Solved

byte interleaving and bit interleaving?

Posted on 2000-04-14
2
2,539 Views
Last Modified: 2012-05-04
in the following sentence:

byte interleaving 24 DS-0 to form the DS-1 and bit interleaving 3 DS-1s to form the DS-2 signal


what is the difference between :byte interleaving and bit interleaving?

0
Comment
Question by:syu2
2 Comments
 
LVL 3

Accepted Solution

by:
apadua earned 50 total points
ID: 2718008
The difference is that when you do bit interleaving, you put one bit from each sequence on the stream. When you do byte interleaving, you put a full byte from each sequence on the stream. Sor of like this:

Sequence 1:
1234567890abcdefghijklmnopqrstuv

Sequence 2:
abcdefghijklmnopqrstuv1234567890

Bit interleaving would be:

1a2b3c4d5e6f7g8h9i0jakblcmdneofpgqhrisjt

Byte interleaving would be:

12345678abcdefgh90abcdefijklmnopghijklmn


I can't really tell you the advantage or disadvantage of each one. My guess would be that if you do byte interleaving, maintaining things synchronous would be simpler. Also, if you lose one or two bits, you'd lose only one byte, and not more. My guess only, so if someone is very experienced, feel free to punch holes.


Cheers,

Andre
0
 

Author Comment

by:syu2
ID: 2724356
thanks lot , for your help, it make sense to me
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Recover password from HP 4300 SAN 2 41
Connecting LAN to a new leased line 2 46
Question regarding adding in a new domain controller 5 57
NAS with google authentication 6 63
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now