SlideShare a Scribd company logo
1 of 144
SDH FUNDAMENTALS
Evolution Of Transport Technologies
 PCM
 PDH
 SDH
 NGSDH/Ethernet/RPR
 WDM/ROADM/OTN
3
SDH
SDH
 Synchronous Digital Hierarchy
 SDH is a hierarchical set of digital transport
structures, standardized for the transport of
suitably adapted payloads over physical
transmission networks
 An integrated transmission network managed by
a powerful network management system
SDH
A standard developed by the International
Telecommunication Union (ITU)
It is documented in standard G.707 and its
extension G.708
Developed to replace the Plesiochronous
Digital Hierarchy (PDH) system
Allow interoperability between equipment
from different vendors with Strong
Network Management capabilities
SDH ITU Recommendations
SDH refers to the rates and formats specified by ITU-T
for synchronous data transmission over fiber optic
networks.
ITU-T G.707: Network Node Interface for SDH
ITU-T G.781: Structure of Recommendations on Equipment for SDH
ITU-T G.783: Characteristics of SDH Equipment Functional Blocks
ITU-T G.803: Architecture of Transport Networks Based on SDH
PDH
Pre SDH Standard
3 standards..European, Japanese, North America
European Standard in Pakistan
Complex Multiplexing structure
Weak monitoring
PDH Data Rates
PCM…… 64Kbps
E1……… 2.048 Mbps (30 x64 Kbps)
E2……… 8.448 Mbps
E3……… 34.368 Mbps
E4……… 139.264 Mbps
E5……… 565 Mbps
PDH Standards & Rates
Japanese Standard
European Standard
565Mb/s
139Mb/s
34Mb/s
8Mb/s
2Mb/s
1.6Gb/s
400Mb/s
100Mb/s
32Mb/s
6.3Mb/s
1.5Mb/s
274Mb/s
45Mb/s
6.3Mb/s
x4 x4
x4
x4
x4
x4
x4
x4
x6
x7
x3
x5
North American
Standard
E1
E2
E3
E4
E5
T1
T2
T3
J2
J1
Adding & Dropping In PDH
140/34
Mb/s
34/140
Mb/s
34/8
8/34
8/2 Mb/s 2/8 Mb/s
2 Mb/s
Multiplexing
De-multiplexing
Optical Optical
Electrical
E
1
E1
E2
E2
E3
E3
E4 E4
Data Rates & Terminologies
Q
34.368 Mbps
Q
34.368 Mbps
P
8.112 Mbps
E1
2.028 Mbps
E1
2.028 Mbps
E1
2.028 Mbps
E1
2.028 Mbps
P
8.112 Mbps
P
8.112 Mbps
P
8.112 Mbps
Q
34.368 Mbps
Q
34.368 Mbps
R1
140 Mbps
R1
140 Mbps
R1
140 Mbps
R1
140 Mbps
System
565 Mbps
Limitations Of PDH
Impossible to interconnect three Incompatible
PDH standards
No worldwide optical interface standard
Week Monitoring due to insufficient capacity
for network management
No direct extraction of lower order signal
Lower data rates for current and future
demands
–STM-1: 155.52 Mbps
–STM-4: 622.08 Mbps
–STM-16: 2.488.32 Gbps
–STM-64: 9.95 Gbps
–STM-256: 40 Gbps
SDH Bit Rates
SDH Capacity
STM-N Line Rate
(Mb/s)
E1
Capacity
E3
Capacity
E4
Capacity
N=1 155.52 63 3 1
N=4 622.08 252 12 4
N=16 2488.32 1008 48 16
N=64 9953.28 4032 192 64
N=256 39813.12 16128 768 256
* STM-0 is not SDH signal rate, however, it is equal to SONET basic rate 51.84Mbps
SDH Network Elements
ADM: Add Drop Multiplexer
TM: Termination Multiplexer
DCS: Digital Cross Connect
REG: Repeater (Regenerator)
Four Types
Adding & Dropping In SDH
ADM
Optical Interface Optical Interface
2 Mb/s
Electrical Signal
SDH: Direct & Simple to add/drop electrical signal
Advantages Of SDH
More Capacity
Easy to interconnect different systems
simple and direct adding or dropping of
electrical signals
Network Management System (NMS)
Flexible and self-healing networks (protection)
Advantages Of SDH
 All current PDH signals can be transmitted within the
SDH except 8 Mb/s (E2) which has no container.
 A reduction in the amount of equipment & an
increase in network reliability.
 Compatible….PDH, ATM, DQDB
Disadvantages Of SDH
Lower Bandwidth utilization
Complicated SDH equipments due to variety
of management traffic types and options
Software based..vulnerable to computer
viruses, software bugs, configuration
problems, etc.
Direct add/drop needs pointer, which make it
complex and introduce jitter
Can’t carry E2 due to un-availability of
container.
SDH Frame Structure
1
3
4
5
9
SOH
STM-N Payload
(including POH)
9×N 261×N
270×N
SOH
AU-PTR
Block frame structure
In units of byte (8 bits)
Rate: 8000 frames/s, frame cycle: 125µs
1
2161
270
2430
271 540
1st Byte Last
Byte
2430
STM-1
Frame # 1
1st
Byte
STM-1
Frame # 2
From Left to right & top to bottom
Transmission Direction
STM-1 Frame Transmission
1st
Byte
2430th
Byte
MUX
MUX
REG
Path Section
MS
MS
MS
Multiplex Section
Multiplex Section
Multiplex Section
RS
SDH Link Structure
Regenerator Section
Sub network
RS, MS, AND Path Overheads
Difference among POH, MSOH, & RSOH
Term
Mux
Term
Mux
Add-Drop
Mux
Repeater Repeater
POH
MSOH
RSOH
• Path OH – end to end circuit
• Multiplex Section OH – multiplexer to multiplexer
• Regenerator Section OH – repeater to adjacent node or vice versa
Section Overhead (SOH)
Multiplex Section Overhead (MSOH)
-MSOH– supervises each STM-1 of STM-N
frame
Regenerator Section Overhead (RSOH)
–RSOH– supervises the whole STM-N
frame
Path Overhead (POH)
Lower order POH (LPOH)
Higher order (HPOH)
---HPOH and LPOH are used for VC4, VC3, and
VC12 monitoring
 POH monitors individual low-rate signals within
STM-N frame, while SOH monitors the whole
package i.e., STM-N frame
STM – Performance Monitoring And
Management
RSOH, MSOH and POH provide monitoring and
management function for different layers/levels
of STM-N frame
For STM-64 frame:
– RSOH monitors the overall transmission
performance of STM-64 signal
– MSOH monitors the performance of individual
STM-1s
– POH monitors each low-rate signal (e.g., 2
Mbps)
SDH Overhead Overview
Overhead
SOH
POH
RSOH
MSOH
High Order POH
Low Order POH
Payload
where services are put in the STM-N
frame
2M, 34M or 140M information is packed and
put in the payload. It is then carried by STM-
N signal to send over SDH nodes
If we take STM-N frame as a truck, the
payload section can be looked as the
carriage of the truck
Administrative Unit Pointer (AU-PTR)
Locate lower rate signal inside a higher rate
signal of a STM-N frame (payload).
comprises of 9 bytes
AU-PTR
AU-4 pointer addresses only every 3rd payload
byte.
Last 3 bytes (H3) of AU-PTR are provided as
additional transmission capacity in order to
equalize clock difference.
Mapping (Mode & Structure)
Low Rate SDH → High Rate SDH: Byte Interleave
PDH → STM-N: Synchronous Multiplexing &
Flexible Mapping
– 140M→STM-N
– 34M→STM-N
– 2M→STM-N
– No container for E2 (8 Mbps)
Container
Container is an information structure, mainly in-
charge of adaptation functions so that
commonly used PDH signals can occupy fixed
space
ITU-T G.709 recommendations have stipulated
5 kinds of standard containers:
C-11, C-12, C-2, C-3 & C-4
Virtual Container
The digital flow from the standard container
combined with path overhead forms a virtual
container (VC).
C-4 + POH (9 bytes) = VC-4 (9x261 bytes)
C-3 + POH (9 bytes) = VC-3 (9x85 bytes)
C-12 + POH (1 byte) = VC-12 (35 bytes)
It is the most important information structure in
SDH which supports path layer connection.
AU & TU
The Administration Unit (AU) is an information
structure that performs adaptation functions for
the high order path layer and multiplexing
segment layer.
AU-4 = AU-PTR + VC-4
The Tributary Unit (TU) is an information structure
that performs adaptation functions for the low
order path layer and high order path layer.
TU-3 = VC-3 + PTR (3 bytes)
TU-12 = VC-12 + PTR (one byte)
TU-3 Pointer
Consists of 3 pointer bytes H1, H2, H3
TU-3 = VC-3 + 3 bytes pointer
TU-12 Pointer
TU-12 = PTR (one byte) + VC-12 (35 bytes)
TUG & AUG
 TUG-3 = TU-3 + 6 Justification Bytes
TUG-2 = 3 x TU-12
TUG-3 = 7 x TUG-2
One or more AU with fixed locations in the STM-
N frame form an Administration Unit Group
(AUG). A single AU-4 can form one
Administration Unit Group (AUG).
AUG is useful for the AU-3 multiplexing, but
meaningless for AU-4 multiplexing.
Conversion/Mapping
of PDH Rates to SDH
Mapping
A process used when tributaries are adapted into
Virtual Containers (VCs) by adding justification
bits and Path Overhead (POH) information
Its essence is to make the various tributary
signals synchronized with related virtual
containers so that VC can be an independent
entity in the transmission, multiplexing and cross
connection
Alignment
This process takes place when a pointer is
included in a Tributary Unit (TU) or an
Administrative Unit (AU), to allow the first byte of
the Virtual Container to be located.
By setting the pointer, it can provide a flexible
and dynamic method for alignment of VC in the
unit (TU or AU-4) frame.
Multiplexing
This process is used when multiple lower-order
path layer signals are adapted into a higher-
order path signal, or when the higher-order path
signals are adapted into a Multiplex Section.
This type of multiplexing comes under
synchronous multiplexing category
Stuffing
When tributary signals are multiplexed &
aligned, some spare capacity is required in
SDH frames to provide space for various
tributary rates
This space capacity is filled with "fixed stuffing"
bits that carry no information, but are required
to fill up the particular frame.
Mapping & Multiplexing Procedures
STM-N
xN x1
C-12
VC-12
VC-4 TUG-2
AUG-4 AU-4 TU-12 2Mb/s
Code rate
adjustment
LO POH
TU PTR
AU PTR
x3
Multiplexing
x7 Multiplexing
HO POH
xN Multiplexing
TUG-3
x3
Multiplexing
44
Virtual Container
STM-N
× N × 1 140Mb/s
45Mb/s
34Mb/s
6.3Mb/s
2Mb/s
1.5Mb/s
×3
× 7
× 7
× 1
× 3
C-11
C-12
C-2
C-3
C-4
VC-11
VC-2
VC-3
VC-3
VC-4
TU-11
TU-12
TU-2
TU-3
TUG-2
TUG-3
AUG
AU-3
AU-4
VC-12
×3
×4
×1
Container
Tributary Unit
Administrative Unit
Tributary Unit Group
Administrative Unit Group
Synchronous
Transmission module
Alignment
Multiplexing
Mapping
45
Virtual Container
Container
Tributary Unit
Administrative Unit
Tributary Unit Group
Administrative Unit Group
Synchronous
Transmission module
Alignment
Multiplexing
Mapping
STM-N
× N × 1
140Mb/s
34Mb/s
2Mb/s
× 7
× 1
× 3
C-12
C-3
C-4
VC-3
VC-4
TU-12
TU-3
TUG-2
TUG-3
AUG AU-4
VC-12
×3
Multiplexing Structure
C: Container
VC: Virtual Container
TU: Tributary Unit
TUG: Tributary Unit Group
AU: Administrative Unit
AUG: Administrative Unit Group
2 MB Signal Mapping Procedure
C–12
Rate
Adaptation
2 Mbps Signal
1 4
1
9
125 μs
1 Byte Path
Overhead
(POH)
1 4
1
9
VC–12
C-12 Size: (4 Rows x 9 Columns) – 2 = 34 Bytes
C–12
POH
VC-12 Size: (4 Rows x 9 Columns) – 1 = 35 Bytes
125 μs
VC-12 = C-12 + (1 Byte POH)
C-12 Frame Duration = 125 μs
VC-12 Frame Duration = 125 μs
There can be four different POH
bytes for one C-12 V5, J2, Z6, Z7
2 MB Signal Mapping Procedure
Multiplexing
x 3
1 12
1
9
TUG–2
T
U
-
12
125 μs
1 4
1
9
VC–12
C–12
POH
125 μs
1 Byte Tributary
Unit Pointer (TU-
PTR)
1 4
TU–12
C–12
POH
125 μs
PTR
T
U
-
12
T
U
-
12
TUG-2 size: (12 Rows x 9 Columns) = 108 Bytes
TU-12 Size : (12 Rows x 9 Columns) = 36 Bytes
TU-12 = VC-12 + (1 Byte TU-PTR)
TUG-2 = TU-12 + TU-12 + TU-12
TU-12 and TUG-2 Frame Duration = 125 μs
R
R
2 MB Signal Mapping Procedure
1 12
1
9
TUG–2
T
U
-
12
125 μs
T
U
-
12
T
U
-
12
Multiplexing
x 7
1 86
1
9
TUG–3
125 μs
T
U
G
-
2
T
U
G
-
2
T
U
G
-
2
T
U
G
-
2
T
U
G
-
2
T
U
G
-
2
T
U
G
-
2
TUG-3 Size = (TUG-2) x 7 + R (2 Columns)
TUG-3 Frame Duration = 125 μs
2 MB Signal Mapping Procedure
1 86
1
9
TUG–3
125 μs
Multiplexing
x 3
R
P
O
H
1 261
1
9
VC–4
125 μs
T
U
G
-
3
T
U
G
-
3
T
U
G
-
3
R
VC-4 = TUG-3 + TUG-3 + TUG-3 + R (2 Columns) + POH (1 Column)
VC-4 Frame Size = 9 Rows x 261 Columns = 2349 Bytes
VC-4 Frame Duration = 125 μs
VC–4
2 MB Signal Mapping Procedure
1 261
1
9
125 μs
AU-PTR
AU–4
VC–4
1 270
1
9
125 μs
AUG
1 270
1
9
125 μs
STM-1
1 270
1
9
125 μs
Multiplexing
x 1
RSOH and
MSOH
AU-PTR
VC–4
AU-PTR
VC–4
AU-PTR
MSOH
RSOH
34 MB Signal Mapping Procedure
C–3
Rate
Adaptatio
n
34 Mbps Signal
1 84
1
9
125 μs
Path
Overhead
(POH)
C–3
1 85
1
9
125 μs
P
O
H
VC–3
C-3 Frame Size: 9 rows x 84 columns = 756 Bytes
C-3 Frame Duration: 125 μs
VC-3 = C-3 + (POH) POH = 9 Rows x 1 Column = 9 Byte
VC-3 Frame Size: 9 Rows x 85 Columns = 765 Bytes
VC-3 Frame Duration: 125 μs
34 MB Signal Mapping Procedure
VC–3
Tributary
Unit
Pointer
1 86
1
9
125 μs
Filling Gap
1 86
1
9
125 μs
TU–3
H1
H2
H3
R
TUG–3
TU–3
H1
H2
H3
TU-3 = VC-3 + TU-PTR TU-PTR = 3 Byte Pointer (H1, H2 and H3)
TUG-3 = TU-3 + R (Filling Gap) R (Filling Gap) = 6 Bytes for filling Gap
TU-3 and TUG-3 Frame Duration = 125 μs
34 MB Signal Mapping Procedure
T
U
G
–
3
1 261
1
9
125 μs
P
O
H
R R
VC–4
Multiplexing
x 3
TU–3
1 86
1
9
125 μs
H1
H2
H3
R
TUG–3
VC-4 = TUG-3 + TUG-3 + TUG-3 + R (2 Columns) + POH (1 Column)
VC-4 Frame Size = 9 Rows x 261 Columns = 2349 Bytes
VC-4 Frame Duration = 125 μs
T
U
G
–
3
T
U
G
–
3
VC–4
34 MB Signal Mapping Procedure
1 261
1
9
125 μs
AU-PTR
AU–4
VC–4
1 270
1
9
125 μs
AUG
1 270
1
9
125 μs
STM-1
1 270
1
9
125 μs
Multiplexing
x 1
RSOH and
MSOH
AU-PTR
VC–4
AU-PTR
VC–4
AU-PTR
MSOH
RSOH
VC-4 = C-4 + (POH) POH = 9 Rows x 1 Column = 9 Byte
VC-4 Frame Size: 9 Rows x 261 Columns = 2349 Bytes
140 MB Signal Mapping Procedure
C–4
Rate
Adaptatio
n
140 Mbps
Signal
1 260
1
9
125 μs
C-4 Frame Size: 9 rows x 260 columns = 2340 Bytes
C-4 Frame Duration: 125 μs
Path
Overhead
(POH)
C–4
1 261
1
9
125 μs
P
O
H
VC–4
Rate Adaptation: The process of “Bit stuffing”, to account for different clock
rates of the signals coming from different sources
140 MB SIgnal Mapping Procedure
VC–4
AU-PTR
10 270
1
9
125 μs
Multiplexing
x 1
AU-PTR
AU-PTR: A 9 byte pointer is inserted at Row No 4
AU–4 Size: (1x9)+(9x261) = 2358 Bytes
1 9
A U – 4
10 270
1
9
125 μs
1 9
AU–4 AUG–4
In case of 140 Mb signal mapping in STM-1, AU-4 and AUG are identical
AU-4 and AUG Frame Duration: 125 μs
4
140 MB Signal Mapping Procedure
STM-1
RSOH and
MSOH
1 270
1
9
125 μs
A U – 4
10 270
1
9
125 μs
1 9
RSOH
MSOH
AUG–4
RSOH Size: 3 Rows x 9 Columns = 27 Bytes
MSOH Size: 5 Rows x 9 Columns = 45 Bytes
STM-1 Size: 9 Rows x 270 Columns = 2430 Bytes
STM-1 Frame Size: 125 μs
3
5
A U – 4
270
125 μs
1
AUG–4
OVERHEAD
STM-1 Section Overhead Bytes
A1 A1 A1 A2 A2 A2 J0  
B1   E1  F1  
D1   D2  D3
A U - P T R
B2 B2 B2 K1 K2
D4 D5 D6
D7 D8 D9
D10 D11 D12
S1 M1 E2  
R
S
O
H
M
S
O
H
9
R
O
w
S
270 Columns
Frame Time=125µs
 Domestic Use
 Transmission Media Usage
Blank indicate Future Use
A1 & A2 Bytes
Framing bytes A1, A2
• Used to identify the start of frame
• A1=F6H & A2=28H
•Generate Alarms OOF, LOF
A1 & A2 Bytes
Framing
Find
A1, A2
OOF
LOF
AIS
Next
Process
Y
N
3ms
Regenerator Section Trace Byte: J0 or C1
STM identification byte
Every STM-1 frame is assigned an identification
number before being multiplexed to an STM-N.
It makes sure that regenerator section of
sending and receiving points keep continuously
connecting.
B1 & B2 Bytes
Bit Interleaved Parity 8 (BIP-8) byte: B1
Regenerator section error code monitoring
Detect unit is bit block
B1 BBE represented by RS-BBE
Only transmitted in STM-1 #1 of an STM-N
Bit Interleaved Parity 24 code (BIP-24) byte: B2
Multiplexing section error code monitoring
Detect unit is bit block
B2 BBE represented by MS-BBE
Only transmitted in STM-1 #1 of an STM-N
A1 00110011
A2 11001100
A3 10101010
A4 00001111
B 01011010
BIP-8
Bit Interleaved parity
B1 working mechanism:
SDH
Equipment
Sending
SDH
Equipment
Receiving
Detect B1
Insert B1
STM-N
If error blocks occurred
produce: RS-BBE
performance event
Bit interleaved Parity B2 byte
monitor the error blocks of MS
SDH
Equipment
Sending
SDH
Equipment
Receiving
Detect B2
Insert B2
STM-N
If error blocks occurred
produce: MS-BBE
performance event
1st
Frame
A B
1st
Frame
Tx
2nd Frame
No.n
Frame
2nd Frame
Rx
No.n Frame
Calculate B1,
B2
Verify B1,
B2
B1 & B2 Bytes
M1 Byte
Multiplex Section Remote Error Indication (MS-REI) byte: M1
 A return message from Rx to Tx when Rx find MS-BBE
 By evaluating the 3xB2, the M1 byte can report back the
number of parity code violations.
 MS-REI will be generated in Tx.
 M1 byte is one per STM-N frame.
Find B2 Error: MS-BBE
Rx Tx
Traffic
Return M1
Generate MS-REI
User Channel Bytes: F1, F2
 Provide a 64 kb/s data or voice channel for local
maintenance purpose to network operator.
 Only transmitted in STM-1 #1 of STM-N signal.
D1~D12 Bytes
Data Communication Channel Bytes: D1~D12
 These 12 bytes are provided for the transport of monitoring
& control data in Network Management System.
 D1-D3 belongs to RSOH, bandwidth is 3x64 kb/s
 D4-D12 belongs to MSOH, bandwidth is 9x64 kb/s
 D1-D12 are transmitted in STM-1#1 of STM-N only.
OAM Massages: performance,
alarm, operation commands etc.
DCC Channel
NMS
Order Wire Bytes: E1 & E2
Provide 64 kb/s digital telephone channels
E1 transmit RS order wire message
E2 transmit MS order wire message (express
channel)
Only present in STM-1#1 of STM-N
K1 & K2 Bytes
Automatic Protection Switching (APS) bytes: K1, K2
(bits:b1-b5)
 Used for network multiplex protection switch function
 K1 & K2 only transmitted in STM-1 #1 of STM-N
 Multiplex Section Remote Defect Indication (MS-RDI): K2
(b6-b8)
– Return alarm message from Rx to Tx
– Indicate Rx receiving alarm
– K2 (b6-b8) value is 110
K2 Detection
Sending back
MS-RDI
Giving
MS-AIS
Found
K2(b6-b8)
Producing
MS-RDI
111
110
SDH
Equipment
Sender
SDH
Equipment
Receiver
STM-N
Find K2(111)
produce: MS-AIS
alarm event
Sending back K2
(110)
Receive K2(110)
produce: MS-RDI
alarm event
Synchronization Status Message (SSM) Byte: S1
 SSM indicates the status & quality level of SDH signal
 Value indicates quality level of available clock source (b5-b8)
0010 = G.811 = External Clock (Cesium)
0100 = G.812 = Transit Exchange Clock Signal (Rubidium)
1000 = G.812 = Local Exchange Clock Signal (Rubidium or
Crystal)
1011 = G.813 = Internal Clock (SETS) (Crystal)
1111= Not Suitable for synchronization
 Only transmitted in STM-1 #1 of STM-N
2 Path Overhead
VC4
POH
VC12
POH
(HPOH) (LPOH)
Classification:
• Lower-order POH--VC12
• Higher-order POH---VC4
• Difference:
• VC-4 macro, VC-12 micro
• VC-4 includes VC-12
Path Overhead
High Order Path Overhead
J1
B3
C2
G1
F2
H4
F3
K3
N1
VC4
Structure of High Order Path Overhead
1 261
1
9
Signal Label Byte: C2
Indicates the type & composition of multiplexing structure.
Example:
 00H means unused
 02H means multiplexing structure is 3xTUG-3
 13H means ATM cells
 12H means C-4
Path Status Byte: G1
• Indicates high order VC transmission status
• Report back the fault from path end to path
start
•Using G1(b1-b4) to tell the number of error
blocks detected by B3
•Sender gives HP-REI performance event at
corresponding VC4 path
•If receiver detects AIS, J1 and C2 mismatch,
VC4 UNEQ, it will inform the sender at
corresponding VC4 path using G1(b5)=1, and
the sender will give HP-RDI alarm
Low Order Path Overhead
VC-12 POH
• Location
 First byte of each basic frame in a multi-frame
 Consist of four bytes
• Monitoring VC12 performance during signal transmission
1
1
9
500us VC12 Multi-frame
V5 J2 N2
VC12 VC12
VC12
4
K4
VC12
Other Bytes
 J2: Low order path trace byte (VC-12 level)
 N2: byte for network operator usage
 K4: APS for low order path
E1 Mapping In VC4
TS# X+ 3 (Y-1)+ 21 (Z-1)
X= TUG-3 Location (1-3)
Y= TUG-2 Location (1-7)
Z= TU-12 Location (1-3)
If E1 location is TU 2 4 3, find TS#
84
(TU-12) X
(TUG – 2) Y
(TUG–3) Z
2 5 8 11 14 17 20
1
2
3
3 6 9 12 15 18 21
1
2
3
1
2
3
1
1
4 7 10 13 16 19
2 3 4 5 6 7
 Network elements are synchronized to a central clock. This central clock is
generated by a high-precision primary reference clock (PRC) unit (ITU-T
G.811). This specifies an accuracy of 1 x 10 e-11.
 This clock signal must be distributed throughout the entire network. A
hierarchical structure is used for this.
 Improper synchronization causes degradation in network function, and
even total failure results
SDH Synchronization Method
PRC
SEC
1
20
SSU
1
SSU
10
21
60
Cascading of timing references through a network
should be minimized and governed by the ITU
recommendation.
Timing performance degrades as timing is passed
from clock to clock. Synchronization chains should be
kept short
Synchronization Network Chain
SETPI
SETS
 Synchronous Equipment Timing Source (SETS)
 Synchronous Equipment Timing Physical Interface (SETPI)
Synchronous Timing Unit
 The system clock distribution
 The system timing signal generation
Synchronous Timing Unit
① Normal Operating mode
② Holdover mode
③ Free-run mode
Normal
a
b
b
c
d
Holdover Free-run
 NE clock working mode
Synchronous Timing Unit
S1 byte: used for clock protection switching
Clock setting:
Primary station: set external and built-in
clock’s priority
Secondary station: set line tracing and
built-in clock’s priority
 NE clock protection configuration
Synchronous Timing Unit
TM TM
1) Point-to-Point Network
Network Topologies
TM
2) Point-to-multi Point Network
TM ADM ADM
TM
TM
TM
3)ring Network
ADM-1
ADM-4
ADM-3
ADM-2
4) Mesh Network
ADM
ADM
ADM
ADM
ADM
5) Composite Network
Self-healing Network
It is a network which can automatically
resume its loaded services within a very
short time in case of fault.
Its terminal users do not notice any service
interruption.
Self-healing Basic Principle
When the working route fails or experience
problems, services will be switched to the protecting
route automatically within a very short time (<50ms).
Redundancy routes are essential for self-healing
networks.
Working Path
Protection Path
Network Protection
Line Network Protection Types
• 1+1 Multiplex Section Protection
• 1:1 Multiplex Section Protection
Line Network 1+1 Multiplex Section Protection
OL
OL
TR
OL
OL
TR
At sending end, the STM-N signal is sent simultaneously
over both segments of the work and protect.
At receiving side, only one (work or protect) path is
selected based on quality.
Send Together Receive One
work route
protect route
work or protect
CS CS
Line Network 1:1 Multiplex Section
Protection
OL
OL
Work
CS
OL
OL
CS
Protection
Work
The 1:1 structure is the subset of the 1:N (where N=1)
structure.
It has the capacity to work in the 1+1 structure and to
interconnect with the 1+1 structure of the other end.
Protection
Continue…
 In Multiplexing segment 1:1 protection The
working payload is transmitted through the
working path while the protection path can be
used to carry extra payload which is of inferior
class.
 When the working path fails, the extra payload on
the protection path will be superseded by the
working payload according to APS protocol. Thus
the working payload is protected.
 Under normal circumstances, 1:1 becomes 2+0.
Basic Ring Network Protection Types
 2-fiber Unidirectional Path Protection Ring
 2-fiber Bidirectional Multiplex Section
Protection Ring
 4-fiber Bidirectional Multiplex Section
Protection Ring
2-fiber Unidirectional Path Protection Ring
• It adopts 1+1 protection mode, the switching criteria is PATH-AIS, & APS
protocol is not needed.
• At the source NE, the payload is send to the working path and protection path
simultaneously. The destination NE detect and compare the coming signal from
both paths, then determine to receive the payload of better quality.
AC
CA AC
A
B
C
D
CA
W1
W1
P1
P1
CA AC
A
B
C
D
W1
P1
P1
W1
CA AC
switching
2-fiber Bidirectional MS Protection Ring
 2 fiber: Two fibers between a pair of nodes
 Bi-direction: Service between two NEs use the
same section of the network and are transmitted
by reverse direction
 Multiplexing Section: Protection based on MS,
protect the payload part, use APS protocol for
protection.
Working Principle
S1/P2
S2/P1
A
C
B
D
Working path
S1 & S2; under normal
situations, service are
transmitted over
working path. The first
half of one fiber is
working path. Taking
STM-16 as an example,
1-8 AU4 are used for
working path.
Working Principle
S1/P2
S2/P1
A
C
B
D
Protecting Path
P1 & P2; services
transmit along
protection path after
switch over. The last
half part of the fiber is
used as protecting
path. Taking STM-16 as
example, 9-16 AU4 are
used as protecting
path.
Working Principle
S1/P2
S2/P1
A
C
B
D
Relationship
between working
& protecting paths
The protecting path of
one direction protect
the working path of
the other direction,
i.e, P1 protects S1, &
P2 protects S2.
Working Principle
Use S1 & S2 to transmit
services.
Service AC is sent in S1
through path A->B->C
Service CA is sent in S2
through path C->B->A
P1 and P2 can be used to
send extra service now.
AC Tx
S1/P2
S2/P1
A
C
B
D
AC Rx
CA Tx
CA Rx
Switching Conditions
Auto Switch Conditions:
LOS, LOF, MS-AIS, Signal Degrade
Switching Procedure
Switch:If the fiber between
B and C is broken, switching
occurs in B and C
B node: service AC crosses
from S1 to P1, and sent
through A->B->A->D->C
C node: service CA crosses
from S2 to P2, and sent
through C->D->A->B->A
AC Tx
S1/P2
S2/P1
A
C
B
D
AC Rx
CA Tx
CA Rx
Normal state in MS-SPRING.
• AU4 # 1-8 used for working
channels
• AU4# 9-16 used for protection
& can be used for low priority
traffic.
•Time slots can be reused
•High network
capacity ½*M*STM-N
•Switching time -
25ms
Multiplex Section Shared Protection Ring
Features Of 2 Fiber Bidirectional MSP Ring
 Advantages: Time slots between two nodes can be
reused, thus increasing the transmission capacity.
Standby path P1 and P2 can be used to transmit
extra services of inferior class.
 Disadvantages: longer switching time due to APS
protocol. Numbers of maximum nodes supported
by APS is limited to 16.
 Transmission capacity: (k/2) x STM-N (k=no. of
nodes).
Protection Type 2f Unidirectional PP
Ring
2f Bidirectional MSP Ring 4f Bidirectional MSP Ring
No. of Nodes K K K
Line Speed STM-N STM-N STM-N
Transmission
Capacity
STM-N K/2*STM-N k*STM-N
APS Protocol No Yes Yes
Switching Time <30ms 50-200ms 50-200ms
Cost Low Medium High
System Complexity Simple Complex Complex
Field of Application Relay Networks
(Centralized Services)
Long Distance Networks
(Distribution Services)
Long Distance Networks
(Distribution Services)
Comparison Of Protection Schemes
Node Protection (SNCP)
Protection features:
 Traffic transmit end sends concurrently, receive
end receives selectively
 2 fiber unidirectional traffic (Diversely routed)
 1 + 1 single-ended protection
Protection switching criteria:
 Signal fail (SF)
 Signal degrade (SD)
 Externally initiated command
SNCP
SNCP Vs MSSPRING
Network Protection Summary
Hardware (OSN 3500)
OSN3500
Huawei NGSDH series
OSN stands for Optical Switch Node
Intelligent (support ASON)
OSN 3500 Intelligent Features
 Service level agreement (SLA)
 Topology automatic discovery function
 Automatic end-to-end service configuration
 Support mesh networking and protection
 Traffic engineering
 Supports RPR
Sub rack with Boards (OSN3500)
Cabinet Indicators
Subrack
Slot Access Capacity
Continue…
Continue…
System Architecture
Board Appearance and Dimensions
Functions of SL64
Optical Port Parameters
SDH Boards
PDH Boards with Slot Allocation
Continue…
PDH Board Function
Capacity of Cross Connect Boards
Cross Connect Unit Functions
GSCC
 Support NE ID setting by software
 Supports 1+1 hot backup
 Supports 40 DCC
 Processes Order-wire bytes
 Controls cabinet indicators and intelligent fans
 Collects and monitors alarms and performance
events
 Monitors power supply
 Supports ASON intelligent function
 Inserted in slot 18 (Active) and/or Slot 17 (Standby
SCC Databases
Summary
Continue…
Continue…
Equipment Protection Summary
Thank You!

