CONTENTS

 

 1     Scope 
 2     References 
 3     Terms and definitions       
        3.1     Terms defined elsewhere    
        3.2     Terms defined in this Recommendation       
 4     Abbreviations   
 5     Conventions     
 6     DCN characteristics        
        6.1     TMN application   
        6.2     ASON application 
        6.3     Other applications requiring communication networks         
        6.4     Separation of various applications  
 7     DCN functional architecture and requirements      
        7.1     Specification of data communication functions         
        7.2     Provisioning requirements   
        7.3     Security requirements         
Annex A – Requirements for three-way handshaking     
        A.1     Point-to-point three-way adjacency TLV  
        A.2     Adjacency three-way state
Annex B – Requirements for automatic encapsulation     
        B.1     Introduction          
        B.2     Scope    
        B.3     Description of the AE-DCF           
        B.4     Requirements and limitations          
Appendix I – Constraints of the interworking functions in DCN     
        I.1        General assumptions        
        I.2        Common to all scenarios  
Appendix II – Example implementation of automatic encapsulation     
       II.1     Introduction           
       II.2     Updates to Dijkstra's algorithm       
Appendix III – Commissioning guide for SDH NEs in dual RFC 1195 environment and impact of automatic encapsulation option     
      III.1     Introduction           
      III.2     Integrated IS-IS without automatic encapsulation    
      III.3     Integrated IS-IS with automatic encapsulation         
Appendix IV – Example illustration of packet 1+1 protection     
       IV.1     Packet 1+1 protection overview   
       IV.2     Packet 1+1 protection illustration  
       IV.3     Operation of selector algorithm under various failure scenarios       
Bibliography