4 Knowledge Base

 

 TelecomTrainning.net > Knowledge Base
 Viewing KB Article
Good Evening, - Please register or - log-in to your account.
Search
Search   Saved Questions   Ask a question
Keywords 
 
Available categories
LTE
100 of Questions in LTE
CCNA Certification
CCNA Sample Q & A (1000 + Q &A)
(Network +) Certification
(Network +) Sample Q & A (1000 + Q &A)
Networking
General/Interview Q& A on Networking
Home Networking
General/Interview Q& A on Networking
VOIP, SIP & Asterisk
Q & A on VOIP,Ethereal, SIP & Asterisk
Telecom Test Equipments
Q & A on Telecom Test Equipment
PSTN / Wireline
General / Interview Q & A on PSTN / Wireline
LTE, Wireless, 3G ,Diameter and HSS
General/Interview Q & A on LTE, Wireless, 3G ,Diameter and HSS
Telecom General
Any Q & A in Telecom in General

Top Questions
Friends, Describe Secure storage and distribution of A-Keys?
what is the difference between E1 signal & Ethernet signal ?
How do I monitor SS7 Traffic in spectra2?
Can you tell me about PBGT?
Explain me the difference between a repeater, bridge and router? Relate this to the OSI model.
What is the difference between BRI & PRI ?
Guys what is the purpose of Umbrella Cell Approach in GSM ?
how can we explain media gateway in MSc?
What is GGSN?
What is the difference between Electrical-tilt and Mechanical-tilt of an antenna?
What is BSC?
What is demarc point?
Can any one explain me how sms flow will work using ss7 network ?( from physical layer to application layer)
why cellphone towers are painted in red and white?
Explain SLTA and SLTM messages in MTP3?
Hi guys what is WAP?
wat is the difference betweem MSC & GMSC, & MSS & GCS?
what is EDAp? what is the functions of EDAP?
What is a circuit id?
what is sdh?

Explain Protection Protocol in V5.2?
craig 09-January-2008 12:13:40 PM

Comments


doi.wiley.com/10.1002/0470841575.ch9
or
en.wikipedia.org/wiki/V5_interface
Posted by crouse


please visit
en.wikipedia.org/wiki/V5_interface
Posted by waqasahmad


Visit the links are better information
www.doi.wiley.com/10.1002/0470841575.ch9
www.protocols.com/pbook/v5.htm
en.wikipedia.org/wiki/V5_interface
Posted by HamidAliKhan


For details

http://doi.wiley.com/10.1002/0470841575.ch9
https://publications.european-patent-office.org/PublicationServer/documentpdf.jsp?iDocId=4753909&iebug=.pdf
Posted by Hash007


For details:

www.protocols.com/pbook/v5.htm
en.wikipedia.org/wiki/V5_interface

Posted by sagitraz


A single V5 interface may consist of up to sixteen (16) 2048 kbps links. According to the protocol architecture and multiplexing structure a communication path may carry information associated to several 2048 kbps links (non-associated information transfer). The failure of a communication path could therefore impact the service of a large number of customers in an unacceptable way. This is in particular true for the BCC protocol, the control protocol, and the link control protocol, where all user ports are affected in case of a failure of the relevant communication path.
In order to improve the reliability of the V5 interface, protection procedures for the switch-over of communication paths under failur e are provided. The protection mechanisms are used to protect all active C-channels. The protection mechanism also protects the protection protocol C-path (itself) which is used to control the protection switch-over procedures. In addition, flags are continuously monitored on all physical C-channels (active and standby C-channels) in order to protect against failures which are not already detected by Layer 1 detection mechanisms. If a failure is detected on a standby C-channel the system management is notified and, as a result, will not switch a logical C-channel to that non-operational standby C-channel.
The structure of the V5-Protection Protocol is shown below
Format Octet
Protocol discriminator 1
Layer 3 address 1 2
Layer 3 address (cont.) 3
Message type 4
Other Information Elements etc.

Protocol discriminator
Distinguishes between messages corresponding to one of the V5 protocols.
Layer 3 address
Identifies the layer 3 entity, within the V5.2 interface, to which the transmitted or received message applies.
Message type
Identifies the function of the message being sent or received. Message types for the protection protocol may be as follows:
• SWITCH-OVER REQ
• SWITCH-OVER COM
• OS-SWITCH-OVER COM
• SWITCH-OVER ACK
• SWITCH-OVER REJECT
• PROTOCOL ERROR
• RESET SN COM
• RESET SN ACK
Other Information Elements
For the protection protocol, the following Information Elements may appear:
Variable Length IEs
• Sequence number
• Physical C-channel identification
• Rejection cause
• Protocol error cause

Posted by kk

Q&A Rating

Q&A Rating
Rate This Question and Answer

Related Questions
Hi guys to exit from privileged mode and go back to the user mode, what would I type at the privileged mode prompt?
 
What are three types of overhead channel in the forward link?
 
Whether the ADSL password may work on particular telephone line or may work on another line also.


Search questions via popularity
Top viewed questions  Top emailed questions  Most printed questions  Most saved questions
 
Copyright © Telecom Training, All Rights Reserved