More Related Content

What's hot (20)

RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUES
RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUESRF measurement and optimization Engineer EMERSON EDUARDO RODRIGUES
RF measurement and optimization Engineer EMERSON EDUARDO RODRIGUES
 
05 b rrm dl PARAMETER
05 b rrm dl PARAMETER05 b rrm dl PARAMETER
05 b rrm dl PARAMETER
 
Long Range Cell Coverage for LTE
Long Range Cell Coverage for LTELong Range Cell Coverage for LTE
Long Range Cell Coverage for LTE
 
SDH BASICS
SDH BASICSSDH BASICS
SDH BASICS
 
SDH MAPPING AND MULTIPLEXING
SDH MAPPING AND MULTIPLEXINGSDH MAPPING AND MULTIPLEXING
SDH MAPPING AND MULTIPLEXING
 
Sdh concept
Sdh conceptSdh concept
Sdh concept
 
Gsm protl
Gsm protlGsm protl
Gsm protl
 
4G - LTE
4G - LTE 4G - LTE
4G - LTE
 
Cs fall back
Cs fall backCs fall back
Cs fall back
 
LTE Location Management and Mobility Management
LTE Location Management and Mobility ManagementLTE Location Management and Mobility Management
LTE Location Management and Mobility Management
 
Lte principle
Lte principleLte principle
Lte principle
 
Rach procedure in lte
Rach procedure in lteRach procedure in lte
Rach procedure in lte
 
Kpi analysis
Kpi analysisKpi analysis
Kpi analysis
 
Lte system signaling procedures
Lte system signaling proceduresLte system signaling procedures
Lte system signaling procedures
 
Lte mac presentation
Lte mac presentationLte mac presentation
Lte mac presentation
 
Interworking wcdma to lte
Interworking wcdma to lteInterworking wcdma to lte
Interworking wcdma to lte
 
UMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFBUMTS/LTE/EPC Call Flows for CSFB
UMTS/LTE/EPC Call Flows for CSFB
 
SDH ALARMS
SDH ALARMSSDH ALARMS
SDH ALARMS
 
OTN for Beginners
OTN for BeginnersOTN for Beginners
OTN for Beginners
 
Bss parameter huawei
Bss parameter huaweiBss parameter huawei
Bss parameter huawei
 

Similar to internship.ppt

Similar to internship.ppt (20)

SDH (Synchronous Digital Hierarchy) & Its Architecture
SDH (Synchronous Digital Hierarchy) & Its ArchitectureSDH (Synchronous Digital Hierarchy) & Its Architecture
SDH (Synchronous Digital Hierarchy) & Its Architecture
 
Digital network lecturer1
Digital network  lecturer1Digital network  lecturer1
Digital network lecturer1
 
Presentation1
Presentation1Presentation1
Presentation1
 
Sdh technology
Sdh technologySdh technology
Sdh technology
 
Fundamentals of sdh
Fundamentals of sdhFundamentals of sdh
Fundamentals of sdh
 
Sdh total final
Sdh total finalSdh total final
Sdh total final
 
SDH_Frame_Structure.ppt
SDH_Frame_Structure.pptSDH_Frame_Structure.ppt
SDH_Frame_Structure.ppt
 
2 ro-pdh-sonet-sdh
2 ro-pdh-sonet-sdh2 ro-pdh-sonet-sdh
2 ro-pdh-sonet-sdh
 
DMRC SDH theory
DMRC SDH theoryDMRC SDH theory
DMRC SDH theory
 
SDH presentation
SDH presentationSDH presentation
SDH presentation
 
Elements
ElementsElements
Elements
 
5g-Air-Interface-pptx.pptx
5g-Air-Interface-pptx.pptx5g-Air-Interface-pptx.pptx
5g-Air-Interface-pptx.pptx
 
JDSU SDH Pocket Guide covering many aspects
JDSU SDH Pocket Guide covering many aspectsJDSU SDH Pocket Guide covering many aspects
JDSU SDH Pocket Guide covering many aspects
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) Introduction
 
SONET/SDH in CCN
SONET/SDH in CCNSONET/SDH in CCN
SONET/SDH in CCN
 
Overview and Basics of LTE
Overview and Basics of LTEOverview and Basics of LTE
Overview and Basics of LTE
 
Overview lte
Overview lteOverview lte
Overview lte
 
Lte physical layer overview
Lte physical layer overviewLte physical layer overview
Lte physical layer overview
 
Lte_details
Lte_detailsLte_details
Lte_details
 
Radio resource management and mobiltiy mngmnt
Radio resource management and mobiltiy mngmntRadio resource management and mobiltiy mngmnt
Radio resource management and mobiltiy mngmnt
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 

