Path overhead - sonet sdh , Computer Networking

Assignment Help:

Path  Overhead

It is part  of SPE  and contain followings  information: Performance monitor of synchronous transport , signal , path , track ,parity ,checks,  and path  status.

702_Path  Overhead.png

                                                                                     Figure  Path Overhead

a.Path  trace byte : The JI bytes in consecutive frames form a 64 kbps channel used for  tracking the path . the JI byte send a continuous 64 bits string to verify  the connection. The choice  of the  string  is left to the application  programs.

b.Path parity byte : Byte B3 is for  bit interleaved parity  like byte B1 and B2. But calculated for the path header.

c.Path signal  label byte > Byte  C2 is the  path  identification byte. It is used to  identify different protocols  used at higher levels .

d.Path status byte > Byte  G1 is sent by the receiver to communicate  its status to the  sender.

e.Path  user channel byte : The byte 2 bytes in consecutive frames like the F1 bytes form a 64 kbps channel is reserved for user needs,, but  at the path  level.

f.Virtual tributary indicate byte H4 is the multi frame indicator. It  indicates payloads that cannot  fit in single frame. Virtual tributaries are discussed in the  next section.

 


Related Discussions:- Path overhead - sonet sdh

use dijkstras shortest-path algorithm compute short path, Consider the fol...

Consider the following network example. With the indicated link costs along each link in the figure, use Dijkstra's shortest-path algorithm to compute the shortest path from x to a

Firewalls - point to point, Firewalls After several  security  related ...

Firewalls After several  security  related internet  newsgroups  started overflowing  with posts it becomes  clear something  hand to done to help  secure  networks. The first

Internet backbone - computer network, Internet Backbone Internet backb...

Internet Backbone Internet backbone  is the  physical  networks ( usually relying  on fiber optic  cable ) that  carries  internet  traffic between  different  networks  and i

Briefly describe three security requirements of an agent, QUESTION (a) ...

QUESTION (a) Briefly describe three security requirements of an agent (b) List four threats that may be caused by malicious hosts to mobile agents (c) Describe the forwar

Connectionless service, In connectionless schema, there is no connection re...

In connectionless schema, there is no connection required. The source of data includes destination information in data and transmit to the network. Network transmit each data item

How a token ring networks allows sharing of bandwidth, Question: (a) E...

Question: (a) Explain how a Token Ring networks allows sharing of bandwidth (access control). (b) (i) CSMA/CD is not appropriate for wireless communication. Explain wh

Types of Networking, How can I identify the difference types of networks

How can I identify the difference types of networks

Explain the Physical layer, Explain the Physical layer The Physical lay...

Explain the Physical layer The Physical layer of the OSI model sets standards for sending and receiving electrical signals among devices. It explains how digital data (bits) ar

System analysis, explain the appropriateness of economic and behavioral fea...

explain the appropriateness of economic and behavioral feasibility

Purpose of the tcp three step handshakes, Identify the purpose of the TCP t...

Identify the purpose of the TCP three step handshakes Ans) The three step handshake establishes the parameters needed for a TCP connection. During the handshake process series n

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd