Sonet sdh , Computer Networking

Assignment Help:

SONET SDH

To satisfy the  requirements  of ever increasing data rate  for diverse applications, ANS developed  a standard known as synchronous optical  network by utilizing the  enormous bandwidth of optical fibber, another very similar standard developed by ITU T  is known  as synchronous digital hierarchy. It is a synchronous TDM  systems controlled by master clock which adds predictability. The  comprehensive SONET/  synchronous digital hierarchy standard is expected to provide the  transport infrastructure for  worldwide telecommunication of or at least the next two or three  decades.

The increased configuration flexibility  and bandwidth  availability of SONEL provides significant advantages over the older telecommunication systems. These  advantages  include the followings .

a.Reduction in equipment  requirement san an increase in network   reliability.

b.Provision of  overhead and payload bytes the overhead bytes management of the  payload  bytes on an individual basis and facilitate centralized fault sectionalisation.

c.Definition of a synchronous multiplexing format for carrying lower level digital signals  and a synchronous structure that greatly simplifies the interface to digital switches digital cross connect  switches and add drop  multiplexers.

d.Availability  of a flexible  architecture capable  of accommodating  future applications  with a variety of transmission  rates.

In brief  SONET  defines optical carrier levels and electrically equivalent synchronous transport signals  for the fibber optic  based transmission hierarchy.

To  a set of synchronous signals the digital transitions in the signals  occurs  at exactly at the same  rate.

If two  digital signals are plesiochronous their  transitions occur at almost   the same rate  with any variation being constrained with in tight limits.

In t eh case  of asynchronous singles the transitions of the signals don't  necessarily occurs  a the same  nominal rate.


Related Discussions:- Sonet sdh

Advantages and disadvantages of client-server method, 1. Write a critical a...

1. Write a critical analysis of the client/server vs. service architecture method for developing service architectures.  You must explain what the client/server method is in terms

Clock-driven scheme , Assume that the clock-driven scheme for generating st...

Assume that the clock-driven scheme for generating starting sequence numbers is used with a 16-bit wide clock counter (that is, sequence numbers range from 0 to 2^16).  The clock t

Different types of subnet classfull networks are present, How many dissimil...

How many dissimilar types of subnet classful networks are present?

Linked list for parallel algorithms, Linked List A linked list is a dat...

Linked List A linked list is a data structure composed of zero or extra nodes linked by pointers. Each node consists of two parts, as shown in Figure: info field having specifi

What is the frame relay, What is the Frame relay, in which layer it comes? ...

What is the Frame relay, in which layer it comes? Ans) Frame relay is an industry standard, shared access, switched Data Link Layer encapsulation that services many virtual circ

Shortest path - network layer and routing , Shortest path  The  dijkst...

Shortest path  The  dijkstra algorithms  four steps to discover what it called  the shortest path  tree . a.The algorithm  beings  to build  the tree identifying  its root.

What is raid in ccna, A method used to standardize and categorize fault-tol...

A method used to standardize and categorize fault-tolerant disk systems. RAID levels give lot of mixes of performance, reliability, and cost. Some servers give three of the RAID le

Public key cryptography and private key cryptography, Question: a) Di...

Question: a) Differentiate between the following key terms used in any e-banking security system: (i) Authorisation v/s Authentication. (ii) Data Integrity v/s Data Conf

Explain the importance of authentication, Explain the importance of authent...

Explain the importance of authentication. Authentication is the method of verifying a user's credentials before he can log into the network. It is normally performed using a us

Software overheads in parallel programming , Besides these hardware overhea...

Besides these hardware overheads, there are certain software overheads imposed by libraries, parallel compilers, tools and operating systems. The parallel programming languages

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd