Wideband digital cross connects, Computer Networking

Wideband Digital Cross Connects

A SONET  cross  connect  accepts  various  optical  carries  rates accesses the  STS signals  and switches at this level . it  is idally used at a SONET hub as shown  in  one major  difference  between a cross  connect  and an add drop  multiplexer is that  broadband cross connect can be  used for grooming  of STS  is or for broadband traffic management. For  example it may be used to segregate high bandwidth from low  bandwidth traffic and send it separately to high bandwidth   switch  and a low bandwidth  switch. It is the synchronous equivalent of aDS-3  digital cross connect  and support hubbed networks.

581_Wideband Digital Cross Connects.png

                                                                   Wideband Digital Cross Connects

 

Posted Date: 3/19/2013 12:58:41 AM | Location : United States







Related Discussions:- Wideband digital cross connects, Assignment Help, Ask Question on Wideband digital cross connects, Get Answer, Expert's Help, Wideband digital cross connects Discussions

Write discussion on Wideband digital cross connects
Your posts are moderated
Related Questions
When you move the NIC cards from one PC to another PC, does the MAC address gets transferred as well? Yes, that's because MAC addresses are hard-wired into the NIC circuitry, n

Processor Arrangements It is a very frequent event in data parallel programming to group a number of processors to perform definite tasks. To reach this goal, HPF gives a direc

Root DNS Servers A root  server is a serve which  consists of the entire  hierarchy  of servers. A root  server  usually  does not  store any  information  about  domains  but

What must be true for two Routers running IGRP to communicate their routes? Ans) Similar autonomous system number

In formation  sharing at  regular intervals For example  every 30 seconds each router sends its information  about the  whole  network  to its  neighbours. This sharing  occurs

What is the function of the OSI Session Layer? This layer gives the protocols and means for two devices on the network to communicate with each other by holding a session.  Thi

Relevance and Protection regarding DNS Attacks While discussing about the relevance and protection of the database, there are many things which need to consider. Almost, may o

codefor FLSM

QUESTION (a) Briefly describe three security requirements of an agent (b) List four threats that may be caused by malicious hosts to mobile agents (c) Describe the forwar

Fundamentals of intranet Introduction The history of the Intranet starts right from the days when computer networks came in. However, it could find a name and place for it