1    
Scope  
 2     References  
       
2.1     Normative
references          
       
2.2     Informative
references         
 3     Definitions   
 4     Abbreviations    
 5     Classification of functions  
 6     Service
scenarios, service features and required functions  
        6.1     Description of functions with
service features           
       
6.2     Examples of
service scenarios and
required functions           
 7     Architecture classification  
       
7.1     Provider network architecture         
        7.2     Customer network architecture       
        7.3     Management architecture    
 8     Layer 1 VPN
functional
architecture concepts       
       
8.1     Architecture constructs       
       
8.2     Resource
allocation schemes           
       
8.3     Private addressing   
 9     Layer 1 VPN functional entities
architecture          
        9.1     Membership information maintenance
and connectivity policy management   
        9.2     Routing information maintenance and route computation       
        9.3     Connection control
        9.4     Management           
10     Examples of functional architecture           
       10.1     Distributed provider network architecture   
       10.2     Hybrid provider network architecture         
       10.3     Centralized provider network architecture  
11     Implementation examples of functional architecture           
       11.1     Overview  
       11.2     Distributed provider network architecture   
       11.3     Hybrid provider network architecture         
       11.4     Centralized provider network architecture  
12     Security aspects   
Annex A – Detailed description of CE and PE     
        A.1     Architecture of CE participating
in multiple Layer 1 VPNs (constructs
from ITU-T Recs        G.805 and
G.8080/Y.1304)     
        A.2     Architecture of PE participating in
multiple Layer 1 VPNs  (constructs from ITU-T        Recs G.805 and G.8080/Y.1304)     
        A.3     Architecture of CE and PE in
relation with management systems      
Appendix I – Implementation examples of existing mechanisms for Layer 1
VPN     
BIBLIOGRAPHY