{"id":229169,"date":"2024-10-19T14:54:26","date_gmt":"2024-10-19T14:54:26","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-62680-1-22017\/"},"modified":"2024-10-25T09:02:05","modified_gmt":"2024-10-25T09:02:05","slug":"bs-en-62680-1-22017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-62680-1-22017\/","title":{"rendered":"BS EN 62680-1-2:2017"},"content":{"rendered":"
IEC 62680-1-2:2017(E) defines a power delivery system covering all elements of a USB system including: Hosts, Devices, Hubs, Chargers and cable assemblies. This specification describes the architecture, protocols, power supply behavior, connectors and cabling necessary for managing power delivery over USB at up to 100 W. This specification is intended to be fully compatible and extend the existing USB infrastructure. It is intended that this specification will allow system OEMs, power supply and peripheral developers adequate flexibility for product versatility and market differentiation without losing backwards compatibility. USB Power Delivery is designed to operate independently of the existing USB bus defined mechanisms used to negotiate power which are: – [USB 2.0], [USB 3.1]in band requests for high power interfaces. – [USBBC 1.2]mechanisms for supplying higher power (not mandated by this specification). – [USB Type-C 1.2]mechanisms for supplying higher power<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
5<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Contributors <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | Revision History <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | Table of Contents <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 1 Introduction 1.1 Overview <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | to a powered cable. 1.3 Scope <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 1.4 Conventions 1.4.1 Precedence 1.4.2 Keywords <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 1.4.3 Numbering 1.5 Related Documents <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 1.6 Terms and Abbreviations Tables Table 1-1 \u2013 Terms and Abbreviations <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 1.7 Parameter Values 2 Overview 2.1 Introduction <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 2.2 Section Overview <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 2.3 USB Power Delivery Capable Devices Figures Figure 2-1 \u2013 Logical Structure of USB Power Delivery Capable Devices <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 2.4 SOP* Communication 2.4.1 Introduction 2.4.2 SOP* Collision Avoidance <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 2.4.3 SOP Communication 2.4.4 SOP\u2019\/SOP\u2019\u2019 Communication with Cable Plugs <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 2.5 Operational Overview 2.5.1 Source Operation Figure 2-2 \u2013 Example SOP\u2019 Communicationbetween VCONN Source and Cable Plug(s) <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 2.5.2 Sink Operation <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 2.5.3 Cable Plugs <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 2.6 Architectural Overview Figure 2-3 \u2013 USB Power Delivery Communications Stack <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | Figure 2-4 \u2013 USB Power Delivery Communication Over USB <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 2.6.1 Policy Figure 2-5 \u2013 High Level Architecture View <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 2.6.2 Message Formation and Transmission 2.6.3 Collision Avoidance <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 2.6.4 Power supply 2.6.5 DFP\/UFP <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 2.6.6 VCONN Source 2.6.7 Cable and Connectors 2.6.8 Interactions between Non-PD, BC and PD devices 2.6.9 Power Rules 3 USB Type-A and USB Type-B Cable Assemblies and Connectors 4 Electrical Requirements 4.1 Interoperability with other USB Specifications <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 4.2 Dead Battery Detection \/ Unpowered Port Detection 4.3 Cable IR Ground Drop (IR Drop) 4.4 Cable Type Detection 5 Physical Layer 5.1 Physical Layer Overview <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 5.2 Physical Layer Functions 5.3 Symbol Encoding <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 5.4 Ordered Sets Table 5-1 \u2013 4b5b Symbol Encoding Table <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | Figure 5-1 \u2013 Interpretation of ordered sets Table 5-2 \u2013 Ordered Sets Table 5-3 \u2013 Validation of Ordered Sets <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 5.5 Transmitted Bit Ordering 5.6 Packet Format Figure 5-2 \u2013 Transmit Order for Various Sizes of Data Table 5-4 \u2013 Data Size <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 5.6.1 Packet Framing Figure 5-3 \u2013 USB Power Delivery Packet Format Table 5-5 \u2013 SOP ordered set <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | Table 5-6 \u2013 SOP\u2019 ordered set Table 5-7 \u2013 SOP\u2019\u2019 ordered set <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 5.6.2 CRC Table 5-8 \u2013 SOP\u2019_Debug ordered set Table 5-9 \u2013 SOP\u2019\u2019_Debug ordered set <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | Figure 5-4 \u2013 CRC 32 generation <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | 5.6.3 Packet Detection Errors Table 5-10 \u2013 CRC-32 Mapping <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | 5.6.4 Hard Reset 5.6.5 Cable Reset Figure 5-5 \u2013 Line format of Hard Reset Table 5-11 \u2013 Hard Reset ordered set <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 5.7 Collision Avoidance Figure 5-6 \u2013 Line format of Cable Reset Table 5-12 \u2013 Cable Reset ordered set <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | 5.8 Biphase Mark Coding (BMC) Signaling Scheme 5.8.1 Encoding and signaling Figure 5-7 \u2013 BMC Example Table 5-13 \u2013 Rp values used for Collision Avoidance <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | Figure 5-8 \u2013 BMC Transmitter Block Diagram Figure 5-9 \u2013 BMC Receiver Block Diagram <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | Figure 5-10 \u2013 BMC Encoded Start of Preamble Figure 5-11 \u2013 Transmitting or Receiving BMC Encoded FrameTerminated by Zero with High-to-Low Last Transition <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | Figure 5-12 \u2013 Transmitting or Receiving BMC Encoded FrameTerminated by One with High-to-Low Last Transition Figure 5-13 \u2013 Transmitting or Receiving BMC Encoded FrameTerminated by Zero with Low to High Last Transition <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 5.8.2 Transmit and Receive Masks Figure 5-14 \u2013 Transmitting or Receiving BMC Encoded Fr Figure 5-15 \u2013 Waiting for idle after a BMC Encoded FrameTerminated by Zero with High-to-Low Last Transition <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | Figure 5-16 \u2013 BMC Tx \u2018ONE\u2019 Mask Figure 5-17 \u2013 BMC Tx \u2018ZERO\u2019 Mask <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | Table 5-14 \u2013 BMC Tx Mask Definition, X Values Table 5-15 \u2013 BMC Tx Mask Definition, Y Values <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | Figure 5-18 \u2013 BMC Rx \u2018ONE\u2019 Mask when Sourcing Power Figure 5-19 \u2013 BMC Rx \u2018ZERO\u2019 Mask when Sourcing Power <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | Figure 5-20 \u2013 BMC Rx \u2018ONE\u2019 Mask when Power neutral Figure 5-21 \u2013 BMC Rx \u2018ZERO\u2019 Mask when Power neutral <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | Figure 5-22 \u2013 BMC Rx \u2018ONE\u2019 Mask when Sinking Power Figure 5-23 \u2013 BMC Rx \u2018ZERO\u2019 Mask when Sinking Power <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 5.8.3 Transmitter Load Model Figure 5-24 \u2013 Transmitter Load Model for BMC Tx from a Source Table 5-16 \u2013 BMC Rx Mask Definition <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 5.8.4 BMC Common specifications Figure 5-25 Transmitter Load Model for BMC Tx from a Sink <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 5.8.5 BMC Transmitter Specifications Table 5-17 \u2013 BMC Common Normative Requirements <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | Table 5-18 \u2013 BMC Transmitter Normative Requirements <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | Figure 5-26 \u2013 Transmitter diagram illustrating zDriver <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | Figure 5-27 \u2013 Inter-Frame Gap Timings <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 5.8.6 BMC Receiver Specifications Table 5-19 \u2013 BMC Receiver Normative Requirements <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | Figure 5-28 \u2013 Example Multi-Drop Configuration showing two DRPs Figure 5-29 \u2013 Example Multi-Drop Configuration showing a DFP and UFP <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | 5.9 Built in Self-Test (BIST) 5.9.1 BIST Carrier Mode 5.9.2 BIST Test Data <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 6 Protocol Layer 6.1 Overview 6.2 Messages Figure 5-30 \u2013 Test Data Frame <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 6.2.1 Message Construction Figure 6-1 \u2013 USB Power Delivery Packet Formatincluding Control Message Payload Figure 6-2 \u2013 USB Power Delivery Packet Format including Data Message Payload Figure 6-3 \u2013 USB Power Delivery Packet Format includingan Extended Message Header and Payload <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | Table 6-1 \u2013 Message Header <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | Table 6-2 \u2013 Revision Interoperability <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | Table 6-3 \u2013 Extended Message Header <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | Figure 6-4 \u2013 Example Security_Request sequence Unchunked <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | 6.3 Control Message Figure 6-5 \u2013 Example Security_Request sequence Chunked <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | 6.3.1 GoodCRC Message Table 6-4 \u2013 Control Message Types <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | 6.3.2 GotoMin Message 6.3.3 Accept Message 6.3.4 Reject Message <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | 6.3.5 Ping Message 6.3.6 PS_RDY Message 6.3.7 Get_Source_Cap Message 6.3.8 Get_Sink_Cap Message 6.3.9 DR_Swap Message <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 6.3.10 PR_Swap Message <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | 6.3.11 VCONN_Swap Message 6.3.12 Wait Message <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | 6.3.13 Soft Reset Message 6.3.14 Not_Supported Message <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | 6.3.15 Get_Source_Cap_Extended Message 6.3.16 Get_ Source_Status Message 6.3.17 FR_Swap Message <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 6.4 Data Message 6.4.1 Capabilities Message Table 6-5 \u2013 Data Message Types <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | Figure 6-6 \u2013 Example Capabilities Message with 2 Power Data Objects Table 6-6 \u2013 Power Data Object <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | Table 6-7 \u2013 Fixed Supply PDO \u2013 Source <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | \u00a9 USB-IF:2016 Table 6-9 \u2013 Variable Supply (non-Battery) PDO \u2013 Source <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | Table 6-10 \u2013 Battery Supply PDO \u2013 Source <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | Table 6-11 \u2013 Fixed Supply PDO \u2013 Sink <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | Table 6-12 \u2013 Variable Supply (non-Battery) PDO \u2013 Sink Table 6-13 \u2013 Battery Supply PDO \u2013 Sink <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | 6.4.2 Request Message Table 6-14 \u2013Fixed and Variable Request Data Object Table 6-15 \u2013 Fixed and Variable Request Data Object with GiveBack Support <\/td>\n<\/tr>\n | ||||||
116<\/td>\n | Table 6-16 \u2013 Battery Request Data Object Table 6-17 \u2013 Battery Request Data Object with GiveBack Support <\/td>\n<\/tr>\n | ||||||
119<\/td>\n | 6.4.3 BIST Message Figure 6-7 \u2013 BIST Message <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | 6.4.4 Vendor Defined Message Table 6-18 \u2013 BIST Data Object <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | Figure 6-8 \u2013 Vendor Defined Message <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | Table 6-19 \u2013 Unstructured VDM Header <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | Table 6-20 \u2013 Structured VDM Header Table 6-21 \u2013 Structured VDM Commands <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | Table 6-22 \u2013 SVID Values <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | Table 6-23 \u2013 Commands and Responses <\/td>\n<\/tr>\n | ||||||
127<\/td>\n | Figure 6-9 \u2013 Discover Identity Command response Table 6-24 \u2013 ID Header VDO <\/td>\n<\/tr>\n | ||||||
128<\/td>\n | Table 6-25 \u2013 Product Types (UFP) Table 6-26 \u2013 Product Types (Cable Plug) <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | Table 6-27 \u2013 Product Types (DFP) Table 6-28 \u2013 Cert Stat VDO Table 6-29 \u2013 Product VDO <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | Table 6-30 \u2013 Passive Cable VDO <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | Table 6-31 \u2013 Active Cable VDO <\/td>\n<\/tr>\n | ||||||
134<\/td>\n | Table 6-32 \u2013 AMA VDO <\/td>\n<\/tr>\n | ||||||
135<\/td>\n | Figure 6-10 \u2013 Example Discover SVIDs response with 3 SVIDs Table 6-33 \u2013 Discover SVIDs Responder VDO <\/td>\n<\/tr>\n | ||||||
136<\/td>\n | Figure 6-11 \u2013 Example Discover SVIDs response with 4 SVIDs Figure 6-12 \u2013 Example Discover SVIDs response with 12 SVIDsfollowed by an empty response Figure 6-13 \u2013 Example Discover Modes response for a given SVID with 3 Mode <\/td>\n<\/tr>\n | ||||||
138<\/td>\n | Figure 6-15 \u2013 Enter Mode sequence Interrupted by Source Capabilities and then Re-run <\/td>\n<\/tr>\n | ||||||
139<\/td>\n | Figure 6-16 \u2013 Unsuccessful Enter Mode sequence due to NAK <\/td>\n<\/tr>\n | ||||||
140<\/td>\n | Figure 6-17 \u2013 Exit Mode sequence Figure 6-18 \u2013 Attention Command request\/response sequence <\/td>\n<\/tr>\n | ||||||
141<\/td>\n | Figure 6-19 \u2013 Command request\/response sequence <\/td>\n<\/tr>\n | ||||||
143<\/td>\n | Figure 6-20 \u2013 Enter\/Exit Mode Process <\/td>\n<\/tr>\n | ||||||
144<\/td>\n | 6.4.5 Battery_Status Message Figure 6-21 \u2013 Battery_Status Message Table 6-34 \u2013 Battery Status Data Object (BSDO) <\/td>\n<\/tr>\n | ||||||
145<\/td>\n | 6.4.6 Source_Alert Message Figure 6-22 \u2013 Source_Alert Message Table 6-35 \u2013 Source Alert Data Object <\/td>\n<\/tr>\n | ||||||
147<\/td>\n | 6.5 Extended Message 6.5.1 Source_Capabilities_Extended Message Figure 6-23 \u2013 Source_Capabilites_Extended Message Table 6-36 \u2013 Extended Message Types <\/td>\n<\/tr>\n | ||||||
148<\/td>\n | Table 6-37 \u2013 Source Capabilities Extended Data Block (SCEDB) <\/td>\n<\/tr>\n | ||||||
151<\/td>\n | 6.5.2 Source_Status Message Figure 6-24 Source_Status Message <\/td>\n<\/tr>\n | ||||||
152<\/td>\n | Table 6-38 \u2013 Source Status Data Block (SSDB) <\/td>\n<\/tr>\n | ||||||
153<\/td>\n | 6.5.4 Get_Battery_Status Message Figure 6-25 \u2013 Get_Battery_Cap Message Figure 6-26 \u2013 Get_Battery_Status Message Table 6-39 \u2013 Get Battery Cap Data Block (GBCDB) Table 6-40 \u2013 Get Battery Status Data Block (GBSDB) <\/td>\n<\/tr>\n | ||||||
154<\/td>\n | 6.5.5 Battery_Capabilities Message Figure 6-27 \u2013 Battery_Capabilities Message Table 6-41 \u2013 Battery Capability Data Block (BCDB) <\/td>\n<\/tr>\n | ||||||
155<\/td>\n | 6.5.6 Get_Manufacturer_Info Message 6.5.7 Manufacturer_Info Message Figure 6-28 \u2013 Get_Manufacturer_Info Message Figure 6-29 \u2013 Manufacturer_Info Message Table 6-42 \u2013 Get Serial Number Data Block (GSNDB) <\/td>\n<\/tr>\n | ||||||
156<\/td>\n | 6.5.8 Security Messages Table 6-43 \u2013 Manufacturer Info Data Block (MIDB) <\/td>\n<\/tr>\n | ||||||
157<\/td>\n | 6.6 Timers 6.6.1 CRCReceiveTimer 6.6.2 SenderResponseTimer Figure 6-30 \u2013 Security_Request Message Figure 6-31 \u2013 Security_Response Message <\/td>\n<\/tr>\n | ||||||
158<\/td>\n | 6.6.3 Capability Timers 6.6.4 SinkRequestTimer <\/td>\n<\/tr>\n | ||||||
159<\/td>\n | 6.6.5 Power Supply Timers <\/td>\n<\/tr>\n | ||||||
160<\/td>\n | 6.6.6 NoResponseTimer <\/td>\n<\/tr>\n | ||||||
161<\/td>\n | 6.6.7 BIST Timers 6.6.8 Power Role Swap Timers <\/td>\n<\/tr>\n | ||||||
162<\/td>\n | 6.6.9 Hard Reset Timers 6.6.10 Structured VDM Timers <\/td>\n<\/tr>\n | ||||||
164<\/td>\n | 6.6.11 VCONN Timers 6.6.12 tCableMessage 6.6.13 DiscoverIdentityTimer 6.6.14 Collision Avoidance Timers <\/td>\n<\/tr>\n | ||||||
165<\/td>\n | 6.6.15 tFRSwapInit 6.6.16 Time Values and Timers <\/td>\n<\/tr>\n | ||||||
166<\/td>\n | Table 6-44 \u2013 Time Values <\/td>\n<\/tr>\n | ||||||
167<\/td>\n | 6.7 Counters 6.7.1 MessageID Counter Table 6-45 \u2013 Timers <\/td>\n<\/tr>\n | ||||||
168<\/td>\n | 6.7.2 Retry Counter 6.7.3 Hard Reset Counter 6.7.4 Capabilities Counter <\/td>\n<\/tr>\n | ||||||
169<\/td>\n | 6.7.5 Discover Identity Counter 6.7.6 VDMBusyCounter 6.7.7 Counter Values and Counters 6.8 Reset 6.8.1 Soft Reset and Protocol Error Table 6-46 \u2013 Counter parameters Table 6-47 \u2013 Counters <\/td>\n<\/tr>\n | ||||||
170<\/td>\n | 6.8.2 Hard Reset <\/td>\n<\/tr>\n | ||||||
171<\/td>\n | 6.8.3 Cable Reset 6.9 Collision Avoidance <\/td>\n<\/tr>\n | ||||||
172<\/td>\n | 6.10 Message Discarding 6.11 State behavior 6.11.1 Introduction to state diagrams used in Chapter 6 Figure 6-32 \u2013 Outline of States Table 6-48 \u2013 Message discarding <\/td>\n<\/tr>\n | ||||||
173<\/td>\n | 6.11.2 State Operation Figure 6-33 \u2013 References to states <\/td>\n<\/tr>\n | ||||||
174<\/td>\n | Figure 6-34 \u2013 Common Protocol Layer Message transmission State Diagram <\/td>\n<\/tr>\n | ||||||
177<\/td>\n | Figure 6-35 \u2013 Source Protocol Layer Message transmission State Diagram <\/td>\n<\/tr>\n | ||||||
179<\/td>\n | Figure 6-36 \u2013 Sink Protocol Layer Message transmission State Diagram <\/td>\n<\/tr>\n | ||||||
180<\/td>\n | Figure 6-37 \u2013 Protocol layer Message reception <\/td>\n<\/tr>\n | ||||||
182<\/td>\n | Figure 6-38 \u2013 Hard\/Cable Reset <\/td>\n<\/tr>\n | ||||||
184<\/td>\n | 6.11.3 List of Protocol Layer States <\/td>\n<\/tr>\n | ||||||
185<\/td>\n | 6.12 Message Applicability Table 6-49 \u2013 Protocol Layer States <\/td>\n<\/tr>\n | ||||||
186<\/td>\n | 6.12.1 Applicability of Control Messages <\/td>\n<\/tr>\n | ||||||
187<\/td>\n | Table 6-50 \u2013 Applicability of Control Messages <\/td>\n<\/tr>\n | ||||||
188<\/td>\n | 6.12.2 Applicability of Data Messages 6.12.3 Applicability of Extended Messages Table 6-51 \u2013 Applicability of Data Messages <\/td>\n<\/tr>\n | ||||||
189<\/td>\n | 6.12.4 Applicability of VDM Commands Table 6-52 \u2013 Applicability of Extended Messages <\/td>\n<\/tr>\n | ||||||
190<\/td>\n | 6.12.5 Applicability of Reset Signaling 6.12.6 Applicability of Fast Role Swap signal Table 6-53 \u2013 Applicability of VDM Commands Table 6-54 \u2013 Applicability of Reset Signaling <\/td>\n<\/tr>\n | ||||||
191<\/td>\n | 6.13 Value Parameters 7 Power Supply 7.1 Source Requirements 7.1.1 Behavioral Aspects 7.1.2 Source Bulk Capacitance Table 6-55 \u2013 Applicability of Fast Role Swap signal Table 6-56 \u2013 Value Parameters <\/td>\n<\/tr>\n | ||||||
192<\/td>\n | 7.1.3 Types of Sources 7.1.4 Positive Voltage Transitions Figure 7-1 \u2013 Placement of Source Bulk Capacitance <\/td>\n<\/tr>\n | ||||||
193<\/td>\n | 7.1.5 Negative Voltage Transitions Figure 7-2 \u2013 Transition Envelope for Positive Voltage Transitions <\/td>\n<\/tr>\n | ||||||
194<\/td>\n | 7.1.6 Response to Hard Resets Figure 7-3 \u2013 Transition Envelope for Negative Voltage Transitions <\/td>\n<\/tr>\n | ||||||
195<\/td>\n | 7.1.7 Changing the Output Power Capability 7.1.8 Robust Source Operation Figure 7-4 \u2013 Source VBUS Response to Hard Reset <\/td>\n<\/tr>\n | ||||||
196<\/td>\n | 7.1.9 Output Voltage Tolerance and Range <\/td>\n<\/tr>\n | ||||||
197<\/td>\n | 7.1.10 Charging and Discharging the Bulk Capacitance on VBUS 7.1.11 Swap Standby for Sources Figure 7-5 \u2013 Application of vSrcNew and vSrcValid limits after tSrcReady <\/td>\n<\/tr>\n | ||||||
198<\/td>\n | 7.1.12 Source Peak Current Operation 7.1.13 Source Capabilities Extended Parameters Figure 7-6 \u2013 Source Peak Current Overload <\/td>\n<\/tr>\n | ||||||
199<\/td>\n | Figure 7-7 \u2013 Holdup Time Measurement <\/td>\n<\/tr>\n | ||||||
200<\/td>\n | 7.1.14 Fast Role Swap <\/td>\n<\/tr>\n | ||||||
201<\/td>\n | 7.2 Sink Requirements 7.2.1 Behavioral Aspects 7.2.2 Sink Bulk Capacitance Figure 7-8 \u2013 VBUS Power during Fast Role Swap <\/td>\n<\/tr>\n | ||||||
202<\/td>\n | 7.2.3 Sink Standby 7.2.4 Suspend Power Consumption 7.2.5 Zero Negotiated Current 7.2.6 Transient Load Behavior Figure 7-9 \u2013 Placement of Sink Bulk Capacitance <\/td>\n<\/tr>\n | ||||||
203<\/td>\n | 7.2.7 Swap Standby for Sinks 7.2.8 Sink Peak Current Operation 7.2.9 Robust Sink Operation <\/td>\n<\/tr>\n | ||||||
204<\/td>\n | 7.2.10 Fast Role Swap <\/td>\n<\/tr>\n | ||||||
205<\/td>\n | 7.3 Transitions <\/td>\n<\/tr>\n | ||||||
206<\/td>\n | 7.3.1 Increasing the Current Figure 7-10 \u2013 Transition Diagram for Increasing the Current <\/td>\n<\/tr>\n | ||||||
207<\/td>\n | 7.3.2 Increasing the Voltage Table 7-1 \u2013 Sequence Description for Increasing the Current <\/td>\n<\/tr>\n | ||||||
208<\/td>\n | Figure 7-11 \u2013 Transition Diagram for Increasing the Voltage <\/td>\n<\/tr>\n | ||||||
209<\/td>\n | 7.3.3 Increasing the Voltage and Current Table 7-2 \u2013 Sequence Description for Increasing the Voltage <\/td>\n<\/tr>\n | ||||||
210<\/td>\n | Figure 7-12 \u2013 Transition Diagram for Increasing the Voltage and Current <\/td>\n<\/tr>\n | ||||||
211<\/td>\n | 7.3.4 Increasing the Voltage and Decreasing the Current Table 7-3 \u2013 Sequence Diagram for Increasing the Voltage and Current <\/td>\n<\/tr>\n | ||||||
212<\/td>\n | Figure 7-13 \u2013 Transition Diagram for Increasing the Voltage and Decreasing the Current <\/td>\n<\/tr>\n | ||||||
213<\/td>\n | 7.3.5 Decreasing the Voltage and Increasing the Current Table 7-4 \u2013 Sequence Description for Increasing the Voltage and Decreasing the Current <\/td>\n<\/tr>\n | ||||||
214<\/td>\n | Figure 7-14 \u2013 Transition Diagram for Decreasing the Voltage and Increasing the Current <\/td>\n<\/tr>\n | ||||||
215<\/td>\n | 7.3.6 Decreasing the Current Table 7-5 \u2013 Sequence Description for Decreasing the Voltage and Increasing the Current <\/td>\n<\/tr>\n | ||||||
216<\/td>\n | Figure 7-15 \u2013 Transition Diagram for Decreasing the Current <\/td>\n<\/tr>\n | ||||||
217<\/td>\n | 7.3.7 Decreasing the Voltage Table 7-6 \u2013 Sequence Description for Decreasing the Current <\/td>\n<\/tr>\n | ||||||
218<\/td>\n | Figure 7-16 \u2013 Transition Diagram for Decreasing the Voltage <\/td>\n<\/tr>\n | ||||||
219<\/td>\n | 7.3.8 Decreasing the Voltage and the Current Table 7-7 \u2013 Sequence Description for Decreasing the Voltage <\/td>\n<\/tr>\n | ||||||
220<\/td>\n | Figure 7-17 \u2013 Transition Diagram for Decreasing the Voltage and the Current <\/td>\n<\/tr>\n | ||||||
221<\/td>\n | 7.3.9 Sink Requested Power Role Swap Table 7-8 \u2013 Sequence Description for Decreasing the Voltage and the Current <\/td>\n<\/tr>\n | ||||||
222<\/td>\n | Figure 7-18 \u2013 Transition Diagram for a Sink Requested Power Role Swap <\/td>\n<\/tr>\n | ||||||
223<\/td>\n | Table 7-9 \u2013 Sequence Description for a Sink Requested Power Role Swap <\/td>\n<\/tr>\n | ||||||
224<\/td>\n | 7.3.10 Source Requested Power Role Swap Figure 7-19 \u2013 Transition Diagram for a Source Requested Power Role Swap <\/td>\n<\/tr>\n | ||||||
225<\/td>\n | Table 7-10 \u2013 Sequence Description for a Source Requested Power Role Swap <\/td>\n<\/tr>\n | ||||||
226<\/td>\n | 7.3.11 GotoMin Current Decrease Figure 7-20 \u2013 Transition Diagram for a GotoMin Current Decrease <\/td>\n<\/tr>\n | ||||||
227<\/td>\n | 7.3.12 Source Initiated Hard Reset Table 7-11 \u2013 Sequence Description for a GotoMin Current Decrease <\/td>\n<\/tr>\n | ||||||
228<\/td>\n | 7.3.13 Sink Initiated Hard Reset Figure 7-21 \u2013 Transition Diagram for a Source Initiated Hard Reset Table 7-12 \u2013 Sequence Description for a Source Initiated Hard Reset <\/td>\n<\/tr>\n | ||||||
229<\/td>\n | 7.3.14 No change in Current or Voltage Figure 7-22 \u2013 Transition Diagram for a Sink Initiated Hard Reset Table 7-13 \u2013 Sequence Description for a Sink Initiated Hard Reset <\/td>\n<\/tr>\n | ||||||
230<\/td>\n | 7.3.15 Fast Role Swap Figure 7-23 \u2013 Transition Diagram for no change in Current or Voltage Table 7-14 \u2013 Sequence Description for no change in Current or Voltage <\/td>\n<\/tr>\n | ||||||
231<\/td>\n | Figure 7-24 \u2013 Transition Diagram for Fast Role Swap <\/td>\n<\/tr>\n | ||||||
232<\/td>\n | 7.4 Electrical Parameters 7.4.1 Source Electrical Parameters Table 7-15 \u2013 Sequence Description for Fast Role Swap <\/td>\n<\/tr>\n | ||||||
233<\/td>\n | Table 7-16 \u2013 Source Electrical Parameters <\/td>\n<\/tr>\n | ||||||
234<\/td>\n | 7.4.2 Sink Electrical Parameters <\/td>\n<\/tr>\n | ||||||
235<\/td>\n | Table 7-17 \u2013 Sink Electrical Parameters <\/td>\n<\/tr>\n | ||||||
236<\/td>\n | 7.4.3 Common Electrical Parameters 8 Device Policy 8.1 Overview 8.2 Device Policy Manager Table 7-18 \u2013 Common Source\/Sink Electrical Parameters <\/td>\n<\/tr>\n | ||||||
237<\/td>\n | 8.2.1 Capabilities <\/td>\n<\/tr>\n | ||||||
238<\/td>\n | 8.2.2 System Policy 8.2.3 Control of Source\/Sink 8.2.4 Cable Detection <\/td>\n<\/tr>\n | ||||||
239<\/td>\n | 8.2.5 Managing Power Requirements <\/td>\n<\/tr>\n | ||||||
241<\/td>\n | 8.2.6 Use of \u201cExternally Powered\u201d bit with Batteries and AC supplies <\/td>\n<\/tr>\n | ||||||
242<\/td>\n | 8.2.7 Interface to the Policy Engine Figure 8-1 \u2013 Example of daisy chained displays <\/td>\n<\/tr>\n | ||||||
243<\/td>\n | 8.3 Policy Engine 8.3.1 Introduction 8.3.2 Atomic Message Sequence Diagrams <\/td>\n<\/tr>\n | ||||||
244<\/td>\n | Figure 8-2 \u2013 Basic Message Exchange (Successful) <\/td>\n<\/tr>\n | ||||||
245<\/td>\n | Figure 8-3 \u2013 Basic Message flow indicating possible errors Table 8-1 \u2013 Basic Message Flow <\/td>\n<\/tr>\n | ||||||
246<\/td>\n | Table 8-2 \u2013 Potential issues in Basic Message Flow <\/td>\n<\/tr>\n | ||||||
247<\/td>\n | Figure 8-4 \u2013 Basic Message Flow with Bad CRC followed by a Retry <\/td>\n<\/tr>\n | ||||||
248<\/td>\n | Table 8-3 \u2013 Basic Message Flow with CRC failure <\/td>\n<\/tr>\n | ||||||
249<\/td>\n | Table 8-4 \u2013 Interruptible and Non-interruptible AMS <\/td>\n<\/tr>\n | ||||||
250<\/td>\n | Figure 8-5 \u2013 Successful Power Negotiation <\/td>\n<\/tr>\n | ||||||
251<\/td>\n | Table 8-5 \u2013 Steps for a successful Power Negotiation <\/td>\n<\/tr>\n | ||||||
253<\/td>\n | Figure 8-6 \u2013 Successful GotoMin operation <\/td>\n<\/tr>\n | ||||||
254<\/td>\n | Table 8-6 \u2013 Steps for a GotoMin Negotiation <\/td>\n<\/tr>\n | ||||||
255<\/td>\n | Figure 8-7 \u2013 Soft Reset <\/td>\n<\/tr>\n | ||||||
256<\/td>\n | Table 8-7 \u2013 Steps for a Soft Reset <\/td>\n<\/tr>\n | ||||||
257<\/td>\n | Figure 8-8 \u2013 Source initiated Hard Reset <\/td>\n<\/tr>\n | ||||||
258<\/td>\n | Table 8-8 \u2013 Steps for Source initiated Hard Reset <\/td>\n<\/tr>\n | ||||||
260<\/td>\n | Figure 8-9 \u2013 Sink Initiated Hard Reset <\/td>\n<\/tr>\n | ||||||
261<\/td>\n | Table 8-9 \u2013 Steps for Sink initiated Hard Reset <\/td>\n<\/tr>\n | ||||||
263<\/td>\n | Figure 8-10 \u2013 Source initiated reset \u2013 Sink long reset <\/td>\n<\/tr>\n | ||||||
264<\/td>\n | Table 8-10 \u2013 Steps for Source initiated Hard Reset \u2013 Sink long reset <\/td>\n<\/tr>\n | ||||||
266<\/td>\n | Figure 8-11 \u2013 Successful Power Role Swap Sequence Initiated by the Source <\/td>\n<\/tr>\n | ||||||
267<\/td>\n | Table 8-11 \u2013 Steps for a Successful Source Initiated Power Role Swap Sequence <\/td>\n<\/tr>\n | ||||||
270<\/td>\n | Figure 8-12 \u2013 Successful Power Role Swap Sequence Initiated by the Sink <\/td>\n<\/tr>\n | ||||||
271<\/td>\n | Table 8-12 \u2013 Steps for a Successful Sink Initiated Power Role Swap Sequence <\/td>\n<\/tr>\n | ||||||
274<\/td>\n | Figure 8-13 \u2013 Successful Fast Role Swap Sequence <\/td>\n<\/tr>\n | ||||||
275<\/td>\n | Table 8-13 \u2013 Steps for a Successful Fast Role Swap Sequence <\/td>\n<\/tr>\n | ||||||
278<\/td>\n | Figure 8-14 \u2013 Data Role Swap, UFP operating as Sink initiates <\/td>\n<\/tr>\n | ||||||
279<\/td>\n | Table 8-14 \u2013 Steps for Data Role Swap, UFP operating as Sink initiates <\/td>\n<\/tr>\n | ||||||
280<\/td>\n | Figure 8-15 \u2013 Data Role Swap, UFP operating as Source initiates <\/td>\n<\/tr>\n | ||||||
281<\/td>\n | Table 8-15 \u2013 Steps for Data Role Swap, UFP operating as Source initiates <\/td>\n<\/tr>\n | ||||||
282<\/td>\n | Figure 8-16 \u2013 Data Role Swap, DFP operating as Source initiates <\/td>\n<\/tr>\n | ||||||
283<\/td>\n | Table 8-16 \u2013 Steps for Data Role Swap, DFP operating as Source initiates <\/td>\n<\/tr>\n | ||||||
284<\/td>\n | Figure 8-17 \u2013 Data Role Swap, DFP operating as Sink initiates <\/td>\n<\/tr>\n | ||||||
285<\/td>\n | Table 8-17 \u2013 Steps for Data Role Swap, DFP operating as Sink initiates <\/td>\n<\/tr>\n | ||||||
286<\/td>\n | Figure 8-18 \u2013 Source to Sink VCONN Source Swap <\/td>\n<\/tr>\n | ||||||
287<\/td>\n | Table 8-18 \u2013 Steps for Source to Sink VCONN Source Swap <\/td>\n<\/tr>\n | ||||||
289<\/td>\n | Figure 8-19 \u2013 Sink to Source VCONN Source Swap <\/td>\n<\/tr>\n | ||||||
290<\/td>\n | Table 8-19 \u2013 Steps for Sink to Source VCONN Source Swap <\/td>\n<\/tr>\n | ||||||
292<\/td>\n | Figure 8-20 \u2013 Source Alert to Sink Table 8-20 \u2013 Steps for Source Alert to Sink <\/td>\n<\/tr>\n | ||||||
293<\/td>\n | Figure 8-21 \u2013 Sink Gets Source Status <\/td>\n<\/tr>\n | ||||||
294<\/td>\n | Table 8-21 \u2013 Steps for a Sink getting Source status Sequence <\/td>\n<\/tr>\n | ||||||
295<\/td>\n | Figure 8-22 \u2013 Sink Gets Source\u2019s Capabilities <\/td>\n<\/tr>\n | ||||||
296<\/td>\n | Table 8-22 \u2013 Steps for a Sink getting Source capabilities Sequence <\/td>\n<\/tr>\n | ||||||
297<\/td>\n | Figure 8-23 \u2013 Dual-Role Source Gets Dual-Role Sink\u2019s Capabilities as a Source <\/td>\n<\/tr>\n | ||||||
298<\/td>\n | Table 8-23 \u2013 Steps for a Dual-Role Source gettingDual-Role Sink\u2019s capabilities as a Source Sequence <\/td>\n<\/tr>\n | ||||||
299<\/td>\n | Figure 8-24 \u2013 Source Gets Sink\u2019s Capabilities <\/td>\n<\/tr>\n | ||||||
300<\/td>\n | Table 8-24 \u2013 Steps for a Source getting Sink capabilities Sequence <\/td>\n<\/tr>\n | ||||||
301<\/td>\n | Figure 8-25 \u2013 Dual-Role Sink Gets Dual-Role Source\u2019s Capabilities as a Sink <\/td>\n<\/tr>\n | ||||||
302<\/td>\n | Table 8-25 \u2013 Steps for a Dual-Role Sink gettingDual-Role Source capabilities as a Sink Sequence <\/td>\n<\/tr>\n | ||||||
303<\/td>\n | Figure 8-26 \u2013 Sink Gets Source\u2019s Extended Capabilities <\/td>\n<\/tr>\n | ||||||
304<\/td>\n | Table 8-26 \u2013 Steps for a Sink getting Source extended capabilities Sequence <\/td>\n<\/tr>\n | ||||||
305<\/td>\n | Figure 8-27 \u2013 Dual-Role Source Gets Dual-Role Sink\u2019s Extended Capabilities <\/td>\n<\/tr>\n | ||||||
306<\/td>\n | Table 8-27 \u2013 Steps for a Dual-Role Source gettingDual-Role Sink extended capabilities Sequence <\/td>\n<\/tr>\n | ||||||
307<\/td>\n | Figure 8-28 \u2013 Sink Gets Source\u2019s Battery Capabilities <\/td>\n<\/tr>\n | ||||||
308<\/td>\n | Table 8-28 \u2013 Steps for a Sink getting Source Battery capabilities Sequence <\/td>\n<\/tr>\n | ||||||
309<\/td>\n | Figure 8-29 \u2013 Source Gets Sink\u2019s Battery Capabilities <\/td>\n<\/tr>\n | ||||||
310<\/td>\n | Table 8-29 \u2013 Steps for a Source getting Sink Battery capabilities Sequence <\/td>\n<\/tr>\n | ||||||
311<\/td>\n | Figure 8-30 \u2013 Source Gets Sink\u2019s Port Manufacturer Information <\/td>\n<\/tr>\n | ||||||
312<\/td>\n | Table 8-30 \u2013 Steps for a Source getting Sink\u2019s Port Manufacturer information Sequence <\/td>\n<\/tr>\n | ||||||
313<\/td>\n | Figure 8-31 \u2013 Sink Gets Source\u2019s Port Manufacturer Information <\/td>\n<\/tr>\n | ||||||
314<\/td>\n | Table 8-31 \u2013 Steps for a Source getting Sink\u2019s Port Manufacturer information Sequence <\/td>\n<\/tr>\n | ||||||
315<\/td>\n | Figure 8-32 \u2013 Source Gets Sink\u2019s Battery Manufacturer Information <\/td>\n<\/tr>\n | ||||||
316<\/td>\n | Table 8-32 \u2013 Steps for a Source gettingSink\u2019s Battery Manufacturer information Sequence <\/td>\n<\/tr>\n | ||||||
317<\/td>\n | Figure 8-33 \u2013 Sink Gets Source\u2019s Battery Manufacturer Information <\/td>\n<\/tr>\n | ||||||
318<\/td>\n | Table 8-33 \u2013 Steps for a Source gettingSink\u2019s Battery Manufacturer information Sequence <\/td>\n<\/tr>\n | ||||||
319<\/td>\n | Figure 8-34 \u2013 VCONN Source Gets Cable Plug\u2019s Manufacturer Information <\/td>\n<\/tr>\n | ||||||
320<\/td>\n | Table 8-34 \u2013 Steps for a Source getting Sink\u2019s Port Manufacturer information Sequence <\/td>\n<\/tr>\n | ||||||
321<\/td>\n | Figure 8-35 \u2013 Source requests security exchange with Sink <\/td>\n<\/tr>\n | ||||||
322<\/td>\n | Table 8-35 \u2013 Steps for a Source requesting a security exchange with a Sink Sequence <\/td>\n<\/tr>\n | ||||||
323<\/td>\n | Figure 8-36 \u2013 Sink requests security exchange with Source <\/td>\n<\/tr>\n | ||||||
324<\/td>\n | Table 8-36 \u2013 Steps for a Sink requesting a security exchange with a Source Sequence <\/td>\n<\/tr>\n | ||||||
325<\/td>\n | Figure 8-37 \u2013 Vconn Source requests security exchange with Cable Plug <\/td>\n<\/tr>\n | ||||||
326<\/td>\n | Table 8-37 \u2013 Steps for a Vconn Source requestinga security exchange with a Cable Plug Sequence <\/td>\n<\/tr>\n | ||||||
327<\/td>\n | Figure 8-38 \u2013 DFP to UFP Discover Identity <\/td>\n<\/tr>\n | ||||||
328<\/td>\n | Table 8-38 \u2013 Steps for DFP to UFP Discover Identity <\/td>\n<\/tr>\n | ||||||
329<\/td>\n | Figure 8-39 \u2013 Source Port to Cable Plug Discover Identity <\/td>\n<\/tr>\n | ||||||
330<\/td>\n | Table 8-39 \u2013 Steps for Source Port to Cable Plug Discover Identity <\/td>\n<\/tr>\n | ||||||
331<\/td>\n | Figure 8-40 \u2013 DFP to Cable Plug Discover Identity <\/td>\n<\/tr>\n | ||||||
332<\/td>\n | Table 8-40 \u2013 Steps for DFP to Cable Plug Discover Identity <\/td>\n<\/tr>\n | ||||||
333<\/td>\n | Figure 8-41 \u2013 DFP to UFP Enter Mode <\/td>\n<\/tr>\n | ||||||
334<\/td>\n | Table 8-41 \u2013 Steps for DFP to UFP Enter Mode <\/td>\n<\/tr>\n | ||||||
335<\/td>\n | Figure 8-42 \u2013 DFP to UFP Exit Mode <\/td>\n<\/tr>\n | ||||||
336<\/td>\n | Table 8-42 \u2013 Steps for DFP to UFP Exit Mode <\/td>\n<\/tr>\n | ||||||
337<\/td>\n | Figure 8-43 \u2013 DFP to Cable Plug Enter Mode <\/td>\n<\/tr>\n | ||||||
338<\/td>\n | Table 8-43 \u2013 Steps for DFP to Cable Plug Enter Mode <\/td>\n<\/tr>\n | ||||||
339<\/td>\n | Figure 8-44 \u2013 DFP to Cable Plug Exit Mode <\/td>\n<\/tr>\n | ||||||
340<\/td>\n | Table 8-44 \u2013 Steps for DFP to Cable Plug Exit Mode <\/td>\n<\/tr>\n | ||||||
341<\/td>\n | Figure 8-45 \u2013 UFP to DFP Attention <\/td>\n<\/tr>\n | ||||||
342<\/td>\n | Table 8-45 \u2013 Steps for UFP to DFP Attention <\/td>\n<\/tr>\n | ||||||
343<\/td>\n | Figure 8-46 \u2013 BIST Carrier Mode Test <\/td>\n<\/tr>\n | ||||||
344<\/td>\n | 8.3.3 State Diagrams Table 8-46 \u2013 Steps for BIST Eye Pattern Test <\/td>\n<\/tr>\n | ||||||
345<\/td>\n | Figure 8-47 \u2013 Outline of States Figure 8-48 \u2013 References to states Figure 8-49 \u2013 Example of state reference with conditions <\/td>\n<\/tr>\n | ||||||
