Table of Contents - G.8152.2/Y.1375.2 (2021) Amd. 2 (08/2024) -
1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 5.1 Information modelling conventions 6 MPLS-TP resilience functions 6.1 Linear protection functions 6.2 Ring protection functions 7 MPLS-TP resilience information model 7.1 MPLS-TP linear protection information model 7.2 MPLS-TP shared ring protection information model 7.3 UML model files 8 MPLS-TP resilience data models 8.1 MPLS-TP YANG data model Annex A � MSRP information model A.1 Wrapping A.2 Steering A.3 Short-wrapping Appendix I � Linear protection examples I.1 1+1/1:1 Cases Appendix II � Examples of using the IETF MPLS static lsp models to support MPLS-TP linear protection models II.1 JSON examples II.2 MPLS-TP trail protection examples II.3 MPLS-TP sub-network protection (SNC/S) examples Appendix III � Relationship between the MPLS-TP linear protection and the reverse-engineered IETF MPLS static UML model Appendix IV � Relationship between the linear protection state versus the path used to carry traffic Bibliography
|