SlideShare a Scribd company logo
Synchronous optical networking
(SONET)
Dr R Jegadeesan Prof & CSE
Jyothishmathi Institute of Technology and Science,
karimnagar
• The SONET standard includes four
functional layers
• They correspond to both the physical and
the data link layers
➢Path layer
➢Line Layer
➢Section Layer
➢Photonic Layer
Path Layer
• The path layer is responsible for the movement of a
signal from its optical source to its optical destination.
• At the optical source, the signal is changed from an
electronic form into an optical form, multiplexed with
other signals, and encapsulated in a frame.
• At the optical destination, the received frame is
demultiplexed , and the individual optical signals are
changed back into their electronic forms.
• Path layer overhead is added at this layer.
• STS Multiplexers/ Demultiplexers provide path layer
functions.
Line Layer
• The Line Layer is responsible for the
movement of a signal across a Physical Line.
• Line layer overhead is added to the frame at
this layer.
• STS Multiplexer/Demultiplexer and add/drop
multiplexers provide line layer functions.
Section Layer
• The section layer is responsible for the
movement of a signal across a physical
section.
• It handles framing and error control.
• Section layer overhead is added to the frame
at this layer.
Photonic Layer
• The photonic layer corresponds to the
physical layer of the OSI model.
• It includes physical specifications for the
optical fiber channel, the sensitivity of the
receiver, multiplexing functions
STS MULTIPLEXING
• In SONET, frames of lower rate can be
synchronously time-division multiplexed into
a higher-rate frame.
• For example, 3 STS-1 signals (channels) can
be combined into 1 STS-3 signal (channel),
• 4 STS-3 can be multiplexed into 1 STS-12,
and so on, as shown in figure.
SONET NETWORKS
• We can divide SONET networks into three
categories:
➢Linear networks
➢Ring networks
➢Mesh networks
Linear Networks
• A linear SONET network can be
➢Point-to-point
➢Multipoint.
Point-to-Point Network
• A point-to-point network is normally made of
an STS multiplexer, an STS demultiplexer, and
zero or more regenerators with no add/drop
multiplexers
• The signal flow can be unidirectional or
bidirectional
• Although Figure shows only unidirectional for
simplicity.
Multipoint Network
• A Multipoint network uses ADMs to allow the
communications between several terminals.
• An ADM removes the signal belonging to the
terminal connected to it and adds the signal
transmitted from another terminal.
• Figure shows a unidirectional scheme in which
each terminal can send data only to the
downstream terminals, but the a multipoint
network can be bidirectional too
Ring Networks
• Add/Drop Multiplexers make it possible to have
SONET ring networks.
• SONET rings can be used in either a unidirectional
or a bidirectional configuration.
• In each case, we can add extra rings to make the
network self-healing, capable of self-recovery from
line failure.
Ring Networks of SONET are of two types
• Unidirectional Path Switching Ring
• Bidirectional Line Switching Ring
Unidirectional Path Switching Ring
• A unidirectional path switching ring (UPSR)
is a unidirectional network with two rings:
• one ring used as the working ring and the
other as the protection ring.
• The same signal flows through both rings,
one clockwise and the other counter
clockwise.
• It is called UPSR because monitoring is done
at the path layer.
• A node receives two copies of the electrical
signals at the path layer, compares them, and
chooses the one with the better quality.
• If part of a ring between two ADMs fails, the
other ring still can guarantee the continuation
of data flow.
• UPSR, like the one-plus-one scheme, has fast
failure recovery, but it is not efficient because
we need to have two rings that do the job of
one.
Bidirectional Line Switching Ring
• In this case, communication is bidirectional,
which means that we need two rings for
working lines.
• We also need two rings for protection lines.
This means BLSR uses four rings.
• If a working ring in one direction between
two nodes fails, the receiving node can use
the reverse ring to inform the upstream node
in the failed direction to use the protection
ring.
Mesh Networks
➢One problem with ring networks when the traffic in
a ring increases, we need to upgrade not only the
rings, but also the ADMs.
➢In this situation, a mesh network with switches
probably give better performance.
➢ A switch in a network mesh is called a cross-
connect.
➢ A cross-connect, like other switches we have seen,
has input and output ports.
• In an input port, the switch takes an OC-n signal,
changes it to an STS-n signal, demultiplexes it into
the corresponding STS-1 signals, and sends each
STS-1 signal to the appropriate output port.
• An output port takes STS-1 signals coming
from different input ports, multiplexes them
into an STS-n signal, and makes an OC-n
signal for transmission.
SONET FRAMES
• Each synchronous transfer signal STS-n is
composed of 8000 frames
• Each frame is a two-dimensional matrix of bytes
with 9 rows by 90 x n columns.
• For example, STS-1 frame is 9 rows by 90
columns (810 bytes), and an STS-3 is 9 rows by
270 columns (2430 bytes).
STS-1 Frame Format
• The first three columns of the frame are used
for section and line overhead.
• The upper three rows of the first three
columns are used for section overhead (SOH)
• The lower six are line overhead (LOH).
• The rest of the frame is called the
Synchronous Payload Envelope (SPE)
Section Overhead
• The section overhead consists of nine octets.
• The functions of these octets are shown in
below
Alignment bytes (A1 and A2)
➢ Bytes A1 and A2 are used for framing and
synchronization and are called Alignment bytes.
➢ These bytes alert a receiver that a frame is arriving
and give the receiver a predetermined bit pattern on
which to synchronize.
Section parity byte (B1)
➢ Byte B1 is for bit interleaved parity i.e. it monitors
bit errors between two adjacent regenerators.
Identification byte (C1)
➢Byte C1 carries the identity information of the
STS-1 frame
➢This byte is necessary when multiple STS-1s are
multiplexed to create a higher-rate STS (STS-3,
STS-9, STS-12, etc.).
➢Information in this byte allows the various signals
to be recognized easily upon demultiplexing.
➢ For example, in an STS-3 signal, the value of
the C1 byte is 1 for the first STS-1; C1 byte is 2
for the second STS-1; and C1 byte is 3 for the
third STS-1.
Management bytes (D1, D2, and D3).
• Management Bytes D1, D2 and D3 provide the
“Section Data Communication Channel” for signal
Monitoring & Maintenance.
• The Section DCC bandwidth is 192 Kbit/s between
each pair of SONET section termination equipment
Order wire byte(E1)
➢Byte E1 is the Order wire byte.
➢Order wire bytes in frames form a channel of
64 kbps (8000 frames per second times 8 bits
per frame).
➢This channel is used for communication
between regenerators, or between terminals
and regenerators.
User's byte (F1).
The F1 bytes in consecutive frames form a 64-
kbps channel that is reserved for users needs
at the section level.
Line Overhead
• Line overhead consists of 18 bytes. The
arrangement of these bytes are shown in
figure
Line parity byte (B2)
➢ Byte B2 is for bit interleaved parity.
➢ It is for error checking of the frame over a
line i.e. between two multiplexers
Data communication channel bytes (D4 to D12)
➢The line overhead D bytes (D4 to D12) in
consecutive frames form a 576-kbps channel
that provides the same service as the D1-D3
bytes monitoring and maintenance, but at the
line rather than the section level(between
multiplexers)
Order wire byte (E2)
➢The E2 bytes in consecutive frames form a 64-
kbps channel that provides the same functions
as the E1 order wire byte, but at the line level
Automatic protection switching bytes (K1 and K2)
➢ The K1 and K2 bytes in consecutive frames form a
128-kbps channel used for automatic detection of
problems in line-terminating equipments(Terminals).
Pointer bytes (H1, H2, and H3).
➢ Bytes H1, H2, and H3 are pointers. These
bytes are used to show the beginning of the
SPE in the frame.
Growth bytes (Z1 and Z2)
➢The Z1 and Z2 bytes are reserved for data
that can be used in future of a line overhead
Synchronous Payload Envelope
• The synchronous payload envelope (SPE) contains the user
data and the overhead related to the user data i.e. path
overhead
• Path overhead, the leftmost column of an SPE
• The path overhead must be added first to the user data to
create an SPE, and then an SPE can be inserted into one or
two frames.i.e some part of SPE can be in one frame another
part can be in the next frame.
• Path overhead consists of 9 bytes.
• The arrangement of these bytes are shown in figure
Path parity byte (B3)
Byte B3 is for bit interleaved parity, like bytes B1
and B2
Path signal label byte (C2)
➢ Byte C2 is the path identification byte.
➢ It is used to identify protocols such as IP used
at higher levels (layers) whose data are being
carried in the SPE.
Path user channel byte (F2)
The F2 bytes in consecutive frames, like the F1
bytes form a 64-kbps channel that is reserved for
user needs, but at the path level.
Path status byte (G1)
Byte G1 is sent by the receiver to communicate
its status to the sender, Whether it is ready to
receive or not
Multiframe indicator (H4)
➢ Byte H4 is the multiframe indicator. It
indicates the payloads that cannot fit into a
single frame.
Path trace byte (J1)
➢ The J1 bytes in consecutive frames form a 64-
kbps channel used for tracking the path
between STS MUX/DEMUX.
Growth bytes (Z3, Z4, and Z5).
➢Bytes Z3, Z4, and Z5 are reserved bytes. These
bytes are used for any future use for reserving
data in SPE.
Thank you

More Related Content

What's hot

Adc assignment final
Adc assignment finalAdc assignment final
Adc assignment final
BADMAPRIYADHARISINY
 
Slide 02 - Asynchronous Transfer Mode (ATM).pdf
Slide 02 - Asynchronous Transfer Mode (ATM).pdfSlide 02 - Asynchronous Transfer Mode (ATM).pdf
Slide 02 - Asynchronous Transfer Mode (ATM).pdf
KingsleyTettey
 
Non Linear Effects in Fiber Optic Systems
Non Linear Effects in Fiber Optic SystemsNon Linear Effects in Fiber Optic Systems
Non Linear Effects in Fiber Optic Systems
Atul Nanal
 
Losses ofc
Losses ofcLosses ofc
Losses ofc
Dinesh Kumar
 
Semiconductor optical amplifier (SOA)
Semiconductor optical amplifier (SOA)Semiconductor optical amplifier (SOA)
Semiconductor optical amplifier (SOA)
Paulo_Vangui
 
Rake Receiver
Rake ReceiverRake Receiver
Rake Receiver
ManochandarThenralma
 
Sonet (synchronous optical networking )
Sonet (synchronous optical networking )Sonet (synchronous optical networking )
Sonet (synchronous optical networking )
Hamza Sajjad
 
Trintron tube Presentation
Trintron tube PresentationTrintron tube Presentation
Trintron tube Presentation
Er. Ashish Pandey
 
frequency modulation
frequency modulationfrequency modulation
frequency modulation
Waqas Afzal
 
Actividades curso sistemas electrónicos
Actividades curso sistemas electrónicosActividades curso sistemas electrónicos
Actividades curso sistemas electrónicos
Edison Coimbra G.
 
Ch 1 optical fiber introduction
Ch 1 optical fiber introductionCh 1 optical fiber introduction
Ch 1 optical fiber introduction
kpphelu
 
M-ary Modulation, noise modelling, bandwidth, Bandpass Modulation
M-ary Modulation, noise modelling, bandwidth, Bandpass ModulationM-ary Modulation, noise modelling, bandwidth, Bandpass Modulation
M-ary Modulation, noise modelling, bandwidth, Bandpass Modulation
DrAimalKhan
 
Wireless networking
Wireless networkingWireless networking
4 Weeks Summer Training In BSNL, Agartala
4 Weeks Summer Training In BSNL, Agartala4 Weeks Summer Training In BSNL, Agartala
4 Weeks Summer Training In BSNL, Agartala
Arijit Roy
 
Du binary signalling
Du binary signallingDu binary signalling
Du binary signalling
srkrishna341
 
Optical network architecture
Optical network architectureOptical network architecture
Optical network architecture
Siddharth Singh
 
optical fibre ppt for download visit http://nowcracktheworld.blogspot.in/
optical fibre  ppt for download visit http://nowcracktheworld.blogspot.in/optical fibre  ppt for download visit http://nowcracktheworld.blogspot.in/
optical fibre ppt for download visit http://nowcracktheworld.blogspot.in/
Ram Niwas Bajiya
 
Rectangular waveguides
Rectangular waveguidesRectangular waveguides
Rectangular waveguides
khan yaseen
 
S parameters
S parametersS parameters
S parameters
Amit Rastogi
 
Analog modulation
Analog modulationAnalog modulation
Analog modulation
vish0110
 

What's hot (20)

Adc assignment final
Adc assignment finalAdc assignment final
Adc assignment final
 
Slide 02 - Asynchronous Transfer Mode (ATM).pdf
Slide 02 - Asynchronous Transfer Mode (ATM).pdfSlide 02 - Asynchronous Transfer Mode (ATM).pdf
Slide 02 - Asynchronous Transfer Mode (ATM).pdf
 
Non Linear Effects in Fiber Optic Systems
Non Linear Effects in Fiber Optic SystemsNon Linear Effects in Fiber Optic Systems
Non Linear Effects in Fiber Optic Systems
 
Losses ofc
Losses ofcLosses ofc
Losses ofc
 
Semiconductor optical amplifier (SOA)
Semiconductor optical amplifier (SOA)Semiconductor optical amplifier (SOA)
Semiconductor optical amplifier (SOA)
 
Rake Receiver
Rake ReceiverRake Receiver
Rake Receiver
 
Sonet (synchronous optical networking )
Sonet (synchronous optical networking )Sonet (synchronous optical networking )
Sonet (synchronous optical networking )
 
Trintron tube Presentation
Trintron tube PresentationTrintron tube Presentation
Trintron tube Presentation
 
frequency modulation
frequency modulationfrequency modulation
frequency modulation
 
Actividades curso sistemas electrónicos
Actividades curso sistemas electrónicosActividades curso sistemas electrónicos
Actividades curso sistemas electrónicos
 
Ch 1 optical fiber introduction
Ch 1 optical fiber introductionCh 1 optical fiber introduction
Ch 1 optical fiber introduction
 
M-ary Modulation, noise modelling, bandwidth, Bandpass Modulation
M-ary Modulation, noise modelling, bandwidth, Bandpass ModulationM-ary Modulation, noise modelling, bandwidth, Bandpass Modulation
M-ary Modulation, noise modelling, bandwidth, Bandpass Modulation
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
4 Weeks Summer Training In BSNL, Agartala
4 Weeks Summer Training In BSNL, Agartala4 Weeks Summer Training In BSNL, Agartala
4 Weeks Summer Training In BSNL, Agartala
 
Du binary signalling
Du binary signallingDu binary signalling
Du binary signalling
 
Optical network architecture
Optical network architectureOptical network architecture
Optical network architecture
 
optical fibre ppt for download visit http://nowcracktheworld.blogspot.in/
optical fibre  ppt for download visit http://nowcracktheworld.blogspot.in/optical fibre  ppt for download visit http://nowcracktheworld.blogspot.in/
optical fibre ppt for download visit http://nowcracktheworld.blogspot.in/
 
Rectangular waveguides
Rectangular waveguidesRectangular waveguides
Rectangular waveguides
 
S parameters
S parametersS parameters
S parameters
 
Analog modulation
Analog modulationAnalog modulation
Analog modulation
 

Similar to Synchronous optical networking (SONET)

Data Communications and Optical Network - Forouzan
Data Communications and Optical Network - ForouzanData Communications and Optical Network - Forouzan
Data Communications and Optical Network - Forouzan
Pradnya Saval
 
sdhbasicsabanoub-140426061715-phpapp02.ppt
sdhbasicsabanoub-140426061715-phpapp02.pptsdhbasicsabanoub-140426061715-phpapp02.ppt
sdhbasicsabanoub-140426061715-phpapp02.ppt
abanoubsamir97
 
Frame relay
Frame relayFrame relay
WAN Technology : ATM - Forouzan
WAN Technology : ATM - ForouzanWAN Technology : ATM - Forouzan
WAN Technology : ATM - Forouzan
Pradnya Saval
 
Sonet
SonetSonet
Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )
Ali Usman
 
Asynchronous Transfer Mode ATM
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATM
Madhumita Tamhane
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
Aabha Tiwari
 
10 Slides to Sonet
10 Slides to Sonet10 Slides to Sonet
10 Slides to Sonet
seanraz
 
Physical organization of parallel platforms
Physical organization of parallel platformsPhysical organization of parallel platforms
Physical organization of parallel platforms
Syed Zaid Irshad
 
Chapter2
Chapter2Chapter2
Chapter2
wael-b1
 
Sonet fall2011
Sonet fall2011Sonet fall2011
Sonet fall2011
kongara
 
UART project report by Tarun Khaneja ( 09034406598 )
UART project report by Tarun Khaneja ( 09034406598 )UART project report by Tarun Khaneja ( 09034406598 )
UART project report by Tarun Khaneja ( 09034406598 )
Tarun Khaneja
 
Group#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptxGroup#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptx
HirazNor
 
Ts patil
Ts patilTs patil
Ts patil
sameerdutta
 
Ts patil
Ts patilTs patil
Ts patil
tarunpatil
 
equipment list.pdf
equipment list.pdfequipment list.pdf
equipment list.pdf
ngusyirga
 
chapter 5.1.pptx
chapter 5.1.pptxchapter 5.1.pptx
chapter 5.1.pptx
MelkamtseganewTigabi1
 
Structure of a Switch
Structure of a SwitchStructure of a Switch
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
JebaRaj26
 

Similar to Synchronous optical networking (SONET) (20)

Data Communications and Optical Network - Forouzan
Data Communications and Optical Network - ForouzanData Communications and Optical Network - Forouzan
Data Communications and Optical Network - Forouzan
 
sdhbasicsabanoub-140426061715-phpapp02.ppt
sdhbasicsabanoub-140426061715-phpapp02.pptsdhbasicsabanoub-140426061715-phpapp02.ppt
sdhbasicsabanoub-140426061715-phpapp02.ppt
 
Frame relay
Frame relayFrame relay
Frame relay
 
WAN Technology : ATM - Forouzan
WAN Technology : ATM - ForouzanWAN Technology : ATM - Forouzan
WAN Technology : ATM - Forouzan
 
Sonet
SonetSonet
Sonet
 
Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )
 
Asynchronous Transfer Mode ATM
Asynchronous Transfer Mode  ATMAsynchronous Transfer Mode  ATM
Asynchronous Transfer Mode ATM
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
10 Slides to Sonet
10 Slides to Sonet10 Slides to Sonet
10 Slides to Sonet
 
Physical organization of parallel platforms
Physical organization of parallel platformsPhysical organization of parallel platforms
Physical organization of parallel platforms
 
Chapter2
Chapter2Chapter2
Chapter2
 
Sonet fall2011
Sonet fall2011Sonet fall2011
Sonet fall2011
 
UART project report by Tarun Khaneja ( 09034406598 )
UART project report by Tarun Khaneja ( 09034406598 )UART project report by Tarun Khaneja ( 09034406598 )
UART project report by Tarun Khaneja ( 09034406598 )
 
Group#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptxGroup#04-PPT-IA&P.pptx
Group#04-PPT-IA&P.pptx
 
Ts patil
Ts patilTs patil
Ts patil
 
Ts patil
Ts patilTs patil
Ts patil
 
equipment list.pdf
equipment list.pdfequipment list.pdf
equipment list.pdf
 
chapter 5.1.pptx
chapter 5.1.pptxchapter 5.1.pptx
chapter 5.1.pptx
 
Structure of a Switch
Structure of a SwitchStructure of a Switch
Structure of a Switch
 
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
Asynchronous Transfer ModeATM is originally the transfer mode for implementin...
 

More from Jyothishmathi Institute of Technology and Science Karimnagar

JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing ButtonsJAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
Jyothishmathi Institute of Technology and Science Karimnagar
 
JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework
Jyothishmathi Institute of Technology and Science Karimnagar
 
JAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - MultithreadingJAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - Multithreading
Jyothishmathi Institute of Technology and Science Karimnagar
 
JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O
Jyothishmathi Institute of Technology and Science Karimnagar
 
Java programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- InheritanceJava programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- Inheritance
Jyothishmathi Institute of Technology and Science Karimnagar
 
WEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JavaScriptWEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JSP
WEB TECHNOLOGIES  JSPWEB TECHNOLOGIES  JSP
WEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES ServletWEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES XML
WEB TECHNOLOGIES XMLWEB TECHNOLOGIES XML
WEB TECHNOLOGIES- PHP Programming
WEB TECHNOLOGIES-  PHP ProgrammingWEB TECHNOLOGIES-  PHP Programming
Compiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent OptimizationsCompiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent Optimizations
Jyothishmathi Institute of Technology and Science Karimnagar
 
COMPILER DESIGN Run-Time Environments
COMPILER DESIGN Run-Time EnvironmentsCOMPILER DESIGN Run-Time Environments
COMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed TranslationCOMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed Translation
Jyothishmathi Institute of Technology and Science Karimnagar
 
COMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Syntax AnalysisCOMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis: COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis:
Jyothishmathi Institute of Technology and Science Karimnagar
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
Jyothishmathi Institute of Technology and Science Karimnagar
 
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash FunctionsCRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
Jyothishmathi Institute of Technology and Science Karimnagar
 
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key CiphersCRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
Jyothishmathi Institute of Technology and Science Karimnagar
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY

More from Jyothishmathi Institute of Technology and Science Karimnagar (20)

JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing ButtonsJAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
 
JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING - The Collections Framework
 
JAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - MultithreadingJAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING- Exception handling - Multithreading
 
JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O JAVA PROGRAMMING – Packages - Stream based I/O
JAVA PROGRAMMING – Packages - Stream based I/O
 
Java programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- InheritanceJava programming -Object-Oriented Thinking- Inheritance
Java programming -Object-Oriented Thinking- Inheritance
 
WEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JavaScriptWEB TECHNOLOGIES JavaScript
WEB TECHNOLOGIES JavaScript
 
WEB TECHNOLOGIES JSP
WEB TECHNOLOGIES  JSPWEB TECHNOLOGIES  JSP
WEB TECHNOLOGIES JSP
 
WEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES ServletWEB TECHNOLOGIES Servlet
WEB TECHNOLOGIES Servlet
 
WEB TECHNOLOGIES XML
WEB TECHNOLOGIES XMLWEB TECHNOLOGIES XML
WEB TECHNOLOGIES XML
 
WEB TECHNOLOGIES- PHP Programming
WEB TECHNOLOGIES-  PHP ProgrammingWEB TECHNOLOGIES-  PHP Programming
WEB TECHNOLOGIES- PHP Programming
 
Compiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent OptimizationsCompiler Design- Machine Independent Optimizations
Compiler Design- Machine Independent Optimizations
 
COMPILER DESIGN Run-Time Environments
COMPILER DESIGN Run-Time EnvironmentsCOMPILER DESIGN Run-Time Environments
COMPILER DESIGN Run-Time Environments
 
COMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed TranslationCOMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Syntax Directed Translation
 
COMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Syntax AnalysisCOMPILER DESIGN- Syntax Analysis
COMPILER DESIGN- Syntax Analysis
 
COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis: COMPILER DESIGN- Introduction & Lexical Analysis:
COMPILER DESIGN- Introduction & Lexical Analysis:
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash FunctionsCRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
 
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key CiphersCRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 

Recently uploaded

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 

Recently uploaded (20)

UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 

Synchronous optical networking (SONET)

  • 1. Synchronous optical networking (SONET) Dr R Jegadeesan Prof & CSE Jyothishmathi Institute of Technology and Science, karimnagar
  • 2. • The SONET standard includes four functional layers • They correspond to both the physical and the data link layers ➢Path layer ➢Line Layer ➢Section Layer ➢Photonic Layer
  • 3.
  • 4. Path Layer • The path layer is responsible for the movement of a signal from its optical source to its optical destination. • At the optical source, the signal is changed from an electronic form into an optical form, multiplexed with other signals, and encapsulated in a frame. • At the optical destination, the received frame is demultiplexed , and the individual optical signals are changed back into their electronic forms. • Path layer overhead is added at this layer. • STS Multiplexers/ Demultiplexers provide path layer functions.
  • 5. Line Layer • The Line Layer is responsible for the movement of a signal across a Physical Line. • Line layer overhead is added to the frame at this layer. • STS Multiplexer/Demultiplexer and add/drop multiplexers provide line layer functions.
  • 6. Section Layer • The section layer is responsible for the movement of a signal across a physical section. • It handles framing and error control. • Section layer overhead is added to the frame at this layer.
  • 7. Photonic Layer • The photonic layer corresponds to the physical layer of the OSI model. • It includes physical specifications for the optical fiber channel, the sensitivity of the receiver, multiplexing functions
  • 8. STS MULTIPLEXING • In SONET, frames of lower rate can be synchronously time-division multiplexed into a higher-rate frame. • For example, 3 STS-1 signals (channels) can be combined into 1 STS-3 signal (channel), • 4 STS-3 can be multiplexed into 1 STS-12, and so on, as shown in figure.
  • 9.
  • 10. SONET NETWORKS • We can divide SONET networks into three categories: ➢Linear networks ➢Ring networks ➢Mesh networks
  • 11.
  • 12. Linear Networks • A linear SONET network can be ➢Point-to-point ➢Multipoint.
  • 13. Point-to-Point Network • A point-to-point network is normally made of an STS multiplexer, an STS demultiplexer, and zero or more regenerators with no add/drop multiplexers • The signal flow can be unidirectional or bidirectional • Although Figure shows only unidirectional for simplicity.
  • 14.
  • 15. Multipoint Network • A Multipoint network uses ADMs to allow the communications between several terminals. • An ADM removes the signal belonging to the terminal connected to it and adds the signal transmitted from another terminal. • Figure shows a unidirectional scheme in which each terminal can send data only to the downstream terminals, but the a multipoint network can be bidirectional too
  • 16.
  • 17. Ring Networks • Add/Drop Multiplexers make it possible to have SONET ring networks. • SONET rings can be used in either a unidirectional or a bidirectional configuration. • In each case, we can add extra rings to make the network self-healing, capable of self-recovery from line failure.
  • 18. Ring Networks of SONET are of two types • Unidirectional Path Switching Ring • Bidirectional Line Switching Ring
  • 20. • A unidirectional path switching ring (UPSR) is a unidirectional network with two rings: • one ring used as the working ring and the other as the protection ring. • The same signal flows through both rings, one clockwise and the other counter clockwise. • It is called UPSR because monitoring is done at the path layer. • A node receives two copies of the electrical signals at the path layer, compares them, and chooses the one with the better quality.
  • 21. • If part of a ring between two ADMs fails, the other ring still can guarantee the continuation of data flow. • UPSR, like the one-plus-one scheme, has fast failure recovery, but it is not efficient because we need to have two rings that do the job of one.
  • 23. • In this case, communication is bidirectional, which means that we need two rings for working lines. • We also need two rings for protection lines. This means BLSR uses four rings. • If a working ring in one direction between two nodes fails, the receiving node can use the reverse ring to inform the upstream node in the failed direction to use the protection ring.
  • 24. Mesh Networks ➢One problem with ring networks when the traffic in a ring increases, we need to upgrade not only the rings, but also the ADMs. ➢In this situation, a mesh network with switches probably give better performance. ➢ A switch in a network mesh is called a cross- connect. ➢ A cross-connect, like other switches we have seen, has input and output ports.
  • 25. • In an input port, the switch takes an OC-n signal, changes it to an STS-n signal, demultiplexes it into the corresponding STS-1 signals, and sends each STS-1 signal to the appropriate output port. • An output port takes STS-1 signals coming from different input ports, multiplexes them into an STS-n signal, and makes an OC-n signal for transmission.
  • 26.
  • 28. • Each synchronous transfer signal STS-n is composed of 8000 frames • Each frame is a two-dimensional matrix of bytes with 9 rows by 90 x n columns. • For example, STS-1 frame is 9 rows by 90 columns (810 bytes), and an STS-3 is 9 rows by 270 columns (2430 bytes).
  • 29.
  • 31. • The first three columns of the frame are used for section and line overhead. • The upper three rows of the first three columns are used for section overhead (SOH) • The lower six are line overhead (LOH). • The rest of the frame is called the Synchronous Payload Envelope (SPE)
  • 32. Section Overhead • The section overhead consists of nine octets. • The functions of these octets are shown in below
  • 33. Alignment bytes (A1 and A2) ➢ Bytes A1 and A2 are used for framing and synchronization and are called Alignment bytes. ➢ These bytes alert a receiver that a frame is arriving and give the receiver a predetermined bit pattern on which to synchronize. Section parity byte (B1) ➢ Byte B1 is for bit interleaved parity i.e. it monitors bit errors between two adjacent regenerators.
  • 34. Identification byte (C1) ➢Byte C1 carries the identity information of the STS-1 frame ➢This byte is necessary when multiple STS-1s are multiplexed to create a higher-rate STS (STS-3, STS-9, STS-12, etc.). ➢Information in this byte allows the various signals to be recognized easily upon demultiplexing. ➢ For example, in an STS-3 signal, the value of the C1 byte is 1 for the first STS-1; C1 byte is 2 for the second STS-1; and C1 byte is 3 for the third STS-1.
  • 35. Management bytes (D1, D2, and D3). • Management Bytes D1, D2 and D3 provide the “Section Data Communication Channel” for signal Monitoring & Maintenance. • The Section DCC bandwidth is 192 Kbit/s between each pair of SONET section termination equipment
  • 36. Order wire byte(E1) ➢Byte E1 is the Order wire byte. ➢Order wire bytes in frames form a channel of 64 kbps (8000 frames per second times 8 bits per frame). ➢This channel is used for communication between regenerators, or between terminals and regenerators.
  • 37. User's byte (F1). The F1 bytes in consecutive frames form a 64- kbps channel that is reserved for users needs at the section level.
  • 38. Line Overhead • Line overhead consists of 18 bytes. The arrangement of these bytes are shown in figure
  • 39. Line parity byte (B2) ➢ Byte B2 is for bit interleaved parity. ➢ It is for error checking of the frame over a line i.e. between two multiplexers Data communication channel bytes (D4 to D12) ➢The line overhead D bytes (D4 to D12) in consecutive frames form a 576-kbps channel that provides the same service as the D1-D3 bytes monitoring and maintenance, but at the line rather than the section level(between multiplexers)
  • 40. Order wire byte (E2) ➢The E2 bytes in consecutive frames form a 64- kbps channel that provides the same functions as the E1 order wire byte, but at the line level Automatic protection switching bytes (K1 and K2) ➢ The K1 and K2 bytes in consecutive frames form a 128-kbps channel used for automatic detection of problems in line-terminating equipments(Terminals).
  • 41. Pointer bytes (H1, H2, and H3). ➢ Bytes H1, H2, and H3 are pointers. These bytes are used to show the beginning of the SPE in the frame. Growth bytes (Z1 and Z2) ➢The Z1 and Z2 bytes are reserved for data that can be used in future of a line overhead
  • 42. Synchronous Payload Envelope • The synchronous payload envelope (SPE) contains the user data and the overhead related to the user data i.e. path overhead • Path overhead, the leftmost column of an SPE • The path overhead must be added first to the user data to create an SPE, and then an SPE can be inserted into one or two frames.i.e some part of SPE can be in one frame another part can be in the next frame. • Path overhead consists of 9 bytes. • The arrangement of these bytes are shown in figure
  • 43.
  • 44. Path parity byte (B3) Byte B3 is for bit interleaved parity, like bytes B1 and B2 Path signal label byte (C2) ➢ Byte C2 is the path identification byte. ➢ It is used to identify protocols such as IP used at higher levels (layers) whose data are being carried in the SPE.
  • 45. Path user channel byte (F2) The F2 bytes in consecutive frames, like the F1 bytes form a 64-kbps channel that is reserved for user needs, but at the path level. Path status byte (G1) Byte G1 is sent by the receiver to communicate its status to the sender, Whether it is ready to receive or not
  • 46. Multiframe indicator (H4) ➢ Byte H4 is the multiframe indicator. It indicates the payloads that cannot fit into a single frame. Path trace byte (J1) ➢ The J1 bytes in consecutive frames form a 64- kbps channel used for tracking the path between STS MUX/DEMUX.
  • 47. Growth bytes (Z3, Z4, and Z5). ➢Bytes Z3, Z4, and Z5 are reserved bytes. These bytes are used for any future use for reserving data in SPE.