Physical configurations sonet sdh , Computer Networking

Physical Configurations

Transport signal multiplexer de multiplexer. It either  signal from multiple   sources into a STS singles  or de multiplexes and STS signal  into different  signals .

Regenerator it is a repeater that takes  a received optical  signal and regenerates it  functions  in the data  link layer. A SONET  regenerator replace  some of the existing overhead information  with new  information.

Add drop multiplexer can add signals  coming  from different  sources into a given  path  or remove  a desired signals  from  a path  redirect it without  de multiplexing the entire signal .

Posted Date: 3/19/2013 12:52:57 AM | Location : United States







Related Discussions:- Physical configurations sonet sdh , Assignment Help, Ask Question on Physical configurations sonet sdh , Get Answer, Expert's Help, Physical configurations sonet sdh Discussions

Write discussion on Physical configurations sonet sdh
Your posts are moderated
Related Questions

Computer Networks 1. Differentiate WAN and LAN. 2. Describe the TCP/IP Reference Model with diagram. 3. Explain Circuit switching and message switching. 4. List the fu

Why it is necessary to have layering in a network? A computer network is a very complex system. It becomes very difficult to execute as a single entity. The layered approach di

Explain how does router share information in Distance Vector routing?

Coaxial Cable Coaxial  cable  carries signals  of higher  frequency ranges than those in twisted pair cable. In part  because the two media are constructed quite  differently.

Q. Applications of networks? End systems (hosts): - Run application programs - Example email, Web - At -edge of network Client/server model - Client host

i have an assigment due and want some one to do my assognment

How to prevent the data from hackers In order to prevent intruders from entering the house, it is necessary for the house owner to look after the behaviour of internal and exte

Internet addresses are divided in five distinct types of classes. The classes were designated A by E. class A address space lets a small number of networks although a large number

DNS - Protocol Attacks Generally, in the DNS protocol, flaws are based on the implementation issues. The three common issues are generally, associated which can be of one of t