Path overhead - sonet sdh , Computer Networking

Path  Overhead

It is part  of SPE  and contain followings  information: Performance monitor of synchronous transport , signal , path , track ,parity ,checks,  and path  status.

702_Path  Overhead.png

                                                                                     Figure  Path Overhead

a.Path  trace byte : The JI bytes in consecutive frames form a 64 kbps channel used for  tracking the path . the JI byte send a continuous 64 bits string to verify  the connection. The choice  of the  string  is left to the application  programs.

b.Path parity byte : Byte B3 is for  bit interleaved parity  like byte B1 and B2. But calculated for the path header.

c.Path signal  label byte > Byte  C2 is the  path  identification byte. It is used to  identify different protocols  used at higher levels .

d.Path status byte > Byte  G1 is sent by the receiver to communicate  its status to the  sender.

e.Path  user channel byte : The byte 2 bytes in consecutive frames like the F1 bytes form a 64 kbps channel is reserved for user needs,, but  at the path  level.

f.Virtual tributary indicate byte H4 is the multi frame indicator. It  indicates payloads that cannot  fit in single frame. Virtual tributaries are discussed in the  next section.

 

Posted Date: 3/19/2013 1:25:31 AM | Location : United States







Related Discussions:- Path overhead - sonet sdh , Assignment Help, Ask Question on Path overhead - sonet sdh , Get Answer, Expert's Help, Path overhead - sonet sdh Discussions

Write discussion on Path overhead - sonet sdh
Your posts are moderated
Related Questions
The World  Wide Web HTTP The Hyper text Transfer Protocols( HTTP) is a protocols  used mainly to  access data on the world  wide  web. HTTP functions as a carbonation of FTP(

Relevance and Protection regarding DNS Attacks While discussing about the relevance and protection of the database, there are many things which need to consider. Almost, may o

Transmission Control Protocol (TCP) TCP makes the Internet reliable. TCP solves several problems which can occur in a packet switching system. TCP provide the given facilities:

What is TCP/IP TCP/IP is short for Transmission Control Protocol / Internet Protocol. This is a set of protocol layers that is intended to make data exchange possible on dissim

Q. Permutation representation through Matrix? Figure: Clos Network The functioning of this above permutation is displayed in Figure. This permutation is able to

Recognize the two commands that copies the configuration in NVRAM to RAM Ans) a) Copy startup-config running-config b)  Configure memory

How Intranets encourage integration of applications Intranets encourage integration of applications; such as the simple word processing application could be easily linked with

What are the features of star and ring topology The three networks have following features: star: best case is = 2, average case is = 2, worst case is = 2 ring: best case

Challenge Handshake Authentication Protocols (CHAP) CHAP as its an implies implements  a form of authentication that  requires a challenge  and a response. A CHAP authenticator

MPI contains hundreds of functions, a small subset of which is enough for most practical purposes. We shall talk about some of them in this unit. Functions for MPI Environment: