Path overhead - sonet sdh , Computer Networking

Path  Overhead

It is part  of SPE  and contain followings  information: Performance monitor of synchronous transport , signal , path , track ,parity ,checks,  and path  status.

702_Path  Overhead.png

                                                                                     Figure  Path Overhead

a.Path  trace byte : The JI bytes in consecutive frames form a 64 kbps channel used for  tracking the path . the JI byte send a continuous 64 bits string to verify  the connection. The choice  of the  string  is left to the application  programs.

b.Path parity byte : Byte B3 is for  bit interleaved parity  like byte B1 and B2. But calculated for the path header.

c.Path signal  label byte > Byte  C2 is the  path  identification byte. It is used to  identify different protocols  used at higher levels .

d.Path status byte > Byte  G1 is sent by the receiver to communicate  its status to the  sender.

e.Path  user channel byte : The byte 2 bytes in consecutive frames like the F1 bytes form a 64 kbps channel is reserved for user needs,, but  at the path  level.

f.Virtual tributary indicate byte H4 is the multi frame indicator. It  indicates payloads that cannot  fit in single frame. Virtual tributaries are discussed in the  next section.

 

Posted Date: 3/19/2013 1:25:31 AM | Location : United States







Related Discussions:- Path overhead - sonet sdh , Assignment Help, Ask Question on Path overhead - sonet sdh , Get Answer, Expert's Help, Path overhead - sonet sdh Discussions

Write discussion on Path overhead - sonet sdh
Your posts are moderated
Related Questions
Control Frames for Lost Tokens If station goes down ... token lost Predecessor listens for data frame or token Noticing none, retransmits token Sends whofoll

1. Suppose the datagram source allocates 12 bytes for this option. Then when the datagram leaves the source host, the RR option area will be like this: 7 12 4 0 0 0 0 0 0 0 0 0

Q. Show the Flow characteristics? Flow characteristics Reliability - if lacking means that packets or ACKs are lost - more important with FTP, SMTP than with audio

Ajax is a relatively new set of techniques that, in a sense, implement some of the functionalities originally provided by RPC. Ajax is primarily used to build web applications with

This is a report, I am working on another one. This report is on finding a better solution dealing with customer, wifi, management, etc.

Q. What is Bipolar Encoding? - Uses three voltage levels negative, positive and zero - Zero level represents binary 0; 1s are represented with alternating positive and negat

This code properly implements the IP checksum function on a 32-bit machine: unsigned short cksum(unsigned short *buf, int count) { unsigned long sum = 0; while (count--) { sum += *

Intrinsic Functions HPF introduces some new intrinsic functions in addition to those defined in F90. The two most regularly used in parallel programming are the system inquiry

Can you define how L2F data tunneling process works?

What are the key functions of data link layer? Data link layer transfers data in a structured and reliable manner so that the service given by the physical layer is utilized by