1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
5.1 UML modelling conventions
5.2 Model artefact lifecycle stereotype conventions
5.3 Forwarding entity terminology conventions
5.4 Conditional package conventions
5.5 Pictorial diagram conventions
6 Model overview
6.1 Development and use of the ITU-T G.7711/Y.1702 Generic
information model
6.2 Core Network model – Forwarding and termination model
6.3 Core Foundation model
6.4 Core Network model – Topology model
6.5 Core Network model – Resilience model
6.6 Core Physical model
6.7 Core Specification model
6.8 Control model
6.9 OAM model
6.10 Operation pattern model
6.11 Processing construct model
7 Other aspects
7.1 Key reference materials
7.2 Data dictionary
7.3 Terminology mapping
7.4 Core model enhancement
7.5 Future core model work areas
8 UML model Papyrus files
Annex A – Modelling principles and guidelines, and tooling
A.1 UML modelling guidelines
A.2 Papyrus and Github guidelines
Annex B – Forwarding and Termination model
B.1 Forwarding and termination model detail
B.2 Explanatory figures
B.3 Work in progress
Annex C – Foundation – Identifiers, naming and states
C.1 Naming and identifiers
C.2 States
Annex D – Topology model
D.1 Topology model
D.2 Explanatory figures
D.3 Work in progress
Annex E – Resilience model
E.1 Resilience model detail
E.2 Protection schemes considered
E.3 Protection of other functions of physical things
E.4 Work in progress
Annex F – Physical model
F.1 Physical model detail
F.2 Work in progress
Annex G – Specification model
G.1 Introduction to the Specification model
G.2 Purpose of the specification model
G.3 Dedicated specification structures
Annex H – Control model
H.1 Model of control component and views
H.2 Understanding the control component and view model
Annex I – OAM model
Annex J – Operation patterns
J.1 Introduction to the operation patterns
J.2 Purpose and essentials of the operation patterns
J.3 Future work
Annex K – Processing construct
K.1 Purpose and essentials of processing construct
K.2 Explanatory figures
K.3 Further considerations
Appendix I – Mapping of ITU-T G.7711/Y.1702 to ONF technical
recommendations
I.1 Model Structural Patterns and Architecture
(Appendix V)
I.2 Rationale behind the CIM (Appendix VI)
I.3 Analogue and media (L0) examples (Appendix VII)
I.4 Circuit switched (L1 & L2) examples (Appendix
VIII)
I.5 Packet switched (L2 & L3) examples (Appendix
IX)
I.6 Control and Signalling examples (Appendix X)
Page
I.7 Timing and synchronization examples (Appendix XI)
I.8 Processing construct examples (Appendix XII)
I.9 Specification examples (Appendix XIII)
I.10 Resilience examples (Appendix XIV)
I.11 Application (L4 and above) examples (Appendix XV)
Appendix II – Data dictionary
Appendix III – Terminology mapping
III.1 Terminology mapping table
III.2 Detailed view of transport application programming interface to
core model mapping
III.3 Model evolution
Appendix IV – Core model enhancement
IV.1 Controller model
IV.2 State extensions
IV.3 Model structure rules
IV.4 Strict composition
IV.5 Multiplicity restrictions
Appendix V – Model structure, patterns and architecture
V.1 A progression patterns – intertwining and unfolding
Appendix VI – Model rationale
VI.1 Business need
VI.2 Benefit of the CIM
VI.3 Model evolution
Appendix VII – Analogue and media (Layer 0) examples
VII.1 Optical Media
Appendix VIII – Circuit switched (L1) examples
VIII.1 General circuit examples
VIII.2 Circuit layer examples
Appendix IX – Packet switched (L2 and L3) examples
Appendix X – Control and signalling examples
Appendix XI – Timing and synchronization examples
XI.1 Network synchronization overview
XI.2 Processing of timing information in a node
XI.3 Synchronization model attributes
Appendix XII – Processing construct examples
XII.1 General examples
Appendix XIII – Specification examples
XIII.1 General examples
Appendix XIV – Resilience examples
XIV.1 Linear protection schemes
XIV.2 Mesh network cases
XIV.3 Ethernet ring protection [ITU-T G.8032]
XIV.4 Other protected ring schemes
Appendix XV – Application (L4 and above) examples
Bibliography