Medium Access Control (MAC) and Physical Layer (PHY) - CISE
Medium Access Control (MAC) and Physical Layer (PHY) - CISE
Medium Access Control (MAC) and Physical Layer (PHY) - CISE
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
IST Integrated Project No 026920<br />
Partners:<br />
Work Package: WP5<br />
Activities: 5.1<br />
Type of document: Report<br />
Date: 04 June 2007<br />
CTI, DS2, EDEV CPL / EDF Group, Iberdrola, SEPC, TUD, URL<br />
Responsible: EDEV CPL / EDF Group<br />
Circulation:<br />
� Public<br />
� Confidential<br />
� Restricted<br />
File name: OP2_WP5_D27 Version: 1.0<br />
Title: First draft of the OPERA specification version 2<br />
D27 : FIRST DRAFT OF THE OPERA SPECIFICATION VERSION 2<br />
Copyright<br />
© Copyright 2007 The OPERA Consortium
EC/IST FP6 Project No 026920<br />
Work Package: WP5<br />
Type of document: Report<br />
Date: 04 June 2007<br />
File name: OP2_WP5_D27 Version: 1.0<br />
Title: First draft of the OPERA specification version 2<br />
Document History<br />
Vers. Issue Date Content <strong>and</strong> changes<br />
1.0 04.06.07 Creation of the first version of the document<br />
Document Authors<br />
Partners Contributors<br />
CTI Manu Sharma<br />
DS2 Luis Manuel Torres, Salvador Iranzo, Marcos Martinez,<br />
Serafin Arroyo<br />
EDEV CPL / EDF Group Laurent Feltin, Eric Perrier<br />
Iberdrola Inigo Berganza<br />
SEPC Philippe Conq<br />
TUD Le Phu Do<br />
University Ramon Llull<br />
(URL)<br />
Document Approvers<br />
Partners Approvers<br />
EDEV CPL / EDF Group Laurent Feltin<br />
Guiomar Corral, Josep M. Selga
4-June-07 P1901_PRO_016_r0<br />
IEEE P1901<br />
Draft St<strong>and</strong>ard for Broadb<strong>and</strong> over Power Line Networks:<br />
<strong>Medium</strong> <strong>Access</strong> <strong>Control</strong> <strong>and</strong> <strong>Physical</strong> <strong>Layer</strong> Specifications<br />
Proposal for the IEEE 1901<br />
<strong>Access</strong> Power Line Networks St<strong>and</strong>ard<br />
Date: 2007-06-04<br />
Author(s):<br />
Name Company Address Phone email<br />
Laurent Feltin OPERA<br />
Inigo Berganza OPERA<br />
Luis M. Torres OPERA<br />
Serafin Arroyo UPA<br />
Guiomar Corral OPERA<br />
Salvador<br />
Iranzo<br />
OPERA<br />
Le Phu Do OPERA<br />
Eric Perrier OPERA<br />
José Maria<br />
EDEV CPL Technologie<br />
1 avenue du Général de Gaulle<br />
92140 Clamart, France<br />
Iberdrola S.A.<br />
Avda San Adrián 48<br />
48003 Bilbao, Spain<br />
Design of Systems on Silicon<br />
(DS2)<br />
C/ Charles Robert Darwin 2<br />
Parc Tecnològic<br />
46980, Paterna, Valencia, Spain<br />
Universal Powerline Association<br />
3 Bridge Street<br />
Kings Cliffe, Peterborough<br />
PE8 6XH, United Kingdom<br />
Enginyeria La Salle - Universitat<br />
Ramon Llull<br />
Postal address c/ Quatre Camins,<br />
2 08022 – Barcelona, Spain<br />
Design of Systems on Silicon<br />
(DS2)<br />
C/ Charles Robert Darwin 2<br />
Parc Tecnològic<br />
46980, Paterna, Valencia, Spain<br />
Technische Universitaet Dresden<br />
Chair for Telecommunications<br />
01062 Dresden, Germany<br />
EDEV CPL Technologie<br />
1 avenue du Général de Gaulle<br />
92140 Clamart, France<br />
OPERA Enginyeria La Salle - Universitat<br />
Ramon Llull<br />
+33 1 41 33 95 14 laurent.feltin@edev-cpl.fr<br />
+34 944665525 iberganza@iberdrola.es<br />
+34 96 136 60 04 luismanuel.torres@ds2.es<br />
+44 (0)1780470003<br />
serafin.arroyo@universalpow<br />
erlineassociation.com<br />
+34 93 290 24 23 guiomar@salle.url.edu<br />
+34 96 136 60 04 salvador.iranzo@ds2.es<br />
+49 351 463-39244 dolephu@ifn.et.tu-dresden.de<br />
+33 1 41 33 95 11 eric.perrier@edev-cpl.fr<br />
+34 93 290 24 23 jmselga@salle.url.edu<br />
Submission page 1 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Selga Postal address c/ Quatre Camins,<br />
2 08022 – Barcelona, Spain<br />
Ralf Lehnert OPERA<br />
Agustin<br />
Badenes<br />
OPERA<br />
Manu Sharma OPERA<br />
Philippe Conq OPERA<br />
Eric Morel Ilevo-Schneider Electric<br />
Powerline<br />
Communications<br />
Technische Universitaet Dresden<br />
Chair for Telecommunications<br />
01062 Dresden, Germany<br />
Design of Systems on Silicon<br />
(DS2)<br />
C/ Charles Robert Darwin 2<br />
Parc Tecnològic<br />
46980, Paterna, Valencia, Spain<br />
Current Technologies<br />
International GmBHPostal<br />
address : Gewerbepark, 5506<br />
Maegenwil, Switzerl<strong>and</strong><br />
ILEVO – Schneider Electric<br />
Powerline Communications 59,<br />
Chemin du vieux chêne, F38240<br />
Meylan, France<br />
59, Chemin du vieux chêne,<br />
F38240 Meylan, France<br />
Ichiro Shimizu ITOCHU Corporation 5-1, Kita-Aoyama 2-chome,<br />
Minato-ku, Tokyo 107-8077,<br />
Japan<br />
Yukio<br />
Akegamiyama<br />
Toyo Network Systems<br />
Co., Ltd.<br />
Ram Rao Ambient Corporation<br />
Brian Donnelly<br />
Abstract:<br />
Corinex Communications<br />
Corp.<br />
1-1,Koyato2-chome,Samukawamachi,Koza-gun,Kanagawa<br />
253-<br />
0198,Japan<br />
79 Chapel Street<br />
Newton, MA 02458<br />
USA<br />
905 West Pender Street<br />
Vancouver, BC V6C 1L6<br />
Canada,<br />
+49 351 463-33942 ralf.lehnert@tu-dresden.de<br />
+34 96 136 60 04 agustin.badenes@ds2.es<br />
+41-62-544-1912 msharma@currentgroup.com<br />
+33 4 76 60 59 56<br />
+33 (0)4 76 60 59<br />
56<br />
philippe.conq@fr.schneiderelectric.com <br />
eric.morel@schneiderelectric.com<br />
+81-33497-7237 shimizu-i@itochu.co.jp<br />
+81 467 74 1176 akegamiy@t-ns.co.jp<br />
+1-617-332-0004 ram.rao@ambientcorp.com<br />
+1 778 371 7697 brian.donnelly@corinex.com<br />
This is a complete proposal for the IEEE P1901 <strong>Access</strong> Broadb<strong>and</strong> over Power Line st<strong>and</strong>ard submitted<br />
by the OPERA (Open PLC European Research Alliance) <strong>and</strong> UPA (Universal Powerline Association).<br />
Submission page 2 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
The proposal fulfills all the requirements described in the document<br />
“P1901_0205_r2_AC_unified_req.doc”, <strong>and</strong> also follows the rules <strong>and</strong> conditions described in the Call for<br />
proposals document “P1901_0269_r1_AC_Call_for_submissions.doc”.<br />
This document will be part of the down-selection process of the P1901 group as described in the<br />
document “P1901_0098_r8_Downselect_Process_final.doc”, for the St<strong>and</strong>ard for Broadb<strong>and</strong> over Power<br />
Line Networks: <strong>Medium</strong> <strong>Access</strong> <strong>Control</strong> <strong>and</strong> <strong>Physical</strong> <strong>Layer</strong> Specifications, <strong>Access</strong>.<br />
Notice: This document has been prepared to assist the IEEE P1901 working group. It is offered as a basis for discussion <strong>and</strong> is not binding on<br />
the contributing individual(s) or organization(s). The material in this document is subject to change in form <strong>and</strong> content after further study. The<br />
contributor(s) reserve(s) the right to add, amend, or withdraw material contained herein.<br />
Release: The contributor grants a free, irrevocable license to The Institute of Electrical <strong>and</strong> Electronics Engineers, Inc. (“IEEE”), a corporation<br />
with offices at 445 Hoes Lane, Piscataway, NJ 08855-1331, to incorporate material contained in this contribution, <strong>and</strong> any modifications<br />
thereof, in the creation of an IEEE St<strong>and</strong>ards publication; to copyright in the IEEE’s name any IEEE St<strong>and</strong>ards publication even though it may<br />
include portions of this contribution; <strong>and</strong> at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE<br />
St<strong>and</strong>ards publication. The contributor also acknowledges <strong>and</strong> accepts that this contribution may be made public by the IEEE P1901 working<br />
group.<br />
Submission page 3 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Draft St<strong>and</strong>ard for<br />
Broadb<strong>and</strong> over Power Line Networks: <strong>Medium</strong><br />
<strong>Access</strong> <strong>Control</strong> (<strong>MAC</strong>)<br />
<strong>and</strong> <strong>Physical</strong> <strong>Layer</strong> (<strong>PHY</strong>) specifications<br />
Copyright © 2007 by the IEEE.<br />
Three Park Avenue<br />
New York, NY 10016-5997, USA<br />
All rights reserved.<br />
This document is an unapproved draft of a proposed IEEE St<strong>and</strong>ard. As such, this document is subject to change.<br />
USE AT YOUR OWN RISK! Because this is an unapproved draft, this document must not be utilized for any<br />
conformance/compliance purposes. Permission is hereby granted for IEEE St<strong>and</strong>ards Committee participants to<br />
reproduce this document for<br />
purposes of international st<strong>and</strong>ardization consideration. Prior to adoption of this document, in whole or in part, by<br />
another st<strong>and</strong>ards development organization, permission must first be obtained from the IEEE St<strong>and</strong>ards Activities<br />
Department. Other entities seeking permission to reproduce this document, in whole or in part, must obtain<br />
permission from the IEEE<br />
St<strong>and</strong>ards Activities Department.<br />
IEEE St<strong>and</strong>ards Activities Department<br />
445 Hoes Lane<br />
Piscataway, NJ 08854, USA<br />
Submission page 4 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
1 INTRODUCTION .............................................................................................................................................. 19<br />
1.1 SCOPE ........................................................................................................................................................ 19<br />
1.2 OVERVIEW ............................................................................................................................................... 19<br />
1.3 REFERENCES............................................................................................................................................ 19<br />
1.4 DOCUMENT CONVENTIONS................................................................................................................. 20<br />
1.5 DEFINITIONS............................................................................................................................................ 21<br />
1.6 ABBREVIATIONS AND ACRONYMS ................................................................................................... 25<br />
2 GENERAL DESCRIPTION ............................................................................................................................... 31<br />
2.1 GENERAL DESCRIPTION OF THE ARCHITECTURE......................................................................... 32<br />
2.2 NODE DESCRIPTION............................................................................................................................... 32<br />
2.2.1 HE ....................................................................................................................................................... 33<br />
2.2.2 Time Division Repeaters..................................................................................................................... 33<br />
2.2.3 CPE ..................................................................................................................................................... 33<br />
2.3 <strong>MAC</strong> overview............................................................................................................................................ 33<br />
2.4 QoS overview.............................................................................................................................................. 34<br />
2.5 Security overview........................................................................................................................................ 34<br />
2.6 NETWORK REFERENCE MODEL.......................................................................................................... 35<br />
3 <strong>PHY</strong>..................................................................................................................................................................... 36<br />
Submission page 5 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
3.1 OVERVIEW ............................................................................................................................................... 37<br />
3.2 <strong>PHY</strong> LAYER FRAME................................................................................................................................ 37<br />
3.3 FORWARD ERROR CORRECTION........................................................................................................38<br />
3.3.1 Delimiters............................................................................................................................................ 38<br />
3.3.2 Data payload........................................................................................................................................ 42<br />
3.4 MAPPING MODES.................................................................................................................................... 46<br />
3.4.1 HURTO mapping................................................................................................................................ 46<br />
3.4.2 Adaptive mapping ............................................................................................................................... 47<br />
3.5 TRELLIS CODED MODULATION (4D-TCM) ....................................................................................... 48<br />
3.5.1 Bit Extraction ...................................................................................................................................... 48<br />
3.5.2 Scrambling .......................................................................................................................................... 50<br />
3.5.3 Bit conversion ..................................................................................................................................... 53<br />
3.5.4 Constellation encoder.......................................................................................................................... 54<br />
3.6 SUBCARRIER MODULATION................................................................................................................ 55<br />
3.7 OFDM MODULATION ............................................................................................................................. 57<br />
3.7.1 <strong>Control</strong> <strong>and</strong> Data symbols................................................................................................................... 58<br />
3.7.2 Time domain windowing .................................................................................................................... 59<br />
3.8 REFERENCE SIGNALS ............................................................................................................................ 61<br />
Submission page 6 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
3.8.1 Channel reference symbol................................................................................................................... 61<br />
3.8.2 Synchronization symbol...................................................................................................................... 61<br />
3.8.3 Start Of Transmission (SOT) .............................................................................................................. 61<br />
3.8.4 Channel estimation symbols................................................................................................................ 63<br />
3.9 CARRIER FREQUENCY .......................................................................................................................... 65<br />
3.10 COMMUNICATION MODES................................................................................................................... 65<br />
3.11 <strong>PHY</strong> PARAMETER SPECIFICATION .....................................................................................................65<br />
3.12 CLOCK SYNCHRONIZATION ................................................................................................................ 66<br />
3.12.1 General ................................................................................................................................................ 66<br />
3.12.2 Clock synchronisation concept............................................................................................................ 66<br />
3.12.3 System reference clock error tolerance ............................................................................................... 66<br />
3.13 TRANSMITTER ELECTRICAL SPECIFICATION................................................................................. 66<br />
3.13.1 Transmit PSD...................................................................................................................................... 66<br />
3.13.2 Modulation error vector magnitude..................................................................................................... 67<br />
3.13.3 Power <strong>Control</strong> ..................................................................................................................................... 67<br />
3.14 RECEIVER ELECTRICAL SPECIFICATION ......................................................................................... 68<br />
3.14.1 Receiver Input Impedance................................................................................................................... 68<br />
3.14.2 Receiver Input Referred Noise............................................................................................................ 69<br />
Submission page 7 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
3.14.3 Receiver Input Signal.......................................................................................................................... 69<br />
3.15 <strong>PHY</strong> service specification (<strong>PHY</strong> SAP) ....................................................................................................... 69<br />
3.15.1 <strong>PHY</strong> service primitives ....................................................................................................................... 69<br />
3.15.2 <strong>PHY</strong> service primitives parameters..................................................................................................... 70<br />
3.15.3 <strong>PHY</strong>-DATA.req .................................................................................................................................. 71<br />
3.15.4 <strong>PHY</strong>-DATA.cnf .................................................................................................................................. 72<br />
3.15.5 <strong>PHY</strong>-DATA.ind .................................................................................................................................. 72<br />
3.15.6 <strong>PHY</strong>-MNT-SNR.ind ........................................................................................................................... 73<br />
3.15.7 <strong>PHY</strong>-MNT-BPC-SET.req ................................................................................................................... 73<br />
3.15.8 <strong>PHY</strong>-MNT-BPC-SET.cnf ................................................................................................................... 74<br />
3.15.9 <strong>PHY</strong>-MNT-BPC-GET.req .................................................................................................................. 75<br />
3.15.10 <strong>PHY</strong>-MNT-BPC-GET.cnf............................................................................................................... 75<br />
3.15.11 <strong>PHY</strong>-MNT-RXGAIN-GET.req....................................................................................................... 76<br />
3.15.12 <strong>PHY</strong>-MNT-RXGAIN-GET.cnf....................................................................................................... 76<br />
3.15.13 <strong>PHY</strong>-MNT-TXGAIN-GET.req....................................................................................................... 77<br />
3.15.14 <strong>PHY</strong>-MNT-TXGAIN-GET.cnf....................................................................................................... 77<br />
3.15.15 <strong>PHY</strong>-MNT-TXGAIN-SET.req ....................................................................................................... 78<br />
3.15.16 <strong>PHY</strong>-MNT-TXGAIN-SET.cnf ....................................................................................................... 78<br />
Submission page 8 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
3.15.17 <strong>PHY</strong>-MNT-POWMASK-GET.req.................................................................................................. 79<br />
3.15.18 <strong>PHY</strong>-MNT-POWMASK-GET.cnf.................................................................................................. 79<br />
3.15.19 <strong>PHY</strong>-MNT-POWMASK-SET.req .................................................................................................. 80<br />
3.15.20 <strong>PHY</strong>-MNT-POWMASK-SET.cnf .................................................................................................. 80<br />
3.15.21 <strong>PHY</strong>-MNT-SYNC.ind .................................................................................................................... 81<br />
3.15.22 <strong>PHY</strong>-MNT-SYNC.req .................................................................................................................... 81<br />
3.15.23 <strong>PHY</strong>-MNT-SYNC.cnf .................................................................................................................... 82<br />
4 <strong>MAC</strong>.................................................................................................................................................................... 82<br />
4.1 OVERVIEW ............................................................................................................................................... 82<br />
4.1.1 Contention free medium access examples ..........................................................................................83<br />
4.1.2 Contention medium access example ................................................................................................... 85<br />
4.2 <strong>MAC</strong> STATES MANAGEMENT .............................................................................................................. 86<br />
4.2.1 Master side .......................................................................................................................................... 86<br />
4.2.2 Slave side ............................................................................................................................................ 88<br />
4.2.3 Transition state diagrams .................................................................................................................... 90<br />
4.3 FRAME FORMATS ................................................................................................................................... 92<br />
4.3.1 Distributor Frame ................................................................................................................................ 94<br />
4.3.2 Data Frame.......................................................................................................................................... 96<br />
Submission page 9 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.3.3 Silence Frame...................................................................................................................................... 96<br />
4.3.4 Channel Estimation Frame.................................................................................................................. 97<br />
4.3.5 Polling Frame...................................................................................................................................... 99<br />
4.3.6 TDR Polling Frame ........................................................................................................................... 100<br />
4.3.7 CSMA Frame .................................................................................................................................... 101<br />
4.3.8 <strong>Access</strong> Frame .................................................................................................................................... 102<br />
4.3.9 <strong>Access</strong> Reply Frame.......................................................................................................................... 102<br />
4.3.10 Non-returnable Data Frame............................................................................................................... 104<br />
4.3.11 Clock Frame...................................................................................................................................... 104<br />
4.4 <strong>MAC</strong> DELIMITERS................................................................................................................................. 106<br />
4.4.1 Token announce ................................................................................................................................ 106<br />
4.4.2 Token ................................................................................................................................................ 111<br />
4.5 TOKEN LOSS RECOVERY.................................................................................................................... 127<br />
4.6 <strong>MAC</strong> PARAMETERS SPECIFICATION................................................................................................ 131<br />
4.7 <strong>MAC</strong> service specification (<strong>MAC</strong> SAP)................................................................................................... 133<br />
4.7.1 <strong>MAC</strong> service primitives .................................................................................................................... 133<br />
4.7.2 <strong>MAC</strong>-DATA.req ............................................................................................................................... 134<br />
4.7.3 <strong>MAC</strong>-DATA.cnf ............................................................................................................................... 135<br />
Submission page 10 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.7.4 <strong>MAC</strong>-DATA.ind ............................................................................................................................... 135<br />
4.7.5 <strong>MAC</strong>-ACK.req.................................................................................................................................. 136<br />
4.7.6 <strong>MAC</strong>-ACK.cnf.................................................................................................................................. 136<br />
4.7.7 <strong>MAC</strong>-ACK.ind.................................................................................................................................. 137<br />
4.7.8 <strong>MAC</strong>-MNT-TOKEN.req .................................................................................................................. 137<br />
4.7.9 <strong>MAC</strong>-MNT-TOKEN.ind .................................................................................................................. 138<br />
4.7.10 <strong>MAC</strong>-MNT-TOKEN.cnf .................................................................................................................. 138<br />
4.7.11 <strong>MAC</strong>-MNT-RESOURCES.req......................................................................................................... 139<br />
4.7.12 <strong>MAC</strong>-MNT-RESOURCES.ind......................................................................................................... 139<br />
4.7.13 <strong>MAC</strong>-MNT-RESOURCES.cnf......................................................................................................... 140<br />
4.7.14 <strong>MAC</strong>-MNT-CHANEST-FRAME.req............................................................................................... 141<br />
4.7.15 <strong>MAC</strong>-MNT-CHANEST-REQ.req .................................................................................................... 141<br />
4.7.16 <strong>MAC</strong>-MNT-CHANEST-REQ.ind .................................................................................................... 142<br />
4.7.17 <strong>MAC</strong>-MNT-NHOPS.req................................................................................................................... 142<br />
4.7.18 <strong>MAC</strong>-MNT-NHOPS.cnf................................................................................................................... 143<br />
4.7.19 <strong>MAC</strong>-MNT-CHANGE.req ............................................................................................................... 143<br />
4.7.20 <strong>MAC</strong>-MNT-CHANGE.cnf ............................................................................................................... 144<br />
4.7.21 <strong>MAC</strong>-MNT-TXSYMB.ind ............................................................................................................... 144<br />
Submission page 11 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.7.22 <strong>MAC</strong>-MNT-CHANSTATS.req......................................................................................................... 145<br />
4.7.23 <strong>MAC</strong>-MNT-CHANSTATS.cnf......................................................................................................... 145<br />
4.7.24 <strong>MAC</strong>-MNT-NEWMID.ind ............................................................................................................... 146<br />
4.7.25 <strong>MAC</strong>-MNT-LINK-STATUS.req ...................................................................................................... 146<br />
4.7.26 <strong>MAC</strong>-MNT-LINK-STATUS.cnf ...................................................................................................... 147<br />
5 LLC ................................................................................................................................................................... 147<br />
5.1 INTRODUCTION..................................................................................................................................... 147<br />
5.2 BURST HEADER..................................................................................................................................... 148<br />
5.2.1 Burst header with data....................................................................................................................... 148<br />
5.2.2 Burst header without data.................................................................................................................. 151<br />
5.3 BURST STRUCTURE.............................................................................................................................. 153<br />
5.3.1 Unencrypted Burst Structure............................................................................................................. 153<br />
5.3.2 Encrypted Burst Structure ................................................................................................................. 156<br />
5.4 Packet ACK Protocol ................................................................................................................................ 157<br />
5.4.1 Transmission window management .................................................................................................. 158<br />
5.4.2 Packet ACK Protocol: Group Encoding............................................................................................ 158<br />
5.4.3 Packet ACK Protocol: Run-Length Encoding .................................................................................. 161<br />
5.4.4 Transmission of PAP information..................................................................................................... 163<br />
Submission page 12 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
5.5 LLC service specification (LLC SAP)...................................................................................................... 163<br />
5.5.1 LLC service primitives...................................................................................................................... 163<br />
5.5.2 LLC-DATA.req................................................................................................................................. 164<br />
5.5.3 LLC-DATA.cnf................................................................................................................................. 164<br />
5.5.4 LLC-DATA.ind................................................................................................................................. 165<br />
5.5.5 LLC-MNT-ACKMODE.req ............................................................................................................. 165<br />
6 CONVERGENCE LAYER............................................................................................................................... 166<br />
6.1 OVERVIEW ............................................................................................................................................. 166<br />
6.2 PACKET FORMAT.................................................................................................................................. 166<br />
6.2.1 Maximum <strong>and</strong> Minimum Packet length............................................................................................ 167<br />
6.2.2 OVLAN Fields.................................................................................................................................. 168<br />
6.2.3 BPL service class .............................................................................................................................. 168<br />
6.2.4 PB Field............................................................................................................................................. 169<br />
6.2.5 Octet alignment ................................................................................................................................. 169<br />
6.3 CONVERGENCE LAYER SERVICE PRIMITIVES.............................................................................. 171<br />
6.3.1 Multi-port transfer requests............................................................................................................... 172<br />
6.4 BROADCAST/MULTICAST HANDLER FUNCTIONAL REQUIREMENTS .................................... 172<br />
7 BRIDGING FUNCTION.................................................................................................................................. 173<br />
Submission page 13 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
7.1 General ...................................................................................................................................................... 173<br />
7.2 IEEE 802.1D conformance ....................................................................................................................... 173<br />
7.3 IEEE 802.1Q conformance ....................................................................................................................... 174<br />
7.4 OVLAN Function...................................................................................................................................... 174<br />
7.4.1 General .............................................................................................................................................. 174<br />
7.4.2 Frame admittance <strong>and</strong> OVLAN assignment ..................................................................................... 175<br />
7.4.3 OVLAN Ingress filtering .................................................................................................................. 176<br />
7.4.4 OVLAN Egress filtering ................................................................................................................... 176<br />
7.4.5 OVLAN management ....................................................................................................................... 176<br />
7.5 Sending broadcast/multicast Ethernet frames ........................................................................................... 176<br />
7.6 PB field ..................................................................................................................................................... 177<br />
7.6.1 Bridging between BPL ports............................................................................................................. 177<br />
7.6.2 Bridging from a non-BPL port to a BPL port ................................................................................... 177<br />
7.7 BPL service class transmission ................................................................................................................. 177<br />
7.8 Filtering multicast management messages from a BPL port..................................................................... 177<br />
7.9 Filtering multicast management messages from the management port..................................................... 178<br />
8 QOS SERVICES............................................................................................................................................... 178<br />
8.1 INTRODUCTION..................................................................................................................................... 178<br />
Submission page 14 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
8.2 SERVICE CLASS DEFINITION ............................................................................................................. 179<br />
8.2.1 Priority .............................................................................................................................................. 179<br />
8.2.2 Max Subcell <strong>Access</strong> Time................................................................................................................. 179<br />
8.2.2.1 Configuration .................................................................................................................................... 180<br />
8.2.3 Resource reservation type ................................................................................................................. 180<br />
8.2.3.1 Configuration .................................................................................................................................... 180<br />
8.2.4 Service reliability .............................................................................................................................. 181<br />
8.2.4.1 Configuration .................................................................................................................................... 181<br />
8.2.5 Example of a service class definition................................................................................................ 181<br />
8.2.6 Provisioning Service Class Definitions to slaves.............................................................................. 183<br />
8.3 CONGESTION MANAGEMENT ........................................................................................................... 183<br />
8.3.1 Configuration .................................................................................................................................... 184<br />
8.4 CONNECTION ADMISSION CONTROL.............................................................................................. 184<br />
8.5 Traffic Shaping.......................................................................................................................................... 185<br />
8.5.1 QOS Requirements............................................................................................................................ 185<br />
9 LAYER MANAGEMENT................................................................................................................................ 186<br />
9.1 CONTROL PROTOCOLS........................................................................................................................ 186<br />
9.1.1 CCP (Communication <strong>Control</strong> Protocol) Description....................................................................... 186<br />
Submission page 15 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
9.1.2 Adaptive Bit-Loading Protocol (ABLP) ........................................................................................... 192<br />
9.1.3 <strong>Access</strong> Protocol................................................................................................................................. 197<br />
9.1.4 Port Solver Protocol .......................................................................................................................... 202<br />
10 SECURITY ................................................................................................................................................... 279<br />
10.1 LOW LEVEL ENCRYPTION AND INTEGRITY.................................................................................. 279<br />
10.1.1 Overview........................................................................................................................................... 279<br />
10.1.2 Detailed encryption process .............................................................................................................. 280<br />
10.2 AAA protocol............................................................................................................................................ 286<br />
10.3 Key Hierarchies......................................................................................................................................... 292<br />
10.4 Establishing the keys................................................................................................................................. 293<br />
11 SYSTEM PARAMETERS............................................................................................................................ 294<br />
11.1 GENERAL PARAMETERS..................................................................................................................... 294<br />
11.2 AGC (AUTOMATIC GAIN CONTROL) PARAMETERS..................................................................... 298<br />
11.3 RADIUS PARAMETERS ........................................................................................................................ 299<br />
11.4 CLASS OF SERVICE (COS) PARAMETER.......................................................................................... 300<br />
11.5 QUALITY OF SERVICE (QOS) PARAMETERS .................................................................................. 302<br />
11.5.1 Slave Node Parameters (CPE)........................................................................................................... 303<br />
11.5.2 Master Node Parameters (HE or REPEATER)................................................................................. 303<br />
Submission page 16 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
11.6 PROFILES PARAMETERS..................................................................................................................... 304<br />
11.7 TRANSLATION TABLE PARAMETERS.............................................................................................. 309<br />
11.8 <strong>MAC</strong> FILTER PARAMETERS................................................................................................................ 310<br />
11.9 NTP PARAMETERS................................................................................................................................ 311<br />
11.10 SNMP PARAMETERS ........................................................................................................................ 312<br />
11.11 STP PARAMETERS ............................................................................................................................ 312<br />
11.12 VOIP PARAMETERS.......................................................................................................................... 315<br />
11.12.1 Dial Plan Configuration ................................................................................................................ 322<br />
11.12.2 Country Specific Parameters......................................................................................................... 324<br />
11.12.3 Tone pattern configuration............................................................................................................ 327<br />
11.13 VLAN NETWORK............................................................................................................................... 327<br />
11.14 OVLAN PARAMETERS ..................................................................................................................... 330<br />
11.15 CUSTOM VLAN/OVLAN PARAMETERS........................................................................................ 331<br />
11.15.1 Custom VLAN Parameters............................................................................................................ 332<br />
11.15.2 Custom OVLAN Parameters......................................................................................................... 337<br />
11.16 ACCESS PROTOCOL PARAMETERS .............................................................................................. 341<br />
12 CONFIGURATION...................................................................................................................................... 344<br />
12.1 MIB ........................................................................................................................................................... 344<br />
Submission page 17 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
12.1.1 SNMP Management .......................................................................................................................... 344<br />
12.1.2 MIB-II for IEEE P1901..................................................................................................................... 345<br />
12.1.3 IEEE P1901 Private MIB .................................................................................................................. 346<br />
12.2 AUTO-CONFIGURATION AND PROVISIONING............................................................................... 358<br />
12.2.1 Auto-configuration purpose .............................................................................................................. 358<br />
12.2.2 Auto-configuration process overview ............................................................................................... 358<br />
12.2.3 <strong>Access</strong> Protocol................................................................................................................................. 360<br />
12.2.4 Auto-configuration at Modem Boot.................................................................................................. 361<br />
12.2.5 PTTP Protocol................................................................................................................................... 362<br />
12.2.6 Translation Table .............................................................................................................................. 371<br />
12.2.7 Auto-configuration & Networking.................................................................................................... 372<br />
12.2.8 DHCP Support .................................................................................................................................. 375<br />
12.2.9 RADIUS Support .............................................................................................................................. 376<br />
12.3 Auto-configuration Parameters ................................................................................................................. 377<br />
12.3.1 Parameter Types................................................................................................................................ 377<br />
12.3.2 Parameter Format .............................................................................................................................. 377<br />
12.3.3 Auto-configuration parameter list ..................................................................................................... 378<br />
ANNEX A MIB DEFINITION IN ASN.1 FORMAT (NORMATIVE) ............................................................ 394<br />
Submission page 18 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
ANNEX B Performance (InforMative) ............................................................................................................... 442<br />
B.1 Data stream ............................................................................................................................................... 442<br />
B.2 Delimiters.................................................................................................................................................. 444<br />
1 INTRODUCTION<br />
This document is the technical specification of the IEEE P1901 technology.<br />
1.1 SCOPE<br />
This document specifies a physical layer (<strong>PHY</strong>), medium access control (<strong>MAC</strong>), LLC layer <strong>and</strong> convergence layer<br />
for data transmission over the electrical BPLs for <strong>Access</strong> Networks.<br />
1.2 OVERVIEW<br />
The purpose of this document is to specify a BPL data transmission system based on Orthogonal Frequency<br />
Division Multiplexing (OFDM) for providing <strong>Access</strong> services.<br />
Specifically this specification,<br />
- Describes a <strong>PHY</strong> capable of achieving rates in excess of 200 Mbps<br />
- Describes a Master-Slave <strong>MAC</strong> optimised for the <strong>Access</strong> BPL environment<br />
- Describes the QoS mechanisms available to support b<strong>and</strong>width <strong>and</strong> latency guarantees<br />
- Describes the security procedures used to provide data privacy over the BPL medium<br />
The description is written from the transmitter perspective to ensure interoperability between devices <strong>and</strong> allow<br />
different implementations. Some minimal requirements about the receiver behaviour are also given.<br />
1.3 REFERENCES<br />
The following st<strong>and</strong>ards contain provisions which, through references in this text, constitute normative provisions<br />
of this specification. At the time of publication, the editions indicated were valid. All st<strong>and</strong>ards are subject to<br />
Submission page 19 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
revision, <strong>and</strong> parties to agreements based on this st<strong>and</strong>ard are encouraged to investigate the possibility of applying<br />
the most recent revisions of the st<strong>and</strong>ards listed below.<br />
• ANSI X9.42: 2003. Agreement of Symmetric Keys Using Discrete Logarithm Cryptography<br />
• IEEE 802.3 St<strong>and</strong>ards for Local <strong>and</strong> Metropolitan Area Networks – Residential Ethernet<br />
• IEEE 802.1p St<strong>and</strong>ards for Local <strong>and</strong> Metropolitan Area Networks - Traffic Class Expediting <strong>and</strong> Dynamic<br />
Multicast Filtering<br />
• IEEE 802.1D St<strong>and</strong>ards for Local <strong>and</strong> Metropolitan Area Networks – <strong>MAC</strong> bridges<br />
• IEEE 802.1q St<strong>and</strong>ards for Local <strong>and</strong> Metropolitan Area Networks - Virtual Bridged Local Area Networks<br />
• IEEE 802.1w St<strong>and</strong>ards for Local <strong>and</strong> Metropolitan Area Networks - Rapid Reconfiguration of Spanning<br />
Tree<br />
• IEEE 802.11i St<strong>and</strong>ards for Local <strong>and</strong> Metropolitan Area Networks – <strong>Medium</strong> <strong>Access</strong> <strong>Control</strong> (<strong>MAC</strong>)<br />
Security Enhancements<br />
• RFC 3610 - Counter with CBC-<strong>MAC</strong> (CCM)<br />
• NIST 800-38A - 2001, Recommendation for Block Cipher Modes of Operation<br />
• FIPS PUB 198 - The Keyed-hash Message Authentication Code<br />
• FIPS 197 – Advanced Encryption St<strong>and</strong>ard (AES)<br />
1.4 DOCUMENT CONVENTIONS<br />
This document is divided into sections <strong>and</strong> appendices. The document body (all sections) is normative (except for<br />
italicised text); each appendix is identified as in its title as normative or informative.<br />
Text formatted in italics is not part of the specification. It is for clarification only.<br />
Binary numbers are indicated by the prefix 0b followed by the binary digits, for example, 0b0101. Hexadecimal<br />
numbers are indicated by the prefix 0x.<br />
Formal requirements are indicated with ‘shall’ in the main body of this document.<br />
Options are indicated with ‘may’ in the main body of this document. If an option is incorporated in an<br />
implementation, it shall be done as specified in this document.<br />
⎡⎤ ⋅ denotes rounding to the closest higher or equal integer<br />
Submission page 20 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
⎣⎦ ⋅ denotes rounding to the closest lower or equal integer<br />
1.5 DEFINITIONS<br />
Active slave An Active slave regularly gets transmission opportunities via the reception of<br />
data tokens from its master.<br />
Bridge port Ports of the bridging block. There are three types of bridge ports: BPL ports,<br />
non-BPL ports <strong>and</strong> the management port. BPL ports are the bridge ports that<br />
are directly mapped onto the completed entries of the Port Solver Table. Non-<br />
BPL ports are any other external ports of the node (e.g. Ethernet, USB,<br />
WIFI,…). The management port is used for the exchange of management<br />
messages between the bridging block <strong>and</strong> the layer management.<br />
Bridging block A functional block which is placed above the convergence layer. This block<br />
makes uses of st<strong>and</strong>ard 802.1D bridging to perform a layer-2 interconnection<br />
between the bridge ports of a node.<br />
Broadcast A transmission that is addressed to all the units of a layer-2 Local Area<br />
Network. It corresponds to the transmission of an Ethernet frame with an<br />
Ethernet Broadcast Destination address. It might be carried over the broadcast<br />
port or can be transmitted consecutively over unicast ports.<br />
Broadcast port Specific LLC port which value is 127. Transmission over the broadcast port<br />
makes use of the HURTO modulation.<br />
Burst A <strong>MAC</strong> Service Data Unit passed to the <strong>MAC</strong> layer by the LLC layer. A Burst<br />
includes one or several complete or fragmented packets destined to the same<br />
port.<br />
Channel<br />
Estimation Frame<br />
A Channel Estimation MPDU which does not contain any data payload. A<br />
Channel Estimation Frame starts with a Token Announce followed by a<br />
specific sequence of symbols used for channel estimation. It is not terminated<br />
by a token.<br />
CPE A BPL unit which only behaves as a slave node.<br />
Data Payload Burst payload which is adaptive modulated or HURTO modulated, depending<br />
on the channel conditions.<br />
Submission page 21 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Delimiter A delimiter is a 22 byte block which is HURTO modulated over one single<br />
symbol. There are three types of delimiters: the Burst Header (LLC), the Token<br />
Announce <strong>and</strong> the Token (<strong>MAC</strong>).<br />
FDR A BPL unit which combines a HE <strong>and</strong> either a CPE or a TDR.<br />
FMN (Flow Master<br />
Node)<br />
Is the node that guarantees the QoS of a certain traffic flow. The QC shall be<br />
always the FMN of the highest service classs of the BPL cell.<br />
Frame An MPDU passed by the <strong>MAC</strong> layer to the <strong>PHY</strong> layer. It can be a regular<br />
MPDU or a Channel Estimation MPDU.<br />
HE A BPL unit which only behaves as a master node. It is the root of a BPL cell.<br />
Contrarily to a TDR, the master part of a HE is not linked to a slave part from<br />
which the right to communicate depends.<br />
Idle slave An Idle slave does not get any transmission opportunities from its master.<br />
However, it is regularly polled by its master. (see polling).<br />
Master A node responsible for controlling access of its slaves to the network.<br />
Message Management Protocol Data Units generated by the <strong>Layer</strong> Management block.<br />
Management messages are IEEE 802.3 SNAP encapsulated <strong>and</strong> provided to the<br />
bridging block before being subsequently transmitted onto the bridge ports.<br />
Management messages are either unicast or multicast. Multicast management<br />
messages are transmitted over the broadcast port using HURTO modulation.<br />
Unicast management messages are transmitted over the unicast port using the<br />
adequate mapping (adaptive or HURTO).<br />
Mode A mode is defined by a symbol type, a carrier center frequency <strong>and</strong> an optional<br />
power mask<br />
MPDU Mac Protocol Data Unit delivered by the <strong>MAC</strong> layer to the <strong>PHY</strong> layer. The<br />
<strong>MAC</strong> layer generates two kinds of MPDUs: regular MPDUs <strong>and</strong> Channel<br />
Estimation MPDUs. A Channel Estimation MPDU does not contain any data<br />
payload (see Channel Estimation Frame definition). A regular MPDU can<br />
contain zero, one or several bursts addressed to one or several ports. A regular<br />
MPDU starts with a Token Announce delimiter <strong>and</strong> is terminated by a Token<br />
delimiter. There are 6 types of regular MPDUs: data, polling, access, access<br />
reply, silence <strong>and</strong> non-returnable. The type of the regular MPDU corresponds<br />
to the type of the Token terminating the regular MPDU.<br />
Submission page 22 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Multicast A transmission that is addressed to a group of units of a LAN segment. It is<br />
making use of an Ethernet Multicast Destination address. It might be carried<br />
over port 127 using HURTO mode, consecutively over unicast ports or can be<br />
transmitted over native multicast ports.<br />
Node A logical element which implements this specification.<br />
Packet An LLC Service Data Unit passed by the Convergence layer to the LLC layer.<br />
Each Ethernet frame received from the Convergence layer is converted into<br />
one single packet.<br />
<strong>PHY</strong>-signal <strong>PHY</strong>-signals are specific signals used as PPDU headers. <strong>PHY</strong>-signals include<br />
the SOT, SYNC <strong>and</strong> CREF signals.<br />
BPL cell A set of units composed by a HE <strong>and</strong> the units under the direct or indirect<br />
control of that HE. A BPL cell is operating under the same symbol type <strong>and</strong> the<br />
same carrier center frequency.<br />
BPL subcell A set of units composed by a master <strong>and</strong> the units under the direct control of<br />
that master<br />
BPL sub-tree A set of units composed by a TDR <strong>and</strong> the units under the direct or indirect<br />
control of that TDR.<br />
Polling Process under which a master regularly checks the status of its Idle slaves<br />
(CPEs or TDRs) . There are four types of polling identified by the type of the<br />
polling token. By using the Alive polling token, the master can detect if a slave<br />
is not connected anymore (Unregistered slave). By using the Active polling<br />
token, the master can detect if a slave is requiring transmission opportunities of<br />
a service class different from 7 (Active slave). In a similar way, using the Alive<br />
polling token, the TDR can detect if its own slave is not connected anymore<br />
(Unregistered slave). By using the Active polling token, the TDR can detect if<br />
its own slave is requiring transmission opportunities of a service class different<br />
from 7 (Active slave).,<br />
Port LLC 7-bit address identifier. Communication between node A <strong>and</strong> B requires<br />
opening a Local Port on node A <strong>and</strong> B. The Local Port on node A is defined as<br />
the Remote Port on node B <strong>and</strong> vice-versa. Transmission is performed onto a<br />
Local Port whereas reception is performed from a Remote Port. From a<br />
receiver st<strong>and</strong>point, a Remote Port is not unique: a remote node is uniquely<br />
identified by its Remote Port <strong>and</strong> its <strong>MAC</strong> address. Port entries are managed<br />
via the Port Solver Protocol <strong>and</strong> the Announce Messages. Port 127 is used as<br />
the broadcast port. Authorized port values are 9 to 126.<br />
Submission page 23 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Port Solver Table Addressing table used by the LLC layer. It contains entries with the association<br />
between <strong>MAC</strong> addresses of the distant nodes <strong>and</strong> ports. The entries are<br />
complete when both the local <strong>and</strong> first remote ports are assigned or incomplete<br />
when only the local port is assigned <strong>and</strong> the remote port is set to 0xFF. A<br />
second remote port is also available to perform native multicast transmissions<br />
QC (QoS<br />
<strong>Control</strong>ler)<br />
QC is the node that distributes the access to the channel among all the nodes<br />
present in a PLC cell, sharing the same NID or not. It can be defined as the<br />
master of the PLC cell. Any node can become a QC. The QC cannot be fixed<br />
by the user <strong>and</strong> it is decided by the nodes. The QC shall be the FMN of the<br />
high priority data traffic of the BPL cell.<br />
Registered slave A slave whose access to the network has been authorized via the <strong>Access</strong><br />
Protocol. A Registered slave can be Active or Alive.<br />
REP Refers to either TDR or FDR<br />
Slave A node for which transmission opportunities are controlled by its master.<br />
These transmission opportunities are specified as Validity Periods carried in<br />
some specific tokens delivered by the master. Slaves which are part of a TDR<br />
can delegate these transmission opportunities to their associated internal master<br />
(see TDR definition).<br />
SOT A specific <strong>PHY</strong>-signal which starts all PPDUs. It is also used as a positive<br />
acknowledgement of a polling request.<br />
Spatial reuse A feature which enables simultaneous node transmissions within non<br />
interfering BPL sub-trees of a single BPL cell. This feature relies on the nonreturnable<br />
token <strong>and</strong> the Cluster Discovery Protocol<br />
OFDM Symbol Transmitted signal for that portion of time when the modulating amplitude <strong>and</strong><br />
phase state is held constant on each of the equally-spaced subcarriers in the<br />
signal.<br />
Symbol type One from three different kinds of OFDM symbol, according to its duration.<br />
TDR A BPL unit made of both an internal master part <strong>and</strong> a slave part which never<br />
operate at the same time. A TDR behaves either as a master or as a slave at<br />
different time periods. Contrarily to a HE, the master part of a TDR is not a<br />
permanent master which has permanent control of its transmission<br />
opportunities. The right to communicate of the master part of a TDR depends<br />
on the Validity Period assigned to its associated slave part.<br />
Submission page 24 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Tonemap Table that contains the amount of bits that shall be transmitted by each<br />
subcarrier.<br />
Token The token is the <strong>MAC</strong> delimiter which terminates a regular MPDU. There are<br />
ten types of tokens: data <strong>and</strong> distributor token are used to propose transmission<br />
opportunities to one or more distant node, access/access reply tokens are used<br />
to discover Unregistered slaves, polling <strong>and</strong> TDR token are used for the slave<br />
<strong>and</strong> TDR states polling respectively, non-returnable token is used for allocating<br />
simultaneous transmission opportunities to several slaves (spatial reuse),<br />
silence token is used for sending a regular MPDU <strong>and</strong> keeping control of the<br />
medium after the transmission of this MPDU, CSMA token allow the priorized<br />
contention for the following transmission to every node that demodulate it, <strong>and</strong><br />
clock token allow the synchronization in time of every node in the BPL cell.<br />
Unicast A transmission that is addressed to a unique recipient.<br />
Unregistered slave An Unregistered slave is not managed by any master. A master can detect such<br />
slaves via the exchange of an access frame <strong>and</strong> an access reply frame.<br />
Visibility From a node to another node, when the first node is able to demodulate the<br />
token announce sent by the second node.<br />
Word A data unit of 32-bits<br />
1.6 ABBREVIATIONS AND ACRONYMS<br />
4D Four Dimensional<br />
AAA Authorization – Authentication – Accounting<br />
ABLP Adaptive Bit-Loading Protocol<br />
ABR Available Bit Rate<br />
ACK ACKnowledge<br />
Submission page 25 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
AFE Analogue Front End<br />
AGC Automatic Gain <strong>Control</strong><br />
ANSI American National St<strong>and</strong>ards Institute<br />
APL Aggregated Payload Length<br />
ARQ Automatic Repeat Request<br />
ARP Address Resolution Protocol<br />
ATM Asynchronous Transfer Mode<br />
BE Best Effort<br />
BER Bit Error Rate<br />
BH Burst Header<br />
BNDA Border Node Designation Acknowledge<br />
BNDP Border Node Designation Protocol<br />
BPC Bits Per subCarrier<br />
BPDU Bridge Protocol Data Unit<br />
BPS Bits Per Symbol<br />
CAC Connection Admission <strong>Control</strong><br />
CBR Constant Bit Rate<br />
CCITT Comité Consultatif International Téléphonique et Télégraphique<br />
Submission page 26 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
CDP Cluster Discovery Protocol<br />
CLPDU Convergence <strong>Layer</strong> Protocol Data Unit<br />
CP Cyclic Prefix<br />
CPE Customer Premises Equipment<br />
CRC Cyclic Redundancy Check<br />
CSM Class of Service Monitor<br />
CTS Clear To Send<br />
CW CodeWord<br />
DAC Digital to Analogue Converter<br />
DES Data Encryption St<strong>and</strong>ard<br />
DS DownStream<br />
DSP Digital Signal Processing<br />
EMC Electromagnetic Compatibility<br />
FCMP Fair Congestion Management Policy<br />
FEC Forward Error Correction<br />
FIPS Federal Information Processing St<strong>and</strong>ards<br />
FFT Fast Fourier Transform<br />
FTP File Transfer Protocol<br />
Submission page 27 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
FMN Flow Master Node<br />
FW Firmware<br />
HE Head End<br />
HURTO High Ultra Reliable Transmission for Ofdm<br />
IEEE Institute of Electrical <strong>and</strong> Electronics Engineers<br />
ICI Inter Carrier Interference<br />
IDFT Inverse Discrete Fourier Transform<br />
IDP Interference Detection Packet<br />
IQ In-phase <strong>and</strong> Quadrature<br />
ISI Inter Symbol Interference<br />
ISO International Organization for St<strong>and</strong>ardization<br />
LLC Logical Link <strong>Control</strong><br />
LP Local Port<br />
LPDU LLC Protocol Data Unit<br />
LSB Least Significant Byte<br />
LSDU LLC Service Data Unit<br />
LV Low Voltage<br />
<strong>MAC</strong> Media <strong>Access</strong> <strong>Control</strong><br />
Submission page 28 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
MIC Message Integrity Check<br />
MID Master Identification<br />
MPDU <strong>MAC</strong> Protocol Data Unit<br />
MSB Most Significant Byte<br />
MSDU <strong>MAC</strong> Service Data Unit<br />
MTU Maximum Transfer Unit<br />
MV <strong>Medium</strong> Voltage<br />
OFDM Orthogonal Frequency Division Multiplexing<br />
OPERA Open PLC European Research Alliance<br />
CCP Communication <strong>Control</strong> Protocol<br />
OSI Open Systems Interconnection<br />
OUI Organizationally Unique Identifier<br />
OVLAN Optimized VLAN<br />
PAP Packet ACK Protocol<br />
PAR Peak to Average Ratio<br />
PBPS <strong>Physical</strong> Bits Per Symbol<br />
PCMP Priority Congestion Management Policy<br />
PDU Protocol Data Unit<br />
Submission page 29 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
<strong>PHY</strong> <strong>PHY</strong>sical layer<br />
BPL BPL Communications<br />
PN Pseudo Noise<br />
PPDU <strong>Physical</strong> Protocol Data Unit<br />
PSD Power Spectral Density<br />
PST Port Solver Table<br />
QC QoS <strong>Control</strong>ler<br />
QoS Quality of Service<br />
REP Repeater<br />
RP Remote Port<br />
RS Reed Solomon<br />
RTS Request To Send<br />
RX Reception<br />
SNAP SubNetwork <strong>Access</strong> Protocol<br />
SNR Signal to Noise Ratio<br />
SLA Service Level Agreement<br />
SOT Start of Transmission<br />
STP Spanning Tree Protocol<br />
Submission page 30 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
TA Token Announce<br />
TCM Trellis Coded Modulation<br />
TCP Transfer <strong>Control</strong> Protocol<br />
TDD Time Division Duplexing<br />
TDMA Time Division Multiple <strong>Access</strong><br />
TDR Time Division Repeater<br />
TO TimeOut<br />
TX Transmission<br />
UDP User Datagram Protocol<br />
UPA Universal BPL Association<br />
US UpStream<br />
VBR Variable Bit Rate<br />
VLAN Virtual Local Area Network<br />
VoIP Voice over IP<br />
2 GENERAL DESCRIPTION<br />
An access BPL network consists of a number of user terminals (CPEs) that transmit/receive traffic in a shared<br />
medium to/from a centralized station (HE). If the signal is too attenuated to reach all CPEs from the same HE,<br />
repeaters (REP) can be inserted in the network in order to retransmit the signal <strong>and</strong> thus increase the coverage.<br />
Repeaters can be either TDR or FDR. From this description, the type of topologies to be found in BPL access<br />
Submission page 31 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
networks are tree-like topologies, like the one depicted in Figure 1, where a central node, called a HE,<br />
concentrates all of the upstream <strong>and</strong> downstream traffic, although other topologies, as the ring shape topologies,<br />
are also common. All kinds of structures in <strong>Medium</strong> Voltage (MV) <strong>and</strong> Low Voltage (LV) can be reduced to a<br />
HE plus Repeaters structure.<br />
CPE<br />
REP<br />
CPE<br />
HE<br />
Submission page 32 UPA-OPERA<br />
REP<br />
CPE CPE<br />
Figure 1 Typical <strong>Access</strong> Scenario<br />
2.1 GENERAL DESCRIPTION OF THE ARCHITECTURE<br />
2.2 NODE DESCRIPTION<br />
A BPL network can be made either of:<br />
• one BPL cell,<br />
• several BPL cells if they are interconnected via Frequency Division repeaters (FDR). FDR are made of<br />
a combination of one HE <strong>and</strong> one CPE or TDR operating in different modes.<br />
In an access BPL network, there is usually one HE, placed in the MV/LV substation, that concentrates the<br />
upstream <strong>and</strong> downstream traffic from/to all the CPEs of all the connected BPL cells.<br />
CPE<br />
HE<br />
REP<br />
REP<br />
REP<br />
CPE
4-June-07 P1901_PRO_016_r0<br />
A BPL cell is composed from a <strong>Medium</strong> <strong>Access</strong> <strong>Control</strong> point of view by a HE <strong>and</strong> the set of units (CPEs or<br />
TDRs) under the direct or indirect control of that HE operating under the same symbol type <strong>and</strong> the same carrier<br />
frequency. Itis composed of:<br />
1. One HE<br />
2. From zero to several TDRs<br />
3. One (or several) CPE(s)<br />
To gguarantee the required performance in terms of Quality of Service, the nodes can be also divided in three<br />
types by means of their function to assure the Quality of Service: QoS <strong>Control</strong>lers (QCs), assumed to be a HE in<br />
a typical BPL cell, Flow Master Nodes (FMN), that are the nodes that assures the resources needed by a certain<br />
class of service traffic flow, <strong>and</strong> End Points that have no management tasks regarding QoS assurance. The QCs<br />
are also the FMN of the higest service class in the BPL cell. More information about QoS can be found in<br />
section 8.<br />
2.2.1 HE<br />
The HE is the central node that controls the entire BPL cell. It assigns resources to all nodes of the BPL cell<br />
through the use of the token, according to the QoS requirements of the flows circulating on the BPL cell. The<br />
HE will always be the master of any node directly connected to it.<br />
2.2.2 Time Division Repeaters<br />
A TDR is used to increase the coverage in areas too far from the cell’s HE. TDRs are connected to the HE or to<br />
other TDRs that act as their master node. TDRs share the channel allocated to them by their master node <strong>and</strong><br />
distribute it among their slave nodes according to the traffic flows <strong>and</strong> service classes in the BPL cell <strong>and</strong> the<br />
origin <strong>and</strong> destination of them. The TDR will be the slave of the HE or of another TDR, <strong>and</strong> will be the master<br />
of its slaves.<br />
2.2.3 CPE<br />
CPEs are BPL units installed in the customer’s household. A CPE must subscribe to the network before being<br />
able to access the channel. Subscribing to the network means selecting a master node that assigns channel<br />
access time. In order to subscribe to the network, a validation process is run that acknowledges that the CPE is<br />
valid. After being accepted into the network, the CPE automatically downloads a file (auto-configuration<br />
process) detailing the parameters to use, such as the user profile <strong>and</strong> other configuration parameters. The CPE is<br />
always a slave.<br />
2.3 <strong>MAC</strong> overview<br />
In an IEEE P1901 pre-established network the access to the channel is managed in a hierarchical way. The HE<br />
(that is usually the QC <strong>and</strong> the FMN for the higest service class) schedules the use of the channel by its slaves<br />
depending on the current traffic flows <strong>and</strong> its previously accepted QoS requirements. The access to the channel<br />
can be managed by the HE using two main procedures.<br />
Submission page 33 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
1. Sending indidually to each of the slaves a data or distributor frame, containg data from the HE to the slaves<br />
<strong>and</strong> finished by a token that contains the next slave or list of slaves that shall use the channel when the first<br />
transmission is finished in a predetermined order. The amount of channel time assigned by the HE <strong>and</strong> can<br />
be fixed for a timing interval or not. In the first case the channel allocation can be synchronous with the<br />
mains or not. In the second case if a node does not use the entire assigned time, the right to transmit is<br />
immeadiately given to the following node in the list or returned to the HE.:<br />
2. Sending a CSMA token, that opens a priorized contention among the nodes that receive it. The winner of<br />
the contention shall obtain the right to transmit for the given amount of time, <strong>and</strong> then, the right to transmit<br />
is returned to the HE.<br />
By means of the first procedure, a timing interval can be programmed where different slaves can allocate their<br />
transmissions.<br />
2.4 QoS overview<br />
IEEE P1901 provides various mechanisms to assure the QoS of the traffic flows in the BPL cell. Traffic flows<br />
are session oriented <strong>and</strong> tagged with certain service class that implies certain requirements in terms of latency<br />
<strong>and</strong> b<strong>and</strong>with, jointly with a requirement in terms of level of assurance of the reserved resources.<br />
A slave requiring to transmit certain type of traffic shall first classify it in one of the eight available service<br />
classes, each one with a preprogrammed latency, b<strong>and</strong>width <strong>and</strong> level of assurance of the required resources,<br />
that can be Variable Bit Rate (VBR), Constant Bit Rate (CBR), Available Bit Rate (ABR) or Best Effort. The<br />
mapping from Service Classes to the B<strong>and</strong>with, Latency <strong>and</strong> Type of Traffic is common <strong>and</strong> known by all<br />
nodes in the BPL cell.<br />
Then, by means of the Connection Admission <strong>Control</strong> (CAC) protocol, the requirements to transmit the traffic<br />
flow are solicited to the Flow Master Node of this service class, <strong>and</strong> can be accepted <strong>and</strong> a session ID shall be<br />
assigned to it, or rejected.<br />
In the case where the maximum capacity of the channel is reached, several congestion policies can be applied<br />
by the QC <strong>and</strong> FMNs to admit, reject or drop current sessions in the BPL cell (See 8.3).<br />
2.5 Security overview<br />
IEEE P1901 specification provides a state-of-art security mechanism including CTR 128 bits AES encryption<br />
with individual key for each CLPDU or fragment of CLPDU, integrity mechanisms by means of CBC 128 bits<br />
AES also performed individually for each CLPDU or fragment CLPDU, integrity protection of <strong>MAC</strong> addess,<br />
RADIUS <strong>and</strong> 802.1X based key distribution <strong>and</strong> AAA protocol, etc.<br />
Recommendations from 802.11i st<strong>and</strong>ard have been specially taken into account to design the security<br />
specification of IEEE P1901. More details are disclosed in section 10.<br />
Submission page 34 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
2.6 NETWORK REFERENCE MODEL<br />
This specification defines <strong>PHY</strong>, <strong>MAC</strong>, LLC <strong>and</strong> Convergence <strong>Layer</strong> functionality as well as minimal bridging<br />
requirements to be supported by all compliant implementations. It also defines layer management functions.<br />
Finally, it also contains specifications for Security <strong>and</strong> Configuration, including MIBs <strong>and</strong> autoconfiguration<br />
issues.<br />
Figure 2 System Reference Model<br />
Submission page 35 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
This document specifies Packet Management, LLC, <strong>MAC</strong> <strong>and</strong> <strong>PHY</strong> behaviour. End-to-end services are<br />
provided by protocol layers not specified in this document.<br />
At an application level the system appears as a black box between information packet interfaces <strong>and</strong> the BPL.<br />
The Bridging function is m<strong>and</strong>atory <strong>and</strong> described in section 7. From a bridging st<strong>and</strong>point, the layer<br />
management block is connected to the bridging function via a management port. The Convergence <strong>Layer</strong> is<br />
seen as a set of BPL ports.<br />
The Convergence layer performs the Ethernet Frame to Packet conversion. This function performs the<br />
conversion between Ethernet II/802.3 frames (802.1 p/q tagged or untagged) <strong>and</strong> 32-bit aligned packets. On the<br />
transmission path, the converter also sets the priority <strong>and</strong> the OVLAN tag, if needed. The Broadcast/Multicast<br />
h<strong>and</strong>ling is also done at this level.<br />
The LLC layer provides peer convergence layers with the ability to exchange LLC service data units<br />
(LSDUs=packets). Given a maximum size constraint on the LPDU payload provided by the layer management,<br />
the LLC segments <strong>and</strong>/or groups packets into LPDU payloads (burst payloads) to be transferred over the same<br />
transmission port. When several packets are present within a burst payload, inter-packets headers are appended.<br />
In relation with the layer management, the LLC also deals with encryption/decryption of burst payloads. The<br />
LLC will append the burst header to a burst payload.<br />
The <strong>MAC</strong> layer provides peer LLC layers with the ability to exchange <strong>MAC</strong> service data units<br />
(MSDUs=LPDUs=burst). On the transmission path, the <strong>MAC</strong> layer performs the grouping of bursts=MSDU<br />
into an MPDU. The <strong>MAC</strong> layer also provides the layer management with the ability to generate specific<br />
MPDUs=frames for performing background tasks: silence management, channel estimation, node status polling<br />
<strong>and</strong> node discovery. The <strong>MAC</strong> layer h<strong>and</strong>les 7 types of frames (data, silence, channel estimation, polling,<br />
access, access reply <strong>and</strong> non-returnable data). All these frames start with a token announce delimiter. Except for<br />
the channel estimation frame, all the other frames are terminated with a token delimiter which content depends<br />
on the type of the frame.<br />
The <strong>PHY</strong> layer performs the OFDM modulation <strong>and</strong> the digital signal processing (DSP) needed to transmit the<br />
MPDU over the BPL channel. It also adds the FEC redundancy.<br />
3 <strong>PHY</strong><br />
This section specifies the <strong>Physical</strong> <strong>Layer</strong> Entity for an Orthogonal Frequency Division Multiplexing (OFDM)<br />
system. OFDM has been chosen as the modulation technique because of its inherent adaptability in the presence<br />
of frequency selective channels, its resilience to jammer signals, its robustness to impulsive noise <strong>and</strong> its<br />
capacity of achieving high spectral efficiencies.<br />
Submission page 36 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
3.1 OVERVIEW<br />
The diagram in Figure 3 shows an example <strong>PHY</strong> layer of a transmitter.<br />
On the transmitter side, the <strong>PHY</strong> layer receives its inputs from the Media <strong>Access</strong> <strong>Control</strong> <strong>Layer</strong>. Two separate<br />
bit streams are shown because of the different encoding for data <strong>and</strong> control information. The delimiters shall be<br />
interleaved by the <strong>Control</strong> Interleaving block <strong>and</strong> mapped by the HURTO Mapping block; while the data stream<br />
shall be mapped using the HURTO Mapping block or the Adaptive Mapping block, depending on the reliability<br />
level required for the transmission. The outputs of both Mapping blocks lead into the Scrambler, which is<br />
followed by 4D-TCM (Four Dimensional Trellis Coded Modulation) encoding. The next step is the OFDM<br />
Modulation, which is composed of the Subcarrier Modulator, the IDFT (Inverse Discrete Fourier Transform),<br />
the Cyclic Prefix generator <strong>and</strong> the symbol windowing operation structure. The resulting digital signal is<br />
converted to an analog signal by means of a DAC <strong>and</strong> IQ modulated, before passing to the amplifying <strong>and</strong><br />
filtering stages.<br />
Delimiters<br />
Data<br />
payload<br />
CRC<br />
Data<br />
Reed-Solomon<br />
Encoder<br />
<strong>Control</strong><br />
Reed-Solomon<br />
Encoder<br />
<strong>Control</strong><br />
Interleaving<br />
3.2 <strong>PHY</strong> LAYER FRAME<br />
Adaptive<br />
Mapping<br />
HURTO<br />
Mapping<br />
Subcarrier<br />
Cyclic<br />
Scrambler 4D TCM<br />
IDFT<br />
Window<br />
Modulator<br />
Prefix<br />
Power Line<br />
Figure 3 Transmission <strong>PHY</strong> layer<br />
Figure 4 shows the symbols that are transmitted in a PPDU.<br />
Submission page 37 UPA-OPERA<br />
DAC<br />
IQ mod<br />
Amplifiers<br />
Filters
4-June-07 P1901_PRO_016_r0<br />
SOT<br />
Synchronization<br />
symbol<br />
Channel reference<br />
symbol<br />
maximum 243 symbols<br />
Figure 4 PPDU<br />
<strong>Control</strong> <strong>and</strong> data<br />
symbols<br />
The maximum duration of a PPDU is 243 symbols (counting from the synchronization symbol to the last<br />
symbol of the frame). A receiver shall be able to h<strong>and</strong>le a maximum duration PPDU.<br />
The gap between the last non-zero sample of the SOT <strong>and</strong> the first non-zero sample of the synchronization<br />
symbol shall be 2.75 ± 0.25 µs.<br />
The time between two consecutive PPDUs is fixed <strong>and</strong> known by all modems as the INTER PPDU SPACE 1<br />
(see 3.11 <strong>and</strong> 4.6). Only when scheduling the token by means of a Distributor Frame, the time can be reduced<br />
<strong>and</strong> is called INTER PPDU SPACE 2 (see 3.11 <strong>and</strong> 4.6).<br />
3.3 FORWARD ERROR CORRECTION<br />
3.3.1 Delimiters<br />
There are several types of delimiters that will be explained in 4.4 <strong>and</strong> 5.2. Delimiters are mapped to one OFDM<br />
symbol, so they will always have the same size.<br />
Three main calculations will be made over a delimiter as is shown in Figure 5.<br />
3.3.1.1 CRC-CCITT<br />
176 bits 192 bits 288 bits Frame 288 bits<br />
RS (12,8)<br />
CRC-16<br />
control<br />
Encoder<br />
Interleaver<br />
Figure 5 Delimiter encoding<br />
A CRC-CCITT is applied to the incoming 176 bits length delimiter applying the polynomial generator:<br />
Submission page 38 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
16 12<br />
g ( x)<br />
= x + x + x<br />
Equation 1<br />
The CRC check called CRC(x), can be obtained as the remainder of the division between I(x)*x16 <strong>and</strong> g(x),<br />
where I(x) is a binary coefficients polynomial given by:<br />
Therefore the CRC is expressed as:<br />
The resulting frame will be:<br />
Submission page 39 UPA-OPERA<br />
5<br />
+ 1<br />
I +<br />
175<br />
174<br />
2<br />
( x)<br />
= I 175 x + I 174 x + .... + I 2 x + I 1 x I 0<br />
Equation 2<br />
CRC +<br />
15<br />
14<br />
( x)<br />
= CRC15<br />
x + CRC14<br />
x + .... + CRC1x<br />
CRC0<br />
Equation 3<br />
16<br />
191 190<br />
18 17 16<br />
15<br />
T ( x)<br />
= I(<br />
x)<br />
x + CRC(<br />
x)<br />
= I175x<br />
+ I174<br />
x + .... + I 2 x + I1x<br />
+ I 0 x + CRC15x<br />
+ ... + CRC0<br />
Equati<br />
on 4<br />
A total of sixteen bits resulting from the CRC algorithm are then appended to the delimiter.<br />
The transformation is shown in the following figure:<br />
I 175 I 174 I 2 I 1 I 0<br />
I 175 I 174 I 2 I 1 I 0 CRC 15 CRC 0<br />
Figure 6 Delimiter CRC
4-June-07 P1901_PRO_016_r0<br />
3.3.1.2 Reed-Solomon Delimiter Coding<br />
Delimiters are composed by six RS codewords from (n=12,k=8,t=2) RS code.<br />
Four (n-k=4) parity symbols p3, p2, p1, p0 shall be appended to k=8 message symbols m7, m6, … , m0 to form a<br />
Reed-Solomon codeword m7, m6, … , m0, p3, p2, … , p0, where symbol m7 is the first four bits symbol in time<br />
out of the Reed-Solomon encoder. Each RS symbol is composed of four bits.<br />
The parity symbols shall be computed from the message symbols using the Equation 5:<br />
Where the message polynomial is:<br />
RS ( x)<br />
= M ( x)<br />
x<br />
mod g(<br />
x)<br />
Submission page 40 UPA-OPERA<br />
4<br />
Equation 5<br />
M +<br />
7 6<br />
( x)<br />
= m7<br />
x + m6x<br />
+ ... + m1x<br />
m0<br />
Equation 6<br />
The parity symbols are expressed as the following polynomial;<br />
RS +<br />
3 2<br />
( x)<br />
= p3x<br />
+ p2x<br />
+ p1x<br />
p0<br />
Equation 7<br />
The field generator binary polynomial that generates each RS symbol is given by:<br />
And the code generator polynomial is given by:<br />
4<br />
f ( x)<br />
= x + x + 1<br />
Equation 8
4-June-07 P1901_PRO_016_r0<br />
1<br />
2<br />
3<br />
4<br />
g ( x)<br />
= ( x −α<br />
)( x −α<br />
)( x −α<br />
)( x −α<br />
)<br />
Equation 9<br />
The RS binary symbol representation for delimiters of α 0 is 0b0001, where the left most bit of this RS symbol is<br />
the most significant bit (MSB). This way, the binary representation of each of the redundancy symbols<br />
generated on the Galois field GF(2 4 ) denoted as p3, p2, p1, p0 will be represented as RSX15, RSX14, RSX13, <strong>and</strong><br />
RSX12 for the symbol p3, RSX11, RSX10, RSX9, <strong>and</strong> RSX8 for the symbol p2, RSX7, RSX6, RSX5, <strong>and</strong> RSX4 for the<br />
symbol p1 <strong>and</strong> RSX3, RSX2, RSX1, <strong>and</strong> RSX0 for the symbol p0, where X denotes the RS codeword number.<br />
The following figure shows the final binary level representation of the delimiter:<br />
I 175 I 174 I 144 RS1 15 RS1 0<br />
I143 I142 I112 RS215 RS20 I 15<br />
I 14<br />
CRC 0 RS6 15 RS6 0<br />
Figure 7 Reed Solomon bit format<br />
The first bit to be transmitted is the leftmost of the first codeword (I175), followed by the rest of the bits of the<br />
RS codeword. Then, the second codeword, <strong>and</strong> so on. This is illustrated in<br />
175<br />
174<br />
3.3.1.3 Delimiter Interleaving<br />
I<br />
I<br />
... RS1<br />
I ... RS2<br />
I ....... RS5<br />
I ... RS6<br />
0<br />
143<br />
Submission page 41 UPA-OPERA<br />
0<br />
111<br />
Figure 8 Reed Solomon bit order<br />
After RS encoding, the six resulting RS codewords shall be interleaved with interleaving depth of six RS<br />
codewords <strong>and</strong> 4 bits granularity, in such a way that the first four bits of each RS codeword shall be sent first to<br />
the interleaver, then, the second 4 bits of each of the six RS codewords <strong>and</strong> so on. We can group the bits in<br />
nibbles for clarity:<br />
0<br />
15<br />
0
4-June-07 P1901_PRO_016_r0<br />
Figure 9 illustrates this interleaving<br />
N<br />
63<br />
N<br />
N<br />
N<br />
1<br />
0<br />
= ( I<br />
N 64 = ( I147<br />
, I<br />
= ( RS1<br />
, RS1<br />
60<br />
N 71 N 70 N 61 N 60<br />
N 59 N 58 N 49 N 48<br />
N 11 N 10 N 1 N 0<br />
N<br />
71<br />
15<br />
:<br />
= ( RS1<br />
, RS1<br />
, RS1<br />
, RS1<br />
)<br />
= ( RS6<br />
, RS6<br />
, RS6<br />
, RS6<br />
)<br />
7<br />
= ( RS6<br />
, RS6<br />
, RS6<br />
, RS6<br />
)<br />
Submission page 42 UPA-OPERA<br />
3<br />
175<br />
3<br />
, I<br />
:<br />
:<br />
174<br />
146<br />
14<br />
6<br />
2<br />
2<br />
, I<br />
Equation 10<br />
173<br />
, I<br />
)<br />
, I145,<br />
I144<br />
)<br />
, RS1<br />
, RS1<br />
13<br />
1<br />
5<br />
1<br />
172<br />
Figure 9 Frame control interleaving<br />
0<br />
12<br />
4<br />
0<br />
)<br />
N 71 N 59 N 23 N 11<br />
N 70 N 58 N 22 N 10<br />
N 60 N 48 N 12 N 0<br />
With reference to the right half of Figure 9 the transmission order is row-wise, starting with the first row <strong>and</strong><br />
from left to right, then the second row, <strong>and</strong> so on. In other words, the MSB of N71 will be the first to be<br />
transmitted, after N71, the next will be N59, <strong>and</strong> N0 will be last.<br />
3.3.2 Data payload<br />
The data payload, delimited by a burst header, shall be encoded by a variable rate 8-bit symbol Reed Solomon<br />
encoder. The RS data mode is set from the fields “FEC redundancy” <strong>and</strong> “FEC payload” of the burst header.<br />
The “FEC redundancy” value will determine which of the four RS data modes is used. The generator<br />
polynomial <strong>and</strong> redundancy of each of the available modes is given in Table 1:<br />
RS data mode g(x) RS data code
4-June-07 P1901_PRO_016_r0<br />
0 2<br />
3<br />
8<br />
g ( x)<br />
= ( x −α<br />
)( x −α<br />
)( x −α<br />
)...( x −α<br />
) (k0+8,k0,t=4)<br />
1 2<br />
3<br />
12<br />
g ( x)<br />
= ( x −α<br />
)( x −α<br />
)( x −α<br />
)...( x −α<br />
) (k1+12, k1,t=6)<br />
2 2<br />
3<br />
16<br />
g ( x)<br />
= ( x −α<br />
)( x −α<br />
)( x −α<br />
)...( x −α<br />
) (k2+16, k2,t=8)<br />
3 2<br />
3<br />
20<br />
g ( x)<br />
= ( x −α<br />
)( x − α )( x −α<br />
)...( x − α )<br />
Table 1 RS data polynomials<br />
(k3+20, k3,t=10)<br />
The “FEC payload” field in each burst header contains the number of 32-bit words that will be coded per RS<br />
codeword, <strong>and</strong> therefore determines the amount of payload bytes per codeword (ki).<br />
Maximum <strong>and</strong> minimum value for this field is given depending on the mode in Table 2:<br />
RS data<br />
mode<br />
Redundancy<br />
words<br />
Max payload in words<br />
Min payload in words<br />
HURTO Adaptive<br />
0 2 61 2 34<br />
1 3 60 3 33<br />
2 4 59 4 32<br />
3 5 58 5 31<br />
Table 2 RS data payload<br />
Each data payload shall be coded following a different RS coding scheme that will be configured in each Burst<br />
header. The selected coding scheme is a shortened Reed-Solomon code that can be processed as a systematic<br />
RS(255, 255-2*ti,ti) by adding 255-(ki+2ti) bytes set to zero before the information bits. After the RS coding<br />
procedure these null bytes shall be discarded, leading to RS codewords of n = ki+2t bytes<br />
Submission page 43 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
When the data payload length is not an integer number of Reed-Solomon codewords, the last Reed Solomon<br />
codeword will have a special coding given by the formula:<br />
[ ( 4*<br />
APL)<br />
mod( k + 2*<br />
t)<br />
] − 2t<br />
klastcw =<br />
i<br />
Equation 11<br />
Where APL is the data payload length in number of 32-bit words including RS coding parity bits.<br />
For the last codeword, no minimum value in k is applied.<br />
The incoming data payload shall be grouped in L groups of ki bytes, where ki has been taken from the “FEC<br />
payload” field in burst header, <strong>and</strong> a last group of klastcw bytes, calculated from Equation 11, as can be seen in<br />
the following figure:<br />
L Blocks<br />
I L*ki+klastcw-1 I L*ki+klastcw-2 I (L-1)*ki+klastcw RS1 2*t-1 RS1 0<br />
I (L-1)*ki+klastcw-1 I (L-1)*ki+klastcw-2 I (L-2)*ki+klastcw RS2 2*t-1 RS2 0<br />
I ki+klastcw-1 I ki+klastcw-2 I klastcw RSL 2*t-1 RSL 0<br />
I klastcw-1 I klastcw-2 I 0 RS(L+1) 2*t-1 RS(L+1) 0<br />
klastcw bytes<br />
k i bytes<br />
Figure 10 Reed Solomon byte grouping<br />
Submission page 44 UPA-OPERA<br />
2*t bytes<br />
2*t bytes
4-June-07 P1901_PRO_016_r0<br />
L is given by the formula:<br />
⎢<br />
L = ⎢<br />
⎣<br />
( ) ⎥ ki<br />
+ 2*<br />
t ⎦<br />
Submission page 45 UPA-OPERA<br />
4*<br />
APL<br />
Equation 12<br />
For each Reed-Solomon codeword, as in delimiter coding, (n-k) parity symbols pn-k-1, pn-k-2, … , p0 shall be<br />
appended to k message symbols mk-1, mk-2, … , m0 to form a Reed-Solomon codeword mk-1, mk-2, … , m0, pn-k-1,<br />
pn-k-2, … , p0, where symbol mk-1 is the first in time out of the Reed-Solomon encoder <strong>and</strong> the first in time of the<br />
uncoded data payload. Each of the symbols belongs to the Galois Field GF(2 8 ), <strong>and</strong> it is then represented in its<br />
binary form with eight bits. On the other h<strong>and</strong>, n <strong>and</strong> k variables depend on the selected RS data mode, taken<br />
from Table 1 <strong>and</strong> Table 2. The parity symbols shall be computed from the message symbols using the equation:<br />
Where<br />
Is the message polynomial,<br />
P<br />
M<br />
n−k<br />
P(<br />
x)<br />
= M ( x)<br />
x mod g(<br />
x)<br />
Equation 13<br />
k −1<br />
k −2<br />
( x)<br />
= mk<br />
− 1 x + mk<br />
−2<br />
x + ... + m1x<br />
+ m0<br />
Equation 14<br />
n−k<br />
−1<br />
n−k<br />
−2<br />
( x)<br />
= pn<br />
− k −1<br />
x + pn−<br />
k −2<br />
x + ... + p1x<br />
+ p0<br />
Equation 15<br />
Is the parity polynomial <strong>and</strong> g(x) is the code generator polynomial of the Reed-Solomon code, given by Table 1<br />
The field generator polynomial associated with the Reed-Solomon code is given by:<br />
8 4 3<br />
f ( x)<br />
= x + x + x + x<br />
Equation 16<br />
⎥<br />
2<br />
+ 1
4-June-07 P1901_PRO_016_r0<br />
The binary representation of α 0 is 0b00000001, where the left most bit of this RS symbol is the most significant<br />
bit (MSB).<br />
3.4 MAPPING MODES<br />
Once obtained a delimiter or a data payload, one from two different mapping procedures shall be used. The<br />
mapping mode is indicated with the field HURTO in the burst header (see section 5.2). HURTO mapping is<br />
fixed. Adaptive mapping will be done following a table (called bit-loading table) with information on how<br />
many coded bits will be allocated in each of the 1536 subcarriers in a symbol<br />
3.4.1 HURTO mapping<br />
HURTO mode shall be used in all delimiters <strong>and</strong> in the data payload if it is indicated in the HURTO field in the<br />
burst header.<br />
First, groups of 288 consecutive bits are made. Each of these groups is replicated eight times, in order to obtain<br />
groups of 2304 bits. The bit allocation table will be set to 2 bits per subcarrier for all the 1536 subcarriers of an<br />
OFDM symbol, <strong>and</strong> each resulting 2304 bits groups shall complete an entire OFDM symbol. 4D-TCM<br />
encoding will be done, with a reset in convolutional encoder each 288 incoming bits.<br />
In the data payload case with the HURTO bit set in the burst header, the last group will be completed with<br />
zeroes, if necessary.<br />
Submission page 46 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
<strong>Control</strong><br />
frame or<br />
HURTO<br />
data<br />
frame<br />
Frame after block coding.<br />
MSB is up.<br />
3.4.2 Adaptive mapping<br />
zero<br />
filling if<br />
needed<br />
288<br />
bits<br />
length<br />
Submission page 47 UPA-OPERA<br />
288<br />
bits<br />
length<br />
288<br />
bits<br />
length<br />
Number of groups will be one<br />
for control frame <strong>and</strong> no zero<br />
filling will be done. Transmission order<br />
will be up to down, MSB first.<br />
Figure 11 HURTO mapping<br />
Frame to encode by 4DTCM<br />
after scrambling<br />
2304bits<br />
length<br />
When the HURTO bit is unset in the burst header, the data payload will be mapped following the bit allocation<br />
table, which sets how many coded (after 4D-TCM) bits will be allocated in each subcarrier.<br />
When adaptive mapping is used, there must be at least 24 subcarriers with 2 or more information bits.
4-June-07 P1901_PRO_016_r0<br />
Normal<br />
Data<br />
Frame<br />
Frame after block<br />
coding. msb is up.<br />
Transmission order will be<br />
top to bottom, msb first.<br />
Figure 12 Adaptive mapping<br />
Submission page 48 UPA-OPERA<br />
BPS<br />
Bits<br />
Zero filling<br />
if needed<br />
BPS in the figure means the number of necessary data bits to fill an entire OFDM symbol with a certain bitloading.<br />
A mathematical expression of this definition is shown in Equation 17. The last symbol shall be padded<br />
with zeros before scrambling, if necessary, until an integer number of symbols is used.<br />
3.5 TRELLIS CODED MODULATION (4D-TCM)<br />
Once obtained a delimiter or data payload that will fill a integer number of OFDM symbols, a 16 state 4dimensional<br />
truncated trellis code is used for error correction. This code will be applied over groups of 1536<br />
subcarriers <strong>and</strong> reset each OFDM symbol, except in HURTO mode, where the 4D-TCM encoder will be reset<br />
each 192 subcarriers out, or, in other words, each 288 bits in.<br />
3.5.1 Bit Extraction<br />
Data bits from both delimiters <strong>and</strong> data payload shall be extracted according to a bit-loading table bj, with<br />
j=0…1535, righter bits first, in groups of z bits. In the case of HURTO mapping bj= 2 ∀j ∈ [0..1535]. Due to<br />
the constellation expansion associated with coding <strong>and</strong> the 4-dimensional nature of the code, zi will be<br />
calculated from a given pair (x,y) of two consecutive bj, where bj is the number of coded bits that subcarrier j<br />
will transmit.<br />
Due to the heavy impairments of the BPL channel, or regional regulations, some subcarriers can be set not to carry<br />
any information. This case is denoted with a bit loading bj = 0 for such subcarriers. When the two consecutive<br />
subcarriers x <strong>and</strong> y that form a symbol of the four dimensional code are set to zero, no bit extraction is performed,<br />
<strong>and</strong> the following pair of subcarriers is taken into account. On the other h<strong>and</strong>, when only one of the two subcarriers
4-June-07 P1901_PRO_016_r0<br />
is set to zero, a special bit extraction is performed to obtain the word called t’, including the insertion of two zeroes<br />
in position 0 <strong>and</strong> 2 of the final t’ word to be introduced in the codec. Similarly, when only one of the two subcarriers<br />
is set to one, the word t’ includes the insertion of one zero in position 2. If both subcarriers are set to one, the word<br />
t’ includes the insertion of two zeroes in position 0 <strong>and</strong> 2. Note that combinations of one subcarrier with 1 <strong>and</strong><br />
another subcarrier with 0 are not allowed.<br />
The extracted group will be noted as t’ <strong>and</strong> calculated from the following table:<br />
Condition Binary word/comment<br />
x ≥ 2 y ≥<br />
x = 0 y ≥<br />
x ≥ 2 y =<br />
x = 1 y ≥<br />
2<br />
2<br />
0<br />
2<br />
x ≥ 2 y = 1<br />
( t t ... t t t )<br />
t z z−1<br />
´ = t Where<br />
Submission page 49 UPA-OPERA<br />
4<br />
z '= z = x + y −1<br />
( t t ... t 0 t 0)<br />
t´ z z−1<br />
2 1<br />
= Where<br />
z ' = z + 2 = y + 1<br />
( t t ... t 0 t 0)<br />
t´ z z−1<br />
2 1<br />
= Where<br />
z ' = z + 2 = x + 1<br />
( t t ... t 0 t )<br />
t z z −1<br />
´ = t Where<br />
3<br />
z ' = z + 1 = x + y<br />
( t t ... t 0 t )<br />
t z z −1<br />
´ = t Where<br />
3<br />
z ' = z + 1 = x + y<br />
x = 1 y = 1<br />
( 0 0)<br />
t t = Where<br />
´ 1<br />
3<br />
2<br />
2<br />
2<br />
1<br />
1<br />
1
4-June-07 P1901_PRO_016_r0<br />
x = 0 y =<br />
0<br />
Table 3 Bit extraction<br />
z ' = z + 2 = x + y + 1<br />
Bit extraction not necessary, no message bits<br />
being sent<br />
Since the maximum number of bits in a group will be 19, a 19 bits wide word called t´ will be formed from each<br />
two subcarriers, filling most significant bits with zeroes when z´ < 19. This word will be scrambled with a<br />
pseudor<strong>and</strong>om word generator.<br />
The bits per symbol (BPS) is defined by:<br />
3.5.2 Scrambling<br />
BPS = ∑ z<br />
i<br />
∀i<br />
∈ Symbol<br />
Submission page 50 UPA-OPERA<br />
i<br />
Equation 17<br />
Each of the bits from the pseudor<strong>and</strong>om generator shall be generated with the same polynomial structure<br />
initialized with different seeds for each bit (where bit 0 is the least significant bit).<br />
The pseudor<strong>and</strong>om sequence generator shall be the 10-bit PN generator with characteristic polynomial given by<br />
Equation 18.<br />
( x)<br />
f = +<br />
3 10<br />
1+ x x<br />
Equation 18<br />
At the beginning of each symbol, the registers of the PN generators shall be set with the corresponding seeds<br />
given by Table 4<br />
PN Seed
4-June-07 P1901_PRO_016_r0<br />
0 0x2bf<br />
1 0x3f0<br />
2 0x3ff<br />
3 0x28d<br />
4 0x2d7<br />
5 0x017<br />
6 0x1e4<br />
7 0x3d8<br />
8 0x337<br />
9 0x1f1<br />
10 0x2a3<br />
11 0x3f3<br />
12 0x000<br />
13 0x11f<br />
14 0x329<br />
15 0x177<br />
16 0x331<br />
17 0x119<br />
Submission page 51 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
18 0x350<br />
Table 4 Scrambling seed values<br />
All the pseudor<strong>and</strong>om generators will advance once for each pair of extracted carriers. If no bit extraction is<br />
performed (x=y=0) the pseudor<strong>and</strong>om generators will not advance. The structure of each pseudor<strong>and</strong>om<br />
generator that generates a u word from the extracted t’ word is shown in Figure 13<br />
The symbol number value shall be 1 for the channel reference symbol, <strong>and</strong> shall be incremented by 1 for every<br />
symbol there after.<br />
u 19<br />
OUTPUT<br />
BIT 18 (MSB)<br />
OUTPUT<br />
BIT 0 (LSB)<br />
u 1<br />
t´ 19<br />
10 9 8 7 6 5 4 3 2 1<br />
PN GENERATOR 0<br />
10 9 8 7 6 5 4 3 2 1<br />
Symbol number (MSB)<br />
Symbol number (LSB)<br />
t´ 1<br />
Figure 13 Scrambling<br />
PN GENERATOR 18<br />
Submission page 52 UPA-OPERA<br />
XOR
4-June-07 P1901_PRO_016_r0<br />
3.5.3 Bit conversion<br />
The binary word u = (uz´, uz´-1,… u1) determines two binary words v’=(v’z´-y,…,v ’ 0) <strong>and</strong> w’=( w’y-1,…,w’0),<br />
which are used to look up two constellations points in the encoder constellation table. As a first step, v <strong>and</strong> w<br />
are obtained from u, as shown in Figure 14. Finally, v’ <strong>and</strong> w’ are obtained from v <strong>and</strong> w. For the usual case of<br />
x≥2 <strong>and</strong> y≥2, z´=z=x+y-1, <strong>and</strong> v´=v <strong>and</strong> w´=w contain x <strong>and</strong> y bits respectively. For the special cases when<br />
x=0 <strong>and</strong> y≥2, z´=z+2=y+1, v´=v=(v1,v0) <strong>and</strong> w´=w=(wy-1,…,w0), when y=0 <strong>and</strong> x≥2, z´=z+2=x+1,<br />
w´=v=(v1,v0) <strong>and</strong> v´=w=(wx-1,…,w0), when x=1 <strong>and</strong> y≥2, z´=z+1=y, v´=v=(v1) <strong>and</strong> w´=w=(wy-1,…,w0), when<br />
y=1 <strong>and</strong> x≥2, z´=z+1=x, w´=v=(v1) <strong>and</strong> v´=w=(wx-1,…,w0) <strong>and</strong> when x=1 <strong>and</strong> y=1, z´=z+2=3, v´=(w1) <strong>and</strong><br />
w´=(w0).<br />
The bits (u3, u2, u1) determine (v1,v0) <strong>and</strong> (w1,w0) according to following figure:<br />
u z´<br />
u z´-1<br />
u z´-y+3<br />
u z´-y+2<br />
u z´-y+1<br />
u 4<br />
u 3<br />
u 2<br />
u 1<br />
Convolutional<br />
Encoder<br />
v1=u1⊕u3 v0=u3 w1=u0⊕u1⊕u2⊕u3 w0=u2⊕u3 Submission page 53 UPA-OPERA<br />
u 2<br />
u 1<br />
u 0<br />
Figure 14 Conversion of u to v <strong>and</strong> w<br />
The convolutional encoder shown in Figure 14 is a systematic encoder as shown in Figure 15. At the beginning<br />
of the encoding of each subcarrier group (1536 or 192 when HURTO mode is active), the convolutional encoder<br />
state is initialized to (0,0,0,0). No special operation to terminate the code is performed.<br />
w y-1<br />
w y-2<br />
w 2<br />
v z´-y<br />
v z´-y-1<br />
v 2<br />
v 1<br />
v 0<br />
w 1<br />
w 0
4-June-07 P1901_PRO_016_r0<br />
u 2<br />
u 1<br />
S 2<br />
Delay<br />
S 1<br />
Delay Delay Delay<br />
Submission page 54 UPA-OPERA<br />
S 3<br />
Figure 15 Convolutional encoder<br />
The remaining bits of v <strong>and</strong> w are obtained from the less significant <strong>and</strong> more significant parts of (uz´, uz´-1,…,<br />
u4), respectively. When x≥2 <strong>and</strong> y≥2, v´=v=(uz´-y+2, uz´-y+1,..., u4,v1,v0) <strong>and</strong> w´=w=(uz´, uz´-1,…, uz´-y+3,w1,w0).<br />
When x=0 or y=0 (but not both), v= (v1, v0), <strong>and</strong> it will be assigned to the zero loading subcarrier (v´ when only<br />
x=0 but not y <strong>and</strong> w´ when y=0 but not x). w will have y bits in the first case <strong>and</strong> x bits in the second, <strong>and</strong> will<br />
be assigned to the non zero loading subcarrier.<br />
When x=1 or y=1 (but not both), v1 will be assigned to the 1 loading subcarrier (v´ when only x=1 but not y <strong>and</strong><br />
w´ when y=1 but not x), v0 is dropped. w will have y bits in the first case <strong>and</strong> x bits in the second, <strong>and</strong> will be<br />
assigned to the non zero loading subcarrier.<br />
When x=1 <strong>and</strong> y=1, v´=(w1) <strong>and</strong> w’=(w0)<br />
The binary word v´ is input first to the constellation encoder, <strong>and</strong> the binary word w´ last.<br />
3.5.4 Constellation encoder<br />
Each of the two resulting binary words after 4D-TCM process, called v’ <strong>and</strong> w’, represent an amplitude ak <strong>and</strong><br />
an increment to previous phase, called Δbk that will perform a new constellation point to be transmitted in one<br />
subcarrier. The first word to be processed <strong>and</strong> transmitted will be v’ <strong>and</strong> then w’. Since the mapping process to<br />
amplitude <strong>and</strong> phase increment will be the same for v’ <strong>and</strong> w’, we consider the following description based in a<br />
binary word called I that can be v’ or w’ indistinctly.<br />
In the following table, mapping for each bit-loading <strong>and</strong> the pair (ak, Δbk) <strong>and</strong> its relationship with the binary<br />
word I is shown.<br />
Bit-loading ak Δbk<br />
S 0<br />
u 2<br />
u 1<br />
u 0
4-June-07 P1901_PRO_016_r0<br />
1 0,0,0,0 0,0,0,0,0, I0<br />
2 0,0,0,0 0,0,0,0,I1, I1⊕I0<br />
3 0,0,0,I1 0,0,0,0,I2, I0<br />
4 0,0,0,I1 0,0,0,I2, I2⊕I3, I0<br />
5 0,0,I4, I1 0,0,0,I2, I2⊕I3, I0<br />
6 0,0,I5, I1 0,0,I2, I2⊕I3, I3⊕I4, I0<br />
7 0,I6,I6⊕I5, I1 0,0,I2, I2⊕I3, I3⊕I4, I0<br />
8 0,I7, I7⊕I6, I1 0,I2, I2⊕I3, I3⊕I4, I4⊕I5, I0<br />
9 I8, I8⊕I7, I8⊕I7⊕I6, I1 0,I2, I2⊕I3, I3⊕I4, I4⊕I5, I0<br />
10 I9, I9⊕I8, I9⊕I8⊕I7, I1 I2, I2⊕I3, I3⊕I4, I4⊕I5, I5⊕I6, I0<br />
Table 5 Constellation encoder<br />
Where the binary word I will be first v´<strong>and</strong> then w´ till end all the 1536 subcarriers.<br />
If no bit extraction is performed (x=y=0) the output of the constellation encoder shall be ak= (0,0,0,0) <strong>and</strong> Δbk<br />
=(0,0,0,0,0,0) for both subcarriers.<br />
3.6 SUBCARRIER MODULATION<br />
Each subcarrier of the <strong>Control</strong> or Data OFDM symbols shall be modulated using the ADPSK (Amplitude<br />
Differential Phase Shift Keying) modulation.<br />
Equation 19 defines the ADPSK constellation of M phases <strong>and</strong> N rings (MxN ADPSK):<br />
s<br />
k<br />
jθk<br />
( A a ) e<br />
=<br />
λ +<br />
Submission page 55 UPA-OPERA<br />
k
4-June-07 P1901_PRO_016_r0<br />
Where:<br />
Equation 19<br />
• k is the time index representing the k-th OFDM symbol. Index 0 corresponds to the channel reference<br />
symbol (see 3.8.1).<br />
• s k is the modulator output for a given subcarrier.<br />
• λ is the factor to normalize the constellation to unit power:<br />
λ =<br />
A<br />
2<br />
+<br />
⎛ 2N<br />
−1⎞<br />
( N −1)<br />
⎜ A + ⎟<br />
⎝ 6 ⎠<br />
Submission page 56 UPA-OPERA<br />
1<br />
Equation 20<br />
• a k , ak ∈{ 0, 1,<br />
Κ , N −1}<br />
, represents the information coded in the amplitude, as supplied by the<br />
constellation encoder (see 3.5.4).<br />
• θ k st<strong>and</strong>s for the absolute phase of the modulated signal obtained as follows:<br />
( θ ( 2π<br />
k 1 ) bk<br />
) mod π<br />
+<br />
θ k<br />
2<br />
M Δ<br />
= −<br />
Equation 21<br />
Equation 21 applies for k>0 only. bk<br />
Δbk ∈ 0, 1,<br />
Κ , M −1<br />
, represents the information coded in the<br />
phase increment, as supplied by the constellation encoder (see 3.5.4).<br />
Δ , { }<br />
A is a shaping parameter <strong>and</strong> represents the ring offset from the centre of the constellation.<br />
Parameters M, N <strong>and</strong> A are determined by the number of bits per subcarrier indicated by the bit-loading table<br />
according to Table 6.<br />
Bit-loading Constellation M N A Bits coded in the Bits coded in
4-June-07 P1901_PRO_016_r0<br />
points phase increment the amplitude<br />
2 4 4 1 1 2 0<br />
3 8 4 2 0.8 2 1<br />
4 16 8 2 1.7 3 1<br />
5 32 8 4 1.7 3 2<br />
6 64 16 4 2.5 4 2<br />
7 128 16 8 2.6 4 3<br />
8 256 32 8 5 5 3<br />
9 512 32 16 4.6 5 4<br />
10 1024 64 16 8.6 6 4<br />
Table 6 Constellation parameters<br />
The 4D-TCM provides the a k <strong>and</strong> Δ bk<br />
values to the ADPSK Modulator according to the bit-loading table. If<br />
the bit-loading table indicates that a subcarrier does not carry any information (0 bits per subcarrier) this<br />
subcarrier shall be modulated using 2 bits.<br />
3.7 OFDM MODULATION<br />
This section describes how the input constellations are grouped to create OFDM symbols. Special symbols for<br />
synchronization <strong>and</strong> SOT are also described.<br />
The signals will be described in a complex base-b<strong>and</strong> signal notation. Different implementations may be<br />
possible, if the signal transmitted to the channel is the same.<br />
Submission page 57 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
3.7.1 <strong>Control</strong> <strong>and</strong> Data symbols<br />
There shall be three symbol types that will define the signal b<strong>and</strong>width used by the system. The three types of<br />
symbols will be referred to as Type I (30 MHz signal b<strong>and</strong>width), Type II (20 MHz signal b<strong>and</strong>width) <strong>and</strong> Type<br />
III (10 MHz signal b<strong>and</strong>width). The symbols are defined based on three system clocks that will define the signal<br />
b<strong>and</strong>width. A node shall be operating in one of the three types at a given time. Specifically, symbol types are<br />
not mixed in a PPDU, <strong>and</strong> the transition from the use of a symbol type to a different one can take in the order of<br />
seconds.<br />
Table 7 lists some timing parameters of the OFDM modulation.<br />
Parameter Type I Type II Type III Units<br />
System clock 40 26 . 6<br />
) 13 . 3<br />
) MHz<br />
NSD: Number subcarriers 1536 1536 1536 Carriers<br />
NIDFT: IDFT interval 2048 2048 2048 Samples<br />
TIDFT: IDFT interval 51.2 76.8 153.6 μs<br />
NCP: Cyclic prefix 800 532 268 Samples<br />
TCP: Cyclic prefix 20 19.95 20.1 μs<br />
NSYM: Symbol interval 2848 2580 2316 Samples<br />
TSYM: Symbol interval 71.2 96.75 173.7 μs<br />
Table 7 OFDM modulation parameters<br />
The stream of complex numbers coming from the subcarrier modulator is divided into groups of NSD=1536 to<br />
form OFDM symbols.<br />
If a complex 2048-point IDFT is used, the 1536 subcarriers shall be mapped in the way shown in Figure 16.<br />
Submission page 58 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Frequency<br />
Domain<br />
Inputs<br />
Null<br />
#1<br />
#2<br />
.<br />
.<br />
#768<br />
Null<br />
.<br />
.<br />
Null<br />
#769<br />
.<br />
.<br />
#1536<br />
Null<br />
.<br />
.<br />
.<br />
.<br />
.<br />
.<br />
0<br />
1<br />
2<br />
.<br />
.<br />
768<br />
769<br />
.<br />
.<br />
1278<br />
1279<br />
.<br />
.<br />
2046<br />
2047<br />
Submission page 59 UPA-OPERA<br />
IDFT<br />
0<br />
1<br />
2<br />
.<br />
.<br />
768<br />
769<br />
.<br />
.<br />
1278<br />
1279<br />
.<br />
.<br />
2046<br />
2047<br />
Figure 16 Subcarrier mapping<br />
.<br />
.<br />
.<br />
.<br />
.<br />
.<br />
Time<br />
Domain<br />
Outputs<br />
After the inverse Fourier transform, the symbol is cyclically extended by NCP samples to create the “cyclic<br />
prefix”.<br />
3.7.2 Time domain windowing<br />
The symbol may be multiplied by a windowing function to smooth transitions between the symbols. However,<br />
the binding requirement is the spectral mask as detailed in 3.13. Time domain windowing is just one way to<br />
achieve that goal. The implementer may use other methods to achieve the same goal such as time domain<br />
filtering. Therefore the transition shape <strong>and</strong> duration (NW) are not specified here. In the particular case where<br />
NW=0 the window degenerates into a rectangular pulse of value 1 <strong>and</strong> duration NSYM. In the general case where<br />
NW>0 the window extends over more than one symbol (NSYM+NW) <strong>and</strong> the symbols overlap as shown in Figure<br />
17. The general expression for the windowing function is given in Equation 22.<br />
⎧<br />
⎪<br />
w(<br />
n)<br />
= ⎨<br />
⎪ f ( N<br />
⎪<br />
⎩<br />
W<br />
f ( n)<br />
1<br />
+ N<br />
SYM<br />
0<br />
− n −1)<br />
Equation 22<br />
And the windowing function fulfils the following condition:<br />
N<br />
SYM<br />
f(n) +<br />
f(N w - n -1)<br />
= 1<br />
0 ≤ n < NW<br />
N w ≤ n < N SYM<br />
≤ n < NW<br />
+ N<br />
elsewhere<br />
SYM
4-June-07 P1901_PRO_016_r0<br />
N W<br />
NCP<br />
Equation 23<br />
Submission page 60 UPA-OPERA<br />
N SYM<br />
N IFFT<br />
Figure 17 Windowing<br />
The maximum duration of the window (Nw) depends on the symbol Type used:<br />
• Type I: 128 samples<br />
• Type II: 128 samples<br />
• Type III: 64 samples<br />
The OFDM symbol can be expressed in mathematical form as inEquation 24.<br />
s<br />
768<br />
2046<br />
⎧<br />
⎛ j2πk<br />
⎞<br />
⎛ j2πk<br />
( n)<br />
= k SYM wSYM<br />
( n)<br />
⎨∑<br />
c(<br />
k,<br />
i)<br />
exp⎜<br />
( n − N CP − N W ) ⎟ + ∑ c(<br />
k − 510,<br />
i)<br />
exp⎜<br />
( n − N<br />
⎩ k = 1 ⎝ 2048<br />
⎠ k = 1279<br />
⎝ 2048<br />
Equation 24<br />
i<br />
Where<br />
− i is the i-th OFDM symbol; i = 0, 1, …<br />
− n is the sample index; 0 ≤ n < NSYM+NW<br />
− kSYM is a normalization factor, that shall be chosen in order to meet the PSD <strong>and</strong> modulation accuracy<br />
requirements.<br />
− wSYM(n) is a windowing function<br />
− c(k,i) is the k+iNSD complex value from the subcarrier modulation block<br />
CP<br />
− N<br />
W<br />
⎞⎫<br />
) ⎟⎬<br />
⎠⎭
4-June-07 P1901_PRO_016_r0<br />
Several of these symbols are concatenated in a burst as expressed in Equation 25<br />
3.8 REFERENCE SIGNALS<br />
3.8.1 Channel reference symbol<br />
s ( n)<br />
= ∑ si<br />
( n − iN SYM )<br />
i<br />
Equation 25<br />
The channel reference symbol comes before the data <strong>and</strong> control symbols. The channel reference symbol<br />
followsEquation 24 with<br />
c( k,<br />
i)<br />
= exp( jφk<br />
)<br />
Equation 26<br />
where φk is a r<strong>and</strong>om phase picked from a uniform distributed r<strong>and</strong>om variable between [0,2π[. The channel<br />
reference symbol gives the initial reference for the subcarrier modulation (3.6)<br />
3.8.2 Synchronization symbol<br />
The synchronization symbol comes before the channel reference symbol. The synchronization symbol follows<br />
Equation 24 with<br />
c(<br />
k,<br />
i)<br />
⎧<br />
= ⎨<br />
⎩<br />
2 exp(<br />
Submission page 61 UPA-OPERA<br />
0<br />
jφ<br />
)<br />
k<br />
Equation 27<br />
k<br />
k<br />
even<br />
where φk is a r<strong>and</strong>om phase picked from a uniform distributed r<strong>and</strong>om variable between [0,2π[.<br />
3.8.3 Start Of Transmission (SOT)<br />
A start of transmission signal shall always be sent before the synchronization symbol. The SOT is also used as<br />
response to the different polling frames (See 4.3.5 <strong>and</strong> 4.3.6). In reception the SOT may be used for AGC. The<br />
odd
4-June-07 P1901_PRO_016_r0<br />
description of the SOT generation is always based on a 40 MHz clock, independently of the symbol type used<br />
by the node. The number of active subcarriers in the SOT depends on the symbol type used.<br />
The SOT is composed of OFDM symbols that may be generated with a complex 256-point IDFT as shown in<br />
Equation 28.<br />
Where<br />
s<br />
D,<br />
i<br />
− kD is a normalization factor<br />
N ⎧ D 2<br />
255<br />
⎛ j2πk<br />
⎞<br />
⎛ j2πk<br />
⎞⎫<br />
( n)<br />
= kDw<br />
D ( n)<br />
⎨∑<br />
c(<br />
k)<br />
exp⎜<br />
n⎟<br />
+ ∑c(<br />
k)<br />
exp⎜<br />
n⎟⎬<br />
⎩ k=<br />
1 ⎝ 256 ⎠ k=<br />
255−N<br />
D 2 ⎝ 256 ⎠⎭<br />
Equation 28<br />
− wD(n) is a windowing function, that follows Equation 22 <strong>and</strong> Equation 23. The duration of the windowing<br />
function is between 6.4 μs <strong>and</strong> 8 μs depending on the transition duration <strong>and</strong> is depicted in Figure 18.<br />
N W≤64 samples<br />
N SYM=N IFFT=256 samples<br />
Figure 18 SOT Windowing<br />
− ND is 192 (Type I), 128 (Type II) or 64 (Type III), so that the frequencies occupied by the SOT are the same<br />
as for the data <strong>and</strong> control symbols.<br />
− c(k) = exp(jφk) where φk is a r<strong>and</strong>om phase picked from a uniform distributed r<strong>and</strong>om variable between<br />
[0,2π[<br />
Six of these symbols are concatenated to form the SOT.<br />
Submission page 62 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
s<br />
SOT<br />
( n)<br />
=<br />
Submission page 63 UPA-OPERA<br />
5<br />
∑<br />
i=<br />
0<br />
s<br />
D,<br />
i<br />
Equation 29<br />
( n − 256i)<br />
Therefore the maximum duration of the SOT (if the maximum window size is used) will be 40 μs.<br />
3.8.4 Channel estimation symbols<br />
The channel estimation symbols are used to estimate the channel quality at the receiver side. After the channel<br />
estimation the receiver may send a new bit-loading table to the transmitter (see 9.1.2). These symbols shall be<br />
known by the transmitter <strong>and</strong> the receiver to allow a correct estimation under all conditions. Therefore, a<br />
pseudor<strong>and</strong>om sequence generator shall be used as the modulator input instead of the output from the 4D-TCM<br />
encoder.<br />
The pseudor<strong>and</strong>om sequence generator shall be the 11-bit PN generator with characteristic polynomial given by<br />
Equation 30.<br />
( x)<br />
f = +<br />
2 11<br />
1+ x x<br />
Equation 30<br />
This symbol shall be modulated using 2 bits per subcarrier. Therefore, two 11-bit PN generators with different<br />
seeds shall be used. Figure 19 explains how the Δ bk<br />
value is formed. The SYMBOL NUMBER value is 1 for<br />
the channel reference symbol, <strong>and</strong> is incremented by 1 for every symbol there after.
4-June-07 P1901_PRO_016_r0<br />
SYMBOL NUMBER<br />
(BIT 1)<br />
Δ b k (BIT 1)<br />
OUTPUT<br />
BIT 1 (MSB)<br />
OUTPUT<br />
BIT 0 (LSB)<br />
Δ b k (BIT 0, LSB)<br />
PN GENERATOR 1<br />
11 10 9 8 7 6 5 4 3 2 1<br />
PN GENERATOR 0<br />
11 10 9 8 7 6 5 4 3 2 1<br />
SYMBOL NUMBER<br />
(BIT 0, LSB)<br />
Submission page 64 UPA-OPERA<br />
XOR<br />
Figure 19 Channel estimation symbol generation<br />
At the beginning of each Channel estimation symbol, the registers of the PN generators shall be set with the<br />
corresponding seed given by Table 8. So, the value to be modulated in the phase increment of the first valid<br />
subcarrier of the OFDM symbol will be determined by the seeds <strong>and</strong> the appropriate symbol number. The<br />
contents of the registers of the PN generators shall be updated before calculating the phase increment for each<br />
of the next subcarriers.<br />
Since two bits of the symbol number are XORed with the output of the PN generators, four different symbols<br />
will be generated. These four symbols will be repeated four times to create a sixteen-symbol sequence.<br />
Seed<br />
PN Generator 1 0x25E<br />
PN Generator 0 0x3C1<br />
Table 8 PN generator seeds
4-June-07 P1901_PRO_016_r0<br />
3.9 CARRIER FREQUENCY<br />
The complex baseb<strong>and</strong> digital signal is converted to analog signal <strong>and</strong> IQ modulated. I(t) <strong>and</strong> Q(t) are the inphase<br />
<strong>and</strong> quadrature analog signals corresponding to the real <strong>and</strong> imaginary components of the complex<br />
baseb<strong>and</strong> signal respectively. The actual transmitted signal is related to them by the following relation:<br />
( t)<br />
= I(<br />
t)<br />
cos( 2πf<br />
t)<br />
− Q(<br />
t)<br />
sin( 2πf<br />
t)<br />
rTX c<br />
c<br />
Equation 31<br />
f c denotes the carrier centre frequency, which must be a multiple of 156.25 KHz.<br />
3.10 COMMUNICATION MODES<br />
f<br />
Transmission modes can be defined by specifying a carrier frequency ( c ), <strong>and</strong> symbol Type (I, II or III) <strong>and</strong>,<br />
optionally, a power mask. Any two nodes that use a common communication mode shall be able to<br />
communicate.<br />
The carrier frequency shall be higher than the b<strong>and</strong>width of the baseb<strong>and</strong> signal in negative frequencies in order<br />
to avoid ICI <strong>and</strong> shall place the signal b<strong>and</strong>width in frequencies up to 100 MHz.<br />
3.11 <strong>PHY</strong> PARAMETER SPECIFICATION<br />
Table 9 contains the values for the <strong>PHY</strong> parameters.<br />
Parameter Value Description<br />
INTER PPDU SPACE 1 189 μs See 3.2 <strong>and</strong> 4.1<br />
INTER PPDU SPACE 2 126 μs See 3.2 <strong>and</strong> 4.1<br />
Table 9 <strong>PHY</strong> parameter specification<br />
Submission page 65 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
3.12 CLOCK SYNCHRONIZATION<br />
3.12.1 General<br />
Clock frequency synchronization shall be performed <strong>and</strong> must be accurate enough to allow for maximum bit<br />
loading 10 bits on all subcarriers.<br />
3.12.2 Clock synchronisation concept<br />
With the exception of the HE of a BPL cell, all BPL nodes belonging to the same BPL cell must adapt their<br />
clock frequency until a unique common clock frequency is reached. This common clock frequency is the<br />
reference clock frequency dictated by the HE. All other nodes (Repeaters <strong>and</strong> CPEs) of the BPL cell will<br />
synchronize their clock frequency to this reference clock frequency.<br />
Both transmitter <strong>and</strong> receiver of a BPL node shall use the same common clock frequency.<br />
3.12.3 System reference clock error tolerance<br />
Without noticeable loss of performance, BPL nodes shall be able to cope with a relative clock frequency error<br />
of up to twice the maximum absolute frequency error of the system reference clock. The absolute frequency<br />
error of the system reference clock in any BPL equipment shall not exceed ±100 ppm.<br />
3.13 TRANSMITTER ELECTRICAL SPECIFICATION<br />
The following specification establishes the minimum transmitter technical requirements for interoperability<br />
maintaining full performance. Unless otherwise stated, transmitter specifications assume a 50 Ω load between<br />
line <strong>and</strong> neutral terminals. All transmitter output voltages as well as spurious transmissions are specified as the<br />
voltage measured at the line terminal with respect to the neutral terminal.<br />
3.13.1 Transmit PSD<br />
The PSD in the emission point must be compliant with regulations in effect in the country where the system is<br />
used.<br />
The ripple in the working b<strong>and</strong> shall be less than ±1 dB.<br />
Besides there will be a transmit spectrum mask that will depend on the regulation of each country or area. All<br />
nodes shall use a configurable power masking with 1 dB of granularity in order to be compliant with that mask,<br />
achieving notches with at least 35 dBs deep<br />
Submission page 66 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
The transmitter must provide means to modify the transmission power of each subcarrier with a granularity of at<br />
least 6 dB. Once the transmitter introduces the notches in the transmitted signal, other mechanisms like the<br />
ABLP (see 9.1.2) will automatically adapt accordingly.<br />
3.13.2 Modulation error vector magnitude<br />
Modulation errors may be caused by quantization in the digital processing <strong>and</strong> by linear <strong>and</strong> non-linear<br />
distortion in the analogue processing of a BPL transmitter.<br />
The normalized mean modulation error vector magnitude is defined as the RMS value of the modulation error<br />
vector magnitude divided by the RMS value of the modulation vector.<br />
• N denotes the number of subcarriers.<br />
•<br />
•<br />
S(<br />
k)<br />
denotes the measured complex symbol of the k-th subcarrier.<br />
S0 ( k)<br />
denotes the ideal complex symbol of the k-th subcarrier.<br />
The RMS error vector magnitude may be expressed as:<br />
EVM<br />
=<br />
1<br />
N<br />
∑<br />
k=<br />
1<br />
( k)<br />
− S ( k)<br />
Submission page 67 UPA-OPERA<br />
N<br />
1<br />
N<br />
S<br />
N<br />
∑<br />
k=<br />
1<br />
S<br />
0<br />
0<br />
( k)<br />
Equation 32<br />
<strong>and</strong> can be measured with a multi-tone error vector magnitude meter.<br />
The EVM shall not exceed 1%<br />
3.13.3 Power <strong>Control</strong><br />
2<br />
2<br />
⋅100%<br />
This specification allows for the optional implementation of a Power <strong>Control</strong> mechanism, using the BPS <strong>and</strong> Rx<br />
Att information supplied in the ABLP packet (9.1.2.4) <strong>and</strong> the Power <strong>Control</strong> bits in the Token Announce (See<br />
4.4.1). The target of the power control is to transmit the lowest power that attains a given performance.<br />
Therefore a node may adjust its transmission power until the desired value of BPS is reached. The process is<br />
depicted in Figure 20.
4-June-07 P1901_PRO_016_r0<br />
Power <strong>Control</strong><br />
task<br />
Check currently<br />
negotiated bps<br />
Lower than<br />
Th_bottom?<br />
Periodically or not<br />
Yes<br />
Submission page 68 UPA-OPERA<br />
No<br />
Greater than<br />
Th_top?<br />
Yes<br />
Increase Txg Decrease Txg<br />
Figure 20 Power control algorithm<br />
3.14 RECEIVER ELECTRICAL SPECIFICATION<br />
Unless otherwise stated, all signals are specified as the voltage measured at the line terminal with respect to the<br />
neutral terminal.<br />
3.14.1 Receiver Input Impedance<br />
When not transmitting, the system shall present a minimum impedance of 40 Ω in the working b<strong>and</strong>, measured<br />
between line <strong>and</strong> neutral terminals.<br />
No
4-June-07 P1901_PRO_016_r0<br />
3.14.2 Receiver Input Referred Noise<br />
The system shall present an IRN level lower than –148 dBm/Hz when it sets the maximum reception gain.<br />
3.14.3 Receiver Input Signal<br />
The receiver shall maintain full performance with a signal input level of 8 Vpp.<br />
The ripple introduced by the system in the working b<strong>and</strong> shall be less than ±1 dB.<br />
The sensitivity of the receiver is defined as follows:<br />
For an input signal with flat spectrum <strong>and</strong> using Type I OFDM symbols, the minimum input level at which the<br />
system shall receive 2 Mbps of UDP traffic with 0% PLR is:<br />
• 0.17 mVrms<br />
• -137 dBm/Hz referred to 50 Ω<br />
3.15 <strong>PHY</strong> service specification (<strong>PHY</strong> SAP)<br />
3.15.1 <strong>PHY</strong> service primitives<br />
The following table shows <strong>PHY</strong> DATA <strong>and</strong> MNT primitives:<br />
Primitive Type<br />
Submission page 69 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
<strong>PHY</strong>-DATA.req Request<br />
<strong>PHY</strong>-DATA.cnf Confirm<br />
<strong>PHY</strong>-DATA.ind Indicate<br />
<strong>PHY</strong>-MNT-SNR.ind Indication<br />
<strong>PHY</strong>-MNT-BPC-SET.req Request<br />
<strong>PHY</strong>-MNT-BPC-SET.cnf Confirm<br />
<strong>PHY</strong>-MNT-BPC-GET.req Request<br />
<strong>PHY</strong>-MNT-BPC-GET.cnf Confirm<br />
<strong>PHY</strong>-MNT-RXGAIN-GET.req Request<br />
<strong>PHY</strong>-MNT-RXGAIN-GET.cnf Confirm<br />
<strong>PHY</strong>-MNT-TXGAIN-SET.req Request<br />
<strong>PHY</strong>-MNT-TXGAIN-SET.cnf Confirm<br />
<strong>PHY</strong>-MNT-TXGAIN-GET.req Request<br />
<strong>PHY</strong>-MNT-TXGAIN-GET.cnf Confirm<br />
<strong>PHY</strong>-MNT-POWMASK-GET.req Request<br />
<strong>PHY</strong>-MNT-POWMASK-GET.cnf Confirm<br />
<strong>PHY</strong>-MNT-POWMASK-SET.req Request<br />
<strong>PHY</strong>-MNT-POWMASK-SET.cnf Confirm<br />
<strong>PHY</strong>-MNT-SYNC.ind Indication<br />
<strong>PHY</strong>-MNT-SYNC.req Request<br />
<strong>PHY</strong>-MNT-SYNC.cnf Confirm<br />
3.15.2 <strong>PHY</strong> service primitives parameters<br />
Table 10 <strong>PHY</strong> SAP primitives<br />
The following table shows <strong>PHY</strong> DATA <strong>and</strong> MNT parameters:<br />
Parameter Associated Primitive Value<br />
Submission page 70 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
MPDU <strong>PHY</strong>-DATA.req<br />
<strong>PHY</strong>-DATA.ind<br />
<strong>MAC</strong> Protocol Data Unit<br />
snr_measure, port <strong>PHY</strong>-MNT-SNR.ind SNR measure with remote<br />
node in Rx<br />
Rx port of the remote<br />
transmitter node<br />
bpc_type, port, tonemap <strong>PHY</strong>-MNT-BPC-SET.req<br />
Tx, Rx<br />
<strong>PHY</strong>-MNT-BPC-SET.cnf<br />
Tx or Rx port<br />
<strong>PHY</strong>-MNT-BPC-GET.cnf<br />
Updated tonemap<br />
bpc_type, port <strong>PHY</strong>-MNT-BPC-GET.req Tx, Rx<br />
Local Tx or Rx port<br />
port <strong>PHY</strong>-MNT-RXGAIN-GET.req Local Rx port<br />
port <strong>PHY</strong>-MNT-TXGAIN-GET.req<br />
<strong>PHY</strong>-MNT-TXGAIN-SET.cnf<br />
<strong>PHY</strong>-MNT-POWMASK-GET.req<br />
<strong>PHY</strong>-MNT-POWMASK-SET.cnf<br />
<strong>PHY</strong>-MNT-LINK-STATUS.req<br />
<strong>PHY</strong>-MNT-LINK-STATUS.cnf<br />
Local Tx port<br />
port, gain <strong>PHY</strong>-MNT-RXGAIN-GET.cnf Local Rx port<br />
[0-7] Rx gain level<br />
port, gain <strong>PHY</strong>-MNT-TXGAIN-GET.cnf<br />
Local Tx port<br />
<strong>PHY</strong>-MNT-TXGAIN-SET.req<br />
Tx gain<br />
port, pow_mask <strong>PHY</strong>-MNT-POWMASK-GET.cnf<br />
Local Tx port<br />
<strong>PHY</strong>-MNT-POWMASK-SET.req<br />
Tx power mask<br />
sync_type, mode <strong>PHY</strong>-MNT-SYNC.ind [sync|sync _lost]<br />
The Tx / Rx signal mode<br />
mode, timeout <strong>PHY</strong>-MNT-SYNC.req The Tx / Rx signal mode<br />
Time to sense the channel<br />
Mode, result <strong>PHY</strong>-MNT-SYNC.cnf The Tx/Rx signal mode<br />
Success/fail<br />
Legend : Tx = Transmission Rx = Reception<br />
3.15.3 <strong>PHY</strong>-DATA.req<br />
3.15.3.1 Function<br />
Table 11 <strong>PHY</strong> SAP parameters<br />
This primitive requests a transfer of a MPDU from a local <strong>MAC</strong> layer entity.<br />
Submission page 71 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
3.15.3.2 Semantics of the service primitive<br />
<strong>PHY</strong>-DATA.req(MPDU):<br />
• MPDU: <strong>MAC</strong> Protocol Data Unit<br />
3.15.3.3 When generated<br />
The primitive is generated by the <strong>MAC</strong> layer entity when a MPDU is to be transferred.<br />
3.15.3.4 Effect of receipt<br />
The <strong>PHY</strong> layer entity starts the sending of the MPDU.<br />
3.15.4 <strong>PHY</strong>-DATA.cnf<br />
3.15.4.1 Function<br />
This primitive has local significance <strong>and</strong> provides the <strong>MAC</strong> layer with status information (sending finished) of the<br />
corresponding preceeding <strong>PHY</strong>-DATA.req primitive.<br />
3.15.4.2 Semantics of the service primitive<br />
This primitive has no parameters.<br />
3.15.4.3 When generated<br />
The primitive is passed from the <strong>PHY</strong> layer entity to the <strong>MAC</strong> layer entity to indicate that the previous MPDU has<br />
been sent <strong>and</strong> the <strong>PHY</strong> layer is available to send new MPDUs.<br />
3.15.4.4 Effect of receipt<br />
The <strong>MAC</strong> layer entity is aware that the <strong>PHY</strong> is available to send new MPDUs, <strong>and</strong> can issue new <strong>PHY</strong>-DATA.req<br />
primitives.<br />
3.15.5 <strong>PHY</strong>-DATA.ind<br />
3.15.5.1 Function<br />
This primitive defines the transfer of a received MPDU from the <strong>PHY</strong> layer entity to the <strong>MAC</strong> layer entity.<br />
Submission page 72 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
3.15.5.2 Semantics of the service primitive<br />
<strong>PHY</strong>-DATA.ind(MPDU):<br />
• MPDU: <strong>MAC</strong> Protocol Data Unit.<br />
3.15.5.3 When generated<br />
The primitive is passed from the <strong>PHY</strong> layer entity to the <strong>MAC</strong> layer entity to indicate the arrival of a MPDU.<br />
3.15.5.4 Effect of receipt<br />
The <strong>MAC</strong> layer entity processes the newly received MPDU.<br />
3.15.6 <strong>PHY</strong>-MNT-SNR.ind<br />
3.15.6.1 Function<br />
This primitive indicates that the <strong>Physical</strong> layer entity has done a SNR measure with another node, <strong>and</strong> defines the<br />
transfer of the SNR measure to the Management layer entity.<br />
3.15.6.2 Semantics of the service primitive<br />
<strong>PHY</strong>-MNT-SNR.ind (snr_measure, port):<br />
• snr_measure: SNR measure with remote node in reception<br />
• port: reception port of the remote transmitter node<br />
3.15.6.3 When generated<br />
The primitive is generated when the node measures the SNR with another node which transmitted an SNR frame.<br />
3.15.6.4 Effect of receipt<br />
The Management layer entity will decide if the tonemap must be changed for that port depending on the new<br />
snr_measure <strong>and</strong> the current tonemap. If the tonemap must change, an ABLP message shall be sent to the other<br />
node by means of the ETH.req primitive.<br />
3.15.7 <strong>PHY</strong>-MNT-BPC-SET.req<br />
3.15.7.1 Function<br />
This primitive request the change of the tonemap used to transmit/receive to/from a remote node.<br />
Submission page 73 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
3.15.7.2 Semantics of the service primitive<br />
<strong>PHY</strong>-MNT-BPC-SET.req (bpc_type, port, tonemap)<br />
• bpc_type: tx, rx (transmission, reception)<br />
• port: transmission or reception port<br />
• tonemap: updated tonemap to be used<br />
3.15.7.3 When generated<br />
The primitive is generated when the transmission/reception tonemap table with a node must be changed according<br />
to the ABLP protocol<br />
3.15.7.4 Effect of receipt<br />
The tonemap used by the Physiscal layer to transmit/receive to/from a remote node is changed.<br />
3.15.8 <strong>PHY</strong>-MNT-BPC-SET.cnf<br />
3.15.8.1 Function<br />
This primitive informs the Management layer that the tonemap has been updated.<br />
3.15.8.2 Semantics of the service primitive<br />
<strong>PHY</strong>-MNT-BPC-SET.cnf (bpc_type, port, tonemap)<br />
• bpc_type: tx, rx (transmission, reception)<br />
• port: transmission or reception port<br />
• tonemap: updated tonemap<br />
3.15.8.3 When generated<br />
The primitive is generated by the <strong>Physical</strong> layer to confirm the Management layer that the tonemap has been<br />
updated.<br />
3.15.8.4 Effect of receipt<br />
Management layer can use the updated tonemap for throughput <strong>and</strong> class of service calculations.<br />
Submission page 74 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
3.15.9 <strong>PHY</strong>-MNT-BPC-GET.req<br />
3.15.9.1 Function<br />
This primitive requests the tonemap used to transmit/receive to/from a remote node.<br />
3.15.9.2 Semantics of the service primitive<br />
<strong>PHY</strong>-MNT-BPC-GET.req (bpc_type, port) :<br />
• bpc_type: tx, rx<br />
• port: local transmission or reception port<br />
3.15.9.3 When generated<br />
The primitive is generated when the Management layer needs to know the current tonemap used to transmit/receive<br />
to/from a remote node.<br />
3.15.9.4 Effect of receipt<br />
The current tonemap is read by the <strong>Physical</strong> layer <strong>and</strong> passed to the Management layer by means of the <strong>PHY</strong>-MNT-<br />
BPC-GET.cnf primitive.<br />
3.15.10 <strong>PHY</strong>-MNT-BPC-GET.cnf<br />
3.15.10.1 Function<br />
This primitive indicates the result of the previously requested tonemap.<br />
3.15.10.2 Semantics of the service primitive<br />
<strong>PHY</strong>-MNT-BPC-GET.cnf (bpc_type, port, tonemap)<br />
• bpc_type: tx, rx<br />
• port: local transmission or reception port<br />
• tonemap: current tonemap<br />
3.15.10.3 When generated<br />
The primitive is passed by the <strong>Physical</strong> layer entity to the Management layer entity to provide the requested<br />
tonemap.<br />
Submission page 75 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
3.15.10.4 Effect of receipt<br />
The Maganement layer receives the tonemap.<br />
3.15.11 <strong>PHY</strong>-MNT-RXGAIN-GET.req<br />
3.15.11.1 Function<br />
This primitive requests the <strong>Physical</strong> layer the reception gain being used to receive from a remote node.<br />
3.15.11.2 Semantics of the service primitive<br />
<strong>PHY</strong>-MNT-RXGAIN-GET.req (port):<br />
• port: reception port<br />
3.15.11.3 When generated<br />
The primitive is generated when the Management layer needs to know the reception gain being used in reception<br />
with another node.<br />
3.15.11.4 Effect of receipt<br />
The current reception gain is obtained by the <strong>Physical</strong> layer <strong>and</strong> passed to the Management layer by means of the<br />
<strong>PHY</strong>-MNT-RXGAIN-GET.cnf primitive.<br />
3.15.12 <strong>PHY</strong>-MNT-RXGAIN-GET.cnf<br />
3.15.12.1 Function<br />
This primitive indicates the result of the previously requested reception gain.<br />
3.15.12.2 Semantics of the service primitive<br />
<strong>PHY</strong>-MNT-RXGAIN-GET.cnf (port, gain):<br />
• port: reception port<br />
• gain: reception gain level<br />
3.15.12.3 When generated<br />
The primitive is passed by the <strong>Physical</strong> layer entity to the Management layer entity to provide the requested<br />
reception gain.<br />
Submission page 76 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
3.15.12.4 Effect of receipt<br />
The Maganement layer gets the reception gain. It can be used in protocols such as the <strong>Access</strong> protocol or the Net<br />
Configuration protocol.<br />
3.15.13 <strong>PHY</strong>-MNT-TXGAIN-GET.req<br />
3.15.13.1 Function<br />
This primitive requests the <strong>Physical</strong> layer the transmission gain being used to transmit to a remote node.<br />
3.15.13.2 Semantics of the service primitive<br />
<strong>PHY</strong>-MNT-TXGAIN-GET.req (port):<br />
• port: local transmission port<br />
3.15.13.3 When generated<br />
The primitive is generated when the Management layer needs to know the transmission gain being used in<br />
transmission with another node.<br />
3.15.13.4 Effect of receipt<br />
The current transmission gain is obtained by the <strong>Physical</strong> layer <strong>and</strong> passed to the Management layer by means of the<br />
<strong>PHY</strong>-MNT-TXGAIN-GET.cnf primitive.<br />
3.15.14 <strong>PHY</strong>-MNT-TXGAIN-GET.cnf<br />
3.15.14.1 Function<br />
This primitive indicates the result of the previously requested transmission gain.<br />
3.15.14.2 Semantics of the service primitive<br />
<strong>PHY</strong>-MNT-TXGAIN-GET.cnf (port, gain):<br />
• port: local transmission port<br />
• gain: transmission gain level<br />
3.15.14.3 When generated<br />
The primitive is passed by the <strong>Physical</strong> layer entity to the Management layer entity to provide the requested<br />
transmission gain.<br />
Submission page 77 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
3.15.14.4 Effect of receipt<br />
The Maganement layer gets the transmission gain.<br />
3.15.15 <strong>PHY</strong>-MNT-TXGAIN-SET.req<br />
3.15.15.1 Function<br />
This primitive request the change of the transmission gain used to transmit to a remote node.<br />
3.15.15.2 Semantics of the service primitive<br />
<strong>PHY</strong>-MNT-TXGAIN-SET.req (port, gain):<br />
• port: local transmission port<br />
• gain: transmission gain level<br />
3.15.15.3 When generated<br />
This primitive must be generated when the Management layer wants to change the transmission gain with a given<br />
node.<br />
3.15.15.4 Effect of receipt<br />
The <strong>Physical</strong> layer updates the transmission gain with the indicated port. It shall confirm the action.<br />
3.15.16 <strong>PHY</strong>-MNT-TXGAIN-SET.cnf<br />
3.15.16.1 Function<br />
This primitive acknowledges the previously requested action.<br />
3.15.16.2 Semantics of the service primitive<br />
<strong>PHY</strong>-MNT-TXGAIN-SET.cnf (port):<br />
• Port: local transmission port.<br />
3.15.16.3 When generated<br />
This primitive is generated by the <strong>Physical</strong> layer when it updates the transmission gain.<br />
Submission page 78 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
3.15.16.4 Effect of receipt<br />
The Management layer receives the confirmation of the change.<br />
3.15.17 <strong>PHY</strong>-MNT-POWMASK-GET.req<br />
3.15.17.1 Function<br />
This primitive requests the <strong>Physical</strong> layer the power mask being used to transmit to a remote node.<br />
3.15.17.2 Semantics of the service primitive<br />
<strong>PHY</strong>-MNT-POWMASK-GET.req (port):<br />
• port: local transmission port<br />
3.15.17.3 When generated<br />
The primitive is generated when the Management layer want to know the power mask being used in transmission<br />
with another node.<br />
3.15.17.4 Effect of receipt<br />
The current power mask is obtained by the <strong>Physical</strong> layer <strong>and</strong> passed to the Management layer by means of the<br />
<strong>PHY</strong>-MNT-POWMASK-GET.cnf primitive<br />
3.15.18 <strong>PHY</strong>-MNT-POWMASK-GET.cnf<br />
3.15.18.1 Function<br />
This primitive indicates the result of the previously requested power mask.<br />
3.15.18.2 Semantics of the service primitive<br />
<strong>PHY</strong>-MNT-POWMASK-GET.cnf (port, pow_mask):<br />
• port: local transmission port<br />
• pow_mask: transmission power mask<br />
3.15.18.3 When generated<br />
The primitive is passed by the <strong>Physical</strong> layer entity to the Management layer entity to provide the requested power<br />
mask.<br />
Submission page 79 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
3.15.18.4 Effect of receipt<br />
The Maganement layer receives the power mask.<br />
3.15.19 <strong>PHY</strong>-MNT-POWMASK-SET.req<br />
3.15.19.1 Function<br />
This primitive request the change of the power mask used to transmit to a remote node.<br />
3.15.19.2 Semantics of the service primitive<br />
<strong>PHY</strong>-MNT-POWMASK-SET.req (port, pow_mask)<br />
• port: local transmission port<br />
• pow_mask: transmission power mask<br />
3.15.19.3 When generated<br />
This primitive must be generated when the Management layer wants to change the transmission power mask with a<br />
given node.<br />
3.15.19.4 Effect of receipt<br />
The <strong>Physical</strong> layer updates the transmission power mask with the indicated port. It shall confirm the action.<br />
3.15.20 <strong>PHY</strong>-MNT-POWMASK-SET.cnf<br />
3.15.20.1 Function<br />
This primitive acknowledges the previously requested action.<br />
3.15.20.2 Semantics of the service primitive<br />
<strong>PHY</strong>-MNT-POWMASK-SET.cnf (port):<br />
• port: local transmission port.<br />
3.15.20.3 When generated<br />
This primitive is generated by the <strong>Physical</strong> layer when it updates the transmission power mask.<br />
Submission page 80 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
3.15.20.4 Effect of receipt<br />
The Management layer receives the confirmation of the change.<br />
3.15.21 <strong>PHY</strong>-MNT-SYNC.ind<br />
3.15.21.1 Function<br />
This primitive is generated by the <strong>Physical</strong> layer to notify a synchronization detection event to the Management<br />
layer. It provides status information.<br />
3.15.21.2 Semantics of the service primitive<br />
<strong>PHY</strong>-MNT-SYNC.ind (sync_type, mode) :<br />
• sync_type= [sync|sync_loss]<br />
• mode: the transmission/reception signal mode<br />
3.15.21.3 When generated<br />
The primitive is passed by the <strong>Physical</strong> layer to the Management layer to inform about a synchronization event. This<br />
event can be positive (synchronization symbol detected) or negative (synchronization symbol not detected when it<br />
was expected).<br />
3.15.21.4 Effect of receipt<br />
When receiving a "sync" event, the Management layer can infer that a synchronization symbol has been detected in<br />
the transmission mode “mode”. When receiving a “sync_loss” event, the Management layer can infer that an<br />
expected synchronization symbol has not been detected. This information can be used by the Management layer to<br />
take decisions regarding the configuration of the BPL cell.<br />
3.15.22 <strong>PHY</strong>-MNT-SYNC.req<br />
3.15.22.1 Function<br />
This primitive requests the <strong>Physical</strong> layer to detect synchronization symbols.<br />
3.15.22.2 Semantics of the service primitive<br />
<strong>PHY</strong>-MNT-SYNC.req (mode,timeout) :<br />
• mode: the transmission/reception signal mode.<br />
• timeout: maximum time to sense the channel<br />
Submission page 81 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
3.15.22.3 When generated<br />
The primitive is generated by the Management layer to detect if there is activity in the channel using the given<br />
transmission mode.<br />
3.15.22.4 Effect of receipt<br />
The <strong>Physical</strong> layer senses the channel during the “timeout” time. When a synchronization symbol is detected or the<br />
“timeout” expires, the result is notified to the Management layer by means of the <strong>PHY</strong>-MNT-SYNC.cnf primitive.<br />
3.15.23 <strong>PHY</strong>-MNT-SYNC.cnf<br />
3.15.23.1 Function<br />
This primitive acknowledges the previously requested action <strong>and</strong> provides the requested information.<br />
3.15.23.2 Semantics of the service primitive<br />
<strong>PHY</strong>-MNT-SYNC.cnf (mode, result):<br />
• mode: transmission/reception signal mode<br />
• result: success/fail<br />
3.15.23.3 When generated<br />
The <strong>Physical</strong> layer generates this primitive when a synchronization symbol is detected (success) or when the<br />
“timeout” expires (fail).<br />
3.15.23.4 Effect of receipt<br />
This information is required by the Net Configuration protocol to check if there are other nodes in the channel.<br />
<strong>PHY</strong>-MNT- <strong>PHY</strong>-MNT-LINK-STATUS.req<br />
4 <strong>MAC</strong><br />
4.1 OVERVIEW<br />
The IEEE P1901 <strong>MAC</strong> is based on a TDMA/TDD <strong>MAC</strong> with hybrid resource sharing mechanisms built on top<br />
of an OFDM <strong>PHY</strong> layer. Data are encapsulated inside OFDM symbols.<br />
The control <strong>and</strong> data symbols transmitted consecutively by a single node constitute a transmission frame.<br />
Submission page 82 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
The channel access is done through the use of a special <strong>MAC</strong> element called a token. Master nodes decide the<br />
type of frame that their slave nodes are going to transmit next, based on the type of token included in the current<br />
frame, or the kind of channel access the slave nodes can perform. Tokens have several intended uses, depending<br />
on the type of token, <strong>and</strong> the actions to be undertaken upon its reception also depend on the type of token.<br />
The master node manages the type of channel access, contention free access to the channel with a<br />
predetermined decision about which of its slaves will be allowed to transmit data, in what order, <strong>and</strong> for how<br />
long, or a contention based access of the slaves to the channel.These decisions will be published by the use of<br />
different types of tokens. In both schemes the final result is a node holding a token. The holder of the token has<br />
the right to access the medium for a specific time <strong>and</strong> after that time it has to assign the token to the next<br />
destination node. By the control of the frequency of the token occupancy <strong>and</strong> the length of the time the node is<br />
allowed to hold the token, it is possible to guarantee the requested QoS.<br />
4.1.1 Contention free medium access examples<br />
One of the simplest ways of distribute the channel among several users is the use of Data Frames. Let’s the<br />
following scenario:<br />
CPE<br />
N3<br />
Submission page 83 UPA-OPERA<br />
HE<br />
N1<br />
TDRep<br />
N2<br />
CPE<br />
N4<br />
Figure 21 Simple <strong>Access</strong> Topology example<br />
The Data Token has a specific destination node, which, upon its reception, must enter transmission mode. This<br />
destination node might then return the token to its master, or transmit it to its own slaves, in the case of a Time<br />
Division Repeater. A tipical transmission using data tokens can be seen in the following figure:
4-June-07 P1901_PRO_016_r0<br />
N1 TX<br />
N2 TX<br />
N3 TX<br />
N4 TX<br />
Data PPDU<br />
Token<br />
for N2<br />
Downstream token<br />
Upstream token<br />
IPPDU1<br />
Token<br />
for N3<br />
IPPDU1<br />
Submission page 84 UPA-OPERA<br />
Token<br />
for N2<br />
Time<br />
IPPDU1<br />
Token<br />
for N4<br />
Figure 22 Transmission sequence<br />
When N2 receives the token from its master, it is this node that must decide what nodes will follow: in this case,<br />
it transmits it to each of its slaves, <strong>and</strong> finally returns it to its master. Any other kind of sequence would be<br />
possible, <strong>and</strong> it is the master, at each level, who decides how the token, <strong>and</strong> thus the slots of time, will be<br />
divided amongst the rest of the nodes.<br />
On the other h<strong>and</strong>, the order of transmission can be predesigned using the so called distributor token. The<br />
transmission sequence can took place in the following topology:<br />
Figure 23 Topology example<br />
IPPDU1<br />
Token<br />
for N2<br />
IPPDU1<br />
Token<br />
for N1
4-June-07 P1901_PRO_016_r0<br />
The following diagram ¡Error! No se encuentra el origen de la referencia.depicts a transmission sequence<br />
using this kind of token. As it is outlined in the above diagram, a transmission sequence starts with a Distributor<br />
Token. This type of token assigns the channel to a list of nodes. The Data Token is used by slaves to release the<br />
token to the next detination node. Further sections describe this diagram in more detail.<br />
List Info<br />
Dst1 = Slave 1 Validity1 SessionId1<br />
Dst2 = Slave 4 Validity2 SessionId2<br />
IPPDUS1<br />
Dst3 = Slave 3 Validity3 SessionId3<br />
Dst4 = Slave 2 Validity4 SessionId4<br />
IPPDUS2 IPPDUS2 IPPDUS2<br />
IPPDUS2<br />
MASTER<br />
DISTRIBUTOR<br />
TOKEN<br />
Slave 1<br />
Slave 4 DATA<br />
TOKEN to Slave 2<br />
Slave 3<br />
Slave 2<br />
DATA TOKEN<br />
To Slave 4<br />
DATA<br />
From SessionId1<br />
≤ Valitdity1<br />
DATA<br />
≤ Valitdity2<br />
From SessionId2<br />
DATA TOKEN to Slave 3<br />
DATA<br />
From SessionId3<br />
≤ Validity3<br />
Figure 24: Transmission Sequence<br />
DATA<br />
From SessionId4<br />
≤ Validity4<br />
DATA TOKEN<br />
to MASTER<br />
Submission page 85 UPA-OPERA<br />
DISTRIBUTOR<br />
TOKEN<br />
Using the previously described channel access, a programmed timming interval can be set, synchronized or not<br />
with the mains meriod using the clock token, where several nodes in a preestablished order can transmit.<br />
4.1.2 Contention medium access example<br />
In the previous examples, the destination of the token, <strong>and</strong> so, the next token holder is explicity defined in the<br />
information that the token contains. In the case of CSMA or <strong>Access</strong> Replay frame, the next token holder is not<br />
predefined by the node that transmit the token, but a priorized contention period is open to decide the node that<br />
will be the next token holder.<br />
Asume again the topology described in Figure 23.
4-June-07 P1901_PRO_016_r0<br />
The HE send a CSMA frame ended with a CSMA token, <strong>and</strong> a priorized contention period is open for all the<br />
nodes that can heard this token:<br />
S<br />
O<br />
T<br />
CSMA Token<br />
CSMA PPDU<br />
IPPDU1<br />
P0min<br />
P0max P1min<br />
Backoff<br />
slot time<br />
Backoff time<br />
CONTENTION WINDOW<br />
P1max P2min<br />
P2max P3min<br />
Submission page 86 UPA-OPERA<br />
S<br />
O<br />
T<br />
Figure 25: CSMA Frame<br />
PPDU<br />
Contention winner Node<br />
Each of the nodes will contend putting an SOT in a r<strong>and</strong>om position inside a predetermined range of the contention<br />
window. The range is determined by the state of the node <strong>and</strong> the service class of the traffic that want to transmit<br />
among other, as explained in section 6. The node that was able to send the SOT before any one, will win the right to<br />
transmit a frame.<br />
4.2 <strong>MAC</strong> STATES MANAGEMENT<br />
<strong>MAC</strong> states include node states which are specific states managed both on the master side <strong>and</strong> the slave side.<br />
They correspond to specific actions described here below.<br />
4.2.1 Master side<br />
From a master st<strong>and</strong>point, a slave can be in three different states: Active, Idle, <strong>and</strong> Unregistered. These states<br />
are related to the following master-side actions (see Figure 26 <strong>and</strong> Figure 27 ):<br />
� Active: A master shall regularly transmit a data token to Active slaves. If a slave returns a data token<br />
without using any of the time resources originally granted, the master may list this slave as Idle. The<br />
master may also list the slave as Idle, if the only data sent has priority 7 (reserved for control packets).<br />
P3max<br />
Token
4-June-07 P1901_PRO_016_r0<br />
� Idle: No data token is transmitted to an Idle slave, that is to say this slave does not get any scheduled<br />
transmission opportunity until it is required. This feature reduces the transmission of empty frames by non<br />
active slaves <strong>and</strong> it also increases the network performance, since the transmission opportunities not given<br />
to Idle slaves can be used by other Active users. A master shall regularly transmit Polling Frames to an Idle<br />
slave. This management is done in a different way <strong>and</strong> with different token depending on the type of the<br />
slaves: TDRs or CPEs.<br />
o When the Idle slave is a CPE, the master shall poll it to check if it has data to transmit from a<br />
service class different from number 7 (See 8). If yes, it must be considered Active again. If<br />
answer is no, it shall be considered registered, although it has no data of higher service class to<br />
transmit. When the CPE has no activity, that means, no data is transmitted during long times,<br />
must be considered as Unregistered. This information is obtained by means of two different<br />
types of Polling Tokens: Active Polling Tokens <strong>and</strong> Alive Polling Tokens respectively. Up to<br />
32 CPEs can be polled with only one of these Polling Frames.<br />
� Active Polling Tokens shall be regularly transmitted by the master to manage<br />
transitions from Idle to Active. A slave which replies to an Active Polling Token shall<br />
be listed as Active by its master. A master is constrained to transmit an Active Polling<br />
Token with a maximum interval equal to MAX_ACTIVE_POLL_INTERVAL.<br />
� Alive Polling Tokens shall be regularly transmitted by the master to manage transitions<br />
from Idle to Unregistered. A master is constrained to transmit an Alive Polling Token<br />
with a maximum interval equal to MAX_ALIVE_POLL_INTERVAL. A slave which<br />
does not reply to a number of Alive polling tokens equal to MAX_ALIVE_TOKENS<br />
shall be listed as Unregistered.<br />
o When the slave is a TDR, the master shall only consider it as Idle when neither it nor any of the<br />
slaves in its BPL sub-tree are transmitting or receiving data of service class 1 to 6; this<br />
information is available in the field Frame Priority sent in the Data Token (see 0). The<br />
management of idle TDRs from the master side is slightly different from idle CPEs, although<br />
the concept stays the same. The reason for these differences is that TDRs shall provide some<br />
periodic services to the users in their BPL sub-tree <strong>and</strong> to other non-registered users within<br />
their visibility area apart from notifying if they have traffic to send. The master shall send a<br />
TDR Polling Frame to every Idle TDR connected to it as a slave, with a maximum interval<br />
equal to MAX_ACTIVE_POLL_INTERVAL.<br />
The master shall give enough validity in this polling token for the TDR to send at least an<br />
<strong>Access</strong> Frame every <strong>MAC</strong>_ACCESS_INTERVAL, as many Polling Frames to CPEs as<br />
required (from 0 to 4, depending on the number of banks needed) every<br />
MAX_ACTIVE_POLL_INTERVAL <strong>and</strong> as many TDR Polling Frames as TDRs connected to<br />
it as slaves every MAX_ACTIVE_POLL_INTERVAL. The validity should be calculated from<br />
the topology information provided by the Cluster Discovery Protocol (see 0).<br />
A TDR that does not reply a number of consecutive TDR Polling Tokens equal to<br />
MAX_ALIVE_TOKENS shall be listed as Unregistered.<br />
Submission page 87 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Note: If a master has pending downstream data for an Idle slave belonging to a service class different from<br />
7, the master may automatically switch the status of this slave into Active <strong>and</strong> start giving it transmission<br />
opportunities.<br />
� Unregistered: An Unregistered slave is not explicitly managed by a master. However, the master is<br />
constrained to regularly broadcast access frames to discover/recover Unregistered slaves. The maximum<br />
transmission interval of these access frames is MAX_ACCESS_INTERVAL.<br />
The HE should also turn Idle itself when it has no users or all its users are Idle during a period, in order to<br />
reduce to the minimum the electromagnetic interference <strong>and</strong> the power consumption.<br />
This requirement implies stopping all <strong>MAC</strong> activity when the whole network is idle except for the transmissions<br />
of <strong>Access</strong> Frames <strong>and</strong> Active, Alive <strong>and</strong> TDR Polling Frames, which shall be made at least within the specified<br />
intervals.<br />
The HE shall switch to Active status, when any of these situations occurs:<br />
• automatically, if it has data from service class different from 7 to transmit to any user,<br />
• after sending an Active Polling Frame or a TDR Polling Frame, if any of its slaves (TDRs <strong>and</strong>/or CPEs)<br />
replies affirmatively <strong>and</strong><br />
• after sending an <strong>Access</strong> Request Frame if any user replies to it, so that the <strong>Access</strong> Protocol process can<br />
be started.<br />
4.2.2 Slave side<br />
4.2.2.1 CPE side<br />
From a slave st<strong>and</strong>point, a CPE can be in two different states: Registered or Unregistered (see Figure 28 )<br />
� Unregistered: This is the initial state of a slave. An unregistered slave is only authorized to answer access<br />
frames as required by the access protocol. When the access protocol process is completed <strong>and</strong> successful,<br />
the slave enters the Registered state.<br />
� Registered: The following specific requirements apply to this state:<br />
o A Registered CPE shall never reply to access frames from its current master. It might reply to<br />
access frames from another master if it wishes to change its current master.<br />
o A Registered CPE shall not reply to an Active polling token if it has no need for network<br />
resources.<br />
o A Registered CPE that wishes to continue in that state shall always reply to an Alive polling<br />
token.<br />
o A Registered CPE which has not received any Alive polling token or Data token for more than<br />
MAX_ALIVE_TOKENS*MAX_ALIVE POLL_INTERVAL shall enter the Unregistered state.<br />
The counting of this time interval shall be initialized at the end of the last polling slot in which<br />
the slave has asserted a SOT or at the reception of the last Data Token received by the<br />
Registered slave, whichever is later.<br />
Submission page 88 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.2.2.2 TDR side<br />
From a slave st<strong>and</strong>point, a TDR can be in two different states: Registered or Unregistered (see Figure 27).<br />
� Unregistered: This is the initial state of a slave. An unregistered slave is only authorized to answer access<br />
frames as required by the access protocol. When the access protocol process is completed <strong>and</strong> successful,<br />
the slave enters the Registered state.<br />
� Registered: The following specific requirements apply to this state:<br />
o A Registered TDR shall never reply to access frames from its current master. It might reply to<br />
access frames from another master if it wishes to change its current master.<br />
o A Registered TDR, at the reception of a TDR Polling Frame, shall ensure to transmit <strong>Access</strong><br />
Frames, Polling Frames <strong>and</strong> TDR Polling Frames for all its slaves in the maximum specified<br />
intervals (see 4.6). Afterwards, the TDR shall reply to the TDR Polling Frame sent by the<br />
master indicating whether it wants to be Active or it wants to stay Idle but still Registered.<br />
o An Registered TDR, in Idle state, shall not transmit any Data Token. It shall no transmit any<br />
data either, except for service class 7 traffic. Nevertheless, the TDR could transmit data in the<br />
TDR Polling Reply Frame when it indicates that it wants to be Active again, if it has enough<br />
remaining validity for it.<br />
o A Registered TDR which has not received any TDR Polling Token or Data Token for more<br />
than MAX_ALIVE_TOKENS*MAX_ACTIVE POLL_INTERVAL shall enter the Unregistered state.<br />
The counting of this time interval shall be initialized at the end of the TDR Polling Reply<br />
symbol sent or at the reception of the last Data Token received by the Registered slave,<br />
whichever is later.<br />
Submission page 89 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.2.3 Transition state diagrams<br />
Legend<br />
Slave state (master side)<br />
Transition event<br />
Master actions associated to the state<br />
No response to<br />
MAX_ALIVE_TOKENS<br />
Alive polling tokens<br />
Idle<br />
Master regularly sends Active<br />
polling tokens <strong>and</strong> Alive polling<br />
tokens to this slave. No data token<br />
is transmitted to this slave.<br />
Master does not manage this state.<br />
Regularly, the master broadcasts an access frame<br />
to discover/recover Unregistered nodes.<br />
Unregistered<br />
The slave replies<br />
to an Active polling token<br />
The slave does<br />
not make use of the time<br />
granted by<br />
its master<br />
Figure 26 CPE states – Master side<br />
<strong>Access</strong> protocol<br />
completed<br />
Submission page 90 UPA-OPERA<br />
Active<br />
Master sends data<br />
tokens to this slave.<br />
No polling token<br />
is sent to this slave
4-June-07 P1901_PRO_016_r0<br />
Legend<br />
TDR state (master side)<br />
Transition event<br />
Master actions associated to the state<br />
No response to<br />
MAX_ALIVE_TOKENS<br />
TDR polling tokens<br />
Idle<br />
Master regularly sends TDR polling<br />
tokens to this TDR. No data token is<br />
transmitted to this TDR.<br />
Master does not manage this state.<br />
Regularly, the master broadcasts an access frame<br />
to discover/recover Unregistered nodes.<br />
Unregistered<br />
The TDR replies affirmatively<br />
to a TDR polling token<br />
The TDR does<br />
not make use of the time<br />
granted by<br />
its master<br />
Figure 27 TDR states – Master side<br />
<strong>Access</strong> protocol<br />
completed<br />
Submission page 91 UPA-OPERA<br />
Active<br />
Master sends data<br />
tokens to this TDR.<br />
No polling token<br />
is sent to this TDR.
4-June-07 P1901_PRO_016_r0<br />
Legend<br />
Slave state (slave side)<br />
Transition event<br />
Slave actions associated to the state<br />
4.3 FRAME FORMATS<br />
No response to/ No reception of<br />
Alive Polling tokens for<br />
MAX_ALIVE_TOKENS*MAX_ALIVE_POLL_INTERVAL<br />
Unregistered<br />
Registered<br />
Figure 28 Slave states – Slave side<br />
The slave shall only reply to<br />
access frames as required by<br />
the access protocol<br />
<strong>Access</strong> protocol<br />
process completed<br />
The slave shall never reply to access<br />
frames from its master. It might answer access<br />
frames from another master if it wishes to change<br />
of master.<br />
A frame corresponds to an MPDU passed by the <strong>MAC</strong> layer to the <strong>PHY</strong> layer. There are two types of MPDUs:<br />
regular MPDUs <strong>and</strong> Channel Estimation MPDUs.<br />
Regular MPDUs can encapsulate bursts provided by the LLC layer.<br />
Channel Estimation MPDUs are directly triggered by the <strong>MAC</strong> layer; they carry a specific signal sequence<br />
generated by the <strong>PHY</strong> layer: Channel Estimation MPDUs do not encapsulate any burst provided by the LLC<br />
layer.<br />
Regular MPDU:<br />
Submission page 92 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
MPDU<br />
Burst<br />
TA BH Data 1 BH Data 2 BH Data 3 Token<br />
Figure 29 Regular MPDU format<br />
The structure of a regular MPDU is depicted in Figure 29. The MPDU is of variable size <strong>and</strong> it is composed by:<br />
- A token announce (TA) delimiter: The token announce defines, amongst other things, which is the<br />
current transmitter <strong>and</strong> what is the maximum transmission time of the current frame (Token Announce<br />
Validity).<br />
- A sequence of bursts, each burst being composed of a Burst Header delimiter followed by data payload.<br />
The bursts included in a transmission frame can have different destination nodes. Burst addressed to a<br />
particular node shall be transmitted in order according to their Burst Id (see 5.2). Bursts to different<br />
destinations can be transmitted in any order. The destination port of the burst is included in the Burst<br />
Header, as well as information such as transfer control, encryption, used FEC, etc. The number of<br />
bursts in a regular MPDU ranges from zero to the maximum allowed by the assigned validity (see<br />
4.4.1).<br />
- A token delimiter.<br />
The type of a regular MPDU is defined by the type of token terminating in the frame. The types of regular<br />
MPDUs are:<br />
1. Distributor Frame<br />
2. Data Frame<br />
3. Silence Frame<br />
4. Polling Frame<br />
5. TDR Polling Frame<br />
6. CSMA Frame<br />
7. <strong>Access</strong> frame<br />
8. <strong>Access</strong> Reply frame<br />
9. Non-returnable Data frame<br />
10. Clock Frame<br />
Channel Estimation MPDU<br />
Submission page 93 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
All MPDUs follow the sequence described above except for the Channel Estimation Frame: this frame does not<br />
contain neither bursts nor token. It starts with a Token Announce delimiter followed by a sequence of channel<br />
estimation symbols.<br />
4.3.1 Distributor Frame<br />
This frame ends with a Distributor Token. This Token assigns the channel to a list of nodes (distribution list)<br />
indicating the transmission order of the nodes, the session allowed to transmit <strong>and</strong> the channel time assigned to<br />
each of them.<br />
Nodes included in the distributor list shall transmit in the indicated order. First node on the distribution list<br />
starts transmitting using the session (see 8.1) <strong>and</strong> for the maximum time indicated in the Distributor Token.<br />
When it ends transmitting, it assigns the channel to the subsequent node on the distribution list using the Data<br />
Token.<br />
When second node on the distribution list receives a Data Token from the first node, it starts transmitting from<br />
the session <strong>and</strong> for the maximum time indicated in the Distributor Token. When this node ends transmitting, it<br />
assigns the channel to the third node on the distribution list. This process is repeated until the last node on the<br />
distribution list returns the channel to the Master node. At this point, the master will be able to transmit a new<br />
frame of the desired type.<br />
Master node can configure the distribution list with a maximum number of five nodes.<br />
The holder token node can assign the channel to the desired nodes during its assigned channel time. In this way,<br />
a repeater node can transmit another Distributor token to its slave nodes or it can assign the channel to a CPE.<br />
Following time diagram shows the described process in a scenario with four nodes (see Figure 23).<br />
Submission page 94 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
List Info<br />
Dst1 = Slave 1 Validity1 SessionId1<br />
Dst2 = Slave 4 Validity2 SessionId2<br />
Dst3 = Slave 3 Validity3 SessionId3<br />
Dst4 = Slave 2 Validity4 SessionId4<br />
MASTER<br />
DISTRIBUTOR<br />
TOKEN<br />
Slave 1<br />
Slave 4 DATA<br />
TOKEN to EP2<br />
Slave 3<br />
Slave 2<br />
IPDUS1 IPPDUS2 IPPDUS2 IPPDUS2<br />
IPPDUS2<br />
DATA TOKEN<br />
To Slave 4<br />
DATA<br />
From SessionId1<br />
≤ Valitdity1<br />
DATA<br />
≤ Valitdity2<br />
From SessionId2<br />
DATA TOKEN to Slave 3<br />
DATA<br />
From SessionId3<br />
≤ Validity3<br />
Figure 30 Example of transmission sequence<br />
DATA<br />
From SessionId4<br />
≤ Validity4<br />
DATA TOKEN<br />
to MASTER<br />
Submission page 95 UPA-OPERA<br />
DISTRIBUTOR<br />
TOKEN<br />
In the above example, Master node assigns the channel to nodes SLAVE 1, SLAVE 4, SLAVE 3 <strong>and</strong> SLAVE 2.<br />
The channel allocation scheduling is decided by the QoS in order to grant the allocated resources to each node.<br />
SLAVE 1 node starts transmitting after the reception of the Distributor token. SLAVE 1 has the right to use the<br />
channel for the maximum time assigned in the Distributor Token (Validity). During this time SLAVE 1 is<br />
allowed transmitting from the flow indicated in the Distritubor Token (SessionId). This value identifies the flow<br />
(source <strong>MAC</strong>, destination <strong>MAC</strong> <strong>and</strong> service class of the allowed flow). The resources reservation protocol <strong>and</strong><br />
the assignation of an identifier for each accepted flow is detailed at the QoS section.<br />
When the holder token node ends transmitting, it releases the token to the next node. In this way, if it has not<br />
enough data packet to use all the assigned channel time, it assigns the channel immediately to the next node, not<br />
wasting the remaining channel time.<br />
If a node has not direct visibility to the next destination node on the distribution list, it has to return the token to<br />
the Master. Then, Master will transmit a new Distributor Token assigning the channel to the next nodes on the<br />
distribution list.<br />
Token holder node checks before start transmitting if next transmission is point to point (a single destination<br />
node) or if it is point to multipoint (different destination nodes). Master node assigns the token to a node to<br />
transmit from a given session identifier. Each node has its own table with information about sessions requested.<br />
This table indicates the destination node/s of that flow/s. If session identifier has the zero value, node can
4-June-07 P1901_PRO_016_r0<br />
transmit to different nodes in the same transmission. Usually, this type of transmission will be only performed<br />
for low service class traffic.<br />
As it is described in the above time diagram, Inter PPDU Space (IPPDUSx) depends on the type of the next<br />
frame to be transmitted. In the <strong>MAC</strong> Parameters Section, it is detailed the value of each Inter PPDU Space.<br />
4.3.2 Data Frame<br />
When a data frame is transmitted from a master to one of its slaves (the direction of the token is downstream),<br />
the data token at the end of the data frame will indicate for how long the slave is allowed to transmit. This<br />
length of time is known as the token validity, <strong>and</strong> is expressed as a number of symbols. The maximum length of<br />
the data frame is limited by the validity.<br />
Upon transmitting a data token, the node will enter reception mode.<br />
When a CPE receives a data token, it may transmit a data frame for as long as the received data token validity<br />
indicated. At the end of the frame, a data token is transmitted indicating the end of the transmission. At this<br />
point, the master node will take over the channel again.<br />
When a Time Division Repeater (TDR) receives a data token from its master node, it schedules the<br />
transmissions between itself <strong>and</strong> the master node <strong>and</strong> also distributes new tokens among its slaves, for as long<br />
as the received data token validity indicated.<br />
The validity does not need to be fully used by the receiving node, <strong>and</strong> it will not be wasted: the validity only<br />
sets the maximum length of time between the transmission of a token downstream <strong>and</strong> the return of this token,<br />
<strong>and</strong> it does not reflect the actual length.<br />
4.3.3 Silence Frame<br />
A node transmits the silence frame when it does not want to transmit the token to another node at the end of the<br />
frame or when no other kind of frames can be sent (or need to be sent). A silence frame may contain bursts with<br />
payload data. Upon transmitting a silence token, the node shall transmit a new frame.<br />
For instance, the silence frame may be used by a HE node that is alone in the network. In that situation it shall<br />
send periodical access frames, <strong>and</strong> silence frames will cover the rest of the time. Another use is when the bursts<br />
to be transmitted do not fit in one single MPDU. In such a case it is possible to transmit several consecutive<br />
silence frames <strong>and</strong> a final data frame to pass the token to another node.<br />
Upon reception of a silence token, no action needs to be done.<br />
Submission page 96 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.3.4 Channel Estimation Frame<br />
Periodically, every node has to send a channel estimation frame so that nodes communicating with that node<br />
can estimate their channel <strong>and</strong> adjust their bit-loading table.<br />
A channel estimation frame is composed by a token announce followed by a known pseudo-r<strong>and</strong>om sequence of<br />
16 symbols. A channel estimation frame is not addressed to any specific node. Any node which receives a<br />
Channel Estimation frame shall consider this frame if the transmitter <strong>MAC</strong> address included in the Token<br />
Announce is part of a completed entry in the port solver table (see 9.1.4.1).<br />
A channel estimation process may lead to the transmission of a bit-loading table calculated upon the reception<br />
of a Channel Estimation Frame. The Adaptive Bit-Loading Protocol is used for the transfer of this bit-loading<br />
table <strong>and</strong> its acknowledgement (see section 9.1.2). Every node is responsible for evaluating the appropriate time<br />
to return the calculated bit-loading table. For instance, if there are major changes in the new calculated bitloading<br />
table with respect to the previous one, the node can immediately return the new bit-loading table before<br />
any other transmission is considered. If the new bit-loading table has undergone no changes, the node shall not<br />
return any bit-loading table.<br />
4.3.4.1 Transmission of channel estimation frames by TDRs <strong>and</strong> CPEs<br />
TDRs <strong>and</strong> CPEs shall ask permission to their master to transmit a channel estimation frame. The channel<br />
estimation frame sent by a TDR may be used by the master <strong>and</strong> the slaves of the TDR to estimate the channel<br />
from the TDR. The channel estimation frame sent by a CPE may be used by the master of the CPE to estimate<br />
the channel from the CPE. A TDR shall not transmit channel estimation frames within its validity period unless<br />
the Allow channel estimation frame field received within the data token was set to 1 by its master, but can grant<br />
rights to transmit channel estimation frames to its slaves.<br />
As shown in Figure 31, the channel estimation process can be initiated either by the TDR or CPE (referred as<br />
slaves) or its master.<br />
Submission page 97 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
1<br />
Send CE frame next=1<br />
in Data Token<br />
Slave initiated<br />
2<br />
Master<br />
Allow CE frame=1<br />
in Data Token<br />
Slave<br />
CE frame<br />
3<br />
4<br />
Unicast Bit-loading<br />
table<br />
for uplink<br />
CE=Channel Estimation<br />
Allow CE frame=1<br />
in Data Token<br />
Master initiated<br />
Submission page 98 UPA-OPERA<br />
1<br />
Master<br />
Slave<br />
CE frame<br />
2<br />
Figure 31 Transmission of channel estimation frames by TDRs <strong>and</strong> CPEs<br />
� Channel estimation initiated by the slave:<br />
3<br />
Unicast Bit-loading<br />
table<br />
for uplink<br />
A slave shall periodically evaluate that it is time to send a new channel estimation frame. A slave shall not ask<br />
permission to send a channel estimation frame more than once every MIN_INTERVAL_FOR_CE_REQUESTS<br />
(default value is 3 seconds <strong>and</strong> corresponds to the minimum number of seconds between two requests from the<br />
same slave for an uplink channel estimation).<br />
A slave may ask permission to send a channel estimation frame by setting the “Send Channel Estimation Frame<br />
Next” to 1 in the data token to its master. The master may accept or reject this request by setting the “Allow<br />
Channel Estimation Frame” to 1 (Accept) or 0 (Reject) in the next data token it returns to this slave. Upon<br />
reception of a data token with “Allow Channel Estimation Frame” set to 1, the slave shall transmit a Channel<br />
Estimation Frame. At the end of the transmission the slave shall enter reception mode, <strong>and</strong> the next transmitter<br />
will be the master.<br />
� Channel estimation initiated by the master:<br />
The channel estimation process also allows the master for asking the slave to send a channel estimation frame.<br />
In this case, the master directly sets the “Allow Channel Estimation” to 1 in the data token sent to the slave. The<br />
process is then executed in the same way as mentioned above.<br />
A master may request a slave to transmit a Channel Estimation frame as often as it deems necessary.
4-June-07 P1901_PRO_016_r0<br />
4.3.4.2 Transmission of channel estimation frames by the HE<br />
The process for the HE is different since it is the only node in the BPL cell that does not have a master.<br />
The HE can send a Channel Estimation Frame as often as it deems necessary. At the end of the transmission of<br />
a Channel Estimation frame by the HE, it is the HE which keeps the control of the medium.<br />
The channel estimation frame sent by a HE may be used by the slaves of the HE to estimate the channel from<br />
the HE. Each slave will have the opportunity to return the new calculated unicast bit-loading table (via the<br />
ABLP protocol) as soon as it receives a data token from its master. However, as described above, the slave shall<br />
not necessarily return the unicast bit-loading table as soon as it receives a data token following a Channel<br />
Estimation frame.<br />
4.3.5 Polling Frame<br />
As described in 4.2.1, polling frames are used by the master to manage CPE state transitions from Idle to<br />
Active or Idle to Unregistered.<br />
Polling frames are frames terminated by a Polling Token. Polling Tokens are addressed to several CPE at the<br />
same time via the Polling Destination Bank/Polling Destination Ports fields of the Polling Token (see 4.4.2.4,<br />
Polling Token). A Polling Token is followed by a polling response sequence made of polling slots. The number<br />
of polling slots included in this sequence corresponds to the number of bits set to 1 in the Polling Destination<br />
Ports field of the polling token (max = 32). First bit set to 1 (going from the Least to the Most Significant bit)<br />
corresponds to the first polling slot in the polling response sequence <strong>and</strong> so forth. Upon reception of a polling<br />
token, a CPE which is addressed by this token shall assert a SOT in its corresponding polling slot if that answer<br />
to the polling token is affirmative. It shall not respond if the answer to the polling token is negative.<br />
Figure 32 shows a typical polling scheme in which three CPEs are polled. CPE 1 <strong>and</strong> CPE 3 assert a SOT in<br />
their corresponding polling slots (affirmative response) while CPE 2 does not respond to the polling token<br />
(negative response). Polling slots have duration equal to Size Poll Window. Two polling slots are separated by a<br />
gap of Offset Poll Window. The last polling slot of the Polling Response Sequence is not followed by this gap:<br />
the TX-RX Switch time shall be initiated immediately after the transmission of the last polling slot<br />
Submission page 99 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Polling Token addressed<br />
to Slaves 1,2 <strong>and</strong> 3<br />
Master<br />
TX<br />
Slave1<br />
TX<br />
Slave2<br />
TX<br />
Slave3<br />
TX<br />
Polling PPDU<br />
IPPDUS1<br />
Time<br />
Size Poll<br />
Window<br />
Submission page 100 UPA-OPERA<br />
Polling<br />
Slot 1<br />
S<br />
O<br />
T<br />
Figure 32 Polling scheme<br />
Offset Poll<br />
Window<br />
Size Poll<br />
Window<br />
Polling<br />
Slot 2<br />
Offset Poll<br />
Window<br />
Size Poll<br />
Window<br />
Polling<br />
Slot 3<br />
As described in 4.2.1, there are two types of Polling Tokens transmitted by a master to CPEs:<br />
• Active Polling Token<br />
• Alive Polling Token<br />
These Polling Tokens are identified by the Polling Type field (see 4.4.2.4, Polling Token).<br />
S<br />
O<br />
T<br />
IPPDUS1<br />
Note: Active Polling Tokens provide an Idle CPE with the ability to recover the Active state <strong>and</strong> get<br />
transmission opportunities. The master transmits data tokens only to those slaves that are considered Active.<br />
Alive Polling Tokens provide the master with the ability to detect slaves with no activity (e.g.: turned off).<br />
These ones become Unregistered <strong>and</strong> are not polled anymore.<br />
4.3.6 TDR Polling Frame<br />
As described in 4.3.5, master shall periodically poll its Idle TDRs <strong>and</strong> give them opportunity to poll their own<br />
Idle slaves (CPEs <strong>and</strong>/or TDRs) <strong>and</strong> transmit <strong>Access</strong> Frames. TDR Polling Frames have the same format as a<br />
Data Frame except for the last symbol, which is a TDR Polling Token instead of a Data Token. TDR Polling
4-June-07 P1901_PRO_016_r0<br />
Tokens are addressed to a single port <strong>and</strong> when they are generated by the master, they shall have enough<br />
validity for the polled TDR to transmit Active <strong>and</strong> Alive Polling Frames, TDR Polling Frames <strong>and</strong> <strong>Access</strong><br />
Frames within the maximum intervals.<br />
This kind of frame is also used by the TDR to indicate whether it wants to be Active or stay Idle; in this case<br />
this frame can only contain service class 7 traffic, except if it is an Active TDR Polling Reply Frame, case in<br />
which any data can be transmitted, according to the remaining validity.<br />
4.3.7 CSMA Frame<br />
The aim of this type of frame is to provide the nodes which do not have access to the channel, an opportunity to<br />
gain access. This type of frame is addressed to:<br />
• Idle nodes that have data packets to send in order to change them into active ones.<br />
• Idle nodes that generates bursty traffic<br />
When a node receives a CSMA token <strong>and</strong> wants to transmit, it must contend for the channel. This contention is<br />
performed through a Backoff. If the node wins the contention it starts transmitting; otherwise, the node waits for<br />
another CSMA token.<br />
Each node will contend for channel access with a different value depending on its contention priority;<br />
contention is prioritized in the following way:-<br />
• High Service class Data traffic <strong>and</strong> idle state: in order to minimize the probability of collision between<br />
nodes that are in the same case each of them will select a r<strong>and</strong>om value in the range [P1min, P1max]. In<br />
this case, the <strong>MAC</strong> must configure the node to transmit only packets with service class 7. The idea is to<br />
only send the Resource Request Packet <strong>and</strong> not send the High Service class Data traffic to avoid<br />
glitches in the audio or the video application.<br />
• Idle node with control packets: this contention range [P2min, P2max] is reserved in order the idle<br />
nodes send the control packets.<br />
• Idle node with Bursty Traffic: this contention range [P3min, P3max] is reserved for nodes with very<br />
low throughput of low service class data traffic.<br />
Submission page 101 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.3.8 <strong>Access</strong> Frame<br />
S<br />
O<br />
T<br />
CSMA Token<br />
CSMA PPDU<br />
IPPDUS1<br />
P0min<br />
P0max P1min<br />
Backoff<br />
slot time<br />
Backoff time<br />
CONTENTION WINDOW<br />
P1max P2min<br />
P2max P3min<br />
Submission page 102 UPA-OPERA<br />
S<br />
O<br />
T<br />
PPDU<br />
Contention winner Node<br />
P3max<br />
Token<br />
Figure 33: Use of CSMA Token to assign channel time to the contention winner node<br />
A master shall periodically transmit <strong>Access</strong> tokens inviting Unregistered slaves or Registered slaves that want<br />
to change masters to subscribe to the network. An <strong>Access</strong> Token does not have a specific destination, <strong>and</strong> thus it<br />
is possible that no slave will answer to this request. Upon receiving an access frame, an Unregistered slave or a<br />
Registered slave that decides to reply must send an access reply frame as described in 4.3.6.<br />
4.3.9 <strong>Access</strong> Reply Frame<br />
The access reply frame is sent by an Unregistered slave that wishes to enter the network, or a Registered slave<br />
that wishes to change its current master. The transmission of an <strong>Access</strong> Reply Frame is triggered by the<br />
reception of an <strong>Access</strong> Frame.
4-June-07 P1901_PRO_016_r0<br />
Master<br />
TX<br />
Slave<br />
TX<br />
S<br />
O<br />
T<br />
<strong>Access</strong> Token<br />
<strong>Access</strong> PPDU<br />
IPPDUS1<br />
Backoff time: slave selects slot 5<br />
Submission page 103 UPA-OPERA<br />
Time<br />
Backoff<br />
slot time<br />
S<br />
O<br />
T<br />
Figure 34 <strong>Access</strong> Reply scheme<br />
<strong>Access</strong> Reply PPDU<br />
<strong>Access</strong> Reply<br />
Token<br />
The <strong>Access</strong> Reply Frame is preceded by a contention. The contention method used is the backoff contention<br />
method: all contending nodes select a r<strong>and</strong>om amount of time to wait before beginning the transmission. The<br />
SOT can be transmitted in one of 16 slots. Each node that intends to send an <strong>Access</strong> Reply PPDU will select a<br />
r<strong>and</strong>om number between 1 <strong>and</strong> 16 with a uniform distribution <strong>and</strong> schedule the transmission of the PPDU in the<br />
appropriate slot (slot 1 corresponds to the first slot after the TX-RX switch time has expired). The size of each<br />
slot is BACKOFF_SLOT_TIME. After the backoff time has expired, the <strong>Access</strong> Reply PPDU must be<br />
transmitted. If a SOT (beginning of an <strong>Access</strong> Reply PPDU) is heard before the time has expired, another node<br />
has won the contention <strong>and</strong> the transmission of the access reply frame should be deferred until a new access<br />
frame is received. A new r<strong>and</strong>om slot will be selected the next time. Particularly, the backoff process is not<br />
affected by the loss of a contention, <strong>and</strong> the process will be carried out in the same manner, except that the<br />
r<strong>and</strong>om slot will be selected again.<br />
If no SOT is heard before starting the transmission of the own SOT, the whole transmission of the access reply<br />
frame will take place. Its structure is identical to a data frame, except for the final token type.<br />
The master, upon receiving an access reply frame, will consider, taking into account Radius, QoS or any other<br />
criteria defined, accepting this node as its slave. The response will be sent as an access packet (see 9.1.3.1). If a<br />
node that transmitted an <strong>Access</strong> Reply PPDU does not receive a reply from the master in ACCEPTATION_TO it<br />
will begin the process again.
4-June-07 P1901_PRO_016_r0<br />
4.3.10 Non-returnable Data Frame<br />
The non-returnable data frame is a frame transmitted from a master to many (up to eight) of its slaves (usually<br />
TDRs). The non-returnable data token transmitted at the end of the frame indicates which are the destination<br />
nodes <strong>and</strong> for how long they will be allowed to transmit. This length of time is known as the token validity, <strong>and</strong><br />
is expressed as a number of symbols. The non-returnable data frame can only be sent by a master if Cluster<br />
Discovery Protocol (See 0) messages have been received from the TDRs that are slaves to it.<br />
Upon transmitting a non-returnable data token, the master will ignore any signals received until the validity<br />
time is finished. At this point, the master will transmit a new frame. No frame will be expected by the<br />
transmitter of the non-returnable data frame.<br />
Upon reception of the non-returnable data frame, the slaves (usually TDRs) will start transmitting new frames.<br />
However, they must not transmit any data in the upstream (data for the master that sent the non-returnable data<br />
frame), or any channel estimation frames.<br />
The non-returnable data frame allows the simultaneous transmission of data <strong>and</strong> tokens of several isolated<br />
clusters, thus allowing for spatial reuse.<br />
4.3.11 Clock Frame<br />
The Clock frame is used to synchronize all nodes of a BPL cell.<br />
Every node shall have an internal timer derived from a 312.5 kHz clock. The periodic timer shall count down from a<br />
maximum value to zero. The maximum timer value (Tmax) shall be adapted to span 9 mains periods to allow enough<br />
numerical accuracy. This value is transmitted in the Clock token together with the remaining cycles (TimerValue)<br />
which shall be the value of the timer in the moment the Clock token is transmitted.<br />
The information transmitted in the Clock frame shall be the remaining cycles for reaching the end of the timer<br />
period. This information is used in the receiver node to calculate the delay between its timer <strong>and</strong> the transmitter<br />
timer. The delay with the master shall be used to compensate the own timer. The Clock frame shall be transmitted<br />
only from masters to its direct slaves. Therefore, when a node receives a Clock frame, it shall check that it comes<br />
from its direct master before using the information. The master/slave tree topology allows the propagation of the<br />
information.<br />
The mains frequency is not a stable value <strong>and</strong> fluctuates depending on the energy dem<strong>and</strong>. So, the maximum timer<br />
value shall be continuously corrected to follow the mains variations. Tmax can be obtained in two different ways:<br />
1. Using a zero-cross point detection circuit.<br />
2. Using the MaximumCorrectionValue field of the Clock token. This field allows a slave to synchronize with<br />
the network clock without using a zero-cross point detection circuit.<br />
From Tmax the value of the actual mains periord (Tmains) can be calculated in the following way:<br />
Submission page 104 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Tmax<br />
Tmains =<br />
9<br />
Equation 33<br />
This periodic timer shall be used to divide the mains period in fixed duration time slots called Qs. The Qs shall be<br />
obtained directly from the periodic timer (Ti) as it is shown in Equation 34.<br />
( T mod T ) >> 6<br />
Q = i mains<br />
Equation 34<br />
The duration of a Q is 204.8 μs, <strong>and</strong> the number of Qs (mains period divisions) will be different depending on the<br />
mains frequency. For example 98 in the case of 50 Hz <strong>and</strong> 82 in the case of 60 Hz, assuming there is no deviation<br />
from the nominal frequency.<br />
The MPDU of a Clock frame shall be composed by a Token Announce <strong>and</strong> a Clock token delimiter. The transmitter<br />
of a Clock frame shall know exactly the frame size (in symbols) before start transmitting, in order to calculate the<br />
delay added in the transmission of that frame. This delay shall be compensated in the transmitted remaining cycles<br />
(TimerValue field of the Clock token).<br />
The Clock frame shall be transmitted every CLOCK_PERIOD_TIME.<br />
The following figures show the described timing references:<br />
0 V<br />
Q @ 50 Hz<br />
Q @ 60 Hz<br />
50 Hz Mains<br />
60 Hz Mains<br />
9<br />
7<br />
9<br />
6<br />
9<br />
5<br />
9<br />
4<br />
...<br />
8<br />
1<br />
8<br />
1<br />
8<br />
0<br />
8<br />
0<br />
7<br />
9<br />
7<br />
9<br />
7<br />
8<br />
7<br />
8<br />
Figure 35 Qs Vs mains period<br />
Submission page 105 UPA-OPERA<br />
...<br />
...<br />
3<br />
3<br />
2 1 0<br />
2 1 0
4-June-07 P1901_PRO_016_r0<br />
4.4 <strong>MAC</strong> DELIMITERS<br />
Figure 36: Clock frame timming reference<br />
As described in 4.3, the <strong>MAC</strong> layer generates two types of MPDUs: regular MPDUs <strong>and</strong> Channel Estimation<br />
MPDUs. These MPDUs make use of two <strong>MAC</strong> delimiters:<br />
• Token Announce<br />
• Token<br />
Note: <strong>MAC</strong> delimiters are processed by the <strong>PHY</strong> layer as described in 3.3.1.<br />
4.4.1 Token announce<br />
The Token Announce is sent in the initial sequence of every transmission frame. The Token Announce has the<br />
following fields:<br />
- Preamble – 32 bits. The preamble is equal to 0x90471D2D. The preamble is used to distinguish the<br />
different types of control symbols.<br />
- Type – 4 bits. In this case, Type should be ANNOUNCE(3).<br />
- Validity – 12 bits. Maximum number of symbols that will be transmitted in the current transmission<br />
after this Token Announce Symbol. The maximum number that can be used is MAX_TA_VALIDITY<br />
- <strong>Access</strong> Id – 16 bits. This id must be set to 0x0001.<br />
Submission page 106 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
- Channel Estimation Frame – 1 bit. If this frame is a Channel Estimation Frame, Channel<br />
Estimation Frame must be set to 1. Otherwise, Channel Estimation Frame must be set to 0.<br />
- Power <strong>Control</strong> bits – 5 bits. From left to right:<br />
� Bit 4. Set to 1 on booting <strong>and</strong> after the transmission gain is increased. Set to 0 fifteen<br />
seconds after it was set to 1.<br />
� Bit 3. Set to 1 if the node cannot decrease its transmission gain due to own reasons. For<br />
example: low throughput. Set to 0 otherwise.<br />
� Bit 2. Set to 1 if the node is not going to decrease its transmission gain due to other<br />
nodes reasons, but if those external circumstances end then the transmission gain could<br />
be decreased (depending on bit 3). For example: when another equipment has bit 3 to 1<br />
<strong>and</strong> the node wants to isolate from it. Set to 0 otherwise.<br />
� Bit 1. Set to 1 if the power control task is on. Set to 0 otherwise.<br />
� Bit 0. Set to 1 if transmission gain has been decreased <strong>and</strong> isolation is expected. Set to<br />
0 if transmission gain has its maximum (initial) value.<br />
If power control is not implemented this field shall be set to 0b01000<br />
- <strong>MAC</strong> Mode – 3 bits. Must be set to 0b001 for <strong>Access</strong>.<br />
- Type of Node – 3 bits. See below<br />
- ACCRQ – 1 bit. If this frame is an <strong>Access</strong> Frame, ACCRQ must be set to 1. Otherwise, ACCRQ<br />
must be set to 0. Using this field, a node that is searching for a master only needs to receive the TA<br />
to know that it is an <strong>Access</strong> frame.<br />
- MID – 21 bits. Master Id. It is used to detect if there is interference from other BPL cell. The<br />
problem of interference appears when there is more than one node allocating the channel in time.<br />
This can happen when there are two BPL cells, each one having its own HE, <strong>and</strong> the transmissions<br />
from some nodes in one of them can be received by some nodes in the other BPL cell.<br />
The first problem is to know if a node is being interfered because there is more than one HE in the<br />
channel. To solve this issue all the nodes that share the token must identify themselves as members<br />
of the same BPL cell.<br />
The HE of the BPL cell must transmit an identifier, so called Master Id [MID], <strong>and</strong> each node that<br />
depends directly or indirectly (because is in the HE’s BPL cell) must copy the MID.<br />
The transmission of the MID is splitted between 2 symbols, the Token Announce <strong>and</strong> the <strong>Access</strong> or<br />
CSMA Token<br />
In the Token Announce, 21 bits are sent, with the following structure:<br />
Submission page 107 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 37 Master ID in Token Announce<br />
In the <strong>Access</strong> or CSMA token, additional 32 bits to complete the Master ID will be sent<br />
Figure 38 Master ID in <strong>Access</strong> Token<br />
So to complete the whole MID an <strong>Access</strong> Token must be received, but most of the decisions can be<br />
taken only with the information received in the Token Announce.<br />
When a node detects that its master has change the MID it shall change it immediately.<br />
� Force master field (3 bits)<br />
This field shall be used to establish priorities in the network coordination rules between <strong>Access</strong><br />
<strong>and</strong> IH BPL cells. Values shall be:<br />
• 0x0 – 0x1 for <strong>Access</strong> MV BPL cell.<br />
• 0x2 – 0x4 for <strong>Access</strong> LV BPL cell.<br />
• 0x6 – 0x7 Reserved for IH cells.<br />
� Negotiation field (1 bit)<br />
Submission page 108 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
It is used to change the priority of a MID in the coordination rules depending on the scenarios.<br />
Default value shall be 1. The following rules shall be respected:<br />
• A node with the same MID except for the Negotiation field shall consider it as the same<br />
MID. In this case, the Negotiation field shall not be considered in the network<br />
coordination rules.<br />
• A node with different MID (Force Master, Reserved field or Identification field) shall<br />
consider the Negotiation field in the network coordination rules.<br />
The next 2 rules assert that the Negotiation field will be set to the same value into the same<br />
BPL cell if a change is made by a single node:<br />
• If the Negotiation field changes from 1 to 0 in a node, its master shall set the<br />
Negotiation field to 0.<br />
• If the Negotiation field changes in a node, its slaves shall set the same Negotiation field<br />
value.<br />
Only the HE can change the Negotiation field from 0 to 1 again. The HE shall change the<br />
Negotiation field from 0 to 1 after 120 seconds from the change from 1 to 0.<br />
� Reserved field (1 bit)<br />
For future use.<br />
� Identification field (48 bits)<br />
By default it should be the Mac Address of the HE stored in reverse order. It shall not be assumed<br />
by any protocol that the MasterId includes a <strong>MAC</strong> address.<br />
For example, the <strong>MAC</strong> 0x00139D0002A8 will produce the Identification Field 0xA802009D1300<br />
- <strong>MAC</strong> – 48 bits. This is the <strong>MAC</strong> address of transmitter.<br />
Submission page 109 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
7<br />
6<br />
5<br />
4<br />
90<br />
47<br />
1D<br />
2D<br />
Type Validity [11:8]<br />
Validity [7:0]<br />
<strong>Access</strong> Id [7:0]<br />
MID [15:8]<br />
MID [7:0]<br />
Submission page 110 UPA-OPERA<br />
3<br />
<strong>Access</strong> Id [15:8]<br />
Ch. Est. Fr.<br />
Always MUST be<br />
set to 0<br />
Always MUST be set to 0<br />
Power <strong>Control</strong> bits<br />
Always MUST be<br />
set to 0<br />
Always MUST be set to 0<br />
<strong>MAC</strong> Mode<br />
TypeOfNode[2]<br />
Type of Node [1:0] MID [20:16] ACCRQ<br />
The field Type has the following meanings:<br />
3 ANNOUNCE<br />
The field Type of Node has the following meanings:<br />
0 HE<br />
1 CPE<br />
2 TDR<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
<strong>MAC</strong>[0]<br />
<strong>MAC</strong>[1]<br />
<strong>MAC</strong>[2]<br />
<strong>MAC</strong>[3]<br />
<strong>MAC</strong>[4]<br />
<strong>MAC</strong>[5]<br />
Figure 39 Token Announce<br />
2<br />
1<br />
0<br />
preamble
4-June-07 P1901_PRO_016_r0<br />
4.4.2 Token<br />
There are ten kinds of Token:<br />
- Distributor Token<br />
- Data Token<br />
- Silence Token<br />
- Polling Token<br />
- TDR Polling Token<br />
- CSMA Token<br />
- <strong>Access</strong> Token<br />
- <strong>Access</strong> Reply Token<br />
- Non-returnable Data Token<br />
- Clock Token<br />
The field Type has the following meanings:<br />
Token Type Value<br />
DATA 0<br />
NON-RETURNABLE 2<br />
CLOCK 3<br />
POLLING 5<br />
TDR POLLING 7<br />
DISTRIBUTOR TOKEN 8<br />
CSMA 9<br />
Submission page 111 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
SILENCE 11<br />
ACCESS_REQUEST 13<br />
ACCESS_REPLY 14<br />
The field Type of Node has the following meanings:<br />
0 HE<br />
1 CPE<br />
2 TDR<br />
The field Direction has the following meaning:<br />
0 DOWNSTREAM<br />
1 UPSTREAM<br />
4.4.2.1 Distributor Token<br />
The Distributor Token has the following fields:<br />
- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />
- Type – 4 bits. Type shall be DISTRIBUTOR (8)<br />
- DstPortx – Destination Port 1 to 5. – 7x5 bits. These are the next token holders (Distribution List). The<br />
destination port equals to the Local Port assigned by the Distributor Token sender to each node. See<br />
Submission page 112 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
¡Error! No se encuentra el origen de la referencia. for more information on the Port Solver protocol. If<br />
this field is equal 0, the destination node is the Master node.<br />
- Info Size – 1 bit. This field indicates the size of the Session Id <strong>and</strong> Validity fields. If it is set to 0, the size of<br />
the SessionId equals 5 bits <strong>and</strong> Validity equals 6 bits. In that case, the Distributor Token carries information<br />
for 5 destination nodes. If it is set to 1, the size of SessionId <strong>and</strong> Validity equal 8 bits. In that case, this token<br />
carries only information for 4 destination nodes. Master will use this subtype of Distributor token if it has<br />
more than 32 opened sessions.<br />
- Validityx – (6x5 bits) or (8x4 bits). Channel time assigned for each of the nodes on the distribution list. This<br />
is the maximum channel time the DstPortx can use before send the token to the next node on the list. This<br />
value is indicated in multiples of 8 symbols.<br />
- SessionIdx – (5x5 bits) or (8x4). This value indicates the flow from which the DstPortx is allowed<br />
transmitting.<br />
- Recovery Mode – 1 bit. Indicates the token loss recovery mode selected by the Master. See section X. It<br />
indicates if the in charged of recovering a token loss is the Distributor Token sender (if set to 0) or each of<br />
the nodes on the distribution list (if set to 1).<br />
- Sequence Number – 3 bits. Identifier of the current Distributor Token.<br />
- Disruption Token – 1 bit. This bit informs to the destination nodes of the Distributor token that the<br />
transmitter node is the new QC of the network <strong>and</strong> it wants to become the master of them.<br />
- Silence Mode – 1bit. Transmitter node indicates it is going to enter in intermittent transmission.<br />
Following diagrams shows the Distributor Token structure if Info Size = 0;<br />
Submission page 113 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 40 Distributor Token Info Size = 0<br />
Following diagrams shows the Distributor Token structure if Info Size = 1;<br />
Submission page 114 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.4.2.2 Data token<br />
The Data Token has the following fields:<br />
Figure 41 Distributor Token Info Size = 0<br />
- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />
- Type – 4 bits. Type shall be DATA (0)<br />
- Direction – 1 bit. See above.<br />
- Transmission in HURTO – 1 bit. Indicates whether the transmission from Token Transmitter to Destination<br />
Port is using HURTO or not.<br />
- Allow Channel Estimation Frame– 1 bit. From Master to Slave. If it is set to 1, the Slave receiving this<br />
token must send a Channel Estimation Frame. See 4.3.3 for more information.<br />
- Send Channel Estimation Frame next – 1 bit. From Slave to Master. The Slave is requesting to send a<br />
Channel Estimation Frame. See 4.3.3 for more information.<br />
Submission page 115 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
- Single Validity – 4 bits. It is expressed in slots (each slot is composed of 16 symbols). The Single Validity is<br />
an indication from the master on the validity that may be assigned for individual transmission. This<br />
information is only used as an example of how to distribute the token validity. However, the receiving node<br />
does not have to follow that distribution. In that case the receiving node may change the Single Validity to a<br />
new value, according to the validity that it assigns in the Data Token. Individual transmission means the<br />
transmission from a TDR to a CPE or a CPE to its TDR. This field is not used by CPEs. The relevant field<br />
for CPEs is the Validity. The Single Validity includes all symbols transmitted after the TA. The minimum<br />
Single Validity is 1.<br />
- Validity – 12 bits. From Master to Slave. This indicates the maximum validity that the slave will be<br />
allowed to use before returning the token. It is expressed as a number of symbols. The master shall start a<br />
timer after the transmission of the Token Announce by the slave with the duration of the Validity it has<br />
assigned, <strong>and</strong> expect to receive the token back before this timer expires. If the slave is a repeater, the<br />
Validity includes the time needed for the repeater to communicate with its slaves.<br />
- Destination Port – 7 bits. Local Port assigned to the intended receiver of the Data Token. See 9.1.4 for more<br />
information on the Port Solver protocol.<br />
- Session Id – 8 bits. Identify a specific flow reserved by the CAC protocol that should have priority over<br />
other flows registered or best-effort traffic.<br />
- Frame Service class – 8 bits. Only used from slave to master. The Frame Service class field in the token is<br />
used to convey the information of the service classes that have been transmitted within the frame, when the<br />
token is directed towards its master node <strong>and</strong> also all the service classes detected in the previous upstream<br />
transmissios. CPEs use this field to indicate the service classes sent in their transmission <strong>and</strong> TDRs gather<br />
the service class information of their slaves <strong>and</strong> the service class information from their own transmissions.<br />
Therefore, the HE has the information of all the priorities transmitted in the network. When the token is<br />
transmitted towards slave nodes, this field is not used. If bit X is equal to 1, there is at least one packet in<br />
this frame with service class X.<br />
- Unused frame symbols - 13 bits. Unused symbols in the current frame, compared to the Validity indicated<br />
in the token announce of the same transmission frame.<br />
- Received words - 16 bits. The Received Words Field is used to communicate to the token receiver the<br />
number of 32-bit words that have been received from that destination since the last time, so that the<br />
b<strong>and</strong>width limitation algorithm can respond. Counting shall be performed over complete received packets<br />
when they are passed to the Convergence <strong>Layer</strong>.<br />
- Number of Downstream Nodes – 8 bits From a CPE to its master, the Number of Downstream Nodes is<br />
equal to 0. From a TDR to its master, the Number of Downstream Nodes is equal to the number of nodes in<br />
its BPL subtree minus 1.<br />
- Maximum Number of Hops – 4 bits. From a CPE to its master, the Maximum Number of Hops is equal to 0.<br />
A TDR will set the Maximum Number of Hops as the maximum value of number of hops amongst those<br />
received by the nodes hanging from it plus 1.When this field is set to 31 means that there are 32 hops or<br />
more.<br />
- Distributor Sequence Number – 3 bits. Identifier of the current Distributor Token when this Data Token<br />
belongs to an scheduded chain of transmissions generated by a Distributor Token.<br />
Submission page 116 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
7<br />
Reserved<br />
6<br />
Type<br />
Single Validity<br />
Always MUST be set to 0<br />
5<br />
Reserved<br />
Always MUST be set to 0<br />
4<br />
5F<br />
73<br />
EE<br />
E2<br />
Validity [7:0]<br />
Submission page 117 UPA-OPERA<br />
3<br />
Destination Port<br />
Frame Priority<br />
Session ID [7:0]<br />
Always MUST be set to 0<br />
Unused Frame Symbols [7:0]<br />
Received words [15:8]<br />
Received words [7:0]<br />
Number of Downstream Nodes<br />
Reserved<br />
Reserved<br />
Always MUST be set to 0<br />
Distributor Sequence Number Always MUST be set to 0<br />
4.4.2.3 Silence Token<br />
2<br />
Direction Reserved<br />
Transmission<br />
in HURTO<br />
Validity [11:8]<br />
Unused Frame Symbols [12:8]<br />
Maximum Number of Hops<br />
No Destination<br />
Port<br />
Figure 42 Data Token<br />
The Silence Token includes the following fields of the data token:<br />
- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />
- Type – 4 bits. Type shall be SILENCE (11).<br />
1<br />
Alow Channel<br />
Estimation Fr.<br />
0<br />
Send Ch. Est.<br />
Fr. Next<br />
Always MUST be set to 0<br />
preamble<br />
- Unused frame symbols (13 bits). Unused symbols in the current frame, compared to the Validity indicated<br />
in the token announce of the same transmission frame.
4-June-07 P1901_PRO_016_r0<br />
7<br />
6<br />
Type<br />
Always MUST be set to 0<br />
4.4.2.4 Polling Token<br />
The Polling Token has the following fields:<br />
5<br />
4<br />
5F<br />
73<br />
EE<br />
E2<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Unused Frame Symbols [7:0]<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Figure 43 Silence Token<br />
- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />
- Type – 4 bits. In this case, Type shall be POLLING (5).<br />
Submission page 118 UPA-OPERA<br />
3<br />
2<br />
Always MUST be set to 0<br />
Unused Frame Symbols [12:8]<br />
1<br />
0<br />
preamble<br />
- Polling Type – 1 bit. (The Polling Type could be equal to ACTIVE(1) or ALIVE(0). When Polling Type is<br />
ACTIVE, the Polling Token is requesting which nodes have data to be sent. When Polling Type is ALIVE,<br />
the Polling Token is requesting which nodes are alive.<br />
- Polling Destination Bank – 2 bits. The total number of destination ports of this Polling Token is divided<br />
into 4 banks. The Polling Destination Bank is to know the destination bank of this polling. The first<br />
available port is port 9.<br />
0 � 9 - 40 ports<br />
1 � 41 - 72 ports
4-June-07 P1901_PRO_016_r0<br />
2 � 73 - 104 ports<br />
3 � 105 - 126 ports<br />
- Unused frame symbols (13 bits). Unused symbols in the current frame, compared to the Validity indicated<br />
in the token announce of the same transmission frame.<br />
- Polling Destination Ports – 32 bits. Destination Ports of Polling Destination Bank of this Polling Token.<br />
Each bit represents one port.<br />
To cover all the possible ports, the field Polling Destination Bank, selects one of the four possible groups of<br />
ports. In order to poll port X (X>=9), Polling Destination Bank equals (X-9) / 32. The bit that represents<br />
port X in Polling Destination Ports field is bit (X-9) mod 32. A bit set to 1 means that this user is being<br />
polled. Only ports in the same Polling Destination Bank can be polled simultaneously<br />
7<br />
1<br />
6<br />
Type<br />
Always MUST be set to 0<br />
4.4.2.5 TDR Polling Token<br />
The TDR Polliing Token has the following fields:<br />
5<br />
4<br />
5F<br />
73<br />
EE<br />
E2<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Unused Frame Symbols [7:0]<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Submission page 119 UPA-OPERA<br />
3<br />
Polling Type<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Unused Frame Symbols [12:8]<br />
Polling Destination Ports<br />
Polling Destination Ports<br />
Polling Destination Ports<br />
Polling Destination Ports<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Figure 44 Polling Token<br />
- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />
2<br />
1<br />
Polling Destination Bank<br />
0<br />
Always MUST be<br />
set to 0<br />
preamble
4-June-07 P1901_PRO_016_r0<br />
- Type – 4 bits. Type shall be TDR POLLING (7)<br />
- Direction – 1 bit. DOWNSTREAM (0) means that this TDR Polling Token is sent by a master to poll a<br />
TDR. UPSTREAM (1) means that it is a TDR Polling Reply Token, sent by a TDR to its master.<br />
- Reply – 1 bit. If Reply is ACTIVE (1), the TDR indicates that it wants to be Active <strong>and</strong> receive transmission<br />
opportunities. If it is IDLE (0), the TDR stays as Idle.<br />
- Single Validity – 4 bits. It is expressed in slots (each slot is composed of 16 symbols). The Single Validity is<br />
an indication from the master on the validity that may be assigned for individual transmission. This<br />
information is only used as an example of how to distribute the token validity. However, the receiving node<br />
does not have to follow that distribution. In that case the receiving node may change the Single Validity to a<br />
new value, according to the validity that it assigns in the Data Token. Individual transmission means the<br />
transmission from a TDR to a CPE or a CPE to its TDR. The Single Validity includes all symbols<br />
transmitted after the TA. The minimum Single Validity is 1.<br />
- Validity – 12 bits. From Master to Slave. This indicates the maximum validity that the TDR will be allowed<br />
to use before returning the token. It is expressed as a number of symbols. The master shall start a timer after<br />
the transmission of the Token Announce by the slave with the duration of the Validity it has assigned, <strong>and</strong><br />
expect to receive the token back before this timer expires.<br />
- Destination Port – 7 bits. Local Port assigned to the intended receiver of the Data Token. See 9.1.4 for more<br />
information on the Port Solver protocol.<br />
- Unused frame symbols – 13 bits. Unused symbols in the current frame, compared to the Validity indicated<br />
in the token announce of the same transmission frame.<br />
- Number of Downstream Nodes – 8 bits From a TDR to its master, the Number of Downstream Nodes is<br />
equal to the number of nodes in its BPL subtree minus 1 (0 if it has no slaves).<br />
- Maximum Number of Hops – 4 bits. A TDR will set the Maximum Number of Hops as the maximum value<br />
of number of hops amongst those received by the nodes hanging from it plus 1 (0 if it has no slaves). When<br />
this field is set to 31 means that there are 32 hops or more.<br />
7<br />
Reserved<br />
6<br />
Type<br />
Always MUST be set to 0<br />
5<br />
4<br />
Submission page 120 UPA-OPERA<br />
5F<br />
73<br />
EE<br />
E2<br />
Validity[7:0]<br />
3<br />
Direction<br />
Always MUST be set to 0<br />
Destination Port<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Unused Frame Symbols [7:0]<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Number of Downstreams Nodes<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
2<br />
Reply<br />
Single Validity Validity[11:8]<br />
Unused Frame Symbols [12:8]<br />
Always MUST be set to 0 Maximum number of Hops<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
1<br />
0<br />
Always MUST be set to 0<br />
preamble
4-June-07 P1901_PRO_016_r0<br />
4.4.2.6 CSMA Token<br />
The CSMA Token has the following fields:<br />
Figure 45 TDR Polling Token<br />
- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />
- Type – 4 bits. Type shall be CSMA (9).<br />
- Type of Node – 2 bits.<br />
- Number of Hops – 4 bits. For a HE, the Number of Hops is equal to 0. For the rest of nodes, the Number of<br />
Hops is equal to the Number of Hops read in CSMA Token from its Master + 1. In a CPE, this field is not<br />
used. When this field is set to 31 means that there are 32 hops or more.<br />
- Validity – 7 bits. This indicates the maximum validity that the slave will be allowed to use before returning<br />
the token. It is expressed as a multiple of 8 symbols.<br />
- Unused frame symbols (13 bits). Unused symbols in the current frame, compared to the Validity indicated<br />
in the token announce of the same transmission frame.<br />
- MID (2nd part) – 32 bits. Last 4 bytes of the MasterId (The 21st first bits are allocated in the Token<br />
Announce).<br />
Following fields configure the contention window:<br />
- P0min (2 bits).<br />
- SizeP0 (4 bits). Size of the contention range for the priority 0. This value fixes the P0max = P0min+SizeP0.<br />
- SizSlave 1 (4 bits). Size of the contention range for the priority 1.<br />
- SizSlave 2 (4 bits). Size of the contention range for the priority 2.<br />
- SizSlave 3 (4 bits). Size of the contention range for the priority 3.<br />
- Allowed Ports (32 bits). Nodes allowed contending for the channel. Each bit represents one port. To cover<br />
all the possible ports, the field Destination Bank(2bits), selects one of the four possible groups of ports. In<br />
order to allow contentending to port X (X>=9), Destination Bank equals (X-9) / 32. The bit that represents<br />
port X in Allowed Ports field is bit (X-9) mod 32. A bit set to 1 means that this port is allowed to contend.<br />
- Subtype (2 bits). Type of CSMA token.<br />
• Normal = 0: Contention window is configured as it<br />
• AllNodes = 2: This subtype indicates that all nodes can contend for the channel. Thus, the<br />
AllowedPorts information must be ignored.<br />
Submission page 121 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
7<br />
6<br />
Type<br />
5<br />
4<br />
5F<br />
73<br />
EE<br />
Submission page 122 UPA-OPERA<br />
3<br />
E2<br />
Always MUST be<br />
set to 0<br />
MasterId[3]<br />
Always MUST be set to 0<br />
2<br />
Type of Node<br />
1<br />
0<br />
Always MUST be<br />
set to 0<br />
P0min[1:0]<br />
MasterId[4]<br />
Validity [7:0]<br />
SizeP0[4:0]<br />
SizeP1[4]<br />
SizeP1[3:0]<br />
MasterId[5][7:4]<br />
MasterId[5][3:0]<br />
MasterId[6][7:4]<br />
MasterId[6][3:0]<br />
Number of Hops<br />
Always MUST be set to<br />
Unused Frame Symbols [12:8]<br />
Unused Frame Symbols [7:0]<br />
Always MUST be<br />
set to 0<br />
SizeP3[4:0]<br />
SizeP2[4:3]<br />
SizeP2[2:0] Destination Bank[1:0] Subtype[2:0]<br />
4.4.2.7 <strong>Access</strong> Token<br />
The <strong>Access</strong> Token has the following fields:<br />
AllowedPorts[31:24]<br />
AllowedPorts[23:16]<br />
AllowedPorts[15:8]<br />
AllowedPorts[7:0]<br />
Always MUST be set to 0<br />
Figure 46: CSMA token structure<br />
- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />
- Type – 4 bits. Type shall be ACCESS_REQUEST (13).<br />
- Direction –1 bit. Shall be set to DOWNSTREAM (0)<br />
- Type of Node – 2 bits. See above.<br />
- Validity – 12 bits. From Master to Slave. This indicates the maximum validity that the slave will be<br />
allowed to use before returning the token. It is expressed as a number of symbols.<br />
preamble<br />
- Number of Hops – 4 bits. For a Head End, the Number of Hops is equal to 0. For a TDR, the Number of<br />
Hops is equal to the Number of Hops read in <strong>Access</strong> Token from its Master + 1. When this field is set to 31<br />
means that there are 32 hops or more.<br />
-
4-June-07 P1901_PRO_016_r0<br />
- Unused frame symbols (13 bits). Unused symbols in the current frame, compared to the Validity indicated<br />
in the token announce of the same transmission frame.<br />
- MID (2nd part) – 32 bits. Last 4 bytes of the MasterId (The 21st first bits are allocated in the Token<br />
Announce).<br />
- <strong>MAC</strong> Address – 48 bits. Own <strong>MAC</strong> address.<br />
- Equivalent speed – 8 bits. This value gives an indication of the throughput to the backbone that can be<br />
achieved connecting to the network through this node. The value is calculated from the equivalent BPS.<br />
⎢ BPSeq<br />
−120⎥<br />
Equivalent _ speed = ⎢ ⎥<br />
⎣ 60 ⎦<br />
Equation 35<br />
If the node is directly linked to the backbone the field will be set to 255. If the node is one hop from the<br />
backbone the equivalent BPS are equal to the average of the downstream <strong>and</strong> upstream BPS of the node<br />
with its master.<br />
BPSup<br />
+ BPSdown<br />
BPS eq =<br />
= BPS<br />
2<br />
Equation 36<br />
If there is more than one hop to the backbone the equivalent BPS are calculated from the BPS value<br />
obtained from the master <strong>and</strong> the own equivalent BPS.<br />
BPS<br />
i<br />
eq<br />
=<br />
1<br />
BPS<br />
Equation 37<br />
i 1<br />
eq<br />
+ −<br />
1<br />
1<br />
BPS<br />
Values for the equivalent speed obtained from the previous formulas shall be between 1 <strong>and</strong> 254. A value of<br />
zero in this field means that the repeater has not been able to calculate it. The BPS information obtained<br />
from the access token, combined with the BPS calculated by the new slave in the link may be used in order<br />
to decide which is the best master to be connected to.<br />
Submission page 123 UPA-OPERA<br />
own<br />
eq<br />
own<br />
eq
4-June-07 P1901_PRO_016_r0<br />
7<br />
6<br />
Type<br />
MasterId[3][7:4]<br />
MasterId[3][3:0]<br />
MasterId[4][3:0]<br />
MasterId[5][3:0]<br />
MasterId[6][3:0]<br />
Always MUST be set to 0<br />
4.4.2.8 <strong>Access</strong> Reply Token<br />
The <strong>Access</strong> Token has the following fields:<br />
5<br />
4<br />
5F<br />
73<br />
EE<br />
E2<br />
Always MUST be set to 0<br />
Validity [7:0]<br />
Unused Frame Symbols [7:0]<br />
<strong>MAC</strong> [0]<br />
<strong>MAC</strong> [1]<br />
<strong>MAC</strong> [2]<br />
<strong>MAC</strong> [3]<br />
<strong>MAC</strong> [4]<br />
<strong>MAC</strong> [5]<br />
3<br />
Equivalent Speed<br />
Always MUST be set to 0<br />
Direction Type of Node<br />
Submission page 124 UPA-OPERA<br />
2<br />
Validity [11:8]<br />
Number of Hops<br />
Unused Frame Symbols [12:8]<br />
Figure 47 <strong>Access</strong> Token<br />
- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />
- Type – 4 bits. Type shall be ACCESS_REPLY (14).<br />
- Direction –1 bit. Shall be set to UPSTREAM (1).<br />
- Type of Node – 2 bits. See above.<br />
1<br />
MasterId[4][7:4]<br />
MasterId[5][7:4]<br />
MasterId[6][7:4]<br />
- MID – 32 bits. Part of the Master ID not included in the Token Announce.<br />
0<br />
Always MUST be<br />
set to 0<br />
preamble<br />
- Disconnect – 1bit. If this field is set to 0, the token is a normal ACCESS REPLY TOKEN, used to achieve<br />
access to the network through a master. If it is set to 1, the token becomes an ACCESS REPLY<br />
DISCONNECTION TOKEN, used to leave a master.<br />
- Destination Port – 7 bits. Local Port assigned to the master.
4-June-07 P1901_PRO_016_r0<br />
- Number of Hops – 4 bits. For a Head End, the Number of Hops is equal to 0. For a TDR, the Number of<br />
Hops is equal to the Number of Hops read in <strong>Access</strong> Token from its Master + 1. In a CPE, this field is not<br />
used. When this field is set to 31 means that there are 32 hops or more.<br />
- Unused frame symbols (13 bits). Unused symbols in the current frame, compared to the Validity indicated<br />
in the token announce of the same transmission frame.<br />
- <strong>MAC</strong> Address – 48 bits. The <strong>MAC</strong> address of the master the access reply token is addressed to.<br />
4.4.2.9 Non-returnable data token<br />
The Non-returnable Data Token has the following fields:<br />
Figure 48 <strong>Access</strong> Reply Token<br />
- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />
- Type – 4 bits. Type shall be NON-RETURNABLE (2)<br />
- Single Validity – 4 bits. See description in 0<br />
- Validity – 12 bits. Same meaning as in the Data Token (See 0). Since this token is non-returnable, the<br />
validity will be fully used.<br />
Submission page 125 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
- Destination Port 0 to 7 – 8x7 bits. Local Port of the intended receiver of the Data Token. If Destination Port<br />
X is not used, it shall be set to 0. At least one of the destination ports shall be different to 0.<br />
The implementation of this type of token is optional.<br />
7<br />
Always MUST be<br />
set to 0<br />
Always MUST be<br />
set to 0<br />
6<br />
Type<br />
Single Validity<br />
Always MUST be<br />
set to 0<br />
Always MUST be<br />
set to 0<br />
Always MUST be set to 0<br />
Always MUST be<br />
set to 0<br />
Always MUST be<br />
set to 0<br />
Always MUST be<br />
set to 0<br />
Always MUST be<br />
set to 0<br />
4.4.2.10 Clock Token<br />
The Clock Token has the following fields:<br />
5<br />
4<br />
5F<br />
73<br />
EE<br />
E2<br />
Submission page 126 UPA-OPERA<br />
3<br />
Destination Port 0<br />
Validity [7:0]<br />
Destination Port 1<br />
Always MUST be set to 0<br />
2<br />
Validity [11:8]<br />
Destination Port 2<br />
Destination Port 3<br />
Unused Frame Symbols [12:8]<br />
Unused Frame Symbols [7:0]<br />
Destination Port 4<br />
Destination Port 5<br />
Destination Port 6<br />
Destination Port 7<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Figure 49 Non-returnable Data Token<br />
- Preamble – 32 bits. The preamble is equal to 0x5F73EEE2.<br />
- Type – 4 bits. Type shall be CLOCK (3)<br />
- Reset – 1 bit. If set to 1 all nodes reset the timers <strong>and</strong> data.<br />
- Grid Frequency – 2 bits: 00 = 50 Hz , 01= 60Hz, 11 = Other.<br />
1<br />
0<br />
preamble<br />
- MaximumlTimerValue – 16 bits: number of cycles of a 312.5 kHz clock used by the Master to count 9
4-June-07 P1901_PRO_016_r0<br />
mains periods.<br />
- TimerValue - 16 bits: number of cycles in the Master to reach the end of the current main period.<br />
- Period Counter – 16 bits: counter of main periods.<br />
7<br />
6<br />
Type<br />
4.5 TOKEN LOSS RECOVERY<br />
5<br />
4<br />
5F<br />
73<br />
EE<br />
E2<br />
Always MUST be<br />
set to 0<br />
MaximumTimerValue[15:8]<br />
MaximumTimerValue[7:0]<br />
TimerValue[15:8]<br />
TimerValue[7:0]<br />
PeriodCounter[15:8]<br />
PeriodCounter[7:0]<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Always MUST be set to 0<br />
Submission page 127 UPA-OPERA<br />
3<br />
Figure 50: Clock Token<br />
2<br />
Reset Grid Frequency<br />
1<br />
0<br />
preamble<br />
The Token uses a very robust modulation scheme that increases the possibility of correct demodulation even in very<br />
noise environment. Still, token may be lost, do not detected by the receiver node/s, due to impulsive noise. Fast<br />
detection mechanisms are therefore essential for efficient communication.<br />
Depending on the token distribution policy implemented in the network, two possible token loss recovey policies<br />
may be possible.<br />
The simplest one relies in the direct distribution of Data Token from HE or TDR to its CPEs.
4-June-07 P1901_PRO_016_r0<br />
In this case, a token loss occurs when the master node transmits a frame <strong>and</strong> the intended token receiver does not<br />
detect the token or when the master does not detect the token sent by one of its slaves. In case of token loss, the<br />
master node shall detect that the token has been lost.<br />
Using the validity associated to every transmitted token, the master node shall generate a new frame whenever the<br />
validity assigned in a token to one of its slaves expires without receiving back the token. Only HE <strong>and</strong> TDR<br />
implement this feature.<br />
When a Token Distributor is used to share the channel, the Token Loss Recovery policy becomes more complex,<br />
but equally efficient.<br />
There are two different modes to recover a token lost when using Distributor Tokens:<br />
1. Master node is the only node in charged of recovering a token lost. In this mode, the node that sends the<br />
Distributor token must monitor the channel during all the validity time assigned in the token in order to<br />
detect in each moment if the channel owner transmits.<br />
When Master transmits a Distributor Token checks that the first node on the distribution list starts<br />
transmitting. If Master does not detect the Token Announce from the expected node, it can retransmit the<br />
Distributor Token lost or a new Distributor Token. In that way, the only overhead included in this simple<br />
acknowledgement mechanism is the retransmission of the token, instead of waiting for the maximum time<br />
assigned to the first slave.<br />
If first slave detects the Distributor Token, it starts transmitting <strong>and</strong> assigns the channel to the second<br />
destination slave. This process will be monitorized by the Master. If Master node detects the first slave<br />
assigns the channel to the next slave, it will check if the second slave starts transmitting. If Master does not<br />
detect the Token Announce from that slave, it transmits a new Distributor Token. This Distributor Token<br />
can include the slave that lost the token or can continue in the next slave on the distribution list.<br />
Master shall repeat all this process till the last destination slave returns the channel to the Master.<br />
Master node shall know in each moment which is the channel owner slave, when it has to start transmitting,<br />
<strong>and</strong> when it has to release the token to the next slave.<br />
Following diagram shows the monitoring process performed by the Master in order to recover a token lost:<br />
Submission page 128 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 51: Distributor Token Lost Monitoring Process<br />
Submission page 129 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
MASTER<br />
DISTRIBUTOR<br />
TOKEN<br />
Slave 1<br />
Slave 4<br />
Slave 3<br />
Slave 2<br />
Check Slave 1 starts<br />
transmitting<br />
Check Slave 1 releases<br />
token before Validity1<br />
DATA TOKEN<br />
to Slave 4<br />
Slave 4 does not start<br />
transmitting after Slave 1<br />
transmission. Transmit<br />
new Distributor Token<br />
Token lost<br />
Check Slave 4 releases<br />
token before Validity2<br />
timeout<br />
Check Slave 4 starts<br />
transmitting<br />
DISTRIBUTOR<br />
TOKEN<br />
DATA<br />
TOKEN to Slave 3<br />
Check Slave 3 releases<br />
token before Validity3<br />
timeout<br />
Check Slave 3 starts<br />
transmitting<br />
Check Slave 2 starts<br />
transmitting<br />
DATA<br />
TOKEN to Slave 2<br />
Figure 52: Recovery Token Lost by Master node<br />
Check Slave 2 returns<br />
token before Validity4<br />
timeout<br />
DATA TOKEN<br />
to MASTER<br />
DISTRIBUTOR<br />
TOKEN<br />
2. Each node on the distribution list transmits in its assigned slot time if it does not receive the token from the<br />
previous node on the distribution list.<br />
In this mode, nodes on the distribution list needs to receive the Distributor Token to know when they have<br />
to transmit. Upon the reception of a Distributor token, each node starts transmitting in their slot time if the<br />
previous node on the list does not assign to it the channel. If previous node on the list ends transmitting, it<br />
assigns the channel to the subsequent node on the list. If this token is lost, next node shall start transmitting<br />
in its slot time.<br />
This mode can be very dangerous because if all the nodes on the distribution list lose the Distritubor token,<br />
Master node does not transmit till the end of the total channel time assigned in that token.<br />
From the other h<strong>and</strong>, this mode can be very interesting in a scenario with no visibility between slave nodes.<br />
In that case, slave nodes cannot assign the channel to the next node on the list because they have no direct<br />
visibility. This functionality reduces the overhead due to the Master does not transmit to assign the channel<br />
to the next node.<br />
Submission page 130 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 53: Recovery Token Lost by each node<br />
The node that sends a Distributor Token selects the token loss recovery mode indicating the selected option in the<br />
token.<br />
4.6 <strong>MAC</strong> PARAMETERS SPECIFICATION<br />
INTER FRAME SPACE 1 189 µs Time distance between the end of a<br />
Distributor Frame <strong>and</strong> the beginning of<br />
the transmission of the first node of the<br />
distribution list. See 4.3.1.<br />
INTER FRAME SPACE 2 126 µs Time distance between the end of a<br />
Data Frame <strong>and</strong> the beginning of the<br />
transmission of the next node on the<br />
distribution list. See 4.3.1.<br />
Table 12 contains the values for the <strong>MAC</strong> parameters.<br />
Submission page 131 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Parameter Value Description<br />
Number of channel estimation<br />
symbols per frame<br />
Maximum number of simultaneous<br />
polling users<br />
16 See 4.3.4<br />
32 Maximum number of users that can be<br />
polled with one single polling frame.<br />
See 4.3.5 <strong>and</strong> 4.3.6<br />
Offset poll windows 61.2 us See 4.3.5 <strong>and</strong> 4.3.6<br />
Size poll window 81.2 us See 4.3.5 <strong>and</strong> 4.3.6<br />
MIN_TA_VALIDITY 1 Symbol See 4.4.1<br />
MAX_TA_VALIDITY 240 Symbols See 4.4.1<br />
MIN_TOKEN_VALIDITY 16 symbols See 0<br />
MAX_TOKEN_VALIDITY 4095 symbols See 0<br />
BACKOFF_SLOT_TIME 35.625 us See 4.3.5 <strong>and</strong> 4.3.6<br />
Backoff maximum number of slots 16 See 4.3.5 <strong>and</strong> 4.3.6<br />
MAX_ACTIVE_POLL_INTERVA<br />
L<br />
2 seconds See 4.2<br />
MAX_CSMA_TOKEN_PERIOD 0.5 seconds See 4.4.2.6<br />
MAX_ALIVE_TOKENS 100 tokens See 4.2<br />
MAX_ALIVE_POLL_INTERVAL 5 seconds See 4.2<br />
MAX_ACCESS_INTERVAL 5 seconds See 4.2<br />
Submission page 132 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Channel Estimation Maximum Period 10 seconds Channel Estimation Frame should be<br />
sent at least every Channel Estimation<br />
Maximum Period.<br />
ACCEPTATION_TO 5 seconds See 4.3.9<br />
INTER FRAME SPACE 1 189 µs Time distance between the end of a<br />
Distributor Frame <strong>and</strong> the beginning of<br />
the transmission of the first node of the<br />
distribution list. See 4.3.1.<br />
INTER FRAME SPACE 2 126 µs Time distance between the end of a<br />
Data Frame <strong>and</strong> the beginning of the<br />
transmission of the next node on the<br />
distribution list. See 4.3.1.<br />
Table 12 <strong>MAC</strong> parameter specification<br />
4.7 <strong>MAC</strong> service specification (<strong>MAC</strong> SAP)<br />
4.7.1 <strong>MAC</strong> service primitives<br />
Following table shows <strong>MAC</strong>-DATA, <strong>MAC</strong>-ACK <strong>and</strong> <strong>MAC</strong>-MNT primitives:<br />
Primitive Type<br />
Submission page 133 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.7.2 <strong>MAC</strong>-DATA.req<br />
4.7.2.1 Function<br />
<strong>MAC</strong>-DATA.req Request<br />
<strong>MAC</strong>-DATA.cnf Confirm<br />
<strong>MAC</strong>-DATA.ind Indication<br />
<strong>MAC</strong>-ACK.req Request<br />
<strong>MAC</strong>-ACK.cnf Confirm<br />
<strong>MAC</strong>-ACK.ind Indication<br />
<strong>MAC</strong>-MNT-TOKEN.req Request<br />
<strong>MAC</strong>-MNT-TOKEN.ind Indicate<br />
<strong>MAC</strong>-MNT-TOKEN.cnf Confirm<br />
<strong>MAC</strong>-MNT-RESOURCES.req Request<br />
<strong>MAC</strong>-MNT-RESOURCES.ind Indication<br />
<strong>MAC</strong>-MNT-RESOURCES.cnf Confirm<br />
<strong>MAC</strong>-MNT-CHANEST-FRAME.req Request<br />
<strong>MAC</strong>-MNT-CHANEST-REQ.req Request<br />
<strong>MAC</strong>-MNT-CHANEST-REQ.ind Indication<br />
<strong>MAC</strong>-MNT-NHOPS.req Request<br />
<strong>MAC</strong>-MNT-NHOPS.cnf Confirm<br />
<strong>MAC</strong>-MNT-CHANGE.req Request<br />
<strong>MAC</strong>-MNT-CHANGE.cnf Confirm<br />
<strong>MAC</strong>-MNT-TXSYMB.ind Indication<br />
<strong>MAC</strong>-MNT-CHANSTATS.req Request<br />
<strong>MAC</strong>-MNT-CHANSTATS.cnf Confirm<br />
<strong>MAC</strong>-MNT-NEWMID.ind Indication<br />
<strong>PHY</strong>-MNT-LINK-STATUS.req Request<br />
<strong>PHY</strong>-MNT-LINK-STATUS.cnf Confirm<br />
Table 13 <strong>MAC</strong> sevice primitives<br />
This primitive requests a transfer of a LPDU from a local LLC layer entity.<br />
4.7.2.2 Semantics of the service primitive<br />
<strong>MAC</strong>-DATA.req(LPDU):<br />
- LPDU: LLC Protocol Data Unit (MSDU)<br />
Submission page 134 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.7.2.3 When generated<br />
The primitive is generated by the LLC layer entity when a LPDU is to be transferred.<br />
4.7.2.4 Effect of receipt<br />
The <strong>MAC</strong> layer entity starts the sending of the LPDU.<br />
4.7.3 <strong>MAC</strong>-DATA.cnf<br />
4.7.3.1 Function<br />
This primitive has local significance <strong>and</strong> provides the LLC layer with status information (sending finished) of the<br />
corresponding preceeding <strong>PHY</strong>-DATA.req primitive.<br />
4.7.3.2 Semantics of the service primitive<br />
This primitive has no parameters.<br />
4.7.3.3 When generated<br />
The primitive is passed from the <strong>MAC</strong> layer entity to the LLC layer entity to indicate that the previous LPDU has<br />
been sent.<br />
4.7.3.4 Effect of receipt<br />
The LLC layer entity is aware that the <strong>MAC</strong> is available to send new MPDUs, <strong>and</strong> can issue new <strong>MAC</strong>-DATA.req<br />
primitives.<br />
4.7.4 <strong>MAC</strong>-DATA.ind<br />
4.7.4.1 Function<br />
This primitive defines the transfer of a LPDU from the <strong>MAC</strong> layer entity to the LLC layer entity.<br />
4.7.4.2 Semantics of the service primitive<br />
<strong>MAC</strong>-DATA.ind(LPDU, lpdu_seq_number)<br />
- LPDU: LLC Protocol Data Unit<br />
- lpdu_seq_number: a sequence number that uniquily identifies this LPDU.<br />
Submission page 135 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.7.4.3 When generated<br />
The primitive is passed from the <strong>MAC</strong> layer entity to the LLC layer entity to indicate the arrival of a LPDU.<br />
4.7.4.4 Effect of receipt<br />
The LLC layer entity processes the newly received LPDU.<br />
4.7.5 <strong>MAC</strong>-ACK.req<br />
4.7.5.1 Function<br />
This primitive requests the acknowledgment of a previously received LPDU.<br />
4.7.5.2 Semantics of the service primitive<br />
<strong>MAC</strong>-ACK.req(lpdu_seq_number):<br />
- lpdu_seq_number: the sequence number of the LPDU to be acknowledged.<br />
4.7.5.3 When generated<br />
This primitive is generated by the LLC layer entity when a previously received LPDU is to be acknowledged.<br />
4.7.5.4 Effect of receipt<br />
The <strong>MAC</strong> layer entity stores the lpdu_seq_number to be acknowledged, <strong>and</strong> will send the acknowledgment in the<br />
proper subsequent MPDU.<br />
4.7.6 <strong>MAC</strong>-ACK.cnf<br />
4.7.6.1 Function<br />
This primitive has local significance <strong>and</strong> provides the LLC layer with status information (acknowledgment sent) of<br />
the corresponding preceeding <strong>MAC</strong>-ACK.req primitive.<br />
4.7.6.2 Semantics of the service primitive<br />
This primitive has no parameters.<br />
Submission page 136 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.7.6.3 When generated<br />
This primitive is passed from the <strong>MAC</strong> suplayer entity to the LLC layer entity to indicate that the previously<br />
requested LPDU acknowledgment has been sent.<br />
4.7.6.4 Effect of receipt<br />
The LLC layer entity is aware that the previously requested LPDU acknowledgment has been sent <strong>and</strong> can issue<br />
new <strong>MAC</strong>-ACK.req primitives<br />
4.7.7 <strong>MAC</strong>-ACK.ind<br />
4.7.7.1 Function<br />
This primitive indicates the LLC layer entity that an LPDU acknowledgment has been received.<br />
4.7.7.2 Semantics of the service primitive<br />
<strong>MAC</strong>-ACK.ind(lpdu_seq_number):<br />
- lpdu_seq_number: the sequence number of the acknowledged LPDU.<br />
4.7.7.3 When generated<br />
This primitive is passed from the <strong>MAC</strong> layer entity to the LLC layer entity to indicate that an LPDU<br />
acknowledgment has been received.<br />
4.7.7.4 Effect of receipt<br />
The LLC marks the corresponding LPDU as correctly acknowledged by the peer LLC entity.<br />
4.7.8 <strong>MAC</strong>-MNT-TOKEN.req<br />
4.7.8.1 Function<br />
This primitive requests the sending of a token.<br />
4.7.8.2 Semantics of the service primitive<br />
<strong>MAC</strong>-MNT-TOKEN.req(token):<br />
- token (see 4.4.2): <strong>MAC</strong> delimiter: Distributor token, Data token, Silence token, <strong>Access</strong> Token, <strong>Access</strong><br />
Reply token, Polling token, TDR Polling token, Non-returnable Data token, CSMA token, Clock token<br />
Submission page 137 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.7.8.3 When generated<br />
This primitive is generated by the Management layer to send the token to other nodes, or to send special tokens.<br />
This primitive is used to schedule the access to the channel.<br />
4.7.8.4 Effect of receipt<br />
The <strong>MAC</strong> layer sends the requested token inside the current MPDU.<br />
4.7.9 <strong>MAC</strong>-MNT-TOKEN.ind<br />
4.7.9.1 Function<br />
This primitive indicates the reception of a token, <strong>and</strong> defines the transfer of the information received in the token to<br />
the Management layer.<br />
4.7.9.2 Semantics of the service primitive<br />
<strong>MAC</strong>-MNT-TOKEN.ind(token):<br />
- token (see 4.4.2): <strong>MAC</strong> delimiter: Distributor token, Data token, Silence token, <strong>Access</strong> Token, <strong>Access</strong><br />
Reply token, Polling token, TDR Polling token, Non-returnable Data token, CSMA token, Clock token<br />
4.7.9.3 When generated<br />
This primitive is generated by the <strong>MAC</strong> layer to indicate the reception of a token <strong>and</strong> provides the corresponding<br />
information used by the Management layer entity in protocols such as <strong>Access</strong> Protocol or QoS.<br />
4.7.9.4 Effect of receipt<br />
Depending on the token parameter, the Management layer entity may perform different actions (see sections 4, 8, 9<br />
<strong>and</strong> 11).<br />
4.7.10 <strong>MAC</strong>-MNT-TOKEN.cnf<br />
4.7.10.1 Function<br />
This primitive is generated by the <strong>MAC</strong> layer to inform about the result of the <strong>MAC</strong>-MNT-TOKEN.req primitive.<br />
That is, if the required token has been successfully sent.<br />
4.7.10.2 Semantics of the service primitive<br />
<strong>MAC</strong>-MNT-TOKEN.cnf (token, result):<br />
Submission page 138 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
- token: Requested token (see 4.4.2). Distributor token, Data token, Silence token, <strong>Access</strong> token, <strong>Access</strong><br />
Reply token, Polling token, TDR Polling token, Non-returnable Data token, CSMA token, Clock token<br />
- result: [SUCCESS|FAIL]. FAIL can be produced if the nodes losses a contention after a CSMA token.<br />
4.7.10.3 When generated<br />
The primitive is generated by the <strong>MAC</strong> layer to confirm the result of trying to send the requested token.<br />
4.7.10.4 Effect of receipt<br />
The Management layer entity shall take the proper actions taking into account the result parameter (see sections 4,<br />
8, 9, 10).<br />
4.7.11 <strong>MAC</strong>-MNT-RESOURCES.req<br />
4.7.11.1 Function<br />
This primitive requests the allocation or release of local <strong>MAC</strong> resources.<br />
4.7.11.2 Semantics of the service primitive<br />
<strong>MAC</strong>-MNT-RESOURCES.req (<strong>MAC</strong>, type, service_class, latency, BW) :<br />
- <strong>MAC</strong>: <strong>MAC</strong> address of the traffic source<br />
- type: type of request. [ALLOCATE|FREE]<br />
- service_class: Service class of the traffic flow<br />
- latency: latency requirement of the flow<br />
- BW: b<strong>and</strong>width requirement of the flow<br />
4.7.11.3 When generated<br />
The primitive is generated by the Management layer entity to allocate resources for one traffic flow, or free them.<br />
4.7.11.4 Effect of receipt<br />
If there are enough resources, they are allocated. The primitive <strong>MAC</strong>-MNT-RESOURCES.conf indicates the status<br />
of this allocation.<br />
4.7.12 <strong>MAC</strong>-MNT-RESOURCES.ind<br />
4.7.12.1 Function<br />
This primitive indicates a change of the resources that a traffic flow can use.<br />
Submission page 139 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.7.12.2 Semantics of the service primitive<br />
<strong>MAC</strong>-MNT-RESOURCES.ind(<strong>MAC</strong>, type, prio, latency, BW):<br />
- <strong>MAC</strong>: <strong>MAC</strong> address of the traffic source.<br />
- type: type of indication. [NO_RESOURCES|RESOURCES_CHANGE].<br />
- service_class: service class of the traffic flow<br />
- latency: latency requirement of the flow<br />
- BW: b<strong>and</strong>width requirement of the flow. (BW can be lower than requested when type is<br />
RESOURCES_CHANGE)<br />
4.7.12.3 When generated<br />
The primitive is passed by the <strong>MAC</strong> layer entity to the Management layer entity to indicate that the resources of a<br />
traffic flow have changed.<br />
4.7.12.4 Effect of receipt<br />
The Management layer is aware of the change in the resources allocated to the traffic flow, <strong>and</strong> shall take this result<br />
into account when performing the CAC protocol.<br />
4.7.13 <strong>MAC</strong>-MNT-RESOURCES.cnf<br />
4.7.13.1 Function<br />
This primitive indicates the result of the previously requested allocation of local resources.<br />
4.7.13.2 Semantics of the service primitive<br />
<strong>MAC</strong>-MNT-RESOURCES.cnf (<strong>MAC</strong>, type, service_class, latency, BW):<br />
- <strong>MAC</strong>: <strong>MAC</strong> address of the traffic source.<br />
- type: type of confirmation. [OK|NO_RESOURCES]<br />
- service_class: service_class of the traffic flow<br />
- latency: latency requirement of the flow<br />
- BW: b<strong>and</strong>width requirement of the flow. (BW can be lower than requested when type is OK).<br />
4.7.13.3 When generated<br />
The primitive is passed by the <strong>MAC</strong> layer entity to the Management layer entity to indicate the result of the<br />
previously requested allocation of local resources.<br />
4.7.13.4 Effect of receipt<br />
The Management layer is aware of the result of the previous <strong>MAC</strong>-MNT-RESOURCES.req primitive, <strong>and</strong> shall<br />
take this result into account when performing the CAC protocol.<br />
Submission page 140 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.7.14 <strong>MAC</strong>-MNT-CHANEST-FRAME.req<br />
4.7.14.1 Function<br />
This primitive requests the transmission of a Channel Estimation frame to the local <strong>MAC</strong> layer entity.<br />
4.7.14.2 Semantics of the service primitive<br />
This primitive has no parameters.<br />
4.7.14.3 When generated<br />
The primitive can be generated in two situations:<br />
- The Management layer periodically shall issue this primitive.<br />
- A <strong>MAC</strong>-MNT-CHANEST-REQ.ind primitive has been received.<br />
4.7.14.4 Effect of receipt<br />
The <strong>MAC</strong> layer entity shall transmit a Channel Estimation frame.<br />
4.7.15 <strong>MAC</strong>-MNT-CHANEST-REQ.req<br />
4.7.15.1 Function<br />
This primitive requests the sending of a Channel Estimation frame petition to a given node.<br />
4.7.15.2 Semantics of the service primitive<br />
<strong>MAC</strong>-MNT-CHANEST-REQ.req (dest_<strong>MAC</strong>) :<br />
- dest_<strong>MAC</strong>: <strong>MAC</strong> address of the node that is requested to send the Channel Estimation frame.<br />
4.7.15.3 When generated<br />
This primitive shall be generated by the Management layer when it considers that the tonemap used to receive<br />
transmissions from a given node may have changed.<br />
4.7.15.4 Effect of receipt<br />
The <strong>MAC</strong> layer entity shall fill a Data token addressed to the dest_<strong>MAC</strong> address with the Channel Estimation<br />
Frame Request set to 1.<br />
Submission page 141 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.7.16 <strong>MAC</strong>-MNT-CHANEST-REQ.ind<br />
4.7.16.1 Function<br />
This primitive indicates the Management layer that a Channel Estimation frame request from a node has been<br />
received.<br />
4.7.16.2 Semantics of the service primitive<br />
<strong>MAC</strong>-MNT-CHANEST-REQ.ind(src_<strong>MAC</strong>):<br />
- src_<strong>MAC</strong>: <strong>MAC</strong> address of the requester.<br />
4.7.16.3 When generated<br />
The primitive is generated by the <strong>MAC</strong> layer entity to indicate that a node has requested the transmission of a<br />
Channel Estimation frame.<br />
4.7.16.4 Effect of receipt<br />
When receiving this primitive, the Management layer entity shall decide to issue the <strong>MAC</strong>-MNT-CHANEST-<br />
FRAME.req in order to transmit the Channel Estimation frame.<br />
4.7.17 <strong>MAC</strong>-MNT-NHOPS.req<br />
4.7.17.1 Function<br />
This primitive requests the <strong>MAC</strong> layer for the number of hops that the node is from a master.<br />
4.7.17.2 Semantics of the service primitive<br />
<strong>MAC</strong>-MNT-NHOPS.req(<strong>MAC</strong>):<br />
- <strong>MAC</strong>: <strong>MAC</strong> address of the master<br />
4.7.17.3 When generated<br />
The primitive is generated when the Management layer needs to know the number of hops from a master node.<br />
4.7.17.4 Effect of receipt<br />
The <strong>MAC</strong> layer obtains the number of hops <strong>and</strong> passes this information to the Management layer by means of the<br />
<strong>MAC</strong>-MNT-NHOPS.cnf primitive.<br />
Submission page 142 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.7.18 <strong>MAC</strong>-MNT-NHOPS.cnf<br />
4.7.18.1 Function<br />
This primitive indicates the result of the previously requested number of hops.<br />
4.7.18.2 Semantics of the service primitive<br />
<strong>MAC</strong>-MNT-NHOPS.cnf(nhops):<br />
- nhops: number of hops between local node <strong>and</strong> requested master.<br />
4.7.18.3 When generated<br />
The primitive is passed by the <strong>MAC</strong> layer entity to the Management layer entity to provide the number of hops.<br />
4.7.18.4 Effect of receipt<br />
The Management layer uses this number of hops in several management <strong>and</strong> configuration protocols.<br />
4.7.19 <strong>MAC</strong>-MNT-CHANGE.req<br />
4.7.19.1 Function<br />
This primitive is used to change the role of the node (master/slave) in the PLC cell.<br />
4.7.19.2 Semantics of the service primitive<br />
<strong>MAC</strong>-MNT-CHANGE.req (role, new_master):<br />
- role: [MASTER|SLAVE]<br />
- new_master: <strong>MAC</strong> address of the node that has to be considered as the new master. This parameter shall be<br />
used when the role is SLAVE.<br />
4.7.19.3 When generated<br />
The primitive is issued by the Management layer entity in the framework of the Coordination tools (see ¡Error! No<br />
se encuentra el origen de la referencia.).<br />
4.7.19.4 Effect of receipt<br />
The <strong>MAC</strong> layer shall play the role indicated in the parameters.<br />
Submission page 143 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.7.20 <strong>MAC</strong>-MNT-CHANGE.cnf<br />
4.7.20.1 Function<br />
This primitive is used to inform that the requested change has been done.<br />
4.7.20.2 Semantics of the service primitive<br />
This primitive has no parameters.<br />
4.7.20.3 When generated<br />
It is generated by the <strong>MAC</strong> layer when the role has been changed.<br />
4.7.20.4 Effect of receipt<br />
The Management layer receives the confirmation of the change.<br />
4.7.21 <strong>MAC</strong>-MNT-TXSYMB.ind<br />
4.7.21.1 Function<br />
This primitive is used to inform the Management layer about the number of information symbols transmitted to a<br />
given node.<br />
4.7.21.2 Semantics of the service primitive<br />
<strong>MAC</strong>-MNT-TXSYMB.ind (num_symb, port):<br />
- num_symb: number of symbols transmitted.<br />
- port: local transmission port<br />
4.7.21.3 When generated<br />
This primitive is generated by the <strong>MAC</strong> layer entity after each transmission.<br />
4.7.21.4 Effect of receipt<br />
Upon the reception of this primitive, the Management layer can estimate the required b<strong>and</strong>width by a traffic flow. It<br />
can also estimate the latencies that the traffic flow is suffering.<br />
Submission page 144 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.7.22 <strong>MAC</strong>-MNT-CHANSTATS.req<br />
4.7.22.1 Function<br />
This primitive is used to gather <strong>MAC</strong> statistics about the channel state.<br />
4.7.22.2 Semantics of the service primitive<br />
This primitive has no parameters.<br />
4.7.22.3 When generated<br />
The primitive is generated by the Management layer when it needs to know the statistics to perform the functions<br />
described in sections 8, 9 <strong>and</strong> 11.<br />
4.7.22.4 Effect of receipt<br />
The <strong>MAC</strong> layer entity communicates the required information by means of the <strong>MAC</strong>-MNT-CHANSTATS.cnf<br />
primitive.<br />
4.7.23 <strong>MAC</strong>-MNT-CHANSTATS.cnf<br />
4.7.23.1 Function<br />
This primitive is used by the <strong>MAC</strong> layer to communicate the required statistics.<br />
4.7.23.2 Semantics of the service primitive<br />
<strong>MAC</strong>-MNT-CHANSTATS.cnf (stats):<br />
- stats: composed by this information:<br />
o cont_win: number of won contention attempts<br />
o cont_attemp: number of contention attempts<br />
o num_nodes: number of detected nodes<br />
o used_val_rate: vector (one value per priotity): % of the assigned validity that has been used by the<br />
slaves<br />
o req_val_rate: vector (one value per service class): % of the available validity that has been<br />
requested<br />
o empy_CSMA: number of unsued CSMA tokens by the slaves<br />
o CSMA_usage: % of the assigned validity in CSMA tokens that has been used by the slaves<br />
4.7.23.3 When generated<br />
It is generated as a response to the <strong>MAC</strong>-MNT-CHANSTATS.req primitive.<br />
Submission page 145 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.7.23.4 Effect of receipt<br />
The Management layer can use the information to perform the functions described in sections 8, 9 <strong>and</strong> 11.<br />
4.7.24 <strong>MAC</strong>-MNT-NEWMID.ind<br />
4.7.24.1 Function<br />
This primitive is used to notify the Management layer that a different MID has been detected.<br />
4.7.24.2 Semantics of the service primitive<br />
<strong>MAC</strong>-MNT-NEWMID.ind (new_mid):<br />
- new_mid: new MID detected<br />
4.7.24.3 When generated<br />
This primitive is generated by the <strong>MAC</strong> layer entity when it detects in the channel a MID different than the own<br />
MID.<br />
4.7.24.4 Effect of receipt<br />
The Management layer entity uses this information to perform the coordination among different BPL Cells.<br />
4.7.25 <strong>MAC</strong>-MNT-LINK-STATUS.req<br />
4.7.25.1 Function<br />
This primitive requests to the <strong>MAC</strong> layer the link status of the communication with certain <strong>MAC</strong>.<br />
4.7.25.2 Semantics of the service primitive<br />
<strong>MAC</strong>-MNT-LINK-STATUS.req (<strong>MAC</strong>):<br />
• <strong>MAC</strong>: <strong>MAC</strong> address<br />
4.7.25.3 When generated<br />
The primitive is generated when the Management layer needs to know the status of certain link.<br />
Submission page 146 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
4.7.25.4 Effect of receipt<br />
The current link status is obtained by the <strong>MAC</strong> layer <strong>and</strong> passed to the Management layer by means of the <strong>MAC</strong>-<br />
MNT-LINK-STATUS.req primitive.<br />
4.7.26 <strong>MAC</strong>-MNT-LINK-STATUS.cnf<br />
4.7.26.1 Function<br />
This primitive indicates the link status of the communication with certain <strong>MAC</strong>.<br />
4.7.26.2 Semantics of the service primitive<br />
<strong>MAC</strong>-MNT-LINK-STATUS.cnf (<strong>MAC</strong>,link_status):<br />
• <strong>MAC</strong>: <strong>MAC</strong> address<br />
• Link Status: Linked (1) or not linked (0)<br />
4.7.26.3 When generated<br />
The primitive is generated when the Management layer needs to know the status of certain link.<br />
4.7.26.4 Effect of receipt<br />
The Maganement layer gets the link status.<br />
5 LLC<br />
5.1 INTRODUCTION<br />
The LLC layer receives packets (Convergence <strong>Layer</strong> PDUs) from the Convergence <strong>Layer</strong> <strong>and</strong> transmits LLC PDUs<br />
to the <strong>MAC</strong> layer. LLC tasks are:<br />
• Segmentation <strong>and</strong> grouping of packets (CLPDUs) to create the payloads of the bursts.<br />
• The addition of an inter-packet header to every packet or fragment of packet<br />
• The addition of an LLC delimiter (Burst Header) to the payload of every burst payload.<br />
• The addition of the CCMP Header at the beginning of each burst when burst is set as encrypted.<br />
• The addition of a Message Integrity Check (MIC) to every fragment of packet or packet when burst is set as<br />
encrypted.<br />
Submission page 147 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
• The addition of a Cyclic Reduncancy Check (CRC) to every fragment of packet or packet when burst is set<br />
as unencripted.<br />
• The Packet ACK Protocol (PAP) for sequence control <strong>and</strong> selective acknowledgement of packets<br />
(CLPDUs).<br />
5.2 BURST HEADER<br />
There are two types of burst header, one with data <strong>and</strong> other one without data.<br />
5.2.1 Burst header with data<br />
The Burst Header is the LLC Delimiter which precedes every burst. It has the following fields:<br />
- Preamble – 32 bits. Always set to 0xBDADC3.<br />
- TMI – 4 bits. Tonemap ID. Tonemap used in the data encoding. TMI 0 is reserved for HURTO mapping.<br />
- Version – 3 bits. Set to 0.<br />
- Transmission Port – 7 bits. Local Port of the intended receiver of the Burst.<br />
- APL – 14 bits. Aggregated Payload Length. Length of the payload in 32-bit words of the current burst,<br />
including RS FEC redundancy. The APL will be defined by the RS FEC redundancy used <strong>and</strong> the length of<br />
the data included in the burst.<br />
- FEC payload – 6 bits. RS Fordward Error Correction codeword payload length in 32-bit words. The RS<br />
FEC codeword payload allowed values are indicated in Table 2. The FEC Redundancy + FEC payload has<br />
to be less or equal to 63 words.<br />
- FEC Redundancy – 2 bits. RS Fordward Error Correction codeword redundancy length:<br />
o 0: 8 redundancy bytes (2 words)<br />
o 1: 12 redundancy bytes (3 words)<br />
o 2: 16 redundancy bytes (4 words)<br />
o 3: 20 redundancy bytes (5 words)<br />
- BPS –14 bits. Bits Per Symbol for the current burst. It depends on the encoding used for the current<br />
transmission. Possible values range from 24 to 14592. The BPS calculation (See Equation 17) includes the<br />
RS redundancy <strong>and</strong> excludes the 4D-TCM. With the BPS <strong>and</strong> APL values nodes that are not the destination<br />
of the burst, but that may be the destination of subsequent bursts in the same frame, may calculate the burst<br />
duration in symbols in order to know when the next burst header or token is going to be placed.<br />
- HURTO – 1 bit. It shall be set to 1 when the burst is transmitted in HURTO mode.<br />
- Dummy Hdr– 1 bit. It shall be set to 1 if the burst is not carrying data symbols.<br />
Submission page 148 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
- PAP Code Type – 1 bit. Packet ACK Protocol Codification Type. It is set to 0 when Run-Length Encoding<br />
is used <strong>and</strong> set to 1 when GroupEncoding is used.<br />
• Crypto AES– 1 bit. Shall be set to 1 when the burst is encrypted.<br />
- ACK Info – 1 bit. Shall be set to 1 when the burst header contains Packet ACK Protocol information (see<br />
5.4).<br />
- PAP Info – 55 bits. The meaning of these bits depends on PAP Code Type. See section 5.4<br />
- PAP Port – 7 bits. Local Port over which the ACK contained in the Burst Header takes effect.<br />
- PAP Init – 1 bit. The first packet that requires ACK (Req ACK field in the Interpacket Header) in the burst<br />
has the lowest packet id stored in transmission buffer. The receiver cannot request retransmissions of<br />
previous packets ids.<br />
- PAP Reset – 1 bit. Reset the reception buffer.<br />
- PAP Last Received Packet – 12 bits. Last received packet information used by Packet ACK Protocol. See<br />
section 5.4<br />
- Service class – 8 bits. Indicates the service classes belonging to the packets contained in the burst. If bit X is<br />
equal to 1, there is at least one packet in this burst with service class X.<br />
Submission page 149 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
7<br />
6<br />
Version<br />
Transmission Port [1:0]<br />
Reserved<br />
Reserved<br />
Reserved<br />
PAP Info [38:36]<br />
PAP Info [3:0]<br />
5<br />
FEC Payload<br />
BPS [5:0]<br />
4<br />
BD<br />
AD<br />
C3<br />
APL [7:0]<br />
BPS [13:6]<br />
PRIORITY<br />
Submission page 150 UPA-OPERA<br />
3<br />
2<br />
TMI<br />
Transmission Port [6:2]<br />
APL [13:8]<br />
1<br />
0<br />
FEC Redundancy<br />
PAP Init<br />
HURTO DUMMY Hdr PAP Code Type ACK Info<br />
PAP Info [53:47]<br />
PAP Port<br />
PAP Info [46:39]<br />
Always must be 0 Always must be 0<br />
PAP Info [35:28]<br />
PAP Info [27:20]<br />
PAP Info [19:12]<br />
PAP Info [11:4]<br />
PAP Last Received Packet [7:0]<br />
Figure 54 Burst Header<br />
The Burst Header contains two independent pieces of information:<br />
Reserved<br />
PAP Last Received Packet [11:8]<br />
PAP Reset<br />
PAP Info [54]<br />
Crypto AES<br />
preamble<br />
- Information about the data burst being transmitted, which destination port is Transmission Port<br />
- Information about PAP Information, which destination port is PAP Port.<br />
For this reason, the receiver of data burst could be different from receiver of PAP information.<br />
For example, in the following figure:
4-June-07 P1901_PRO_016_r0<br />
Port_4<br />
Port_3<br />
Node A Node B<br />
A burst header sent from node A could have:<br />
Node C<br />
Submission page 151 UPA-OPERA<br />
Port_1<br />
Port_2<br />
Figure 55: Example of PAP destination<br />
- A PAP Port equal to port_3 to send PAP information about data previously received from node B in a data burst<br />
whose Burst Header contained in the Transmission Port field the value port_1.<br />
- Transmission Port equal to port_4 to send data to node C.<br />
For further details about ports, see section 9.1.4.<br />
5.2.2 Burst header without data<br />
The Burst Header without data is used when information about Packet ACK Protocol should be sent in the<br />
following situations:<br />
- There is no data to be sent.
4-June-07 P1901_PRO_016_r0<br />
- The Packet ACK Protocol information has too many errors if it is sent in a Burst Header because limitation<br />
of used PAP codification.<br />
Thefollowing are the fields with significant information:<br />
- Preamble – 32 bits. Always set to 0xBDADC3<br />
- TMI – 4 bits. Tonemap ID. Tonemap used in the data encoding. TMI 0 is reserved for HURTO mapping.<br />
- Version – 3 bits. Set to 0.<br />
- Dummy Hdr– 1 bit. It shall be set to 1 if the burst is not carrying data symbols.<br />
- PAP Code Type – 1 bit. Packet ACK Protocol Codification Type. It is set to 0 when Run-Length Encoding.<br />
And set to 1 when GroupEncoding.<br />
- ACK Info – 1 bit. Shall be set to 1 when the burst header contains Packet ACK Protocol information. See<br />
section 5.4.<br />
- PAP Info – 119 bits. The meaning of these bits depends on PAP Code Type. See section 5.4<br />
- PAP Port – 7 bits. Local Port over which the ACK contained in the Burst Header takes effect.<br />
- PAP Last Received Packet – 12 bits. Last received packet information used by Packet ACK Protocol. See<br />
section 5.4<br />
The rest of the fields shall be ignored in reception.<br />
Submission page 152 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
7<br />
PAP Info [60]<br />
6<br />
Version<br />
Reserved<br />
5<br />
PAP Info [73:70]<br />
PAP Info [3:0]<br />
5.3 BURST STRUCTURE<br />
4<br />
BD<br />
AD<br />
C3<br />
Submission page 153 UPA-OPERA<br />
3<br />
PAP Info [113:106]<br />
PAP Info [105:98]<br />
PAP Info [97:90]<br />
PAP Info [89:82]<br />
PAP Info [81:74]<br />
PAP Info [68:61]<br />
2<br />
TMI<br />
PAP Info [118:114]<br />
DUMMY Hdr PAP Code Type ACK Info<br />
PAP Port<br />
PAP Info [59:52]<br />
PAP Info [51:44]<br />
PAP Info [43:36]<br />
PAP Info [35:28]<br />
PAP Info [27:20]<br />
PAP Info [19:12]<br />
PAP Info [11:4]<br />
PAP Last Received Packet [7:0]<br />
PAP Last Received Packet [11:8]<br />
Figure 56: Burst Header without Data<br />
1<br />
0<br />
PAP Info [69]<br />
preamble<br />
Two possible burst structures are supported. First one is used in the case of unencrypted burst, <strong>and</strong> second one is<br />
devoted to encrypted bursts.<br />
5.3.1 Unencrypted Burst Structure<br />
When Cripto AES bit in the Burst Header is set to 0, the burst shall be composed by a Burst Header delimiter<br />
followed by a data payload including one or several fragmented <strong>and</strong>/or completed packets. A Burst Header delimiter<br />
without any following data payload is used to send PAP information when there are no data to be sent as described<br />
in section 5.2.2.<br />
Note: The Burst Header is a delimiter processed by the <strong>PHY</strong> layer as described in 3.3.1. It is transmitted in HURTO<br />
mode over one single symbol. The data payload is processed by the <strong>PHY</strong> layer as described in 3.3.2. The data<br />
payload may use HURTO or adaptive mapping. It can be transmitted over one or several symbols.<br />
The Unencrypted Burst could have the following structures:
4-June-07 P1901_PRO_016_r0<br />
Burst<br />
header<br />
symbol M data symbols<br />
HEADER<br />
HEADER<br />
HEADER<br />
First<br />
INTER-<br />
PACKET<br />
HEADER<br />
Completed<br />
PACKET<br />
CRC<br />
WORD<br />
N-<br />
INTER-<br />
PACKET<br />
HEADER<br />
Completed<br />
PACKET<br />
Submission page 154 UPA-OPERA<br />
…<br />
CRC<br />
WORD<br />
64 bits 32 bits 64 bits 32 bits<br />
First<br />
INTER-<br />
PACKET<br />
HEADER<br />
Fragmented<br />
PACKET<br />
PADDING<br />
CRC<br />
WORD<br />
64 bits 32 bits<br />
First<br />
INTER-<br />
PACKET<br />
HEADER<br />
Fragmented<br />
or Completed<br />
PACKET<br />
CRC<br />
WORD<br />
Second<br />
INTER-<br />
PACKET<br />
HEADER<br />
Completed<br />
PACKET<br />
CRC<br />
WORD<br />
N-<br />
INTER-<br />
PACKET<br />
HEADER<br />
Fragmented<br />
or Completed<br />
PACKET<br />
CRC<br />
WORD<br />
64 bits 32 bits 64 bits<br />
32 bits<br />
64 bits 32 bits<br />
For more information about the Burst Header see 5.2.<br />
PADDING<br />
PADDING<br />
PADDING<br />
Figure 57 Unencrypted Burst examples<br />
Each burst can contain more than one CLPDU. For more information about the CLPDU format see 6.2.<br />
The length of a burst is equal to a number of data symbols. The maximum length of a burst is 30 OFDM symbols,<br />
excluding the burst header. The maximum capacity of the burst in 32-bit words depends on the bit-loading table <strong>and</strong><br />
the number of data symbols.<br />
When one packet has to be divided into fragments, each fragment length must be multiple of 256 bytes, except the<br />
last fragment. No 32-bit words are added as padding in the last fragment to obtain 256 bytes. If one packet has<br />
length equal to X with X = Y * 256 + Z bytes, the packet could be sent in up to (Y+1) different bursts using<br />
fragmentation. If one packet has length equal to X bytes with X less than 256 bytes, this packet is sent with X bytes<br />
plus the needed padding to align it to 32-bit words. In any case, the only added padding is to be aligned to 32-bit<br />
words.<br />
The inter-packet header is used for disassembling bursts in reception. An inter-packet header shall always precede<br />
each packet or fragment of a packet.<br />
At the end of each fragment or packet, a 32-bits CRC of the preceding fragment or packet (excluding inter-packet<br />
header) shall be sent.<br />
…<br />
PADDING<br />
PADDING
4-June-07 P1901_PRO_016_r0<br />
Packet fragments shall only appear at the beginning or the end of the burst. Once a fragment of a packet is sent in a<br />
burst, the rest of the packet shall be sent before any other packet to the same Local Port (regardless of service class).<br />
Packets with the same destination port <strong>and</strong> same service class shall be transmitted in order. Within the same<br />
destination port, packets are transmitted according to their service class, with highest service class packets first (see<br />
8.2).<br />
The inter-packet header has the following structure:<br />
7 6<br />
Part of<br />
Packet<br />
Version<br />
- Preamble – 8 bits. Set to 0x5D<br />
5<br />
4<br />
Unfinished Last Packet ACK Req Packet Id [11:8]<br />
Length [5:0]<br />
5D<br />
Reserved<br />
Submission page 155 UPA-OPERA<br />
3<br />
Packet Id [7:0]<br />
Fragment Number<br />
CRC – 16 bits<br />
Figure 58 Inter-packet header<br />
2<br />
1<br />
Length [8:6]<br />
0<br />
Padding Last Word<br />
- Part of Packet – 1 bit. The first fragment in the burst is part of a previous packet. This field shall only be<br />
checked by the receiver in the first inter-packet header.<br />
- Unfinished – 1 bit. The last fragment in this burst is unfinished. To be set to one in the last inter-packet<br />
header if it is not a complete packet.<br />
- Last Packet – 1 bit. This is the last fragment or packet inside this burst.<br />
- ACK Req – 1 bit. The transmitter is waiting an ACK about this packet to free it. When it is set to 0, the<br />
transmitter frees this packet when this packet is sent <strong>and</strong> the receiver can not request retransmissions about<br />
it.<br />
- Packet Id – 12 bits. Unique identification of each packet.<br />
- Version – 2 bits. Version is set to 0.<br />
- Fragment number – 3 bits. Each packet could be divided into 6 fragments. This is the identification of each<br />
fragment: from 0 to 5.<br />
- Length – 9 bits. Length of the packet or fragment in words.<br />
Octet<br />
1<br />
2<br />
3<br />
4<br />
5<br />
6<br />
7<br />
8
4-June-07 P1901_PRO_016_r0<br />
- Padding Last Word – 2 bits. Number of padding bytes of the last word of the packet or fragment of a<br />
packet.<br />
- CRC – 16 bits. 16 bits CRC of the preceding 48-bits.<br />
5.3.2 Encrypted Burst Structure<br />
When Cripto AES bit in the Burst Header is set to 1, the burst shall be composed by a Burst Header delimiter<br />
followed by a CCMP Header of 64 bits length whose composition <strong>and</strong> fields are described in section 10.1. After the<br />
CCMP Header, data payload including one or several fragmented <strong>and</strong>/or completed packets is added to the burst.<br />
Each packet fragment or packet includes a Message Integrity Check (MIC) to preserve the integrity of each unit as<br />
described in section 10.1.<br />
The Encrypted Burst could have the following structures:<br />
Burst<br />
header<br />
symbol<br />
HEADER<br />
HEADER<br />
HEADER<br />
CCMP<br />
Header<br />
64 bits<br />
CCMP<br />
Header<br />
64 bits<br />
CCMP<br />
Header<br />
64 bits<br />
First<br />
INTER-<br />
PACKET<br />
HEADER<br />
Completed<br />
PACKET<br />
MIC<br />
M data symbols<br />
N-<br />
INTER-<br />
PACKET<br />
HEADER<br />
Completed<br />
PACKET<br />
64 bits 32 bits 64 bits 32 bits<br />
First<br />
INTER-<br />
PACKET<br />
HEADER<br />
64 bits<br />
First<br />
INTER-<br />
PACKET<br />
HEADER<br />
Fragmented<br />
or<br />
Completed<br />
PACKET<br />
PADDING<br />
PADDING<br />
MIC<br />
Second<br />
INTER-<br />
PACKET<br />
HEADER<br />
Submission page 156 UPA-OPERA<br />
…<br />
Fragmented<br />
PACKET<br />
Completed<br />
PACKET<br />
N-<br />
INTER-<br />
PACKET<br />
HEADER<br />
Fragmented<br />
or<br />
Completed<br />
PACKET<br />
64 bits 32 bits 64 bits<br />
32 bits<br />
64 bits 32 bits<br />
PADDING<br />
MIC<br />
Figure 59 Encrypted Burst examples<br />
Each MIC is calculated over the Burst Header, CCMP Header, its correspondent Interpacket Header, the packet or<br />
fragment of packet itself <strong>and</strong> the padding, but Burst Header <strong>and</strong> CCMP Header are sent only once at the beginning<br />
of the burst. More information about algorithms <strong>and</strong> field composition is given in section 10.1.<br />
Restrictions <strong>and</strong> rules regarding packet fragmentation in unencrypted burst remains the same for encrypted bursts.<br />
…<br />
PADDING<br />
PADDING<br />
PADDING<br />
MIC<br />
MIC<br />
32 bits<br />
MIC
4-June-07 P1901_PRO_016_r0<br />
5.4 Packet ACK Protocol<br />
The Packet ACK Protocol has the following functions:<br />
1) <strong>Control</strong> of sequence of received packets in the receiver<br />
2) Acknowledge of correct received packets <strong>and</strong> request of retransmission of no received or incorrect packets<br />
Each packet can be sent in one of the following modes:<br />
a) No ACK mode: The receiver cannot request any retransmission of this packet. The packet id is only used to<br />
reassembling fragments of one packet. The Req ACK bit in inter-packet header is set to 0 in this case.<br />
b) ACK mode: The receiver can do a sequence control, reassembling fragments of one packet <strong>and</strong> request<br />
retransmissions. The receiver is the responsible for sending ACKs to the transmitter about the receive<br />
packet. The Req ACK bit in inter-packet header is set to 1 in this case.<br />
The Packet ACK Protocol (PAP) uses fields located in the Burst Header or in the inter-packet header to perform the<br />
ACK algorithm:<br />
• ACK Info - 1 bit. Active when the Burst Header contains PAP information.<br />
• PAP Port – 7 bits: Local port of this PAP information<br />
• PAP Last Received Packet – 12 bits: Packet ID of last Received Packet . Used to decode PAP<br />
Information.<br />
• PAP Code Type – 1 bit: Packet ACK Protocol Codification Type. It is set to 0 when performing Run-<br />
Length Encoding <strong>and</strong> set to 1 when performing Group Encoding.<br />
• PAP Info – 119 bits in case of Burst Header without data. And 55 bits in case of Burst Header with<br />
data. . The meaning of these bits depends on PAP Code Type as explained below.<br />
• PAP Init – 1 bit. The receiver should move the reception buffer in order to have as first packet<br />
identification the first ACK Req packet identification from this burst.<br />
• Packet Id – 12 bits: Unique identification of each packet.<br />
• Fragment number – 3 bits: Each packet could be divided into 6 fragments. This is the identification of<br />
each fragment: from 0 to 5.<br />
• ACK Req – 1 bit. The transmitter is waiting an ACK about this packet to free it. When it is set to 0, the<br />
transmitter frees this packet when this packet is sent <strong>and</strong> the receiver can not request retransmissions<br />
about it.<br />
In case of ACK Req packets are transmitted, the receiver shall inform the transmitter about how the packets were<br />
received. Since the packet windows size is 2048 packets, 2048 bits shall be sent back to the transmitter so that it can<br />
free the correctly received packets <strong>and</strong> retransmit the packets that have been received incorrectly or not received.<br />
The feedback information shall be coded to fit in the allocated space. There are two types of encoding:<br />
Submission page 157 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
- Group Encoding (see 5.4.2)<br />
- Run-Length Encoding (see 5.4.3)<br />
The PAP codification could have some errors due to limited space left in the Burst Header. An error in PAP<br />
codification consists on requesting retransmission of a correct received packet. Errors in the PAP codification that<br />
acknowledge a not received packet or an incorrect received packet are forbidden.<br />
5.4.1 Transmission window management<br />
Packets can be transmitted without receiving acks while there are free positions in the transmission window. An<br />
occupied position in the transmission window is a sent packet whose ack has not been received. If all the positions<br />
in the transmission window are occupied, a timer (ACK_TIMER) shall be started. If no ack is received before the<br />
timer expires, the packets inside the transmission window shall be sent again. After MAX_RTX timeouts, the<br />
window shall be cleared (packets removed from the transmission memory) <strong>and</strong> the next burst that will be sent to the<br />
same destination shall have the PAP Init bit set to 1.<br />
5.4.2 Packet ACK Protocol: Group Encoding<br />
When using Group Encoding, the status of the received packets is coded in a compressed format. Status is not<br />
expressed by individual packets but by groups of packets.<br />
Groups shall be all the same length, <strong>and</strong> shall be formed starting from the most recently received packet id<br />
backwards to the oldest id.<br />
The PAP information depends on the PAP Code Type <strong>and</strong> on PAP Algorithm (PAP Info bits [1:0]):<br />
PAP Algorithm Description<br />
0 Algorithm A (see section 5.4.2.1)<br />
1 Algorithm B (see section 0)<br />
2 Algorithm C (see section 5.4.2.3)<br />
In all these algorithms, the following information is used:<br />
Table 14: PAP algorithm coding<br />
Submission page 158 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
PAP Info Bits Parameter Description<br />
[2] Polarity of the left-over bits The PAP Information per<br />
group is about a number of<br />
packet ids. The rest of packet<br />
ids are correctly received if<br />
“polarity of the left-over bits”<br />
is equal to 1. And incorrectly<br />
received if it is equal to 0.<br />
[8:3] Compression Ratio Number of packets<br />
represented by each bit<br />
Table 15: PAP algorithm information<br />
The difference between Algorithm A, B <strong>and</strong> C is that B <strong>and</strong> C needs extra information.<br />
In case of Burst with data, the bits in Burst Header are used depending on the chosen algorithm:<br />
- Algorithm A, the bits from [54:9] are used to describe the status of each group (Group Status)<br />
- Algorithm B <strong>and</strong> C:<br />
o Bits from [19:9] are used for parameter “offset”.<br />
o Bits from [54:20] are used to describe the status of each group (Group Status)<br />
In case of Burst without data, the bits in Burst Header are used depending on the chosen algorithm:<br />
- Algorithm A, the bits from [118:9] are used to describe the status of each group<br />
- Algorithm B <strong>and</strong> C:<br />
o Bits from [19:9] are used for parameter “offset”.<br />
o Bits from [118:20] are used to describe the status of each group (Group Status)<br />
5.4.2.1 Group Encoding: Algorithm A<br />
In this algorithm the receiver shall send 4 pieces of information to the transmitter.<br />
1. The last correctly received packet<br />
2. The number of packets in each group (compression ratio)<br />
3. The polarity of the left-over bits (1 shall mean received correctly/ 0 shall mean received incorrectly)<br />
4. The PAP coded bit: 46 bits in Burst Header with data or 111 bits in Burst Header without data.<br />
With this information the transmitter shall be able to reconstruct the receiver window <strong>and</strong> retransmit or free-up<br />
packets appropriately.<br />
The PAP informatioin decoder (transmitter) in order to reconstruct the status of the packets sent previously to the<br />
last correctly received shall take the first bit of the coded bits <strong>and</strong> replicate it a number of times, (given by the<br />
Submission page 159 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
compression ratio), until completing the window (2048 bits). The group porder goes from the most recently<br />
received to least recently received (see Figure 60)<br />
Polarity<br />
of lefover<br />
bits<br />
PAP<br />
Coded<br />
Bits<br />
[last bit]<br />
Compression<br />
ratio<br />
2048<br />
5.4.2.2 Packet ACK Protocol: Algorithm B<br />
PAP<br />
Coded<br />
Bits [1]<br />
Figure 60: Packet ACK Protocol: Algorithm A<br />
Last correctly<br />
received packet<br />
PAP<br />
Coded<br />
Bits [0]<br />
Submission page 160 UPA-OPERA<br />
ok<br />
Compression<br />
ratio<br />
Compression<br />
ratio<br />
This algorithm is similar to the algorithm A but one extra piece of information shall be sent:<br />
• An offset that shall indicate where the next transition (status change) after the last correctly received packet<br />
(not including the offset itself) occurs.<br />
In this algorithm, the status of the groups is described by 35 bits in Burst Header with data or 99 bits in Burst<br />
Header without data.<br />
With this information the PAP decoder (transmitter) shall take the previous packet to the last correctly received<br />
packet, <strong>and</strong> count backwards until the offset is reached <strong>and</strong>. It shall fill these spacespositions with either ones or<br />
zeros (depending on the polarity bit). After this, the decoding of the algorithm B shall be identical of that ofto the<br />
algorithm A. The process is described in the following figure:<br />
Polarity<br />
of lefover<br />
bits<br />
PAP<br />
Coded<br />
Bits<br />
[last bit]<br />
Compression<br />
ratio<br />
2048<br />
PAP<br />
Coded<br />
Bits [1]<br />
PAP<br />
Coded<br />
Bits [0]<br />
Compression<br />
ratio<br />
Compression<br />
ratio<br />
Figure 61: Packet ACK Protocol: Algorithm B<br />
1<br />
Last correctly<br />
received packet<br />
NOT<br />
PAP<br />
Coded<br />
Bits [0]<br />
Offset<br />
ok<br />
1
4-June-07 P1901_PRO_016_r0<br />
5.4.2.3 Grouping Encoding: Algorithm C<br />
This algorithm is a variation of the algorithm B. The receiver shall send the same amount of data than in algorithm<br />
B but the transmitter shall decode it in a different way.<br />
The PAP decoder (transmitter) shall take the information <strong>and</strong> assume that from the starting point (this is the last<br />
correctly received packet) to the offsets, the packets were incorrectly received. And from the offset, it shall start the<br />
decoding in the same way as in algorithms A <strong>and</strong> B.<br />
Polarity<br />
of lefover<br />
bits<br />
PAP<br />
Coded<br />
Bits<br />
[last bit]<br />
Compression<br />
ratio<br />
PAP<br />
Coded<br />
Bits [1]<br />
PAP<br />
Coded<br />
Bits [0]<br />
Compression<br />
ratio<br />
Compression<br />
ratio<br />
2048<br />
Figure 62: Packet ACK Protocol: Algorithm C<br />
5.4.3 Packet ACK Protocol: Run-Length Encoding<br />
Last correctly<br />
received packet<br />
Incorrect<br />
Offset<br />
When using Run-Length encoding the status of the received packets is compressed <strong>and</strong> transmitted by groups. But<br />
differently from Group Encoding because the length of each groups is variable.<br />
Instead of transmitting the status of each group, which is transmitted is the number of packets in each group (group<br />
length).Groupboundaries are marked by the status of the received packets. If one group represents packets that have<br />
been received correctly, the next group represents packets that have been received incorrectly or not received.<br />
The number of bits that inidcates the length of each group is variable <strong>and</strong> shall be chosen so that the number of<br />
packets whose status is reported is maximized.<br />
In case of Run-Length Encoding, the PAP information is divided in the following fields:<br />
PAP Info Bits Parameter Description<br />
[0] Status of last received packet<br />
Submission page 161 UPA-OPERA<br />
ok<br />
(0) If last received packet<br />
is incorrect<br />
(1) If last received packet<br />
1
4-June-07 P1901_PRO_016_r0<br />
is correct<br />
[4:1] Length width Number of bits used to<br />
express about the length of<br />
each group. The allowed<br />
values are from 1 to 11. The<br />
value 0 means that all packets<br />
are incorrect.<br />
[54:5] (Burst Header)<br />
[118:5] (Burst Header<br />
without Data)<br />
Group lengths This field is divided in<br />
subfields of Length width<br />
bits. Each of the subfields<br />
express the number of packets<br />
belonging to each group<br />
It is possible to have a Length width not big enough to express the length of one or more groups, this is, length ><br />
2 (Length width) – 1. In such case, the length of the group shall be expressed with the maximum value, 2 (Length width) – 1.<br />
The following group shall be expressed with length 0, <strong>and</strong> the group after it with the remainder, length mod (2 (Length<br />
width) – 1).<br />
When Length width is equal to 0 it means that all packets are incorrectly received or not received.<br />
Length width Number of Group<br />
Lengths in Burst<br />
Burst Header in a<br />
Burst with Data<br />
Number of Group<br />
Lengths in Burst<br />
Burst Header in a<br />
Burst without<br />
Data<br />
Length of group of last<br />
received packet<br />
1 50 114 Group Lengths [0]<br />
2 25 57 Group Lengths [1:0]<br />
3 16 38 Group Lengths [2:0]<br />
4 12 28 Group Lengths [3:0]<br />
5 10 22 Group Lengths [4:0]<br />
6 8 19 Group Lengths [5:0]<br />
7 7 16 Group Lengths [6:0]<br />
Submission page 162 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
8 6 14 Group Lengths [7:0]<br />
9 5 12 Group Lengths [8:0]<br />
10 5 11 Group Lengths [9:0]<br />
11 4 10 Group Lengths [10:0]<br />
See the following example with Length width equal to 11:<br />
Status of<br />
last<br />
received<br />
packet<br />
NOT<br />
Status of last<br />
received<br />
packet<br />
Group<br />
Lengths<br />
[43:33]<br />
Table 16: Run-Length encoding<br />
Status of last<br />
received<br />
packet<br />
Group<br />
Lengths<br />
[32:22]<br />
5.4.4 Transmission of PAP information<br />
2048<br />
NOT<br />
Status of last<br />
received<br />
packet<br />
Group<br />
Lengths<br />
[21:11]<br />
Figure 63: Run-Length encoding example<br />
Last correctly<br />
received packet<br />
Status of last<br />
received<br />
packet<br />
Group<br />
Lengths<br />
[10:0]<br />
If a node has PAP information to be sent <strong>and</strong> gains access to the channel, the PAP information shall be sent inside<br />
the Burst Header. If this node cannot transmit data symbols because of the assigned validity or because there are no<br />
data to be transmitted, a Burst Header without data in the payload shall be sent. Because one node can be receiving<br />
from more than one node, it could send more than one Burst Header without data in the payload.<br />
5.5 LLC service specification (LLC SAP)<br />
5.5.1 LLC service primitives<br />
Following table shows LLC DATA <strong>and</strong> MNT primitives:<br />
Submission page 163 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
5.5.2 LLC-DATA.req<br />
5.5.2.1 Function<br />
Primitive Type<br />
LLC-DATA.req Request<br />
LLC-DATA.cnf Confirm<br />
LLC-DATA.ind Indication<br />
LLC-MNT-ACKMODE.req Request<br />
Table 17 LLC service primitives<br />
This primitive requests a transfer of a Convergence layer PDU from a local Convergence layer entity.<br />
5.5.2.2 Semantics of the service primitive<br />
LLC-DATA.req (CPDU):<br />
- CPDU: Convergence layer Protocol Data Unit<br />
5.5.2.3 When generated<br />
This primitive is generated by the Convergence layer entity when a CPDU is to be transferred.<br />
5.5.2.4 Effect of receipt<br />
The LLC layer entity starts the sending of the CPDU.<br />
5.5.3 LLC-DATA.cnf<br />
5.5.3.1 Function<br />
This primitive has local significance <strong>and</strong> provides the Convergence layer with status information (sending finished)<br />
of the corresponding preceeding LLC-DATA.req primitive.<br />
5.5.3.2 Semantics of the service primitive<br />
This primitive has no parameters.<br />
Submission page 164 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
5.5.3.3 When generated<br />
The primitive is passed from the LLC layer entity to the Convergence layer entity to indicate that the previous<br />
CPDU has been sent.<br />
5.5.3.4 Effect of receipt<br />
The Convergence layer entity is aware that the LLC is available to send new CPDUs, <strong>and</strong> can issue new LLC-<br />
DATA.req primitives.<br />
5.5.4 LLC-DATA.ind<br />
5.5.4.1 Function<br />
This primitive defines the transfer of a CPDU from the LLC layer entity to the Convergence layer entity.<br />
5.5.4.2 Semantics of the service primitive<br />
LLC-DATA.ind (CPDU):<br />
- CPDU: Convergence layer Protocol Data Unit<br />
5.5.4.3 When generated<br />
The primitive is passed from the LLC layer entity to the Convergence layer entity to indicate the arrival of a CPDU.<br />
5.5.4.4 Effect of receipt<br />
The Convergence layer entity processes the newly received CPDU.<br />
5.5.5 LLC-MNT-ACKMODE.req<br />
5.5.5.1 Function<br />
This primitive requests the use or not of LLC ACKs for data transmission.<br />
5.5.5.2 Semantics of the service primitive<br />
LLC-MNT-ACKMODE.req (ack_mode, port) :<br />
- ack_mode = [yes|no]<br />
- port: local transmission port to remote peer node<br />
Submission page 165 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
5.5.5.3 When generated<br />
The primitive is generated by the Management layer to enable or disable the use of LLC ACKs to transmit data to a<br />
specified port.<br />
5.5.5.4 Effect of receipt<br />
The LLC layer will configure the port accordingly by means of ACK or no ACK transmission.<br />
6 CONVERGENCE LAYER<br />
6.1 OVERVIEW<br />
This section describes the mechanisms that are used to encapsulate packets coming from external interfaces before<br />
passing them to the LLC. Some modifications are made to the Ethernet packet from the external interfaces. So the<br />
main task of the Convergence layer is Ethernet packet formatting.<br />
6.2 PACKET FORMAT<br />
The IEEE 1901 Packet Format is derived from the IEEE 802.3 frame format without the following fields:<br />
- Preamble (PRE) - 7 bytes. The PRE is an alternating pattern of ones <strong>and</strong> zeros that tells receiving stations<br />
that a frame is coming, <strong>and</strong> that provides a means to synchronize the frame-reception portions of receiving<br />
physical layers with the incoming bit stream.<br />
- Start-of-frame delimiter (SFD) - 1 byte. The SOF is an alternating pattern of ones <strong>and</strong> zeros, ending with<br />
two consecutive 1-bits indicating that the next bit is the left-most bit in the left-most byte of the destination<br />
address.<br />
Additional fields are added to support BPL broadcast of packets <strong>and</strong> OVLANs, as explained below<br />
See the following figure to underst<strong>and</strong> the differences:<br />
IEEE Std 802.3 Packet Format<br />
IEEE 1901 Packet Format<br />
PRE SFD DA SA TPID TCI<br />
Type/<br />
EXT PB OVLAN Word DA SA TPID TCI<br />
Data<br />
PLW<br />
length<br />
Submission page 166 UPA-OPERA<br />
Type/<br />
length<br />
Data
4-June-07 P1901_PRO_016_r0<br />
The Packet Format has the following fields:<br />
- EXT – 16 bits. Reserved for extensions<br />
- PB – 48 bits. Previous Bridge ID<br />
Figure 64 Packet format<br />
- OVLAN – 32 bits with the following information:<br />
o PCF – 1 bit. Pre-classified Packet<br />
o PCP – 3 bit. Pre-classified Packet Priority<br />
o OVLANV - 1 bit.Valid OVLAN<br />
o OVLANID - 12 bits. OVLAN Identifier<br />
- DA – 48 bits. Destination <strong>MAC</strong> Address. The DA field identifies which station(s) should receive the<br />
frame.<br />
- SA – 48 bits. Source <strong>MAC</strong> Address. The SA identifies the sending station.<br />
- TPID – 16 bits. Optional field. Defined value of 8100 in hex. When a frame has the EtherType equal to<br />
8100, this frame carries the tag IEEE 802.1Q/802.1p, otherwise it will be filled with 0x0000.<br />
- TCI – 16 bits. Optional field. VLAN Tag <strong>Control</strong> Information field including user priority, Canonical<br />
format indicator <strong>and</strong> VLAN ID. This field is always present, even if the TPID is not 0x8100.<br />
- Len – 16 bits. IEEE Std 802.3-style Length/Type Field<br />
- Data – From 42 to 1500 bytes. The Data Payload of this packet.<br />
- PLW – From 0 to 3 bytes. Because the packet has to be 32 bit aligned, there are from 0 to 3 bytes of no<br />
valid data at the end of this packet. This field is called Padding Last Word.<br />
The incoming IEEE std 802.3 packet may have TCI field or not, but the TCI field is always present in the IEEE<br />
1901 packet format.<br />
6.2.1 Maximum <strong>and</strong> Minimum Packet length<br />
The maximum length of one packet is equal to 1536 octets.<br />
The minimum length of one packet is equal to 76 octets.<br />
Submission page 167 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
6.2.2 OVLAN Fields<br />
OVLAN fields are intended for OVLAN The OVLAN is a sort of Virtual LAN (VLAN), which functions<br />
independtly of IEEE 802.1Q. Jointly with IEEE 802.1Q functionality it provides a two-layer Virtual LAN<br />
functionality between BPL nodes. OVLAN functionality is described in Clause 7.4).<br />
The OVLAN fields are the following:<br />
- OVLANV - 1 bit. Valid OVLAN<br />
- OVLANID - 12 bits. OVLAN Identifier<br />
The OVLAN fields have the following meaning:<br />
- When OVLANV is equal to 0, the OVLANID is not used <strong>and</strong> the packet is not carrying OVLAN<br />
information.<br />
- When OVLANV is equal to 1, the OVLANID is equal to the tag, <strong>and</strong> the tag is used with the same sense as<br />
in IEEE 802.1Q. The only difference is the following:<br />
o The tag equal to 0 is a possible tag<br />
o The tag equal to 0xFFF is a tag that must be accepted by all the filters.<br />
As in IEEE 802.1Q where the TCI has priority information, the OVLAN word has two fields to know the priority of<br />
this packet:<br />
- PCF: Pre-classified Packet<br />
- PCP: Pre-classified Packet Priority<br />
If PCF is set to 1, the priority of this packet is equal to PCP value. The 802.1p or any other rule is not applied to<br />
decide the priority. Priority assignment is described in clause 8.<br />
In the case of nodes that do not perform OVLAN filtering, the OVLAN field will not be modified if the packet was<br />
received through a BPL interface. If the packet was received through other interfaces, the node will add the<br />
OVLAN fields with OVLANV = 1b0 <strong>and</strong> PCF = 1b0.<br />
6.2.3 BPL service class<br />
The OVLAN word has two fields that store the poweline service class of this packet. BPL service class is used in<br />
parallel to IEEE 802.1Q priority. The fields are:<br />
- PCF: Pre-classified Packet<br />
- PCP: Pre-classified Packet Service class<br />
Submission page 168 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
If PCF is set to 1, this indicates that PCP contains a valid BPL service class.<br />
For packets received through a non-BPL interface, PCF = 0. For packets received through a BPL interface PCF<br />
must be left unchanged.<br />
BPL service class can be calculated then by the QoS function (see 8.2).<br />
6.2.4 PB Field<br />
This field are used to avoid loops with broadcast packets.<br />
Broadcast packets can be sent in two ways through the BPL network:<br />
- Using the broadcast port. The broadcast packet is sent using the broadcast port <strong>and</strong> all nodes that have<br />
negotiated ports with the sender will receive it.<br />
- Using unicast ports. The broadcast packet is sent once per each negotiated port, except the port where it was<br />
received in the case it was a BPL port.<br />
In the case when a broadcast packet is sent using the broadcast port, these fields are used to avoid loops. In the other<br />
case, they are not necessary. In any case, they shall always be present in all packets.<br />
The meaning of the field (defined in 6.2) is the following:<br />
- PB: Previous Bridge ID. It shall contain the <strong>MAC</strong> address of the previous node that has transmitted this<br />
packet.<br />
When a packet enters the BPL network Previous Bridge ID shall be set to 0.<br />
In any retransmission, the Previous Bridge ID shall be filled with the ID of the last unit that transmitted the packet.<br />
When receiving a packet it shall be discarded when its Previous Bridge ID is equal to the <strong>MAC</strong> address of the node<br />
that has received the packet, because this indicates that the node has already received the packet before..<br />
6.2.5 Octet alignment<br />
The bytes from IEEE Std 802.3 are stored in 32 bits words in the following way:<br />
Byte<br />
3<br />
Byte<br />
2<br />
Submission page 169 UPA-OPERA<br />
Byte<br />
1<br />
Byte<br />
0<br />
Figure 65 Byte order
4-June-07 P1901_PRO_016_r0<br />
From IEEE 802.3 interface, the bytes are received in the following order: byte0, byte1, byte2 <strong>and</strong> byte3.<br />
And from this 32 bits word, the bytes are transmitted into the LLC interface in the following order: byte3, byte2,<br />
byte1, byte0. The packets are transmitted to the LLC in the way shown in Figure 66, starting from the top, since the<br />
LLC works with bytes.<br />
If we define N as the number of bytes in Data Payload plus the number of bytes of the Length/Type Field, then we<br />
can write N = 4*m + p; with m an integer value <strong>and</strong> p equal to 0, 1, 2 or 3. The number of bytes in PLW is equal to<br />
0 if p is equal to 0 or 4-p in the other cases, because the packet is 32 bit aligned.<br />
Submission page 170 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
bits<br />
7 6<br />
Reserved<br />
Reserved<br />
5<br />
4<br />
Data (from byte [6] to [4*m – 3])<br />
PLW (0 bytes if p is equal to 0 OR (4-p) bytes if p is different from 0)<br />
Last Word Data (from byte [4*m-2] to [4*m+p-3])<br />
FCS[3]<br />
FCS[2]<br />
FCS[1]<br />
FCS[0]<br />
Submission page 171 UPA-OPERA<br />
3<br />
PB[1]<br />
PB[0]<br />
Extensions[1]<br />
Extensions[0]<br />
PB[5]<br />
PB[4]<br />
PB[3]<br />
PB[2]<br />
OVLANID[7:0]<br />
OVLANV OVLANID[11:8]<br />
PCP PCF<br />
Reserved<br />
DA[3]<br />
DA[2]<br />
DA[1]<br />
DA[0]<br />
SA[1]<br />
SA[0]<br />
DA[5]<br />
DA[4]<br />
SA[5]<br />
SA[4]<br />
SA[3]<br />
SA[2]<br />
TCI[7:0]<br />
TCI[15:8]<br />
TPID[7:0]<br />
TPID[15:8]<br />
Data[1]<br />
Data[0]<br />
Lenght[0]<br />
Length[1]<br />
Data[5]<br />
Data[4]<br />
Data[3]<br />
Data[2]<br />
Figure 66 Packet byte order to the LLC<br />
6.3 CONVERGENCE LAYER SERVICE PRIMITIVES<br />
The bridging block communicates with the convergence layer through 3 service primitives Eth.req, Eth.cnf <strong>and</strong><br />
Eth.ind:<br />
2<br />
1<br />
0<br />
Octet<br />
1<br />
2<br />
3<br />
4<br />
5<br />
6<br />
7<br />
8<br />
9<br />
10<br />
11<br />
12<br />
13<br />
14<br />
15<br />
16<br />
17<br />
18<br />
19<br />
20<br />
21<br />
22<br />
23<br />
24<br />
25<br />
26<br />
27<br />
28<br />
29<br />
30<br />
31<br />
32<br />
33<br />
34<br />
35<br />
36<br />
37<br />
38<br />
39<br />
40<br />
41<br />
42<br />
43<br />
44
4-June-07 P1901_PRO_016_r0<br />
Notes:<br />
• Eth.req (802.3/EthernetII frame, BPL local ports list, PB, OVLAN word): This primitive requests the<br />
transfer of an Ethernet frame from the local bridging block to a single peer bridging block or multiple peer<br />
bridging blocks in the case of multi-port transfer requests (see 6.3.1).<br />
• Eth.ind (802.3/EthernetII frame, BPL local port, LB, OVLAN word, Session ID): This primitive defines the<br />
transfer of an Ethernet frame from the convergence layer to the bridging block.<br />
• Eth.cnf: This primitive is used by the convergence layer to notify the bridging block of the results of the<br />
Eth.req primitive.<br />
• VLAN tag may be included in the 802.3/EthernetII frame<br />
• The OVLAN word includes PCF, PCP, OVLANV <strong>and</strong> OVLANID<br />
6.3.1 Multi-port transfer requests<br />
Multi-port transfer requests correspond to Eth.req service primitives including several BPL local ports as argument.<br />
Such requests are inherent to bridging in TDRs <strong>and</strong> HEs which manage several BPL ports. The multi-port requests<br />
are solicited by st<strong>and</strong>ard transparent bridging actions such as:<br />
1. Broadcast transmission: The IEEE 802.3 frame includes a Broadcast Ethernet address in its Destination<br />
Address field. The multi-port request concerns all the BPL ports managed by the bridging function except<br />
the one from which the Ethernet frame was received (if it was eventually received from a BPL port).<br />
2. Multicast transmission: The IEEE 802.3 frame includes a Multicast Ethernet address in its Destination<br />
Address field. The multi-port request might concern a subset of the BPL ports managed by the bridging<br />
function or a single native multicast BPL port associated.<br />
3. Bridge flooding: The bridging block could not find any association of a unicast Ethernet Destination<br />
addresses with a specific bridge port, the request is then flooded to all the bridge ports. The multi-port<br />
request concerns all the BPL ports managed by the bridging function.<br />
6.4 BROADCAST/MULTICAST HANDLER FUNCTIONAL REQUIREMENTS<br />
The convergence layer shall include a broadcast/multicast h<strong>and</strong>ler that shall perform the following functions:<br />
1. H<strong>and</strong>ling transfer of multicast management messages: Management messages can be unicast or multicast as<br />
described in section 7.4. Multicast management messages can be received from the bridging fundtion through<br />
primitives which are either single port requests or multi-port requests. Any multicast management message<br />
received through these requests shall be transferred over the broadcast port using HURTO modulation.<br />
2. Management of multi-port transfer requests which do not carry multicast management messages: upon<br />
reception of such multi-port transfer request from the convergence layer, the block shall compute the best<br />
method for h<strong>and</strong>ling the transfer. If the multi-port request concerns all the local ports of the Port Solver Table or<br />
if the request includes a broadcast/multicast Ethernet Destination Address, depending on the bit-loading tables<br />
associated to each local port, the block might consider transferring the Ethernet frame over the broadcast local<br />
Submission page 172 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
port using HURTO modulation. In the other cases, the multi-port request will result in several consecutive LLC<br />
service requests related to each unicast local port, or in the use of a native multicast local port.<br />
3. Broadcasts loop back avoidance: on the reception path, upon reception of a packet over the broadcast local port<br />
(127), the module shall discard any packet which is detected as previously transmitted (that is, the <strong>MAC</strong> address<br />
contained in the PB field of the packet is equal to the <strong>MAC</strong> address of the node).<br />
4. On the reception path, upon reception of a packet over the broadcast local port (127), the local port passed<br />
within the Eth.ind primitive shall be the one assigned to the remote node from which the request was received.<br />
7 BRIDGING FUNCTION<br />
7.1 General<br />
The bridging function interconnects bridge ports. There are two types of bridge ports: BPL ports <strong>and</strong> non-BPL ports<br />
<strong>and</strong> the management port. BPL ports are the bridge ports that represent a remote PL unit <strong>and</strong> are directly mapped<br />
onto the completed entries of the Port Solver Table. Non-BPL ports are any other external ports of the unit (e.g.<br />
Ethernet, USB, WIFI,…).<br />
The bridging function is based in st<strong>and</strong>ards IEEE 802.1D <strong>and</strong> IEEE 802.1Q as described below.<br />
From a bridging st<strong>and</strong>point, the convergence layer is seen as a set of bridge ports called “BPL ports” which are both<br />
transmission <strong>and</strong> reception unicast <strong>and</strong> native multicast ports. The bridging block of a node h<strong>and</strong>les as many BPL<br />
unicast ports as there completed entries in the Port Solver Table of this node, in addition to the native multicast<br />
ports that has a valid value in such Port Solver Table. The identifier of a BPL port corresponds to the value of the<br />
local port attached to a remote node, that can be a native multicast or an unicast port. The status (open/close) <strong>and</strong> the<br />
identifier of the BPL ports are mapped onto the status <strong>and</strong> identifiers of the local ports defined in the Port Solver<br />
Table.<br />
There is also a BPL management entity that can access all the ports in the same conditions as the higher layer<br />
entities as described in IEEE 802.1D.<br />
*Note: The port solver table includes complete entries <strong>and</strong> incomplete entries. Complete entries correspond to local<br />
port which are associated to solved remote port <strong>and</strong> <strong>MAC</strong> addresses. Incomplete entries correspond to local ports<br />
which associated unicast remote port are still not solved via the Port Solver Protocol.A complete entry may have<br />
an additional native multicast remote port associated.<br />
7.2 IEEE 802.1D conformance<br />
The bridging function shall conform to:<br />
a) IEEE Std 802.1D, with Basic Filtering Services support requirements<br />
Submission page 173 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
b) IEEE Std 802.1D Management (clause 14 of IEEE 802.1D-2004) requirements<br />
c) IEEE Std 802.1D Remote Management (clause 5.2 of IEEE 802.1D-2004) requirements<br />
as modified by the provisions of this st<strong>and</strong>ard<br />
The permanent filtering database, as defined in IEEE 802.1D-2004 clause 7.9 shall have a minimum size of 8<br />
entries.<br />
The dynamic filtering database, as defined in IEEE 802.1D-2004 clause 7.9 shall have a minimum size of 64<br />
entries.<br />
7.3 IEEE 802.1Q conformance<br />
The bridging function shall support VLAN according to IEEE Std 802.1Q requirements for VLAN-aware bridges,<br />
as modified by the provisions of this st<strong>and</strong>ard.<br />
The bridging function shall support a minimum of 32 VLANs.<br />
7.4 OVLAN Function<br />
7.4.1 General<br />
The OVLAN functionality is based on IEEE 802.1Q Virtual LAN (VLAN), but does not substitute the IEEE<br />
802.1Q functionality. Instead, if enabled, it shall work independtly of IEEE 802.1Q functionality.<br />
OVLAN function is is aimed to:<br />
• Avoid packets from one customer leaking into a neighbor customer (for security reasons).<br />
• Avoid packets from one BPL sub-network (for example, an LV cell) leaking into another BPL sub-network<br />
(for security reasons <strong>and</strong> in order to avoid the problem of bridge tables filling up with unnecessary <strong>MAC</strong><br />
addresses).<br />
In such cases, as IEEE 802.1Q VIDs are limited to less than 4096, a large network can rapidly run out of VLANs<br />
numbers if they are used for customer isolation, OVLAN should be used, leaving IEEE 802.1Q for its traditional<br />
VLAN purposes.<br />
The following processes are defined for OVLAN function<br />
Submission page 174 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
a) Frame admittance <strong>and</strong> OVLAN assignment<br />
b) OVLAN Ingress filtering<br />
c) OVLAN Egress filtering<br />
Each PL port has a list of OVLAN IDs which represent the OVLANS to which the port belongs (OVLAN_list)<br />
7.4.2 Frame admittance <strong>and</strong> OVLAN assignment<br />
7.4.2.1 Non PL ports<br />
The OVLAN parameters of a non PL port are:<br />
- OVLAN enabled / disabled<br />
- POVID (Port OVLAN identifier)<br />
If one port is OVLAN enabled, all incoming frames are assigned an OVLAN ID which is exactly the POVID of<br />
such port.<br />
7.4.2.2 PL PORTS<br />
The OVLAN parameters of a pl port are:<br />
- OVLAN enabled / disabled<br />
- Tagged only<br />
- POVID (Port OVLAN identifier)<br />
All packets coming from a port are discarded if <strong>and</strong> only if:<br />
a) The OVLAN is enabled for such port , tagged only parameter is set <strong>and</strong> the frame does not carry a valid OVLAN<br />
ID.<br />
The OVLAN ID of a frame is assigned the value of the POVID of the port if <strong>and</strong> only if:<br />
b) The OVLAN is enabled, tagged only parameter is not set <strong>and</strong> the frame does not carry a valid OVLAN ID.<br />
In the rest of cases the frames are admitted unchanged.<br />
Submission page 175 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
7.4.3 OVLAN Ingress filtering<br />
If any frame coming into the bridge has a valid OVLAN identifier, OVLAN is enabled <strong>and</strong> its OVLAN identifier is<br />
not included in the OVLAN list for such port, the frame is discarded, unless the frame has FFF as identifier. It is<br />
passed otherwise.<br />
7.4.4 OVLAN Egress filtering<br />
If any frame going out of the bridge has a valid OVLAN identifier <strong>and</strong> this OVLAN identifier is not included the<br />
OVLAN list for such port, the frame is discarded, unless the frame has FFF as identifier. It is passed otherwise.<br />
7.4.5 OVLAN management<br />
If a unit has OVLAN functionality, OVLAN parameters per port (OVLAN enabled / disabled, tagged only, POVID,<br />
<strong>and</strong> OVLAN_list) shall be modifiable by a management process.<br />
The management process shall be executable remotely.<br />
7.5 Sending broadcast/multicast Ethernet frames<br />
When sending a broadcast/multicast Ethernet frame or when flooding the ports of the bridge, two main ways to<br />
transmit multicast IEEE 802.3 frame con be configured.<br />
In the first option the bridging function shall provide the list of BPL ports related to this transfer as part of the<br />
Eth.req service primitive<br />
In the second option, the bridging function shall provide a native multicast BPL port related to this transfer as part<br />
of the Eth.req service primitive.<br />
The bridging function shall also support management of associations of multicast groups to native ports.<br />
The association of a multicast group to a native multicast port is done in two stages:<br />
a) The remote nodes belonging to a multicast group are associated to the native multicast port<br />
For this, the unit shall send Port Solver Protocol Multicast Port packets to the nodes selected to become associated<br />
to the native multicast port. The aim of such packets is to add in the Port Solver Table of each destination node that<br />
wants to join the multicast flow the selected Local native multicast Port as Second Remote Port (RP2).<br />
Submission page 176 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
b) In the forwarding tables, the list of individual unicast ports associated to the multicast group is substituted by the<br />
native multicast port.<br />
If a multicast group is associated to a native multicast port, any incorporation of a new node to such multicast group<br />
shall result in an association of such node to the native multicast port, as described in (a).<br />
Conversely, if a node is removed from a multicast group <strong>and</strong> such multicast group is associated to a native multicast<br />
port, the node shall be removed from the associated native multicast port. This shall be done by sending a Port<br />
Solver Protocol Multicast Port carrying as local native multicast port the so called invalid port. (0xFF).<br />
These actions (adding or removing a node from a native multicast port, <strong>and</strong> incorporation of the native multicast<br />
ports to the forwarding tables) shall be supported as a result of a management action <strong>and</strong> may, optionally, be done<br />
as a consequence of operation of group management protocols, such as IGMP or GMRP.<br />
7.6 PB field<br />
7.6.1 Bridging between BPL ports<br />
When bridging between BPL ports (HE or TDR feature), the bridging function shall return within the Eth.req a PB<br />
argument equal to the ID from which the packet has been received.<br />
7.6.2 Bridging from a non-BPL port to a BPL port<br />
When bridging from a non BPL-port to a BPL port, the PB argument of the Eth.req shall be set to 0.<br />
7.7 BPL service class transmission<br />
When bridging between BPL ports , if PCF=1 within the OVLAN argument of the received Eth.ind, the PCF <strong>and</strong><br />
PCP values (subfield of the OVLAN word argument) included in the subsequent Eth.req shall be kept unchanged.<br />
7.8 Filtering multicast management messages from a BPL port<br />
BPL Management messages are IEEE 802.2 SNAP encapsulated data units carried over an Ethernet frame which<br />
can be either unicast or multicast. Multicast management messages make use of one of the two following multicast<br />
addresses (referred as management multicast addresses): the STP multicast address 0x0180C2000000 (primarily<br />
used by the STP protocol but also used for some BPL management messages) or the IEEE P1901 specific multicast<br />
address: 0x01139D000000. Any Ethernet frame including a management multicast address shall be filtered by the<br />
bridging function <strong>and</strong> not retransmitted to any other port. Upon reception of management messages destined to the<br />
above two mentioned multicast addresses, the bridging function shall provide these frames to the management port.<br />
Submission page 177 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
7.9 Filtering multicast management messages from the management port<br />
BPL Multicast management messages from the management port shall only be flooded to the BPL ports (non-BPL<br />
ports excluded).<br />
8 QOS SERVICES<br />
8.1 INTRODUCTION<br />
This section describes mechanisms for applying specific guarantees in terms of b<strong>and</strong>width, latency <strong>and</strong> reliability to<br />
some flows. It is also possible to define a policy upon congestion. Any flow requiring such guarantees must initiate<br />
a connection through a Connection Admission <strong>Control</strong> procedure using protocol described in 0.<br />
The mechanisms described here below are designed for flows circulating from the HE to a CPE or vice versa. These<br />
mechanisms have not been designed to support QoS for flows between CPEs,<br />
The QOS services described here below rely on the configuration of several components:<br />
1. Service classes. (Must be declared in all the masters of a BPL cell).<br />
2. Classifier module: this module maps flows onto service classes (preconfigured in all the nodes).<br />
3. Congestion management (declared in all the masters).<br />
4. Traffic specifications, published through the CAC procedure. Pre-determined traffic specifications must be<br />
declared in CPEs.<br />
Note: A flow is a unidirectional data stream exchanged between two BPL units <strong>and</strong> carried over the same service<br />
class.<br />
BPL network uses a shared medium <strong>and</strong> provides differentiated control of the medium to h<strong>and</strong>le data transfers with<br />
QoS requirements. QoS services carry out end-to-end traffic delivery providing QoS transport on a per-user basis.<br />
The BPL cell master node will be in charge of schedule <strong>and</strong> guarantee the QoS of the BPL cell, <strong>and</strong> must assign<br />
resources to cell nodes based on the configured b<strong>and</strong>width limit <strong>and</strong> the resources reservations requests made. This<br />
node shall be named QC (quality controller).<br />
Also, there are others figures in the BPL cell which are the Flow Master Nodes (FMNs). A FMN is defined as the<br />
BPL node in charge of guarantee QoS requirement for a registered flow. This node will be the QC <strong>and</strong> also can be<br />
the BPL repeaters which will distribute the resouces given by the QC to the nodes connected to it.<br />
Submission page 178 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
The FMN must receive the resource reservations requests using the CAC protocol (See section 0) <strong>and</strong> must decide if<br />
it has enough resources to assign to the incoming request or if it has to request more resources to the BPL master<br />
node.<br />
With this mechanism, we will have a complementary tool to limit the b<strong>and</strong>width. This information will be<br />
interesting to known if a new traffic of a service class can be started <strong>and</strong> the requirements for that traffic <strong>and</strong> service<br />
class can be assured.<br />
8.2 SERVICE CLASS DEFINITION<br />
Up to eight service classes can be defined within a BPL cell. Services classes are globally defined over a BPL<br />
subcell. Four service parameters are necessary to fully describe a service class: priority, subcell_access_time,<br />
resource reservation type <strong>and</strong> service reliability.<br />
8.2.1 Priority<br />
Service classes are directly mapped onto priorities. A priority uniquely identifies a service class. That is why all the<br />
other service parameters are configured <strong>and</strong> mapped from this priority parameter. Priorities shall have values from<br />
0 to 7, 0 being the lowest priority. If packets have to be dropped at the transmitter because of lack of resources, then<br />
the lower priority packets shall be dropped before the higher priority packets. When there are data of different<br />
priorities addressed to the same destination, higher priority data shall be transmitted earlier than lower priority data.<br />
8.2.1.1 Configuration<br />
Priority parameter is determined by the Classifier module operating at the bridging block level. The classifier<br />
analyses all the frames received from a bridge port (BPL port, non-BPL port, management port) <strong>and</strong> assigns a<br />
priority to each Ethernet frame transmitted to the convergence layer via the Eth.req primitive (see 6.3). The<br />
Classifier operates according to some predetermined <strong>and</strong>/or configurable rules (see 11.4). Any frame received from<br />
the management port shall be mapped to priority 7 (that is: service class 7).<br />
Note: For each Eth.req primitives delivered by the bridging block, a priority is submitted as part of the OVLAN<br />
word argument (PCP bits). The PCF bit of this OVLAN word might be set to 1 meaning that the priority is to be<br />
seamlessly bridged through the intermediate nodes of the BPL cell. This priority information is summarized within<br />
the Priority field of any Burst Header <strong>and</strong> the Frame Priority field of every upstream data token.<br />
8.2.2 Max Subcell <strong>Access</strong> Time<br />
The Max_Subcell_<strong>Access</strong>_Time corresponds to the max duration for a flow to access the channel on the subcell<br />
level. It is a latency requirement for the scheduler to be configured within any master of a BPL cell.<br />
Four Max_Subcell_<strong>Access</strong>_Time are defined at the master level. The minimum value of the<br />
Max_Subcell_<strong>Access</strong>_Time is used as the reference step from which the three other Max_Subcell_<strong>Access</strong>_Time are<br />
derived by multiplying by 2, 4 or 8 this reference step.<br />
Submission page 179 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
8.2.2.1 Configuration<br />
The reference step shall be configured within any master of a BPL cell. This parameter is configured using the<br />
QOS_LATENCY_STEP parameter (min 20ms, max 400ms).<br />
Mapping a Max_Subcell_<strong>Access</strong>_Time to a priority: Such a mapping shall be declared within each master by using<br />
the QOS_LATENCY.prio+1 parameter.<br />
8.2.3 Resource reservation type<br />
This parameter is related to the type of claimed guarantees provided in terms of node resources <strong>and</strong> time resources.<br />
It can take three values:<br />
• Type Best Effort: No guarantees on the node <strong>and</strong> time resources. This type will be mapped with the nonguaranteed<br />
service classes. Resources are granted on a Best Effort basis.<br />
• Type ABR (Available Bit-Rate): Requests ask for node <strong>and</strong> time resources for which a minimum b<strong>and</strong>width<br />
can be guaranteed with a peak over the minimum. The peak can be limited by the network capability or the<br />
node limit b<strong>and</strong>width.<br />
• Type VBR (Variable Bit-Rate):Requests ask for node <strong>and</strong> time resources for which an average b<strong>and</strong>width<br />
can be guaranteed with a maximum variation around this average.<br />
• Type CBR (Constant Bit-Rate):Requests ask for individual guarantees in terms of node <strong>and</strong> time resources.<br />
The granted node <strong>and</strong> time resources are not shared. The claimed b<strong>and</strong>width is guaranteed.<br />
Note: Any class which is associated to an ABR, VBR or CBR type corresponds to a connected service requiring<br />
initiation of a Connection Admission <strong>Control</strong> Procedure. By extension, CBR, VBR or ABR flows are called<br />
connected flows unlike Best Effort flows which are non connected flows.<br />
A maximum upstream <strong>and</strong> downstream b<strong>and</strong>width limitation applies to all the Best Effort <strong>and</strong> ABR flows of the<br />
same node (see 12).<br />
CBR <strong>and</strong> VBR traffic shall be reserved for operator services such as VoIP <strong>and</strong> video streaming services (IPTV,<br />
VOD, …), <strong>and</strong> shall be out of the b<strong>and</strong>width limitation. To accept or deny these services, the FMN must assure that<br />
network resources will be available <strong>and</strong> mechanisms for AAA services shall be used in order to authenticate the<br />
service can be used by the node.<br />
8.2.3.1 Configuration<br />
Mapping a Resource Reservation Type to a priority: Such a mapping shall be declared within each master by using<br />
the QOS_PRIORSV.prio+1 parameter.<br />
Submission page 180 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
8.2.4 Service reliability<br />
This parameter defines if the ACK mode is enabled (see section 5.4) within the service class.<br />
8.2.4.1 Configuration<br />
Mapping Service Reliability to a priority: Such a mapping shall be declared within each master by using the<br />
QOS_PRIOACK.prio+1 parameter.<br />
8.2.5 Example of a service class definition<br />
The service class definition shall be the same for all nodes in the BPL cell, <strong>and</strong> must determine univocally the the<br />
relationship between priority, maximum subcell access time, resource reservation <strong>and</strong> service reliability<br />
characteristics.<br />
This service class definition must be used by QoS to determine the priorization between flows <strong>and</strong> resources<br />
reservation in the network, <strong>and</strong> will provide criteria to allow or deny new flows or to drop existent flows to allow<br />
new flows which higher service class.<br />
Table 18 shows an example of possible relationship between service classes, priorities, Max_Subcell_<strong>Access</strong>_Time,<br />
Service Reliability <strong>and</strong> Resource Reservation Type.<br />
Submission page 181 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Service<br />
Class<br />
Resource<br />
reservation<br />
Priority MaxSubcell<br />
<strong>Access</strong><br />
Time<br />
7 Best Effort 7 240 No<br />
6 CBR 6 30 No<br />
5 VBR 5 60 Yes<br />
4 VBR 4 120 Yes<br />
3 VBR 3 120 No<br />
2 ABR 2 120 Yes<br />
1 Best Effort 1 240 No<br />
0 Best Effort 0 240 No<br />
Table 18 Definition of Service Classes: example<br />
Service<br />
Reliability<br />
(ACK<br />
enabled)<br />
The definition of service classes as described in table 1 could be used to implement QoS services for applications as<br />
described in Table 19.<br />
Submission page 182 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Service Class Application<br />
Examples<br />
7 Management<br />
messages<br />
6 VoIP<br />
5 Video, Games<br />
4 Data Highprio<br />
3 Data Highprio<br />
2 Data Highprio<br />
1 Data Lowprio<br />
0 Data Lowprio<br />
Table 19 Mapping applications to service classes: example<br />
8.2.6 Provisioning Service Class Definitions to slaves<br />
As detailed in 0, nodes that wish to request a resource reservation through the Connection Admission <strong>Control</strong><br />
procedure must make a reference to the requested service class. As a matter of fact, it is necessary for the slaves to<br />
have an idea of the service class definitions. The description of the available service classes will be obtained<br />
through the Autoconfiguration process.<br />
8.3 CONGESTION MANAGEMENT<br />
The mission of CM is to manage the accepted connections in congested networks (due to a sudden drop in the<br />
channel quality, for example). There are two possible policies that can be configured in the system:<br />
• Fair Congestion Management Policy (FCMP): all traffic flows are treated equally. Therefore, if the<br />
traffic scheduler cannot meet the b<strong>and</strong>width <strong>and</strong> latency requirements from users, it will decrease the<br />
performance of all active flows equally until new b<strong>and</strong>width <strong>and</strong> latency definitions can be supported.<br />
Submission page 183 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
• Priority Congestion Management Policy (PCMP): lower priority traffic performance is decreased in<br />
order to guarantee higher priority traffic SLA. Therefore, access to the channel is denied to lower service<br />
types first, until SLA of higher service types can be maintained.<br />
• “Quality Service” Congestion Management Policy (QSCMP): The congestion manager will act like as<br />
Priority Congestion Management but uses the service class <strong>and</strong> the quality session parameters to perform<br />
the scheduling <strong>and</strong> the acceptance criteria for new sessions. The sessions with higher quality session values<br />
will have more probabilities to be scheduled accomplishing its requirements when network is congested.<br />
Quality Session parameter can be also a mixture of priority <strong>and</strong> age, or an arbitrary parameter defined by<br />
the network operator.<br />
8.3.1 Configuration<br />
The Congestion Management can be configured using the Auto-configuration protocol. In this section, we<br />
enumerate the auto-configuration parameters that modify the behavior of the Congestion Management. For more<br />
information, see 11.<br />
QOS_BW_POLICY = [0|1|2] configures the CM in which the QoS manages the network in the event of congestion<br />
(0 configures the CM in FCMP mode; 1 configures the CM in PCMP mode; 2 configures the CM in QSCMP<br />
mode).<br />
8.4 CONNECTION ADMISSION CONTROL<br />
Initiation of a Connection Admission <strong>Control</strong> (CAC) procedure is required for any connected flow. The mission of<br />
the Connection Admission <strong>Control</strong> is to ensure that the BPL network can deliver the agreed services <strong>and</strong> guarantees<br />
to new flows while maintaining the requested performance of already accepted flows.<br />
The Connection Admission <strong>Control</strong> functionality is embedded inall the network. The CAC protocol might be used<br />
in the following two scenarios:<br />
• Before the transmission of a connected flow, the CAC shall be used to reserve resources on the nodes in the<br />
system that collaborates in the communication of the new flow (from the node initiating the flow to the<br />
nodethat shall guarantee the flow). The CAC requests made to commit resources for a given Service Class<br />
may be new or updates from previous reservations.<br />
• At the end of the transmission of a connected flow, resources may be released. Release of resources may be<br />
done explicitly by transmitting a CAC Stop message indicating traffic flow is not longer needed, or may be<br />
done when a timer, MAX_CAC_DRP_TO expires since the last time a Data Token with the Session ID of<br />
the traffic was received by the node.<br />
In the CAC protocol, the exchanged parameters to verify whether or not the BPL network can guarantee the<br />
required service shall include the required b<strong>and</strong>width, <strong>and</strong> the maximum latency dem<strong>and</strong>ed by the new node.<br />
Submission page 184 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
8.5 Traffic Shaping<br />
QoS apply traffic shaping in two different ways. Each one is applied based on the service class of traffic:<br />
• Limit b<strong>and</strong>width: Is applied for best-effort <strong>and</strong> ABR service classes. Is based on the credit assignation for<br />
this service classes. This credit is assigned per-user <strong>and</strong> is renewed periodically. If the credit is not used<br />
during the period time, it’s lost <strong>and</strong> can not be used in the next period.<br />
• Guaranteed b<strong>and</strong>width: Is applied for VBR <strong>and</strong> CBR service classes. Traffic must be allowed prior to<br />
transmit <strong>and</strong> a reservation is made for this type of traffic using the CAC protocol. Channel time is assigned<br />
based on the resources reservation to meet b<strong>and</strong>width <strong>and</strong> latency requirements. Due to the explicit<br />
reservation of resources, nodes shall have mechanisms to allocate buffer space to support the incoming<br />
traffic.<br />
8.5.1 QOS Requirements<br />
To provide QoS requirements is needed support from <strong>MAC</strong> layer in order to identify the network usage by each<br />
node <strong>and</strong> the traffic service classes in the network. This support must be provided as <strong>MAC</strong> primitives <strong>and</strong> will be:<br />
• Transmitted priorities by a CPE. Must be a set of bits <strong>and</strong> each bit must be mapped to a priority<br />
• Transmitted priorities by BPL subcell/cell masters.<br />
• Single transmission Channel time: Must be the transmission time used for individual transmissions for each<br />
node in the BPL cell.<br />
• Transmitted data: Data transmitted since last time the token was received, so that b<strong>and</strong>width limitation<br />
algorithm can be reconfigured dynamically.<br />
• Unused channel time: The percentage of network resources assigned to this node available in the network.<br />
Other QoS facilities should be implemented in order to guarantee QoS requirements:<br />
• BPL node shall be able to define service classes with or without <strong>MAC</strong> Level acknowledgment capabilities.<br />
• BPL node shall be able to assign resources in a per-user <strong>and</strong> per-service basis to guarantee constant,<br />
variable or peak rate traffic requirements.<br />
• BPL node shall be able to transmit to a subset of possible receivers nodes in order to guarantee unique<br />
channel usage per-user.<br />
• BPL node shall configure MTU per-user in order to guarantee minimum transmission time per-user.<br />
• BPL node should be able to avoid transmission of lower priorities to guarantee preferential treatment of<br />
higher priorities in a per-flow basis.<br />
Submission page 185 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Furthermore, there are <strong>MAC</strong> primitives to give the QoS scheduler an idea of the BPL topology. These primitives<br />
collect information in the Upstream direction. These primitives allows to compute correctly the Validity field. These<br />
parameters are:<br />
• Maximum Number of Hops in the network<br />
• Number of Downstream Nodes<br />
9 LAYER MANAGEMENT<br />
9.1 CONTROL PROTOCOLS<br />
9.1.1 CCP (Communication <strong>Control</strong> Protocol) Description<br />
The exchange of management messages between IEEE P1901 nodes needs a special <strong>and</strong> homogeneous structure in<br />
order to simplify implementation <strong>and</strong> clarify information exchanges between nodes. Such information will have as<br />
source <strong>and</strong> destination IEEE P1901 nodes, <strong>and</strong> will be used for internal management.<br />
The structure of the packet that will be exchanged by two BPL nodes will follow the scheme presented in Figure 67:<br />
TPID<br />
DSAP<br />
SSAP<br />
CTL<br />
OUI0<br />
OUI1<br />
OUI2<br />
Type0<br />
Type1<br />
Length<br />
Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />
TCI<br />
Figure 67 Management packet<br />
The management information will be encapsulated using SNAP as depicted in Figure 67 into a regular Ethernet<br />
Frame. Using SNAP with an assigned OUI, it is possible to create specific protocols for IEEE P1901 nodes.<br />
Encapsulated fields will be described in the following table:<br />
Field Length Description<br />
Submission page 186 UPA-OPERA<br />
Data<br />
DSAP 1 byte Destination Service <strong>Access</strong> Point
4-June-07 P1901_PRO_016_r0<br />
SSAP 1 byte Source Service <strong>Access</strong> Point<br />
CTL 1 byte <strong>Control</strong> field<br />
OUI0 1 byte Organizationally Unique Identifier Byte 0<br />
OUI1 1 byte Organizationally Unique Identifier Byte 1<br />
OUI2 1 byte Organizationally Unique Identifier Byte 2<br />
Type0 1 byte Ethertype byte 0<br />
Type1 1 byte Ethertype byte 1<br />
Table 20 Management packet field description<br />
For the internal BPL protocols that IEEE P1901 stations will exchange, the described fields must have the following<br />
values:<br />
Field Length Value<br />
DSAP 1 byte 0xAA<br />
SSAP 1 byte 0xAA<br />
CTL 1 byte 0x3<br />
OUI0 1 byte 0x00<br />
OUI1 1 byte 0x13<br />
OUI2 1 byte 0x9D<br />
Type0 1 byte See Table 22<br />
Submission page 187 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Type1 1 byte See Table 22<br />
Table 21 Management packet field values<br />
Table 22 includes the used types <strong>and</strong> subtypes for m<strong>and</strong>atory BPL protocols. Description of each one will be<br />
provided in the following sections. In general, with Type0 a Specific protocol is set <strong>and</strong> with Type1 a message type<br />
that makes sense into the protocol is announced. In the following table, messages of each BPL protocol are<br />
described, providing information about the content of each type field for each message.<br />
Type0 Protocol Type1 Description<br />
0x06 Adaptive Bit-Loading Protocol 0x01 BPC<br />
0x07 Port Solver Protocol 0x01 <strong>Access</strong> message<br />
0x02 Anounce Message<br />
0x03 Multicast message<br />
0x04 Multicast ACK message<br />
0x0b <strong>Access</strong> Protocol 0x01 Petition Status<br />
0x05 Connection Admission <strong>Control</strong><br />
Protocol<br />
P Sub_Type P.(1 bit) is the most<br />
significant bit of Type1.<br />
Sub_Type (7 bits)<br />
0 0x01 Resources Reservation<br />
Request<br />
0 0x02 Resources Reservation<br />
Reply<br />
0 0x03 Resources Reservation<br />
Change<br />
Submission page 188 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
0x07 Parametric Translation Table<br />
protocol<br />
0 0x04 Resources Reservation<br />
Change Confirmation.<br />
0 0x05 Resources Reservation<br />
Dropped<br />
0 0x06 Resources Reservation<br />
stop<br />
See 12.2.5<br />
0x0a Cluster Discovery Protocol 0x01 CDP message<br />
0x0b Automatic management of crosstalks 0x01 IDP<br />
0x02 BNDP<br />
0x03 BNDA<br />
Table 22 Management packet protocol types<br />
In some cases it is foreseen that the management information that has to be sent may not fit in one single packet. A<br />
mechanism is provided to split the information in several packets using sub-tables. The general format of those<br />
packets follows in Table 23:<br />
Bytes Fields Length<br />
0 Sub-table number 1 bytes<br />
1 Number of sub-tables 1 bytes<br />
2 Number of entries of the sub-table 1 byte<br />
3 - 8 Sender <strong>MAC</strong> address 6 byte<br />
Submission page 189 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
9 Entry size 1 byte<br />
10 - 521 Entries 512 bytes<br />
Maximum<br />
Table 23 Packet format<br />
The sub-table number shall be 1 for the first packet, <strong>and</strong> the sub-tables shall be sent in order. Entries can have<br />
variable length to allow for forward compatibility. The entry size is expressed in bytes. A node receiving entries<br />
with a size bigger than what it expects shall only take the values in the entries that it knows how to interpret <strong>and</strong><br />
shall look for the next entry taking into account the entry size received in the packet.<br />
The final structure, including information about Bridging <strong>and</strong> VLAN, <strong>and</strong> aligned in bytes shall be transmitted<br />
through the BPL in the order presented in the following figure:<br />
Submission page 190 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
bits 7 6<br />
Reserved<br />
Reserved<br />
5<br />
4<br />
3<br />
2<br />
1<br />
0<br />
LB[3]<br />
LB[2]<br />
LB[1]<br />
LB[0]<br />
PB[1]<br />
PB[0]<br />
LB[5]<br />
LB[4]<br />
PB[5]<br />
PB[4]<br />
PB[3]<br />
PB[2]<br />
OVLANID[7:0]<br />
OVLANV OVLANID[11:8]<br />
PCP PCF<br />
Reserved<br />
DA[3]<br />
DA[2]<br />
DA[1]<br />
DA[0]<br />
SA[1]<br />
SA[0]<br />
DA[5]<br />
DA[4]<br />
SA[5]<br />
SA[4]<br />
SA[3]<br />
SA[2]<br />
TCI[7:0]<br />
TCI[15:8]<br />
TPID[7:0]<br />
TPID[15:8]<br />
SSAP<br />
DSAP<br />
Lenght[1]<br />
Length[0]<br />
OUI[2]<br />
OUI[1]<br />
OUI[0]<br />
CTL<br />
Data[1]<br />
Data[0]<br />
TYPE1<br />
TYPE0<br />
Data from byte 2 to N<br />
Submission page 191 UPA-OPERA<br />
PLW<br />
Figure 68 Management packet structure<br />
When VLANs are active, all CCP packets must use the power-line reserved VLAN tag 1.<br />
Other st<strong>and</strong>ard protocols like spanning tree, will follow the IEEE 802 st<strong>and</strong>ard.<br />
Octet<br />
1<br />
2<br />
3<br />
4<br />
5<br />
6<br />
7<br />
8<br />
9<br />
10<br />
11<br />
12<br />
13<br />
14<br />
15<br />
16<br />
17<br />
18<br />
19<br />
20<br />
21<br />
22<br />
23<br />
24<br />
25<br />
26<br />
27<br />
28<br />
29<br />
30<br />
31<br />
32<br />
33<br />
34<br />
35<br />
36<br />
37<br />
38<br />
39<br />
40<br />
41<br />
42<br />
43<br />
44
4-June-07 P1901_PRO_016_r0<br />
9.1.2 Adaptive Bit-Loading Protocol (ABLP)<br />
9.1.2.1 Overview<br />
The Adaptive Bit-Loading Protocol (ABLP) is responsible for the interchange of tonemap information between the<br />
different nodes of an established BPL network.<br />
Tonemap negotiation is unidirectional <strong>and</strong> needs direct visibility between the involved nodes. One node sends the<br />
tonemap configuration <strong>and</strong> the other accepts it. The same tonemap shall be used by receiver nodes in order to<br />
underst<strong>and</strong> the received data.<br />
A pair of nodes can establish two different logical links identified in the reception side by the pair transmitter’s<br />
<strong>MAC</strong> <strong>and</strong> First Remote Port (RP1) <strong>and</strong> transmitter’s <strong>MAC</strong> <strong>and</strong> Second Remote Port (RP2). The link determined by<br />
the transmitter’s <strong>MAC</strong> <strong>and</strong> the Second Remote Port is usually devoted to Multicast Transmissions, <strong>and</strong> may have a<br />
different tonemap from the link determined by the pair transmitter‘s <strong>MAC</strong> <strong>and</strong> First Remote Port (RP1) (See<br />
9.1.2.1). In this case, the negotiation will be independent for each one of the links.<br />
Tonemap negotiation includes:<br />
- The tonemap.<br />
- The tonemap ID (TMI) associated to the included tonemap.<br />
- And, optionally, cycle selection (CS) configuration.<br />
Cycle selection configuration can be included to indicate that current tonemap has been designated to be used only<br />
during a specific part of the cycle defined as a multiple of Qs (See 4.4.2.10). In that case, nodes will need to<br />
negotiate several tonemaps to cover the the entire cycle.<br />
9.1.2.2 Protocol<br />
The ABLP defines two different packets:<br />
- The ABLP Tonemap information packet (ABLP_inf).<br />
- And the ABLP Tonemap acknowledgement packet (ABLP_ack).<br />
The ABLP_ack is used by the ABLP_inf packet transmitter to know if the tonemap configuration has been received<br />
<strong>and</strong> accepted by the transmitter node. In case that acknowledgment does not arrive, the ABLP_inf packet transmitter<br />
shall send a new ABLP_inf packet. The ABLP_inf packet transmitter shall start a timer after the transmission of the<br />
packet.<br />
The loss of an ABLP_inf packet or the ABLP_ack packet shall not cause a tonemap mismatch (different tonemaps<br />
with the same TMI in transmitter <strong>and</strong> receiver). Current tonemaps shall not share TMI with new tonemaps <strong>and</strong> shall<br />
not be immediately discarded after sending the new packet. The loss of an ABLP_inf packet will imply the use of<br />
previous tonemap configuration <strong>and</strong> the transmission of a new ABLP_inf packet.<br />
On the other h<strong>and</strong>, although the ABLP_ack packet is lost, the new tonemap configuration can be used. However, a<br />
new ABLP_inf packet shall be sent (timeout) with the objective of finishing the negotiation.<br />
Submission page 192 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
The ABLP_ack packet shall include the same TMI <strong>and</strong> sequence number as the transmitted ABLP_inf packet. The<br />
sequence number shall be increased with every transmitted ABLP_inf packet. The reception of the ABLP_ack<br />
implies that the receiver has accepted the new tonemap configuration.<br />
9.1.2.3 ABLP_inf packet format<br />
Figure 69: Example of successful tonemap negotiation<br />
ABLP_inf packets shall be sent in HURTO mapping mode. The use of a different mapping could result in the<br />
impossibility to negotiate new tonemaps if current tonemap configuration is inadequate.<br />
ABLP_inf packets use the CCP with Type0 0x01 <strong>and</strong> Type1 0x01. The packet format can be seen in Figure 70.<br />
Figure 70: ABLP_inf packet<br />
ABLP_inf packets use 0x01139D000000 multicast address as destination <strong>MAC</strong> address.<br />
Submission page 193 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Source <strong>MAC</strong> address is set to the ABLP_inf packet transmitter node <strong>MAC</strong> address. The ABLP_inf data is shown in<br />
Figure 71.<br />
Description:<br />
Figure 71: ABLP_inf Data<br />
a) Remote Port: Remote Port assigned by the ABLP_inf packet transmitter to the link with the ABLP_inf<br />
packet destination node. May be the First or the Second Remote Port.<br />
b) TMI: Tonemap ID assigned to the included tonemap. From 0 to 255. If the H bit is set to 1, this value shall<br />
be set to 0.<br />
c) Local Port: Local Port assigned by the ABLP_inf packet transmitter to the link with the ABLP_inf packet<br />
destination node.<br />
d) Flags:<br />
1) H bit: use HURTO mapping. When this bit is set to 1, Tonemap Format <strong>and</strong> Tonemap fields shall<br />
not be included <strong>and</strong>, additionally, TMI <strong>and</strong> BPS fields shall be set to 0.<br />
2) C bit: use cycle selection (CS). When this bit is set to 1, CS Format <strong>and</strong> CS fields shall be included.<br />
The rest of bits are reserved <strong>and</strong> shall be set to 0.<br />
e) BPS: Bits Per Symbol value calculated from the tonemap included in the packet (see Equation 17). If H bit<br />
is set to 1, this value shall be set to 0.<br />
f) Rx Att: difference, in 3 dB steps, between the maximum reception gain <strong>and</strong> the gain used during channel<br />
estimation.<br />
g) Sequence Number: ABLP_inf packet sequence number. From 0 to 65535.<br />
h) Dest <strong>MAC</strong>: destination node <strong>MAC</strong> address.<br />
Submission page 194 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
i) CRC: CRC-32-IEEE 802.3 calculation. The complete ABLP_inf data is used, considering as 0 the CRC<br />
field.<br />
j) Tonemap Format: information about the format used in the Tonemap field.<br />
k) Tonemap: tonemap data. Tonemap data field shall be in the format set in Tonemap Format field.<br />
l) CS Format: information about the format used in the CS field.<br />
m) CS: cycle selection data. CS field shall be in the format set in the CS Format field.<br />
9.1.2.3.1 Tonemap format details<br />
Tonemap basic format is defined here. This format shall be used when Tonemap Format field value is set to 1<br />
(0x0001). Format description:<br />
- Tonemap sets the value for 1536 subcarriers.<br />
- Every subcarrier uses 4 bits to describe subcarrier bit-loading value.<br />
- Tonemap field length is 768 octects.<br />
- The first octet contains the first subcarrier (lowest frequency subcarrier) bit-loading value in the least<br />
significant bits <strong>and</strong> the second subcarrier bit-loading value in the more significant bits.<br />
- The second octet contains the third <strong>and</strong> fourth subcarrier bit-loading values; the third octet contains the fifth<br />
<strong>and</strong> sixth values, <strong>and</strong> so on.<br />
9.1.2.3.2 Cycle Selection details<br />
CS basic format is defined here. This format shall be used when CS Format field first octet is set to 1 (0x01). CS<br />
Format field second octet represents the number of octet pairs in the CS field. See Figure 72.<br />
Figure 72: CS Format field<br />
Therefore, CS field length is two times the Zone Count value. Each two octets define a part of the cycle when the<br />
tonemap can be used. The first octet represents the start <strong>and</strong> the second octet st<strong>and</strong>s for the end (both included).<br />
Start <strong>and</strong> end values shall be defined by a synchronized Q value (see 4.3.11).<br />
Submission page 195 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
9.1.2.4 ABLP_ack packet<br />
ABLP_ack packets shall be sent in HURTO mapping mode. ABLP_ack packets use the CCP with Type0 0x01 <strong>and</strong><br />
Type1 0x04. The packet format can be seen in Figure 75¡Error! No se encuentra el origen de la referencia..<br />
Figure 73: ABLP_ack packet<br />
ABLP_ack packets use 0x01139D000000 multicast address as destination <strong>MAC</strong> address.<br />
Source <strong>MAC</strong> is set to the ABLP_ack packet transmitter <strong>MAC</strong> address.<br />
The ABLP_ack data format is shown in Figure 74¡Error! No se encuentra el origen de la referencia..<br />
Description:<br />
Figure 74: ABLP_ack Data<br />
a) Remote Port: Remote Port assigned by the ABLP_ack packet transmitter to the link with the ABLP_ack<br />
packet destination node. May be the First or the Second Remote Port.<br />
b) TMI: acknowledged Tonemap ID.<br />
Submission page 196 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
c) Local Port: Local Port assigned by the ABLP_ack packet transmitter to the link with the ABLP_ack packet<br />
destination node.<br />
d) Sequence Number: acknowledged ABLP_inf packet sequence number.<br />
e) Dest <strong>MAC</strong>: destination node <strong>MAC</strong> address.<br />
9.1.3 <strong>Access</strong> Protocol<br />
<strong>Access</strong> protocol defines a protocol for connecting nodes in point-multipoint BPL networks within master-slave<br />
architecture.<br />
In this protocol we will define the way to establish a connection from a slave to a master of the network.<br />
Each master node may periodically send an access frame, as explained in 4.3.5, to the network, <strong>and</strong> wait for a<br />
response to add the responding slave to their own list <strong>and</strong> then start the AAA (Authorization – Authentication –<br />
Accounting) protocol to decide if the node is authorized to connect to the network via this master or not.<br />
On the other side, when a slave receives an access token it decides to reply or not with an access reply frame, as<br />
explained in 4.3.9.<br />
When a slave wants to send an access reply frame it must start a back-off period, as it is explained in 4.3.9. If no<br />
other access reply frame is detected during that period, the node may send an access reply frame.<br />
Once a master receives an access reply frame from a slave it must send an access protocol packet accepting or<br />
rejecting the slave.<br />
9.1.3.1 <strong>Access</strong> Protocol packet format<br />
This packet shall be sent from the master to a slave that sent <strong>and</strong> access reply frame, to indicate if the slave is<br />
accepted or not. The packet is formatted as an CCP packet <strong>and</strong> the structure is shown in Figure 75.<br />
The response contained in the packet can be of three different types:<br />
• ACCEPT: The slave node has been accepted<br />
• REJECT: The slave node has been rejected because the AAA process has resulted in rejection.<br />
• FAILED: The slave node has been rejected because the AAA process has failed <strong>and</strong> the master does<br />
not have enough information to accept or reject the node.<br />
The packet uses the CCP with Type0=0x03 <strong>and</strong> Type1=0x01.<br />
Submission page 197 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
In Figure 75 we can see the entire packet format:<br />
TPID<br />
0xAA<br />
0xAA<br />
0x03<br />
0x00<br />
0x13<br />
0x9D<br />
0x03<br />
0x01<br />
Slave <strong>MAC</strong><br />
Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />
TCI<br />
Submission page 198 UPA-OPERA<br />
Length<br />
Figure 75 <strong>Access</strong> protocol packet<br />
Master <strong>MAC</strong><br />
The packet is sent using the broadcast port (127). The value of the packet fields shall be:<br />
• Dest <strong>MAC</strong> is set 0x0180C2000000.<br />
• Src <strong>MAC</strong> is set to the master <strong>MAC</strong> address.<br />
• Slave <strong>MAC</strong> is set to the slave <strong>MAC</strong> address<br />
• Master <strong>MAC</strong> is set to the master <strong>MAC</strong> address<br />
• The Info field is 1 byte <strong>and</strong> can have the following values:<br />
o REJECT: 0x00<br />
o ACCEPT: 0x01<br />
o FAILED: 0x02<br />
9.1.3.2 Timing diagrams<br />
In the following timeline diagrams we will show the sequence of messages that can be produced in access protocol<br />
between master <strong>and</strong> slave <strong>and</strong> the messages sent.<br />
We will divide this section in different cases that can occur.<br />
Case 01: Master accepts Slave<br />
Info
4-June-07 P1901_PRO_016_r0<br />
ACCESS_TOKEN_SENT<br />
ACCESS_TOKEN_REPLY_RECEIVED<br />
AAA PROCESS STARTs<br />
SLAVE ACCEPTED<br />
ACCEPT_PACKET_SENT<br />
Case 02: A Master rejects a Slave<br />
MASTER SLAVE<br />
Figure 76 <strong>Access</strong> protocol: Master accepts Slave<br />
ACCESS_TOKEN_SENT<br />
ACCESS_TOKEN_REPLY_RECEIVED<br />
AAA PROCESS STARTs<br />
SLAVE REJECTED<br />
REJECT_PACKET_SENT<br />
MASTER SLAVE<br />
Figure 77 <strong>Access</strong> protocol: Master rejects Slave<br />
ACCESS_TOKEN_RECEIVED<br />
REPLY_ACCESS_TOKEN<br />
MASTER_REGISTRATION<br />
ACCESS PROTOCOL<br />
COMPLETED<br />
ACCESS_TOKEN_RECEIVED<br />
REPLY_ACCESS_TOKEN<br />
ACCESS PROTOCOL RESTART<br />
Case 03 Master rejects Slave due to different reasons from not acceptation (protocol has failed)<br />
Submission page 199 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Case 04: Slave response is lost<br />
ACCESS_TOKEN_SENT<br />
ACCESS_TOKEN_REPLY_RECEIVED<br />
AAA PROCESS STARTs<br />
SLAVE REJECTED<br />
FAILED_PACKET_SENT<br />
MASTER SLAVE<br />
Figure 78 <strong>Access</strong> protocol: registration failed<br />
ACCESS_TOKEN_SENT<br />
ACCESS_TOKEN_SENT<br />
SLAVE ACCEPTED<br />
ACCEPT_PACKET_SENT<br />
MASTER SLAVE<br />
ACCESS_TOKEN_RECEIVED<br />
REPLY_ACCESS_TOKEN<br />
ACCESS PROTOCOL RESTART<br />
ACCESS_TOKEN_RECEIVED<br />
REPLY_ACCESS_TOKEN<br />
ACCESS_TOKEN_RECEIVED<br />
REPLY_ACCESS_TOKEN<br />
MASTER_REGISTRATION<br />
ACCESS PROTOCOL<br />
COMPLETED<br />
Figure 79 <strong>Access</strong> protocol: Slave response is lost<br />
Case 05: Master acceptation packet is lost. Protocol starts again after expiring timers waiting for master reply.<br />
Submission page 200 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
ACCESS_TOKEN_SENT<br />
SLAVE ACCEPTED<br />
ACCEPT_PACKET_SENT<br />
ACCESS_TOKEN_SENT<br />
ACCESS_TOKEN_SENT<br />
SLAVE ACCEPTED<br />
ACCEPT_PACKET_SENT<br />
Case 06: Master accepts Slave 1. Slave 2 lost contention<br />
ACCESS_TOKEN_SENT<br />
SLAVE ACCEPTED<br />
ACCEPT_PACKET_SENT<br />
Case 07: Slave decides not to log in a Master<br />
MASTER SLAVE<br />
ACCESS_TOKEN_RECEIVED<br />
REPLY_ACCESS_TOKEN<br />
TIMEOUT<br />
ACCESS PROTOCOL RESTART<br />
ACCESS_TOKEN_RECEIVED<br />
REPLY_ACCESS_TOKEN<br />
MASTER_REGISTRATION<br />
ACCESS PROTOCOL<br />
COMPLETED<br />
Figure 80 <strong>Access</strong> protocol: Master acceptation packet is lost<br />
MASTER SLAVE 1<br />
MASTER_REGISTRATION<br />
ACCESS PROTOCOL<br />
COMPLETED<br />
Figure 81 <strong>Access</strong> protocol: two slaves contend<br />
SLAVE 2<br />
ACCESS_TOKEN_RECEIVED<br />
REPLY_ACCESS_TOKEN<br />
ACCESS PROTOCOL RESTART<br />
Submission page 201 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
9.1.4 Port Solver Protocol<br />
Figure 82 <strong>Access</strong> protocol: Slave decides not to log in a Master<br />
To allow data transmission from node A to node B a connection must be created between them. This connection<br />
will allow sending data between A <strong>and</strong> B.<br />
This connection is composed by two unidirectional links: one from A to B <strong>and</strong> another from B to A. These links are<br />
entries in the Port Solver Table (PST). That is, a connection between A <strong>and</strong> B is fully established when in A’s PST<br />
there is a complete entry (with all its data) regarding B, <strong>and</strong> in B’s PST there is a complete entry regarding A.<br />
The objective of the protocol is to complete the remote port (RP) field of the PST entries.<br />
9.1.4.1 Port Solver Table<br />
The Token Announce is used to know the transmitter. In the Token Announce, there is the <strong>MAC</strong> address of the<br />
transmitter. For more information about the Token Announce see 4.4.1.<br />
The way to identify the receiver at the transmitter side is with the Local Port. The Local Port is included in the<br />
Transmission Port field of the burst header. The transmitter may have up to two Local Ports to identify two flows<br />
between the transmitter <strong>and</strong> a single receiver. The second Local Port is intended to be used for multicast purposes.<br />
At the receiver side, the information in the Transmission Port field of the burst header will be the Remote Port. The<br />
relation between Remote Port <strong>and</strong> <strong>MAC</strong> address of transmitter in order to identify that it is the intended receiver<br />
shall be stored in a table (referred to as the Port Solver Table). To get more information about Burst Header see 5.2.<br />
Submission page 202 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
The transmitter can send bursts to up to 119 ports. The correct range of Local Port is the following:<br />
- From 9 to 126 are possible Local Ports.<br />
- Port 127 is the Broadcast Port. All receivers have to receive the burst with Transmission Port equal to 127.<br />
The Port Solver Table has 118 entries <strong>and</strong> each entry has the following information:<br />
- <strong>MAC</strong> address of all transmitters that are visible for this node. The <strong>MAC</strong> address of the transmitter can be<br />
read in the received Token Announce<br />
- First Remote Port (RP1). The RP1 will be set to a default invalid value (0xFF) until the Port Solver Protocol<br />
takes place. The RP1 of transmitters that do not transmit data directly to this node (for instance, the RP1 of<br />
a CPE for another CPE) will keep the default value. This RP1 is intended to be used fro unicast<br />
communications.<br />
- Second Remote Port (RP2). The RP2 will be set to a default value (0xFF) until a Multicast message of the<br />
Port Solver Protocol containing the Local Port using by the multicast flow transmitter is received.(See<br />
9.1.4.3.2)<br />
- Local Port (LP)<br />
The Port Solver Table will have therefore completed entries (with a valid RP1) <strong>and</strong> incomplete entries (with a RP1<br />
equal to 0xFF). The RP2 is not taken into account to decide if an entry is completed or not. When receiving from a<br />
<strong>MAC</strong> address with a completed entry in the Port Solver Table, the receiver shall decode any burst with<br />
Transmission Port field in the burst header equal to:<br />
- The First Remote Port associated to this <strong>MAC</strong> address<br />
- The Broadcast Port.<br />
If RP2 is also completed in the entry, the receiver shall decode also any burst with Transmission Port in the burst<br />
header equal to:<br />
- The Second Remote Port associated to this <strong>MAC</strong> address<br />
When First Remote Port is using Mode ACK, the next sent ACK has ACK Port equal to Local Port.<br />
Second Remote Port does not support ACK mode.<br />
Port Solver Table entries are deleted if no TA is received from the corresponding <strong>MAC</strong> address during 60 seconds<br />
(ageing).<br />
9.1.4.1.1 Unicast Communication example<br />
The following example is useful to underst<strong>and</strong> the meaning of each field in the case of unicast communication<br />
between two nodes:<br />
Submission page 203 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
9<br />
Node A Node B<br />
Figure 83 Ports example<br />
To transmit a burst from A to B, the Transmission Port field is equal to 9.<br />
To transmit a burst from B to A, the Transmission Port field is equal to 15.<br />
In B the Port Solver Table has the following entry:<br />
• <strong>MAC</strong> address equal to A <strong>MAC</strong> address<br />
• Local Port equal to 15.<br />
• First Remote Port equal to 9.<br />
In A the Port Solver Table has the following entry:<br />
• <strong>MAC</strong> address equal to B <strong>MAC</strong> address<br />
• Local Port equal to 9.<br />
• First Remote Port equal to 15.<br />
The first remote port exchange process is described in section 9.1.4.2.<br />
9.1.4.1.2 Multicast Communication example<br />
The second remote port is intended to support native multicast using BPL by means of identify a physical unique<br />
link that will have its own tonemap <strong>and</strong> particular management, as described in section 9.1.2.1<br />
In the following draw, node A has three links stablished. First one is a unicast link with node B, second another<br />
unicast link with node C <strong>and</strong> finally, a multicast link with nodes B <strong>and</strong> C. The local reference in node A for each of<br />
the links is its assigned Local Port, in this case 9, 10 <strong>and</strong> 12 respectively.<br />
Submission page 204 UPA-OPERA<br />
15
4-June-07 P1901_PRO_016_r0<br />
12<br />
12<br />
9<br />
Node A Node B<br />
10<br />
Figure 84: Native Multicast example<br />
In Node A the Port Solver Table has the following entries:<br />
• <strong>MAC</strong> address equal to Node B <strong>MAC</strong> address<br />
• Local Port equal to 9<br />
• Remote Port 1 equal to 15<br />
• <strong>MAC</strong> address equal to Node C <strong>MAC</strong> address<br />
• Local Port equal to 10<br />
• Remote Port 1 equal to 14<br />
In Node B the Port Solver Table will have the following entry:<br />
• <strong>MAC</strong> address equal to Node A <strong>MAC</strong> address<br />
• Local Port equal to 15<br />
• Remote Port 1 equal to 9<br />
• Remote Port 2 equal to 12<br />
In Node C the Port Solver Table will have the following entry:<br />
• <strong>MAC</strong> address equal to Node A <strong>MAC</strong> address<br />
Node C<br />
Submission page 205 UPA-OPERA<br />
15<br />
14
4-June-07 P1901_PRO_016_r0<br />
• Local Port equal to 14<br />
• Remote Port 1 equal to 10<br />
• Remote Port 2 equal to 12<br />
When a burst with a Transmission Port field set to 12 is sent by Node A will be demodulated by Node B <strong>and</strong> Node<br />
C using the tonemap for the second port, which will be common for Node B <strong>and</strong> Node C in the reception. (See<br />
section 9.1.2) This way, the information will be sent only once.<br />
9.1.4.2 First Port exchange process<br />
The first port (RP1) exchange process is only executed between the master <strong>and</strong> the corresponding slaves. The<br />
protocol is always started by the master, after completion of the access protocol. The slave node cannot send the<br />
port solver message because it needs the token to transmit any packet, <strong>and</strong> to recognize that the token is addressed<br />
to it, it must know its RP1 with the master; that is, it has to complete the entry in its PST correspondent to the <strong>MAC</strong><br />
address of its master.<br />
To complete all the fields of an entry correspondent to a given <strong>MAC</strong> address, the first remote transmission port<br />
must be communicated by the node with that <strong>MAC</strong> address. A h<strong>and</strong>-shake protocol is used.<br />
The node that wants to complete the entry sends a Port Solver Message (PSM) addressed to the <strong>MAC</strong> address of the<br />
PST entry. When a node receives a PSM, it answers with another PSM (Figure 85). The main contents of the PSM<br />
are the LP <strong>and</strong> the flag field. The flag field is set to zero by default. The flag field must be set to 1 when a PSM is<br />
received <strong>and</strong> the correspondent entry is already completed (Figure 87). A received PSM with this flag set to 1 will<br />
not require an answer.<br />
Node A Node B<br />
Node B entry added<br />
Entry: (<strong>MAC</strong> B, LP 3, RP1 -)<br />
Entry: (<strong>MAC</strong> B, LP 3, RP1 5)<br />
PSM(LP 3, 0)<br />
PSM(LP 5, 1)<br />
Node A entry added<br />
Entry: (<strong>MAC</strong> A, LP 5, RP1 -)<br />
Entry: (<strong>MAC</strong> A, LP 5, RP1 3)<br />
Figure 85 Port Solver Protocol Messages Exchange to complete First remote Port<br />
If a response to PSM is not received, the entry will not be completed <strong>and</strong> a new PSM must be sent (Figure 86,<br />
Figure 87). There is a minimum time between PSM retransmissions. If the entry remains in the PST, the protocol<br />
must be followed until its success.<br />
Submission page 206 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 86 Port Solver Protocol Messages Exchange to complete First remote Port<br />
Submission page 207 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Node A Node B<br />
Node B entry added<br />
Entry: (<strong>MAC</strong> B, LP 3, RP1 -)<br />
Entry: (<strong>MAC</strong> B, LP 3, RP1 -)<br />
Entry: (<strong>MAC</strong> B, LP 3, RP1 5)<br />
PSM(LP 3, 0)<br />
PSM(LP 3, 0)<br />
PSM(LP 3, 0)<br />
PSM(LP 5, 1)<br />
PSM(LP 3, 0)<br />
PSM(LP 5, 1)<br />
Node A entry added<br />
Entry: (<strong>MAC</strong> A, LP 5, RP1 -)<br />
Entry: (<strong>MAC</strong> A, LP 5, RP1 3)<br />
Entry: (<strong>MAC</strong> A, LP 5, RP1 3)<br />
Figure 87 Port Solver Protocol Messages Exchange to complete First remote Port<br />
Every time a PSM is received, the correspondent entry in the PST must be updated because the first remote port can<br />
change.<br />
Every time the LP is changed, the RP1 must be set to an invalid value <strong>and</strong> the protocol started.<br />
9.1.4.3 Second Port exchange process<br />
The second port (RP2) exchange process is only executed when the unicast link between origin <strong>and</strong> destination of<br />
multicast flow has been previously established. The protocol is always started by the origin of the multicast flow,<br />
that, through higher level exchange of packets, respond to the petition of inclusion or exclusion of certain node,<br />
identified by the Local Port assigned to the previously established unicast link, into a multicast flow, identified by a<br />
Local Port in the traffic origin.The response will be to trigger the Second Port (RP2) exchange process.<br />
The origin of the multicast flow wil send a Posrt Solver Multicast Message (PSMM) addressed to the <strong>MAC</strong> address<br />
of the destination of the multicast flow. When a node receives a PSMM, it answers with a Port Solver Multicast<br />
ACK Message (PSMAM) to acknowledge the reception of the Local Port assigned in the transmission side to the<br />
Submission page 208 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
multicast flow desired, <strong>and</strong> the RP2 (Second Remote Port) field of the entry indexed by the multicast origin <strong>MAC</strong><br />
will be filled with this number.<br />
Since this time, when receiving from a <strong>MAC</strong> address with a entry that contains RP1 <strong>and</strong> RP2 in the Port Solver<br />
Table, the receiver shall decode any burst with Transmission Port field in the burst header equal to RP1 <strong>and</strong> RP2.<br />
The main contents of the PSMM are the LP assigned in the origin of the multicast flow <strong>and</strong> the flag field. The flag<br />
field is set to zero by default. A received PSMM with this flag set to 1 shall not require an answer.<br />
Node A Node B<br />
Node B wants to join<br />
multicast flow<br />
With LP associated 12<br />
Node B will receive data<br />
transmitted by port 3 <strong>and</strong> port<br />
12 from Node A<br />
PSMM(LP 12, 0)<br />
PSMAM<br />
Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />
RP2 -)<br />
Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />
RP2 12)<br />
Figure 88 Port Solver Protocol Messages Exchange to complete Second remote Port<br />
Submission page 209 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Node A Node B<br />
Node B wants to join<br />
multicast flow<br />
With LP associated 12<br />
Node B will receive data<br />
transmitted by port 3 <strong>and</strong><br />
port 12 from Node A<br />
PSMM(LP 12, 0)<br />
PSMM(LP 12, 0)<br />
PSMM(LP 12, 0)<br />
PSMM(LP 12, 0)<br />
PSMAM<br />
Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />
RP2 -)<br />
Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />
RP2 12)<br />
Figure 89: Port Solver Protocol Messages Exchange to complete Second remote Port<br />
Node A Node B<br />
Node B wants to join<br />
multicast flow<br />
With LP associated 12<br />
Node B will receive data<br />
transmitted by port 3 <strong>and</strong> port<br />
12 from Node A<br />
PSMM(LP 12, 0)<br />
PSMM(LP 12, 0)<br />
PSMM(LP 12, 0)<br />
PSMAM<br />
PSMM(LP 12, 0)<br />
PSMAM<br />
Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />
RP2 -)<br />
Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />
RP2 12)<br />
Figure 90: Port Solver Protocol Messages Exchange to complete Second remote Port<br />
If a response to PSMM is not received, Node A will not known is Node B is in the group or not, <strong>and</strong> a Time Out is<br />
done in the transmitter to send again the PSMM.<br />
Submission page 210 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
In the case of leaving a group, the protocol messages exchange will be the same, but replacing the LP associated by<br />
an invalid identifier (0xFF), as can be seen in the following figure:<br />
Node A Node B<br />
Node B wants to leave<br />
multicast flow<br />
With LP associated 12<br />
Node B will receive data<br />
transmitted only by port 3<br />
from Node A<br />
PSMM(LP 0xFF, 0)<br />
PSMAM<br />
Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />
RP2 12)<br />
Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />
RP2 -)<br />
Figure 91: Port Solver Protocol Exchange to delete Second Remote Port<br />
Node A Node B<br />
Node B wants to leave<br />
multicast flow<br />
With LP associated 12<br />
Node B will receive data<br />
transmitted only by port 3<br />
from Node A<br />
PSMM(LP 0xFF, 0)<br />
PSMM(LP 0xFF, 0)<br />
PSMM(LP 0xFF, 0)<br />
PSMM(LP 0xFF, 0)<br />
PSMAM<br />
Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />
RP2 12)<br />
Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />
RP2 -)<br />
Figure 92 Port Solver Protocol Messages Exchange to delete Second Remote Port<br />
Submission page 211 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Node A Node B<br />
Node B wants to leave<br />
multicast flow<br />
With LP associated 12<br />
Node B will receive data<br />
transmitted only by port 3<br />
from Node A<br />
PSMM(LP 0xFF, 0)<br />
PSMM(LP 0xFF, 0)<br />
PSMM(LP 0xFF, 0)<br />
PSMAM<br />
PSMM(LP 0xFF, 0)<br />
PSMAM<br />
Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />
RP2 12)<br />
Entry: (<strong>MAC</strong> A, LP 5, RP1 3,<br />
RP2 -)<br />
Figure 93: Port Solver Protocol Messages Exchange to delete Second Remote Port<br />
Every time a PSMM is received, the correspondent entry of RP2 in the PST must be updated.<br />
Every time the LP is changed, the RP2 must be set to an invalid value <strong>and</strong> the protocol started.<br />
9.1.4.3.1 Port Solver Packet format<br />
The PSM is encapsulated using the CCP with Type0 0x02 <strong>and</strong> Type1 0x01 (Figure 94). The Port Solver packet will<br />
be sent through broadcast port 127.<br />
TPID<br />
0xAA<br />
0xAA<br />
0x03<br />
0x00<br />
0x13<br />
0x9D<br />
0x02<br />
0x01<br />
Length<br />
Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />
TCI<br />
Figure 94 Port solver packet<br />
Port Solver Protocol Data<br />
Submission page 212 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Destination <strong>MAC</strong> must be the STP multicast address (0x0180C2000000) because PSMs are exchanged prior to the<br />
STP protocol. The packet shall be transmitted using the broadcast port (127). The PSM data fields are:<br />
Bytes PSM data fields Length<br />
0 – 5 Source <strong>MAC</strong> 6 bytes<br />
6 – 11 Destination <strong>MAC</strong> 6 bytes<br />
12 Assigned LP 1 byte<br />
13 Info 1 byte<br />
Table 24 Port solver packet fields<br />
The format of the Info field is depicted in ¡Error! No se encuentra el origen de la referencia.:<br />
Figure 95 Info field format<br />
Bits number 1 to 4 are devoted to set the message type of the Capability Exchange Protocol (See section 0)<br />
9.1.4.3.2 Port Solver Multicast Message (PSMM) format<br />
The PSMM is encapsulated using the CCP with Type0 0x02 <strong>and</strong> Type1 0x03 (Figure 94). The Port Solver Multicast<br />
Message will be sent through broadcast port 127.<br />
Submission page 213 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 96 Port solver Multicast Message<br />
Destination <strong>MAC</strong> must be the STP multicast address (0x0180C2000000) because PSMMs are exchanged prior to<br />
the STP protocol. The packet shall be transmitted using the broadcast port (127). The PSMM data fields are:<br />
Bytes PSM data fields Length<br />
0 – 5 Source <strong>MAC</strong> 6 bytes<br />
6 – 11 Destination <strong>MAC</strong> 6 bytes<br />
12 Assigned Multicast LP 1 byte<br />
13 Info 1 byte<br />
Table 25 Port solverMulticast Message fields<br />
The format of the Info field is depicted in ¡Error! No se encuentra el origen de la referencia.:<br />
Figure 97 Info field format<br />
Bits number 1 to 4 are devoted to set the message type of the Capability Exchange Protocol (See section 0)<br />
Submission page 214 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
9.1.4.3.3 Port Solver Multicast Acknowledge Message (PSMAM) format<br />
The PSMAM is encapsulated using the CCP with Type0 0x02 <strong>and</strong> Type1 0x04 (Figure 94). The Port Solver<br />
Multicast Message will be sent through broadcast port 127.<br />
Figure 98 Port solver ACK Multicast Message<br />
Destination <strong>MAC</strong> must be the STP multicast address (0x0180C2000000) because PSMAMs are exchanged prior to<br />
the STP protocol. The packet shall be transmitted using the broadcast port (127). The PSMAM data fields are:<br />
Bytes PSM data fields Length<br />
0 – 5 Source <strong>MAC</strong> 6 bytes<br />
6 – 11 Destination <strong>MAC</strong> 6 bytes<br />
12 Acknowledged Multicast<br />
LP<br />
1 byte<br />
13 Info 1 byte<br />
Table 26 Port solverMulticast Message fields<br />
The format of the Info field is depicted in ¡Error! No se encuentra el origen de la referencia.:<br />
Submission page 215 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 99 Info field format<br />
Bits number 1 to 4 are devoted to set the message type of the Capability Exchange Protocol (See section 0)<br />
9.1.4.4 Periodic publication of Port Solver information<br />
Each Announce Time period (30 seconds) each node sends an Announce Message (AnM) publishing Port Solver<br />
information. This message contains a list with pairs of values (entry <strong>MAC</strong> address <strong>and</strong> assigned LP).<br />
Upon the reception of an AnM, the PST shall be modified in the following cases:<br />
• The sender <strong>MAC</strong> address is in a completed entry of the PST <strong>and</strong> the AnM LP value associated to the node<br />
<strong>MAC</strong> address is different from the PST RP value associated to the sender <strong>MAC</strong> address � the RP shall be<br />
updated (see Figure 100)<br />
• The sender <strong>MAC</strong> address is in the PST but the <strong>MAC</strong> address of the node is not in the AnM � Set PST RP<br />
value associated to the sender <strong>MAC</strong> address to 0xFF (see Figure 101)<br />
• The sender <strong>MAC</strong> address is in a incomplete entry of the PST, <strong>and</strong> the sender is either slave or master of the<br />
receiving node � the RP shall be updated<br />
AnM from A<br />
<strong>MAC</strong> D LP 11<br />
<strong>MAC</strong> C LP 10<br />
<strong>MAC</strong> B LP 9<br />
PST in C<br />
Rx AnM from A<br />
<strong>MAC</strong> A LP 11<br />
<strong>MAC</strong> D LP 10<br />
<strong>MAC</strong> B LP 9<br />
RP 12 10<br />
Submission page 216 UPA-OPERA<br />
C<br />
RP 255<br />
RP 255<br />
Figure 100 Announce Messages
4-June-07 P1901_PRO_016_r0<br />
AnM from A<br />
<strong>MAC</strong> D LP 11<br />
<strong>MAC</strong> E LP 10<br />
<strong>MAC</strong> B LP 9<br />
PST in C<br />
This message does not require any acknowledgement.<br />
9.1.4.4.1 Announce message format<br />
Rx AnM from A<br />
<strong>MAC</strong> A LP 11<br />
<strong>MAC</strong> D LP 10<br />
<strong>MAC</strong> B LP 9<br />
RP 12 255<br />
Submission page 217 UPA-OPERA<br />
C<br />
RP 255<br />
RP 255<br />
Figure 101 Announce Messages<br />
The Announce Message is encapsulated using the CCP with Type0 0x02 <strong>and</strong> Type1 0x02 (Figure 102). The<br />
Announce Message packet will be sent through broadcast port 127.<br />
TPID<br />
0xAA<br />
0xAA<br />
0x03<br />
0x00<br />
0x13<br />
0x9D<br />
0x02<br />
0x02<br />
Length<br />
Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />
TCI<br />
Figure 102 Announce packet format<br />
Destination <strong>MAC</strong> must be the STP multicast address (0x0180C2000000).<br />
Announce Message Data<br />
The PST can be fragmented in several AnMs (identified by a sub-table number) if the entries do not fit in one.<br />
The AnM data fields are:
4-June-07 P1901_PRO_016_r0<br />
Bytes AnM data fields Length<br />
0 Sub-table number 1 bytes<br />
1 Number of sub-tables 1 bytes<br />
2 Number of entries of the sub-table 1 byte<br />
3 - 8 Sender <strong>MAC</strong> address 6 byte<br />
9 Entry size 1 byte<br />
10 - 521 Entries 512 bytes<br />
Maximum<br />
The Table data is a list of consecutive pairs in the form:<br />
9.1.4.5 Capabilities Exchange protocol<br />
9.1.4.5.1 Overview<br />
Table 27 Announce message fields<br />
Entry fields Length<br />
<strong>MAC</strong> address 6 bytes<br />
LP 1 byte<br />
Table 28 Announce message entries<br />
In a BPL cell, nodes shall coexist with different capabilities <strong>and</strong> with other nodes from diverse vendors. Besides,<br />
they shall be able to communicate with each other, regardless their differences.<br />
The Capabilities Exchange protocol is a mechanism to exchange information about node capabilities. Every node in<br />
the BPL network shall know the capabilities of each node that has negotiated BPL ports with it.<br />
Submission page 218 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
However, the processing of such information in order to negotiate the best possible features used in the<br />
communications network is beyond the aim of this protocol.<br />
From the point of view of packet format <strong>and</strong> message exchange, this protocol is an extension of the Port Solver<br />
protocol (PSP). It uses reserved fields in Port Solver Messages (PSMs) to place node capabilities information, <strong>and</strong><br />
shall not prevent the ordinary working of the PSP protocol. Some additions shall be applied to the PSM exchange<br />
mechanism in order to fulfill the features of the Capabilities Exchange protocol.<br />
The Capabilities Exchange protocol shall be flexible enough, not only to provide the exchange of specific<br />
capabilities from different vendors, but also to allow the exchange of a st<strong>and</strong>ard set of minimum capabilities<br />
common for all vendors. Moreover, it shall be easily extensible to include new capabilities, which shall not prevent<br />
backwards compatibility.<br />
This protocol should be efficient, regarding the channel use, to minimize the impact of the overhead of the protocol<br />
in the application data throughput of the whole network.<br />
9.1.4.5.2 Protocol<br />
The protocol is composed by two main stages:<br />
• First stage: Two nodes shall exchange the information about the maximum capabilities they can perform<br />
<strong>and</strong> the capabilities they are running at that time. In this stage, it is used an ACK-based protocol whose<br />
objective is to fill two local tables in each node indexed by <strong>MAC</strong> address:<br />
o Node Capability Table (NCT): It shall contain the maximum capabilities of each known node.<br />
o Performed Capability Table (PCT): It shall contain the capabilities that each known node is running<br />
at that time.<br />
The implementation of these two tables should be done in a single table with the contents described in<br />
section 0 <strong>and</strong> 0. The two tables are divided into four sections:<br />
o Common capabilities<br />
o Chip related capabilities<br />
o Reference Design related capabilities<br />
o Firmware related capabilities<br />
The first section (Common) shall be common for all systems, independent of the vendor. The last three ones<br />
(Chip, Reference Design <strong>and</strong> Firmware related) shall depend on the vendor. The maximum number of<br />
entries of each section shall be 64, with an unlimited size per entry.<br />
• Second stage: It shall take place only if the running capabilities of a node change. This node shall indicate<br />
all nodes the new capabilities that it is performing at that time. This second stage may be either ACK-based<br />
or not, with a first information message <strong>and</strong> a received ACK from the destination, depending on the content<br />
of the ACK expected field. If it is 1, an ACK is expected. If not, no ACK is expected from the receiver.<br />
9.1.4.5.3 Messages<br />
Submission page 219 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
One of the two possible schemes explained below can be used to send the vendor dependent information within the<br />
maximum capabilities messages (MAX_CAP_MSG(xxx)):<br />
• Indexed scheme: Only the vendor related information shall be sent, <strong>and</strong> the maximum capabilities shall be<br />
inferred by the receiver. As a result, less data shall be transferred by the Capabilities Exchange protocol,<br />
minimizing the overhead.<br />
• Enumerated scheme: Node vendor <strong>and</strong> capabilities shall be sent as an enumeration.<br />
In case a node does not underst<strong>and</strong> the indexed scheme, it shall send a NACK to the sender in response. In any case,<br />
the common capabilities section is always sent in the message using an enumerated scheme.<br />
The information within the running capabilities messages (RUN_CAP_MSG) shall be sent in a different way. First,<br />
a field containing the default mode shall be sent. This field shall indicate what shall be the value for a running<br />
capability that is not sent in the message. The possible values can be two:<br />
• Maximum capability.<br />
• Minimum capability.<br />
Once the default field content is clear, the running capabilities that do not match with this default value shall be sent<br />
using a group of two fields. The first one shall indicate the position of the capability in the NCT, <strong>and</strong> the second<br />
one, its value. In addition to the information itself, a message mode shall be filled, indicating whether the node has<br />
changed its running capabilities, or it is a simply information message to the others nodes.<br />
9.1.4.5.3.1 Capability Element (CapE)<br />
A capability element is a structure composed by several <strong>and</strong> variable number of fields. All protocol messages are<br />
built using this structure. Four can be the protocol messages to be composed:<br />
• MAX_CAP_MSG(xxx): This message shall contain the maximum capabilities that a node can perform. It<br />
shall be divided into two main sections. The first one is the common capabilities section, which includes all<br />
these capabilities that are vendor independent, <strong>and</strong> have been previously approved by all vendors as a<br />
st<strong>and</strong>ard. The second one is the vendor capabilities section that shall be divided into three subsections.<br />
Either these subsections can be transmitted entirely (enumerated scheme) or sent using only an index<br />
(indexed scheme), enough for the receiver to underst<strong>and</strong> all the capabilities related to each subsection. In<br />
this case, the indication (xxx) shall be substituted by a 1 in the position relative to each of the subsections.<br />
That is, if only the Chip related capabilities are sent using the index, the indication becomes (100). The<br />
subsections are the following:<br />
o Chip related capabilities: All the capabilities that depend directly on the chip. If sent by index, it<br />
shall be indicated with a 1 in the first position of the index indicator. A list of Chip related<br />
capabilities is presented in section 0.<br />
o Firmware related capabilities: All the capabilities that depend on the Firmware version. If sent by<br />
index, it shall be indicated with a 1 in the second position of the index indicator. A list of Firmware<br />
related capabilities is presented in section 0.<br />
o Reference Design related capabilities: All the capabilities that depend on the Reference Design. If<br />
sent by index, it shall be indicated with a 1 in the third position of the index indicator. A list of<br />
Reference Design related capabilities is presented in section 0.<br />
• RUN_CAP_MSG: In this message, the running but not the maximum capabilities of the node shall be sent.<br />
Its objective is to fill the PCT. The first field shall notate the transmission mode, where the nature of the<br />
message, if it is a simply informational message or includes a notification of change in the running<br />
Submission page 220 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
capabilities, is transmitted. A second field telling the default value for the running capabilities that are not<br />
explicitly indicated in the message shall be sent. This default value can be the highest possible capability of<br />
the node or the lowest possible one. Then, the position of the capability in the NCT using a section indicator<br />
(Common, Chip, Firmware or Reference Design subsection) followed by the position of the capability in<br />
the section of the NCT shall be sent, associated with a value for this capability, that shall be wrote in the<br />
PCT.<br />
• ACK_CAP_ANN: Acknowledge of all sections of a MAX_CAP_MSG (xxx) message <strong>and</strong> also a previous<br />
RUN_CAP_MSG if they were sent with the ACK expected field set to 1. A sender cannot send two<br />
messages that expect two different ACKs. If a composed message with a MAX_CAP_MSG(xxx) <strong>and</strong> a<br />
RUN_CAP_MSG is sent, only an ACK_CAP_ANN shall be expected. If the sender decides to send both<br />
messages separately, first it shall expect the ACK_CAP_ANN for the MAX_CAP_MSG(xxx); <strong>and</strong> then, it<br />
shall transmit the RUN_CAP_MSG <strong>and</strong> expect another ACK_CAP_ANN for it. If some section of the<br />
MAX_CAP_MSG has not been correctly decoded, i.e. the index is not recognized by the destination node,<br />
(<strong>and</strong> cannot fill the NCT using only this data) then the message sent in response shall be a<br />
NACK_CAP_ANN (xxx) instead, with a 1 in the non-correctly decoded section.<br />
• NACK_CAP_ANN(xxx): One or more sections of the MAX_CAP_MSG(xxx) section sent by index have<br />
not been recognized by the receptor, because no index found, or table structure not known.<br />
Each type of Capabilities Exchange protocol message shall be identified by a field called MSG_TYPE. Please refer<br />
to section 0 for further details on this issue.<br />
Those messages can be composed encapsulating several of them into one Port Solver Message (PSM); therefore it is<br />
saved some overhead due to protocol encapsulation.<br />
Each one of the messages <strong>and</strong> how to compose them is discussed in the following subsections.<br />
9.1.4.5.3.2 MAX_CAP_MSG message<br />
This message shall begin with one field devoted to indicate the number of sets of maximum capabilities that are sent<br />
in the message.<br />
Depending on the decision performed in the node, it shall transmit the MAX_CAP_MSG message with either its<br />
maximum capabilities only (Single Node Publication) or the maximum capabilities of all the nodes it knows (All<br />
Known Nodes Publication). Although only the Single Node Publication method should be used, it is also possible to<br />
use the All Known Nodes Publication method.<br />
In the first case (Single Node Publication), this field shall be set to 1, <strong>and</strong> in the second case (All Known Nodes<br />
Publication), it shall be set to the number of known nodes with a complete filled NCT plus one.<br />
Submission page 221 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
The second section shall include the data themselves <strong>and</strong> can contain the maximum capabilities of either one or<br />
several nodes.<br />
Each set of maximum capabilities shall be preceded by the <strong>MAC</strong> address of the node that can perform this set of<br />
capabilities.<br />
The different maximum capabilities that can be present in a BPL cell shall be divided into two different groups:<br />
• Common capabilities (vendor independent capabilities)<br />
• Vendor dependent capabilities<br />
Common capabilities shall be always sent in the messages. They are sent by means of a variable-length set of fields,<br />
whose contents <strong>and</strong> meaning will be determined by the protocol.<br />
The vendor dependent capabilities shall be divided themselves in capabilities associated with:<br />
• Chip version.<br />
• Reference design.<br />
• Firmware.<br />
Common capabilities shall not require a division among chip, firmware or reference design related capabilities,<br />
because these capabilities shall be the same for all types of nodes <strong>and</strong> vendors.<br />
On the other h<strong>and</strong>, vendor dependent capabilities shall be divided into the three described sections, because a<br />
solution may present different vendors for each part of the system; one vendor for the chip, other for the firmware<br />
<strong>and</strong> a third one for the reference design, <strong>and</strong> each vendor may sent its own information inside the vendor dependent<br />
section.<br />
The Maximum Capabilities section of the MAX_CAP_MSG message shall follow this division also, with two main<br />
sections, where the first one shall be the common capabilities section <strong>and</strong> the second one the vendor dependent<br />
section.<br />
The common capabilities section shall be simply composed by a first field of length in bytes, <strong>and</strong> a second variablelength<br />
field that shall include the fields that will be determined by the protocol. There are up to 64 entries in the<br />
NCT <strong>and</strong> PCT for common capabilities.<br />
The vendor dependent capabilities section shall be subdivided into three main subsections: Chip, Reference Design<br />
<strong>and</strong> Firmware. For each subsection, two possible schemes of sending capabilities shall be allowed: Indexed <strong>and</strong><br />
Enumerated.<br />
When using the Indexed scheme, it is only required to send a part of sender’s NCT to fill the entire NCT in the<br />
receiver.<br />
The second one shall be simply an enumeration of each of the capabilities that a node has.<br />
Submission page 222 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
An indexed section shall be simply an enumeration covering only the minimum possible set of capabilities. This<br />
minimum set shall depend on the vendor. The proposed set is the following:<br />
Section Set of capabilities to be an index<br />
Chip Chip Vendor<br />
Chip Version<br />
Reference Design RD Vendor<br />
RD Family<br />
RD Version<br />
Firmware FW Vendor<br />
FW Family<br />
FW Version<br />
Table 29 Proposed vendor dependent capabilities indexes<br />
As the vendor may be different for each section, it shall be indicated in each of the sections.<br />
The number of enumerated capabilities may change from node to node depending on the version of each one, but<br />
the capabilities order shall remain the same.<br />
The following figure presents an example of Maximum Capabilities section, where N sets of capabilities are sent.<br />
Inside each set, the three sections described below can be found, <strong>and</strong>, in this example, the enumerated mode is used,<br />
containing all the proposed fields. The common section is empty, because the contents <strong>and</strong> meaning of its fields are<br />
not determined yet. As a result, the length_of the common field is set to 0:<br />
Submission page 223 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
MSG_TYPE = 0x1<br />
#CAPSET = N<br />
L<strong>MAC</strong>_SET<br />
LENGTH_COMMON_SET<br />
COMMON_CAP_1<br />
COMMON_CAP_2<br />
…<br />
COMMON_CAP_i<br />
LENGTH_CHIP_SET<br />
CHIP_VENDOR<br />
CHIP_CAP_1<br />
CHIP_CAP_2<br />
…<br />
CHIP_CAP_j<br />
Figure 103 MAX_CAP_MSG structure for N sets using enumerated mode<br />
In the following table, each field of the message is described:<br />
LENGTH_RD_SET<br />
RD_VENDOR<br />
RD_CAP_1<br />
RD_CAP_2<br />
…<br />
RD_CAP_k<br />
LENGTH_FW_SET<br />
FW_VENDOR<br />
FW_CAP_1<br />
Field Name Length (in<br />
bytes)<br />
FW_CAP_2<br />
…<br />
FW_CAP_l<br />
Default<br />
Value<br />
Submission page 224 UPA-OPERA<br />
L<strong>MAC</strong>_SET<br />
LENGTH_COMMON_SET<br />
COMMON_CAP_1<br />
Description<br />
COMMON_CAP_2<br />
…<br />
COMMON_CAP_i<br />
LENGTH_CHIP_SET<br />
MSG_TYPE 1 0x1 MAX_CAP_MSG message<br />
#CAP_SET 1 1 Number of capabilities sets included<br />
in this message<br />
L<strong>MAC</strong>_SET 6 - <strong>MAC</strong> address of the node that can<br />
perform the capabilities described in<br />
the message<br />
LENGTH_COMMON 1 0 Length of the common capabilities<br />
section. Set to 0 until the common<br />
capabilites are determined by the<br />
protocol.<br />
COMMON_CAP_i - - Common capabilities. To be<br />
determined.<br />
LENGTH_CHIP 1 1 Number of bytes, excluding the<br />
LENGTH_CHIP field that are<br />
included in the CHIP section of the<br />
message<br />
CHIP_VENDOR 1 - Chip vendor. To be determined.<br />
CHIP_CAP_j - - Other Chip related capabilities<br />
(vendor dependent). To be<br />
CHIP_VENDOR<br />
CHIP_CAP_1<br />
CHIP_CAP_2<br />
…<br />
CHIP_CAP_j<br />
LENGTH_RD_SET<br />
RD_VENDOR<br />
RD_CAP_1<br />
RD_CAP_2<br />
…<br />
RD_CAP_k<br />
LENGTH_FW_SET<br />
FW_VENDOR<br />
FW_CAP_1<br />
FW_CAP_2<br />
…<br />
FW_CAP_l
4-June-07 P1901_PRO_016_r0<br />
determined.<br />
LENGTH_RD 1 1 Number of bytes, excluding the<br />
LENGTH_RD field that are<br />
included in the REFERENCE<br />
DESIGN section of the message<br />
RD_VENDOR 1 - Reference Design vendor. To be<br />
determined.<br />
RD_CAP_k - - Other Reference Design related<br />
capabilities (vendor dependent). To<br />
be determined.<br />
LENGTH_FW 1 1 Number of bytes, excluding the<br />
LENGTH_FW field that are<br />
included in the FIRMWARE<br />
section of the message<br />
FW_VENDOR 1 - Firmware vendor. To be<br />
determined.<br />
FW_CAP_l - - Other Firmware related capabilities<br />
(vendor dependent). To be<br />
determined.<br />
Table 30 MAX_CAP_MSG message fields<br />
In the following figure, an example of transmission of N sets of maximum capabilities using indexed scheme in all<br />
three sections is shown. It should be kept in mind that the indexed scheme can be set individually to each section<br />
<strong>and</strong> set, <strong>and</strong> that is applied only to the vendor dependent sections.<br />
1 byte<br />
MSG_TYPE = 0x1<br />
#CAPSET = N<br />
L<strong>MAC</strong>_SET<br />
LENGTH_COMMON_SET<br />
COMMON_CAP_1<br />
Maximum Capabilities of Set 1 Maximum Capabilities of Set N<br />
COMMON_CAP_2<br />
…<br />
COMMON_CAP_i<br />
LENGTH_CHIP_SET<br />
CHIP_VENDOR<br />
CHIP_VERSION<br />
LENGTH_RD_SET<br />
RD_VENDOR<br />
RD_FAMILY<br />
RD_VERSION<br />
LENGTH_FW_SET<br />
FW_VENDOR<br />
FW_FAMILY<br />
FW_VERSION<br />
Figure 104 Example of Maximum Capabilities exchange using the indexed shceme for every subsection<br />
Submission page 225 UPA-OPERA<br />
L<strong>MAC</strong>_SET<br />
LENGTH_COMMON_SET<br />
COMMON_CAP_1<br />
COMMON_CAP_2<br />
…<br />
COMMON_CAP_i<br />
LENGTH_CHIP_SET<br />
CHIP_VENDOR<br />
CHIP_VERSION<br />
LENGTH_RD_SET<br />
RD_VENDOR<br />
RD_FAMILY<br />
RD_VERSION<br />
LENGTH_FW_SET<br />
FW_VENDOR<br />
FW_FAMILY<br />
FW_VERSION
4-June-07 P1901_PRO_016_r0<br />
RUN_CAP_MSG message<br />
This message shall contain information about the capabilities that a node is running at that time. Additionally, by<br />
means of the MESSAGE_MODE field, a change of previous sent running capabilities can be indicated. Four are the<br />
supported message modes that apply only to a running capabilities set from a concrete node:<br />
Info mode with ACK: Indicates that the following sections contain information about the maximum <strong>and</strong> running<br />
capabilities, <strong>and</strong> that an ACK is required for this message.<br />
Info mode without ACK: Indicates that the following sections contain information about the maximum <strong>and</strong> running<br />
capabilities, <strong>and</strong> that NO ACK is required for this message.<br />
Change Mode with ACK: Indicates that the running capabilities have changed <strong>and</strong> are sent in the following section.<br />
An ACK of this message is expected by the sender.<br />
Change Mode without ACK: Indicates that the running capabilities have changed <strong>and</strong> are sent in the following<br />
section. No ACK of this message is expected by the sender.<br />
The running capabilities are transmitted by means of a field that indicates what is the default value for the<br />
capabilities that are not included explicitly in this message (highest possible capability of the node or lower possible<br />
capability of the node), <strong>and</strong> several two fields groups where the first one is a reference to a capability in the NCT<br />
(including section <strong>and</strong> position) <strong>and</strong> the second field is the value related to this capability. The number of groups<br />
describing each of the running capabilities that are different from the default value shall be set in the<br />
NUM_RUN_CAP field.<br />
If a value for a capability is longer than a byte, the same reference shall be sent followed by the first byte, then the<br />
same reference followed by the second byte <strong>and</strong> so on, up to complete the number of desired bytes for the capability<br />
value.<br />
In the following figure it is shown an example of a Running Capability section carrying running capabilities from N<br />
nodes, where the first set contain an explicit description of three running capabilities <strong>and</strong> the Nth set contains a<br />
description of four running capabilities.<br />
MSG_TYPE = 0x2<br />
#CAP_SET = N<br />
L<strong>MAC</strong>_SET<br />
MSG__MODE<br />
DEF_MODE<br />
#RUN_CAP<br />
CAP_REF_1<br />
CAP_VALUE_1<br />
CAP_REF_2<br />
CAP_VALUE_2<br />
...<br />
Figure 105 Example of Running Capability Section<br />
CAP_REF_i<br />
CAP_VALUE_i<br />
Submission page 226 UPA-OPERA<br />
L<strong>MAC</strong>_SET<br />
MSG__MODE<br />
DEF_MODE<br />
#RUN_CAP<br />
CAP_REF_1<br />
CAP_VALUE_1<br />
CAP_REF_2<br />
CAP_VALUE_2<br />
...<br />
CAP_REF_i<br />
CAP_VALUE_1
4-June-07 P1901_PRO_016_r0<br />
Field Name Length (in<br />
bytes)<br />
Default<br />
Value<br />
Description<br />
MSG_TYPE 1 0x2 RUN_CAP_MSG message<br />
#CAP_SET 1 1 Number of Running Capabilities<br />
individually described<br />
L<strong>MAC</strong>_SET 6 - <strong>MAC</strong> address of the node that is<br />
performing the capabilities<br />
described in the message<br />
MSG_MODE 1 0 0 – INFO message with ACK<br />
1 – INFO message without ACK<br />
2 – Change notification message<br />
with ACK<br />
3 – Change notification message<br />
without ACK<br />
DEF_MODE 1 0 0 – Highest Possible<br />
1 – Lower Possible<br />
#RUN_CAP 1 1 Number of running capabilities that<br />
will be described in this message<br />
CAP_REF_i 1 0 Bits 1 to 0:<br />
00 – Common Section<br />
01 – Chip Section<br />
10 – Reference Design Section<br />
Submission page 227 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
11 – Firmware Section<br />
Bits 7 to 2: Position of the<br />
capability in the section of the NCT<br />
CAP_VALUE_i 1 - Value of the referenced capability<br />
Table 31 RUN_CAP_MSG message fields<br />
ACK_CAP_ANN message<br />
MSG_TYPE = 0x4<br />
#CAP_ACK = N<br />
L<strong>MAC</strong>_ACK_1<br />
L<strong>MAC</strong>_ACK_2<br />
Figure 106 ACK_CAP_ANN message structure<br />
The structure of the ACK_CAP_ANN message is very simple. It shall be composed by a first field, 1 byte wide,<br />
with the number of ACKs that composes the message, followed by the <strong>MAC</strong> addresses of the nodes whose<br />
capabilities have been received correctly.<br />
Field Name Length (in<br />
bytes)<br />
Default<br />
Value<br />
Submission page 228 UPA-OPERA<br />
L<strong>MAC</strong>_ACK_N<br />
Description<br />
MSG_TYPE 1 0x4 ACK_CAP_ANN message<br />
#CAP_ACK 1 1 Number of ACKs contained in the<br />
message
4-June-07 P1901_PRO_016_r0<br />
L<strong>MAC</strong>_ACK_i 6 - <strong>MAC</strong> address of the node whose<br />
capabilities have been received<br />
corretly<br />
Table 32 ACK_CAP_ANN message fields<br />
NACK_CAP_ANN message<br />
MSG_TYPE = 0x8<br />
#CAP_NACK = N<br />
L<strong>MAC</strong>_NACK_1<br />
NACK_SECTION_1<br />
L<strong>MAC</strong>_NACK_2<br />
Figure 107 NACK_CAP_ANN message structure<br />
NACK_SECTION_2<br />
The structure of the NACK_CAP_ANN message is very simple. It shall be composed by a first field, 1 byte wide,<br />
with the number of NACKs that composes the message, followed by the <strong>MAC</strong> addresses of the nodes whose<br />
capabilities have not been received correctly. After each L<strong>MAC</strong> field, the NACK_SECTION field, 1 byte wide,<br />
containing the section that has not been correctly decoded shall be included.<br />
Field Name Length (in<br />
bytes)<br />
Default<br />
Value<br />
Description<br />
MSG_TYPE 1 0x8 NACK_CAP_ANN message<br />
#CAP_NACK 1 1 Number of NACKs contained in the<br />
message<br />
L<strong>MAC</strong>_NACK_i 6 - <strong>MAC</strong> address of the node whose<br />
capabilities have NOT been<br />
received correctly<br />
Submission page 229 UPA-OPERA<br />
L<strong>MAC</strong>_NACK_N<br />
NACK_SECTION_N
4-June-07 P1901_PRO_016_r0<br />
NACK_SECTION_i 1 - Bit 0: if set to 1 means that CHIP<br />
section not correctly decoded.<br />
Table 33 NACK_CAP_ANN message fields<br />
Aggregated messages<br />
Bit 1: if set to 1 means that<br />
REFERENCE DESIGN section not<br />
correctly decoded.<br />
Bit 2: if set to 1 means that<br />
FIRMWARE section not correctly<br />
decoded.<br />
In order to make the protocol more efficient, a message aggregation can be performed. It shall consist on changing<br />
the MSG_TYPE field code by the aggregation of up to three different messages types, as shown in Table 38. The<br />
order of the submessages in the final structure shall follow the scheme presented in the following figure, where<br />
some examples are proposed:<br />
Submission page 230 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
1 byte<br />
Figure 108 Agregated protocol messages <strong>and</strong> its MSG_TYPE codes<br />
It must be stated that, in each of the submessages, the MSG_TYPE field shall be deprecated <strong>and</strong> substituted by the<br />
new MSG_TYPE content at the beginning of the resulting message.<br />
Node Capability Table<br />
The Node Capability Table shall be resident in each node <strong>and</strong> contains, indexed by <strong>MAC</strong> address, the maximum<br />
<strong>and</strong> running capabilities of each of the known nodes.<br />
Each node shall contain a NCT per known node in the network, indexed by <strong>MAC</strong> address. This table shall contain<br />
four different sections each one with specific fields:<br />
Common capabilities section<br />
Chip section<br />
Reference design<br />
Submission page 231 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Firmware<br />
In each section, for each of the possible capabilities, two fields have to be filled. The first one shall be the maximum<br />
capability the node can perform. The second one shall be the real level of such capability that is performing at that<br />
time.<br />
Common capabilities section<br />
For the moment, this part of the table is empty, until the common capabilites are determined by the st<strong>and</strong>ard. The<br />
index shall be used to make a reference to a capability when transmitting the running capabilities as described in<br />
section 0.<br />
Chip related fields<br />
In the following table, the fields index, field name, length, default value <strong>and</strong> description, are presented. The index<br />
shall be used to make a reference to a capability when transmitting the running capabilities as described in section 0.<br />
Index Field Name Length<br />
(in bits)<br />
Default<br />
Value<br />
Description<br />
1 Chip Vendor 8 - Chip vendor. To be<br />
determined.<br />
2 Chip Capability j - - Other Chip related<br />
capabilities (vendor<br />
dependent). To be<br />
determined.<br />
Table 34 Chip related fields<br />
…<br />
Reference Design related fields<br />
In the following table, the fields index, field name, length, default value <strong>and</strong> description, are presented. The index<br />
shall be used to make a reference to a capability when transmitting the running capabilities as described in section 0.<br />
Submission page 232 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Index Field Name Length<br />
(in bits)<br />
Default<br />
Value<br />
Description<br />
1 RD Vendor 8 - Reference Design vendor.<br />
To be determined.<br />
2 RD Capability k - - Other Reference Design<br />
related capabilities (vendor<br />
dependent). To be<br />
determined.<br />
…<br />
Table 35 Reference Design related fields<br />
Firmware related fields<br />
In the following table, the fields index, field name, length, default value <strong>and</strong> description, are presented. The index<br />
shall be used to make a reference to a capability when transmitting the running capabilities as described in section 0.<br />
Index Field Name Length<br />
(in bits)<br />
Default<br />
Value<br />
Description<br />
1 FW Vendor 8 - Firmware vendor. To be<br />
determined.<br />
2 FW Capability l - - Other Firmware related<br />
capabilities (vendor<br />
dependent). To be<br />
determined.<br />
…<br />
Table 36 Firmware related fields<br />
Performed Capability Table<br />
Submission page 233 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
The PCT shall contain, for each possible capability, a value that indicates if the capability is performed or not, <strong>and</strong><br />
the grade of functionality that is running at the time.<br />
The PCT shall also be divided into four sections corresponding to the above mentioned groups of capabilities:<br />
Common, Chip, Reference Design <strong>and</strong> Firmware related.<br />
The common capabilities section is empty until a decision on which capabilities must be considered common for all<br />
vendors is reached. The table is structured as follows:<br />
Capability Section Index Value Default<br />
High<br />
Value<br />
Chip Vendor Chip<br />
Related<br />
1 - - -<br />
Chip Capability<br />
j<br />
…<br />
2 - - -<br />
RD Vendor RD<br />
Related<br />
1 - - -<br />
RD Capability k 2 - - -<br />
…<br />
FW Vendor FW<br />
Related<br />
1 - - -<br />
FW Capability l 2 - - -<br />
…<br />
Table 37 PCT values for the proposed capabilities<br />
Default<br />
Low<br />
Value<br />
As the RUN_CAP_MSG is decoded, the position in the PCT shall be located using the CAP_RUN_REF field<br />
content, <strong>and</strong> then, the correspondent value shall be extracted from the following field called CAP_VALUE. After<br />
Submission page 234 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
decoding all the pairs CAP_RUN_REF/CAP_VALUE, some entries in the value column of the PCT may be empty.<br />
Then, depending on the DEF_MODE, the capabilities shall be set to the default high or default low value.<br />
An optimal implementation of both tables should reduce them up to a simple one, because both tables are indexed<br />
by <strong>MAC</strong> address <strong>and</strong> the capabilities are the same. They are presented separately for the sake of clarity.<br />
Capabilities Exchange protocol stages <strong>and</strong> modes<br />
Several capability publishing modes are available. They can be indicated using a local variable in each node<br />
(CAP_PUBLICATION_MODE ):<br />
Single Node Publication: only the capabilities of the node that transmits the MAX_CAP_MSG(xxx) message shall<br />
be included in such message. CAP_PUBLICATION_MODE shall be set to 1.<br />
All Known Nodes Publication: All the capabilities from every node known by the transmitter of the<br />
MAX_CAP_MSG(xxx) message, including their own capabilities, shall be included in the message.<br />
CAP_PUBLICATION_MODE shall be set to 2.<br />
No Capability Publication: No MAX_CAP_MSG(xxx) message will be transmitted. CAP_PUBLICATION_MODE<br />
shall be set to 0. This mode should not be used.<br />
The preferred mode should be the Single Node Publication because of its simplicity.<br />
The Capabilities Exchange protocol shall start each time a new node is discovered <strong>and</strong> a data link is established with<br />
it. If the NCT related with such node is empty, or incomplete, then the message exchange shall begin. Otherwise, no<br />
operation shall be performed.<br />
Packet format<br />
The Port Solver protocol is extended to include the exchange of capabilities information.<br />
Port Solver packet expansion<br />
The Port Solver Message (PSM) is defined previously as follows:<br />
Submission page 235 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Dest <strong>MAC</strong><br />
Src <strong>MAC</strong><br />
Figure 109 Port Solver Message structure<br />
TPID<br />
TCI<br />
Length<br />
0xAA<br />
0xAA<br />
0x3<br />
0x00<br />
0x13<br />
Submission page 236 UPA-OPERA<br />
0x9D<br />
0x02<br />
The destination <strong>and</strong> source <strong>MAC</strong> addresses of the packets shall be filled as all the Port Solver messages: in the Dest<br />
<strong>MAC</strong>, the Spanning tree <strong>MAC</strong> (0x0180C2000000), <strong>and</strong> in the src <strong>MAC</strong> the <strong>MAC</strong> address of the node that<br />
originates the message.<br />
The PSM message is extended to include also CapE messages. Therefore, it is used a special content for the INFO<br />
field. Then, if a node detects a PSM with an INFO field with the bits 1 to 4 set to something different from zero, it<br />
shall assume that the PSM includes also a CapE message.<br />
The values of bits 1 to 4 of the INFO field <strong>and</strong> the message sent is shown in the following table:<br />
Message INFO[4:1]<br />
PSM without capabilities information 0x0<br />
MAX_CAP_MSG 0x1<br />
RUN_CAP_MSG 0x2<br />
ACK_CAP_ANN 0x4<br />
NACK_CAP_ANN 0x8<br />
MAX_CAP_MSG+RUN_CAP_MSG 0x3<br />
MAX_CAP_MSG+RUN_CAP_MSG+ACK_CAP_ANN 0x7<br />
0x01<br />
Source <strong>MAC</strong><br />
Destination <strong>MAC</strong><br />
Assigned LP<br />
Info
4-June-07 P1901_PRO_016_r0<br />
MAX_CAP_MSG+RUN_CAP_MSG+ACK_CAP_ANN+NACK_CAP_ANN 0xF<br />
MAX_CAP_MSG+ACK_CAP_ANN 0x5<br />
MAX_CAP_MSG+ACK_CAP_ANN+ NACK_CAP_ANN 0xD<br />
MAX_CAP_MSG+NACK_CAP_ANN 0x9<br />
MAX_CAP_MSG+RUN_CAP_MSG+NACK_CAP_ANN 0xB<br />
RUN_CAP_MSG+ACK_CAP_ANN 0x6<br />
RUN_CAP_MSG+NACK_CAP_ANN 0xA<br />
RUN_CAP_MSG+ACK_CAP_ANN+NACK_CAP_ANN 0xE<br />
ACK_CAP_ANN+NACK_CAP_ANN 0xC<br />
Table 38 Message type <strong>and</strong> content of bits 1-3 of INFO field in PSM<br />
In case of composed messages, the order of each message in the final structure shall be, from left to right, the same<br />
as the shown in the table.<br />
The INFO field shall remain as follows:<br />
Figure 110 INFO field<br />
Port Solver protocol flow expansion<br />
First stage of the Capabilities Exchange protocol<br />
Submission page 237 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
The Port Solver protocol is exp<strong>and</strong>ed repeating the ports information <strong>and</strong> including CapE information.<br />
As a result, the Port Solver protocol becomes a more reliable port exchange method, due to the inclusion of an ACK<br />
for each trasaction.<br />
Therefore, the message exchange shall be as the one shown in the following figures for the described cases:<br />
Submission page 238 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 111 Compressed normal work using Port Solver Protocol. All indexes recognized.<br />
Figure 112 Normal asynchronous work using PSM. All indexes recognized.<br />
Submission page 239 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 113 Normal work using PSM. Some indexes not recognized.<br />
Submission page 240 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 114 Normal work using PSM. Not all indexes recognized. MAX_CAP_MSG lost.<br />
Submission page 241 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 115 Normal work. Not all indexes recognized. NACK_CAP_INDEX lost.<br />
Submission page 242 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 116 Normal work. Not all indexes recognized. ACK_CAP_ANN lost.<br />
Submission page 243 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 117 Compressed work using PSM. All indexes recognized. MAX_CAP_MSG+ACK_CAP_ANN lost.<br />
Second stage of the Capabilities Exchange protocol<br />
This second stage is asynchronous with the PSP messages, because it depends on when a node decides to change its<br />
running capabilities.<br />
Submission page 244 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
The running capabilities message shall be the same as the one used in the first stage of the protocol, just repeating<br />
the previously negotiated ports in its content.<br />
The RUN_CAP_MSG may expect or not an ACK from its destination, depending on the content of the<br />
MESSAGE_MODE field, as described in section 0.<br />
When a broadcast destination address is used, a dummy port named 255, which will be ignored by the receiver,<br />
shall be set in the message.<br />
The protocol behaviour in the case of RUN_CAP_MSG with an ACK required is described in the following figures:<br />
Submission page 245 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 118 Running capabilities change <strong>and</strong> associated protocol. Normal mode.<br />
Submission page 246 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 119 Running capabilities change <strong>and</strong> ACK_CAP_ANN loss<br />
Submission page 247 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 120 Running capabilities change <strong>and</strong> RUN_CAP_MSG loss<br />
Adding a new capability<br />
To add a new capability, a new entry shall be added in the adequate NCT section <strong>and</strong> assigned to it a high <strong>and</strong> low<br />
default value, <strong>and</strong> an index. The index shall be formed by two bits that indicate the section where the new<br />
Submission page 248 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
capabilitity is included (Common, Chip, Reference Design or Firmware) <strong>and</strong> a number that shall be consecutive to<br />
the last assigned. In the case of a capability that belongs to a vendor dependent section, it shall be the vendor who<br />
assigns a new index number to the new capability. In case of the common section, the new capabilities will be<br />
determined by the protocol.<br />
In case the new capability needs more than one byte to inform about its status, this information shall be sent byte by<br />
byte with the uniqe filed index preceding each byte.<br />
The new capability shall be sent in the same order that has been assigned in the NCT in the enumerated<br />
MAX_CAP_MSG(000) messages, <strong>and</strong> using its index <strong>and</strong> section in the RUN_CAP_MSG messages.<br />
Cluster Discovery Protocol<br />
The use of the Cluster Discovery Protocol (from here onwards, CDP) is limited to TDRs. Its use is not m<strong>and</strong>atory.<br />
The non-use of this protocol will result in the impossibility of its master to send non-returnable tokens.<br />
A master must be able to determine if the nodes that are hanging from it may be divided in isolated clusters. In order<br />
to achieve this it is necessary for every alive node to transmit information in the upstream direction, in order to<br />
know which nodes are visible for each node. This is achieved through the Cluster Discovery Protocol. This protocol<br />
also gives information of the exact network topology.<br />
CPEs are already sending the information regarding which nodes are visible with the periodic Announce Messages<br />
(see 9.1.4.4). They do not need to send any other information in the upstream.<br />
However, a TDR X needs to send the following information to their masters:<br />
List of nodes that are visible from X (this would be the same as the information in the periodic Announce Message<br />
sent by X);<br />
List of nodes that belong to its BPL subtree: this includes CPEs <strong>and</strong> TDRs which are under the direct or indirect<br />
control of X;<br />
List of nodes external to the BPL subtree of X that are visible from all the nodes belonging to its BPL subtree.<br />
In order to transmit the information in points 2 <strong>and</strong> 3 the Cluster Discovery Protocol is used. This protocol simply<br />
consists in the periodic transmission from a TDR to its master of all this information. The information is recursive,<br />
because in order to form this packet, the TDR must have previously received the information from its slaves in<br />
order to include it.<br />
The protocol will start in the first TDR (the one with only end-users hanging from it), once it has received at least<br />
one Periodic Announce Message from all of its slaves. The TDR will recollect this information, <strong>and</strong> send to its<br />
master a new packet. Every TDR in the chain will repeat this. Any TDR as well as the Head End might use the<br />
Submission page 249 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
information received to determine that there are isolated clusters, <strong>and</strong> that it can perform spatial reuse by the use of<br />
the non-returnable token (see 4.4.2.9)<br />
Cluster Discovery Protocol message format<br />
The CDP Message is encapsulated using the CCP with Type0 0x0a <strong>and</strong> Type1 0x01 (Figure 102). The CDP packet<br />
will be sent through unicast port, as it is specifically addressed to the master node. The destination <strong>MAC</strong> will be the<br />
master node destination <strong>MAC</strong>.<br />
TPID<br />
0xAA<br />
0xAA<br />
0x03<br />
0x00<br />
0x13<br />
0x9D<br />
0x0A<br />
0x01<br />
Length<br />
Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />
TCI<br />
Figure 121 Cluster discovery packet format<br />
Cluster Discovery Protocol Data<br />
The information can be fragmented in several packets (identified by a sub-table number) if the entries do not fit in<br />
one.<br />
The CDP data fields are:<br />
Bytes CDP data fields Length<br />
0 Sub-table number 1 bytes<br />
1 Number of sub-tables 1 bytes<br />
2 Number of entries of the sub-table 1 byte<br />
3 – 8 Sender <strong>MAC</strong> address 6 byte<br />
9 Entry size (in bytes) 1 byte<br />
10 - 521 Entries 512 bytes<br />
Submission page 250 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Table 39 Cluster discovery packet fields<br />
Maximum<br />
The Entries in the above table have the following format, although they could be extended:<br />
Table 40 Cluster discovery entries<br />
The Dependency field will be set to 1 if the corresponding <strong>MAC</strong> belongs to the same BPL subtree. Otherwise, it<br />
will be set to 0.<br />
The Cluster Discovery Protocol packet shall be sent at least when changes in the topology <strong>and</strong> visibility are<br />
detected; nevertheless this information can be transmitted periodically.<br />
To increase the packet intelligibility <strong>and</strong> to simplify the subsequent algorithms, the order of the entries in a sub-table<br />
<strong>and</strong> the order of sub-tables in the CDP packet are predetermined:<br />
In a sub-table, all entries belonging to the same BPL subtree shall appear together <strong>and</strong> at the beginning of the subtable,<br />
after them, there will be entries with only visibility dependency.<br />
Every TDR shall place its sub-table at the beginning of the CDP packet <strong>and</strong> encapsulate the CDP packets received<br />
from other TDRs, slaves of its, without altering their sub-table order. There is no restriction in the order how the<br />
CDP packets received from TDRs belonging to the same hierchary level shall be encapsulated.<br />
Connection Admission <strong>Control</strong> Protocol (CAC)<br />
The Connection Admission <strong>Control</strong> Protocol Messages are sent whenever one or several new flow(s) register into<br />
the BPL network to reserve the type of traffic that should be assigned, <strong>and</strong> also when there are changes in the traffic<br />
requirements for any of the flows, so that new resources can be committed or released. If reservation parameters<br />
change during the duration of the current session, an update of the parameters is necessary.<br />
There are six types of CAC messages:<br />
Entry fields Length<br />
<strong>MAC</strong> address 6 bytes<br />
Dependency 1 byte<br />
CAC_Req : Request to the master for the desired resources.<br />
Submission page 251 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
CAC_Rsp ; Reponse from the master.<br />
CAC_Chg ; Inform the master of a change in the allocated resources.<br />
CAC_Chg_Rsp ; Contains the response to a CAC_Req.<br />
CAC_Drp: Master or Repeater tells a node it shall cancel its reservation.<br />
CAC_Stp: Inform the FMN that a traffic flow has stopped (thus that its resources can be freed).<br />
Flow Master Node (FMN) is defined as the BPL node in charge of guarantee QoS requirement for a registered<br />
flow. All CAC_Req messages are transmitted from the source node which request flow to the BPL subcell master of<br />
the node. This request may be propagated to the HE, in this situation FMN of the requested flow will be network<br />
HE, or could be blocked by an intermediate node if this node decides to be the FMN of the requested flow.<br />
Destination <strong>MAC</strong> address of CAC messages:<br />
CAC_Req/CAC_Chg/CAC_Stp messages are transmitted by a BPL node <strong>and</strong> it shall be addressed to its BPL<br />
subcell master, these messages will be propagated in the network hop by hop until arrive to the FMN of the flow.<br />
These messages have as source <strong>MAC</strong> the <strong>MAC</strong> of the node that request the flow <strong>and</strong> as destination <strong>MAC</strong> the <strong>MAC</strong><br />
of the BPL subcell master.<br />
CAC_Rsp/CAC_Chg_Rsp/CAC_Drp messages are transmitted by the FMN in downstream to the node which<br />
request the flow. CCP source address will be the <strong>MAC</strong> of the FMN <strong>and</strong> the destination <strong>MAC</strong>, the address of the<br />
directly connected slave that is part of the requested flow.<br />
CAC_Req<br />
The CAC_Req message is transmitted to request QoS Resources to be committed in order to satisfy the agreed<br />
quality parameters. It may be originated from any node except network HE. There are two subtypes Slave<br />
CAC_Req <strong>and</strong> Master CAC_Req.<br />
CAC_Req sequence is triggered by a CPE or Repeater node upon detection of a specific flow or statically after node<br />
configuration. A node requesting resources must trigger a CAC_Req sequence by sending a CAC_Req message to<br />
its master node. Master node then decides if can guarantee requested flow <strong>and</strong> can reply the request with a<br />
CAC_Rsp message, in this case Master node will become the FMN of the requested flow (the node that should<br />
guarantee flow requirements). In order to guarantee requested flow guarantees, FMN can trigger a new CAC_Req<br />
message to its master or use existing resources to guarantee the flow.<br />
If a node decides to be the FMN of a specific user flow, it must be the FMN of the totality of flows for this user.<br />
Submission page 252 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
A node that decides to be a FMN of a flow shall select a session ID for this flow <strong>and</strong> communicate this session ID to<br />
all the nodes that are part of the flow path using a CAC_Rsp message.<br />
CAC_Req packet contains the list of traffic from one node requesting resources.<br />
Figure 122 CAC Req Message<br />
Information present in this packet (<strong>and</strong> in the reply) will be needed by any nodes present between the node requester<br />
<strong>and</strong> FMN.<br />
Bytes CAC_Req data fields Length<br />
0 Entry Length in bytes 1 byte<br />
1 Num entries 1 byte<br />
2-<br />
Num_entries*Entry_Length+2<br />
CAC_Req Entry Field 19 bytes<br />
Num_entries*Entry_Length+3 Num hop 1 byte<br />
Num_entries*Entry_Length+4<br />
- 9<br />
Table 41 CAC_Req Data Fields<br />
Mac i 6 bytes<br />
Mac i + 1 6 bytes<br />
NumHop : Initially set to 0, each node taking part of the path between the requester node <strong>and</strong> the FMN should<br />
increment this number <strong>and</strong> place its Mac in the locations reserved below. If NumHop reaches 255, no further<br />
increment is performed.<br />
Submission page 253 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Mac i : Macs of nodes taking part of the path from the requester node to the FMN. It is necessary to know the path<br />
to send the reply packet from the FMN to the requester node.<br />
Data Field Description Size (Bytes)<br />
Mac SrcReq <strong>MAC</strong> of the requester node 6<br />
Mac DstReq <strong>MAC</strong> of the destination<br />
traffic flow<br />
Request ID <strong>MAC</strong> source of the request<br />
<strong>and</strong> the request ID form a<br />
unique identifier of the<br />
request. If a CAC_Req<br />
message is lost but resource<br />
has been partially allocated in<br />
some nodes of the flow path,<br />
request should be resent again<br />
after a timeout<br />
(MAX_CAC_TO). Resources<br />
shall not be allocated again.<br />
Service Class Service Class of the traffic<br />
flow<br />
Latency<br />
(ms)<br />
Latency requirements of the<br />
flow<br />
B<strong>and</strong>width B<strong>and</strong>width requested 2<br />
Table 42 CAC_Req Message Entry Field<br />
CAC_Rsp<br />
Submission page 254 UPA-OPERA<br />
6<br />
1<br />
1<br />
2
4-June-07 P1901_PRO_016_r0<br />
The CAC_Rsp message is transmitted by a FMN to accept or deny requested resources. This packet is sent by the<br />
master <strong>and</strong> is destined to the requester but will go down throughTDRs placed on the way (if they exist).<br />
Figure 123 CAC Rsp Message<br />
The CAC Reservation Response payload must have the following fields:<br />
Bytes CAC_Rsp data fields Length<br />
0 Entry Length in bytes 1 byte<br />
1 Num entries 1 byte<br />
2 -<br />
Num_entries*Entry_Length+2<br />
CAC_Rsp Entry Field 19 bytes<br />
Num_entries*Entry_Length+3 Num hop 1 byte<br />
Num_entries*Entry_Length+4<br />
-<br />
Num_entries*Entry_Length+9<br />
Table 43 CAC_Rsp Data Fields<br />
Mac i 6 bytes<br />
Mac i + 1 6 bytes<br />
Submission page 255 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
And each entry of CAC Reservation Response must have the following fields:<br />
Data Field Description Size (Bytes)<br />
Mac SrcReq <strong>MAC</strong> of the requester node 6<br />
Mac DstReq <strong>MAC</strong> of the destination<br />
traffic flow<br />
Ack Status (accepted or not) of the<br />
flow based on calculation of<br />
available b<strong>and</strong>width <strong>and</strong><br />
b<strong>and</strong>width requested.<br />
Session ID Session ID assigned to this<br />
flow. Used if Ack status is<br />
accepted.<br />
Service Class Service Class of the traffic<br />
flow<br />
Latency<br />
(ms)<br />
Latency assigned 2<br />
B<strong>and</strong>width B<strong>and</strong>width assigned 2<br />
Table 44 CAC_Rsp Message Entry Field<br />
CAC_Chg<br />
Submission page 256 UPA-OPERA<br />
6<br />
1<br />
1<br />
1
4-June-07 P1901_PRO_016_r0<br />
CAC_Chg message must be used when:<br />
A resource parameter has changed <strong>and</strong> the node has to communicate the change to its FMN.<br />
If the FMN receives a Reservation Change from an open Session Id, it updates the resources requested, the FMN<br />
has to answer with a Reservation Change Confirmation Packet, indicating if the new resources requested are<br />
accepted or not. If the requester node does not receive the acknowledgement of the packet sent, when a timeout<br />
expires, it will send a new Reservation Change Packet.<br />
Figure 124 CAC Change Message<br />
The CAC Change payload must have the following fields:<br />
Table 45 CAC_Chg Data Fields<br />
Bytes CAC_Chg data fields Length<br />
0 Entry Length in bytes 1 byte<br />
1 Num Entries 1 byte<br />
2 -<br />
Num_entries*Entry_Length+2<br />
CAC_Chg Entry Field 3 bytes<br />
Submission page 257 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
And each entry of CAC Change must have the following fields:<br />
Data Field Description Size (Bytes)<br />
Session ID Session ID assigned to this<br />
flow.<br />
Latency Latency requirements of the<br />
flow<br />
B<strong>and</strong>width B<strong>and</strong>width requested 1<br />
Table 46 CAC_Chg Message Entry Field<br />
CAC_Chg_Rsp<br />
CAC_Chg_Rsp message is sent by the FMN of a flow to communicate if a flow has been correctly allocated.<br />
Figure 125 CAC Change Response Message<br />
The CAC Change payload must have the following fields:<br />
Submission page 258 UPA-OPERA<br />
1<br />
1
4-June-07 P1901_PRO_016_r0<br />
Bytes CAC_Chg_Rsp data fields Length<br />
0 Entry Length in bytes 1 byte<br />
1 Num Entries 1 byte<br />
2 -<br />
Num_entries*Entry_Length+2<br />
Table 47 CAC_Chg_Rsp Data Fields<br />
CAC_Chg Entry Field 3 bytes<br />
And each entry of CAC Change Response must have the following fields:<br />
Data Field Description Size (Bytes)<br />
Session ID Session ID assigned to this<br />
flow.<br />
ACK Status (accepted or not) of the<br />
flow based on calculation of<br />
available b<strong>and</strong>width <strong>and</strong><br />
b<strong>and</strong>width requested.<br />
Latency Latency assigned 2<br />
B<strong>and</strong>width B<strong>and</strong>width assigned 2<br />
Table 48 CAC Chg Rsp Entry Fields<br />
CAC_Drp<br />
Submission page 259 UPA-OPERA<br />
1<br />
1
4-June-07 P1901_PRO_016_r0<br />
In a congestion situation, the FMN has to deny resources even to an accepted Session Id. In this case, the FMN<br />
sends a Reservation Dropped Packet to indicate to a node that its traffic with the indicated Session Id has been<br />
dropped due to congestion.<br />
Figure 126 CAC Drop Message<br />
The CAC Drop payload must have the following fields:<br />
Table 49 CAC_Drp Data Fields<br />
Bytes CAC_Drp data fields Length<br />
0 Entry Length in bytes 1 byte<br />
1 Num Entries 1 byte<br />
2 CAC Drp Entry Field 1 byte<br />
And each entry of CAC Drop message must have the following fields:<br />
Data Field Description Size (Bytes)<br />
Submission page 260 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Table 50 CAC Drop Entry Fields<br />
CAC_Stp<br />
Session ID Session ID assigned to this<br />
flow.<br />
The reservation Stop must be used by requester nodes when:<br />
The node doesn’t transmit a flow anymore <strong>and</strong> informs the FMN that the resources allocated to its Session Id can be<br />
freed.<br />
The reservation Stop must be used by a node that is included in the flow path when:<br />
It detect that requester node is no longer connected to the node.<br />
CAC_Stp message doesn´t need to be confirmed by the FMN because requester node knows if FMN is trying to<br />
guarantee Session ID traffic (Node receives data tokens for this Session ID).In this case, node shall resend CAC_Stp<br />
message again after MAX_CAC_STP_TO time.<br />
Submission page 261 UPA-OPERA<br />
1
4-June-07 P1901_PRO_016_r0<br />
Figure 127 CAC Stop Message<br />
The CAC Stop payload must have the following fields:<br />
Table 51 CAC Stp Data Fields<br />
Bytes CAC_Stp data fields Length<br />
0 Entry Length in bytes 1 byte<br />
1 Num Entries 1 byte<br />
2 CAC Stp Entry Field 1 byte<br />
And each entry of CAC Stop message must have the following fields:<br />
Table 52 CAC Stp Entry Fields<br />
Data Field Description Size (Bytes)<br />
Session ID Session ID assigned to this<br />
flow.<br />
Connection Admission <strong>Control</strong> protocol scenarios.<br />
Submission page 262 UPA-OPERA<br />
1
4-June-07 P1901_PRO_016_r0<br />
Figure 128 CAC Protocol Scenario 1<br />
¡Error! No se encuentra el origen de la referencia. CPE Request resources to its direct master. REP node<br />
propagate CAC_Req message <strong>and</strong> the Network HE becomes the FMN of the flow. A session ID will be assigned by<br />
the HE to the flow in all the flow path.<br />
Figure 129 CAC Protocol Scenario 2<br />
¡Error! No se encuentra el origen de la referencia. REP node receives a CAC_Req message from a CPE. REP node<br />
decides to be the FMN of this flow because it has enough resources. CAC_Req message shall not be propagated to<br />
the HE.<br />
Submission page 263 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 130 CAC Protocol Scenario 3<br />
¡Error! No se encuentra el origen de la referencia. depicts a scenario where a CAC_Req packet does not reach the<br />
TDR, it is lost. After a MAX_CAC_TO time-out, the CAC_Req packet will be resent.<br />
Submission page 264 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
MAX_CAC_TO<br />
CPE TDR HE<br />
CAC_Req<br />
CAC_Rsp<br />
CAC_Req<br />
CAC_Rsp<br />
CAC_Req<br />
CAC_Rsp<br />
Figure 131 CAC Protocol Scenario 4<br />
Figure 131 Resources are partially allocated for a session ID. CAC_Req message shall be resent after<br />
MAX_CAC_TO timeout but REP shall not resend it because REP resources have been allocated previously, <strong>and</strong><br />
TDREP must send the CAC_Rsp with the session_id to the node<br />
Submission page 265 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
CPE TDR HE<br />
CAC_Req<br />
CAC_Rsp<br />
CAC_Stp<br />
CAC_Req<br />
CAC_Rsp<br />
CAC_Stp<br />
Figure 132 CAC Protocol Scenario 5<br />
Figure 132 Resources may be freed using CAC_Stp message. Message shall be propagated to FMN.<br />
Submission page 266 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
CPE TDR HE<br />
CAC_Req<br />
CAC_Rsp<br />
CAC_Stp<br />
MAX_CAC_STP_TO<br />
CAC_Stp<br />
CAC_Req<br />
CAC_Rsp<br />
CAC_Stp<br />
Figure 133 CAC Protocol Scenario 6<br />
Figure 133 Resources may be freed using CAC_Stp message. If Message CAC_Stp is lost. message shall be resent<br />
after <strong>MAC</strong>_CAC_STP_TO time if node is still receiving requested resource.<br />
Submission page 267 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
CPE TDR HE<br />
CAC_Req<br />
CAC_Rsp<br />
TDR detect CPE is<br />
disconnected<br />
CAC_Req<br />
CAC_Rsp<br />
CAC_Stp<br />
Figure 134 CAC Protocol Scenario 7<br />
Figure 134 REP node detect a node is no longer connected. It shall free all resources allocated for the node subcell.<br />
Submission page 268 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
CPE TDR HE<br />
CAC_Req<br />
CAC_Rsp<br />
CAC_Drp<br />
CAC_Req<br />
CAC_Rsp<br />
CAC_Drp<br />
Figure 135 CAC Protocol Scenario 8<br />
Figure 135 FMN are not able to guarantee all the resources allocated. It chooses less service class flow <strong>and</strong> sends a<br />
CAC_Drp message to inform the requester node that this flow can not be guarantee.<br />
Submission page 269 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
MAX_CAC_DRP_TO<br />
CPE TDR HE<br />
CAC_Req<br />
CAC_Rsp<br />
CAC_Drp<br />
CAC_Req<br />
CAC_Rsp<br />
CAC_Drp<br />
Figure 136 CAC Protocol Scenario 9<br />
Figure 136 CAC_Drp message is lost. CPE node will deregister flow after MAX_CAC_DRP_TO time without<br />
receiving the resource (Tokens with a register Session ID).<br />
Automatic Management of Crosstalks between not Synchronized Systems<br />
This section describes a mechanism to avoid crosstalk that may be implemented but is not m<strong>and</strong>atory.<br />
Once the nodes realize that there is more than one master in the channel by means of the Master Id (see 4.4.1), it is<br />
necessary to take some measures to avoid such interferences.<br />
The solution is to coordinate both BPL cells, <strong>and</strong> the simplest way to do it is subordinate one of the BPL cells. Next,<br />
the algorithm is explained:<br />
MID hierarchy<br />
When the crosstalk is detected, then the nodes must decide which BPL cell must subordinate.<br />
Submission page 270 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
The rule shall be “the lowest MID, the best”, analyzing the MID as a number.<br />
Then, one of the nodes of the worse BPL cell will register in the neighbor network using the <strong>Access</strong> Protocol, <strong>and</strong> it<br />
will act as master of its BPL cell, distributing the token.<br />
If one node does not perform this protocol it does not copy the MID inherited from its master, instead it fixes the<br />
local MID to one of these values:<br />
0x1FFFFF. Nodes that have not completed the <strong>Access</strong> Protocol.<br />
0x130001. Nodes that have finished the <strong>Access</strong> Protocol.<br />
Border node designation<br />
The border node is the modem that will act as a bridge between the networks passing the token.<br />
Once the interference is detected, the network with higher MID must decide which node within the BPL cell, will<br />
perform registration.<br />
Designation Rules<br />
The master will select the Border Node with the following criteria:<br />
Less hops, higher priority. This is, if the interference is detected by several nodes, the HE has preference over the<br />
rest of the nodes; next TDRs placed one hop away; next repeaters with two hops, etc.<br />
CPEs do not perform this protocol, only HEs <strong>and</strong> TDRs do. A node that detects only a CPE of a neighbor BPL cell<br />
does not apply for becoming border node.<br />
Notification protocol<br />
To centralize the decision, the HE of the BPL cell decides which node will perform negotiation, interchanging CCP<br />
packets. Since the interference will not be detected by all the nodes simultaneously, a guard time may be kept before<br />
designating the border node in order to know all the information.<br />
If any node detects the interference (sniffing a better MID), it transmits an Interference Detection Packet (IDP),<br />
containing the own <strong>MAC</strong>, the neighbor <strong>MAC</strong> sniffed, the MID sniffed, the local number of hops <strong>and</strong> the identity of<br />
the node detected (HE or TDR). When the packet is received by a node, it has to check if is coming from one of its<br />
slaves, then the information is copied <strong>and</strong> retransmitted to its master, then the packet will arrive finally to the HE of<br />
the BPL cell. To avoid flooding the network, the IDPs have to be sent with a minimum period of 10 seconds<br />
Submission page 271 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
between them, except if the node detects a better node to register to, this is new information that has to be<br />
transmitted immediately (for instance a node reported that was detecting a TDR but afterwards detects a HE, or<br />
another MID better than the transmitted one).<br />
Among all the IDPs received, the HE decides which node must become border node sending a Border Node<br />
Designation Packet (BNDP), containing the <strong>MAC</strong> of the Border Node. This is a broadcast packet that has to be<br />
relayed by all the nodes of the network because the destination might be several hops away from the master. When<br />
the packet is received by a node coming from its master <strong>and</strong> it is not the designated border node, it has to built a<br />
new BNDP to notify its slaves (only for TDR with at least one slave).<br />
The designated border node must send a Border Node Designation Acknowledge (BNDA), to confirm that the<br />
information has been received, <strong>and</strong> it is transmitted towards the master in the same way than the IDP. The BNDA<br />
must be received by the HE in a specific period of time (5 seconds). If the time expires a new BNDA to the same<br />
node is delivered. After 3 consecutive timeouts not receiving the BNDA, a new node (if exists) must be designated<br />
as Border Node.<br />
Crosstalk Management Frames Format<br />
IDP<br />
The IDP Message is encapsulated using the CCP with Type0 0x0b <strong>and</strong> Type1 0x01 (Figure 137).<br />
0xAA<br />
0xAA<br />
0x03<br />
0x00<br />
0x13<br />
0x9D<br />
0x0B<br />
0x01<br />
Length<br />
Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />
Figure 137 IDP Packet<br />
TPID<br />
TCI<br />
IDP Data<br />
The packet is sent using the broadcast port (127). The value of the packet fields shall be:<br />
Dest <strong>MAC</strong> is set 0x0180C2000000.<br />
Src <strong>MAC</strong> is set to the local <strong>MAC</strong> address.<br />
The IDP data fields are:<br />
Submission page 272 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Table 53 Interference detection packet fields<br />
Bytes IDP data fields Length<br />
0-5 Sender <strong>MAC</strong> address 6 bytes<br />
6-11 Sniffed <strong>MAC</strong> address 6 bytes<br />
12-14 MID sniffed 3 bytes<br />
15 Local Number of hops 1 byte<br />
16 Type of Node sniffed 1 byte<br />
In the Local Number of hops field, a value of 255 hops means 255 or more hops.<br />
The field Type of Node contains the same information allocated in the Token Announce (although announce the<br />
detection of a slave is forbidden by the protocol).<br />
Table 54 Type of node in IDP<br />
BNDP<br />
0 HE<br />
1 CPE<br />
2 TDR<br />
The BNDP Message is encapsulated using the CCP with Type0 0x0b <strong>and</strong> Type1 0x02 (Figure 138).<br />
Submission page 273 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
TPID<br />
0xAA<br />
0xAA<br />
0x03<br />
0x00<br />
0x13<br />
0x9D<br />
0x0B<br />
0x02<br />
Length<br />
Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />
Figure 138 BNDP Packet<br />
TCI<br />
BNDP Data<br />
The packet is sent using the broadcast port (127). The value of the packet fields shall be:<br />
Dest <strong>MAC</strong> is set 0x0180C2000000.<br />
Src <strong>MAC</strong> is set to the local <strong>MAC</strong> address.<br />
The BNDP data fields are:<br />
Table 55 BNDP packet fields<br />
BNDA<br />
Bytes BNDP data fields Length<br />
0-5 Border Node <strong>MAC</strong> address 6 bytes<br />
The BNDA Message is encapsulated using the CCP with type 0x0b <strong>and</strong> subtype 0x03 (Figure 139).<br />
TPID<br />
0xAA<br />
0xAA<br />
0x03<br />
0x00<br />
0x13<br />
0x9D<br />
0x0B<br />
0x03<br />
Length<br />
Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />
TCI<br />
BNDA Data<br />
Submission page 274 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 139 BNDA Packet<br />
The packet is sent using the broadcast port (127). The value of the packet fields shall be:<br />
Dest <strong>MAC</strong> is set 0x0180C2000000.<br />
Src <strong>MAC</strong> is set to the local <strong>MAC</strong> address.<br />
The BNDA data fields are:<br />
Table 56 BNDA packet fields<br />
Border node registration<br />
Bytes BNDA data fields Length<br />
0-5 Border Node <strong>MAC</strong> address 6 bytes<br />
Once the border node is designated by the HE (can be itself), it starts its attempt for registration in the neighbor BPL<br />
cell as it is described in the <strong>Access</strong> Protocol.<br />
Master selection<br />
The border node will select the master to register based in the following criteria:<br />
First HE (of the neighbor BPL cell)<br />
Second repeaters.<br />
Successful registration<br />
If the modem succeeds, as it has changed BPL cell it copies the MID of its new BPL cell, in this way any node<br />
knows that the node is token dependant from the neighbor network.<br />
Submission page 275 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
A node performing the registration in the neighbor BPL cell will have a MID different <strong>and</strong> it will be different from<br />
0x1FFFFF <strong>and</strong> 0x130001. Under these conditions the node must be accepted avoiding any authentication process,<br />
also the master node knows that is not a node from its network <strong>and</strong> must avoid transmit any data through the BPL<br />
port.<br />
Failing registration<br />
The maximum time specified for the registration of the border node is 120 seconds<br />
When the timer expires, the HE has to select a new border node to complete negotiation. The HE is the node that<br />
monitories the registration timer, in this way no new packets are needed, even if the border node designated is<br />
switched off the HE restarts the protocol by itself.<br />
The formerly designated border node has to activate the registration timer like the master <strong>and</strong> when the timer<br />
expires it assumes that it is not border node anymore until a new BNDP is received.<br />
Intermittent transmission<br />
To perform successfully the negotiation among BPL cells it is necessary to get free interference periods, because the<br />
transmissions within the own BPL cell will ruin the registration.<br />
A HE can decide by itself to stop the transmissions within its network avoiding new token generation, but any other<br />
node cannot because its master will regenerate the token.<br />
When the HE receives a BNDA it starts a period so called “INTERMITTENT TRANSMISSION” [IT].<br />
During the status of Border Node a modem can generate as many BNDAs as needed to complete the negotiation.<br />
The default silence time 2 sec, followed by a normal transmission period of 1 sec. It will have 5 silence periods. So<br />
the overall IT will last 15 seconds.<br />
SPANNING TREE<br />
In a network, a spanning tree is a path or collection of paths that represent connections between nodes. To be called<br />
a spanning tree, the tree must cover every possible path in a network. A minimal spanning tree is one that covers all<br />
possible paths, does so with as few segments as possible, <strong>and</strong> makes sure there are no loops (closed paths) in the<br />
network.<br />
The IEEE 802.1 recommendations provide an algorithm for finding a spanning tree in any network.<br />
Submission page 276 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
STP packets will be transmitted through the corresponding unicast ports.<br />
IEEE 802.1D (Spanning Tree Protocol)<br />
The 802.1D recommendation describes the Spanning Tree algorithm <strong>and</strong> protocol. In this document, the calculation<br />
of the tree elements <strong>and</strong> the messages exchanged between bridges for this purpose are exposed. This specification is<br />
fully compliant with this st<strong>and</strong>ard.<br />
The implementation of IEEE 802.1D is a must for network compatibility.<br />
For specific information on message types <strong>and</strong> their fields <strong>and</strong> the algorithm to h<strong>and</strong>le them, refer to IEEE Std 802.1<br />
<strong>and</strong> IEEE Std 802.1D (Spanning Tree).<br />
Ports can be Ethernet or BPL. Every new BPL connection is added to the bridge as a new port. Ports can be deleted<br />
when the BPL connection is lost for some physical reason. Some ports, such as Ethernet ports, are always present.<br />
Each port carries out the STP.<br />
Default timers <strong>and</strong> field values<br />
The IEEE recommendation is relatively flexible in some aspects, such as default timer values <strong>and</strong> other message<br />
fields, so that they can be tuned for different network sizes <strong>and</strong> <strong>Medium</strong> <strong>Access</strong> technologies. The values adopted<br />
by this specification for these parameters are:<br />
hello: time between each BPDU that is sent on a port.<br />
Default: 2 seconds<br />
Range: [1, 10] seconds<br />
forward delay: time spent in the listening <strong>and</strong> learning states.<br />
Default: 15 seconds<br />
Range: [4, 30] seconds<br />
max age: maximum length of time a bridge port saves its configuration.<br />
Default: 20 seconds<br />
Submission page 277 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Range: [6, 40] seconds<br />
Priority: The greater the number, the less priority.<br />
Table 57 STP priority<br />
IEEE 802.1w (Rapid STP)<br />
MV Master 0x9010<br />
MV Repeater 0x9020<br />
LV Master 0x9030<br />
LV Repeater 0x9040<br />
LV Slave 0x9050<br />
Rapid Spanning Tree Protocol (RSTP; IEEE 802.1w) is an amendment to 802.1D. This version offers a significant<br />
reduction in the time taken to reconfigure the active topology of the Bridged LAN in the face of changes to the<br />
physical topology or its configuration parameters. The strategy to reach this performance is based on a h<strong>and</strong>shake<br />
mechanism between bridges that enables a fast transition to forwarding, thus bypassing the listening <strong>and</strong> learning<br />
states <strong>and</strong> timers.<br />
The two versions of the algorithm <strong>and</strong> protocol are capable of interoperating within the same Bridged LAN; hence,<br />
it is not necessary for implementations to support both versions of the Spanning Tree algorithm <strong>and</strong> protocol.<br />
In view of the improved performance offered, it is recommended that the Rapid Spanning Tree algorithm <strong>and</strong><br />
Protocol be supported in preference to the original version.<br />
For specific information on message types <strong>and</strong> their format, the migration protocol <strong>and</strong> the RSTP algorithm, refer to<br />
IEEE Std 802.1D, 1998 Edition; Clause 17 (Rapid Spanning Tree Algorithm <strong>and</strong> Protocol), also found as 802.1w.<br />
Default timers <strong>and</strong> field values<br />
migration delay (mdelay): indicates that the protocol migration is ongoing. It is used to avoid re-entry. If any BPDU<br />
of the other type is received while mdelay is running, it is ignored in terms of protocol migration. mdelay is set to 3<br />
seconds.<br />
Submission page 278 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Point-to-point ports <strong>and</strong> edge ports<br />
In order to achieve fast convergence on a port, the protocol relies upon two new variables: edge ports <strong>and</strong> link type.<br />
All BPL ports can be assumed to be point-to-point ports. Ethernet ports can be considered edge ports, unless another<br />
bridge is connected to the same segment. Anyway, since the st<strong>and</strong>ard establishes that the first BPDU coming into an<br />
edge port removes its edge port status, it can be assumed at startup that all ports are c<strong>and</strong>idate to directly transition<br />
to forwarding:<br />
Ethernet ports start in forwarding state (edge ports).<br />
BPL ports, even though they start in blocking state, are ready for h<strong>and</strong>shake <strong>and</strong> rapid transition to forwarding<br />
(point-to-point).<br />
STP <strong>and</strong> VLANs<br />
If VLANs are active, STP packets must use the management VLAN inside the power-line network.<br />
Common STP<br />
Ethernet interfaces must support the possibility of being configured to remove/add the VLAN tag to the<br />
outgoing/incoming STP packets. That is, the VLAN tag of the STP packets going out the BPL network is removed.<br />
On the other h<strong>and</strong>, VLAN tag must be added to the incoming STP packets, so as to make sure that STP packets<br />
inside the power-line network use the management VLAN.<br />
10 SECURITY<br />
10.1 LOW LEVEL ENCRYPTION AND INTEGRITY<br />
10.1.1 Overview<br />
Encryption <strong>and</strong> Integrity are two key features needed by any communication device to guarantee security <strong>and</strong><br />
privacy in the message exchange.<br />
For encryption IEEE P1901 uses as basic building block the Advanced Encryption St<strong>and</strong>ard (AES) according to<br />
FIPS-97(2002).<br />
AES is a block cipher algorithm while higher layers have to deal with variable length packets. To be able to encrypt<br />
these variable length packets IEEE P1901 uses the operation mode known as Counter Mode (CTR) defined in<br />
Submission page 279 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
NIST800-38A “Recommendations for Block Cipher Modes of Operation. Methods <strong>and</strong> Techniques”. By the use of<br />
CTR IEEE P1901 achieves confidentiality for messages of arbitrary length.<br />
Nevertheless it is still necessary to provide message integrity against tampering. For this purpose IEEE P1901 uses<br />
the operation mode known as CCM (Counter with CBC-<strong>MAC</strong> (Message Authentication Check)) that avoids the use<br />
of a separate mechanism for providing message integrity. CCM mode of operation combines CTR mode of<br />
encryption with the CBC-<strong>MAC</strong> mode of authentication. CCM is defined in RFC 3610 <strong>and</strong> has been used <strong>and</strong><br />
studied for a long time <strong>and</strong> has well-understood cryptographic properties. The interesting point is that the same<br />
encryption key can be used for both processes in conjunction with other parameters, thus leading, in effect, to two<br />
separated keys.<br />
CCM is only defined for 128-bit block ciphers <strong>and</strong>, though it is a generic mode applicable to any many ciphers, in<br />
IETF RFC3610 it is defined for use with 128-bit AES.<br />
CCM has two parameters (M <strong>and</strong> L). M indicates the length of the MIC (Message Integrity Check) <strong>and</strong> L indicates<br />
the length of the message itself. For the selected algorithm M is equal to 4 (thus indicating that the Message<br />
Integrity Check (MIC) produced is 4 bytes long) <strong>and</strong> L is equal to 2 (thus indicating that the length of the message<br />
is at most 2^16 bytes as is exactly the maximum length of a burst).<br />
Encryption <strong>and</strong> Integrity are both based on AES blocks <strong>and</strong> needs a different initialization variables <strong>and</strong> modes to<br />
work. The information about the initial state for desencryption <strong>and</strong> integrity check is transported in the CCMP<br />
Header.<br />
Encryption <strong>and</strong> Integrity are applied when the burst is set as encrypted <strong>and</strong> over each one of the packets or packet<br />
fragments inside the burst payload independently, but using the common initial state contained in the CCMP<br />
Header, that is transmitted only once each burst at the beginning of the payload.<br />
Each MIC is calculated over the Burst Header, CCMP Header, the Interpacket Header added by the LLC layer <strong>and</strong><br />
the packet or fragment of a packet including the padding, <strong>and</strong> then appended to this structure, althought Burst<br />
Header <strong>and</strong> CCMP Header are only transmitted once at the beginning of the Burst.<br />
The encryption algorithm is also applied in a fragment packet or packet basis. Burst Header, CCMP Header <strong>and</strong><br />
Interpacket Headers shall be sent in clear, <strong>and</strong> the encryption is applied over the fragment packet or packet<br />
including its padding <strong>and</strong> the appended MIC.<br />
10.1.2 Detailed encryption process<br />
As has been described before, Encryption <strong>and</strong> Integrity algorithms are applied in a packet or fragment of packet<br />
basis, but using common initial state information for each Burst contained in the CCMP Header.<br />
Submission page 280 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
The Crypto bit, located at the byte 15, 6th bit of the Burst Header, when set to 1, indicates that encryption is used in<br />
this Burst. Therefore, the CCMP header is appended after the Burst Header <strong>and</strong> the MIC is placed after each<br />
fragment of packet or packet, including its padding. Each MIC will be calculated over the Burst Header, CCMP<br />
Header (structures that are common for all MIC calculations inside the same Burst), Interpacket Header <strong>and</strong> the<br />
fragment packet or packet including its padding.<br />
Although for the calculation of each MIC Burst Header <strong>and</strong> CCMP Header are taken into account, these fields shall<br />
be transmitted only once per Burst.<br />
Each one of the generated MICs <strong>and</strong> its correspondent fragment packet or packet including its padding shall be<br />
encrypted using the CTR AES algorithm.<br />
In the following figure an Encrypted Burst construction is depicted:<br />
PADDING<br />
Figure 140: Construction of an Encrypted Burst<br />
The CCMP header is inserted between Burst Header <strong>and</strong> the first Interpacket Header <strong>and</strong> it is not to be encrypted<br />
although shall be protected by every MIC. A representation of the CCMP header is shown in Figure 141. It shall<br />
contain the following fields:<br />
- Packet Number (PN) - 48 bits. Packets or segment of packets are numbered by the use of a PN. The PN is<br />
incremented by a positive number at each successive packet or fragment of a packet transmission. PN shall<br />
never repeat for a series of encrypted packets using the same temporal key. PN provides replay protection<br />
<strong>and</strong> enables the receiver to derive the value of the nonce that was used in the encryption <strong>and</strong> integrity<br />
algorithms.PN is represented as an array of 6 octets. PN5 is the most significant octet of the PN, <strong>and</strong> PN0 is<br />
Submission page 281 UPA-OPERA<br />
PADDING<br />
PADDING
4-June-07 P1901_PRO_016_r0<br />
the least significant. The Packet Number sent in the CCMP Header is the one correspondent to the first<br />
packet or fragment of a packet sent in the Burst.<br />
- Rsvd – 8 bits. Reserved bits set to 0 <strong>and</strong> ignored on reception.<br />
- KeyID - 8 bits. 5 bits are reserved <strong>and</strong> set to 0. Bit 5 is set to 1. Bits 6–7 of the Key ID octet are for the Key<br />
ID subfield. The Key ID subfield allows for operating with different keys.<br />
The CCMP Header shall be the following structure:<br />
1 byte<br />
PN0 PN1 Rsvd KeyID PN2 PN3 PN4 PN5<br />
Rsvd 1 KeyID<br />
Submission page 282 UPA-OPERA<br />
1 bit<br />
b0 b4 b5 b6 b7<br />
Figure 141: CCMP Header Structure<br />
CCM requires for encryption <strong>and</strong> message integrity checking, an unique Nonce value, a number which never<br />
repeats during a given life time, for each packet protected by a given temporal key. CCM requires a fresh temporal<br />
key for every session.<br />
The PN is combined with other fields to produce a 13-octet long Nonce as corresponds to setting the parameter L to<br />
2 as indicated in IETF RFC 3610. This Nonce is represented in Figure 142.
4-June-07 P1901_PRO_016_r0<br />
The Nonce shall be the following fields:<br />
Figure 142: Nonce Structure<br />
- Nonce priority – 8 bits. This field is different from the priority field in the burst header <strong>and</strong> is for future<br />
capability. The Nonce Priority Octet field shall be 0 <strong>and</strong> is reserved for future use.<br />
- Source Address – 48 bits. It is taken from the <strong>MAC</strong> address of the transmitter included in the Token<br />
Announce (Section 4.4.1).<br />
- PN – 48 bits. It is calculated adding to the PN of the CCMP Header the number of the first packet or<br />
fragment of packet of the Burst minus one.<br />
This Nonce is used to produce two 128-bit words: B0 <strong>and</strong> A0 (IETF RFC 3610 <strong>and</strong> NIST 800-38c).<br />
The initial CCMP block B0 (128-bit block), needed for the calculation of the MIC, has the following fields:<br />
- Flag B0 – 8 bits. Fix content (IETF RFC 3610 <strong>and</strong> <strong>and</strong> NIST 800-38c). It indicates that the MIC is 32 bits<br />
long. See Table 58.<br />
- Nonce – 104 bits. See Figure 142<br />
- DLen – 16 bits. Length in bytes of the data to be encrypted. The DLen is the taken from the Length field of<br />
the Inter Packet Header (Figure 58).<br />
Submission page 283 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 143: CCM Block B0 used for MIC calculation<br />
The initial counter block A0 (128-bit block), needed for the encryption process, has the following fields:<br />
- Flag A0 – 8 bits. Fix content (IETF RFC 3610 <strong>and</strong> <strong>and</strong> NIST 800-38c). See Table 1.<br />
- Nonce – 104 bits. See Figure 142.<br />
- Counter – 16 bits. Counter that starts at the value of one at the beginning of the encryption process <strong>and</strong> is<br />
incremented for each encrypted 128-bit block.<br />
1 byte<br />
1 byte<br />
6 bytes 6 bytes<br />
FlagA0 Priority Source Address PN<br />
104 bits Nonce<br />
Figure 144: Counter Block A0 used to initialize the encryption<br />
Counter<br />
FlagsA0 <strong>and</strong> FlagsB0 are 8-bit words with a fix contents (IETF RFC 3610 <strong>and</strong> <strong>and</strong> NIST 800-38c) as indicated as<br />
follows.<br />
Bit Number Contents of Flag A0 Contents of Flag B0<br />
7 Reserved (Always 0) Reserved (Always 0)<br />
6 Reserved (Always 0) 1<br />
5-3 0 (M-2)/2 (001)<br />
2-0 L-1 (001) L-1 (001)<br />
Submission page 284 UPA-OPERA<br />
2 bytes
4-June-07 P1901_PRO_016_r0<br />
Table 58: Flag A0 <strong>and</strong> B0 Contents<br />
The Burst Header, CCMP header <strong>and</strong> Interpacket Headers shall be transmitted unencrypted. In the calculation of<br />
each MIC, the Burst Header plus the CCMP header <strong>and</strong> the Interpacket Header are more than 128 bits long.<br />
Because of this fact, it is necessary, for the proper calculation of the first MIC, to add some padding at the end of<br />
the Interpacket Header to get three 128-bit blocks. The padding bits shall not be transmitted. This padding is only<br />
used for MIC calculation. Padding bits are not used for encryption. The procedure is shown in Figure 145.<br />
Figure 145: Encryption <strong>and</strong> Integrity process for the first packet<br />
In the case of the second <strong>and</strong> subsequent packets, the MIC calculation shall remain the same, but in the encryption,<br />
the Burst Header <strong>and</strong> CCMP Header will not be included in the resulting Encrypted message. The padding bits shall<br />
not be transmitted. This padding is only used for MIC calculation. Padding bits are not used for encryption. The<br />
procedure is shown in Figure 146.<br />
Submission page 285 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 146: Encryption <strong>and</strong> Integrity process for all but the first packet<br />
The MIC is computed in both cases using CBC-<strong>MAC</strong>, which encrypts a starting block B0 <strong>and</strong> then successively<br />
XORs subsequent blocks <strong>and</strong> encrypts the result. Although the result is a MIC of 128 bits, the lower 96 bits are<br />
discarded, <strong>and</strong> a final 32-bit MIC is obtained.<br />
Once the MIC has been computed <strong>and</strong> appended to the plaintext data, the encryption takes place using Counter<br />
Mode (CTR).<br />
10.2 AAA protocol<br />
In section 9.1.3 the access method used in IEEE P1901 has been described. Nevertheless, for the sake of security,<br />
section 9.1.3 is to be complemented with the AAA protocol that is described in the present section.<br />
The access <strong>and</strong> authentication control system of IEEE P1901 follows closely the one described in IEEE802.1X<br />
which in turn relies on the Extensible Authentication Protocol (EAP) [RFC3748] over LAN (EAPOL). IEEE802.1X<br />
provides the description of EAPOL.<br />
The purpose of IEEE 802.1X is to implement access control at the point at which a user joins the network. In the<br />
process of application of IEEE 802.1X the network entities can take one of three roles: Supplicant, Authenticator<br />
<strong>and</strong> Authentication Server (AS).<br />
The device asking for connection to the network is known as the Supplicant <strong>and</strong> in IEEE P1901 can be either a CPE<br />
or a TDR. The Authenticator can be either the HE or a TDR. The Authentication Server will normally be<br />
centralized.<br />
The IEEE 802.1X access control mechanisms apply to the association between a CPE or TDR <strong>and</strong> a Master.<br />
Submission page 286 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
In IEEE 802.1X an access <strong>and</strong> authentication dialog is defined for the case of authenticator initiated exchange. This<br />
dialog is formed by the following sequence of messages:<br />
• Message A: Authenticator to Supplicant<br />
o EAPOL with Code field: Request (1) <strong>and</strong> Type field: Identity (1)<br />
• Message B: Supplicant to Authenticator<br />
o EAPOL with Code field: Response (2) <strong>and</strong> Type field: Identity (1)<br />
• Message C: Authenticator to Supplicant<br />
o EAPOL with Code field: Request (1) <strong>and</strong> Type field: Challenge (4)<br />
• Message D: Supplicant to Authenticator<br />
o EAPOL with Code field: Response (2) <strong>and</strong> Type field: Challenge (4)<br />
• Message E: Authenticator to Supplicant<br />
o EAPOL with Code field: Success (3) or Failure (4)<br />
In IEEE P1901 Message A of the previous dialog should be implemented by the use of the <strong>Access</strong> Frame described<br />
in section 4.3.8., Message B should be implemented by the use of the <strong>Access</strong> Reply Frame described in section<br />
4.3.9 <strong>and</strong> Message E should be implemented by the use of the <strong>Access</strong> Protocol Packet described in section 9.1.3.<br />
Messages C <strong>and</strong> D serve for the purpose of authentication. With message C the Authenticator sends a r<strong>and</strong>om<br />
challenge of 16 octets to the Supplicant <strong>and</strong> message D is the response of the Supplicant to this challenge. This<br />
Response is a 16-octet MD5 hash calculated over the r<strong>and</strong>om challenge <strong>and</strong> the secret shared by the Supplicant <strong>and</strong><br />
the Authentication Server <strong>and</strong> other fields [RFC 2865]. This secret should be the Serial Number of the Supplicant.<br />
IEEE 802.1X states that “The EAPOL encapsulation used with IEEE802.3/Ethernet can be applied to other LAN<br />
technologies that share the same basic frame format as Ethernet” as is the case of IEEE P1901 technology. As a<br />
consequence, the format of Messages C <strong>and</strong> D in IEEE P1901, which follows the rules of EAPOL packets, are<br />
encapsulated in CLPDUs. The formats are the following:<br />
Submission page 287 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Packet Body<br />
Description<br />
Nr. Of<br />
octets<br />
Contents<br />
PAE Ethernet Type 2 0x88-8E<br />
EAPOL Protocol Version 1 0x02<br />
Packet Body Length 2 0x007F<br />
Code 1<br />
Identifier 1<br />
Message C: Request (1)<br />
Message D: Response (2)<br />
Requests must modify the Identifier<br />
Responses must match them<br />
Length in octets 2 0x007F<br />
Type 1<br />
Default: 0x04 (MD5 Challenge)<br />
Open to other hash functions<br />
Value size 1 Default: 0x10<br />
Value<br />
Default:<br />
16<br />
This content is included in the payload of a CCP packet.<br />
Table 59: Message C <strong>and</strong> D format<br />
Message C: R<strong>and</strong>om Number<br />
Message D: Hash<br />
All of the previous messages, except for Message A, have to be transferred from the Authenticator to the AS or the<br />
other way around. This transfer is done in IEEE P1901 by the use of EAP over Radius [RFC 3579] although Radius<br />
as a server [RFC2865] does not form part of this specification.<br />
The Format of the EAP over Radius messages follows completely the st<strong>and</strong>ard [ RFC2865] [RFC3579].<br />
The IEEE P1901 <strong>Access</strong> Reply Frame is converted into a “Radius <strong>Access</strong>-Request/EAP” packet. From the <strong>Access</strong><br />
Reply Frame the Authenticator creates a st<strong>and</strong>ardized EAP-Response /Identity packet <strong>and</strong> encapsulates it within a<br />
RADIUS <strong>Access</strong>-Request packet.<br />
Submission page 288 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
The format of this EAP-Response/Identity packet to be encapsulated in the RADIUS <strong>Access</strong>-Request is the already<br />
indicated for Messages C <strong>and</strong> D but the Packet Body is the following:<br />
Packet Body<br />
Description<br />
Nr. Of<br />
octets<br />
Contents<br />
Code 1 Response (0x02)<br />
Identifier 1<br />
Requests must modify the Identifier<br />
Responses must match them<br />
Length in octets 2 0x000C<br />
Type 1 0x01 (Identity)<br />
Value size 1 0x06<br />
Value 6 <strong>MAC</strong> Address of the supplicant<br />
Table 60: Packet Body Format for EAP-Response/Identity packet fro messages C <strong>and</strong> D<br />
The Response to the previous message by the AS is an “<strong>Access</strong>-Challenge/EAP” packet which the authenticator<br />
will convert into Message C for transmission to the Supplicant just decapsulating it.<br />
Message D (EAP-Response/Challenge) shall be encapsulated by the Authenticator into a RADIUS <strong>Access</strong>-<br />
Request/EAP.<br />
And the response to the previous message will be a “Radius <strong>Access</strong>-Accept (or Reject)/EAP” packet which the<br />
authenticator will convert into Message E for transmission to the Supplicant by forming an IEEE P1901 “<strong>Access</strong><br />
Protocol Packet” as indicated in section 9.1.3, which has also the possibility to signal “Failed” besides Accept or<br />
Reject. This would happen in case of failure of the dialog between the Authenticator <strong>and</strong> the Authentication Server.<br />
The Format of the RADIUS packet encapsulating an EAP message is the following [RFC2865]:<br />
Submission page 289 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Attribute Attribute<br />
Table 61: RADIUS packet encapsulating an EAP message<br />
In the case of Radius <strong>Access</strong>-Request/EAP packet it is necessary to add to the previous message structure the<br />
following Attributes:<br />
Submission page 290 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Attribute Attribute Attribute<br />
Table 62: RADIUS <strong>Access</strong>-request/EAP Attributes<br />
The User Name Attribute must be sent even if the String is already included in the EAP Attribute. This last<br />
Attribute must [RFC3579 ]also be included in the <strong>Access</strong>-Accept.<br />
Exactly one RADIUS packet is encapsulated in the UDP Data field, where the UDP Destination Port field indicates<br />
1812 (decimal). When a reply is generated, the source <strong>and</strong> destination ports are reversed.<br />
Figure 147 is a representation of the access <strong>and</strong> authentication dialog used in IEEE P1901.<br />
Submission page 291 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Figure 147: Representation of the access <strong>and</strong> authentication dialog used in IEEE P1901.<br />
At the end of the dialog the Supplicant is already authenticated but the keys for encryption <strong>and</strong> for integrity<br />
checking are still not established. This is the subject of the next section.<br />
10.3 Key Hierarchies<br />
There are two key hierarchies in IEEE P1901: Pairwise Key Hierarchy <strong>and</strong> Group Key Hierarchy.<br />
It is assumed that there is a Pairwise Master Key (PMK) that is assumed to be in possession of the Supplicant <strong>and</strong><br />
the Authenticator by some “out of b<strong>and</strong> means” <strong>and</strong> which distribution is not the subject of this specification, <strong>and</strong> a<br />
Group Master Key (GMK) which is generated at r<strong>and</strong>om by the HE or by some other higher level entity.<br />
From the PMK the following temporal keys are derived for use in conjunction with the AES-CCMP algorithm:<br />
- Data Encryption/Integrity key (128 bits)<br />
- EAPOL-Key Encryption key (128 bits)<br />
Submission page 292 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
- EAPOL-Key Integrity key (128 bits)<br />
From the GMK the following temporal key is derived:<br />
- Group Encryption/Integrity key (128 bits)<br />
The EAPOL keys are used to protect key h<strong>and</strong>shakes.<br />
These hierarchies are conformant to the st<strong>and</strong>ard IEEE802.11i.<br />
10.4 Establishing the keys<br />
To compute the Pairwise Temporal Keys (PTK) the 4-Way H<strong>and</strong>shake is used [IEEE 802.11i].<br />
As indicated in Figure 148 the procedure implies the use of 4 messages that use the EAPOL-key format<br />
Figure 148: Schematics of the 4-way h<strong>and</strong>shake<br />
Submission page 293 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
In this dialog Supplicant <strong>and</strong> Master exchange two Nonces that allow to derive the PTK; Supplicant <strong>and</strong><br />
Authenticator prove knowledge of the PMK to the other one <strong>and</strong> both synchronize to turn on the encryption keys for<br />
unicast packets. Message 3 may also be used to send the GTK (Group Transient Key).By this way the Supplicant<br />
<strong>and</strong> the Authenticator have established a secure channel using encryption in both directions.<br />
11 SYSTEM PARAMETERS<br />
11.1 GENERAL PARAMETERS<br />
• GENERAL_USE_AUTOCONF = [YES | NO]<br />
Parameter: YES enables autoconf, NO disables it.<br />
SNMP: no<br />
M<strong>and</strong>atory: yes<br />
This should be the first parameter in the auto-configuration file. If this parameter is disabled, when downloading<br />
the file, all the parameters will be stored in non-volatile memory, <strong>and</strong> next boot-up will be in local settings boot<br />
mode. In case of enabled, except a few parameters that must be necessarily saved in non-volatile memory, the<br />
others will not be stored in the non-volatile memory, <strong>and</strong> next boot-up will be in Auto-configuration mode. By<br />
default, it is enabled.<br />
• GENERAL_TYPE = [HE | CPE | TDREPEATER]<br />
Parameter: Possible values are: HE (Head End), CPE (Customer Premises Equipment) <strong>and</strong> TDREPEATER (Time<br />
Division Repeater).<br />
SNMP: plSysNodeType<br />
M<strong>and</strong>atory: yes<br />
Configures the type of node. A node can be configured as a HE (Head End), a CPE (Customer Premises<br />
Equipment) or a TDREPEATER (Time Division Repeater). The default value is CPE.<br />
• GENERAL_FW_TYPE = [MV | LV | EU]<br />
Parameter: Possible values are: MV (<strong>Medium</strong> Voltage), LV (Low Voltage) <strong>and</strong> EU (End User).<br />
Submission page 294 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
SNMP: no<br />
M<strong>and</strong>atory: yes<br />
Configures the firmware type of the node. The following firmware types can be configured: MV (<strong>Medium</strong><br />
Voltage), LV (Low Voltage) <strong>and</strong> EU (End User). This parameter affects the QoS <strong>and</strong> VLAN/OVLAN<br />
configuration. The default value is LV.<br />
• GENERAL_SIGNAL_MODE = [1 … m]<br />
Parameter: Configures the physical mode used by the modem. This value can reach from 1 to m, depending on the<br />
range of frequency used.<br />
SNMP: plBasicMode<br />
M<strong>and</strong>atory: yes<br />
Configures the physical mode used by the modem. The valid modes depend on the range of frequency used.<br />
• GENERAL_SIGNAL_MODE_LIST.i = [1 … m]<br />
Parameter: This value can reach from 1 to m, depending on the range of frequency used.<br />
SNMP: plBasicSearchModes<br />
M<strong>and</strong>atory: yes<br />
Configures i-mode of the mode list for the modem to search with the SearchLink protocol (i = 1 … 12). The<br />
valid modes depend on the range of frequency used. The mode list is scanned to select the range of frequencies<br />
that will be taken into account by the modem.<br />
GENERAL_AUTHENTICATION = [RADIUS | AUTHLIST | NONE]<br />
Parameter: There are three possible values: RADIUS, ATHLIST <strong>and</strong> NONE. If RADIUS is selected, a RADIUS<br />
server will be in charge of accepting new users <strong>and</strong> assigning the profile. If AUTHLIST is selected, authentication<br />
will be done by checking a list provided in the auto-configuration file. If NONE is selected, all the users will be<br />
accepted<br />
SNMP: no<br />
Submission page 295 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
M<strong>and</strong>atory: yes<br />
Selects one of the following authentication methods:<br />
RADIUS server. In this case, a RADIUS server will be in charge of accepting new users <strong>and</strong> assigning the profile.<br />
Authorization list. In this case, authentication will be done by checking a list provided in the auto-configuration file.<br />
This option avoids the installation of a RADIUS server.<br />
No authentication. In this case, no authentication method is used at all. Therefore, all the users will be accepted.<br />
By default, no authentication is used.<br />
• GENERAL_STP = [YES | NO]<br />
Parameter: Enables (YES) or disables (NO) the Spanning Tree Protocol in the node.<br />
SNMP: plStpEnable<br />
M<strong>and</strong>atory: yes<br />
Enables or disables the Spanning Tree Protocol in the node. Enabled by default.<br />
• GENERAL_COMMON_STP_EXTA = [YES | NO]<br />
Parameter: Enables (YES) or disables (NO) the Common STP feature in the Ethernet interface A (EXTA).<br />
SNMP: no<br />
M<strong>and</strong>atory: no<br />
Enables or disables the Common STP feature in the Ethernet interface A (EXTA). This parameter only makes<br />
sense to be used if VLANs are enabled. If it is enabled, STP packets will be released <strong>and</strong> accepted through<br />
EXTA without VLAN tag (even if VLANs are enabled). If it is disabled, STP packets will be released with the<br />
management VLAN tag (if VLANs are active).<br />
WARNING: with this parameter enabled, all packets without VLAN will be accepted through EXTA.<br />
Submission page 296 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
• GENERAL_COMMON_STP_EXTB = [YES | NO]<br />
Parameter: Enables (YES) or disables (NO) the Common STP feature in the Ethernet interface B (EXTB).<br />
SNMP: no<br />
M<strong>and</strong>atory: no<br />
Enables or disables the Common STP feature in the Ethernet interface B (EXTB). This parameter only makes<br />
sense to be used if VLANs are enabled. If it is enabled, STP packets will be released <strong>and</strong> accepted through<br />
EXTB without VLAN tag (even if VLANs are enabled). If it is disabled, STP packets will be released with the<br />
management VLAN tag (if VLANs are active).<br />
WARNING: with this parameter enabled, all packets without VLAN will be accepted through EXTB.<br />
• GENERAL_IP_ADDRESS = <br />
Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by dots).<br />
SNMP: plSysStaticIPAddress<br />
M<strong>and</strong>atory: no<br />
Configures the IP address to be used when booting up with DHCP disabled.<br />
• GENERAL_IP_NETMASK = <br />
Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by dots).<br />
SNMP: plSysStaticNetMask<br />
M<strong>and</strong>atory: no<br />
Configures the IP network mask to be used when booting up with DHCP disabled.<br />
• GENERAL_IP_GATEWAY = <br />
Submission page 297 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by dots).<br />
SNMP: plSysStaticDefaultGW<br />
M<strong>and</strong>atory: no<br />
Configures the default gateway IP address to be used when booting up with DHCP disabled.<br />
• GENERAL_IP_USE_DHCP = [YES | NO]<br />
Parameter: If Yes DHCP is used, if NO DHCP is not used.<br />
SNMP: plSysUseDHCP<br />
M<strong>and</strong>atory: no<br />
Enables or disables the DHCP protocol in the modem. If DHCP is enabled, network configuration parameters<br />
(IP address, network mask <strong>and</strong> default gateway IP address) will be obtained from a DHCP server when booting<br />
up. If it is disabled, the network configuration parameters saved in the non-volatile memory will be used<br />
instead.<br />
11.2 AGC (AUTOMATIC GAIN CONTROL) PARAMETERS<br />
The following parameters must be h<strong>and</strong>led with special care. A bad configuration of them can produce lost of<br />
communication with the modem through BPL.<br />
• AGC_TX_GAIN = [0 | 1]<br />
o Parameter: Selecting 1, the default value, 12 dB are added to the reference gain. In case of 0 value,<br />
no extra gain is added (0 dB).<br />
o SNMP: plBasicTXAGCGain<br />
o M<strong>and</strong>atory: no<br />
It configures the transmission gain. Two gain values, 0 <strong>and</strong> 12 dB, can be added to the reference gain. By default,<br />
12 dB are selected.<br />
• AGC_RX_ENABLE = [0 | 1]<br />
Submission page 298 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o Parameter: Enables (1) or disables (0) the hardware AGC.<br />
o SNMP: plBasicRXAGCEnable<br />
o M<strong>and</strong>atory: no<br />
Enables or disables the reception HW AGC. It is enabled by default.<br />
• AGC_RX_FIX_GAIN = [0 … 7]<br />
o Parameter: Eight values, from 0 to 7, are possible. Those values represent gains from 0 to 42 dB,<br />
respectively, added to the reference gain in steps of 6 dB.<br />
o SNMP: plBasicRXAGCGain<br />
o M<strong>and</strong>atory: no<br />
It sets a fixed value for the reception gain. This value is only taken into account if the HW AGC is disabled.<br />
Eight gain values, from 0 to 42 dB, can be added to the reference gain.<br />
• AGC_MAX_RX_GAIN = [0 … 7]<br />
o Parameter: Eight values, from 0 to 7, are possible. Those values represent gains from 0 to 42 dB,<br />
respectively, added to the reference gain in steps of 6 dB. The default value is 7 (42 dB).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Configures the maximum reception gain for the HW AGC. Eight gain values, from 0 to 42 dB, can be<br />
added to the reference gain. The default value is 42 dB.<br />
• AGC_MIN_RX_GAIN = [0 … 7]<br />
o Parameter: Eight values, from 0 to 7, are possible. Those values represent gains from 0 to 42 dB,<br />
respectively, added to the reference gain in steps of 6 dB. The default value is 7 (42 dB).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Configures the minimum reception gain for the HW AGC. Eight gain values, from 0 to 42 dB, can be added<br />
to the reference gain. The default value is 0 dB.<br />
11.3 RADIUS PARAMETERS<br />
• RADIUS_SERVER_IP = <br />
Submission page 299 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />
dots).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
This autoconfiguration parameter specifies the RADIUS server IP address. The access-request of the<br />
RADIUS procedure is submitted to the RADIUS server via the network using this IP address.<br />
• RADIUS_SERVER_PORT = ddddd<br />
o Parameter: Port number<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
It specifies the RADIUS client UDP port. The access-request of the RADIUS procedure is submitted to the<br />
RADIUS server via the network as a UDP communication to the IP address set before <strong>and</strong> sent to the UDP<br />
port of this parameter.<br />
• RADIUS_SHARED_SECRET = <br />
o Parameter: ‘shared_secret’ (string, limited to 16 characters, of the shared secret)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
It sets the RADIUS shared secret, which is limited to 16 characters. The forwarding server decrypts the<br />
User-Password, if present, using the shared secret. Once the RADIUS server receives the request, it<br />
validates the sending client. A request from a client for which the RADIUS server does not have a shared<br />
secret MUST be silently discarded<br />
All three parameters must be set up in order for the RADIUS client to work properly.<br />
11.4 CLASS OF SERVICE (COS) PARAMETER<br />
Using the auto-configuration file, 2 classes of service criteria can be defined, assigning priorities from 0 to 7.<br />
• COS_CUSTOM_CRITERION_OFFSET.i = [1 … 531]<br />
o Parameter: Values from 1 to 531 are possible.<br />
o SNMP: no<br />
Submission page 300 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o M<strong>and</strong>atory: no<br />
Custom i-criterion frame offset, in bytes (i = 1, 2).<br />
• COS_CUSTOM_CRITERION_PATTERN.i = 0xXXXXXXXXXXXXXXXX<br />
o Parameter: The value must be specified with 16 hexadecimal digits.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Custom i-criterion 8-byte pattern (i = 1, 2).<br />
• COS_CUSTOM_CRITERION_BITMASK.i = 0xXXXXXXXXXXXXXXXX<br />
o Parameter: The value must be specified with 16 hexadecimal digits.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Custom i-criterion 8-byte bitmask (i = 1, 2).<br />
• COS_CUSTOM_CRITERION_CLASSES_OFFSET.i = [1 … 531]<br />
o Parameter: Values from 1 to 531 are possible.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Custom i-criterion classes frame offset, in bytes (i = 1, 2).<br />
• COS_CUSTOM_CRITERION_CLASSES_BITMASK.i i = 0xXXXXXXXXXXXXXXXX<br />
o Parameter: The value must be specified with 16 hexadecimal digits.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Custom i-criterion classes 8-byte bitmask (i = 1, 2).<br />
• COS_CUSTOM_CRITERION_CLASSES_PATTERN.i.j i=0xXXXXXXXXXXXXXXXX<br />
o Parameter: The value must be specified with 16 hexadecimal digits<br />
o SNMP: no<br />
Submission page 301 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o M<strong>and</strong>atory: no<br />
Custom i-criterion j-class 8-byte pattern (i = 1, 2; j = 1 … 8).<br />
• COS_CUSTOM_CRITERION_CLASSES_PRIO.i.j = [0 … 7]<br />
o Parameter: Values from 0 to 7 are allowed.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Priority assigned the packets that match the custom i-criterion j-class priority (i = 1, 2; j = 1 … 8).<br />
• COS_CRITERION.k = [8021P | TOS | CUSTOM1 | CUSTOM2]<br />
o Parameter: There are two predefined criteria (8021P, based on IEEE 802.1p VLAN tag priority<br />
field, <strong>and</strong> TOS, based on IP type of service), <strong>and</strong> two custom criteria (CUSTOM1 <strong>and</strong> CUSTOM2),<br />
defined with the parameters above (COS_CUSTOM_CRITERION_xxx).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
k-criterion definition (k = 1, 2). Assigns up to 2 criteria to classify traffic. There are two predefined criteria<br />
(one based on IEEE 802.1p VLAN tag priority field, <strong>and</strong> another based on IP type of service), <strong>and</strong> two<br />
custom criteria, defined with the parameters above (COS_CUSTOM_CRITERION_xxx).<br />
• COS_DEFAULT_PRIO = [0 … 7]<br />
o Parameter: Values from 0 to 7 are allowed.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
Configures the CoS default priority, i.e. the priority assigned to packets that do not match any criterion.<br />
11.5 QUALITY OF SERVICE (QOS) PARAMETERS<br />
• QOS_ENABLE = [YES | NO]<br />
o Parameter: Enables (YES) or disables (NO) the quality of service in the node.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
Submission page 302 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Enables or disables the quality of service in the node. If this parameter is disabled, all other parameters<br />
related to QoS will not be configured.<br />
• QOS_PRIOACK.prio+1 = [0 | 1]<br />
o Parameter: This list enables (1) or disables (0) the <strong>Layer</strong> 2 ACK protocol depending on the<br />
priority level transmitted by the modem (priority levels: prio = 0 … 7).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
This list enables or disables the <strong>Layer</strong> 2 ACK protocol depending on the priority level transmitted by the<br />
modem (can be useful for those applications with hard settings in latency but not in PLR) (priority levels:<br />
prio = 0 … 7). The ACK policy is carried out as follows:<br />
o The highest priority of all the outgoing frames present in the output buffers of the modem is<br />
obtained.<br />
o If the <strong>Layer</strong> 2 ACK protocol is enabled for such a priority, the ACKs will be enabled for all<br />
priorities.<br />
o If the <strong>Layer</strong> 2 ACK protocol is disabled for such a priority, the ACKs will be disabled for all<br />
priorities.<br />
The <strong>Layer</strong> 2 ACK protocol is enabled for all the priorities by default.<br />
11.5.1 Slave Node Parameters (CPE)<br />
• QOS_UPBWLIMIT = [YES | NO]<br />
o Parameter: Enables (YES) or disables (NO) the transmission b<strong>and</strong>width limitation in a slave.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
Enables or disables the transmission b<strong>and</strong>width limitation in a slave. Enabled by default. If disabled, the<br />
user will transmit data constantly without restrictions. Every time it receives a resource allocation message<br />
to use the channel, there will be no limit imposed by the slave when transmitting data back to its master.<br />
11.5.2 Master Node Parameters (HE or REPEATER)<br />
• QOS_LATENCY_STEP = [20 … 400]<br />
o Parameter: Values in ms, from 20 to 400.<br />
o SNMP: no<br />
Submission page 303 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o M<strong>and</strong>atory: yes<br />
It configures the minimum latency step for the different slaves when using QoS.<br />
• QOS_BW_POLICY = [0 | 1]<br />
o Parameter: A value of 0 corresponds to Fair mode, <strong>and</strong> 1 to Priority-based mode.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
Selects the policy in which the QoS manages the excess of b<strong>and</strong>width: Fair or Priority-based mode.<br />
• QOS_LATENCY.prio+1 = [1 | 2 | 4 | 8]<br />
o Parameter: Priority levels: prio = 0 … 7. Possible values are: 1, 2, 4 <strong>and</strong> 8.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
This list configures the latency for each priority level in QOS_LATENCY_STEP units (priority levels: prio<br />
= 0 … 7).<br />
11.6 PROFILES PARAMETERS<br />
A profile is set of configurable parameters that are saved as a whole. A number is assigned to each profile, <strong>and</strong><br />
when a modem is assigned one profile, it will use all the parameters that are saved in this profile.<br />
To define a profile all parameters must be set up, even if not working with VLANs. In this case, the values are<br />
not used <strong>and</strong> can be 1 for instance.<br />
• PROFILE_MAX_TXPUT_TX.i = N (in kbps)<br />
o Parameter: Number (32 bits size) of kbps<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
Maximum transmission throughput (from the slave point of view: upstream) for users with profile i. A<br />
modem that uses the profile ‘i’ will have a transmission throughput limited to this value.<br />
Submission page 304 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
• PROFILE_MAX_TXPUT_RX.i N (in kbps)<br />
M<strong>and</strong>atory: yes<br />
o Parameter: Number (32 bits size) of kbps<br />
o SNMP: no<br />
Maximum reception throughput (from the EU point of view: downstream) for users with profile i. A modem that<br />
uses the profile ‘i’ will have the reception throughput limited to this value.<br />
• PROFILE_UPBWLIMIT.i = [YES|NO]<br />
o Parameter: ‘yes’ (to limit the upstream) or ‘no’ (to not limit the upstream)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
In a Master or a TD Repeater, this parameter is used to limit the upstream (slave’s transmission) for users<br />
with profile i. This parameter is set to ‘yes’ by default.<br />
If set to ‘no’, the user will receive resource allocation messages constantly. Every time the master node has<br />
transmitted all required resource allocation messages to all the slaves with limit up b<strong>and</strong>width enabled, then<br />
it will transmit resource allocation messages to the slaves without up b<strong>and</strong>width limit until the rest of the<br />
slaves can receive resource allocation messages again.<br />
• PROFILE_DWBWLIMIT.i = [YES|NO]<br />
o Parameter: ‘yes’ (to limit the downstream) or ‘no’ (to not limit the downstream)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
In a Master or a TD Repeater, this parameter is used to limit the downstream (slave’s reception) for users<br />
with profile i. This parameter is set to ‘yes’ by default.<br />
If disabled, the master node will never stop transmitting data to that user. Every time the master node has<br />
transmitted all required data to all slaves with down b<strong>and</strong>width limit, then it will transmit data to the slaves<br />
without down b<strong>and</strong>width limit until the rest of slaves can receive again.<br />
• PROFILE_PRIORITIES.i = [0x00-0xFF]<br />
o Parameter: ‘0xXX’ (hexadecimal number from 00 to FF) each bit represents a priority, that can be<br />
set (1) or not (0).i.e. 0x85 priorities 7, 2 <strong>and</strong> 0 are allowed.<br />
Submission page 305 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
This parameter indicates the priorities allowed for a user of profile i. This is useful to prioritise some<br />
transmission above others <strong>and</strong> to give some quality of service to the different modems.<br />
At this parameter each bit represents a priority, that can be set or not. The default value is 0x85, so<br />
priorities 7, 2 <strong>and</strong> 0 are allowed. To include another priority, it is necessary to set the appropriate bit in the<br />
profile priorities flag. In any case, the maximum <strong>and</strong> minimum priorities are always set even if they are not<br />
configured (0x81).<br />
• PROFILE_MNMT_VLAN.i = [2-4093] | %<br />
o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
If VLANs are used, this value indicates the management VLAN for that user.<br />
• PROFILE_DATA_VLAN.i = [2-4093] | %<br />
o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
If VLANs are used, this value indicates the Data VLAN for that user.<br />
• PROFILE_VOIP_VLAN.i = [2-4093] | %<br />
o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
If VLANs are used, this valued indicates the VoIP VLAN for that user.<br />
• PROFILE_VLAN_ADD_TAG.i.j = [2-4093] or parametric<br />
o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
Submission page 306 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
With this parameter a filter list is created. The list can be ‘allowed’ or ‘forbidden’. A user that uses the<br />
profile ‘i’ will add the filter list as allowed or forbidden.<br />
This parameter is of table type, with up to 16 VLAN in the filter list. When the list is ‘allowed’, these tags<br />
are added to the base configuration. Otherwise, if the list is changed to forbidden, the base tags are removed<br />
<strong>and</strong> only the tags defined here are included, for security reasons.<br />
• PROFILE_VLAN_IS_ALLOWED_IFACE_USER.i = [yes/no]<br />
M<strong>and</strong>atory: no<br />
o Parameter: ‘yes’ (to set the list as allowed) or ‘no’ (to set the list as forbidden)<br />
o SNMP: no<br />
This parameter is the complementary of the previous one <strong>and</strong> indicates if the tags on the list are allowed or<br />
forbidden for the user with the profile i. When the list is ‘allowed’ (setting ‘yes’ as value of the parameter) the tags<br />
are additive to the base configuration, when the list is ‘forbidden’ (setting ‘no’ as value of the parameter), the list is<br />
reseted <strong>and</strong> only tags defined with PROFILE_VLAN_ADD_TAG will be in the list.<br />
• PROFILE_VLAN_TAGGED_ONLY_IFACE_USER.i = [yes/no]<br />
o Parameter: ‘yes’ (to drop input packets without VLAN tag) or ‘no’ (to not drop input packets<br />
without VLAN tag)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
This parameter indicates whether or not to drop input packets without a VLAN tag from the user with<br />
profile i (PL interface).<br />
• PROFILE_VLAN_OUTFORMAT_TAG_IFACE_USER.i = [yes/no]<br />
o Parameter: ‘yes’ (to send packets with VLAN tag) or ‘no’ (to not send packets with VLAN tag)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
This parameter indicates whether or not to send packets with a VLAN tag to the user interface with this<br />
profile.<br />
• PROFILE_OVLAN_ADD_TAG.i.j = [2-4094] or parametric<br />
o Parameter: Number from 2 to 4094 or ‘%Parameter_name’ (parametric value preceded by a %)<br />
o SNMP: no<br />
Submission page 307 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o M<strong>and</strong>atory: yes<br />
With this parameter a filter list is created. The list can be ‘allowed’ or ‘forbidden’. A user that uses the<br />
profile ‘i’ will add the filter list as allowed or forbidden.<br />
This parameter is of table type, with up to 16 OVLAN in the filter list. When the list is ‘allowed’, these tags<br />
are added to the base configuration. Otherwise, if the list is changed to forbidden, the base tags are removed<br />
<strong>and</strong> only the tags defined here are included, for security reasons.<br />
• PROFILE_OVLAN_IS_ALLOWED_IFACE_USER.i = [yes/no]<br />
o Parameter: ‘yes’ (to mark the list as allowed) or ‘no’ (to mark the list as forbidden)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
This parameter is the complementary of the previous one <strong>and</strong> indicates if the tags on the list are allowed or<br />
forbidden for the user with the profile i. When the list is ‘allowed’ (setting ‘yes’ as value of the parameter)<br />
the tags are additive to the base configuration, when the list is ‘forbidden’ (setting ‘no’ as value of the<br />
parameter), the list is reset <strong>and</strong> only tags defined with PROFILE_OVLAN_ADD_TAG will be in the list.<br />
• PROFILE_OVLAN_TAGGED_ONLY_IFACE_USER.i = [yes/no]<br />
o Parameter: ‘yes’ (to drop input packets without OVLAN tag) or ‘no’ (to not drop input packets<br />
without OVLAN tag)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
This parameter indicates whether or not to drop input packets without a OVLAN tag from the user with<br />
profile i (PL interface).<br />
• PROFILE_OVLAN_OUTFORMAT_TAG_IFACE_USER.i = [yes/no]<br />
o Parameter: ‘yes’ (to send packets with OVLAN tag) or ‘no’ (to not send packets with OVLAN<br />
tag)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
This parameter indicates whether or not to send packets with a VLAN tag to the user interface with this<br />
profile.<br />
Submission page 308 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
11.7 TRANSLATION TABLE PARAMETERS<br />
The translation table contains information about the VLAN/OVLANs used for all nodes hanging from HV/MV<br />
equipment. This table is necessary because the autoconfiguration file of equipment is a parametric file, that is,<br />
there are several symbolic values that should be translated into concrete values.<br />
• TRANSLATION_MNMT_VLAN = [2-4093]<br />
o Parameter: Number from 2 to 4093<br />
o SNMP: none<br />
o M<strong>and</strong>atory: yes<br />
Tag number of the Management VLAN. This parameter is m<strong>and</strong>atory when using VLANs in the network.<br />
• TRANSLATION_DATA_VLAN.i = [2-4093]<br />
o Parameter: Number from 2 to 4093<br />
o SNMP: none<br />
o M<strong>and</strong>atory: yes<br />
Tag number of the Data i-operator VLAN (i=1, 2, 3…). Up to 16 different tags can be set.<br />
• TRANSLATION_VOIP_VLAN.i = [2-4093]<br />
o Parameter: Number from 2 to 4093<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
Tag number of the VOIP i-operator VLAN (I=1,2,3,…) Up to 16 different tags can be set.<br />
• TRANSLATION_ROOTPATH_OVLAN = [2-4094]<br />
o Parameter: Number from 2 to 4094<br />
o SNMP: none<br />
o M<strong>and</strong>atory: yes<br />
Tag number of the default OVLAN. This parameter is m<strong>and</strong>atory when using OVLANs in the network.<br />
Submission page 309 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
11.8 <strong>MAC</strong> FILTER PARAMETERS<br />
• <strong>MAC</strong>_INGRESS_FILTERING_ENABLE = [YES | NO]<br />
o Parameter: Enables (YES) or disables (NO) <strong>MAC</strong> ingress filtering in Ethernet interfaces.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Enables or disables <strong>MAC</strong> ingress filtering in Ethernet interfaces (EXTA <strong>and</strong> EXTB). If enabled, only the<br />
incoming frames whose source <strong>MAC</strong> address is contained in the allowed <strong>MAC</strong> list will be processed by the<br />
bridge. If disabled, any <strong>MAC</strong> incoming frame will be processed, regardless its source address.<br />
• <strong>MAC</strong>_INGRESS_FILTERING_MAX_ALLOWED = [1 … 4]<br />
o Parameter: Values from 1 to 4 are possible.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Configures the maximum number of <strong>MAC</strong> addresses contained in the allowed <strong>MAC</strong> list for <strong>MAC</strong> ingress<br />
filtering.<br />
• <strong>MAC</strong>_INGRESS_FILTERING_MODE = [FIXED | AUTO]<br />
o Parameter: Two possible values: FIXED or AUTO. If FIXED is selected, the allowed <strong>MAC</strong> list<br />
must be filled entering each <strong>MAC</strong> address manually. If AUTO is selected, the allowed <strong>MAC</strong> list is<br />
automatically filled with any new source <strong>MAC</strong> address learnt by the bridge.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Selects one of the following <strong>MAC</strong> ingress-filtering modes:<br />
o Fixed. In this case, the allowed <strong>MAC</strong> list must be filled entering each <strong>MAC</strong> address manually.<br />
o Automatic. In this case, the allowed <strong>MAC</strong> list is automatically filled with any new source <strong>MAC</strong><br />
address learnt by the bridge. Until the list is not full, the filtering is not actually performed. Once<br />
the list is full, the filtering is enabled <strong>and</strong> any frame with source <strong>MAC</strong> address not contained in the<br />
list will be discarded.<br />
In both modes, the own <strong>MAC</strong> address is never filtered, i.e. it is implicitly contained in the allowed <strong>MAC</strong><br />
list, although not taken into account when computing the number of allowed addresses.<br />
• <strong>MAC</strong>_INGRESS_FILTERING_FIXED_<strong>MAC</strong>.i 0xXXXXXXXXXXXX<br />
Submission page 310 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o Parameter: The value must be specified with 12 hexadecimal digits.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Configures i-<strong>MAC</strong> address of the allowed <strong>MAC</strong> list for <strong>MAC</strong> ingress filtering when fixed <strong>MAC</strong> ingressfiltering<br />
mode is selected (i = 1 … 4).<br />
11.9 NTP PARAMETERS<br />
For complete information about NTP (Network Time Protocol) please refer to RFC 958.<br />
• NTP_ENABLE = [ENABLED | DISABLED]<br />
o Parameter: Enables (ENABLED) or disables (DISABLED) the NTP feature.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Enables or disables the NTP feature.<br />
• NTP_SERVER_IP = <br />
o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />
dots).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Configures the NTP server IP address.<br />
• NTP_TIMEZONE = [-12 … 12] * 60<br />
o Parameter: This value must be specified in minutes (in 60-minute steps) relative to Universal<br />
Time (UT). A value of 0 corresponds to UT.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Configures the timezone for the NTP clock server. This value is relative to Universal Time (UT), also known as<br />
Greenwich Mean Time (GMT).<br />
• NTP_DST = [YES | NO]<br />
Submission page 311 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o Parameter: If the value is YES, the time correction for daylight savings time is applied. Not<br />
applied if NO.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
If this parameter is enabled, the time correction for daylight savings time is applied. Not applied if disabled.<br />
11.10 SNMP PARAMETERS<br />
For complete information about SNMP (Simple Network Management Protocol) please refer to RFC 1157.<br />
• SNMP_TRAP_IP_ADDRESS = <br />
o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />
dots).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
Configures the IP address to which traps are sent when produced.<br />
• SNMP_TRAP_COMMUNITY_NAME = community<br />
o Parameter: This parameter is a string (up to 25 characters) (e.g.<br />
“SNMP_TRAP_COMMUNITY_NAME = public”).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
It configures the trap community access.<br />
11.11 STP PARAMETERS<br />
For complete information about STP (Spanning Tree Protocol) <strong>and</strong> RSTP (Rapid STP) please refer to IEEE 802.1d<br />
<strong>and</strong> IEEE 802.1w st<strong>and</strong>ards, respectively.<br />
• STP_PRIO = [0 … 65535]<br />
o Parameter: Valid values range from 0 to 65535.<br />
o SNMP: no<br />
Submission page 312 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o M<strong>and</strong>atory: no<br />
Configures the 2-byte field which, added to the <strong>MAC</strong> address, is used by the STP st<strong>and</strong>ard to decide the<br />
root path (Bridge Identifier Priority, part of BridgeIdentifier, in IEEE 802.1d). The default values,<br />
depending on the node features, are the following (in hexadecimal):<br />
o 0x9010: MV MASTER<br />
o 0x9010: MV MASTER<br />
o 0x9020: MV TDREPEATER<br />
o 0x9030: LV MASTER<br />
o 0x9040: LV TDREPEATER<br />
o 0x9050: LV CPE<br />
• STP_PORT.i = [EXTA | EXTB | BPL]<br />
o Parameter: Three possible values: EXTA, EXTB <strong>and</strong> BPL (i = 1,2 or 3).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
This list configures the type of port to be used in association with STP_PORT_PRIO.i <strong>and</strong><br />
STP_PORT_COST.i parameters. (i = 1 … 3). All these parameters are lists, whose elements are associated<br />
by the same i-index. Ethernet interfaces A <strong>and</strong> B, <strong>and</strong> the BPL ports can be selected. In case of BPL, all<br />
ports will be h<strong>and</strong>led as an aggregate, i.e. the priority <strong>and</strong> cost will be the same for all BPL ports.<br />
• STP_PORT_PRIO.i = [0 … 255]<br />
o Parameter: Valid values range from 0 to 255 (i = 1,2 or 3).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
This list configures the priority assigned to each port, needed if their costs are equal (i = 1 … 3). The default<br />
value for all ports is 80.<br />
• STP_PORT_COST.i = [0 … 4294967295]<br />
o Parameter: Valid values range from 0 to 4294967295 (i = 1,2 or 3).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Submission page 313 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
This list configures the cost associated with each port (PortPathCost in IEEE 802.1d) (i = 1 … 3). The<br />
default values, depending on the port type, are the following:<br />
o 2000000: Ethernet interface A (EXTA)<br />
o 2000000: Ethernet interface B (EXTB)<br />
o 4000000: BPL ports<br />
• STP_HELLO_TIME = [10 … 40]<br />
o Parameter: Valid values range from 10 to 40.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Hello time expressed in decisecs (HelloTime in IEEE 802.1d). The default value is 20 decisecs.<br />
• STP_MAX_AGE = [10 … 40]<br />
o Parameter: Valid values range from 10 to 40.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Maximum age time expressed in decisecs (MaxAge in IEEE 802.1d). The default value is 200 decisecs.<br />
• STP_FORWARD_DELAY = [40 … 300]<br />
o Parameter: Valid values range from 40 to 300.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Forward delay time expressed in decisecs (forwardDelay in IEEE 802.1d). The default value is 150<br />
decisecs.<br />
• STP_FRONTIER = [EXTA | EXTB | NONE]<br />
o Parameter: Valid values are: EXTA (Ethernet interface A), EXTB (Ethernet interface B) <strong>and</strong><br />
NONE (Spanning Tree Frontier disabled).<br />
o SNMP: plStpFrontier<br />
o M<strong>and</strong>atory: no<br />
Submission page 314 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Selects the interface where Spanning Tree Frontier is enabled or disables it. This feature drops all the STP<br />
messages on an external (Ethernet) interface.<br />
• STP_MODE = [STP | RSTP]<br />
o Parameter: Possible values: STP selects STP or RSTP selects RSTP.<br />
o SNMP: plStpProtocolVersion<br />
o M<strong>and</strong>atory: yes<br />
Selects STP protocol version, either STP (version < 2, IEEE 802.1d) or RSTP (version ≥ 2, IEEE 802.1w)<br />
(rstpVersion <strong>and</strong> stpVersion in IEEE 802.1d). The RSTP version is compatible with STP on a per-port<br />
basis.<br />
11.12 VOIP PARAMETERS<br />
For complete information about VoIP protocols please refer to ITU H.323, RFC 3261 (SIP) <strong>and</strong> RFC 2705 (MGCP)<br />
st<strong>and</strong>ards.<br />
• VOIP_ENABLE = [ENABLED | DISABLED]<br />
o Parameter: This parameter enables (ENABLED) or disables (DISABLED) the VoIP service.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
This parameter enables or disables the VoIP service.<br />
• VOIP_GATEKEEPERIP = <br />
o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />
dots).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
IP address of the H.323 gatekeeper.<br />
• VOIP_LINE1NUMBER = number<br />
o Parameter: This parameter is a string (maximum string length is 20 characters) (e.g.<br />
“VOIP_LINE1NUMBER = 612345678”).<br />
o SNMP: no<br />
Submission page 315 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o M<strong>and</strong>atory: no<br />
Configures the telephone number for H.323.<br />
• VOIP_DIALPLAN = ([0 … 9, ‘T’, ‘X’, ‘.’, ‘|’])<br />
o Parameter: This parameter is a string with maximum length is 200 characters (e.g.<br />
“VOIP_DIALPLAN = (9XXXXXXXX|6XXXXXXXX|00X.T)”.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Configures the dial plan matching string for H.323. Please see section 11.12.1 for details.<br />
• VOIP_INBANDDTMF = [ENABLED | DISABLED]<br />
o Parameter: This parameter enables (ENABLED) or disables (DISABLED) in-b<strong>and</strong> DTMF feature.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
This parameter enables or disables in-b<strong>and</strong> DTMF feature.<br />
• VOIP_OUTOFBANDDTMF = [ENABLED | DISABLED]<br />
o Parameter: This parameter enables (ENABLED) or disables (DISABLED) out-of-b<strong>and</strong> DTMF<br />
feature.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
This parameter enables or disables out-of-b<strong>and</strong> DTMF feature.<br />
• VOIP_KEYPADTYPE = [KEYPADTYPE_NONE | KEYPADTYPE_H225 |<br />
KEYPADTYPE_H245ALPHANUMERIC | KEYPADTYPE_H245SIGNAL |<br />
KEYPADTYPE_RFC2833]<br />
o Parameter: This parameter is a string (up to 30 characters). Valid values are the following:<br />
o KEYPADTYPE_H225: H.225/Q.931 User Info field (Keypad facility information element)<br />
o KEYPADTYPE_H245ALPHANUMERIC: H.245 User Input Indication (UII) Alphanumeric<br />
message<br />
o KEYPADTYPE_H245SIGNAL: H.245 User Input Indication (UII) Signal Type message<br />
o KEYPADTYPE_RFC2833: RTP stream as defined in RFC 2833<br />
Submission page 316 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o SNMP: no<br />
o KEYPADTYPE_NONE: no out-of-b<strong>and</strong> signalling<br />
o M<strong>and</strong>atory: no<br />
Configures the different 'keypad types' defined by H.323 in order to codify the out-of-b<strong>and</strong> DTMF<br />
signaling.<br />
• VOIP_CALLSIGPORT1 = [1025 … 65530]<br />
o Parameter: Valid values range from 1025 to 65530.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Configures the modem signaling port for H.323.<br />
• VOIP_G711USS = [YES | NO]<br />
o Parameter: Selects whether silence suppression for G.711 μ-law is enabled (YES) or not (NO).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
It selects whether silence suppression for G.711 μ-law is enabled or not.<br />
• VOIP_G711UPACK = [2 … 4]<br />
o Parameter: Valid values range from 2 (20 ms) to 4 (40 ms).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Configures the specific packet size in 10-ms units for G.711 μ-law.<br />
• VOIP_G711ASS = [YES | NO]<br />
o Parameter: Selects whether silence suppression for G.711 A-law is enabled (YES) or not (NO).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Selects whether silence suppression for G.711 A-law is enabled or not.<br />
Submission page 317 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
• VOIP_G711APACK = [2 … 4]<br />
o Parameter: Valid values range from 2 (20 ms) to 4 (40 ms).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Configures the specific packet size in 10-ms units for G.711 A-law.<br />
• VOIP_JB_TYPE = [FIXED | ADAPTIVE]<br />
o Parameter: Selects either adaptive (ADAPTIVE) or fixed (FIXED) jitter buffer.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Selects either adaptive or fixed jitter buffer.<br />
• VOIP_FJB_DELAY = [1 … 10] * 10<br />
o Parameter: Valid values range from 10 to 100 ms.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Configures the fixed jitter buffer delay in ms.<br />
• VOIP_AJB_MAXDELAY = [1 … 19] * 10<br />
o Parameter: Valid values range from 10 to 190 ms.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Configures the adaptive jitter buffer maximum delay in ms.<br />
• VOIP_G729ON = [YES | NO]<br />
o Parameter: Selects whether G.729 codec is enabled (YES) or not (NO).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Selects whether G.729 codec is enabled or not.<br />
Submission page 318 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
• VOIP_G729SS = [YES | NO]<br />
o Parameter: Selects whether G.729 silence enabled is supported (YES) or not (NO).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Selects whether silence suppression for G.729 is enabled or not.<br />
• VOIP_G729PACK = [2 … 4]<br />
o Parameter: Valid values range from 2 (20 ms) to 4 (40 ms).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Configures the specific packet size in 10-ms units for G.729.<br />
• VOIP_ALTERNATEGK = [ENABLED | DISABLED]<br />
o Parameter: Enables (ENABLED) or disables (DISABLED) alternate gatekeeper feature for H.323.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Enables or disables alternate gatekeeper feature for H.323.<br />
• VOIP_ALTGKIP = <br />
o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />
dots).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
IP address of the H.323 alternative gatekeeper.<br />
• VOIP_GKDISCOVERY = [ENABLED | DISABLED]<br />
o Parameter: Enables (ENABLED) or disables (DISABLED) gatekeeper discovery feature for H.323.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Submission page 319 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Enables or disables gatekeeper discovery feature for H.323.<br />
• VOIP_FULLRRQ1 = [ENABLED | DISABLED]<br />
o Parameter: Enables (ENABLED) or disables (DISABLED) full gatekeeper registration request for<br />
H.323.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Enables or disables full gatekeeper registration request for H.323.<br />
• VOIP_TIMETOLIVE = [≥ 60]<br />
o Parameter: The minimum valid value is 60 seconds.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Value in seconds for the H.323 time-to-live parameter (time after which the registration with the gatekeeper<br />
shall expire). This parameter is related to the time between two consecutive registration requests to the<br />
gatekeeper. Using a value greater than 1200 is recommended in order not to interfere with the polling<br />
feature.<br />
• VOIP_FASTCONNECT = [ENABLED | DISABLED]<br />
o Parameter: Enables (ENABLED) or disables (DISABLED) fast connect signalling feature for<br />
H.323.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Enables or disables fast connect signalling feature for H.323.<br />
• VOIP_H245TUNNEL = [ENABLED | DISABLED]<br />
o Parameter: Enables (ENABLED) or disables (DISABLED) H.245 tunnelling signalling feature for<br />
H.323.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Enables or disables H.245 tunnelling signalling feature for H.323.<br />
• VOIP_COUNTRY = [XX | ES | PT | GB | JP | FR | SG | RU | AU]<br />
Submission page 320 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o Parameter: This parameter is a string (up to 20 characters). Valid values are: The USA (XX), Spain<br />
(ES), Portugal (PT), The United Kingdom (GB), Japan (JP), France (FR), Singapore (SG), Russia<br />
(RU) <strong>and</strong> Australia (AU). The default country is Spain (ES).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Configures telephony tones (dial, network busy, busy <strong>and</strong> ring-back tones) <strong>and</strong> phone line (physical) parameters<br />
(line impedance, ring waveform <strong>and</strong> line feed voltage) for the specified country. The default country is Spain.<br />
Please see section 11.12.2 for details.<br />
The following four parameters are provided to be able to configure tones for countries that are not available through<br />
the VOIP_COUNTRY parameter. If the country is available, there is no need to use these parameters. In any case,<br />
these parameters overwrite the VOIP_COUNTRY settings.<br />
• VOIP_TONE_DIALTONE = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />
o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_DIALTONE =<br />
425@-10#ON”).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Dial tone configuration pattern. Please see section 11.12.3 for details.<br />
• VOIP_TONE_NETWORKBUSY = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />
o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_BUSY = 425@-<br />
10#ON(200),OFF(200),R”).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Network busy tone configuration pattern. Please see section11.12.3 for details.<br />
• VOIP_TONE_BUSY = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />
o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_BUSY = 425@-<br />
10#ON(200),OFF(200),R”).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Submission page 321 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Busy tone configuration pattern. Please see section 11.12.3 for details.<br />
• VOIP_TONE_RINGBACK = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />
o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_RINGBACK =<br />
425@-10#ON(1500),OFF(3000),R”).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Ring-back tone configuration pattern. Please see section 11.12.3 for details.<br />
• VOIP_RTP_TOS = 0xXX<br />
o Parameter: value must be specified with 2 hexadecimal digits.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Configures the 8-bit bitmap of the type of service field in the IP header of the RTP packets.<br />
• VOIP_CALLSIG_TOS 0xXX<br />
o Parameter: value must be specified with 2 hexadecimal digits.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Configures the 8-bit bitmap of the type of service field in the IP header of the VoIP signalling packets for<br />
H.323.<br />
11.12.1 Dial Plan Configuration<br />
A dial plan gives the unit a map to determine when a complete number has been entered <strong>and</strong> should be passed to the<br />
gatekeeper for resolution into an IP address. Dial plans are expressed using the same syntax used by MGCP NCS<br />
specification.<br />
The dialled numbers that do not match the specified dial plan do not initiate an outgoing call from the VoIP modem.<br />
The formal syntax of the dial plan is described using the following notation:<br />
Digit ::= "0" | "1" | "2" | "3" | "4" | "5" | "6" | "7" | "8" | "9"<br />
Submission page 322 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Timer ::= "T" | "t"<br />
Letter ::= Digit | Timer | "#" | "*" | "A" | "a" | "B" | "b" | "C" | "c" | "D" | "d"<br />
Range ::= "X" | "x" -- matches any digit<br />
| "[" Letters "]" -- matches any of the specified letters<br />
Letters ::= Subrange | Subrange Letters<br />
Subrange ::= Letter -- matches the specified letter<br />
| Digit "-" Digit -- matches any digit between first <strong>and</strong> last<br />
Position ::= Letter | Range<br />
StringElement ::= Position -- matches any occurrence of the position<br />
| Position "." -- matches an arbitrary number of occurrences including 0<br />
String ::= StringElement | StringElement String<br />
StringList ::= String | String "|" StringList<br />
DialPlan ::= "(" StringList ")"<br />
A dial plan, according to this syntax, is defined either by a string (not case-sensitive) or by a list of strings.<br />
Regardless of the above syntax a timer is only allowed if it appears in the last position in a string (12T3 is not<br />
valid). Each string is an alternate numbering scheme. The unit will process the dial plan by comparing the current<br />
dial string against the dial plan. If the result is under-qualified (partially matches at least one entry) then it will do<br />
nothing further; if the result matches or is overqualified (no further digits could possibly produce a match) then it<br />
sends the string to the gatekeeper <strong>and</strong> clears the dial string.<br />
The timer T is activated when it is all that is required to produce a match. The period of timer T is 4 seconds. For<br />
example, a dial plan of (xxxT|xxxxx) will match immediately if 5 digits are entered <strong>and</strong> it will also match after a 4<br />
second pause when 3 digits are entered.<br />
Submission page 323 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
11.12.2 Country Specific Parameters<br />
These are the country-specific parameters configured from “VOIP_COUNTRY”. Some of them (tone-related<br />
parameters) can be latter overwritten (thanks to VOIP_TONE_DIALTONE, VOIP_TONE_RINGBACK,<br />
VOIP_TONE_BUSY <strong>and</strong> VOIP_TONE_NETWORKBUSY). The others (line feed voltage, ring signal waveform<br />
<strong>and</strong> line impedance) can’t be changed.<br />
Default parameters:<br />
These are the ones being used for any country not specified in the list below (they are USA parameters):<br />
DIALTONE = 350@-13+440@-13#ON(300),OFF(0),R<br />
RINGBACK = 440@-13+480@-19#2000(ON),4000(OFF),R<br />
BUSY = 480@-24+620@-24#500(ON),500(OFF),R<br />
NETWORKBUSY = 480@-24+620@-24#250(ON),250(OFF),R<br />
LINE FEED VOLTAGE = 48 V DC<br />
RING SIGNAL = 48 V DC + 35 Vrms AC # 2000(ON),4000(OFF),R<br />
LINE IMPEDANCE = 600 ohm<br />
Countries:<br />
NOTE: If some country does not specify all of the possible parameters that is because these parameters get the<br />
“default” value shown above.<br />
SPAIN:<br />
DIALTONE = 425@-10#ON(3000),OFF(0),R<br />
NETWORKBUSY = 425@-10#ON(200),OFF(200),R<br />
BUSY = 425@-10#ON(200),OFF(200),R<br />
Submission page 324 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
RINGBACK = 425@-10#ON(1500),OFF(3000),R<br />
PORTUGAL:<br />
UK:<br />
DIALTONE = 425@-10#ON(3000),OFF(0),R<br />
NETWORKBUSY = 425@-10#ON(200),OFF(200),R<br />
BUSY = 425@-10#ON(200),OFF(200),R<br />
RINGBACK = 425@-10#ON(1000),OFF(5000),R<br />
RING SIGNAL = 48 V DC + 35 Vrms AC # 1000(ON),5000(OFF),R<br />
DIALTONE = 350@-18+440@-18#ON(3000),OFF(0),R<br />
NETWORKBUSY = 400@-14#ON(400),OFF(400),R<br />
BUSY = 400@-14#ON(400),OFF(400),R<br />
RINGBACK = 400@-15+450@-15#ON(400),OFF(200),ON(400),OFF(2000),R<br />
JAPAN:<br />
DIALTONE = 400@-15#ON(3000),OFF(0),R<br />
NETWORKBUSY = 400@-5#ON(500),OFF(500),R<br />
BUSY = 400@-5#ON(500),OFF(500),R<br />
RINGBACK = 400@-10#ON(1000),OFF(2000),R<br />
FRANCE:<br />
Submission page 325 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
DIALTONE = 440@-13#ON(3000),OFF(0),R<br />
NETWORKBUSY = 440@-13#ON(500),OFF(500),R<br />
BUSY = 440@-13#ON(500),OFF(500),R<br />
RINGBACK = 440@-13#ON(1500),OFF(3500),R<br />
SINGAPORE:<br />
DIALTONE = 425@-15#ON(3000),OFF(0),R<br />
NETWORKBUSY = 425@-10#ON(750),OFF(750),R<br />
BUSY = 425@-10#ON(750),OFF(750),R<br />
RINGBACK = 425@-10#ON(400),OFF(200),R<br />
RUSSIA:<br />
DIALTONE = 425@-10#ON(400),OFF(400),R<br />
RINGBACK = 425@-10#ON(800),OFF(3200),R<br />
AUSTRALIA:<br />
DIALTONE = 425@-10#ON(3000),OFF(0),R<br />
NETWORKBUSY = 425@-10#ON(200),OFF(200),R<br />
BUSY = 425@-10#ON(400),OFF(400),R<br />
RINGBACK = 425@-10#ON(400),OFF(200),ON(400),OFF(2000),R<br />
LINE IMPEDANCE = 220 ohm + 820 ohm || 120 nF<br />
Submission page 326 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
11.12.3 Tone pattern configuration<br />
The different available tones can be configured using the following ring cadence pattern:<br />
freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R. Only the following frequencies (in Hz) are possible:<br />
350, 400, 425, 440, 480, 572, 620, 682, 697, 770, 852, 941, 1209, 1336, 1400, 1477, 1633, 2060, 2130, 2450, 2750<br />
<strong>and</strong> 2600. An example will help to explain this string:<br />
950@-25+420@-10#ON(330),OFF(30),IDLE(1000),R:<br />
This will create the following tone:<br />
• The tone will be the addition of two frequencies: 950Hz with a power of –25dBm plus 420Hz with a power of –<br />
10dBm<br />
• It will be ON during 330 msecs.<br />
• Then it will be OFF during 30 msecs.<br />
• And then it will be IDLE for 1000 msecs. This IDLE number it is not m<strong>and</strong>atory in the string.<br />
• R means that the sequence ON, OFF, IDLE will be repeated continuously.<br />
To configure a continuous tone of 1400Hz <strong>and</strong> –10dBm, the following string should be used:<br />
• 1400@-10#ON(3000),OFF(0),R<br />
Therefore, the m<strong>and</strong>atory symbols are:<br />
• @ to separate frequency <strong>and</strong> power.<br />
• # to separate the tone frequency <strong>and</strong> power from the sound cadence.<br />
• , to separate the ON(xx), OFF(xx) <strong>and</strong> IDLE(xx) parameters.<br />
Besides, the tone may be an addition of two different frequencies <strong>and</strong> powers using the + symbol.<br />
11.13 VLAN NETWORK<br />
• VLAN_ENABLE = [yes|no]<br />
o Parameter: ‘yes’ (to enable VLAN use) or ‘no’ (to disable VLAN use)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
Submission page 327 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
This autoconfiguration parameter enables or disables the use of VLAN. Normally this parameter is not<br />
needed because the modem itself discovers the use of VLAN, but it is necessary in case of booting from<br />
local settings.<br />
• VLAN_MNMT_TAG = [2-4093] | %<br />
o Parameter: Number from 2 to 4093) or ‘%Parameter_name’ (parametric value preceded by a %)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
This parameter indicates the management VLAN_ID (VID) of high-level management protocols (Telnet,<br />
Ping, …). Often a parametric value is used, <strong>and</strong> so the appropriate parameter will be taken from the<br />
translation table (for example, writing ‘$VLAN_DATA_2’).<br />
• VLAN_MNMT_PRIO = [0-7]<br />
o Parameter: Number from 0 to 7.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
This autoconfiguration parameter sets the VLAN priority for the high-level management (Telnet, Ping, …)<br />
packets.<br />
• VLAN_DATA_TAG = [2-4093] | %<br />
o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
This parameter is used at the EU nodes. It configures the VLAN_ID (VID) for the data packets (packets<br />
coming from the external interfaces). The value set can be a value (from 2 to 4093) or a parametric value. In<br />
this last case, the adequate value will be taken from the translation table.<br />
• VLAN_DATA_PRIO = [0-6]<br />
o Parameter: Number from 0 to 6.<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
This parameter is used at the EU nodes. It configures the VLAN priority for the data packets (packets<br />
coming from the external interfaces).<br />
Submission page 328 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
• VLAN_VOIP_TAG = [2-4093] | %<br />
o Parameter: Number from 2 to 4093 or ‘%Parameter_name‘ (parametric value preceded by a %)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
This parameter configures the VLAN_ID (VID) for the VoIP packets (packets coming from the external<br />
interfaces). The value set can be a value (from 2 to 4093) or a parametric value. In this last case, the<br />
adequate value will be taken from the translation table.<br />
• VLAN_VOIP_PRIO = [0-7]<br />
o Parameter: Number from 0 to 7<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
This autoconfiguration parameter sets the VLAN priority for the VoIP packets.<br />
• VLAN_VSIG_PRIO = [0-7]<br />
o Parameter: Number from 0 to 7<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
It configures the VLAN priority for the VoIP signalling packets.<br />
• VLAN_TRUNK.i = [2-4093]<br />
o Parameter: Number from 2 to 4093)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
This parameter is usable at LV <strong>and</strong> MV nodes. It configures a list of VLAN trunks different from the ones<br />
inside the translation table that must be allowed in the node interfaces. It is necessary to configure these<br />
trunks for private VLANs between EUs in all intermediary equipment.<br />
• VLAN_RETAG_EXTA_SRC = [0 | 2-4095]<br />
o Parameter: ‘0’ (in order to disable retagging in interface) number from 2 to 4095.<br />
o SNMP: no<br />
Submission page 329 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o M<strong>and</strong>atory: yes<br />
Autoconfiguration parameter used for VLAN retagging: External (Ethernet) interface A (EXTA) source tag.<br />
With 0, the retagging is disabled in EXTA interface.<br />
• VLAN_RETAG_EXTA_DST = [0 | 2-4095]<br />
o Parameter: ‘0’ (in order to disable retagging in interface) or number from 2 to 4095<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
Autoconfiguration parameter used for the VLAN retagging: External (Ethernet) interface A (EXTA)<br />
destination tag. With 0, the retagging is disabled in EXTA interface.<br />
• VLAN_RETAG_EXTB_SRC = [0 | 2-4095]<br />
o Parameter: ‘0’ (in order to disable retagging in interface) or number from 2 to 4095<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
Autoconfiguration parameter used for the VLAN retagging: External (Ethernet) interface B (EXTB) source<br />
tag. With 0, the retagging is disabled in EXTB interface.<br />
• VLAN_RETAG_EXTB_DST = [0 | 2-4095]<br />
o Parameter: ‘0’ (in order to disable retagging in interface) or number from 2 to 4095<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
Autoconfiguration parameter used for the VLAN retagging: External (Ethernet) interface B (EXTB)<br />
destination tag. With 0, the retagging is disabled in EXTB interface.<br />
11.14 OVLAN PARAMETERS<br />
The OVLAN parameters are used to configure the basic OVLAN configuration, which avoids the visibility between<br />
different customers in the access network. They are similar to the VLAN parameters specified above.<br />
• OVLAN_ENABLE = [yes|no]<br />
o Parameter: ‘yes’ (to enable OVLAN use) or ‘no’ (to disable OVLAN use)<br />
Submission page 330 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o SNMP: none<br />
o M<strong>and</strong>atory: yes<br />
This autoconfiguration parameter enables or disables the use of OVLAN filtering.<br />
• OVLAN_DATA_TAG = [2-4094] | %ROOTPATH_OVLAN<br />
o Parameter: Number from 2 to 4093 or ‘%ROOTPATH_OVLAN’ (use the OVLAN Rootpath<br />
value)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: yes<br />
This parameters specifies of the OVLAN ID assigned to the packets coming from the external interface. It<br />
should be the same as in the translation table to perform the basic OVLAN operation in all equipment<br />
except the one connected to the backbone, which will have the ALL_VLAN tag (4095).<br />
• OVLAN_TRUNK.i = [2-4094]<br />
o Parameter: Number from 2 to 4094<br />
o SNMP: none<br />
o M<strong>and</strong>atory: yes<br />
This parameter is used in LV <strong>and</strong> MV nodes, <strong>and</strong> it configures a list of OVLAN trunks different from the<br />
one inside the translation table that must be allowed in the node interfaces. It is necessary to configure<br />
these trunks for private OVLANs between EUs in all intermediary equipment.<br />
11.15 CUSTOM VLAN/OVLAN PARAMETERS<br />
• USE_CUSTOM_VLAN_OVLAN = [yes/no]<br />
o Parameter: ‘yes’ (to enable the custom VLAN/OVLAN use) or ‘no’ (to disable the custom<br />
VLAN/OVLAN use)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This parameter enables other VLAN/OVLAN parameters. If set to ‘yes’, it will configure the parameters<br />
that are set in the auto-configuration file. The connection will be lost if the new parameters are not properly<br />
configured in the auto-configuration file. It is necessary to specify several parameters with care or no<br />
connection will be possible between the modems.<br />
Submission page 331 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
As a general rule, this configuration overrides the basic VLAN/OVLAN configuration. In order to decrease<br />
the risk of loosing connection, the VLAN/OVLAN filtering follows these rules:<br />
• When the list is allowed, the tags specified here are added to the existing ones. This solution<br />
simplifies the configuration <strong>and</strong> decreases the risk of miss-configuration.<br />
• When the list is forbidden, the lists are reset before inserting the tags specified here, due to the same<br />
reasons.<br />
The VLAN/OVLAN custom configuration must be complemented with the profile parameters referred to the<br />
VLAN/OVLAN, to configure interfaces different from EXTA, EXTB, ROOT <strong>and</strong> OTHERS.<br />
11.15.1 Custom VLAN Parameters<br />
• VLAN_TAGGED_ONLY_IFACE_ROOT = [yes/no]<br />
o Parameter: ‘yes’ (to enable tag only in interface root) or ‘no’ (to disable tag only in interface root)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
If this parameter is set to ‘yes’, the modem will drop packets without a VLAN tag entering the root<br />
interface (IFACE_ROOT).<br />
• VLAN_TAGGED_ONLY_IFACE_EXTA = [yes/no]<br />
o Parameter: ‘yes’ (to enable tag only in Ethernet A) or ‘no’ (to disable tag only in Ethernet A)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
If this parameter is set, the modem will drop packets without a VLAN tag entering external (Ethernet)<br />
interface A.<br />
• VLAN_TAGGED_ONLY_IFACE_EXTB = [yes/no]<br />
o Parameter: ‘yes’ (to enable tag only in Ethernet B) or ‘no’ (to disable tag only in Ethernet B)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
It this parameter is set, the modem will drop packets without a VLAN tag entering external (Ethernet) interface B.<br />
• VLAN_TAGGED_ONLY_IFACE_PL_X= [yes/no]<br />
Being X = 0 to 127 (BPL port)<br />
Submission page 332 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o Parameter: ‘yes’ (to enable tag only in BPL port X) or ‘no’ (to disable tag only in BPL port X)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
If this parameter is set, the modem will drop packets without a VLAN tag entering BPL interfaces (PL_X).<br />
• VLAN_OUTFORMAT_TAG_IFACE_ROOT = [yes/no]<br />
o Parameter: ‘yes’ (to tag output in root interface) or ‘no’ (to disable tag output in root interface)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
It this parameter is set, the modem will introduce a VLAN tag when sending packets to the root interface<br />
(IFACE_ROOT).<br />
• VLAN_OUTFORMAT_TAG_IFACE_EXTA = [yes/no]<br />
o Parameter: ‘yes’ (to tag output in Ethernet A) or ‘no’ (to disable tag output in Ethernet A)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
It this parameter is set, the modem will introduce a VLAN tag when sending packets to the external (Ethernet)<br />
interface A.<br />
• VLAN_OUTFORMAT_TAG_IFACE_EXTB = [yes/no]<br />
o Parameter: ‘yes’ (to tag output in Ethernet B) or ‘no’ (to disable tag output in Ethernet B)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
It this parameter is set, the modem will introduce a VLAN tag when sending packets to external (Ethernet) interface<br />
B.<br />
• VLAN_OUTFORMAT_TAG_IFACE_PL_X = [yes/no]<br />
Being X = 0 to 127 (BPL port)<br />
o Parameter: ‘yes’ (to tag output in BPL port X) or ‘no’ (to disable tag output in BPL port X)<br />
o SNMP: none<br />
Submission page 333 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o M<strong>and</strong>atory: no<br />
It this parameter is set, the modem will introduce a VLAN tag when sending packets to BPL port (PL_X).<br />
• VLAN_PVID_PL_X = [2-4095]<br />
Being X = 0 to 127 (BPL port)<br />
o Parameter: Number from 2 to 4095<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This autoconfiguration parameter specifies the 802.1Q VLAN tag for tagging untagged packets from the BPL port<br />
(PL_X).<br />
• VLAN_PVID_EXTA = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This autoconfiguration parameter specifies the 802.1Q VLAN tag for tagging untagged packets from the external<br />
interface A (EXTA).<br />
• VLAN_PVID_EXTB = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This autoconfiguration parameter specifies the 802.1Q VLAN tag for tagging untagged packets from the external<br />
interface B (EXTB).<br />
• VLAN_PVID_FW = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This autoconfiguration parameter specifies the 802.1Q VLAN tag for tagging untagged packets from the firmware<br />
interface (FW).<br />
Submission page 334 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
• VLAN_DEFAULT_PRIO_PL_X = [0-7]<br />
Being X = 0 to 127 (BPL port)<br />
o Parameter: Number from 0 to 7<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This parameter configures the 802.1p priority for tagging untagged packets from the BPL interface (PL_X).<br />
• VLAN_DEFAULT_PRIO_EXTA = [0-7]<br />
o Parameter: Number from 0 to 7<br />
o SNMP: none<br />
This parameter configures the 802.1p priority for tagging untagged packets from external (Ethernet) interface A<br />
(EXTA).<br />
• VLAN_DEFAULT_PRIO_EXTB = [0-7]<br />
o Parameter: Number from 0 to 7<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This parameter configures the 802.1p priority for tagging untagged packets from external (Ethernet)<br />
interface B (EXTB).<br />
• VLAN_DEFAULT_PRIO_FW = [0-7]<br />
o Parameter: Number from 0 to 7<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This parameter configures the 802.1p priority for tagging untagged packets from firmware interface (FW).<br />
• VLAN_IS_ALLOWED_IFACE_ROOT = [yes/no]<br />
o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
Submission page 335 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
This parameter characterizes the VLAN list for the root interface. Root interface (IFACE_ROOT) list is allowed tag<br />
if configured as ‘yes’ or forbidden if configured as ‘no’.<br />
• VLAN_LIST_IFACE_ROOT.i = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This parameter is a list of root interface (IFACE_ROOT) VLAN IDs. Up to 16 values can be configured.<br />
• VLAN_IS_ALLOWED_IFACE_EXTA = [yes/no]<br />
o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This parameter characterizes the VLAN list for the external (Ethernet) interface A. The external (Ethernet) interface<br />
A list contains allowed tags if configured as ‘yes’ or forbidden if configured as ‘no’.<br />
• VLAN_LIST_IFACE_EXTA.i = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This parameter is a list of VLAN IDs for external (Ethernet) interface A. Up to 16 values can be configured.<br />
• VLAN_IS_ALLOWED_IFACE_EXTB = [yes/no]<br />
o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This parameter characterizes the VLAN list for the external (Ethernet) interface B. The external (Ethernet) interface<br />
B list contains allowed tags if configured as ‘yes’ or forbidden if configured as ‘no’.<br />
• VLAN_LIST_IFACE_EXTB.i = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
Submission page 336 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This parameter is a list of VLAN IDs for external (Ethernet) interface B. Up to 16 values can be configured.<br />
• VLAN_IS_ALLOWED_IFACE_PL_X = [yes/no]<br />
Being X = 0 to 127 (BPL port)<br />
o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This parameter characterizes the VLAN list for the powelrline interface X. The BPL interface list contains allowed<br />
tags if configured as ‘yes’ or forbidden if configured as ‘no’.<br />
• VLAN_LIST_IFACE_PL_X.i = [2-4095]<br />
Being X = 0 to 127 (BPL port)<br />
o Parameter: Number from 2 to 4095<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This parameter is a list of VLAN IDs for BPL interface X.<br />
11.15.2 Custom OVLAN Parameters<br />
• OVLAN_TAGGED_ONLY_IFACE_ROOT = [yes/no]<br />
o Parameter: ‘yes’ (to accept only tagged packets at root interface) or ‘no’ (to accept any packet at<br />
root interface)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
If this parameter is set to ‘yes’, the modem will drop packets without a OVLAN tag entering the root interface<br />
(IFACE_ROOT).<br />
Submission page 337 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
• OVLAN_TAGGED_ONLY_IFACE_PL_X = [yes/no]<br />
Being X = 0 to 127 (BPL port)<br />
o Parameter: ‘yes’ (to accept only tagged packets at other interfaces) or ‘no’ (to accept any packet at<br />
other interfaces)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
If this parameter is set to ‘yes’, the modem will drop packets without a OVLAN tag entering BPL ports (PL_X).<br />
• OVLAN_OUTFORMAT_TAG_IFACE_ROOT = [yes/no]<br />
o Parameter: ‘yes’ (to introduce a tag in output packets at root interface) or ‘no’ (to not introduce a<br />
tag in output packets at root interface)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
If this parameter is set, the modem will introduce a OVLAN tag when sending packets to the root interface<br />
(IFACE_ROOT).<br />
• OVLAN_OUTFORMAT_TAG_IFACE_PL_X = [yes/no]<br />
Being X = 0 to 127 (BPL port)<br />
o Parameter: ‘yes’ (to introduce a tag in output packets at BPL ports) or ‘no’ (to not introduce a tag<br />
in output packets at BPL ports)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
If this parameter is set, the modem will introduce a OVLAN tag when sending packets to BPL ports (PL_X).<br />
• OVLAN_POVID_PL_X = [2-4095]<br />
Being X = 0 to 127 (BPL port)<br />
o Parameter: Number from 2 to 4095<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
Submission page 338 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
This autoconfiguration parameter specifies the OVLAN tag for tagging untagged packets from the BPL port X<br />
(PL_X).<br />
• OVLAN_POVID_EXTA = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This autoconfiguration parameter specifies the OVLAN tag for tagging untagged packets from the external interface<br />
A (EXTA).<br />
• OVLAN_POVID_EXTB = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This autoconfiguration parameter specifies the OVLAN tag for tagging untagged packets from the external interface<br />
B (EXTB).<br />
• OVLAN_POVID_FW = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This autoconfiguration parameter specifies the OVLAN tag for tagging untagged packets from the firmware<br />
interface (FW).<br />
• OVLAN_IS_ALLOWED_IFACE_ROOT = [yes/no]<br />
o Parameter: ‘yes’ (to set the root interface list as allowed) or ‘no’ (to set the root interface list as<br />
forbidden)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This parameter characterizes the OVLAN list for the root interface. Root interface (IFACE_ROOT) list is allowed<br />
tag if configured as ‘yes’ or forbidden if configured as ‘no’.<br />
• OVLAN_LIST_IFACE_ROOT.i = [2-4095]<br />
Submission page 339 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o Parameter: Number from 2 to 4095<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This parameter is a list of root interface (IFACE_ROOT) OVLAN tags.<br />
• OVLAN_IS_ALLOWED_IFACE_EXTA = [yes/no]<br />
o Parameter: ‘yes’ (to set the Ethernet A interface list as allowed) or ‘no’ (to set the Ethernet A<br />
interface list as forbidden)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This parameter characterizes the OVLAN list for the external (Ethernet) interface A. The external (Ethernet)<br />
interface A list contains allowed tags if configured as ‘yes’ or forbidden if configured as ‘no’.<br />
• OVLAN_LIST_IFACE_EXTA.i = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This parameter is a list of OVLAN tags for external (Ethernet) interface A.<br />
• OVLAN_IS_ALLOWED_IFACE_EXTB = [yes/no]<br />
o Parameter: ‘yes’ (to set the Ethernet B interface list as allowed) or ‘no’ (to set the Ethernet B<br />
interface list as forbidden)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This parameter characterizes the OVLAN list for the external (Ethernet) interface B,. The external (Ethernet)<br />
interface B list contains allowed tags if configured as ‘yes’ or forbidden if configured as ‘no’.<br />
• OVLAN_LIST_IFACE_EXTB.i = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
Submission page 340 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
This parameter is a list of OVLAN tags for external (Ethernet) interface B. Up to 16 values can be configured.<br />
• OVLAN_IS_ALLOWED_IFACE_PL_X = [yes/no]<br />
Being X = 0 to 127 (BPL port)<br />
o Parameter: ‘yes’ (to set the BPL interface list as allowed) or ‘no’ (to set the BPL interface list as<br />
forbidden)<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This parameter characterizes the OVLAN list for the BPL Interface X. The list contains allowed tags if configured<br />
as ‘yes’ or forbidden if configured as ‘no’.<br />
• OVLAN_LIST_IFACE_PL_X.i = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
o SNMP: none<br />
o M<strong>and</strong>atory: no<br />
This parameter is a list of OVLAN tags for external BPL interface X.<br />
11.16 ACCESS PROTOCOL PARAMETERS<br />
Parameters for the slave:<br />
• AP_MIN_NUMBER_HOPS = [0|1|…]<br />
o Parameter: Number from 0<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
This parameter configures the main criterion for connecting to a master, the minimum number of hops that<br />
the master has to be separated to the backbone. ‘0’ means that it can connect to the master connected to the<br />
backbone (no hop), ‘1’ means that it can connect to masters with one hop to the backbone (TDrepeaters),<br />
<strong>and</strong> so on.<br />
• AP_FORBID_MASTER.i = 0xXXXXXXXXXXXX<br />
Submission page 341 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o Parameter: ‘0xXXXXXXXXXXXX’ (<strong>MAC</strong> address of forbidden master)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
This parameter is a list of the <strong>MAC</strong> addressees of the masters this equipment has to avoid. The equipment<br />
will not connect to a master on this list, even if there are no other masters available.<br />
• AP_PREFER_MASTER = 0xXXXXXXXXXXXX<br />
o Parameter: ‘0xXXXXXXXXXXXX’ (<strong>MAC</strong> address of preferred master)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
This parameter specifies a <strong>MAC</strong> address of a master that is preferred by the equipment. If the node can<br />
detect the master with this <strong>MAC</strong> address <strong>and</strong> it is not restricted (it is not forbidden <strong>and</strong> the number of hops<br />
is the adequate), it will try to connect to it regardless of any other parameter. If fails to connect to this prefer<br />
master, it will use the usual algorithm to decide to which master connect.<br />
• AP_FIX_MASTER = ‘0xXXXXXXXXXXXX’<br />
o Parameter: 0xXXXXXXXXXXXX (<strong>MAC</strong> address of fixed master)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: yes<br />
This parameter specifies the only one master to which the node can connect. If this <strong>MAC</strong> address is not<br />
detected in the network, the node will not connect to any other one, so this parameter can be dangerous<br />
because if not properly configured can produce slaves unable to connect.<br />
• AP_CHECK_BEST_MASTER_ENABLE = [yes|no]<br />
o Parameter: ‘yes’ (to enable checking of best master periodically after connecting with one) or ‘no’<br />
(to disable the checking of better masters after connecting to one).<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
Once the node is connected to the network (after choosing <strong>and</strong> being accepted by a master) it is possible to<br />
repeat periodically the search of a better master. This parameter enables or disables the periodical check of<br />
the best master of the access protocol.<br />
• AP_CHECK_BEST_MASTER_PERIOD = <br />
Submission page 342 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o Parameter: Number of minutes<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
This parameter configures how much time has to pass to search for a better master. This process is periodic,<br />
<strong>and</strong> the time is in minutes.<br />
• AP_CURRENT_MASTER_MIN_BPS = <br />
o Parameter: Number of bits per symbol (0-14592)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
This parameter is also used in the period search for a better master. The node will only change to a better<br />
master if the number of bits per symbol with the current master is lower than the<br />
‘AP_CURRENT_MASTER_MIN_BPS’ value.<br />
• AP_NEW_MASTER_MIN_BPS = <br />
o Parameter: Number of bits per symbol (0-14592)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
At the period search for a better master, no every master will be considered. Only the masters with a number<br />
of bits per symbol greater than ‘AP_NEW_MASTER_MIN_BPS’ will be eligible.<br />
Parameters for the master: The master will receive petitions of the slaves that want to connect to it. There are<br />
different policies about what to do in this case:<br />
- Accept any petition. The slave will be allowed to connect through this master.<br />
- Deny any petition. No slave will be allowed to connect through this master.<br />
- Use the Radius. The RADIUS will be the one that decides to accept of reject the connection of a<br />
slave.<br />
- Use an authorization list. This is a list of the <strong>MAC</strong>s of the slaves that will be allowed to connect<br />
through this master. The following parameters configures this list.<br />
• ACCESSP_AUTHLIST_<strong>MAC</strong>.i = 0xXXXXXXXXXXXX<br />
o Parameter: ‘0xXXXXXXXXXXXX’ (<strong>MAC</strong> address authorized to connect)<br />
o SNMP: no<br />
Submission page 343 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o M<strong>and</strong>atory: no<br />
This parameter is a list of the <strong>MAC</strong> address of the modems that will be allowed to connect through this<br />
master. The length of the list is 128 (i=1…128).<br />
• ACCESSP_AUTHLIST_PROFILE.i = [1-16]<br />
o Parameter: Number of the profile related to a <strong>MAC</strong> authorized)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
If a slave is accepted via the authorization list it will use the parameters of one profile. This<br />
autoconfiguration parameter indicates which profile will be associated with each slave. The length of the list<br />
is 128 (i=1…128).<br />
• ACCESSP_AUTHLIST_FWTYPE.i = [MV|LV|EU]<br />
o Parameter: ‘MV’ (medium voltage) or ‘LV’ (low voltage) or ‘EU’ (End User)<br />
o SNMP: no<br />
o M<strong>and</strong>atory: no<br />
If a slave is accepted via the authorization list it will have a firmware type This autoconfiguration parameter<br />
indicates which firmware type will be associated with each slave. The length of the list is 128 (i=1…128).<br />
12 CONFIGURATION<br />
12.1 MIB<br />
12.1.1 SNMP Management<br />
SNMP (Simple Network Management Protocol) refers to a group of specifications for the management of<br />
communication networks: the protocol, the data base definition <strong>and</strong> the modules. For more information, consult the<br />
SNMP st<strong>and</strong>ards RFC 1155 (Structure <strong>and</strong> Identification of Management Information for TCP/IP-based Internets),<br />
RFC 1157 (Simple Network Management Protocol), RFC 1213, Management Information Base).<br />
Each resource to be managed in a device is represented by an object. The MIB is a structured collection of these<br />
objects. For SNMP, the MIB is a database structure, or a database definition. Each system in a network to be<br />
managed must maintain a MIB that reflects the status of the managed resources in that system.<br />
Submission page 344 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
All managed objects in the SNMP environment are arranged in a hierarchical or tree structure. The leaf objects of<br />
the tree are the actual managed objects, each of which represents some resource, activity or related information that<br />
is to be managed.<br />
SNMP <strong>and</strong> thus MIB support are optional in this specification.<br />
12.1.2 MIB-II for IEEE P1901<br />
The structure MIB-II is located under the node mgmt. This node contains the definition of the management<br />
information base approved by the IAB. MIB-II is an extension of the previously defined MIB-I. Under the node<br />
‘mib-2’, IEEE P1901 nodes must support the following structures in RFC 1213:<br />
• system(1): General information about the system:<br />
o Description of the entity – hardware, operating system, etc.<br />
o Level of OSI reference model to which the managed object pertains.<br />
o Time since the last initialization of the system.<br />
• interfaces(2): Information about the network interfaces of the managed entity, including information <strong>and</strong><br />
statistics about the events in each. There is an “interfaces” table in which each row corresponds to a<br />
network interface. The information for a given interface:<br />
o <strong>Physical</strong> address<br />
o Type of interface<br />
o Speed<br />
o Status<br />
o Number of transmitted <strong>and</strong> received octets<br />
The implementation of the following nodes is optional.<br />
• at(3): Translation of addresses IP – <strong>MAC</strong>.<br />
• ip(4): Information about the configuration of the IP protocol over the device. Among others, the nodes<br />
under the ‘ip’ node contain information about:<br />
o Number of packets discarded because of errors in the IP header, because of errors in the addresses,<br />
because of not finding a correct route, etc.<br />
o Number of accepted packets.<br />
o IP address of the interfaces <strong>and</strong> network mask of the network.<br />
• icmp(5): Information about the Internet <strong>Control</strong> Message Protocol (ICMP).<br />
Submission page 345 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
• tcp(6): General information about the TCP protocol working in the managed node.<br />
• udp(7): General information about the UDP protocol.<br />
• snmp(11): Information about the execution of the SNMP protocol in the entity.<br />
All fundamentals for the MIB-II can be found in RFC 1213, <strong>and</strong> no further information will be shown in this<br />
document.<br />
12.1.3 IEEE P1901 Private MIB<br />
This section walks through the IEEE P1901 Private MIB.<br />
Under the ‘.iso.org.dod.internet.private.enterprises’ node in the st<strong>and</strong>ard MIB, in position number 6798, the node<br />
assigned to DS2 (ds2 OBJECT IDENTIFIER ::= {enterprises 6798}) is allocated <strong>and</strong> in turn, under this node, the<br />
IEEE P1901 MIB branch has position 3 (IEEE P1901 OBJECT_IDENTIFIER ::= {ds2 3}) <strong>and</strong> contains all objects<br />
that are not supported in the st<strong>and</strong>ard MIB-II but can be remotely managed in an IEEE P1901 node.<br />
Internally the IEEE P1901 (3) branch is composed of 8 sub-branches.<br />
• plSystem: Generic information about the system.<br />
• plBasic: Information about the general BPL configuration.<br />
• plPhy: Information related to the physical layer indexed by node address.<br />
• pl<strong>MAC</strong>: Objects related to the <strong>Medium</strong> <strong>Access</strong> <strong>Control</strong>.<br />
• plQoS: Objects related to Quality of Service.<br />
• plOVLAN: Objects related to OVLAN.<br />
• plStatistics: Statistics counters.<br />
• plTraps: Trap information.<br />
• plStp: STP information.<br />
• plSecurity: Security configuration.<br />
Submission page 346 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
plSystem (1)<br />
enterprises (1)<br />
plBasic (2)<br />
plPhy (3)<br />
ds2 (6798)<br />
pl<strong>MAC</strong> (4)<br />
IEEE P1901 (3)<br />
plQoS (5)<br />
plOVLAN (6)<br />
Figure 149 IEEE P1901 MIB tree<br />
12.1.3.1 The IEEE P1901 MIB Description<br />
plStatistics (7)<br />
plSecurity (10)<br />
plStp (9)<br />
plTraps (8)<br />
This section shows the IEEE P1901 MIB <strong>and</strong> contains a brief description of every object inside each branch under<br />
the ‘IEEE P1901’ node. The MIB definition in ASN.1 format can be found in ANNEX A.<br />
Note that not every OID can be accessed for get/set operations; read-only OIDs only accept ‘get’ operations, readwrite<br />
OIDs accept both ‘get’ <strong>and</strong> ‘set’ operations, <strong>and</strong> nonaccessible OIDs accept neither of them (indicated in the<br />
table above). In addition, every OID with an enable/disable meaning accepts an integer ‘1’ for enabling <strong>and</strong> an<br />
integer ‘0’ for disabling.<br />
plSystem<br />
• plSystemTable<br />
Almost every table in the IEEE P1901 MIB is indexed by the card number, so there will be a copy<br />
of this object in these tables; their explanation is equivalent to this one.<br />
o plSysCard: Used as an index to get/set system characteristic data for a specific BPL card. This<br />
could be seen as useless because every BPL card has its own IP address, but it has been included to<br />
support future improvements in IEEE P1901 technology where a single node will have a single IP<br />
address, independent of the number of cards it will hold. But at present, this index is always a fixed<br />
‘1’ value.<br />
o plSysNodeType: Node type. An IEEE P1901 BPL card can act as a master, slave or repeater, <strong>and</strong><br />
therefore this OID can hold the values of 0:Master, 1:Slave <strong>and</strong> 2:Repeater.<br />
Submission page 347 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o plSysFWVersion: Shows a string describing the firmware version running in the IEEE P1901<br />
modem.<br />
o plSysHWVersion: Shows a string describing the hardware version built inside the modem.<br />
o plSysReset: Performs a system reset when receiving a ‘set’ with a ‘1’.<br />
o plSysFactoryReset: Performs a system reset when receiving a ‘set’ with a ‘1’ <strong>and</strong> restores the<br />
factory configuration parameters.<br />
o plSysUseDHCP: Enables (1) or disables (0) the DHCP protocol in the modem. If DHCP is<br />
enabled, network configuration parameters (IP address, netmask <strong>and</strong> gateway IP address) will be<br />
obtained from a DHCP server; if it is disabled, the network configuration parameters saved in the<br />
modem will be used.<br />
o plSysStaticIPAddress: Holds the IP address to be used when DHCP is disabled.<br />
o plSysStaticNetMask: Holds the network mask to be used when DHCP is disabled.<br />
o plSysStaticDefaultGW: Holds the default gateway IP address to be used when DHCP is disabled.<br />
o plSysSaveAsPermanent: When a ‘1’ integer value is passed to this OID, all node parameters that<br />
could have changed <strong>and</strong> are liable to be saved are stored in non-volatile memory for using them as<br />
the current system configuration. As soon as these parameters are saved, the system is reconfigured<br />
to use the new parameters.<br />
o plSysConfUpload: This OID accepts a string in this format:<br />
where:<br />
“PROT IP CONFIG_FILE USER PASSWD“<br />
PROT Value of 0 for uploading the configuration by TFTP, or 1 to upload it by FTP.<br />
IP IP address of the TFTP or FTP server.<br />
CONFIG_FILE Name of the file where the uploaded configuration will be stored.<br />
USER User login for FTP, not necessary if TFTP is being used.<br />
PASSWD User password for FTP, not necessary if TFTP is being used.<br />
Table 63 Upload file parameters<br />
This way, the system performs an upload of the active configuration to a TFTP or FTP server. The<br />
configuration file name string size can be up to 60 characters long.<br />
Submission page 348 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o plSysConfDownload: This OID accepts a string in this format:<br />
where:<br />
“PROT IP CONFIG_FILE USER PASSWD“<br />
PROT Value of 0 for downloading the configuration file by TFTP, or 1 to download it by FTP.<br />
IP IP address of the TFTP or FTP server.<br />
CONFIG_FILE Name of the file to be downloaded.<br />
USER User login for FTP, not necessary if TFTP is being used.<br />
PASSWD User password for FTP, not necessary if TFTP is being used.<br />
Table 64 Download configuration file parameters<br />
This way, the system performs a download of a new configuration file from a FTP or TFTP server.<br />
The configuration file name string size can be up to 60 characters long.<br />
o plSysUpgradeStatus: This OID is read-only <strong>and</strong> shows an integer number, which is a special code<br />
for showing the current status of the upgrade in progress. The codes for this OID are:<br />
0 Last upgrade was performed correctly.<br />
-1 No FLASH upgrade has been performed since the last boot.<br />
-2 Last upgrade failed checking CRC.<br />
-3 Last upgrade failed due to src was incorrect.<br />
-4 Last upgrade failed due to destination (FLASH sector) was incorrect.<br />
-5 Last upgrade failed due to file was for an incorrect HW product.<br />
-6 Last upgrade failed due to file was for an incorrect HW Revision.<br />
-7 Last upgrade failed due to file was for an incorrect ASIC.<br />
Submission page 349 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
-8 Last upgrade failed due to file was for an incorrect flash region.<br />
-9 Last upgrade failed due to file was for an incorrect SW product.<br />
-10 Last upgrade failed due to file size exceeds the flash section size.<br />
-11 Last upgrade failed due to flash section is read-only.<br />
-12 Last upgrade failed downloading/uploading file.<br />
-13 Last upgrade failed due to another upgrade process is running.<br />
-14 Last upgrade failed due to download buffer could not be allocated.<br />
-15 Last upgrade failed due to the region used at upgrade process is invalid.<br />
-16 Warning. The file used is not full compatible.<br />
-17 Last upgrade failed due to the upgrade thread could not be created.<br />
-18 Last upgrade failed due to file was for an incorrect SW version.<br />
-19 Last upgrade failed due to Board Description Data is not set.<br />
-20 Last upgrade failed with other error (unknown).<br />
-21 Last upgrade failed due to file not found.<br />
1 A FLASH upgrade process is starting.<br />
2 A FLASH upgrade process is downloading/uploading file.<br />
3 A FLASH upgrade process is checking CRC.<br />
4 A FLASH upgrade process is finishing.<br />
Submission page 350 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
plBasic<br />
99 A FLASH upgrade process is in unknown status.<br />
Table 65 Upgrade status code list<br />
o plSysUpdate: This OID accepts a string in this format:<br />
where:<br />
“PROT IP CONFIG_FILE USER PASSWD“<br />
PROT Value of 0 for downloading the firmware by TFTP, or 1 to download it by FTP.<br />
IP IP address of the TFTP or FTP server.<br />
CONFIG_FILE Name of the file to be downloaded.<br />
TYPE Type of file 1:FW imag, 2 Loader image, etc.<br />
USER User login for FTP, not necessary if TFTP is being used.<br />
PASSWD User password for FTP, not necessary if TFTP is being used.<br />
Table 66 Update system parameters<br />
This way, the system performs an update of the firmware, loader or whatever part of the code in a<br />
modem from a TFTP or FTP server. The configuration file name string size can be up to 60<br />
characters long.<br />
o plSysDNSAddress: Holds the DNS IP address.<br />
o plSnmpROComunityName: Holds the community name string.<br />
o plSnmpRWComunityName: Holds the community name string.<br />
o plSnmpTrapDest: Holds the IP address to send the traps to.<br />
• plBasicTable<br />
Submission page 351 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o plBasicCard: Card index.<br />
o plBasicMode: <strong>Physical</strong> mode used by the modem. These values can reach from 1 to M, depending<br />
on the range of frequency used.<br />
o plBasicCentralFrequency: Mode central frequency value in KHz.<br />
o plBasicB<strong>and</strong>width: Mode b<strong>and</strong>width in MHz.<br />
o plBasicTXAGCEnable: Enables/disables transmission AGC. This AGC feature controls<br />
transmission gains automatically <strong>and</strong> dynamically.<br />
o plBasicRXAGCEnable: Enables/disables reception AGC.<br />
o plBasicTXAGCGain: Sets/gets the transmission gain, <strong>and</strong> it can accept two values, ‘0’ <strong>and</strong> ‘1’.<br />
These values have a ‘distance’ of 12 dB <strong>and</strong> act over the AFE amplifiers.<br />
o plBasicRXAGCGain: Sets/gets the gain in reception, in a range of values from ‘0’ to ‘7’ in steps<br />
of 6 dB.<br />
o plBasicTXPowerMaskLB: Sets/gets the system powermask in the low half b<strong>and</strong> of frequencies in<br />
the whole b<strong>and</strong>width used by the IEEE P1901 node, from carrier numbers 1 to 768. The value is a<br />
768-character long string, each character corresponding to a carrier, that is, the first character<br />
corresponds to carrier number 1 <strong>and</strong> so on. These characters have a special coding, <strong>and</strong> its meaning<br />
has to be split into two sub-codes, e.g.:<br />
0100 0110<br />
First 4 bits coded in steps of 6 dB for coarse attenuation.<br />
Last 4 bits specially coded for fine attenuation.<br />
The coding for the last 4 bits can be deduced from this graph:<br />
Submission page 352 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
plPhy<br />
Figure 150 Power mask encoding graphic<br />
o plBasicTXPowerMaskHB: Sets/gets the system powermask in the high half b<strong>and</strong> frequencies of<br />
the whole b<strong>and</strong>width used by the IEEE P1901 node, from carrier numbers 769 to 1536. The<br />
explanation of the value of this OID is equivalent to the previous one.<br />
o plBasicMaster<strong>MAC</strong>: Shows the <strong>MAC</strong> address of the current master of the node.<br />
• plPhyBy<strong>MAC</strong>Table<br />
o plPhyBy<strong>MAC</strong>Card: Card index.<br />
o plPhyBy<strong>MAC</strong><strong>MAC</strong>: <strong>Physical</strong> (<strong>MAC</strong>) address that also serves as an index. This means that all of<br />
the following OIDs will refer to a single <strong>MAC</strong> address. These <strong>MAC</strong> addresses are those that have<br />
been learned by the <strong>MAC</strong> protocol or configured manually. Other tables could be also indexed by<br />
<strong>MAC</strong>, <strong>and</strong> all of them would mean that the value shown affects that <strong>MAC</strong>.<br />
o plPhyBy<strong>MAC</strong>TXBPC: For all practical purposes, these are the tonemap associated to the indexed<br />
<strong>MAC</strong> in transmission. The value is a 768-character long string with numbers from 2 to 10, each<br />
number representing the number of bits per symbol of each carrier. Each byte contains two carriers<br />
(4 bits each).<br />
Note: All BPC OIDs are the result of applying the Adaptive Bitloading ProtoCol, for which BPC is<br />
the acronym.<br />
Submission page 353 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
pl<strong>MAC</strong><br />
o plPhyBy<strong>MAC</strong>TXBPCAggregated: Holds the aggregated BPC value in transmission, which is a<br />
value from 288 to 14592. Although the maximum number of bits per carrier is 10 <strong>and</strong> the number<br />
of carriers is 1536, the physical throughput requires making a subtraction of 0.5 bits for each BPC<br />
value, which is used by the FEC algorithm. Therefore, 1536 times 9.5 results in 14592.<br />
o plPhyBy<strong>MAC</strong>TXPhySpeed: <strong>Physical</strong> speed in transmission in Mbits per second.<br />
o plPhyBy<strong>MAC</strong>RXBPC: These are the BPCs associated to the indexed <strong>MAC</strong> in reception. The<br />
value is a 768-character long string with numbers ranging from 2 to 10, each number representing<br />
the number of bits per symbol for each carrier. Each byte contains two carriers (4 bits each).<br />
o plPhyBy<strong>MAC</strong>RXBPCAggregated: Shows the aggregated BPC value in reception, which is a<br />
value from 288 to 14592. Although the maximum number of bits per carrier is 10 <strong>and</strong> the number<br />
of carriers is 1536, the physical throughput requires making a subtraction of 0.5 bits for each BPC<br />
value, which is used by the FEC algorithm. Therefore, 1536 times 9.5 results in 14592.<br />
o plPhyBy<strong>MAC</strong>RXPhySpeed: <strong>Physical</strong> speed in reception in Mbits per second.<br />
o plPhyBy<strong>MAC</strong>SNR: Shows the measured channel SNR. The value shown is a 768-character long<br />
string where each character is a number that shows the SNR value in units of 0.5 dB.<br />
o plPhyBy<strong>MAC</strong>CFR: Shows the measured channel CFR. The value shown is a 768-character long<br />
string where each character is a number that shows the CFR value in units of 1 dB.<br />
o plPhyBy<strong>MAC</strong>ACK: Enables/disables the level 2 ACKs feature.<br />
o plPhyBy<strong>MAC</strong>Cipher: Enables/disables the cipher feature.<br />
o plPhyBy<strong>MAC</strong>TxHURTO: Forces HURTO mode in transmission for a ‘set’ operation, or<br />
indicates if the modem is transmitting in HURTO mode to the indexed <strong>MAC</strong> for a ‘get’ operation.<br />
o plPhyBy<strong>MAC</strong>RxHURTO: Forces HURTO mode in reception for a ‘set’ operation, or indicates if<br />
the modem is receiving in HURTO mode from the indexed <strong>MAC</strong> for a ‘get’ operation.<br />
o plPhyBy<strong>MAC</strong>IsActive: Used to check if a node, whose <strong>MAC</strong> is the index, is active (1) or not (0).<br />
o plPhyBy<strong>MAC</strong>RXTimeLastActivity: Indicates the number of seconds since the last time the<br />
indexed <strong>MAC</strong> showed BPL activity.<br />
• plPhyRXSNRThresholdTable<br />
o plPhyRXSNRThresholdCard: Card index.<br />
o plPhyRXSNRThresholdIndex: The IEEE P1901 modems have 9 levels of SNR thresholds for<br />
changing the BPCs to be used when these levels are reached. This OID is an index with fixed<br />
values from 1 to 10 to refer to the BPCs to be used when a certain SNR value is reached. For<br />
instance, if data is requested (see the OID below) for the index 6, it will return the SNR value from<br />
which 6 BPCs will be used.<br />
o plPhyRXSNRThreshold: SNR threshold value in units of 0.5 dB for a determinate threshold index<br />
in the above OID.<br />
Submission page 354 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
plQoS<br />
• pl<strong>MAC</strong>Table<br />
o pl<strong>MAC</strong>Card: Card index.<br />
o pl<strong>MAC</strong><strong>Access</strong>Protocol: Enables/disables the <strong>Access</strong> Protocol mode, which has been implemented<br />
to allow a node to automatically learn the <strong>MAC</strong> addresses of the nodes that are liable to connect<br />
with it.<br />
o pl<strong>MAC</strong>NumConnectedNodes: Shows the number of nodes successfully connected, that is, with its<br />
link solved by the Port Solver Protocol.<br />
o pl<strong>MAC</strong>NumSlaves: Shows the number of configured slaves if the nodeis a master.<br />
• pl<strong>MAC</strong>ConnectedNodesTable<br />
o pl<strong>MAC</strong>ConnectedNodesCard: Card index.<br />
o pl<strong>MAC</strong>ConnectedNodesIndex: This index will refer to a connected node, a number ranging from<br />
0 to the value shown by pl<strong>MAC</strong>NumConnectedNodes (see above).<br />
o pl<strong>MAC</strong>ConnectedNodes<strong>MAC</strong>: <strong>MAC</strong> address of the indexed connected node.<br />
• pl<strong>MAC</strong>SlavesTable<br />
o pl<strong>MAC</strong>SlavesCard: Card index.<br />
o pl<strong>MAC</strong>SlavesIndex: This index will refer to a slave node, a number ranging from 0 to the value<br />
shown by pl<strong>MAC</strong>NumSlaves (see above).<br />
o pl<strong>MAC</strong>Slaves<strong>MAC</strong>: <strong>MAC</strong> address of the indexed slave node.<br />
• plQoSMasterGeneralMinOneWayLat<br />
If the modem is a master, this OID shows the minimum latency configured in the modem in milliseconds.<br />
• plQoSMasterGeneralBwMngrPolicy<br />
This OID shows the policy to be followed by a master in assigning a certain b<strong>and</strong>width to its attached<br />
slaves. If a 0 is returned, the master is configured to assign b<strong>and</strong>width in a fair policy, while if a 1 is<br />
returned, the b<strong>and</strong>width is assigned in a priority-based policy.<br />
• plQoSPriorityManagementTable<br />
o plQoSPriorityManagementCard: Card index.<br />
o plQoSPriorityManagementPrio: Priority value, from 1 to 8.<br />
Submission page 355 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o plQoSPriorityManagementLatency: Latency coding value for the priority. Allowed coding<br />
values are 0, 1, 2, 4 <strong>and</strong> 8<br />
o plQoSPriorityManagementTimmingInterval: A fixed scheduling repeated each programmable<br />
Timming Interval is set, <strong>and</strong> the slaves will have a fixed amount of assigned time to transmit. This<br />
scheduling may be synchronized with the mains.<br />
• plQoSPerUserTable<br />
plOVLAN<br />
o plQoSPerUserCard: Card index.<br />
o plQoSPerUser<strong>MAC</strong>: <strong>Physical</strong> <strong>MAC</strong> address of the user hanging from the master. Used as index.<br />
o plQoSPerUserTXMaxXput: Shows the maximum throughput allowed in transmission for a user in<br />
kilobits per second.<br />
o plQoSPerUserRXMaxXput: Shows the maximum throughput allowed in reception for a user in<br />
kilobits per second.<br />
o plQoSPerUserPriorityAllowedUp: Shows the allowed priorities for transmission <strong>and</strong> reception in<br />
upstream for a user. The returned value is a number from 0 to 255, which is a number<br />
corresponding to the allowed priorities’ 8-bit mask coding, i.e., a value of 16 (0010000b) would<br />
mean that priority 5 is the only one allowed.<br />
o plQoSPerUserPriorityAllowedDown: Shows the allowed priorities for transmission <strong>and</strong> reception<br />
in downstream for a user. The returned value is a number from 0 to 255, which is a number<br />
corresponding to the allowed priorities’ 8-bit mask coding, i.e., a value of 17 (0010001b) would<br />
mean that priorities 5 <strong>and</strong> 1 are the only ones allowed.<br />
This node has the same structure <strong>and</strong> OID that the dot1qVlan MIB branch.<br />
plStatistics<br />
• plStatisticsTable<br />
o plStatisticsCard: Card index.<br />
o plStatisticsBPLInputWords: Number of words received by the BPL physical interface.<br />
o plStatisticsBPLInputPackets: Number of packets received by the BPL physical interface.<br />
o plStatisticsBPLInputIncorrigible: Number of incorrigible packets received by the BPL physical<br />
interface.<br />
o plStatisticsBPLInputFECBlocksTotal: Number of FEC blocks received by the BPL physical<br />
interface.<br />
o plStatisticsBPLInputFECBlocksCorrected: Number of FEC blocks received <strong>and</strong> corrected by the<br />
BPL physical interface.<br />
o plStatisticsBPLInputPktsReceived: Number of packets received by the BPL physical interface.<br />
Submission page 356 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o plStatisticsBPLInputPktsRcvComplete: Number of packets received complete by the BPL<br />
physical interface.<br />
o plStatisticsBPLInputPktsRcvIncomplete: Number of packets received incomplete by the BPL<br />
physical interface.<br />
o plStatisticsBPLOutputWords: Number of words transmitted through the BPL physical interface.<br />
o plStatisticsBPLOutputPkts: Number of packets transmitted through the BPL physical interface.<br />
plTraps<br />
• plTrapsPhyTable<br />
o plTrapsPhyCard: Card index.<br />
o plTrapsPhyTrapToHURTOEnable: Enables/disables trap generation when entering HURTO<br />
mode.<br />
o plTrapsPhyTrapFromHURTOEnable: Enables/disables trap generation when leaving HURTO<br />
mode.<br />
• plTraps<strong>MAC</strong>Table<br />
o plTraps<strong>MAC</strong>Card: Card index.<br />
o plTraps<strong>MAC</strong>TrapPeerDetectedEnable: Enables/disables trap generation when detecting a peer<br />
modem.<br />
o plTraps<strong>MAC</strong>TrapPeerDisappearedEnable: Enables/disables trap generation when a peer modem<br />
disappears.<br />
• plTrapsBridgeTable<br />
o plTrapsBridgeCard: Card index.<br />
o plTrapsBridgeTrapNewRootEnable: Enables/disables trap generation when a new root is<br />
assigned. The trap is sent from a node when this node becomes root.<br />
o plTrapsBridgeTopologyChangeEnable: Enables/disables trap generation when network topology<br />
changes.<br />
• plTrapsConfFailTable<br />
o plTrapsConfFailCard: Card Index.<br />
o plTrapsConfDonwloadFailEnable : Enables/disables the trap generation when a configuration file<br />
download fails.<br />
o plTrapsConfUploadFailEnable : Enables/disables the trap generation when a configuration file<br />
upload fails.<br />
plStp<br />
• plStpTable<br />
Submission page 357 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o plStpCard: Card index.<br />
o plStpEnable: Enables/disables the Spanning Tree protocol.<br />
o plStpProtocolVersion: Chooses either using STP (IEEE 802.1d) or RSTP (IEEE 802.1w). The<br />
RSTP version is compatible to STP on a per-port basis. Values: “STP”, RSTP”.<br />
o plStpPtpExtA: Sets the point-to-point flag on EXTA. This port will be considered point-to-point,<br />
thus c<strong>and</strong>idate for rapid transition to forwarding. Set by default when EXTA is connected to<br />
backplane.<br />
o plStpPtpExtB: Sets the point-to-point flag on EXTB. This port will be considered point-to-point,<br />
thus c<strong>and</strong>idate for rapid transition to forwarding. Set by default when EXTB is connected to<br />
backplane.<br />
o plStpFrontier: Enables/disables the Spanning Tree Frontier . This feature drops all the STP<br />
messages on an EXT interface. Values: “NONE”, “EXTA”, EXTB”.<br />
plSecurity<br />
o plSecurityConsoleSerial: Enables or disables the serial console access to the modem.<br />
o plSecurityConsoleTelnet: Enables or disables the telnet console access to the modem.<br />
o plSecurityConsoleAuthTable: Table containing the IP addresses from which telnet clients may<br />
access this<br />
12.2 AUTO-CONFIGURATION AND PROVISIONING<br />
12.2.1 Auto-configuration purpose<br />
The purpose of the auto-configuration process is the complete automation of the deployment of the BPL network:<br />
• <strong>Medium</strong> Voltage equipment<br />
• Low Voltage Repeaters <strong>and</strong> Home Gateways<br />
• CPEs<br />
With the auto-configuration mechanism no prior pre-configuration of any modem is required.<br />
12.2.2 Auto-configuration process overview<br />
The objective of the auto-configuration process is the centralized management of a BPL network using<br />
configuration files stored in a centralized database that are transferred to each node when it boots. These files<br />
contain all of the information that a node needs to know to work as expected.<br />
Below is a brief description of the process:<br />
Submission page 358 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
1. Every node starts with the same default factory configuration: <strong>Access</strong> CPE.<br />
2. Using PTTP (explained later in this document 12.2.5) the modem discovers if it is booting in a network<br />
with VLANs or not. If a network has been built using VLANs it is necessary to know the Management VLAN of<br />
that network segment for the DHCP request to reach the backbone. The information passed between modems<br />
during PTTP is called the translation table.<br />
3. Using DHCP protocol, each node gets their IP configuration (IP address, netmask <strong>and</strong> gateway), the phone<br />
number (in the case of VoIP CPEs), the name of their corresponding auto-configuration file <strong>and</strong> the IP address of<br />
the TFTP server where the auto-configuration file is.<br />
4. Using TFTP protocol, the nodes download the auto-configuration file <strong>and</strong> configure the node accordingly.<br />
The four points mentioned above are the main ones, but there is another point to consider:<br />
In order to achieve a secure network, BPL authentication is introduced. When a new slave is trying to<br />
access the BPL network <strong>and</strong> connecting to a master or a repeater, the master or repeater may perform a<br />
RADIUS request to authenticate the user. See section 12.2.9 for more information.<br />
Below there is an example of the actions involved in the auto-configuration of a slave modem:<br />
Radius Server<br />
TFTP Server<br />
DHCP Server<br />
Master<br />
PLC<br />
Slave<br />
Master<br />
Slave<br />
Searchlink<br />
<strong>Access</strong><br />
Protocol<br />
Radius<br />
Request<br />
Master<br />
Slave<br />
<strong>MAC</strong><br />
Authentication<br />
RadiusReply<br />
with Profile<br />
<strong>Access</strong><br />
Grant<br />
Master<br />
Slave<br />
PSP Negotiation<br />
STP<br />
PTTP<br />
Request<br />
Submission page 359 UPA-OPERA<br />
Master<br />
Slave<br />
PTTP<br />
Reply<br />
Gets Translation Table<br />
with Mgmt VLAN<br />
DHCP<br />
Request<br />
Figure 151 Autoconfiguration of a slave modem<br />
Slave<br />
TFTP<br />
Request<br />
DHCP<br />
Reply<br />
Gets IP address +<br />
Name of Configuration<br />
File<br />
Slave<br />
Downloads<br />
Configuration File
4-June-07 P1901_PRO_016_r0<br />
If the node is the first modem in the network <strong>and</strong> connected directly through the Ethernet port to the backbone, the<br />
process is slightly different:<br />
1. This node starts with the same default factory configuration: <strong>Access</strong> CPE.<br />
2. Using DHCP protocol, the node gets their IP configuration (IP address, netmask <strong>and</strong> gateway, <strong>and</strong> the name<br />
of their corresponding auto-configuration file). Also there is another parameter called pttp-code that indicates if<br />
VLAN is used <strong>and</strong> the value of the management VLAN if needed. Once this parameter is obtained the PTTP<br />
protocol finishes. Important: the DHCP server must ask this node in the VLAN #1 or without VLAN. In other<br />
words, the node performs DHCP requests without VLAN <strong>and</strong> with VLAN #1 alternately.<br />
3. Using TFTP protocol, the nodes download the auto-configuration file <strong>and</strong> configure the node accordingly.<br />
The figure below shows an example of this case:<br />
Radius Server<br />
TFTP Server<br />
DHCP Server<br />
Ethernet<br />
12.2.3 <strong>Access</strong> Protocol<br />
DHCP<br />
Request<br />
VLAN 1<br />
Slave<br />
DHCP<br />
DHCP<br />
Reply<br />
VLAN 1<br />
Slave<br />
Gets Mgmt VLAN from<br />
DHCP reply<br />
Gets IP address +<br />
Name of Configuration<br />
File<br />
TFTP<br />
Request<br />
VLAN X<br />
Submission page 360 UPA-OPERA<br />
Slave<br />
TFTP<br />
Reply<br />
VLAN X<br />
Downloads Configuration<br />
File + Translation Table<br />
Figure 152 Autoconfiguration of a HE<br />
HE<br />
HE Node Configured<br />
as master<br />
The access protocol mechanism controls the access of slaves to the BPL network. The master or repeater queries the<br />
Radius server (if Radius authentication is enabled) when a new slave is detected.<br />
Only nodes that link to a Master or repeater need to be in the Radius database:<br />
• CPEs
4-June-07 P1901_PRO_016_r0<br />
• TD Repeaters<br />
The Radius server checks:<br />
• The <strong>MAC</strong> address of the slave applying for authentication<br />
• The <strong>MAC</strong> address of the master placing the request<br />
The Radius server replies:<br />
• Accept / Reject<br />
• Profile number<br />
The profile number relates to the QoS <strong>and</strong> VLAN settings for the given slave (Radius user).<br />
If <strong>Access</strong> Protocol authentication is disabled, all slaves get access to the network with the default settings (profile<br />
1).<br />
A third type of authentication is possible: Authlist. In this mode, the autoconfiguration file of the master contains all<br />
the slaves that are allowed to connect <strong>and</strong> their associated profile.<br />
12.2.4 Auto-configuration at Modem Boot<br />
autoconfiguration parameters on booting. When any node boots, there may be a parameter stored in the non-volatile<br />
memory called GENERAL_USE_AUTOCONF. When this value is YES, the node boots in auto-configuration<br />
mode. When this value is NO, the node boots from local settings.<br />
Inside the autoconfiguration boot mode there are two possibilities depending on whether or not PTTP is performed.<br />
12.2.4.1 Autoconfiguration PTTP Boot<br />
send PTTP requests. When this protocol ends, the modem has the minimum information to successfully connect to<br />
the backbone <strong>and</strong> execute DHCP <strong>and</strong> TFTP.<br />
The node then performs a DHCP request to get an IP configuration, the phone number (if required) <strong>and</strong> the name of<br />
the auto-configuration file, as well as the TFTP server where the file is located. Then it downloads the file <strong>and</strong><br />
configures the node accordingly.<br />
12.2.4.2 Autoconfiguration no PTTP Boot<br />
In this autoconfiguration boot modality, the modem has been already configured somehow (see section 12.2.5 for<br />
more information) to successfully execute DHCP <strong>and</strong> TFTP so it skips PTTP.<br />
Submission page 361 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
This mode requires pre-configuration <strong>and</strong> it is only recommended in the first node of the BPL network, the node<br />
that connects to the backbone, because this node cannot get the information for booting from any other node.<br />
However, there is defined a DHCP extension to solve this issue without pre-configuration. See section 12.2.8.<br />
12.2.4.3 Boot from local settings<br />
When a node starts in local settings boot mode, it collects all of the configured parameters from the non-volatile<br />
memory <strong>and</strong> configures the node accordingly. There are some basic parameters that are always configured in this<br />
mode:<br />
• GENERAL_TYPE: Node type – HE, CPE, or TDREPEATER.<br />
• GENERAL_IP_USE_DHCP: Use DHCP – yes or no. If this parameter is set to no, the IP configuration<br />
parameters <strong>and</strong> the phone number are also configured from non-volatile memory.<br />
All of the other parameters are only configured if they have been downloaded from a file first, <strong>and</strong> a<br />
GENERAL_USE_AUTOCONF = no line was in that auto-configuration file. This is equivalent to performing a<br />
Save as Permanent.<br />
12.2.5 PTTP Protocol<br />
The PTTP (Parametric Translation Table Protocol) is used to transfer the translation table (explained later in this<br />
document) between modems at booting. The PTTP uses the CCP<br />
12.2.5.1 General description<br />
The Parametric translation table protocol takes place every time a node boots. The aim of this protocol is to obtain<br />
from the nearest active node a table with the values of certain auto-configuration parameters. When the node<br />
downloads the auto-configuration file it uses the obtained values to translate all the parametric values contained in<br />
the file.<br />
The translation table contains information about the different VLAN <strong>and</strong> OVLAN tags used in the network, as well<br />
as information about the QoS settings. If the network is not using VLAN tags, this information is also contained in<br />
the translation table. Due to this, it is necessary to perform the protocol before the DHCP request.<br />
Once the translation table is obtained, the node is able to perform the DHCP request successfully <strong>and</strong> download <strong>and</strong><br />
interpret the auto-configuration file, translating the parametric values contained on it.<br />
12.2.5.2 Protocol description<br />
The Translation Table protocol is client-server. Each node belonging to the network at boot time represents the<br />
client side. Each configured node in the network excluding End Users nodes performs the server side of the<br />
protocol.<br />
The usual sequence of packet exchanging is described:<br />
Submission page 362 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
1. The client starts sending a Read ReQuest (RRQ) packet through all active interfaces.<br />
2. The closest server receives the RRQ packet <strong>and</strong> it sends the first block of the Translation Table to the client<br />
with a DATA packet with block number 1.<br />
3. The client answers with an ACK packet of the block number 1.<br />
4. The server sends the next block of DATA.<br />
5. The client replies with another ACK<br />
6. Steps 4 <strong>and</strong> 5 are repeated until the translation table is sent completely.<br />
7. The server sends an empty DATA packet to finish the protocol.<br />
8. The client replies with an ACK to this empty packet <strong>and</strong> closes the connection.<br />
9. The server receives the last ACK <strong>and</strong> closes the connection.<br />
The following figure shows this sequence:<br />
Submission page 363 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Open connection<br />
Learn source <strong>MAC</strong><br />
address<br />
Last data block<br />
received (empty)<br />
Close connection<br />
Client<br />
<strong>MAC</strong>_x<br />
PTTP.DATA(N)<br />
Empty<br />
PTTP.RRQ<br />
DST: DS2 Multicast<br />
SRC: <strong>MAC</strong>_x<br />
Preforwarded to<br />
active ports<br />
PTTP.DATA(1)<br />
DST: <strong>MAC</strong>_x<br />
SRC: <strong>MAC</strong>_y<br />
PTTP.ACK(1)<br />
DST: <strong>MAC</strong>_y<br />
SRC: <strong>MAC</strong>_x<br />
PTTP.DATA(2)<br />
PTTP.ACK(2)<br />
PTTP.ACK(N)<br />
Figure 153 Usual PTTP operation.<br />
Server<br />
<strong>MAC</strong>_y<br />
Open connection<br />
Learn source <strong>MAC</strong><br />
address<br />
Last block ACK<br />
received<br />
Close connection<br />
Since PTTP protocol operates directly over BPL <strong>and</strong> Ethernet protocols, it must h<strong>and</strong>le itself lost <strong>and</strong> duplicated<br />
packets. PTTP implements the stop-<strong>and</strong>-wait protocol described before. For this purpose, two timers are needed per<br />
each connection: DATA <strong>and</strong> ACK timers. The DATA timer is in the client, whereas the ACK timer is located in the<br />
server.<br />
If a duplicated DATA or ACK message arrives, it is simply discarded, because its Block Number field will not<br />
match the expected one. If a DATA or ACK message is lost, the ACK timer will expire in the server <strong>and</strong> this will<br />
retransmit the last DATA message.<br />
There is defined a Maximum Number of Retransmissions, which in case of being exceeded, the connection will be<br />
closed on the server side. Moreover, the connection will be closed on the client side too, because its DATA timer<br />
will expire.<br />
Submission page 364 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
If the initial RRQ packet is lost, the DATA timer will expire too, <strong>and</strong> the connection will not be open.<br />
In case of DATA timer expiration, the client would not get its translation table <strong>and</strong> will not be configured. For that<br />
reason, it must retry sending another RRQ message again to request the translation table.<br />
DATA timer value should be several times the ACK timer. Concretely, this value must be slightly greater than the<br />
product of the Maximum Number of Retransmissions <strong>and</strong> the ACK timer:<br />
DATA_Timer > Max_Retransmissions · ACK_Timer<br />
The reason for using this value is to avoid useless retransmissions by the server, because the client might have<br />
closed its connection, due to DATA timer timeout, before the server did. Thus, in case of DATA timer expiration,<br />
the server should close the connection before the client.<br />
The following figure shows the mechanism of ACK timer expiration <strong>and</strong> data block retransmission:<br />
Submission page 365 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Client Server<br />
PTTP.ACK(i-1)<br />
PTTP.DATA(i)<br />
PTTP.DATA(i)<br />
PTTP.ACK(i)<br />
PTTP.DATA(i)<br />
PTTP.ACK(i)<br />
PTTP.DATA(i+1)<br />
ACK Timer expired<br />
Retransmit last<br />
data block<br />
ACK Timer expired<br />
Retransmit last<br />
data block<br />
Figure 154 ACK timer expiration <strong>and</strong> data block retransmission.<br />
The following figure shows the mechanism of DATA timer expiration <strong>and</strong> Maximum Number of Retransmissions<br />
exceeded, whose consequence is the connection closing:<br />
Submission page 366 UPA-OPERA<br />
ACK Timer<br />
ACK Timer
4-June-07 P1901_PRO_016_r0<br />
DATA Timer<br />
DATA Timer<br />
expired<br />
Close connection<br />
Client Server<br />
PTTP.ACK(i-1)<br />
PTTP.DATA(i)<br />
PTTP.DATA(i)<br />
PTTP.ACK(i)<br />
PTTP.DATA(i)<br />
PTTP.DATA(i)<br />
ACK Timer expired<br />
Retransmit last<br />
data block<br />
ACK Timer expired<br />
Retransmit last<br />
data block<br />
ACK Timer expired<br />
Retransmit last<br />
data block<br />
Maximum Number<br />
of Retransmissions<br />
exceeded<br />
Close connection<br />
Figure 155 DATA timer expiration <strong>and</strong> Maximum Number of Retransmissions exceeded.<br />
12.2.5.3 PTTP Packets Format<br />
All the packets used by the PTTP protocol are encapsulated with the CCP format, with Type0 0x07. The Type1<br />
field indicates the type of packet within the PTTP protocol:<br />
• 0x06 RRQ (Establish connection)<br />
• 0x07 Data<br />
• 0x08 Data Ack<br />
Submission page 367 UPA-OPERA<br />
ACK Timer<br />
ACK Timer<br />
ACK Timer<br />
Max_Retransmissions · ACK_Timer
4-June-07 P1901_PRO_016_r0<br />
The data field contains the block number <strong>and</strong>/or data to transmit.<br />
12.2.5.3.1 RRQ packet<br />
0xAA<br />
0xAA<br />
0x03<br />
0x00<br />
0x13<br />
0x9D<br />
0x07<br />
0x06<br />
Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />
Submission page 368 UPA-OPERA<br />
TPID<br />
TCI<br />
Length<br />
Figure 156 PTTP RRQ packet format<br />
The destination address is the Multicast address 0x01139D000000 defined by the CCP protocol. When a node<br />
receives such a packet, it must not be forwarded.<br />
12.2.5.3.2 DATA packet<br />
TPID<br />
0xAA<br />
0xAA<br />
0x03<br />
0x00<br />
0x13<br />
0x9D<br />
0x07<br />
0x07<br />
Length<br />
Dest <strong>MAC</strong> Src <strong>MAC</strong> Payload<br />
TCI<br />
Block Number<br />
Data (0-1024 bytes)<br />
Figure 157 PTTP DATA packet format<br />
The destination <strong>and</strong> source address are the client <strong>and</strong> server <strong>MAC</strong> addresses respectively.<br />
The Type1 field indicates this is a data packet. Next to this field, it is the data block number, <strong>and</strong> finally the data<br />
block. The data field can be empty if the DATA packet is the last packet of the transfer.<br />
12.2.5.3.3 DATA ACK packet
4-June-07 P1901_PRO_016_r0<br />
Figure 158 PTTP DATA ACK packet format<br />
The destination <strong>and</strong> source address are the server <strong>and</strong> client <strong>MAC</strong> addresses respectively.<br />
The Type1 field indicates this is a data ack packet. Next to this field, it is the acknowledged data block number.<br />
12.2.5.4 Translation Table DATA format<br />
The Translation Table data follows a specific format. It is a set of one or more parameter items. A parameter item is<br />
defined as follows:<br />
Size<br />
TT Parameter Item (4 + n bytes)<br />
ParameterCode Index<br />
ParameterValue<br />
1 byte 2 bytes<br />
1 byte<br />
0 ... n bytes<br />
Figure 159 Translation Table parameter item<br />
The field Size is the number of bytes of the rest of parameter item (ParameterCode + Index + ParameterValue).<br />
The minimum value is thus 4. If the value is 0, it means that no more parameters are sent. It is m<strong>and</strong>atory to finish<br />
the Data block with a 0-size byte.<br />
The ParameterCode is a 2-byte field. The first byte is reserved for future extensions. It defaults to 0x00. The second<br />
byte is the parameter code. The whole field identifies one <strong>and</strong> only one parameter.<br />
The Index byte contains the index for list parameters (from 1 to 127). It is 0 for scalar parameters.<br />
The ParameterValue contains the value for that parameter. Its format depends on the ParameterCode <strong>and</strong> may be of<br />
any type such as int8, int16, int32, string…<br />
The next parameters are available:<br />
Submission page 369 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
TRANSLATION TABLE<br />
PARAMETER<br />
PARAMETER<br />
SIZE (IN<br />
BYTES)<br />
PARAMETER CODE<br />
(IN HEXADECIMAL)<br />
PARAMETER TYPE<br />
TRANSLATION_USE_VLAN 1 0x00 01 Boolean<br />
TRANSLATION_MNMT_VLAN 2 0x00 02 Int16<br />
TRANSLATION_DATA_VLAN.i 2 0x00 03 Int16<br />
TRANSLATION_VOIP_VLAN.i 2 0x00 04 Int16<br />
TRANSLATION_ROOTPATH_OVLAN 2 0x00 05 Int16<br />
TRANSLATION_MAX_TXTPUT_TX.i 4 0x00 06 Int32<br />
TRANSLATION_MAX_TXTPUT_RX.i 4 0x00 07 Int32<br />
Table 67 Translation table parameters<br />
When the Data block exceeds the maximum length of 1024 bytes, it is fragmented <strong>and</strong> transferred in different<br />
DATA packets. No padding is needed for the last packet in case the Data field is smaller than 1024 bytes.<br />
The big endian format is used in the entire Data block to preserve the net order.<br />
The Figure 160 shows a complete data block.<br />
Parameter1<br />
4 + n1 bytes<br />
Parameter2<br />
TT Data block<br />
Parameter3 . . . ParameterN<br />
4 + n2 bytes 4 + n3 bytes 4 + nN bytes<br />
Figure 160 Full Translation Table Data block<br />
12.2.5.5 VLAN configuration while doing PTTP<br />
Submission page 370 UPA-OPERA<br />
0x00<br />
1 byte<br />
In order to discover the type of network where the node is booting, the PTTP petitions are made as described below:
4-June-07 P1901_PRO_016_r0<br />
• Step 1: A PTTP request is made without VLANs <strong>and</strong> waits for a response. If there is response, stay without<br />
VLAN.<br />
• Step 2: Then it switches to VLAN mode <strong>and</strong> makes a PTTP request using VLAN tag #1 (reserved in the<br />
IEEE P1901 network) <strong>and</strong> waits for response. If there is response, stay with VLAN.<br />
Step 3: Back to step 1.<br />
To accomplish this, the VLAN #1 must be accepted in the node that acts as PTTP master.<br />
12.2.5.6 PTTP packets forwarding<br />
When a node receives a PTTP RRQ packet, the packet is not treated as multicast to avoid packet storms.<br />
In transmission, the request is forwarded to all active interfaces in order to reach any active PTTP available server.<br />
12.2.6 Translation Table<br />
The translation table allows particularizing configuration files for a given network sector. Auto-configuration file is<br />
parametric, <strong>and</strong> the same for a given user category. Different sectors have different Translation Tables <strong>and</strong> each<br />
node combines its configuration file with the translation table to obtain its particular setting in VLAN/OVLAN <strong>and</strong><br />
QoS terms.<br />
The parameters cointained in the translation table are shown in 12.2.5.4.<br />
The next figure shows the use of the translation table.<br />
Configuration File<br />
VLAN= %DTVL<br />
Translation table<br />
Translation table<br />
%DTVL =13 %DTVL =14<br />
User A<br />
Sector 1<br />
S S<br />
VLAN=13 VLAN=14<br />
Figure 161 Translation table example<br />
User A<br />
Sector 2<br />
Submission page 371 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
12.2.7 Auto-configuration & Networking<br />
12.2.7.1 VLAN Network<br />
The network model is described as follows:<br />
• The BPL network is a switched network with different VLAN tags.<br />
• BPL management protocols (PTTP, ABLP, etc.) use VLAN 1, while high-level management protocols<br />
(DHCP, TFTP, HTTP, NTP, SNMP, etc.) use the management VLAN configured by the auto-configuration<br />
procedure. The Management VLAN may be different in different LV cells.<br />
• The end user node receives untagged traffic from the external interface <strong>and</strong> this traffic is tagged with the<br />
correct Data VLAN according to the ISP operator that the customer belongs to. So there can be more than<br />
one Data VLAN per LV cell.<br />
• The end user node generates traffic from VoIP tagged with the correct VoIP VLAN according to the voice<br />
operator that the customer belongs to. So there can be more than one VoIP VLAN per LV cell.<br />
• It is possible to add private VLANs between specific customers that do not belong to any ISP or voice<br />
operator. In this case, VLAN trunks must be defined in the intermediary equipment in order to allow all of<br />
that tagged traffic.<br />
All of the traffic is tagged inside the BPL network.<br />
Each node must receive its VLAN configuration inside the auto-configuration file. In addition to this, <strong>and</strong> in order<br />
to reduce the number of auto-configuration files, there will be a translation table transferred between nodes which.<br />
The translation table contains information about the Management, Data <strong>and</strong> VoIP VLANs used in a LV cell.<br />
Submission page 372 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
Internet MV Node Head-End<br />
Router<br />
PSTN<br />
Opt Fiber<br />
MV Node<br />
MV link<br />
MV link<br />
Submission page 373 UPA-OPERA<br />
MV node<br />
L2 visibility area<br />
Head-End<br />
Repeater<br />
Repeater<br />
Repeater<br />
Repeater<br />
Figure 162 VLAN use inside the BPL network<br />
The figure above shows the use of VLAN inside the BPL network.<br />
12.2.7.2 noVLAN Network<br />
End<br />
User-1<br />
End<br />
User-2<br />
End<br />
User-3<br />
End<br />
User-4<br />
End<br />
User-5<br />
End<br />
User-6<br />
End<br />
User-7<br />
End<br />
User-8<br />
VoIP-Op1<br />
Data-Op2<br />
VoIP-Op3<br />
Data-Op1<br />
VoIP-Op4<br />
Data-Op3<br />
VoIP-Op1<br />
Data-Op2<br />
Private1<br />
Private1<br />
VoIP-Op1<br />
Data-Op3<br />
VoIP-Op4<br />
Data-Op1<br />
VoIP-Op1<br />
Data-Op2<br />
VoIP-Op1<br />
Data-Op1<br />
The use of VLANs is not m<strong>and</strong>atory but is advisable for privacy reasons. Nevertheless this privacy can be<br />
implemented with different tools or if the operator simply wants to establish a LAN.<br />
The node will perform its PTTP requests, switching between VLAN #1 <strong>and</strong> not using VLAN, <strong>and</strong> finally a master<br />
will answer with the translation table that will at least contain the parameter “USE VLAN = no”.<br />
Once the modem has received the translation table <strong>and</strong> does not need to configure anything with regard to VLANs,<br />
it can complete the following steps: DHCP, TFTP <strong>and</strong> configuration.<br />
12.2.7.3 OVLAN Configuration <strong>and</strong> Root Interface<br />
The basic OVLAN configuration in IEEE P1901 avoids the visibility between customers connected to the end-user<br />
nodes in a simple way. All of the customer data packets in the same LV cell are tagged with the Rootpath OVLAN<br />
tag. This tag is the only allowed tag in the entire path to the backbone. In the path from the backbone to the<br />
customers, the packets are tagged with the ALL_VLAN tag (4095) in equipment that is connected to the backbone,
4-June-07 P1901_PRO_016_r0<br />
<strong>and</strong> no tag is allowed in this path. However, packets with the ALL_VLAN tag are not filtered, so only packets from<br />
the backbone can be transmitted over the downstream path.<br />
12.2.7.4 User Profiles<br />
The use of profiles allows securely assigning resources to end-user modems based on <strong>MAC</strong> address. They also<br />
inform the master about the VLAN/OVLAN <strong>and</strong> QoS settings to be applied to the slave.<br />
12.2.7.5 User Profiles inside auto-configuration<br />
Inside a master’s auto-configuration file, there is a section with user profiles. These profiles contain the information<br />
a master needs to know to configure a port to a new slave that enters the network. The information is related to QoS<br />
<strong>and</strong> VLAN/OVLAN configuration.<br />
The figure shows an example on the use of user profiles to configure different QoS settings:<br />
User A<br />
Profile 1<br />
Configuration File<br />
#Profile 1<br />
BW = 500<br />
#Profile 2<br />
BW = 1000<br />
Radius Server<br />
M M<br />
S S<br />
User B<br />
Profile 2<br />
BW=500 BW=1000<br />
Figure 163 Radius profiles example<br />
There will be always an invited profile, profile number 1, applied to the users with no specific profile or if the<br />
corresponding profile is not available. This invited profile, as well as the other profiles, can be redefined with autoconfiguration.<br />
Submission page 374 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
12.2.7.6 Working with RADIUS Authentication<br />
When RADIUS authentication is active, the repeater or HE sends an <strong>Access</strong>-Request message to the RADIUS<br />
server, which checks if the <strong>MAC</strong> address corresponds to one that was accepted <strong>and</strong>, in that case, it responds with an<br />
<strong>Access</strong>-Accept message containing the profile number. Otherwise, the server replies with a RADIUS <strong>Access</strong>-<br />
Reject message <strong>and</strong> the authentication fails. If the authentication fails the slave will not join the BPL network.<br />
Once authentication is achieved, the slave is authorized <strong>and</strong> a QoS <strong>and</strong> VLAN/OVLAN configuration takes place<br />
between the master <strong>and</strong> slave. The master uses the profile number to get these parameters. The slave uses the<br />
parameters inside the downloaded auto-configuration file. The slave node downloads the file during its autoconfiguration<br />
process, after the RADIUS request on the master-side has been successful.<br />
12.2.7.7 Working without RADIUS Authentication<br />
If there is no RADIUS authentication, two ways of operation are possible.<br />
The first one is ‘NO AUTHENTICATION’. The master will configure a default QoS <strong>and</strong> VLAN/OVLAN<br />
configuration (the invited profile) for the slave.<br />
The other one is the use of an ‘AUTHORIZATION LIST’. With ‘ACCESSP_AUTHLIST_x’, up to 128 different<br />
users can be added with their related profiles. The user is searched for in that list, <strong>and</strong> if an entry matches with the<br />
new user, the QoS <strong>and</strong> VLAN/OVLAN configuration related to that entry is used for the new user. Otherwise, the<br />
user is rejected.<br />
12.2.8 DHCP Support<br />
12.2.8.1 DHCP Client<br />
The IEEE P1901 nodes perform a DHCP request with extended custom options. So not only the basic IP<br />
configuration (IP address, netmask <strong>and</strong> gateway) is requested, but the client also requests three custom options in<br />
order to obtain the auto-configuration file:<br />
• tftp-server-name: String with the IP address of the TFTP server.<br />
• extensions-path-name: String with the path <strong>and</strong> file name of the auto-configuration file inside the TFTP<br />
server.<br />
• PTTP-code: 32 bits integer that represents the PTTP behaviour:<br />
o 0: Boot without VLANs <strong>and</strong> skip PTTP.<br />
o 1: Keep on requesting PTTP (does nothing).<br />
o [2-4095]: Boot with Management VLAN = PTTP-code. Skip PTTP.<br />
Submission page 375 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
On the other h<strong>and</strong>, if the phone number has to be downloaded using DHCP, another custom option should be<br />
requested:<br />
• phone-number: Text with the phone number.<br />
12.2.8.2 DHCP Server<br />
A DHCP server that supports DHCP extensions is needed in order to provide the different IEEE P1901 nodes with<br />
the custom options requested.<br />
Warning: Although the two first custom options needed by the DHCP client are supposed to be st<strong>and</strong>ard,<br />
sometimes it is necessary to define the extensions-path-name option in the header of the dhcpd.conf file. The PTTPcode<br />
option is m<strong>and</strong>atory to define:<br />
option extensions-path-name code 18 = string;<br />
option PTTP-code code 120 = unsigned integer 32;<br />
It is also necessary to define the phone-number in the header of the dhcpd.conf file, if the phone number of some<br />
CPEs will be configured via DHCP:<br />
option phone-number code 135 = text;<br />
12.2.9 RADIUS Support<br />
Every IEEE P1901 master or repeater node may implement a RADIUS client in order to authenticate users (slaves)<br />
connected through the BPL to that node. The modem acts as a NAS, which requests authentication, gives<br />
authorization, <strong>and</strong> allocates resources.<br />
12.2.9.1 RADIUS Client<br />
The RADIUS client implemented in the IEEE P1901 nodes is configured through the auto-configuration file with<br />
three parameters:<br />
• RADIUS server IP address<br />
• RADIUS server UDP port<br />
• Shared secret password between client <strong>and</strong> server<br />
It also sends two RADIUS st<strong>and</strong>ard attributes within a RADIUS request:<br />
• <strong>MAC</strong> address of the slave trying to join the network as User name.<br />
Submission page 376 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
• <strong>MAC</strong> address of the master as NAS-Identifier.<br />
12.3 Auto-configuration Parameters<br />
12.3.1 Parameter Types<br />
There are three types of parameters inside the auto-configuration file:<br />
1. Scalar: PARAMETER = value<br />
2. List: PARAMTER.index1 = value<br />
3. Table: PARAMETER.index1.index2 = value<br />
The first valid index for lists <strong>and</strong> tables is 1.<br />
12.3.2 Parameter Format<br />
The format of the parameters is:<br />
• PARAMETER_LABEL[.x][.y] = value<br />
for concrete parameter values<br />
• PARAMETER_LABEL[.x][.y] = %parametric_value<br />
for parametric parameter values<br />
For example, the following parameter could be inside an end-user auto-configuration file:<br />
• VLAN_DATA_TAG = 452<br />
or<br />
• VLAN_DATA_TAG = %DATA3<br />
In the second case, the parametric value must be translated to its correct value using the translation table.<br />
The following is a list with the syntax of the autoconfiguration parameters.<br />
It is important that the order in which these parameters appear in the auto-configuration file is preserved.<br />
Submission page 377 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
12.3.3 Auto-configuration parameter list<br />
12.3.3.1 General Parameters<br />
• GENERAL_USE_AUTOCONF = [YES | NO]<br />
o Parameter: YES enables autoconf, NO disables it.<br />
• GENERAL_TYPE = [HE | CPE | TDREPEATER]<br />
o Parameter: Possible values are: HE (Head End), CPE (Customer Premises Equipment) <strong>and</strong><br />
TDREPEATER (Time Division Repeater).<br />
• GENERAL_FW_TYPE = [MV | LV | EU]<br />
o Parameter: Possible values are: MV (<strong>Medium</strong> Voltage), LV (Low Voltage) <strong>and</strong> EU (End User).<br />
• GENERAL_SIGNAL_MODE = [1 … m]<br />
o Parameter: Configures the physical mode used by the modem. This value can reach from 1 to m,<br />
depending on the range of frequency used.<br />
• GENERAL_SIGNAL_MODE_LIST.i = [1 … m]<br />
o Parameter: This value can reach from 1 to m, depending on the range of frequency used.<br />
• GENERAL_AUTHENTICATION = [RADIUS | AUTHLIST | NONE]<br />
o Parameter: There are three possible values: RADIUS, ATHLIST <strong>and</strong> NONE. If RADIUS is<br />
selected, a RADIUS server will be in charge of accepting new users <strong>and</strong> assigning the profile. If<br />
AUTHLIST is selected, authentication will be done by checking a list provided in the autoconfiguration<br />
file. If NONE is selected, all the users will be accepted<br />
• GENERAL_STP = [YES | NO]<br />
o Parameter: Enables (YES) or disables (NO) the Spanning Tree Protocol in the node. Enabled by<br />
default.<br />
• GENERAL_COMMON_STP_EXTA = [YES | NO]<br />
o Parameter: Enables (YES) or disables (NO) the Common STP feature in the Ethernet interface A<br />
(EXTA).<br />
• GENERAL_COMMON_STP_EXTB = [YES | NO]<br />
o Parameter: Enables (YES) or disables (NO) the Common STP feature in the Ethernet interface B<br />
(EXTB).<br />
• GENERAL_IP_ADDRESS = <br />
o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />
dots).<br />
Submission page 378 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
• GENERAL_IP_NETMASK = <br />
o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />
dots).<br />
• GENERAL_IP_GATEWAY = <br />
o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />
dots).<br />
• GENERAL_IP_USE_DHCP = [YES | NO]<br />
o Parameter: If Yes DHCP is used, if NO DHCP is not used.<br />
12.3.3.2 AGC (Automatic Gain <strong>Control</strong>) Parameters<br />
• AGC_TX_GAIN = [0 | 1]<br />
o Parameter: Selecting 1, the default value, 12 dB are added to the reference gain. In case of 0 value,<br />
no extra gain is added (0 dB).<br />
• AGC_RX_ENABLE = [0 | 1]<br />
o Parameter: Enables (1) or disables (0) the hardware AGC.<br />
• AGC_RX_FIX_GAIN = [0 … 7]<br />
o Parameter: Eight values, from 0 to 7, are possible. Those values represent gains from 0 to 42 dB,<br />
respectively, added to the reference gain in steps of 6 dB.<br />
• AGC_MAX_RX_GAIN = [0 … 7]<br />
o Parameter: Eight values, from 0 to 7, are possible. Those values represent gains from 0 to 42 dB,<br />
respectively, added to the reference gain in steps of 6 dB. The default value is 7 (42 dB).<br />
• AGC_MIN_RX_GAIN = [0 … 7]<br />
o Parameter: Eight values, from 0 to 7, are possible. Those values represent gains from 0 to 42 dB,<br />
respectively, added to the reference gain in steps of 6 dB. The default value is 7 (42 dB).<br />
12.3.3.3 RADIUS Parameters<br />
• RADIUS_SERVER_IP = <br />
o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />
dots).<br />
• RADIUS_SERVER_PORT = ddddd<br />
o Parameter: Port number<br />
Submission page 379 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
• RADIUS_SHARED_SECRET = <br />
o Parameter: ‘shared_secret’ (string, limited to 16 characters, of the shared secret)<br />
12.3.3.4 Class of Service (CoS) Parameters<br />
• COS_CUSTOM_CRITERION_OFFSET.i = [1 … 531]<br />
o Parameter: Values from 1 to 531 are possible.<br />
• COS_CUSTOM_CRITERION_PATTERN.i = 0xXXXXXXXXXXXXXXXX<br />
o Parameter: The value must be specified with 16 hexadecimal digits.<br />
• COS_CUSTOM_CRITERION_BITMASK.i = 0xXXXXXXXXXXXXXXXX<br />
o Parameter: The value must be specified with 16 hexadecimal digits.<br />
• COS_CUSTOM_CRITERION_CLASSES_OFFSET.i = [1 … 531]<br />
o Parameter: Values from 1 to 531 are possible.<br />
• COS_CUSTOM_CRITERION_CLASSES_BITMASK.i i = 0xXXXXXXXXXXXXXXXX<br />
o Parameter: The value must be specified with 16 hexadecimal digits.<br />
• COS_CUSTOM_CRITERION_CLASSES_PATTERN.i.j i=0xXXXXXXXXXXXXXXXX<br />
o Parameter: The value must be specified with 16 hexadecimal digits<br />
• COS_CUSTOM_CRITERION_CLASSES_PRIO.i.j = [0 … 7]<br />
o Parameter: Values from 0 to 7 are allowed.<br />
• COS_CRITERION.k = [8021P | TOS | CUSTOM1 | CUSTOM2]<br />
o Parameter: There are two predefined criteria (8021P, based on IEEE 802.1p VLAN tag priority<br />
field, <strong>and</strong> TOS, based on IP type of service), <strong>and</strong> two custom criteria (CUSTOM1 <strong>and</strong> CUSTOM2),<br />
defined with the parameters above (COS_CUSTOM_CRITERION_xxx).<br />
• COS_DEFAULT_PRIO = [0 … 7]<br />
o Parameter: Values from 0 to 7 are allowed.<br />
12.3.3.5 Quality of Service (QoS) Parameters<br />
• QOS_ENABLE = [YES | NO]<br />
o Parameter: Enables (YES) or disables (NO) the quality of service in the node.<br />
• QOS_PRIOACK.prio+1 = [0 | 1]<br />
Submission page 380 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o Parameter: This list enables (1) or disables (0) the <strong>Layer</strong> 2 ACK protocol depending on the<br />
priority level transmitted by the modem (priority levels: prio = 0 … 7).<br />
• QOS_PRIORSV.prio+1 = [CBR | VBR | BE]<br />
o Parameter: Type of reservation for each priority<br />
12.3.3.5.1 Slave Node Parameters (CPE)<br />
• QOS_UPBWLIMIT = [YES | NO]<br />
o Parameter: Enables (YES) or disables (NO) the transmission b<strong>and</strong>width limitation in a slave.<br />
• QOS_CLASSES.prio+1 = [VOIP | VIDEO | DATAH | DATAL]<br />
o Parameter: Sets the type of application for each service class<br />
12.3.3.5.2 Master Node Parameters (HE or REPEATER)<br />
• QOS_LATENCY_STEP = [20 … 400]<br />
o Parameter: Values in ms, from 20 to 400.<br />
• QOS_BW_POLICY = [0 | 1]<br />
o Parameter: A value of 0 corresponds to Fair mode, <strong>and</strong> 1 to Priority-based mode.<br />
• QOS_LATENCY.prio+1 = [1 | 2 | 4 | 8]<br />
o Parameter: Priority levels: prio = 0 … 7. Possible values are: 1, 2, 4 <strong>and</strong> 8.<br />
12.3.3.6 Profiles Parameters<br />
• PROFILE_MAX_TXPUT_TX.i = dddd (in kbps)<br />
o Parameter: Number of kbps)<br />
• PROFILE_MAX_TXPUT_RX.i = dddd (in kbps)<br />
o Parameter: Number of kbps)<br />
• PROFILE_PRIORITIES.i = [0x00-0xFF]<br />
o Parameter: ‘0xXX’ (hexadecimal number from 00 to FF)<br />
• PROFILE_MNMT_VLAN.i = [2-4093] | %<br />
o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />
• PROFILE_DATA_VLAN.i = [2-4093] | %<br />
Submission page 381 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />
• PROFILE_VOIP_VLAN.i = [2-4093] | %<br />
o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />
• PROFILE_VLAN_ADD_TAG.i.j = [2-4093] or parametric<br />
o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />
• PROFILE_VLAN_IS_ALLOWED_IFACE_USER.i = [yes/no]<br />
o Parameter: ‘yes’ (to set the list as allowed) or ‘no’ (to set the list as forbidden)<br />
• PROFILE_VLAN_TAGGED_ONLY_IFACE_USER.i = [yes/no]<br />
o Parameter: ‘yes’ (to drop input packets without VLAN tag) or ‘no’ (to not drop input packets<br />
without VLAN tag)<br />
• PROFILE_VLAN_OUTFORMAT_TAG_IFACE_USER.i = [yes/no]<br />
o Parameter: ‘yes’ (to send packets with VLAN tag) or ‘no’ (to not send packets with VLAN tag)<br />
• PROFILE_OVLAN_ADD_TAG.i.j = [2-4094] or parametric<br />
o Parameter: Number from 2 to 4094 or ‘%Parameter_name’ (parametric value preceded by a %)<br />
• PROFILE_OVLAN_IS_ALLOWED_IFACE_USER.i = [yes/no]<br />
o Parameter: ‘yes’ (to mark the list as allowed) or ‘no’ (to mark the list as forbidden)<br />
• PROFILE_OVLAN_TAGGED_ONLY_IFACE_USER.i = [yes/no]<br />
o Parameter: ‘yes’ (to drop input packets without OVLAN tag) or ‘no’ (to not drop input packets<br />
without OVLAN tag)<br />
• PROFILE_OVLAN_OUTFORMAT_TAG_IFACE_USER.i = [yes/no]<br />
o Parameter: ‘yes’ (to send packets with OVLAN tag) or ‘no’ (to not send packets with OVLAN<br />
tag)<br />
• PROFILE_UPBWLIMIT.i = [YES|NO]<br />
o Parameter: ‘yes’ (to limit the upstream) or ‘no’ (to not limit the upstream)<br />
• PROFILE_DWBWLIMIT.i = [YES|NO]<br />
o Parameter: ‘yes’ (to limit the downstream) or ‘no’ (to not limit the downstream)<br />
12.3.3.7 Translation Table Parameters<br />
• TRANSLATION_MNMT_VLAN = [2-4093]<br />
Submission page 382 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o Parameter: Number from 2 to 4093<br />
• TRANSLATION_DATA_VLAN.i = [2-4093]<br />
o Parameter: Number from 2 to 4093<br />
• TRANSLATION_VOIP_VLAN.i = [2-4093]<br />
o Parameter: Number from 2 to 4093<br />
• TRANSLATION_ROOTPATH_OVLAN = [2-4094]<br />
o Parameter: Number from 2 to 4094<br />
12.3.3.8 VLAN Parameters<br />
• VLAN_ENABLE = [yes|no]<br />
o Parameter: ‘yes’ (to enable VLAN use) or ‘no’ (to disable VLAN use)<br />
• VLAN_MNMT_TAG = [2-4093] | %<br />
o Parameter: Number from 2 to 4093 or ‘%Parameter name’ (parametric value preceded by a %)<br />
• VLAN_MNMT_PRIO = [0-7]<br />
o Parameter: Number from 0 to 7<br />
• VLAN_DATA_TAG = [2-4093] | %<br />
o Parameter: Number from 2 to 4093 or ‘%Parameter_name’ (parametric value preceded by a %)<br />
• VLAN_DATA_PRIO = [0-6]<br />
o Parameter: Number from 0 to 6<br />
• VLAN_VOIP_TAG = [2-4093] | %<br />
o Parameter: Number from 2 to 4093 or ‘%Parameter_name‘ (parametric value preceded by a %)<br />
• VLAN_VOIP_PRIO = [0-7]<br />
o Parameter: Number from 0 to 7<br />
• VLAN_VSIG_PRIO = [0-7]<br />
o Parameter: Number from 0 to 7<br />
• VLAN_TRUNK.i = [2-4093]<br />
o Parameter: Number from 2 to 4093<br />
Submission page 383 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
• VLAN_RETAG_EXTA_SRC = [0 | 2-4095]<br />
o Parameter: ‘0’ (in order to disable retagging in interface) or Number from 2 to 4095.<br />
• VLAN_RETAG_EXTA_DST = [0 | 2-4095]<br />
o Parameter: ‘0’ (in order to disable retagging in interface) or Number from 2 to 4095<br />
• VLAN_RETAG_EXTB_SRC = [0 | 2-4095]<br />
o Parameter: ‘0’ (in order to disable retagging in interface) or Number from 2 to 4095<br />
• VLAN_RETAG_EXTB_DST = [0 | 2-4095]<br />
o Parameter: ‘0’ (in order to disable retagging in interface) or Number from 2 to 4095<br />
12.3.3.9 OVLAN Parameters<br />
• OVLAN_ENABLE = [yes|no]<br />
o Parameter: ‘yes’ (to enable OVLAN use) or ‘no’ (to disable OVLAN use)<br />
• OVLAN_DATA_TAG = [2-4094] | %ROOTPATH_OVLAN<br />
o Parameter: Number from 2 to 4093 or ‘%ROOTPATH_OVLAN’ (use the OVLAN Rootpath<br />
value)<br />
• OVLAN_TRUNK.i = [2-4094]<br />
o Parameter: Number from 2 to 4094<br />
12.3.3.10 <strong>Access</strong> Protocol Parameters<br />
• AP_MIN_NUMBER_HOPS = [0|1|…]<br />
o Parameter: Number from 0<br />
• AP_FORBID_MASTER.i = 0xXXXXXXXXXXXX<br />
o Parameter: ‘0xXXXXXXXXXXXX’ (<strong>MAC</strong> address of forbidden master)<br />
• AP_PREFER_MASTER = 0xXXXXXXXXXXXX<br />
o Parameter: ‘0xXXXXXXXXXXXX’ (<strong>MAC</strong> address of preferred master)<br />
• AP_FIX_MASTER = ‘0xXXXXXXXXXXXX’<br />
o Parameter: 0xXXXXXXXXXXXX (<strong>MAC</strong> address of fixed master)<br />
• AP_CHECK_BEST_MASTER_ENABLE = [yes|no]<br />
Submission page 384 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o Parameter: ‘yes’ (to enable checking of best master periodically after connecting with one) or ‘no’<br />
(to disable the checking of better masters after connecting to one).<br />
• AP_CHECK_BEST_MASTER_PERIOD = <br />
o Parameter: Number of minutes<br />
• AP_CURRENT_MASTER_MIN_BPS = <br />
o Parameter: Number of bits per symbol<br />
• AP_NEW_MASTER_MIN_BPS = <br />
o Parameter: Number of bits per symbol<br />
• ACCESSP_AUTHLIST_<strong>MAC</strong>.i = 0xXXXXXXXXXXXX<br />
o Parameter: ‘0xXXXXXXXXXXXX’ (<strong>MAC</strong> address authorized to connect)<br />
• ACCESSP_AUTHLIST_PROFILE.i = [1-16]<br />
o Parameter: Number of the profile related to a <strong>MAC</strong> authorized<br />
• ACCESSP_AUTHLIST_FWTYPE.i = [MV|LV|EU]<br />
o Parameter: ‘MV’ (medium voltage) or ‘LV’ (low voltage) or ‘EU’ (End User)<br />
12.3.3.11 STP Parameters<br />
• STP_PRIO = [0 … 65535]<br />
o Parameter: Valid values range from 0 to 65535.<br />
• STP_PORT.i = [EXTA | EXTB | BPL]<br />
o Parameter: Three possible values: EXTA, EXTB <strong>and</strong> BPL (i = 1,2 or 3).<br />
• STP_PORT_PRIO.i = [0 … 255]<br />
o Parameter: Valid values range from 0 to 255 (i = 1,2 or 3).<br />
• STP_PORT_COST.i = [0 … 4294967295]<br />
o Parameter: Valid values range from 0 to 4294967295 (i = 1,2 or 3).<br />
• STP_HELLO_TIME = [10 … 40]<br />
o Parameter: Valid values range from 10 to 40.<br />
• STP_MAX_AGE = [10 … 40]<br />
o Parameter: Valid values range from 10 to 40.<br />
Submission page 385 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
• STP_FORWARD_DELAY = [40 … 300]<br />
o Parameter: Valid values range from 40 to 300.<br />
• STP_FRONTIER = [EXTA | EXTB | NONE]<br />
o Parameter: Valid values are: EXTA (Ethernet interface A), EXTB (Ethernet interface B) <strong>and</strong><br />
NONE (Spanning Tree Frontier disabled).<br />
• STP_MODE = [STP | RSTP]<br />
o Parameter: Possible values: STP selects STP or RSTP selects RSTP.<br />
12.3.3.12 VoIP Parameters<br />
• VOIP_ENABLE = [ENABLED | DISABLED]<br />
o Parameter: This parameter enables (ENABLED) or disables (DISABLED) the VoIP service.<br />
• VOIP_GATEKEEPERIP = <br />
o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />
dots).<br />
• VOIP_LINE1NUMBER = number<br />
o Parameter: This parameter is a string (maximum string length is 20 characters) (e.g.<br />
“VOIP_LINE1NUMBER = 612345678”).<br />
• VOIP_DIALPLAN = ([0 … 9, ‘T’, ‘X’, ‘.’, ‘|’])<br />
o Parameter: This parameter is a string with maximum length is 200 characters (e.g.<br />
“VOIP_DIALPLAN = (9XXXXXXXX|6XXXXXXXX|00X.T)”.<br />
• VOIP_INBANDDTMF = [ENABLED | DISABLED]<br />
o Parameter: This parameter enables (ENABLED) or disables (DISABLED) in-b<strong>and</strong> DTMF feature.<br />
• VOIP_OUTOFBANDDTMF = [ENABLED | DISABLED]<br />
o Parameter: This parameter enables (ENABLED) or disables (DISABLED) out-of-b<strong>and</strong> DTMF<br />
feature.<br />
• VOIP_KEYPADTYPE = [KEYPADTYPE_NONE | KEYPADTYPE_H225 |<br />
KEYPADTYPE_H245ALPHANUMERIC | KEYPADTYPE_H245SIGNAL |<br />
KEYPADTYPE_RFC2833]<br />
o Parameter: This parameter is a string (up to 30 characters). Valid values are the following:<br />
o KEYPADTYPE_H225: H.225/Q.931 User Info field (Keypad facility information element)<br />
Submission page 386 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o KEYPADTYPE_H245ALPHANUMERIC: H.245 User Input Indication (UII) Alphanumeric<br />
message<br />
o KEYPADTYPE_H245SIGNAL: H.245 User Input Indication (UII) Signal Type message<br />
o KEYPADTYPE_RFC2833: RTP stream as defined in RFC 2833<br />
o KEYPADTYPE_NONE: no out-of-b<strong>and</strong> signalling<br />
• VOIP_CALLSIGPORT1 = [1025 … 65530]<br />
o Parameter: Valid values range from 1025 to 65530.<br />
• VOIP_G711USS = [YES | NO]<br />
o Parameter: Selects whether silence suppression for G.711 μ-law is enabled (YES) or not (NO).<br />
• VOIP_G711UPACK = [2 … 4]<br />
o Parameter: Valid values range from 2 (20 ms) to 4 (40 ms).<br />
• VOIP_G711ASS = [YES | NO]<br />
o Parameter: Selects whether silence suppression for G.711 A-law is enabled (YES) or not (NO).<br />
• VOIP_G711APACK = [2 … 4]<br />
o Parameter: Valid values range from 2 (20 ms) to 4 (40 ms).<br />
• VOIP_JB_TYPE = [FIXED | ADAPTIVE]<br />
o Parameter: Selects either adaptive (ADAPTIVE) or fixed (FIXED) jitter buffer.<br />
• VOIP_FJB_DELAY = [1 … 10] * 10<br />
o Parameter: Valid values range from 10 to 100 ms.<br />
• VOIP_AJB_MAXDELAY = [1 … 19] * 10<br />
o Parameter: Valid values range from 10 to 190 ms.<br />
• VOIP_G729ON = [YES | NO]<br />
o Parameter: Selects whether G.729 codec is enabled (YES) or not (NO).<br />
• VOIP_G729SS = [YES | NO]<br />
o Parameter: Selects whether G.729 silence enabled is supported (YES) or not (NO).<br />
• VOIP_G729PACK = [2 … 4]<br />
o Parameter: Valid values range from 2 (20 ms) to 4 (40 ms).<br />
Submission page 387 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
• VOIP_ALTERNATEGK = [ENABLED | DISABLED]<br />
o Parameter: Enables (ENABLED) or disables (DISABLED) alternate gatekeeper feature for H.323.<br />
• VOIP_ALTGKIP = <br />
o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />
dots).<br />
• VOIP_GKDISCOVERY = [ENABLED | DISABLED]<br />
o Parameter: Enables (ENABLED) or disables (DISABLED) gatekeeper discovery feature for H.323.<br />
• VOIP_FULLRRQ1 = [ENABLED | DISABLED]<br />
o Parameter: Enables (ENABLED) or disables (DISABLED) full gatekeeper registration request for<br />
H.323.<br />
• VOIP_TIMETOLIVE = [≥ 60]<br />
o Parameter: The minimum valid value is 60 seconds.<br />
• VOIP_FASTCONNECT = [ENABLED | DISABLED]<br />
o Parameter: Enables (ENABLED) or disables (DISABLED) fast connect signalling feature for<br />
H.323.<br />
• VOIP_H245TUNNEL = [ENABLED | DISABLED]<br />
o Parameter: Enables (ENABLED) or disables (DISABLED) H.245 tunnelling signalling feature for<br />
H.323.<br />
• VOIP_COUNTRY = [XX | ES | PT | GB | JP | FR | SG | RU | AU]<br />
o Parameter: This parameter is a string (up to 20 characters). Valid values are: The USA (XX), Spain<br />
(ES), Portugal (PT), The United Kingdom (GB), Japan (JP), France (FR), Singapore (SG), Russia<br />
(RU) <strong>and</strong> Australia (AU). The default country is Spain (ES).<br />
• VOIP_TONE_DIALTONE = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />
o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_DIALTONE =<br />
425@-10#ON”).<br />
• VOIP_TONE_NETWORKBUSY = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />
o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_BUSY = 425@-<br />
10#ON(200),OFF(200),R”).<br />
• VOIP_TONE_BUSY = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />
o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_BUSY = 425@-<br />
10#ON(200),OFF(200),R”).<br />
Submission page 388 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
• VOIP_TONE_RINGBACK = freq1@pot1+freq2@pot2#ON(time),OFF(time),IDLE(time),R<br />
o Parameter: This parameter is a string (up to 70 characters) (e.g. “VOIP_TONE_RINGBACK =<br />
425@-10#ON(1500),OFF(3000),R”).<br />
• VOIP_RTP_TOS = 0xXX<br />
o Parameter: value must be specified with 2 hexadecimal digits.<br />
• VOIP_CALLSIG_TOS 0xXX<br />
o Parameter: value must be specified with 2 hexadecimal digits.<br />
12.3.3.13 NTP Parameters<br />
• NTP_ENABLE = [ENABLED | DISABLED]<br />
o Parameter: Enables (ENABLED) or disables (DISABLED) the NTP feature.<br />
• NTP_SERVER_IP = <br />
o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />
dots).<br />
• NTP_TIMEZONE = [-12 … 12] * 60<br />
o Parameter: This value must be specified in minutes (in 60-minute steps) relative to Universal<br />
Time (UT). A value of 0 corresponds to UT.<br />
• NTP_DST = [YES | NO]<br />
o Parameter: If the value is YES, the time correction for daylight savings time is applied. Not<br />
applied if NO.<br />
12.3.3.14 Custom VLAN/OVLAN Parameters<br />
• USE_CUSTOM_VLAN_OVLAN = [yes/no]<br />
o Parameter: ‘yes’ (to enable the custom VLAN/OVLAN use) or ‘no’ (to disable the custom<br />
VLAN/OVLAN use)<br />
• VLAN_TAGGED_ONLY_IFACE_ROOT = [yes/no]<br />
o Parameter: ‘yes’ (to enable tag only in interface root) or ‘no’ (to disable tag only in interface root)<br />
• VLAN_TAGGED_ONLY_IFACE_EXTA = [yes/no]<br />
o Parameter: ‘yes’ (to enable tag only in Ethernet A) or ‘no’ (to disable tag only in Ethernet A)<br />
• VLAN_TAGGED_ONLY_IFACE_EXTB = [yes/no]<br />
o Parameter: ‘yes’ (to enable tag only in Ethernet B) or ‘no’ (to disable tag only in Ethernet B)<br />
Submission page 389 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
• VLAN_TAGGED_ONLY_IFACE_PL_X = [yes/no]<br />
Being X from 0 to 128<br />
o Parameter: ‘yes’ (to enable tag only in BPL ports) or ‘no’ (to disable tag only in BPL ports)<br />
• VLAN_OUTFORMAT_TAG_IFACE_ROOT = [yes/no]<br />
o Parameter: ‘yes’ (to tag output in root interface) or ‘no’ (to disable tag output in root interface)<br />
• VLAN_OUTFORMAT_TAG_IFACE_EXTA = [yes/no]<br />
o Parameter: ‘yes’ (to tag output in Ethernet A) or ‘no’ (to disable tag output in Ethernet A)<br />
• VLAN_OUTFORMAT_TAG_IFACE_EXTB = [yes/no]<br />
o Parameter: ‘yes’ (to tag output in Ethernet B) or ‘no’ (to disable tag output in Ethernet B)<br />
• VLAN_OUTFORMAT_TAG_IFACE_PL_X = [yes/no]<br />
Being X from 0 to 128<br />
o Parameter: ‘yes’ (to tag output in BPL ports) or ‘no’ (to disable tag output in BPL ports)<br />
• VLAN_PVID_PL = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
• VLAN_PVID_EXTA = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
• VLAN_PVID_EXTB = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
• VLAN_PVID_FW = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
• VLAN_DEFAULT_PRIO_PL_X = [0-7]<br />
Being X from 0 to 128<br />
o Parameter: Number from 0 to 7<br />
• VLAN_DEFAULT_PRIO_EXTA = [0-7]<br />
o Parameter: Number from 0 to 7<br />
• VLAN_DEFAULT_PRIO_EXTB = [0-7]<br />
Submission page 390 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o Parameter: Number from 0 to 7<br />
• VLAN_DEFAULT_PRIO_FW = [0-7]<br />
o Parameter: Number from 0 to 7<br />
• VLAN_IS_ALLOWED_IFACE_ROOT = [yes/no]<br />
o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />
• VLAN_LIST_IFACE_ROOT.i = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
• VLAN_IS_ALLOWED_IFACE_EXTA = [yes/no]<br />
o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />
• VLAN_LIST_IFACE_EXTA.i = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
• VLAN_IS_ALLOWED_IFACE_EXTB = [yes/no]<br />
o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />
• VLAN_LIST_IFACE_EXTB.i = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
• VLAN_IS_ALLOWED_IFACE_PL_X = [yes/no]<br />
Being X from 0 to 128<br />
o Parameter: ‘yes’ (to set list as allowed) or ‘no’ (to set list as forbidden)<br />
• VLAN_LIST_IFACE_PL_Xi = [2-4095]<br />
Being X from 0 to 128<br />
o Parameter: Number from 2 to 4095<br />
• OVLAN_TAGGED_ONLY_IFACE_ROOT = [yes/no]<br />
o Parameter: ‘yes’ (to accept only tagged packets at root interface) or ‘no’ (to accept any packet at<br />
root interface)<br />
• OVLAN_TAGGED_ONLY_IFACE_PL_X= [yes/no]<br />
Being X from 0 to 128<br />
Submission page 391 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o Parameter: ‘yes’ (to accept only tagged packets at BPL ports) or ‘no’ (to accept any packet at BPL<br />
ports)<br />
• OVLAN_OUTFORMAT_TAG_IFACE_ROOT = [yes/no]<br />
o Parameter: ‘yes’ (to introduce a tag in output packets at root interface) or ‘no’ (to not introduce a<br />
tag in output packets at root interface)<br />
• OVLAN_OUTFORMAT_TAG_IFACE_PL_X = [yes/no]<br />
Being X from 0 to 128<br />
o Parameter: ‘yes’ (to introduce a tag in output packets at BPL ports) or ‘no’ (to not introduce a tag<br />
in output packets at BPL ports)<br />
• OVLAN_POVID_PL_X = [2-4095]<br />
Being X from 0 to 128<br />
o Parameter: Number from 2 to 4095<br />
• OVLAN_POVID_EXTA = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
• OVLAN_POVID_EXTB = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
• OVLAN_POVID_FW = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
• OVLAN_IS_ALLOWED_IFACE_ROOT = [yes/no]<br />
o Parameter: ‘yes’ (to set the root interface list as allowed) or ‘no’ (to set the root interface list as<br />
forbidden)<br />
• OVLAN_LIST_IFACE_ROOT.i = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
• OVLAN_IS_ALLOWED_IFACE_EXTA = [yes/no]<br />
o Parameter: ‘yes’ (to set the Ethernet A interface list as allowed) or ‘no’ (to set the Ethernet A<br />
interface list as forbidden)<br />
• OVLAN_LIST_IFACE_EXTA.i = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
• OVLAN_IS_ALLOWED_IFACE_EXTB = [yes/no]<br />
Submission page 392 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
o Parameter: ‘yes’ (to set the Ethernet B interface list as allowed) or ‘no’ (to set the Ethernet B<br />
interface list as forbidden)<br />
• OVLAN_LIST_IFACE_EXTB.i = [2-4095]<br />
o Parameter: Number from 2 to 4095<br />
• OVLAN_IS_ALLOWED_IFACE_PL_X = [yes/no]<br />
Being X from 0 to 128<br />
o Parameter: ‘yes’ (to set the Ethernet B interface list as allowed) or ‘no’ (to set the Ethernet B<br />
interface list as forbidden)<br />
• OVLAN_LIST_IFACE_PL_X.i = [2-4095]<br />
Being X from 0 to 128<br />
o Parameter: Number from 2 to 4095<br />
12.3.3.15 SNMP parameters<br />
• SNMP_TRAP_IP_ADDRESS = <br />
o Parameter: The valid format is the dotted decimal notation (four decimal numbers separated by<br />
dots).<br />
• SNMP_TRAP_COMMUNITY_NAME = community<br />
o Parameter: This parameter is a string (up to 25 characters) (e.g.<br />
“SNMP_TRAP_COMMUNITY_NAME = public”).<br />
Submission page 393 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
ANNEX A MIB DEFINITION IN ASN.1 FORMAT (NORMATIVE)<br />
BPL-DEVICE-MIB DEFINITIONS ::= BEGIN<br />
IMPORTS<br />
NetworkAddress, IpAddress, Counter, Gauge, TimeTicks,<br />
enterprises<br />
STATUS,<br />
PhysAddress,<br />
OBJECT-TYPE,<br />
FROM RFC1155-SMI<br />
FROM RFC-1212<br />
FROM SNMPv2-SMI<br />
FROM RFC1213-MIB;<br />
iso OBJECT IDENTIFIER ::= { 1 }<br />
org OBJECT IDENTIFIER ::= { iso 3 }<br />
dod OBJECT IDENTIFIER ::= { org 6 }<br />
internet OBJECT IDENTIFIER ::= { dod 1 }<br />
private OBJECT IDENTIFIER ::= { internet 4 }<br />
enterprises OBJECT IDENTIFIER ::= { private 1 }<br />
IEEE P1901 OBJECT IDENTIFIER ::= { enterprises 20804 }<br />
v1 OBJECT IDENTIFIER ::= { IEEE P1901 1 }<br />
--<br />
Submission page 394 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
-- Object definition<br />
--<br />
-- Groups in v1 tree<br />
plSystem OBJECT IDENTIFIER ::= {v1 1}<br />
plBasic OBJECT IDENTIFIER ::= {v1 2}<br />
plPhy OBJECT IDENTIFIER ::= {v1 3}<br />
pl<strong>MAC</strong> OBJECT IDENTIFIER ::= {v1 4}<br />
plQoS OBJECT IDENTIFIER ::= {v1 5}<br />
plStatistics OBJECT IDENTIFIER ::= {v1 7}<br />
plTraps OBJECT IDENTIFIER ::= {v1 8}<br />
plStp OBJECT IDENTIFIER ::= {v1 10}<br />
plSecurity OBJECT IDENTIFIER ::= {v1 11}<br />
--<br />
-- Groups definition<br />
--<br />
--<br />
-- The plSystem Group<br />
--<br />
plSystemTable OBJECT-TYPE<br />
SYNTAX SEQUENCE OF plSystemEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
Submission page 395 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
DESCRIPTION "Generic information about the IEEE P1901 system."<br />
::= { plSystem 1 }<br />
plSystemEntry OBJECT-TYPE<br />
SYNTAX plSystemEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION "System information gathered per card."<br />
INDEX { plSysCard }<br />
::= { plSystemTable 1 }<br />
plSystemEntry ::= SEQUENCE { plSysCard INTEGER,<br />
plSysNodeType INTEGER,<br />
plSysNodeMode INTEGER,<br />
plSysFWVersion IA5String (SIZE(0..128)),<br />
plSysHWVersion IA5String (SIZE(0..128)),<br />
plSysReset INTEGER,<br />
plSysFactoryReset INTEGER,<br />
plSysUseDHCP INTEGER,<br />
plSysStaticIPAddress IpAddress,<br />
plSysStaticNetMask IpAddress,<br />
plSysStaticDefaultGW IpAddress,<br />
plSysSaveAsPermanent INTEGER,<br />
plSysConfUpload IA5String (SIZE (0..256)),<br />
plSysConfDownload IA5String (SIZE (0..256)),<br />
plSysUpdateStatus INTEGER,<br />
plSysUpdate IA5String (SIZE(0..256)),<br />
Submission page 396 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
plSysCard OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Node card number"<br />
::= { plSystemEntry 1 }<br />
plSysNodeType OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
}<br />
plSysDNSIPAddress IpAddress,<br />
plSysSnmpROComunityName DisplayString (SIZE(0..31)),<br />
plSysSnmpRWComunityName DisplayString (SIZE(0..31)),<br />
plSysSnmpTrapDest IpAddress<br />
DESCRIPTION "Node type: master -> 0<br />
::= { plSystemEntry 2 }<br />
plSysNodeMode OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
slave -> 1<br />
repeater -> 2"<br />
DESCRIPTION "Node mode: access -> 0<br />
Submission page 397 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
::= { plSystemEntry 3 }<br />
plSysFWVersion OBJECT-TYPE<br />
in-home -> 1<br />
medium-voltage -> 2"<br />
SYNTAX IA5String (SIZE(0..128))<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Firmware version"<br />
::= { plSystemEntry 5 }<br />
plSysHWVersion OBJECT-TYPE<br />
SYNTAX IA5String (SIZE(0..128))<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Hardware version"<br />
::= { plSystemEntry 6 }<br />
plSysReset OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "System reset"<br />
::= { plSystemEntry 7 }<br />
plSysFactoryReset OBJECT-TYPE<br />
SYNTAX INTEGER<br />
Submission page 398 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Restore factory parameters"<br />
::= { plSystemEntry 8 }<br />
plSysUseDHCP OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Use DHCP (1) or a fixed IP, netmask <strong>and</strong> gateway (0) instead"<br />
::= { plSystemEntry 9 }<br />
plSysStaticIPAddress OBJECT-TYPE<br />
SYNTAX IpAddress<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Default IP address if DHCP is disabled"<br />
::= { plSystemEntry 10 }<br />
plSysStaticNetMask OBJECT-TYPE<br />
SYNTAX IpAddress<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Default netmask if DHCP is disabled"<br />
::= { plSystemEntry 11 }<br />
plSysStaticDefaultGW OBJECT-TYPE<br />
SYNTAX IpAddress<br />
ACCESS read-write<br />
Submission page 399 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
STATUS current<br />
DESCRIPTION "Default gateway if DHCP is disabled"<br />
::= { plSystemEntry 12 }<br />
plSysSaveAsPermanent OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Saves changed objects as permanent"<br />
::= { plSystemEntry 14 }<br />
plSysConfUpload OBJECT-TYPE<br />
SYNTAX IA5String (SIZE(0..256))<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Uploads node local configuration to a server"<br />
::= { plSystemEntry 15 }<br />
plSysConfDownload OBJECT-TYPE<br />
SYNTAX IA5String (SIZE(0..256))<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Forces a configuration file download"<br />
::= { plSystemEntry 16 }<br />
plSysUpgradeStatus OBJECT-TYPE<br />
Submission page 400 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Status of the current upgrade: finished KO -> 0<br />
::= { plSystemEntry 19 }<br />
plSysUpdate OBJECT-TYPE<br />
SYNTAX IA5String (SIZE(0..256))<br />
ACCESS read-write<br />
STATUS current<br />
finished OK -> 1<br />
busy (in progress) -> 2"<br />
DESCRIPTION "Updates the selected flash section of a modem"<br />
::= { plSystemEntry 30 }<br />
plSysDNSIPAddress OBJECT-TYPE<br />
SYNTAX IpAddress<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "IP address of the DNS"<br />
::= { plSystemEntry 31 }<br />
plSysSnmpROComunityName OBJECT-TYPE<br />
SYNTAX DisplayString (SIZE(0..31))<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Community Name string”<br />
Submission page 401 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
--<br />
::= { plSystemEntry 32 }<br />
plSysSnmpRWComunityName OBJECT-TYPE<br />
SYNTAX DisplayString (SIZE(0..31))<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Community Name string”<br />
::= { plSystemEntry 33 }<br />
plSysSnmpTrapDest OBJECT-TYPE<br />
SYNTAX IpAddress<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Trap destination IP address”<br />
::= { plSystemEntry 34 }<br />
-- The plBasic Group<br />
--<br />
plBasicTable OBJECT-TYPE<br />
SYNTAX SEQUENCE OF plBasicEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
::= { plBasic 1 }<br />
Submission page 402 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
plBasicEntry OBJECT-TYPE<br />
SYNTAX plBasicEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
INDEX { plBasicCard }<br />
::= { plBasicTable 1 }<br />
plBasicEntry ::= SEQUENCE { plBasicCard INTEGER,<br />
plBasicCard OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
}<br />
plBasicMode INTEGER,<br />
plBasicCentralFrequency INTEGER,<br />
plBasicB<strong>and</strong>width INTEGER,<br />
plBasicSearchModes IA5String,<br />
plBasicTXAGCEnable INTEGER,<br />
plBasicRXAGCEnable INTEGER,<br />
plBasicTXAGCGain INTEGER,<br />
plBasicRXAGCGain INTEGER,<br />
plBasicTXPowerMaskLB OCTET STRING (SIZE(769)),<br />
plBasicTXPowerMaskHB OCTET STRING (SIZE(769)),<br />
plBasicMaster<strong>MAC</strong> PhysAddress<br />
Submission page 403 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
DESCRIPTION "Node card number"<br />
::= { plBasicEntry 1 }<br />
plBasicMode OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "<strong>Physical</strong> mode (1..M)"<br />
::= { plBasicEntry 2 }<br />
plBasicCentralFrequency OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "B<strong>and</strong> Central Frequency in MHz"<br />
::= { plBasicEntry 3 }<br />
plBasicB<strong>and</strong>width OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Working Node B<strong>and</strong>width in MHz"<br />
::= { plBasicEntry 4 }<br />
plBasicSearchModes OBJECT-TYPE<br />
SYNTAX IA5String<br />
ACCESS read-write<br />
Submission page 404 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
STATUS current<br />
DESCRIPTION "List of modes used for searching"<br />
::= { plBasicEntry 5 }<br />
plBasicTXAGCEnable OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "TX AGC: Enabled -> 1<br />
::= { plBasicEntry 6 }<br />
plBasicRXAGCEnable OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
Disabled -> 0"<br />
DESCRIPTION "RX AGC: Enabled -> 1<br />
::= { plBasicEntry 7 }<br />
plBasicTXAGCGain OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "TX AGC Gain"<br />
::= { plBasicEntry 8 }<br />
Disabled -> 0"<br />
Submission page 405 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
plBasicRXAGCGain OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "RX AGC Gain"<br />
::= { plBasicEntry 9 }<br />
plBasicTXPowerMaskLB OBJECT-TYPE<br />
SYNTAX OCTET STRING ( SIZE ( 769 ) )<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Low half Powermask"<br />
::= { plBasicEntry 10 }<br />
plBasicTXPowerMaskHB OBJECT-TYPE<br />
SYNTAX OCTET STRING ( SIZE ( 769 ) )<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "High half Powermask"<br />
::= { plBasicEntry 11 }<br />
plBasicMaster<strong>MAC</strong> OBJECT-TYPE<br />
SYNTAX PhysAddress<br />
ACCESS read-only<br />
Submission page 406 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
--<br />
STATUS current<br />
DESCRIPTION "<strong>MAC</strong> address of the master of current node"<br />
::= { plBasicEntry 12 }<br />
-- The plPhy Group<br />
--<br />
-- plPhyBy<strong>MAC</strong> Table<br />
plPhyBy<strong>MAC</strong>Table OBJECT-TYPE<br />
SYNTAX SEQUENCE OF plPhyBy<strong>MAC</strong>Entry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION "<strong>Physical</strong> parameters"<br />
::= { plPhy 1 }<br />
plPhyBy<strong>MAC</strong>Entry OBJECT-TYPE<br />
SYNTAX plPhyBy<strong>MAC</strong>Entry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
INDEX { plPhyBy<strong>MAC</strong>Card, plPhyBy<strong>MAC</strong><strong>MAC</strong> }<br />
::= { plPhyBy<strong>MAC</strong>Table 1 }<br />
plPhyBy<strong>MAC</strong>Entry ::= SEQUENCE { plPhyBy<strong>MAC</strong>Card INTEGER,<br />
plPhyBy<strong>MAC</strong><strong>MAC</strong> PhysAddress,<br />
plPhyBy<strong>MAC</strong>TXBPC OCTET STRING (SIZE(769)),<br />
plPhyBy<strong>MAC</strong>TXBPCAggregated INTEGER,<br />
Submission page 407 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
plPhyBy<strong>MAC</strong>Card OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Node card number"<br />
::= { plPhyBy<strong>MAC</strong>Entry 1 }<br />
plPhyBy<strong>MAC</strong><strong>MAC</strong> OBJECT-TYPE<br />
SYNTAX PhysAddress<br />
ACCESS read-only<br />
STATUS current<br />
}<br />
plPhyBy<strong>MAC</strong>RXBPC OCTET STRING (SIZE(769)),<br />
plPhyBy<strong>MAC</strong>RXBPCAggregated INTEGER,<br />
plPhyBy<strong>MAC</strong>RXSNR OCTET STRING (SIZE(769)),<br />
plPhyBy<strong>MAC</strong>RXCFR OCTET STRING (SIZE(769)),<br />
plPhyBy<strong>MAC</strong>TXPhySpeed INTEGER,<br />
plPhyBy<strong>MAC</strong>RXPhySpeed INTEGER,<br />
plPhyBy<strong>MAC</strong>ACK INTEGER,<br />
plPhyBy<strong>MAC</strong>Cipher INTEGER,<br />
plPhyBy<strong>MAC</strong>TXHURTO INTEGER,<br />
plPhyBy<strong>MAC</strong>RXHURTO INTEGER,<br />
plPhyBy<strong>MAC</strong>IsActive INTEGER,<br />
plPhyBy<strong>MAC</strong>RXTimeLastActivity INTEGER<br />
Submission page 408 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
DESCRIPTION "<strong>MAC</strong> Address"<br />
::= { plPhyBy<strong>MAC</strong>Entry 2 }<br />
plPhyBy<strong>MAC</strong>TXBPC OBJECT-TYPE<br />
SYNTAX OCTET STRING ( SIZE ( 769 ) )<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "BPC in transmission for the low half b<strong>and</strong>"<br />
::= { plPhyBy<strong>MAC</strong>Entry 3 }<br />
plPhyBy<strong>MAC</strong>TXBPCAggregated OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "BPC Aggregated in transmission"<br />
::= { plPhyBy<strong>MAC</strong>Entry 5 }<br />
plPhyBy<strong>MAC</strong>RXBPC OBJECT-TYPE<br />
SYNTAX OCTET STRING ( SIZE ( 769 ) )<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "BPC in reception for the low half b<strong>and</strong>"<br />
::= { plPhyBy<strong>MAC</strong>Entry 6 }<br />
plPhyBy<strong>MAC</strong>RXBPCAggregated OBJECT-TYPE<br />
Submission page 409 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "BPC Aggregated in reception"<br />
::= { plPhyBy<strong>MAC</strong>Entry 8 }<br />
plPhyBy<strong>MAC</strong>RXSNR OBJECT-TYPE<br />
SYNTAX OCTET STRING ( SIZE ( 769 ) )<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Measured SNR"<br />
::= { plPhyBy<strong>MAC</strong>Entry 9 }<br />
plPhyBy<strong>MAC</strong>RXCFR OBJECT-TYPE<br />
SYNTAX OCTET STRING ( SIZE ( 769 ) )<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Measured CFR"<br />
::= { plPhyBy<strong>MAC</strong>Entry 10 }<br />
plPhyBy<strong>MAC</strong>TXPhySpeed OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "<strong>Physical</strong> speed in transmission"<br />
::= { plPhyBy<strong>MAC</strong>Entry 11 }<br />
Submission page 410 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
plPhyBy<strong>MAC</strong>RXPhySpeed OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "<strong>Physical</strong> speed in reception"<br />
::= { plPhyBy<strong>MAC</strong>Entry 12 }<br />
plPhyBy<strong>MAC</strong>ACK OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "ACK enabled"<br />
::= { plPhyBy<strong>MAC</strong>Entry 13 }<br />
plPhyBy<strong>MAC</strong>Cipher OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Cipher enabled"<br />
::= { plPhyBy<strong>MAC</strong>Entry 14 }<br />
plPhyBy<strong>MAC</strong>TXHURTO OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "HURTO mode in transmission"<br />
::= { plPhyBy<strong>MAC</strong>Entry 15 }<br />
Submission page 411 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
plPhyBy<strong>MAC</strong>RXHURTO OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "HURTO mode in reception"<br />
::= { plPhyBy<strong>MAC</strong>Entry 16 }<br />
plPhyBy<strong>MAC</strong>IsActive OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Checks if the node is active or not"<br />
::= { plPhyBy<strong>MAC</strong>Entry 17 }<br />
plPhyBy<strong>MAC</strong>RXTimeLastActivity OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Time since last BPL activity"<br />
::= { plPhyBy<strong>MAC</strong>Entry 18 }<br />
-- plPhyRXSNRThreshold Table<br />
plPhyRXSNRThresholdTable OBJECT-TYPE<br />
SYNTAX SEQUENCE OF plPhyRXSNRThresholdEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
Submission page 412 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
::= { plWiscPhy 2 }<br />
plPhyRXSNRThresholdEntry OBJECT-TYPE<br />
SYNTAX plPhyRXSNRThresholdEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
INDEX { plPhyRXSNRThresholdCard, plPhyRXSNRThresholdIndex }<br />
::= { plPhyRXSNRThresholdTable 1 }<br />
plPhyRXSNRThresholdEntry ::= SEQUENCE { plPhyRXSNRThresholdCard INTEGER,<br />
plPhyRXSNRThresholdCard OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION "Node card number"<br />
::= { plPhyRXSNRThresholdEntry 1 }<br />
plPhyRXSNRThresholdIndex OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS not-accessible<br />
STATUS current<br />
plPhyRXSNRThresholdIndex INTEGER,<br />
plPhyRXSNRThreshold INTEGER<br />
DESCRIPTION "SNR threshold value index (1..10)"<br />
}<br />
Submission page 413 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
--<br />
::= { plPhyRXSNRThresholdEntry 2 }<br />
plPhyRXSNRThreshold OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "SNR threshold value"<br />
::= { plPhyRXSNRThresholdEntry 3 }<br />
-- The pl<strong>MAC</strong> Group<br />
--<br />
-- pl<strong>MAC</strong> Table<br />
pl<strong>MAC</strong>Table OBJECT-TYPE<br />
SYNTAX SEQUENCE OF pl<strong>MAC</strong>Entry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
::= { pl<strong>MAC</strong> 1 }<br />
pl<strong>MAC</strong>Entry OBJECT-TYPE<br />
SYNTAX pl<strong>MAC</strong>Entry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
INDEX { pl<strong>MAC</strong>Card }<br />
Submission page 414 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
::= { pl<strong>MAC</strong>Table 1 }<br />
pl<strong>MAC</strong>Entry ::= SEQUENCE { pl<strong>MAC</strong>Card INTEGER,<br />
pl<strong>MAC</strong>Card OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Node card number"<br />
::= { pl<strong>MAC</strong>Entry 1 }<br />
pl<strong>MAC</strong><strong>Access</strong>Protocol OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
}<br />
pl<strong>MAC</strong><strong>Access</strong>Protocol INTEGER,<br />
pl<strong>MAC</strong>NumConnectedNodes INTEGER,<br />
pl<strong>MAC</strong>NumSlaves INTEGER<br />
DESCRIPTION "Autodiscovery mode enabled"<br />
::= { pl<strong>MAC</strong>Entry 2 }<br />
pl<strong>MAC</strong>NumConnectedNodes OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Number of nodes with link solved (PSP)"<br />
Submission page 415 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
::= { pl<strong>MAC</strong>Entry 3 }<br />
pl<strong>MAC</strong>NumSlaves OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Number of slaves configured in the master or repeater"<br />
::= { pl<strong>MAC</strong>Entry 4 }<br />
-- pl<strong>MAC</strong>ConnectedNodes Table<br />
pl<strong>MAC</strong>ConnectedNodesTable OBJECT-TYPE<br />
SYNTAX SEQUENCE OF pl<strong>MAC</strong>ConnectedNodesEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
::= { plWisc<strong>MAC</strong> 2 }<br />
pl<strong>MAC</strong>ConnectedNodesEntry OBJECT-TYPE<br />
SYNTAX pl<strong>MAC</strong>ConnectedNodesEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
INDEX { pl<strong>MAC</strong>ConnectedNodesCard, pl<strong>MAC</strong>ConnectedNodesIndex }<br />
::= { pl<strong>MAC</strong>ConnectedNodesTable 1 }<br />
pl<strong>MAC</strong>ConnectedNodesEntry ::= SEQUENCE { pl<strong>MAC</strong>ConnectedNodesCard INTEGER,<br />
pl<strong>MAC</strong>ConnectedNodesIndex INTEGER,<br />
pl<strong>MAC</strong>ConnectedNodes<strong>MAC</strong> PhysAddress<br />
Submission page 416 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
pl<strong>MAC</strong>ConnectedNodesCard OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Node card number"<br />
::= { pl<strong>MAC</strong>ConnectedNodesEntry 1 }<br />
pl<strong>MAC</strong>ConnectedNodesIndex OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Node index"<br />
::= {pl<strong>MAC</strong>ConnectedNodesEntry 2}<br />
pl<strong>MAC</strong>ConnectedNodes<strong>MAC</strong> OBJECT-TYPE<br />
SYNTAX PhysAddress<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "<strong>MAC</strong> for the node index"<br />
::= {pl<strong>MAC</strong>ConnectedNodesEntry 3}<br />
-- pl<strong>MAC</strong>Slaves Table<br />
pl<strong>MAC</strong>SlavesTable OBJECT-TYPE<br />
SYNTAX SEQUENCE OF pl<strong>MAC</strong>SlavesEntry<br />
}<br />
Submission page 417 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
::= { plWisc<strong>MAC</strong> 3 }<br />
pl<strong>MAC</strong>SlavesEntry OBJECT-TYPE<br />
SYNTAX pl<strong>MAC</strong>SlavesEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
INDEX { pl<strong>MAC</strong>SlavesCard, pl<strong>MAC</strong>SlavesIndex }<br />
::= { pl<strong>MAC</strong>SlavesTable 1 }<br />
pl<strong>MAC</strong>SlavesEntry ::= SEQUENCE { pl<strong>MAC</strong>SlavesCard INTEGER,<br />
pl<strong>MAC</strong>SlavesCard OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Node card number"<br />
::= { pl<strong>MAC</strong>SlavesEntry 1 }<br />
pl<strong>MAC</strong>SlavesIndex OBJECT-TYPE<br />
SYNTAX INTEGER<br />
}<br />
pl<strong>MAC</strong>SlavesIndex INTEGER,<br />
pl<strong>MAC</strong>Slaves<strong>MAC</strong> PhysAddress<br />
Submission page 418 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
--<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Slaves index"<br />
::= { pl<strong>MAC</strong>SlavesEntry 2 }<br />
pl<strong>MAC</strong>Slaves<strong>MAC</strong> OBJECT-TYPE<br />
SYNTAX PhysAddress<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "<strong>MAC</strong> for the slave index"<br />
::= { pl<strong>MAC</strong>SlavesEntry 3 }<br />
-- The plQoS Group<br />
--<br />
plQoSMasterGeneralMinOneWayLat OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Latency in milliseconds"<br />
::= { plQoS 1 }<br />
plQoSMasterGeneralBwMngrPolicy OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
Submission page 419 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
DESCRIPTION "B<strong>and</strong>width ..."<br />
::= { plQoS 2 }<br />
-- plQoSPriorityManagement Table<br />
plQoSPriorityManagementTable OBJECT-TYPE<br />
SYNTAX SEQUENCE OF plQoSPriorityManagementEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
::= { plQoS 3 }<br />
plQoSPriorityManagementEntry OBJECT-TYPE<br />
SYNTAX plQoSPriorityManagementEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION "QoS Priorities Management per card."<br />
INDEX { plQoSPriorityManagementCard, plQoSPriorityManagementPrio }<br />
::= { plQoSPriorityManagementTable 1 }<br />
plQoSPriorityManagementEntry ::= SEQUENCE {<br />
plQoSPriorityManagementCard INTEGER,<br />
plQoSPriorityManagementPrio INTEGER,<br />
plQoSPriorityManagementLatency INTEGER,<br />
plQoSPriorityManagementJitter INTEGER,<br />
plQoSPriorityManagementB<strong>and</strong>width INTEGER<br />
Submission page 420 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
plQoSPriorityManagementCard OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Node card number"<br />
::= { plQoSPriorityManagementEntry 1 }<br />
plQoSPriorityManagementPrio OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Priority value (1..8)"<br />
::= { plQoSPriorityManagementEntry 2 }<br />
plQoSPriorityManagementLatency OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Latency value for the priority (0,1,2,4,8)"<br />
::= { plQoSPriorityManagementEntry 3 }<br />
plQoSPriorityManagementJitter OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Jitter value for the priority"<br />
::= { plQoSPriorityManagementEntry 4 }<br />
}<br />
Submission page 421 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
plQoSPriorityManagementB<strong>and</strong>width OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "B<strong>and</strong>width for the priority"<br />
::= { plQoSPriorityManagementEntry 5 }<br />
-- plQoSPerUser Table<br />
plQoSPerUserTable OBJECT-TYPE<br />
SYNTAX SEQUENCE OF plQoSPerUserEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
::= { plWiscQoS 4 }<br />
plQoSPerUserEntry OBJECT-TYPE<br />
SYNTAX plQoSPerUserEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION "User QoS management values per card."<br />
INDEX { plQoSPerUserCard, plQoSPerUser<strong>MAC</strong> }<br />
::= { plQoSPerUserTable 1 }<br />
plQoSPerUserEntry ::= SEQUENCE { plQoSPerUserCard INTEGER,<br />
plQoSPerUser<strong>MAC</strong> PhysAddress,<br />
plQoSPerUserTXMaxXput INTEGER,<br />
Submission page 422 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
plQoSPerUserCard OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Node card number"<br />
::= { plQoSPerUserEntry 1 }<br />
plQoSPerUser<strong>MAC</strong> OBJECT-TYPE<br />
SYNTAX PhysAddress<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "User <strong>MAC</strong> address"<br />
::= { plQoSPerUserEntry 2 }<br />
plQoSPerUserTXMaxXput OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
}<br />
plQoSPerUserRXMaxXput INTEGER,<br />
plQoSPerUserPriorityAllowedUp INTEGER,<br />
plQoSPerUserPriorityAllowedDown INTEGER<br />
-- plQoSPerUserPriorityActive INTEGER<br />
DESCRIPTION "Maximum allowed throughput in transmission for a user"<br />
::= { plQoSPerUserEntry 3 }<br />
plQoSPerUserRXMaxXput OBJECT-TYPE<br />
SYNTAX INTEGER<br />
Submission page 423 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Maximum allowed throughput in reception for a user"<br />
::= { plQoSPerUserEntry 4 }<br />
plQoSPerUserPriorityAllowedUp OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Allowed priorities for transmission <strong>and</strong> reception in upstream for a user"<br />
::= { plQoSPerUserEntry 5 }<br />
plQoSPerUserPriorityAllowedDown OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Allowed priorities for transmission <strong>and</strong> reception in downstream for a<br />
user"<br />
::= { plQoSPerUserEntry 6 }<br />
-- plQoSPerUserPriorityActive OBJECT-TYPE<br />
-- SYNTAX INTEGER<br />
-- ACCESS read-only<br />
-- STATUS current<br />
-- DESCRIPTION "Active priorities for transmission <strong>and</strong> reception for a user"<br />
-- ::= { plQoSPerUserEntry 7 }<br />
--<br />
Submission page 424 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
-- The plStatistics Group<br />
--<br />
-- plStatistics Table<br />
plStatisticsTable OBJECT-TYPE<br />
SYNTAX SEQUENCE OF plStatisticsEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION "Packets <strong>and</strong> Bytes Statistics by Interface"<br />
::= { plStatistics 1 }<br />
plStatisticsEntry OBJECT-TYPE<br />
SYNTAX plStatisticsEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
INDEX { plStatisticsCard }<br />
::= { plStatisticsTable 1 }<br />
plStatisticsEntry ::= SEQUENCE {<br />
plStatisticsCard INTEGER,<br />
plStatisticsBPLInputWords INTEGER,<br />
plStatisticsBPLInputPackets INTEGER,<br />
plStatisticsBPLInputIncorrigible INTEGER,<br />
plStatisticsBPLInputFECBlocksTotal INTEGER,<br />
plStatisticsBPLInputFECBlocksCorrected INTEGER,<br />
Submission page 425 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
plStatisticsCard OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Node card number"<br />
::= { plStatisticsEntry 1 }<br />
plStatisticsBPLInputWords OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Words received by BPL"<br />
::= { plStatisticsEntry 19 }<br />
plStatisticsBPLInputPackets OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Packets received by BPL"<br />
::= { plStatisticsEntry 20 }<br />
}<br />
plStatisticsBPLInputPktsReceived INTEGER,<br />
plStatisticsBPLInputPktsRcvComplete INTEGER,<br />
plStatisticsBPLInputPktsRcvIncomplete INTEGER,<br />
plStatisticsBPLOutputWords INTEGER,<br />
plStatisticsBPLOutputPkts INTEGER<br />
Submission page 426 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
plStatisticsBPLInputIncorrigible OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Incorrigible packets received by BPL"<br />
::= { plStatisticsEntry 21 }<br />
plStatisticsBPLInputFECBlocksTotal OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Received FEC blocks by BPL"<br />
::= { plStatisticsEntry 22 }<br />
plStatisticsBPLInputFECBlocksCorrected OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "FEC blocks corrected by BPL"<br />
::= { plStatisticsEntry 23 }<br />
plStatisticsBPLInputPktsReceived OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
Submission page 427 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
DESCRIPTION "Received packets by BPL"<br />
::= { plStatisticsEntry 24 }<br />
plStatisticsBPLInputPktsRcvComplete OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Complete received packets by BPL"<br />
::= { plStatisticsEntry 25 }<br />
plStatisticsBPLInputPktsRcvIncomplete OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Incomplete received packets by BPL"<br />
::= { plStatisticsEntry 26 }<br />
plStatisticsBPLOutputWords OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Transmitted words by BPL"<br />
::= { plStatisticsEntry 27 }<br />
plStatisticsBPLOutputPkts OBJECT-TYPE<br />
SYNTAX INTEGER<br />
Submission page 428 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Transmitted packets by BPL"<br />
::= { plStatisticsEntry 28 }<br />
-- End of plStatistics Table<br />
--<br />
-- The plTraps Group<br />
--<br />
-- plTrapsPhy Table<br />
plTrapsPhyTable OBJECT-TYPE<br />
SYNTAX SEQUENCE OF plTrapsPhyEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
::= { plTraps 1 }<br />
plTrapsPhyEntry OBJECT-TYPE<br />
SYNTAX plTrapsPhyEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
INDEX { plTrapsPhyCard }<br />
::= { plPhyTable 1 }<br />
Submission page 429 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
plTrapsPhyEntry ::= SEQUENCE { plTrapsPhyCard INTEGER,<br />
plTrapsPhyCard OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "node card number"<br />
::= { plTrapsPhyEntry 1 }<br />
plTrapsPhyTrapToHURTOEnable OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
}<br />
plTrapsPhyTrapToHURTOEnable INTEGER,<br />
plTrapsPhyTrapFromHURTOEnable INTEGER<br />
DESCRIPTION "Enable/disable trap generation when entering HURTO mode"<br />
::= { plTrapsPhyEntry 2 }<br />
plTrapsPhyTrapFromHURTOEnable OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Enable/disable trap generation when exiting HURTO mode"<br />
Submission page 430 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
::= { plTrapsPhyEntry 3 }<br />
-- plTraps<strong>MAC</strong> Table<br />
plTraps<strong>MAC</strong>Table OBJECT-TYPE<br />
SYNTAX SEQUENCE OF plTraps<strong>MAC</strong>Entry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
::= { plWiscTraps 2 }<br />
plTraps<strong>MAC</strong>Entry OBJECT-TYPE<br />
SYNTAX plTraps<strong>MAC</strong>Entry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
INDEX { plTraps<strong>MAC</strong>Card }<br />
::= { plTraps<strong>MAC</strong>Table 1 }<br />
plTraps<strong>MAC</strong>Entry ::= SEQUENCE { plTraps<strong>MAC</strong>Card INTEGER,<br />
plTraps<strong>MAC</strong>Card OBJECT-TYPE<br />
SYNTAX INTEGER<br />
}<br />
plTraps<strong>MAC</strong>PeerDetectedEnable INTEGER,<br />
plTraps<strong>MAC</strong>PeerDisappearedEnable INTEGER<br />
Submission page 431 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
---<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Node card number"<br />
::= { plTraps<strong>MAC</strong>Entry 1 }<br />
plTraps<strong>MAC</strong>PeerDetectedEnable OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Enable/disable trap generation when detecting a peer"<br />
::= { plTraps<strong>MAC</strong>Entry 2 }<br />
plTraps<strong>MAC</strong>PeerDisappearedEnable OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Enable/disable trap generation when dissapearing a peer"<br />
::= { plTraps<strong>MAC</strong>Entry 3 }<br />
-- plTrapsBridge Table<br />
---<br />
plTrapsBridgeTable OBJECT-TYPE<br />
SYNTAX SEQUENCE OF plTrapsBridgeEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
Submission page 432 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
DESCRIPTION ""<br />
::= { plWiscTraps 3 }<br />
plTrapsBridgeEntry OBJECT-TYPE<br />
SYNTAX plTrapsBridgeEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
INDEX { plTrapsBridgeCard }<br />
::= { plTrapsBridgeTable 1 }<br />
plTrapsBridgeEntry ::= SEQUENCE { plTrapsBridgeCard INTEGER,<br />
plTrapsBridgeCard OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Node card number"<br />
::= { plTrapsBridgeEntry 1 }<br />
plTrapsBridgeNewRootEnable OBJECT-TYPE<br />
SYNTAX INTEGER<br />
}<br />
plTrapsBridgeNewRootEnable INTEGER,<br />
plTrapsBridgeTopologyChangeEnable INTEGER<br />
Submission page 433 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
---<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Enable/disable trap generation when a new root is assigned"<br />
::= { plTrapsBridgeEntry 2 }<br />
plTrapsBridgeTopologyChangeEnable OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Enable/disable trap generation when topology changes"<br />
::= { plTrapsBridgeEntry 3 }<br />
-- plTrapsConfFail Table<br />
---<br />
plTrapsConfFailTable OBJECT-TYPE<br />
SYNTAX SEQUENCE OF plTrapsConfFailEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
::= { plWiscTraps 4 }<br />
plTrapsConfFailEntry OBJECT-TYPE<br />
SYNTAX plTrapsConfFailEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION ""<br />
Submission page 434 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
INDEX { plTrapsConfFailCard }<br />
::= { plTrapsConfFailTable 1 }<br />
plTrapsConfFailEntry ::=SEQUENCE{<br />
plTrapsConfFailCard OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Node card number"<br />
::= { plTrapsConfFailEntry 1 }<br />
plTrapsConfDownloadFailEnable OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
plTrapsConfFailCard INTEGER,<br />
plTrapsConfDownloadFailEnable INTEGER,<br />
plTrapsConfUploadFailEnable INTEGER,<br />
DESCRIPTION "Enable/disable trap generation when a configuration file download fails"<br />
::= { plTrapsConfFileEntry 2 }<br />
plTrapsConfUploadFailEnable OBJECT-TYPE<br />
SYNTAX INTEGER<br />
Submission page 435 UPA-OPERA<br />
}
4-June-07 P1901_PRO_016_r0<br />
--<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Enable/disable trap generation when a configuration file upload fails"<br />
::= { plTrapsConfFileEntry 3 }<br />
-- The plStp Group<br />
--<br />
plStpTable OBJECT-TYPE<br />
SYNTAX SEQUENCE OF plStpEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION "Information about Spanning Tree."<br />
::= { plWiscStp 1 }<br />
plStpEntry OBJECT-TYPE<br />
SYNTAX plStpEntry<br />
ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION "System information gathered per card."<br />
INDEX { plStpCard }<br />
::= { plStpTable 1 }<br />
plStpEntry ::= SEQUENCE { plStpCard INTEGER,<br />
plStpEnable INTEGER,<br />
plStpProtocolVersion IA5String (SIZE(0..8)),<br />
Submission page 436 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
plStpCard OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-only<br />
STATUS current<br />
DESCRIPTION "Node card number"<br />
::= { plStpEntry 1 }<br />
plStpEnable OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
}<br />
plStpPtpExtA INTEGER,<br />
plStpPtpExtB INTEGER,<br />
plStpFrontier IA5String (SIZE(0..8))<br />
DESCRIPTION "0: STP Enabled, 1: STP Disabled"<br />
::= { plStpEntry 2 }<br />
plStpProtocolVersion OBJECT-TYPE<br />
SYNTAX IA5String (SIZE(0..8))<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "STP Protocol Version [STP|RSTP]"<br />
::= { plStpEntry 3 }<br />
plStpPtpExtA OBJECT-TYPE<br />
Submission page 437 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
--<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Set point-to-point flag for EXTA [0|1]"<br />
::= { plStpEntry 4 }<br />
plStpPtpExtB OBJECT-TYPE<br />
SYNTAX INTEGER<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "Set point-to-point flag for EXTB [0|1]"<br />
::= { plStpEntry 5 }<br />
plStpFrontier OBJECT-TYPE<br />
SYNTAX IA5String (SIZE(0..8))<br />
ACCESS read-write<br />
STATUS current<br />
DESCRIPTION "STP Frontier enabled in [EXTA|EXTB|NONE]"<br />
::= { plStpEntry 6 }<br />
-- The plSecurity Group<br />
--<br />
plSecurityConsoleSerial OBJECT-TYPE<br />
SYNTAX INTEGER { enabled ( 1 ),<br />
Submission page 438 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
MAX-ACCESS read-write<br />
STATUS current<br />
disabled ( 0 ) }<br />
DESCRIPTION "Enable/disable access to the modems<br />
DEFVAL { enabled }<br />
::= { plSecurity 1 }<br />
serial port console."<br />
plSecurityConsoleTelnet OBJECT-TYPE<br />
SYNTAX INTEGER { enabled ( 1 ),<br />
MAX-ACCESS read-write<br />
STATUS current<br />
disabled ( 0 ) }<br />
DESCRIPTION "Enable/disable access to the modems<br />
telnet console."<br />
DEFVAL { disabled }<br />
::= { plSecurity 2 }<br />
plSecurityConsoleAuthTable OBJECT-TYPE<br />
SYNTAX SEQUENCE OF SecurityConsoleAuthEntry<br />
MAX-ACCESS not-accessible<br />
Submission page 439 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
STATUS current<br />
DESCRIPTION "Table of IP addresses form which<br />
::= { plSecurity 3 }<br />
plSecurityConsoleAuthEntry OBJECT-TYPE<br />
Telnet clients may access this modem."<br />
SYNTAX SecurityConsoleAuthEntry<br />
MAX-ACCESS not-accessible<br />
STATUS current<br />
DESCRIPTION "One entry of the table."<br />
INDEX { securityConsoleAuthNumber }<br />
::= { plSecurityConsoleAuthTable 1 }<br />
plSecurityConsoleAuthEntry ::= SEQUENCE {<br />
}<br />
plSecurityConsoleAuthNumber INTEGER,<br />
plSecurityConsoleAuthAddress IpAddress,<br />
plSecurityConsoleAuthRowStatus RowStatus<br />
plSecurityConsoleAuthNumber OBJECT-TYPE<br />
SYNTAX INTEGER (0..15)<br />
MAX-ACCESS not-accessible<br />
Submission page 440 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
END<br />
STATUS current<br />
DESCRIPTION "Number of this row."<br />
::= { plSecurityConsoleAuthEntry 1 }<br />
plSecurityConsoleAuthAddress OBJECT-TYPE<br />
SYNTAX IpAddress<br />
MAX-ACCESS read-create<br />
STATUS current<br />
DESCRIPTION "IP address of client."<br />
::= { plSecurityConsoleAuthEntry 2 }<br />
plSecurityConsoleAuthRowStatus OBJECT-TYPE<br />
SYNTAX RowStatus<br />
MAX-ACCESS read-create<br />
STATUS current<br />
DESCRIPTION "The status of this conceptual row."<br />
::= { plSecurityConsoleAuthEntry 3 }<br />
Submission page 441 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
ANNEX B PERFORMANCE (INFORMATIVE)<br />
The total bitrate transmitted by a BPL node is influenced by several factors. Considering <strong>PHY</strong> level, the maximum<br />
theoretical rates depend on the OFDM Symbol Type <strong>and</strong> spectral efficiency, which is bound by the bit-loading of<br />
each subcarrier.<br />
Approximate numerical values will be given for maximum bit rates, taking into account these factors:<br />
• OFDM symbol rate <strong>and</strong> cyclic prefix<br />
• Truncated 4D-TCM<br />
• Loss rate due to RS coding<br />
• CRC overhead (Delimiters)<br />
And specifically not considering these:<br />
• Zero filling<br />
• Special coding of last Reed-Solomon codewords<br />
• Overhead of reference signals when fitting OFDM symbols inside PPDU.<br />
For simplicity purposes, numerical values will only be given for the special cases in which all 1536 subcarriers have<br />
the same bit-loading. This makes calculations easier, but it should not be difficult to find corresponding numerical<br />
values for any possible bit-loading table.<br />
B.1 Data stream<br />
Data payload is adaptively or HURTO modulated.<br />
The cyclic prefix that each Symbol Type uses implies that actual data is only transmitted during the IDFT interval.<br />
The percentage of maximum <strong>PHY</strong> rate that is lost equals the percentage of cyclic prefix interval over total symbol<br />
interval (which is the sum of cyclic prefix <strong>and</strong> IDFT interval). The IDFT interval is fixed to 2048 samples for every<br />
Symbol Type.<br />
Truncated 4D-TCM operates on 768 pairs of subcarriers.<br />
For adaptive mapping, each pair of subcarriers gets a different coding according to its bit-loading: if we call z to<br />
z − 1<br />
the sum of the bit-loadings of both subcarriers, the coding rate for that pair of subcarriers is , except for the<br />
z<br />
Submission page 442 UPA-OPERA
S mode<br />
0<br />
S mode<br />
1<br />
S mode<br />
2<br />
S mode<br />
3<br />
4-June-07 P1901_PRO_016_r0<br />
case in which the bit-loadings for both subcarriers is zero (in this case there is no coding because no message in<br />
being sent on that pair of subcarriers). As bit-loadings can take the values 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 or 10, coding<br />
rates will range from 1/2 to 19/20 for each pair of subcarriers.<br />
For HURTO mapping, each subcarrier will get the same coding, with a bit-loading of 2, so the coding rate for each<br />
pair of subcarriers is 3/4. Additionally, HURTO mapping replicates eight times the message, which means a further<br />
coding rate of 1/8.<br />
Next table shows coded maximum data rates (in Mbps) for OFDM symbols with constant bit-loading for all<br />
subcarriers. Numbers shown take into account cyclic prefix <strong>and</strong> 4D-TCM.<br />
Bit-loading for all 1536 subcarriers (adaptive mapping) HURTO<br />
10 9 8 7 6 5 4 3 2 1<br />
Type I 204.94 183.37 161.80 140.22 118.65 97.08 75.51 53.93 32.36 10.79 4.04<br />
Type II 150.82 134.95 119.07 103.19 87.32 71.44 55.57 39.69 23.81 7.94 2.98<br />
Type III 84.01 75.16 66.32 57.48 48.64 39.79 30.95 22.11 13.26 4.42 1.66<br />
Table 68 Coded maximum bitrates for Data payload (constant bit-loading)<br />
Furthermore, RS coding implies an additional rate loss which depends on the code rate. For each of the four RS data<br />
modes (0 being the least <strong>and</strong> 3 the most robust one), adaptive mapping can produce a total of 28 different codes<br />
depending on the FEC payload, each one with a different data rate as given in Table 69.<br />
FEC payload (bytes)<br />
Code rate<br />
244 240 236 232 228 224 220 216 212 208 204 200 196 192 188 184 180 176 172 168 164 160 156 152 148 144 140 136<br />
0.968 0.968 0.967 0.967 0.966 0.966 0.965 0.964 0.964 0.963 0.962 0.962 0.961 0.960 0.959 0.958 0.957 0.957 0.956 0.955 0.953 0.952 0.951 0.950 0.949 0.947 0.946 0.944<br />
240 236 232 228 224 220 216 212 208 204 200 196 192 188 184 180 176 172 168 164 160 156 152 148 144 140 136 132<br />
0.952 0.952 0.951 0.950 0.949 0.948 0.947 0.946 0.945 0.944 0.943 0.942 0.941 0.940 0.939 0.938 0.936 0.935 0.933 0.932 0.930 0.929 0.927 0.925 0.923 0.921 0.919 0.917<br />
236 232 228 224 220 216 212 208 204 200 196 192 188 184 180 176 172 168 164 160 156 152 148 144 140 136 132 128<br />
0.937 0.935 0.934 0.933 0.932 0.931 0.930 0.929 0.927 0.926 0.925 0.923 0.922 0.920 0.918 0.917 0.915 0.913 0.911 0.909 0.907 0.905 0.902 0.900 0.897 0.895 0.892 0.889<br />
232 228 224 220 216 212 208 204 200 196 192 188 184 180 176 172 168 164 160 156 152 148 144 140 136 132 128 124<br />
0.921 0.919 0.918 0.917 0.915 0.914 0.912 0.911 0.909 0.907 0.906 0.904 0.902 0.900 0.898 0.896 0.894 0.891 0.889 0.886 0.884 0.881 0.878 0.875 0.872 0.868 0.865 0.86<br />
Table 69 RS coding rates for Data payload (adaptive)<br />
Submission page 443 UPA-OPERA
4-June-07 P1901_PRO_016_r0<br />
HURTO mapping can use all the RS codes above plus codes with decreasing FEC payload until code rate is 0.5.<br />
The uncoded maximum bitrates for Data payload are the result of multiplying coded maximum bitrates by RS<br />
coding rate.<br />
B.2 Delimiters<br />
Delimiters are HURTO modulated for robust OFDM transmission.<br />
<strong>Control</strong> symbols have modulation <strong>and</strong> trellis coding schemes similar to HURTO data symbols, so the maximum<br />
coded data rate is the same.<br />
Delimiters use a specific RS code with rate 2/3. Additionally, a CRC-CCITT is applied which implies a rate loss of<br />
176/192.<br />
So in the same conditions as assumed for Data payload, the Delimiters data rate is given in Table 70<br />
Uncoded bitrate (Mbps)<br />
Type I 2.47<br />
Type II 1.82<br />
Type III 1.01<br />
Table 70 Coded maximum bitrates for Delimiters<br />
Submission page 444 UPA-OPERA
EC/IST FP6 Project No 026920<br />
Work Package: WP5<br />
Type of document: Report<br />
Date: 04 June 2007<br />
File name: OP2_WP5_D27 Version: 1.0<br />
Title: First draft of the OPERA specification version 2<br />
Copyright<br />
“Copyright <strong>and</strong> Reprint Permissions. You may freely reproduce all or part of this paper<br />
for non-commercial purposes, provided that the following conditions are fulfilled: (i) to<br />
cite the authors, as the copyright owners (ii) to cite the OPERA Project <strong>and</strong> mention<br />
that the European Commission co-finances it, by means of including this statement<br />
“OPERA. IST Integrated Project No 507667. Funded by EC” <strong>and</strong> (iii) not to alter the<br />
information.”