Preview

Ethernet over Sdh

Powerful Essays
Open Document
Open Document
4662 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethernet over Sdh
Ethernet-over-Sonet Tutorial
In order to support increasing data traffic levels, equipment developers must build systems that map Ethernet packets over Sonet/SDH links. In this two-part series we'll lay out the encapsulation techniques required to make Ethernet-over-Sonet come to life.
Today's incumbent service providers are seeking to accommodate increasing demands for bandwidth, security and service level management resulting from the proliferation of LAN-based applications. According to RHK, 2.4 million metro Ethernet ports distributed among 10/100/1000 Mbps rates are expected to be deployed by 2006. These Ethernet ports will primarily be used to support these emerging applications: • Broadband Internet access for e-mail and web-based content • Packet-based video conferencing • Tunneled virtual private networks (VPNs) • E-commerce hosting for outsourced applications services such as customer relationship management (CRM)
Storage area networking (SAN) for outsourced access/management of server content including disaster recovery services
The big issue carriers face is how to handle Ethernet traffic. Depending on the cost, distance, bandwidth, and traffic management requirements of the WAN/MAN application, several metro approaches may be used to transport Ethernet data traffic. These include direct mapping of Ethernet over wavelengths (EoW), Ethernet over Sonet/SDH (EoS), optical Ethernet (i.e. native Ethernet over fiber for long haul, 1000BaseLX), or implementing an Ethernet in the first mile (EFM) solution over copper or fiber. Of all these solutions, EoS is the one gaining the most ground with today's developers.
In this two-part series, we'll lay out some of the key requirements for mapping Ethernet frames over Sonet/SDH links. In part 1, we'll look at the advantages EoS brings to an equipment designer. We'll also begin a discussion on encapsulation techniques, looking at virtual concatenation and the link capacity adjustment scheme

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1310 Unit 3 Exercise 1

    • 443 Words
    • 2 Pages

    Application (in terms of cabling infrastructure) – systems supported by telecommunications cabling; includes Ethernet, Token ring, Fiber Distributed Data Interface (FDDI), and Asynchronous Transfer Mode (ATM)…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NTC362 INDP part 1

    • 815 Words
    • 3 Pages

    When designing this new system the importance of both standards in network as well as the importance of communication protocols will help to make sure the network works smoothly and devices on the network can talk to each other. Currently Kudler is using a SONET which is “An ANSI standard, incorporated into the SDH standard, that defines a line rate hierarchy and frame formats for use with high-speed optical fiber transmission systems” (Goleniewski & Jarrett, 2007, p. 800)…

    • 815 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Checkpoint Week 3 It242

    • 407 Words
    • 2 Pages

    You have been contracted to build a network for a multimedia development firm that currently uses a 10-Mbps Ethernet network. The company requires a high-bandwidth network for the multimedia team, which constantly views and manipulates large files across the network. The company is expecting moderate growth. You are to come up with a solution to support the high bandwidth applications and growth potential of this company.…

    • 407 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The next steps ethnet will be taking will be to increases speed and security. An organization using medical equipment or financial information has to consider what security protocols and policies it would use. Using Category 6 twisted pair cabling. These cables are hardier versions of Cat5E and are covered in a shielding that prevents them from being compromised by electrical wiring or magnetic fields. Once the speeds of Ethernet have been completely maxed out, the next upgrade will have to the security features they provide.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 987 Words
    • 4 Pages

    The IEEE maintains the industry standards for Ethernet Protocols (or applications). This is part of the 802.3 series of standards and includes applications such as 1000Base-T, 1000Base-SX, 10GBase-T, and 10GBase-SR.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Trulove, J. (2005). “Designing LAN Wiring Systems.” LAN wiring (3rd ed.). McGraw-Hill Professional. P. 23. ISBN 0-07-145975-8.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    IT220 Unit 5 assignment

    • 286 Words
    • 2 Pages

    Ethernet LANs: collection of devices which use IEEE Ethernet standards at the physical and data link layers, so that the devices can send Ethernet frames to each other…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IEEE802 standard series protocol, the data link layer includes a logical link control (LLC) sublayer and the media access control (MAC) sub-layer which is located between the MAC layer and the physical LLC, which allows adaptation to different LLC media access technology and physical media. MAC sublayer as a separate, they will not change the impact of the media access method and higher level protocols. MAC disassembly of data and media access management of two modules, the completion of the data frame encapsulation, re-opened send and receive functions. Ethernet frame encapsulation format as shown in Table 1, where the destination address, source address, length / type field and the data generated by the four layer protocol module when transmitting data frames, data encapsulation module automatically adding data to be transmitted in the first seven bytes of preamble and a delimiter byte and add at the end of the data transfer byte sent four cyclic redundancy check code, if the data length is less than 46 bytes , the data is automatically filled in order to achieve the minimum length required when receiving data frame, the data will be automatically discarded removable module preamble and delimiter two fields.…

    • 312 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    With the advancement information technologies such as multi-core processors, digital media and mega storage architectures, increased Ethernet capacities will continue to be developed. It is likely that approximately every five to seven years will produce new standards to meet new technologies in Ethernet capacities. We can expect to see a greater push towards unified networking with an increasing emphasis on increased data storage at lower costs. New standards will be developed and evolve as the technologies continue to expand.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 5 Lab 1 Answers

    • 4778 Words
    • 20 Pages

    Ethernet Networks in Review Ethernet Cabling Data Encapsulation The Cisco Three-Layer Hierarchical Model Summary Exam Essentials Written Labs Review Questions Answers to Review Questions Answers to Written Lab 2.1 Answers to Written Lab 2.2 Answers to Written Lab…

    • 4778 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 2 Assignment 2

    • 299 Words
    • 1 Page

    In just over thirty years, the Ethernet standard has grown exponentially. In 1980, the standard was only 10MB, which is unheard of today. Today, the standard is 100 Gbit, which is a growth of 10,000 times what it once was. The rate of progression is still climbing, with 1 Tbit Ethernet standards being in the works.…

    • 299 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It255 Assignment 8

    • 309 Words
    • 2 Pages

    We show how incremental deployment of such routers can make the Internet safer. Like all things dynamic, change is inevitable. Such is the case with your network environment. Upgrades and modifications to the network architecture can sometimes expose, or create security holes. Hardening a network does not always mean spending large amounts of money. Whether that means spending it on new hardware, software, or man hours really depends on what needs to be addressed. It may include all of the above. The time may come when a cost/benefit analysis will be required by those in charge before hardening activities can move forward. As such it's important to point out some of the non-technical benefits of network hardening for the business as a whole.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Arrakis OS

    • 719 Words
    • 3 Pages

    Recent device hardware trends enable a new approach to the design of network servers. In a traditional operating system, the kernel mediates access to device hardware by server applications, to enforce process isolation as well as network and disk security. Arrakis splits the traditional role of the kernel in two. Applications have direct access to virtualized I/O devices, allowing most I/O operations to skip the kernel entirely.…

    • 719 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Digital Subscriber Line (DSL) technology is a modem technology that uses existing twisted-pair telephone lines to transport high-bandwidth data, such as multimedia and video, to service subscribers. The term xDSL covers a number of similar yet competing forms of DSL technologies, including ADSL, SDSL, HDSL, HDSL-2, G.SHDL, IDSL, and VDSL. xDSL is drawing significant attention from implementers and service providers because it promises to deliver high-bandwidth data rates to dispersed locations with relatively small changes to the existing telco infrastructure. xDSL services are dedicated, point-to-point, public network access over twisted-pair copper wire on the local loop (last mile) between a network service provider’s (NSP) central office and the customer site, or on local loops created either intrabuilding or intracampus. Currently, most DSL deployments are ADSL, mainly delivered to residential customers. This chapter focus mainly on defining ADSL.…

    • 4521 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    TO DESIGN A LAYER 3 MPLS VPN (Multiprotocol Label Switching Protocol Virtual Private Network ) FOR A CUSTOMER WITH DIFFERENT LOCATIONS…

    • 6714 Words
    • 27 Pages
    Powerful Essays

Related Topics