1 Scope
2 References
3 Terms and definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations
5 Conventions
6 DCN characteristics
6.1 TMN application
6.2 Control plane application (ASON and MPLS-TP)
6.3 Other applications requiring communication networks
6.4 Separation of various applications
7 DCN functional architecture and requirements
7.1 Specification of data communication functions
7.2 Provisioning requirements
7.3 Security requirements
Annex A – Requirements for three-way handshaking
A.1 Point-to-point three-way adjacency TLV
A.2 Adjacency three-way state
Annex B – Requirements for automatic encapsulation
B.1 Introduction
B.2 Scope
B.3 Description of the AE-DCF
B.4 Requirements and limitations
Annex C – MPLS-TP to SCC and MCC adaptation functions
C.1 MT/SCC_A adaptation function
C.2 MT/MCC_A adaptation function
Appendix I – Constraints of the interworking functions in DCN
I.1 General assumptions
I.2 Common to all scenarios
Appendix II – Example implementation of automatic encapsulation
II.1 Introduction
II.2 Updates to Dijkstra's algorithm
Appendix III – Commissioning guide for SDH NEs in dual [IETF RFC 1195] environment
and impact of automatic encapsulation option
III.1 Introduction
III.2 Integrated IS-IS without automatic encapsulation
III.3 Integrated IS-IS with automatic encapsulation
Appendix IV – Example illustration of packet 1+1 protection
IV.1 Packet 1+1 protection overview
IV.2 Packet 1+1 protection illustration
IV.3 Operation of selector algorithm under various failure scenarios
Bibliography