1
Scope
2
References
3
Terms and definitions
4
Abbreviations
5
Conventions
6
DCN characteristics
6.1 TMN application
6.2 ASTN application
6.3 Other applications requiring communication networks
6.4 Separation of various applications
7
DCN functional architecture and requirements
7.1 Specification of data communication functions
7.2 Provisioning requirements
7.3 Security requirements
Annex A –
Requirements for three-way handshaking
A.1 Point-to-Point three-way adjacency TLV
A.2 Adjacency three-way state
Annex B –
Requirements for automatic encapsulation
B.1 Introduction
B.2 Scope
B.3 Description of the AE-DCF
B.4 Requirements and limitations
Appendix I –
Constraints of the interworking functions in DCN
I.1 General assumptions
I.2 Common to all scenarios
Appendix II – Example
implementation of automatic encapsulation
II.1 Introduction
II.2 Updates to Dijkstra's Algorithm
Appendix III –
Commissioning guide for SDH NEs in dual RFC 1195 environment and impact of
automatic encapsulation option
III.1 Introduction
III.2 Integrated IS-IS without automatic encapsulation
III.3 Integrated IS-IS with automatic encapsulation
Appendix IV – Example
illustration of packet 1+1 protection
IV.1 Packet 1+1 protection overview
IV.2 Packet 1+1 protection illustration
IV.3 Operation of selector algorithm under various failure
scenarios
Appendix
V – Bibliography