Добавил:
Я за два дня прошел весь курс ТВиМС Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
!ОСНОВНАЯ КНИГА КУРСА! Chapple M. (ISC)2 CISSP Certified IS...Study Guide 9ed 2021.pdf
Скачиваний:
1
Добавлен:
20.06.2025
Размер:
15.75 Mб
Скачать

624Chapter 12  Secure Communications and Network Attacks

Fiber-Optic Links

Synchronous Digital Hierarchy (SDH) and Synchronous Optical Network (SONET) are fiber-optic high-speed networking standards. SDH was standardized by the International Telecommunications Union (ITU) and SONET by the American National Standards Institute (ANSI). SDH and SONET are mostly hardware or physical layer standards defining infrastructure and line speed requirements. SDH and SONET use synchronous time-division multiplexing (TDM) to high-speed duplex communications with minimal need for control and management overhead.

These two standards have only slight variations and use the same hierarchy of bandwidth levels. The transmission service supports a foundational level of speed of 51.48 Mbps, which supports the Synchronous Transport Signals (STS) of SONET and/or the Synchronous Transport Modules (STM) of SDH. The term Optical Carrier (OC) can also be substituted for STS. The main bandwidth levels of SDH and SONET are shown in Table 12.3.

TABLE 12 . 3  

Bandwidth levels of SDH and SONET

 

 

 

 

SONET

SDH

Data rate

 

 

 

STS-1/OC-1

STM-0

51.84 Mbps

STS-3/OC-3

STM-1

155.52 Mbps

STS-12/OC-12

STM-4

622.08 Mbps

STS-48/OC-48

STM-16

2.488 Gbps

STS-96/OC-96

STM-32

4.876 Gbps

STS-192/OC-192

STM-64

9.953 Gbps

STS-768/OC-768

STM-256

39.813 Gbps

Note:The SDH service numbers are 1/3 that of SONET’s.

SDH and SONET both support mesh and ring topologies. These fiber solutions are often implemented as the backbone of a telco service and divisions or fractions of the capacity are subscribed out to customers.

Security Control Characteristics

When you’re selecting or deploying security controls for network communications, you need to evaluate numerous characteristics in light of your circumstances, capabilities, and security policy. Key characteristics are the protection of confidentiality and integrity. Since those

Соседние файлы в предмете Информационная безопасность автоматизированных систем