Table of Contents - G.8152.2/Y.1375.2 (2021) Amd. 2 (08/2024) -

1	Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
5.1 Information modelling conventions
6 MPLS-TP resilience functions
6.1 Linear protection functions
6.2 Ring protection functions
7 MPLS-TP resilience information model
7.1 MPLS-TP linear protection information model
7.2 MPLS-TP shared ring protection information model
7.3 UML model files
8 MPLS-TP resilience data models
8.1 MPLS-TP YANG data model
Annex A � MSRP information model
A.1 Wrapping
A.2 Steering
A.3 Short-wrapping
Appendix I � Linear protection examples
I.1 1+1/1:1 Cases
Appendix II � Examples of using the IETF MPLS static lsp models to support MPLS-TP linear protection models
II.1 JSON examples
II.2 MPLS-TP trail protection examples
II.3 MPLS-TP sub-network protection (SNC/S) examples
Appendix III � Relationship between the MPLS-TP linear protection and the reverse-engineered IETF MPLS static UML model
Appendix IV � Relationship between the linear protection state versus the path used to carry traffic
Bibliography