This Recommendation provides the necessary equipment-level specifications to implement different choices of protection architectures for Synchronous Digital Hierarchy (SDH) networks. Protected entities may range from a single SDH multiplex section (e.g. linear multiplex section protection), to a portion of an SDH end-to-end path (e.g. subnetwork connection protection), or to an entire SDH endto-end path (e.g. HO\/LO linear VC trail protection). Physical implementations of these protection architectures may include rings or linear chains of nodes.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\n\t\t\t\t\t\t
ITU-T G.841 – This Recommendation provides the necessary equipment-level specifications to implement different choices of protection architectures for Synchronous Digital Hierarchy (SDH) networks. Protected entities may range from a single SDH multiplex section …<\/p>\n","protected":false},"author":1,"featured_media":78544,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[364],"tags":[366],"yoast_head":"\n