
Proceedings Paper
In-depth study on SDH protectionFormat | Member Price | Non-Member Price |
---|---|---|
$14.40 | $18.00 |
![]() |
GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. | Check Access |
Paper Abstract
This paper discusses the specific realization of SDH protection which based on ITU-T recommendation G.841, and gives detailed flow of APS protocol for some representation status of MS shared protection rings (not defined in G.841), and reinforces the content of G.841.
Paper Details
Date Published: 15 April 2004
PDF: 7 pages
Proc. SPIE 5282, Network Architectures, Management, and Applications, (15 April 2004); doi: 10.1117/12.523218
Published in SPIE Proceedings Vol. 5282:
Network Architectures, Management, and Applications
S. J. Ben Yoo; Kwok-wai Cheung; Yun-Chur Chung; Guangcheng Li, Editor(s)
PDF: 7 pages
Proc. SPIE 5282, Network Architectures, Management, and Applications, (15 April 2004); doi: 10.1117/12.523218
Show Author Affiliations
Tao Sun, Fiberhome Telecommunication Technologies Co., Ltd. (China)
Rong Li, Jianghan Univ. (China)
Published in SPIE Proceedings Vol. 5282:
Network Architectures, Management, and Applications
S. J. Ben Yoo; Kwok-wai Cheung; Yun-Chur Chung; Guangcheng Li, Editor(s)
© SPIE. Terms of Use
