Types of vts sonet sdh, Computer Networking

Assignment Help:

Types of VTs

There are  several  option for  payload are actually mapped into the VT.  Locked mode VTs  bypass the pointers with a fixed  byte oriented mapping of limited flexibility. Floating mode  mapping use the pointers to allow the payload to float  within  the VT payload. There  are  three different  floating mode  mappings asynchronous bit synchronous and bytes synchronous.

To  accommodate mixes of different VT types  within  an STS ISPE the VTs are grouped together. An SPE can carry a mix of any  of the seven  groups. They  have no overhead  or pointer they are just a  means of organizing the different VT with in  an STS -1  SPE.  Because each  of the VT group is  allocated 12 columns of the SPE a VT group  would  contain  one the  of the  followings  combinations:

a.Four VT ( with 3 columns per VT 1.05)

b.Three  VT ( with 4 columns per VT2)

c.Two VT 3 ( with 6 columns per VT3)

d.One VT 6( with  12 columns per VT6)

e.VT 1.5 this virtual tributary canaries  one DSI signal  which  in itself carriers 24 DSO signals at 64 kbps  each. VT 1.5  is contained in three columns that is it takes up 27  bytes. Four VT can be  transported in  signal  VTG.

f.VT2 this virtual tributary carries an E1 signal of 2.048 mbps. Which consists of thirty  two 8 bit  time  slots of which  thirty  raw used  for voice  and the remaining two are used for  synchronization and control. VT2 is contained into four  columns that is it  takes  up 36 bytes.  Three VT2 can be  carried in a single VTG.

g.VT3. This virtual  tributary transport the  un channelized version  of the DSI  signal. Where the time slot  boundaries are ignored by the sending and receiving equipment. All 192 bits  are used to transport  data followed  by the 193 framing bit. It is also possible  to use the entire frame ( including  the framing bit) in  an un channelized manner. The un channelized version is known as the concatenated channel. It is  indicated by the capital c ( as opposed to the lowercase c used in SONET . VT3. Is contained in six  columns that is it takes  up 54 bytes. This  means that a VTG can carry two VT3s.

h.VT6: this virtual tributary transport a DS2 signal  which  carries 96 voice channels. VT6 is contained in twelve columns that is it takes  up 108 bytes. AVTG can carry  exactly one VT6.


Related Discussions:- Types of vts sonet sdh

Bit stuffing, bit stuffing program in python

bit stuffing program in python

Network ownership, NETWORK OWNERSHIP:   There are two types in this ...

NETWORK OWNERSHIP:   There are two types in this case: 1. Private Network 2. Public Network

Sockets, When programming a server or a client, we have to deal with port n...

When programming a server or a client, we have to deal with port numbers and IP addresses, but we usually do this through an abstraction called a socket. Sockets are the standard A

Illustrate 802.11b HR DSSS, 802.11b HR DSSS a) High-rate DSSS using a ...

802.11b HR DSSS a) High-rate DSSS using a 2.4 GHz band b) Similar to DSSS excluding for encoding method c) Uses complementary code keying (CCK), encoding 4 or 8 bits to

When a switch is said to be congested, When a switch is said to be congeste...

When a switch is said to be congested? It is possible that a switch receives packets faster than the shared link can accommodate and keeps in its memory, for an extended period

Illustrate about the working of socks protocol, Illustrate about the workin...

Illustrate about the working of Socks protocol SOCKS is an open, industry-standard protocol advanced by the Authenticated Firewall Traversal working group of the IETF (Internet

Improvements for the wireline lan infrastructure, 5. CSMA/CD based Ethernet...

5. CSMA/CD based Ethernet LANs in various sites and Frame Relay (FR) service to connect them together. You want to make a difference in the organization by upgrading the LANs to be

Command to configure a explanation on an interface, Recognize the command t...

Recognize the command to configure a explanation on an interface Ans) Router(config-if)# explanation Finance department

Define the method of encryption and decryption using by ssl, Encryption/dec...

Encryption/decryption using by SSL Once a session is established, the SSL generates a session key using public-key encryption to exchange information between the client and ser

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd