Types of vts sonet sdh, Computer Networking

Types of VTs

There are  several  option for  payload are actually mapped into the VT.  Locked mode VTs  bypass the pointers with a fixed  byte oriented mapping of limited flexibility. Floating mode  mapping use the pointers to allow the payload to float  within  the VT payload. There  are  three different  floating mode  mappings asynchronous bit synchronous and bytes synchronous.

To  accommodate mixes of different VT types  within  an STS ISPE the VTs are grouped together. An SPE can carry a mix of any  of the seven  groups. They  have no overhead  or pointer they are just a  means of organizing the different VT with in  an STS -1  SPE.  Because each  of the VT group is  allocated 12 columns of the SPE a VT group  would  contain  one the  of the  followings  combinations:

a.Four VT ( with 3 columns per VT 1.05)

b.Three  VT ( with 4 columns per VT2)

c.Two VT 3 ( with 6 columns per VT3)

d.One VT 6( with  12 columns per VT6)

e.VT 1.5 this virtual tributary canaries  one DSI signal  which  in itself carriers 24 DSO signals at 64 kbps  each. VT 1.5  is contained in three columns that is it takes up 27  bytes. Four VT can be  transported in  signal  VTG.

f.VT2 this virtual tributary carries an E1 signal of 2.048 mbps. Which consists of thirty  two 8 bit  time  slots of which  thirty  raw used  for voice  and the remaining two are used for  synchronization and control. VT2 is contained into four  columns that is it  takes  up 36 bytes.  Three VT2 can be  carried in a single VTG.

g.VT3. This virtual  tributary transport the  un channelized version  of the DSI  signal. Where the time slot  boundaries are ignored by the sending and receiving equipment. All 192 bits  are used to transport  data followed  by the 193 framing bit. It is also possible  to use the entire frame ( including  the framing bit) in  an un channelized manner. The un channelized version is known as the concatenated channel. It is  indicated by the capital c ( as opposed to the lowercase c used in SONET . VT3. Is contained in six  columns that is it takes  up 54 bytes. This  means that a VTG can carry two VT3s.

h.VT6: this virtual tributary transport a DS2 signal  which  carries 96 voice channels. VT6 is contained in twelve columns that is it takes  up 108 bytes. AVTG can carry  exactly one VT6.

Posted Date: 3/19/2013 1:29:15 AM | Location : United States







Related Discussions:- Types of vts sonet sdh, Assignment Help, Ask Question on Types of vts sonet sdh, Get Answer, Expert's Help, Types of vts sonet sdh Discussions

Write discussion on Types of vts sonet sdh
Your posts are moderated
Related Questions

What are the Data link protocols? Data link protocols are sets of specifications used to implement the data link layer. The categories of Data Link protocols are 1. Asynchro

Two neighbouring nodes (A and B) use a Go-Back-N protocol with a 3-bit sequence number and a window size of 4. Acknowledgments are cumulative. Assuming A is transmitting and B is r

The following DNA sequences are extracted from promoter region of genes which are co-regulated by the same transcription factor (TF). The nucleotide segments capitalized in the giv

What is workstation? A workstation is a node in network that is more useful and can occur local information processing or graphics processing. A workstation generally has an in

IEEE 8021.d Spanning Tree Protocol (STP) was developed to stop routing loops in a network. If a router, switch, or hub has more than one path to the similar destination, a routing

Question 1 Differentiate LAN and WAN Question 2 Explain the TCP/IP Reference Model with diagram Question 3 Describe Circuit switching and message switching Question

DLCI- Data Link Connection Identifier. A frame-relay service provider usually assigns DLCI values that are used by frame-relay to distinguish among different virtual circuits on th

Question 1 Who initiates the ‘Trap' message? When is this message generated? Question 2 Discuss the features of a typical Network Management System.List (Fault Management,

What are the Unix-based firewalls The Unix-based firewalls are considered most secured as compared to the Windows NT based ones. The firewalls bind the holes of the operating