Sonet sdh , Computer Networking

Assignment Help:

SONET SDH

To satisfy the  requirements  of ever increasing data rate  for diverse applications, ANS developed  a standard known as synchronous optical  network by utilizing the  enormous bandwidth of optical fibber, another very similar standard developed by ITU T  is known  as synchronous digital hierarchy. It is a synchronous TDM  systems controlled by master clock which adds predictability. The  comprehensive SONET/  synchronous digital hierarchy standard is expected to provide the  transport infrastructure for  worldwide telecommunication of or at least the next two or three  decades.

The increased configuration flexibility  and bandwidth  availability of SONEL provides significant advantages over the older telecommunication systems. These  advantages  include the followings .

a.Reduction in equipment  requirement san an increase in network   reliability.

b.Provision of  overhead and payload bytes the overhead bytes management of the  payload  bytes on an individual basis and facilitate centralized fault sectionalisation.

c.Definition of a synchronous multiplexing format for carrying lower level digital signals  and a synchronous structure that greatly simplifies the interface to digital switches digital cross connect  switches and add drop  multiplexers.

d.Availability  of a flexible  architecture capable  of accommodating  future applications  with a variety of transmission  rates.

In brief  SONET  defines optical carrier levels and electrically equivalent synchronous transport signals  for the fibber optic  based transmission hierarchy.

To  a set of synchronous signals the digital transitions in the signals  occurs  at exactly at the same  rate.

If two  digital signals are plesiochronous their  transitions occur at almost   the same rate  with any variation being constrained with in tight limits.

In t eh case  of asynchronous singles the transitions of the signals don't  necessarily occurs  a the same  nominal rate.


Related Discussions:- Sonet sdh

Difference between authentication and deauthentication, Difference between ...

Difference between Authentication and Deauthentication Authentication: Used to establish the self of stations to each other. Deauthentication: This service is appealed whene

Overview of the various network topologies, QUESTION Write a report to ...

QUESTION Write a report to explain the concept of LAN and WAN including the various components of the telecommunication infrastructure required by UTM Ltd. You are required to

Define virtual channel, Virtual channel is normally a link from one source...

Virtual channel is normally a link from one source to one destination, although multicast connections are also allowed. The other name for virtual channel is virtual circuit.

How can you identify the ip class of a given ip address, How can you identi...

How can you identify the IP class of a given IP address? By looking at the first octet of any given IP address, you can recognize whether it's Class A, B or C. If the first oct

cisco ios for which encapsulation, "arpa" is used by the Cisco IOS for whi...

"arpa" is used by the Cisco IOS for which encapsulation types Ans) Ethernet_II

eigrp protocol update route information, How does EIGRP protocol update ro...

How does EIGRP protocol update route information to its neighbors

Methods of reliability prediction, I NTRODUCTION Reliability  predicti...

I NTRODUCTION Reliability  prediction  is  an  important  method  for  evaluating  a  system design, right from its conceptual stage through development and manufacture and al

Define power management in wireless network, Question 1 Brief the Fourth g...

Question 1 Brief the Fourth generation network. List its advantages and disadvantages Question 2 Explain the steps involved in component identification and call establishm

Evolution of data communication, Question 1 Discuss the following         ...

Question 1 Discuss the following                     Evolution of Data Communication                     Elements of Data Communication System Question 2 Explain the following

Disk encryption and block cipher, Suppose AES (or any block cipher) is used...

Suppose AES (or any block cipher) is used to encrypt data. Which mode of encryption covered in class is best suited for each of the following two scenarios and why? If more than on

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd