�1����
Scope
�2���� References
�3���� Terms and Definitions
�4���� Abbreviations
�5���� Subnetwork connection protection
management model
������� 5.1���� Overview
������� 5.2���� SDH subnetwork connection
protection requirements
�6���� Managed object class definitions
������� 6.1���� Connection protection group
������� 6.2���� Connection protection
������� 6.3���� Multipoint connection protection
������� 6.4���� Subnetwork connection protection
fabric
�7���� Packages
������� 7.1���� Hold off time package
�8���� Attributes
������� 8.1���� Hold off time
������� 8.2���� Protection criteria
������� 8.3���� Switch status
�9���� Actions
������� 9.1���� Protected connect action
������� 9.2���� Protect unprotect connection
action
10���� Parameters
������ 10.1���� Switch status
11���� Name bindings
������ 11.1���� Connection protection
������ 11.2���� Connection protection group R1
������ 11.3���� Cross connection
������ 11.4���� Multipoint connection protection
������ 11.5���� Multipoint cross connection
12���� Subordination rules
13���� Pointer constraints
14���� Supporting ASN.1 productions
Annex A -
Inheritance and naming diagrams
Annex B - Examples
of subnetwork connection protection
������� B.1���� Legends
������� B.2���� Subnetwork connection protection
examples
������� B.3���� Bidirectional subnetwork
connection protection in rings
������� B.4���� Interconnection of protected rings
by a cross-connect
������� B.5���� Interconnections of subnetwork
with ADMs (SNCP/SNCP) in SNCP interworking
������� B.6���� Logical connections in SNCP
interworking rings
������� B.7���� Logical connections in MS SHARED
RINGs interworking
������� B.8���� Logical connections in SNCPRing
and MS SHARED RING interworking
Annex C - State
transition diagrams
������� C.1���� State diagrams
������� C.2���� Allowable values of switchStatus
for a protected (mp) connection protection
������� C.3���� Allowable values of switchStatus
for a protecting (mp) connection protection
������� C.4���� State diagram for a protected
connection protection (non-revertive)
������� C.5���� State diagram for a protecting
connection protection (non-revertive)
������� C.6���� State diagram for a protected
connection protection (revertive)
������� C.7���� State diagram for a protecting
connection protection (revertive)