4. SDH
Synchronous Digital Hierarchy
SDH is a hierarchical set of digital transport
structures, standardized for the transport of
suitably adapted payloads over physical
transmission networks
An integrated transmission network managed by
a powerful network management system
5. SDH
A standard developed by the International
Telecommunication Union (ITU)
It is documented in standard G.707 and its
extension G.708
Developed to replace the Plesiochronous
Digital Hierarchy (PDH) system
Allow interoperability between equipment
from different vendors with Strong
Network Management capabilities
6. SDH ITU Recommendations
SDH refers to the rates and formats specified by ITU-T
for synchronous data transmission over fiber optic
networks.
ITU-T G.707: Network Node Interface for SDH
ITU-T G.781: Structure of Recommendations on Equipment for SDH
ITU-T G.783: Characteristics of SDH Equipment Functional Blocks
ITU-T G.803: Architecture of Transport Networks Based on SDH
7. PDH
Pre SDH Standard
3 standards..European, Japanese, North America
European Standard in Pakistan
Complex Multiplexing structure
Weak monitoring
11. Data Rates & Terminologies
Q
34.368 Mbps
Q
34.368 Mbps
P
8.112 Mbps
E1
2.028 Mbps
E1
2.028 Mbps
E1
2.028 Mbps
E1
2.028 Mbps
P
8.112 Mbps
P
8.112 Mbps
P
8.112 Mbps
Q
34.368 Mbps
Q
34.368 Mbps
R1
140 Mbps
R1
140 Mbps
R1
140 Mbps
R1
140 Mbps
System
565 Mbps
12. Limitations Of PDH
Impossible to interconnect three Incompatible
PDH standards
No worldwide optical interface standard
Week Monitoring due to insufficient capacity
for network management
No direct extraction of lower order signal
Lower data rates for current and future
demands
14. SDH Capacity
STM-N Line Rate
(Mb/s)
E1
Capacity
E3
Capacity
E4
Capacity
N=1 155.52 63 3 1
N=4 622.08 252 12 4
N=16 2488.32 1008 48 16
N=64 9953.28 4032 192 64
N=256 39813.12 16128 768 256
* STM-0 is not SDH signal rate, however, it is equal to SONET basic rate 51.84Mbps
15. SDH Network Elements
ADM: Add Drop Multiplexer
TM: Termination Multiplexer
DCS: Digital Cross Connect
REG: Repeater (Regenerator)
Four Types
16. Adding & Dropping In SDH
ADM
Optical Interface Optical Interface
2 Mb/s
Electrical Signal
SDH: Direct & Simple to add/drop electrical signal
17. Advantages Of SDH
More Capacity
Easy to interconnect different systems
simple and direct adding or dropping of
electrical signals
Network Management System (NMS)
Flexible and self-healing networks (protection)
18. Advantages Of SDH
All current PDH signals can be transmitted within the
SDH except 8 Mb/s (E2) which has no container.
A reduction in the amount of equipment & an
increase in network reliability.
Compatible….PDH, ATM, DQDB
19. Disadvantages Of SDH
Lower Bandwidth utilization
Complicated SDH equipments due to variety
of management traffic types and options
Software based..vulnerable to computer
viruses, software bugs, configuration
problems, etc.
Direct add/drop needs pointer, which make it
complex and introduce jitter
Can’t carry E2 due to un-availability of
container.
21. 1
2161
270
2430
271 540
1st Byte Last
Byte
2430
STM-1
Frame # 1
1st
Byte
STM-1
Frame # 2
From Left to right & top to bottom
Transmission Direction
STM-1 Frame Transmission
1st
Byte
2430th
Byte
23. RS, MS, AND Path Overheads
Difference among POH, MSOH, & RSOH
Term
Mux
Term
Mux
Add-Drop
Mux
Repeater Repeater
POH
MSOH
RSOH
• Path OH – end to end circuit
• Multiplex Section OH – multiplexer to multiplexer
• Regenerator Section OH – repeater to adjacent node or vice versa
24. Section Overhead (SOH)
Multiplex Section Overhead (MSOH)
-MSOH– supervises each STM-1 of STM-N
frame
Regenerator Section Overhead (RSOH)
–RSOH– supervises the whole STM-N
frame
25. Path Overhead (POH)
Lower order POH (LPOH)
Higher order (HPOH)
---HPOH and LPOH are used for VC4, VC3, and
VC12 monitoring
POH monitors individual low-rate signals within
STM-N frame, while SOH monitors the whole
package i.e., STM-N frame
26. STM – Performance Monitoring And
Management
RSOH, MSOH and POH provide monitoring and
management function for different layers/levels
of STM-N frame
For STM-64 frame:
– RSOH monitors the overall transmission
performance of STM-64 signal
– MSOH monitors the performance of individual
STM-1s
– POH monitors each low-rate signal (e.g., 2
Mbps)
28. Payload
where services are put in the STM-N
frame
2M, 34M or 140M information is packed and
put in the payload. It is then carried by STM-
N signal to send over SDH nodes
If we take STM-N frame as a truck, the
payload section can be looked as the
carriage of the truck
29. Administrative Unit Pointer (AU-PTR)
Locate lower rate signal inside a higher rate
signal of a STM-N frame (payload).
comprises of 9 bytes
30. AU-PTR
AU-4 pointer addresses only every 3rd payload
byte.
Last 3 bytes (H3) of AU-PTR are provided as
additional transmission capacity in order to
equalize clock difference.
32. Container
Container is an information structure, mainly in-
charge of adaptation functions so that
commonly used PDH signals can occupy fixed
space
ITU-T G.709 recommendations have stipulated
5 kinds of standard containers:
C-11, C-12, C-2, C-3 & C-4
33. Virtual Container
The digital flow from the standard container
combined with path overhead forms a virtual
container (VC).
C-4 + POH (9 bytes) = VC-4 (9x261 bytes)
C-3 + POH (9 bytes) = VC-3 (9x85 bytes)
C-12 + POH (1 byte) = VC-12 (35 bytes)
It is the most important information structure in
SDH which supports path layer connection.
34. AU & TU
The Administration Unit (AU) is an information
structure that performs adaptation functions for
the high order path layer and multiplexing
segment layer.
AU-4 = AU-PTR + VC-4
The Tributary Unit (TU) is an information structure
that performs adaptation functions for the low
order path layer and high order path layer.
TU-3 = VC-3 + PTR (3 bytes)
TU-12 = VC-12 + PTR (one byte)
37. TUG & AUG
TUG-3 = TU-3 + 6 Justification Bytes
TUG-2 = 3 x TU-12
TUG-3 = 7 x TUG-2
One or more AU with fixed locations in the STM-
N frame form an Administration Unit Group
(AUG). A single AU-4 can form one
Administration Unit Group (AUG).
AUG is useful for the AU-3 multiplexing, but
meaningless for AU-4 multiplexing.
39. Mapping
A process used when tributaries are adapted into
Virtual Containers (VCs) by adding justification
bits and Path Overhead (POH) information
Its essence is to make the various tributary
signals synchronized with related virtual
containers so that VC can be an independent
entity in the transmission, multiplexing and cross
connection
40. Alignment
This process takes place when a pointer is
included in a Tributary Unit (TU) or an
Administrative Unit (AU), to allow the first byte of
the Virtual Container to be located.
By setting the pointer, it can provide a flexible
and dynamic method for alignment of VC in the
unit (TU or AU-4) frame.
41. Multiplexing
This process is used when multiple lower-order
path layer signals are adapted into a higher-
order path signal, or when the higher-order path
signals are adapted into a Multiplex Section.
This type of multiplexing comes under
synchronous multiplexing category
42. Stuffing
When tributary signals are multiplexed &
aligned, some spare capacity is required in
SDH frames to provide space for various
tributary rates
This space capacity is filled with "fixed stuffing"
bits that carry no information, but are required
to fill up the particular frame.
43. Mapping & Multiplexing Procedures
STM-N
xN x1
C-12
VC-12
VC-4 TUG-2
AUG-4 AU-4 TU-12 2Mb/s
Code rate
adjustment
LO POH
TU PTR
AU PTR
x3
Multiplexing
x7 Multiplexing
HO POH
xN Multiplexing
TUG-3
x3
Multiplexing
44. 44
Virtual Container
STM-N
× N × 1 140Mb/s
45Mb/s
34Mb/s
6.3Mb/s
2Mb/s
1.5Mb/s
×3
× 7
× 7
× 1
× 3
C-11
C-12
C-2
C-3
C-4
VC-11
VC-2
VC-3
VC-3
VC-4
TU-11
TU-12
TU-2
TU-3
TUG-2
TUG-3
AUG
AU-3
AU-4
VC-12
×3
×4
×1
Container
Tributary Unit
Administrative Unit
Tributary Unit Group
Administrative Unit Group
Synchronous
Transmission module
Alignment
Multiplexing
Mapping
45. 45
Virtual Container
Container
Tributary Unit
Administrative Unit
Tributary Unit Group
Administrative Unit Group
Synchronous
Transmission module
Alignment
Multiplexing
Mapping
STM-N
× N × 1
140Mb/s
34Mb/s
2Mb/s
× 7
× 1
× 3
C-12
C-3
C-4
VC-3
VC-4
TU-12
TU-3
TUG-2
TUG-3
AUG AU-4
VC-12
×3
47. 2 MB Signal Mapping Procedure
C–12
Rate
Adaptation
2 Mbps Signal
1 4
1
9
125 μs
1 Byte Path
Overhead
(POH)
1 4
1
9
VC–12
C-12 Size: (4 Rows x 9 Columns) – 2 = 34 Bytes
C–12
POH
VC-12 Size: (4 Rows x 9 Columns) – 1 = 35 Bytes
125 μs
VC-12 = C-12 + (1 Byte POH)
C-12 Frame Duration = 125 μs
VC-12 Frame Duration = 125 μs
There can be four different POH
bytes for one C-12 V5, J2, Z6, Z7
48. 2 MB Signal Mapping Procedure
Multiplexing
x 3
1 12
1
9
TUG–2
T
U
-
12
125 μs
1 4
1
9
VC–12
C–12
POH
125 μs
1 Byte Tributary
Unit Pointer (TU-
PTR)
1 4
TU–12
C–12
POH
125 μs
PTR
T
U
-
12
T
U
-
12
TUG-2 size: (12 Rows x 9 Columns) = 108 Bytes
TU-12 Size : (12 Rows x 9 Columns) = 36 Bytes
TU-12 = VC-12 + (1 Byte TU-PTR)
TUG-2 = TU-12 + TU-12 + TU-12
TU-12 and TUG-2 Frame Duration = 125 μs
49. R
R
2 MB Signal Mapping Procedure
1 12
1
9
TUG–2
T
U
-
12
125 μs
T
U
-
12
T
U
-
12
Multiplexing
x 7
1 86
1
9
TUG–3
125 μs
T
U
G
-
2
T
U
G
-
2
T
U
G
-
2
T
U
G
-
2
T
U
G
-
2
T
U
G
-
2
T
U
G
-
2
TUG-3 Size = (TUG-2) x 7 + R (2 Columns)
TUG-3 Frame Duration = 125 μs
50. 2 MB Signal Mapping Procedure
1 86
1
9
TUG–3
125 μs
Multiplexing
x 3
R
P
O
H
1 261
1
9
VC–4
125 μs
T
U
G
-
3
T
U
G
-
3
T
U
G
-
3
R
VC-4 = TUG-3 + TUG-3 + TUG-3 + R (2 Columns) + POH (1 Column)
VC-4 Frame Size = 9 Rows x 261 Columns = 2349 Bytes
VC-4 Frame Duration = 125 μs
52. 34 MB Signal Mapping Procedure
C–3
Rate
Adaptatio
n
34 Mbps Signal
1 84
1
9
125 μs
Path
Overhead
(POH)
C–3
1 85
1
9
125 μs
P
O
H
VC–3
C-3 Frame Size: 9 rows x 84 columns = 756 Bytes
C-3 Frame Duration: 125 μs
VC-3 = C-3 + (POH) POH = 9 Rows x 1 Column = 9 Byte
VC-3 Frame Size: 9 Rows x 85 Columns = 765 Bytes
VC-3 Frame Duration: 125 μs
53. 34 MB Signal Mapping Procedure
VC–3
Tributary
Unit
Pointer
1 86
1
9
125 μs
Filling Gap
1 86
1
9
125 μs
TU–3
H1
H2
H3
R
TUG–3
TU–3
H1
H2
H3
TU-3 = VC-3 + TU-PTR TU-PTR = 3 Byte Pointer (H1, H2 and H3)
TUG-3 = TU-3 + R (Filling Gap) R (Filling Gap) = 6 Bytes for filling Gap
TU-3 and TUG-3 Frame Duration = 125 μs
54. 34 MB Signal Mapping Procedure
T
U
G
–
3
1 261
1
9
125 μs
P
O
H
R R
VC–4
Multiplexing
x 3
TU–3
1 86
1
9
125 μs
H1
H2
H3
R
TUG–3
VC-4 = TUG-3 + TUG-3 + TUG-3 + R (2 Columns) + POH (1 Column)
VC-4 Frame Size = 9 Rows x 261 Columns = 2349 Bytes
VC-4 Frame Duration = 125 μs
T
U
G
–
3
T
U
G
–
3
56. VC-4 = C-4 + (POH) POH = 9 Rows x 1 Column = 9 Byte
VC-4 Frame Size: 9 Rows x 261 Columns = 2349 Bytes
140 MB Signal Mapping Procedure
C–4
Rate
Adaptatio
n
140 Mbps
Signal
1 260
1
9
125 μs
C-4 Frame Size: 9 rows x 260 columns = 2340 Bytes
C-4 Frame Duration: 125 μs
Path
Overhead
(POH)
C–4
1 261
1
9
125 μs
P
O
H
VC–4
Rate Adaptation: The process of “Bit stuffing”, to account for different clock
rates of the signals coming from different sources
57. 140 MB SIgnal Mapping Procedure
VC–4
AU-PTR
10 270
1
9
125 μs
Multiplexing
x 1
AU-PTR
AU-PTR: A 9 byte pointer is inserted at Row No 4
AU–4 Size: (1x9)+(9x261) = 2358 Bytes
1 9
A U – 4
10 270
1
9
125 μs
1 9
AU–4 AUG–4
In case of 140 Mb signal mapping in STM-1, AU-4 and AUG are identical
AU-4 and AUG Frame Duration: 125 μs
4
58. 140 MB Signal Mapping Procedure
STM-1
RSOH and
MSOH
1 270
1
9
125 μs
A U – 4
10 270
1
9
125 μs
1 9
RSOH
MSOH
AUG–4
RSOH Size: 3 Rows x 9 Columns = 27 Bytes
MSOH Size: 5 Rows x 9 Columns = 45 Bytes
STM-1 Size: 9 Rows x 270 Columns = 2430 Bytes
STM-1 Frame Size: 125 μs
3
5
A U – 4
270
125 μs
1
AUG–4
60. STM-1 Section Overhead Bytes
A1 A1 A1 A2 A2 A2 J0
B1 E1 F1
D1 D2 D3
A U - P T R
B2 B2 B2 K1 K2
D4 D5 D6
D7 D8 D9
D10 D11 D12
S1 M1 E2
R
S
O
H
M
S
O
H
9
R
O
w
S
270 Columns
Frame Time=125µs
Domestic Use
Transmission Media Usage
Blank indicate Future Use
61. A1 & A2 Bytes
Framing bytes A1, A2
• Used to identify the start of frame
• A1=F6H & A2=28H
•Generate Alarms OOF, LOF
62. A1 & A2 Bytes
Framing
Find
A1, A2
OOF
LOF
AIS
Next
Process
Y
N
3ms
63. Regenerator Section Trace Byte: J0 or C1
STM identification byte
Every STM-1 frame is assigned an identification
number before being multiplexed to an STM-N.
It makes sure that regenerator section of
sending and receiving points keep continuously
connecting.
64. B1 & B2 Bytes
Bit Interleaved Parity 8 (BIP-8) byte: B1
Regenerator section error code monitoring
Detect unit is bit block
B1 BBE represented by RS-BBE
Only transmitted in STM-1 #1 of an STM-N
Bit Interleaved Parity 24 code (BIP-24) byte: B2
Multiplexing section error code monitoring
Detect unit is bit block
B2 BBE represented by MS-BBE
Only transmitted in STM-1 #1 of an STM-N
69. M1 Byte
Multiplex Section Remote Error Indication (MS-REI) byte: M1
A return message from Rx to Tx when Rx find MS-BBE
By evaluating the 3xB2, the M1 byte can report back the
number of parity code violations.
MS-REI will be generated in Tx.
M1 byte is one per STM-N frame.
Find B2 Error: MS-BBE
Rx Tx
Traffic
Return M1
Generate MS-REI
70. User Channel Bytes: F1, F2
Provide a 64 kb/s data or voice channel for local
maintenance purpose to network operator.
Only transmitted in STM-1 #1 of STM-N signal.
71. D1~D12 Bytes
Data Communication Channel Bytes: D1~D12
These 12 bytes are provided for the transport of monitoring
& control data in Network Management System.
D1-D3 belongs to RSOH, bandwidth is 3x64 kb/s
D4-D12 belongs to MSOH, bandwidth is 9x64 kb/s
D1-D12 are transmitted in STM-1#1 of STM-N only.
OAM Massages: performance,
alarm, operation commands etc.
DCC Channel
NMS
72. Order Wire Bytes: E1 & E2
Provide 64 kb/s digital telephone channels
E1 transmit RS order wire message
E2 transmit MS order wire message (express
channel)
Only present in STM-1#1 of STM-N
73. K1 & K2 Bytes
Automatic Protection Switching (APS) bytes: K1, K2
(bits:b1-b5)
Used for network multiplex protection switch function
K1 & K2 only transmitted in STM-1 #1 of STM-N
Multiplex Section Remote Defect Indication (MS-RDI): K2
(b6-b8)
– Return alarm message from Rx to Tx
– Indicate Rx receiving alarm
– K2 (b6-b8) value is 110
76. Synchronization Status Message (SSM) Byte: S1
SSM indicates the status & quality level of SDH signal
Value indicates quality level of available clock source (b5-b8)
0010 = G.811 = External Clock (Cesium)
0100 = G.812 = Transit Exchange Clock Signal (Rubidium)
1000 = G.812 = Local Exchange Clock Signal (Rubidium or
Crystal)
1011 = G.813 = Internal Clock (SETS) (Crystal)
1111= Not Suitable for synchronization
Only transmitted in STM-1 #1 of STM-N
78. High Order Path Overhead
J1
B3
C2
G1
F2
H4
F3
K3
N1
VC4
Structure of High Order Path Overhead
1 261
1
9
79. Signal Label Byte: C2
Indicates the type & composition of multiplexing structure.
Example:
00H means unused
02H means multiplexing structure is 3xTUG-3
13H means ATM cells
12H means C-4
80. Path Status Byte: G1
• Indicates high order VC transmission status
• Report back the fault from path end to path
start
•Using G1(b1-b4) to tell the number of error
blocks detected by B3
•Sender gives HP-REI performance event at
corresponding VC4 path
•If receiver detects AIS, J1 and C2 mismatch,
VC4 UNEQ, it will inform the sender at
corresponding VC4 path using G1(b5)=1, and
the sender will give HP-RDI alarm
81. Low Order Path Overhead
VC-12 POH
• Location
First byte of each basic frame in a multi-frame
Consist of four bytes
• Monitoring VC12 performance during signal transmission
1
1
9
500us VC12 Multi-frame
V5 J2 N2
VC12 VC12
VC12
4
K4
VC12
82. Other Bytes
J2: Low order path trace byte (VC-12 level)
N2: byte for network operator usage
K4: APS for low order path
83. E1 Mapping In VC4
TS# X+ 3 (Y-1)+ 21 (Z-1)
X= TUG-3 Location (1-3)
Y= TUG-2 Location (1-7)
Z= TU-12 Location (1-3)
If E1 location is TU 2 4 3, find TS#
85. Network elements are synchronized to a central clock. This central clock is
generated by a high-precision primary reference clock (PRC) unit (ITU-T
G.811). This specifies an accuracy of 1 x 10 e-11.
This clock signal must be distributed throughout the entire network. A
hierarchical structure is used for this.
Improper synchronization causes degradation in network function, and
even total failure results
SDH Synchronization Method
86. PRC
SEC
1
20
SSU
1
SSU
10
21
60
Cascading of timing references through a network
should be minimized and governed by the ITU
recommendation.
Timing performance degrades as timing is passed
from clock to clock. Synchronization chains should be
kept short
Synchronization Network Chain
88. The system clock distribution
The system timing signal generation
Synchronous Timing Unit
89. ① Normal Operating mode
② Holdover mode
③ Free-run mode
Normal
a
b
b
c
d
Holdover Free-run
NE clock working mode
Synchronous Timing Unit
90. S1 byte: used for clock protection switching
Clock setting:
Primary station: set external and built-in
clock’s priority
Secondary station: set line tracing and
built-in clock’s priority
NE clock protection configuration
Synchronous Timing Unit
96. Self-healing Network
It is a network which can automatically
resume its loaded services within a very
short time in case of fault.
Its terminal users do not notice any service
interruption.
97. Self-healing Basic Principle
When the working route fails or experience
problems, services will be switched to the protecting
route automatically within a very short time (<50ms).
Redundancy routes are essential for self-healing
networks.
Working Path
Protection Path
100. Line Network 1+1 Multiplex Section Protection
OL
OL
TR
OL
OL
TR
At sending end, the STM-N signal is sent simultaneously
over both segments of the work and protect.
At receiving side, only one (work or protect) path is
selected based on quality.
Send Together Receive One
work route
protect route
work or protect
CS CS
101. Line Network 1:1 Multiplex Section
Protection
OL
OL
Work
CS
OL
OL
CS
Protection
Work
The 1:1 structure is the subset of the 1:N (where N=1)
structure.
It has the capacity to work in the 1+1 structure and to
interconnect with the 1+1 structure of the other end.
Protection
102. Continue…
In Multiplexing segment 1:1 protection The
working payload is transmitted through the
working path while the protection path can be
used to carry extra payload which is of inferior
class.
When the working path fails, the extra payload on
the protection path will be superseded by the
working payload according to APS protocol. Thus
the working payload is protected.
Under normal circumstances, 1:1 becomes 2+0.
103. Basic Ring Network Protection Types
2-fiber Unidirectional Path Protection Ring
2-fiber Bidirectional Multiplex Section
Protection Ring
4-fiber Bidirectional Multiplex Section
Protection Ring
104. 2-fiber Unidirectional Path Protection Ring
• It adopts 1+1 protection mode, the switching criteria is PATH-AIS, & APS
protocol is not needed.
• At the source NE, the payload is send to the working path and protection path
simultaneously. The destination NE detect and compare the coming signal from
both paths, then determine to receive the payload of better quality.
AC
CA AC
A
B
C
D
CA
W1
W1
P1
P1
CA AC
A
B
C
D
W1
P1
P1
W1
CA AC
switching
105. 2-fiber Bidirectional MS Protection Ring
2 fiber: Two fibers between a pair of nodes
Bi-direction: Service between two NEs use the
same section of the network and are transmitted
by reverse direction
Multiplexing Section: Protection based on MS,
protect the payload part, use APS protocol for
protection.
106. Working Principle
S1/P2
S2/P1
A
C
B
D
Working path
S1 & S2; under normal
situations, service are
transmitted over
working path. The first
half of one fiber is
working path. Taking
STM-16 as an example,
1-8 AU4 are used for
working path.
107. Working Principle
S1/P2
S2/P1
A
C
B
D
Protecting Path
P1 & P2; services
transmit along
protection path after
switch over. The last
half part of the fiber is
used as protecting
path. Taking STM-16 as
example, 9-16 AU4 are
used as protecting
path.
109. Working Principle
Use S1 & S2 to transmit
services.
Service AC is sent in S1
through path A->B->C
Service CA is sent in S2
through path C->B->A
P1 and P2 can be used to
send extra service now.
AC Tx
S1/P2
S2/P1
A
C
B
D
AC Rx
CA Tx
CA Rx
111. Switching Procedure
Switch:If the fiber between
B and C is broken, switching
occurs in B and C
B node: service AC crosses
from S1 to P1, and sent
through A->B->A->D->C
C node: service CA crosses
from S2 to P2, and sent
through C->D->A->B->A
AC Tx
S1/P2
S2/P1
A
C
B
D
AC Rx
CA Tx
CA Rx
112. Normal state in MS-SPRING.
• AU4 # 1-8 used for working
channels
• AU4# 9-16 used for protection
& can be used for low priority
traffic.
