Path layer - sonet sdh , Computer Networking

Path Layer

The path  layer maps services  such as DS3, FDDI, and ATM into the SONET  payload formal. This layer  provides  end to end  communications  signals  labelling path maintenance and control  and is accessible only  through terminating equipment. A SONET  ADM accesses the path  layer overhead a cross  connect  systems that performs  section and line layer processing does  not require  access to  the path  layer overhead.

Posted Date: 3/19/2013 1:05:57 AM | Location : United States







Related Discussions:- Path layer - sonet sdh , Assignment Help, Ask Question on Path layer - sonet sdh , Get Answer, Expert's Help, Path layer - sonet sdh Discussions

Write discussion on Path layer - sonet sdh
Your posts are moderated
Related Questions
In multiprocessing, various processors have to to communicate with each other. Therefore, synchronisation is needed between them. The correctness and performance of parallel execut


Q. Show the TCP connections? Connection establishment Three-way handshake Why is two-way handshake not enough? Connection termination Four steps

Initialization  Imagine that  all routers in our  sample internetwork  comes up  at the  same time. Each router sends a greeting packet to its  neighbours to find  out the  sta

What is Star topology Each station is directly connected to a common central node. Typically, each station attaches to a central node via two point-to-point links, one for tran

The diagram below offers an overall view on the methods use by both the OSI and TCP/IP model. ISO Approach - Occasionally called Horizontal Approach - OSI asse

Transmission robustness and security Unless properly designed, a wireless LAN might be interference prone and simply eavesdropped. The design of a wireless LAN must allow relia

The entire idea of ISDN is to digitize the telephone network to allow the transmission of video, audio and text over existing telephone lines. The reason of the ISDN is to provide

Question 1 requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption t