Can some explain the additions made in V5.2 protocol to support more traffic and dynamic allocation of links?
karthikeyan 09-January-2008 12:14:31 PM

Comments


For more info

http://www.itu.int/ITU-D/asp/Events/ITU-BSNL-India/presentations/15-Access%20Technology%20Protocol%20-V5_2.pdf
Posted by Hash007


please visit
en.wikipedia.org/wiki/V5_interface
Posted by waqasahmad


In general a protection protocol, operated on two separate data links for security reasons, is defined to manage the protection switching of communication channels in case of link failures.
Posted by HamidAliKhan


For details visit:

www.en.wikipedia.org/wiki/V5_interface
www.protocols.com/pbook/v5.htm

Posted by sagitraz



Posted by kk


• A bearer channel connection protocol establishes and de-establishes bearer connections required on demand, identified by the signalling information, under the control of the Local Exchange.
• A link control protocol is defined for the multi-link management to control link identification, link blocking and link failure conditions.
• A protection protocol, operated on two separate data links for security reasons, is defined to manage the protection switching of communication channels in case of link failures.

Posted by tom



Posted: 09-January-2008 01:04:23 PM By: tom

• A bearer channel connection protocol establishes and de-establishes bearer connections required on demand, identified by the signalling information, under the control of the Local Exchange.
• A link control protocol is defined for the multi-link management to control link identification, link blocking and link failure conditions.
• A protection protocol, operated on two separate data links for security reasons, is defined to manage the protection switching of communication channels in case of link failures.

Posted: 11-June-2008 09:03:51 AM By: kk


Posted: 31-December-2008 03:52:20 AM By: sagitraz

For details visit:

www.en.wikipedia.org/wiki/V5_interface
www.protocols.com/pbook/v5.htm

Posted: 31-December-2008 01:24:09 PM By: HamidAliKhan

In general a protection protocol, operated on two separate data links for security reasons, is defined to manage the protection switching of communication channels in case of link failures.

Posted: 01-January-2009 12:19:12 AM By: waqasahmad

please visit
en.wikipedia.org/wiki/V5_interface

Posted: 01-February-2009 12:32:58 AM By: Hash007

For more info

http://www.itu.int/ITU-D/asp/Events/ITU-BSNL-India/presentations/15-Access%20Technology%20Protocol%20-V5_2.pdf