Ethereal Wake

Ethernet: Fundamentals

Much of recent professional development has focused on Ethernet, making it a convenient target for technical essays. Unlike much of the Internet, this series of essays will focus on practical implementation of Ethernet from an FPGA or ASIC perspective. This means the necessary waveforms and encodings to generate ethernet packets when directly connected to a PHY or medium.

The essays will be making extensive references to IEEE 802.3-2022 and every effort will be made to specify the exact clauses for further research by the reader. I will not be using the amendment names (e.g. 802.3z for Gigabit Ethernet) because they are not not useful for finding content within the actual standard and any given clause may have been modified by multiple amendments.

In this first essay, the focus will be on the fundamentals of Ethernet. Much of the information will be conceptual but referenced repeatedly when discussing specific protocols.

Note: The most recent version of the 802 standards are available from the IEEE Get program at no cost. It is highly advised that anyone working with Ethernet download a copy of 802.3 (Wired Ethernet).

Architecture (Clause 1.1)

Before we start diving into the specifics, it’s useful to get a model for visualizing the components of Ethernet. When discussing networking, one frequently starts with the OSI model but given that it’s based on a software model of networking, it’s woefully inadequate for describing the hardware. It simply brushes everything into a single box called “Physical Layer”. Compare that to HTTP, which gets smeared out over the top three layers despite having a fraction of the complexity.

Basic Ethernet Layer ModelApplicationPresentationSessionTransportNetworkData LinkPhysicalLLC - Logical Link ControlMAC - Media Access ControllerReconciliationxMIIPCSPMAPMDPHYMDIMedia
Mapping of Ethernet to the OSI Networking Model

For 802.3, we largely concern ourselves with the Physical Layer (Layer 1) and the lower half of the Data Link Layer (Layer 2). For most people working with embedded systems, this consists of the Media Access Controller (MAC) in Layer 2 and the PHY comprising most of Layer 1. These components typically communicate using some variant of the Media Independent Interface (xMII) and the PHY interfaces with the physical medium using a Medium Dependent Interface (MDI). The MDI and medium roughly corresponds to what people think of as “Ethernet”, e.g. 100Base-TX, 1000Base-T, 10GBase-SR, etc.

The PHY itself contains three sublayers:

Older standards, such as 10Base-T, have a different breakdown and additional sublayers may appear in more sophisticated circumstances but this is fairly consistent for modern standards.

The original Media Independent Interface was introduced with Fast Ethernet (100 Megabit) in Clause 22, where it was intended as a standard interface between Line Replaceable Units (LRU) but this usage is generally extinct. Today, it primarily used as a chip-to-chip or on-chip interface. Each subsequent Ethernet revision tends to introduce a new variant of xMII and many of the dominant interfaces are external to the 802.3 process.

The split between a processor-based MAC and a discrete PHY chip breaks down when considering higher-speed protocols like 10 Gigabit. An SFP module, for example, contains only the PMD. The PCS and PMA sublayers are usually colocated with the MAC on the processor.

Endian

Ethernet has a confusing concept of endian.

The physical interfaces group the bitstream into bundles of different sizes, from RMII with two bits to 10GBase-R with 64 bits. Within each bundle, the least significant bit is transmitted first (i.e. little endian). For example, the byte 0x83 would be transmitted 1 1 0 0 0 0 0 1 bit-at-a-time or loaded onto RMII as 11 00 00 10. This extends to computation and transmission of the FCS (discussed later).

However, protocol fields such as sizes, types, and addresses are generally loaded most-significant byte first (i.e. big endian). For example, an Ethernet frame of length 0x157 would load its length field as the bytes 01 57, which would then be presented to MII nibble-at-a-time as 1 0 7 5 due to the treatment of endian at the byte level.

This discrepancy can sometimes lead to confusion between numerical representation and transmit order. I will endeavour to provide explicit examples in these cases to help clear the ambiguity.

Ethernet Packets and Frames (Clause 3)

In 802.3 parlance, an Ethernet packet is the entire structure from the preamble through the FCS and any extension while the Ethernet frame begins with the destination address and ends with the FCS.

To assist with verification, an example packet containing an ARP frame captured from a local network is illustrated. To minimize the probability of error, this packet was captured off my home network using a Xilinx ILA attached to an RGMII PHY. The CRC was independently verified and the packet is presented unmodified.

55 55 55 55 55 55 55 D5 FF FF FF FF FF FF F8 B7 E2 04 0C 19 08 06 00 01 08 00 06 04 00 01 F8 B7 E2 04 0C 19 44 0F 43 F1 00 00 00 00 00 00 44 0F 43 FE 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 69 70 39 BB /R/R/

Preamble (Clause 3.2.1)

Example: 55 55 55 55 55 55 55

In communication systems, the purpose of a preamble is to allow the receiver to synchronize with the transmitter. It provides a regular pattern of repeating symbols to extract a timing reference, perform channel equalization, or complete any other task necessary for reliable reception. However, with the introduction of Fast Ethernet (100 Megabit), modern protocols transmit continuously in full duplex with the packet delimitated by control words, making the preamble largely vestigial.

The standard preamble is seven bytes of 0x55 (10101010 in transmit order); however, there are conditions under which the transmitter may intentionally adjust the length of this field. As a result, receivers should not assume that they will receive exactly seven bytes. The specific protocol will provide certain guarantees and implementations need to be careful they do not make incorrect assumptions.

Start Frame Delimiter (Clause 3.2.2)

Example: D5

The last byte of the preamble sequence is the Start Frame Delimiter (SFD), which has the sequence 10101011 in transmit order (0xD5 numerically). This immediately preceeds the first byte of the Ethernet frame.

Destination Address (Clause 3.2.4)

Example: FF FF FF FF FF FF

The first 48 bits (six bytes) of the Ethernet frame is the destination address. An Ethernet address, formally a EUI-48 address, has an internal structure that permits the hierarchial delegation of responsibility for assigning addresses but that is largely irrelevant from the perspective of hardware implementation. Instead, we only care whether the address identifies an individual host or a group.

The least significant bit of the first byte (i.e. the first bit transmitted) is the individual/group bit. When set, the address is treated as a group (multicast) address. All ones, as in the above example, represents the standard broadcast address. Most switches treat all group addresses as broadcast addresses but techniques such as IGMP snooping or a simple static configuration can be used to reduce the scope of traffic in a multicast-heavy environment.

Source Address (Clause 3.2.5)

Example: F8 B7 E2 04 0C 19

The next 48 bits of the Ethernet frame is the address of the transmitting host. Unlike the destination address, this should always be an individual address.

Length/Type (Clause 3.2.6)

Example: 08 06

The next 16 bits of the Ethernet frame can be interpreted as either the length or the type of the frame. This is sent most significant byte first (although the bit ordering within each byte is still little endian).

  1. When 1500 or less (0x05DC), it is to be interpreted as the number of bytes in the Client Data field, excluding any padding. For example, a payload of 47 bytes (hex 0x002F) will be transmitted as 00 2F and include one byte of padding due to the minimum frame size of 64 bytes.
  2. When 1536 or more (0x0600), it is to be interpreted as the EtherType. For example, the ARP packet in the example has an EtherType of 0x0806 and will be transmitted as 08 06.
  3. Values in between these two are invalid and should be discarded.

Note: There is no mechanism to indicate the length of a jumbo frame.

In practice, lengths are not commonly seen in modern Ethernet. Instead, standard type values are used (e.g. the 0x0806 in our example represents the ARP protocol for mapping between IPv4 and Ethernet addresses). The set of standard values, formally EtherType, are registered with the IEEE but a more accessible list of common protocols is maintained at Wikipedia.

Client Data (Clause 3.2.7) and Envelope

Example: 00 01 08 00 06 04 …

Between the Length/Type and the FCS is the client data (payload) of the frame. There are no restrictions on what data this field can contain.

The standard maximum length of the payload is 1500 bytes (for a frame of 1518 bytes) but can be exceeded in one of two ways:

  1. An envelope frame. Q-Tagging (802.1Q Clause 9) is the most common example of this, but a variety of standards exist to encapsulate customer data as it transitions a network. While a Q-Tag only extends the frame by four bytes (to a maximum of 1522 bytes), other protocols can extend it considerably longer. Clause 3.2.7 recommends a maximum of 1982 for the general handling of envelopes (for a total frame size of 2000 bytes) but the client data is still limited to 1500 bytes.
  2. Jumbo frames, those with a client payload in excess of 1500 bytes, are not defined by the 802.3 standard and are, in effect, a nonstandard extension.

Note: The ability of the FCS to detect errors decreases as the frame increases in length. The detection of four bit errors is only guaranteed with a 372 byte frame and three bit errors only being guaranteed up to 11,450 bytes. Errors can sometimes be detected even if these limits are exceeded but it is dependent on the specific nature of the error sequence. It is recommended that the higher level protocol (e.g. IP or TCP) provide additional error detection capabilities. Some variants of Ethernet embed Forward Error Correction (FEC) into the stream to provide further protection.

Note: Longer packets require stricter tolerances on the reference clocks and buffering of both peers. This can become acute for interfaces such as SGMII where the recovered clock cannot be used for PHY-MAC communications. Even the standard MTU at 10Base-T with standard oscillator tolerances can exceed the buffering capabilities of some MGTs.

Note: Due to the lack of explicit delimiters in the framing structure, it’s possible that additional bytes may be appended to the payload at the receiver interface, such as padding and the FCS, when the frame uses an EtherType instead of an explicit length.

Padding (Clause 3.2.8)

Example: 00 00 00 00 …

The Ethernet frame must be a minimum of 64 bytes, padded to this minimum by the MAC if sufficient bits are not included. The standard leaves the content as explicitly unspecified (Clause 4.2.3.3) but it is near-universal to zero-fill for security reasons.

If a received frame is shorter than this minimum, it is classified as a runt frame. These are frequently the result of collisions (in case of half-duplex operation) or buffer underruns. They can also erroneously occur in some switch implementations when 802.1Q tags are removed. Per Clause 4.2.4.2.2, runt frames are to be discarded.

Frame Check Sequence (Clause 3.2.9)

Example: 69 70 39 BB

At the end of the Ethernet frame is the 32-bit Frame Check Sequence (FCS). This is a CRC with polynomial:

G(x) =x32 +x26 +x23 +x22 +x16 +x12 +x11 +x10 +x8 +x7 +x5 +x4 +x2 +x+1

The shift register is initialized with all ones and the entire frame, starting with the destination address and continuing through the end of the padding, are shifted through in transmit order. The final register value is inverted before being shifted out to form the last field of the packet.

A common mistake when implementing a CRC is to view it like a hash: as a function that operates on bytes (or words) at a time. This leads to confusing nomenclature about bit reversals or reflections, especially for little endian protocols like Ethernet. Instead, it’s best to understand that the CRC operates bit-at-a-time and shift the register in the same direction as the underlying protocol.

This can be implemented in C as:

#define CRC_POLY UINT32_C(0xEDB88320)

uint32_t crc_ether(const uint8_t *data, size_t len) {
    uint32_t accum = ~UINT32_C(0);
    for (size_t n = 0; n < len; ++len) {
        accum ^= data[n];
        for (int b = 0; b < 8; ++b) {
            if (accum & 1) {
                accum = (accum >> 1) ^ CRC_POLY;
            } else {
                accum >>= 1;
            }
        }
    }
    return ~accum;
}

The final value of crc_ether(data, len) would then be shifted out least significant byte first without any bit reversals.

On reception, Clause 4.2.4.1.2 states that the receiver is to compute the FCS in the same manner as transmission and compare it to the value stored in the frame. While this works, a more common implementation is to send the entire frame, including the FCS, through the CRC computation. This will generate the same residual (0x2144DF1C or 1C DF 44 21 in transmit order after inversion) for all valid frames.

Note: The example C implementation is focused on algorithmic clarity, not performance, and largely models how it will be approached in HDL. The lookup tables common in software implementations are not characteristic of hardware implementations. Many HDL examples of CRC in the wild have the XOR tree explicitly spelled out. This is unnecessary as modern synthesis engines can handle the loop unrolling and logic folding without issue.

Extension (Clause 3.2.10)

Example: /R/R/

The minimum length of a packet was originally designed to exceed the round-trip time of a packet at the maximum segment length in order to facilitate the detection of collisions. Given the 100 meter maximum segment length specified in 802.3, this corresponds roughly to 10 bits at 10Base-T and 100 bits at 100Base-TX.

However, for 1000Base-T, this increases to 1000 bits (125 bytes), nearly double the minimum length of an Ethernet frame. This means that a station transmitting the minimum length frame may produce a collision it is unable to detect. 1000Base-T addressed this deficiency by introducing carrier extension, a control word that extends the packet without extending the length of the frame.

As half-duplex 1000Base-T was never commercially available, it is rarely implemented in real hardware. However, it still exists in a vestigial form in 1000Base-X (Clause 36) and derived interfaces, represented by the token /R/.

Interpacket Gap (Clause 4.2.3.2.2)

Commonly known as the interframe gap, the IPG is a period between packets where the medium is idle to provide a buffer for the sublayers forming the physical interface. This includes the insertion of delimiters to mark the extends of a packet, absorbing the difference in reference frequency between stations, and aligning the frame as required by the underlying encoding. As a result, the IPG at the receiving MAC may differ from what was generated by the transmitter.

The standard IPG is a minimum of 96 bit periods (12 bytes) and this applies to all normal forms of Ethernet. Some exotic variants of Ethernet (e.g. those involving SONET or SDH) may have more complex requirements for the interpacket gap.

Duplex (Clause 4.2.3.2, Annex 4A)

Most modern variants of Ethernet are full-duplex, providing a point-to-point link between two hosts with independent channels in each direction. Under these conditions, the two hosts can transmit continuously without consideration for the other’s activities. In this mode, the transmit process can begin once data is available from the client and the minimum interpacket gap has been honored.

Half Duplex (Clause 4.2.3.2)

Older implementations and some specialty variants, such as 10Base-T1S, are based on the concept of a shared medium which is exclusively held by one transmitter at a time. With exception to 10Base-T1S, this implemented through an algorithm known as CSMA/CD. While largely extinct in the wild, half-duplex mode can still be entered when autonegotiation is disabled or misconfigured.

Failure to provide even a rudimentary implementation of the logic (e.g. carrier sense) can lead to severe communication failures when the peer attempts to engage in collision recovery. The specifics of CSMA/CD will be discussed in the essays describing each protocol.

Full Duplex (Annex 4A)

With the near-complete extinction of half duplex, a simplified version of the MAC specification is provided in Annex 4A, which eliminates all mentions to half duplex operation.

Under Clause 4 and the original definitions of MII, the carrier sense and collision signals becomes undefined under full duplex operation. Most commercial PHYs simply continue to operate these signals unchanged between the two modes. However, Clause 4A allows the option to repurpose them.

There are conditions under which the medium is not ready for transmission, such as when leaving LPI. In these cases, the PHY may use the carrier sense signal to request deference from the MAC until the situation is resolved. This is described in Clause 4A.2.3.2.1 and largely amounts to implementing bullets 1-3 of the half duplex logic. It should be emphasized that this usage of carrier sense is not commonly supported in commercial PHYs and using it on such devices may result in significant transmission delays.

Autonegotiation

Many Ethernet variants support autonegotiation and it’s broadly implemented in the same way: the PHYs will exchange words describing their capabilities and the link configures itself based on the shared subset.

The specifics of how autonegotiation is implemented and what capabilities it can describe differs significantly between protocols: For twisted pair (Clause 28), this is a sublayer that sits below the PMD and exchanges a supported list of speeds. Whereas for optical standards (e.g. 1000Base-X, Clause 37), autonegotiation is part of the PCS, indicating duplex and flow control support in addition to fault reporting but speed is fixed.

The specifics of autonegotiation will be presented in the protocol-specific essays.

Q-Tagging (802.1Q Clause 9)

As mentioned in the Client Data section, the user payload can be wrapped in an envelope for special processing by switches and networking equipment between the source and its destination. The most common envelope seen in the wild is the Customer VLAN Tag (or C-TAG) described in 802.1Q Clause 9.

