Types of vts sonet sdh, Computer Networking

Assignment Help:

Types of VTs

There are  several  option for  payload are actually mapped into the VT.  Locked mode VTs  bypass the pointers with a fixed  byte oriented mapping of limited flexibility. Floating mode  mapping use the pointers to allow the payload to float  within  the VT payload. There  are  three different  floating mode  mappings asynchronous bit synchronous and bytes synchronous.

To  accommodate mixes of different VT types  within  an STS ISPE the VTs are grouped together. An SPE can carry a mix of any  of the seven  groups. They  have no overhead  or pointer they are just a  means of organizing the different VT with in  an STS -1  SPE.  Because each  of the VT group is  allocated 12 columns of the SPE a VT group  would  contain  one the  of the  followings  combinations:

a.Four VT ( with 3 columns per VT 1.05)

b.Three  VT ( with 4 columns per VT2)

c.Two VT 3 ( with 6 columns per VT3)

d.One VT 6( with  12 columns per VT6)

e.VT 1.5 this virtual tributary canaries  one DSI signal  which  in itself carriers 24 DSO signals at 64 kbps  each. VT 1.5  is contained in three columns that is it takes up 27  bytes. Four VT can be  transported in  signal  VTG.

f.VT2 this virtual tributary carries an E1 signal of 2.048 mbps. Which consists of thirty  two 8 bit  time  slots of which  thirty  raw used  for voice  and the remaining two are used for  synchronization and control. VT2 is contained into four  columns that is it  takes  up 36 bytes.  Three VT2 can be  carried in a single VTG.

g.VT3. This virtual  tributary transport the  un channelized version  of the DSI  signal. Where the time slot  boundaries are ignored by the sending and receiving equipment. All 192 bits  are used to transport  data followed  by the 193 framing bit. It is also possible  to use the entire frame ( including  the framing bit) in  an un channelized manner. The un channelized version is known as the concatenated channel. It is  indicated by the capital c ( as opposed to the lowercase c used in SONET . VT3. Is contained in six  columns that is it takes  up 54 bytes. This  means that a VTG can carry two VT3s.

h.VT6: this virtual tributary transport a DS2 signal  which  carries 96 voice channels. VT6 is contained in twelve columns that is it takes  up 108 bytes. AVTG can carry  exactly one VT6.


Related Discussions:- Types of vts sonet sdh

What is the purpose of arp, ARP is used to search a devices MAC address giv...

ARP is used to search a devices MAC address given an IP address.

Des key, Assume the following 64-bit DES key (expressed in hexadecimal): FE...

Assume the following 64-bit DES key (expressed in hexadecimal): FEFE FEFE FEFE FEFE (a) What is the term for such a key? (b) State the value of each of the 48-bit round keys

What are the major technologies to create client application, What are the ...

What are the five major technologies that can be used to create Client/Server applications? Database Servers Groupware TP Monitors Distributed Objects Intranets.

What is the disadvantage of a star topology, What is the disadvantage of a ...

What is the disadvantage of a star topology? One major drawbacks of star topology is that once the central hub or switch get damaged, the whole network becomes unusable.

Advantages of firewall, Firewall The NAT router allows receiving of num...

Firewall The NAT router allows receiving of number of a data streams. If it receives a transmission in the form of acknowledgement or data streams or error responses from an ex

Show vpns security and the internet model, Q. Show VPNs Security and the In...

Q. Show VPNs Security and the Internet Model? - VPN's Security and the Internet Model - Application layer - provide for each application protocol (other layers may be left v

What are the compression protocols for ppp, The compression protocols for P...

The compression protocols for PPP are:- A. Stac   B. Predictor

What is data link of osi model, Q. What is data link of osi model? - Th...

Q. What is data link of osi model? - The data link layer offers access to the networking media and physical transmission across the media and this enables the data to locate it

Will the client send a tcp or udp packet, Question: (a) Explain the usa...

Question: (a) Explain the usage of the following parts of the IPv4 datagram format. i. VERS ii. HLEN iii. TOTAL LENGTH iv. SERVICE TYPE v. HEADER CHECKSUM (b) Na

Snort deployed in the dmz network, Let's consider the network shown in Figu...

Let's consider the network shown in Figure 1 where Snort is deployed. In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? In Figure 1, say True or

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd