Sonet sdh , Computer Networking

Assignment Help:

SONET SDH

To satisfy the  requirements  of ever increasing data rate  for diverse applications, ANS developed  a standard known as synchronous optical  network by utilizing the  enormous bandwidth of optical fibber, another very similar standard developed by ITU T  is known  as synchronous digital hierarchy. It is a synchronous TDM  systems controlled by master clock which adds predictability. The  comprehensive SONET/  synchronous digital hierarchy standard is expected to provide the  transport infrastructure for  worldwide telecommunication of or at least the next two or three  decades.

The increased configuration flexibility  and bandwidth  availability of SONEL provides significant advantages over the older telecommunication systems. These  advantages  include the followings .

a.Reduction in equipment  requirement san an increase in network   reliability.

b.Provision of  overhead and payload bytes the overhead bytes management of the  payload  bytes on an individual basis and facilitate centralized fault sectionalisation.

c.Definition of a synchronous multiplexing format for carrying lower level digital signals  and a synchronous structure that greatly simplifies the interface to digital switches digital cross connect  switches and add drop  multiplexers.

d.Availability  of a flexible  architecture capable  of accommodating  future applications  with a variety of transmission  rates.

In brief  SONET  defines optical carrier levels and electrically equivalent synchronous transport signals  for the fibber optic  based transmission hierarchy.

To  a set of synchronous signals the digital transitions in the signals  occurs  at exactly at the same  rate.

If two  digital signals are plesiochronous their  transitions occur at almost   the same rate  with any variation being constrained with in tight limits.

In t eh case  of asynchronous singles the transitions of the signals don't  necessarily occurs  a the same  nominal rate.


Related Discussions:- Sonet sdh

Single program multiple date in parallel virtual machine, Single Program Mu...

Single Program Multiple Date A common style of writing data parallel programs for MIMD computers is SPMD (single program, multiple data): all the processors implement the same

Explain about error detection, Q. Explain about Error Detection? Data c...

Q. Explain about Error Detection? Data can be corrupted during transmission because of accidents, Storms, sudden increase in electricity and voltage / decrease in signal power

What is the igp (interior gateway protocol), Any protocol used by an intern...

Any protocol used by an internetwork to exchange routing data within an autonomous system. E.g. RIP, IGRP and OSPF.

What is region, What is region? When hierarchical routing is used, the ...

What is region? When hierarchical routing is used, the routers are separated into what we will call regions, with every router knowing all the details about how to route packet

The functions of the typical server program, What are the functions of the ...

What are the functions of the typical server program? Ans) It waits for client-initiated requests. Implements many requests at the similar time. Takes care of VIP clients first.

Topology, what is difference between Star and Mesh topology?

what is difference between Star and Mesh topology?

Three main functions at layer three of the osi model, Identify the 3 major ...

Identify the 3 major functions at layer 3 of the OSI model Ans) Layer three explains the path, forwards the packet and executes software / logical addressing.

Network control protocols ncp, Network  Control  protocols ( NCP) Th...

Network  Control  protocols ( NCP) The first  ARPANET  networking protocols  was named  simply the network  control protocols in 1970,and  was created by  created by  network

Process of securing an intranet, Process of Securing an Intranet Secur...

Process of Securing an Intranet Securing an Intranet is not a simple task. Mere installation of firewall hardware and software would not help the Intranet to protect itself. P

Explain dynamic key management mechanism, Question: a) Consider the f...

Question: a) Consider the following MIP scenario. Quite a few enterprise networks use private addresses and NAPT for the communication to the Internet. i. Discu

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd