{"id":229169,"date":"2024-10-19T14:54:26","date_gmt":"2024-10-19T14:54:26","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-62680-1-22017\/"},"modified":"2024-10-25T09:02:05","modified_gmt":"2024-10-25T09:02:05","slug":"bs-en-62680-1-22017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-62680-1-22017\/","title":{"rendered":"BS EN 62680-1-2:2017"},"content":{"rendered":"

IEC 62680-1-2:2017(E) defines a power delivery system covering all elements of a USB system including: Hosts, Devices, Hubs, Chargers and cable assemblies.  This specification describes the architecture, protocols, power supply behavior, connectors and cabling necessary for managing power delivery over USB at up to 100 W. This specification is intended to be fully compatible and extend the existing USB infrastructure.  It is intended that this specification will allow system OEMs, power supply and peripheral developers adequate flexibility for product versatility and market differentiation without losing backwards compatibility. USB Power Delivery is designed to operate independently of the existing USB bus defined mechanisms used to negotiate power which are: – [USB 2.0], [USB 3.1]in band requests for high power interfaces. – [USBBC 1.2]mechanisms for supplying higher power (not mandated by this specification). – [USB Type-C 1.2]mechanisms for supplying higher power<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
5<\/td>\nFOREWORD <\/td>\n<\/tr>\n
7<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
9<\/td>\nContributors <\/td>\n<\/tr>\n
15<\/td>\nRevision History <\/td>\n<\/tr>\n
16<\/td>\nTable of Contents <\/td>\n<\/tr>\n
32<\/td>\n1 Introduction
1.1 Overview <\/td>\n<\/tr>\n
33<\/td>\nto a powered cable.
1.3 Scope <\/td>\n<\/tr>\n
34<\/td>\n1.4 Conventions
1.4.1 Precedence
1.4.2 Keywords <\/td>\n<\/tr>\n
35<\/td>\n1.4.3 Numbering
1.5 Related Documents <\/td>\n<\/tr>\n
36<\/td>\n1.6 Terms and Abbreviations
Tables
Table 1-1 \u2013 Terms and Abbreviations <\/td>\n<\/tr>\n
42<\/td>\n1.7 Parameter Values
2 Overview
2.1 Introduction <\/td>\n<\/tr>\n
43<\/td>\n2.2 Section Overview <\/td>\n<\/tr>\n
44<\/td>\n2.3 USB Power Delivery Capable Devices
Figures
Figure 2-1 \u2013 Logical Structure of USB Power Delivery Capable Devices <\/td>\n<\/tr>\n
45<\/td>\n2.4 SOP* Communication
2.4.1 Introduction
2.4.2 SOP* Collision Avoidance <\/td>\n<\/tr>\n
46<\/td>\n2.4.3 SOP Communication
2.4.4 SOP\u2019\/SOP\u2019\u2019 Communication with Cable Plugs <\/td>\n<\/tr>\n
47<\/td>\n2.5 Operational Overview
2.5.1 Source Operation
Figure 2-2 \u2013 Example SOP\u2019 Communicationbetween VCONN Source and Cable Plug(s) <\/td>\n<\/tr>\n
49<\/td>\n2.5.2 Sink Operation <\/td>\n<\/tr>\n
51<\/td>\n2.5.3 Cable Plugs <\/td>\n<\/tr>\n
52<\/td>\n2.6 Architectural Overview
Figure 2-3 \u2013 USB Power Delivery Communications Stack <\/td>\n<\/tr>\n
53<\/td>\nFigure 2-4 \u2013 USB Power Delivery Communication Over USB <\/td>\n<\/tr>\n
54<\/td>\n2.6.1 Policy
Figure 2-5 \u2013 High Level Architecture View <\/td>\n<\/tr>\n
55<\/td>\n2.6.2 Message Formation and Transmission
2.6.3 Collision Avoidance <\/td>\n<\/tr>\n
56<\/td>\n2.6.4 Power supply
2.6.5 DFP\/UFP <\/td>\n<\/tr>\n
57<\/td>\n2.6.6 VCONN Source
2.6.7 Cable and Connectors
2.6.8 Interactions between Non-PD, BC and PD devices
2.6.9 Power Rules
3 USB Type-A and USB Type-B Cable Assemblies and Connectors
4 Electrical Requirements
4.1 Interoperability with other USB Specifications <\/td>\n<\/tr>\n
58<\/td>\n4.2 Dead Battery Detection \/ Unpowered Port Detection
4.3 Cable IR Ground Drop (IR Drop)
4.4 Cable Type Detection
5 Physical Layer
5.1 Physical Layer Overview <\/td>\n<\/tr>\n
59<\/td>\n5.2 Physical Layer Functions
5.3 Symbol Encoding <\/td>\n<\/tr>\n
60<\/td>\n5.4 Ordered Sets
Table 5-1 \u2013 4b5b Symbol Encoding Table <\/td>\n<\/tr>\n
61<\/td>\nFigure 5-1 \u2013 Interpretation of ordered sets
Table 5-2 \u2013 Ordered Sets
Table 5-3 \u2013 Validation of Ordered Sets <\/td>\n<\/tr>\n
62<\/td>\n5.5 Transmitted Bit Ordering
5.6 Packet Format
Figure 5-2 \u2013 Transmit Order for Various Sizes of Data
Table 5-4 \u2013 Data Size <\/td>\n<\/tr>\n
63<\/td>\n5.6.1 Packet Framing
Figure 5-3 \u2013 USB Power Delivery Packet Format
Table 5-5 \u2013 SOP ordered set <\/td>\n<\/tr>\n
64<\/td>\nTable 5-6 \u2013 SOP\u2019 ordered set
Table 5-7 \u2013 SOP\u2019\u2019 ordered set <\/td>\n<\/tr>\n
65<\/td>\n5.6.2 CRC
Table 5-8 \u2013 SOP\u2019_Debug ordered set
Table 5-9 \u2013 SOP\u2019\u2019_Debug ordered set <\/td>\n<\/tr>\n
66<\/td>\nFigure 5-4 \u2013 CRC 32 generation <\/td>\n<\/tr>\n
67<\/td>\n5.6.3 Packet Detection Errors
Table 5-10 \u2013 CRC-32 Mapping <\/td>\n<\/tr>\n
68<\/td>\n5.6.4 Hard Reset
5.6.5 Cable Reset
Figure 5-5 \u2013 Line format of Hard Reset
Table 5-11 \u2013 Hard Reset ordered set <\/td>\n<\/tr>\n
69<\/td>\n5.7 Collision Avoidance
Figure 5-6 \u2013 Line format of Cable Reset
Table 5-12 \u2013 Cable Reset ordered set <\/td>\n<\/tr>\n
70<\/td>\n5.8 Biphase Mark Coding (BMC) Signaling Scheme
5.8.1 Encoding and signaling
Figure 5-7 \u2013 BMC Example
Table 5-13 \u2013 Rp values used for Collision Avoidance <\/td>\n<\/tr>\n
71<\/td>\nFigure 5-8 \u2013 BMC Transmitter Block Diagram
Figure 5-9 \u2013 BMC Receiver Block Diagram <\/td>\n<\/tr>\n
72<\/td>\nFigure 5-10 \u2013 BMC Encoded Start of Preamble
Figure 5-11 \u2013 Transmitting or Receiving BMC Encoded FrameTerminated by Zero with High-to-Low Last Transition <\/td>\n<\/tr>\n
