ITU J.213:2006

ITU J.213:2006 Layer 2 Virtual Private Networks For Ip Cable Modem Systems Specifies requirements on both CMTSs and CMs in order to implement a DOCSIS layer-2 virtual private network (DOCSIS L2VPN) feature.

More details

Download

PDF AVAILABLE FORMATS IMMEDIATE DOWNLOAD
$17.53 tax incl.

$39.83 tax incl.

(price reduced by 56 %)

1000 items in stock

Table of Contents

1Scope
2References
3Definitions
4Abbreviationsandacronyms
5Conventions
5.1Requirements
5.2Conformance
6Theoryofoperation(Informative)
6.1L2VPNfeatures
6.2CMTSlayer-2forwardingarchitecture
7L2VPNoperation
7.1CMTSbridgingmodelrequirements
7.2ConfiguringL2VPNforwarding
7.3CMTSupstreamL2VPNforwarding
7.4CMTSdownstreamL2VPNforwarding
7.5L2VPNisolationandprivacy
7.6CMandeSAFEexclusion
7.7L2VPNqualityofservice
7.8Stacked802.1Qtagsortag-in-tagoperation
7.9Spanningtreeandloopdetection
8Cablemodemrequirements
AnnexA-CMTSDOCS-L2VPN-MIBrequirements
A.1DOCS-L2VPN-MIBconformance
A.2DOCS-L2VPN-MIBdefinitions
AnnexB-Parameterencodings
B.1Capabilities
B.2Downstreamunencryptedtraffic(DUT)filteringencoding
B.3L2VPNencoding
B.4Confirmationcodes
B.5L2VPNerrorencoding
B.6CMinterfacemaskclassificationcriteria
AppendixI-ExampleL2VPNencodings
I.1Point-to-pointexample
I.2Multipointexample
I.3UpstreamL2VPNclassifierexample
AppendixII-IEEE802.1Qencapsulation
AppendixIII-EmbeddedVLANCMbridgingmodel
III.1IEEE802.1QandembeddedVLANmodel
III.2EmbeddedbridgeMACdomainserviceprimitives
AppendixIV-L2VPNnon-compliantCMrestrictions
IV.1Leakingthroughnon-compliantCMs
Bibliography

Abstract

Specifies requirements on both CMTSs and CMs in order to implement a DOCSIS layer-2 virtual private network (DOCSIS L2VPN) feature.

Contact us