Path overhead - sonet sdh , Computer Networking

Path  Overhead

It is part  of SPE  and contain followings  information: Performance monitor of synchronous transport , signal , path , track ,parity ,checks,  and path  status.

702_Path  Overhead.png

                                                                                     Figure  Path Overhead

a.Path  trace byte : The JI bytes in consecutive frames form a 64 kbps channel used for  tracking the path . the JI byte send a continuous 64 bits string to verify  the connection. The choice  of the  string  is left to the application  programs.

b.Path parity byte : Byte B3 is for  bit interleaved parity  like byte B1 and B2. But calculated for the path header.

c.Path signal  label byte > Byte  C2 is the  path  identification byte. It is used to  identify different protocols  used at higher levels .

d.Path status byte > Byte  G1 is sent by the receiver to communicate  its status to the  sender.

e.Path  user channel byte : The byte 2 bytes in consecutive frames like the F1 bytes form a 64 kbps channel is reserved for user needs,, but  at the path  level.

f.Virtual tributary indicate byte H4 is the multi frame indicator. It  indicates payloads that cannot  fit in single frame. Virtual tributaries are discussed in the  next section.


Posted Date: 3/19/2013 1:25:31 AM | Location : United States

Related Discussions:- Path overhead - sonet sdh , Assignment Help, Ask Question on Path overhead - sonet sdh , Get Answer, Expert's Help, Path overhead - sonet sdh Discussions

Write discussion on Path overhead - sonet sdh
Your posts are moderated
Related Questions
Difference between Unicast and Anycast Unicast: An identifier for a single interface. A packet sent to a unicast address is delivered to the interface identified by that addres

I have a larget text file of 1MB, how do i break down into chunks of packets to send over UDP? byte b[]=new byte[1024]; FileInputStream f=new FileInputStream("input.txt

What is a private IP address? Private IP addresses are allocated for use on intranets. These addresses are used for internal networks and are not routable on external public ne

Problem: (a) Application Layer protocols can be classified as connection-oriented or connectionless-oriented. i. What do you understand by the term protocol? ii. Give an e

Classification of Access Networks Access  networks  can loosely  be classified into three  categories 1. Residential Access 2. Company Access 3. Wireless Access

State the uses of groupware With the use of groupware, users can easily do most of the office related management work, which otherwise would be extremely difficult. For instanc

What are the advantages and disadvantages of the three types of routing tables? The three types of routing tables are fixed, dynamic, and fixed central. The fixed table must be

There are many types of servers:- a) File servers b) Database servers c) Transaction servers d)  Groupware servers e) Object servers Web servers.

Arrays Pointers An array is a set of the same type of data. Arrays are very well-liked data structures in parallel programming due to their easiness of use and declaration. At

Q. Which steps are used at receiver end by check sum? The receiver follows these steps: The unit is divided into "k" sections each of "n" bits All sections are