The presence of a C-TAG is identified by the Tag Protocol Identifier (TPID) 0x8100 (81 00 in transmit order) in place of the EtherType. The C-TAG extends the frame by four bytes to provide the following additional information about a packet, known as the Tag Control Information (TCI):

Together, these are inserted between the source address and the EtherType. There are encoded in the following bitfield:

Encoding of 802.1Q C-TAG87654321TPIDPCPDEIVID
Encoding of 802.1Q C-TAG

If we start with our original example frame:

FF FF FF FF FF FF F8 B7 E2 04 0C 19 08 06 00 01 08 00 06 04 00 01 F8 B7 E2 04 0C 19 44 0F 43 F1 00 00 00 00 00 00 44 0F 43 FE 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 69 70 39 BB

We can place it on VLAN 24 at default priority by adding the C-TAG:

FF FF FF FF FF FF F8 B7 E2 04 0C 19 81 00 00 18 08 06 00 01 08 00 06 04 00 01 F8 B7 E2 04 0C 19 44 0F 43 F1 00 00 00 00 00 00 44 0F 43 FE 00 00 00 00 00 00 00 00 00 00 00 00 00 00 79 C4 55 07

Alternatively, we can drop its priority and make it drop eligible, but leave it on the default VLAN:

FF FF FF FF FF FF F8 B7 E2 04 0C 19 81 00 30 00 08 06 00 01 08 00 06 04 00 01 F8 B7 E2 04 0C 19 44 0F 43 F1 00 00 00 00 00 00 44 0F 43 FE 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8D D0 E8 4A

As with any envelope, this can also extend the frame past the standard MTU. A packet at the standard MTU of 1500 would have its frame increased from 1518 to 1522 bytes after the inclusion of a C-TAG.

Note: These examples apply the tag without extending the length of the frame. Instead, four bytes are removed from the padding to accommodate the C-TAG while leaving the frame at the minimum size. This is not required or expected on the part of the sender, but it is valid and was done here to demonstrate an important point. Should a switch remove the tag when forwarding the frame, it must be prepared to extend the padding to maintain the minimum length or the frame is likely to be discarded by the recipient.

A nearly identical structure, called the Service VLAN Tag (S-TAG), is also described in in Clause 9. Instead, it uses a TPID of 0x88A8 (88 A8 in transmit order). It exists to distinguish service provider data planes from those of the customer and, in fact, an S-TAG will regularly carry C-TAGs within its envelope.

Note: As part of the 802 standards, the latest version of 802.1Q is available from the IEEE Get program at no cost. Despite its common association with VLAN tags, 802.1Q describes all forms of bridging (e.g. switches). Many of the Time Sensitive Networking (TSN) standards built on top of the features described in 802.1Q.

Flow Control (Clause 31, Annex 31B, Annex 31D)

Ethernet does not have an intrinsic concept of flow control. There is no “ready” or “wait” signal by which the receiver can apply backpressure against the transmitter. Instead, the transmitter may send data at full rate and the receiver must either accept or drop the data as it comes.

What 802.3 does provide is an optional MAC Control sublayer, described in Clause 31. This establishes a control plane using otherwise normal Ethernet frames. For the purpose of flow control, we are interested in the PAUSE (Annex 31B) and PFC (Annex 31D) operations.

PAUSE (Annex 31B)

The PAUSE operation is a fairly simply frame with the following characteristics:

An example PAUSE frame with a pause time of 0x1234 (4660 pause quanta, aka 298,240 bytes) would look like:

01 80 C2 00 00 01 F8 B7 E2 04 0C 19 88 08 00 01 12 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 C0 77 B2 C3

Upon receiving the frame, the transmitter should complete the current frame (if any) and then pause transmission of normal traffic for the requested time period. Transmission of MAC Control frames is not affected by a PAUSE operation.

If a second PAUSE frame is received during this period, it will override the previous PAUSE operation. This facilitates a manner of operation in which a max length 0xFFFF PAUSE is sent when buffers have received capacity and then sending a zero-length PAUSE after they have fallen below the target threshold.

Note: Support for PAUSE needs to be negotiated as part of the protocol’s autonegotiation mechanism and only applies to full duplex links. PAUSE frames are not used when PFC is in effect.

Priority-based Flow Control (Annex 31D, 802.1Q Clause 36)

Using Q-Tags, traffic may be sent at different priorities with different QoS guarantees. As such, when approaching link capacity, it may be desirable to slow down (pause) lower-priority traffic in order to ensure the timely delivery of higher-priority traffic. The PFC operation permits the specification of separate durations for each of the eight priorities permitted by a Q-Tag.

