong>and</strong> the master node <strong>and</strong> also distributes new tokens among its slaves, for as long<br />

as the received data token validity indicated.<br />

The validity does not need to be fully used by the receiving node, <strong>and</strong> it will not be wasted: the validity only<br />

sets the maximum length of time between the transmission of a token downstream <strong>and</strong> the return of this token,<br />

<strong>and</strong> it does not reflect the actual length.<br />

4.3.3 Silence Frame<br />

A node transmits the silence frame when it does not want to transmit the token to another node at the end of the<br />

frame or when no other kind of frames can be sent (or need to be sent). A silence frame may contain bursts with<br />

payload data. Upon transmitting a silence token, the node shall transmit a new frame.<br />

For instance, the silence frame may be used by a HE node that is alone in the network. In that situation it shall<br />

send periodical access frames, <strong>and</strong> silence frames will cover the rest of the time. Another use is when the bursts<br />

to be transmitted do not fit in one single MPDU. In such a case it is possible to transmit several consecutive<br />

silence frames <strong>and</strong> a final data frame to pass the token to another node.<br />

Upon reception of a silence token, no action needs to be done.<br />

Submission page 96 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.3.4 Channel Estimation Frame<br />

Periodically, every node has to send a channel estimation frame so that nodes communicating with that node<br />

can estimate their channel <strong>and</strong> adjust their bit-loading table.<br />

A channel estimation frame is composed by a token announce followed by a known pseudo-r<strong>and</strong>om sequence of<br />

16 symbols. A channel estimation frame is not addressed to any specific node. Any node which receives a<br />

Channel Estimation frame shall consider this frame if the transmitter <strong>MAC</strong> address included in the Token<br />

Announce is part of a completed entry in the port solver table (see 9.1.4.1).<br />

A channel estimation process may lead to the transmission of a bit-loading table calculated upon the reception<br />

of a Channel Estimation Frame. The Adaptive Bit-Loading Protocol is used for the transfer of this bit-loading<br />

table <strong>and</strong> its acknowledgement (see section 9.1.2). Every node is responsible for evaluating the appropriate time<br />

to return the calculated bit-loading table. For instance, if there are major changes in the new calculated bitloading<br />

table with respect to the previous one, the node can immediately return the new bit-loading table before<br />

any other transmission is considered. If the new bit-loading table has undergone no changes, the node shall not<br />

return any bit-loading table.<br />

4.3.4.1 Transmission of channel estimation frames by TDRs <strong>and</strong> CPEs<br />

TDRs <strong>and</strong> CPEs shall ask permission to their master to transmit a channel estimation frame. The channel<br />

estimation frame sent by a TDR may be used by the master <strong>and</strong> the slaves of the TDR to estimate the channel<br />

from the TDR. The channel estimation frame sent by a CPE may be used by the master of the CPE to estimate<br />

the channel from the CPE. A TDR shall not transmit channel estimation frames within its validity period unless<br />

the Allow channel estimation frame field received within the data token was set to 1 by its master, but can grant<br />

rights to transmit channel estimation frames to its slaves.<br />

As shown in Figure 31, the channel estimation process can be initiated either by the TDR or CPE (referred as<br />

slaves) or its master.<br />

Submission page 97 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

1<br />

Send CE frame next=1<br />

in Data Token<br />

Slave initiated<br />

2<br />

Master<br />

Allow CE frame=1<br />

in Data Token<br />

Slave<br />

CE frame<br />

3<br />

4<br />

Unicast Bit-loading<br />

table<br />

for uplink<br />

CE=Channel Estimation<br />

Allow CE frame=1<br />

in Data Token<br />

Master initiated<br />

Submission page 98 UPA-OPERA<br />

1<br />

Master<br />

Slave<br />

CE frame<br />

2<br />

Figure 31 Transmission of channel estimation frames by TDRs <strong>and</strong> CPEs<br />

� Channel estimation initiated by the slave:<br />

3<br />

Unicast Bit-loading<br />

table<br />

for uplink<br />

A slave shall periodically evaluate that it is time to send a new channel estimation frame. A slave shall not ask<br />

permission to send a channel estimation frame more than once every MIN_INTERVAL_FOR_CE_REQUESTS<br />

(default value is 3 seconds <strong>and</strong> corresponds to the minimum number of seconds between two requests from the<br />

same slave for an uplink channel estimation).<br />

A slave may ask permission to send a channel estimation frame by setting the “Send Channel Estimation Frame<br />

Next” to 1 in the data token to its master. The master may accept or reject this request by setting the “Allow<br />

Channel Estimation Frame” to 1 (Accept) or 0 (Reject) in the next data token it returns to this slave. Upon<br />

reception of a data token with “Allow Channel Estimation Frame” set to 1, the slave shall transmit a Channel<br />

Estimation Frame. At the end of the transmission the slave shall enter reception mode, <strong>and</strong> the next transmitter<br />

will be the master.<br />

� Channel estimation initiated by the master:<br />

The channel estimation process also allows the master for asking the slave to send a channel estimation frame.<br />

In this case, the master directly sets the “Allow Channel Estimation” to 1 in the data token sent to the slave. The<br />

process is then executed in the same way as mentioned above.<br />

A master may request a slave to transmit a Channel Estimation frame as often as it deems necessary.


4-June-07 P1901_PRO_016_r0<br />

4.3.4.2 Transmission of channel estimation frames by the HE<br />

The process for the HE is different since it is the only node in the BPL cell that does not have a master.<br />

The HE can send a Channel Estimation Frame as often as it deems necessary. At the end of the transmission of<br />

a Channel Estimation frame by the HE, it is the HE which keeps the control of the medium.<br />

The channel estimation frame sent by a HE may be used by the slaves of the HE to estimate the channel from<br />

the HE. Each slave will have the opportunity to return the new calculated unicast bit-loading table (via the<br />

ABLP protocol) as soon as it receives a data token from its master. However, as described above, the slave shall<br />

not necessarily return the unicast bit-loading table as soon as it receives a data token following a Channel<br />

Estimation frame.<br />

4.3.5 Polling Frame<br />

As described in 4.2.1, polling frames are used by the master to manage CPE state transitions from Idle to<br />

Active or Idle to Unregistered.<br />

Polling frames are frames terminated by a Polling Token. Polling Tokens are addressed to several CPE at the<br />

same time via the Polling Destination Bank/Polling Destination Ports fields of the Polling Token (see 4.4.2.4,<br />

Polling Token). A Polling Token is followed by a polling response sequence made of polling slots. The number<br />

of polling slots included in this sequence corresponds to the number of bits set to 1 in the Polling Destination<br />

Ports field of the polling token (max = 32). First bit set to 1 (going from the Least to the Most Significant bit)<br />

corresponds to the first polling slot in the polling response sequence <strong>and</strong> so forth. Upon reception of a polling<br />

token, a CPE which is addressed by this token shall assert a SOT in its corresponding polling slot if that answer<br />

to the polling token is affirmative. It shall not respond if the answer to the polling token is negative.<br />

Figure 32 shows a typical polling scheme in which three CPEs are polled. CPE 1 <strong>and</strong> CPE 3 assert a SOT in<br />

their corresponding polling slots (affirmative response) while CPE 2 does not respond to the polling token<br />

(negative response). Polling slots have duration equal to Size Poll Window. Two polling slots are separated by a<br />

gap of Offset Poll Window. The last polling slot of the Polling Response Sequence is not followed by this gap:<br />

the TX-RX Switch time shall be initiated immediately after the transmission of the last polling slot<br />

Submission page 99 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Polling Token addressed<br />

to Slaves 1,2 <strong>and</strong> 3<br />

Master<br />

TX<br />

Slave1<br />

TX<br />

Slave2<br />

TX<br />

Slave3<br />

TX<br />

Polling PPDU<br />

IPPDUS1<br />

Time<br />

Size Poll<br />

Window<br />

Submission page 100 UPA-OPERA<br />

Polling<br />

Slot 1<br />

S<br />

O<br />

T<br />

Figure 32 Polling scheme<br />

Offset Poll<br />

Window<br />

Size Poll<br />

Window<br />

Polling<br />

Slot 2<br />

Offset Poll<br />

Window<br />

Size Poll<br />

Window<br />

Polling<br />

Slot 3<br />

As described in 4.2.1, there are two types of Polling Tokens transmitted by a master to CPEs:<br />

• Active Polling Token<br />

• Alive Polling Token<br />

These Polling Tokens are identified by the Polling Type field (see 4.4.2.4, Polling Token).<br />

S<br />

O<br />

T<br />

IPPDUS1<br />

Note: Active Polling Tokens provide an Idle CPE with the ability to recover the Active state <strong>and</strong> get<br />

transmission opportunities. The master transmits data tokens only to those slaves that are considered Active.<br />

Alive Polling Tokens provide the master with the ability to detect slaves with no activity (e.g.: turned off).<br />

These ones become Unregistered <strong>and</strong> are not polled anymore.<br />

4.3.6 TDR Polling Frame<br />

As described in 4.3.5, master shall periodically poll its Idle TDRs <strong>and</strong> give them opportunity to poll their own<br />

Idle slaves (CPEs <strong>and</strong>/or TDRs) <strong>and</strong> transmit <strong>Access</strong> Frames. TDR Polling Frames have the same format as a<br />

Data Frame except for the last symbol, which is a TDR Polling Token instead of a Data Token. TDR Polling


4-June-07 P1901_PRO_016_r0<br />

Tokens are addressed to a single port <strong>and</strong> when they are generated by the master, they shall have enough<br />

validity for the polled TDR to transmit Active <strong>and</strong> Alive Polling Frames, TDR Polling Frames <strong>and</strong> <strong>Access</strong><br />

Frames within the maximum intervals.<br />

This kind of frame is also used by the TDR to indicate whether it wants to be Active or stay Idle; in this case<br />

this frame can only contain service class 7 traffic, except if it is an Active TDR Polling Reply Frame, case in<br />

which any data can be transmitted, according to the remaining validity.<br />

4.3.7 CSMA Frame<br />

The aim of this type of frame is to provide the nodes which do not have access to the channel, an opportunity to<br />

gain access. This type of frame is addressed to:<br />

• Idle nodes that have data packets to send in order to change them into active ones.<br />

• Idle nodes that generates bursty traffic<br />

When a node receives a CSMA token <strong>and</strong> wants to transmit, it must contend for the channel. This contention is<br />

performed through a Backoff. If the node wins the contention it starts transmitting; otherwise, the node waits for<br />

another CSMA token.<br />

Each node will contend for channel access with a different value depending on its contention priority;<br />

contention is prioritized in the following way:-<br />

• High Service class Data traffic <strong>and</strong> idle state: in order to minimize the probability of collision between<br />

nodes that are in the same case each of them will select a r<strong>and</strong>om value in the range [P1min, P1max]. In<br />

this case, the <strong>MAC</strong> must configure the node to transmit only packets with service class 7. The idea is to<br />

only send the Resource Request Packet <strong>and</strong> not send the High Service class Data traffic to avoid<br />

glitches in the audio or the video application.<br />

• Idle node with control packets: this contention range [P2min, P2max] is reserved in order the idle<br />

nodes send the control packets.<br />

• Idle node with Bursty Traffic: this contention range [P3min, P3max] is reserved for nodes with very<br />

low throughput of low service class data traffic.<br />

Submission page 101 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.3.8 <strong>Access</strong> Frame<br />

S<br />

O<br />

T<br />

CSMA Token<br />

CSMA PPDU<br />

IPPDUS1<br />

P0min<br />

P0max P1min<br />

Backoff<br />

slot time<br />

Backoff time<br />

CONTENTION WINDOW<br />

P1max P2min<br />

P2max P3min<br />

Submission page 102 UPA-OPERA<br />

S<br />

O<br />

T<br />

PPDU<br />

Contention winner Node<br />

P3max<br />

Token<br />

Figure 33: Use of CSMA Token to assign channel time to the contention winner node<br />

A master shall periodically transmit <strong>Access</strong> tokens inviting Unregistered slaves or Registered slaves that want<br />

to change masters to subscribe to the network. An <strong>Access</strong> Token does not have a specific destination, <strong>and</strong> thus it<br />

is possible that no slave will answer to this request. Upon receiving an access frame, an Unregistered slave or a<br />

Registered slave that decides to reply must send an access reply frame as described in 4.3.6.<br />

4.3.9 <strong>Access</strong> Reply Frame<br />

The access reply frame is sent by an Unregistered slave that wishes to enter the network, or a Registered slave<br />

that wishes to change its current master. The transmission of an <strong>Access</strong> Reply Frame is triggered by the<br />

reception of an <strong>Access</strong> Frame.


4-June-07 P1901_PRO_016_r0<br />

Master<br />

TX<br />

Slave<br />

TX<br />

S<br />

O<br />

T<br />

<strong>Access</strong> Token<br />

<strong>Access</strong> PPDU<br />

IPPDUS1<br />

Backoff time: slave selects slot 5<br />

Submission page 103 UPA-OPERA<br />

Time<br />

Backoff<br />

slot time<br />

S<br />

O<br />

T<br />

Figure 34 <strong>Access</strong> Reply scheme<br />

<strong>Access</strong> Reply PPDU<br />

<strong>Access</strong> Reply<br />

Token<br />

The <strong>Access</strong> Reply Frame is preceded by a contention. The contention method used is the backoff contention<br />

method: all contending nodes select a r<strong>and</strong>om amount of time to wait before beginning the transmission. The<br />

SOT can be transmitted in one of 16 slots. Each node that intends to send an <strong>Access</strong> Reply PPDU will select a<br />

r<strong>and</strong>om number between 1 <strong>and</strong> 16 with a uniform distribution <strong>and</strong> schedule the transmission of the PPDU in the<br />

appropriate slot (slot 1 corresponds to the first slot after the TX-RX switch time has expired). The size of each<br />

slot is BACKOFF_SLOT_TIME. After the backoff time has expired, the <strong>Access</strong> Reply PPDU must be<br />

transmitted. If a SOT (beginning of an <strong>Access</strong> Reply PPDU) is heard before the time has expired, another node<br />

has won the contention <strong>and</strong> the transmission of the access reply frame should be deferred until a new access<br />

frame is received. A new r<strong>and</strong>om slot will be selected the next time. Particularly, the backoff process is not<br />

affected by the loss of a contention, <strong>and</strong> the process will be carried out in the same manner, except that the<br />

r<strong>and</strong>om slot will be selected again.<br />

If no SOT is heard before starting the transmission of the own SOT, the whole transmission of the access reply<br />

frame will take place. Its structure is identical to a data frame, except for the final token type.<br />

The master, upon receiving an access reply frame, will consider, taking into account Radius, QoS or any other<br />

criteria defined, accepting this node as its slave. The response will be sent as an access packet (see 9.1.3.1). If a<br />

node that transmitted an <strong>Access</strong> Reply PPDU does not receive a reply from the master in ACCEPTATION_TO it<br />

will begin the process again.


4-June-07 P1901_PRO_016_r0<br />

4.3.10 Non-returnable Data Frame<br />

The non-returnable data frame is a frame transmitted from a master to many (up to eight) of its slaves (usually<br />

TDRs). The non-returnable data token transmitted at the end of the frame indicates which are the destination<br />

nodes <strong>and</strong> for how long they will be allowed to transmit. This length of time is known as the token validity, <strong>and</strong><br />

is expressed as a number of symbols. The non-returnable data frame can only be sent by a master if Cluster<br />

Discovery Protocol (See 0) messages have been received from the TDRs that are slaves to it.<br />

Upon transmitting a non-returnable data token, the master will ignore any signals received until the validity<br />

time is finished. At this point, the master will transmit a new frame. No frame will be expected by the<br />

transmitter of the non-returnable data frame.<br />

Upon reception of the non-returnable data frame, the slaves (usually TDRs) will start transmitting new frames.<br />

However, they must not transmit any data in the upstream (data for the master that sent the non-returnable data<br />

frame), or any channel estimation frames.<br />

The non-returnable data frame allows the simultaneous transmission of data <strong>and</strong> tokens of several isolated<br />

clusters, thus allowing for spatial reuse.<br />

4.3.11 Clock Frame<br />

The Clock frame is used to synchronize all nodes of a BPL cell.<br />

Every node shall have an internal timer derived from a 312.5 kHz clock. The periodic timer shall count down from a<br />

maximum value to zero. The maximum timer value (Tmax) shall be adapted to span 9 mains periods to allow enough<br />

numerical accuracy. This value is transmitted in the Clock token together with the remaining cycles (TimerValue)<br />

which shall be the value of the timer in the moment the Clock token is transmitted.<br />

The information transmitted in the Clock frame shall be the remaining cycles for reaching the end of the timer<br />

period. This information is used in the receiver node to calculate the delay between its timer <strong>and</strong> the transmitter<br />

timer. The delay with the master shall be used to compensate the own timer. The Clock frame shall be transmitted<br />

only from masters to its direct slaves. Therefore, when a node receives a Clock frame, it shall check that it comes<br />

from its direct master before using the information. The master/slave tree topology allows the propagation of the<br />

information.<br />

The mains frequency is not a stable value <strong>and</strong> fluctuates depending on the energy dem<strong>and</strong>. So, the maximum timer<br />

value shall be continuously corrected to follow the mains variations. Tmax can be obtained in two different ways:<br />

1. Using a zero-cross point detection circuit.<br />

2. Using the MaximumCorrectionValue field of the Clock token. This field allows a slave to synchronize with<br />

the network clock without using a zero-cross point detection circuit.<br />

From Tmax the value of the actual mains periord (Tmains) can be calculated in the following way:<br />

Submission page 104 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Tmax<br />

Tmains =<br />

9<br />

Equation 33<br />

This periodic timer shall be used to divide the mains period in fixed duration time slots called Qs. The Qs shall be<br />

obtained directly from the periodic timer (Ti) as it is shown in Equation 34.<br />

( T mod T ) >> 6<br />

Q = i mains<br />

Equation 34<br />

The duration of a Q is 204.8 μs, <strong>and</strong> the number of Qs (mains period divisions) will be different depending on the<br />

mains frequency. For example 98 in the case of 50 Hz <strong>and</strong> 82 in the case of 60 Hz, assuming there is no deviation<br />

from the nominal frequency.<br />

The MPDU of a Clock frame shall be composed by a Token Announce <strong>and</strong> a Clock token delimiter. The transmitter<br />

of a Clock frame shall know exactly the frame size (in symbols) before start transmitting, in order to calculate the<br />

delay added in the transmission of that frame. This delay shall be compensated in the transmitted remaining cycles<br />

(TimerValue field of the Clock token).<br />

The Clock frame shall be transmitted every CLOCK_PERIOD_TIME.<br />

The following figures show the described timing references:<br />

0 V<br />

Q @ 50 Hz<br />

Q @ 60 Hz<br />

50 Hz Mains<br />

60 Hz Mains<br />

9<br />

7<br />

9<br />

6<br />

9<br />

5<br />

9<br />

4<br />

...<br />

8<br />

1<br />

8<br />

1<br />

8<br />

0<br />

8<br />

0<br />

7<br />

9<br />

7<br />

9<br />

7<br />

8<br />

7<br />

8<br />

Figure 35 Qs Vs mains period<br />

Submission page 105 UPA-OPERA<br />

...<br />

...<br />

3<br />

3<br />

2 1 0<br />

2 1 0


4-June-07 P1901_PRO_016_r0<br />

4.4 <strong>MAC</strong> DELIMITERS<br />

Figure 36: Clock frame timming reference<br />

As described in 4.3, the <strong>MAC</strong> layer generates two types of MPDUs: regular MPDUs <strong>and</strong> Channel Estimation<br />

MPDUs. These MPDUs make use of two <strong>MAC</strong> delimiters:<br />

• Token Announce<br />

• Token<br />

Note: <strong>MAC</strong> delimiters are processed by the <strong>PHY</strong> layer as described in 3.3.1.<br />

4.4.1 Token announce<br />

The Token Announce is sent in the initial sequence of every transmission frame. The Token Announce has the<br />

following fields:<br />

- Preamble – 32 bits. The preamble is equal to 0x90471D2D. The preamble is used to distinguish the<br />

different types of control symbols.<br />

- Type – 4 bits. In this case, Type should be ANNOUNCE(3).<br />

- Validity – 12 bits. Maximum number of symbols that will be transmitted in the current transmission<br />

after this Token Announce Symbol. The maximum number that can be used is MAX_TA_VALIDITY<br />

- <strong>Access</strong> Id – 16 bits. This id must be set to 0x0001.<br />

Submission page 106 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

- Channel Estimation Frame – 1 bit. If this frame is a Channel Estimation Frame, Channel<br />

Estimation Frame must be set to 1. Otherwise, Channel Estimation Frame must be set to 0.<br />

- Power <strong>Control</strong> bits – 5 bits. From left to right:<br />

� Bit 4. Set to 1 on booting <strong>and</strong> after the transmission gain is increased. Set to 0 fifteen<br />

seconds after it was set to 1.<br />

� Bit 3. Set to 1 if the node cannot decrease its transmission gain due to own reasons. For<br />

example: low throughput. Set to 0 otherwise.<br />

� Bit 2. Set to 1 if the node is not going to decrease its transmission gain due to other<br />

nodes reasons, but if those external circumstances end then the transmission gain could<br />

be decreased (depending on bit 3). For example: when another equipment has bit 3 to 1<br />

<strong>and</strong> the node wants to isolate from it. Set to 0 otherwise.<br />

� Bit 1. Set to 1 if the power control task is on. Set to 0 otherwise.<br />

� Bit 0. Set to 1 if transmission gain has been decreased <strong>and</strong> isolation is expected. Set to<br />

0 if transmission gain has its maximum (initial) value.<br />

If power control is not implemented this field shall be set to 0b01000<br />

- <strong>MAC</strong> Mode – 3 bits. Must be set to 0b001 for <strong>Access</strong>.<br />

- Type of Node – 3 bits. See below<br />

- ACCRQ – 1 bit. If this frame is an <strong>Access</strong> Frame, ACCRQ must be set to 1. Otherwise, ACCRQ<br />

must be set to 0. Using this field, a node that is searching for a master only needs to receive the TA<br />

to know that it is an <strong>Access</strong> frame.<br />

- MID – 21 bits. Master Id. It is used to detect if there is interference from other BPL cell. The<br />

problem of interference appears when there is more than one node allocating the channel in time.<br />

This can happen when there are two BPL cells, each one having its own HE, <strong>and</strong> the transmissions<br />

from some nodes in one of them can be received by some nodes in the other BPL cell.<br />

The first problem is to know if a node is being interfered because there is more than one HE in the<br />

channel. To solve this issue all the nodes that share the token must identify themselves as members<br />

of the same BPL cell.<br />

The HE of the BPL cell must transmit an identifier, so called Master Id [MID], <strong>and</strong> each node that<br />

depends directly or indirectly (because is in the HE’s BPL cell) must copy the MID.<br />

The transmission of the MID is splitted between 2 symbols, the Token Announce <strong>and</strong> the <strong>Access</strong> or<br />

CSMA Token<br />

In the Token Announce, 21 bits are sent, with the following structure:<br />

Submission page 107 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 37 Master ID in Token Announce<br />

In the <strong>Access</strong> or CSMA token, additional 32 bits to complete the Master ID will be sent<br />

Figure 38 Master ID in <strong>Access</strong> Token<br />

So to complete the whole MID an <strong>Access</strong> Token must be received, but most of the decisions can be<br />

taken only with the information received in the Token Announce.<br />

When a node detects that its master has change the MID it shall change it immediately.<br />

� Force master field (3 bits)<br />

This field shall be used to establish priorities in the network coordination rules between <strong>Access</strong><br />

<strong>and</strong> IH BPL cells. Values shall be:<br />

• 0x0 – 0x1 for <strong>Access</strong> MV BPL cell.<br />

• 0x2 – 0x4 for <strong>Access</strong> LV BPL cell.<br />

• 0x6 – 0x7 Reserved for IH cells.<br />

� Negotiation field (1 bit)<br />

Submission page 108 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

It is used to change the priority of a MID in the coordination rules depending on the scenarios.<br />

Default value shall be 1. The following rules shall be respected:<br />

• A node with the same MID except for the Negotiation field shall consider it as the same<br />

MID. In this case, the Negotiation field shall not be considered in the network<br />

coordination rules.<br />

• A node with different MID (Force Master, Reserved field or Identification field) shall<br />

consider the Negotiation field in the network coordination rules.<br />

The next 2 rules assert that the Negotiation field will be set to the same value into the same<br />

BPL cell if a change is made by a single node:<br />

• If the Negotiation field changes from 1 to 0 in a node, its master shall set the<br />

Negotiation field to 0.<br />

• If the Negotiation field changes in a node, its slaves shall set the same Negotiation field<br />

value.<br />

Only the HE can change the Negotiation field from 0 to 1 again. The HE shall change the<br />

Negotiation field from 0 to 1 after 120 seconds from the change from 1 to 0.<br />

� Reserved field (1 bit)<br />

For future use.<br />

� Identification field (48 bits)<br />

By default it should be the Mac Address of the HE stored in reverse order. It shall not be assumed<br />

by any protocol that the MasterId includes a <strong>MAC</strong> address.<br />

For example, the <strong>MAC</strong> 0x00139D0002A8 will produce the Identification Field 0xA802009D1300<br />

- <strong>MAC</strong> – 48 bits. This is the <strong>MAC</strong> address of transmitter.<br />

Submission page 109 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

7<br />

6<br />

5<br />

4<br />

90<br />

47<br />

1D<br />

2D<br />

Type Validity [11:8]<br />

Validity [7:0]<br />

<strong>Access</strong> Id [7:0]<br />

MID [15:8]<br />

MID [7:0]<br />

Submission page 110 UPA-OPERA<br />

3<br />

<strong>Access</strong> Id [15:8]<br />

Ch. Est. Fr.<br />

Always MUST be<br />

set to 0<br />

Always MUST be set to 0<br />

Power <strong>Control</strong> bits<br />

Always MUST be<br />

set to 0<br />

Always MUST be set to 0<br />

<strong>MAC</strong> Mode<br />

TypeOfNode[2]<br />

Type of Node [1:0] MID [20:16] ACCRQ<br />

The field Type has the following meanings:<br />

3 ANNOUNCE<br />

The field Type of Node has the following meanings:<br />

0 HE<br />

1 CPE<br />

2 TDR<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

<strong>MAC</strong>[0]<br />

<strong>MAC</strong>[1]<br />

<strong>MAC</strong>[2]<br />

<strong>MAC</strong>[3]<br />

<strong>MAC</strong>[4]<br />

<strong>MAC</strong>[5]<br />

Figure 39 Token Announce<br />

2<br />

1<br />

0<br />

preamble


4-June-07 P1901_PRO_016_r0<br />

4.4.2 Token<br />

There are ten kinds of Token:<br />

- Distributor Token<br />

- Data Token<br />

- Silence Token<br />

- Polling Token<br />

- TDR Polling Token<br />

- CSMA Token<br />

- <strong>Access</strong> Token<br />

- <strong>Access</strong> Reply Token<br />

- Non-returnable Data Token<br />

- Clock Token<br />

The field Type has the following meanings:<br />

Token Type Value<br />

DATA 0<br />

NON-RETURNABLE 2<br />

CLOCK 3<br />

POLLING 5<br />

TDR POLLING 7<br />

DISTRIBUTOR TOKEN 8<br />

CSMA 9<br />

Submission page 111 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

SILENCE 11<br />

ACCESS_REQUEST 13<br />

ACCESS_REPLY 14<br />

The field Type of Node has the following meanings:<br />

0 HE<br />

1 CPE<br />

2 TDR<br />

The field Direction has the following meaning:<br />

0 DOWNSTREAM<br />

1 UPSTREAM<br />

4.4.2.1 Distributor Token<br />

The Distributor Token has the following fields:<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

- Type – 4 bits. Type shall be DISTRIBUTOR (8)<br />

- DstPortx – Destination Port 1 to 5. – 7x5 bits. These are the next token holders (Distribution List). The<br />

destination port equals to the Local Port assigned by the Distributor Token sender to each node. See<br />

Submission page 112 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

¡Error! No se encuentra el origen de la referencia. for more information on the Port Solver protocol. If<br />

this field is equal 0, the destination node is the Master node.<br />

- Info Size – 1 bit. This field indicates the size of the Session Id <strong>and</strong> Validity fields. If it is set to 0, the size of<br />

the SessionId equals 5 bits <strong>and</strong> Validity equals 6 bits. In that case, the Distributor Token carries information<br />

for 5 destination nodes. If it is set to 1, the size of SessionId <strong>and</strong> Validity equal 8 bits. In that case, this token<br />

carries only information for 4 destination nodes. Master will use this subtype of Distributor token if it has<br />

more than 32 opened sessions.<br />

- Validityx – (6x5 bits) or (8x4 bits). Channel time assigned for each of the nodes on the distribution list. This<br />

is the maximum channel time the DstPortx can use before send the token to the next node on the list. This<br />

value is indicated in multiples of 8 symbols.<br />

- SessionIdx – (5x5 bits) or (8x4). This value indicates the flow from which the DstPortx is allowed<br />

transmitting.<br />

- Recovery Mode – 1 bit. Indicates the token loss recovery mode selected by the Master. See section X. It<br />

indicates if the in charged of recovering a token loss is the Distributor Token sender (if set to 0) or each of<br />

the nodes on the distribution list (if set to 1).<br />

- Sequence Number – 3 bits. Identifier of the current Distributor Token.<br />

- Disruption Token – 1 bit. This bit informs to the destination nodes of the Distributor token that the<br />

transmitter node is the new QC of the network <strong>and</strong> it wants to become the master of them.<br />

- Silence Mode – 1bit. Transmitter node indicates it is going to enter in intermittent transmission.<br />

Following diagrams shows the Distributor Token structure if Info Size = 0;<br />

Submission page 113 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 40 Distributor Token Info Size = 0<br />

Following diagrams shows the Distributor Token structure if Info Size = 1;<br />

Submission page 114 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.4.2.2 Data token<br />

The Data Token has the following fields:<br />

Figure 41 Distributor Token Info Size = 0<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

- Type – 4 bits. Type shall be DATA (0)<br />

- Direction – 1 bit. See above.<br />

- Transmission in HURTO – 1 bit. Indicates whether the transmission from Token Transmitter to Destination<br />

Port is using HURTO or not.<br />

- Allow Channel Estimation Frame– 1 bit. From Master to Slave. If it is set to 1, the Slave receiving this<br />

token must send a Channel Estimation Frame. See 4.3.3 for more information.<br />

- Send Channel Estimation Frame next – 1 bit. From Slave to Master. The Slave is requesting to send a<br />

Channel Estimation Frame. See 4.3.3 for more information.<br />

Submission page 115 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

- Single Validity – 4 bits. It is expressed in slots (each slot is composed of 16 symbols). The Single Validity is<br />

an indication from the master on the validity that may be assigned for individual transmission. This<br />

information is only used as an example of how to distribute the token validity. However, the receiving node<br />

does not have to follow that distribution. In that case the receiving node may change the Single Validity to a<br />

new value, according to the validity that it assigns in the Data Token. Individual transmission means the<br />

transmission from a TDR to a CPE or a CPE to its TDR. This field is not used by CPEs. The relevant field<br />

for CPEs is the Validity. The Single Validity includes all symbols transmitted after the TA. The minimum<br />

Single Validity is 1.<br />

- Validity – 12 bits. From Master to Slave. This indicates the maximum validity that the slave will be<br />

allowed to use before returning the token. It is expressed as a number of symbols. The master shall start a<br />

timer after the transmission of the Token Announce by the slave with the duration of the Validity it has<br />

assigned, <strong>and</strong> expect to receive the token back before this timer expires. If the slave is a repeater, the<br />

Validity includes the time needed for the repeater to communicate with its slaves.<br />

- Destination Port – 7 bits. Local Port assigned to the intended receiver of the Data Token. See 9.1.4 for more<br />

information on the Port Solver protocol.<br />

- Session Id – 8 bits. Identify a specific flow reserved by the CAC protocol that should have priority over<br />

other flows registered or best-effort traffic.<br />

- Frame Service class – 8 bits. Only used from slave to master. The Frame Service class field in the token is<br />

used to convey the information of the service classes that have been transmitted within the frame, when the<br />

token is directed towards its master node <strong>and</strong> also all the service classes detected in the previous upstream<br />

transmissios. CPEs use this field to indicate the service classes sent in their transmission <strong>and</strong> TDRs gather<br />

the service class information of their slaves <strong>and</strong> the service class information from their own transmissions.<br />

Therefore, the HE has the information of all the priorities transmitted in the network. When the token is<br />

transmitted towards slave nodes, this field is not used. If bit X is equal to 1, there is at least one packet in<br />

this frame with service class X.<br />

- Unused frame symbols - 13 bits. Unused symbols in the current frame, compared to the Validity indicated<br />

in the token announce of the same transmission frame.<br />

- Received words - 16 bits. The Received Words Field is used to communicate to the token receiver the<br />

number of 32-bit words that have been received from that destination since the last time, so that the<br />

b<strong>and</strong>width limitation algorithm can respond. Counting shall be performed over complete received packets<br />

when they are passed to the Convergence <strong>Layer</strong>.<br />

- Number of Downstream Nodes – 8 bits From a CPE to its master, the Number of Downstream Nodes is<br />

equal to 0. From a TDR to its master, the Number of Downstream Nodes is equal to the number of nodes in<br />

its BPL subtree minus 1.<br />

- Maximum Number of Hops – 4 bits. From a CPE to its master, the Maximum Number of Hops is equal to 0.<br />

A TDR will set the Maximum Number of Hops as the maximum value of number of hops amongst those<br />

received by the nodes hanging from it plus 1.When this field is set to 31 means that there are 32 hops or<br />

more.<br />

- Distributor Sequence Number – 3 bits. Identifier of the current Distributor Token when this Data Token<br />

belongs to an scheduded chain of transmissions generated by a Distributor Token.<br />

Submission page 116 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

7<br />

Reserved<br />

6<br />

Type<br />

Single Validity<br />

Always MUST be set to 0<br />

5<br />

Reserved<br />

Always MUST be set to 0<br />

4<br />

5F<br />

73<br />

EE<br />

E2<br />

Validity [7:0]<br />

Submission page 117 UPA-OPERA<br />

3<br />

Destination Port<br />

Frame Priority<br />

Session ID [7:0]<br />

Always MUST be set to 0<br />

Unused Frame Symbols [7:0]<br />

Received words [15:8]<br />

Received words [7:0]<br />

Number of Downstream Nodes<br />

Reserved<br />

Reserved<br />

Always MUST be set to 0<br />

Distributor Sequence Number Always MUST be set to 0<br />

4.4.2.3 Silence Token<br />

2<br />

Direction Reserved<br />

Transmission<br />

in HURTO<br />

Validity [11:8]<br />

Unused Frame Symbols [12:8]<br />

Maximum Number of Hops<br />

No Destination<br />

Port<br />

Figure 42 Data Token<br />

The Silence Token includes the following fields of the data token:<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

- Type – 4 bits. Type shall be SILENCE (11).<br />

1<br />

Alow Channel<br />

Estimation Fr.<br />

0<br />

Send Ch. Est.<br />

Fr. Next<br />

Always MUST be set to 0<br />

preamble<br />

- Unused frame symbols (13 bits). Unused symbols in the current frame, compared to the Validity indicated<br />

in the token announce of the same transmission frame.


4-June-07 P1901_PRO_016_r0<br />

7<br />

6<br />

Type<br />

Always MUST be set to 0<br />

4.4.2.4 Polling Token<br />

The Polling Token has the following fields:<br />

5<br />

4<br />

5F<br />

73<br />

EE<br />

E2<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Unused Frame Symbols [7:0]<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Figure 43 Silence Token<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

- Type – 4 bits. In this case, Type shall be POLLING (5).<br />

Submission page 118 UPA-OPERA<br />

3<br />

2<br />

Always MUST be set to 0<br />

Unused Frame Symbols [12:8]<br />

1<br />

0<br />

preamble<br />

- Polling Type – 1 bit. (The Polling Type could be equal to ACTIVE(1) or ALIVE(0). When Polling Type is<br />

ACTIVE, the Polling Token is requesting which nodes have data to be sent. When Polling Type is ALIVE,<br />

the Polling Token is requesting which nodes are alive.<br />

- Polling Destination Bank – 2 bits. The total number of destination ports of this Polling Token is divided<br />

into 4 banks. The Polling Destination Bank is to know the destination bank of this polling. The first<br />

available port is port 9.<br />

0 � 9 - 40 ports<br />

1 � 41 - 72 ports


4-June-07 P1901_PRO_016_r0<br />

2 � 73 - 104 ports<br />

3 � 105 - 126 ports<br />

- Unused frame symbols (13 bits). Unused symbols in the current frame, compared to the Validity indicated<br />

in the token announce of the same transmission frame.<br />

- Polling Destination Ports – 32 bits. Destination Ports of Polling Destination Bank of this Polling Token.<br />

Each bit represents one port.<br />

To cover all the possible ports, the field Polling Destination Bank, selects one of the four possible groups of<br />

ports. In order to poll port X (X>=9), Polling Destination Bank equals (X-9) / 32. The bit that represents<br />

port X in Polling Destination Ports field is bit (X-9) mod 32. A bit set to 1 means that this user is being<br />

polled. Only ports in the same Polling Destination Bank can be polled simultaneously<br />

7<br />

1<br />

6<br />

Type<br />

Always MUST be set to 0<br />

4.4.2.5 TDR Polling Token<br />

The TDR Polliing Token has the following fields:<br />

5<br />

4<br />

5F<br />

73<br />

EE<br />

E2<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Unused Frame Symbols [7:0]<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Submission page 119 UPA-OPERA<br />

3<br />

Polling Type<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Unused Frame Symbols [12:8]<br />

Polling Destination Ports<br />

Polling Destination Ports<br />

Polling Destination Ports<br />

Polling Destination Ports<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Figure 44 Polling Token<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

2<br />

1<br />

Polling Destination Bank<br />

0<br />

Always MUST be<br />

set to 0<br />

preamble


4-June-07 P1901_PRO_016_r0<br />

- Type – 4 bits. Type shall be TDR POLLING (7)<br />

- Direction – 1 bit. DOWNSTREAM (0) means that this TDR Polling Token is sent by a master to poll a<br />

TDR. UPSTREAM (1) means that it is a TDR Polling Reply Token, sent by a TDR to its master.<br />

- Reply – 1 bit. If Reply is ACTIVE (1), the TDR indicates that it wants to be Active <strong>and</strong> receive transmission<br />

opportunities. If it is IDLE (0), the TDR stays as Idle.<br />

- Single Validity – 4 bits. It is expressed in slots (each slot is composed of 16 symbols). The Single Validity is<br />

an indication from the master on the validity that may be assigned for individual transmission. This<br />

information is only used as an example of how to distribute the token validity. However, the receiving node<br />

does not have to follow that distribution. In that case the receiving node may change the Single Validity to a<br />

new value, according to the validity that it assigns in the Data Token. Individual transmission means the<br />

transmission from a TDR to a CPE or a CPE to its TDR. The Single Validity includes all symbols<br />

transmitted after the TA. The minimum Single Validity is 1.<br />

- Validity – 12 bits. From Master to Slave. This indicates the maximum validity that the TDR will be allowed<br />

to use before returning the token. It is expressed as a number of symbols. The master shall start a timer after<br />

the transmission of the Token Announce by the slave with the duration of the Validity it has assigned, <strong>and</strong><br />

expect to receive the token back before this timer expires.<br />

- Destination Port – 7 bits. Local Port assigned to the intended receiver of the Data Token. See 9.1.4 for more<br />

information on the Port Solver protocol.<br />

- Unused frame symbols – 13 bits. Unused symbols in the current frame, compared to the Validity indicated<br />

in the token announce of the same transmission frame.<br />

- Number of Downstream Nodes – 8 bits From a TDR to its master, the Number of Downstream Nodes is<br />

equal to the number of nodes in its BPL subtree minus 1 (0 if it has no slaves).<br />

- Maximum Number of Hops – 4 bits. A TDR will set the Maximum Number of Hops as the maximum value<br />

of number of hops amongst those received by the nodes hanging from it plus 1 (0 if it has no slaves). When<br />

this field is set to 31 means that there are 32 hops or more.<br />

7<br />

Reserved<br />

6<br />

Type<br />

Always MUST be set to 0<br />

5<br />

4<br />

Submission page 120 UPA-OPERA<br />

5F<br />

73<br />

EE<br />

E2<br />

Validity[7:0]<br />

3<br />

Direction<br />

Always MUST be set to 0<br />

Destination Port<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Unused Frame Symbols [7:0]<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Number of Downstreams Nodes<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

2<br />

Reply<br />

Single Validity Validity[11:8]<br />

Unused Frame Symbols [12:8]<br />

Always MUST be set to 0 Maximum number of Hops<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

1<br />

0<br />

Always MUST be set to 0<br />

preamble


4-June-07 P1901_PRO_016_r0<br />

4.4.2.6 CSMA Token<br />

The CSMA Token has the following fields:<br />

Figure 45 TDR Polling Token<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

- Type – 4 bits. Type shall be CSMA (9).<br />

- Type of Node – 2 bits.<br />

- Number of Hops – 4 bits. For a HE, the Number of Hops is equal to 0. For the rest of nodes, the Number of<br />

Hops is equal to the Number of Hops read in CSMA Token from its Master + 1. In a CPE, this field is not<br />

used. When this field is set to 31 means that there are 32 hops or more.<br />

- Validity – 7 bits. This indicates the maximum validity that the slave will be allowed to use before returning<br />

the token. It is expressed as a multiple of 8 symbols.<br />

- Unused frame symbols (13 bits). Unused symbols in the current frame, compared to the Validity indicated<br />

in the token announce of the same transmission frame.<br />

- MID (2nd part) – 32 bits. Last 4 bytes of the MasterId (The 21st first bits are allocated in the Token<br />

Announce).<br />

Following fields configure the contention window:<br />

- P0min (2 bits).<br />

- SizeP0 (4 bits). Size of the contention range for the priority 0. This value fixes the P0max = P0min+SizeP0.<br />

- SizSlave 1 (4 bits). Size of the contention range for the priority 1.<br />

- SizSlave 2 (4 bits). Size of the contention range for the priority 2.<br />

- SizSlave 3 (4 bits). Size of the contention range for the priority 3.<br />

- Allowed Ports (32 bits). Nodes allowed contending for the channel. Each bit represents one port. To cover<br />

all the possible ports, the field Destination Bank(2bits), selects one of the four possible groups of ports. In<br />

order to allow contentending to port X (X>=9), Destination Bank equals (X-9) / 32. The bit that represents<br />

port X in Allowed Ports field is bit (X-9) mod 32. A bit set to 1 means that this port is allowed to contend.<br />

- Subtype (2 bits). Type of CSMA token.<br />

• Normal = 0: Contention window is configured as it<br />

• AllNodes = 2: This subtype indicates that all nodes can contend for the channel. Thus, the<br />

AllowedPorts information must be ignored.<br />

Submission page 121 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

7<br />

6<br />

Type<br />

5<br />

4<br />

5F<br />

73<br />

EE<br />

Submission page 122 UPA-OPERA<br />

3<br />

E2<br />

Always MUST be<br />

set to 0<br />

MasterId[3]<br />

Always MUST be set to 0<br />

2<br />

Type of Node<br />

1<br />

0<br />

Always MUST be<br />

set to 0<br />

P0min[1:0]<br />

MasterId[4]<br />

Validity [7:0]<br />

SizeP0[4:0]<br />

SizeP1[4]<br />

SizeP1[3:0]<br />

MasterId[5][7:4]<br />

MasterId[5][3:0]<br />

MasterId[6][7:4]<br />

MasterId[6][3:0]<br />

Number of Hops<br />

Always MUST be set to<br />

Unused Frame Symbols [12:8]<br />

Unused Frame Symbols [7:0]<br />

Always MUST be<br />

set to 0<br />

SizeP3[4:0]<br />

SizeP2[4:3]<br />

SizeP2[2:0] Destination Bank[1:0] Subtype[2:0]<br />

4.4.2.7 <strong>Access</strong> Token<br />

The <strong>Access</strong> Token has the following fields:<br />

AllowedPorts[31:24]<br />

AllowedPorts[23:16]<br />

AllowedPorts[15:8]<br />

AllowedPorts[7:0]<br />

Always MUST be set to 0<br />

Figure 46: CSMA token structure<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

- Type – 4 bits. Type shall be ACCESS_REQUEST (13).<br />

- Direction –1 bit. Shall be set to DOWNSTREAM (0)<br />

- Type of Node – 2 bits. See above.<br />

- Validity – 12 bits. From Master to Slave. This indicates the maximum validity that the slave will be<br />

allowed to use before returning the token. It is expressed as a number of symbols.<br />

preamble<br />

- Number of Hops – 4 bits. For a Head End, the Number of Hops is equal to 0. For a TDR, the Number of<br />

Hops is equal to the Number of Hops read in <strong>Access</strong> Token from its Master + 1. When this field is set to 31<br />

means that there are 32 hops or more.<br />

-


4-June-07 P1901_PRO_016_r0<br />

- Unused frame symbols (13 bits). Unused symbols in the current frame, compared to the Validity indicated<br />

in the token announce of the same transmission frame.<br />

- MID (2nd part) – 32 bits. Last 4 bytes of the MasterId (The 21st first bits are allocated in the Token<br />

Announce).<br />

- <strong>MAC</strong> Address – 48 bits. Own <strong>MAC</strong> address.<br />

- Equivalent speed – 8 bits. This value gives an indication of the throughput to the backbone that can be<br />

achieved connecting to the network through this node. The value is calculated from the equivalent BPS.<br />

⎢ BPSeq<br />

−120⎥<br />

Equivalent _ speed = ⎢ ⎥<br />

⎣ 60 ⎦<br />

Equation 35<br />

If the node is directly linked to the backbone the field will be set to 255. If the node is one hop from the<br />

backbone the equivalent BPS are equal to the average of the downstream <strong>and</strong> upstream BPS of the node<br />

with its master.<br />

BPSup<br />

+ BPSdown<br />

BPS eq =<br />

= BPS<br />

2<br />

Equation 36<br />

If there is more than one hop to the backbone the equivalent BPS are calculated from the BPS value<br />

obtained from the master <strong>and</strong> the own equivalent BPS.<br />

BPS<br />

i<br />

eq<br />

=<br />

1<br />

BPS<br />

Equation 37<br />

i 1<br />

eq<br />

+ −<br />

1<br />

1<br />

BPS<br />

Values for the equivalent speed obtained from the previous formulas shall be between 1 <strong>and</strong> 254. A value of<br />

zero in this field means that the repeater has not been able to calculate it. The BPS information obtained<br />

from the access token, combined with the BPS calculated by the new slave in the link may be used in order<br />

to decide which is the best master to be connected to.<br />

Submission page 123 UPA-OPERA<br />

own<br />

eq<br />

own<br />

eq


4-June-07 P1901_PRO_016_r0<br />

7<br />

6<br />

Type<br />

MasterId[3][7:4]<br />

MasterId[3][3:0]<br />

MasterId[4][3:0]<br />

MasterId[5][3:0]<br />

MasterId[6][3:0]<br />

Always MUST be set to 0<br />

4.4.2.8 <strong>Access</strong> Reply Token<br />

The <strong>Access</strong> Token has the following fields:<br />

5<br />

4<br />

5F<br />

73<br />

EE<br />

E2<br />

Always MUST be set to 0<br />

Validity [7:0]<br />

Unused Frame Symbols [7:0]<br />

<strong>MAC</strong> [0]<br />

<strong>MAC</strong> [1]<br />

<strong>MAC</strong> [2]<br />

<strong>MAC</strong> [3]<br />

<strong>MAC</strong> [4]<br />

<strong>MAC</strong> [5]<br />

3<br />

Equivalent Speed<br />

Always MUST be set to 0<br />

Direction Type of Node<br />

Submission page 124 UPA-OPERA<br />

2<br />

Validity [11:8]<br />

Number of Hops<br />

Unused Frame Symbols [12:8]<br />

Figure 47 <strong>Access</strong> Token<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

- Type – 4 bits. Type shall be ACCESS_REPLY (14).<br />

- Direction –1 bit. Shall be set to UPSTREAM (1).<br />

- Type of Node – 2 bits. See above.<br />

1<br />

MasterId[4][7:4]<br />

MasterId[5][7:4]<br />

MasterId[6][7:4]<br />

- MID – 32 bits. Part of the Master ID not included in the Token Announce.<br />

0<br />

Always MUST be<br />

set to 0<br />

preamble<br />

- Disconnect – 1bit. If this field is set to 0, the token is a normal ACCESS REPLY TOKEN, used to achieve<br />

access to the network through a master. If it is set to 1, the token becomes an ACCESS REPLY<br />

DISCONNECTION TOKEN, used to leave a master.<br />

- Destination Port – 7 bits. Local Port assigned to the master.


4-June-07 P1901_PRO_016_r0<br />

- Number of Hops – 4 bits. For a Head End, the Number of Hops is equal to 0. For a TDR, the Number of<br />

Hops is equal to the Number of Hops read in <strong>Access</strong> Token from its Master + 1. In a CPE, this field is not<br />

used. When this field is set to 31 means that there are 32 hops or more.<br />

- Unused frame symbols (13 bits). Unused symbols in the current frame, compared to the Validity indicated<br />

in the token announce of the same transmission frame.<br />

- <strong>MAC</strong> Address – 48 bits. The <strong>MAC</strong> address of the master the access reply token is addressed to.<br />

4.4.2.9 Non-returnable data token<br />

The Non-returnable Data Token has the following fields:<br />

Figure 48 <strong>Access</strong> Reply Token<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

- Type – 4 bits. Type shall be NON-RETURNABLE (2)<br />

- Single Validity – 4 bits. See description in 0<br />

- Validity – 12 bits. Same meaning as in the Data Token (See 0). Since this token is non-returnable, the<br />

validity will be fully used.<br />

Submission page 125 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

- Destination Port 0 to 7 – 8x7 bits. Local Port of the intended receiver of the Data Token. If Destination Port<br />

X is not used, it shall be set to 0. At least one of the destination ports shall be different to 0.<br />

The implementation of this type of token is optional.<br />

7<br />

Always MUST be<br />

set to 0<br />

Always MUST be<br />

set to 0<br />

6<br />

Type<br />

Single Validity<br />

Always MUST be<br />

set to 0<br />

Always MUST be<br />

set to 0<br />

Always MUST be set to 0<br />

Always MUST be<br />

set to 0<br />

Always MUST be<br />

set to 0<br />

Always MUST be<br />

set to 0<br />

Always MUST be<br />

set to 0<br />

4.4.2.10 Clock Token<br />

The Clock Token has the following fields:<br />

5<br />

4<br />

5F<br />

73<br />

EE<br />

E2<br />

Submission page 126 UPA-OPERA<br />

3<br />

Destination Port 0<br />

Validity [7:0]<br />

Destination Port 1<br />

Always MUST be set to 0<br />

2<br />

Validity [11:8]<br />

Destination Port 2<br />

Destination Port 3<br />

Unused Frame Symbols [12:8]<br />

Unused Frame Symbols [7:0]<br />

Destination Port 4<br />

Destination Port 5<br />

Destination Port 6<br />

Destination Port 7<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Figure 49 Non-returnable Data Token<br />

- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />

- Type – 4 bits. Type shall be CLOCK (3)<br />

- Reset – 1 bit. If set to 1 all nodes reset the timers <strong>and</strong> data.<br />

- Grid Frequency – 2 bits: 00 = 50 Hz , 01= 60Hz, 11 = Other.<br />

1<br />

0<br />

preamble<br />

- MaximumlTimerValue – 16 bits: number of cycles of a 312.5 kHz clock used by the Master to count 9


4-June-07 P1901_PRO_016_r0<br />

mains periods.<br />

- TimerValue - 16 bits: number of cycles in the Master to reach the end of the current main period.<br />

- Period Counter – 16 bits: counter of main periods.<br />

7<br />

6<br />

Type<br />

4.5 TOKEN LOSS RECOVERY<br />

5<br />

4<br />

5F<br />

73<br />

EE<br />

E2<br />

Always MUST be<br />

set to 0<br />

MaximumTimerValue[15:8]<br />

MaximumTimerValue[7:0]<br />

TimerValue[15:8]<br />

TimerValue[7:0]<br />

PeriodCounter[15:8]<br />

PeriodCounter[7:0]<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Always MUST be set to 0<br />

Submission page 127 UPA-OPERA<br />

3<br />

Figure 50: Clock Token<br />

2<br />

Reset Grid Frequency<br />

1<br />

0<br />

preamble<br />

The Token uses a very robust modulation scheme that increases the possibility of correct demodulation even in very<br />

noise environment. Still, token may be lost, do not detected by the receiver node/s, due to impulsive noise. Fast<br />

detection mechanisms are therefore essential for efficient communication.<br />

Depending on the token distribution policy implemented in the network, two possible token loss recovey policies<br />

may be possible.<br />

The simplest one relies in the direct distribution of Data Token from HE or TDR to its CPEs.


4-June-07 P1901_PRO_016_r0<br />

In this case, a token loss occurs when the master node transmits a frame <strong>and</strong> the intended token receiver does not<br />

detect the token or when the master does not detect the token sent by one of its slaves. In case of token loss, the<br />

master node shall detect that the token has been lost.<br />

Using the validity associated to every transmitted token, the master node shall generate a new frame whenever the<br />

validity assigned in a token to one of its slaves expires without receiving back the token. Only HE <strong>and</strong> TDR<br />

implement this feature.<br />

When a Token Distributor is used to share the channel, the Token Loss Recovery policy becomes more complex,<br />

but equally efficient.<br />

There are two different modes to recover a token lost when using Distributor Tokens:<br />

1. Master node is the only node in charged of recovering a token lost. In this mode, the node that sends the<br />

Distributor token must monitor the channel during all the validity time assigned in the token in order to<br />

detect in each moment if the channel owner transmits.<br />

When Master transmits a Distributor Token checks that the first node on the distribution list starts<br />

transmitting. If Master does not detect the Token Announce from the expected node, it can retransmit the<br />

Distributor Token lost or a new Distributor Token. In that way, the only overhead included in this simple<br />

acknowledgement mechanism is the retransmission of the token, instead of waiting for the maximum time<br />

assigned to the first slave.<br />

If first slave detects the Distributor Token, it starts transmitting <strong>and</strong> assigns the channel to the second<br />

destination slave. This process will be monitorized by the Master. If Master node detects the first slave<br />

assigns the channel to the next slave, it will check if the second slave starts transmitting. If Master does not<br />

detect the Token Announce from that slave, it transmits a new Distributor Token. This Distributor Token<br />

can include the slave that lost the token or can continue in the next slave on the distribution list.<br />

Master shall repeat all this process till the last destination slave returns the channel to the Master.<br />

Master node shall know in each moment which is the channel owner slave, when it has to start transmitting,<br />

<strong>and</strong> when it has to release the token to the next slave.<br />

Following diagram shows the monitoring process performed by the Master in order to recover a token lost:<br />

Submission page 128 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 51: Distributor Token Lost Monitoring Process<br />

Submission page 129 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

MASTER<br />

DISTRIBUTOR<br />

TOKEN<br />

Slave 1<br />

Slave 4<br />

Slave 3<br />

Slave 2<br />

Check Slave 1 starts<br />

transmitting<br />

Check Slave 1 releases<br />

token before Validity1<br />

DATA TOKEN<br />

to Slave 4<br />

Slave 4 does not start<br />

transmitting after Slave 1<br />

transmission. Transmit<br />

new Distributor Token<br />

Token lost<br />

Check Slave 4 releases<br />

token before Validity2<br />

timeout<br />

Check Slave 4 starts<br />

transmitting<br />

DISTRIBUTOR<br />

TOKEN<br />

DATA<br />

TOKEN to Slave 3<br />

Check Slave 3 releases<br />

token before Validity3<br />

timeout<br />

Check Slave 3 starts<br />

transmitting<br />

Check Slave 2 starts<br />

transmitting<br />

DATA<br />

TOKEN to Slave 2<br />

Figure 52: Recovery Token Lost by Master node<br />

Check Slave 2 returns<br />

token before Validity4<br />

timeout<br />

DATA TOKEN<br />

to MASTER<br />

DISTRIBUTOR<br />

TOKEN<br />

2. Each node on the distribution list transmits in its assigned slot time if it does not receive the token from the<br />

previous node on the distribution list.<br />

In this mode, nodes on the distribution list needs to receive the Distributor Token to know when they have<br />

to transmit. Upon the reception of a Distributor token, each node starts transmitting in their slot time if the<br />

previous node on the list does not assign to it the channel. If previous node on the list ends transmitting, it<br />

assigns the channel to the subsequent node on the list. If this token is lost, next node shall start transmitting<br />

in its slot time.<br />

This mode can be very dangerous because if all the nodes on the distribution list lose the Distritubor token,<br />

Master node does not transmit till the end of the total channel time assigned in that token.<br />

From the other h<strong>and</strong>, this mode can be very interesting in a scenario with no visibility between slave nodes.<br />

In that case, slave nodes cannot assign the channel to the next node on the list because they have no direct<br />

visibility. This functionality reduces the overhead due to the Master does not transmit to assign the channel<br />

to the next node.<br />

Submission page 130 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 53: Recovery Token Lost by each node<br />

The node that sends a Distributor Token selects the token loss recovery mode indicating the selected option in the<br />

token.<br />

4.6 <strong>MAC</strong> PARAMETERS SPECIFICATION<br />

INTER FRAME SPACE 1 189 µs Time distance between the end of a<br />

Distributor Frame <strong>and</strong> the beginning of<br />

the transmission of the first node of the<br />

distribution list. See 4.3.1.<br />

INTER FRAME SPACE 2 126 µs Time distance between the end of a<br />

Data Frame <strong>and</strong> the beginning of the<br />

transmission of the next node on the<br />

distribution list. See 4.3.1.<br />

Table 12 contains the values for the <strong>MAC</strong> parameters.<br />

Submission page 131 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Parameter Value Description<br />

Number of channel estimation<br />

symbols per frame<br />

Maximum number of simultaneous<br />

polling users<br />

16 See 4.3.4<br />

32 Maximum number of users that can be<br />

polled with one single polling frame.<br />

See 4.3.5 <strong>and</strong> 4.3.6<br />

Offset poll windows 61.2 us See 4.3.5 <strong>and</strong> 4.3.6<br />

Size poll window 81.2 us See 4.3.5 <strong>and</strong> 4.3.6<br />

MIN_TA_VALIDITY 1 Symbol See 4.4.1<br />

MAX_TA_VALIDITY 240 Symbols See 4.4.1<br />

MIN_TOKEN_VALIDITY 16 symbols See 0<br />

MAX_TOKEN_VALIDITY 4095 symbols See 0<br />

BACKOFF_SLOT_TIME 35.625 us See 4.3.5 <strong>and</strong> 4.3.6<br />

Backoff maximum number of slots 16 See 4.3.5 <strong>and</strong> 4.3.6<br />

MAX_ACTIVE_POLL_INTERVA<br />

L<br />

2 seconds See 4.2<br />

MAX_CSMA_TOKEN_PERIOD 0.5 seconds See 4.4.2.6<br />

MAX_ALIVE_TOKENS 100 tokens See 4.2<br />

MAX_ALIVE_POLL_INTERVAL 5 seconds See 4.2<br />

MAX_ACCESS_INTERVAL 5 seconds See 4.2<br />

Submission page 132 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Channel Estimation Maximum Period 10 seconds Channel Estimation Frame should be<br />

sent at least every Channel Estimation<br />

Maximum Period.<br />

ACCEPTATION_TO 5 seconds See 4.3.9<br />

INTER FRAME SPACE 1 189 µs Time distance between the end of a<br />

Distributor Frame <strong>and</strong> the beginning of<br />

the transmission of the first node of the<br />

distribution list. See 4.3.1.<br />

INTER FRAME SPACE 2 126 µs Time distance between the end of a<br />

Data Frame <strong>and</strong> the beginning of the<br />

transmission of the next node on the<br />

distribution list. See 4.3.1.<br />

Table 12 <strong>MAC</strong> parameter specification<br />

4.7 <strong>MAC</strong> service specification (<strong>MAC</strong> SAP)<br />

4.7.1 <strong>MAC</strong> service primitives<br />

Following table shows <strong>MAC</strong>-DATA, <strong>MAC</strong>-ACK <strong>and</strong> <strong>MAC</strong>-MNT primitives:<br />

Primitive Type<br />

Submission page 133 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.2 <strong>MAC</strong>-DATA.req<br />

4.7.2.1 Function<br />

<strong>MAC</strong>-DATA.req Request<br />

<strong>MAC</strong>-DATA.cnf Confirm<br />

<strong>MAC</strong>-DATA.ind Indication<br />

<strong>MAC</strong>-ACK.req Request<br />

<strong>MAC</strong>-ACK.cnf Confirm<br />

<strong>MAC</strong>-ACK.ind Indication<br />

<strong>MAC</strong>-MNT-TOKEN.req Request<br />

<strong>MAC</strong>-MNT-TOKEN.ind Indicate<br />

<strong>MAC</strong>-MNT-TOKEN.cnf Confirm<br />

<strong>MAC</strong>-MNT-RESOURCES.req Request<br />

<strong>MAC</strong>-MNT-RESOURCES.ind Indication<br />

<strong>MAC</strong>-MNT-RESOURCES.cnf Confirm<br />

<strong>MAC</strong>-MNT-CHANEST-FRAME.req Request<br />

<strong>MAC</strong>-MNT-CHANEST-REQ.req Request<br />

<strong>MAC</strong>-MNT-CHANEST-REQ.ind Indication<br />

<strong>MAC</strong>-MNT-NHOPS.req Request<br />

<strong>MAC</strong>-MNT-NHOPS.cnf Confirm<br />

<strong>MAC</strong>-MNT-CHANGE.req Request<br />

<strong>MAC</strong>-MNT-CHANGE.cnf Confirm<br />

<strong>MAC</strong>-MNT-TXSYMB.ind Indication<br />

<strong>MAC</strong>-MNT-CHANSTATS.req Request<br />

<strong>MAC</strong>-MNT-CHANSTATS.cnf Confirm<br />

<strong>MAC</strong>-MNT-NEWMID.ind Indication<br />

<strong>PHY</strong>-MNT-LINK-STATUS.req Request<br />

<strong>PHY</strong>-MNT-LINK-STATUS.cnf Confirm<br />

Table 13 <strong>MAC</strong> sevice primitives<br />

This primitive requests a transfer of a LPDU from a local LLC layer entity.<br />

4.7.2.2 Semantics of the service primitive<br />

<strong>MAC</strong>-DATA.req(LPDU):<br />

- LPDU: LLC Protocol Data Unit (MSDU)<br />

Submission page 134 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.2.3 When generated<br />

The primitive is generated by the LLC layer entity when a LPDU is to be transferred.<br />

4.7.2.4 Effect of receipt<br />

The <strong>MAC</strong> layer entity starts the sending of the LPDU.<br />

4.7.3 <strong>MAC</strong>-DATA.cnf<br />

4.7.3.1 Function<br />

This primitive has local significance <strong>and</strong> provides the LLC layer with status information (sending finished) of the<br />

corresponding preceeding <strong>PHY</strong>-DATA.req primitive.<br />

4.7.3.2 Semantics of the service primitive<br />

This primitive has no parameters.<br />

4.7.3.3 When generated<br />

The primitive is passed from the <strong>MAC</strong> layer entity to the LLC layer entity to indicate that the previous LPDU has<br />

been sent.<br />

4.7.3.4 Effect of receipt<br />

The LLC layer entity is aware that the <strong>MAC</strong> is available to send new MPDUs, <strong>and</strong> can issue new <strong>MAC</strong>-DATA.req<br />

primitives.<br />

4.7.4 <strong>MAC</strong>-DATA.ind<br />

4.7.4.1 Function<br />

This primitive defines the transfer of a LPDU from the <strong>MAC</strong> layer entity to the LLC layer entity.<br />

4.7.4.2 Semantics of the service primitive<br />

<strong>MAC</strong>-DATA.ind(LPDU, lpdu_seq_number)<br />

- LPDU: LLC Protocol Data Unit<br />

- lpdu_seq_number: a sequence number that uniquily identifies this LPDU.<br />

Submission page 135 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.4.3 When generated<br />

The primitive is passed from the <strong>MAC</strong> layer entity to the LLC layer entity to indicate the arrival of a LPDU.<br />

4.7.4.4 Effect of receipt<br />

The LLC layer entity processes the newly received LPDU.<br />

4.7.5 <strong>MAC</strong>-ACK.req<br />

4.7.5.1 Function<br />

This primitive requests the acknowledgment of a previously received LPDU.<br />

4.7.5.2 Semantics of the service primitive<br />

<strong>MAC</strong>-ACK.req(lpdu_seq_number):<br />

- lpdu_seq_number: the sequence number of the LPDU to be acknowledged.<br />

4.7.5.3 When generated<br />

This primitive is generated by the LLC layer entity when a previously received LPDU is to be acknowledged.<br />

4.7.5.4 Effect of receipt<br />

The <strong>MAC</strong> layer entity stores the lpdu_seq_number to be acknowledged, <strong>and</strong> will send the acknowledgment in the<br />

proper subsequent MPDU.<br />

4.7.6 <strong>MAC</strong>-ACK.cnf<br />

4.7.6.1 Function<br />

This primitive has local significance <strong>and</strong> provides the LLC layer with status information (acknowledgment sent) of<br />

the corresponding preceeding <strong>MAC</strong>-ACK.req primitive.<br />

4.7.6.2 Semantics of the service primitive<br />

This primitive has no parameters.<br />

Submission page 136 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.6.3 When generated<br />

This primitive is passed from the <strong>MAC</strong> suplayer entity to the LLC layer entity to indicate that the previously<br />

requested LPDU acknowledgment has been sent.<br />

4.7.6.4 Effect of receipt<br />

The LLC layer entity is aware that the previously requested LPDU acknowledgment has been sent <strong>and</strong> can issue<br />

new <strong>MAC</strong>-ACK.req primitives<br />

4.7.7 <strong>MAC</strong>-ACK.ind<br />

4.7.7.1 Function<br />

This primitive indicates the LLC layer entity that an LPDU acknowledgment has been received.<br />

4.7.7.2 Semantics of the service primitive<br />

<strong>MAC</strong>-ACK.ind(lpdu_seq_number):<br />

- lpdu_seq_number: the sequence number of the acknowledged LPDU.<br />

4.7.7.3 When generated<br />

This primitive is passed from the <strong>MAC</strong> layer entity to the LLC layer entity to indicate that an LPDU<br />

acknowledgment has been received.<br />

4.7.7.4 Effect of receipt<br />

The LLC marks the corresponding LPDU as correctly acknowledged by the peer LLC entity.<br />

4.7.8 <strong>MAC</strong>-MNT-TOKEN.req<br />

4.7.8.1 Function<br />

This primitive requests the sending of a token.<br />

4.7.8.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-TOKEN.req(token):<br />

- token (see 4.4.2): <strong>MAC</strong> delimiter: Distributor token, Data token, Silence token, <strong>Access</strong> Token, <strong>Access</strong><br />

Reply token, Polling token, TDR Polling token, Non-returnable Data token, CSMA token, Clock token<br />

Submission page 137 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.8.3 When generated<br />

This primitive is generated by the Management layer to send the token to other nodes, or to send special tokens.<br />

This primitive is used to schedule the access to the channel.<br />

4.7.8.4 Effect of receipt<br />

The <strong>MAC</strong> layer sends the requested token inside the current MPDU.<br />

4.7.9 <strong>MAC</strong>-MNT-TOKEN.ind<br />

4.7.9.1 Function<br />

This primitive indicates the reception of a token, <strong>and</strong> defines the transfer of the information received in the token to<br />

the Management layer.<br />

4.7.9.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-TOKEN.ind(token):<br />

- token (see 4.4.2): <strong>MAC</strong> delimiter: Distributor token, Data token, Silence token, <strong>Access</strong> Token, <strong>Access</strong><br />

Reply token, Polling token, TDR Polling token, Non-returnable Data token, CSMA token, Clock token<br />

4.7.9.3 When generated<br />

This primitive is generated by the <strong>MAC</strong> layer to indicate the reception of a token <strong>and</strong> provides the corresponding<br />

information used by the Management layer entity in protocols such as <strong>Access</strong> Protocol or QoS.<br />

4.7.9.4 Effect of receipt<br />

Depending on the token parameter, the Management layer entity may perform different actions (see sections 4, 8, 9<br />

<strong>and</strong> 11).<br />

4.7.10 <strong>MAC</strong>-MNT-TOKEN.cnf<br />

4.7.10.1 Function<br />

This primitive is generated by the <strong>MAC</strong> layer to inform about the result of the <strong>MAC</strong>-MNT-TOKEN.req primitive.<br />

That is, if the required token has been successfully sent.<br />

4.7.10.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-TOKEN.cnf (token, result):<br />

Submission page 138 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

- token: Requested token (see 4.4.2). Distributor token, Data token, Silence token, <strong>Access</strong> token, <strong>Access</strong><br />

Reply token, Polling token, TDR Polling token, Non-returnable Data token, CSMA token, Clock token<br />

- result: [SUCCESS|FAIL]. FAIL can be produced if the nodes losses a contention after a CSMA token.<br />

4.7.10.3 When generated<br />

The primitive is generated by the <strong>MAC</strong> layer to confirm the result of trying to send the requested token.<br />

4.7.10.4 Effect of receipt<br />

The Management layer entity shall take the proper actions taking into account the result parameter (see sections 4,<br />

8, 9, 10).<br />

4.7.11 <strong>MAC</strong>-MNT-RESOURCES.req<br />

4.7.11.1 Function<br />

This primitive requests the allocation or release of local <strong>MAC</strong> resources.<br />

4.7.11.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-RESOURCES.req (<strong>MAC</strong>, type, service_class, latency, BW) :<br />

- <strong>MAC</strong>: <strong>MAC</strong> address of the traffic source<br />

- type: type of request. [ALLOCATE|FREE]<br />

- service_class: Service class of the traffic flow<br />

- latency: latency requirement of the flow<br />

- BW: b<strong>and</strong>width requirement of the flow<br />

4.7.11.3 When generated<br />

The primitive is generated by the Management layer entity to allocate resources for one traffic flow, or free them.<br />

4.7.11.4 Effect of receipt<br />

If there are enough resources, they are allocated. The primitive <strong>MAC</strong>-MNT-RESOURCES.conf indicates the status<br />

of this allocation.<br />

4.7.12 <strong>MAC</strong>-MNT-RESOURCES.ind<br />

4.7.12.1 Function<br />

This primitive indicates a change of the resources that a traffic flow can use.<br />

Submission page 139 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.12.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-RESOURCES.ind(<strong>MAC</strong>, type, prio, latency, BW):<br />

- <strong>MAC</strong>: <strong>MAC</strong> address of the traffic source.<br />

- type: type of indication. [NO_RESOURCES|RESOURCES_CHANGE].<br />

- service_class: service class of the traffic flow<br />

- latency: latency requirement of the flow<br />

- BW: b<strong>and</strong>width requirement of the flow. (BW can be lower than requested when type is<br />

RESOURCES_CHANGE)<br />

4.7.12.3 When generated<br />

The primitive is passed by the <strong>MAC</strong> layer entity to the Management layer entity to indicate that the resources of a<br />

traffic flow have changed.<br />

4.7.12.4 Effect of receipt<br />

The Management layer is aware of the change in the resources allocated to the traffic flow, <strong>and</strong> shall take this result<br />

into account when performing the CAC protocol.<br />

4.7.13 <strong>MAC</strong>-MNT-RESOURCES.cnf<br />

4.7.13.1 Function<br />

This primitive indicates the result of the previously requested allocation of local resources.<br />

4.7.13.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-RESOURCES.cnf (<strong>MAC</strong>, type, service_class, latency, BW):<br />

- <strong>MAC</strong>: <strong>MAC</strong> address of the traffic source.<br />

- type: type of confirmation. [OK|NO_RESOURCES]<br />

- service_class: service_class of the traffic flow<br />

- latency: latency requirement of the flow<br />

- BW: b<strong>and</strong>width requirement of the flow. (BW can be lower than requested when type is OK).<br />

4.7.13.3 When generated<br />

The primitive is passed by the <strong>MAC</strong> layer entity to the Management layer entity to indicate the result of the<br />

previously requested allocation of local resources.<br />

4.7.13.4 Effect of receipt<br />

The Management layer is aware of the result of the previous <strong>MAC</strong>-MNT-RESOURCES.req primitive, <strong>and</strong> shall<br />

take this result into account when performing the CAC protocol.<br />

Submission page 140 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.14 <strong>MAC</strong>-MNT-CHANEST-FRAME.req<br />

4.7.14.1 Function<br />

This primitive requests the transmission of a Channel Estimation frame to the local <strong>MAC</strong> layer entity.<br />

4.7.14.2 Semantics of the service primitive<br />

This primitive has no parameters.<br />

4.7.14.3 When generated<br />

The primitive can be generated in two situations:<br />

- The Management layer periodically shall issue this primitive.<br />

- A <strong>MAC</strong>-MNT-CHANEST-REQ.ind primitive has been received.<br />

4.7.14.4 Effect of receipt<br />

The <strong>MAC</strong> layer entity shall transmit a Channel Estimation frame.<br />

4.7.15 <strong>MAC</strong>-MNT-CHANEST-REQ.req<br />

4.7.15.1 Function<br />

This primitive requests the sending of a Channel Estimation frame petition to a given node.<br />

4.7.15.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-CHANEST-REQ.req (dest_<strong>MAC</strong>) :<br />

- dest_<strong>MAC</strong>: <strong>MAC</strong> address of the node that is requested to send the Channel Estimation frame.<br />

4.7.15.3 When generated<br />

This primitive shall be generated by the Management layer when it considers that the tonemap used to receive<br />

transmissions from a given node may have changed.<br />

4.7.15.4 Effect of receipt<br />

The <strong>MAC</strong> layer entity shall fill a Data token addressed to the dest_<strong>MAC</strong> address with the Channel Estimation<br />

Frame Request set to 1.<br />

Submission page 141 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.16 <strong>MAC</strong>-MNT-CHANEST-REQ.ind<br />

4.7.16.1 Function<br />

This primitive indicates the Management layer that a Channel Estimation frame request from a node has been<br />

received.<br />

4.7.16.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-CHANEST-REQ.ind(src_<strong>MAC</strong>):<br />

- src_<strong>MAC</strong>: <strong>MAC</strong> address of the requester.<br />

4.7.16.3 When generated<br />

The primitive is generated by the <strong>MAC</strong> layer entity to indicate that a node has requested the transmission of a<br />

Channel Estimation frame.<br />

4.7.16.4 Effect of receipt<br />

When receiving this primitive, the Management layer entity shall decide to issue the <strong>MAC</strong>-MNT-CHANEST-<br />

FRAME.req in order to transmit the Channel Estimation frame.<br />

4.7.17 <strong>MAC</strong>-MNT-NHOPS.req<br />

4.7.17.1 Function<br />

This primitive requests the <strong>MAC</strong> layer for the number of hops that the node is from a master.<br />

4.7.17.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-NHOPS.req(<strong>MAC</strong>):<br />

- <strong>MAC</strong>: <strong>MAC</strong> address of the master<br />

4.7.17.3 When generated<br />

The primitive is generated when the Management layer needs to know the number of hops from a master node.<br />

4.7.17.4 Effect of receipt<br />

The <strong>MAC</strong> layer obtains the number of hops <strong>and</strong> passes this information to the Management layer by means of the<br />

<strong>MAC</strong>-MNT-NHOPS.cnf primitive.<br />

Submission page 142 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.18 <strong>MAC</strong>-MNT-NHOPS.cnf<br />

4.7.18.1 Function<br />

This primitive indicates the result of the previously requested number of hops.<br />

4.7.18.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-NHOPS.cnf(nhops):<br />

- nhops: number of hops between local node <strong>and</strong> requested master.<br />

4.7.18.3 When generated<br />

The primitive is passed by the <strong>MAC</strong> layer entity to the Management layer entity to provide the number of hops.<br />

4.7.18.4 Effect of receipt<br />

The Management layer uses this number of hops in several management <strong>and</strong> configuration protocols.<br />

4.7.19 <strong>MAC</strong>-MNT-CHANGE.req<br />

4.7.19.1 Function<br />

This primitive is used to change the role of the node (master/slave) in the PLC cell.<br />

4.7.19.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-CHANGE.req (role, new_master):<br />

- role: [MASTER|SLAVE]<br />

- new_master: <strong>MAC</strong> address of the node that has to be considered as the new master. This parameter shall be<br />

used when the role is SLAVE.<br />

4.7.19.3 When generated<br />

The primitive is issued by the Management layer entity in the framework of the Coordination tools (see ¡Error! No<br />

se encuentra el origen de la referencia.).<br />

4.7.19.4 Effect of receipt<br />

The <strong>MAC</strong> layer shall play the role indicated in the parameters.<br />

Submission page 143 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.20 <strong>MAC</strong>-MNT-CHANGE.cnf<br />

4.7.20.1 Function<br />

This primitive is used to inform that the requested change has been done.<br />

4.7.20.2 Semantics of the service primitive<br />

This primitive has no parameters.<br />

4.7.20.3 When generated<br />

It is generated by the <strong>MAC</strong> layer when the role has been changed.<br />

4.7.20.4 Effect of receipt<br />

The Management layer receives the confirmation of the change.<br />

4.7.21 <strong>MAC</strong>-MNT-TXSYMB.ind<br />

4.7.21.1 Function<br />

This primitive is used to inform the Management layer about the number of information symbols transmitted to a<br />

given node.<br />

4.7.21.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-TXSYMB.ind (num_symb, port):<br />

- num_symb: number of symbols transmitted.<br />

- port: local transmission port<br />

4.7.21.3 When generated<br />

This primitive is generated by the <strong>MAC</strong> layer entity after each transmission.<br />

4.7.21.4 Effect of receipt<br />

Upon the reception of this primitive, the Management layer can estimate the required b<strong>and</strong>width by a traffic flow. It<br />

can also estimate the latencies that the traffic flow is suffering.<br />

Submission page 144 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.22 <strong>MAC</strong>-MNT-CHANSTATS.req<br />

4.7.22.1 Function<br />

This primitive is used to gather <strong>MAC</strong> statistics about the channel state.<br />

4.7.22.2 Semantics of the service primitive<br />

This primitive has no parameters.<br />

4.7.22.3 When generated<br />

The primitive is generated by the Management layer when it needs to know the statistics to perform the functions<br />

described in sections 8, 9 <strong>and</strong> 11.<br />

4.7.22.4 Effect of receipt<br />

The <strong>MAC</strong> layer entity communicates the required information by means of the <strong>MAC</strong>-MNT-CHANSTATS.cnf<br />

primitive.<br />

4.7.23 <strong>MAC</strong>-MNT-CHANSTATS.cnf<br />

4.7.23.1 Function<br />

This primitive is used by the <strong>MAC</strong> layer to communicate the required statistics.<br />

4.7.23.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-CHANSTATS.cnf (stats):<br />

- stats: composed by this information:<br />

o cont_win: number of won contention attempts<br />

o cont_attemp: number of contention attempts<br />

o num_nodes: number of detected nodes<br />

o used_val_rate: vector (one value per priotity): % of the assigned validity that has been used by the<br />

slaves<br />

o req_val_rate: vector (one value per service class): % of the available validity that has been<br />

requested<br />

o empy_CSMA: number of unsued CSMA tokens by the slaves<br />

o CSMA_usage: % of the assigned validity in CSMA tokens that has been used by the slaves<br />

4.7.23.3 When generated<br />

It is generated as a response to the <strong>MAC</strong>-MNT-CHANSTATS.req primitive.<br />

Submission page 145 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.23.4 Effect of receipt<br />

The Management layer can use the information to perform the functions described in sections 8, 9 <strong>and</strong> 11.<br />

4.7.24 <strong>MAC</strong>-MNT-NEWMID.ind<br />

4.7.24.1 Function<br />

This primitive is used to notify the Management layer that a different MID has been detected.<br />

4.7.24.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-NEWMID.ind (new_mid):<br />

- new_mid: new MID detected<br />

4.7.24.3 When generated<br />

This primitive is generated by the <strong>MAC</strong> layer entity when it detects in the channel a MID different than the own<br />

MID.<br />

4.7.24.4 Effect of receipt<br />

The Management layer entity uses this information to perform the coordination among different BPL Cells.<br />

4.7.25 <strong>MAC</strong>-MNT-LINK-STATUS.req<br />

4.7.25.1 Function<br />

This primitive requests to the <strong>MAC</strong> layer the link status of the communication with certain <strong>MAC</strong>.<br />

4.7.25.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-LINK-STATUS.req (<strong>MAC</strong>):<br />

• <strong>MAC</strong>: <strong>MAC</strong> address<br />

4.7.25.3 When generated<br />

The primitive is generated when the Management layer needs to know the status of certain link.<br />

Submission page 146 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

4.7.25.4 Effect of receipt<br />

The current link status is obtained by the <strong>MAC</strong> layer <strong>and</strong> passed to the Management layer by means of the <strong>MAC</strong>-<br />

MNT-LINK-STATUS.req primitive.<br />

4.7.26 <strong>MAC</strong>-MNT-LINK-STATUS.cnf<br />

4.7.26.1 Function<br />

This primitive indicates the link status of the communication with certain <strong>MAC</strong>.<br />

4.7.26.2 Semantics of the service primitive<br />

<strong>MAC</strong>-MNT-LINK-STATUS.cnf (<strong>MAC</strong>,link_status):<br />

• <strong>MAC</strong>: <strong>MAC</strong> address<br />

• Link Status: Linked (1) or not linked (0)<br />

4.7.26.3 When generated<br />

The primitive is generated when the Management layer needs to know the status of certain link.<br />

4.7.26.4 Effect of receipt<br />

The Maganement layer gets the link status.<br />

5 LLC<br />

5.1 INTRODUCTION<br />

The LLC layer receives packets (Convergence <strong>Layer</strong> PDUs) from the Convergence <strong>Layer</strong> <strong>and</strong> transmits LLC PDUs<br />

to the <strong>MAC</strong> layer. LLC tasks are:<br />

• Segmentation <strong>and</strong> grouping of packets (CLPDUs) to create the payloads of the bursts.<br />

• The addition of an inter-packet header to every packet or fragment of packet<br />

• The addition of an LLC delimiter (Burst Header) to the payload of every burst payload.<br />

• The addition of the CCMP Header at the beginning of each burst when burst is set as encrypted.<br />

• The addition of a Message Integrity Check (MIC) to every fragment of packet or packet when burst is set as<br />

encrypted.<br />

Submission page 147 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• The addition of a Cyclic Reduncancy Check (CRC) to every fragment of packet or packet when burst is set<br />

as unencripted.<br />

• The Packet ACK Protocol (PAP) for sequence control <strong>and</strong> selective acknowledgement of packets<br />

(CLPDUs).<br />

5.2 BURST HEADER<br />

There are two types of burst header, one with data <strong>and</strong> other one without data.<br />

5.2.1 Burst header with data<br />

The Burst Header is the LLC Delimiter which precedes every burst. It has the following fields:<br />

- Preamble – 32 bits. Always set to 0xBDADC3.<br />

- TMI – 4 bits. Tonemap ID. Tonemap used in the data encoding. TMI 0 is reserved for HURTO mapping.<br />

- Version – 3 bits. Set to 0.<br />

- Transmission Port – 7 bits. Local Port of the intended receiver of the Burst.<br />

- APL – 14 bits. Aggregated Payload Length. Length of the payload in 32-bit words of the current burst,<br />

including RS FEC redundancy. The APL will be defined by the RS FEC redundancy used <strong>and</strong> the length of<br />

the data included in the burst.<br />

- FEC payload – 6 bits. RS Fordward Error Correction codeword payload length in 32-bit words. The RS<br />

FEC codeword payload allowed values are indicated in Table 2. The FEC Redundancy + FEC payload has<br />

to be less or equal to 63 words.<br />

- FEC Redundancy – 2 bits. RS Fordward Error Correction codeword redundancy length:<br />

o 0: 8 redundancy bytes (2 words)<br />

o 1: 12 redundancy bytes (3 words)<br />

o 2: 16 redundancy bytes (4 words)<br />

o 3: 20 redundancy bytes (5 words)<br />

- BPS –14 bits. Bits Per Symbol for the current burst. It depends on the encoding used for the current<br />

transmission. Possible values range from 24 to 14592. The BPS calculation (See Equation 17) includes the<br />

RS redundancy <strong>and</strong> excludes the 4D-TCM. With the BPS <strong>and</strong> APL values nodes that are not the destination<br />

of the burst, but that may be the destination of subsequent bursts in the same frame, may calculate the burst<br />

duration in symbols in order to know when the next burst header or token is going to be placed.<br />

- HURTO – 1 bit. It shall be set to 1 when the burst is transmitted in HURTO mode.<br />

- Dummy Hdr– 1 bit. It shall be set to 1 if the burst is not carrying data symbols.<br />

Submission page 148 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

- PAP Code Type – 1 bit. Packet ACK Protocol Codification Type. It is set to 0 when Run-Length Encoding<br />

is used <strong>and</strong> set to 1 when GroupEncoding is used.<br />

• Crypto AES– 1 bit. Shall be set to 1 when the burst is encrypted.<br />

- ACK Info – 1 bit. Shall be set to 1 when the burst header contains Packet ACK Protocol information (see<br />

5.4).<br />

- PAP Info – 55 bits. The meaning of these bits depends on PAP Code Type. See section 5.4<br />

- PAP Port – 7 bits. Local Port over which the ACK contained in the Burst Header takes effect.<br />

- PAP Init – 1 bit. The first packet that requires ACK (Req ACK field in the Interpacket Header) in the burst<br />

has the lowest packet id stored in transmission buffer. The receiver cannot request retransmissions of<br />

previous packets ids.<br />

- PAP Reset – 1 bit. Reset the reception buffer.<br />

- PAP Last Received Packet – 12 bits. Last received packet information used by Packet ACK Protocol. See<br />

section 5.4<br />

- Service class – 8 bits. Indicates the service classes belonging to the packets contained in the burst. If bit X is<br />

equal to 1, there is at least one packet in this burst with service class X.<br />

Submission page 149 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

7<br />

6<br />

Version<br />

Transmission Port [1:0]<br />

Reserved<br />

Reserved<br />

Reserved<br />

PAP Info [38:36]<br />

PAP Info [3:0]<br />

5<br />

FEC Payload<br />

BPS [5:0]<br />

4<br />

BD<br />

AD<br />

C3<br />

APL [7:0]<br />

BPS [13:6]<br />

PRIORITY<br />

Submission page 150 UPA-OPERA<br />

3<br />

2<br />

TMI<br />

Transmission Port [6:2]<br />

APL [13:8]<br />

1<br />

0<br />

FEC Redundancy<br />

PAP Init<br />

HURTO DUMMY Hdr PAP Code Type ACK Info<br />

PAP Info [53:47]<br />

PAP Port<br />

PAP Info [46:39]<br />

Always must be 0 Always must be 0<br />

PAP Info [35:28]<br />

PAP Info [27:20]<br />

PAP Info [19:12]<br />

PAP Info [11:4]<br />

PAP Last Received Packet [7:0]<br />

Figure 54 Burst Header<br />

The Burst Header contains two independent pieces of information:<br />

Reserved<br />

PAP Last Received Packet [11:8]<br />

PAP Reset<br />

PAP Info [54]<br />

Crypto AES<br />

preamble<br />

- Information about the data burst being transmitted, which destination port is Transmission Port<br />

- Information about PAP Information, which destination port is PAP Port.<br />

For this reason, the receiver of data burst could be different from receiver of PAP information.<br />

For example, in the following figure:


4-June-07 P1901_PRO_016_r0<br />

Port_4<br />

Port_3<br />

Node A Node B<br />

A burst header sent from node A could have:<br />

Node C<br />

Submission page 151 UPA-OPERA<br />

Port_1<br />

Port_2<br />

Figure 55: Example of PAP destination<br />

- A PAP Port equal to port_3 to send PAP information about data previously received from node B in a data burst<br />

whose Burst Header contained in the Transmission Port field the value port_1.<br />

- Transmission Port equal to port_4 to send data to node C.<br />

For further details about ports, see section 9.1.4.<br />

5.2.2 Burst header without data<br />

The Burst Header without data is used when information about Packet ACK Protocol should be sent in the<br />

following situations:<br />

- There is no data to be sent.


4-June-07 P1901_PRO_016_r0<br />

- The Packet ACK Protocol information has too many errors if it is sent in a Burst Header because limitation<br />

of used PAP codification.<br />

Thefollowing are the fields with significant information:<br />

- Preamble – 32 bits. Always set to 0xBDADC3<br />

- TMI – 4 bits. Tonemap ID. Tonemap used in the data encoding. TMI 0 is reserved for HURTO mapping.<br />

- Version – 3 bits. Set to 0.<br />

- Dummy Hdr– 1 bit. It shall be set to 1 if the burst is not carrying data symbols.<br />

- PAP Code Type – 1 bit. Packet ACK Protocol Codification Type. It is set to 0 when Run-Length Encoding.<br />

And set to 1 when GroupEncoding.<br />

- ACK Info – 1 bit. Shall be set to 1 when the burst header contains Packet ACK Protocol information. See<br />

section 5.4.<br />

- PAP Info – 119 bits. The meaning of these bits depends on PAP Code Type. See section 5.4<br />

- PAP Port – 7 bits. Local Port over which the ACK contained in the Burst Header takes effect.<br />

- PAP Last Received Packet – 12 bits. Last received packet information used by Packet ACK Protocol. See<br />

section 5.4<br />

The rest of the fields shall be ignored in reception.<br />

Submission page 152 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

7<br />

PAP Info [60]<br />

6<br />

Version<br />

Reserved<br />

5<br />

PAP Info [73:70]<br />

PAP Info [3:0]<br />

5.3 BURST STRUCTURE<br />

4<br />

BD<br />

AD<br />

C3<br />

Submission page 153 UPA-OPERA<br />

3<br />

PAP Info [113:106]<br />

PAP Info [105:98]<br />

PAP Info [97:90]<br />

PAP Info [89:82]<br />

PAP Info [81:74]<br />

PAP Info [68:61]<br />

2<br />

TMI<br />

PAP Info [118:114]<br />

DUMMY Hdr PAP Code Type ACK Info<br />

PAP Port<br />

PAP Info [59:52]<br />

PAP Info [51:44]<br />

PAP Info [43:36]<br />

PAP Info [35:28]<br />

PAP Info [27:20]<br />

PAP Info [19:12]<br />

PAP Info [11:4]<br />

PAP Last Received Packet [7:0]<br />

PAP Last Received Packet [11:8]<br />

Figure 56: Burst Header without Data<br />

1<br />

0<br />

PAP Info [69]<br />

preamble<br />

Two possible burst structures are supported. First one is used in the case of unencrypted burst, <strong>and</strong> second one is<br />

devoted to encrypted bursts.<br />

5.3.1 Unencrypted Burst Structure<br />

When Cripto AES bit in the Burst Header is set to 0, the burst shall be composed by a Burst Header delimiter<br />

followed by a data payload including one or several fragmented <strong>and</strong>/or completed packets. A Burst Header delimiter<br />

without any following data payload is used to send PAP information when there are no data to be sent as described<br />

in section 5.2.2.<br />

Note: The Burst Header is a delimiter processed by the <strong>PHY</strong> layer as described in 3.3.1. It is transmitted in HURTO<br />

mode over one single symbol. The data payload is processed by the <strong>PHY</strong> layer as described in 3.3.2. The data<br />

payload may use HURTO or adaptive mapping. It can be transmitted over one or several symbols.<br />

The Unencrypted Burst could have the following structures:


4-June-07 P1901_PRO_016_r0<br />

Burst<br />

header<br />

symbol M data symbols<br />

HEADER<br />

HEADER<br />

HEADER<br />

First<br />

INTER-<br />

PACKET<br />

HEADER<br />

Completed<br />

PACKET<br />

CRC<br />

WORD<br />

N-<br />

INTER-<br />

PACKET<br />

HEADER<br />

Completed<br />

PACKET<br />

Submission page 154 UPA-OPERA<br />

…<br />

CRC<br />

WORD<br />

64 bits 32 bits 64 bits 32 bits<br />

First<br />

INTER-<br />

PACKET<br />

HEADER<br />

Fragmented<br />

PACKET<br />

PADDING<br />

CRC<br />

WORD<br />

64 bits 32 bits<br />

First<br />

INTER-<br />

PACKET<br />

HEADER<br />

Fragmented<br />

or Completed<br />

PACKET<br />

CRC<br />

WORD<br />

Second<br />

INTER-<br />

PACKET<br />

HEADER<br />

Completed<br />

PACKET<br />

CRC<br />

WORD<br />

N-<br />

INTER-<br />

PACKET<br />

HEADER<br />

Fragmented<br />

or Completed<br />

PACKET<br />

CRC<br />

WORD<br />

64 bits 32 bits 64 bits<br />

32 bits<br />

64 bits 32 bits<br />

For more information about the Burst Header see 5.2.<br />

PADDING<br />

PADDING<br />

PADDING<br />

Figure 57 Unencrypted Burst examples<br />

Each burst can contain more than one CLPDU. For more information about the CLPDU format see 6.2.<br />

The length of a burst is equal to a number of data symbols. The maximum length of a burst is 30 OFDM symbols,<br />

excluding the burst header. The maximum capacity of the burst in 32-bit words depends on the bit-loading table <strong>and</strong><br />

the number of data symbols.<br />

When one packet has to be divided into fragments, each fragment length must be multiple of 256 bytes, except the<br />

last fragment. No 32-bit words are added as padding in the last fragment to obtain 256 bytes. If one packet has<br />

length equal to X with X = Y * 256 + Z bytes, the packet could be sent in up to (Y+1) different bursts using<br />

fragmentation. If one packet has length equal to X bytes with X less than 256 bytes, this packet is sent with X bytes<br />

plus the needed padding to align it to 32-bit words. In any case, the only added padding is to be aligned to 32-bit<br />

words.<br />

The inter-packet header is used for disassembling bursts in reception. An inter-packet header shall always precede<br />

each packet or fragment of a packet.<br />

At the end of each fragment or packet, a 32-bits CRC of the preceding fragment or packet (excluding inter-packet<br />

header) shall be sent.<br />

…<br />

PADDING<br />

PADDING


4-June-07 P1901_PRO_016_r0<br />

Packet fragments shall only appear at the beginning or the end of the burst. Once a fragment of a packet is sent in a<br />

burst, the rest of the packet shall be sent before any other packet to the same Local Port (regardless of service class).<br />

Packets with the same destination port <strong>and</strong> same service class shall be transmitted in order. Within the same<br />

destination port, packets are transmitted according to their service class, with highest service class packets first (see<br />

8.2).<br />

The inter-packet header has the following structure:<br />

7 6<br />

Part of<br />

Packet<br />

Version<br />

- Preamble – 8 bits. Set to 0x5D<br />

5<br />

4<br />

Unfinished Last Packet ACK Req Packet Id [11:8]<br />

Length [5:0]<br />

5D<br />

Reserved<br />

Submission page 155 UPA-OPERA<br />

3<br />

Packet Id [7:0]<br />

Fragment Number<br />

CRC – 16 bits<br />

Figure 58 Inter-packet header<br />

2<br />

1<br />

Length [8:6]<br />

0<br />

Padding Last Word<br />

- Part of Packet – 1 bit. The first fragment in the burst is part of a previous packet. This field shall only be<br />

checked by the receiver in the first inter-packet header.<br />

- Unfinished – 1 bit. The last fragment in this burst is unfinished. To be set to one in the last inter-packet<br />

header if it is not a complete packet.<br />

- Last Packet – 1 bit. This is the last fragment or packet inside this burst.<br />

- ACK Req – 1 bit. The transmitter is waiting an ACK about this packet to free it. When it is set to 0, the<br />

transmitter frees this packet when this packet is sent <strong>and</strong> the receiver can not request retransmissions about<br />

it.<br />

- Packet Id – 12 bits. Unique identification of each packet.<br />

- Version – 2 bits. Version is set to 0.<br />

- Fragment number – 3 bits. Each packet could be divided into 6 fragments. This is the identification of each<br />

fragment: from 0 to 5.<br />

- Length – 9 bits. Length of the packet or fragment in words.<br />

Octet<br />

1<br />

2<br />

3<br />

4<br />

5<br />

6<br />

7<br />

8


4-June-07 P1901_PRO_016_r0<br />

- Padding Last Word – 2 bits. Number of padding bytes of the last word of the packet or fragment of a<br />

packet.<br />

- CRC – 16 bits. 16 bits CRC of the preceding 48-bits.<br />

5.3.2 Encrypted Burst Structure<br />

When Cripto AES bit in the Burst Header is set to 1, the burst shall be composed by a Burst Header delimiter<br />

followed by a CCMP Header of 64 bits length whose composition <strong>and</strong> fields are described in section 10.1. After the<br />

CCMP Header, data payload including one or several fragmented <strong>and</strong>/or completed packets is added to the burst.<br />

Each packet fragment or packet includes a Message Integrity Check (MIC) to preserve the integrity of each unit as<br />

described in section 10.1.<br />

The Encrypted Burst could have the following structures:<br />

Burst<br />

header<br />

symbol<br />

HEADER<br />

HEADER<br />

HEADER<br />

CCMP<br />

Header<br />

64 bits<br />

CCMP<br />

Header<br />

64 bits<br />

CCMP<br />

Header<br />

64 bits<br />

First<br />

INTER-<br />

PACKET<br />

HEADER<br />

Completed<br />

PACKET<br />

MIC<br />

M data symbols<br />

N-<br />

INTER-<br />

PACKET<br />

HEADER<br />

Completed<br />

PACKET<br />

64 bits 32 bits 64 bits 32 bits<br />

First<br />

INTER-<br />

PACKET<br />

HEADER<br />

64 bits<br />

First<br />

INTER-<br />

PACKET<br />

HEADER<br />

Fragmented<br />

or<br />

Completed<br />

PACKET<br />

PADDING<br />

PADDING<br />

MIC<br />

Second<br />

INTER-<br />

PACKET<br />

HEADER<br />

Submission page 156 UPA-OPERA<br />

…<br />

Fragmented<br />

PACKET<br />

Completed<br />

PACKET<br />

N-<br />

INTER-<br />

PACKET<br />

HEADER<br />

Fragmented<br />

or<br />

Completed<br />

PACKET<br />

64 bits 32 bits 64 bits<br />

32 bits<br />

64 bits 32 bits<br />

PADDING<br />

MIC<br />

Figure 59 Encrypted Burst examples<br />

Each MIC is calculated over the Burst Header, CCMP Header, its correspondent Interpacket Header, the packet or<br />

fragment of packet itself <strong>and</strong> the padding, but Burst Header <strong>and</strong> CCMP Header are sent only once at the beginning<br />

of the burst. More information about algorithms <strong>and</strong> field composition is given in section 10.1.<br />

Restrictions <strong>and</strong> rules regarding packet fragmentation in unencrypted burst remains the same for encrypted bursts.<br />

…<br />

PADDING<br />

PADDING<br />

PADDING<br />

MIC<br />

MIC<br />

32 bits<br />

MIC


4-June-07 P1901_PRO_016_r0<br />

5.4 Packet ACK Protocol<br />

The Packet ACK Protocol has the following functions:<br />

1) <strong>Control</strong> of sequence of received packets in the receiver<br />

2) Acknowledge of correct received packets <strong>and</strong> request of retransmission of no received or incorrect packets<br />

Each packet can be sent in one of the following modes:<br />

a) No ACK mode: The receiver cannot request any retransmission of this packet. The packet id is only used to<br />

reassembling fragments of one packet. The Req ACK bit in inter-packet header is set to 0 in this case.<br />

b) ACK mode: The receiver can do a sequence control, reassembling fragments of one packet <strong>and</strong> request<br />

retransmissions. The receiver is the responsible for sending ACKs to the transmitter about the receive<br />

packet. The Req ACK bit in inter-packet header is set to 1 in this case.<br />

The Packet ACK Protocol (PAP) uses fields located in the Burst Header or in the inter-packet header to perform the<br />

ACK algorithm:<br />

• ACK Info - 1 bit. Active when the Burst Header contains PAP information.<br />

• PAP Port – 7 bits: Local port of this PAP information<br />

• PAP Last Received Packet – 12 bits: Packet ID of last Received Packet . Used to decode PAP<br />

Information.<br />

• PAP Code Type – 1 bit: Packet ACK Protocol Codification Type. It is set to 0 when performing Run-<br />

Length Encoding <strong>and</strong> set to 1 when performing Group Encoding.<br />

• PAP Info – 119 bits in case of Burst Header without data. And 55 bits in case of Burst Header with<br />

data. . The meaning of these bits depends on PAP Code Type as explained below.<br />

• PAP Init – 1 bit. The receiver should move the reception buffer in order to have as first packet<br />

identification the first ACK Req packet identification from this burst.<br />

• Packet Id – 12 bits: Unique identification of each packet.<br />

• Fragment number – 3 bits: Each packet could be divided into 6 fragments. This is the identification of<br />

each fragment: from 0 to 5.<br />

• ACK Req – 1 bit. The transmitter is waiting an ACK about this packet to free it. When it is set to 0, the<br />

transmitter frees this packet when this packet is sent <strong>and</strong> the receiver can not request retransmissions<br />

about it.<br />

In case of ACK Req packets are transmitted, the receiver shall inform the transmitter about how the packets were<br />

received. Since the packet windows size is 2048 packets, 2048 bits shall be sent back to the transmitter so that it can<br />

free the correctly received packets <strong>and</strong> retransmit the packets that have been received incorrectly or not received.<br />

The feedback information shall be coded to fit in the allocated space. There are two types of encoding:<br />

Submission page 157 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

- Group Encoding (see 5.4.2)<br />

- Run-Length Encoding (see 5.4.3)<br />

The PAP codification could have some errors due to limited space left in the Burst Header. An error in PAP<br />

codification consists on requesting retransmission of a correct received packet. Errors in the PAP codification that<br />

acknowledge a not received packet or an incorrect received packet are forbidden.<br />

5.4.1 Transmission window management<br />

Packets can be transmitted without receiving acks while there are free positions in the transmission window. An<br />

occupied position in the transmission window is a sent packet whose ack has not been received. If all the positions<br />

in the transmission window are occupied, a timer (ACK_TIMER) shall be started. If no ack is received before the<br />

timer expires, the packets inside the transmission window shall be sent again. After MAX_RTX timeouts, the<br />

window shall be cleared (packets removed from the transmission memory) <strong>and</strong> the next burst that will be sent to the<br />

same destination shall have the PAP Init bit set to 1.<br />

5.4.2 Packet ACK Protocol: Group Encoding<br />

When using Group Encoding, the status of the received packets is coded in a compressed format. Status is not<br />

expressed by individual packets but by groups of packets.<br />

Groups shall be all the same length, <strong>and</strong> shall be formed starting from the most recently received packet id<br />

backwards to the oldest id.<br />

The PAP information depends on the PAP Code Type <strong>and</strong> on PAP Algorithm (PAP Info bits [1:0]):<br />

PAP Algorithm Description<br />

0 Algorithm A (see section 5.4.2.1)<br />

1 Algorithm B (see section 0)<br />

2 Algorithm C (see section 5.4.2.3)<br />

In all these algorithms, the following information is used:<br />

Table 14: PAP algorithm coding<br />

Submission page 158 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

PAP Info Bits Parameter Description<br />

[2] Polarity of the left-over bits The PAP Information per<br />

group is about a number of<br />

packet ids. The rest of packet<br />

ids are correctly received if<br />

“polarity of the left-over bits”<br />

is equal to 1. And incorrectly<br />

received if it is equal to 0.<br />

[8:3] Compression Ratio Number of packets<br />

represented by each bit<br />

Table 15: PAP algorithm information<br />

The difference between Algorithm A, B <strong>and</strong> C is that B <strong>and</strong> C needs extra information.<br />

In case of Burst with data, the bits in Burst Header are used depending on the chosen algorithm:<br />

- Algorithm A, the bits from [54:9] are used to describe the status of each group (Group Status)<br />

- Algorithm B <strong>and</strong> C:<br />

o Bits from [19:9] are used for parameter “offset”.<br />

o Bits from [54:20] are used to describe the status of each group (Group Status)<br />

In case of Burst without data, the bits in Burst Header are used depending on the chosen algorithm:<br />

- Algorithm A, the bits from [118:9] are used to describe the status of each group<br />

- Algorithm B <strong>and</strong> C:<br />

o Bits from [19:9] are used for parameter “offset”.<br />

o Bits from [118:20] are used to describe the status of each group (Group Status)<br />

5.4.2.1 Group Encoding: Algorithm A<br />

In this algorithm the receiver shall send 4 pieces of information to the transmitter.<br />

1. The last correctly received packet<br />

2. The number of packets in each group (compression ratio)<br />

3. The polarity of the left-over bits (1 shall mean received correctly/ 0 shall mean received incorrectly)<br />

4. The PAP coded bit: 46 bits in Burst Header with data or 111 bits in Burst Header without data.<br />

With this information the transmitter shall be able to reconstruct the receiver window <strong>and</strong> retransmit or free-up<br />

packets appropriately.<br />

The PAP informatioin decoder (transmitter) in order to reconstruct the status of the packets sent previously to the<br />

last correctly received shall take the first bit of the coded bits <strong>and</strong> replicate it a number of times, (given by the<br />

Submission page 159 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

compression ratio), until completing the window (2048 bits). The group porder goes from the most recently<br />

received to least recently received (see Figure 60)<br />

Polarity<br />

of lefover<br />

bits<br />

PAP<br />

Coded<br />

Bits<br />

[last bit]<br />

Compression<br />

ratio<br />

2048<br />

5.4.2.2 Packet ACK Protocol: Algorithm B<br />

PAP<br />

Coded<br />

Bits [1]<br />

Figure 60: Packet ACK Protocol: Algorithm A<br />

Last correctly<br />

received packet<br />

PAP<br />

Coded<br />

Bits [0]<br />

Submission page 160 UPA-OPERA<br />

ok<br />

Compression<br />

ratio<br />

Compression<br />

ratio<br />

This algorithm is similar to the algorithm A but one extra piece of information shall be sent:<br />

• An offset that shall indicate where the next transition (status change) after the last correctly received packet<br />

(not including the offset itself) occurs.<br />

In this algorithm, the status of the groups is described by 35 bits in Burst Header with data or 99 bits in Burst<br />

Header without data.<br />

With this information the PAP decoder (transmitter) shall take the previous packet to the last correctly received<br />

packet, <strong>and</strong> count backwards until the offset is reached <strong>and</strong>. It shall fill these spacespositions with either ones or<br />

zeros (depending on the polarity bit). After this, the decoding of the algorithm B shall be identical of that ofto the<br />

algorithm A. The process is described in the following figure:<br />

Polarity<br />

of lefover<br />

bits<br />

PAP<br />

Coded<br />

Bits<br />

[last bit]<br />

Compression<br />

ratio<br />

2048<br />

PAP<br />

Coded<br />

Bits [1]<br />

PAP<br />

Coded<br />

Bits [0]<br />

Compression<br />

ratio<br />

Compression<br />

ratio<br />

Figure 61: Packet ACK Protocol: Algorithm B<br />

1<br />

Last correctly<br />

received packet<br />

NOT<br />

PAP<br />

Coded<br />

Bits [0]<br />

Offset<br />

ok<br />

1


4-June-07 P1901_PRO_016_r0<br />

5.4.2.3 Grouping Encoding: Algorithm C<br />

This algorithm is a variation of the algorithm B. The receiver shall send the same amount of data than in algorithm<br />

B but the transmitter shall decode it in a different way.<br />

The PAP decoder (transmitter) shall take the information <strong>and</strong> assume that from the starting point (this is the last<br />

correctly received packet) to the offsets, the packets were incorrectly received. And from the offset, it shall start the<br />

decoding in the same way as in algorithms A <strong>and</strong> B.<br />

Polarity<br />

of lefover<br />

bits<br />

PAP<br />

Coded<br />

Bits<br />

[last bit]<br />

Compression<br />

ratio<br />

PAP<br />

Coded<br />

Bits [1]<br />

PAP<br />

Coded<br />

Bits [0]<br />

Compression<br />

ratio<br />

Compression<br />

ratio<br />

2048<br />

Figure 62: Packet ACK Protocol: Algorithm C<br />

5.4.3 Packet ACK Protocol: Run-Length Encoding<br />

Last correctly<br />

received packet<br />

Incorrect<br />

Offset<br />

When using Run-Length encoding the status of the received packets is compressed <strong>and</strong> transmitted by groups. But<br />

differently from Group Encoding because the length of each groups is variable.<br />

Instead of transmitting the status of each group, which is transmitted is the number of packets in each group (group<br />

length).Groupboundaries are marked by the status of the received packets. If one group represents packets that have<br />

been received correctly, the next group represents packets that have been received incorrectly or not received.<br />

The number of bits that inidcates the length of each group is variable <strong>and</strong> shall be chosen so that the number of<br />

packets whose status is reported is maximized.<br />

In case of Run-Length Encoding, the PAP information is divided in the following fields:<br />

PAP Info Bits Parameter Description<br />

[0] Status of last received packet<br />

Submission page 161 UPA-OPERA<br />

ok<br />

(0) If last received packet<br />

is incorrect<br />

(1) If last received packet<br />

1


4-June-07 P1901_PRO_016_r0<br />

is correct<br />

[4:1] Length width Number of bits used to<br />

express about the length of<br />

each group. The allowed<br />

values are from 1 to 11. The<br />

value 0 means that all packets<br />

are incorrect.<br />

[54:5] (Burst Header)<br />

[118:5] (Burst Header<br />

without Data)<br />

Group lengths This field is divided in<br />

subfields of Length width<br />

bits. Each of the subfields<br />

express the number of packets<br />

belonging to each group<br />

It is possible to have a Length width not big enough to express the length of one or more groups, this is, length ><br />

2 (Length width) – 1. In such case, the length of the group shall be expressed with the maximum value, 2 (Length width) – 1.<br />

The following group shall be expressed with length 0, <strong>and</strong> the group after it with the remainder, length mod (2 (Length<br />

width) – 1).<br />

When Length width is equal to 0 it means that all packets are incorrectly received or not received.<br />

Length width Number of Group<br />

Lengths in Burst<br />

Burst Header in a<br />

Burst with Data<br />

Number of Group<br />

Lengths in Burst<br />

Burst Header in a<br />

Burst without<br />

Data<br />

Length of group of last<br />

received packet<br />

1 50 114 Group Lengths [0]<br />

2 25 57 Group Lengths [1:0]<br />

3 16 38 Group Lengths [2:0]<br />

4 12 28 Group Lengths [3:0]<br />

5 10 22 Group Lengths [4:0]<br />

6 8 19 Group Lengths [5:0]<br />

7 7 16 Group Lengths [6:0]<br />

Submission page 162 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

8 6 14 Group Lengths [7:0]<br />

9 5 12 Group Lengths [8:0]<br />

10 5 11 Group Lengths [9:0]<br />

11 4 10 Group Lengths [10:0]<br />

See the following example with Length width equal to 11:<br />

Status of<br />

last<br />

received<br />

packet<br />

NOT<br />

Status of last<br />

received<br />

packet<br />

Group<br />

Lengths<br />

[43:33]<br />

Table 16: Run-Length encoding<br />

Status of last<br />

received<br />

packet<br />

Group<br />

Lengths<br />

[32:22]<br />

5.4.4 Transmission of PAP information<br />

2048<br />

NOT<br />

Status of last<br />

received<br />

packet<br />

Group<br />

Lengths<br />

[21:11]<br />

Figure 63: Run-Length encoding example<br />

Last correctly<br />

received packet<br />

Status of last<br />

received<br />

packet<br />

Group<br />

Lengths<br />

[10:0]<br />

If a node has PAP information to be sent <strong>and</strong> gains access to the channel, the PAP information shall be sent inside<br />

the Burst Header. If this node cannot transmit data symbols because of the assigned validity or because there are no<br />

data to be transmitted, a Burst Header without data in the payload shall be sent. Because one node can be receiving<br />

from more than one node, it could send more than one Burst Header without data in the payload.<br />

5.5 LLC service specification (LLC SAP)<br />

5.5.1 LLC service primitives<br />

Following table shows LLC DATA <strong>and</strong> MNT primitives:<br />

Submission page 163 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

5.5.2 LLC-DATA.req<br />

5.5.2.1 Function<br />

Primitive Type<br />

LLC-DATA.req Request<br />

LLC-DATA.cnf Confirm<br />

LLC-DATA.ind Indication<br />

LLC-MNT-ACKMODE.req Request<br />

Table 17 LLC service primitives<br />

This primitive requests a transfer of a Convergence layer PDU from a local Convergence layer entity.<br />

5.5.2.2 Semantics of the service primitive<br />

LLC-DATA.req (CPDU):<br />

- CPDU: Convergence layer Protocol Data Unit<br />

5.5.2.3 When generated<br />

This primitive is generated by the Convergence layer entity when a CPDU is to be transferred.<br />

5.5.2.4 Effect of receipt<br />

The LLC layer entity starts the sending of the CPDU.<br />

5.5.3 LLC-DATA.cnf<br />

5.5.3.1 Function<br />

This primitive has local significance <strong>and</strong> provides the Convergence layer with status information (sending finished)<br />

of the corresponding preceeding LLC-DATA.req primitive.<br />

5.5.3.2 Semantics of the service primitive<br />

This primitive has no parameters.<br />

Submission page 164 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

5.5.3.3 When generated<br />

The primitive is passed from the LLC layer entity to the Convergence layer entity to indicate that the previous<br />

CPDU has been sent.<br />

5.5.3.4 Effect of receipt<br />

The Convergence layer entity is aware that the LLC is available to send new CPDUs, <strong>and</strong> can issue new LLC-<br />

DATA.req primitives.<br />

5.5.4 LLC-DATA.ind<br />

5.5.4.1 Function<br />

This primitive defines the transfer of a CPDU from the LLC layer entity to the Convergence layer entity.<br />

5.5.4.2 Semantics of the service primitive<br />

LLC-DATA.ind (CPDU):<br />

- CPDU: Convergence layer Protocol Data Unit<br />

5.5.4.3 When generated<br />

The primitive is passed from the LLC layer entity to the Convergence layer entity to indicate the arrival of a CPDU.<br />

5.5.4.4 Effect of receipt<br />

The Convergence layer entity processes the newly received CPDU.<br />

5.5.5 LLC-MNT-ACKMODE.req<br />

5.5.5.1 Function<br />

This primitive requests the use or not of LLC ACKs for data transmission.<br />

5.5.5.2 Semantics of the service primitive<br />

LLC-MNT-ACKMODE.req (ack_mode, port) :<br />

- ack_mode = [yes|no]<br />

- port: local transmission port to remote peer node<br />

Submission page 165 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

5.5.5.3 When generated<br />

The primitive is generated by the Management layer to enable or disable the use of LLC ACKs to transmit data to a<br />

specified port.<br />

5.5.5.4 Effect of receipt<br />

The LLC layer will configure the port accordingly by means of ACK or no ACK transmission.<br />

6 CONVERGENCE LAYER<br />

6.1 OVERVIEW<br />

This section describes the mechanisms that are used to encapsulate packets coming from external interfaces before<br />

passing them to the LLC. Some modifications are made to the Ethernet packet from the external interfaces. So the<br />

main task of the Convergence layer is Ethernet packet formatting.<br />

6.2 PACKET FORMAT<br />

The IEEE 1901 Packet Format is derived from the IEEE 802.3 frame format without the following fields:<br />

- Preamble (PRE) - 7 bytes. The PRE is an alternating pattern of ones <strong>and</strong> zeros that tells receiving stations<br />

that a frame is coming, <strong>and</strong> that provides a means to synchronize the frame-reception portions of receiving<br />

physical layers with the incoming bit stream.<br />

- Start-of-frame delimiter (SFD) - 1 byte. The SOF is an alternating pattern of ones <strong>and</strong> zeros, ending with<br />

two consecutive 1-bits indicating that the next bit is the left-most bit in the left-most byte of the destination<br />

address.<br />

Additional fields are added to support BPL broadcast of packets <strong>and</strong> OVLANs, as explained below<br />

See the following figure to underst<strong>and</strong> the differences:<br />

IEEE Std 802.3 Packet Format<br />

IEEE 1901 Packet Format<br />

PRE SFD DA SA TPID TCI<br />

Type/<br />

EXT PB OVLAN Word DA SA TPID TCI<br />

Data<br />

PLW<br />

length<br />

Submission page 166 UPA-OPERA<br />

Type/<br />

length<br />

Data


4-June-07 P1901_PRO_016_r0<br />

The Packet Format has the following fields:<br />

- EXT – 16 bits. Reserved for extensions<br />

- PB – 48 bits. Previous Bridge ID<br />

Figure 64 Packet format<br />

- OVLAN – 32 bits with the following information:<br />

o PCF – 1 bit. Pre-classified Packet<br />

o PCP – 3 bit. Pre-classified Packet Priority<br />

o OVLANV - 1 bit.Valid OVLAN<br />

o OVLANID - 12 bits. OVLAN Identifier<br />

- DA – 48 bits. Destination <strong>MAC</strong> Address. The DA field identifies which station(s) should receive the<br />

frame.<br />

- SA – 48 bits. Source <strong>MAC</strong> Address. The SA identifies the sending station.<br />

- TPID – 16 bits. Optional field. Defined value of 8100 in hex. When a frame has the EtherType equal to<br />

8100, this frame carries the tag IEEE 802.1Q/802.1p, otherwise it will be filled with 0x0000.<br />

- TCI – 16 bits. Optional field. VLAN Tag <strong>Control</strong> Information field including user priority, Canonical<br />

format indicator <strong>and</strong> VLAN ID. This field is always present, even if the TPID is not 0x8100.<br />

- Len – 16 bits. IEEE Std 802.3-style Length/Type Field<br />

- Data – From 42 to 1500 bytes. The Data Payload of this packet.<br />

- PLW – From 0 to 3 bytes. Because the packet has to be 32 bit aligned, there are from 0 to 3 bytes of no<br />

valid data at the end of this packet. This field is called Padding Last Word.<br />

The incoming IEEE std 802.3 packet may have TCI field or not, but the TCI field is always present in the IEEE<br />

1901 packet format.<br />

6.2.1 Maximum <strong>and</strong> Minimum Packet length<br />

The maximum length of one packet is equal to 1536 octets.<br />

The minimum length of one packet is equal to 76 octets.<br />

Submission page 167 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

6.2.2 OVLAN Fields<br />

OVLAN fields are intended for OVLAN The OVLAN is a sort of Virtual LAN (VLAN), which functions<br />

independtly of IEEE 802.1Q. Jointly with IEEE 802.1Q functionality it provides a two-layer Virtual LAN<br />

functionality between BPL nodes. OVLAN functionality is described in Clause 7.4).<br />

The OVLAN fields are the following:<br />

- OVLANV - 1 bit. Valid OVLAN<br />

- OVLANID - 12 bits. OVLAN Identifier<br />

The OVLAN fields have the following meaning:<br />

- When OVLANV is equal to 0, the OVLANID is not used <strong>and</strong> the packet is not carrying OVLAN<br />

information.<br />

- When OVLANV is equal to 1, the OVLANID is equal to the tag, <strong>and</strong> the tag is used with the same sense as<br />

in IEEE 802.1Q. The only difference is the following:<br />

o The tag equal to 0 is a possible tag<br />

o The tag equal to 0xFFF is a tag that must be accepted by all the filters.<br />

As in IEEE 802.1Q where the TCI has priority information, the OVLAN word has two fields to know the priority of<br />

this packet:<br />

- PCF: Pre-classified Packet<br />

- PCP: Pre-classified Packet Priority<br />

If PCF is set to 1, the priority of this packet is equal to PCP value. The 802.1p or any other rule is not applied to<br />

decide the priority. Priority assignment is described in clause 8.<br />

In the case of nodes that do not perform OVLAN filtering, the OVLAN field will not be modified if the packet was<br />

received through a BPL interface. If the packet was received through other interfaces, the node will add the<br />

OVLAN fields with OVLANV = 1b0 <strong>and</strong> PCF = 1b0.<br />

6.2.3 BPL service class<br />

The OVLAN word has two fields that store the poweline service class of this packet. BPL service class is used in<br />

parallel to IEEE 802.1Q priority. The fields are:<br />

- PCF: Pre-classified Packet<br />

- PCP: Pre-classified Packet Service class<br />

Submission page 168 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

If PCF is set to 1, this indicates that PCP contains a valid BPL service class.<br />

For packets received through a non-BPL interface, PCF = 0. For packets received through a BPL interface PCF<br />

must be left unchanged.<br />

BPL service class can be calculated then by the QoS function (see 8.2).<br />

6.2.4 PB Field<br />

This field are used to avoid loops with broadcast packets.<br />

Broadcast packets can be sent in two ways through the BPL network:<br />

- Using the broadcast port. The broadcast packet is sent using the broadcast port <strong>and</strong> all nodes that have<br />

negotiated ports with the sender will receive it.<br />

- Using unicast ports. The broadcast packet is sent once per each negotiated port, except the port where it was<br />

received in the case it was a BPL port.<br />

In the case when a broadcast packet is sent using the broadcast port, these fields are used to avoid loops. In the other<br />

case, they are not necessary. In any case, they shall always be present in all packets.<br />

The meaning of the field (defined in 6.2) is the following:<br />

- PB: Previous Bridge ID. It shall contain the <strong>MAC</strong> address of the previous node that has transmitted this<br />

packet.<br />

When a packet enters the BPL network Previous Bridge ID shall be set to 0.<br />

In any retransmission, the Previous Bridge ID shall be filled with the ID of the last unit that transmitted the packet.<br />

When receiving a packet it shall be discarded when its Previous Bridge ID is equal to the <strong>MAC</strong> address of the node<br />

that has received the packet, because this indicates that the node has already received the packet before..<br />

6.2.5 Octet alignment<br />

The bytes from IEEE Std 802.3 are stored in 32 bits words in the following way:<br />

Byte<br />

3<br />

Byte<br />

2<br />

Submission page 169 UPA-OPERA<br />

Byte<br />

1<br />

Byte<br />

0<br />

Figure 65 Byte order


4-June-07 P1901_PRO_016_r0<br />

From IEEE 802.3 interface, the bytes are received in the following order: byte0, byte1, byte2 <strong>and</strong> byte3.<br />

