CONTENTS

 1     Scope
 2     References
 3     Terms and Definitions
 4     Abbreviations
 5     Subnetwork connection protection management model
        5.1     Overview
        5.2     SDH subnetwork connection protection requirements
 6     Managed object class definitions
        6.1     Connection protection group
        6.2     Connection protection
        6.3     Multipoint connection protection
        6.4     Subnetwork connection protection fabric
 7     Packages
        7.1     Hold off time package
 8     Attributes
        8.1     Hold off time
        8.2     Protection criteria
        8.3     Switch status
 9     Actions
        9.1     Protected connect action
        9.2     Protect unprotect connection action
10     Parameters
       10.1     Switch status
11     Name bindings
       11.1     Connection protection
       11.2     Connection protection group R1
       11.3     Cross connection
       11.4     Multipoint connection protection
       11.5     Multipoint cross connection
12     Subordination rules
13     Pointer constraints
14     Supporting ASN.1 productions
Annex A - Inheritance and naming diagrams
Annex B - Examples of subnetwork connection protection
        B.1     Legends
        B.2     Subnetwork connection protection examples
        B.3     Bidirectional subnetwork connection protection in rings
        B.4     Interconnection of protected rings by a cross-connect
        B.5     Interconnections of subnetwork with ADMs (SNCP/SNCP) in SNCP interworking
        B.6     Logical connections in SNCP interworking rings
        B.7     Logical connections in MS SHARED RINGs interworking
        B.8     Logical connections in SNCPRing and MS SHARED RING interworking
Annex C - State transition diagrams
        C.1     State diagrams
        C.2     Allowable values of switchStatus for a protected (mp) connection protection
        C.3     Allowable values of switchStatus for a protecting (mp) connection protection
        C.4     State diagram for a protected connection protection (non-revertive)
        C.5     State diagram for a protecting connection protection (non-revertive)
        C.6     State diagram for a protected connection protection (revertive)
        C.7     State diagram for a protecting connection protection (revertive)