�1���� Scope
������� 1.1���� Structure of this Recommendation
�2����
References
�3����
Definitions
�4����
Abbreviations
�5����
Subnetwork connection protection management model
������� 5.1���� Overview
������� 5.2���� SDH subnetwork connection protection requirements
�6����
Managed object class definitions
������� 6.1���� Connection protection group
������� 6.2���� Connection protection
������� 6.3���� Multipoint connection protection
������� 6.4���� Subnetwork connection protection fabric
�7����
Packages
������� 7.1���� Hold off time package
�8����
Attributes
������� 8.1���� Hold off time
������� 8.2���� Protection criteria
������� 8.3���� Switch status
�9����
Actions
������� 9.1���� Protected connect action
������� 9.2���� Protect unprotect connection action
10���� Parameters
������ 10.1���� Switch status
11���� Name bindings
������ 11.1���� Connection protection
������ 11.2���� Connection protection group
������ 11.3���� Cross connection
������ 11.4���� Multipoint connection protection
������ 11.5���� Multipoint cross connection
12���� Subordination rules
13���� Pointer constraints
14���� Supporting ASN.1 productions
Annex A � Inheritance and naming diagrams
Annex B � Examples of subnetwork connection protection
������ �B.1���� Legends
������� B.2���� Subnetwork connection protection examples
������� B.3���� Bidirectional subnetwork connection protection in rings
������� B.4���� Interconnection of protected rings by a cross-connected
������� B.5���� Interconnections of subnetwork with ADMs (SNCP/SNCP) in SNCP
interworking
������� B.6���� Logical connections in SNCP interworking rings
������� B.7���� Logical connections in MS SHARED RINGs interworking
������� B.8���� Logical connections in SNCP Ring and MS SHARED RING interworking
Annex C � State transition diagrams
������� C.1���� State diagrams
������� C.2���� Allowable values of switchStatus for a protected (mp)
connection protection
������� C.3���� Allowable values of switchStatus for a protecting (mp)
connection protection
������� C.4���� State diagram for a protected connection protection
(non-revertive)
������� C.5���� State diagram for a protecting connection protection
(non-revertive)
������� C.6���� State diagram for a protected connection protection
(revertive)
� ������C.7���� State diagram
for a protecting connection protection (revertive)