•Time slots can be reused
•High network
capacity ½*M*STM-N
•Switching time -
25ms
Multiplex Section Shared Protection Ring
113. Features Of 2 Fiber Bidirectional MSP Ring
Advantages: Time slots between two nodes can be
reused, thus increasing the transmission capacity.
Standby path P1 and P2 can be used to transmit
extra services of inferior class.
Disadvantages: longer switching time due to APS
protocol. Numbers of maximum nodes supported
by APS is limited to 16.
Transmission capacity: (k/2) x STM-N (k=no. of
nodes).
114. Protection Type 2f Unidirectional PP
Ring
2f Bidirectional MSP Ring 4f Bidirectional MSP Ring
No. of Nodes K K K
Line Speed STM-N STM-N STM-N
Transmission
Capacity
STM-N K/2*STM-N k*STM-N
APS Protocol No Yes Yes
Switching Time <30ms 50-200ms 50-200ms
Cost Low Medium High
System Complexity Simple Complex Complex
Field of Application Relay Networks
(Centralized Services)
Long Distance Networks
(Distribution Services)
Long Distance Networks
(Distribution Services)
Comparison Of Protection Schemes
121. OSN 3500 Intelligent Features
Service level agreement (SLA)
Topology automatic discovery function
Automatic end-to-end service configuration
Support mesh networking and protection
Traffic engineering
Supports RPR
SDH Synchronization Method
Master-slave synchronization uses a hierarchy of clocks in which each level of the hierarchy is synchronized with reference to a higher level, the highest level being the primary reference clock (PRC). Clock reference signals are distributed between levels of the hierarchy via a distribution network which may use the facilities of the transport network. The hierarchical levels are shown in the slide.
The distribution of timing between hierarchical node clocks must be done by a method that avoids intermediate pointer processing. Two possible methods are recommended :
Recover timing from a received STM-N signal. This avoids the unpredictable effect of a pointer justification on the downstream slave clock.
Derive timing from a synchronization link that is not supported by an SDH network, for example, a PDH network.
The slave clock determines the synchronization link to be used as its reference and changes to an alternative if the original link fails.
Synchronization network reference chain
The node clocks are interconnected via N network elements each having clocks compliant with Recommendation G.813.
The longest chain should not exceed K slave clocks compliant with Recommendation G.812. The quality of timing will deteriorate as the number of synchronization links increases.
The value of N will be limited by the quality of timing required by the last network element in the chain. This ensures the short-term stability requirements .To determine synchronization clock specifications, the values for the worst-case synchronization reference chain are: K=10, N=20 with the total number of SDH network element clocks limited to 60.
Because jitter can rise on the signal after it has passed many nodes, in some NEs down the transmission link, the synchronization signal must be recovered and reshaped. In this case a Synchronization Supply Unit (SSU) will be used. In addition to recovering and reshaping, the SSU will also able to run on its own when the reference signal (e.g. coming from the PRC) is lost, in this case, the SSU will be able to maintain the quality of the reference signal it produces by means of a holdover mode: the frequency and phase of each reference signal are stored in a memory and used to generate a reference signal locally
Multiplex Section Shared Protection RING
The-two-fiber bidirectional multiplex section protection ring requires only two fibers for each span of the ring. Each fiber carries both working channels and protection channels. On each fiber, half the channels are defined as working channels and half are defined as protection channels. The normal traffic carried on working channels in one fiber are protected by the protection channels in another fiber traveling in the opposite direction around the ring. This permits the bidirectional transport of normal traffic.
Two-fiber MS shared protection rings support ring switching only. When a ring switch is invoked, the normal traffic is switched from the working channels to the protection channels in the opposite direction.
From 1 to N according to the order that they appear in the multiplex. AU-4s numbered from 1 to N/2 shall be assigned as working channels, and AU-4s numbered from (N/2) + 1 to N shall be assigned as protection channels. The normal traffic carried on working channel “m” is protected by protection channel (N/2) +m.