CONTENTS

 1     Scope 
 2     References 
        2.1     Normative references         
        2.2     Informative references        
 3     Definitions  
 4     Abbreviations   
 5     Classification of functions 
 6     Service scenarios, service features and required functions 
        6.1     Description of functions with service features          
        6.2     Examples of service scenarios and required functions          
 7     Architecture classification 
        7.1     Provider network architecture        
        7.2     Customer network architecture      
        7.3     Management architecture   
 8     Layer 1 VPN functional architecture concepts      
        8.1     Architecture constructs      
        8.2     Resource allocation schemes          
        8.3     Private addressing  
 9     Layer 1 VPN functional entities architecture         
        9.1     Membership information maintenance and connectivity policy management  
        9.2     Routing information maintenance and route computation      
        9.3     Connection control
        9.4     Management          
10     Examples of functional architecture          
       10.1     Distributed provider network architecture  
       10.2     Hybrid provider network architecture        
       10.3     Centralized provider network architecture 
11     Implementation examples of functional architecture          
       11.1     Overview 
       11.2     Distributed provider network architecture  
       11.3     Hybrid provider network architecture        
       11.4     Centralized provider network architecture 
12     Security aspects  
Annex A – Detailed description of CE and PE    
        A.1     Architecture of CE participating in multiple Layer 1 VPNs (constructs from ITU-T Recs        G.805 and G.8080/Y.1304)    
        A.2     Architecture of PE participating in multiple Layer 1 VPNs  (constructs from ITU-T        Recs G.805 and G.8080/Y.1304)    
        A.3     Architecture of CE and PE in relation with management systems     
Appendix I – Implementation examples of existing mechanisms for Layer 1 VPN    
BIBLIOGRAPHY