73<\/td>\nFigure 5-12 \u2013 Transmitting or Receiving BMC Encoded FrameTerminated by One with High-to-Low Last Transition
Figure 5-13 \u2013 Transmitting or Receiving BMC Encoded FrameTerminated by Zero with Low to High Last Transition <\/td>\n<\/tr>\n
74<\/td>\n5.8.2 Transmit and Receive Masks
Figure 5-14 \u2013 Transmitting or Receiving BMC Encoded Fr
Figure 5-15 \u2013 Waiting for idle after a BMC Encoded FrameTerminated by Zero with High-to-Low Last Transition <\/td>\n<\/tr>\n
75<\/td>\nFigure 5-16 \u2013 BMC Tx \u2018ONE\u2019 Mask
Figure 5-17 \u2013 BMC Tx \u2018ZERO\u2019 Mask <\/td>\n<\/tr>\n
76<\/td>\nTable 5-14 \u2013 BMC Tx Mask Definition, X Values
Table 5-15 \u2013 BMC Tx Mask Definition, Y Values <\/td>\n<\/tr>\n
78<\/td>\nFigure 5-18 \u2013 BMC Rx \u2018ONE\u2019 Mask when Sourcing Power
Figure 5-19 \u2013 BMC Rx \u2018ZERO\u2019 Mask when Sourcing Power <\/td>\n<\/tr>\n
79<\/td>\nFigure 5-20 \u2013 BMC Rx \u2018ONE\u2019 Mask when Power neutral
Figure 5-21 \u2013 BMC Rx \u2018ZERO\u2019 Mask when Power neutral <\/td>\n<\/tr>\n
80<\/td>\nFigure 5-22 \u2013 BMC Rx \u2018ONE\u2019 Mask when Sinking Power
Figure 5-23 \u2013 BMC Rx \u2018ZERO\u2019 Mask when Sinking Power <\/td>\n<\/tr>\n
81<\/td>\n5.8.3 Transmitter Load Model
Figure 5-24 \u2013 Transmitter Load Model for BMC Tx from a Source
Table 5-16 \u2013 BMC Rx Mask Definition <\/td>\n<\/tr>\n
82<\/td>\n5.8.4 BMC Common specifications
Figure 5-25 Transmitter Load Model for BMC Tx from a Sink <\/td>\n<\/tr>\n
83<\/td>\n5.8.5 BMC Transmitter Specifications
Table 5-17 \u2013 BMC Common Normative Requirements <\/td>\n<\/tr>\n
84<\/td>\nTable 5-18 \u2013 BMC Transmitter Normative Requirements <\/td>\n<\/tr>\n
85<\/td>\nFigure 5-26 \u2013 Transmitter diagram illustrating zDriver <\/td>\n<\/tr>\n
86<\/td>\nFigure 5-27 \u2013 Inter-Frame Gap Timings <\/td>\n<\/tr>\n
87<\/td>\n5.8.6 BMC Receiver Specifications
Table 5-19 \u2013 BMC Receiver Normative Requirements <\/td>\n<\/tr>\n
88<\/td>\nFigure 5-28 \u2013 Example Multi-Drop Configuration showing two DRPs
Figure 5-29 \u2013 Example Multi-Drop Configuration showing a DFP and UFP <\/td>\n<\/tr>\n
89<\/td>\n5.9 Built in Self-Test (BIST)
5.9.1 BIST Carrier Mode
5.9.2 BIST Test Data <\/td>\n<\/tr>\n
90<\/td>\n6 Protocol Layer
6.1 Overview
6.2 Messages
Figure 5-30 \u2013 Test Data Frame <\/td>\n<\/tr>\n
91<\/td>\n6.2.1 Message Construction
Figure 6-1 \u2013 USB Power Delivery Packet Formatincluding Control Message Payload
Figure 6-2 \u2013 USB Power Delivery Packet Format including Data Message Payload
Figure 6-3 \u2013 USB Power Delivery Packet Format includingan Extended Message Header and Payload <\/td>\n<\/tr>\n
92<\/td>\nTable 6-1 \u2013 Message Header <\/td>\n<\/tr>\n
94<\/td>\nTable 6-2 \u2013 Revision Interoperability <\/td>\n<\/tr>\n
95<\/td>\nTable 6-3 \u2013 Extended Message Header <\/td>\n<\/tr>\n
96<\/td>\nFigure 6-4 \u2013 Example Security_Request sequence Unchunked <\/td>\n<\/tr>\n
97<\/td>\n6.3 Control Message
Figure 6-5 \u2013 Example Security_Request sequence Chunked <\/td>\n<\/tr>\n
98<\/td>\n6.3.1 GoodCRC Message
Table 6-4 \u2013 Control Message Types <\/td>\n<\/tr>\n
99<\/td>\n6.3.2 GotoMin Message
6.3.3 Accept Message
6.3.4 Reject Message <\/td>\n<\/tr>\n
100<\/td>\n6.3.5 Ping Message
6.3.6 PS_RDY Message
6.3.7 Get_Source_Cap Message
6.3.8 Get_Sink_Cap Message
6.3.9 DR_Swap Message <\/td>\n<\/tr>\n
101<\/td>\n6.3.10 PR_Swap Message <\/td>\n<\/tr>\n
102<\/td>\n6.3.11 VCONN_Swap Message
6.3.12 Wait Message <\/td>\n<\/tr>\n
103<\/td>\n6.3.13 Soft Reset Message
6.3.14 Not_Supported Message <\/td>\n<\/tr>\n
104<\/td>\n6.3.15 Get_Source_Cap_Extended Message
6.3.16 Get_ Source_Status Message
6.3.17 FR_Swap Message <\/td>\n<\/tr>\n
105<\/td>\n6.4 Data Message
6.4.1 Capabilities Message
Table 6-5 \u2013 Data Message Types <\/td>\n<\/tr>\n
106<\/td>\nFigure 6-6 \u2013 Example Capabilities Message with 2 Power Data Objects
Table 6-6 \u2013 Power Data Object <\/td>\n<\/tr>\n
109<\/td>\nTable 6-7 \u2013 Fixed Supply PDO \u2013 Source <\/td>\n<\/tr>\n
111<\/td>\n\u00a9 USB-IF:2016
Table 6-9 \u2013 Variable Supply (non-Battery) PDO \u2013 Source <\/td>\n<\/tr>\n
112<\/td>\nTable 6-10 \u2013 Battery Supply PDO \u2013 Source <\/td>\n<\/tr>\n
113<\/td>\nTable 6-11 \u2013 Fixed Supply PDO \u2013 Sink <\/td>\n<\/tr>\n
114<\/td>\nTable 6-12 \u2013 Variable Supply (non-Battery) PDO \u2013 Sink
Table 6-13 \u2013 Battery Supply PDO \u2013 Sink <\/td>\n<\/tr>\n
115<\/td>\n6.4.2 Request Message
Table 6-14 \u2013Fixed and Variable Request Data Object
Table 6-15 \u2013 Fixed and Variable Request Data Object with GiveBack Support <\/td>\n<\/tr>\n
116<\/td>\nTable 6-16 \u2013 Battery Request Data Object
Table 6-17 \u2013 Battery Request Data Object with GiveBack Support <\/td>\n<\/tr>\n
119<\/td>\n6.4.3 BIST Message
Figure 6-7 \u2013 BIST Message <\/td>\n<\/tr>\n
120<\/td>\n6.4.4 Vendor Defined Message
Table 6-18 \u2013 BIST Data Object <\/td>\n<\/tr>\n
121<\/td>\nFigure 6-8 \u2013 Vendor Defined Message <\/td>\n<\/tr>\n
122<\/td>\nTable 6-19 \u2013 Unstructured VDM Header <\/td>\n<\/tr>\n
123<\/td>\nTable 6-20 \u2013 Structured VDM Header
Table 6-21 \u2013 Structured VDM Commands <\/td>\n<\/tr>\n
124<\/td>\nTable 6-22 \u2013 SVID Values <\/td>\n<\/tr>\n
126<\/td>\nTable 6-23 \u2013 Commands and Responses <\/td>\n<\/tr>\n
127<\/td>\nFigure 6-9 \u2013 Discover Identity Command response
Table 6-24 \u2013 ID Header VDO <\/td>\n<\/tr>\n
128<\/td>\nTable 6-25 \u2013 Product Types (UFP)
Table 6-26 \u2013 Product Types (Cable Plug) <\/td>\n<\/tr>\n
129<\/td>\nTable 6-27 \u2013 Product Types (DFP)
Table 6-28 \u2013 Cert Stat VDO
Table 6-29 \u2013 Product VDO <\/td>\n<\/tr>\n
130<\/td>\nTable 6-30 \u2013 Passive Cable VDO <\/td>\n<\/tr>\n
132<\/td>\nTable 6-31 \u2013 Active Cable VDO <\/td>\n<\/tr>\n
134<\/td>\nTable 6-32 \u2013 AMA VDO <\/td>\n<\/tr>\n
135<\/td>\nFigure 6-10 \u2013 Example Discover SVIDs response with 3 SVIDs
Table 6-33 \u2013 Discover SVIDs Responder VDO <\/td>\n<\/tr>\n
136<\/td>\nFigure 6-11 \u2013 Example Discover SVIDs response with 4 SVIDs
Figure 6-12 \u2013 Example Discover SVIDs response with 12 SVIDsfollowed by an empty response
Figure 6-13 \u2013 Example Discover Modes response for a given SVID with 3 Mode <\/td>\n<\/tr>\n
138<\/td>\nFigure 6-15 \u2013 Enter Mode sequence Interrupted by Source Capabilities and then Re-run <\/td>\n<\/tr>\n
139<\/td>\nFigure 6-16 \u2013 Unsuccessful Enter Mode sequence due to NAK <\/td>\n<\/tr>\n
140<\/td>\nFigure 6-17 \u2013 Exit Mode sequence
Figure 6-18 \u2013 Attention Command request\/response sequence <\/td>\n<\/tr>\n
141<\/td>\nFigure 6-19 \u2013 Command request\/response sequence <\/td>\n<\/tr>\n
143<\/td>\nFigure 6-20 \u2013 Enter\/Exit Mode Process <\/td>\n<\/tr>\n
144<\/td>\n6.4.5 Battery_Status Message
Figure 6-21 \u2013 Battery_Status Message
Table 6-34 \u2013 Battery Status Data Object (BSDO) <\/td>\n<\/tr>\n
145<\/td>\n6.4.6 Source_Alert Message
Figure 6-22 \u2013 Source_Alert Message
Table 6-35 \u2013 Source Alert Data Object <\/td>\n<\/tr>\n
147<\/td>\n6.5 Extended Message
6.5.1 Source_Capabilities_Extended Message
Figure 6-23 \u2013 Source_Capabilites_Extended Message
Table 6-36 \u2013 Extended Message Types <\/td>\n<\/tr>\n
148<\/td>\nTable 6-37 \u2013 Source Capabilities Extended Data Block (SCEDB) <\/td>\n<\/tr>\n
151<\/td>\n6.5.2 Source_Status Message
Figure 6-24 Source_Status Message <\/td>\n<\/tr>\n
152<\/td>\nTable 6-38 \u2013 Source Status Data Block (SSDB) <\/td>\n<\/tr>\n
153<\/td>\n6.5.4 Get_Battery_Status Message
Figure 6-25 \u2013 Get_Battery_Cap Message
Figure 6-26 \u2013 Get_Battery_Status Message
Table 6-39 \u2013 Get Battery Cap Data Block (GBCDB)
Table 6-40 \u2013 Get Battery Status Data Block (GBSDB) <\/td>\n<\/tr>\n
154<\/td>\n6.5.5 Battery_Capabilities Message
Figure 6-27 \u2013 Battery_Capabilities Message
Table 6-41 \u2013 Battery Capability Data Block (BCDB) <\/td>\n<\/tr>\n
155<\/td>\n6.5.6 Get_Manufacturer_Info Message
6.5.7 Manufacturer_Info Message
Figure 6-28 \u2013 Get_Manufacturer_Info Message
Figure 6-29 \u2013 Manufacturer_Info Message
Table 6-42 \u2013 Get Serial Number Data Block (GSNDB) <\/td>\n<\/tr>\n
156<\/td>\n6.5.8 Security Messages
Table 6-43 \u2013 Manufacturer Info Data Block (MIDB) <\/td>\n<\/tr>\n
157<\/td>\n6.6 Timers
6.6.1 CRCReceiveTimer
6.6.2 SenderResponseTimer
Figure 6-30 \u2013 Security_Request Message
Figure 6-31 \u2013 Security_Response Message <\/td>\n<\/tr>\n
158<\/td>\n6.6.3 Capability Timers
6.6.4 SinkRequestTimer <\/td>\n<\/tr>\n
159<\/td>\n6.6.5 Power Supply Timers <\/td>\n<\/tr>\n
160<\/td>\n6.6.6 NoResponseTimer <\/td>\n<\/tr>\n
161<\/td>\n6.6.7 BIST Timers
6.6.8 Power Role Swap Timers <\/td>\n<\/tr>\n
162<\/td>\n6.6.9 Hard Reset Timers
6.6.10 Structured VDM Timers <\/td>\n<\/tr>\n
164<\/td>\n6.6.11 VCONN Timers
6.6.12 tCableMessage
6.6.13 DiscoverIdentityTimer
6.6.14 Collision Avoidance Timers <\/td>\n<\/tr>\n
165<\/td>\n6.6.15 tFRSwapInit
6.6.16 Time Values and Timers <\/td>\n<\/tr>\n
166<\/td>\nTable 6-44 \u2013 Time Values <\/td>\n<\/tr>\n
167<\/td>\n6.7 Counters
6.7.1 MessageID Counter
Table 6-45 \u2013 Timers <\/td>\n<\/tr>\n
168<\/td>\n6.7.2 Retry Counter
6.7.3 Hard Reset Counter
6.7.4 Capabilities Counter <\/td>\n<\/tr>\n
169<\/td>\n6.7.5 Discover Identity Counter
6.7.6 VDMBusyCounter
6.7.7 Counter Values and Counters
6.8 Reset
6.8.1 Soft Reset and Protocol Error
Table 6-46 \u2013 Counter parameters
Table 6-47 \u2013 Counters <\/td>\n<\/tr>\n
170<\/td>\n6.8.2 Hard Reset <\/td>\n<\/tr>\n
171<\/td>\n6.8.3 Cable Reset
6.9 Collision Avoidance <\/td>\n<\/tr>\n
172<\/td>\n6.10 Message Discarding
6.11 State behavior
6.11.1 Introduction to state diagrams used in Chapter 6
Figure 6-32 \u2013 Outline of States
Table 6-48 \u2013 Message discarding <\/td>\n<\/tr>\n
173<\/td>\n6.11.2 State Operation
Figure 6-33 \u2013 References to states <\/td>\n<\/tr>\n
174<\/td>\nFigure 6-34 \u2013 Common Protocol Layer Message transmission State Diagram <\/td>\n<\/tr>\n
177<\/td>\nFigure 6-35 \u2013 Source Protocol Layer Message transmission State Diagram <\/td>\n<\/tr>\n
179<\/td>\nFigure 6-36 \u2013 Sink Protocol Layer Message transmission State Diagram <\/td>\n<\/tr>\n
180<\/td>\nFigure 6-37 \u2013 Protocol layer Message reception <\/td>\n<\/tr>\n
182<\/td>\nFigure 6-38 \u2013 Hard\/Cable Reset <\/td>\n<\/tr>\n
184<\/td>\n6.11.3 List of Protocol Layer States <\/td>\n<\/tr>\n
185<\/td>\n6.12 Message Applicability
Table 6-49 \u2013 Protocol Layer States <\/td>\n<\/tr>\n
186<\/td>\n6.12.1 Applicability of Control Messages <\/td>\n<\/tr>\n
187<\/td>\nTable 6-50 \u2013 Applicability of Control Messages <\/td>\n<\/tr>\n
188<\/td>\n6.12.2 Applicability of Data Messages
6.12.3 Applicability of Extended Messages
Table 6-51 \u2013 Applicability of Data Messages <\/td>\n<\/tr>\n
189<\/td>\n6.12.4 Applicability of VDM Commands
Table 6-52 \u2013 Applicability of Extended Messages <\/td>\n<\/tr>\n
190<\/td>\n6.12.5 Applicability of Reset Signaling
6.12.6 Applicability of Fast Role Swap signal
Table 6-53 \u2013 Applicability of VDM Commands
Table 6-54 \u2013 Applicability of Reset Signaling <\/td>\n<\/tr>\n
191<\/td>\n6.13 Value Parameters
7 Power Supply
7.1 Source Requirements
7.1.1 Behavioral Aspects
7.1.2 Source Bulk Capacitance
Table 6-55 \u2013 Applicability of Fast Role Swap signal
Table 6-56 \u2013 Value Parameters <\/td>\n<\/tr>\n
192<\/td>\n7.1.3 Types of Sources
7.1.4 Positive Voltage Transitions
Figure 7-1 \u2013 Placement of Source Bulk Capacitance <\/td>\n<\/tr>\n
193<\/td>\n7.1.5 Negative Voltage Transitions
Figure 7-2 \u2013 Transition Envelope for Positive Voltage Transitions <\/td>\n<\/tr>\n
194<\/td>\n7.1.6 Response to Hard Resets
Figure 7-3 \u2013 Transition Envelope for Negative Voltage Transitions <\/td>\n<\/tr>\n
195<\/td>\n7.1.7 Changing the Output Power Capability
7.1.8 Robust Source Operation
Figure 7-4 \u2013 Source VBUS Response to Hard Reset <\/td>\n<\/tr>\n
196<\/td>\n7.1.9 Output Voltage Tolerance and Range <\/td>\n<\/tr>\n
197<\/td>\n7.1.10 Charging and Discharging the Bulk Capacitance on VBUS
7.1.11 Swap Standby for Sources
Figure 7-5 \u2013 Application of vSrcNew and vSrcValid limits after tSrcReady <\/td>\n<\/tr>\n
198<\/td>\n7.1.12 Source Peak Current Operation
7.1.13 Source Capabilities Extended Parameters
Figure 7-6 \u2013 Source Peak Current Overload <\/td>\n<\/tr>\n
199<\/td>\nFigure 7-7 \u2013 Holdup Time Measurement <\/td>\n<\/tr>\n
200<\/td>\n7.1.14 Fast Role Swap <\/td>\n<\/tr>\n
201<\/td>\n7.2 Sink Requirements
7.2.1 Behavioral Aspects
7.2.2 Sink Bulk Capacitance
Figure 7-8 \u2013 VBUS Power during Fast Role Swap <\/td>\n<\/tr>\n
202<\/td>\n7.2.3 Sink Standby
7.2.4 Suspend Power Consumption
7.2.5 Zero Negotiated Current
7.2.6 Transient Load Behavior
Figure 7-9 \u2013 Placement of Sink Bulk Capacitance <\/td>\n<\/tr>\n
203<\/td>\n7.2.7 Swap Standby for Sinks
7.2.8 Sink Peak Current Operation
7.2.9 Robust Sink Operation <\/td>\n<\/tr>\n
204<\/td>\n7.2.10 Fast Role Swap <\/td>\n<\/tr>\n
205<\/td>\n7.3 Transitions <\/td>\n<\/tr>\n
206<\/td>\n7.3.1 Increasing the Current
Figure 7-10 \u2013 Transition Diagram for Increasing the Current <\/td>\n<\/tr>\n
207<\/td>\n7.3.2 Increasing the Voltage
Table 7-1 \u2013 Sequence Description for Increasing the Current <\/td>\n<\/tr>\n
208<\/td>\nFigure 7-11 \u2013 Transition Diagram for Increasing the Voltage <\/td>\n<\/tr>\n
209<\/td>\n7.3.3 Increasing the Voltage and Current
Table 7-2 \u2013 Sequence Description for Increasing the Voltage <\/td>\n<\/tr>\n
210<\/td>\nFigure 7-12 \u2013 Transition Diagram for Increasing the Voltage and Current <\/td>\n<\/tr>\n
211<\/td>\n7.3.4 Increasing the Voltage and Decreasing the Current
Table 7-3 \u2013 Sequence Diagram for Increasing the Voltage and Current <\/td>\n<\/tr>\n
212<\/td>\nFigure 7-13 \u2013 Transition Diagram for Increasing the Voltage and Decreasing the Current <\/td>\n<\/tr>\n
213<\/td>\n7.3.5 Decreasing the Voltage and Increasing the Current
Table 7-4 \u2013 Sequence Description for Increasing the Voltage and Decreasing the Current <\/td>\n<\/tr>\n
214<\/td>\nFigure 7-14 \u2013 Transition Diagram for Decreasing the Voltage and Increasing the Current <\/td>\n<\/tr>\n
215<\/td>\n7.3.6 Decreasing the Current
Table 7-5 \u2013 Sequence Description for Decreasing the Voltage and Increasing the Current <\/td>\n<\/tr>\n
216<\/td>\nFigure 7-15 \u2013 Transition Diagram for Decreasing the Current <\/td>\n<\/tr>\n
217<\/td>\n7.3.7 Decreasing the Voltage
Table 7-6 \u2013 Sequence Description for Decreasing the Current <\/td>\n<\/tr>\n
218<\/td>\nFigure 7-16 \u2013 Transition Diagram for Decreasing the Voltage <\/td>\n<\/tr>\n
219<\/td>\n7.3.8 Decreasing the Voltage and the Current
Table 7-7 \u2013 Sequence Description for Decreasing the Voltage <\/td>\n<\/tr>\n
220<\/td>\nFigure 7-17 \u2013 Transition Diagram for Decreasing the Voltage and the Current <\/td>\n<\/tr>\n
221<\/td>\n7.3.9 Sink Requested Power Role Swap
Table 7-8 \u2013 Sequence Description for Decreasing the Voltage and the Current <\/td>\n<\/tr>\n
222<\/td>\nFigure 7-18 \u2013 Transition Diagram for a Sink Requested Power Role Swap <\/td>\n<\/tr>\n
223<\/td>\nTable 7-9 \u2013 Sequence Description for a Sink Requested Power Role Swap <\/td>\n<\/tr>\n
224<\/td>\n7.3.10 Source Requested Power Role Swap
Figure 7-19 \u2013 Transition Diagram for a Source Requested Power Role Swap <\/td>\n<\/tr>\n
225<\/td>\nTable 7-10 \u2013 Sequence Description for a Source Requested Power Role Swap <\/td>\n<\/tr>\n
226<\/td>\n7.3.11 GotoMin Current Decrease
Figure 7-20 \u2013 Transition Diagram for a GotoMin Current Decrease <\/td>\n<\/tr>\n
227<\/td>\n7.3.12 Source Initiated Hard Reset
Table 7-11 \u2013 Sequence Description for a GotoMin Current Decrease <\/td>\n<\/tr>\n
228<\/td>\n7.3.13 Sink Initiated Hard Reset
Figure 7-21 \u2013 Transition Diagram for a Source Initiated Hard Reset
Table 7-12 \u2013 Sequence Description for a Source Initiated Hard Reset <\/td>\n<\/tr>\n
229<\/td>\n7.3.14 No change in Current or Voltage
Figure 7-22 \u2013 Transition Diagram for a Sink Initiated Hard Reset
Table 7-13 \u2013 Sequence Description for a Sink Initiated Hard Reset <\/td>\n<\/tr>\n
230<\/td>\n7.3.15 Fast Role Swap
Figure 7-23 \u2013 Transition Diagram for no change in Current or Voltage
Table 7-14 \u2013 Sequence Description for no change in Current or Voltage <\/td>\n<\/tr>\n
231<\/td>\nFigure 7-24 \u2013 Transition Diagram for Fast Role Swap <\/td>\n<\/tr>\n
232<\/td>\n7.4 Electrical Parameters
7.4.1 Source Electrical Parameters
Table 7-15 \u2013 Sequence Description for Fast Role Swap <\/td>\n<\/tr>\n
233<\/td>\nTable 7-16 \u2013 Source Electrical Parameters <\/td>\n<\/tr>\n
234<\/td>\n7.4.2 Sink Electrical Parameters <\/td>\n<\/tr>\n
235<\/td>\nTable 7-17 \u2013 Sink Electrical Parameters <\/td>\n<\/tr>\n
236<\/td>\n7.4.3 Common Electrical Parameters
8 Device Policy
8.1 Overview
8.2 Device Policy Manager
Table 7-18 \u2013 Common Source\/Sink Electrical Parameters <\/td>\n<\/tr>\n
237<\/td>\n8.2.1 Capabilities <\/td>\n<\/tr>\n
238<\/td>\n8.2.2 System Policy
8.2.3 Control of Source\/Sink
8.2.4 Cable Detection <\/td>\n<\/tr>\n
239<\/td>\n8.2.5 Managing Power Requirements <\/td>\n<\/tr>\n
241<\/td>\n8.2.6 Use of \u201cExternally Powered\u201d bit with Batteries and AC supplies <\/td>\n<\/tr>\n
242<\/td>\n8.2.7 Interface to the Policy Engine
Figure 8-1 \u2013 Example of daisy chained displays <\/td>\n<\/tr>\n
243<\/td>\n8.3 Policy Engine
8.3.1 Introduction
8.3.2 Atomic Message Sequence Diagrams <\/td>\n<\/tr>\n
244<\/td>\nFigure 8-2 \u2013 Basic Message Exchange (Successful) <\/td>\n<\/tr>\n
245<\/td>\nFigure 8-3 \u2013 Basic Message flow indicating possible errors
Table 8-1 \u2013 Basic Message Flow <\/td>\n<\/tr>\n
246<\/td>\nTable 8-2 \u2013 Potential issues in Basic Message Flow <\/td>\n<\/tr>\n
247<\/td>\nFigure 8-4 \u2013 Basic Message Flow with Bad CRC followed by a Retry <\/td>\n<\/tr>\n
248<\/td>\nTable 8-3 \u2013 Basic Message Flow with CRC failure <\/td>\n<\/tr>\n
249<\/td>\nTable 8-4 \u2013 Interruptible and Non-interruptible AMS <\/td>\n<\/tr>\n
250<\/td>\nFigure 8-5 \u2013 Successful Power Negotiation <\/td>\n<\/tr>\n
251<\/td>\nTable 8-5 \u2013 Steps for a successful Power Negotiation <\/td>\n<\/tr>\n
253<\/td>\nFigure 8-6 \u2013 Successful GotoMin operation <\/td>\n<\/tr>\n
254<\/td>\nTable 8-6 \u2013 Steps for a GotoMin Negotiation <\/td>\n<\/tr>\n
255<\/td>\nFigure 8-7 \u2013 Soft Reset <\/td>\n<\/tr>\n
256<\/td>\nTable 8-7 \u2013 Steps for a Soft Reset <\/td>\n<\/tr>\n
257<\/td>\nFigure 8-8 \u2013 Source initiated Hard Reset <\/td>\n<\/tr>\n
258<\/td>\nTable 8-8 \u2013 Steps for Source initiated Hard Reset <\/td>\n<\/tr>\n
260<\/td>\nFigure 8-9 \u2013 Sink Initiated Hard Reset <\/td>\n<\/tr>\n
261<\/td>\nTable 8-9 \u2013 Steps for Sink initiated Hard Reset <\/td>\n<\/tr>\n
263<\/td>\nFigure 8-10 \u2013 Source initiated reset \u2013 Sink long reset <\/td>\n<\/tr>\n
264<\/td>\nTable 8-10 \u2013 Steps for Source initiated Hard Reset \u2013 Sink long reset <\/td>\n<\/tr>\n
266<\/td>\nFigure 8-11 \u2013 Successful Power Role Swap Sequence Initiated by the Source <\/td>\n<\/tr>\n
267<\/td>\nTable 8-11 \u2013 Steps for a Successful Source Initiated Power Role Swap Sequence <\/td>\n<\/tr>\n
270<\/td>\nFigure 8-12 \u2013 Successful Power Role Swap Sequence Initiated by the Sink <\/td>\n<\/tr>\n
271<\/td>\nTable 8-12 \u2013 Steps for a Successful Sink Initiated Power Role Swap Sequence <\/td>\n<\/tr>\n
274<\/td>\nFigure 8-13 \u2013 Successful Fast Role Swap Sequence <\/td>\n<\/tr>\n
275<\/td>\nTable 8-13 \u2013 Steps for a Successful Fast Role Swap Sequence <\/td>\n<\/tr>\n
278<\/td>\nFigure 8-14 \u2013 Data Role Swap, UFP operating as Sink initiates <\/td>\n<\/tr>\n
279<\/td>\nTable 8-14 \u2013 Steps for Data Role Swap, UFP operating as Sink initiates <\/td>\n<\/tr>\n
280<\/td>\nFigure 8-15 \u2013 Data Role Swap, UFP operating as Source initiates <\/td>\n<\/tr>\n
281<\/td>\nTable 8-15 \u2013 Steps for Data Role Swap, UFP operating as Source initiates <\/td>\n<\/tr>\n
282<\/td>\nFigure 8-16 \u2013 Data Role Swap, DFP operating as Source initiates <\/td>\n<\/tr>\n
283<\/td>\nTable 8-16 \u2013 Steps for Data Role Swap, DFP operating as Source initiates <\/td>\n<\/tr>\n
284<\/td>\nFigure 8-17 \u2013 Data Role Swap, DFP operating as Sink initiates <\/td>\n<\/tr>\n
285<\/td>\nTable 8-17 \u2013 Steps for Data Role Swap, DFP operating as Sink initiates <\/td>\n<\/tr>\n
286<\/td>\nFigure 8-18 \u2013 Source to Sink VCONN Source Swap <\/td>\n<\/tr>\n
287<\/td>\nTable 8-18 \u2013 Steps for Source to Sink VCONN Source Swap <\/td>\n<\/tr>\n
289<\/td>\nFigure 8-19 \u2013 Sink to Source VCONN Source Swap <\/td>\n<\/tr>\n
290<\/td>\nTable 8-19 \u2013 Steps for Sink to Source VCONN Source Swap <\/td>\n<\/tr>\n
292<\/td>\nFigure 8-20 \u2013 Source Alert to Sink
Table 8-20 \u2013 Steps for Source Alert to Sink <\/td>\n<\/tr>\n
293<\/td>\nFigure 8-21 \u2013 Sink Gets Source Status <\/td>\n<\/tr>\n
294<\/td>\nTable 8-21 \u2013 Steps for a Sink getting Source status Sequence <\/td>\n<\/tr>\n
295<\/td>\nFigure 8-22 \u2013 Sink Gets Source\u2019s Capabilities <\/td>\n<\/tr>\n
296<\/td>\nTable 8-22 \u2013 Steps for a Sink getting Source capabilities Sequence <\/td>\n<\/tr>\n
297<\/td>\nFigure 8-23 \u2013 Dual-Role Source Gets Dual-Role Sink\u2019s Capabilities as a Source <\/td>\n<\/tr>\n
298<\/td>\nTable 8-23 \u2013 Steps for a Dual-Role Source gettingDual-Role Sink\u2019s capabilities as a Source Sequence <\/td>\n<\/tr>\n
299<\/td>\nFigure 8-24 \u2013 Source Gets Sink\u2019s Capabilities <\/td>\n<\/tr>\n
300<\/td>\nTable 8-24 \u2013 Steps for a Source getting Sink capabilities Sequence <\/td>\n<\/tr>\n
301<\/td>\nFigure 8-25 \u2013 Dual-Role Sink Gets Dual-Role Source\u2019s Capabilities as a Sink <\/td>\n<\/tr>\n
302<\/td>\nTable 8-25 \u2013 Steps for a Dual-Role Sink gettingDual-Role Source capabilities as a Sink Sequence <\/td>\n<\/tr>\n
303<\/td>\nFigure 8-26 \u2013 Sink Gets Source\u2019s Extended Capabilities <\/td>\n<\/tr>\n
304<\/td>\nTable 8-26 \u2013 Steps for a Sink getting Source extended capabilities Sequence <\/td>\n<\/tr>\n
305<\/td>\nFigure 8-27 \u2013 Dual-Role Source Gets Dual-Role Sink\u2019s Extended Capabilities <\/td>\n<\/tr>\n
306<\/td>\nTable 8-27 \u2013 Steps for a Dual-Role Source gettingDual-Role Sink extended capabilities Sequence <\/td>\n<\/tr>\n
307<\/td>\nFigure 8-28 \u2013 Sink Gets Source\u2019s Battery Capabilities <\/td>\n<\/tr>\n
308<\/td>\nTable 8-28 \u2013 Steps for a Sink getting Source Battery capabilities Sequence <\/td>\n<\/tr>\n
309<\/td>\nFigure 8-29 \u2013 Source Gets Sink\u2019s Battery Capabilities <\/td>\n<\/tr>\n
310<\/td>\nTable 8-29 \u2013 Steps for a Source getting Sink Battery capabilities Sequence <\/td>\n<\/tr>\n
311<\/td>\nFigure 8-30 \u2013 Source Gets Sink\u2019s Port Manufacturer Information <\/td>\n<\/tr>\n
312<\/td>\nTable 8-30 \u2013 Steps for a Source getting Sink\u2019s Port Manufacturer information Sequence <\/td>\n<\/tr>\n
313<\/td>\nFigure 8-31 \u2013 Sink Gets Source\u2019s Port Manufacturer Information <\/td>\n<\/tr>\n
314<\/td>\nTable 8-31 \u2013 Steps for a Source getting Sink\u2019s Port Manufacturer information Sequence <\/td>\n<\/tr>\n
315<\/td>\nFigure 8-32 \u2013 Source Gets Sink\u2019s Battery Manufacturer Information <\/td>\n<\/tr>\n
316<\/td>\nTable 8-32 \u2013 Steps for a Source gettingSink\u2019s Battery Manufacturer information Sequence <\/td>\n<\/tr>\n
317<\/td>\nFigure 8-33 \u2013 Sink Gets Source\u2019s Battery Manufacturer Information <\/td>\n<\/tr>\n
318<\/td>\nTable 8-33 \u2013 Steps for a Source gettingSink\u2019s Battery Manufacturer information Sequence <\/td>\n<\/tr>\n
319<\/td>\nFigure 8-34 \u2013 VCONN Source Gets Cable Plug\u2019s Manufacturer Information <\/td>\n<\/tr>\n
320<\/td>\nTable 8-34 \u2013 Steps for a Source getting Sink\u2019s Port Manufacturer information Sequence <\/td>\n<\/tr>\n
321<\/td>\nFigure 8-35 \u2013 Source requests security exchange with Sink <\/td>\n<\/tr>\n
322<\/td>\nTable 8-35 \u2013 Steps for a Source requesting a security exchange with a Sink Sequence <\/td>\n<\/tr>\n
323<\/td>\nFigure 8-36 \u2013 Sink requests security exchange with Source <\/td>\n<\/tr>\n
324<\/td>\nTable 8-36 \u2013 Steps for a Sink requesting a security exchange with a Source Sequence <\/td>\n<\/tr>\n
325<\/td>\nFigure 8-37 \u2013 Vconn Source requests security exchange with Cable Plug <\/td>\n<\/tr>\n
326<\/td>\nTable 8-37 \u2013 Steps for a Vconn Source requestinga security exchange with a Cable Plug Sequence <\/td>\n<\/tr>\n
327<\/td>\nFigure 8-38 \u2013 DFP to UFP Discover Identity <\/td>\n<\/tr>\n
328<\/td>\nTable 8-38 \u2013 Steps for DFP to UFP Discover Identity <\/td>\n<\/tr>\n
329<\/td>\nFigure 8-39 \u2013 Source Port to Cable Plug Discover Identity <\/td>\n<\/tr>\n
330<\/td>\nTable 8-39 \u2013 Steps for Source Port to Cable Plug Discover Identity <\/td>\n<\/tr>\n
331<\/td>\nFigure 8-40 \u2013 DFP to Cable Plug Discover Identity <\/td>\n<\/tr>\n
332<\/td>\nTable 8-40 \u2013 Steps for DFP to Cable Plug Discover Identity <\/td>\n<\/tr>\n
333<\/td>\nFigure 8-41 \u2013 DFP to UFP Enter Mode <\/td>\n<\/tr>\n
334<\/td>\nTable 8-41 \u2013 Steps for DFP to UFP Enter Mode <\/td>\n<\/tr>\n
335<\/td>\nFigure 8-42 \u2013 DFP to UFP Exit Mode <\/td>\n<\/tr>\n
336<\/td>\nTable 8-42 \u2013 Steps for DFP to UFP Exit Mode <\/td>\n<\/tr>\n
337<\/td>\nFigure 8-43 \u2013 DFP to Cable Plug Enter Mode <\/td>\n<\/tr>\n
338<\/td>\nTable 8-43 \u2013 Steps for DFP to Cable Plug Enter Mode <\/td>\n<\/tr>\n
339<\/td>\nFigure 8-44 \u2013 DFP to Cable Plug Exit Mode <\/td>\n<\/tr>\n
340<\/td>\nTable 8-44 \u2013 Steps for DFP to Cable Plug Exit Mode <\/td>\n<\/tr>\n
341<\/td>\nFigure 8-45 \u2013 UFP to DFP Attention <\/td>\n<\/tr>\n
342<\/td>\nTable 8-45 \u2013 Steps for UFP to DFP Attention <\/td>\n<\/tr>\n
343<\/td>\nFigure 8-46 \u2013 BIST Carrier Mode Test <\/td>\n<\/tr>\n
344<\/td>\n8.3.3 State Diagrams
Table 8-46 \u2013 Steps for BIST Eye Pattern Test <\/td>\n<\/tr>\n
345<\/td>\nFigure 8-47 \u2013 Outline of States
Figure 8-48 \u2013 References to states
Figure 8-49 \u2013 Example of state reference with conditions <\/td>\n<\/tr>\n
346<\/td>\nFigure 8-50 \u2013 Example of state reference with the same entry and exit <\/td>\n<\/tr>\n
348<\/td>\nFigure 8-51 \u2013 Source Port Policy Engine state diagram <\/td>\n<\/tr>\n
354<\/td>\nFigure 8-52 \u2013 Sink Port state diagram <\/td>\n<\/tr>\n
358<\/td>\nFigure 8-53 \u2013 Source Port Soft Reset and Protocol Error State Diagram <\/td>\n<\/tr>\n
359<\/td>\nFigure 8-54 \u2013 Sink Port Soft Reset and Protocol Error Diagram <\/td>\n<\/tr>\n
361<\/td>\nFigure 8-55 \u2013 Source Port Not Supported Message State Diagram
Figure 8-56 \u2013 Sink Port Not Supported Message State Diagram <\/td>\n<\/tr>\n
362<\/td>\nFigure 8-57 \u2013 Source Port Ping State Diagram <\/td>\n<\/tr>\n
363<\/td>\nFigure 8-58 \u2013 Source Port Source Alert State Diagram
Figure 8-59 \u2013 Sink Port Source Alert State Diagram <\/td>\n<\/tr>\n
364<\/td>\nFigure 8-60 \u2013 Sink Port Get Source Capabilities Extended state diagram
Figure 8-61 \u2013 Source Give Source Capabilities Extended state diagram <\/td>\n<\/tr>\n
365<\/td>\nFigure 8-62 \u2013 Sink Port Get Source Status state diagram
Figure 8-63 \u2013 Source Give Source Status state diagram <\/td>\n<\/tr>\n
366<\/td>\nFigure 8-64 \u2013 Get Battery Capabilities state diagram8.3.3.10.1.1
Figure 8-65 \u2013 Give Battery Capabilities state diagram <\/td>\n<\/tr>\n
367<\/td>\nFigure 8-66 \u2013 Get Battery Status state diagram <\/td>\n<\/tr>\n
368<\/td>\nFigure 8-67 \u2013 Give Battery Status state diagram
Figure 8-68 \u2013 Get Manufacturer Information state diagram <\/td>\n<\/tr>\n
369<\/td>\nFigure 8-69 \u2013 Give Manufacturer Information state diagram
Figure 8-70 \u2013 Send security request state diagram <\/td>\n<\/tr>\n
370<\/td>\nFigure 8-71 \u2013 Send security response state diagram
Figure 8-72 \u2013 Security response received state diagram <\/td>\n<\/tr>\n
371<\/td>\nFigure 8-73 \u2013 DFP to UFP Data Role Swap State Diagram <\/td>\n<\/tr>\n
374<\/td>\nFigure 8-74 \u2013 UFP to DFP Data Role Swap State Diagram <\/td>\n<\/tr>\n
376<\/td>\nFigure 8-75 \u2013 Dual-Role Port in Source to Sink Power Role Swap State Diagram <\/td>\n<\/tr>\n
379<\/td>\nFigure 8-76 \u2013 Dual-role Port in Sink to Source Power Role Swap State Diagram <\/td>\n<\/tr>\n
382<\/td>\nFigure 8-77 \u2013 Dual-Role Port in Source to Sink Fast Role Swap State Diagram <\/td>\n<\/tr>\n
385<\/td>\nFigure 8-78 \u2013 Dual-role Port in Sink to Source Fast Role Swap State Diagram <\/td>\n<\/tr>\n
387<\/td>\nFigure 8-79 \u2013 Dual-Role (Source) Get Source Capabilities diagram
Figure 8-80 \u2013 Dual-Role (Source) Give Sink Capabilities diagram <\/td>\n<\/tr>\n
388<\/td>\nFigure 8-81 \u2013 Dual-Role (Sink) Get Sink Capabilities State Diagram
Figure 8-82 \u2013 Dual-Role (Sink) Give Source Capabilities State Diagram <\/td>\n<\/tr>\n
389<\/td>\nFigure 8-83 \u2013 Dual-Role (Source) Get Source Capabilities Extended state diagram <\/td>\n<\/tr>\n
390<\/td>\nFigure 8-84 \u2013 Dual-Role (Source) Give Sink Capabilities diagram <\/td>\n<\/tr>\n
391<\/td>\nFigure 8-85 \u2013 VCONN Swap State Diagram <\/td>\n<\/tr>\n
394<\/td>\nFigure 8-86 \u2013 Initiator to Port VDM Discover Identity State Diagram <\/td>\n<\/tr>\n
395<\/td>\nFigure 8-87 \u2013 Initiator VDM Discover SVIDs State Diagram <\/td>\n<\/tr>\n
396<\/td>\nFigure 8-88 \u2013 Initiator VDM Discover Modes State Diagram <\/td>\n<\/tr>\n
397<\/td>\nFigure 8-89 \u2013 Initiator VDM Attention State Diagram <\/td>\n<\/tr>\n
398<\/td>\nFigure 8-90 \u2013 Responder Structured VDM Discover Identity State Diagram <\/td>\n<\/tr>\n
399<\/td>\nFigure 8-91 \u2013 Responder Structured VDM Discover SVIDs State Diagram <\/td>\n<\/tr>\n
400<\/td>\nFigure 8-92 \u2013 Responder Structured VDM Discover Modes State Diagram <\/td>\n<\/tr>\n
401<\/td>\nFigure 8-93 \u2013 Receiving a Structured VDM Attention State Diagram <\/td>\n<\/tr>\n
402<\/td>\nFigure 8-94 \u2013 DFP VDM Mode Entry State Diagram <\/td>\n<\/tr>\n
403<\/td>\nFigure 8-95 \u2013 DFP VDM Mode Exit State Diagram <\/td>\n<\/tr>\n
404<\/td>\nFigure 8-96 \u2013 UFP Structured VDM Enter Mode State Diagram <\/td>\n<\/tr>\n
405<\/td>\nFigure 8-97 \u2013 UFP Structured VDM Exit Mode State Diagram <\/td>\n<\/tr>\n
406<\/td>\nFigure 8-98 \u2013 Cable Ready VDM State Diagram <\/td>\n<\/tr>\n
407<\/td>\nFigure 8-99 \u2013 Cable Plug Soft Reset State Diagram <\/td>\n<\/tr>\n
408<\/td>\nFigure 8-100 \u2013 Cable Plug Hard Reset State Diagram
Figure 8-101 \u2013 DFP Soft Reset or Cable Reset of a Cable Plug State Diagram <\/td>\n<\/tr>\n
410<\/td>\nFigure 8-102 \u2013 UFP Source Soft Reset of a Cable Plug State Diagram <\/td>\n<\/tr>\n
411<\/td>\nFigure 8-103 \u2013 Source Startup Structured VDM Discover Identity State Diagram <\/td>\n<\/tr>\n
413<\/td>\nFigure 8-104 \u2013 Cable Plug Structured VDM Enter Mode State Diagram <\/td>\n<\/tr>\n
414<\/td>\nFigure 8-105 \u2013 Cable Plug Structured VDM Exit Mode State Diagram <\/td>\n<\/tr>\n
415<\/td>\nFigure 8-106 \u2013 BIST Carrier Mode State Diagram <\/td>\n<\/tr>\n
417<\/td>\nTable 8-47 \u2013 Policy Engine States <\/td>\n<\/tr>\n
421<\/td>\n9 States and Status Reporting
9.1 Overview <\/td>\n<\/tr>\n
422<\/td>\nFigure 9-1 \u2013 Example PD Topology <\/td>\n<\/tr>\n
423<\/td>\n9.1.1 PDUSB Device and Hub Requirements
9.1.2 Mapping to USB Device States
Figure 9-2 \u2013 Mapping of PD Topology to USB <\/td>\n<\/tr>\n
424<\/td>\nFigure 9-3 \u2013 USB Attached to USB Powered State Transition <\/td>\n<\/tr>\n
425<\/td>\n9.1.4 PDUSB Device Enumeration
Figure 9-4 \u2013 Any USB State to USB Attached State Transition(When operating as a Consumer)
Figure 9-5 \u2013 Any USB State to USB Attached State Transition(When operating as a Provider) <\/td>\n<\/tr>\n
426<\/td>\n9.1.3 PD Software Stack
Figure 9-6 \u2013 Any USB State to USB Attached State Transition(After a USB Type-C Data Role Swap)
Figure 9-7 \u2013 Software stack on a PD aware OS <\/td>\n<\/tr>\n
427<\/td>\n9.2 PD Class Specific Descriptors
Figure 9-8 \u2013 Enumeration of a PDUSB Device
Table 9-1 \u2013 USB Power Delivery Type Codes <\/td>\n<\/tr>\n
428<\/td>\n9.2.1 USB Power Delivery Capability Descriptor
Table 9-2 \u2013 USB Power Delivery Capability Descriptor <\/td>\n<\/tr>\n
430<\/td>\n9.2.2 Battery Info Capability Descriptor
9.2.3 PD Consumer Port Capability Descriptor
Table 9-3 \u2013 Battery Info Capability Descriptor <\/td>\n<\/tr>\n
431<\/td>\n9.2.4 PD Provider Port Capability Descriptor
Table 9-4 \u2013 PD Consumer Port Descriptor <\/td>\n<\/tr>\n
432<\/td>\n9.3 PD Class Specific Requests and Events
9.3.1 Class-specific Requests
Table 9-5 \u2013 PD Provider Port Descriptor
Table 9-6 \u2013 PD Class Requests <\/td>\n<\/tr>\n
433<\/td>\n9.4 PDUSB Hub and PDUSB Peripheral Device Requests
9.4.1 GetBatteryStatus
Table 9-7 \u2013 PD Class Request Codes
Table 9-8 \u2013 PD Class Feature Selectors <\/td>\n<\/tr>\n
434<\/td>\nTable 9-9 \u2013 Battery Status Structure <\/td>\n<\/tr>\n
435<\/td>\n9.4.2 SetPDFeature
Table 9-10 \u2013 Battery Wake Mask <\/td>\n<\/tr>\n
436<\/td>\n10 Power Rules
10.1 Introduction
10.2 Source Power Rules
10.2.1 Source Power Rule Considerations
Table 9-11 \u2013 Charging Policy Encoding <\/td>\n<\/tr>\n
437<\/td>\n10.2.2 Normative Voltages and Currents
Table 10-1 \u2013 Considerations for Sources
Table 10-2 \u2013 Normative Voltages and Currents <\/td>\n<\/tr>\n
438<\/td>\nFigure 10-1 \u2013 Source Power Rule Illustration
Figure 10-2 \u2013 Source Power Rule Example <\/td>\n<\/tr>\n
439<\/td>\nTable 10-3 \u2013 Fixed Supply PDO \u2013 Source 5V
Table 10-4 \u2013 Fixed Supply PDO \u2013 Source 9V
Table 10-5 \u2013 Fixed Supply PDO \u2013 Source 15V <\/td>\n<\/tr>\n
440<\/td>\n10.2.3 Optional Voltages\/Currents
10.2.4 Power sharing between ports
10.3 Sink Power Rules
10.3.1 Sink Power Rule Considerations
10.3.2 Normative Sink Rules
Table 10-6 \u2013 Fixed Supply PDO \u2013 Source 20V <\/td>\n<\/tr>\n
441<\/td>\nA. CRC calculation
A.1 C code example <\/td>\n<\/tr>\n
442<\/td>\nA.2 Table showing the full calculation over one Message
B. PD Message Sequence Examples <\/td>\n<\/tr>\n
443<\/td>\nB.1 External power is supplied downstream
Figure B\u20131 \u2013 External Power supplied downstream <\/td>\n<\/tr>\n
444<\/td>\nTable B\u20131 \u2013 External power is supplied downstream <\/td>\n<\/tr>\n
446<\/td>\nFigure B-2 \u2013 External Power supplied upstream <\/td>\n<\/tr>\n
447<\/td>\nTable B\u20132 \u2013 External power is supplied downstream <\/td>\n<\/tr>\n
451<\/td>\nB.3 Giving back power
Figure B\u20133 \u2013 Giving Back Power <\/td>\n<\/tr>\n
452<\/td>\nTable B\u20133 \u2013 Giving back power <\/td>\n<\/tr>\n
459<\/td>\nC. VDM Command Examples
C.1 Discover Identity Example
C.1.1 Discover Identity Command request <\/td>\n<\/tr>\n
460<\/td>\nC.1.2 Discover Identity Command response \u2013 Active Cable
Table C\u20131 \u2013 Discover Identity Command request from Initiator Example <\/td>\n<\/tr>\n
461<\/td>\nTable C\u20132 \u2013 Discover Identity Command responsefrom Active Cable Responder Example <\/td>\n<\/tr>\n
462<\/td>\nC.1.3 Discover Identity Command response \u2013 Hub
Table C\u20133 \u2013 Discover Identity Command response from Hub Responder Example <\/td>\n<\/tr>\n
463<\/td>\nC.2 Discover SVIDs Example
C.2.1 Discover SVIDs Command request
C.2.2 Discover SVIDs Command response
Table C\u20134 \u2013 Discover SVIDs Command request from Initiator Example <\/td>\n<\/tr>\n
464<\/td>\nC.3 Discover Modes Example
C.3.1 Discover Modes Command request
Table C\u20135 \u2013 Discover SVIDs Command response from Responder Example <\/td>\n<\/tr>\n
465<\/td>\nC.3.2 Discover Modes Command response
Table C\u20136 \u2013 Discover Modes Command request from Initiator Example <\/td>\n<\/tr>\n
466<\/td>\nC.4 Enter Mode Example
C.4.1 Enter Mode Command request
Table C\u20137 \u2013 Discover Modes Command response from Responder Example <\/td>\n<\/tr>\n
467<\/td>\nC.4.2 Enter Mode Command response
Table C\u20138 \u2013 Enter Mode Command request from Initiator Example <\/td>\n<\/tr>\n
468<\/td>\nC.4.3 Enter Mode Command request with additional VDO
Table C\u20139 \u2013 Enter Mode Command response from Responder Example <\/td>\n<\/tr>\n
469<\/td>\nC.5 Exit Mode Example
C.5.1 Exit Mode Command request
Table C\u201310 \u2013 Enter Mode Command request from Initiator Example <\/td>\n<\/tr>\n
470<\/td>\nC.5.2 Exit Mode Command response
Table C\u201311 \u2013 Exit Mode Command request from Initiator Example <\/td>\n<\/tr>\n
471<\/td>\nC.6 Attention Example
C.6.1 Attention Command request
Table C\u201312 \u2013 Exit Mode Command response from Responder Example <\/td>\n<\/tr>\n
472<\/td>\nC.6.2 Attention Command request with additional VDO
Table C\u201313 \u2013 Attention Command request from Initiator Example <\/td>\n<\/tr>\n
473<\/td>\nTable C\u201314 \u2013 Attention Command request from Initiator with additional VDO Example <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Universal serial bus interfaces for data and power – Common components. USB Power Delivery specification<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2017<\/td>\n502<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":229174,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-229169","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/229169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/229174"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=229169"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=229169"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=229169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}