03.11.2012 Views

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4-June-07 P1901_PRO_016_r0<br />

Point-to-point ports <strong>and</strong> edge ports<br />

In order to achieve fast convergence on a port, the protocol relies upon two new variables: edge ports <strong>and</strong> link type.<br />

All BPL ports can be assumed to be point-to-point ports. Ethernet ports can be considered edge ports, unless another<br />

bridge is connected to the same segment. Anyway, since the st<strong>and</strong>ard establishes that the first BPDU coming into an<br />

edge port removes its edge port status, it can be assumed at startup that all ports are c<strong>and</strong>idate to directly transition<br />

to forwarding:<br />

Ethernet ports start in forwarding state (edge ports).<br />

BPL ports, even though they start in blocking state, are ready for h<strong>and</strong>shake <strong>and</strong> rapid transition to forwarding<br />

(point-to-point).<br />

STP <strong>and</strong> VLANs<br />

If VLANs are active, STP packets must use the management VLAN inside the power-line network.<br />

Common STP<br />

Ethernet interfaces must support the possibility of being configured to remove/add the VLAN tag to the<br />

outgoing/incoming STP packets. That is, the VLAN tag of the STP packets going out the BPL network is removed.<br />

On the other h<strong>and</strong>, VLAN tag must be added to the incoming STP packets, so as to make sure that STP packets<br />

inside the power-line network use the management VLAN.<br />

10 SECURITY<br />

10.1 LOW LEVEL ENCRYPTION AND INTEGRITY<br />

10.1.1 Overview<br />

Encryption <strong>and</strong> Integrity are two key features needed by any communication device to guarantee security <strong>and</strong><br />

privacy in the message exchange.<br />

For encryption IEEE P1901 uses as basic building block the Advanced Encryption St<strong>and</strong>ard (AES) according to<br />

FIPS-97(2002).<br />

AES is a block cipher algorithm while higher layers have to deal with variable length packets. To be able to encrypt<br />

these variable length packets IEEE P1901 uses the operation mode known as Counter Mode (CTR) defined in<br />

Submission page 279 UPA-OPERA

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!