Path overhead - sonet sdh , Computer Networking

Assignment Help:

Path  Overhead

It is part  of SPE  and contain followings  information: Performance monitor of synchronous transport , signal , path , track ,parity ,checks,  and path  status.

702_Path  Overhead.png

                                                                                     Figure  Path Overhead

a.Path  trace byte : The JI bytes in consecutive frames form a 64 kbps channel used for  tracking the path . the JI byte send a continuous 64 bits string to verify  the connection. The choice  of the  string  is left to the application  programs.

b.Path parity byte : Byte B3 is for  bit interleaved parity  like byte B1 and B2. But calculated for the path header.

c.Path signal  label byte > Byte  C2 is the  path  identification byte. It is used to  identify different protocols  used at higher levels .

d.Path status byte > Byte  G1 is sent by the receiver to communicate  its status to the  sender.

e.Path  user channel byte : The byte 2 bytes in consecutive frames like the F1 bytes form a 64 kbps channel is reserved for user needs,, but  at the path  level.

f.Virtual tributary indicate byte H4 is the multi frame indicator. It  indicates payloads that cannot  fit in single frame. Virtual tributaries are discussed in the  next section.

 


Related Discussions:- Path overhead - sonet sdh

Why we use numbering frames, Q. Why we use numbering frames? Why numbe...

Q. Why we use numbering frames? Why numbering frames? Stop--and-wait ARQ, 1. Numbering Frames prevents the retaining of duplicate frames.. 2. Numbered acknowled

Cost saving - application layer, Cost Saving Better performance  scala...

Cost Saving Better performance  scalability  and viability  translates into  saving  for  website  operators.  Because  fewer  application  web servers are required  to meet

Security - fundamentals of networks, Security Security  is the  protec...

Security Security  is the  protection of hardware software and data  from  unauthorized access. Restricted physical  access to computer password protection limiting  user priv

Binary addition, using binary adition, what is the result of 1010 + 10? Usi...

using binary adition, what is the result of 1010 + 10? Using binary addition, how would you repeatedly increment a number by 2?

Telecommunication switching system, if the signal input to an amplifier is ...

if the signal input to an amplifier is 0 dBm what is the power output in mW if the gain of the amplifier is 20 dB ?

What is the protocol number for tcp, Transmission Control Protocol - TCP i...

Transmission Control Protocol - TCP is a connection oriented transport layer protocol with built unreliability. It considers a large block of data and breaks it down into segments

What are the important benefits of computer network, Q. What are the import...

Q. What are the important benefits of computer network? Ans: Important benefits of computer networks are: -  Resource sharing -  Higher reliability -  Higher flexibili

Ipx traffic on a network, To monitor ipx traffic on a network, what command...

To monitor ipx traffic on a network, what command would we use? Ans) show ipx traffic

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd