Explain Protection Protocol in V5.2? craig 09-January-2008 12:13:40 PMComments doi.wiley.com/10.1002/0470841575.ch9 or en.wikipedia.org/wiki/V5_interface Posted by crouse please visit en.wikipedia.org/wiki/V5_interface Posted by waqasahmad Visit the links are better information www.doi.wiley.com/10.1002/0470841575.ch9 www.protocols.com/pbook/v5.htm en.wikipedia.org/wiki/V5_interface Posted by HamidAliKhan For details http://doi.wiley.com/10.1002/0470841575.ch9 https://publications.european-patent-office.org/PublicationServer/documentpdf.jsp?iDocId=4753909&iebug=.pdf Posted by Hash007 For details: www.protocols.com/pbook/v5.htm en.wikipedia.org/wiki/V5_interface Posted by sagitraz A single V5 interface may consist of up to sixteen (16) 2048 kbps links. According to the protocol architecture and multiplexing structure a communication path may carry information associated to several 2048 kbps links (non-associated information transfer). The failure of a communication path could therefore impact the service of a large number of customers in an unacceptable way. This is in particular true for the BCC protocol, the control protocol, and the link control protocol, where all user ports are affected in case of a failure of the relevant communication path. In order to improve the reliability of the V5 interface, protection procedures for the switch-over of communication paths under failur e are provided. The protection mechanisms are used to protect all active C-channels. The protection mechanism also protects the protection protocol C-path (itself) which is used to control the protection switch-over procedures. In addition, flags are continuously monitored on all physical C-channels (active and standby C-channels) in order to protect against failures which are not already detected by Layer 1 detection mechanisms. If a failure is detected on a standby C-channel the system management is notified and, as a result, will not switch a logical C-channel to that non-operational standby C-channel. The structure of the V5-Protection Protocol is shown below Format Octet Protocol discriminator 1 Layer 3 address 1 2 Layer 3 address (cont.) 3 Message type 4 Other Information Elements etc. Protocol discriminator Distinguishes between messages corresponding to one of the V5 protocols. Layer 3 address Identifies the layer 3 entity, within the V5.2 interface, to which the transmitted or received message applies. Message type Identifies the function of the message being sent or received. Message types for the protection protocol may be as follows: • SWITCH-OVER REQ • SWITCH-OVER COM • OS-SWITCH-OVER COM • SWITCH-OVER ACK • SWITCH-OVER REJECT • PROTOCOL ERROR • RESET SN COM • RESET SN ACK Other Information Elements For the protection protocol, the following Information Elements may appear: Variable Length IEs • Sequence number • Physical C-channel identification • Rejection cause • Protocol error cause Posted by kk |
Posted: 09-January-2008 01:03:41 PM By: kk A single V5 interface may consist of up to sixteen (16) 2048 kbps links. According to the protocol architecture and multiplexing structure a communication path may carry information associated to several 2048 kbps links (non-associated information transfer). The failure of a communication path could therefore impact the service of a large number of customers in an unacceptable way. This is in particular true for the BCC protocol, the control protocol, and the link control protocol, where all user ports are affected in case of a failure of the relevant communication path. In order to improve the reliability of the V5 interface, protection procedures for the switch-over of communication paths under failur e are provided. The protection mechanisms are used to protect all active C-channels. The protection mechanism also protects the protection protocol C-path (itself) which is used to control the protection switch-over procedures. In addition, flags are continuously monitored on all physical C-channels (active and standby C-channels) in order to protect against failures which are not already detected by Layer 1 detection mechanisms. If a failure is detected on a standby C-channel the system management is notified and, as a result, will not switch a logical C-channel to that non-operational standby C-channel. The structure of the V5-Protection Protocol is shown below Format Octet Protocol discriminator 1 Layer 3 address 1 2 Layer 3 address (cont.) 3 Message type 4 Other Information Elements etc. Protocol discriminator Distinguishes between messages corresponding to one of the V5 protocols. Layer 3 address Identifies the layer 3 entity, within the V5.2 interface, to which the transmitted or received message applies. Message type Identifies the function of the message being sent or received. Message types for the protection protocol may be as follows: • SWITCH-OVER REQ • SWITCH-OVER COM • OS-SWITCH-OVER COM • SWITCH-OVER ACK • SWITCH-OVER REJECT • PROTOCOL ERROR • RESET SN COM • RESET SN ACK Other Information Elements For the protection protocol, the following Information Elements may appear: Variable Length IEs • Sequence number • Physical C-channel identification • Rejection cause • Protocol error cause | |
Posted: 31-December-2008 03:52:56 AM By: sagitraz For details: www.protocols.com/pbook/v5.htm en.wikipedia.org/wiki/V5_interface | |
Posted: 31-December-2008 10:06:02 AM By: Hash007 For details http://doi.wiley.com/10.1002/0470841575.ch9 https://publications.european-patent-office.org/PublicationServer/documentpdf.jsp?iDocId=4753909&iebug=.pdf | |
Posted: 31-December-2008 01:25:10 PM By: HamidAliKhan Visit the links are better information www.doi.wiley.com/10.1002/0470841575.ch9 www.protocols.com/pbook/v5.htm en.wikipedia.org/wiki/V5_interface | |
Posted: 01-January-2009 12:19:25 AM By: waqasahmad please visit en.wikipedia.org/wiki/V5_interface | |
Posted: 27-March-2009 01:55:37 PM By: crouse doi.wiley.com/10.1002/0470841575.ch9 or en.wikipedia.org/wiki/V5_interface |