CONTENTS

 1     Scope        
 2     References             
 3     Definitions
        3.1     Terms defined elsewhere      
        3.2     Terms defined in this Recommendation          
 4     Abbreviations         
 5     Conventions           
        5.1     Representation of octets        
 6     Introduction           
 7     Ring protection characteristics        
        7.1     Monitoring methods and conditions   
        7.2     Ethernet traffic and bandwidth consideration 
        7.3     Ethernet ring protection switching performance         
 8     Ring protection conditions and commands  
 9     Ring protection architectures          
        9.1     Revertive and non-revertive switching            
        9.2     Protection switching triggers 
        9.3     Protection switching models on a single Ethernet ring
        9.4     Traffic channel blocking        
        9.5     R-APS channel blocking          
        9.6     FDB flush      
        9.7     Ethernet ring protection switching models for interconnection
10     Protection control protocol             
       10.1     Principles of operations        
       10.2     Protection switching behaviour         
       10.3     R-APS format           
       10.4     Failure of protocol defect     
Appendix I – Ring protection network objectives    
Appendix II – Ethernet ring network objectives    
Appendix III – Ring protection scenarios     
Appendix IV – Considerations for the different timers    
       IV.1     State machine use of timers  
       IV.2     Guard timer use to block outdated R-APS messages    
Appendix V – Interconnected rings example    
        V.1     Configuration for interconnected rings           
        V.2     Topology examples for interconnected Ethernet rings
Appendix VI – Protection switching for multiple ERP instances    
       VI.1     Multiple ERP instances          
       VI.2     Applying protection mechanisms to multiple ERP instances     
       VI.3     Protection switching model for multiple ERP instances            
       VI.4     Multiple instances of interconnected rings     
Appendix VII – Guidelines for the configuration of VIDs and Ring-IDs of R-APS channels    
      VII.1     Sub-ring with R-APS virtual channel   
      VII.2     Example 3: Sub-ring without R-APS virtual channel model; each R-APS channel with different VIDs    
      VII.3     Example 4: Co-existence on an Ethernet ring of Ethernet ring nodes which support this Recommendation (v2) and the previous version (v1) of this Recommendation    
Appendix VIII – Flush optimization    
     VIII.1     Flushing FDB consideration   
     VIII.2     Scenarios of unnecessary FDB flushing            
     VIII.3     Example of FDB flush optimization     
     VIII.4     Additional definition for ERP control process model and state machine             
     VIII.5     DNF status   
Appendix IX – Guidelines for management procedures    
       IX.1     An example procedure for removing an Ethernet ring node     
       IX.2     Management procedures to exit the FS state in case of failure of an Ethernet ring node under an FS condition    
       IX.3     Replacing a v1 Ethernet ring node with a v2 Ethernet ring node           
Appendix X – Minimizing segmentation in interconnected rings    
        X.1     Characterization of the segmentation issue    
        X.2     Class of double faults addressed         
        X.3     Procedure for minimization of segmentation  
Appendix XI – End-to-end service resilience    
       XI.1     Generic end-to-end service resilience
       XI.2     Layering ITU-T G.8031 protection over ITU-T G.8032   
       XI.3     End-to-end service that traverses interconnected rings            
Bibliography