CONTENTS

 1     Scope 
 2     References
 3     Terms and definitions   
 4     Abbreviations 
 5     Conventions   
 6     DCN characteristics     
        6.1     TMN application
        6.2     ASTN application        
        6.3     Other applications requiring communication networks  
        6.4     Separation of various applications        
 7     DCN functional architecture and requirements 
        7.1     Specification of data communication functions  
        7.2     Provisioning requirements        
        7.3     Security requirements    
Annex A – Requirements for three-way handshaking    
        A.1     Point-to-Point three-way adjacency TLV       
        A.2     Adjacency three-way state       
Annex B – Requirements for automatic encapsulation    
        B.1     Introduction      
        B.2     Scope   
        B.3     Description of the AE-DCF     
        B.4     Requirements and limitations    
Appendix I – Constraints of the interworking functions in DCN    
        I.1       General assumptions    
        I.2       Common to all scenarios
Appendix II – Example implementation of automatic encapsulation    
       II.1     Introduction       
       II.2     Updates to Dijkstra's Algorithm 
Appendix III – Commissioning guide for SDH NEs in dual RFC 1195 environment and impact of automatic encapsulation option    
      III.1     Introduction       
      III.2     Integrated IS-IS without automatic encapsulation        
      III.3     Integrated IS-IS with automatic encapsulation   
Appendix IV – Example illustration of packet 1+1 protection    
       IV.1     Packet 1+1 protection overview
       IV.2     Packet 1+1 protection illustration       
       IV.3     Operation of selector algorithm under various failure scenarios
Appendix V – Bibliography