Can some explain the additions made in V5.2 protocol to support more traffic and dynamic allocation of links? karthikeyan 09-January-2008 12:14:31 PMComments For more info http://www.itu.int/ITU-D/asp/Events/ITU-BSNL-India/presentations/15-Access%20Technology%20Protocol%20-V5_2.pdf Posted by Hash007 please visit en.wikipedia.org/wiki/V5_interface Posted by waqasahmad In general a protection protocol, operated on two separate data links for security reasons, is defined to manage the protection switching of communication channels in case of link failures. Posted by HamidAliKhan For details visit: www.en.wikipedia.org/wiki/V5_interface www.protocols.com/pbook/v5.htm Posted by sagitraz Posted by kk • A bearer channel connection protocol establishes and de-establishes bearer connections required on demand, identified by the signalling information, under the control of the Local Exchange. • A link control protocol is defined for the multi-link management to control link identification, link blocking and link failure conditions. • A protection protocol, operated on two separate data links for security reasons, is defined to manage the protection switching of communication channels in case of link failures. Posted by tom |
Posted: 09-January-2008 01:04:23 PM By: tom • A bearer channel connection protocol establishes and de-establishes bearer connections required on demand, identified by the signalling information, under the control of the Local Exchange. • A link control protocol is defined for the multi-link management to control link identification, link blocking and link failure conditions. • A protection protocol, operated on two separate data links for security reasons, is defined to manage the protection switching of communication channels in case of link failures. | |
Posted: 11-June-2008 09:03:51 AM By: kk | |
Posted: 31-December-2008 03:52:20 AM By: sagitraz For details visit: www.en.wikipedia.org/wiki/V5_interface www.protocols.com/pbook/v5.htm | |
Posted: 31-December-2008 01:24:09 PM By: HamidAliKhan In general a protection protocol, operated on two separate data links for security reasons, is defined to manage the protection switching of communication channels in case of link failures. | |
Posted: 01-January-2009 12:19:12 AM By: waqasahmad please visit en.wikipedia.org/wiki/V5_interface | |
Posted: 01-February-2009 12:32:58 AM By: Hash007 For more info http://www.itu.int/ITU-D/asp/Events/ITU-BSNL-India/presentations/15-Access%20Technology%20Protocol%20-V5_2.pdf |