internship.ppt

  • 2. Evolution Of Transport Technologies  PCM  PDH  SDH  NGSDH/Ethernet/RPR  WDM/ROADM/OTN
  • 4. SDH  Synchronous Digital Hierarchy  SDH is a hierarchical set of digital transport structures, standardized for the transport of suitably adapted payloads over physical transmission networks  An integrated transmission network managed by a powerful network management system
  • 5. SDH A standard developed by the International Telecommunication Union (ITU) It is documented in standard G.707 and its extension G.708 Developed to replace the Plesiochronous Digital Hierarchy (PDH) system Allow interoperability between equipment from different vendors with Strong Network Management capabilities
  • 6. SDH ITU Recommendations SDH refers to the rates and formats specified by ITU-T for synchronous data transmission over fiber optic networks. ITU-T G.707: Network Node Interface for SDH ITU-T G.781: Structure of Recommendations on Equipment for SDH ITU-T G.783: Characteristics of SDH Equipment Functional Blocks ITU-T G.803: Architecture of Transport Networks Based on SDH
  • 7. PDH Pre SDH Standard 3 standards..European, Japanese, North America European Standard in Pakistan Complex Multiplexing structure Weak monitoring
  • 8. PDH Data Rates PCM…… 64Kbps E1……… 2.048 Mbps (30 x64 Kbps) E2……… 8.448 Mbps E3……… 34.368 Mbps E4……… 139.264 Mbps E5……… 565 Mbps
  • 9. PDH Standards & Rates Japanese Standard European Standard 565Mb/s 139Mb/s 34Mb/s 8Mb/s 2Mb/s 1.6Gb/s 400Mb/s 100Mb/s 32Mb/s 6.3Mb/s 1.5Mb/s 274Mb/s 45Mb/s 6.3Mb/s x4 x4 x4 x4 x4 x4 x4 x4 x6 x7 x3 x5 North American Standard E1 E2 E3 E4 E5 T1 T2 T3 J2 J1
  • 10. Adding & Dropping In PDH 140/34 Mb/s 34/140 Mb/s 34/8 8/34 8/2 Mb/s 2/8 Mb/s 2 Mb/s Multiplexing De-multiplexing Optical Optical Electrical E 1 E1 E2 E2 E3 E3 E4 E4
  • 11. Data Rates & Terminologies Q 34.368 Mbps Q 34.368 Mbps P 8.112 Mbps E1 2.028 Mbps E1 2.028 Mbps E1 2.028 Mbps E1 2.028 Mbps P 8.112 Mbps P 8.112 Mbps P 8.112 Mbps Q 34.368 Mbps Q 34.368 Mbps R1 140 Mbps R1 140 Mbps R1 140 Mbps R1 140 Mbps System 565 Mbps
  • 12. Limitations Of PDH Impossible to interconnect three Incompatible PDH standards No worldwide optical interface standard Week Monitoring due to insufficient capacity for network management No direct extraction of lower order signal Lower data rates for current and future demands
  • 13. –STM-1: 155.52 Mbps –STM-4: 622.08 Mbps –STM-16: 2.488.32 Gbps –STM-64: 9.95 Gbps –STM-256: 40 Gbps SDH Bit Rates
  • 14. SDH Capacity STM-N Line Rate (Mb/s) E1 Capacity E3 Capacity E4 Capacity N=1 155.52 63 3 1 N=4 622.08 252 12 4 N=16 2488.32 1008 48 16 N=64 9953.28 4032 192 64 N=256 39813.12 16128 768 256 * STM-0 is not SDH signal rate, however, it is equal to SONET basic rate 51.84Mbps
  • 15. SDH Network Elements ADM: Add Drop Multiplexer TM: Termination Multiplexer DCS: Digital Cross Connect REG: Repeater (Regenerator) Four Types
  • 16. Adding & Dropping In SDH ADM Optical Interface Optical Interface 2 Mb/s Electrical Signal SDH: Direct & Simple to add/drop electrical signal
  • 17. Advantages Of SDH More Capacity Easy to interconnect different systems simple and direct adding or dropping of electrical signals Network Management System (NMS) Flexible and self-healing networks (protection)
  • 18. Advantages Of SDH  All current PDH signals can be transmitted within the SDH except 8 Mb/s (E2) which has no container.  A reduction in the amount of equipment & an increase in network reliability.  Compatible….PDH, ATM, DQDB
  • 19. Disadvantages Of SDH Lower Bandwidth utilization Complicated SDH equipments due to variety of management traffic types and options Software based..vulnerable to computer viruses, software bugs, configuration problems, etc. Direct add/drop needs pointer, which make it complex and introduce jitter Can’t carry E2 due to un-availability of container.
  • 20. SDH Frame Structure 1 3 4 5 9 SOH STM-N Payload (including POH) 9×N 261×N 270×N SOH AU-PTR Block frame structure In units of byte (8 bits) Rate: 8000 frames/s, frame cycle: 125µs
  • 21. 1 2161 270 2430 271 540 1st Byte Last Byte 2430 STM-1 Frame # 1 1st Byte STM-1 Frame # 2 From Left to right & top to bottom Transmission Direction STM-1 Frame Transmission 1st Byte 2430th Byte
  • 22. MUX MUX REG Path Section MS MS MS Multiplex Section Multiplex Section Multiplex Section RS SDH Link Structure Regenerator Section Sub network
  • 23. RS, MS, AND Path Overheads Difference among POH, MSOH, & RSOH Term Mux Term Mux Add-Drop Mux Repeater Repeater POH MSOH RSOH • Path OH – end to end circuit • Multiplex Section OH – multiplexer to multiplexer • Regenerator Section OH – repeater to adjacent node or vice versa
  • 24. Section Overhead (SOH) Multiplex Section Overhead (MSOH) -MSOH– supervises each STM-1 of STM-N frame Regenerator Section Overhead (RSOH) –RSOH– supervises the whole STM-N frame
  • 25. Path Overhead (POH) Lower order POH (LPOH) Higher order (HPOH) ---HPOH and LPOH are used for VC4, VC3, and VC12 monitoring  POH monitors individual low-rate signals within STM-N frame, while SOH monitors the whole package i.e., STM-N frame
  • 26. STM – Performance Monitoring And Management RSOH, MSOH and POH provide monitoring and management function for different layers/levels of STM-N frame For STM-64 frame: – RSOH monitors the overall transmission performance of STM-64 signal – MSOH monitors the performance of individual STM-1s – POH monitors each low-rate signal (e.g., 2 Mbps)
  • 28. Payload where services are put in the STM-N frame 2M, 34M or 140M information is packed and put in the payload. It is then carried by STM- N signal to send over SDH nodes If we take STM-N frame as a truck, the payload section can be looked as the carriage of the truck
  • 29. Administrative Unit Pointer (AU-PTR) Locate lower rate signal inside a higher rate signal of a STM-N frame (payload). comprises of 9 bytes
  • 30. AU-PTR AU-4 pointer addresses only every 3rd payload byte. Last 3 bytes (H3) of AU-PTR are provided as additional transmission capacity in order to equalize clock difference.
  • 31. Mapping (Mode & Structure) Low Rate SDH → High Rate SDH: Byte Interleave PDH → STM-N: Synchronous Multiplexing & Flexible Mapping – 140M→STM-N – 34M→STM-N – 2M→STM-N – No container for E2 (8 Mbps)
  • 32. Container Container is an information structure, mainly in- charge of adaptation functions so that commonly used PDH signals can occupy fixed space ITU-T G.709 recommendations have stipulated 5 kinds of standard containers: C-11, C-12, C-2, C-3 & C-4
  • 33. Virtual Container The digital flow from the standard container combined with path overhead forms a virtual container (VC). C-4 + POH (9 bytes) = VC-4 (9x261 bytes) C-3 + POH (9 bytes) = VC-3 (9x85 bytes) C-12 + POH (1 byte) = VC-12 (35 bytes) It is the most important information structure in SDH which supports path layer connection.
