xvContents
12.11.3 Other Important Features ...................................................392
12.12 Comparison of Various Protection Schemes .................................392
12.13 Deployment of Protection in a Network ........................................393
Review Questions ........................................................................................ 395
Critical Thinking Questions....................................................................... 397
Bibliography ..................................................................................................397
13. Data Over SDH ...........................................................................................399
13.1 Problems in Interfacing Data and SD ...