And from this 32 bits word, the bytes are transmitted into the LLC interface in the following order: byte3, byte2,<br />

byte1, byte0. The packets are transmitted to the LLC in the way shown in Figure 66, starting from the top, since the<br />

LLC works with bytes.<br />

If we define N as the number of bytes in Data Payload plus the number of bytes of the Length/Type Field, then we<br />

can write N = 4*m + p; with m an integer value <strong>and</strong> p equal to 0, 1, 2 or 3. The number of bytes in PLW is equal to<br />

0 if p is equal to 0 or 4-p in the other cases, because the packet is 32 bit aligned.<br />

Submission page 170 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

bits<br />

7 6<br />

Reserved<br />

Reserved<br />

5<br />

4<br />

Data (from byte [6] to [4*m – 3])<br />

PLW (0 bytes if p is equal to 0 OR (4-p) bytes if p is different from 0)<br />

Last Word Data (from byte [4*m-2] to [4*m+p-3])<br />

FCS[3]<br />

FCS[2]<br />

FCS[1]<br />

FCS[0]<br />

Submission page 171 UPA-OPERA<br />

3<br />

PB[1]<br />

PB[0]<br />

Extensions[1]<br />

Extensions[0]<br />

PB[5]<br />

PB[4]<br />

PB[3]<br />

PB[2]<br />

OVLANID[7:0]<br />

OVLANV OVLANID[11:8]<br />

PCP PCF<br />

Reserved<br />

DA[3]<br />

DA[2]<br />

DA[1]<br />

DA[0]<br />

SA[1]<br />

SA[0]<br />

DA[5]<br />

DA[4]<br />

SA[5]<br />

SA[4]<br />

SA[3]<br />

SA[2]<br />

TCI[7:0]<br />

TCI[15:8]<br />

TPID[7:0]<br />

TPID[15:8]<br />

Data[1]<br />

Data[0]<br />

Lenght[0]<br />

Length[1]<br />

Data[5]<br />

Data[4]<br />

Data[3]<br />

Data[2]<br />

Figure 66 Packet byte order to the LLC<br />

6.3 CONVERGENCE LAYER SERVICE PRIMITIVES<br />

The bridging block communicates with the convergence layer through 3 service primitives Eth.req, Eth.cnf <strong>and</strong><br />

Eth.ind:<br />

2<br />

1<br />

0<br />

Octet<br />

1<br />

2<br />

3<br />

4<br />

5<br />

6<br />

7<br />

8<br />

9<br />

10<br />

11<br />

12<br />

13<br />

14<br />

15<br />

16<br />

17<br />

18<br />

19<br />

20<br />

21<br />

22<br />

23<br />

24<br />

25<br />

26<br />

27<br />

28<br />

29<br />

30<br />

31<br />

32<br />

33<br />

34<br />

35<br />

36<br />

37<br />

38<br />

39<br />

40<br />

41<br />

42<br />

43<br />

44


4-June-07 P1901_PRO_016_r0<br />

Notes:<br />

• Eth.req (802.3/EthernetII frame, BPL local ports list, PB, OVLAN word): This primitive requests the<br />

transfer of an Ethernet frame from the local bridging block to a single peer bridging block or multiple peer<br />

bridging blocks in the case of multi-port transfer requests (see 6.3.1).<br />

• Eth.ind (802.3/EthernetII frame, BPL local port, LB, OVLAN word, Session ID): This primitive defines the<br />

transfer of an Ethernet frame from the convergence layer to the bridging block.<br />

• Eth.cnf: This primitive is used by the convergence layer to notify the bridging block of the results of the<br />

Eth.req primitive.<br />

• VLAN tag may be included in the 802.3/EthernetII frame<br />

• The OVLAN word includes PCF, PCP, OVLANV <strong>and</strong> OVLANID<br />

6.3.1 Multi-port transfer requests<br />

Multi-port transfer requests correspond to Eth.req service primitives including several BPL local ports as argument.<br />

Such requests are inherent to bridging in TDRs <strong>and</strong> HEs which manage several BPL ports. The multi-port requests<br />

are solicited by st<strong>and</strong>ard transparent bridging actions such as:<br />

1. Broadcast transmission: The IEEE 802.3 frame includes a Broadcast Ethernet address in its Destination<br />

Address field. The multi-port request concerns all the BPL ports managed by the bridging function except<br />

the one from which the Ethernet frame was received (if it was eventually received from a BPL port).<br />

2. Multicast transmission: The IEEE 802.3 frame includes a Multicast Ethernet address in its Destination<br />

Address field. The multi-port request might concern a subset of the BPL ports managed by the bridging<br />

function or a single native multicast BPL port associated.<br />

3. Bridge flooding: The bridging block could not find any association of a unicast Ethernet Destination<br />

addresses with a specific bridge port, the request is then flooded to all the bridge ports. The multi-port<br />

request concerns all the BPL ports managed by the bridging function.<br />

6.4 BROADCAST/MULTICAST HANDLER FUNCTIONAL REQUIREMENTS<br />

The convergence layer shall include a broadcast/multicast h<strong>and</strong>ler that shall perform the following functions:<br />

1. H<strong>and</strong>ling transfer of multicast management messages: Management messages can be unicast or multicast as<br />

described in section 7.4. Multicast management messages can be received from the bridging fundtion through<br />

primitives which are either single port requests or multi-port requests. Any multicast management message<br />

received through these requests shall be transferred over the broadcast port using HURTO modulation.<br />

2. Management of multi-port transfer requests which do not carry multicast management messages: upon<br />

reception of such multi-port transfer request from the convergence layer, the block shall compute the best<br />

method for h<strong>and</strong>ling the transfer. If the multi-port request concerns all the local ports of the Port Solver Table or<br />

if the request includes a broadcast/multicast Ethernet Destination Address, depending on the bit-loading tables<br />

associated to each local port, the block might consider transferring the Ethernet frame over the broadcast local<br />

Submission page 172 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

port using HURTO modulation. In the other cases, the multi-port request will result in several consecutive LLC<br />

service requests related to each unicast local port, or in the use of a native multicast local port.<br />

3. Broadcasts loop back avoidance: on the reception path, upon reception of a packet over the broadcast local port<br />

(127), the module shall discard any packet which is detected as previously transmitted (that is, the <strong>MAC</strong> address<br />

contained in the PB field of the packet is equal to the <strong>MAC</strong> address of the node).<br />

4. On the reception path, upon reception of a packet over the broadcast local port (127), the local port passed<br />

within the Eth.ind primitive shall be the one assigned to the remote node from which the request was received.<br />

7 BRIDGING FUNCTION<br />

7.1 General<br />

The bridging function interconnects bridge ports. There are two types of bridge ports: BPL ports <strong>and</strong> non-BPL ports<br />

<strong>and</strong> the management port. BPL ports are the bridge ports that represent a remote PL unit <strong>and</strong> are directly mapped<br />

onto the completed entries of the Port Solver Table. Non-BPL ports are any other external ports of the unit (e.g.<br />

Ethernet, USB, WIFI,…).<br />

The bridging function is based in st<strong>and</strong>ards IEEE 802.1D <strong>and</strong> IEEE 802.1Q as described below.<br />

From a bridging st<strong>and</strong>point, the convergence layer is seen as a set of bridge ports called “BPL ports” which are both<br />

transmission <strong>and</strong> reception unicast <strong>and</strong> native multicast ports. The bridging block of a node h<strong>and</strong>les as many BPL<br />

unicast ports as there completed entries in the Port Solver Table of this node, in addition to the native multicast<br />

ports that has a valid value in such Port Solver Table. The identifier of a BPL port corresponds to the value of the<br />

local port attached to a remote node, that can be a native multicast or an unicast port. The status (open/close) <strong>and</strong> the<br />

identifier of the BPL ports are mapped onto the status <strong>and</strong> identifiers of the local ports defined in the Port Solver<br />

Table.<br />

There is also a BPL management entity that can access all the ports in the same conditions as the higher layer<br />

entities as described in IEEE 802.1D.<br />

*Note: The port solver table includes complete entries <strong>and</strong> incomplete entries. Complete entries correspond to local<br />

port which are associated to solved remote port <strong>and</strong> <strong>MAC</strong> addresses. Incomplete entries correspond to local ports<br />

which associated unicast remote port are still not solved via the Port Solver Protocol.A complete entry may have<br />

an additional native multicast remote port associated.<br />

7.2 IEEE 802.1D conformance<br />

The bridging function shall conform to:<br />

a) IEEE Std 802.1D, with Basic Filtering Services support requirements<br />

Submission page 173 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

b) IEEE Std 802.1D Management (clause 14 of IEEE 802.1D-2004) requirements<br />

c) IEEE Std 802.1D Remote Management (clause 5.2 of IEEE 802.1D-2004) requirements<br />

as modified by the provisions of this st<strong>and</strong>ard<br />

The permanent filtering database, as defined in IEEE 802.1D-2004 clause 7.9 shall have a minimum size of 8<br />

entries.<br />

The dynamic filtering database, as defined in IEEE 802.1D-2004 clause 7.9 shall have a minimum size of 64<br />

entries.<br />

7.3 IEEE 802.1Q conformance<br />

The bridging function shall support VLAN according to IEEE Std 802.1Q requirements for VLAN-aware bridges,<br />

as modified by the provisions of this st<strong>and</strong>ard.<br />

The bridging function shall support a minimum of 32 VLANs.<br />

7.4 OVLAN Function<br />

7.4.1 General<br />

The OVLAN functionality is based on IEEE 802.1Q Virtual LAN (VLAN), but does not substitute the IEEE<br />

802.1Q functionality. Instead, if enabled, it shall work independtly of IEEE 802.1Q functionality.<br />

OVLAN function is is aimed to:<br />

• Avoid packets from one customer leaking into a neighbor customer (for security reasons).<br />

• Avoid packets from one BPL sub-network (for example, an LV cell) leaking into another BPL sub-network<br />

(for security reasons <strong>and</strong> in order to avoid the problem of bridge tables filling up with unnecessary <strong>MAC</strong><br />

addresses).<br />

In such cases, as IEEE 802.1Q VIDs are limited to less than 4096, a large network can rapidly run out of VLANs<br />

numbers if they are used for customer isolation, OVLAN should be used, leaving IEEE 802.1Q for its traditional<br />

VLAN purposes.<br />

The following processes are defined for OVLAN function<br />

Submission page 174 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

a) Frame admittance <strong>and</strong> OVLAN assignment<br />

b) OVLAN Ingress filtering<br />

c) OVLAN Egress filtering<br />

Each PL port has a list of OVLAN IDs which represent the OVLANS to which the port belongs (OVLAN_list)<br />

7.4.2 Frame admittance <strong>and</strong> OVLAN assignment<br />

7.4.2.1 Non PL ports<br />

The OVLAN parameters of a non PL port are:<br />

- OVLAN enabled / disabled<br />

- POVID (Port OVLAN identifier)<br />

If one port is OVLAN enabled, all incoming frames are assigned an OVLAN ID which is exactly the POVID of<br />

such port.<br />

7.4.2.2 PL PORTS<br />

The OVLAN parameters of a pl port are:<br />

- OVLAN enabled / disabled<br />

- Tagged only<br />

- POVID (Port OVLAN identifier)<br />

All packets coming from a port are discarded if <strong>and</strong> only if:<br />

a) The OVLAN is enabled for such port , tagged only parameter is set <strong>and</strong> the frame does not carry a valid OVLAN<br />

ID.<br />

The OVLAN ID of a frame is assigned the value of the POVID of the port if <strong>and</strong> only if:<br />

b) The OVLAN is enabled, tagged only parameter is not set <strong>and</strong> the frame does not carry a valid OVLAN ID.<br />

In the rest of cases the frames are admitted unchanged.<br />

Submission page 175 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

7.4.3 OVLAN Ingress filtering<br />

If any frame coming into the bridge has a valid OVLAN identifier, OVLAN is enabled <strong>and</strong> its OVLAN identifier is<br />

not included in the OVLAN list for such port, the frame is discarded, unless the frame has FFF as identifier. It is<br />

passed otherwise.<br />

7.4.4 OVLAN Egress filtering<br />

If any frame going out of the bridge has a valid OVLAN identifier <strong>and</strong> this OVLAN identifier is not included the<br />

OVLAN list for such port, the frame is discarded, unless the frame has FFF as identifier. It is passed otherwise.<br />

7.4.5 OVLAN management<br />

If a unit has OVLAN functionality, OVLAN parameters per port (OVLAN enabled / disabled, tagged only, POVID,<br />

<strong>and</strong> OVLAN_list) shall be modifiable by a management process.<br />

The management process shall be executable remotely.<br />

7.5 Sending broadcast/multicast Ethernet frames<br />

When sending a broadcast/multicast Ethernet frame or when flooding the ports of the bridge, two main ways to<br />

transmit multicast IEEE 802.3 frame con be configured.<br />

In the first option the bridging function shall provide the list of BPL ports related to this transfer as part of the<br />

Eth.req service primitive<br />

In the second option, the bridging function shall provide a native multicast BPL port related to this transfer as part<br />

of the Eth.req service primitive.<br />

The bridging function shall also support management of associations of multicast groups to native ports.<br />

The association of a multicast group to a native multicast port is done in two stages:<br />

a) The remote nodes belonging to a multicast group are associated to the native multicast port<br />

For this, the unit shall send Port Solver Protocol Multicast Port packets to the nodes selected to become associated<br />

to the native multicast port. The aim of such packets is to add in the Port Solver Table of each destination node that<br />

wants to join the multicast flow the selected Local native multicast Port as Second Remote Port (RP2).<br />

Submission page 176 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

b) In the forwarding tables, the list of individual unicast ports associated to the multicast group is substituted by the<br />

native multicast port.<br />

If a multicast group is associated to a native multicast port, any incorporation of a new node to such multicast group<br />

shall result in an association of such node to the native multicast port, as described in (a).<br />

Conversely, if a node is removed from a multicast group <strong>and</strong> such multicast group is associated to a native multicast<br />

port, the node shall be removed from the associated native multicast port. This shall be done by sending a Port<br />

Solver Protocol Multicast Port carrying as local native multicast port the so called invalid port. (0xFF).<br />

These actions (adding or removing a node from a native multicast port, <strong>and</strong> incorporation of the native multicast<br />

ports to the forwarding tables) shall be supported as a result of a management action <strong>and</strong> may, optionally, be done<br />

as a consequence of operation of group management protocols, such as IGMP or GMRP.<br />

7.6 PB field<br />

7.6.1 Bridging between BPL ports<br />

When bridging between BPL ports (HE or TDR feature), the bridging function shall return within the Eth.req a PB<br />

argument equal to the ID from which the packet has been received.<br />

7.6.2 Bridging from a non-BPL port to a BPL port<br />

When bridging from a non BPL-port to a BPL port, the PB argument of the Eth.req shall be set to 0.<br />

7.7 BPL service class transmission<br />

When bridging between BPL ports , if PCF=1 within the OVLAN argument of the received Eth.ind, the PCF <strong>and</strong><br />

PCP values (subfield of the OVLAN word argument) included in the subsequent Eth.req shall be kept unchanged.<br />

7.8 Filtering multicast management messages from a BPL port<br />

BPL Management messages are IEEE 802.2 SNAP encapsulated data units carried over an Ethernet frame which<br />

can be either unicast or multicast. Multicast management messages make use of one of the two following multicast<br />

addresses (referred as management multicast addresses): the STP multicast address 0x0180C2000000 (primarily<br />

used by the STP protocol but also used for some BPL management messages) or the IEEE P1901 specific multicast<br />

address: 0x01139D000000. Any Ethernet frame including a management multicast address shall be filtered by the<br />

bridging function <strong>and</strong> not retransmitted to any other port. Upon reception of management messages destined to the<br />

above two mentioned multicast addresses, the bridging function shall provide these frames to the management port.<br />

Submission page 177 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

7.9 Filtering multicast management messages from the management port<br />

BPL Multicast management messages from the management port shall only be flooded to the BPL ports (non-BPL<br />

ports excluded).<br />

8 QOS SERVICES<br />

8.1 INTRODUCTION<br />

This section describes mechanisms for applying specific guarantees in terms of b<strong>and</strong>width, latency <strong>and</strong> reliability to<br />

some flows. It is also possible to define a policy upon congestion. Any flow requiring such guarantees must initiate<br />

a connection through a Connection Admission <strong>Control</strong> procedure using protocol described in 0.<br />

The mechanisms described here below are designed for flows circulating from the HE to a CPE or vice versa. These<br />

mechanisms have not been designed to support QoS for flows between CPEs,<br />

The QOS services described here below rely on the configuration of several components:<br />

1. Service classes. (Must be declared in all the masters of a BPL cell).<br />

2. Classifier module: this module maps flows onto service classes (preconfigured in all the nodes).<br />

3. Congestion management (declared in all the masters).<br />

4. Traffic specifications, published through the CAC procedure. Pre-determined traffic specifications must be<br />

declared in CPEs.<br />

Note: A flow is a unidirectional data stream exchanged between two BPL units <strong>and</strong> carried over the same service<br />

class.<br />

BPL network uses a shared medium <strong>and</strong> provides differentiated control of the medium to h<strong>and</strong>le data transfers with<br />

QoS requirements. QoS services carry out end-to-end traffic delivery providing QoS transport on a per-user basis.<br />

The BPL cell master node will be in charge of schedule <strong>and</strong> guarantee the QoS of the BPL cell, <strong>and</strong> must assign<br />

resources to cell nodes based on the configured b<strong>and</strong>width limit <strong>and</strong> the resources reservations requests made. This<br />

node shall be named QC (quality controller).<br />

Also, there are others figures in the BPL cell which are the Flow Master Nodes (FMNs). A FMN is defined as the<br />

BPL node in charge of guarantee QoS requirement for a registered flow. This node will be the QC <strong>and</strong> also can be<br />

the BPL repeaters which will distribute the resouces given by the QC to the nodes connected to it.<br />

Submission page 178 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The FMN must receive the resource reservations requests using the CAC protocol (See section 0) <strong>and</strong> must decide if<br />

it has enough resources to assign to the incoming request or if it has to request more resources to the BPL master<br />

node.<br />

With this mechanism, we will have a complementary tool to limit the b<strong>and</strong>width. This information will be<br />

interesting to known if a new traffic of a service class can be started <strong>and</strong> the requirements for that traffic <strong>and</strong> service<br />

class can be assured.<br />

8.2 SERVICE CLASS DEFINITION<br />

Up to eight service classes can be defined within a BPL cell. Services classes are globally defined over a BPL<br />

subcell. Four service parameters are necessary to fully describe a service class: priority, subcell_access_time,<br />

resource reservation type <strong>and</strong> service reliability.<br />

8.2.1 Priority<br />

Service classes are directly mapped onto priorities. A priority uniquely identifies a service class. That is why all the<br />

other service parameters are configured <strong>and</strong> mapped from this priority parameter. Priorities shall have values from<br />

0 to 7, 0 being the lowest priority. If packets have to be dropped at the transmitter because of lack of resources, then<br />

the lower priority packets shall be dropped before the higher priority packets. When there are data of different<br />

priorities addressed to the same destination, higher priority data shall be transmitted earlier than lower priority data.<br />

8.2.1.1 Configuration<br />

Priority parameter is determined by the Classifier module operating at the bridging block level. The classifier<br />

analyses all the frames received from a bridge port (BPL port, non-BPL port, management port) <strong>and</strong> assigns a<br />

priority to each Ethernet frame transmitted to the convergence layer via the Eth.req primitive (see 6.3). The<br />

Classifier operates according to some predetermined <strong>and</strong>/or configurable rules (see 11.4). Any frame received from<br />

the management port shall be mapped to priority 7 (that is: service class 7).<br />

Note: For each Eth.req primitives delivered by the bridging block, a priority is submitted as part of the OVLAN<br />

word argument (PCP bits). The PCF bit of this OVLAN word might be set to 1 meaning that the priority is to be<br />

seamlessly bridged through the intermediate nodes of the BPL cell. This priority information is summarized within<br />

the Priority field of any Burst Header <strong>and</strong> the Frame Priority field of every upstream data token.<br />

8.2.2 Max Subcell <strong>Access</strong> Time<br />

The Max_Subcell_<strong>Access</strong>_Time corresponds to the max duration for a flow to access the channel on the subcell<br />

level. It is a latency requirement for the scheduler to be configured within any master of a BPL cell.<br />

Four Max_Subcell_<strong>Access</strong>_Time are defined at the master level. The minimum value of the<br />

Max_Subcell_<strong>Access</strong>_Time is used as the reference step from which the three other Max_Subcell_<strong>Access</strong>_Time are<br />

derived by multiplying by 2, 4 or 8 this reference step.<br />

Submission page 179 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

8.2.2.1 Configuration<br />

The reference step shall be configured within any master of a BPL cell. This parameter is configured using the<br />

QOS_LATENCY_STEP parameter (min 20ms, max 400ms).<br />

Mapping a Max_Subcell_<strong>Access</strong>_Time to a priority: Such a mapping shall be declared within each master by using<br />

the QOS_LATENCY.prio+1 parameter.<br />

8.2.3 Resource reservation type<br />

This parameter is related to the type of claimed guarantees provided in terms of node resources <strong>and</strong> time resources.<br />

It can take three values:<br />

• Type Best Effort: No guarantees on the node <strong>and</strong> time resources. This type will be mapped with the nonguaranteed<br />

service classes. Resources are granted on a Best Effort basis.<br />

• Type ABR (Available Bit-Rate): Requests ask for node <strong>and</strong> time resources for which a minimum b<strong>and</strong>width<br />

can be guaranteed with a peak over the minimum. The peak can be limited by the network capability or the<br />

node limit b<strong>and</strong>width.<br />

• Type VBR (Variable Bit-Rate):Requests ask for node <strong>and</strong> time resources for which an average b<strong>and</strong>width<br />

can be guaranteed with a maximum variation around this average.<br />

• Type CBR (Constant Bit-Rate):Requests ask for individual guarantees in terms of node <strong>and</strong> time resources.<br />

The granted node <strong>and</strong> time resources are not shared. The claimed b<strong>and</strong>width is guaranteed.<br />

Note: Any class which is associated to an ABR, VBR or CBR type corresponds to a connected service requiring<br />

initiation of a Connection Admission <strong>Control</strong> Procedure. By extension, CBR, VBR or ABR flows are called<br />

connected flows unlike Best Effort flows which are non connected flows.<br />

A maximum upstream <strong>and</strong> downstream b<strong>and</strong>width limitation applies to all the Best Effort <strong>and</strong> ABR flows of the<br />

same node (see 12).<br />

CBR <strong>and</strong> VBR traffic shall be reserved for operator services such as VoIP <strong>and</strong> video streaming services (IPTV,<br />

VOD, …), <strong>and</strong> shall be out of the b<strong>and</strong>width limitation. To accept or deny these services, the FMN must assure that<br />

network resources will be available <strong>and</strong> mechanisms for AAA services shall be used in order to authenticate the<br />

service can be used by the node.<br />

8.2.3.1 Configuration<br />

Mapping a Resource Reservation Type to a priority: Such a mapping shall be declared within each master by using<br />

the QOS_PRIORSV.prio+1 parameter.<br />

Submission page 180 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

8.2.4 Service reliability<br />

This parameter defines if the ACK mode is enabled (see section 5.4) within the service class.<br />

8.2.4.1 Configuration<br />

Mapping Service Reliability to a priority: Such a mapping shall be declared within each master by using the<br />

QOS_PRIOACK.prio+1 parameter.<br />

8.2.5 Example of a service class definition<br />

The service class definition shall be the same for all nodes in the BPL cell, <strong>and</strong> must determine univocally the the<br />

relationship between priority, maximum subcell access time, resource reservation <strong>and</strong> service reliability<br />

characteristics.<br />

This service class definition must be used by QoS to determine the priorization between flows <strong>and</strong> resources<br />

reservation in the network, <strong>and</strong> will provide criteria to allow or deny new flows or to drop existent flows to allow<br />

new flows which higher service class.<br />

Table 18 shows an example of possible relationship between service classes, priorities, Max_Subcell_<strong>Access</strong>_Time,<br />

Service Reliability <strong>and</strong> Resource Reservation Type.<br />

Submission page 181 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Service<br />

Class<br />

Resource<br />

reservation<br />

Priority MaxSubcell<br />

<strong>Access</strong><br />

Time<br />

7 Best Effort 7 240 No<br />

6 CBR 6 30 No<br />

5 VBR 5 60 Yes<br />

4 VBR 4 120 Yes<br />

3 VBR 3 120 No<br />

2 ABR 2 120 Yes<br />

1 Best Effort 1 240 No<br />

0 Best Effort 0 240 No<br />

Table 18 Definition of Service Classes: example<br />

Service<br />

Reliability<br />

(ACK<br />

enabled)<br />

The definition of service classes as described in table 1 could be used to implement QoS services for applications as<br />

described in Table 19.<br />

Submission page 182 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Service Class Application<br />

Examples<br />

7 Management<br />

messages<br />

6 VoIP<br />

5 Video, Games<br />

4 Data Highprio<br />

3 Data Highprio<br />

2 Data Highprio<br />

1 Data Lowprio<br />

0 Data Lowprio<br />

Table 19 Mapping applications to service classes: example<br />

8.2.6 Provisioning Service Class Definitions to slaves<br />

As detailed in 0, nodes that wish to request a resource reservation through the Connection Admission <strong>Control</strong><br />

procedure must make a reference to the requested service class. As a matter of fact, it is necessary for the slaves to<br />

have an idea of the service class definitions. The description of the available service classes will be obtained<br />

through the Autoconfiguration process.<br />

8.3 CONGESTION MANAGEMENT<br />

The mission of CM is to manage the accepted connections in congested networks (due to a sudden drop in the<br />

channel quality, for example). There are two possible policies that can be configured in the system:<br />

• Fair Congestion Management Policy (FCMP): all traffic flows are treated equally. Therefore, if the<br />

traffic scheduler cannot meet the b<strong>and</strong>width <strong>and</strong> latency requirements from users, it will decrease the<br />

performance of all active flows equally until new b<strong>and</strong>width <strong>and</strong> latency definitions can be supported.<br />

Submission page 183 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• Priority Congestion Management Policy (PCMP): lower priority traffic performance is decreased in<br />

order to guarantee higher priority traffic SLA. Therefore, access to the channel is denied to lower service<br />

types first, until SLA of higher service types can be maintained.<br />

• “Quality Service” Congestion Management Policy (QSCMP): The congestion manager will act like as<br />

Priority Congestion Management but uses the service class <strong>and</strong> the quality session parameters to perform<br />

the scheduling <strong>and</strong> the acceptance criteria for new sessions. The sessions with higher quality session values<br />

will have more probabilities to be scheduled accomplishing its requirements when network is congested.<br />

Quality Session parameter can be also a mixture of priority <strong>and</strong> age, or an arbitrary parameter defined by<br />

the network operator.<br />

8.3.1 Configuration<br />

The Congestion Management can be configured using the Auto-configuration protocol. In this section, we<br />

enumerate the auto-configuration parameters that modify the behavior of the Congestion Management. For more<br />

information, see 11.<br />

QOS_BW_POLICY = [0|1|2] configures the CM in which the QoS manages the network in the event of congestion<br />

(0 configures the CM in FCMP mode; 1 configures the CM in PCMP mode; 2 configures the CM in QSCMP<br />

mode).<br />

8.4 CONNECTION ADMISSION CONTROL<br />

Initiation of a Connection Admission <strong>Control</strong> (CAC) procedure is required for any connected flow. The mission of<br />

the Connection Admission <strong>Control</strong> is to ensure that the BPL network can deliver the agreed services <strong>and</strong> guarantees<br />

to new flows while maintaining the requested performance of already accepted flows.<br />

The Connection Admission <strong>Control</strong> functionality is embedded inall the network. The CAC protocol might be used<br />

in the following two scenarios:<br />

• Before the transmission of a connected flow, the CAC shall be used to reserve resources on the nodes in the<br />

system that collaborates in the communication of the new flow (from the node initiating the flow to the<br />

nodethat shall guarantee the flow). The CAC requests made to commit resources for a given Service Class<br />

may be new or updates from previous reservations.<br />

• At the end of the transmission of a connected flow, resources may be released. Release of resources may be<br />

done explicitly by transmitting a CAC Stop message indicating traffic flow is not longer needed, or may be<br />

done when a timer, MAX_CAC_DRP_TO expires since the last time a Data Token with the Session ID of<br />

the traffic was received by the node.<br />

In the CAC protocol, the exchanged parameters to verify whether or not the BPL network can guarantee the<br />

required service shall include the required b<strong>and</strong>width, <strong>and</strong> the maximum latency dem<strong>and</strong>ed by the new node.<br />

Submission page 184 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

8.5 Traffic Shaping<br />

QoS apply traffic shaping in two different ways. Each one is applied based on the service class of traffic:<br />

• Limit b<strong>and</strong>width: Is applied for best-effort <strong>and</strong> ABR service classes. Is based on the credit assignation for<br />

this service classes. This credit is assigned per-user <strong>and</strong> is renewed periodically. If the credit is not used<br />

during the period time, it’s lost <strong>and</strong> can not be used in the next period.<br />

• Guaranteed b<strong>and</strong>width: Is applied for VBR <strong>and</strong> CBR service classes. Traffic must be allowed prior to<br />

transmit <strong>and</strong> a reservation is made for this type of traffic using the CAC protocol. Channel time is assigned<br />

based on the resources reservation to meet b<strong>and</strong>width <strong>and</strong> latency requirements. Due to the explicit<br />

reservation of resources, nodes shall have mechanisms to allocate buffer space to support the incoming<br />

traffic.<br />

8.5.1 QOS Requirements<br />

To provide QoS requirements is needed support from <strong>MAC</strong> layer in order to identify the network usage by each<br />

node <strong>and</strong> the traffic service classes in the network. This support must be provided as <strong>MAC</strong> primitives <strong>and</strong> will be:<br />

• Transmitted priorities by a CPE. Must be a set of bits <strong>and</strong> each bit must be mapped to a priority<br />

• Transmitted priorities by BPL subcell/cell masters.<br />

• Single transmission Channel time: Must be the transmission time used for individual transmissions for each<br />

node in the BPL cell.<br />

• Transmitted data: Data transmitted since last time the token was received, so that b<strong>and</strong>width limitation<br />

algorithm can be reconfigured dynamically.<br />

• Unused channel time: The percentage of network resources assigned to this node available in the network.<br />

Other QoS facilities should be implemented in order to guarantee QoS requirements:<br />

• BPL node shall be able to define service classes with or without <strong>MAC</strong> Level acknowledgment capabilities.<br />

• BPL node shall be able to assign resources in a per-user <strong>and</strong> per-service basis to guarantee constant,<br />

variable or peak rate traffic requirements.<br />

• BPL node shall be able to transmit to a subset of possible receivers nodes in order to guarantee unique<br />

channel usage per-user.<br />

• BPL node shall configure MTU per-user in order to guarantee minimum transmission time per-user.<br />

• BPL node should be able to avoid transmission of lower priorities to guarantee preferential treatment of<br />

higher priorities in a per-flow basis.<br />

Submission page 185 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Furthermore, there are <strong>MAC</strong> primitives to give the QoS scheduler an idea of the BPL topology. These primitives<br />

collect information in the Upstream direction. These primitives allows to compute correctly the Validity field. These<br />

parameters are:<br />

• Maximum Number of Hops in the network<br />

• Number of Downstream Nodes<br />

9 LAYER MANAGEMENT<br />

9.1 CONTROL PROTOCOLS<br />

9.1.1 CCP (Communication <strong>Control</strong> Protocol) Description<br />

The exchange of management messages between IEEE P1901 nodes needs a special <strong>and</strong> homogeneous structure in<br />

order to simplify implementation <strong>and</strong> clarify information exchanges between nodes. Such information will have as<br />

source <strong>and</strong> destination IEEE P1901 nodes, <strong>and</strong> will be used for internal management.<br />

The structure of the packet that will be exchanged by two BPL nodes will follow the scheme presented in Figure 67:<br />

TPID<br />

DSAP<br />

SSAP<br />

CTL<br />

OUI0<br />

OUI1<br />

OUI2<br />

Type0<br />

Type1<br />

Length<br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

TCI<br />

Figure 67 Management packet<br />

The management information will be encapsulated using SNAP as depicted in Figure 67 into a regular Ethernet<br />

Frame. Using SNAP with an assigned OUI, it is possible to create specific protocols for IEEE P1901 nodes.<br />

Encapsulated fields will be described in the following table:<br />

Field Length Description<br />

Submission page 186 UPA-OPERA<br />

Data<br />

DSAP 1 byte Destination Service <strong>Access</strong> Point


4-June-07 P1901_PRO_016_r0<br />

SSAP 1 byte Source Service <strong>Access</strong> Point<br />

CTL 1 byte <strong>Control</strong> field<br />

OUI0 1 byte Organizationally Unique Identifier Byte 0<br />

OUI1 1 byte Organizationally Unique Identifier Byte 1<br />

OUI2 1 byte Organizationally Unique Identifier Byte 2<br />

Type0 1 byte Ethertype byte 0<br />

Type1 1 byte Ethertype byte 1<br />

Table 20 Management packet field description<br />

For the internal BPL protocols that IEEE P1901 stations will exchange, the described fields must have the following<br />

values:<br />

Field Length Value<br />

DSAP 1 byte 0xAA<br />

SSAP 1 byte 0xAA<br />

CTL 1 byte 0x3<br />

OUI0 1 byte 0x00<br />

OUI1 1 byte 0x13<br />

OUI2 1 byte 0x9D<br />

Type0 1 byte See Table 22<br />

Submission page 187 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Type1 1 byte See Table 22<br />

Table 21 Management packet field values<br />

Table 22 includes the used types <strong>and</strong> subtypes for m<strong>and</strong>atory BPL protocols. Description of each one will be<br />

provided in the following sections. In general, with Type0 a Specific protocol is set <strong>and</strong> with Type1 a message type<br />

that makes sense into the protocol is announced. In the following table, messages of each BPL protocol are<br />

described, providing information about the content of each type field for each message.<br />

Type0 Protocol Type1 Description<br />

0x06 Adaptive Bit-Loading Protocol 0x01 BPC<br />

0x07 Port Solver Protocol 0x01 <strong>Access</strong> message<br />

0x02 Anounce Message<br />

0x03 Multicast message<br />

0x04 Multicast ACK message<br />

0x0b <strong>Access</strong> Protocol 0x01 Petition Status<br />

0x05 Connection Admission <strong>Control</strong><br />

Protocol<br />

P Sub_Type P.(1 bit) is the most<br />

significant bit of Type1.<br />

Sub_Type (7 bits)<br />

0 0x01 Resources Reservation<br />

Request<br />

0 0x02 Resources Reservation<br />

Reply<br />

0 0x03 Resources Reservation<br />

Change<br />

Submission page 188 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

0x07 Parametric Translation Table<br />

protocol<br />

0 0x04 Resources Reservation<br />

Change Confirmation.<br />

0 0x05 Resources Reservation<br />

Dropped<br />

0 0x06 Resources Reservation<br />

stop<br />

See 12.2.5<br />

0x0a Cluster Discovery Protocol 0x01 CDP message<br />

0x0b Automatic management of crosstalks 0x01 IDP<br />

0x02 BNDP<br />

0x03 BNDA<br />

Table 22 Management packet protocol types<br />

In some cases it is foreseen that the management information that has to be sent may not fit in one single packet. A<br />

mechanism is provided to split the information in several packets using sub-tables. The general format of those<br />

packets follows in Table 23:<br />

Bytes Fields Length<br />

0 Sub-table number 1 bytes<br />

1 Number of sub-tables 1 bytes<br />

2 Number of entries of the sub-table 1 byte<br />

3 - 8 Sender <strong>MAC</strong> address 6 byte<br />

Submission page 189 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

9 Entry size 1 byte<br />

10 - 521 Entries 512 bytes<br />

Maximum<br />

Table 23 Packet format<br />

The sub-table number shall be 1 for the first packet, <strong>and</strong> the sub-tables shall be sent in order. Entries can have<br />

variable length to allow for forward compatibility. The entry size is expressed in bytes. A node receiving entries<br />

with a size bigger than what it expects shall only take the values in the entries that it knows how to interpret <strong>and</strong><br />

shall look for the next entry taking into account the entry size received in the packet.<br />

The final structure, including information about Bridging <strong>and</strong> VLAN, <strong>and</strong> aligned in bytes shall be transmitted<br />

through the BPL in the order presented in the following figure:<br />

Submission page 190 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

bits 7 6<br />

Reserved<br />

Reserved<br />

5<br />

4<br />

3<br />

2<br />

1<br />

0<br />

LB[3]<br />

LB[2]<br />

LB[1]<br />

LB[0]<br />

PB[1]<br />

PB[0]<br />

LB[5]<br />

LB[4]<br />

PB[5]<br />

PB[4]<br />

PB[3]<br />

PB[2]<br />

OVLANID[7:0]<br />

OVLANV OVLANID[11:8]<br />

PCP PCF<br />

Reserved<br />

DA[3]<br />

DA[2]<br />

DA[1]<br />

DA[0]<br />

SA[1]<br />

SA[0]<br />

DA[5]<br />

DA[4]<br />

SA[5]<br />

SA[4]<br />

SA[3]<br />

SA[2]<br />

TCI[7:0]<br />

TCI[15:8]<br />

TPID[7:0]<br />

TPID[15:8]<br />

SSAP<br />

DSAP<br />

Lenght[1]<br />

Length[0]<br />

OUI[2]<br />

OUI[1]<br />

OUI[0]<br />

CTL<br />

Data[1]<br />

Data[0]<br />

TYPE1<br />

TYPE0<br />

Data from byte 2 to N<br />

Submission page 191 UPA-OPERA<br />

PLW<br />

Figure 68 Management packet structure<br />

When VLANs are active, all CCP packets must use the power-line reserved VLAN tag 1.<br />

Other st<strong>and</strong>ard protocols like spanning tree, will follow the IEEE 802 st<strong>and</strong>ard.<br />

Octet<br />

1<br />

2<br />

3<br />

4<br />

5<br />

6<br />

7<br />

8<br />

9<br />

10<br />

11<br />

12<br />

13<br />

14<br />

15<br />

16<br />

17<br />

18<br />

19<br />

20<br />

21<br />

22<br />

23<br />

24<br />

25<br />

26<br />

27<br />

28<br />

29<br />

30<br />

31<br />

32<br />

33<br />

34<br />

35<br />

36<br />

37<br />

38<br />

39<br />

40<br />

41<br />

42<br />

43<br />

44


4-June-07 P1901_PRO_016_r0<br />

9.1.2 Adaptive Bit-Loading Protocol (ABLP)<br />

9.1.2.1 Overview<br />

The Adaptive Bit-Loading Protocol (ABLP) is responsible for the interchange of tonemap information between the<br />

different nodes of an established BPL network.<br />

Tonemap negotiation is unidirectional <strong>and</strong> needs direct visibility between the involved nodes. One node sends the<br />

tonemap configuration <strong>and</strong> the other accepts it. The same tonemap shall be used by receiver nodes in order to<br />

underst<strong>and</strong> the received data.<br />

A pair of nodes can establish two different logical links identified in the reception side by the pair transmitter’s<br />

<strong>MAC</strong> <strong>and</strong> First Remote Port (RP1) <strong>and</strong> transmitter’s <strong>MAC</strong> <strong>and</strong> Second Remote Port (RP2). The link determined by<br />

the transmitter’s <strong>MAC</strong> <strong>and</strong> the Second Remote Port is usually devoted to Multicast Transmissions, <strong>and</strong> may have a<br />

different tonemap from the link determined by the pair transmitter‘s <strong>MAC</strong> <strong>and</strong> First Remote Port (RP1) (See<br />

9.1.2.1). In this case, the negotiation will be independent for each one of the links.<br />

Tonemap negotiation includes:<br />

- The tonemap.<br />

- The tonemap ID (TMI) associated to the included tonemap.<br />

- And, optionally, cycle selection (CS) configuration.<br />

Cycle selection configuration can be included to indicate that current tonemap has been designated to be used only<br />

during a specific part of the cycle defined as a multiple of Qs (See 4.4.2.10). In that case, nodes will need to<br />

negotiate several tonemaps to cover the the entire cycle.<br />

9.1.2.2 Protocol<br />

The ABLP defines two different packets:<br />

- The ABLP Tonemap information packet (ABLP_inf).<br />

- And the ABLP Tonemap acknowledgement packet (ABLP_ack).<br />

The ABLP_ack is used by the ABLP_inf packet transmitter to know if the tonemap configuration has been received<br />

<strong>and</strong> accepted by the transmitter node. In case that acknowledgment does not arrive, the ABLP_inf packet transmitter<br />

shall send a new ABLP_inf packet. The ABLP_inf packet transmitter shall start a timer after the transmission of the<br />

packet.<br />

The loss of an ABLP_inf packet or the ABLP_ack packet shall not cause a tonemap mismatch (different tonemaps<br />

with the same TMI in transmitter <strong>and</strong> receiver). Current tonemaps shall not share TMI with new tonemaps <strong>and</strong> shall<br />

not be immediately discarded after sending the new packet. The loss of an ABLP_inf packet will imply the use of<br />

previous tonemap configuration <strong>and</strong> the transmission of a new ABLP_inf packet.<br />

On the other h<strong>and</strong>, although the ABLP_ack packet is lost, the new tonemap configuration can be used. However, a<br />

new ABLP_inf packet shall be sent (timeout) with the objective of finishing the negotiation.<br />

Submission page 192 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The ABLP_ack packet shall include the same TMI <strong>and</strong> sequence number as the transmitted ABLP_inf packet. The<br />

sequence number shall be increased with every transmitted ABLP_inf packet. The reception of the ABLP_ack<br />

implies that the receiver has accepted the new tonemap configuration.<br />

9.1.2.3 ABLP_inf packet format<br />

Figure 69: Example of successful tonemap negotiation<br />

ABLP_inf packets shall be sent in HURTO mapping mode. The use of a different mapping could result in the<br />

impossibility to negotiate new tonemaps if current tonemap configuration is inadequate.<br />

ABLP_inf packets use the CCP with Type0 0x01 <strong>and</strong> Type1 0x01. The packet format can be seen in Figure 70.<br />

Figure 70: ABLP_inf packet<br />

ABLP_inf packets use 0x01139D000000 multicast address as destination <strong>MAC</strong> address.<br />

Submission page 193 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Source <strong>MAC</strong> address is set to the ABLP_inf packet transmitter node <strong>MAC</strong> address. The ABLP_inf data is shown in<br />

Figure 71.<br />

Description:<br />

Figure 71: ABLP_inf Data<br />

a) Remote Port: Remote Port assigned by the ABLP_inf packet transmitter to the link with the ABLP_inf<br />

packet destination node. May be the First or the Second Remote Port.<br />

b) TMI: Tonemap ID assigned to the included tonemap. From 0 to 255. If the H bit is set to 1, this value shall<br />

be set to 0.<br />

c) Local Port: Local Port assigned by the ABLP_inf packet transmitter to the link with the ABLP_inf packet<br />

destination node.<br />

d) Flags:<br />

1) H bit: use HURTO mapping. When this bit is set to 1, Tonemap Format <strong>and</strong> Tonemap fields shall<br />

not be included <strong>and</strong>, additionally, TMI <strong>and</strong> BPS fields shall be set to 0.<br />

2) C bit: use cycle selection (CS). When this bit is set to 1, CS Format <strong>and</strong> CS fields shall be included.<br />

The rest of bits are reserved <strong>and</strong> shall be set to 0.<br />

e) BPS: Bits Per Symbol value calculated from the tonemap included in the packet (see Equation 17). If H bit<br />

is set to 1, this value shall be set to 0.<br />

f) Rx Att: difference, in 3 dB steps, between the maximum reception gain <strong>and</strong> the gain used during channel<br />

estimation.<br />

g) Sequence Number: ABLP_inf packet sequence number. From 0 to 65535.<br />

h) Dest <strong>MAC</strong>: destination node <strong>MAC</strong> address.<br />

Submission page 194 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

i) CRC: CRC-32-IEEE 802.3 calculation. The complete ABLP_inf data is used, considering as 0 the CRC<br />

field.<br />

j) Tonemap Format: information about the format used in the Tonemap field.<br />

k) Tonemap: tonemap data. Tonemap data field shall be in the format set in Tonemap Format field.<br />

l) CS Format: information about the format used in the CS field.<br />

m) CS: cycle selection data. CS field shall be in the format set in the CS Format field.<br />

9.1.2.3.1 Tonemap format details<br />

Tonemap basic format is defined here. This format shall be used when Tonemap Format field value is set to 1<br />

(0x0001). Format description:<br />

- Tonemap sets the value for 1536 subcarriers.<br />

- Every subcarrier uses 4 bits to describe subcarrier bit-loading value.<br />

- Tonemap field length is 768 octects.<br />

- The first octet contains the first subcarrier (lowest frequency subcarrier) bit-loading value in the least<br />

significant bits <strong>and</strong> the second subcarrier bit-loading value in the more significant bits.<br />

- The second octet contains the third <strong>and</strong> fourth subcarrier bit-loading values; the third octet contains the fifth<br />

<strong>and</strong> sixth values, <strong>and</strong> so on.<br />

9.1.2.3.2 Cycle Selection details<br />

CS basic format is defined here. This format shall be used when CS Format field first octet is set to 1 (0x01). CS<br />

Format field second octet represents the number of octet pairs in the CS field. See Figure 72.<br />

Figure 72: CS Format field<br />

Therefore, CS field length is two times the Zone Count value. Each two octets define a part of the cycle when the<br />

tonemap can be used. The first octet represents the start <strong>and</strong> the second octet st<strong>and</strong>s for the end (both included).<br />

Start <strong>and</strong> end values shall be defined by a synchronized Q value (see 4.3.11).<br />

Submission page 195 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

9.1.2.4 ABLP_ack packet<br />

ABLP_ack packets shall be sent in HURTO mapping mode. ABLP_ack packets use the CCP with Type0 0x01 <strong>and</strong><br />

Type1 0x04. The packet format can be seen in Figure 75¡Error! No se encuentra el origen de la referencia..<br />

Figure 73: ABLP_ack packet<br />

ABLP_ack packets use 0x01139D000000 multicast address as destination <strong>MAC</strong> address.<br />

Source <strong>MAC</strong> is set to the ABLP_ack packet transmitter <strong>MAC</strong> address.<br />

The ABLP_ack data format is shown in Figure 74¡Error! No se encuentra el origen de la referencia..<br />

Description:<br />

Figure 74: ABLP_ack Data<br />

a) Remote Port: Remote Port assigned by the ABLP_ack packet transmitter to the link with the ABLP_ack<br />

packet destination node. May be the First or the Second Remote Port.<br />

b) TMI: acknowledged Tonemap ID.<br />

Submission page 196 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

c) Local Port: Local Port assigned by the ABLP_ack packet transmitter to the link with the ABLP_ack packet<br />

destination node.<br />

d) Sequence Number: acknowledged ABLP_inf packet sequence number.<br />

e) Dest <strong>MAC</strong>: destination node <strong>MAC</strong> address.<br />

9.1.3 <strong>Access</strong> Protocol<br />

<strong>Access</strong> protocol defines a protocol for connecting nodes in point-multipoint BPL networks within master-slave<br />

architecture.<br />

In this protocol we will define the way to establish a connection from a slave to a master of the network.<br />

Each master node may periodically send an access frame, as explained in 4.3.5, to the network, <strong>and</strong> wait for a<br />

response to add the responding slave to their own list <strong>and</strong> then start the AAA (Authorization – Authentication –<br />

Accounting) protocol to decide if the node is authorized to connect to the network via this master or not.<br />

On the other side, when a slave receives an access token it decides to reply or not with an access reply frame, as<br />

explained in 4.3.9.<br />

When a slave wants to send an access reply frame it must start a back-off period, as it is explained in 4.3.9. If no<br />

other access reply frame is detected during that period, the node may send an access reply frame.<br />

Once a master receives an access reply frame from a slave it must send an access protocol packet accepting or<br />

rejecting the slave.<br />

9.1.3.1 <strong>Access</strong> Protocol packet format<br />

This packet shall be sent from the master to a slave that sent <strong>and</strong> access reply frame, to indicate if the slave is<br />

accepted or not. The packet is formatted as an CCP packet <strong>and</strong> the structure is shown in Figure 75.<br />

The response contained in the packet can be of three different types:<br />

• ACCEPT: The slave node has been accepted<br />

• REJECT: The slave node has been rejected because the AAA process has resulted in rejection.<br />

• FAILED: The slave node has been rejected because the AAA process has failed <strong>and</strong> the master does<br />

not have enough information to accept or reject the node.<br />

The packet uses the CCP with Type0=0x03 <strong>and</strong> Type1=0x01.<br />

Submission page 197 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

In Figure 75 we can see the entire packet format:<br />

TPID<br />

0xAA<br />

0xAA<br />

0x03<br />

0x00<br />

0x13<br />

0x9D<br />

0x03<br />

0x01<br />

Slave <strong>MAC</strong><br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

TCI<br />

Submission page 198 UPA-OPERA<br />

Length<br />

Figure 75 <strong>Access</strong> protocol packet<br />

Master <strong>MAC</strong><br />

The packet is sent using the broadcast port (127). The value of the packet fields shall be:<br />

• Dest <strong>MAC</strong> is set 0x0180C2000000.<br />

• Src <strong>MAC</strong> is set to the master <strong>MAC</strong> address.<br />

• Slave <strong>MAC</strong> is set to the slave <strong>MAC</strong> address<br />

• Master <strong>MAC</strong> is set to the master <strong>MAC</strong> address<br />

• The Info field is 1 byte <strong>and</strong> can have the following values:<br />

o REJECT: 0x00<br />

o ACCEPT: 0x01<br />

o FAILED: 0x02<br />

9.1.3.2 Timing diagrams<br />

In the following timeline diagrams we will show the sequence of messages that can be produced in access protocol<br />

between master <strong>and</strong> slave <strong>and</strong> the messages sent.<br />

We will divide this section in different cases that can occur.<br />

Case 01: Master accepts Slave<br />

Info


4-June-07 P1901_PRO_016_r0<br />

ACCESS_TOKEN_SENT<br />

ACCESS_TOKEN_REPLY_RECEIVED<br />

AAA PROCESS STARTs<br />

SLAVE ACCEPTED<br />

ACCEPT_PACKET_SENT<br />

Case 02: A Master rejects a Slave<br />

MASTER SLAVE<br />

Figure 76 <strong>Access</strong> protocol: Master accepts Slave<br />

ACCESS_TOKEN_SENT<br />

ACCESS_TOKEN_REPLY_RECEIVED<br />

AAA PROCESS STARTs<br />

SLAVE REJECTED<br />

REJECT_PACKET_SENT<br />

MASTER SLAVE<br />

Figure 77 <strong>Access</strong> protocol: Master rejects Slave<br />

ACCESS_TOKEN_RECEIVED<br />

REPLY_ACCESS_TOKEN<br />

MASTER_REGISTRATION<br />

ACCESS PROTOCOL<br />

COMPLETED<br />

ACCESS_TOKEN_RECEIVED<br />

REPLY_ACCESS_TOKEN<br />

ACCESS PROTOCOL RESTART<br />

Case 03 Master rejects Slave due to different reasons from not acceptation (protocol has failed)<br />

Submission page 199 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Case 04: Slave response is lost<br />

ACCESS_TOKEN_SENT<br />

ACCESS_TOKEN_REPLY_RECEIVED<br />

AAA PROCESS STARTs<br />

SLAVE REJECTED<br />

FAILED_PACKET_SENT<br />

MASTER SLAVE<br />

Figure 78 <strong>Access</strong> protocol: registration failed<br />

ACCESS_TOKEN_SENT<br />

ACCESS_TOKEN_SENT<br />

SLAVE ACCEPTED<br />

ACCEPT_PACKET_SENT<br />

MASTER SLAVE<br />

ACCESS_TOKEN_RECEIVED<br />

REPLY_ACCESS_TOKEN<br />

ACCESS PROTOCOL RESTART<br />

ACCESS_TOKEN_RECEIVED<br />

REPLY_ACCESS_TOKEN<br />

ACCESS_TOKEN_RECEIVED<br />

REPLY_ACCESS_TOKEN<br />

MASTER_REGISTRATION<br />

ACCESS PROTOCOL<br />

COMPLETED<br />

Figure 79 <strong>Access</strong> protocol: Slave response is lost<br />

Case 05: Master acceptation packet is lost. Protocol starts again after expiring timers waiting for master reply.<br />

Submission page 200 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

ACCESS_TOKEN_SENT<br />

SLAVE ACCEPTED<br />

ACCEPT_PACKET_SENT<br />

ACCESS_TOKEN_SENT<br />

ACCESS_TOKEN_SENT<br />

SLAVE ACCEPTED<br />

ACCEPT_PACKET_SENT<br />

Case 06: Master accepts Slave 1. Slave 2 lost contention<br />

ACCESS_TOKEN_SENT<br />

SLAVE ACCEPTED<br />

ACCEPT_PACKET_SENT<br />

Case 07: Slave decides not to log in a Master<br />

MASTER SLAVE<br />

ACCESS_TOKEN_RECEIVED<br />

REPLY_ACCESS_TOKEN<br />

TIMEOUT<br />

ACCESS PROTOCOL RESTART<br />

ACCESS_TOKEN_RECEIVED<br />

REPLY_ACCESS_TOKEN<br />

MASTER_REGISTRATION<br />

ACCESS PROTOCOL<br />

COMPLETED<br />

Figure 80 <strong>Access</strong> protocol: Master acceptation packet is lost<br />

MASTER SLAVE 1<br />

MASTER_REGISTRATION<br />

ACCESS PROTOCOL<br />

COMPLETED<br />

Figure 81 <strong>Access</strong> protocol: two slaves contend<br />

SLAVE 2<br />

ACCESS_TOKEN_RECEIVED<br />

REPLY_ACCESS_TOKEN<br />

ACCESS PROTOCOL RESTART<br />

Submission page 201 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

9.1.4 Port Solver Protocol<br />

Figure 82 <strong>Access</strong> protocol: Slave decides not to log in a Master<br />

To allow data transmission from node A to node B a connection must be created between them. This connection<br />

will allow sending data between A <strong>and</strong> B.<br />

This connection is composed by two unidirectional links: one from A to B <strong>and</strong> another from B to A. These links are<br />

entries in the Port Solver Table (PST). That is, a connection between A <strong>and</strong> B is fully established when in A’s PST<br />

there is a complete entry (with all its data) regarding B, <strong>and</strong> in B’s PST there is a complete entry regarding A.<br />

The objective of the protocol is to complete the remote port (RP) field of the PST entries.<br />

9.1.4.1 Port Solver Table<br />

The Token Announce is used to know the transmitter. In the Token Announce, there is the <strong>MAC</strong> address of the<br />

transmitter. For more information about the Token Announce see 4.4.1.<br />

The way to identify the receiver at the transmitter side is with the Local Port. The Local Port is included in the<br />

Transmission Port field of the burst header. The transmitter may have up to two Local Ports to identify two flows<br />

between the transmitter <strong>and</strong> a single receiver. The second Local Port is intended to be used for multicast purposes.<br />

At the receiver side, the information in the Transmission Port field of the burst header will be the Remote Port. The<br />

relation between Remote Port <strong>and</strong> <strong>MAC</strong> address of transmitter in order to identify that it is the intended receiver<br />

shall be stored in a table (referred to as the Port Solver Table). To get more information about Burst Header see 5.2.<br />

Submission page 202 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The transmitter can send bursts to up to 119 ports. The correct range of Local Port is the following:<br />

- From 9 to 126 are possible Local Ports.<br />

- Port 127 is the Broadcast Port. All receivers have to receive the burst with Transmission Port equal to 127.<br />

The Port Solver Table has 118 entries <strong>and</strong> each entry has the following information:<br />

- <strong>MAC</strong> address of all transmitters that are visible for this node. The <strong>MAC</strong> address of the transmitter can be<br />

read in the received Token Announce<br />

- First Remote Port (RP1). The RP1 will be set to a default invalid value (0xFF) until the Port Solver Protocol<br />

takes place. The RP1 of transmitters that do not transmit data directly to this node (for instance, the RP1 of<br />

a CPE for another CPE) will keep the default value. This RP1 is intended to be used fro unicast<br />

communications.<br />

- Second Remote Port (RP2). The RP2 will be set to a default value (0xFF) until a Multicast message of the<br />

Port Solver Protocol containing the Local Port using by the multicast flow transmitter is received.(See<br />

9.1.4.3.2)<br />

- Local Port (LP)<br />

The Port Solver Table will have therefore completed entries (with a valid RP1) <strong>and</strong> incomplete entries (with a RP1<br />

equal to 0xFF). The RP2 is not taken into account to decide if an entry is completed or not. When receiving from a<br />

<strong>MAC</strong> address with a completed entry in the Port Solver Table, the receiver shall decode any burst with<br />

Transmission Port field in the burst header equal to:<br />

- The First Remote Port associated to this <strong>MAC</strong> address<br />

- The Broadcast Port.<br />

If RP2 is also completed in the entry, the receiver shall decode also any burst with Transmission Port in the burst<br />

header equal to:<br />

- The Second Remote Port associated to this <strong>MAC</strong> address<br />

When First Remote Port is using Mode ACK, the next sent ACK has ACK Port equal to Local Port.<br />

Second Remote Port does not support ACK mode.<br />

Port Solver Table entries are deleted if no TA is received from the corresponding <strong>MAC</strong> address during 60 seconds<br />

(ageing).<br />

9.1.4.1.1 Unicast Communication example<br />

The following example is useful to underst<strong>and</strong> the meaning of each field in the case of unicast communication<br />

between two nodes:<br />

Submission page 203 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

9<br />

Node A Node B<br />

Figure 83 Ports example<br />

To transmit a burst from A to B, the Transmission Port field is equal to 9.<br />

To transmit a burst from B to A, the Transmission Port field is equal to 15.<br />

In B the Port Solver Table has the following entry:<br />

• <strong>MAC</strong> address equal to A <strong>MAC</strong> address<br />

• Local Port equal to 15.<br />

• First Remote Port equal to 9.<br />

In A the Port Solver Table has the following entry:<br />

• <strong>MAC</strong> address equal to B <strong>MAC</strong> address<br />

• Local Port equal to 9.<br />

• First Remote Port equal to 15.<br />

The first remote port exchange process is described in section 9.1.4.2.<br />

9.1.4.1.2 Multicast Communication example<br />

The second remote port is intended to support native multicast using BPL by means of identify a physical unique<br />

link that will have its own tonemap <strong>and</strong> particular management, as described in section 9.1.2.1<br />

In the following draw, node A has three links stablished. First one is a unicast link with node B, second another<br />

unicast link with node C <strong>and</strong> finally, a multicast link with nodes B <strong>and</strong> C. The local reference in node A for each of<br />

the links is its assigned Local Port, in this case 9, 10 <strong>and</strong> 12 respectively.<br />

Submission page 204 UPA-OPERA<br />

15


4-June-07 P1901_PRO_016_r0<br />

12<br />

12<br />

9<br />

Node A Node B<br />

10<br />

Figure 84: Native Multicast example<br />

In Node A the Port Solver Table has the following entries:<br />

• <strong>MAC</strong> address equal to Node B <strong>MAC</strong> address<br />

• Local Port equal to 9<br />

• Remote Port 1 equal to 15<br />

• <strong>MAC</strong> address equal to Node C <strong>MAC</strong> address<br />

• Local Port equal to 10<br />

• Remote Port 1 equal to 14<br />

In Node B the Port Solver Table will have the following entry:<br />

• <strong>MAC</strong> address equal to Node A <strong>MAC</strong> address<br />

• Local Port equal to 15<br />

• Remote Port 1 equal to 9<br />

• Remote Port 2 equal to 12<br />

In Node C the Port Solver Table will have the following entry:<br />

• <strong>MAC</strong> address equal to Node A <strong>MAC</strong> address<br />

Node C<br />

Submission page 205 UPA-OPERA<br />

15<br />

14


4-June-07 P1901_PRO_016_r0<br />

• Local Port equal to 14<br />

• Remote Port 1 equal to 10<br />

• Remote Port 2 equal to 12<br />

When a burst with a Transmission Port field set to 12 is sent by Node A will be demodulated by Node B <strong>and</strong> Node<br />

C using the tonemap for the second port, which will be common for Node B <strong>and</strong> Node C in the reception. (See<br />

section 9.1.2) This way, the information will be sent only once.<br />

9.1.4.2 First Port exchange process<br />

The first port (RP1) exchange process is only executed between the master <strong>and</strong> the corresponding slaves. The<br />

protocol is always started by the master, after completion of the access protocol. The slave node cannot send the<br />

port solver message because it needs the token to transmit any packet, <strong>and</strong> to recognize that the token is addressed<br />

to it, it must know its RP1 with the master; that is, it has to complete the entry in its PST correspondent to the <strong>MAC</strong><br />

address of its master.<br />

To complete all the fields of an entry correspondent to a given <strong>MAC</strong> address, the first remote transmission port<br />

must be communicated by the node with that <strong>MAC</strong> address. A h<strong>and</strong>-shake protocol is used.<br />

The node that wants to complete the entry sends a Port Solver Message (PSM) addressed to the <strong>MAC</strong> address of the<br />

PST entry. When a node receives a PSM, it answers with another PSM (Figure 85). The main contents of the PSM<br />

are the LP <strong>and</strong> the flag field. The flag field is set to zero by default. The flag field must be set to 1 when a PSM is<br />

received <strong>and</strong> the correspondent entry is already completed (Figure 87). A received PSM with this flag set to 1 will<br />

not require an answer.<br />

Node A Node B<br />

Node B entry added<br />

Entry: (<strong>MAC</strong> B, LP 3, RP1 -)<br />

Entry: (<strong>MAC</strong> B, LP 3, RP1 5)<br />

PSM(LP 3, 0)<br />

PSM(LP 5, 1)<br />

Node A entry added<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 -)<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3)<br />

Figure 85 Port Solver Protocol Messages Exchange to complete First remote Port<br />

If a response to PSM is not received, the entry will not be completed <strong>and</strong> a new PSM must be sent (Figure 86,<br />

Figure 87). There is a minimum time between PSM retransmissions. If the entry remains in the PST, the protocol<br />

must be followed until its success.<br />

Submission page 206 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 86 Port Solver Protocol Messages Exchange to complete First remote Port<br />

Submission page 207 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Node A Node B<br />

Node B entry added<br />

Entry: (<strong>MAC</strong> B, LP 3, RP1 -)<br />

Entry: (<strong>MAC</strong> B, LP 3, RP1 -)<br />

Entry: (<strong>MAC</strong> B, LP 3, RP1 5)<br />

PSM(LP 3, 0)<br />

PSM(LP 3, 0)<br />

PSM(LP 3, 0)<br />

PSM(LP 5, 1)<br />

PSM(LP 3, 0)<br />

PSM(LP 5, 1)<br />

Node A entry added<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 -)<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3)<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3)<br />

Figure 87 Port Solver Protocol Messages Exchange to complete First remote Port<br />

Every time a PSM is received, the correspondent entry in the PST must be updated because the first remote port can<br />

change.<br />

Every time the LP is changed, the RP1 must be set to an invalid value <strong>and</strong> the protocol started.<br />

9.1.4.3 Second Port exchange process<br />

The second port (RP2) exchange process is only executed when the unicast link between origin <strong>and</strong> destination of<br />

multicast flow has been previously established. The protocol is always started by the origin of the multicast flow,<br />

that, through higher level exchange of packets, respond to the petition of inclusion or exclusion of certain node,<br />

identified by the Local Port assigned to the previously established unicast link, into a multicast flow, identified by a<br />

Local Port in the traffic origin.The response will be to trigger the Second Port (RP2) exchange process.<br />

The origin of the multicast flow wil send a Posrt Solver Multicast Message (PSMM) addressed to the <strong>MAC</strong> address<br />

of the destination of the multicast flow. When a node receives a PSMM, it answers with a Port Solver Multicast<br />

ACK Message (PSMAM) to acknowledge the reception of the Local Port assigned in the transmission side to the<br />

Submission page 208 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

multicast flow desired, <strong>and</strong> the RP2 (Second Remote Port) field of the entry indexed by the multicast origin <strong>MAC</strong><br />

will be filled with this number.<br />

Since this time, when receiving from a <strong>MAC</strong> address with a entry that contains RP1 <strong>and</strong> RP2 in the Port Solver<br />

Table, the receiver shall decode any burst with Transmission Port field in the burst header equal to RP1 <strong>and</strong> RP2.<br />

The main contents of the PSMM are the LP assigned in the origin of the multicast flow <strong>and</strong> the flag field. The flag<br />

field is set to zero by default. A received PSMM with this flag set to 1 shall not require an answer.<br />

Node A Node B<br />

Node B wants to join<br />

multicast flow<br />

With LP associated 12<br />

Node B will receive data<br />

transmitted by port 3 <strong>and</strong> port<br />

12 from Node A<br />

PSMM(LP 12, 0)<br />

PSMAM<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 -)<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 12)<br />

Figure 88 Port Solver Protocol Messages Exchange to complete Second remote Port<br />

Submission page 209 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Node A Node B<br />

Node B wants to join<br />

multicast flow<br />

With LP associated 12<br />

Node B will receive data<br />

transmitted by port 3 <strong>and</strong><br />

port 12 from Node A<br />

PSMM(LP 12, 0)<br />

PSMM(LP 12, 0)<br />

PSMM(LP 12, 0)<br />

PSMM(LP 12, 0)<br />

PSMAM<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 -)<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 12)<br />

Figure 89: Port Solver Protocol Messages Exchange to complete Second remote Port<br />

Node A Node B<br />

Node B wants to join<br />

multicast flow<br />

With LP associated 12<br />

Node B will receive data<br />

transmitted by port 3 <strong>and</strong> port<br />

12 from Node A<br />

PSMM(LP 12, 0)<br />

PSMM(LP 12, 0)<br />

PSMM(LP 12, 0)<br />

PSMAM<br />

PSMM(LP 12, 0)<br />

PSMAM<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 -)<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 12)<br />

Figure 90: Port Solver Protocol Messages Exchange to complete Second remote Port<br />

If a response to PSMM is not received, Node A will not known is Node B is in the group or not, <strong>and</strong> a Time Out is<br />

done in the transmitter to send again the PSMM.<br />

Submission page 210 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

In the case of leaving a group, the protocol messages exchange will be the same, but replacing the LP associated by<br />

an invalid identifier (0xFF), as can be seen in the following figure:<br />

Node A Node B<br />

Node B wants to leave<br />

multicast flow<br />

With LP associated 12<br />

Node B will receive data<br />

transmitted only by port 3<br />

from Node A<br />

PSMM(LP 0xFF, 0)<br />

PSMAM<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 12)<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 -)<br />

Figure 91: Port Solver Protocol Exchange to delete Second Remote Port<br />

Node A Node B<br />

Node B wants to leave<br />

multicast flow<br />

With LP associated 12<br />

Node B will receive data<br />

transmitted only by port 3<br />

from Node A<br />

PSMM(LP 0xFF, 0)<br />

PSMM(LP 0xFF, 0)<br />

PSMM(LP 0xFF, 0)<br />

PSMM(LP 0xFF, 0)<br />

PSMAM<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 12)<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 -)<br />

Figure 92 Port Solver Protocol Messages Exchange to delete Second Remote Port<br />

Submission page 211 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Node A Node B<br />

Node B wants to leave<br />

multicast flow<br />

With LP associated 12<br />

Node B will receive data<br />

transmitted only by port 3<br />

from Node A<br />

PSMM(LP 0xFF, 0)<br />

PSMM(LP 0xFF, 0)<br />

PSMM(LP 0xFF, 0)<br />

PSMAM<br />

PSMM(LP 0xFF, 0)<br />

PSMAM<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 12)<br />

Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />

RP2 -)<br />

Figure 93: Port Solver Protocol Messages Exchange to delete Second Remote Port<br />

Every time a PSMM is received, the correspondent entry of RP2 in the PST must be updated.<br />

Every time the LP is changed, the RP2 must be set to an invalid value <strong>and</strong> the protocol started.<br />

9.1.4.3.1 Port Solver Packet format<br />

The PSM is encapsulated using the CCP with Type0 0x02 <strong>and</strong> Type1 0x01 (Figure 94). The Port Solver packet will<br />

be sent through broadcast port 127.<br />

TPID<br />

0xAA<br />

0xAA<br />

0x03<br />

0x00<br />

0x13<br />

0x9D<br />

0x02<br />

0x01<br />

Length<br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

TCI<br />

Figure 94 Port solver packet<br />

Port Solver Protocol Data<br />

Submission page 212 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Destination <strong>MAC</strong> must be the STP multicast address (0x0180C2000000) because PSMs are exchanged prior to the<br />

STP protocol. The packet shall be transmitted using the broadcast port (127). The PSM data fields are:<br />

Bytes PSM data fields Length<br />

0 – 5 Source <strong>MAC</strong> 6 bytes<br />

6 – 11 Destination <strong>MAC</strong> 6 bytes<br />

12 Assigned LP 1 byte<br />

13 Info 1 byte<br />

Table 24 Port solver packet fields<br />

The format of the Info field is depicted in ¡Error! No se encuentra el origen de la referencia.:<br />

Figure 95 Info field format<br />

Bits number 1 to 4 are devoted to set the message type of the Capability Exchange Protocol (See section 0)<br />

9.1.4.3.2 Port Solver Multicast Message (PSMM) format<br />

The PSMM is encapsulated using the CCP with Type0 0x02 <strong>and</strong> Type1 0x03 (Figure 94). The Port Solver Multicast<br />

Message will be sent through broadcast port 127.<br />

Submission page 213 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 96 Port solver Multicast Message<br />

Destination <strong>MAC</strong> must be the STP multicast address (0x0180C2000000) because PSMMs are exchanged prior to<br />

the STP protocol. The packet shall be transmitted using the broadcast port (127). The PSMM data fields are:<br />

Bytes PSM data fields Length<br />

0 – 5 Source <strong>MAC</strong> 6 bytes<br />

6 – 11 Destination <strong>MAC</strong> 6 bytes<br />

12 Assigned Multicast LP 1 byte<br />

13 Info 1 byte<br />

Table 25 Port solverMulticast Message fields<br />

The format of the Info field is depicted in ¡Error! No se encuentra el origen de la referencia.:<br />

Figure 97 Info field format<br />

Bits number 1 to 4 are devoted to set the message type of the Capability Exchange Protocol (See section 0)<br />

Submission page 214 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

9.1.4.3.3 Port Solver Multicast Acknowledge Message (PSMAM) format<br />

The PSMAM is encapsulated using the CCP with Type0 0x02 <strong>and</strong> Type1 0x04 (Figure 94). The Port Solver<br />

Multicast Message will be sent through broadcast port 127.<br />

Figure 98 Port solver ACK Multicast Message<br />

Destination <strong>MAC</strong> must be the STP multicast address (0x0180C2000000) because PSMAMs are exchanged prior to<br />

the STP protocol. The packet shall be transmitted using the broadcast port (127). The PSMAM data fields are:<br />

Bytes PSM data fields Length<br />

0 – 5 Source <strong>MAC</strong> 6 bytes<br />

6 – 11 Destination <strong>MAC</strong> 6 bytes<br />

12 Acknowledged Multicast<br />

LP<br />

1 byte<br />

13 Info 1 byte<br />

Table 26 Port solverMulticast Message fields<br />

The format of the Info field is depicted in ¡Error! No se encuentra el origen de la referencia.:<br />

Submission page 215 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 99 Info field format<br />

Bits number 1 to 4 are devoted to set the message type of the Capability Exchange Protocol (See section 0)<br />

9.1.4.4 Periodic publication of Port Solver information<br />

Each Announce Time period (30 seconds) each node sends an Announce Message (AnM) publishing Port Solver<br />

information. This message contains a list with pairs of values (entry <strong>MAC</strong> address <strong>and</strong> assigned LP).<br />

Upon the reception of an AnM, the PST shall be modified in the following cases:<br />

• The sender <strong>MAC</strong> address is in a completed entry of the PST <strong>and</strong> the AnM LP value associated to the node<br />

<strong>MAC</strong> address is different from the PST RP value associated to the sender <strong>MAC</strong> address � the RP shall be<br />

updated (see Figure 100)<br />

• The sender <strong>MAC</strong> address is in the PST but the <strong>MAC</strong> address of the node is not in the AnM � Set PST RP<br />

value associated to the sender <strong>MAC</strong> address to 0xFF (see Figure 101)<br />

• The sender <strong>MAC</strong> address is in a incomplete entry of the PST, <strong>and</strong> the sender is either slave or master of the<br />

receiving node � the RP shall be updated<br />

AnM from A<br />

<strong>MAC</strong> D LP 11<br />

<strong>MAC</strong> C LP 10<br />

<strong>MAC</strong> B LP 9<br />

PST in C<br />

Rx AnM from A<br />

<strong>MAC</strong> A LP 11<br />

<strong>MAC</strong> D LP 10<br />

<strong>MAC</strong> B LP 9<br />

RP 12 10<br />

Submission page 216 UPA-OPERA<br />

C<br />

RP 255<br />

RP 255<br />

Figure 100 Announce Messages


4-June-07 P1901_PRO_016_r0<br />

AnM from A<br />

<strong>MAC</strong> D LP 11<br />

<strong>MAC</strong> E LP 10<br />

<strong>MAC</strong> B LP 9<br />

PST in C<br />

This message does not require any acknowledgement.<br />

9.1.4.4.1 Announce message format<br />

Rx AnM from A<br />

<strong>MAC</strong> A LP 11<br />

<strong>MAC</strong> D LP 10<br />

<strong>MAC</strong> B LP 9<br />

RP 12 255<br />

Submission page 217 UPA-OPERA<br />

C<br />

RP 255<br />

RP 255<br />

Figure 101 Announce Messages<br />

The Announce Message is encapsulated using the CCP with Type0 0x02 <strong>and</strong> Type1 0x02 (Figure 102). The<br />

Announce Message packet will be sent through broadcast port 127.<br />

TPID<br />

0xAA<br />

0xAA<br />

0x03<br />

0x00<br />

0x13<br />

0x9D<br />

0x02<br />

0x02<br />

Length<br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

TCI<br />

Figure 102 Announce packet format<br />

Destination <strong>MAC</strong> must be the STP multicast address (0x0180C2000000).<br />

Announce Message Data<br />

The PST can be fragmented in several AnMs (identified by a sub-table number) if the entries do not fit in one.<br />

The AnM data fields are:


4-June-07 P1901_PRO_016_r0<br />

Bytes AnM data fields Length<br />

0 Sub-table number 1 bytes<br />

1 Number of sub-tables 1 bytes<br />

2 Number of entries of the sub-table 1 byte<br />

3 - 8 Sender <strong>MAC</strong> address 6 byte<br />

9 Entry size 1 byte<br />

10 - 521 Entries 512 bytes<br />

Maximum<br />

The Table data is a list of consecutive pairs in the form:<br />

9.1.4.5 Capabilities Exchange protocol<br />

9.1.4.5.1 Overview<br />

Table 27 Announce message fields<br />

Entry fields Length<br />

<strong>MAC</strong> address 6 bytes<br />

LP 1 byte<br />

Table 28 Announce message entries<br />

In a BPL cell, nodes shall coexist with different capabilities <strong>and</strong> with other nodes from diverse vendors. Besides,<br />

they shall be able to communicate with each other, regardless their differences.<br />

The Capabilities Exchange protocol is a mechanism to exchange information about node capabilities. Every node in<br />

the BPL network shall know the capabilities of each node that has negotiated BPL ports with it.<br />

Submission page 218 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

However, the processing of such information in order to negotiate the best possible features used in the<br />

communications network is beyond the aim of this protocol.<br />

From the point of view of packet format <strong>and</strong> message exchange, this protocol is an extension of the Port Solver<br />

protocol (PSP). It uses reserved fields in Port Solver Messages (PSMs) to place node capabilities information, <strong>and</strong><br />

shall not prevent the ordinary working of the PSP protocol. Some additions shall be applied to the PSM exchange<br />

mechanism in order to fulfill the features of the Capabilities Exchange protocol.<br />

The Capabilities Exchange protocol shall be flexible enough, not only to provide the exchange of specific<br />

capabilities from different vendors, but also to allow the exchange of a st<strong>and</strong>ard set of minimum capabilities<br />

common for all vendors. Moreover, it shall be easily extensible to include new capabilities, which shall not prevent<br />

backwards compatibility.<br />

This protocol should be efficient, regarding the channel use, to minimize the impact of the overhead of the protocol<br />

in the application data throughput of the whole network.<br />

9.1.4.5.2 Protocol<br />

The protocol is composed by two main stages:<br />

• First stage: Two nodes shall exchange the information about the maximum capabilities they can perform<br />

<strong>and</strong> the capabilities they are running at that time. In this stage, it is used an ACK-based protocol whose<br />

objective is to fill two local tables in each node indexed by <strong>MAC</strong> address:<br />

o Node Capability Table (NCT): It shall contain the maximum capabilities of each known node.<br />

o Performed Capability Table (PCT): It shall contain the capabilities that each known node is running<br />

at that time.<br />

The implementation of these two tables should be done in a single table with the contents described in<br />

section 0 <strong>and</strong> 0. The two tables are divided into four sections:<br />

o Common capabilities<br />

o Chip related capabilities<br />

o Reference Design related capabilities<br />

o Firmware related capabilities<br />

The first section (Common) shall be common for all systems, independent of the vendor. The last three ones<br />

(Chip, Reference Design <strong>and</strong> Firmware related) shall depend on the vendor. The maximum number of<br />

entries of each section shall be 64, with an unlimited size per entry.<br />

• Second stage: It shall take place only if the running capabilities of a node change. This node shall indicate<br />

all nodes the new capabilities that it is performing at that time. This second stage may be either ACK-based<br />

or not, with a first information message <strong>and</strong> a received ACK from the destination, depending on the content<br />

of the ACK expected field. If it is 1, an ACK is expected. If not, no ACK is expected from the receiver.<br />

9.1.4.5.3 Messages<br />

Submission page 219 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

One of the two possible schemes explained below can be used to send the vendor dependent information within the<br />

maximum capabilities messages (MAX_CAP_MSG(xxx)):<br />

• Indexed scheme: Only the vendor related information shall be sent, <strong>and</strong> the maximum capabilities shall be<br />

inferred by the receiver. As a result, less data shall be transferred by the Capabilities Exchange protocol,<br />

minimizing the overhead.<br />

• Enumerated scheme: Node vendor <strong>and</strong> capabilities shall be sent as an enumeration.<br />

In case a node does not underst<strong>and</strong> the indexed scheme, it shall send a NACK to the sender in response. In any case,<br />

the common capabilities section is always sent in the message using an enumerated scheme.<br />

The information within the running capabilities messages (RUN_CAP_MSG) shall be sent in a different way. First,<br />

a field containing the default mode shall be sent. This field shall indicate what shall be the value for a running<br />

capability that is not sent in the message. The possible values can be two:<br />

• Maximum capability.<br />

• Minimum capability.<br />

Once the default field content is clear, the running capabilities that do not match with this default value shall be sent<br />

using a group of two fields. The first one shall indicate the position of the capability in the NCT, <strong>and</strong> the second<br />

one, its value. In addition to the information itself, a message mode shall be filled, indicating whether the node has<br />

changed its running capabilities, or it is a simply information message to the others nodes.<br />

9.1.4.5.3.1 Capability Element (CapE)<br />

A capability element is a structure composed by several <strong>and</strong> variable number of fields. All protocol messages are<br />

built using this structure. Four can be the protocol messages to be composed:<br />

• MAX_CAP_MSG(xxx): This message shall contain the maximum capabilities that a node can perform. It<br />

shall be divided into two main sections. The first one is the common capabilities section, which includes all<br />

these capabilities that are vendor independent, <strong>and</strong> have been previously approved by all vendors as a<br />

st<strong>and</strong>ard. The second one is the vendor capabilities section that shall be divided into three subsections.<br />

Either these subsections can be transmitted entirely (enumerated scheme) or sent using only an index<br />

(indexed scheme), enough for the receiver to underst<strong>and</strong> all the capabilities related to each subsection. In<br />

this case, the indication (xxx) shall be substituted by a 1 in the position relative to each of the subsections.<br />

That is, if only the Chip related capabilities are sent using the index, the indication becomes (100). The<br />

subsections are the following:<br />

o Chip related capabilities: All the capabilities that depend directly on the chip. If sent by index, it<br />

shall be indicated with a 1 in the first position of the index indicator. A list of Chip related<br />

capabilities is presented in section 0.<br />

o Firmware related capabilities: All the capabilities that depend on the Firmware version. If sent by<br />

index, it shall be indicated with a 1 in the second position of the index indicator. A list of Firmware<br />

related capabilities is presented in section 0.<br />

o Reference Design related capabilities: All the capabilities that depend on the Reference Design. If<br />

sent by index, it shall be indicated with a 1 in the third position of the index indicator. A list of<br />

Reference Design related capabilities is presented in section 0.<br />

• RUN_CAP_MSG: In this message, the running but not the maximum capabilities of the node shall be sent.<br />

Its objective is to fill the PCT. The first field shall notate the transmission mode, where the nature of the<br />

message, if it is a simply informational message or includes a notification of change in the running<br />

Submission page 220 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

capabilities, is transmitted. A second field telling the default value for the running capabilities that are not<br />

explicitly indicated in the message shall be sent. This default value can be the highest possible capability of<br />

the node or the lowest possible one. Then, the position of the capability in the NCT using a section indicator<br />

(Common, Chip, Firmware or Reference Design subsection) followed by the position of the capability in<br />

the section of the NCT shall be sent, associated with a value for this capability, that shall be wrote in the<br />

PCT.<br />

• ACK_CAP_ANN: Acknowledge of all sections of a MAX_CAP_MSG (xxx) message <strong>and</strong> also a previous<br />

RUN_CAP_MSG if they were sent with the ACK expected field set to 1. A sender cannot send two<br />

messages that expect two different ACKs. If a composed message with a MAX_CAP_MSG(xxx) <strong>and</strong> a<br />

RUN_CAP_MSG is sent, only an ACK_CAP_ANN shall be expected. If the sender decides to send both<br />

messages separately, first it shall expect the ACK_CAP_ANN for the MAX_CAP_MSG(xxx); <strong>and</strong> then, it<br />

shall transmit the RUN_CAP_MSG <strong>and</strong> expect another ACK_CAP_ANN for it. If some section of the<br />

MAX_CAP_MSG has not been correctly decoded, i.e. the index is not recognized by the destination node,<br />

(<strong>and</strong> cannot fill the NCT using only this data) then the message sent in response shall be a<br />

NACK_CAP_ANN (xxx) instead, with a 1 in the non-correctly decoded section.<br />

• NACK_CAP_ANN(xxx): One or more sections of the MAX_CAP_MSG(xxx) section sent by index have<br />

not been recognized by the receptor, because no index found, or table structure not known.<br />

Each type of Capabilities Exchange protocol message shall be identified by a field called MSG_TYPE. Please refer<br />

to section 0 for further details on this issue.<br />

Those messages can be composed encapsulating several of them into one Port Solver Message (PSM); therefore it is<br />

saved some overhead due to protocol encapsulation.<br />

Each one of the messages <strong>and</strong> how to compose them is discussed in the following subsections.<br />

9.1.4.5.3.2 MAX_CAP_MSG message<br />

This message shall begin with one field devoted to indicate the number of sets of maximum capabilities that are sent<br />

in the message.<br />

Depending on the decision performed in the node, it shall transmit the MAX_CAP_MSG message with either its<br />

maximum capabilities only (Single Node Publication) or the maximum capabilities of all the nodes it knows (All<br />

Known Nodes Publication). Although only the Single Node Publication method should be used, it is also possible to<br />

use the All Known Nodes Publication method.<br />

In the first case (Single Node Publication), this field shall be set to 1, <strong>and</strong> in the second case (All Known Nodes<br />

Publication), it shall be set to the number of known nodes with a complete filled NCT plus one.<br />

Submission page 221 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The second section shall include the data themselves <strong>and</strong> can contain the maximum capabilities of either one or<br />

several nodes.<br />

Each set of maximum capabilities shall be preceded by the <strong>MAC</strong> address of the node that can perform this set of<br />

capabilities.<br />

The different maximum capabilities that can be present in a BPL cell shall be divided into two different groups:<br />

• Common capabilities (vendor independent capabilities)<br />

• Vendor dependent capabilities<br />

Common capabilities shall be always sent in the messages. They are sent by means of a variable-length set of fields,<br />

whose contents <strong>and</strong> meaning will be determined by the protocol.<br />

The vendor dependent capabilities shall be divided themselves in capabilities associated with:<br />

• Chip version.<br />

• Reference design.<br />

• Firmware.<br />

Common capabilities shall not require a division among chip, firmware or reference design related capabilities,<br />

because these capabilities shall be the same for all types of nodes <strong>and</strong> vendors.<br />

On the other h<strong>and</strong>, vendor dependent capabilities shall be divided into the three described sections, because a<br />

solution may present different vendors for each part of the system; one vendor for the chip, other for the firmware<br />

<strong>and</strong> a third one for the reference design, <strong>and</strong> each vendor may sent its own information inside the vendor dependent<br />

section.<br />

The Maximum Capabilities section of the MAX_CAP_MSG message shall follow this division also, with two main<br />

sections, where the first one shall be the common capabilities section <strong>and</strong> the second one the vendor dependent<br />

section.<br />

The common capabilities section shall be simply composed by a first field of length in bytes, <strong>and</strong> a second variablelength<br />

field that shall include the fields that will be determined by the protocol. There are up to 64 entries in the<br />

NCT <strong>and</strong> PCT for common capabilities.<br />

The vendor dependent capabilities section shall be subdivided into three main subsections: Chip, Reference Design<br />

<strong>and</strong> Firmware. For each subsection, two possible schemes of sending capabilities shall be allowed: Indexed <strong>and</strong><br />

Enumerated.<br />

When using the Indexed scheme, it is only required to send a part of sender’s NCT to fill the entire NCT in the<br />

receiver.<br />

The second one shall be simply an enumeration of each of the capabilities that a node has.<br />

Submission page 222 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

An indexed section shall be simply an enumeration covering only the minimum possible set of capabilities. This<br />

minimum set shall depend on the vendor. The proposed set is the following:<br />

Section Set of capabilities to be an index<br />

Chip Chip Vendor<br />

Chip Version<br />

Reference Design RD Vendor<br />

RD Family<br />

RD Version<br />

Firmware FW Vendor<br />

FW Family<br />

FW Version<br />

Table 29 Proposed vendor dependent capabilities indexes<br />

As the vendor may be different for each section, it shall be indicated in each of the sections.<br />

The number of enumerated capabilities may change from node to node depending on the version of each one, but<br />

the capabilities order shall remain the same.<br />

The following figure presents an example of Maximum Capabilities section, where N sets of capabilities are sent.<br />

Inside each set, the three sections described below can be found, <strong>and</strong>, in this example, the enumerated mode is used,<br />

containing all the proposed fields. The common section is empty, because the contents <strong>and</strong> meaning of its fields are<br />

not determined yet. As a result, the length_of the common field is set to 0:<br />

Submission page 223 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

MSG_TYPE = 0x1<br />

#CAPSET = N<br />

L<strong>MAC</strong>_SET<br />

LENGTH_COMMON_SET<br />

COMMON_CAP_1<br />

COMMON_CAP_2<br />

…<br />

COMMON_CAP_i<br />

LENGTH_CHIP_SET<br />

CHIP_VENDOR<br />

CHIP_CAP_1<br />

CHIP_CAP_2<br />

…<br />

CHIP_CAP_j<br />

Figure 103 MAX_CAP_MSG structure for N sets using enumerated mode<br />

In the following table, each field of the message is described:<br />

LENGTH_RD_SET<br />

RD_VENDOR<br />

RD_CAP_1<br />

RD_CAP_2<br />

…<br />

RD_CAP_k<br />

LENGTH_FW_SET<br />

FW_VENDOR<br />

FW_CAP_1<br />

Field Name Length (in<br />

bytes)<br />

FW_CAP_2<br />

…<br />

FW_CAP_l<br />

Default<br />

Value<br />

Submission page 224 UPA-OPERA<br />

L<strong>MAC</strong>_SET<br />

LENGTH_COMMON_SET<br />

COMMON_CAP_1<br />

Description<br />

COMMON_CAP_2<br />

…<br />

COMMON_CAP_i<br />

LENGTH_CHIP_SET<br />

MSG_TYPE 1 0x1 MAX_CAP_MSG message<br />

#CAP_SET 1 1 Number of capabilities sets included<br />

in this message<br />

L<strong>MAC</strong>_SET 6 - <strong>MAC</strong> address of the node that can<br />

perform the capabilities described in<br />

the message<br />

LENGTH_COMMON 1 0 Length of the common capabilities<br />

section. Set to 0 until the common<br />

capabilites are determined by the<br />

protocol.<br />

COMMON_CAP_i - - Common capabilities. To be<br />

determined.<br />

LENGTH_CHIP 1 1 Number of bytes, excluding the<br />

LENGTH_CHIP field that are<br />

included in the CHIP section of the<br />

message<br />

CHIP_VENDOR 1 - Chip vendor. To be determined.<br />

CHIP_CAP_j - - Other Chip related capabilities<br />

(vendor dependent). To be<br />

CHIP_VENDOR<br />

CHIP_CAP_1<br />

CHIP_CAP_2<br />

…<br />

CHIP_CAP_j<br />

LENGTH_RD_SET<br />

RD_VENDOR<br />

RD_CAP_1<br />

RD_CAP_2<br />

…<br />

RD_CAP_k<br />

LENGTH_FW_SET<br />

FW_VENDOR<br />

FW_CAP_1<br />

FW_CAP_2<br />

…<br />

FW_CAP_l


4-June-07 P1901_PRO_016_r0<br />

determined.<br />

LENGTH_RD 1 1 Number of bytes, excluding the<br />

LENGTH_RD field that are<br />

included in the REFERENCE<br />

DESIGN section of the message<br />

RD_VENDOR 1 - Reference Design vendor. To be<br />

determined.<br />

RD_CAP_k - - Other Reference Design related<br />

capabilities (vendor dependent). To<br />

be determined.<br />

LENGTH_FW 1 1 Number of bytes, excluding the<br />

LENGTH_FW field that are<br />

included in the FIRMWARE<br />

section of the message<br />

FW_VENDOR 1 - Firmware vendor. To be<br />

determined.<br />

FW_CAP_l - - Other Firmware related capabilities<br />

(vendor dependent). To be<br />

determined.<br />

Table 30 MAX_CAP_MSG message fields<br />

In the following figure, an example of transmission of N sets of maximum capabilities using indexed scheme in all<br />

three sections is shown. It should be kept in mind that the indexed scheme can be set individually to each section<br />

<strong>and</strong> set, <strong>and</strong> that is applied only to the vendor dependent sections.<br />

1 byte<br />

MSG_TYPE = 0x1<br />

#CAPSET = N<br />

L<strong>MAC</strong>_SET<br />

LENGTH_COMMON_SET<br />

COMMON_CAP_1<br />

Maximum Capabilities of Set 1 Maximum Capabilities of Set N<br />

COMMON_CAP_2<br />

…<br />

COMMON_CAP_i<br />

LENGTH_CHIP_SET<br />

CHIP_VENDOR<br />

CHIP_VERSION<br />

LENGTH_RD_SET<br />

RD_VENDOR<br />

RD_FAMILY<br />

RD_VERSION<br />

LENGTH_FW_SET<br />

FW_VENDOR<br />

FW_FAMILY<br />

FW_VERSION<br />

Figure 104 Example of Maximum Capabilities exchange using the indexed shceme for every subsection<br />

Submission page 225 UPA-OPERA<br />

L<strong>MAC</strong>_SET<br />

LENGTH_COMMON_SET<br />

COMMON_CAP_1<br />

COMMON_CAP_2<br />

…<br />

COMMON_CAP_i<br />

LENGTH_CHIP_SET<br />

CHIP_VENDOR<br />

CHIP_VERSION<br />

LENGTH_RD_SET<br />

RD_VENDOR<br />

RD_FAMILY<br />

RD_VERSION<br />

LENGTH_FW_SET<br />

FW_VENDOR<br />

FW_FAMILY<br />

FW_VERSION


4-June-07 P1901_PRO_016_r0<br />

RUN_CAP_MSG message<br />

This message shall contain information about the capabilities that a node is running at that time. Additionally, by<br />

means of the MESSAGE_MODE field, a change of previous sent running capabilities can be indicated. Four are the<br />

supported message modes that apply only to a running capabilities set from a concrete node:<br />

Info mode with ACK: Indicates that the following sections contain information about the maximum <strong>and</strong> running<br />

capabilities, <strong>and</strong> that an ACK is required for this message.<br />

Info mode without ACK: Indicates that the following sections contain information about the maximum <strong>and</strong> running<br />

capabilities, <strong>and</strong> that NO ACK is required for this message.<br />

Change Mode with ACK: Indicates that the running capabilities have changed <strong>and</strong> are sent in the following section.<br />

An ACK of this message is expected by the sender.<br />

Change Mode without ACK: Indicates that the running capabilities have changed <strong>and</strong> are sent in the following<br />

section. No ACK of this message is expected by the sender.<br />

The running capabilities are transmitted by means of a field that indicates what is the default value for the<br />

capabilities that are not included explicitly in this message (highest possible capability of the node or lower possible<br />

capability of the node), <strong>and</strong> several two fields groups where the first one is a reference to a capability in the NCT<br />

(including section <strong>and</strong> position) <strong>and</strong> the second field is the value related to this capability. The number of groups<br />

describing each of the running capabilities that are different from the default value shall be set in the<br />

NUM_RUN_CAP field.<br />

If a value for a capability is longer than a byte, the same reference shall be sent followed by the first byte, then the<br />

same reference followed by the second byte <strong>and</strong> so on, up to complete the number of desired bytes for the capability<br />

value.<br />

In the following figure it is shown an example of a Running Capability section carrying running capabilities from N<br />

nodes, where the first set contain an explicit description of three running capabilities <strong>and</strong> the Nth set contains a<br />

description of four running capabilities.<br />

MSG_TYPE = 0x2<br />

#CAP_SET = N<br />

L<strong>MAC</strong>_SET<br />

MSG__MODE<br />

DEF_MODE<br />

#RUN_CAP<br />

CAP_REF_1<br />

CAP_VALUE_1<br />

CAP_REF_2<br />

CAP_VALUE_2<br />

...<br />

Figure 105 Example of Running Capability Section<br />

CAP_REF_i<br />

CAP_VALUE_i<br />

Submission page 226 UPA-OPERA<br />

L<strong>MAC</strong>_SET<br />

MSG__MODE<br />

DEF_MODE<br />

#RUN_CAP<br />

CAP_REF_1<br />

CAP_VALUE_1<br />

CAP_REF_2<br />

CAP_VALUE_2<br />

...<br />

CAP_REF_i<br />

CAP_VALUE_1


4-June-07 P1901_PRO_016_r0<br />

Field Name Length (in<br />

bytes)<br />

Default<br />

Value<br />

Description<br />

MSG_TYPE 1 0x2 RUN_CAP_MSG message<br />

#CAP_SET 1 1 Number of Running Capabilities<br />

individually described<br />

L<strong>MAC</strong>_SET 6 - <strong>MAC</strong> address of the node that is<br />

performing the capabilities<br />

described in the message<br />

MSG_MODE 1 0 0 – INFO message with ACK<br />

1 – INFO message without ACK<br />

2 – Change notification message<br />

with ACK<br />

3 – Change notification message<br />

without ACK<br />

DEF_MODE 1 0 0 – Highest Possible<br />

1 – Lower Possible<br />

#RUN_CAP 1 1 Number of running capabilities that<br />

will be described in this message<br />

CAP_REF_i 1 0 Bits 1 to 0:<br />

00 – Common Section<br />

01 – Chip Section<br />

10 – Reference Design Section<br />

Submission page 227 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

11 – Firmware Section<br />

Bits 7 to 2: Position of the<br />

capability in the section of the NCT<br />

CAP_VALUE_i 1 - Value of the referenced capability<br />

Table 31 RUN_CAP_MSG message fields<br />

ACK_CAP_ANN message<br />

MSG_TYPE = 0x4<br />

#CAP_ACK = N<br />

L<strong>MAC</strong>_ACK_1<br />

L<strong>MAC</strong>_ACK_2<br />

Figure 106 ACK_CAP_ANN message structure<br />

The structure of the ACK_CAP_ANN message is very simple. It shall be composed by a first field, 1 byte wide,<br />

with the number of ACKs that composes the message, followed by the <strong>MAC</strong> addresses of the nodes whose<br />

capabilities have been received correctly.<br />

Field Name Length (in<br />

bytes)<br />

Default<br />

Value<br />

Submission page 228 UPA-OPERA<br />

L<strong>MAC</strong>_ACK_N<br />

Description<br />

MSG_TYPE 1 0x4 ACK_CAP_ANN message<br />

#CAP_ACK 1 1 Number of ACKs contained in the<br />

message


4-June-07 P1901_PRO_016_r0<br />

L<strong>MAC</strong>_ACK_i 6 - <strong>MAC</strong> address of the node whose<br />

capabilities have been received<br />

corretly<br />

Table 32 ACK_CAP_ANN message fields<br />

NACK_CAP_ANN message<br />

MSG_TYPE = 0x8<br />

#CAP_NACK = N<br />

L<strong>MAC</strong>_NACK_1<br />

NACK_SECTION_1<br />

L<strong>MAC</strong>_NACK_2<br />

Figure 107 NACK_CAP_ANN message structure<br />

NACK_SECTION_2<br />

The structure of the NACK_CAP_ANN message is very simple. It shall be composed by a first field, 1 byte wide,<br />

with the number of NACKs that composes the message, followed by the <strong>MAC</strong> addresses of the nodes whose<br />

capabilities have not been received correctly. After each L<strong>MAC</strong> field, the NACK_SECTION field, 1 byte wide,<br />

containing the section that has not been correctly decoded shall be included.<br />

Field Name Length (in<br />

bytes)<br />

Default<br />

Value<br />

Description<br />

MSG_TYPE 1 0x8 NACK_CAP_ANN message<br />

#CAP_NACK 1 1 Number of NACKs contained in the<br />

message<br />

L<strong>MAC</strong>_NACK_i 6 - <strong>MAC</strong> address of the node whose<br />

capabilities have NOT been<br />

received correctly<br />

Submission page 229 UPA-OPERA<br />

L<strong>MAC</strong>_NACK_N<br />

NACK_SECTION_N


4-June-07 P1901_PRO_016_r0<br />

NACK_SECTION_i 1 - Bit 0: if set to 1 means that CHIP<br />

section not correctly decoded.<br />

Table 33 NACK_CAP_ANN message fields<br />

Aggregated messages<br />

Bit 1: if set to 1 means that<br />

REFERENCE DESIGN section not<br />

correctly decoded.<br />

Bit 2: if set to 1 means that<br />

FIRMWARE section not correctly<br />

decoded.<br />

In order to make the protocol more efficient, a message aggregation can be performed. It shall consist on changing<br />

the MSG_TYPE field code by the aggregation of up to three different messages types, as shown in Table 38. The<br />

order of the submessages in the final structure shall follow the scheme presented in the following figure, where<br />

some examples are proposed:<br />

Submission page 230 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

1 byte<br />

Figure 108 Agregated protocol messages <strong>and</strong> its MSG_TYPE codes<br />

It must be stated that, in each of the submessages, the MSG_TYPE field shall be deprecated <strong>and</strong> substituted by the<br />

new MSG_TYPE content at the beginning of the resulting message.<br />

Node Capability Table<br />

The Node Capability Table shall be resident in each node <strong>and</strong> contains, indexed by <strong>MAC</strong> address, the maximum<br />

<strong>and</strong> running capabilities of each of the known nodes.<br />

Each node shall contain a NCT per known node in the network, indexed by <strong>MAC</strong> address. This table shall contain<br />

four different sections each one with specific fields:<br />

Common capabilities section<br />

Chip section<br />

Reference design<br />

Submission page 231 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Firmware<br />

In each section, for each of the possible capabilities, two fields have to be filled. The first one shall be the maximum<br />

capability the node can perform. The second one shall be the real level of such capability that is performing at that<br />

time.<br />

Common capabilities section<br />

For the moment, this part of the table is empty, until the common capabilites are determined by the st<strong>and</strong>ard. The<br />

index shall be used to make a reference to a capability when transmitting the running capabilities as described in<br />

section 0.<br />

Chip related fields<br />

In the following table, the fields index, field name, length, default value <strong>and</strong> description, are presented. The index<br />

shall be used to make a reference to a capability when transmitting the running capabilities as described in section 0.<br />

Index Field Name Length<br />

(in bits)<br />

Default<br />

Value<br />

Description<br />

1 Chip Vendor 8 - Chip vendor. To be<br />

determined.<br />

2 Chip Capability j - - Other Chip related<br />

capabilities (vendor<br />

dependent). To be<br />

determined.<br />

Table 34 Chip related fields<br />

…<br />

Reference Design related fields<br />

In the following table, the fields index, field name, length, default value <strong>and</strong> description, are presented. The index<br />

shall be used to make a reference to a capability when transmitting the running capabilities as described in section 0.<br />

Submission page 232 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Index Field Name Length<br />

(in bits)<br />

Default<br />

Value<br />

Description<br />

1 RD Vendor 8 - Reference Design vendor.<br />

To be determined.<br />

2 RD Capability k - - Other Reference Design<br />

related capabilities (vendor<br />

dependent). To be<br />

determined.<br />

…<br />

Table 35 Reference Design related fields<br />

Firmware related fields<br />

In the following table, the fields index, field name, length, default value <strong>and</strong> description, are presented. The index<br />

shall be used to make a reference to a capability when transmitting the running capabilities as described in section 0.<br />

Index Field Name Length<br />

(in bits)<br />

Default<br />

Value<br />

Description<br />

1 FW Vendor 8 - Firmware vendor. To be<br />

determined.<br />

2 FW Capability l - - Other Firmware related<br />

capabilities (vendor<br />

dependent). To be<br />

determined.<br />

…<br />

Table 36 Firmware related fields<br />

Performed Capability Table<br />

Submission page 233 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The PCT shall contain, for each possible capability, a value that indicates if the capability is performed or not, <strong>and</strong><br />

the grade of functionality that is running at the time.<br />

The PCT shall also be divided into four sections corresponding to the above mentioned groups of capabilities:<br />

Common, Chip, Reference Design <strong>and</strong> Firmware related.<br />

The common capabilities section is empty until a decision on which capabilities must be considered common for all<br />

vendors is reached. The table is structured as follows:<br />

Capability Section Index Value Default<br />

High<br />

Value<br />

Chip Vendor Chip<br />

Related<br />

1 - - -<br />

Chip Capability<br />

j<br />

…<br />

2 - - -<br />

RD Vendor RD<br />

Related<br />

1 - - -<br />

RD Capability k 2 - - -<br />

…<br />

FW Vendor FW<br />

Related<br />

1 - - -<br />

FW Capability l 2 - - -<br />

…<br />

Table 37 PCT values for the proposed capabilities<br />

Default<br />

Low<br />

Value<br />

As the RUN_CAP_MSG is decoded, the position in the PCT shall be located using the CAP_RUN_REF field<br />

content, <strong>and</strong> then, the correspondent value shall be extracted from the following field called CAP_VALUE. After<br />

Submission page 234 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

decoding all the pairs CAP_RUN_REF/CAP_VALUE, some entries in the value column of the PCT may be empty.<br />

Then, depending on the DEF_MODE, the capabilities shall be set to the default high or default low value.<br />

An optimal implementation of both tables should reduce them up to a simple one, because both tables are indexed<br />

by <strong>MAC</strong> address <strong>and</strong> the capabilities are the same. They are presented separately for the sake of clarity.<br />

Capabilities Exchange protocol stages <strong>and</strong> modes<br />

Several capability publishing modes are available. They can be indicated using a local variable in each node<br />

(CAP_PUBLICATION_MODE ):<br />

Single Node Publication: only the capabilities of the node that transmits the MAX_CAP_MSG(xxx) message shall<br />

be included in such message. CAP_PUBLICATION_MODE shall be set to 1.<br />

All Known Nodes Publication: All the capabilities from every node known by the transmitter of the<br />

MAX_CAP_MSG(xxx) message, including their own capabilities, shall be included in the message.<br />

CAP_PUBLICATION_MODE shall be set to 2.<br />

No Capability Publication: No MAX_CAP_MSG(xxx) message will be transmitted. CAP_PUBLICATION_MODE<br />

shall be set to 0. This mode should not be used.<br />

The preferred mode should be the Single Node Publication because of its simplicity.<br />

The Capabilities Exchange protocol shall start each time a new node is discovered <strong>and</strong> a data link is established with<br />

it. If the NCT related with such node is empty, or incomplete, then the message exchange shall begin. Otherwise, no<br />

operation shall be performed.<br />

Packet format<br />

The Port Solver protocol is extended to include the exchange of capabilities information.<br />

Port Solver packet expansion<br />

The Port Solver Message (PSM) is defined previously as follows:<br />

Submission page 235 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Dest <strong>MAC</strong><br />

Src <strong>MAC</strong><br />

Figure 109 Port Solver Message structure<br />

TPID<br />

TCI<br />

Length<br />

0xAA<br />

0xAA<br />

0x3<br />

0x00<br />

0x13<br />

Submission page 236 UPA-OPERA<br />

0x9D<br />

0x02<br />

The destination <strong>and</strong> source <strong>MAC</strong> addresses of the packets shall be filled as all the Port Solver messages: in the Dest<br />

<strong>MAC</strong>, the Spanning tree <strong>MAC</strong> (0x0180C2000000), <strong>and</strong> in the src <strong>MAC</strong> the <strong>MAC</strong> address of the node that<br />

originates the message.<br />

The PSM message is extended to include also CapE messages. Therefore, it is used a special content for the INFO<br />

field. Then, if a node detects a PSM with an INFO field with the bits 1 to 4 set to something different from zero, it<br />

shall assume that the PSM includes also a CapE message.<br />

The values of bits 1 to 4 of the INFO field <strong>and</strong> the message sent is shown in the following table:<br />

Message INFO[4:1]<br />

PSM without capabilities information 0x0<br />

MAX_CAP_MSG 0x1<br />

RUN_CAP_MSG 0x2<br />

ACK_CAP_ANN 0x4<br />

NACK_CAP_ANN 0x8<br />

MAX_CAP_MSG+RUN_CAP_MSG 0x3<br />

MAX_CAP_MSG+RUN_CAP_MSG+ACK_CAP_ANN 0x7<br />

0x01<br />

Source <strong>MAC</strong><br />

Destination <strong>MAC</strong><br />

Assigned LP<br />

Info


4-June-07 P1901_PRO_016_r0<br />

MAX_CAP_MSG+RUN_CAP_MSG+ACK_CAP_ANN+NACK_CAP_ANN 0xF<br />

MAX_CAP_MSG+ACK_CAP_ANN 0x5<br />

MAX_CAP_MSG+ACK_CAP_ANN+ NACK_CAP_ANN 0xD<br />

MAX_CAP_MSG+NACK_CAP_ANN 0x9<br />

MAX_CAP_MSG+RUN_CAP_MSG+NACK_CAP_ANN 0xB<br />

RUN_CAP_MSG+ACK_CAP_ANN 0x6<br />

RUN_CAP_MSG+NACK_CAP_ANN 0xA<br />

RUN_CAP_MSG+ACK_CAP_ANN+NACK_CAP_ANN 0xE<br />

ACK_CAP_ANN+NACK_CAP_ANN 0xC<br />

Table 38 Message type <strong>and</strong> content of bits 1-3 of INFO field in PSM<br />

In case of composed messages, the order of each message in the final structure shall be, from left to right, the same<br />

as the shown in the table.<br />

The INFO field shall remain as follows:<br />

Figure 110 INFO field<br />

Port Solver protocol flow expansion<br />

First stage of the Capabilities Exchange protocol<br />

Submission page 237 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The Port Solver protocol is exp<strong>and</strong>ed repeating the ports information <strong>and</strong> including CapE information.<br />

As a result, the Port Solver protocol becomes a more reliable port exchange method, due to the inclusion of an ACK<br />

for each trasaction.<br />

Therefore, the message exchange shall be as the one shown in the following figures for the described cases:<br />

Submission page 238 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 111 Compressed normal work using Port Solver Protocol. All indexes recognized.<br />

Figure 112 Normal asynchronous work using PSM. All indexes recognized.<br />

Submission page 239 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 113 Normal work using PSM. Some indexes not recognized.<br />

Submission page 240 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 114 Normal work using PSM. Not all indexes recognized. MAX_CAP_MSG lost.<br />

Submission page 241 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 115 Normal work. Not all indexes recognized. NACK_CAP_INDEX lost.<br />

Submission page 242 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 116 Normal work. Not all indexes recognized. ACK_CAP_ANN lost.<br />

Submission page 243 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 117 Compressed work using PSM. All indexes recognized. MAX_CAP_MSG+ACK_CAP_ANN lost.<br />

Second stage of the Capabilities Exchange protocol<br />

This second stage is asynchronous with the PSP messages, because it depends on when a node decides to change its<br />

running capabilities.<br />

Submission page 244 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The running capabilities message shall be the same as the one used in the first stage of the protocol, just repeating<br />

the previously negotiated ports in its content.<br />

The RUN_CAP_MSG may expect or not an ACK from its destination, depending on the content of the<br />

MESSAGE_MODE field, as described in section 0.<br />

When a broadcast destination address is used, a dummy port named 255, which will be ignored by the receiver,<br />

shall be set in the message.<br />

The protocol behaviour in the case of RUN_CAP_MSG with an ACK required is described in the following figures:<br />

Submission page 245 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 118 Running capabilities change <strong>and</strong> associated protocol. Normal mode.<br />

Submission page 246 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 119 Running capabilities change <strong>and</strong> ACK_CAP_ANN loss<br />

Submission page 247 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 120 Running capabilities change <strong>and</strong> RUN_CAP_MSG loss<br />

Adding a new capability<br />

To add a new capability, a new entry shall be added in the adequate NCT section <strong>and</strong> assigned to it a high <strong>and</strong> low<br />

default value, <strong>and</strong> an index. The index shall be formed by two bits that indicate the section where the new<br />

Submission page 248 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

capabilitity is included (Common, Chip, Reference Design or Firmware) <strong>and</strong> a number that shall be consecutive to<br />

the last assigned. In the case of a capability that belongs to a vendor dependent section, it shall be the vendor who<br />

assigns a new index number to the new capability. In case of the common section, the new capabilities will be<br />

determined by the protocol.<br />

In case the new capability needs more than one byte to inform about its status, this information shall be sent byte by<br />

byte with the uniqe filed index preceding each byte.<br />

The new capability shall be sent in the same order that has been assigned in the NCT in the enumerated<br />

MAX_CAP_MSG(000) messages, <strong>and</strong> using its index <strong>and</strong> section in the RUN_CAP_MSG messages.<br />

Cluster Discovery Protocol<br />

The use of the Cluster Discovery Protocol (from here onwards, CDP) is limited to TDRs. Its use is not m<strong>and</strong>atory.<br />

The non-use of this protocol will result in the impossibility of its master to send non-returnable tokens.<br />

A master must be able to determine if the nodes that are hanging from it may be divided in isolated clusters. In order<br />

to achieve this it is necessary for every alive node to transmit information in the upstream direction, in order to<br />

know which nodes are visible for each node. This is achieved through the Cluster Discovery Protocol. This protocol<br />

also gives information of the exact network topology.<br />

CPEs are already sending the information regarding which nodes are visible with the periodic Announce Messages<br />

(see 9.1.4.4). They do not need to send any other information in the upstream.<br />

However, a TDR X needs to send the following information to their masters:<br />

List of nodes that are visible from X (this would be the same as the information in the periodic Announce Message<br />

sent by X);<br />

List of nodes that belong to its BPL subtree: this includes CPEs <strong>and</strong> TDRs which are under the direct or indirect<br />

control of X;<br />

List of nodes external to the BPL subtree of X that are visible from all the nodes belonging to its BPL subtree.<br />

In order to transmit the information in points 2 <strong>and</strong> 3 the Cluster Discovery Protocol is used. This protocol simply<br />

consists in the periodic transmission from a TDR to its master of all this information. The information is recursive,<br />

because in order to form this packet, the TDR must have previously received the information from its slaves in<br />

order to include it.<br />

The protocol will start in the first TDR (the one with only end-users hanging from it), once it has received at least<br />

one Periodic Announce Message from all of its slaves. The TDR will recollect this information, <strong>and</strong> send to its<br />

master a new packet. Every TDR in the chain will repeat this. Any TDR as well as the Head End might use the<br />

Submission page 249 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

information received to determine that there are isolated clusters, <strong>and</strong> that it can perform spatial reuse by the use of<br />

the non-returnable token (see 4.4.2.9)<br />

Cluster Discovery Protocol message format<br />

The CDP Message is encapsulated using the CCP with Type0 0x0a <strong>and</strong> Type1 0x01 (Figure 102). The CDP packet<br />

will be sent through unicast port, as it is specifically addressed to the master node. The destination <strong>MAC</strong> will be the<br />

master node destination <strong>MAC</strong>.<br />

TPID<br />

0xAA<br />

0xAA<br />

0x03<br />

0x00<br />

0x13<br />

0x9D<br />

0x0A<br />

0x01<br />

Length<br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

TCI<br />

Figure 121 Cluster discovery packet format<br />

Cluster Discovery Protocol Data<br />

The information can be fragmented in several packets (identified by a sub-table number) if the entries do not fit in<br />

one.<br />

The CDP data fields are:<br />

Bytes CDP data fields Length<br />

0 Sub-table number 1 bytes<br />

1 Number of sub-tables 1 bytes<br />

2 Number of entries of the sub-table 1 byte<br />

3 – 8 Sender <strong>MAC</strong> address 6 byte<br />

9 Entry size (in bytes) 1 byte<br />

10 - 521 Entries 512 bytes<br />

Submission page 250 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Table 39 Cluster discovery packet fields<br />

Maximum<br />

The Entries in the above table have the following format, although they could be extended:<br />

Table 40 Cluster discovery entries<br />

The Dependency field will be set to 1 if the corresponding <strong>MAC</strong> belongs to the same BPL subtree. Otherwise, it<br />

will be set to 0.<br />

The Cluster Discovery Protocol packet shall be sent at least when changes in the topology <strong>and</strong> visibility are<br />

detected; nevertheless this information can be transmitted periodically.<br />

To increase the packet intelligibility <strong>and</strong> to simplify the subsequent algorithms, the order of the entries in a sub-table<br />

<strong>and</strong> the order of sub-tables in the CDP packet are predetermined:<br />

In a sub-table, all entries belonging to the same BPL subtree shall appear together <strong>and</strong> at the beginning of the subtable,<br />

after them, there will be entries with only visibility dependency.<br />

Every TDR shall place its sub-table at the beginning of the CDP packet <strong>and</strong> encapsulate the CDP packets received<br />

from other TDRs, slaves of its, without altering their sub-table order. There is no restriction in the order how the<br />

CDP packets received from TDRs belonging to the same hierchary level shall be encapsulated.<br />

Connection Admission <strong>Control</strong> Protocol (CAC)<br />

The Connection Admission <strong>Control</strong> Protocol Messages are sent whenever one or several new flow(s) register into<br />

the BPL network to reserve the type of traffic that should be assigned, <strong>and</strong> also when there are changes in the traffic<br />

requirements for any of the flows, so that new resources can be committed or released. If reservation parameters<br />

change during the duration of the current session, an update of the parameters is necessary.<br />

There are six types of CAC messages:<br />

Entry fields Length<br />

<strong>MAC</strong> address 6 bytes<br />

Dependency 1 byte<br />

CAC_Req : Request to the master for the desired resources.<br />

Submission page 251 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

CAC_Rsp ; Reponse from the master.<br />

CAC_Chg ; Inform the master of a change in the allocated resources.<br />

CAC_Chg_Rsp ; Contains the response to a CAC_Req.<br />

CAC_Drp: Master or Repeater tells a node it shall cancel its reservation.<br />

CAC_Stp: Inform the FMN that a traffic flow has stopped (thus that its resources can be freed).<br />

Flow Master Node (FMN) is defined as the BPL node in charge of guarantee QoS requirement for a registered<br />

flow. All CAC_Req messages are transmitted from the source node which request flow to the BPL subcell master of<br />

the node. This request may be propagated to the HE, in this situation FMN of the requested flow will be network<br />

HE, or could be blocked by an intermediate node if this node decides to be the FMN of the requested flow.<br />

Destination <strong>MAC</strong> address of CAC messages:<br />

CAC_Req/CAC_Chg/CAC_Stp messages are transmitted by a BPL node <strong>and</strong> it shall be addressed to its BPL<br />

subcell master, these messages will be propagated in the network hop by hop until arrive to the FMN of the flow.<br />

These messages have as source <strong>MAC</strong> the <strong>MAC</strong> of the node that request the flow <strong>and</strong> as destination <strong>MAC</strong> the <strong>MAC</strong><br />

of the BPL subcell master.<br />

CAC_Rsp/CAC_Chg_Rsp/CAC_Drp messages are transmitted by the FMN in downstream to the node which<br />

request the flow. CCP source address will be the <strong>MAC</strong> of the FMN <strong>and</strong> the destination <strong>MAC</strong>, the address of the<br />

directly connected slave that is part of the requested flow.<br />

CAC_Req<br />

The CAC_Req message is transmitted to request QoS Resources to be committed in order to satisfy the agreed<br />

quality parameters. It may be originated from any node except network HE. There are two subtypes Slave<br />

CAC_Req <strong>and</strong> Master CAC_Req.<br />

CAC_Req sequence is triggered by a CPE or Repeater node upon detection of a specific flow or statically after node<br />

configuration. A node requesting resources must trigger a CAC_Req sequence by sending a CAC_Req message to<br />

its master node. Master node then decides if can guarantee requested flow <strong>and</strong> can reply the request with a<br />

CAC_Rsp message, in this case Master node will become the FMN of the requested flow (the node that should<br />

guarantee flow requirements). In order to guarantee requested flow guarantees, FMN can trigger a new CAC_Req<br />

message to its master or use existing resources to guarantee the flow.<br />

If a node decides to be the FMN of a specific user flow, it must be the FMN of the totality of flows for this user.<br />

Submission page 252 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

A node that decides to be a FMN of a flow shall select a session ID for this flow <strong>and</strong> communicate this session ID to<br />

all the nodes that are part of the flow path using a CAC_Rsp message.<br />

CAC_Req packet contains the list of traffic from one node requesting resources.<br />

Figure 122 CAC Req Message<br />

Information present in this packet (<strong>and</strong> in the reply) will be needed by any nodes present between the node requester<br />

<strong>and</strong> FMN.<br />

Bytes CAC_Req data fields Length<br />

0 Entry Length in bytes 1 byte<br />

1 Num entries 1 byte<br />

2-<br />

Num_entries*Entry_Length+2<br />

CAC_Req Entry Field 19 bytes<br />

Num_entries*Entry_Length+3 Num hop 1 byte<br />

Num_entries*Entry_Length+4<br />

- 9<br />

Table 41 CAC_Req Data Fields<br />

Mac i 6 bytes<br />

Mac i + 1 6 bytes<br />

NumHop : Initially set to 0, each node taking part of the path between the requester node <strong>and</strong> the FMN should<br />

increment this number <strong>and</strong> place its Mac in the locations reserved below. If NumHop reaches 255, no further<br />

increment is performed.<br />

Submission page 253 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Mac i : Macs of nodes taking part of the path from the requester node to the FMN. It is necessary to know the path<br />

to send the reply packet from the FMN to the requester node.<br />

Data Field Description Size (Bytes)<br />

Mac SrcReq <strong>MAC</strong> of the requester node 6<br />

Mac DstReq <strong>MAC</strong> of the destination<br />

traffic flow<br />

Request ID <strong>MAC</strong> source of the request<br />

<strong>and</strong> the request ID form a<br />

unique identifier of the<br />

request. If a CAC_Req<br />

message is lost but resource<br />

has been partially allocated in<br />

some nodes of the flow path,<br />

request should be resent again<br />

after a timeout<br />

(MAX_CAC_TO). Resources<br />

shall not be allocated again.<br />

Service Class Service Class of the traffic<br />

flow<br />

Latency<br />

(ms)<br />

Latency requirements of the<br />

flow<br />

B<strong>and</strong>width B<strong>and</strong>width requested 2<br />

Table 42 CAC_Req Message Entry Field<br />

CAC_Rsp<br />

Submission page 254 UPA-OPERA<br />

6<br />

1<br />

1<br />

2


4-June-07 P1901_PRO_016_r0<br />

The CAC_Rsp message is transmitted by a FMN to accept or deny requested resources. This packet is sent by the<br />

master <strong>and</strong> is destined to the requester but will go down throughTDRs placed on the way (if they exist).<br />

Figure 123 CAC Rsp Message<br />

The CAC Reservation Response payload must have the following fields:<br />

Bytes CAC_Rsp data fields Length<br />

0 Entry Length in bytes 1 byte<br />

1 Num entries 1 byte<br />

2 -<br />

Num_entries*Entry_Length+2<br />

CAC_Rsp Entry Field 19 bytes<br />

Num_entries*Entry_Length+3 Num hop 1 byte<br />

Num_entries*Entry_Length+4<br />

-<br />

Num_entries*Entry_Length+9<br />

Table 43 CAC_Rsp Data Fields<br />

Mac i 6 bytes<br />

Mac i + 1 6 bytes<br />

Submission page 255 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

And each entry of CAC Reservation Response must have the following fields:<br />

Data Field Description Size (Bytes)<br />

Mac SrcReq <strong>MAC</strong> of the requester node 6<br />

Mac DstReq <strong>MAC</strong> of the destination<br />

traffic flow<br />

Ack Status (accepted or not) of the<br />

flow based on calculation of<br />

available b<strong>and</strong>width <strong>and</strong><br />

b<strong>and</strong>width requested.<br />

Session ID Session ID assigned to this<br />

flow. Used if Ack status is<br />

accepted.<br />

Service Class Service Class of the traffic<br />

flow<br />

Latency<br />

(ms)<br />

Latency assigned 2<br />

B<strong>and</strong>width B<strong>and</strong>width assigned 2<br />

Table 44 CAC_Rsp Message Entry Field<br />

CAC_Chg<br />

Submission page 256 UPA-OPERA<br />

6<br />

1<br />

1<br />

1


4-June-07 P1901_PRO_016_r0<br />

CAC_Chg message must be used when:<br />

A resource parameter has changed <strong>and</strong> the node has to communicate the change to its FMN.<br />

If the FMN receives a Reservation Change from an open Session Id, it updates the resources requested, the FMN<br />

has to answer with a Reservation Change Confirmation Packet, indicating if the new resources requested are<br />

accepted or not. If the requester node does not receive the acknowledgement of the packet sent, when a timeout<br />

expires, it will send a new Reservation Change Packet.<br />

Figure 124 CAC Change Message<br />

The CAC Change payload must have the following fields:<br />

Table 45 CAC_Chg Data Fields<br />

Bytes CAC_Chg data fields Length<br />

0 Entry Length in bytes 1 byte<br />

1 Num Entries 1 byte<br />

2 -<br />

Num_entries*Entry_Length+2<br />

CAC_Chg Entry Field 3 bytes<br />

Submission page 257 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

And each entry of CAC Change must have the following fields:<br />

Data Field Description Size (Bytes)<br />

Session ID Session ID assigned to this<br />

flow.<br />

Latency Latency requirements of the<br />

flow<br />

B<strong>and</strong>width B<strong>and</strong>width requested 1<br />

Table 46 CAC_Chg Message Entry Field<br />

CAC_Chg_Rsp<br />

CAC_Chg_Rsp message is sent by the FMN of a flow to communicate if a flow has been correctly allocated.<br />

Figure 125 CAC Change Response Message<br />

The CAC Change payload must have the following fields:<br />

Submission page 258 UPA-OPERA<br />

1<br />

1


4-June-07 P1901_PRO_016_r0<br />

Bytes CAC_Chg_Rsp data fields Length<br />

0 Entry Length in bytes 1 byte<br />

1 Num Entries 1 byte<br />

2 -<br />

Num_entries*Entry_Length+2<br />

Table 47 CAC_Chg_Rsp Data Fields<br />

CAC_Chg Entry Field 3 bytes<br />

And each entry of CAC Change Response must have the following fields:<br />

Data Field Description Size (Bytes)<br />

Session ID Session ID assigned to this<br />

flow.<br />

ACK Status (accepted or not) of the<br />

flow based on calculation of<br />

available b<strong>and</strong>width <strong>and</strong><br />

b<strong>and</strong>width requested.<br />

Latency Latency assigned 2<br />

B<strong>and</strong>width B<strong>and</strong>width assigned 2<br />

Table 48 CAC Chg Rsp Entry Fields<br />

CAC_Drp<br />

Submission page 259 UPA-OPERA<br />

1<br />

1


4-June-07 P1901_PRO_016_r0<br />

In a congestion situation, the FMN has to deny resources even to an accepted Session Id. In this case, the FMN<br />

sends a Reservation Dropped Packet to indicate to a node that its traffic with the indicated Session Id has been<br />

dropped due to congestion.<br />

Figure 126 CAC Drop Message<br />

The CAC Drop payload must have the following fields:<br />

Table 49 CAC_Drp Data Fields<br />

Bytes CAC_Drp data fields Length<br />

0 Entry Length in bytes 1 byte<br />

1 Num Entries 1 byte<br />

2 CAC Drp Entry Field 1 byte<br />

And each entry of CAC Drop message must have the following fields:<br />

Data Field Description Size (Bytes)<br />

Submission page 260 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Table 50 CAC Drop Entry Fields<br />

CAC_Stp<br />

Session ID Session ID assigned to this<br />

flow.<br />

The reservation Stop must be used by requester nodes when:<br />

The node doesn’t transmit a flow anymore <strong>and</strong> informs the FMN that the resources allocated to its Session Id can be<br />

freed.<br />

The reservation Stop must be used by a node that is included in the flow path when:<br />

It detect that requester node is no longer connected to the node.<br />

CAC_Stp message doesn´t need to be confirmed by the FMN because requester node knows if FMN is trying to<br />

guarantee Session ID traffic (Node receives data tokens for this Session ID).In this case, node shall resend CAC_Stp<br />

message again after MAX_CAC_STP_TO time.<br />

Submission page 261 UPA-OPERA<br />

1


4-June-07 P1901_PRO_016_r0<br />

Figure 127 CAC Stop Message<br />

The CAC Stop payload must have the following fields:<br />

Table 51 CAC Stp Data Fields<br />

Bytes CAC_Stp data fields Length<br />

0 Entry Length in bytes 1 byte<br />

1 Num Entries 1 byte<br />

2 CAC Stp Entry Field 1 byte<br />

And each entry of CAC Stop message must have the following fields:<br />

Table 52 CAC Stp Entry Fields<br />

Data Field Description Size (Bytes)<br />

Session ID Session ID assigned to this<br />

flow.<br />

Connection Admission <strong>Control</strong> protocol scenarios.<br />

Submission page 262 UPA-OPERA<br />

1


4-June-07 P1901_PRO_016_r0<br />

Figure 128 CAC Protocol Scenario 1<br />

¡Error! No se encuentra el origen de la referencia. CPE Request resources to its direct master. REP node<br />

propagate CAC_Req message <strong>and</strong> the Network HE becomes the FMN of the flow. A session ID will be assigned by<br />

the HE to the flow in all the flow path.<br />

Figure 129 CAC Protocol Scenario 2<br />

¡Error! No se encuentra el origen de la referencia. REP node receives a CAC_Req message from a CPE. REP node<br />

decides to be the FMN of this flow because it has enough resources. CAC_Req message shall not be propagated to<br />

the HE.<br />

Submission page 263 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 130 CAC Protocol Scenario 3<br />

¡Error! No se encuentra el origen de la referencia. depicts a scenario where a CAC_Req packet does not reach the<br />

TDR, it is lost. After a MAX_CAC_TO time-out, the CAC_Req packet will be resent.<br />

Submission page 264 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

MAX_CAC_TO<br />

CPE TDR HE<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Req<br />

CAC_Rsp<br />

Figure 131 CAC Protocol Scenario 4<br />

Figure 131 Resources are partially allocated for a session ID. CAC_Req message shall be resent after<br />

MAX_CAC_TO timeout but REP shall not resend it because REP resources have been allocated previously, <strong>and</strong><br />

TDREP must send the CAC_Rsp with the session_id to the node<br />

Submission page 265 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

CPE TDR HE<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Stp<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Stp<br />

Figure 132 CAC Protocol Scenario 5<br />

Figure 132 Resources may be freed using CAC_Stp message. Message shall be propagated to FMN.<br />

Submission page 266 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

CPE TDR HE<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Stp<br />

MAX_CAC_STP_TO<br />

CAC_Stp<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Stp<br />

Figure 133 CAC Protocol Scenario 6<br />

Figure 133 Resources may be freed using CAC_Stp message. If Message CAC_Stp is lost. message shall be resent<br />

after <strong>MAC</strong>_CAC_STP_TO time if node is still receiving requested resource.<br />

Submission page 267 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

CPE TDR HE<br />

CAC_Req<br />

CAC_Rsp<br />

TDR detect CPE is<br />

disconnected<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Stp<br />

Figure 134 CAC Protocol Scenario 7<br />

Figure 134 REP node detect a node is no longer connected. It shall free all resources allocated for the node subcell.<br />

Submission page 268 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

CPE TDR HE<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Drp<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Drp<br />

Figure 135 CAC Protocol Scenario 8<br />

Figure 135 FMN are not able to guarantee all the resources allocated. It chooses less service class flow <strong>and</strong> sends a<br />

CAC_Drp message to inform the requester node that this flow can not be guarantee.<br />

Submission page 269 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

MAX_CAC_DRP_TO<br />

CPE TDR HE<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Drp<br />

CAC_Req<br />

CAC_Rsp<br />

CAC_Drp<br />

Figure 136 CAC Protocol Scenario 9<br />

Figure 136 CAC_Drp message is lost. CPE node will deregister flow after MAX_CAC_DRP_TO time without<br />

receiving the resource (Tokens with a register Session ID).<br />

Automatic Management of Crosstalks between not Synchronized Systems<br />

This section describes a mechanism to avoid crosstalk that may be implemented but is not m<strong>and</strong>atory.<br />

Once the nodes realize that there is more than one master in the channel by means of the Master Id (see 4.4.1), it is<br />

necessary to take some measures to avoid such interferences.<br />

The solution is to coordinate both BPL cells, <strong>and</strong> the simplest way to do it is subordinate one of the BPL cells. Next,<br />

the algorithm is explained:<br />

MID hierarchy<br />

When the crosstalk is detected, then the nodes must decide which BPL cell must subordinate.<br />

Submission page 270 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The rule shall be “the lowest MID, the best”, analyzing the MID as a number.<br />

Then, one of the nodes of the worse BPL cell will register in the neighbor network using the <strong>Access</strong> Protocol, <strong>and</strong> it<br />

will act as master of its BPL cell, distributing the token.<br />

If one node does not perform this protocol it does not copy the MID inherited from its master, instead it fixes the<br />

local MID to one of these values:<br />

0x1FFFFF. Nodes that have not completed the <strong>Access</strong> Protocol.<br />

0x130001. Nodes that have finished the <strong>Access</strong> Protocol.<br />

Border node designation<br />

The border node is the modem that will act as a bridge between the networks passing the token.<br />

Once the interference is detected, the network with higher MID must decide which node within the BPL cell, will<br />

perform registration.<br />

Designation Rules<br />

The master will select the Border Node with the following criteria:<br />

Less hops, higher priority. This is, if the interference is detected by several nodes, the HE has preference over the<br />

rest of the nodes; next TDRs placed one hop away; next repeaters with two hops, etc.<br />

CPEs do not perform this protocol, only HEs <strong>and</strong> TDRs do. A node that detects only a CPE of a neighbor BPL cell<br />

does not apply for becoming border node.<br />

Notification protocol<br />

To centralize the decision, the HE of the BPL cell decides which node will perform negotiation, interchanging CCP<br />

packets. Since the interference will not be detected by all the nodes simultaneously, a guard time may be kept before<br />

designating the border node in order to know all the information.<br />

If any node detects the interference (sniffing a better MID), it transmits an Interference Detection Packet (IDP),<br />

containing the own <strong>MAC</strong>, the neighbor <strong>MAC</strong> sniffed, the MID sniffed, the local number of hops <strong>and</strong> the identity of<br />

the node detected (HE or TDR). When the packet is received by a node, it has to check if is coming from one of its<br />

slaves, then the information is copied <strong>and</strong> retransmitted to its master, then the packet will arrive finally to the HE of<br />

the BPL cell. To avoid flooding the network, the IDPs have to be sent with a minimum period of 10 seconds<br />

Submission page 271 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

between them, except if the node detects a better node to register to, this is new information that has to be<br />

transmitted immediately (for instance a node reported that was detecting a TDR but afterwards detects a HE, or<br />

another MID better than the transmitted one).<br />

Among all the IDPs received, the HE decides which node must become border node sending a Border Node<br />

Designation Packet (BNDP), containing the <strong>MAC</strong> of the Border Node. This is a broadcast packet that has to be<br />

relayed by all the nodes of the network because the destination might be several hops away from the master. When<br />

the packet is received by a node coming from its master <strong>and</strong> it is not the designated border node, it has to built a<br />

new BNDP to notify its slaves (only for TDR with at least one slave).<br />

The designated border node must send a Border Node Designation Acknowledge (BNDA), to confirm that the<br />

information has been received, <strong>and</strong> it is transmitted towards the master in the same way than the IDP. The BNDA<br />

must be received by the HE in a specific period of time (5 seconds). If the time expires a new BNDA to the same<br />

node is delivered. After 3 consecutive timeouts not receiving the BNDA, a new node (if exists) must be designated<br />

as Border Node.<br />

Crosstalk Management Frames Format<br />

IDP<br />

The IDP Message is encapsulated using the CCP with Type0 0x0b <strong>and</strong> Type1 0x01 (Figure 137).<br />

0xAA<br />

0xAA<br />

0x03<br />

0x00<br />

0x13<br />

0x9D<br />

0x0B<br />

0x01<br />

Length<br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

Figure 137 IDP Packet<br />

TPID<br />

TCI<br />

IDP Data<br />

The packet is sent using the broadcast port (127). The value of the packet fields shall be:<br />

Dest <strong>MAC</strong> is set 0x0180C2000000.<br />

Src <strong>MAC</strong> is set to the local <strong>MAC</strong> address.<br />

The IDP data fields are:<br />

Submission page 272 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Table 53 Interference detection packet fields<br />

Bytes IDP data fields Length<br />

0-5 Sender <strong>MAC</strong> address 6 bytes<br />

6-11 Sniffed <strong>MAC</strong> address 6 bytes<br />

12-14 MID sniffed 3 bytes<br />

15 Local Number of hops 1 byte<br />

16 Type of Node sniffed 1 byte<br />

In the Local Number of hops field, a value of 255 hops means 255 or more hops.<br />

The field Type of Node contains the same information allocated in the Token Announce (although announce the<br />

detection of a slave is forbidden by the protocol).<br />

Table 54 Type of node in IDP<br />

BNDP<br />

0 HE<br />

1 CPE<br />

2 TDR<br />

The BNDP Message is encapsulated using the CCP with Type0 0x0b <strong>and</strong> Type1 0x02 (Figure 138).<br />

Submission page 273 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

TPID<br />

0xAA<br />

0xAA<br />

0x03<br />

0x00<br />

0x13<br />

0x9D<br />

0x0B<br />

0x02<br />

Length<br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

Figure 138 BNDP Packet<br />

TCI<br />

BNDP Data<br />

The packet is sent using the broadcast port (127). The value of the packet fields shall be:<br />

Dest <strong>MAC</strong> is set 0x0180C2000000.<br />

Src <strong>MAC</strong> is set to the local <strong>MAC</strong> address.<br />

The BNDP data fields are:<br />

Table 55 BNDP packet fields<br />

BNDA<br />

Bytes BNDP data fields Length<br />

0-5 Border Node <strong>MAC</strong> address 6 bytes<br />

The BNDA Message is encapsulated using the CCP with type 0x0b <strong>and</strong> subtype 0x03 (Figure 139).<br />

TPID<br />

0xAA<br />

0xAA<br />

0x03<br />

0x00<br />

0x13<br />

0x9D<br />

0x0B<br />

0x03<br />

Length<br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

TCI<br />

BNDA Data<br />

Submission page 274 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 139 BNDA Packet<br />

The packet is sent using the broadcast port (127). The value of the packet fields shall be:<br />

Dest <strong>MAC</strong> is set 0x0180C2000000.<br />

Src <strong>MAC</strong> is set to the local <strong>MAC</strong> address.<br />

The BNDA data fields are:<br />

Table 56 BNDA packet fields<br />

Border node registration<br />

Bytes BNDA data fields Length<br />

0-5 Border Node <strong>MAC</strong> address 6 bytes<br />

Once the border node is designated by the HE (can be itself), it starts its attempt for registration in the neighbor BPL<br />

cell as it is described in the <strong>Access</strong> Protocol.<br />

Master selection<br />

The border node will select the master to register based in the following criteria:<br />

First HE (of the neighbor BPL cell)<br />

Second repeaters.<br />

Successful registration<br />

If the modem succeeds, as it has changed BPL cell it copies the MID of its new BPL cell, in this way any node<br />

knows that the node is token dependant from the neighbor network.<br />

Submission page 275 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

A node performing the registration in the neighbor BPL cell will have a MID different <strong>and</strong> it will be different from<br />

0x1FFFFF <strong>and</strong> 0x130001. Under these conditions the node must be accepted avoiding any authentication process,<br />

also the master node knows that is not a node from its network <strong>and</strong> must avoid transmit any data through the BPL<br />

port.<br />

Failing registration<br />

The maximum time specified for the registration of the border node is 120 seconds<br />

When the timer expires, the HE has to select a new border node to complete negotiation. The HE is the node that<br />

monitories the registration timer, in this way no new packets are needed, even if the border node designated is<br />

switched off the HE restarts the protocol by itself.<br />

The formerly designated border node has to activate the registration timer like the master <strong>and</strong> when the timer<br />

expires it assumes that it is not border node anymore until a new BNDP is received.<br />

Intermittent transmission<br />

To perform successfully the negotiation among BPL cells it is necessary to get free interference periods, because the<br />

transmissions within the own BPL cell will ruin the registration.<br />

A HE can decide by itself to stop the transmissions within its network avoiding new token generation, but any other<br />

node cannot because its master will regenerate the token.<br />

When the HE receives a BNDA it starts a period so called “INTERMITTENT TRANSMISSION” [IT].<br />

During the status of Border Node a modem can generate as many BNDAs as needed to complete the negotiation.<br />

The default silence time 2 sec, followed by a normal transmission period of 1 sec. It will have 5 silence periods. So<br />

the overall IT will last 15 seconds.<br />

SPANNING TREE<br />

In a network, a spanning tree is a path or collection of paths that represent connections between nodes. To be called<br />

a spanning tree, the tree must cover every possible path in a network. A minimal spanning tree is one that covers all<br />

possible paths, does so with as few segments as possible, <strong>and</strong> makes sure there are no loops (closed paths) in the<br />

network.<br />

The IEEE 802.1 recommendations provide an algorithm for finding a spanning tree in any network.<br />

Submission page 276 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

STP packets will be transmitted through the corresponding unicast ports.<br />

IEEE 802.1D (Spanning Tree Protocol)<br />

The 802.1D recommendation describes the Spanning Tree algorithm <strong>and</strong> protocol. In this document, the calculation<br />

of the tree elements <strong>and</strong> the messages exchanged between bridges for this purpose are exposed. This specification is<br />

fully compliant with this st<strong>and</strong>ard.<br />

The implementation of IEEE 802.1D is a must for network compatibility.<br />

For specific information on message types <strong>and</strong> their fields <strong>and</strong> the algorithm to h<strong>and</strong>le them, refer to IEEE Std 802.1<br />

<strong>and</strong> IEEE Std 802.1D (Spanning Tree).<br />

Ports can be Ethernet or BPL. Every new BPL connection is added to the bridge as a new port. Ports can be deleted<br />

when the BPL connection is lost for some physical reason. Some ports, such as Ethernet ports, are always present.<br />

Each port carries out the STP.<br />

Default timers <strong>and</strong> field values<br />

The IEEE recommendation is relatively flexible in some aspects, such as default timer values <strong>and</strong> other message<br />

fields, so that they can be tuned for different network sizes <strong>and</strong> <strong>Medium</strong> <strong>Access</strong> technologies. The values adopted<br />

by this specification for these parameters are:<br />

hello: time between each BPDU that is sent on a port.<br />

Default: 2 seconds<br />

Range: [1, 10] seconds<br />

forward delay: time spent in the listening <strong>and</strong> learning states.<br />

Default: 15 seconds<br />

Range: [4, 30] seconds<br />

max age: maximum length of time a bridge port saves its configuration.<br />

Default: 20 seconds<br />

Submission page 277 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Range: [6, 40] seconds<br />

Priority: The greater the number, the less priority.<br />

Table 57 STP priority<br />

IEEE 802.1w (Rapid STP)<br />

MV Master 0x9010<br />

MV Repeater 0x9020<br />

LV Master 0x9030<br />

LV Repeater 0x9040<br />

LV Slave 0x9050<br />

Rapid Spanning Tree Protocol (RSTP; IEEE 802.1w) is an amendment to 802.1D. This version offers a significant<br />

reduction in the time taken to reconfigure the active topology of the Bridged LAN in the face of changes to the<br />

physical topology or its configuration parameters. The strategy to reach this performance is based on a h<strong>and</strong>shake<br />

mechanism between bridges that enables a fast transition to forwarding, thus bypassing the listening <strong>and</strong> learning<br />

states <strong>and</strong> timers.<br />

The two versions of the algorithm <strong>and</strong> protocol are capable of interoperating within the same Bridged LAN; hence,<br />

it is not necessary for implementations to support both versions of the Spanning Tree algorithm <strong>and</strong> protocol.<br />

In view of the improved performance offered, it is recommended that the Rapid Spanning Tree algorithm <strong>and</strong><br />

Protocol be supported in preference to the original version.<br />

For specific information on message types <strong>and</strong> their format, the migration protocol <strong>and</strong> the RSTP algorithm, refer to<br />

IEEE Std 802.1D, 1998 Edition; Clause 17 (Rapid Spanning Tree Algorithm <strong>and</strong> Protocol), also found as 802.1w.<br />

Default timers <strong>and</strong> field values<br />

migration delay (mdelay): indicates that the protocol migration is ongoing. It is used to avoid re-entry. If any BPDU<br />

of the other type is received while mdelay is running, it is ignored in terms of protocol migration. mdelay is set to 3<br />

seconds.<br />

Submission page 278 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Point-to-point ports <strong>and</strong> edge ports<br />

In order to achieve fast convergence on a port, the protocol relies upon two new variables: edge ports <strong>and</strong> link type.<br />

All BPL ports can be assumed to be point-to-point ports. Ethernet ports can be considered edge ports, unless another<br />

bridge is connected to the same segment. Anyway, since the st<strong>and</strong>ard establishes that the first BPDU coming into an<br />

edge port removes its edge port status, it can be assumed at startup that all ports are c<strong>and</strong>idate to directly transition<br />

to forwarding:<br />

Ethernet ports start in forwarding state (edge ports).<br />

BPL ports, even though they start in blocking state, are ready for h<strong>and</strong>shake <strong>and</strong> rapid transition to forwarding<br />

(point-to-point).<br />

STP <strong>and</strong> VLANs<br />

If VLANs are active, STP packets must use the management VLAN inside the power-line network.<br />

Common STP<br />

Ethernet interfaces must support the possibility of being configured to remove/add the VLAN tag to the<br />

outgoing/incoming STP packets. That is, the VLAN tag of the STP packets going out the BPL network is removed.<br />

On the other h<strong>and</strong>, VLAN tag must be added to the incoming STP packets, so as to make sure that STP packets<br />

inside the power-line network use the management VLAN.<br />

10 SECURITY<br />

10.1 LOW LEVEL ENCRYPTION AND INTEGRITY<br />

10.1.1 Overview<br />

Encryption <strong>and</strong> Integrity are two key features needed by any communication device to guarantee security <strong>and</strong><br />

privacy in the message exchange.<br />

For encryption IEEE P1901 uses as basic building block the Advanced Encryption St<strong>and</strong>ard (AES) according to<br />

FIPS-97(2002).<br />

AES is a block cipher algorithm while higher layers have to deal with variable length packets. To be able to encrypt<br />

these variable length packets IEEE P1901 uses the operation mode known as Counter Mode (CTR) defined in<br />

Submission page 279 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

NIST800-38A “Recommendations for Block Cipher Modes of Operation. Methods <strong>and</strong> Techniques”. By the use of<br />

CTR IEEE P1901 achieves confidentiality for messages of arbitrary length.<br />

Nevertheless it is still necessary to provide message integrity against tampering. For this purpose IEEE P1901 uses<br />

the operation mode known as CCM (Counter with CBC-<strong>MAC</strong> (Message Authentication Check)) that avoids the use<br />

of a separate mechanism for providing message integrity. CCM mode of operation combines CTR mode of<br />

encryption with the CBC-<strong>MAC</strong> mode of authentication. CCM is defined in RFC 3610 <strong>and</strong> has been used <strong>and</strong><br />

studied for a long time <strong>and</strong> has well-understood cryptographic properties. The interesting point is that the same<br />

encryption key can be used for both processes in conjunction with other parameters, thus leading, in effect, to two<br />

separated keys.<br />

CCM is only defined for 128-bit block ciphers <strong>and</strong>, though it is a generic mode applicable to any many ciphers, in<br />

IETF RFC3610 it is defined for use with 128-bit AES.<br />

CCM has two parameters (M <strong>and</strong> L). M indicates the length of the MIC (Message Integrity Check) <strong>and</strong> L indicates<br />

the length of the message itself. For the selected algorithm M is equal to 4 (thus indicating that the Message<br />

Integrity Check (MIC) produced is 4 bytes long) <strong>and</strong> L is equal to 2 (thus indicating that the length of the message<br />

is at most 2^16 bytes as is exactly the maximum length of a burst).<br />

Encryption <strong>and</strong> Integrity are both based on AES blocks <strong>and</strong> needs a different initialization variables <strong>and</strong> modes to<br />

work. The information about the initial state for desencryption <strong>and</strong> integrity check is transported in the CCMP<br />

Header.<br />

Encryption <strong>and</strong> Integrity are applied when the burst is set as encrypted <strong>and</strong> over each one of the packets or packet<br />

fragments inside the burst payload independently, but using the common initial state contained in the CCMP<br />

Header, that is transmitted only once each burst at the beginning of the payload.<br />

Each MIC is calculated over the Burst Header, CCMP Header, the Interpacket Header added by the LLC layer <strong>and</strong><br />

the packet or fragment of a packet including the padding, <strong>and</strong> then appended to this structure, althought Burst<br />

Header <strong>and</strong> CCMP Header are only transmitted once at the beginning of the Burst.<br />

The encryption algorithm is also applied in a fragment packet or packet basis. Burst Header, CCMP Header <strong>and</strong><br />

Interpacket Headers shall be sent in clear, <strong>and</strong> the encryption is applied over the fragment packet or packet<br />

including its padding <strong>and</strong> the appended MIC.<br />

10.1.2 Detailed encryption process<br />

As has been described before, Encryption <strong>and</strong> Integrity algorithms are applied in a packet or fragment of packet<br />

basis, but using common initial state information for each Burst contained in the CCMP Header.<br />

Submission page 280 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The Crypto bit, located at the byte 15, 6th bit of the Burst Header, when set to 1, indicates that encryption is used in<br />

this Burst. Therefore, the CCMP header is appended after the Burst Header <strong>and</strong> the MIC is placed after each<br />

fragment of packet or packet, including its padding. Each MIC will be calculated over the Burst Header, CCMP<br />

Header (structures that are common for all MIC calculations inside the same Burst), Interpacket Header <strong>and</strong> the<br />

fragment packet or packet including its padding.<br />

Although for the calculation of each MIC Burst Header <strong>and</strong> CCMP Header are taken into account, these fields shall<br />

be transmitted only once per Burst.<br />

Each one of the generated MICs <strong>and</strong> its correspondent fragment packet or packet including its padding shall be<br />

encrypted using the CTR AES algorithm.<br />

In the following figure an Encrypted Burst construction is depicted:<br />

PADDING<br />

Figure 140: Construction of an Encrypted Burst<br />

The CCMP header is inserted between Burst Header <strong>and</strong> the first Interpacket Header <strong>and</strong> it is not to be encrypted<br />

although shall be protected by every MIC. A representation of the CCMP header is shown in Figure 141. It shall<br />

contain the following fields:<br />

- Packet Number (PN) - 48 bits. Packets or segment of packets are numbered by the use of a PN. The PN is<br />

incremented by a positive number at each successive packet or fragment of a packet transmission. PN shall<br />

never repeat for a series of encrypted packets using the same temporal key. PN provides replay protection<br />

<strong>and</strong> enables the receiver to derive the value of the nonce that was used in the encryption <strong>and</strong> integrity<br />

algorithms.PN is represented as an array of 6 octets. PN5 is the most significant octet of the PN, <strong>and</strong> PN0 is<br />

Submission page 281 UPA-OPERA<br />

PADDING<br />

PADDING


4-June-07 P1901_PRO_016_r0<br />

the least significant. The Packet Number sent in the CCMP Header is the one correspondent to the first<br />

packet or fragment of a packet sent in the Burst.<br />

- Rsvd – 8 bits. Reserved bits set to 0 <strong>and</strong> ignored on reception.<br />

- KeyID - 8 bits. 5 bits are reserved <strong>and</strong> set to 0. Bit 5 is set to 1. Bits 6–7 of the Key ID octet are for the Key<br />

ID subfield. The Key ID subfield allows for operating with different keys.<br />

The CCMP Header shall be the following structure:<br />

1 byte<br />

PN0 PN1 Rsvd KeyID PN2 PN3 PN4 PN5<br />

Rsvd 1 KeyID<br />

Submission page 282 UPA-OPERA<br />

1 bit<br />

b0 b4 b5 b6 b7<br />

Figure 141: CCMP Header Structure<br />

CCM requires for encryption <strong>and</strong> message integrity checking, an unique Nonce value, a number which never<br />

repeats during a given life time, for each packet protected by a given temporal key. CCM requires a fresh temporal<br />

key for every session.<br />

The PN is combined with other fields to produce a 13-octet long Nonce as corresponds to setting the parameter L to<br />

2 as indicated in IETF RFC 3610. This Nonce is represented in Figure 142.


4-June-07 P1901_PRO_016_r0<br />

The Nonce shall be the following fields:<br />

Figure 142: Nonce Structure<br />

- Nonce priority – 8 bits. This field is different from the priority field in the burst header <strong>and</strong> is for future<br />

capability. The Nonce Priority Octet field shall be 0 <strong>and</strong> is reserved for future use.<br />

- Source Address – 48 bits. It is taken from the <strong>MAC</strong> address of the transmitter included in the Token<br />

Announce (Section 4.4.1).<br />

- PN – 48 bits. It is calculated adding to the PN of the CCMP Header the number of the first packet or<br />

fragment of packet of the Burst minus one.<br />

This Nonce is used to produce two 128-bit words: B0 <strong>and</strong> A0 (IETF RFC 3610 <strong>and</strong> NIST 800-38c).<br />

The initial CCMP block B0 (128-bit block), needed for the calculation of the MIC, has the following fields:<br />

- Flag B0 – 8 bits. Fix content (IETF RFC 3610 <strong>and</strong> <strong>and</strong> NIST 800-38c). It indicates that the MIC is 32 bits<br />

long. See Table 58.<br />

- Nonce – 104 bits. See Figure 142<br />

- DLen – 16 bits. Length in bytes of the data to be encrypted. The DLen is the taken from the Length field of<br />

the Inter Packet Header (Figure 58).<br />

Submission page 283 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 143: CCM Block B0 used for MIC calculation<br />

The initial counter block A0 (128-bit block), needed for the encryption process, has the following fields:<br />

- Flag A0 – 8 bits. Fix content (IETF RFC 3610 <strong>and</strong> <strong>and</strong> NIST 800-38c). See Table 1.<br />

- Nonce – 104 bits. See Figure 142.<br />

- Counter – 16 bits. Counter that starts at the value of one at the beginning of the encryption process <strong>and</strong> is<br />

incremented for each encrypted 128-bit block.<br />

1 byte<br />

1 byte<br />

6 bytes 6 bytes<br />

FlagA0 Priority Source Address PN<br />

104 bits Nonce<br />

Figure 144: Counter Block A0 used to initialize the encryption<br />

Counter<br />

FlagsA0 <strong>and</strong> FlagsB0 are 8-bit words with a fix contents (IETF RFC 3610 <strong>and</strong> <strong>and</strong> NIST 800-38c) as indicated as<br />

follows.<br />

Bit Number Contents of Flag A0 Contents of Flag B0<br />

7 Reserved (Always 0) Reserved (Always 0)<br />

6 Reserved (Always 0) 1<br />

5-3 0 (M-2)/2 (001)<br />

2-0 L-1 (001) L-1 (001)<br />

Submission page 284 UPA-OPERA<br />

2 bytes


4-June-07 P1901_PRO_016_r0<br />

Table 58: Flag A0 <strong>and</strong> B0 Contents<br />

The Burst Header, CCMP header <strong>and</strong> Interpacket Headers shall be transmitted unencrypted. In the calculation of<br />

each MIC, the Burst Header plus the CCMP header <strong>and</strong> the Interpacket Header are more than 128 bits long.<br />

Because of this fact, it is necessary, for the proper calculation of the first MIC, to add some padding at the end of<br />

the Interpacket Header to get three 128-bit blocks. The padding bits shall not be transmitted. This padding is only<br />

used for MIC calculation. Padding bits are not used for encryption. The procedure is shown in Figure 145.<br />

Figure 145: Encryption <strong>and</strong> Integrity process for the first packet<br />

In the case of the second <strong>and</strong> subsequent packets, the MIC calculation shall remain the same, but in the encryption,<br />

the Burst Header <strong>and</strong> CCMP Header will not be included in the resulting Encrypted message. The padding bits shall<br />

not be transmitted. This padding is only used for MIC calculation. Padding bits are not used for encryption. The<br />

procedure is shown in Figure 146.<br />

Submission page 285 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 146: Encryption <strong>and</strong> Integrity process for all but the first packet<br />

The MIC is computed in both cases using CBC-<strong>MAC</strong>, which encrypts a starting block B0 <strong>and</strong> then successively<br />

XORs subsequent blocks <strong>and</strong> encrypts the result. Although the result is a MIC of 128 bits, the lower 96 bits are<br />

discarded, <strong>and</strong> a final 32-bit MIC is obtained.<br />

Once the MIC has been computed <strong>and</strong> appended to the plaintext data, the encryption takes place using Counter<br />

Mode (CTR).<br />

10.2 AAA protocol<br />

In section 9.1.3 the access method used in IEEE P1901 has been described. Nevertheless, for the sake of security,<br />

section 9.1.3 is to be complemented with the AAA protocol that is described in the present section.<br />

The access <strong>and</strong> authentication control system of IEEE P1901 follows closely the one described in IEEE802.1X<br />

which in turn relies on the Extensible Authentication Protocol (EAP) [RFC3748] over LAN (EAPOL). IEEE802.1X<br />

provides the description of EAPOL.<br />

The purpose of IEEE 802.1X is to implement access control at the point at which a user joins the network. In the<br />

process of application of IEEE 802.1X the network entities can take one of three roles: Supplicant, Authenticator<br />

<strong>and</strong> Authentication Server (AS).<br />

The device asking for connection to the network is known as the Supplicant <strong>and</strong> in IEEE P1901 can be either a CPE<br />

or a TDR. The Authenticator can be either the HE or a TDR. The Authentication Server will normally be<br />

centralized.<br />

The IEEE 802.1X access control mechanisms apply to the association between a CPE or TDR <strong>and</strong> a Master.<br />

Submission page 286 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

In IEEE 802.1X an access <strong>and</strong> authentication dialog is defined for the case of authenticator initiated exchange. This<br />

dialog is formed by the following sequence of messages:<br />

• Message A: Authenticator to Supplicant<br />

o EAPOL with Code field: Request (1) <strong>and</strong> Type field: Identity (1)<br />

• Message B: Supplicant to Authenticator<br />

o EAPOL with Code field: Response (2) <strong>and</strong> Type field: Identity (1)<br />

• Message C: Authenticator to Supplicant<br />

o EAPOL with Code field: Request (1) <strong>and</strong> Type field: Challenge (4)<br />

• Message D: Supplicant to Authenticator<br />

o EAPOL with Code field: Response (2) <strong>and</strong> Type field: Challenge (4)<br />

• Message E: Authenticator to Supplicant<br />

o EAPOL with Code field: Success (3) or Failure (4)<br />

In IEEE P1901 Message A of the previous dialog should be implemented by the use of the <strong>Access</strong> Frame described<br />

in section 4.3.8., Message B should be implemented by the use of the <strong>Access</strong> Reply Frame described in section<br />

4.3.9 <strong>and</strong> Message E should be implemented by the use of the <strong>Access</strong> Protocol Packet described in section 9.1.3.<br />

Messages C <strong>and</strong> D serve for the purpose of authentication. With message C the Authenticator sends a r<strong>and</strong>om<br />

challenge of 16 octets to the Supplicant <strong>and</strong> message D is the response of the Supplicant to this challenge. This<br />

Response is a 16-octet MD5 hash calculated over the r<strong>and</strong>om challenge <strong>and</strong> the secret shared by the Supplicant <strong>and</strong><br />

the Authentication Server <strong>and</strong> other fields [RFC 2865]. This secret should be the Serial Number of the Supplicant.<br />

IEEE 802.1X states that “The EAPOL encapsulation used with IEEE802.3/Ethernet can be applied to other LAN<br />

technologies that share the same basic frame format as Ethernet” as is the case of IEEE P1901 technology. As a<br />

consequence, the format of Messages C <strong>and</strong> D in IEEE P1901, which follows the rules of EAPOL packets, are<br />

encapsulated in CLPDUs. The formats are the following:<br />

Submission page 287 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Packet Body<br />

Description<br />

Nr. Of<br />

octets<br />

Contents<br />

PAE Ethernet Type 2 0x88-8E<br />

EAPOL Protocol Version 1 0x02<br />

Packet Body Length 2 0x007F<br />

Code 1<br />

Identifier 1<br />

Message C: Request (1)<br />

Message D: Response (2)<br />

Requests must modify the Identifier<br />

Responses must match them<br />

Length in octets 2 0x007F<br />

Type 1<br />

Default: 0x04 (MD5 Challenge)<br />

Open to other hash functions<br />

Value size 1 Default: 0x10<br />

Value<br />

Default:<br />

16<br />

This content is included in the payload of a CCP packet.<br />

Table 59: Message C <strong>and</strong> D format<br />

Message C: R<strong>and</strong>om Number<br />

Message D: Hash<br />

All of the previous messages, except for Message A, have to be transferred from the Authenticator to the AS or the<br />

other way around. This transfer is done in IEEE P1901 by the use of EAP over Radius [RFC 3579] although Radius<br />

as a server [RFC2865] does not form part of this specification.<br />

The Format of the EAP over Radius messages follows completely the st<strong>and</strong>ard [ RFC2865] [RFC3579].<br />

The IEEE P1901 <strong>Access</strong> Reply Frame is converted into a “Radius <strong>Access</strong>-Request/EAP” packet. From the <strong>Access</strong><br />

Reply Frame the Authenticator creates a st<strong>and</strong>ardized EAP-Response /Identity packet <strong>and</strong> encapsulates it within a<br />

RADIUS <strong>Access</strong>-Request packet.<br />

Submission page 288 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

The format of this EAP-Response/Identity packet to be encapsulated in the RADIUS <strong>Access</strong>-Request is the already<br />

indicated for Messages C <strong>and</strong> D but the Packet Body is the following:<br />

Packet Body<br />

Description<br />

Nr. Of<br />

octets<br />

Contents<br />

Code 1 Response (0x02)<br />

Identifier 1<br />

Requests must modify the Identifier<br />

Responses must match them<br />

Length in octets 2 0x000C<br />

Type 1 0x01 (Identity)<br />

Value size 1 0x06<br />

Value 6 <strong>MAC</strong> Address of the supplicant<br />

Table 60: Packet Body Format for EAP-Response/Identity packet fro messages C <strong>and</strong> D<br />

The Response to the previous message by the AS is an “<strong>Access</strong>-Challenge/EAP” packet which the authenticator<br />

will convert into Message C for transmission to the Supplicant just decapsulating it.<br />

Message D (EAP-Response/Challenge) shall be encapsulated by the Authenticator into a RADIUS <strong>Access</strong>-<br />

Request/EAP.<br />

And the response to the previous message will be a “Radius <strong>Access</strong>-Accept (or Reject)/EAP” packet which the<br />

authenticator will convert into Message E for transmission to the Supplicant by forming an IEEE P1901 “<strong>Access</strong><br />

Protocol Packet” as indicated in section 9.1.3, which has also the possibility to signal “Failed” besides Accept or<br />

Reject. This would happen in case of failure of the dialog between the Authenticator <strong>and</strong> the Authentication Server.<br />

The Format of the RADIUS packet encapsulating an EAP message is the following [RFC2865]:<br />

Submission page 289 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Attribute Attribute<br />

Table 61: RADIUS packet encapsulating an EAP message<br />

In the case of Radius <strong>Access</strong>-Request/EAP packet it is necessary to add to the previous message structure the<br />

following Attributes:<br />

Submission page 290 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Attribute Attribute Attribute<br />

Table 62: RADIUS <strong>Access</strong>-request/EAP Attributes<br />

The User Name Attribute must be sent even if the String is already included in the EAP Attribute. This last<br />

Attribute must [RFC3579 ]also be included in the <strong>Access</strong>-Accept.<br />

Exactly one RADIUS packet is encapsulated in the UDP Data field, where the UDP Destination Port field indicates<br />

1812 (decimal). When a reply is generated, the source <strong>and</strong> destination ports are reversed.<br />

Figure 147 is a representation of the access <strong>and</strong> authentication dialog used in IEEE P1901.<br />

Submission page 291 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Figure 147: Representation of the access <strong>and</strong> authentication dialog used in IEEE P1901.<br />

At the end of the dialog the Supplicant is already authenticated but the keys for encryption <strong>and</strong> for integrity<br />

checking are still not established. This is the subject of the next section.<br />

10.3 Key Hierarchies<br />

There are two key hierarchies in IEEE P1901: Pairwise Key Hierarchy <strong>and</strong> Group Key Hierarchy.<br />

It is assumed that there is a Pairwise Master Key (PMK) that is assumed to be in possession of the Supplicant <strong>and</strong><br />

the Authenticator by some “out of b<strong>and</strong> means” <strong>and</strong> which distribution is not the subject of this specification, <strong>and</strong> a<br />

Group Master Key (GMK) which is generated at r<strong>and</strong>om by the HE or by some other higher level entity.<br />

From the PMK the following temporal keys are derived for use in conjunction with the AES-CCMP algorithm:<br />

- Data Encryption/Integrity key (128 bits)<br />

- EAPOL-Key Encryption key (128 bits)<br />

Submission page 292 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

- EAPOL-Key Integrity key (128 bits)<br />

From the GMK the following temporal key is derived:<br />

- Group Encryption/Integrity key (128 bits)<br />

The EAPOL keys are used to protect key h<strong>and</strong>shakes.<br />

These hierarchies are conformant to the st<strong>and</strong>ard IEEE802.11i.<br />

10.4 Establishing the keys<br />

To compute the Pairwise Temporal Keys (PTK) the 4-Way H<strong>and</strong>shake is used [IEEE 802.11i].<br />

As indicated in Figure 148 the procedure implies the use of 4 messages that use the EAPOL-key format<br />

Figure 148: Schematics of the 4-way h<strong>and</strong>shake<br />

Submission page 293 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

In this dialog Supplicant <strong>and</strong> Master exchange two Nonces that allow to derive the PTK; Supplicant <strong>and</strong><br />

Authenticator prove knowledge of the PMK to the other one <strong>and</strong> both synchronize to turn on the encryption keys for<br />

unicast packets. Message 3 may also be used to send the GTK (Group Transient Key).By this way the Supplicant<br />

<strong>and</strong> the Authenticator have established a secure channel using encryption in both directions.<br />

11 SYSTEM PARAMETERS<br />

11.1 GENERAL PARAMETERS<br />

• GENERAL_USE_AUTOCONF = [YES | NO]<br />

Parameter: YES enables autoconf, NO disables it.<br />

SNMP: no<br />

M<strong>and</strong>atory: yes<br />

This should be the first parameter in the auto-configuration file. If this parameter is disabled, when downloading<br />

the file, all the parameters will be stored in non-volatile memory, <strong>and</strong> next boot-up will be in local settings boot<br />

mode. In case of enabled, except a few parameters that must be necessarily saved in non-volatile memory, the<br />

others will not be stored in the non-volatile memory, <strong>and</strong> next boot-up will be in Auto-configuration mode. By<br />

default, it is enabled.<br />

• GENERAL_TYPE = [HE | CPE | TDREPEATER]<br />

Parameter: Possible values are: HE (Head End), CPE (Customer Premises Equipment) <strong>and</strong> TDREPEATER (Time<br />

Division Repeater).<br />

SNMP: plSysNodeType<br />

M<strong>and</strong>atory: yes<br />

Configures the type of node. A node can be configured as a HE (Head End), a CPE (Customer Premises<br />

Equipment) or a TDREPEATER (Time Division Repeater). The default value is CPE.<br />

• GENERAL_FW_TYPE = [MV | LV | EU]<br />

Parameter: Possible values are: MV (<strong>Medium</strong> Voltage), LV (Low Voltage) <strong>and</strong> EU (End User).<br />

Submission page 294 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

SNMP: no<br />

M<strong>and</strong>atory: yes<br />

Configures the firmware type of the node. The following firmware types can be configured: MV (<strong>Medium</strong><br />

Voltage), LV (Low Voltage) <strong>and</strong> EU (End User). This parameter affects the QoS <strong>and</strong> VLAN/OVLAN<br />

configuration. The default value is LV.<br />

• GENERAL_SIGNAL_MODE = [1 … m]<br />

Parameter: Configures the physical mode used by the modem. This value can reach from 1 to m, depending on the<br />

range of frequency used.<br />

SNMP: plBasicMode<br />

M<strong>and</strong>atory: yes<br />

Configures the physical mode used by the modem. The valid modes depend on the range of frequency used.<br />

• GENERAL_SIGNAL_MODE_LIST.i = [1 … m]<br />

Parameter: This value can reach from 1 to m, depending on the range of frequency used.<br />

SNMP: plBasicSearchModes<br />

M<strong>and</strong>atory: yes<br />

Configures i-mode of the mode list for the modem to search with the SearchLink protocol (i = 1 … 12). The<br />

valid modes depend on the range of frequency used. The mode list is scanned to select the range of frequencies<br />

that will be taken into account by the modem.<br />

GENERAL_AUTHENTICATION = [RADIUS | AUTHLIST | NONE]<br />

Parameter: There are three possible values: RADIUS, ATHLIST <strong>and</strong> NONE. If RADIUS is selected, a RADIUS<br />

server will be in charge of accepting new users <strong>and</strong> assigning the profile. If AUTHLIST is selected, authentication<br />

will be done by checking a list provided in the auto-configuration file. If NONE is selected, all the users will be<br />

accepted<br />

SNMP: no<br />

Submission page 295 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

M<strong>and</strong>atory: yes<br />

Selects one of the following authentication methods:<br />

RADIUS server. In this case, a RADIUS server will be in charge of accepting new users <strong>and</strong> assigning the profile.<br />

Authorization list. In this case, authentication will be done by checking a list provided in the auto-configuration file.<br />

This option avoids the installation of a RADIUS server.<br />

No authentication. In this case, no authentication method is used at all. Therefore, all the users will be accepted.<br />

By default, no authentication is used.<br />

• GENERAL_STP = [YES | NO]<br />

Parameter: Enables (YES) or disables (NO) the Spanning Tree Protocol in the node.<br />

SNMP: plStpEnable<br />

M<strong>and</strong>atory: yes<br />

Enables or disables the Spanning Tree Protocol in the node. Enabled by default.<br />

• GENERAL_COMMON_STP_EXTA = [YES | NO]<br />

Parameter: Enables (YES) or disables (NO) the Common STP feature in the Ethernet interface A (EXTA).<br />

SNMP: no<br />

M<strong>and</strong>atory: no<br />

Enables or disables the Common STP feature in the Ethernet interface A (EXTA). This parameter only makes<br />

sense to be used if VLANs are enabled. If it is enabled, STP packets will be released <strong>and</strong> accepted through<br />

EXTA without VLAN tag (even if VLANs are enabled). If it is disabled, STP packets will be released with the<br />

management VLAN tag (if VLANs are active).<br />

WARNING: with this parameter enabled, all packets without VLAN will be accepted through EXTA.<br />

Submission page 296 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• GENERAL_COMMON_STP_EXTB = [YES | NO]<br />

Parameter: Enables (YES) or disables (NO) the Common STP feature in the Ethernet interface B (EXTB).<br />

SNMP: no<br />

M<strong>and</strong>atory: no<br />

Enables or disables the Common STP feature in the Ethernet interface B (EXTB). This parameter only makes<br />

sense to be used if VLANs are enabled. If it is enabled, STP packets will be released <strong>and</strong> accepted through<br />

EXTB without VLAN tag (even if VLANs are enabled). If it is disabled, STP packets will be released with the<br />

management VLAN tag (if VLANs are active).<br />

WARNING: with this parameter enabled, all packets without VLAN will be accepted through EXTB.<br />

• GENERAL_IP_ADDRESS = <br />

Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by dots).<br />

SNMP: plSysStaticIPAddress<br />

M<strong>and</strong>atory: no<br />

Configures the IP address to be used when booting up with DHCP disabled.<br />

• GENERAL_IP_NETMASK = <br />

Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by dots).<br />

SNMP: plSysStaticNetMask<br />

M<strong>and</strong>atory: no<br />

Configures the IP network mask to be used when booting up with DHCP disabled.<br />

• GENERAL_IP_GATEWAY = <br />

Submission page 297 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by dots).<br />

SNMP: plSysStaticDefaultGW<br />

M<strong>and</strong>atory: no<br />

Configures the default gateway IP address to be used when booting up with DHCP disabled.<br />

• GENERAL_IP_USE_DHCP = [YES | NO]<br />

Parameter: If Yes DHCP is used, if NO DHCP is not used.<br />

SNMP: plSysUseDHCP<br />

M<strong>and</strong>atory: no<br />

Enables or disables the DHCP protocol in the modem. If DHCP is enabled, network configuration parameters<br />

(IP address, network mask <strong>and</strong> default gateway IP address) will be obtained from a DHCP server when booting<br />

up. If it is disabled, the network configuration parameters saved in the non-volatile memory will be used<br />

instead.<br />

11.2 AGC (AUTOMATIC GAIN CONTROL) PARAMETERS<br />

The following parameters must be h<strong>and</strong>led with special care. A bad configuration of them can produce lost of<br />

communication with the modem through BPL.<br />

• AGC_TX_GAIN = [0 | 1]<br />

o Parameter: Selecting 1, the default value, 12 dB are added to the reference gain. In case of 0 value,<br />

no extra gain is added (0 dB).<br />

o SNMP: plBasicTXAGCGain<br />

o M<strong>and</strong>atory: no<br />

It configures the transmission gain. Two gain values, 0 <strong>and</strong> 12 dB, can be added to the reference gain. By default,<br />

12 dB are selected.<br />

• AGC_RX_ENABLE = [0 | 1]<br />

Submission page 298 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: Enables (1) or disables (0) the hardware AGC.<br />

o SNMP: plBasicRXAGCEnable<br />

o M<strong>and</strong>atory: no<br />

Enables or disables the reception HW AGC. It is enabled by default.<br />

• AGC_RX_FIX_GAIN = [0 … 7]<br />

o Parameter: Eight values, from 0 to 7, are possible. Those values represent gains from 0 to 42 dB,<br />

respectively, added to the reference gain in steps of 6 dB.<br />

o SNMP: plBasicRXAGCGain<br />

o M<strong>and</strong>atory: no<br />

It sets a fixed value for the reception gain. This value is only taken into account if the HW AGC is disabled.<br />

Eight gain values, from 0 to 42 dB, can be added to the reference gain.<br />

• AGC_MAX_RX_GAIN = [0 … 7]<br />

o Parameter: Eight values, from 0 to 7, are possible. Those values represent gains from 0 to 42 dB,<br />

respectively, added to the reference gain in steps of 6 dB. The default value is 7 (42 dB).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the maximum reception gain for the HW AGC. Eight gain values, from 0 to 42 dB, can be<br />

added to the reference gain. The default value is 42 dB.<br />

• AGC_MIN_RX_GAIN = [0 … 7]<br />

o Parameter: Eight values, from 0 to 7, are possible. Those values represent gains from 0 to 42 dB,<br />

respectively, added to the reference gain in steps of 6 dB. The default value is 7 (42 dB).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the minimum reception gain for the HW AGC. Eight gain values, from 0 to 42 dB, can be added<br />

to the reference gain. The default value is 0 dB.<br />

11.3 RADIUS PARAMETERS<br />

• RADIUS_SERVER_IP = <br />

Submission page 299 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This autoconfiguration parameter specifies the RADIUS server IP address. The access-request of the<br />

RADIUS procedure is submitted to the RADIUS server via the network using this IP address.<br />

• RADIUS_SERVER_PORT = ddddd<br />

o Parameter: Port number<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

It specifies the RADIUS client UDP port. The access-request of the RADIUS procedure is submitted to the<br />

RADIUS server via the network as a UDP communication to the IP address set before <strong>and</strong> sent to the UDP<br />

port of this parameter.<br />

• RADIUS_SHARED_SECRET = <br />

o Parameter: ‘shared_secret’ (string, limited to 16 characters, of the shared secret)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

It sets the RADIUS shared secret, which is limited to 16 characters. The forwarding server decrypts the<br />

User-Password, if present, using the shared secret. Once the RADIUS server receives the request, it<br />

validates the sending client. A request from a client for which the RADIUS server does not have a shared<br />

secret MUST be silently discarded<br />

All three parameters must be set up in order for the RADIUS client to work properly.<br />

11.4 CLASS OF SERVICE (COS) PARAMETER<br />

Using the auto-configuration file, 2 classes of service criteria can be defined, assigning priorities from 0 to 7.<br />

• COS_CUSTOM_CRITERION_OFFSET.i = [1 … 531]<br />

o Parameter: Values from 1 to 531 are possible.<br />

o SNMP: no<br />

Submission page 300 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o M<strong>and</strong>atory: no<br />

Custom i-criterion frame offset, in bytes (i = 1, 2).<br />

• COS_CUSTOM_CRITERION_PATTERN.i = 0xXXXXXXXXXXXXXXXX<br />

o Parameter: The value must be specified with 16 hexadecimal digits.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Custom i-criterion 8-byte pattern (i = 1, 2).<br />

• COS_CUSTOM_CRITERION_BITMASK.i = 0xXXXXXXXXXXXXXXXX<br />

o Parameter: The value must be specified with 16 hexadecimal digits.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Custom i-criterion 8-byte bitmask (i = 1, 2).<br />

• COS_CUSTOM_CRITERION_CLASSES_OFFSET.i = [1 … 531]<br />

o Parameter: Values from 1 to 531 are possible.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Custom i-criterion classes frame offset, in bytes (i = 1, 2).<br />

• COS_CUSTOM_CRITERION_CLASSES_BITMASK.i i = 0xXXXXXXXXXXXXXXXX<br />

o Parameter: The value must be specified with 16 hexadecimal digits.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Custom i-criterion classes 8-byte bitmask (i = 1, 2).<br />

• COS_CUSTOM_CRITERION_CLASSES_PATTERN.i.j i=0xXXXXXXXXXXXXXXXX<br />

o Parameter: The value must be specified with 16 hexadecimal digits<br />

o SNMP: no<br />

Submission page 301 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o M<strong>and</strong>atory: no<br />

Custom i-criterion j-class 8-byte pattern (i = 1, 2; j = 1 … 8).<br />

• COS_CUSTOM_CRITERION_CLASSES_PRIO.i.j = [0 … 7]<br />

o Parameter: Values from 0 to 7 are allowed.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Priority assigned the packets that match the custom i-criterion j-class priority (i = 1, 2; j = 1 … 8).<br />

• COS_CRITERION.k = [8021P | TOS | CUSTOM1 | CUSTOM2]<br />

o Parameter: There are two predefined criteria (8021P, based on IEEE 802.1p VLAN tag priority<br />

field, <strong>and</strong> TOS, based on IP type of service), <strong>and</strong> two custom criteria (CUSTOM1 <strong>and</strong> CUSTOM2),<br />

defined with the parameters above (COS_CUSTOM_CRITERION_xxx).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

k-criterion definition (k = 1, 2). Assigns up to 2 criteria to classify traffic. There are two predefined criteria<br />

(one based on IEEE 802.1p VLAN tag priority field, <strong>and</strong> another based on IP type of service), <strong>and</strong> two<br />

custom criteria, defined with the parameters above (COS_CUSTOM_CRITERION_xxx).<br />

• COS_DEFAULT_PRIO = [0 … 7]<br />

o Parameter: Values from 0 to 7 are allowed.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Configures the CoS default priority, i.e. the priority assigned to packets that do not match any criterion.<br />

11.5 QUALITY OF SERVICE (QOS) PARAMETERS<br />

• QOS_ENABLE = [YES | NO]<br />

o Parameter: Enables (YES) or disables (NO) the quality of service in the node.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Submission page 302 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Enables or disables the quality of service in the node. If this parameter is disabled, all other parameters<br />

related to QoS will not be configured.<br />

• QOS_PRIOACK.prio+1 = [0 | 1]<br />

o Parameter: This list enables (1) or disables (0) the <strong>Layer</strong> 2 ACK protocol depending on the<br />

priority level transmitted by the modem (priority levels: prio = 0 … 7).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This list enables or disables the <strong>Layer</strong> 2 ACK protocol depending on the priority level transmitted by the<br />

modem (can be useful for those applications with hard settings in latency but not in PLR) (priority levels:<br />

prio = 0 … 7). The ACK policy is carried out as follows:<br />

o The highest priority of all the outgoing frames present in the output buffers of the modem is<br />

obtained.<br />

o If the <strong>Layer</strong> 2 ACK protocol is enabled for such a priority, the ACKs will be enabled for all<br />

priorities.<br />

o If the <strong>Layer</strong> 2 ACK protocol is disabled for such a priority, the ACKs will be disabled for all<br />

priorities.<br />

The <strong>Layer</strong> 2 ACK protocol is enabled for all the priorities by default.<br />

11.5.1 Slave Node Parameters (CPE)<br />

• QOS_UPBWLIMIT = [YES | NO]<br />

o Parameter: Enables (YES) or disables (NO) the transmission b<strong>and</strong>width limitation in a slave.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Enables or disables the transmission b<strong>and</strong>width limitation in a slave. Enabled by default. If disabled, the<br />

user will transmit data constantly without restrictions. Every time it receives a resource allocation message<br />

to use the channel, there will be no limit imposed by the slave when transmitting data back to its master.<br />

11.5.2 Master Node Parameters (HE or REPEATER)<br />

• QOS_LATENCY_STEP = [20 … 400]<br />

o Parameter: Values in ms, from 20 to 400.<br />

o SNMP: no<br />

Submission page 303 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o M<strong>and</strong>atory: yes<br />

It configures the minimum latency step for the different slaves when using QoS.<br />

• QOS_BW_POLICY = [0 | 1]<br />

o Parameter: A value of 0 corresponds to Fair mode, <strong>and</strong> 1 to Priority-based mode.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Selects the policy in which the QoS manages the excess of b<strong>and</strong>width: Fair or Priority-based mode.<br />

• QOS_LATENCY.prio+1 = [1 | 2 | 4 | 8]<br />

o Parameter: Priority levels: prio = 0 … 7. Possible values are: 1, 2, 4 <strong>and</strong> 8.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This list configures the latency for each priority level in QOS_LATENCY_STEP units (priority levels: prio<br />

= 0 … 7).<br />

11.6 PROFILES PARAMETERS<br />

A profile is set of configurable parameters that are saved as a whole. A number is assigned to each profile, <strong>and</strong><br />

when a modem is assigned one profile, it will use all the parameters that are saved in this profile.<br />

To define a profile all parameters must be set up, even if not working with VLANs. In this case, the values are<br />

not used <strong>and</strong> can be 1 for instance.<br />

• PROFILE_MAX_TXPUT_TX.i = N (in kbps)<br />

o Parameter: Number (32 bits size) of kbps<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Maximum transmission throughput (from the slave point of view: upstream) for users with profile i. A<br />

modem that uses the profile ‘i’ will have a transmission throughput limited to this value.<br />

Submission page 304 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• PROFILE_MAX_TXPUT_RX.i N (in kbps)<br />

M<strong>and</strong>atory: yes<br />

o Parameter: Number (32 bits size) of kbps<br />

o SNMP: no<br />

Maximum reception throughput (from the EU point of view: downstream) for users with profile i. A modem that<br />

uses the profile ‘i’ will have the reception throughput limited to this value.<br />

• PROFILE_UPBWLIMIT.i = [YES|NO]<br />

o Parameter: ‘yes’ (to limit the upstream) or ‘no’ (to not limit the upstream)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

In a Master or a TD Repeater, this parameter is used to limit the upstream (slave’s transmission) for users<br />

with profile i. This parameter is set to ‘yes’ by default.<br />

If set to ‘no’, the user will receive resource allocation messages constantly. Every time the master node has<br />

transmitted all required resource allocation messages to all the slaves with limit up b<strong>and</strong>width enabled, then<br />

it will transmit resource allocation messages to the slaves without up b<strong>and</strong>width limit until the rest of the<br />

slaves can receive resource allocation messages again.<br />

• PROFILE_DWBWLIMIT.i = [YES|NO]<br />

o Parameter: ‘yes’ (to limit the downstream) or ‘no’ (to not limit the downstream)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

In a Master or a TD Repeater, this parameter is used to limit the downstream (slave’s reception) for users<br />

with profile i. This parameter is set to ‘yes’ by default.<br />

If disabled, the master node will never stop transmitting data to that user. Every time the master node has<br />

transmitted all required data to all slaves with down b<strong>and</strong>width limit, then it will transmit data to the slaves<br />

without down b<strong>and</strong>width limit until the rest of slaves can receive again.<br />

• PROFILE_PRIORITIES.i = [0x00-0xFF]<br />

o Parameter: ‘0xXX’ (hexadecimal number from 00 to FF) each bit represents a priority, that can be<br />

set (1) or not (0).i.e. 0x85 priorities 7, 2 <strong>and</strong> 0 are allowed.<br />

Submission page 305 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This parameter indicates the priorities allowed for a user of profile i. This is useful to prioritise some<br />

transmission above others <strong>and</strong> to give some quality of service to the different modems.<br />

At this parameter each bit represents a priority, that can be set or not. The default value is 0x85, so<br />

priorities 7, 2 <strong>and</strong> 0 are allowed. To include another priority, it is necessary to set the appropriate bit in the<br />

profile priorities flag. In any case, the maximum <strong>and</strong> minimum priorities are always set even if they are not<br />

configured (0x81).<br />

• PROFILE_MNMT_VLAN.i = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

If VLANs are used, this value indicates the management VLAN for that user.<br />

• PROFILE_DATA_VLAN.i = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

If VLANs are used, this value indicates the Data VLAN for that user.<br />

• PROFILE_VOIP_VLAN.i = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

If VLANs are used, this valued indicates the VoIP VLAN for that user.<br />

• PROFILE_VLAN_ADD_TAG.i.j = [2-4093] or parametric<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Submission page 306 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

With this parameter a filter list is created. The list can be ‘allowed’ or ‘forbidden’. A user that uses the<br />

profile ‘i’ will add the filter list as allowed or forbidden.<br />

This parameter is of table type, with up to 16 VLAN in the filter list. When the list is ‘allowed’, these tags<br />

are added to the base configuration. Otherwise, if the list is changed to forbidden, the base tags are removed<br />

<strong>and</strong> only the tags defined here are included, for security reasons.<br />

• PROFILE_VLAN_IS_ALLOWED_IFACE_USER.i = [yes/no]<br />

M<strong>and</strong>atory: no<br />

o Parameter: ‘yes’ (to set the list as allowed) or ‘no’ (to set the list as forbidden)<br />

o SNMP: no<br />

This parameter is the complementary of the previous one <strong>and</strong> indicates if the tags on the list are allowed or<br />

forbidden for the user with the profile i. When the list is ‘allowed’ (setting ‘yes’ as value of the parameter) the tags<br />

are additive to the base configuration, when the list is ‘forbidden’ (setting ‘no’ as value of the parameter), the list is<br />

reseted <strong>and</strong> only tags defined with PROFILE_VLAN_ADD_TAG will be in the list.<br />

• PROFILE_VLAN_TAGGED_ONLY_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to drop input packets without VLAN tag) or ‘no’ (to not drop input packets<br />

without VLAN tag)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter indicates whether or not to drop input packets without a VLAN tag from the user with<br />

profile i (PL interface).<br />

• PROFILE_VLAN_OUTFORMAT_TAG_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to send packets with VLAN tag) or ‘no’ (to not send packets with VLAN tag)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter indicates whether or not to send packets with a VLAN tag to the user interface with this<br />

profile.<br />

• PROFILE_OVLAN_ADD_TAG.i.j = [2-4094] or parametric<br />

o Parameter: Number from 2 to 4094 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

o SNMP: no<br />

Submission page 307 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o M<strong>and</strong>atory: yes<br />

With this parameter a filter list is created. The list can be ‘allowed’ or ‘forbidden’. A user that uses the<br />

profile ‘i’ will add the filter list as allowed or forbidden.<br />

This parameter is of table type, with up to 16 OVLAN in the filter list. When the list is ‘allowed’, these tags<br />

are added to the base configuration. Otherwise, if the list is changed to forbidden, the base tags are removed<br />

<strong>and</strong> only the tags defined here are included, for security reasons.<br />

• PROFILE_OVLAN_IS_ALLOWED_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to mark the list as allowed) or ‘no’ (to mark the list as forbidden)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter is the complementary of the previous one <strong>and</strong> indicates if the tags on the list are allowed or<br />

forbidden for the user with the profile i. When the list is ‘allowed’ (setting ‘yes’ as value of the parameter)<br />

the tags are additive to the base configuration, when the list is ‘forbidden’ (setting ‘no’ as value of the<br />

parameter), the list is reset <strong>and</strong> only tags defined with PROFILE_OVLAN_ADD_TAG will be in the list.<br />

• PROFILE_OVLAN_TAGGED_ONLY_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to drop input packets without OVLAN tag) or ‘no’ (to not drop input packets<br />

without OVLAN tag)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter indicates whether or not to drop input packets without a OVLAN tag from the user with<br />

profile i (PL interface).<br />

• PROFILE_OVLAN_OUTFORMAT_TAG_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to send packets with OVLAN tag) or ‘no’ (to not send packets with OVLAN<br />

tag)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter indicates whether or not to send packets with a VLAN tag to the user interface with this<br />

profile.<br />

Submission page 308 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

11.7 TRANSLATION TABLE PARAMETERS<br />

The translation table contains information about the VLAN/OVLANs used for all nodes hanging from HV/MV<br />

equipment. This table is necessary because the autoconfiguration file of equipment is a parametric file, that is,<br />

there are several symbolic values that should be translated into concrete values.<br />

• TRANSLATION_MNMT_VLAN = [2-4093]<br />

o Parameter: Number from 2 to 4093<br />

o SNMP: none<br />

o M<strong>and</strong>atory: yes<br />

Tag number of the Management VLAN. This parameter is m<strong>and</strong>atory when using VLANs in the network.<br />

• TRANSLATION_DATA_VLAN.i = [2-4093]<br />

o Parameter: Number from 2 to 4093<br />

o SNMP: none<br />

o M<strong>and</strong>atory: yes<br />

Tag number of the Data i-operator VLAN (i=1, 2, 3…). Up to 16 different tags can be set.<br />

• TRANSLATION_VOIP_VLAN.i = [2-4093]<br />

o Parameter: Number from 2 to 4093<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

Tag number of the VOIP i-operator VLAN (I=1,2,3,…) Up to 16 different tags can be set.<br />

• TRANSLATION_ROOTPATH_OVLAN = [2-4094]<br />

o Parameter: Number from 2 to 4094<br />

o SNMP: none<br />

o M<strong>and</strong>atory: yes<br />

Tag number of the default OVLAN. This parameter is m<strong>and</strong>atory when using OVLANs in the network.<br />

Submission page 309 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

11.8 <strong>MAC</strong> FILTER PARAMETERS<br />

• <strong>MAC</strong>_INGRESS_FILTERING_ENABLE = [YES | NO]<br />

o Parameter: Enables (YES) or disables (NO) <strong>MAC</strong> ingress filtering in Ethernet interfaces.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Enables or disables <strong>MAC</strong> ingress filtering in Ethernet interfaces (EXTA <strong>and</strong> EXTB). If enabled, only the<br />

incoming frames whose source <strong>MAC</strong> address is contained in the allowed <strong>MAC</strong> list will be processed by the<br />

bridge. If disabled, any <strong>MAC</strong> incoming frame will be processed, regardless its source address.<br />

• <strong>MAC</strong>_INGRESS_FILTERING_MAX_ALLOWED = [1 … 4]<br />

o Parameter: Values from 1 to 4 are possible.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the maximum number of <strong>MAC</strong> addresses contained in the allowed <strong>MAC</strong> list for <strong>MAC</strong> ingress<br />

filtering.<br />

• <strong>MAC</strong>_INGRESS_FILTERING_MODE = [FIXED | AUTO]<br />

o Parameter: Two possible values: FIXED or AUTO. If FIXED is selected, the allowed <strong>MAC</strong> list<br />

must be filled entering each <strong>MAC</strong> address manually. If AUTO is selected, the allowed <strong>MAC</strong> list is<br />

automatically filled with any new source <strong>MAC</strong> address learnt by the bridge.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Selects one of the following <strong>MAC</strong> ingress-filtering modes:<br />

o Fixed. In this case, the allowed <strong>MAC</strong> list must be filled entering each <strong>MAC</strong> address manually.<br />

o Automatic. In this case, the allowed <strong>MAC</strong> list is automatically filled with any new source <strong>MAC</strong><br />

address learnt by the bridge. Until the list is not full, the filtering is not actually performed. Once<br />

the list is full, the filtering is enabled <strong>and</strong> any frame with source <strong>MAC</strong> address not contained in the<br />

list will be discarded.<br />

In both modes, the own <strong>MAC</strong> address is never filtered, i.e. it is implicitly contained in the allowed <strong>MAC</strong><br />

list, although not taken into account when computing the number of allowed addresses.<br />

• <strong>MAC</strong>_INGRESS_FILTERING_FIXED_<strong>MAC</strong>.i 0xXXXXXXXXXXXX<br />

Submission page 310 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: The value must be specified with 12 hexadecimal digits.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures i-<strong>MAC</strong> address of the allowed <strong>MAC</strong> list for <strong>MAC</strong> ingress filtering when fixed <strong>MAC</strong> ingressfiltering<br />

mode is selected (i = 1 … 4).<br />

11.9 NTP PARAMETERS<br />

For complete information about NTP (Network Time Protocol) please refer to RFC 958.<br />

• NTP_ENABLE = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) the NTP feature.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Enables or disables the NTP feature.<br />

• NTP_SERVER_IP = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the NTP server IP address.<br />

• NTP_TIMEZONE = [-12 … 12] * 60<br />

o Parameter: This value must be specified in minutes (in 60-minute steps) relative to Universal<br />

Time (UT). A value of 0 corresponds to UT.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the timezone for the NTP clock server. This value is relative to Universal Time (UT), also known as<br />

Greenwich Mean Time (GMT).<br />

• NTP_DST = [YES | NO]<br />

Submission page 311 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: If the value is YES, the time correction for daylight savings time is applied. Not<br />

applied if NO.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

If this parameter is enabled, the time correction for daylight savings time is applied. Not applied if disabled.<br />

11.10 SNMP PARAMETERS<br />

For complete information about SNMP (Simple Network Management Protocol) please refer to RFC 1157.<br />

• SNMP_TRAP_IP_ADDRESS = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Configures the IP address to which traps are sent when produced.<br />

• SNMP_TRAP_COMMUNITY_NAME = community<br />

o Parameter: This parameter is a string (up to 25 characters) (e.g.<br />

“SNMP_TRAP_COMMUNITY_NAME = public”).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

It configures the trap community access.<br />

11.11 STP PARAMETERS<br />

For complete information about STP (Spanning Tree Protocol) <strong>and</strong> RSTP (Rapid STP) please refer to IEEE 802.1d<br />

<strong>and</strong> IEEE 802.1w st<strong>and</strong>ards, respectively.<br />

• STP_PRIO = [0 … 65535]<br />

o Parameter: Valid values range from 0 to 65535.<br />

o SNMP: no<br />

Submission page 312 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o M<strong>and</strong>atory: no<br />

Configures the 2-byte field which, added to the <strong>MAC</strong> address, is used by the STP st<strong>and</strong>ard to decide the<br />

root path (Bridge Identifier Priority, part of BridgeIdentifier, in IEEE 802.1d). The default values,<br />

depending on the node features, are the following (in hexadecimal):<br />

o 0x9010: MV MASTER<br />

o 0x9010: MV MASTER<br />

o 0x9020: MV TDREPEATER<br />

o 0x9030: LV MASTER<br />

o 0x9040: LV TDREPEATER<br />

o 0x9050: LV CPE<br />

• STP_PORT.i = [EXTA | EXTB | BPL]<br />

o Parameter: Three possible values: EXTA, EXTB <strong>and</strong> BPL (i = 1,2 or 3).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This list configures the type of port to be used in association with STP_PORT_PRIO.i <strong>and</strong><br />

STP_PORT_COST.i parameters. (i = 1 … 3). All these parameters are lists, whose elements are associated<br />

by the same i-index. Ethernet interfaces A <strong>and</strong> B, <strong>and</strong> the BPL ports can be selected. In case of BPL, all<br />

ports will be h<strong>and</strong>led as an aggregate, i.e. the priority <strong>and</strong> cost will be the same for all BPL ports.<br />

• STP_PORT_PRIO.i = [0 … 255]<br />

o Parameter: Valid values range from 0 to 255 (i = 1,2 or 3).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This list configures the priority assigned to each port, needed if their costs are equal (i = 1 … 3). The default<br />

value for all ports is 80.<br />

• STP_PORT_COST.i = [0 … 4294967295]<br />

o Parameter: Valid values range from 0 to 4294967295 (i = 1,2 or 3).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Submission page 313 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

This list configures the cost associated with each port (PortPathCost in IEEE 802.1d) (i = 1 … 3). The<br />

default values, depending on the port type, are the following:<br />

o 2000000: Ethernet interface A (EXTA)<br />

o 2000000: Ethernet interface B (EXTB)<br />

o 4000000: BPL ports<br />

• STP_HELLO_TIME = [10 … 40]<br />

o Parameter: Valid values range from 10 to 40.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Hello time expressed in decisecs (HelloTime in IEEE 802.1d). The default value is 20 decisecs.<br />

• STP_MAX_AGE = [10 … 40]<br />

o Parameter: Valid values range from 10 to 40.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Maximum age time expressed in decisecs (MaxAge in IEEE 802.1d). The default value is 200 decisecs.<br />

• STP_FORWARD_DELAY = [40 … 300]<br />

o Parameter: Valid values range from 40 to 300.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Forward delay time expressed in decisecs (forwardDelay in IEEE 802.1d). The default value is 150<br />

decisecs.<br />

• STP_FRONTIER = [EXTA | EXTB | NONE]<br />

o Parameter: Valid values are: EXTA (Ethernet interface A), EXTB (Ethernet interface B) <strong>and</strong><br />

NONE (Spanning Tree Frontier disabled).<br />

o SNMP: plStpFrontier<br />

o M<strong>and</strong>atory: no<br />

Submission page 314 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Selects the interface where Spanning Tree Frontier is enabled or disables it. This feature drops all the STP<br />

messages on an external (Ethernet) interface.<br />

• STP_MODE = [STP | RSTP]<br />

o Parameter: Possible values: STP selects STP or RSTP selects RSTP.<br />

o SNMP: plStpProtocolVersion<br />

o M<strong>and</strong>atory: yes<br />

Selects STP protocol version, either STP (version < 2, IEEE 802.1d) or RSTP (version ≥ 2, IEEE 802.1w)<br />

(rstpVersion <strong>and</strong> stpVersion in IEEE 802.1d). The RSTP version is compatible with STP on a per-port<br />

basis.<br />

11.12 VOIP PARAMETERS<br />

For complete information about VoIP protocols please refer to ITU H.323, RFC 3261 (SIP) <strong>and</strong> RFC 2705 (MGCP)<br />

st<strong>and</strong>ards.<br />

• VOIP_ENABLE = [ENABLED | DISABLED]<br />

o Parameter: This parameter enables (ENABLED) or disables (DISABLED) the VoIP service.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter enables or disables the VoIP service.<br />

• VOIP_GATEKEEPERIP = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

IP address of the H.323 gatekeeper.<br />

• VOIP_LINE1NUMBER = number<br />

o Parameter: This parameter is a string (maximum string length is 20 characters) (e.g.<br />

“VOIP_LINE1NUMBER = 612345678”).<br />

o SNMP: no<br />

Submission page 315 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o M<strong>and</strong>atory: no<br />

Configures the telephone number for H.323.<br />

• VOIP_DIALPLAN = ([0 … 9, ‘T’, ‘X’, ‘.’, ‘|’])<br />

o Parameter: This parameter is a string with maximum length is 200 characters (e.g.<br />

“VOIP_DIALPLAN = (9XXXXXXXX|6XXXXXXXX|00X.T)”.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the dial plan matching string for H.323. Please see section 11.12.1 for details.<br />

• VOIP_INBANDDTMF = [ENABLED | DISABLED]<br />

o Parameter: This parameter enables (ENABLED) or disables (DISABLED) in-b<strong>and</strong> DTMF feature.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter enables or disables in-b<strong>and</strong> DTMF feature.<br />

• VOIP_OUTOFBANDDTMF = [ENABLED | DISABLED]<br />

o Parameter: This parameter enables (ENABLED) or disables (DISABLED) out-of-b<strong>and</strong> DTMF<br />

feature.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter enables or disables out-of-b<strong>and</strong> DTMF feature.<br />

• VOIP_KEYPADTYPE = [KEYPADTYPE_NONE | KEYPADTYPE_H225 |<br />

KEYPADTYPE_H245ALPHANUMERIC | KEYPADTYPE_H245SIGNAL |<br />

KEYPADTYPE_RFC2833]<br />

o Parameter: This parameter is a string (up to 30 characters). Valid values are the following:<br />

o KEYPADTYPE_H225: H.225/Q.931 User Info field (Keypad facility information element)<br />

o KEYPADTYPE_H245ALPHANUMERIC: H.245 User Input Indication (UII) Alphanumeric<br />

message<br />

o KEYPADTYPE_H245SIGNAL: H.245 User Input Indication (UII) Signal Type message<br />

o KEYPADTYPE_RFC2833: RTP stream as defined in RFC 2833<br />

Submission page 316 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o SNMP: no<br />

o KEYPADTYPE_NONE: no out-of-b<strong>and</strong> signalling<br />

o M<strong>and</strong>atory: no<br />

Configures the different 'keypad types' defined by H.323 in order to codify the out-of-b<strong>and</strong> DTMF<br />

signaling.<br />

• VOIP_CALLSIGPORT1 = [1025 … 65530]<br />

o Parameter: Valid values range from 1025 to 65530.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the modem signaling port for H.323.<br />

• VOIP_G711USS = [YES | NO]<br />

o Parameter: Selects whether silence suppression for G.711 μ-law is enabled (YES) or not (NO).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

It selects whether silence suppression for G.711 μ-law is enabled or not.<br />

• VOIP_G711UPACK = [2 … 4]<br />

o Parameter: Valid values range from 2 (20 ms) to 4 (40 ms).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the specific packet size in 10-ms units for G.711 μ-law.<br />

• VOIP_G711ASS = [YES | NO]<br />

o Parameter: Selects whether silence suppression for G.711 A-law is enabled (YES) or not (NO).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Selects whether silence suppression for G.711 A-law is enabled or not.<br />

Submission page 317 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• VOIP_G711APACK = [2 … 4]<br />

o Parameter: Valid values range from 2 (20 ms) to 4 (40 ms).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the specific packet size in 10-ms units for G.711 A-law.<br />

• VOIP_JB_TYPE = [FIXED | ADAPTIVE]<br />

o Parameter: Selects either adaptive (ADAPTIVE) or fixed (FIXED) jitter buffer.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Selects either adaptive or fixed jitter buffer.<br />

• VOIP_FJB_DELAY = [1 … 10] * 10<br />

o Parameter: Valid values range from 10 to 100 ms.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the fixed jitter buffer delay in ms.<br />

• VOIP_AJB_MAXDELAY = [1 … 19] * 10<br />

o Parameter: Valid values range from 10 to 190 ms.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the adaptive jitter buffer maximum delay in ms.<br />

• VOIP_G729ON = [YES | NO]<br />

o Parameter: Selects whether G.729 codec is enabled (YES) or not (NO).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Selects whether G.729 codec is enabled or not.<br />

Submission page 318 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• VOIP_G729SS = [YES | NO]<br />

o Parameter: Selects whether G.729 silence enabled is supported (YES) or not (NO).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Selects whether silence suppression for G.729 is enabled or not.<br />

• VOIP_G729PACK = [2 … 4]<br />

o Parameter: Valid values range from 2 (20 ms) to 4 (40 ms).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the specific packet size in 10-ms units for G.729.<br />

• VOIP_ALTERNATEGK = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) alternate gatekeeper feature for H.323.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Enables or disables alternate gatekeeper feature for H.323.<br />

• VOIP_ALTGKIP = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

IP address of the H.323 alternative gatekeeper.<br />

• VOIP_GKDISCOVERY = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) gatekeeper discovery feature for H.323.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Submission page 319 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Enables or disables gatekeeper discovery feature for H.323.<br />

• VOIP_FULLRRQ1 = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) full gatekeeper registration request for<br />

H.323.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Enables or disables full gatekeeper registration request for H.323.<br />

• VOIP_TIMETOLIVE = [≥ 60]<br />

o Parameter: The minimum valid value is 60 seconds.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Value in seconds for the H.323 time-to-live parameter (time after which the registration with the gatekeeper<br />

shall expire). This parameter is related to the time between two consecutive registration requests to the<br />

gatekeeper. Using a value greater than 1200 is recommended in order not to interfere with the polling<br />

feature.<br />

• VOIP_FASTCONNECT = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) fast connect signalling feature for<br />

H.323.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Enables or disables fast connect signalling feature for H.323.<br />

• VOIP_H245TUNNEL = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) H.245 tunnelling signalling feature for<br />

H.323.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Enables or disables H.245 tunnelling signalling feature for H.323.<br />

• VOIP_COUNTRY = [XX | ES | PT | GB | JP | FR | SG | RU | AU]<br />

Submission page 320 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: This parameter is a string (up to 20 characters). Valid values are: The USA (XX), Spain<br />

(ES), Portugal (PT), The United Kingdom (GB), Japan (JP), France (FR), Singapore (SG), Russia<br />

(RU) <strong>and</strong> Australia (AU). The default country is Spain (ES).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures telephony tones (dial, network busy, busy <strong>and</strong> ring-back tones) <strong>and</strong> phone line (physical) parameters<br />

(line impedance, ring waveform <strong>and</strong> line feed voltage) for the specified country. The default country is Spain.<br />

Please see section 11.12.2 for details.<br />

The following four parameters are provided to be able to configure tones for countries that are not available through<br />

the VOIP_COUNTRY parameter. If the country is available, there is no need to use these parameters. In any case,<br />

these parameters overwrite the VOIP_COUNTRY settings.<br />

• VOIP_TONE_DIALTONE = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />

o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_DIALTONE =<br />

425@-10#ON”).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Dial tone configuration pattern. Please see section 11.12.3 for details.<br />

• VOIP_TONE_NETWORKBUSY = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />

o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_BUSY = 425@-<br />

10#ON(200),OFF(200),R”).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Network busy tone configuration pattern. Please see section11.12.3 for details.<br />

• VOIP_TONE_BUSY = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />

o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_BUSY = 425@-<br />

10#ON(200),OFF(200),R”).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Submission page 321 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Busy tone configuration pattern. Please see section 11.12.3 for details.<br />

• VOIP_TONE_RINGBACK = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />

o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_RINGBACK =<br />

425@-10#ON(1500),OFF(3000),R”).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Ring-back tone configuration pattern. Please see section 11.12.3 for details.<br />

• VOIP_RTP_TOS = 0xXX<br />

o Parameter: value must be specified with 2 hexadecimal digits.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the 8-bit bitmap of the type of service field in the IP header of the RTP packets.<br />

• VOIP_CALLSIG_TOS 0xXX<br />

o Parameter: value must be specified with 2 hexadecimal digits.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Configures the 8-bit bitmap of the type of service field in the IP header of the VoIP signalling packets for<br />

H.323.<br />

11.12.1 Dial Plan Configuration<br />

A dial plan gives the unit a map to determine when a complete number has been entered <strong>and</strong> should be passed to the<br />

gatekeeper for resolution into an IP address. Dial plans are expressed using the same syntax used by MGCP NCS<br />

specification.<br />

The dialled numbers that do not match the specified dial plan do not initiate an outgoing call from the VoIP modem.<br />

The formal syntax of the dial plan is described using the following notation:<br />

Digit ::= "0" | "1" | "2" | "3" | "4" | "5" | "6" | "7" | "8" | "9"<br />

Submission page 322 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Timer ::= "T" | "t"<br />

Letter ::= Digit | Timer | "#" | "*" | "A" | "a" | "B" | "b" | "C" | "c" | "D" | "d"<br />

Range ::= "X" | "x" -- matches any digit<br />

| "[" Letters "]" -- matches any of the specified letters<br />

Letters ::= Subrange | Subrange Letters<br />

Subrange ::= Letter -- matches the specified letter<br />

| Digit "-" Digit -- matches any digit between first <strong>and</strong> last<br />

Position ::= Letter | Range<br />

StringElement ::= Position -- matches any occurrence of the position<br />

| Position "." -- matches an arbitrary number of occurrences including 0<br />

String ::= StringElement | StringElement String<br />

StringList ::= String | String "|" StringList<br />

DialPlan ::= "(" StringList ")"<br />

A dial plan, according to this syntax, is defined either by a string (not case-sensitive) or by a list of strings.<br />

Regardless of the above syntax a timer is only allowed if it appears in the last position in a string (12T3 is not<br />

valid). Each string is an alternate numbering scheme. The unit will process the dial plan by comparing the current<br />

dial string against the dial plan. If the result is under-qualified (partially matches at least one entry) then it will do<br />

nothing further; if the result matches or is overqualified (no further digits could possibly produce a match) then it<br />

sends the string to the gatekeeper <strong>and</strong> clears the dial string.<br />

The timer T is activated when it is all that is required to produce a match. The period of timer T is 4 seconds. For<br />

example, a dial plan of (xxxT|xxxxx) will match immediately if 5 digits are entered <strong>and</strong> it will also match after a 4<br />

second pause when 3 digits are entered.<br />

Submission page 323 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

11.12.2 Country Specific Parameters<br />

These are the country-specific parameters configured from “VOIP_COUNTRY”. Some of them (tone-related<br />

parameters) can be latter overwritten (thanks to VOIP_TONE_DIALTONE, VOIP_TONE_RINGBACK,<br />

VOIP_TONE_BUSY <strong>and</strong> VOIP_TONE_NETWORKBUSY). The others (line feed voltage, ring signal waveform<br />

<strong>and</strong> line impedance) can’t be changed.<br />

Default parameters:<br />

These are the ones being used for any country not specified in the list below (they are USA parameters):<br />

DIALTONE = 350@-13+440@-13#ON(300),OFF(0),R<br />

RINGBACK = 440@-13+480@-19#2000(ON),4000(OFF),R<br />

BUSY = 480@-24+620@-24#500(ON),500(OFF),R<br />

NETWORKBUSY = 480@-24+620@-24#250(ON),250(OFF),R<br />

LINE FEED VOLTAGE = 48 V DC<br />

RING SIGNAL = 48 V DC + 35 Vrms AC # 2000(ON),4000(OFF),R<br />

LINE IMPEDANCE = 600 ohm<br />

Countries:<br />

NOTE: If some country does not specify all of the possible parameters that is because these parameters get the<br />

“default” value shown above.<br />

SPAIN:<br />

DIALTONE = 425@-10#ON(3000),OFF(0),R<br />

NETWORKBUSY = 425@-10#ON(200),OFF(200),R<br />

BUSY = 425@-10#ON(200),OFF(200),R<br />

Submission page 324 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

RINGBACK = 425@-10#ON(1500),OFF(3000),R<br />

PORTUGAL:<br />

UK:<br />

DIALTONE = 425@-10#ON(3000),OFF(0),R<br />

NETWORKBUSY = 425@-10#ON(200),OFF(200),R<br />

BUSY = 425@-10#ON(200),OFF(200),R<br />

RINGBACK = 425@-10#ON(1000),OFF(5000),R<br />

RING SIGNAL = 48 V DC + 35 Vrms AC # 1000(ON),5000(OFF),R<br />

DIALTONE = 350@-18+440@-18#ON(3000),OFF(0),R<br />

NETWORKBUSY = 400@-14#ON(400),OFF(400),R<br />

BUSY = 400@-14#ON(400),OFF(400),R<br />

RINGBACK = 400@-15+450@-15#ON(400),OFF(200),ON(400),OFF(2000),R<br />

JAPAN:<br />

DIALTONE = 400@-15#ON(3000),OFF(0),R<br />

NETWORKBUSY = 400@-5#ON(500),OFF(500),R<br />

BUSY = 400@-5#ON(500),OFF(500),R<br />

RINGBACK = 400@-10#ON(1000),OFF(2000),R<br />

FRANCE:<br />

Submission page 325 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

DIALTONE = 440@-13#ON(3000),OFF(0),R<br />

NETWORKBUSY = 440@-13#ON(500),OFF(500),R<br />

BUSY = 440@-13#ON(500),OFF(500),R<br />

RINGBACK = 440@-13#ON(1500),OFF(3500),R<br />

SINGAPORE:<br />

DIALTONE = 425@-15#ON(3000),OFF(0),R<br />

NETWORKBUSY = 425@-10#ON(750),OFF(750),R<br />

BUSY = 425@-10#ON(750),OFF(750),R<br />

RINGBACK = 425@-10#ON(400),OFF(200),R<br />

RUSSIA:<br />

DIALTONE = 425@-10#ON(400),OFF(400),R<br />

RINGBACK = 425@-10#ON(800),OFF(3200),R<br />

AUSTRALIA:<br />

DIALTONE = 425@-10#ON(3000),OFF(0),R<br />

NETWORKBUSY = 425@-10#ON(200),OFF(200),R<br />

BUSY = 425@-10#ON(400),OFF(400),R<br />

RINGBACK = 425@-10#ON(400),OFF(200),ON(400),OFF(2000),R<br />

LINE IMPEDANCE = 220 ohm + 820 ohm || 120 nF<br />

Submission page 326 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

11.12.3 Tone pattern configuration<br />

The different available tones can be configured using the following ring cadence pattern:<br />

freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R. Only the following frequencies (in Hz) are possible:<br />

350, 400, 425, 440, 480, 572, 620, 682, 697, 770, 852, 941, 1209, 1336, 1400, 1477, 1633, 2060, 2130, 2450, 2750<br />

<strong>and</strong> 2600. An example will help to explain this string:<br />

950@-25+420@-10#ON(330),OFF(30),IDLE(1000),R:<br />

This will create the following tone:<br />

• The tone will be the addition of two frequencies: 950Hz with a power of –25dBm plus 420Hz with a power of –<br />

10dBm<br />

• It will be ON during 330 msecs.<br />

• Then it will be OFF during 30 msecs.<br />

• And then it will be IDLE for 1000 msecs. This IDLE number it is not m<strong>and</strong>atory in the string.<br />

• R means that the sequence ON, OFF, IDLE will be repeated continuously.<br />

To configure a continuous tone of 1400Hz <strong>and</strong> –10dBm, the following string should be used:<br />

• 1400@-10#ON(3000),OFF(0),R<br />

Therefore, the m<strong>and</strong>atory symbols are:<br />

• @ to separate frequency <strong>and</strong> power.<br />

• # to separate the tone frequency <strong>and</strong> power from the sound cadence.<br />

• , to separate the ON(xx), OFF(xx) <strong>and</strong> IDLE(xx) parameters.<br />

Besides, the tone may be an addition of two different frequencies <strong>and</strong> powers using the + symbol.<br />

11.13 VLAN NETWORK<br />

• VLAN_ENABLE = [yes|no]<br />

o Parameter: ‘yes’ (to enable VLAN use) or ‘no’ (to disable VLAN use)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Submission page 327 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

This autoconfiguration parameter enables or disables the use of VLAN. Normally this parameter is not<br />

needed because the modem itself discovers the use of VLAN, but it is necessary in case of booting from<br />

local settings.<br />

• VLAN_MNMT_TAG = [2-4093] | %<br />

o Parameter: Number from 2 to 4093) or ‘%Parameter_name’ (parametric value preceded by a %)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This parameter indicates the management VLAN_ID (VID) of high-level management protocols (Telnet,<br />

Ping, …). Often a parametric value is used, <strong>and</strong> so the appropriate parameter will be taken from the<br />

translation table (for example, writing ‘$VLAN_DATA_2’).<br />

• VLAN_MNMT_PRIO = [0-7]<br />

o Parameter: Number from 0 to 7.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This autoconfiguration parameter sets the VLAN priority for the high-level management (Telnet, Ping, …)<br />

packets.<br />

• VLAN_DATA_TAG = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This parameter is used at the EU nodes. It configures the VLAN_ID (VID) for the data packets (packets<br />

coming from the external interfaces). The value set can be a value (from 2 to 4093) or a parametric value. In<br />

this last case, the adequate value will be taken from the translation table.<br />

• VLAN_DATA_PRIO = [0-6]<br />

o Parameter: Number from 0 to 6.<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This parameter is used at the EU nodes. It configures the VLAN priority for the data packets (packets<br />

coming from the external interfaces).<br />

Submission page 328 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• VLAN_VOIP_TAG = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name‘ (parametric value preceded by a %)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter configures the VLAN_ID (VID) for the VoIP packets (packets coming from the external<br />

interfaces). The value set can be a value (from 2 to 4093) or a parametric value. In this last case, the<br />

adequate value will be taken from the translation table.<br />

• VLAN_VOIP_PRIO = [0-7]<br />

o Parameter: Number from 0 to 7<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This autoconfiguration parameter sets the VLAN priority for the VoIP packets.<br />

• VLAN_VSIG_PRIO = [0-7]<br />

o Parameter: Number from 0 to 7<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

It configures the VLAN priority for the VoIP signalling packets.<br />

• VLAN_TRUNK.i = [2-4093]<br />

o Parameter: Number from 2 to 4093)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This parameter is usable at LV <strong>and</strong> MV nodes. It configures a list of VLAN trunks different from the ones<br />

inside the translation table that must be allowed in the node interfaces. It is necessary to configure these<br />

trunks for private VLANs between EUs in all intermediary equipment.<br />

• VLAN_RETAG_EXTA_SRC = [0 | 2-4095]<br />

o Parameter: ‘0’ (in order to disable retagging in interface) number from 2 to 4095.<br />

o SNMP: no<br />

Submission page 329 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o M<strong>and</strong>atory: yes<br />

Autoconfiguration parameter used for VLAN retagging: External (Ethernet) interface A (EXTA) source tag.<br />

With 0, the retagging is disabled in EXTA interface.<br />

• VLAN_RETAG_EXTA_DST = [0 | 2-4095]<br />

o Parameter: ‘0’ (in order to disable retagging in interface) or number from 2 to 4095<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Autoconfiguration parameter used for the VLAN retagging: External (Ethernet) interface A (EXTA)<br />

destination tag. With 0, the retagging is disabled in EXTA interface.<br />

• VLAN_RETAG_EXTB_SRC = [0 | 2-4095]<br />

o Parameter: ‘0’ (in order to disable retagging in interface) or number from 2 to 4095<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Autoconfiguration parameter used for the VLAN retagging: External (Ethernet) interface B (EXTB) source<br />

tag. With 0, the retagging is disabled in EXTB interface.<br />

• VLAN_RETAG_EXTB_DST = [0 | 2-4095]<br />

o Parameter: ‘0’ (in order to disable retagging in interface) or number from 2 to 4095<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

Autoconfiguration parameter used for the VLAN retagging: External (Ethernet) interface B (EXTB)<br />

destination tag. With 0, the retagging is disabled in EXTB interface.<br />

11.14 OVLAN PARAMETERS<br />

The OVLAN parameters are used to configure the basic OVLAN configuration, which avoids the visibility between<br />

different customers in the access network. They are similar to the VLAN parameters specified above.<br />

• OVLAN_ENABLE = [yes|no]<br />

o Parameter: ‘yes’ (to enable OVLAN use) or ‘no’ (to disable OVLAN use)<br />

Submission page 330 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o SNMP: none<br />

o M<strong>and</strong>atory: yes<br />

This autoconfiguration parameter enables or disables the use of OVLAN filtering.<br />

• OVLAN_DATA_TAG = [2-4094] | %ROOTPATH_OVLAN<br />

o Parameter: Number from 2 to 4093 or ‘%ROOTPATH_OVLAN’ (use the OVLAN Rootpath<br />

value)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: yes<br />

This parameters specifies of the OVLAN ID assigned to the packets coming from the external interface. It<br />

should be the same as in the translation table to perform the basic OVLAN operation in all equipment<br />

except the one connected to the backbone, which will have the ALL_VLAN tag (4095).<br />

• OVLAN_TRUNK.i = [2-4094]<br />

o Parameter: Number from 2 to 4094<br />

o SNMP: none<br />

o M<strong>and</strong>atory: yes<br />

This parameter is used in LV <strong>and</strong> MV nodes, <strong>and</strong> it configures a list of OVLAN trunks different from the<br />

one inside the translation table that must be allowed in the node interfaces. It is necessary to configure<br />

these trunks for private OVLANs between EUs in all intermediary equipment.<br />

11.15 CUSTOM VLAN/OVLAN PARAMETERS<br />

• USE_CUSTOM_VLAN_OVLAN = [yes/no]<br />

o Parameter: ‘yes’ (to enable the custom VLAN/OVLAN use) or ‘no’ (to disable the custom<br />

VLAN/OVLAN use)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter enables other VLAN/OVLAN parameters. If set to ‘yes’, it will configure the parameters<br />

that are set in the auto-configuration file. The connection will be lost if the new parameters are not properly<br />

configured in the auto-configuration file. It is necessary to specify several parameters with care or no<br />

connection will be possible between the modems.<br />

Submission page 331 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

As a general rule, this configuration overrides the basic VLAN/OVLAN configuration. In order to decrease<br />

the risk of loosing connection, the VLAN/OVLAN filtering follows these rules:<br />

• When the list is allowed, the tags specified here are added to the existing ones. This solution<br />

simplifies the configuration <strong>and</strong> decreases the risk of miss-configuration.<br />

• When the list is forbidden, the lists are reset before inserting the tags specified here, due to the same<br />

reasons.<br />

The VLAN/OVLAN custom configuration must be complemented with the profile parameters referred to the<br />

VLAN/OVLAN, to configure interfaces different from EXTA, EXTB, ROOT <strong>and</strong> OTHERS.<br />

11.15.1 Custom VLAN Parameters<br />

• VLAN_TAGGED_ONLY_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to enable tag only in interface root) or ‘no’ (to disable tag only in interface root)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

If this parameter is set to ‘yes’, the modem will drop packets without a VLAN tag entering the root<br />

interface (IFACE_ROOT).<br />

• VLAN_TAGGED_ONLY_IFACE_EXTA = [yes/no]<br />

o Parameter: ‘yes’ (to enable tag only in Ethernet A) or ‘no’ (to disable tag only in Ethernet A)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

If this parameter is set, the modem will drop packets without a VLAN tag entering external (Ethernet)<br />

interface A.<br />

• VLAN_TAGGED_ONLY_IFACE_EXTB = [yes/no]<br />

o Parameter: ‘yes’ (to enable tag only in Ethernet B) or ‘no’ (to disable tag only in Ethernet B)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

It this parameter is set, the modem will drop packets without a VLAN tag entering external (Ethernet) interface B.<br />

• VLAN_TAGGED_ONLY_IFACE_PL_X= [yes/no]<br />

Being X = 0 to 127 (BPL port)<br />

Submission page 332 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: ‘yes’ (to enable tag only in BPL port X) or ‘no’ (to disable tag only in BPL port X)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

If this parameter is set, the modem will drop packets without a VLAN tag entering BPL interfaces (PL_X).<br />

• VLAN_OUTFORMAT_TAG_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to tag output in root interface) or ‘no’ (to disable tag output in root interface)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

It this parameter is set, the modem will introduce a VLAN tag when sending packets to the root interface<br />

(IFACE_ROOT).<br />

• VLAN_OUTFORMAT_TAG_IFACE_EXTA = [yes/no]<br />

o Parameter: ‘yes’ (to tag output in Ethernet A) or ‘no’ (to disable tag output in Ethernet A)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

It this parameter is set, the modem will introduce a VLAN tag when sending packets to the external (Ethernet)<br />

interface A.<br />

• VLAN_OUTFORMAT_TAG_IFACE_EXTB = [yes/no]<br />

o Parameter: ‘yes’ (to tag output in Ethernet B) or ‘no’ (to disable tag output in Ethernet B)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

It this parameter is set, the modem will introduce a VLAN tag when sending packets to external (Ethernet) interface<br />

B.<br />

• VLAN_OUTFORMAT_TAG_IFACE_PL_X = [yes/no]<br />

Being X = 0 to 127 (BPL port)<br />

o Parameter: ‘yes’ (to tag output in BPL port X) or ‘no’ (to disable tag output in BPL port X)<br />

o SNMP: none<br />

Submission page 333 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o M<strong>and</strong>atory: no<br />

It this parameter is set, the modem will introduce a VLAN tag when sending packets to BPL port (PL_X).<br />

• VLAN_PVID_PL_X = [2-4095]<br />

Being X = 0 to 127 (BPL port)<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This autoconfiguration parameter specifies the 802.1Q VLAN tag for tagging untagged packets from the BPL port<br />

(PL_X).<br />

• VLAN_PVID_EXTA = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This autoconfiguration parameter specifies the 802.1Q VLAN tag for tagging untagged packets from the external<br />

interface A (EXTA).<br />

• VLAN_PVID_EXTB = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This autoconfiguration parameter specifies the 802.1Q VLAN tag for tagging untagged packets from the external<br />

interface B (EXTB).<br />

• VLAN_PVID_FW = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This autoconfiguration parameter specifies the 802.1Q VLAN tag for tagging untagged packets from the firmware<br />

interface (FW).<br />

Submission page 334 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• VLAN_DEFAULT_PRIO_PL_X = [0-7]<br />

Being X = 0 to 127 (BPL port)<br />

o Parameter: Number from 0 to 7<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter configures the 802.1p priority for tagging untagged packets from the BPL interface (PL_X).<br />

• VLAN_DEFAULT_PRIO_EXTA = [0-7]<br />

o Parameter: Number from 0 to 7<br />

o SNMP: none<br />

This parameter configures the 802.1p priority for tagging untagged packets from external (Ethernet) interface A<br />

(EXTA).<br />

• VLAN_DEFAULT_PRIO_EXTB = [0-7]<br />

o Parameter: Number from 0 to 7<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter configures the 802.1p priority for tagging untagged packets from external (Ethernet)<br />

interface B (EXTB).<br />

• VLAN_DEFAULT_PRIO_FW = [0-7]<br />

o Parameter: Number from 0 to 7<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter configures the 802.1p priority for tagging untagged packets from firmware interface (FW).<br />

• VLAN_IS_ALLOWED_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

Submission page 335 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

This parameter characterizes the VLAN list for the root interface. Root interface (IFACE_ROOT) list is allowed tag<br />

if configured as ‘yes’ or forbidden if configured as ‘no’.<br />

• VLAN_LIST_IFACE_ROOT.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter is a list of root interface (IFACE_ROOT) VLAN IDs. Up to 16 values can be configured.<br />

• VLAN_IS_ALLOWED_IFACE_EXTA = [yes/no]<br />

o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter characterizes the VLAN list for the external (Ethernet) interface A. The external (Ethernet) interface<br />

A list contains allowed tags if configured as ‘yes’ or forbidden if configured as ‘no’.<br />

• VLAN_LIST_IFACE_EXTA.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter is a list of VLAN IDs for external (Ethernet) interface A. Up to 16 values can be configured.<br />

• VLAN_IS_ALLOWED_IFACE_EXTB = [yes/no]<br />

o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter characterizes the VLAN list for the external (Ethernet) interface B. The external (Ethernet) interface<br />

B list contains allowed tags if configured as ‘yes’ or forbidden if configured as ‘no’.<br />

• VLAN_LIST_IFACE_EXTB.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

Submission page 336 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter is a list of VLAN IDs for external (Ethernet) interface B. Up to 16 values can be configured.<br />

• VLAN_IS_ALLOWED_IFACE_PL_X = [yes/no]<br />

Being X = 0 to 127 (BPL port)<br />

o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter characterizes the VLAN list for the powelrline interface X. The BPL interface list contains allowed<br />

tags if configured as ‘yes’ or forbidden if configured as ‘no’.<br />

• VLAN_LIST_IFACE_PL_X.i = [2-4095]<br />

Being X = 0 to 127 (BPL port)<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter is a list of VLAN IDs for BPL interface X.<br />

11.15.2 Custom OVLAN Parameters<br />

• OVLAN_TAGGED_ONLY_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to accept only tagged packets at root interface) or ‘no’ (to accept any packet at<br />

root interface)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

If this parameter is set to ‘yes’, the modem will drop packets without a OVLAN tag entering the root interface<br />

(IFACE_ROOT).<br />

Submission page 337 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• OVLAN_TAGGED_ONLY_IFACE_PL_X = [yes/no]<br />

Being X = 0 to 127 (BPL port)<br />

o Parameter: ‘yes’ (to accept only tagged packets at other interfaces) or ‘no’ (to accept any packet at<br />

other interfaces)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

If this parameter is set to ‘yes’, the modem will drop packets without a OVLAN tag entering BPL ports (PL_X).<br />

• OVLAN_OUTFORMAT_TAG_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to introduce a tag in output packets at root interface) or ‘no’ (to not introduce a<br />

tag in output packets at root interface)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

If this parameter is set, the modem will introduce a OVLAN tag when sending packets to the root interface<br />

(IFACE_ROOT).<br />

• OVLAN_OUTFORMAT_TAG_IFACE_PL_X = [yes/no]<br />

Being X = 0 to 127 (BPL port)<br />

o Parameter: ‘yes’ (to introduce a tag in output packets at BPL ports) or ‘no’ (to not introduce a tag<br />

in output packets at BPL ports)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

If this parameter is set, the modem will introduce a OVLAN tag when sending packets to BPL ports (PL_X).<br />

• OVLAN_POVID_PL_X = [2-4095]<br />

Being X = 0 to 127 (BPL port)<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

Submission page 338 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

This autoconfiguration parameter specifies the OVLAN tag for tagging untagged packets from the BPL port X<br />

(PL_X).<br />

• OVLAN_POVID_EXTA = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This autoconfiguration parameter specifies the OVLAN tag for tagging untagged packets from the external interface<br />

A (EXTA).<br />

• OVLAN_POVID_EXTB = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This autoconfiguration parameter specifies the OVLAN tag for tagging untagged packets from the external interface<br />

B (EXTB).<br />

• OVLAN_POVID_FW = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This autoconfiguration parameter specifies the OVLAN tag for tagging untagged packets from the firmware<br />

interface (FW).<br />

• OVLAN_IS_ALLOWED_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to set the root interface list as allowed) or ‘no’ (to set the root interface list as<br />

forbidden)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter characterizes the OVLAN list for the root interface. Root interface (IFACE_ROOT) list is allowed<br />

tag if configured as ‘yes’ or forbidden if configured as ‘no’.<br />

• OVLAN_LIST_IFACE_ROOT.i = [2-4095]<br />

Submission page 339 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter is a list of root interface (IFACE_ROOT) OVLAN tags.<br />

• OVLAN_IS_ALLOWED_IFACE_EXTA = [yes/no]<br />

o Parameter: ‘yes’ (to set the Ethernet A interface list as allowed) or ‘no’ (to set the Ethernet A<br />

interface list as forbidden)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter characterizes the OVLAN list for the external (Ethernet) interface A. The external (Ethernet)<br />

interface A list contains allowed tags if configured as ‘yes’ or forbidden if configured as ‘no’.<br />

• OVLAN_LIST_IFACE_EXTA.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter is a list of OVLAN tags for external (Ethernet) interface A.<br />

• OVLAN_IS_ALLOWED_IFACE_EXTB = [yes/no]<br />

o Parameter: ‘yes’ (to set the Ethernet B interface list as allowed) or ‘no’ (to set the Ethernet B<br />

interface list as forbidden)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter characterizes the OVLAN list for the external (Ethernet) interface B,. The external (Ethernet)<br />

interface B list contains allowed tags if configured as ‘yes’ or forbidden if configured as ‘no’.<br />

• OVLAN_LIST_IFACE_EXTB.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

Submission page 340 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

This parameter is a list of OVLAN tags for external (Ethernet) interface B. Up to 16 values can be configured.<br />

• OVLAN_IS_ALLOWED_IFACE_PL_X = [yes/no]<br />

Being X = 0 to 127 (BPL port)<br />

o Parameter: ‘yes’ (to set the BPL interface list as allowed) or ‘no’ (to set the BPL interface list as<br />

forbidden)<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter characterizes the OVLAN list for the BPL Interface X. The list contains allowed tags if configured<br />

as ‘yes’ or forbidden if configured as ‘no’.<br />

• OVLAN_LIST_IFACE_PL_X.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

o SNMP: none<br />

o M<strong>and</strong>atory: no<br />

This parameter is a list of OVLAN tags for external BPL interface X.<br />

11.16 ACCESS PROTOCOL PARAMETERS<br />

Parameters for the slave:<br />

• AP_MIN_NUMBER_HOPS = [0|1|…]<br />

o Parameter: Number from 0<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter configures the main criterion for connecting to a master, the minimum number of hops that<br />

the master has to be separated to the backbone. ‘0’ means that it can connect to the master connected to the<br />

backbone (no hop), ‘1’ means that it can connect to masters with one hop to the backbone (TDrepeaters),<br />

<strong>and</strong> so on.<br />

• AP_FORBID_MASTER.i = 0xXXXXXXXXXXXX<br />

Submission page 341 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: ‘0xXXXXXXXXXXXX’ (<strong>MAC</strong> address of forbidden master)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This parameter is a list of the <strong>MAC</strong> addressees of the masters this equipment has to avoid. The equipment<br />

will not connect to a master on this list, even if there are no other masters available.<br />

• AP_PREFER_MASTER = 0xXXXXXXXXXXXX<br />

o Parameter: ‘0xXXXXXXXXXXXX’ (<strong>MAC</strong> address of preferred master)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This parameter specifies a <strong>MAC</strong> address of a master that is preferred by the equipment. If the node can<br />

detect the master with this <strong>MAC</strong> address <strong>and</strong> it is not restricted (it is not forbidden <strong>and</strong> the number of hops<br />

is the adequate), it will try to connect to it regardless of any other parameter. If fails to connect to this prefer<br />

master, it will use the usual algorithm to decide to which master connect.<br />

• AP_FIX_MASTER = ‘0xXXXXXXXXXXXX’<br />

o Parameter: 0xXXXXXXXXXXXX (<strong>MAC</strong> address of fixed master)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: yes<br />

This parameter specifies the only one master to which the node can connect. If this <strong>MAC</strong> address is not<br />

detected in the network, the node will not connect to any other one, so this parameter can be dangerous<br />

because if not properly configured can produce slaves unable to connect.<br />

• AP_CHECK_BEST_MASTER_ENABLE = [yes|no]<br />

o Parameter: ‘yes’ (to enable checking of best master periodically after connecting with one) or ‘no’<br />

(to disable the checking of better masters after connecting to one).<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

Once the node is connected to the network (after choosing <strong>and</strong> being accepted by a master) it is possible to<br />

repeat periodically the search of a better master. This parameter enables or disables the periodical check of<br />

the best master of the access protocol.<br />

• AP_CHECK_BEST_MASTER_PERIOD = <br />

Submission page 342 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: Number of minutes<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter configures how much time has to pass to search for a better master. This process is periodic,<br />

<strong>and</strong> the time is in minutes.<br />

• AP_CURRENT_MASTER_MIN_BPS = <br />

o Parameter: Number of bits per symbol (0-14592)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

This parameter is also used in the period search for a better master. The node will only change to a better<br />

master if the number of bits per symbol with the current master is lower than the<br />

‘AP_CURRENT_MASTER_MIN_BPS’ value.<br />

• AP_NEW_MASTER_MIN_BPS = <br />

o Parameter: Number of bits per symbol (0-14592)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

At the period search for a better master, no every master will be considered. Only the masters with a number<br />

of bits per symbol greater than ‘AP_NEW_MASTER_MIN_BPS’ will be eligible.<br />

Parameters for the master: The master will receive petitions of the slaves that want to connect to it. There are<br />

different policies about what to do in this case:<br />

- Accept any petition. The slave will be allowed to connect through this master.<br />

- Deny any petition. No slave will be allowed to connect through this master.<br />

- Use the Radius. The RADIUS will be the one that decides to accept of reject the connection of a<br />

slave.<br />

- Use an authorization list. This is a list of the <strong>MAC</strong>s of the slaves that will be allowed to connect<br />

through this master. The following parameters configures this list.<br />

• ACCESSP_AUTHLIST_<strong>MAC</strong>.i = 0xXXXXXXXXXXXX<br />

o Parameter: ‘0xXXXXXXXXXXXX’ (<strong>MAC</strong> address authorized to connect)<br />

o SNMP: no<br />

Submission page 343 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o M<strong>and</strong>atory: no<br />

This parameter is a list of the <strong>MAC</strong> address of the modems that will be allowed to connect through this<br />

master. The length of the list is 128 (i=1…128).<br />

• ACCESSP_AUTHLIST_PROFILE.i = [1-16]<br />

o Parameter: Number of the profile related to a <strong>MAC</strong> authorized)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

If a slave is accepted via the authorization list it will use the parameters of one profile. This<br />

autoconfiguration parameter indicates which profile will be associated with each slave. The length of the list<br />

is 128 (i=1…128).<br />

• ACCESSP_AUTHLIST_FWTYPE.i = [MV|LV|EU]<br />

o Parameter: ‘MV’ (medium voltage) or ‘LV’ (low voltage) or ‘EU’ (End User)<br />

o SNMP: no<br />

o M<strong>and</strong>atory: no<br />

If a slave is accepted via the authorization list it will have a firmware type This autoconfiguration parameter<br />

indicates which firmware type will be associated with each slave. The length of the list is 128 (i=1…128).<br />

12 CONFIGURATION<br />

12.1 MIB<br />

12.1.1 SNMP Management<br />

SNMP (Simple Network Management Protocol) refers to a group of specifications for the management of<br />

communication networks: the protocol, the data base definition <strong>and</strong> the modules. For more information, consult the<br />

SNMP st<strong>and</strong>ards RFC 1155 (Structure <strong>and</strong> Identification of Management Information for TCP/IP-based Internets),<br />

RFC 1157 (Simple Network Management Protocol), RFC 1213, Management Information Base).<br />

Each resource to be managed in a device is represented by an object. The MIB is a structured collection of these<br />

objects. For SNMP, the MIB is a database structure, or a database definition. Each system in a network to be<br />

managed must maintain a MIB that reflects the status of the managed resources in that system.<br />

Submission page 344 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

All managed objects in the SNMP environment are arranged in a hierarchical or tree structure. The leaf objects of<br />

the tree are the actual managed objects, each of which represents some resource, activity or related information that<br />

is to be managed.<br />

SNMP <strong>and</strong> thus MIB support are optional in this specification.<br />

12.1.2 MIB-II for IEEE P1901<br />

The structure MIB-II is located under the node mgmt. This node contains the definition of the management<br />

information base approved by the IAB. MIB-II is an extension of the previously defined MIB-I. Under the node<br />

‘mib-2’, IEEE P1901 nodes must support the following structures in RFC 1213:<br />

• system(1): General information about the system:<br />

o Description of the entity – hardware, operating system, etc.<br />

o Level of OSI reference model to which the managed object pertains.<br />

o Time since the last initialization of the system.<br />

• interfaces(2): Information about the network interfaces of the managed entity, including information <strong>and</strong><br />

statistics about the events in each. There is an “interfaces” table in which each row corresponds to a<br />

network interface. The information for a given interface:<br />

o <strong>Physical</strong> address<br />

o Type of interface<br />

o Speed<br />

o Status<br />

o Number of transmitted <strong>and</strong> received octets<br />

The implementation of the following nodes is optional.<br />

• at(3): Translation of addresses IP – <strong>MAC</strong>.<br />

• ip(4): Information about the configuration of the IP protocol over the device. Among others, the nodes<br />

under the ‘ip’ node contain information about:<br />

o Number of packets discarded because of errors in the IP header, because of errors in the addresses,<br />

because of not finding a correct route, etc.<br />

o Number of accepted packets.<br />

o IP address of the interfaces <strong>and</strong> network mask of the network.<br />

• icmp(5): Information about the Internet <strong>Control</strong> Message Protocol (ICMP).<br />

Submission page 345 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• tcp(6): General information about the TCP protocol working in the managed node.<br />

• udp(7): General information about the UDP protocol.<br />

• snmp(11): Information about the execution of the SNMP protocol in the entity.<br />

All fundamentals for the MIB-II can be found in RFC 1213, <strong>and</strong> no further information will be shown in this<br />

document.<br />

12.1.3 IEEE P1901 Private MIB<br />

This section walks through the IEEE P1901 Private MIB.<br />

Under the ‘.iso.org.dod.internet.private.enterprises’ node in the st<strong>and</strong>ard MIB, in position number 6798, the node<br />

assigned to DS2 (ds2 OBJECT IDENTIFIER ::= {enterprises 6798}) is allocated <strong>and</strong> in turn, under this node, the<br />

IEEE P1901 MIB branch has position 3 (IEEE P1901 OBJECT_IDENTIFIER ::= {ds2 3}) <strong>and</strong> contains all objects<br />

that are not supported in the st<strong>and</strong>ard MIB-II but can be remotely managed in an IEEE P1901 node.<br />

Internally the IEEE P1901 (3) branch is composed of 8 sub-branches.<br />

• plSystem: Generic information about the system.<br />

• plBasic: Information about the general BPL configuration.<br />

• plPhy: Information related to the physical layer indexed by node address.<br />

• pl<strong>MAC</strong>: Objects related to the <strong>Medium</strong> <strong>Access</strong> <strong>Control</strong>.<br />

• plQoS: Objects related to Quality of Service.<br />

• plOVLAN: Objects related to OVLAN.<br />

• plStatistics: Statistics counters.<br />

• plTraps: Trap information.<br />

• plStp: STP information.<br />

• plSecurity: Security configuration.<br />

Submission page 346 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plSystem (1)<br />

enterprises (1)<br />

plBasic (2)<br />

plPhy (3)<br />

ds2 (6798)<br />

pl<strong>MAC</strong> (4)<br />

IEEE P1901 (3)<br />

plQoS (5)<br />

plOVLAN (6)<br />

Figure 149 IEEE P1901 MIB tree<br />

12.1.3.1 The IEEE P1901 MIB Description<br />

plStatistics (7)<br />

plSecurity (10)<br />

plStp (9)<br />

plTraps (8)<br />

This section shows the IEEE P1901 MIB <strong>and</strong> contains a brief description of every object inside each branch under<br />

the ‘IEEE P1901’ node. The MIB definition in ASN.1 format can be found in ANNEX A.<br />

Note that not every OID can be accessed for get/set operations; read-only OIDs only accept ‘get’ operations, readwrite<br />

OIDs accept both ‘get’ <strong>and</strong> ‘set’ operations, <strong>and</strong> nonaccessible OIDs accept neither of them (indicated in the<br />

table above). In addition, every OID with an enable/disable meaning accepts an integer ‘1’ for enabling <strong>and</strong> an<br />

integer ‘0’ for disabling.<br />

plSystem<br />

• plSystemTable<br />

Almost every table in the IEEE P1901 MIB is indexed by the card number, so there will be a copy<br />

of this object in these tables; their explanation is equivalent to this one.<br />

o plSysCard: Used as an index to get/set system characteristic data for a specific BPL card. This<br />

could be seen as useless because every BPL card has its own IP address, but it has been included to<br />

support future improvements in IEEE P1901 technology where a single node will have a single IP<br />

address, independent of the number of cards it will hold. But at present, this index is always a fixed<br />

‘1’ value.<br />

o plSysNodeType: Node type. An IEEE P1901 BPL card can act as a master, slave or repeater, <strong>and</strong><br />

therefore this OID can hold the values of 0:Master, 1:Slave <strong>and</strong> 2:Repeater.<br />

Submission page 347 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o plSysFWVersion: Shows a string describing the firmware version running in the IEEE P1901<br />

modem.<br />

o plSysHWVersion: Shows a string describing the hardware version built inside the modem.<br />

o plSysReset: Performs a system reset when receiving a ‘set’ with a ‘1’.<br />

o plSysFactoryReset: Performs a system reset when receiving a ‘set’ with a ‘1’ <strong>and</strong> restores the<br />

factory configuration parameters.<br />

o plSysUseDHCP: Enables (1) or disables (0) the DHCP protocol in the modem. If DHCP is<br />

enabled, network configuration parameters (IP address, netmask <strong>and</strong> gateway IP address) will be<br />

obtained from a DHCP server; if it is disabled, the network configuration parameters saved in the<br />

modem will be used.<br />

o plSysStaticIPAddress: Holds the IP address to be used when DHCP is disabled.<br />

o plSysStaticNetMask: Holds the network mask to be used when DHCP is disabled.<br />

o plSysStaticDefaultGW: Holds the default gateway IP address to be used when DHCP is disabled.<br />

o plSysSaveAsPermanent: When a ‘1’ integer value is passed to this OID, all node parameters that<br />

could have changed <strong>and</strong> are liable to be saved are stored in non-volatile memory for using them as<br />

the current system configuration. As soon as these parameters are saved, the system is reconfigured<br />

to use the new parameters.<br />

o plSysConfUpload: This OID accepts a string in this format:<br />

where:<br />

“PROT IP CONFIG_FILE USER PASSWD“<br />

PROT Value of 0 for uploading the configuration by TFTP, or 1 to upload it by FTP.<br />

IP IP address of the TFTP or FTP server.<br />

CONFIG_FILE Name of the file where the uploaded configuration will be stored.<br />

USER User login for FTP, not necessary if TFTP is being used.<br />

PASSWD User password for FTP, not necessary if TFTP is being used.<br />

Table 63 Upload file parameters<br />

This way, the system performs an upload of the active configuration to a TFTP or FTP server. The<br />

configuration file name string size can be up to 60 characters long.<br />

Submission page 348 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o plSysConfDownload: This OID accepts a string in this format:<br />

where:<br />

“PROT IP CONFIG_FILE USER PASSWD“<br />

PROT Value of 0 for downloading the configuration file by TFTP, or 1 to download it by FTP.<br />

IP IP address of the TFTP or FTP server.<br />

CONFIG_FILE Name of the file to be downloaded.<br />

USER User login for FTP, not necessary if TFTP is being used.<br />

PASSWD User password for FTP, not necessary if TFTP is being used.<br />

Table 64 Download configuration file parameters<br />

This way, the system performs a download of a new configuration file from a FTP or TFTP server.<br />

The configuration file name string size can be up to 60 characters long.<br />

o plSysUpgradeStatus: This OID is read-only <strong>and</strong> shows an integer number, which is a special code<br />

for showing the current status of the upgrade in progress. The codes for this OID are:<br />

0 Last upgrade was performed correctly.<br />

-1 No FLASH upgrade has been performed since the last boot.<br />

-2 Last upgrade failed checking CRC.<br />

-3 Last upgrade failed due to src was incorrect.<br />

-4 Last upgrade failed due to destination (FLASH sector) was incorrect.<br />

-5 Last upgrade failed due to file was for an incorrect HW product.<br />

-6 Last upgrade failed due to file was for an incorrect HW Revision.<br />

-7 Last upgrade failed due to file was for an incorrect ASIC.<br />

Submission page 349 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

-8 Last upgrade failed due to file was for an incorrect flash region.<br />

-9 Last upgrade failed due to file was for an incorrect SW product.<br />

-10 Last upgrade failed due to file size exceeds the flash section size.<br />

-11 Last upgrade failed due to flash section is read-only.<br />

-12 Last upgrade failed downloading/uploading file.<br />

-13 Last upgrade failed due to another upgrade process is running.<br />

-14 Last upgrade failed due to download buffer could not be allocated.<br />

-15 Last upgrade failed due to the region used at upgrade process is invalid.<br />

-16 Warning. The file used is not full compatible.<br />

-17 Last upgrade failed due to the upgrade thread could not be created.<br />

-18 Last upgrade failed due to file was for an incorrect SW version.<br />

-19 Last upgrade failed due to Board Description Data is not set.<br />

-20 Last upgrade failed with other error (unknown).<br />

-21 Last upgrade failed due to file not found.<br />

1 A FLASH upgrade process is starting.<br />

2 A FLASH upgrade process is downloading/uploading file.<br />

3 A FLASH upgrade process is checking CRC.<br />

4 A FLASH upgrade process is finishing.<br />

Submission page 350 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plBasic<br />

99 A FLASH upgrade process is in unknown status.<br />

Table 65 Upgrade status code list<br />

o plSysUpdate: This OID accepts a string in this format:<br />

where:<br />

“PROT IP CONFIG_FILE USER PASSWD“<br />

PROT Value of 0 for downloading the firmware by TFTP, or 1 to download it by FTP.<br />

IP IP address of the TFTP or FTP server.<br />

CONFIG_FILE Name of the file to be downloaded.<br />

TYPE Type of file 1:FW imag, 2 Loader image, etc.<br />

USER User login for FTP, not necessary if TFTP is being used.<br />

PASSWD User password for FTP, not necessary if TFTP is being used.<br />

Table 66 Update system parameters<br />

This way, the system performs an update of the firmware, loader or whatever part of the code in a<br />

modem from a TFTP or FTP server. The configuration file name string size can be up to 60<br />

characters long.<br />

o plSysDNSAddress: Holds the DNS IP address.<br />

o plSnmpROComunityName: Holds the community name string.<br />

o plSnmpRWComunityName: Holds the community name string.<br />

o plSnmpTrapDest: Holds the IP address to send the traps to.<br />

• plBasicTable<br />

Submission page 351 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o plBasicCard: Card index.<br />

o plBasicMode: <strong>Physical</strong> mode used by the modem. These values can reach from 1 to M, depending<br />

on the range of frequency used.<br />

o plBasicCentralFrequency: Mode central frequency value in KHz.<br />

o plBasicB<strong>and</strong>width: Mode b<strong>and</strong>width in MHz.<br />

o plBasicTXAGCEnable: Enables/disables transmission AGC. This AGC feature controls<br />

transmission gains automatically <strong>and</strong> dynamically.<br />

o plBasicRXAGCEnable: Enables/disables reception AGC.<br />

o plBasicTXAGCGain: Sets/gets the transmission gain, <strong>and</strong> it can accept two values, ‘0’ <strong>and</strong> ‘1’.<br />

These values have a ‘distance’ of 12 dB <strong>and</strong> act over the AFE amplifiers.<br />

o plBasicRXAGCGain: Sets/gets the gain in reception, in a range of values from ‘0’ to ‘7’ in steps<br />

of 6 dB.<br />

o plBasicTXPowerMaskLB: Sets/gets the system powermask in the low half b<strong>and</strong> of frequencies in<br />

the whole b<strong>and</strong>width used by the IEEE P1901 node, from carrier numbers 1 to 768. The value is a<br />

768-character long string, each character corresponding to a carrier, that is, the first character<br />

corresponds to carrier number 1 <strong>and</strong> so on. These characters have a special coding, <strong>and</strong> its meaning<br />

has to be split into two sub-codes, e.g.:<br />

0100 0110<br />

First 4 bits coded in steps of 6 dB for coarse attenuation.<br />

Last 4 bits specially coded for fine attenuation.<br />

The coding for the last 4 bits can be deduced from this graph:<br />

Submission page 352 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plPhy<br />

Figure 150 Power mask encoding graphic<br />

o plBasicTXPowerMaskHB: Sets/gets the system powermask in the high half b<strong>and</strong> frequencies of<br />

the whole b<strong>and</strong>width used by the IEEE P1901 node, from carrier numbers 769 to 1536. The<br />

explanation of the value of this OID is equivalent to the previous one.<br />

o plBasicMaster<strong>MAC</strong>: Shows the <strong>MAC</strong> address of the current master of the node.<br />

• plPhyBy<strong>MAC</strong>Table<br />

o plPhyBy<strong>MAC</strong>Card: Card index.<br />

o plPhyBy<strong>MAC</strong><strong>MAC</strong>: <strong>Physical</strong> (<strong>MAC</strong>) address that also serves as an index. This means that all of<br />

the following OIDs will refer to a single <strong>MAC</strong> address. These <strong>MAC</strong> addresses are those that have<br />

been learned by the <strong>MAC</strong> protocol or configured manually. Other tables could be also indexed by<br />

<strong>MAC</strong>, <strong>and</strong> all of them would mean that the value shown affects that <strong>MAC</strong>.<br />

o plPhyBy<strong>MAC</strong>TXBPC: For all practical purposes, these are the tonemap associated to the indexed<br />

<strong>MAC</strong> in transmission. The value is a 768-character long string with numbers from 2 to 10, each<br />

number representing the number of bits per symbol of each carrier. Each byte contains two carriers<br />

(4 bits each).<br />

Note: All BPC OIDs are the result of applying the Adaptive Bitloading ProtoCol, for which BPC is<br />

the acronym.<br />

Submission page 353 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

pl<strong>MAC</strong><br />

o plPhyBy<strong>MAC</strong>TXBPCAggregated: Holds the aggregated BPC value in transmission, which is a<br />

value from 288 to 14592. Although the maximum number of bits per carrier is 10 <strong>and</strong> the number<br />

of carriers is 1536, the physical throughput requires making a subtraction of 0.5 bits for each BPC<br />

value, which is used by the FEC algorithm. Therefore, 1536 times 9.5 results in 14592.<br />

o plPhyBy<strong>MAC</strong>TXPhySpeed: <strong>Physical</strong> speed in transmission in Mbits per second.<br />

o plPhyBy<strong>MAC</strong>RXBPC: These are the BPCs associated to the indexed <strong>MAC</strong> in reception. The<br />

value is a 768-character long string with numbers ranging from 2 to 10, each number representing<br />

the number of bits per symbol for each carrier. Each byte contains two carriers (4 bits each).<br />

o plPhyBy<strong>MAC</strong>RXBPCAggregated: Shows the aggregated BPC value in reception, which is a<br />

value from 288 to 14592. Although the maximum number of bits per carrier is 10 <strong>and</strong> the number<br />

of carriers is 1536, the physical throughput requires making a subtraction of 0.5 bits for each BPC<br />

value, which is used by the FEC algorithm. Therefore, 1536 times 9.5 results in 14592.<br />

o plPhyBy<strong>MAC</strong>RXPhySpeed: <strong>Physical</strong> speed in reception in Mbits per second.<br />

o plPhyBy<strong>MAC</strong>SNR: Shows the measured channel SNR. The value shown is a 768-character long<br />

string where each character is a number that shows the SNR value in units of 0.5 dB.<br />

o plPhyBy<strong>MAC</strong>CFR: Shows the measured channel CFR. The value shown is a 768-character long<br />

string where each character is a number that shows the CFR value in units of 1 dB.<br />

o plPhyBy<strong>MAC</strong>ACK: Enables/disables the level 2 ACKs feature.<br />

o plPhyBy<strong>MAC</strong>Cipher: Enables/disables the cipher feature.<br />

o plPhyBy<strong>MAC</strong>TxHURTO: Forces HURTO mode in transmission for a ‘set’ operation, or<br />

indicates if the modem is transmitting in HURTO mode to the indexed <strong>MAC</strong> for a ‘get’ operation.<br />

o plPhyBy<strong>MAC</strong>RxHURTO: Forces HURTO mode in reception for a ‘set’ operation, or indicates if<br />

the modem is receiving in HURTO mode from the indexed <strong>MAC</strong> for a ‘get’ operation.<br />

o plPhyBy<strong>MAC</strong>IsActive: Used to check if a node, whose <strong>MAC</strong> is the index, is active (1) or not (0).<br />

o plPhyBy<strong>MAC</strong>RXTimeLastActivity: Indicates the number of seconds since the last time the<br />

indexed <strong>MAC</strong> showed BPL activity.<br />

• plPhyRXSNRThresholdTable<br />

o plPhyRXSNRThresholdCard: Card index.<br />

o plPhyRXSNRThresholdIndex: The IEEE P1901 modems have 9 levels of SNR thresholds for<br />

changing the BPCs to be used when these levels are reached. This OID is an index with fixed<br />

values from 1 to 10 to refer to the BPCs to be used when a certain SNR value is reached. For<br />

instance, if data is requested (see the OID below) for the index 6, it will return the SNR value from<br />

which 6 BPCs will be used.<br />

o plPhyRXSNRThreshold: SNR threshold value in units of 0.5 dB for a determinate threshold index<br />

in the above OID.<br />

Submission page 354 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plQoS<br />

• pl<strong>MAC</strong>Table<br />

o pl<strong>MAC</strong>Card: Card index.<br />

o pl<strong>MAC</strong><strong>Access</strong>Protocol: Enables/disables the <strong>Access</strong> Protocol mode, which has been implemented<br />

to allow a node to automatically learn the <strong>MAC</strong> addresses of the nodes that are liable to connect<br />

with it.<br />

o pl<strong>MAC</strong>NumConnectedNodes: Shows the number of nodes successfully connected, that is, with its<br />

link solved by the Port Solver Protocol.<br />

o pl<strong>MAC</strong>NumSlaves: Shows the number of configured slaves if the nodeis a master.<br />

• pl<strong>MAC</strong>ConnectedNodesTable<br />

o pl<strong>MAC</strong>ConnectedNodesCard: Card index.<br />

o pl<strong>MAC</strong>ConnectedNodesIndex: This index will refer to a connected node, a number ranging from<br />

0 to the value shown by pl<strong>MAC</strong>NumConnectedNodes (see above).<br />

o pl<strong>MAC</strong>ConnectedNodes<strong>MAC</strong>: <strong>MAC</strong> address of the indexed connected node.<br />

• pl<strong>MAC</strong>SlavesTable<br />

o pl<strong>MAC</strong>SlavesCard: Card index.<br />

o pl<strong>MAC</strong>SlavesIndex: This index will refer to a slave node, a number ranging from 0 to the value<br />

shown by pl<strong>MAC</strong>NumSlaves (see above).<br />

o pl<strong>MAC</strong>Slaves<strong>MAC</strong>: <strong>MAC</strong> address of the indexed slave node.<br />

• plQoSMasterGeneralMinOneWayLat<br />

If the modem is a master, this OID shows the minimum latency configured in the modem in milliseconds.<br />

• plQoSMasterGeneralBwMngrPolicy<br />

This OID shows the policy to be followed by a master in assigning a certain b<strong>and</strong>width to its attached<br />

slaves. If a 0 is returned, the master is configured to assign b<strong>and</strong>width in a fair policy, while if a 1 is<br />

returned, the b<strong>and</strong>width is assigned in a priority-based policy.<br />

• plQoSPriorityManagementTable<br />

o plQoSPriorityManagementCard: Card index.<br />

o plQoSPriorityManagementPrio: Priority value, from 1 to 8.<br />

Submission page 355 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o plQoSPriorityManagementLatency: Latency coding value for the priority. Allowed coding<br />

values are 0, 1, 2, 4 <strong>and</strong> 8<br />

o plQoSPriorityManagementTimmingInterval: A fixed scheduling repeated each programmable<br />

Timming Interval is set, <strong>and</strong> the slaves will have a fixed amount of assigned time to transmit. This<br />

scheduling may be synchronized with the mains.<br />

• plQoSPerUserTable<br />

plOVLAN<br />

o plQoSPerUserCard: Card index.<br />

o plQoSPerUser<strong>MAC</strong>: <strong>Physical</strong> <strong>MAC</strong> address of the user hanging from the master. Used as index.<br />

o plQoSPerUserTXMaxXput: Shows the maximum throughput allowed in transmission for a user in<br />

kilobits per second.<br />

o plQoSPerUserRXMaxXput: Shows the maximum throughput allowed in reception for a user in<br />

kilobits per second.<br />

o plQoSPerUserPriorityAllowedUp: Shows the allowed priorities for transmission <strong>and</strong> reception in<br />

upstream for a user. The returned value is a number from 0 to 255, which is a number<br />

corresponding to the allowed priorities’ 8-bit mask coding, i.e., a value of 16 (0010000b) would<br />

mean that priority 5 is the only one allowed.<br />

o plQoSPerUserPriorityAllowedDown: Shows the allowed priorities for transmission <strong>and</strong> reception<br />

in downstream for a user. The returned value is a number from 0 to 255, which is a number<br />

corresponding to the allowed priorities’ 8-bit mask coding, i.e., a value of 17 (0010001b) would<br />

mean that priorities 5 <strong>and</strong> 1 are the only ones allowed.<br />

This node has the same structure <strong>and</strong> OID that the dot1qVlan MIB branch.<br />

plStatistics<br />

• plStatisticsTable<br />

o plStatisticsCard: Card index.<br />

o plStatisticsBPLInputWords: Number of words received by the BPL physical interface.<br />

o plStatisticsBPLInputPackets: Number of packets received by the BPL physical interface.<br />

o plStatisticsBPLInputIncorrigible: Number of incorrigible packets received by the BPL physical<br />

interface.<br />

o plStatisticsBPLInputFECBlocksTotal: Number of FEC blocks received by the BPL physical<br />

interface.<br />

o plStatisticsBPLInputFECBlocksCorrected: Number of FEC blocks received <strong>and</strong> corrected by the<br />

BPL physical interface.<br />

o plStatisticsBPLInputPktsReceived: Number of packets received by the BPL physical interface.<br />

Submission page 356 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o plStatisticsBPLInputPktsRcvComplete: Number of packets received complete by the BPL<br />

physical interface.<br />

o plStatisticsBPLInputPktsRcvIncomplete: Number of packets received incomplete by the BPL<br />

physical interface.<br />

o plStatisticsBPLOutputWords: Number of words transmitted through the BPL physical interface.<br />

o plStatisticsBPLOutputPkts: Number of packets transmitted through the BPL physical interface.<br />

plTraps<br />

• plTrapsPhyTable<br />

o plTrapsPhyCard: Card index.<br />

o plTrapsPhyTrapToHURTOEnable: Enables/disables trap generation when entering HURTO<br />

mode.<br />

o plTrapsPhyTrapFromHURTOEnable: Enables/disables trap generation when leaving HURTO<br />

mode.<br />

• plTraps<strong>MAC</strong>Table<br />

o plTraps<strong>MAC</strong>Card: Card index.<br />

o plTraps<strong>MAC</strong>TrapPeerDetectedEnable: Enables/disables trap generation when detecting a peer<br />

modem.<br />

o plTraps<strong>MAC</strong>TrapPeerDisappearedEnable: Enables/disables trap generation when a peer modem<br />

disappears.<br />

• plTrapsBridgeTable<br />

o plTrapsBridgeCard: Card index.<br />

o plTrapsBridgeTrapNewRootEnable: Enables/disables trap generation when a new root is<br />

assigned. The trap is sent from a node when this node becomes root.<br />

o plTrapsBridgeTopologyChangeEnable: Enables/disables trap generation when network topology<br />

changes.<br />

• plTrapsConfFailTable<br />

o plTrapsConfFailCard: Card Index.<br />

o plTrapsConfDonwloadFailEnable : Enables/disables the trap generation when a configuration file<br />

download fails.<br />

o plTrapsConfUploadFailEnable : Enables/disables the trap generation when a configuration file<br />

upload fails.<br />

plStp<br />

• plStpTable<br />

Submission page 357 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o plStpCard: Card index.<br />

o plStpEnable: Enables/disables the Spanning Tree protocol.<br />

o plStpProtocolVersion: Chooses either using STP (IEEE 802.1d) or RSTP (IEEE 802.1w). The<br />

RSTP version is compatible to STP on a per-port basis. Values: “STP”, RSTP”.<br />

o plStpPtpExtA: Sets the point-to-point flag on EXTA. This port will be considered point-to-point,<br />

thus c<strong>and</strong>idate for rapid transition to forwarding. Set by default when EXTA is connected to<br />

backplane.<br />

o plStpPtpExtB: Sets the point-to-point flag on EXTB. This port will be considered point-to-point,<br />

thus c<strong>and</strong>idate for rapid transition to forwarding. Set by default when EXTB is connected to<br />

backplane.<br />

o plStpFrontier: Enables/disables the Spanning Tree Frontier . This feature drops all the STP<br />

messages on an EXT interface. Values: “NONE”, “EXTA”, EXTB”.<br />

plSecurity<br />

o plSecurityConsoleSerial: Enables or disables the serial console access to the modem.<br />

o plSecurityConsoleTelnet: Enables or disables the telnet console access to the modem.<br />

o plSecurityConsoleAuthTable: Table containing the IP addresses from which telnet clients may<br />

access this<br />

12.2 AUTO-CONFIGURATION AND PROVISIONING<br />

12.2.1 Auto-configuration purpose<br />

The purpose of the auto-configuration process is the complete automation of the deployment of the BPL network:<br />

• <strong>Medium</strong> Voltage equipment<br />

• Low Voltage Repeaters <strong>and</strong> Home Gateways<br />

• CPEs<br />

With the auto-configuration mechanism no prior pre-configuration of any modem is required.<br />

12.2.2 Auto-configuration process overview<br />

The objective of the auto-configuration process is the centralized management of a BPL network using<br />

configuration files stored in a centralized database that are transferred to each node when it boots. These files<br />

contain all of the information that a node needs to know to work as expected.<br />

Below is a brief description of the process:<br />

Submission page 358 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

1. Every node starts with the same default factory configuration: <strong>Access</strong> CPE.<br />

2. Using PTTP (explained later in this document 12.2.5) the modem discovers if it is booting in a network<br />

with VLANs or not. If a network has been built using VLANs it is necessary to know the Management VLAN of<br />

that network segment for the DHCP request to reach the backbone. The information passed between modems<br />

during PTTP is called the translation table.<br />

3. Using DHCP protocol, each node gets their IP configuration (IP address, netmask <strong>and</strong> gateway), the phone<br />

number (in the case of VoIP CPEs), the name of their corresponding auto-configuration file <strong>and</strong> the IP address of<br />

the TFTP server where the auto-configuration file is.<br />

4. Using TFTP protocol, the nodes download the auto-configuration file <strong>and</strong> configure the node accordingly.<br />

The four points mentioned above are the main ones, but there is another point to consider:<br />

In order to achieve a secure network, BPL authentication is introduced. When a new slave is trying to<br />

access the BPL network <strong>and</strong> connecting to a master or a repeater, the master or repeater may perform a<br />

RADIUS request to authenticate the user. See section 12.2.9 for more information.<br />

Below there is an example of the actions involved in the auto-configuration of a slave modem:<br />

Radius Server<br />

TFTP Server<br />

DHCP Server<br />

Master<br />

PLC<br />

Slave<br />

Master<br />

Slave<br />

Searchlink<br />

<strong>Access</strong><br />

Protocol<br />

Radius<br />

Request<br />

Master<br />

Slave<br />

<strong>MAC</strong><br />

Authentication<br />

RadiusReply<br />

with Profile<br />

<strong>Access</strong><br />

Grant<br />

Master<br />

Slave<br />

PSP Negotiation<br />

STP<br />

PTTP<br />

Request<br />

Submission page 359 UPA-OPERA<br />

Master<br />

Slave<br />

PTTP<br />

Reply<br />

Gets Translation Table<br />

with Mgmt VLAN<br />

DHCP<br />

Request<br />

Figure 151 Autoconfiguration of a slave modem<br />

Slave<br />

TFTP<br />

Request<br />

DHCP<br />

Reply<br />

Gets IP address +<br />

Name of Configuration<br />

File<br />

Slave<br />

Downloads<br />

Configuration File


4-June-07 P1901_PRO_016_r0<br />

If the node is the first modem in the network <strong>and</strong> connected directly through the Ethernet port to the backbone, the<br />

process is slightly different:<br />

1. This node starts with the same default factory configuration: <strong>Access</strong> CPE.<br />

2. Using DHCP protocol, the node gets their IP configuration (IP address, netmask <strong>and</strong> gateway, <strong>and</strong> the name<br />

of their corresponding auto-configuration file). Also there is another parameter called pttp-code that indicates if<br />

VLAN is used <strong>and</strong> the value of the management VLAN if needed. Once this parameter is obtained the PTTP<br />

protocol finishes. Important: the DHCP server must ask this node in the VLAN #1 or without VLAN. In other<br />

words, the node performs DHCP requests without VLAN <strong>and</strong> with VLAN #1 alternately.<br />

3. Using TFTP protocol, the nodes download the auto-configuration file <strong>and</strong> configure the node accordingly.<br />

The figure below shows an example of this case:<br />

Radius Server<br />

TFTP Server<br />

DHCP Server<br />

Ethernet<br />

12.2.3 <strong>Access</strong> Protocol<br />

DHCP<br />

Request<br />

VLAN 1<br />

Slave<br />

DHCP<br />

DHCP<br />

Reply<br />

VLAN 1<br />

Slave<br />

Gets Mgmt VLAN from<br />

DHCP reply<br />

Gets IP address +<br />

Name of Configuration<br />

File<br />

TFTP<br />

Request<br />

VLAN X<br />

Submission page 360 UPA-OPERA<br />

Slave<br />

TFTP<br />

Reply<br />

VLAN X<br />

Downloads Configuration<br />

File + Translation Table<br />

Figure 152 Autoconfiguration of a HE<br />

HE<br />

HE Node Configured<br />

as master<br />

The access protocol mechanism controls the access of slaves to the BPL network. The master or repeater queries the<br />

Radius server (if Radius authentication is enabled) when a new slave is detected.<br />

Only nodes that link to a Master or repeater need to be in the Radius database:<br />

• CPEs


4-June-07 P1901_PRO_016_r0<br />

• TD Repeaters<br />

The Radius server checks:<br />

• The <strong>MAC</strong> address of the slave applying for authentication<br />

• The <strong>MAC</strong> address of the master placing the request<br />

The Radius server replies:<br />

• Accept / Reject<br />

• Profile number<br />

The profile number relates to the QoS <strong>and</strong> VLAN settings for the given slave (Radius user).<br />

If <strong>Access</strong> Protocol authentication is disabled, all slaves get access to the network with the default settings (profile<br />

1).<br />

A third type of authentication is possible: Authlist. In this mode, the autoconfiguration file of the master contains all<br />

the slaves that are allowed to connect <strong>and</strong> their associated profile.<br />

12.2.4 Auto-configuration at Modem Boot<br />

autoconfiguration parameters on booting. When any node boots, there may be a parameter stored in the non-volatile<br />

memory called GENERAL_USE_AUTOCONF. When this value is YES, the node boots in auto-configuration<br />

mode. When this value is NO, the node boots from local settings.<br />

Inside the autoconfiguration boot mode there are two possibilities depending on whether or not PTTP is performed.<br />

12.2.4.1 Autoconfiguration PTTP Boot<br />

send PTTP requests. When this protocol ends, the modem has the minimum information to successfully connect to<br />

the backbone <strong>and</strong> execute DHCP <strong>and</strong> TFTP.<br />

The node then performs a DHCP request to get an IP configuration, the phone number (if required) <strong>and</strong> the name of<br />

the auto-configuration file, as well as the TFTP server where the file is located. Then it downloads the file <strong>and</strong><br />

configures the node accordingly.<br />

12.2.4.2 Autoconfiguration no PTTP Boot<br />

In this autoconfiguration boot modality, the modem has been already configured somehow (see section 12.2.5 for<br />

more information) to successfully execute DHCP <strong>and</strong> TFTP so it skips PTTP.<br />

Submission page 361 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

This mode requires pre-configuration <strong>and</strong> it is only recommended in the first node of the BPL network, the node<br />

that connects to the backbone, because this node cannot get the information for booting from any other node.<br />

However, there is defined a DHCP extension to solve this issue without pre-configuration. See section 12.2.8.<br />

12.2.4.3 Boot from local settings<br />

When a node starts in local settings boot mode, it collects all of the configured parameters from the non-volatile<br />

memory <strong>and</strong> configures the node accordingly. There are some basic parameters that are always configured in this<br />

mode:<br />

• GENERAL_TYPE: Node type – HE, CPE, or TDREPEATER.<br />

• GENERAL_IP_USE_DHCP: Use DHCP – yes or no. If this parameter is set to no, the IP configuration<br />

parameters <strong>and</strong> the phone number are also configured from non-volatile memory.<br />

All of the other parameters are only configured if they have been downloaded from a file first, <strong>and</strong> a<br />

GENERAL_USE_AUTOCONF = no line was in that auto-configuration file. This is equivalent to performing a<br />

Save as Permanent.<br />

12.2.5 PTTP Protocol<br />

The PTTP (Parametric Translation Table Protocol) is used to transfer the translation table (explained later in this<br />

document) between modems at booting. The PTTP uses the CCP<br />

12.2.5.1 General description<br />

The Parametric translation table protocol takes place every time a node boots. The aim of this protocol is to obtain<br />

from the nearest active node a table with the values of certain auto-configuration parameters. When the node<br />

downloads the auto-configuration file it uses the obtained values to translate all the parametric values contained in<br />

the file.<br />

The translation table contains information about the different VLAN <strong>and</strong> OVLAN tags used in the network, as well<br />

as information about the QoS settings. If the network is not using VLAN tags, this information is also contained in<br />

the translation table. Due to this, it is necessary to perform the protocol before the DHCP request.<br />

Once the translation table is obtained, the node is able to perform the DHCP request successfully <strong>and</strong> download <strong>and</strong><br />

interpret the auto-configuration file, translating the parametric values contained on it.<br />

12.2.5.2 Protocol description<br />

The Translation Table protocol is client-server. Each node belonging to the network at boot time represents the<br />

client side. Each configured node in the network excluding End Users nodes performs the server side of the<br />

protocol.<br />

The usual sequence of packet exchanging is described:<br />

Submission page 362 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

1. The client starts sending a Read ReQuest (RRQ) packet through all active interfaces.<br />

2. The closest server receives the RRQ packet <strong>and</strong> it sends the first block of the Translation Table to the client<br />

with a DATA packet with block number 1.<br />

3. The client answers with an ACK packet of the block number 1.<br />

4. The server sends the next block of DATA.<br />

5. The client replies with another ACK<br />

6. Steps 4 <strong>and</strong> 5 are repeated until the translation table is sent completely.<br />

7. The server sends an empty DATA packet to finish the protocol.<br />

8. The client replies with an ACK to this empty packet <strong>and</strong> closes the connection.<br />

9. The server receives the last ACK <strong>and</strong> closes the connection.<br />

The following figure shows this sequence:<br />

Submission page 363 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Open connection<br />

Learn source <strong>MAC</strong><br />

address<br />

Last data block<br />

received (empty)<br />

Close connection<br />

Client<br />

<strong>MAC</strong>_x<br />

PTTP.DATA(N)<br />

Empty<br />

PTTP.RRQ<br />

DST: DS2 Multicast<br />

SRC: <strong>MAC</strong>_x<br />

Preforwarded to<br />

active ports<br />

PTTP.DATA(1)<br />

DST: <strong>MAC</strong>_x<br />

SRC: <strong>MAC</strong>_y<br />

PTTP.ACK(1)<br />

DST: <strong>MAC</strong>_y<br />

SRC: <strong>MAC</strong>_x<br />

PTTP.DATA(2)<br />

PTTP.ACK(2)<br />

PTTP.ACK(N)<br />

Figure 153 Usual PTTP operation.<br />

Server<br />

<strong>MAC</strong>_y<br />

Open connection<br />

Learn source <strong>MAC</strong><br />

address<br />

Last block ACK<br />

received<br />

Close connection<br />

Since PTTP protocol operates directly over BPL <strong>and</strong> Ethernet protocols, it must h<strong>and</strong>le itself lost <strong>and</strong> duplicated<br />

packets. PTTP implements the stop-<strong>and</strong>-wait protocol described before. For this purpose, two timers are needed per<br />

each connection: DATA <strong>and</strong> ACK timers. The DATA timer is in the client, whereas the ACK timer is located in the<br />

server.<br />

If a duplicated DATA or ACK message arrives, it is simply discarded, because its Block Number field will not<br />

match the expected one. If a DATA or ACK message is lost, the ACK timer will expire in the server <strong>and</strong> this will<br />

retransmit the last DATA message.<br />

There is defined a Maximum Number of Retransmissions, which in case of being exceeded, the connection will be<br />

closed on the server side. Moreover, the connection will be closed on the client side too, because its DATA timer<br />

will expire.<br />

Submission page 364 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

If the initial RRQ packet is lost, the DATA timer will expire too, <strong>and</strong> the connection will not be open.<br />

In case of DATA timer expiration, the client would not get its translation table <strong>and</strong> will not be configured. For that<br />

reason, it must retry sending another RRQ message again to request the translation table.<br />

DATA timer value should be several times the ACK timer. Concretely, this value must be slightly greater than the<br />

product of the Maximum Number of Retransmissions <strong>and</strong> the ACK timer:<br />

DATA_Timer > Max_Retransmissions · ACK_Timer<br />

The reason for using this value is to avoid useless retransmissions by the server, because the client might have<br />

closed its connection, due to DATA timer timeout, before the server did. Thus, in case of DATA timer expiration,<br />

the server should close the connection before the client.<br />

The following figure shows the mechanism of ACK timer expiration <strong>and</strong> data block retransmission:<br />

Submission page 365 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Client Server<br />

PTTP.ACK(i-1)<br />

PTTP.DATA(i)<br />

PTTP.DATA(i)<br />

PTTP.ACK(i)<br />

PTTP.DATA(i)<br />

PTTP.ACK(i)<br />

PTTP.DATA(i+1)<br />

ACK Timer expired<br />

Retransmit last<br />

data block<br />

ACK Timer expired<br />

Retransmit last<br />

data block<br />

Figure 154 ACK timer expiration <strong>and</strong> data block retransmission.<br />

The following figure shows the mechanism of DATA timer expiration <strong>and</strong> Maximum Number of Retransmissions<br />

exceeded, whose consequence is the connection closing:<br />

Submission page 366 UPA-OPERA<br />

ACK Timer<br />

ACK Timer


4-June-07 P1901_PRO_016_r0<br />

DATA Timer<br />

DATA Timer<br />

expired<br />

Close connection<br />

Client Server<br />

PTTP.ACK(i-1)<br />

PTTP.DATA(i)<br />

PTTP.DATA(i)<br />

PTTP.ACK(i)<br />

PTTP.DATA(i)<br />

PTTP.DATA(i)<br />

ACK Timer expired<br />

Retransmit last<br />

data block<br />

ACK Timer expired<br />

Retransmit last<br />

data block<br />

ACK Timer expired<br />

Retransmit last<br />

data block<br />

Maximum Number<br />

of Retransmissions<br />

exceeded<br />

Close connection<br />

Figure 155 DATA timer expiration <strong>and</strong> Maximum Number of Retransmissions exceeded.<br />

12.2.5.3 PTTP Packets Format<br />

All the packets used by the PTTP protocol are encapsulated with the CCP format, with Type0 0x07. The Type1<br />

field indicates the type of packet within the PTTP protocol:<br />

• 0x06 RRQ (Establish connection)<br />

• 0x07 Data<br />

• 0x08 Data Ack<br />

Submission page 367 UPA-OPERA<br />

ACK Timer<br />

ACK Timer<br />

ACK Timer<br />

Max_Retransmissions · ACK_Timer


4-June-07 P1901_PRO_016_r0<br />

The data field contains the block number <strong>and</strong>/or data to transmit.<br />

12.2.5.3.1 RRQ packet<br />

0xAA<br />

0xAA<br />

0x03<br />

0x00<br />

0x13<br />

0x9D<br />

0x07<br />

0x06<br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

Submission page 368 UPA-OPERA<br />

TPID<br />

TCI<br />

Length<br />

Figure 156 PTTP RRQ packet format<br />

The destination address is the Multicast address 0x01139D000000 defined by the CCP protocol. When a node<br />

receives such a packet, it must not be forwarded.<br />

12.2.5.3.2 DATA packet<br />

TPID<br />

0xAA<br />

0xAA<br />

0x03<br />

0x00<br />

0x13<br />

0x9D<br />

0x07<br />

0x07<br />

Length<br />

Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />

TCI<br />

Block Number<br />

Data (0-1024 bytes)<br />

Figure 157 PTTP DATA packet format<br />

The destination <strong>and</strong> source address are the client <strong>and</strong> server <strong>MAC</strong> addresses respectively.<br />

The Type1 field indicates this is a data packet. Next to this field, it is the data block number, <strong>and</strong> finally the data<br />

block. The data field can be empty if the DATA packet is the last packet of the transfer.<br />

12.2.5.3.3 DATA ACK packet


4-June-07 P1901_PRO_016_r0<br />

Figure 158 PTTP DATA ACK packet format<br />

The destination <strong>and</strong> source address are the server <strong>and</strong> client <strong>MAC</strong> addresses respectively.<br />

The Type1 field indicates this is a data ack packet. Next to this field, it is the acknowledged data block number.<br />

12.2.5.4 Translation Table DATA format<br />

The Translation Table data follows a specific format. It is a set of one or more parameter items. A parameter item is<br />

defined as follows:<br />

Size<br />

TT Parameter Item (4 + n bytes)<br />

ParameterCode Index<br />

ParameterValue<br />

1 byte 2 bytes<br />

1 byte<br />

0 ... n bytes<br />

Figure 159 Translation Table parameter item<br />

The field Size is the number of bytes of the rest of parameter item (ParameterCode + Index + ParameterValue).<br />

The minimum value is thus 4. If the value is 0, it means that no more parameters are sent. It is m<strong>and</strong>atory to finish<br />

the Data block with a 0-size byte.<br />

The ParameterCode is a 2-byte field. The first byte is reserved for future extensions. It defaults to 0x00. The second<br />

byte is the parameter code. The whole field identifies one <strong>and</strong> only one parameter.<br />

The Index byte contains the index for list parameters (from 1 to 127). It is 0 for scalar parameters.<br />

The ParameterValue contains the value for that parameter. Its format depends on the ParameterCode <strong>and</strong> may be of<br />

any type such as int8, int16, int32, string…<br />

The next parameters are available:<br />

Submission page 369 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

TRANSLATION TABLE<br />

PARAMETER<br />

PARAMETER<br />

SIZE (IN<br />

BYTES)<br />

PARAMETER CODE<br />

(IN HEXADECIMAL)<br />

PARAMETER TYPE<br />

TRANSLATION_USE_VLAN 1 0x00 01 Boolean<br />

TRANSLATION_MNMT_VLAN 2 0x00 02 Int16<br />

TRANSLATION_DATA_VLAN.i 2 0x00 03 Int16<br />

TRANSLATION_VOIP_VLAN.i 2 0x00 04 Int16<br />

TRANSLATION_ROOTPATH_OVLAN 2 0x00 05 Int16<br />

TRANSLATION_MAX_TXTPUT_TX.i 4 0x00 06 Int32<br />

TRANSLATION_MAX_TXTPUT_RX.i 4 0x00 07 Int32<br />

Table 67 Translation table parameters<br />

When the Data block exceeds the maximum length of 1024 bytes, it is fragmented <strong>and</strong> transferred in different<br />

DATA packets. No padding is needed for the last packet in case the Data field is smaller than 1024 bytes.<br />

The big endian format is used in the entire Data block to preserve the net order.<br />

The Figure 160 shows a complete data block.<br />

Parameter1<br />

4 + n1 bytes<br />

Parameter2<br />

TT Data block<br />

Parameter3 . . . ParameterN<br />

4 + n2 bytes 4 + n3 bytes 4 + nN bytes<br />

Figure 160 Full Translation Table Data block<br />

12.2.5.5 VLAN configuration while doing PTTP<br />

Submission page 370 UPA-OPERA<br />

0x00<br />

1 byte<br />

In order to discover the type of network where the node is booting, the PTTP petitions are made as described below:


4-June-07 P1901_PRO_016_r0<br />

• Step 1: A PTTP request is made without VLANs <strong>and</strong> waits for a response. If there is response, stay without<br />

VLAN.<br />

• Step 2: Then it switches to VLAN mode <strong>and</strong> makes a PTTP request using VLAN tag #1 (reserved in the<br />

IEEE P1901 network) <strong>and</strong> waits for response. If there is response, stay with VLAN.<br />

Step 3: Back to step 1.<br />

To accomplish this, the VLAN #1 must be accepted in the node that acts as PTTP master.<br />

12.2.5.6 PTTP packets forwarding<br />

When a node receives a PTTP RRQ packet, the packet is not treated as multicast to avoid packet storms.<br />

In transmission, the request is forwarded to all active interfaces in order to reach any active PTTP available server.<br />

12.2.6 Translation Table<br />

The translation table allows particularizing configuration files for a given network sector. Auto-configuration file is<br />

parametric, <strong>and</strong> the same for a given user category. Different sectors have different Translation Tables <strong>and</strong> each<br />

node combines its configuration file with the translation table to obtain its particular setting in VLAN/OVLAN <strong>and</strong><br />

QoS terms.<br />

The parameters cointained in the translation table are shown in 12.2.5.4.<br />

The next figure shows the use of the translation table.<br />

Configuration File<br />

VLAN= %DTVL<br />

Translation table<br />

Translation table<br />

%DTVL =13 %DTVL =14<br />

User A<br />

Sector 1<br />

S S<br />

VLAN=13 VLAN=14<br />

Figure 161 Translation table example<br />

User A<br />

Sector 2<br />

Submission page 371 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

12.2.7 Auto-configuration & Networking<br />

12.2.7.1 VLAN Network<br />

The network model is described as follows:<br />

• The BPL network is a switched network with different VLAN tags.<br />

• BPL management protocols (PTTP, ABLP, etc.) use VLAN 1, while high-level management protocols<br />

(DHCP, TFTP, HTTP, NTP, SNMP, etc.) use the management VLAN configured by the auto-configuration<br />

procedure. The Management VLAN may be different in different LV cells.<br />

• The end user node receives untagged traffic from the external interface <strong>and</strong> this traffic is tagged with the<br />

correct Data VLAN according to the ISP operator that the customer belongs to. So there can be more than<br />

one Data VLAN per LV cell.<br />

• The end user node generates traffic from VoIP tagged with the correct VoIP VLAN according to the voice<br />

operator that the customer belongs to. So there can be more than one VoIP VLAN per LV cell.<br />

• It is possible to add private VLANs between specific customers that do not belong to any ISP or voice<br />

operator. In this case, VLAN trunks must be defined in the intermediary equipment in order to allow all of<br />

that tagged traffic.<br />

All of the traffic is tagged inside the BPL network.<br />

Each node must receive its VLAN configuration inside the auto-configuration file. In addition to this, <strong>and</strong> in order<br />

to reduce the number of auto-configuration files, there will be a translation table transferred between nodes which.<br />

The translation table contains information about the Management, Data <strong>and</strong> VoIP VLANs used in a LV cell.<br />

Submission page 372 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

Internet MV Node Head-End<br />

Router<br />

PSTN<br />

Opt Fiber<br />

MV Node<br />

MV link<br />

MV link<br />

Submission page 373 UPA-OPERA<br />

MV node<br />

L2 visibility area<br />

Head-End<br />

Repeater<br />

Repeater<br />

Repeater<br />

Repeater<br />

Figure 162 VLAN use inside the BPL network<br />

The figure above shows the use of VLAN inside the BPL network.<br />

12.2.7.2 noVLAN Network<br />

End<br />

User-1<br />

End<br />

User-2<br />

End<br />

User-3<br />

End<br />

User-4<br />

End<br />

User-5<br />

End<br />

User-6<br />

End<br />

User-7<br />

End<br />

User-8<br />

VoIP-Op1<br />

Data-Op2<br />

VoIP-Op3<br />

Data-Op1<br />

VoIP-Op4<br />

Data-Op3<br />

VoIP-Op1<br />

Data-Op2<br />

Private1<br />

Private1<br />

VoIP-Op1<br />

Data-Op3<br />

VoIP-Op4<br />

Data-Op1<br />

VoIP-Op1<br />

Data-Op2<br />

VoIP-Op1<br />

Data-Op1<br />

The use of VLANs is not m<strong>and</strong>atory but is advisable for privacy reasons. Nevertheless this privacy can be<br />

implemented with different tools or if the operator simply wants to establish a LAN.<br />

The node will perform its PTTP requests, switching between VLAN #1 <strong>and</strong> not using VLAN, <strong>and</strong> finally a master<br />

will answer with the translation table that will at least contain the parameter “USE VLAN = no”.<br />

Once the modem has received the translation table <strong>and</strong> does not need to configure anything with regard to VLANs,<br />

it can complete the following steps: DHCP, TFTP <strong>and</strong> configuration.<br />

12.2.7.3 OVLAN Configuration <strong>and</strong> Root Interface<br />

The basic OVLAN configuration in IEEE P1901 avoids the visibility between customers connected to the end-user<br />

nodes in a simple way. All of the customer data packets in the same LV cell are tagged with the Rootpath OVLAN<br />

tag. This tag is the only allowed tag in the entire path to the backbone. In the path from the backbone to the<br />

customers, the packets are tagged with the ALL_VLAN tag (4095) in equipment that is connected to the backbone,


4-June-07 P1901_PRO_016_r0<br />

<strong>and</strong> no tag is allowed in this path. However, packets with the ALL_VLAN tag are not filtered, so only packets from<br />

the backbone can be transmitted over the downstream path.<br />

12.2.7.4 User Profiles<br />

The use of profiles allows securely assigning resources to end-user modems based on <strong>MAC</strong> address. They also<br />

inform the master about the VLAN/OVLAN <strong>and</strong> QoS settings to be applied to the slave.<br />

12.2.7.5 User Profiles inside auto-configuration<br />

Inside a master’s auto-configuration file, there is a section with user profiles. These profiles contain the information<br />

a master needs to know to configure a port to a new slave that enters the network. The information is related to QoS<br />

<strong>and</strong> VLAN/OVLAN configuration.<br />

The figure shows an example on the use of user profiles to configure different QoS settings:<br />

User A<br />

Profile 1<br />

Configuration File<br />

#Profile 1<br />

BW = 500<br />

#Profile 2<br />

BW = 1000<br />

Radius Server<br />

M M<br />

S S<br />

User B<br />

Profile 2<br />

BW=500 BW=1000<br />

Figure 163 Radius profiles example<br />

There will be always an invited profile, profile number 1, applied to the users with no specific profile or if the<br />

corresponding profile is not available. This invited profile, as well as the other profiles, can be redefined with autoconfiguration.<br />

Submission page 374 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

12.2.7.6 Working with RADIUS Authentication<br />

When RADIUS authentication is active, the repeater or HE sends an <strong>Access</strong>-Request message to the RADIUS<br />

server, which checks if the <strong>MAC</strong> address corresponds to one that was accepted <strong>and</strong>, in that case, it responds with an<br />

<strong>Access</strong>-Accept message containing the profile number. Otherwise, the server replies with a RADIUS <strong>Access</strong>-<br />

Reject message <strong>and</strong> the authentication fails. If the authentication fails the slave will not join the BPL network.<br />

Once authentication is achieved, the slave is authorized <strong>and</strong> a QoS <strong>and</strong> VLAN/OVLAN configuration takes place<br />

between the master <strong>and</strong> slave. The master uses the profile number to get these parameters. The slave uses the<br />

parameters inside the downloaded auto-configuration file. The slave node downloads the file during its autoconfiguration<br />

process, after the RADIUS request on the master-side has been successful.<br />

12.2.7.7 Working without RADIUS Authentication<br />

If there is no RADIUS authentication, two ways of operation are possible.<br />

The first one is ‘NO AUTHENTICATION’. The master will configure a default QoS <strong>and</strong> VLAN/OVLAN<br />

configuration (the invited profile) for the slave.<br />

The other one is the use of an ‘AUTHORIZATION LIST’. With ‘ACCESSP_AUTHLIST_x’, up to 128 different<br />

users can be added with their related profiles. The user is searched for in that list, <strong>and</strong> if an entry matches with the<br />

new user, the QoS <strong>and</strong> VLAN/OVLAN configuration related to that entry is used for the new user. Otherwise, the<br />

user is rejected.<br />

12.2.8 DHCP Support<br />

12.2.8.1 DHCP Client<br />

The IEEE P1901 nodes perform a DHCP request with extended custom options. So not only the basic IP<br />

configuration (IP address, netmask <strong>and</strong> gateway) is requested, but the client also requests three custom options in<br />

order to obtain the auto-configuration file:<br />

• tftp-server-name: String with the IP address of the TFTP server.<br />

• extensions-path-name: String with the path <strong>and</strong> file name of the auto-configuration file inside the TFTP<br />

server.<br />

• PTTP-code: 32 bits integer that represents the PTTP behaviour:<br />

o 0: Boot without VLANs <strong>and</strong> skip PTTP.<br />

o 1: Keep on requesting PTTP (does nothing).<br />

o [2-4095]: Boot with Management VLAN = PTTP-code. Skip PTTP.<br />

Submission page 375 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

On the other h<strong>and</strong>, if the phone number has to be downloaded using DHCP, another custom option should be<br />

requested:<br />

• phone-number: Text with the phone number.<br />

12.2.8.2 DHCP Server<br />

A DHCP server that supports DHCP extensions is needed in order to provide the different IEEE P1901 nodes with<br />

the custom options requested.<br />

Warning: Although the two first custom options needed by the DHCP client are supposed to be st<strong>and</strong>ard,<br />

sometimes it is necessary to define the extensions-path-name option in the header of the dhcpd.conf file. The PTTPcode<br />

option is m<strong>and</strong>atory to define:<br />

option extensions-path-name code 18 = string;<br />

option PTTP-code code 120 = unsigned integer 32;<br />

It is also necessary to define the phone-number in the header of the dhcpd.conf file, if the phone number of some<br />

CPEs will be configured via DHCP:<br />

option phone-number code 135 = text;<br />

12.2.9 RADIUS Support<br />

Every IEEE P1901 master or repeater node may implement a RADIUS client in order to authenticate users (slaves)<br />

connected through the BPL to that node. The modem acts as a NAS, which requests authentication, gives<br />

authorization, <strong>and</strong> allocates resources.<br />

12.2.9.1 RADIUS Client<br />

The RADIUS client implemented in the IEEE P1901 nodes is configured through the auto-configuration file with<br />

three parameters:<br />

• RADIUS server IP address<br />

• RADIUS server UDP port<br />

• Shared secret password between client <strong>and</strong> server<br />

It also sends two RADIUS st<strong>and</strong>ard attributes within a RADIUS request:<br />

• <strong>MAC</strong> address of the slave trying to join the network as User name.<br />

Submission page 376 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• <strong>MAC</strong> address of the master as NAS-Identifier.<br />

12.3 Auto-configuration Parameters<br />

12.3.1 Parameter Types<br />

There are three types of parameters inside the auto-configuration file:<br />

1. Scalar: PARAMETER = value<br />

2. List: PARAMTER.index1 = value<br />

3. Table: PARAMETER.index1.index2 = value<br />

The first valid index for lists <strong>and</strong> tables is 1.<br />

12.3.2 Parameter Format<br />

The format of the parameters is:<br />

• PARAMETER_LABEL[.x][.y] = value<br />

for concrete parameter values<br />

• PARAMETER_LABEL[.x][.y] = %parametric_value<br />

for parametric parameter values<br />

For example, the following parameter could be inside an end-user auto-configuration file:<br />

• VLAN_DATA_TAG = 452<br />

or<br />

• VLAN_DATA_TAG = %DATA3<br />

In the second case, the parametric value must be translated to its correct value using the translation table.<br />

The following is a list with the syntax of the autoconfiguration parameters.<br />

It is important that the order in which these parameters appear in the auto-configuration file is preserved.<br />

Submission page 377 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

12.3.3 Auto-configuration parameter list<br />

12.3.3.1 General Parameters<br />

• GENERAL_USE_AUTOCONF = [YES | NO]<br />

o Parameter: YES enables autoconf, NO disables it.<br />

• GENERAL_TYPE = [HE | CPE | TDREPEATER]<br />

o Parameter: Possible values are: HE (Head End), CPE (Customer Premises Equipment) <strong>and</strong><br />

TDREPEATER (Time Division Repeater).<br />

• GENERAL_FW_TYPE = [MV | LV | EU]<br />

o Parameter: Possible values are: MV (<strong>Medium</strong> Voltage), LV (Low Voltage) <strong>and</strong> EU (End User).<br />

• GENERAL_SIGNAL_MODE = [1 … m]<br />

o Parameter: Configures the physical mode used by the modem. This value can reach from 1 to m,<br />

depending on the range of frequency used.<br />

• GENERAL_SIGNAL_MODE_LIST.i = [1 … m]<br />

o Parameter: This value can reach from 1 to m, depending on the range of frequency used.<br />

• GENERAL_AUTHENTICATION = [RADIUS | AUTHLIST | NONE]<br />

o Parameter: There are three possible values: RADIUS, ATHLIST <strong>and</strong> NONE. If RADIUS is<br />

selected, a RADIUS server will be in charge of accepting new users <strong>and</strong> assigning the profile. If<br />

AUTHLIST is selected, authentication will be done by checking a list provided in the autoconfiguration<br />

file. If NONE is selected, all the users will be accepted<br />

• GENERAL_STP = [YES | NO]<br />

o Parameter: Enables (YES) or disables (NO) the Spanning Tree Protocol in the node. Enabled by<br />

default.<br />

• GENERAL_COMMON_STP_EXTA = [YES | NO]<br />

o Parameter: Enables (YES) or disables (NO) the Common STP feature in the Ethernet interface A<br />

(EXTA).<br />

• GENERAL_COMMON_STP_EXTB = [YES | NO]<br />

o Parameter: Enables (YES) or disables (NO) the Common STP feature in the Ethernet interface B<br />

(EXTB).<br />

• GENERAL_IP_ADDRESS = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

Submission page 378 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• GENERAL_IP_NETMASK = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

• GENERAL_IP_GATEWAY = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

• GENERAL_IP_USE_DHCP = [YES | NO]<br />

o Parameter: If Yes DHCP is used, if NO DHCP is not used.<br />

12.3.3.2 AGC (Automatic Gain <strong>Control</strong>) Parameters<br />

• AGC_TX_GAIN = [0 | 1]<br />

o Parameter: Selecting 1, the default value, 12 dB are added to the reference gain. In case of 0 value,<br />

no extra gain is added (0 dB).<br />

• AGC_RX_ENABLE = [0 | 1]<br />

o Parameter: Enables (1) or disables (0) the hardware AGC.<br />

• AGC_RX_FIX_GAIN = [0 … 7]<br />

o Parameter: Eight values, from 0 to 7, are possible. Those values represent gains from 0 to 42 dB,<br />

respectively, added to the reference gain in steps of 6 dB.<br />

• AGC_MAX_RX_GAIN = [0 … 7]<br />

o Parameter: Eight values, from 0 to 7, are possible. Those values represent gains from 0 to 42 dB,<br />

respectively, added to the reference gain in steps of 6 dB. The default value is 7 (42 dB).<br />

• AGC_MIN_RX_GAIN = [0 … 7]<br />

o Parameter: Eight values, from 0 to 7, are possible. Those values represent gains from 0 to 42 dB,<br />

respectively, added to the reference gain in steps of 6 dB. The default value is 7 (42 dB).<br />

12.3.3.3 RADIUS Parameters<br />

• RADIUS_SERVER_IP = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

• RADIUS_SERVER_PORT = ddddd<br />

o Parameter: Port number<br />

Submission page 379 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• RADIUS_SHARED_SECRET = <br />

o Parameter: ‘shared_secret’ (string, limited to 16 characters, of the shared secret)<br />

12.3.3.4 Class of Service (CoS) Parameters<br />

• COS_CUSTOM_CRITERION_OFFSET.i = [1 … 531]<br />

o Parameter: Values from 1 to 531 are possible.<br />

• COS_CUSTOM_CRITERION_PATTERN.i = 0xXXXXXXXXXXXXXXXX<br />

o Parameter: The value must be specified with 16 hexadecimal digits.<br />

• COS_CUSTOM_CRITERION_BITMASK.i = 0xXXXXXXXXXXXXXXXX<br />

o Parameter: The value must be specified with 16 hexadecimal digits.<br />

• COS_CUSTOM_CRITERION_CLASSES_OFFSET.i = [1 … 531]<br />

o Parameter: Values from 1 to 531 are possible.<br />

• COS_CUSTOM_CRITERION_CLASSES_BITMASK.i i = 0xXXXXXXXXXXXXXXXX<br />

o Parameter: The value must be specified with 16 hexadecimal digits.<br />

• COS_CUSTOM_CRITERION_CLASSES_PATTERN.i.j i=0xXXXXXXXXXXXXXXXX<br />

o Parameter: The value must be specified with 16 hexadecimal digits<br />

• COS_CUSTOM_CRITERION_CLASSES_PRIO.i.j = [0 … 7]<br />

o Parameter: Values from 0 to 7 are allowed.<br />

• COS_CRITERION.k = [8021P | TOS | CUSTOM1 | CUSTOM2]<br />

o Parameter: There are two predefined criteria (8021P, based on IEEE 802.1p VLAN tag priority<br />

field, <strong>and</strong> TOS, based on IP type of service), <strong>and</strong> two custom criteria (CUSTOM1 <strong>and</strong> CUSTOM2),<br />

defined with the parameters above (COS_CUSTOM_CRITERION_xxx).<br />

• COS_DEFAULT_PRIO = [0 … 7]<br />

o Parameter: Values from 0 to 7 are allowed.<br />

12.3.3.5 Quality of Service (QoS) Parameters<br />

• QOS_ENABLE = [YES | NO]<br />

o Parameter: Enables (YES) or disables (NO) the quality of service in the node.<br />

• QOS_PRIOACK.prio+1 = [0 | 1]<br />

Submission page 380 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: This list enables (1) or disables (0) the <strong>Layer</strong> 2 ACK protocol depending on the<br />

priority level transmitted by the modem (priority levels: prio = 0 … 7).<br />

• QOS_PRIORSV.prio+1 = [CBR | VBR | BE]<br />

o Parameter: Type of reservation for each priority<br />

12.3.3.5.1 Slave Node Parameters (CPE)<br />

• QOS_UPBWLIMIT = [YES | NO]<br />

o Parameter: Enables (YES) or disables (NO) the transmission b<strong>and</strong>width limitation in a slave.<br />

• QOS_CLASSES.prio+1 = [VOIP | VIDEO | DATAH | DATAL]<br />

o Parameter: Sets the type of application for each service class<br />

12.3.3.5.2 Master Node Parameters (HE or REPEATER)<br />

• QOS_LATENCY_STEP = [20 … 400]<br />

o Parameter: Values in ms, from 20 to 400.<br />

• QOS_BW_POLICY = [0 | 1]<br />

o Parameter: A value of 0 corresponds to Fair mode, <strong>and</strong> 1 to Priority-based mode.<br />

• QOS_LATENCY.prio+1 = [1 | 2 | 4 | 8]<br />

o Parameter: Priority levels: prio = 0 … 7. Possible values are: 1, 2, 4 <strong>and</strong> 8.<br />

12.3.3.6 Profiles Parameters<br />

• PROFILE_MAX_TXPUT_TX.i = dddd (in kbps)<br />

o Parameter: Number of kbps)<br />

• PROFILE_MAX_TXPUT_RX.i = dddd (in kbps)<br />

o Parameter: Number of kbps)<br />

• PROFILE_PRIORITIES.i = [0x00-0xFF]<br />

o Parameter: ‘0xXX’ (hexadecimal number from 00 to FF)<br />

• PROFILE_MNMT_VLAN.i = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

• PROFILE_DATA_VLAN.i = [2-4093] | %<br />

Submission page 381 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

• PROFILE_VOIP_VLAN.i = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

• PROFILE_VLAN_ADD_TAG.i.j = [2-4093] or parametric<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

• PROFILE_VLAN_IS_ALLOWED_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to set the list as allowed) or ‘no’ (to set the list as forbidden)<br />

• PROFILE_VLAN_TAGGED_ONLY_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to drop input packets without VLAN tag) or ‘no’ (to not drop input packets<br />

without VLAN tag)<br />

• PROFILE_VLAN_OUTFORMAT_TAG_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to send packets with VLAN tag) or ‘no’ (to not send packets with VLAN tag)<br />

• PROFILE_OVLAN_ADD_TAG.i.j = [2-4094] or parametric<br />

o Parameter: Number from 2 to 4094 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

• PROFILE_OVLAN_IS_ALLOWED_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to mark the list as allowed) or ‘no’ (to mark the list as forbidden)<br />

• PROFILE_OVLAN_TAGGED_ONLY_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to drop input packets without OVLAN tag) or ‘no’ (to not drop input packets<br />

without OVLAN tag)<br />

• PROFILE_OVLAN_OUTFORMAT_TAG_IFACE_USER.i = [yes/no]<br />

o Parameter: ‘yes’ (to send packets with OVLAN tag) or ‘no’ (to not send packets with OVLAN<br />

tag)<br />

• PROFILE_UPBWLIMIT.i = [YES|NO]<br />

o Parameter: ‘yes’ (to limit the upstream) or ‘no’ (to not limit the upstream)<br />

• PROFILE_DWBWLIMIT.i = [YES|NO]<br />

o Parameter: ‘yes’ (to limit the downstream) or ‘no’ (to not limit the downstream)<br />

12.3.3.7 Translation Table Parameters<br />

• TRANSLATION_MNMT_VLAN = [2-4093]<br />

Submission page 382 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: Number from 2 to 4093<br />

• TRANSLATION_DATA_VLAN.i = [2-4093]<br />

o Parameter: Number from 2 to 4093<br />

• TRANSLATION_VOIP_VLAN.i = [2-4093]<br />

o Parameter: Number from 2 to 4093<br />

• TRANSLATION_ROOTPATH_OVLAN = [2-4094]<br />

o Parameter: Number from 2 to 4094<br />

12.3.3.8 VLAN Parameters<br />

• VLAN_ENABLE = [yes|no]<br />

o Parameter: ‘yes’ (to enable VLAN use) or ‘no’ (to disable VLAN use)<br />

• VLAN_MNMT_TAG = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter name’ (parametric value preceded by a %)<br />

• VLAN_MNMT_PRIO = [0-7]<br />

o Parameter: Number from 0 to 7<br />

• VLAN_DATA_TAG = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />

• VLAN_DATA_PRIO = [0-6]<br />

o Parameter: Number from 0 to 6<br />

• VLAN_VOIP_TAG = [2-4093] | %<br />

o Parameter: Number from 2 to 4093 or ‘%Parameter_name‘ (parametric value preceded by a %)<br />

• VLAN_VOIP_PRIO = [0-7]<br />

o Parameter: Number from 0 to 7<br />

• VLAN_VSIG_PRIO = [0-7]<br />

o Parameter: Number from 0 to 7<br />

• VLAN_TRUNK.i = [2-4093]<br />

o Parameter: Number from 2 to 4093<br />

Submission page 383 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• VLAN_RETAG_EXTA_SRC = [0 | 2-4095]<br />

o Parameter: ‘0’ (in order to disable retagging in interface) or Number from 2 to 4095.<br />

• VLAN_RETAG_EXTA_DST = [0 | 2-4095]<br />

o Parameter: ‘0’ (in order to disable retagging in interface) or Number from 2 to 4095<br />

• VLAN_RETAG_EXTB_SRC = [0 | 2-4095]<br />

o Parameter: ‘0’ (in order to disable retagging in interface) or Number from 2 to 4095<br />

• VLAN_RETAG_EXTB_DST = [0 | 2-4095]<br />

o Parameter: ‘0’ (in order to disable retagging in interface) or Number from 2 to 4095<br />

