{"title":"Protection of SONET based networks","authors":"R. D. Hall, S. Whitt","doi":"10.1109/GLOCOM.1989.64078","DOIUrl":null,"url":null,"abstract":"The authors address the issue of telecommunications network protection, with particular reference to optical fibers and the new topologies made possible using the SONET signal format. It is found that the introduction of SONET-based networks provides an ideal opportunity to reappraise protection methodologies and to improve customer circuit availability significantly. The authors propose techniques for achieving these aims by examining a whole network from customer to customer so that weak links in the chain can be identified. In this manner, the network operator can be sure that investment in infrastructure is correctly targeted to provide a service that satisfies the customers' expectations.<<ETX>>","PeriodicalId":256305,"journal":{"name":"IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOM.1989.64078","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The authors address the issue of telecommunications network protection, with particular reference to optical fibers and the new topologies made possible using the SONET signal format. It is found that the introduction of SONET-based networks provides an ideal opportunity to reappraise protection methodologies and to improve customer circuit availability significantly. The authors propose techniques for achieving these aims by examining a whole network from customer to customer so that weak links in the chain can be identified. In this manner, the network operator can be sure that investment in infrastructure is correctly targeted to provide a service that satisfies the customers' expectations.<>