Explain Protection Protocol in V5.2?
craig 09-January-2008 12:13:40 PM

Comments


doi.wiley.com/10.1002/0470841575.ch9
or
en.wikipedia.org/wiki/V5_interface
Posted by crouse


please visit
en.wikipedia.org/wiki/V5_interface
Posted by waqasahmad


Visit the links are better information
www.doi.wiley.com/10.1002/0470841575.ch9
www.protocols.com/pbook/v5.htm
en.wikipedia.org/wiki/V5_interface
Posted by HamidAliKhan


For details

http://doi.wiley.com/10.1002/0470841575.ch9
https://publications.european-patent-office.org/PublicationServer/documentpdf.jsp?iDocId=4753909&iebug=.pdf
Posted by Hash007


For details:

www.protocols.com/pbook/v5.htm
en.wikipedia.org/wiki/V5_interface

Posted by sagitraz


A single V5 interface may consist of up to sixteen (16) 2048 kbps links. According to the protocol architecture and multiplexing structure a communication path may carry information associated to several 2048 kbps links (non-associated information transfer). The failure of a communication path could therefore impact the service of a large number of customers in an unacceptable way. This is in particular true for the BCC protocol, the control protocol, and the link control protocol, where all user ports are affected in case of a failure of the relevant communication path.
In order to improve the reliability of the V5 interface, protection procedures for the switch-over of communication paths under failur e are provided. The protection mechanisms are used to protect all active C-channels. The protection mechanism also protects the protection protocol C-path (itself) which is used to control the protection switch-over procedures. In addition, flags are continuously monitored on all physical C-channels (active and standby C-channels) in order to protect against failures which are not already detected by Layer 1 detection mechanisms. If a failure is detected on a standby C-channel the system management is notified and, as a result, will not switch a logical C-channel to that non-operational standby C-channel.
The structure of the V5-Protection Protocol is shown below
Format Octet
Protocol discriminator 1
Layer 3 address 1 2
Layer 3 address (cont.) 3
Message type 4
Other Information Elements etc.

Protocol discriminator
Distinguishes between messages corresponding to one of the V5 protocols.
Layer 3 address
Identifies the layer 3 entity, within the V5.2 interface, to which the transmitted or received message applies.
Message type
Identifies the function of the message being sent or received. Message types for the protection protocol may be as follows:
• SWITCH-OVER REQ
• SWITCH-OVER COM
• OS-SWITCH-OVER COM
• SWITCH-OVER ACK
• SWITCH-OVER REJECT
• PROTOCOL ERROR
• RESET SN COM
• RESET SN ACK
Other Information Elements
For the protection protocol, the following Information Elements may appear:
Variable Length IEs
• Sequence number
• Physical C-channel identification
• Rejection cause
• Protocol error cause

Posted by kk



Posted: 09-January-2008 01:03:41 PM By: kk

A single V5 interface may consist of up to sixteen (16) 2048 kbps links. According to the protocol architecture and multiplexing structure a communication path may carry information associated to several 2048 kbps links (non-associated information transfer). The failure of a communication path could therefore impact the service of a large number of customers in an unacceptable way. This is in particular true for the BCC protocol, the control protocol, and the link control protocol, where all user ports are affected in case of a failure of the relevant communication path.
In order to improve the reliability of the V5 interface, protection procedures for the switch-over of communication paths under failur e are provided. The protection mechanisms are used to protect all active C-channels. The protection mechanism also protects the protection protocol C-path (itself) which is used to control the protection switch-over procedures. In addition, flags are continuously monitored on all physical C-channels (active and standby C-channels) in order to protect against failures which are not already detected by Layer 1 detection mechanisms. If a failure is detected on a standby C-channel the system management is notified and, as a result, will not switch a logical C-channel to that non-operational standby C-channel.
The structure of the V5-Protection Protocol is shown below
Format Octet
Protocol discriminator 1
Layer 3 address 1 2
Layer 3 address (cont.) 3
Message type 4
Other Information Elements etc.

Protocol discriminator
Distinguishes between messages corresponding to one of the V5 protocols.
Layer 3 address
Identifies the layer 3 entity, within the V5.2 interface, to which the transmitted or received message applies.
Message type
Identifies the function of the message being sent or received. Message types for the protection protocol may be as follows:
• SWITCH-OVER REQ
• SWITCH-OVER COM
• OS-SWITCH-OVER COM
• SWITCH-OVER ACK
• SWITCH-OVER REJECT
• PROTOCOL ERROR
• RESET SN COM
• RESET SN ACK
Other Information Elements
For the protection protocol, the following Information Elements may appear:
Variable Length IEs
• Sequence number
• Physical C-channel identification
• Rejection cause
• Protocol error cause

Posted: 31-December-2008 03:52:56 AM By: sagitraz

For details:

www.protocols.com/pbook/v5.htm
en.wikipedia.org/wiki/V5_interface

Posted: 31-December-2008 10:06:02 AM By: Hash007

For details

http://doi.wiley.com/10.1002/0470841575.ch9
https://publications.european-patent-office.org/PublicationServer/documentpdf.jsp?iDocId=4753909&iebug=.pdf

Posted: 31-December-2008 01:25:10 PM By: HamidAliKhan

Visit the links are better information
www.doi.wiley.com/10.1002/0470841575.ch9
www.protocols.com/pbook/v5.htm
en.wikipedia.org/wiki/V5_interface

Posted: 01-January-2009 12:19:25 AM By: waqasahmad

please visit
en.wikipedia.org/wiki/V5_interface

Posted: 27-March-2009 01:55:37 PM By: crouse

doi.wiley.com/10.1002/0470841575.ch9
or
en.wikipedia.org/wiki/V5_interface