The structure is similar to the PAUSE frame:

An example PFC frame requesting a pause time of 0x1234 on priority two and a pause time of 0x5678 on priority one would look like:

01 80 C2 00 00 01 F8 B7 E2 04 0C 19 88 08 01 01 00 06 00 00 56 78 12 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 74 B3 B9 76

Note: Like PAUSE, support for PFC needs to be enabled. Unlike PFC, this is not handled by standard in-band autonegotiation mechanisms. Audio Video Bridging (802.1BA) makes use of PFC.

Note: As part of the 802 standards, the latest versions of 802.1Q and 802.1BA are available from the IEEE Get program at no cost.

Energy Efficient Ethernet (Clause 78)

With the exception of half-duplex operation and 10Base-T, modern Ethernet transmits continuously. This can result in a considerable power expense, especially at higher signalling rates. Energy Efficient Ethernet (EEE) is a mechanism by which the PHY can disable its transmitter during periods of low activity to save power, known as Low Power Idle (LPI). In addition to disabling the transmitter, the interface between the MAC and PHY can also be disabled, reducing power even further.

The implementation of LPI is specific to the interface, but generally involves three phases: a sleep signal indicating an intent to enter LPI, the LPI state itself (with periodic refreshes to maintain the link), and an idle period to resynchronize the link before resuming transmission. Many of these steps are managed automatically by a Base-T PHY but more direct handling is required when implementing Base-X or Base-R using the MGTs of an FPGA. The specific handling of EEE will be described with each protocol.

As 10Base-T does not transmit continuously, it does not implement LPI. Instead, 10Base-Te is a cross-compatible variant of 10Base-T with reduced signal amplitude introduced at the same time as EEE.

Precision Time Protocol (802.1AS or 1588)

The Precision Time Protocol (PTP) is a hardware-assisted time synchronization protocol capable of sub-microsecond accuracy. The timestamp point for PTP packets is the transition from the last symbol of the SFD to the first symbol of the destination address. While this can be captured by the MAC in its interface with the PHY, many PHYs have built-in PTP support and will capture the packet timestamp as it crosses to/from the medium. When implemented in this fashion, nanosecond-level accuracy is possible.

Note: As part of 802, 802.1AS (gPTP) is available from the IEEE Get program. The full PTP standard (IEEE 1588) is a paid standard.

Synchronous Ethernet (ITU-T G.8261)

As the transmit pattern in high speed ethernet runs continuously (baring the use of LPI), the receiver is able to maintain continuous synchronization to the reference clock of its peer as part of its clock recovery circuit. The ITU exploits this in their Synchronous Ethernet specifications to provide traceable time synchronization through a network. This is commonly limited to high-speed protocols such as those implemented using Base-X or Base-R which provide a high-precision reference.

Note: I am not personally familiar with the SyncE specifications and have not acquainted myself with the SyncE features of the PHYs I have used.

Note: As with the 802 standards, the ITU-T G.8261 standard is freely available from the ITU’s website.

Definitions

Carrier

In radio, “carrier” frequently refers to a sinusoid that is mixed into a modulated signal to facilitate its transmission and permit sharing of the physical medium. With exception to optical Ethernet, where the wavelength of the laser would qualify, wired Ethernet does not have a carrier in this traditional sense. The “Base” in something like 10GBase-T refers to baseband (i.e. the absence of a carrier signal).

In the context of 802.3, “carrier” (as part of carrier sense) refers to the condition when the medium is nonidle (e.g. Clause 22.2.2.11). It should not be interpreted as describing how the medium itself is being modulated.

Ethernet

I’ve seen it debated that certain network protocols (namely fiber) are not Ethernet. That is incorrect.

The name of the IEEE 802.3-2022 standard is Ethernet and anything defined by that standard is also called Ethernet. This includes fiber protocols like 10GBase-SR (Clause 52), backplane protocols like 10GBase-KR (Clause 72), and strange diversions like 10GBase-CX4 (Clause 54) in addition to classic twisted pair like 100Base-TX (Clause 25).