346<\/td>\n | Figure 8-50 \u2013 Example of state reference with the same entry and exit <\/td>\n<\/tr>\n | ||||||
348<\/td>\n | Figure 8-51 \u2013 Source Port Policy Engine state diagram <\/td>\n<\/tr>\n | ||||||
354<\/td>\n | Figure 8-52 \u2013 Sink Port state diagram <\/td>\n<\/tr>\n | ||||||
358<\/td>\n | Figure 8-53 \u2013 Source Port Soft Reset and Protocol Error State Diagram <\/td>\n<\/tr>\n | ||||||
359<\/td>\n | Figure 8-54 \u2013 Sink Port Soft Reset and Protocol Error Diagram <\/td>\n<\/tr>\n | ||||||
361<\/td>\n | Figure 8-55 \u2013 Source Port Not Supported Message State Diagram Figure 8-56 \u2013 Sink Port Not Supported Message State Diagram <\/td>\n<\/tr>\n | ||||||
362<\/td>\n | Figure 8-57 \u2013 Source Port Ping State Diagram <\/td>\n<\/tr>\n | ||||||
363<\/td>\n | Figure 8-58 \u2013 Source Port Source Alert State Diagram Figure 8-59 \u2013 Sink Port Source Alert State Diagram <\/td>\n<\/tr>\n | ||||||
364<\/td>\n | Figure 8-60 \u2013 Sink Port Get Source Capabilities Extended state diagram Figure 8-61 \u2013 Source Give Source Capabilities Extended state diagram <\/td>\n<\/tr>\n | ||||||
365<\/td>\n | Figure 8-62 \u2013 Sink Port Get Source Status state diagram Figure 8-63 \u2013 Source Give Source Status state diagram <\/td>\n<\/tr>\n | ||||||
366<\/td>\n | Figure 8-64 \u2013 Get Battery Capabilities state diagram8.3.3.10.1.1 Figure 8-65 \u2013 Give Battery Capabilities state diagram <\/td>\n<\/tr>\n | ||||||
367<\/td>\n | Figure 8-66 \u2013 Get Battery Status state diagram <\/td>\n<\/tr>\n | ||||||
368<\/td>\n | Figure 8-67 \u2013 Give Battery Status state diagram Figure 8-68 \u2013 Get Manufacturer Information state diagram <\/td>\n<\/tr>\n | ||||||
369<\/td>\n | Figure 8-69 \u2013 Give Manufacturer Information state diagram Figure 8-70 \u2013 Send security request state diagram <\/td>\n<\/tr>\n | ||||||
370<\/td>\n | Figure 8-71 \u2013 Send security response state diagram Figure 8-72 \u2013 Security response received state diagram <\/td>\n<\/tr>\n | ||||||
371<\/td>\n | Figure 8-73 \u2013 DFP to UFP Data Role Swap State Diagram <\/td>\n<\/tr>\n | ||||||
374<\/td>\n | Figure 8-74 \u2013 UFP to DFP Data Role Swap State Diagram <\/td>\n<\/tr>\n | ||||||
376<\/td>\n | Figure 8-75 \u2013 Dual-Role Port in Source to Sink Power Role Swap State Diagram <\/td>\n<\/tr>\n | ||||||
379<\/td>\n | Figure 8-76 \u2013 Dual-role Port in Sink to Source Power Role Swap State Diagram <\/td>\n<\/tr>\n | ||||||
382<\/td>\n | Figure 8-77 \u2013 Dual-Role Port in Source to Sink Fast Role Swap State Diagram <\/td>\n<\/tr>\n | ||||||
385<\/td>\n | Figure 8-78 \u2013 Dual-role Port in Sink to Source Fast Role Swap State Diagram <\/td>\n<\/tr>\n | ||||||
387<\/td>\n | Figure 8-79 \u2013 Dual-Role (Source) Get Source Capabilities diagram Figure 8-80 \u2013 Dual-Role (Source) Give Sink Capabilities diagram <\/td>\n<\/tr>\n | ||||||
388<\/td>\n | Figure 8-81 \u2013 Dual-Role (Sink) Get Sink Capabilities State Diagram Figure 8-82 \u2013 Dual-Role (Sink) Give Source Capabilities State Diagram <\/td>\n<\/tr>\n | ||||||
389<\/td>\n | Figure 8-83 \u2013 Dual-Role (Source) Get Source Capabilities Extended state diagram <\/td>\n<\/tr>\n | ||||||
390<\/td>\n | Figure 8-84 \u2013 Dual-Role (Source) Give Sink Capabilities diagram <\/td>\n<\/tr>\n | ||||||
391<\/td>\n | Figure 8-85 \u2013 VCONN Swap State Diagram <\/td>\n<\/tr>\n | ||||||
394<\/td>\n | Figure 8-86 \u2013 Initiator to Port VDM Discover Identity State Diagram <\/td>\n<\/tr>\n | ||||||
395<\/td>\n | Figure 8-87 \u2013 Initiator VDM Discover SVIDs State Diagram <\/td>\n<\/tr>\n | ||||||
396<\/td>\n | Figure 8-88 \u2013 Initiator VDM Discover Modes State Diagram <\/td>\n<\/tr>\n | ||||||
397<\/td>\n | Figure 8-89 \u2013 Initiator VDM Attention State Diagram <\/td>\n<\/tr>\n | ||||||
398<\/td>\n | Figure 8-90 \u2013 Responder Structured VDM Discover Identity State Diagram <\/td>\n<\/tr>\n | ||||||
399<\/td>\n | Figure 8-91 \u2013 Responder Structured VDM Discover SVIDs State Diagram <\/td>\n<\/tr>\n | ||||||
400<\/td>\n | Figure 8-92 \u2013 Responder Structured VDM Discover Modes State Diagram <\/td>\n<\/tr>\n | ||||||
401<\/td>\n | Figure 8-93 \u2013 Receiving a Structured VDM Attention State Diagram <\/td>\n<\/tr>\n | ||||||
402<\/td>\n | Figure 8-94 \u2013 DFP VDM Mode Entry State Diagram <\/td>\n<\/tr>\n | ||||||
403<\/td>\n | Figure 8-95 \u2013 DFP VDM Mode Exit State Diagram <\/td>\n<\/tr>\n | ||||||
404<\/td>\n | Figure 8-96 \u2013 UFP Structured VDM Enter Mode State Diagram <\/td>\n<\/tr>\n | ||||||
405<\/td>\n | Figure 8-97 \u2013 UFP Structured VDM Exit Mode State Diagram <\/td>\n<\/tr>\n | ||||||
406<\/td>\n | Figure 8-98 \u2013 Cable Ready VDM State Diagram <\/td>\n<\/tr>\n | ||||||
407<\/td>\n | Figure 8-99 \u2013 Cable Plug Soft Reset State Diagram <\/td>\n<\/tr>\n | ||||||
408<\/td>\n | Figure 8-100 \u2013 Cable Plug Hard Reset State Diagram Figure 8-101 \u2013 DFP Soft Reset or Cable Reset of a Cable Plug State Diagram <\/td>\n<\/tr>\n | ||||||
410<\/td>\n | Figure 8-102 \u2013 UFP Source Soft Reset of a Cable Plug State Diagram <\/td>\n<\/tr>\n | ||||||
411<\/td>\n | Figure 8-103 \u2013 Source Startup Structured VDM Discover Identity State Diagram <\/td>\n<\/tr>\n | ||||||
413<\/td>\n | Figure 8-104 \u2013 Cable Plug Structured VDM Enter Mode State Diagram <\/td>\n<\/tr>\n | ||||||
414<\/td>\n | Figure 8-105 \u2013 Cable Plug Structured VDM Exit Mode State Diagram <\/td>\n<\/tr>\n | ||||||
415<\/td>\n | Figure 8-106 \u2013 BIST Carrier Mode State Diagram <\/td>\n<\/tr>\n | ||||||
417<\/td>\n | Table 8-47 \u2013 Policy Engine States <\/td>\n<\/tr>\n | ||||||
421<\/td>\n | 9 States and Status Reporting 9.1 Overview <\/td>\n<\/tr>\n | ||||||
422<\/td>\n | Figure 9-1 \u2013 Example PD Topology <\/td>\n<\/tr>\n | ||||||
423<\/td>\n | 9.1.1 PDUSB Device and Hub Requirements 9.1.2 Mapping to USB Device States Figure 9-2 \u2013 Mapping of PD Topology to USB <\/td>\n<\/tr>\n | ||||||
424<\/td>\n | Figure 9-3 \u2013 USB Attached to USB Powered State Transition <\/td>\n<\/tr>\n | ||||||
425<\/td>\n | 9.1.4 PDUSB Device Enumeration Figure 9-4 \u2013 Any USB State to USB Attached State Transition(When operating as a Consumer) Figure 9-5 \u2013 Any USB State to USB Attached State Transition(When operating as a Provider) <\/td>\n<\/tr>\n | ||||||
426<\/td>\n | 9.1.3 PD Software Stack Figure 9-6 \u2013 Any USB State to USB Attached State Transition(After a USB Type-C Data Role Swap) Figure 9-7 \u2013 Software stack on a PD aware OS <\/td>\n<\/tr>\n | ||||||
427<\/td>\n | 9.2 PD Class Specific Descriptors Figure 9-8 \u2013 Enumeration of a PDUSB Device Table 9-1 \u2013 USB Power Delivery Type Codes <\/td>\n<\/tr>\n | ||||||
428<\/td>\n | 9.2.1 USB Power Delivery Capability Descriptor Table 9-2 \u2013 USB Power Delivery Capability Descriptor <\/td>\n<\/tr>\n | ||||||
430<\/td>\n | 9.2.2 Battery Info Capability Descriptor 9.2.3 PD Consumer Port Capability Descriptor Table 9-3 \u2013 Battery Info Capability Descriptor <\/td>\n<\/tr>\n | ||||||
431<\/td>\n | 9.2.4 PD Provider Port Capability Descriptor Table 9-4 \u2013 PD Consumer Port Descriptor <\/td>\n<\/tr>\n | ||||||
432<\/td>\n | 9.3 PD Class Specific Requests and Events 9.3.1 Class-specific Requests Table 9-5 \u2013 PD Provider Port Descriptor Table 9-6 \u2013 PD Class Requests <\/td>\n<\/tr>\n | ||||||
433<\/td>\n | 9.4 PDUSB Hub and PDUSB Peripheral Device Requests 9.4.1 GetBatteryStatus Table 9-7 \u2013 PD Class Request Codes Table 9-8 \u2013 PD Class Feature Selectors <\/td>\n<\/tr>\n | ||||||
434<\/td>\n | Table 9-9 \u2013 Battery Status Structure <\/td>\n<\/tr>\n | ||||||
435<\/td>\n | 9.4.2 SetPDFeature Table 9-10 \u2013 Battery Wake Mask <\/td>\n<\/tr>\n | ||||||
436<\/td>\n | 10 Power Rules 10.1 Introduction 10.2 Source Power Rules 10.2.1 Source Power Rule Considerations Table 9-11 \u2013 Charging Policy Encoding <\/td>\n<\/tr>\n | ||||||
437<\/td>\n | 10.2.2 Normative Voltages and Currents Table 10-1 \u2013 Considerations for Sources Table 10-2 \u2013 Normative Voltages and Currents <\/td>\n<\/tr>\n | ||||||
438<\/td>\n | Figure 10-1 \u2013 Source Power Rule Illustration Figure 10-2 \u2013 Source Power Rule Example <\/td>\n<\/tr>\n | ||||||
439<\/td>\n | Table 10-3 \u2013 Fixed Supply PDO \u2013 Source 5V Table 10-4 \u2013 Fixed Supply PDO \u2013 Source 9V Table 10-5 \u2013 Fixed Supply PDO \u2013 Source 15V <\/td>\n<\/tr>\n | ||||||
440<\/td>\n | 10.2.3 Optional Voltages\/Currents 10.2.4 Power sharing between ports 10.3 Sink Power Rules 10.3.1 Sink Power Rule Considerations 10.3.2 Normative Sink Rules Table 10-6 \u2013 Fixed Supply PDO \u2013 Source 20V <\/td>\n<\/tr>\n | ||||||
441<\/td>\n | A. CRC calculation A.1 C code example <\/td>\n<\/tr>\n | ||||||
442<\/td>\n | A.2 Table showing the full calculation over one Message B. PD Message Sequence Examples <\/td>\n<\/tr>\n | ||||||
443<\/td>\n | B.1 External power is supplied downstream Figure B\u20131 \u2013 External Power supplied downstream <\/td>\n<\/tr>\n | ||||||
444<\/td>\n | Table B\u20131 \u2013 External power is supplied downstream <\/td>\n<\/tr>\n | ||||||
446<\/td>\n | Figure B-2 \u2013 External Power supplied upstream <\/td>\n<\/tr>\n | ||||||
447<\/td>\n | Table B\u20132 \u2013 External power is supplied downstream <\/td>\n<\/tr>\n | ||||||
451<\/td>\n | B.3 Giving back power Figure B\u20133 \u2013 Giving Back Power <\/td>\n<\/tr>\n | ||||||
452<\/td>\n | Table B\u20133 \u2013 Giving back power <\/td>\n<\/tr>\n | ||||||
459<\/td>\n | C. VDM Command Examples C.1 Discover Identity Example C.1.1 Discover Identity Command request <\/td>\n<\/tr>\n | ||||||
460<\/td>\n | C.1.2 Discover Identity Command response \u2013 Active Cable Table C\u20131 \u2013 Discover Identity Command request from Initiator Example <\/td>\n<\/tr>\n | ||||||
461<\/td>\n | Table C\u20132 \u2013 Discover Identity Command responsefrom Active Cable Responder Example <\/td>\n<\/tr>\n | ||||||
462<\/td>\n | C.1.3 Discover Identity Command response \u2013 Hub Table C\u20133 \u2013 Discover Identity Command response from Hub Responder Example <\/td>\n<\/tr>\n | ||||||
463<\/td>\n | C.2 Discover SVIDs Example C.2.1 Discover SVIDs Command request C.2.2 Discover SVIDs Command response Table C\u20134 \u2013 Discover SVIDs Command request from Initiator Example <\/td>\n<\/tr>\n | ||||||
464<\/td>\n | C.3 Discover Modes Example C.3.1 Discover Modes Command request Table C\u20135 \u2013 Discover SVIDs Command response from Responder Example <\/td>\n<\/tr>\n | ||||||
465<\/td>\n | C.3.2 Discover Modes Command response Table C\u20136 \u2013 Discover Modes Command request from Initiator Example <\/td>\n<\/tr>\n | ||||||
466<\/td>\n | C.4 Enter Mode Example C.4.1 Enter Mode Command request Table C\u20137 \u2013 Discover Modes Command response from Responder Example <\/td>\n<\/tr>\n | ||||||
467<\/td>\n | C.4.2 Enter Mode Command response Table C\u20138 \u2013 Enter Mode Command request from Initiator Example <\/td>\n<\/tr>\n | ||||||
468<\/td>\n | C.4.3 Enter Mode Command request with additional VDO Table C\u20139 \u2013 Enter Mode Command response from Responder Example <\/td>\n<\/tr>\n | ||||||
469<\/td>\n | C.5 Exit Mode Example C.5.1 Exit Mode Command request Table C\u201310 \u2013 Enter Mode Command request from Initiator Example <\/td>\n<\/tr>\n | ||||||
470<\/td>\n | C.5.2 Exit Mode Command response Table C\u201311 \u2013 Exit Mode Command request from Initiator Example <\/td>\n<\/tr>\n | ||||||
471<\/td>\n | C.6 Attention Example C.6.1 Attention Command request Table C\u201312 \u2013 Exit Mode Command response from Responder Example <\/td>\n<\/tr>\n | ||||||
472<\/td>\n | C.6.2 Attention Command request with additional VDO Table C\u201313 \u2013 Attention Command request from Initiator Example <\/td>\n<\/tr>\n | ||||||
473<\/td>\n | Table C\u201314 \u2013 Attention Command request from Initiator with additional VDO Example <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Universal serial bus interfaces for data and power – Common components. USB Power Delivery specification<\/b><\/p>\n |