Sonet sdh , Computer Networking

Assignment Help:

SONET SDH

To satisfy the  requirements  of ever increasing data rate  for diverse applications, ANS developed  a standard known as synchronous optical  network by utilizing the  enormous bandwidth of optical fibber, another very similar standard developed by ITU T  is known  as synchronous digital hierarchy. It is a synchronous TDM  systems controlled by master clock which adds predictability. The  comprehensive SONET/  synchronous digital hierarchy standard is expected to provide the  transport infrastructure for  worldwide telecommunication of or at least the next two or three  decades.

The increased configuration flexibility  and bandwidth  availability of SONEL provides significant advantages over the older telecommunication systems. These  advantages  include the followings .

a.Reduction in equipment  requirement san an increase in network   reliability.

b.Provision of  overhead and payload bytes the overhead bytes management of the  payload  bytes on an individual basis and facilitate centralized fault sectionalisation.

c.Definition of a synchronous multiplexing format for carrying lower level digital signals  and a synchronous structure that greatly simplifies the interface to digital switches digital cross connect  switches and add drop  multiplexers.

d.Availability  of a flexible  architecture capable  of accommodating  future applications  with a variety of transmission  rates.

In brief  SONET  defines optical carrier levels and electrically equivalent synchronous transport signals  for the fibber optic  based transmission hierarchy.

To  a set of synchronous signals the digital transitions in the signals  occurs  at exactly at the same  rate.

If two  digital signals are plesiochronous their  transitions occur at almost   the same rate  with any variation being constrained with in tight limits.

In t eh case  of asynchronous singles the transitions of the signals don't  necessarily occurs  a the same  nominal rate.


Related Discussions:- Sonet sdh

Describe the omni-directional and the directional antennas, Question: a...

Question: a) Describe the following two approaches used towards wireless frequency regulation. i. Regulated Band ii. Unlicensed Band b) An antenna is an electrical c

Security mechanism, How can the use of NAT and PAT, be considered a securit...

How can the use of NAT and PAT, be considered a security mechanism? Research the acronym(s) if it is not a part of your collection.

Try for selective repeat, - Lost as well as delayed ACKs - Bidirectional...

- Lost as well as delayed ACKs - Bidirectional transmission both side needs both sending and receiving windows Note: In selective repeat ARQ the size of the sender and rece

Cpe is an acronym for, Customer Premise Equipment (CPE) are devices physica...

Customer Premise Equipment (CPE) are devices physically located at the subscriber's premises. Includes both owned and leased equipment.

Define the term - store-and-forward and cut-through switch, Store-and-forwa...

Store-and-forward switch  The layer 2 switch accepts a frame on an input line, buffers it briefly, and then routes it to the appropriate output line. Cut-through switch

What do you mean by modems, Q. What do you mean by Modems? Telephone M...

Q. What do you mean by Modems? Telephone Modems - A telephone line has a bandwidth of approximately 2400 Hz for data transmission

Difference between tftp and ftp application layer protocols, What is the di...

What is the difference between TFTP and FTP application layer protocols? The Trivial File Transfer Protocol (TFTP) allows a local host to obtain files from a remote host but d

Explain process management and transaction management, TP Monitor does main...

TP Monitor does mainly two things extremely well. They are Process management and Transaction management? They were originally introduced to run classes of applications that co

Metropolitan area network ( man)- fundamentals of networks , Normal 0 ...

Normal 0 false false false EN-IN X-NONE X-NONE Metropolitan area Network ( MAN) Metropoli

Determine the computing infrastructure, Determine the computing infrastruct...

Determine the computing infrastructure One solution for the protection of the computing infrastructure is to use digital certificate-based solutions. Users can be given access

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd