Table of Contents

 1     Scope        
 2     References             
 3     Terms and definitions         
        3.1     Terms defined elsewhere      
        3.2     Terms defined in this Recommendation          
 4     Abbreviations         
 5     Conventions           
 6     DCN characteristics            
        6.1     TMN application       
        6.2     Control plane application (ASON and MPLS-TP)           
        6.3     Other applications requiring communication networks            
        6.4     Separation of various applications      
 7     DCN functional architecture and requirements        
        7.1     Specification of data communication functions            
        7.2     Provisioning requirements     
        7.3     Security requirements           
Annex A – Requirements for three-way handshaking    
        A.1     Point-to-point three-way adjacency TLV          
        A.2     Adjacency three-way state    
Annex B – Requirements for automatic encapsulation    
        B.1     Introduction 
        B.2     Scope           
        B.3     Description of the AE-DCF     
        B.4     Requirements and limitations            
Annex C – MPLS-TP to SCC and MCC adaptation functions    
        C.1     MT/SCC_A adaptation function          
        C.2     MT/MCC_A adaptation function        
Appendix I – Constraints of the interworking functions in DCN    
        I.1               General assumptions     
        I.2               Common to all scenarios            
Appendix II – Example implementation of automatic encapsulation    
       II.1     Introduction  
       II.2     Updates to Dijkstra's algorithm           
Appendix III – Commissioning guide for SDH NEs in dual [IETF RFC 1195] environment and impact of automatic encapsulation option    
      III.1     Introduction  
      III.2     Integrated IS-IS without automatic encapsulation         
      III.3     Integrated IS-IS with automatic encapsulation 
Appendix IV – Example illustration of packet 1+1 protection    
       IV.1     Packet 1+1 protection overview         
       IV.2     Packet 1+1 protection illustration      
       IV.3     Operation of selector algorithm under various failure scenarios          
Bibliography