Sonet sdh , Computer Networking

Assignment Help:

SONET SDH

To satisfy the  requirements  of ever increasing data rate  for diverse applications, ANS developed  a standard known as synchronous optical  network by utilizing the  enormous bandwidth of optical fibber, another very similar standard developed by ITU T  is known  as synchronous digital hierarchy. It is a synchronous TDM  systems controlled by master clock which adds predictability. The  comprehensive SONET/  synchronous digital hierarchy standard is expected to provide the  transport infrastructure for  worldwide telecommunication of or at least the next two or three  decades.

The increased configuration flexibility  and bandwidth  availability of SONEL provides significant advantages over the older telecommunication systems. These  advantages  include the followings .

a.Reduction in equipment  requirement san an increase in network   reliability.

b.Provision of  overhead and payload bytes the overhead bytes management of the  payload  bytes on an individual basis and facilitate centralized fault sectionalisation.

c.Definition of a synchronous multiplexing format for carrying lower level digital signals  and a synchronous structure that greatly simplifies the interface to digital switches digital cross connect  switches and add drop  multiplexers.

d.Availability  of a flexible  architecture capable  of accommodating  future applications  with a variety of transmission  rates.

In brief  SONET  defines optical carrier levels and electrically equivalent synchronous transport signals  for the fibber optic  based transmission hierarchy.

To  a set of synchronous signals the digital transitions in the signals  occurs  at exactly at the same  rate.

If two  digital signals are plesiochronous their  transitions occur at almost   the same rate  with any variation being constrained with in tight limits.

In t eh case  of asynchronous singles the transitions of the signals don't  necessarily occurs  a the same  nominal rate.


Related Discussions:- Sonet sdh

How xor operations can implement key stream attacks, Question: a) In a...

Question: a) In a wireless network where WEP is enforced as security mechanism, what procedure would the network manager adopt for changing WEP default keys. b) Using Pla

Message passing programming, Message passing is probably the most extensive...

Message passing is probably the most extensively used parallel programming paradigm today. It is the mainly natural, portable and efficient approach for distributed memory systems.

Categories of encryption - decryption, Q. Categories of Encryption - Decryp...

Q. Categories of Encryption - Decryption ? Categories of Encryption/Decryption - Symmetric-key - encryption key (Ke) and the decryption key (Kd) are the same and secret

computer computinons, Difference between synchronous tdm and statistical t...

Difference between synchronous tdm and statistical tdm

Discuss about the jpeg and ldap, Discuss  about the JPEG and LDAP J...

Discuss  about the JPEG and LDAP JPEG: Stands for Joint Photographic Experts Group.  A standard format of storing digitized, colour, or black-and-white photographs. JPEG fi

Link layer process, Each link layer process will have two connections: one ...

Each link layer process will have two connections: one "up" to the appropriate IP layer process, and one "sideways" to the link layer process on the simulated machine at the other

Determine the use of icon, Determine the use of Icon A small picture...

Determine the use of Icon A small picture or graphic used to represent a location in the inter- or Intranet (for example a flow-chart graphic to take the user to the departm

State the term - lot of care required while programming, State the term - L...

State the term - Lot of care required while programming It is a common and well-known saying that many developers of "secure systems" leave a "back door" way for themselves so

What is aspects of security, Q. What is Aspects of Security? - Securit...

Q. What is Aspects of Security? - Security Attack: Any action whichcompromises the security of information owned by an organization. - Security Mechanism: A mechanism th

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd