1
Scope
2 References
3 Terms and definitions
3.1 Terms defined
elsewhere
3.2 Terms defined in this
Recommendation
4 Abbreviations
5 Conventions
6 DCN characteristics
6.1 TMN application
6.2 ASON application
6.3 Other applications
requiring communication networks
6.4 Separation of various
applications
7 DCN functional architecture and
requirements
7.1 Specification of data
communication functions
7.2 Provisioning
requirements
7.3 Security requirements
Annex A – Requirements for three-way handshaking
A.1 Point-to-point
three-way adjacency TLV
A.2 Adjacency three-way
state
Annex B – Requirements for automatic encapsulation
B.1 Introduction
B.2 Scope
B.3 Description of the
AE-DCF
B.4 Requirements and
limitations
Appendix I – Constraints of the interworking functions in DCN
I.1 General assumptions
I.2 Common to all
scenarios
Appendix II – Example implementation of automatic
encapsulation
II.1 Introduction
II.2 Updates to Dijkstra's
algorithm
Appendix III – Commissioning guide for SDH NEs in dual RFC
1195 environment and impact of automatic encapsulation option
III.1 Introduction
III.2 Integrated IS-IS
without automatic encapsulation
III.3 Integrated IS-IS with
automatic encapsulation
Appendix IV – Example illustration of packet 1+1 protection
IV.1 Packet 1+1 protection
overview
IV.2 Packet 1+1 protection
illustration
IV.3 Operation of selector
algorithm under various failure scenarios
Bibliography