1 Scope
2
References
3
Definitions
4
Symbols and abbreviations
5
Protection switching principles
5.1 General principles, requirements and objectives
5.1.1 General principles
5.1.2 General
requirements and objectives
5.2 Examples of network protected domains
5.3 Extent of the protected domain
5.3.1 Trail protection
5.3.2 Subnetwork connection protection
5.3.3 1+1 non-intrusive monitored subnetwork
connection protection (SNC/N)
5.3.4 Relationship between the protected domain
and the extent of OAM flows
5.4 Dependency on physical layer network configuration
5.5 Protection switching configurations
5.5.1 (1:1) configuration
5.5.2 (1+1) configuration
5.5.3 (1:n) configuration
5.5.4 (m:n) configuration
5.6 Protection
switching performance
5.7 Hold-off function in ATM survivability escalation
5.8 Protection switching control protocol
6
ATM VP/VC protection switching
6.1 Specific requirements and objectives
6.2 Protection switching trigger mechanism
6.2.1 Operator control
6.2.2 Trigger for signal fail
6.2.3 Trigger for signal degrade
7
ATM VP/VC Group protection switching
7.1 Specific
requirements and objectives
7.2 Architecture
7.2.1 Introduction
7.2.2 General
7.2.3 VPG/VCG 1+1 protection architecture
7.2.4 VPG/VCG 1:1 protection architecture
7.2.5 VPG/VCG 1:N (N>1) protection
architecture
7.2.6 VPG/VCG M:N protection architecture
7.3 Protection switch trigger mechanism
7.3.1 Operator control
7.3.2 Trigger for signal fail
7.3.3 Trigger for signal degrade
Annex A – Protection switching coordination protocol for 1+1/1:1 configurations
A.1 General introduction
A.1.1 Application architecture
A.1.2 Compliance with network objectives
A.2 1+1/1:1 Linear protection switching protocol
A.2.1 Switch initiation criteria
A.2.2 K1/K2 byte generation rules
A.2.3 1+1/1:1 Linear protection switching
algorithm
Annex B – 1+1 unidirectional SNC and trail protection switching operation
B.1 Application architecture
B.2 Compliance with network objectives
B.3 Switch initiation
criteria
B.3.1 Externally initiated commands
B.3.2 Automatically initiated commands
B.3.3 States
B.4 Protection switching protocol
B.5 1+1 unidirectional protection switching algorithm operation
B.5.1 Control of the bridge
B.5.2 Control of the selector
B.5.3 Revertive mode
B.5.4 Non-revertive mode