CONTENTS

�1���� Scope
�2���� References
�3���� Terms and Definitions
�4���� Abbreviations
�5���� Subnetwork connection protection management model
������� 5.1���� Overview
������� 5.2���� SDH subnetwork connection protection requirements
�6���� Managed object class definitions
������� 6.1���� Connection protection group
������� 6.2���� Connection protection
������� 6.3���� Multipoint connection protection
������� 6.4���� Subnetwork connection protection fabric
�7���� Packages
������� 7.1���� Hold off time package
�8���� Attributes
������� 8.1���� Hold off time
������� 8.2���� Protection criteria
������� 8.3���� Switch status
�9���� Actions
������� 9.1���� Protected connect action
������� 9.2���� Protect unprotect connection action
10���� Parameters
������ 10.1���� Switch status
11���� Name bindings
������ 11.1���� Connection protection
������ 11.2���� Connection protection group R1
������ 11.3���� Cross connection
������ 11.4���� Multipoint connection protection
������ 11.5���� Multipoint cross connection
12���� Subordination rules
13���� Pointer constraints
14���� Supporting ASN.1 productions
Annex A - Inheritance and naming diagrams
Annex B - Examples of subnetwork connection protection
������� B.1���� Legends
������� B.2���� Subnetwork connection protection examples
������� B.3���� Bidirectional subnetwork connection protection in rings
������� B.4���� Interconnection of protected rings by a cross-connect
������� B.5���� Interconnections of subnetwork with ADMs (SNCP/SNCP) in SNCP interworking
������� B.6���� Logical connections in SNCP interworking rings
������� B.7���� Logical connections in MS SHARED RINGs interworking
������� B.8���� Logical connections in SNCPRing and MS SHARED RING interworking
Annex C - State transition diagrams
������� C.1���� State diagrams
������� C.2���� Allowable values of switchStatus for a protected (mp) connection protection
������� C.3���� Allowable values of switchStatus for a protecting (mp) connection protection
������� C.4���� State diagram for a protected connection protection (non-revertive)
������� C.5���� State diagram for a protecting connection protection (non-revertive)
������� C.6���� State diagram for a protected connection protection (revertive)
������� C.7���� State diagram for a protecting connection protection (revertive)