12.3.3.9 OVLAN Parameters<br />

• OVLAN_ENABLE = [yes|no]<br />

o Parameter: ‘yes’ (to enable OVLAN use) or ‘no’ (to disable OVLAN use)<br />

• OVLAN_DATA_TAG = [2-4094] | %ROOTPATH_OVLAN<br />

o Parameter: Number from 2 to 4093 or ‘%ROOTPATH_OVLAN’ (use the OVLAN Rootpath<br />

value)<br />

• OVLAN_TRUNK.i = [2-4094]<br />

o Parameter: Number from 2 to 4094<br />

12.3.3.10 <strong>Access</strong> Protocol Parameters<br />

• AP_MIN_NUMBER_HOPS = [0|1|…]<br />

o Parameter: Number from 0<br />

• AP_FORBID_MASTER.i = 0xXXXXXXXXXXXX<br />

o Parameter: ‘0xXXXXXXXXXXXX’ (<strong>MAC</strong> address of forbidden master)<br />

• AP_PREFER_MASTER = 0xXXXXXXXXXXXX<br />

o Parameter: ‘0xXXXXXXXXXXXX’ (<strong>MAC</strong> address of preferred master)<br />

• AP_FIX_MASTER = ‘0xXXXXXXXXXXXX’<br />

o Parameter: 0xXXXXXXXXXXXX (<strong>MAC</strong> address of fixed master)<br />

• AP_CHECK_BEST_MASTER_ENABLE = [yes|no]<br />

Submission page 384 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: ‘yes’ (to enable checking of best master periodically after connecting with one) or ‘no’<br />

(to disable the checking of better masters after connecting to one).<br />

• AP_CHECK_BEST_MASTER_PERIOD = <br />

o Parameter: Number of minutes<br />

• AP_CURRENT_MASTER_MIN_BPS = <br />

o Parameter: Number of bits per symbol<br />

• AP_NEW_MASTER_MIN_BPS = <br />

o Parameter: Number of bits per symbol<br />

• ACCESSP_AUTHLIST_<strong>MAC</strong>.i = 0xXXXXXXXXXXXX<br />

o Parameter: ‘0xXXXXXXXXXXXX’ (<strong>MAC</strong> address authorized to connect)<br />

• ACCESSP_AUTHLIST_PROFILE.i = [1-16]<br />

o Parameter: Number of the profile related to a <strong>MAC</strong> authorized<br />

• ACCESSP_AUTHLIST_FWTYPE.i = [MV|LV|EU]<br />

o Parameter: ‘MV’ (medium voltage) or ‘LV’ (low voltage) or ‘EU’ (End User)<br />

12.3.3.11 STP Parameters<br />

• STP_PRIO = [0 … 65535]<br />

o Parameter: Valid values range from 0 to 65535.<br />

• STP_PORT.i = [EXTA | EXTB | BPL]<br />

o Parameter: Three possible values: EXTA, EXTB <strong>and</strong> BPL (i = 1,2 or 3).<br />

• STP_PORT_PRIO.i = [0 … 255]<br />

o Parameter: Valid values range from 0 to 255 (i = 1,2 or 3).<br />

• STP_PORT_COST.i = [0 … 4294967295]<br />

o Parameter: Valid values range from 0 to 4294967295 (i = 1,2 or 3).<br />

• STP_HELLO_TIME = [10 … 40]<br />

o Parameter: Valid values range from 10 to 40.<br />

• STP_MAX_AGE = [10 … 40]<br />

o Parameter: Valid values range from 10 to 40.<br />

Submission page 385 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• STP_FORWARD_DELAY = [40 … 300]<br />

o Parameter: Valid values range from 40 to 300.<br />

• STP_FRONTIER = [EXTA | EXTB | NONE]<br />

o Parameter: Valid values are: EXTA (Ethernet interface A), EXTB (Ethernet interface B) <strong>and</strong><br />

NONE (Spanning Tree Frontier disabled).<br />

• STP_MODE = [STP | RSTP]<br />

o Parameter: Possible values: STP selects STP or RSTP selects RSTP.<br />

12.3.3.12 VoIP Parameters<br />

• VOIP_ENABLE = [ENABLED | DISABLED]<br />

o Parameter: This parameter enables (ENABLED) or disables (DISABLED) the VoIP service.<br />

• VOIP_GATEKEEPERIP = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

• VOIP_LINE1NUMBER = number<br />

o Parameter: This parameter is a string (maximum string length is 20 characters) (e.g.<br />

“VOIP_LINE1NUMBER = 612345678”).<br />

• VOIP_DIALPLAN = ([0 … 9, ‘T’, ‘X’, ‘.’, ‘|’])<br />

o Parameter: This parameter is a string with maximum length is 200 characters (e.g.<br />

“VOIP_DIALPLAN = (9XXXXXXXX|6XXXXXXXX|00X.T)”.<br />

• VOIP_INBANDDTMF = [ENABLED | DISABLED]<br />

o Parameter: This parameter enables (ENABLED) or disables (DISABLED) in-b<strong>and</strong> DTMF feature.<br />

• VOIP_OUTOFBANDDTMF = [ENABLED | DISABLED]<br />

o Parameter: This parameter enables (ENABLED) or disables (DISABLED) out-of-b<strong>and</strong> DTMF<br />

feature.<br />

• VOIP_KEYPADTYPE = [KEYPADTYPE_NONE | KEYPADTYPE_H225 |<br />

KEYPADTYPE_H245ALPHANUMERIC | KEYPADTYPE_H245SIGNAL |<br />

KEYPADTYPE_RFC2833]<br />

o Parameter: This parameter is a string (up to 30 characters). Valid values are the following:<br />

o KEYPADTYPE_H225: H.225/Q.931 User Info field (Keypad facility information element)<br />

Submission page 386 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o KEYPADTYPE_H245ALPHANUMERIC: H.245 User Input Indication (UII) Alphanumeric<br />

message<br />

o KEYPADTYPE_H245SIGNAL: H.245 User Input Indication (UII) Signal Type message<br />

o KEYPADTYPE_RFC2833: RTP stream as defined in RFC 2833<br />

o KEYPADTYPE_NONE: no out-of-b<strong>and</strong> signalling<br />

• VOIP_CALLSIGPORT1 = [1025 … 65530]<br />

o Parameter: Valid values range from 1025 to 65530.<br />

• VOIP_G711USS = [YES | NO]<br />

o Parameter: Selects whether silence suppression for G.711 μ-law is enabled (YES) or not (NO).<br />

• VOIP_G711UPACK = [2 … 4]<br />

o Parameter: Valid values range from 2 (20 ms) to 4 (40 ms).<br />

• VOIP_G711ASS = [YES | NO]<br />

o Parameter: Selects whether silence suppression for G.711 A-law is enabled (YES) or not (NO).<br />

• VOIP_G711APACK = [2 … 4]<br />

o Parameter: Valid values range from 2 (20 ms) to 4 (40 ms).<br />

• VOIP_JB_TYPE = [FIXED | ADAPTIVE]<br />

o Parameter: Selects either adaptive (ADAPTIVE) or fixed (FIXED) jitter buffer.<br />

• VOIP_FJB_DELAY = [1 … 10] * 10<br />

o Parameter: Valid values range from 10 to 100 ms.<br />

• VOIP_AJB_MAXDELAY = [1 … 19] * 10<br />

o Parameter: Valid values range from 10 to 190 ms.<br />

• VOIP_G729ON = [YES | NO]<br />

o Parameter: Selects whether G.729 codec is enabled (YES) or not (NO).<br />

• VOIP_G729SS = [YES | NO]<br />

o Parameter: Selects whether G.729 silence enabled is supported (YES) or not (NO).<br />

• VOIP_G729PACK = [2 … 4]<br />

o Parameter: Valid values range from 2 (20 ms) to 4 (40 ms).<br />

Submission page 387 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• VOIP_ALTERNATEGK = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) alternate gatekeeper feature for H.323.<br />

• VOIP_ALTGKIP = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

• VOIP_GKDISCOVERY = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) gatekeeper discovery feature for H.323.<br />

• VOIP_FULLRRQ1 = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) full gatekeeper registration request for<br />

H.323.<br />

• VOIP_TIMETOLIVE = [≥ 60]<br />

o Parameter: The minimum valid value is 60 seconds.<br />

• VOIP_FASTCONNECT = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) fast connect signalling feature for<br />

H.323.<br />

• VOIP_H245TUNNEL = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) H.245 tunnelling signalling feature for<br />

H.323.<br />

• VOIP_COUNTRY = [XX | ES | PT | GB | JP | FR | SG | RU | AU]<br />

o Parameter: This parameter is a string (up to 20 characters). Valid values are: The USA (XX), Spain<br />

(ES), Portugal (PT), The United Kingdom (GB), Japan (JP), France (FR), Singapore (SG), Russia<br />

(RU) <strong>and</strong> Australia (AU). The default country is Spain (ES).<br />

• VOIP_TONE_DIALTONE = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />

o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_DIALTONE =<br />

425@-10#ON”).<br />

• VOIP_TONE_NETWORKBUSY = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />

o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_BUSY = 425@-<br />

10#ON(200),OFF(200),R”).<br />

• VOIP_TONE_BUSY = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />

o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_BUSY = 425@-<br />

10#ON(200),OFF(200),R”).<br />

Submission page 388 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• VOIP_TONE_RINGBACK = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />

o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_RINGBACK =<br />

425@-10#ON(1500),OFF(3000),R”).<br />

• VOIP_RTP_TOS = 0xXX<br />

o Parameter: value must be specified with 2 hexadecimal digits.<br />

• VOIP_CALLSIG_TOS 0xXX<br />

o Parameter: value must be specified with 2 hexadecimal digits.<br />

12.3.3.13 NTP Parameters<br />

• NTP_ENABLE = [ENABLED | DISABLED]<br />

o Parameter: Enables (ENABLED) or disables (DISABLED) the NTP feature.<br />

• NTP_SERVER_IP = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

• NTP_TIMEZONE = [-12 … 12] * 60<br />

o Parameter: This value must be specified in minutes (in 60-minute steps) relative to Universal<br />

Time (UT). A value of 0 corresponds to UT.<br />

• NTP_DST = [YES | NO]<br />

o Parameter: If the value is YES, the time correction for daylight savings time is applied. Not<br />

applied if NO.<br />

12.3.3.14 Custom VLAN/OVLAN Parameters<br />

• USE_CUSTOM_VLAN_OVLAN = [yes/no]<br />

o Parameter: ‘yes’ (to enable the custom VLAN/OVLAN use) or ‘no’ (to disable the custom<br />

VLAN/OVLAN use)<br />

• VLAN_TAGGED_ONLY_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to enable tag only in interface root) or ‘no’ (to disable tag only in interface root)<br />

• VLAN_TAGGED_ONLY_IFACE_EXTA = [yes/no]<br />

o Parameter: ‘yes’ (to enable tag only in Ethernet A) or ‘no’ (to disable tag only in Ethernet A)<br />

• VLAN_TAGGED_ONLY_IFACE_EXTB = [yes/no]<br />

o Parameter: ‘yes’ (to enable tag only in Ethernet B) or ‘no’ (to disable tag only in Ethernet B)<br />

Submission page 389 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

• VLAN_TAGGED_ONLY_IFACE_PL_X = [yes/no]<br />

Being X from 0 to 128<br />

o Parameter: ‘yes’ (to enable tag only in BPL ports) or ‘no’ (to disable tag only in BPL ports)<br />

• VLAN_OUTFORMAT_TAG_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to tag output in root interface) or ‘no’ (to disable tag output in root interface)<br />

• VLAN_OUTFORMAT_TAG_IFACE_EXTA = [yes/no]<br />

o Parameter: ‘yes’ (to tag output in Ethernet A) or ‘no’ (to disable tag output in Ethernet A)<br />

• VLAN_OUTFORMAT_TAG_IFACE_EXTB = [yes/no]<br />

o Parameter: ‘yes’ (to tag output in Ethernet B) or ‘no’ (to disable tag output in Ethernet B)<br />

• VLAN_OUTFORMAT_TAG_IFACE_PL_X = [yes/no]<br />

Being X from 0 to 128<br />

o Parameter: ‘yes’ (to tag output in BPL ports) or ‘no’ (to disable tag output in BPL ports)<br />

• VLAN_PVID_PL = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• VLAN_PVID_EXTA = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• VLAN_PVID_EXTB = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• VLAN_PVID_FW = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• VLAN_DEFAULT_PRIO_PL_X = [0-7]<br />

Being X from 0 to 128<br />

o Parameter: Number from 0 to 7<br />

• VLAN_DEFAULT_PRIO_EXTA = [0-7]<br />

o Parameter: Number from 0 to 7<br />

• VLAN_DEFAULT_PRIO_EXTB = [0-7]<br />

Submission page 390 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: Number from 0 to 7<br />

• VLAN_DEFAULT_PRIO_FW = [0-7]<br />

o Parameter: Number from 0 to 7<br />

• VLAN_IS_ALLOWED_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />

• VLAN_LIST_IFACE_ROOT.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• VLAN_IS_ALLOWED_IFACE_EXTA = [yes/no]<br />

o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />

• VLAN_LIST_IFACE_EXTA.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• VLAN_IS_ALLOWED_IFACE_EXTB = [yes/no]<br />

o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />

• VLAN_LIST_IFACE_EXTB.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• VLAN_IS_ALLOWED_IFACE_PL_X = [yes/no]<br />

Being X from 0 to 128<br />

o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />

• VLAN_LIST_IFACE_PL_Xi = [2-4095]<br />

Being X from 0 to 128<br />

o Parameter: Number from 2 to 4095<br />

• OVLAN_TAGGED_ONLY_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to accept only tagged packets at root interface) or ‘no’ (to accept any packet at<br />

root interface)<br />

• OVLAN_TAGGED_ONLY_IFACE_PL_X= [yes/no]<br />

Being X from 0 to 128<br />

Submission page 391 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: ‘yes’ (to accept only tagged packets at BPL ports) or ‘no’ (to accept any packet at BPL<br />

ports)<br />

• OVLAN_OUTFORMAT_TAG_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to introduce a tag in output packets at root interface) or ‘no’ (to not introduce a<br />

tag in output packets at root interface)<br />

• OVLAN_OUTFORMAT_TAG_IFACE_PL_X = [yes/no]<br />

Being X from 0 to 128<br />

o Parameter: ‘yes’ (to introduce a tag in output packets at BPL ports) or ‘no’ (to not introduce a tag<br />

in output packets at BPL ports)<br />

• OVLAN_POVID_PL_X = [2-4095]<br />

Being X from 0 to 128<br />

o Parameter: Number from 2 to 4095<br />

• OVLAN_POVID_EXTA = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• OVLAN_POVID_EXTB = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• OVLAN_POVID_FW = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• OVLAN_IS_ALLOWED_IFACE_ROOT = [yes/no]<br />

o Parameter: ‘yes’ (to set the root interface list as allowed) or ‘no’ (to set the root interface list as<br />

forbidden)<br />

• OVLAN_LIST_IFACE_ROOT.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• OVLAN_IS_ALLOWED_IFACE_EXTA = [yes/no]<br />

o Parameter: ‘yes’ (to set the Ethernet A interface list as allowed) or ‘no’ (to set the Ethernet A<br />

interface list as forbidden)<br />

• OVLAN_LIST_IFACE_EXTA.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• OVLAN_IS_ALLOWED_IFACE_EXTB = [yes/no]<br />

Submission page 392 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

o Parameter: ‘yes’ (to set the Ethernet B interface list as allowed) or ‘no’ (to set the Ethernet B<br />

interface list as forbidden)<br />

• OVLAN_LIST_IFACE_EXTB.i = [2-4095]<br />

o Parameter: Number from 2 to 4095<br />

• OVLAN_IS_ALLOWED_IFACE_PL_X = [yes/no]<br />

Being X from 0 to 128<br />

o Parameter: ‘yes’ (to set the Ethernet B interface list as allowed) or ‘no’ (to set the Ethernet B<br />

interface list as forbidden)<br />

• OVLAN_LIST_IFACE_PL_X.i = [2-4095]<br />

Being X from 0 to 128<br />

o Parameter: Number from 2 to 4095<br />

12.3.3.15 SNMP parameters<br />

• SNMP_TRAP_IP_ADDRESS = <br />

o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />

dots).<br />

• SNMP_TRAP_COMMUNITY_NAME = community<br />

o Parameter: This parameter is a string (up to 25 characters) (e.g.<br />

“SNMP_TRAP_COMMUNITY_NAME = public”).<br />

Submission page 393 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

ANNEX A MIB DEFINITION IN ASN.1 FORMAT (NORMATIVE)<br />

BPL-DEVICE-MIB DEFINITIONS ::= BEGIN<br />

IMPORTS<br />

NetworkAddress, IpAddress, Counter, Gauge, TimeTicks,<br />

enterprises<br />

STATUS,<br />

PhysAddress,<br />

OBJECT-TYPE,<br />

FROM RFC1155-SMI<br />

FROM RFC-1212<br />

FROM SNMPv2-SMI<br />

FROM RFC1213-MIB;<br />

iso OBJECT IDENTIFIER ::= { 1 }<br />

org OBJECT IDENTIFIER ::= { iso 3 }<br />

dod OBJECT IDENTIFIER ::= { org 6 }<br />

internet OBJECT IDENTIFIER ::= { dod 1 }<br />

private OBJECT IDENTIFIER ::= { internet 4 }<br />

enterprises OBJECT IDENTIFIER ::= { private 1 }<br />

IEEE P1901 OBJECT IDENTIFIER ::= { enterprises 20804 }<br />

v1 OBJECT IDENTIFIER ::= { IEEE P1901 1 }<br />

--<br />

Submission page 394 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

-- Object definition<br />

--<br />

-- Groups in v1 tree<br />

plSystem OBJECT IDENTIFIER ::= {v1 1}<br />

plBasic OBJECT IDENTIFIER ::= {v1 2}<br />

plPhy OBJECT IDENTIFIER ::= {v1 3}<br />

pl<strong>MAC</strong> OBJECT IDENTIFIER ::= {v1 4}<br />

plQoS OBJECT IDENTIFIER ::= {v1 5}<br />

plStatistics OBJECT IDENTIFIER ::= {v1 7}<br />

plTraps OBJECT IDENTIFIER ::= {v1 8}<br />

plStp OBJECT IDENTIFIER ::= {v1 10}<br />

plSecurity OBJECT IDENTIFIER ::= {v1 11}<br />

--<br />

-- Groups definition<br />

--<br />

--<br />

-- The plSystem Group<br />

--<br />

plSystemTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plSystemEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

Submission page 395 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

DESCRIPTION "Generic information about the IEEE P1901 system."<br />

::= { plSystem 1 }<br />

plSystemEntry OBJECT-TYPE<br />

SYNTAX plSystemEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION "System information gathered per card."<br />

INDEX { plSysCard }<br />

::= { plSystemTable 1 }<br />

plSystemEntry ::= SEQUENCE { plSysCard INTEGER,<br />

plSysNodeType INTEGER,<br />

plSysNodeMode INTEGER,<br />

plSysFWVersion IA5String (SIZE(0..128)),<br />

plSysHWVersion IA5String (SIZE(0..128)),<br />

plSysReset INTEGER,<br />

plSysFactoryReset INTEGER,<br />

plSysUseDHCP INTEGER,<br />

plSysStaticIPAddress IpAddress,<br />

plSysStaticNetMask IpAddress,<br />

plSysStaticDefaultGW IpAddress,<br />

plSysSaveAsPermanent INTEGER,<br />

plSysConfUpload IA5String (SIZE (0..256)),<br />

plSysConfDownload IA5String (SIZE (0..256)),<br />

plSysUpdateStatus INTEGER,<br />

plSysUpdate IA5String (SIZE(0..256)),<br />

Submission page 396 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plSysCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plSystemEntry 1 }<br />

plSysNodeType OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

}<br />

plSysDNSIPAddress IpAddress,<br />

plSysSnmpROComunityName DisplayString (SIZE(0..31)),<br />

plSysSnmpRWComunityName DisplayString (SIZE(0..31)),<br />

plSysSnmpTrapDest IpAddress<br />

DESCRIPTION "Node type: master -> 0<br />

::= { plSystemEntry 2 }<br />

plSysNodeMode OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

slave -> 1<br />

repeater -> 2"<br />

DESCRIPTION "Node mode: access -> 0<br />

Submission page 397 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

::= { plSystemEntry 3 }<br />

plSysFWVersion OBJECT-TYPE<br />

in-home -> 1<br />

medium-voltage -> 2"<br />

SYNTAX IA5String (SIZE(0..128))<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Firmware version"<br />

::= { plSystemEntry 5 }<br />

plSysHWVersion OBJECT-TYPE<br />

SYNTAX IA5String (SIZE(0..128))<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Hardware version"<br />

::= { plSystemEntry 6 }<br />

plSysReset OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "System reset"<br />

::= { plSystemEntry 7 }<br />

plSysFactoryReset OBJECT-TYPE<br />

SYNTAX INTEGER<br />

Submission page 398 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Restore factory parameters"<br />

::= { plSystemEntry 8 }<br />

plSysUseDHCP OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Use DHCP (1) or a fixed IP, netmask <strong>and</strong> gateway (0) instead"<br />

::= { plSystemEntry 9 }<br />

plSysStaticIPAddress OBJECT-TYPE<br />

SYNTAX IpAddress<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Default IP address if DHCP is disabled"<br />

::= { plSystemEntry 10 }<br />

plSysStaticNetMask OBJECT-TYPE<br />

SYNTAX IpAddress<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Default netmask if DHCP is disabled"<br />

::= { plSystemEntry 11 }<br />

plSysStaticDefaultGW OBJECT-TYPE<br />

SYNTAX IpAddress<br />

ACCESS read-write<br />

Submission page 399 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

STATUS current<br />

DESCRIPTION "Default gateway if DHCP is disabled"<br />

::= { plSystemEntry 12 }<br />

plSysSaveAsPermanent OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Saves changed objects as permanent"<br />

::= { plSystemEntry 14 }<br />

plSysConfUpload OBJECT-TYPE<br />

SYNTAX IA5String (SIZE(0..256))<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Uploads node local configuration to a server"<br />

::= { plSystemEntry 15 }<br />

plSysConfDownload OBJECT-TYPE<br />

SYNTAX IA5String (SIZE(0..256))<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Forces a configuration file download"<br />

::= { plSystemEntry 16 }<br />

plSysUpgradeStatus OBJECT-TYPE<br />

Submission page 400 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Status of the current upgrade: finished KO -> 0<br />

::= { plSystemEntry 19 }<br />

plSysUpdate OBJECT-TYPE<br />

SYNTAX IA5String (SIZE(0..256))<br />

ACCESS read-write<br />

STATUS current<br />

finished OK -> 1<br />

busy (in progress) -> 2"<br />

DESCRIPTION "Updates the selected flash section of a modem"<br />

::= { plSystemEntry 30 }<br />

plSysDNSIPAddress OBJECT-TYPE<br />

SYNTAX IpAddress<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "IP address of the DNS"<br />

::= { plSystemEntry 31 }<br />

plSysSnmpROComunityName OBJECT-TYPE<br />

SYNTAX DisplayString (SIZE(0..31))<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Community Name string”<br />

Submission page 401 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

--<br />

::= { plSystemEntry 32 }<br />

plSysSnmpRWComunityName OBJECT-TYPE<br />

SYNTAX DisplayString (SIZE(0..31))<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Community Name string”<br />

::= { plSystemEntry 33 }<br />

plSysSnmpTrapDest OBJECT-TYPE<br />

SYNTAX IpAddress<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Trap destination IP address”<br />

::= { plSystemEntry 34 }<br />

-- The plBasic Group<br />

--<br />

plBasicTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plBasicEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

::= { plBasic 1 }<br />

Submission page 402 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plBasicEntry OBJECT-TYPE<br />

SYNTAX plBasicEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { plBasicCard }<br />

::= { plBasicTable 1 }<br />

plBasicEntry ::= SEQUENCE { plBasicCard INTEGER,<br />

plBasicCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

}<br />

plBasicMode INTEGER,<br />

plBasicCentralFrequency INTEGER,<br />

plBasicB<strong>and</strong>width INTEGER,<br />

plBasicSearchModes IA5String,<br />

plBasicTXAGCEnable INTEGER,<br />

plBasicRXAGCEnable INTEGER,<br />

plBasicTXAGCGain INTEGER,<br />

plBasicRXAGCGain INTEGER,<br />

plBasicTXPowerMaskLB OCTET STRING (SIZE(769)),<br />

plBasicTXPowerMaskHB OCTET STRING (SIZE(769)),<br />

plBasicMaster<strong>MAC</strong> PhysAddress<br />

Submission page 403 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

DESCRIPTION "Node card number"<br />

::= { plBasicEntry 1 }<br />

plBasicMode OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "<strong>Physical</strong> mode (1..M)"<br />

::= { plBasicEntry 2 }<br />

plBasicCentralFrequency OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "B<strong>and</strong> Central Frequency in MHz"<br />

::= { plBasicEntry 3 }<br />

plBasicB<strong>and</strong>width OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Working Node B<strong>and</strong>width in MHz"<br />

::= { plBasicEntry 4 }<br />

plBasicSearchModes OBJECT-TYPE<br />

SYNTAX IA5String<br />

ACCESS read-write<br />

Submission page 404 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

STATUS current<br />

DESCRIPTION "List of modes used for searching"<br />

::= { plBasicEntry 5 }<br />

plBasicTXAGCEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "TX AGC: Enabled -> 1<br />

::= { plBasicEntry 6 }<br />

plBasicRXAGCEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

Disabled -> 0"<br />

DESCRIPTION "RX AGC: Enabled -> 1<br />

::= { plBasicEntry 7 }<br />

plBasicTXAGCGain OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "TX AGC Gain"<br />

::= { plBasicEntry 8 }<br />

Disabled -> 0"<br />

Submission page 405 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plBasicRXAGCGain OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "RX AGC Gain"<br />

::= { plBasicEntry 9 }<br />

plBasicTXPowerMaskLB OBJECT-TYPE<br />

SYNTAX OCTET STRING ( SIZE ( 769 ) )<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Low half Powermask"<br />

::= { plBasicEntry 10 }<br />

plBasicTXPowerMaskHB OBJECT-TYPE<br />

SYNTAX OCTET STRING ( SIZE ( 769 ) )<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "High half Powermask"<br />

::= { plBasicEntry 11 }<br />

plBasicMaster<strong>MAC</strong> OBJECT-TYPE<br />

SYNTAX PhysAddress<br />

ACCESS read-only<br />

Submission page 406 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

--<br />

STATUS current<br />

DESCRIPTION "<strong>MAC</strong> address of the master of current node"<br />

::= { plBasicEntry 12 }<br />

-- The plPhy Group<br />

--<br />

-- plPhyBy<strong>MAC</strong> Table<br />

plPhyBy<strong>MAC</strong>Table OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plPhyBy<strong>MAC</strong>Entry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION "<strong>Physical</strong> parameters"<br />

::= { plPhy 1 }<br />

plPhyBy<strong>MAC</strong>Entry OBJECT-TYPE<br />

SYNTAX plPhyBy<strong>MAC</strong>Entry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { plPhyBy<strong>MAC</strong>Card, plPhyBy<strong>MAC</strong><strong>MAC</strong> }<br />

::= { plPhyBy<strong>MAC</strong>Table 1 }<br />

plPhyBy<strong>MAC</strong>Entry ::= SEQUENCE { plPhyBy<strong>MAC</strong>Card INTEGER,<br />

plPhyBy<strong>MAC</strong><strong>MAC</strong> PhysAddress,<br />

plPhyBy<strong>MAC</strong>TXBPC OCTET STRING (SIZE(769)),<br />

plPhyBy<strong>MAC</strong>TXBPCAggregated INTEGER,<br />

Submission page 407 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plPhyBy<strong>MAC</strong>Card OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plPhyBy<strong>MAC</strong>Entry 1 }<br />

plPhyBy<strong>MAC</strong><strong>MAC</strong> OBJECT-TYPE<br />

SYNTAX PhysAddress<br />

ACCESS read-only<br />

STATUS current<br />

}<br />

plPhyBy<strong>MAC</strong>RXBPC OCTET STRING (SIZE(769)),<br />

plPhyBy<strong>MAC</strong>RXBPCAggregated INTEGER,<br />

plPhyBy<strong>MAC</strong>RXSNR OCTET STRING (SIZE(769)),<br />

plPhyBy<strong>MAC</strong>RXCFR OCTET STRING (SIZE(769)),<br />

plPhyBy<strong>MAC</strong>TXPhySpeed INTEGER,<br />

plPhyBy<strong>MAC</strong>RXPhySpeed INTEGER,<br />

plPhyBy<strong>MAC</strong>ACK INTEGER,<br />

plPhyBy<strong>MAC</strong>Cipher INTEGER,<br />

plPhyBy<strong>MAC</strong>TXHURTO INTEGER,<br />

plPhyBy<strong>MAC</strong>RXHURTO INTEGER,<br />

plPhyBy<strong>MAC</strong>IsActive INTEGER,<br />

plPhyBy<strong>MAC</strong>RXTimeLastActivity INTEGER<br />

Submission page 408 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

DESCRIPTION "<strong>MAC</strong> Address"<br />

::= { plPhyBy<strong>MAC</strong>Entry 2 }<br />

plPhyBy<strong>MAC</strong>TXBPC OBJECT-TYPE<br />

SYNTAX OCTET STRING ( SIZE ( 769 ) )<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "BPC in transmission for the low half b<strong>and</strong>"<br />

::= { plPhyBy<strong>MAC</strong>Entry 3 }<br />

plPhyBy<strong>MAC</strong>TXBPCAggregated OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "BPC Aggregated in transmission"<br />

::= { plPhyBy<strong>MAC</strong>Entry 5 }<br />

plPhyBy<strong>MAC</strong>RXBPC OBJECT-TYPE<br />

SYNTAX OCTET STRING ( SIZE ( 769 ) )<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "BPC in reception for the low half b<strong>and</strong>"<br />

::= { plPhyBy<strong>MAC</strong>Entry 6 }<br />

plPhyBy<strong>MAC</strong>RXBPCAggregated OBJECT-TYPE<br />

Submission page 409 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "BPC Aggregated in reception"<br />

::= { plPhyBy<strong>MAC</strong>Entry 8 }<br />

plPhyBy<strong>MAC</strong>RXSNR OBJECT-TYPE<br />

SYNTAX OCTET STRING ( SIZE ( 769 ) )<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Measured SNR"<br />

::= { plPhyBy<strong>MAC</strong>Entry 9 }<br />

plPhyBy<strong>MAC</strong>RXCFR OBJECT-TYPE<br />

SYNTAX OCTET STRING ( SIZE ( 769 ) )<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Measured CFR"<br />

::= { plPhyBy<strong>MAC</strong>Entry 10 }<br />

plPhyBy<strong>MAC</strong>TXPhySpeed OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "<strong>Physical</strong> speed in transmission"<br />

::= { plPhyBy<strong>MAC</strong>Entry 11 }<br />

Submission page 410 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plPhyBy<strong>MAC</strong>RXPhySpeed OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "<strong>Physical</strong> speed in reception"<br />

::= { plPhyBy<strong>MAC</strong>Entry 12 }<br />

plPhyBy<strong>MAC</strong>ACK OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "ACK enabled"<br />

::= { plPhyBy<strong>MAC</strong>Entry 13 }<br />

plPhyBy<strong>MAC</strong>Cipher OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Cipher enabled"<br />

::= { plPhyBy<strong>MAC</strong>Entry 14 }<br />

plPhyBy<strong>MAC</strong>TXHURTO OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "HURTO mode in transmission"<br />

::= { plPhyBy<strong>MAC</strong>Entry 15 }<br />

Submission page 411 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plPhyBy<strong>MAC</strong>RXHURTO OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "HURTO mode in reception"<br />

::= { plPhyBy<strong>MAC</strong>Entry 16 }<br />

plPhyBy<strong>MAC</strong>IsActive OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Checks if the node is active or not"<br />

::= { plPhyBy<strong>MAC</strong>Entry 17 }<br />

plPhyBy<strong>MAC</strong>RXTimeLastActivity OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Time since last BPL activity"<br />

::= { plPhyBy<strong>MAC</strong>Entry 18 }<br />

-- plPhyRXSNRThreshold Table<br />

plPhyRXSNRThresholdTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plPhyRXSNRThresholdEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

Submission page 412 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

::= { plWiscPhy 2 }<br />

plPhyRXSNRThresholdEntry OBJECT-TYPE<br />

SYNTAX plPhyRXSNRThresholdEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { plPhyRXSNRThresholdCard, plPhyRXSNRThresholdIndex }<br />

::= { plPhyRXSNRThresholdTable 1 }<br />

plPhyRXSNRThresholdEntry ::= SEQUENCE { plPhyRXSNRThresholdCard INTEGER,<br />

plPhyRXSNRThresholdCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plPhyRXSNRThresholdEntry 1 }<br />

plPhyRXSNRThresholdIndex OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS not-accessible<br />

STATUS current<br />

plPhyRXSNRThresholdIndex INTEGER,<br />

plPhyRXSNRThreshold INTEGER<br />

DESCRIPTION "SNR threshold value index (1..10)"<br />

}<br />

Submission page 413 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

--<br />

::= { plPhyRXSNRThresholdEntry 2 }<br />

plPhyRXSNRThreshold OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "SNR threshold value"<br />

::= { plPhyRXSNRThresholdEntry 3 }<br />

-- The pl<strong>MAC</strong> Group<br />

--<br />

-- pl<strong>MAC</strong> Table<br />

pl<strong>MAC</strong>Table OBJECT-TYPE<br />

SYNTAX SEQUENCE OF pl<strong>MAC</strong>Entry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

::= { pl<strong>MAC</strong> 1 }<br />

pl<strong>MAC</strong>Entry OBJECT-TYPE<br />

SYNTAX pl<strong>MAC</strong>Entry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { pl<strong>MAC</strong>Card }<br />

Submission page 414 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

::= { pl<strong>MAC</strong>Table 1 }<br />

pl<strong>MAC</strong>Entry ::= SEQUENCE { pl<strong>MAC</strong>Card INTEGER,<br />

pl<strong>MAC</strong>Card OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { pl<strong>MAC</strong>Entry 1 }<br />

pl<strong>MAC</strong><strong>Access</strong>Protocol OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

}<br />

pl<strong>MAC</strong><strong>Access</strong>Protocol INTEGER,<br />

pl<strong>MAC</strong>NumConnectedNodes INTEGER,<br />

pl<strong>MAC</strong>NumSlaves INTEGER<br />

DESCRIPTION "Autodiscovery mode enabled"<br />

::= { pl<strong>MAC</strong>Entry 2 }<br />

pl<strong>MAC</strong>NumConnectedNodes OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Number of nodes with link solved (PSP)"<br />

Submission page 415 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

::= { pl<strong>MAC</strong>Entry 3 }<br />

pl<strong>MAC</strong>NumSlaves OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Number of slaves configured in the master or repeater"<br />

::= { pl<strong>MAC</strong>Entry 4 }<br />

-- pl<strong>MAC</strong>ConnectedNodes Table<br />

pl<strong>MAC</strong>ConnectedNodesTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF pl<strong>MAC</strong>ConnectedNodesEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

::= { plWisc<strong>MAC</strong> 2 }<br />

pl<strong>MAC</strong>ConnectedNodesEntry OBJECT-TYPE<br />

SYNTAX pl<strong>MAC</strong>ConnectedNodesEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { pl<strong>MAC</strong>ConnectedNodesCard, pl<strong>MAC</strong>ConnectedNodesIndex }<br />

::= { pl<strong>MAC</strong>ConnectedNodesTable 1 }<br />

pl<strong>MAC</strong>ConnectedNodesEntry ::= SEQUENCE { pl<strong>MAC</strong>ConnectedNodesCard INTEGER,<br />

pl<strong>MAC</strong>ConnectedNodesIndex INTEGER,<br />

pl<strong>MAC</strong>ConnectedNodes<strong>MAC</strong> PhysAddress<br />

Submission page 416 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

pl<strong>MAC</strong>ConnectedNodesCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { pl<strong>MAC</strong>ConnectedNodesEntry 1 }<br />

pl<strong>MAC</strong>ConnectedNodesIndex OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node index"<br />

::= {pl<strong>MAC</strong>ConnectedNodesEntry 2}<br />

pl<strong>MAC</strong>ConnectedNodes<strong>MAC</strong> OBJECT-TYPE<br />

SYNTAX PhysAddress<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "<strong>MAC</strong> for the node index"<br />

::= {pl<strong>MAC</strong>ConnectedNodesEntry 3}<br />

-- pl<strong>MAC</strong>Slaves Table<br />

pl<strong>MAC</strong>SlavesTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF pl<strong>MAC</strong>SlavesEntry<br />

}<br />

Submission page 417 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

::= { plWisc<strong>MAC</strong> 3 }<br />

pl<strong>MAC</strong>SlavesEntry OBJECT-TYPE<br />

SYNTAX pl<strong>MAC</strong>SlavesEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { pl<strong>MAC</strong>SlavesCard, pl<strong>MAC</strong>SlavesIndex }<br />

::= { pl<strong>MAC</strong>SlavesTable 1 }<br />

pl<strong>MAC</strong>SlavesEntry ::= SEQUENCE { pl<strong>MAC</strong>SlavesCard INTEGER,<br />

pl<strong>MAC</strong>SlavesCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { pl<strong>MAC</strong>SlavesEntry 1 }<br />

pl<strong>MAC</strong>SlavesIndex OBJECT-TYPE<br />

SYNTAX INTEGER<br />

}<br />

pl<strong>MAC</strong>SlavesIndex INTEGER,<br />

pl<strong>MAC</strong>Slaves<strong>MAC</strong> PhysAddress<br />

Submission page 418 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

--<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Slaves index"<br />

::= { pl<strong>MAC</strong>SlavesEntry 2 }<br />

pl<strong>MAC</strong>Slaves<strong>MAC</strong> OBJECT-TYPE<br />

SYNTAX PhysAddress<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "<strong>MAC</strong> for the slave index"<br />

::= { pl<strong>MAC</strong>SlavesEntry 3 }<br />

-- The plQoS Group<br />

--<br />

plQoSMasterGeneralMinOneWayLat OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Latency in milliseconds"<br />

::= { plQoS 1 }<br />

plQoSMasterGeneralBwMngrPolicy OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

Submission page 419 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

DESCRIPTION "B<strong>and</strong>width ..."<br />

::= { plQoS 2 }<br />

-- plQoSPriorityManagement Table<br />

plQoSPriorityManagementTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plQoSPriorityManagementEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

::= { plQoS 3 }<br />

plQoSPriorityManagementEntry OBJECT-TYPE<br />

SYNTAX plQoSPriorityManagementEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION "QoS Priorities Management per card."<br />

INDEX { plQoSPriorityManagementCard, plQoSPriorityManagementPrio }<br />

::= { plQoSPriorityManagementTable 1 }<br />

plQoSPriorityManagementEntry ::= SEQUENCE {<br />

plQoSPriorityManagementCard INTEGER,<br />

plQoSPriorityManagementPrio INTEGER,<br />

plQoSPriorityManagementLatency INTEGER,<br />

plQoSPriorityManagementJitter INTEGER,<br />

plQoSPriorityManagementB<strong>and</strong>width INTEGER<br />

Submission page 420 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plQoSPriorityManagementCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plQoSPriorityManagementEntry 1 }<br />

plQoSPriorityManagementPrio OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Priority value (1..8)"<br />

::= { plQoSPriorityManagementEntry 2 }<br />

plQoSPriorityManagementLatency OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Latency value for the priority (0,1,2,4,8)"<br />

::= { plQoSPriorityManagementEntry 3 }<br />

plQoSPriorityManagementJitter OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Jitter value for the priority"<br />

::= { plQoSPriorityManagementEntry 4 }<br />

}<br />

Submission page 421 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plQoSPriorityManagementB<strong>and</strong>width OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "B<strong>and</strong>width for the priority"<br />

::= { plQoSPriorityManagementEntry 5 }<br />

-- plQoSPerUser Table<br />

plQoSPerUserTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plQoSPerUserEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

::= { plWiscQoS 4 }<br />

plQoSPerUserEntry OBJECT-TYPE<br />

SYNTAX plQoSPerUserEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION "User QoS management values per card."<br />

INDEX { plQoSPerUserCard, plQoSPerUser<strong>MAC</strong> }<br />

::= { plQoSPerUserTable 1 }<br />

plQoSPerUserEntry ::= SEQUENCE { plQoSPerUserCard INTEGER,<br />

plQoSPerUser<strong>MAC</strong> PhysAddress,<br />

plQoSPerUserTXMaxXput INTEGER,<br />

Submission page 422 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plQoSPerUserCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plQoSPerUserEntry 1 }<br />

plQoSPerUser<strong>MAC</strong> OBJECT-TYPE<br />

SYNTAX PhysAddress<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "User <strong>MAC</strong> address"<br />

::= { plQoSPerUserEntry 2 }<br />

plQoSPerUserTXMaxXput OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

}<br />

plQoSPerUserRXMaxXput INTEGER,<br />

plQoSPerUserPriorityAllowedUp INTEGER,<br />

plQoSPerUserPriorityAllowedDown INTEGER<br />

-- plQoSPerUserPriorityActive INTEGER<br />

DESCRIPTION "Maximum allowed throughput in transmission for a user"<br />

::= { plQoSPerUserEntry 3 }<br />

plQoSPerUserRXMaxXput OBJECT-TYPE<br />

SYNTAX INTEGER<br />

Submission page 423 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Maximum allowed throughput in reception for a user"<br />

::= { plQoSPerUserEntry 4 }<br />

plQoSPerUserPriorityAllowedUp OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Allowed priorities for transmission <strong>and</strong> reception in upstream for a user"<br />

::= { plQoSPerUserEntry 5 }<br />

plQoSPerUserPriorityAllowedDown OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Allowed priorities for transmission <strong>and</strong> reception in downstream for a<br />

user"<br />

::= { plQoSPerUserEntry 6 }<br />

-- plQoSPerUserPriorityActive OBJECT-TYPE<br />

-- SYNTAX INTEGER<br />

-- ACCESS read-only<br />

-- STATUS current<br />

-- DESCRIPTION "Active priorities for transmission <strong>and</strong> reception for a user"<br />

-- ::= { plQoSPerUserEntry 7 }<br />

--<br />

Submission page 424 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

-- The plStatistics Group<br />

--<br />

-- plStatistics Table<br />

plStatisticsTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plStatisticsEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION "Packets <strong>and</strong> Bytes Statistics by Interface"<br />

::= { plStatistics 1 }<br />

plStatisticsEntry OBJECT-TYPE<br />

SYNTAX plStatisticsEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { plStatisticsCard }<br />

::= { plStatisticsTable 1 }<br />

plStatisticsEntry ::= SEQUENCE {<br />

plStatisticsCard INTEGER,<br />

plStatisticsBPLInputWords INTEGER,<br />

plStatisticsBPLInputPackets INTEGER,<br />

plStatisticsBPLInputIncorrigible INTEGER,<br />

plStatisticsBPLInputFECBlocksTotal INTEGER,<br />

plStatisticsBPLInputFECBlocksCorrected INTEGER,<br />

Submission page 425 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plStatisticsCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plStatisticsEntry 1 }<br />

plStatisticsBPLInputWords OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Words received by BPL"<br />

::= { plStatisticsEntry 19 }<br />

plStatisticsBPLInputPackets OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Packets received by BPL"<br />

::= { plStatisticsEntry 20 }<br />

}<br />

plStatisticsBPLInputPktsReceived INTEGER,<br />

plStatisticsBPLInputPktsRcvComplete INTEGER,<br />

plStatisticsBPLInputPktsRcvIncomplete INTEGER,<br />

plStatisticsBPLOutputWords INTEGER,<br />

plStatisticsBPLOutputPkts INTEGER<br />

Submission page 426 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plStatisticsBPLInputIncorrigible OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Incorrigible packets received by BPL"<br />

::= { plStatisticsEntry 21 }<br />

plStatisticsBPLInputFECBlocksTotal OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Received FEC blocks by BPL"<br />

::= { plStatisticsEntry 22 }<br />

plStatisticsBPLInputFECBlocksCorrected OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "FEC blocks corrected by BPL"<br />

::= { plStatisticsEntry 23 }<br />

plStatisticsBPLInputPktsReceived OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

Submission page 427 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

DESCRIPTION "Received packets by BPL"<br />

::= { plStatisticsEntry 24 }<br />

plStatisticsBPLInputPktsRcvComplete OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Complete received packets by BPL"<br />

::= { plStatisticsEntry 25 }<br />

plStatisticsBPLInputPktsRcvIncomplete OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Incomplete received packets by BPL"<br />

::= { plStatisticsEntry 26 }<br />

plStatisticsBPLOutputWords OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Transmitted words by BPL"<br />

::= { plStatisticsEntry 27 }<br />

plStatisticsBPLOutputPkts OBJECT-TYPE<br />

SYNTAX INTEGER<br />

Submission page 428 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Transmitted packets by BPL"<br />

::= { plStatisticsEntry 28 }<br />

-- End of plStatistics Table<br />

--<br />

-- The plTraps Group<br />

--<br />

-- plTrapsPhy Table<br />

plTrapsPhyTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plTrapsPhyEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

::= { plTraps 1 }<br />

plTrapsPhyEntry OBJECT-TYPE<br />

SYNTAX plTrapsPhyEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { plTrapsPhyCard }<br />

::= { plPhyTable 1 }<br />

Submission page 429 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plTrapsPhyEntry ::= SEQUENCE { plTrapsPhyCard INTEGER,<br />

plTrapsPhyCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "node card number"<br />

::= { plTrapsPhyEntry 1 }<br />

plTrapsPhyTrapToHURTOEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

}<br />

plTrapsPhyTrapToHURTOEnable INTEGER,<br />

plTrapsPhyTrapFromHURTOEnable INTEGER<br />

DESCRIPTION "Enable/disable trap generation when entering HURTO mode"<br />

::= { plTrapsPhyEntry 2 }<br />

plTrapsPhyTrapFromHURTOEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Enable/disable trap generation when exiting HURTO mode"<br />

Submission page 430 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

::= { plTrapsPhyEntry 3 }<br />

-- plTraps<strong>MAC</strong> Table<br />

plTraps<strong>MAC</strong>Table OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plTraps<strong>MAC</strong>Entry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

::= { plWiscTraps 2 }<br />

plTraps<strong>MAC</strong>Entry OBJECT-TYPE<br />

SYNTAX plTraps<strong>MAC</strong>Entry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { plTraps<strong>MAC</strong>Card }<br />

::= { plTraps<strong>MAC</strong>Table 1 }<br />

plTraps<strong>MAC</strong>Entry ::= SEQUENCE { plTraps<strong>MAC</strong>Card INTEGER,<br />

plTraps<strong>MAC</strong>Card OBJECT-TYPE<br />

SYNTAX INTEGER<br />

}<br />

plTraps<strong>MAC</strong>PeerDetectedEnable INTEGER,<br />

plTraps<strong>MAC</strong>PeerDisappearedEnable INTEGER<br />

Submission page 431 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

---<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plTraps<strong>MAC</strong>Entry 1 }<br />

plTraps<strong>MAC</strong>PeerDetectedEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Enable/disable trap generation when detecting a peer"<br />

::= { plTraps<strong>MAC</strong>Entry 2 }<br />

plTraps<strong>MAC</strong>PeerDisappearedEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Enable/disable trap generation when dissapearing a peer"<br />

::= { plTraps<strong>MAC</strong>Entry 3 }<br />

-- plTrapsBridge Table<br />

---<br />

plTrapsBridgeTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plTrapsBridgeEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

Submission page 432 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

DESCRIPTION ""<br />

::= { plWiscTraps 3 }<br />

plTrapsBridgeEntry OBJECT-TYPE<br />

SYNTAX plTrapsBridgeEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

INDEX { plTrapsBridgeCard }<br />

::= { plTrapsBridgeTable 1 }<br />

plTrapsBridgeEntry ::= SEQUENCE { plTrapsBridgeCard INTEGER,<br />

plTrapsBridgeCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plTrapsBridgeEntry 1 }<br />

plTrapsBridgeNewRootEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

}<br />

plTrapsBridgeNewRootEnable INTEGER,<br />

plTrapsBridgeTopologyChangeEnable INTEGER<br />

Submission page 433 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

---<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Enable/disable trap generation when a new root is assigned"<br />

::= { plTrapsBridgeEntry 2 }<br />

plTrapsBridgeTopologyChangeEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Enable/disable trap generation when topology changes"<br />

::= { plTrapsBridgeEntry 3 }<br />

-- plTrapsConfFail Table<br />

---<br />

plTrapsConfFailTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plTrapsConfFailEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

::= { plWiscTraps 4 }<br />

plTrapsConfFailEntry OBJECT-TYPE<br />

SYNTAX plTrapsConfFailEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION ""<br />

Submission page 434 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

INDEX { plTrapsConfFailCard }<br />

::= { plTrapsConfFailTable 1 }<br />

plTrapsConfFailEntry ::=SEQUENCE{<br />

plTrapsConfFailCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plTrapsConfFailEntry 1 }<br />

plTrapsConfDownloadFailEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

plTrapsConfFailCard INTEGER,<br />

plTrapsConfDownloadFailEnable INTEGER,<br />

plTrapsConfUploadFailEnable INTEGER,<br />

DESCRIPTION "Enable/disable trap generation when a configuration file download fails"<br />

::= { plTrapsConfFileEntry 2 }<br />

plTrapsConfUploadFailEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

Submission page 435 UPA-OPERA<br />

}


4-June-07 P1901_PRO_016_r0<br />

--<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Enable/disable trap generation when a configuration file upload fails"<br />

::= { plTrapsConfFileEntry 3 }<br />

-- The plStp Group<br />

--<br />

plStpTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF plStpEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION "Information about Spanning Tree."<br />

::= { plWiscStp 1 }<br />

plStpEntry OBJECT-TYPE<br />

SYNTAX plStpEntry<br />

ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION "System information gathered per card."<br />

INDEX { plStpCard }<br />

::= { plStpTable 1 }<br />

plStpEntry ::= SEQUENCE { plStpCard INTEGER,<br />

plStpEnable INTEGER,<br />

plStpProtocolVersion IA5String (SIZE(0..8)),<br />

Submission page 436 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

plStpCard OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-only<br />

STATUS current<br />

DESCRIPTION "Node card number"<br />

::= { plStpEntry 1 }<br />

plStpEnable OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

}<br />

plStpPtpExtA INTEGER,<br />

plStpPtpExtB INTEGER,<br />

plStpFrontier IA5String (SIZE(0..8))<br />

DESCRIPTION "0: STP Enabled, 1: STP Disabled"<br />

::= { plStpEntry 2 }<br />

plStpProtocolVersion OBJECT-TYPE<br />

SYNTAX IA5String (SIZE(0..8))<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "STP Protocol Version [STP|RSTP]"<br />

::= { plStpEntry 3 }<br />

plStpPtpExtA OBJECT-TYPE<br />

Submission page 437 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

--<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Set point-to-point flag for EXTA [0|1]"<br />

::= { plStpEntry 4 }<br />

plStpPtpExtB OBJECT-TYPE<br />

SYNTAX INTEGER<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "Set point-to-point flag for EXTB [0|1]"<br />

::= { plStpEntry 5 }<br />

plStpFrontier OBJECT-TYPE<br />

SYNTAX IA5String (SIZE(0..8))<br />

ACCESS read-write<br />

STATUS current<br />

DESCRIPTION "STP Frontier enabled in [EXTA|EXTB|NONE]"<br />

::= { plStpEntry 6 }<br />

-- The plSecurity Group<br />

--<br />

plSecurityConsoleSerial OBJECT-TYPE<br />

SYNTAX INTEGER { enabled ( 1 ),<br />

Submission page 438 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

MAX-ACCESS read-write<br />

STATUS current<br />

disabled ( 0 ) }<br />

DESCRIPTION "Enable/disable access to the modems<br />

DEFVAL { enabled }<br />

::= { plSecurity 1 }<br />

serial port console."<br />

plSecurityConsoleTelnet OBJECT-TYPE<br />

SYNTAX INTEGER { enabled ( 1 ),<br />

MAX-ACCESS read-write<br />

STATUS current<br />

disabled ( 0 ) }<br />

DESCRIPTION "Enable/disable access to the modems<br />

telnet console."<br />

DEFVAL { disabled }<br />

::= { plSecurity 2 }<br />

plSecurityConsoleAuthTable OBJECT-TYPE<br />

SYNTAX SEQUENCE OF SecurityConsoleAuthEntry<br />

MAX-ACCESS not-accessible<br />

Submission page 439 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

STATUS current<br />

DESCRIPTION "Table of IP addresses form which<br />

::= { plSecurity 3 }<br />

plSecurityConsoleAuthEntry OBJECT-TYPE<br />

Telnet clients may access this modem."<br />

SYNTAX SecurityConsoleAuthEntry<br />

MAX-ACCESS not-accessible<br />

STATUS current<br />

DESCRIPTION "One entry of the table."<br />

INDEX { securityConsoleAuthNumber }<br />

::= { plSecurityConsoleAuthTable 1 }<br />

plSecurityConsoleAuthEntry ::= SEQUENCE {<br />

}<br />

plSecurityConsoleAuthNumber INTEGER,<br />

plSecurityConsoleAuthAddress IpAddress,<br />

plSecurityConsoleAuthRowStatus RowStatus<br />

plSecurityConsoleAuthNumber OBJECT-TYPE<br />

SYNTAX INTEGER (0..15)<br />

MAX-ACCESS not-accessible<br />

Submission page 440 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

END<br />

STATUS current<br />

DESCRIPTION "Number of this row."<br />

::= { plSecurityConsoleAuthEntry 1 }<br />

plSecurityConsoleAuthAddress OBJECT-TYPE<br />

SYNTAX IpAddress<br />

MAX-ACCESS read-create<br />

STATUS current<br />

DESCRIPTION "IP address of client."<br />

::= { plSecurityConsoleAuthEntry 2 }<br />

plSecurityConsoleAuthRowStatus OBJECT-TYPE<br />

SYNTAX RowStatus<br />

MAX-ACCESS read-create<br />

STATUS current<br />

DESCRIPTION "The status of this conceptual row."<br />

::= { plSecurityConsoleAuthEntry 3 }<br />

Submission page 441 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

ANNEX B PERFORMANCE (INFORMATIVE)<br />

The total bitrate transmitted by a BPL node is influenced by several factors. Considering <strong>PHY</strong> level, the maximum<br />

theoretical rates depend on the OFDM Symbol Type <strong>and</strong> spectral efficiency, which is bound by the bit-loading of<br />

each subcarrier.<br />

Approximate numerical values will be given for maximum bit rates, taking into account these factors:<br />

• OFDM symbol rate <strong>and</strong> cyclic prefix<br />

• Truncated 4D-TCM<br />

• Loss rate due to RS coding<br />

• CRC overhead (Delimiters)<br />

And specifically not considering these:<br />

• Zero filling<br />

• Special coding of last Reed-Solomon codewords<br />

• Overhead of reference signals when fitting OFDM symbols inside PPDU.<br />

For simplicity purposes, numerical values will only be given for the special cases in which all 1536 subcarriers have<br />

the same bit-loading. This makes calculations easier, but it should not be difficult to find corresponding numerical<br />

values for any possible bit-loading table.<br />

B.1 Data stream<br />

Data payload is adaptively or HURTO modulated.<br />

The cyclic prefix that each Symbol Type uses implies that actual data is only transmitted during the IDFT interval.<br />

The percentage of maximum <strong>PHY</strong> rate that is lost equals the percentage of cyclic prefix interval over total symbol<br />

interval (which is the sum of cyclic prefix <strong>and</strong> IDFT interval). The IDFT interval is fixed to 2048 samples for every<br />

Symbol Type.<br />

Truncated 4D-TCM operates on 768 pairs of subcarriers.<br />

For adaptive mapping, each pair of subcarriers gets a different coding according to its bit-loading: if we call z to<br />

z − 1<br />

the sum of the bit-loadings of both subcarriers, the coding rate for that pair of subcarriers is , except for the<br />

z<br />

Submission page 442 UPA-OPERA


S mode<br />

0<br />

S mode<br />

1<br />

S mode<br />

2<br />

S mode<br />

3<br />

4-June-07 P1901_PRO_016_r0<br />

case in which the bit-loadings for both subcarriers is zero (in this case there is no coding because no message in<br />

being sent on that pair of subcarriers). As bit-loadings can take the values 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 or 10, coding<br />

rates will range from 1/2 to 19/20 for each pair of subcarriers.<br />

For HURTO mapping, each subcarrier will get the same coding, with a bit-loading of 2, so the coding rate for each<br />

pair of subcarriers is 3/4. Additionally, HURTO mapping replicates eight times the message, which means a further<br />

coding rate of 1/8.<br />

Next table shows coded maximum data rates (in Mbps) for OFDM symbols with constant bit-loading for all<br />

subcarriers. Numbers shown take into account cyclic prefix <strong>and</strong> 4D-TCM.<br />

Bit-loading for all 1536 subcarriers (adaptive mapping) HURTO<br />

10 9 8 7 6 5 4 3 2 1<br />

Type I 204.94 183.37 161.80 140.22 118.65 97.08 75.51 53.93 32.36 10.79 4.04<br />

Type II 150.82 134.95 119.07 103.19 87.32 71.44 55.57 39.69 23.81 7.94 2.98<br />

Type III 84.01 75.16 66.32 57.48 48.64 39.79 30.95 22.11 13.26 4.42 1.66<br />

Table 68 Coded maximum bitrates for Data payload (constant bit-loading)<br />

Furthermore, RS coding implies an additional rate loss which depends on the code rate. For each of the four RS data<br />

modes (0 being the least <strong>and</strong> 3 the most robust one), adaptive mapping can produce a total of 28 different codes<br />

depending on the FEC payload, each one with a different data rate as given in Table 69.<br />

FEC payload (bytes)<br />

Code rate<br />

244 240 236 232 228 224 220 216 212 208 204 200 196 192 188 184 180 176 172 168 164 160 156 152 148 144 140 136<br />

0.968 0.968 0.967 0.967 0.966 0.966 0.965 0.964 0.964 0.963 0.962 0.962 0.961 0.960 0.959 0.958 0.957 0.957 0.956 0.955 0.953 0.952 0.951 0.950 0.949 0.947 0.946 0.944<br />

240 236 232 228 224 220 216 212 208 204 200 196 192 188 184 180 176 172 168 164 160 156 152 148 144 140 136 132<br />

0.952 0.952 0.951 0.950 0.949 0.948 0.947 0.946 0.945 0.944 0.943 0.942 0.941 0.940 0.939 0.938 0.936 0.935 0.933 0.932 0.930 0.929 0.927 0.925 0.923 0.921 0.919 0.917<br />

236 232 228 224 220 216 212 208 204 200 196 192 188 184 180 176 172 168 164 160 156 152 148 144 140 136 132 128<br />

0.937 0.935 0.934 0.933 0.932 0.931 0.930 0.929 0.927 0.926 0.925 0.923 0.922 0.920 0.918 0.917 0.915 0.913 0.911 0.909 0.907 0.905 0.902 0.900 0.897 0.895 0.892 0.889<br />

232 228 224 220 216 212 208 204 200 196 192 188 184 180 176 172 168 164 160 156 152 148 144 140 136 132 128 124<br />

0.921 0.919 0.918 0.917 0.915 0.914 0.912 0.911 0.909 0.907 0.906 0.904 0.902 0.900 0.898 0.896 0.894 0.891 0.889 0.886 0.884 0.881 0.878 0.875 0.872 0.868 0.865 0.86<br />

Table 69 RS coding rates for Data payload (adaptive)<br />

Submission page 443 UPA-OPERA


4-June-07 P1901_PRO_016_r0<br />

HURTO mapping can use all the RS codes above plus codes with decreasing FEC payload until code rate is 0.5.<br />

The uncoded maximum bitrates for Data payload are the result of multiplying coded maximum bitrates by RS<br />

coding rate.<br />

B.2 Delimiters<br />

Delimiters are HURTO modulated for robust OFDM transmission.<br />

<strong>Control</strong> symbols have modulation <strong>and</strong> trellis coding schemes similar to HURTO data symbols, so the maximum<br />

coded data rate is the same.<br />

Delimiters use a specific RS code with rate 2/3. Additionally, a CRC-CCITT is applied which implies a rate loss of<br />

176/192.<br />

So in the same conditions as assumed for Data payload, the Delimiters data rate is given in Table 70<br />

Uncoded bitrate (Mbps)<br />

Type I 2.47<br />

Type II 1.82<br />

Type III 1.01<br />

Table 70 Coded maximum bitrates for Delimiters<br />

Submission page 444 UPA-OPERA


EC/IST FP6 Project No 026920<br />

Work Package: WP5<br />

Type of document: Report<br />

Date: 04 June 2007<br />

File name: OP2_WP5_D27 Version: 1.0<br />

Title: First draft of the OPERA specification version 2<br />

Copyright<br />

“Copyright <strong>and</strong> Reprint Permissions. You may freely reproduce all or part of this paper<br />

for non-commercial purposes, provided that the following conditions are fulfilled: (i) to<br />

cite the authors, as the copyright owners (ii) to cite the OPERA Project <strong>and</strong> mention<br />

that the European Commission co-finances it, by means of including this statement<br />

“OPERA. IST Integrated Project No 507667. Funded by EC” <strong>and</strong> (iii) not to alter the<br />

information.”

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!