  • 34. AU & TU The Administration Unit (AU) is an information structure that performs adaptation functions for the high order path layer and multiplexing segment layer. AU-4 = AU-PTR + VC-4 The Tributary Unit (TU) is an information structure that performs adaptation functions for the low order path layer and high order path layer. TU-3 = VC-3 + PTR (3 bytes) TU-12 = VC-12 + PTR (one byte)
  • 35. TU-3 Pointer Consists of 3 pointer bytes H1, H2, H3 TU-3 = VC-3 + 3 bytes pointer
  • 36. TU-12 Pointer TU-12 = PTR (one byte) + VC-12 (35 bytes)
  • 37. TUG & AUG  TUG-3 = TU-3 + 6 Justification Bytes TUG-2 = 3 x TU-12 TUG-3 = 7 x TUG-2 One or more AU with fixed locations in the STM- N frame form an Administration Unit Group (AUG). A single AU-4 can form one Administration Unit Group (AUG). AUG is useful for the AU-3 multiplexing, but meaningless for AU-4 multiplexing.
  • 39. Mapping A process used when tributaries are adapted into Virtual Containers (VCs) by adding justification bits and Path Overhead (POH) information Its essence is to make the various tributary signals synchronized with related virtual containers so that VC can be an independent entity in the transmission, multiplexing and cross connection
  • 40. Alignment This process takes place when a pointer is included in a Tributary Unit (TU) or an Administrative Unit (AU), to allow the first byte of the Virtual Container to be located. By setting the pointer, it can provide a flexible and dynamic method for alignment of VC in the unit (TU or AU-4) frame.
  • 41. Multiplexing This process is used when multiple lower-order path layer signals are adapted into a higher- order path signal, or when the higher-order path signals are adapted into a Multiplex Section. This type of multiplexing comes under synchronous multiplexing category
  • 42. Stuffing When tributary signals are multiplexed & aligned, some spare capacity is required in SDH frames to provide space for various tributary rates This space capacity is filled with "fixed stuffing" bits that carry no information, but are required to fill up the particular frame.
  • 43. Mapping & Multiplexing Procedures STM-N xN x1 C-12 VC-12 VC-4 TUG-2 AUG-4 AU-4 TU-12 2Mb/s Code rate adjustment LO POH TU PTR AU PTR x3 Multiplexing x7 Multiplexing HO POH xN Multiplexing TUG-3 x3 Multiplexing
  • 44. 44 Virtual Container STM-N × N × 1 140Mb/s 45Mb/s 34Mb/s 6.3Mb/s 2Mb/s 1.5Mb/s ×3 × 7 × 7 × 1 × 3 C-11 C-12 C-2 C-3 C-4 VC-11 VC-2 VC-3 VC-3 VC-4 TU-11 TU-12 TU-2 TU-3 TUG-2 TUG-3 AUG AU-3 AU-4 VC-12 ×3 ×4 ×1 Container Tributary Unit Administrative Unit Tributary Unit Group Administrative Unit Group Synchronous Transmission module Alignment Multiplexing Mapping
  • 45. 45 Virtual Container Container Tributary Unit Administrative Unit Tributary Unit Group Administrative Unit Group Synchronous Transmission module Alignment Multiplexing Mapping STM-N × N × 1 140Mb/s 34Mb/s 2Mb/s × 7 × 1 × 3 C-12 C-3 C-4 VC-3 VC-4 TU-12 TU-3 TUG-2 TUG-3 AUG AU-4 VC-12 ×3
  • 46. Multiplexing Structure C: Container VC: Virtual Container TU: Tributary Unit TUG: Tributary Unit Group AU: Administrative Unit AUG: Administrative Unit Group
  • 47. 2 MB Signal Mapping Procedure C–12 Rate Adaptation 2 Mbps Signal 1 4 1 9 125 μs 1 Byte Path Overhead (POH) 1 4 1 9 VC–12 C-12 Size: (4 Rows x 9 Columns) – 2 = 34 Bytes C–12 POH VC-12 Size: (4 Rows x 9 Columns) – 1 = 35 Bytes 125 μs VC-12 = C-12 + (1 Byte POH) C-12 Frame Duration = 125 μs VC-12 Frame Duration = 125 μs There can be four different POH bytes for one C-12 V5, J2, Z6, Z7
  • 48. 2 MB Signal Mapping Procedure Multiplexing x 3 1 12 1 9 TUG–2 T U - 12 125 μs 1 4 1 9 VC–12 C–12 POH 125 μs 1 Byte Tributary Unit Pointer (TU- PTR) 1 4 TU–12 C–12 POH 125 μs PTR T U - 12 T U - 12 TUG-2 size: (12 Rows x 9 Columns) = 108 Bytes TU-12 Size : (12 Rows x 9 Columns) = 36 Bytes TU-12 = VC-12 + (1 Byte TU-PTR) TUG-2 = TU-12 + TU-12 + TU-12 TU-12 and TUG-2 Frame Duration = 125 μs
  • 49. R R 2 MB Signal Mapping Procedure 1 12 1 9 TUG–2 T U - 12 125 μs T U - 12 T U - 12 Multiplexing x 7 1 86 1 9 TUG–3 125 μs T U G - 2 T U G - 2 T U G - 2 T U G - 2 T U G - 2 T U G - 2 T U G - 2 TUG-3 Size = (TUG-2) x 7 + R (2 Columns) TUG-3 Frame Duration = 125 μs
  • 50. 2 MB Signal Mapping Procedure 1 86 1 9 TUG–3 125 μs Multiplexing x 3 R P O H 1 261 1 9 VC–4 125 μs T U G - 3 T U G - 3 T U G - 3 R VC-4 = TUG-3 + TUG-3 + TUG-3 + R (2 Columns) + POH (1 Column) VC-4 Frame Size = 9 Rows x 261 Columns = 2349 Bytes VC-4 Frame Duration = 125 μs
  • 51. VC–4 2 MB Signal Mapping Procedure 1 261 1 9 125 μs AU-PTR AU–4 VC–4 1 270 1 9 125 μs AUG 1 270 1 9 125 μs STM-1 1 270 1 9 125 μs Multiplexing x 1 RSOH and MSOH AU-PTR VC–4 AU-PTR VC–4 AU-PTR MSOH RSOH
  • 52. 34 MB Signal Mapping Procedure C–3 Rate Adaptatio n 34 Mbps Signal 1 84 1 9 125 μs Path Overhead (POH) C–3 1 85 1 9 125 μs P O H VC–3 C-3 Frame Size: 9 rows x 84 columns = 756 Bytes C-3 Frame Duration: 125 μs VC-3 = C-3 + (POH) POH = 9 Rows x 1 Column = 9 Byte VC-3 Frame Size: 9 Rows x 85 Columns = 765 Bytes VC-3 Frame Duration: 125 μs
  • 53. 34 MB Signal Mapping Procedure VC–3 Tributary Unit Pointer 1 86 1 9 125 μs Filling Gap 1 86 1 9 125 μs TU–3 H1 H2 H3 R TUG–3 TU–3 H1 H2 H3 TU-3 = VC-3 + TU-PTR TU-PTR = 3 Byte Pointer (H1, H2 and H3) TUG-3 = TU-3 + R (Filling Gap) R (Filling Gap) = 6 Bytes for filling Gap TU-3 and TUG-3 Frame Duration = 125 μs
  • 54. 34 MB Signal Mapping Procedure T U G – 3 1 261 1 9 125 μs P O H R R VC–4 Multiplexing x 3 TU–3 1 86 1 9 125 μs H1 H2 H3 R TUG–3 VC-4 = TUG-3 + TUG-3 + TUG-3 + R (2 Columns) + POH (1 Column) VC-4 Frame Size = 9 Rows x 261 Columns = 2349 Bytes VC-4 Frame Duration = 125 μs T U G – 3 T U G – 3
  • 55. VC–4 34 MB Signal Mapping Procedure 1 261 1 9 125 μs AU-PTR AU–4 VC–4 1 270 1 9 125 μs AUG 1 270 1 9 125 μs STM-1 1 270 1 9 125 μs Multiplexing x 1 RSOH and MSOH AU-PTR VC–4 AU-PTR VC–4 AU-PTR MSOH RSOH
  • 56. VC-4 = C-4 + (POH) POH = 9 Rows x 1 Column = 9 Byte VC-4 Frame Size: 9 Rows x 261 Columns = 2349 Bytes 140 MB Signal Mapping Procedure C–4 Rate Adaptatio n 140 Mbps Signal 1 260 1 9 125 μs C-4 Frame Size: 9 rows x 260 columns = 2340 Bytes C-4 Frame Duration: 125 μs Path Overhead (POH) C–4 1 261 1 9 125 μs P O H VC–4 Rate Adaptation: The process of “Bit stuffing”, to account for different clock rates of the signals coming from different sources
  • 57. 140 MB SIgnal Mapping Procedure VC–4 AU-PTR 10 270 1 9 125 μs Multiplexing x 1 AU-PTR AU-PTR: A 9 byte pointer is inserted at Row No 4 AU–4 Size: (1x9)+(9x261) = 2358 Bytes 1 9 A U – 4 10 270 1 9 125 μs 1 9 AU–4 AUG–4 In case of 140 Mb signal mapping in STM-1, AU-4 and AUG are identical AU-4 and AUG Frame Duration: 125 μs 4
  • 58. 140 MB Signal Mapping Procedure STM-1 RSOH and MSOH 1 270 1 9 125 μs A U – 4 10 270 1 9 125 μs 1 9 RSOH MSOH AUG–4 RSOH Size: 3 Rows x 9 Columns = 27 Bytes MSOH Size: 5 Rows x 9 Columns = 45 Bytes STM-1 Size: 9 Rows x 270 Columns = 2430 Bytes STM-1 Frame Size: 125 μs 3 5 A U – 4 270 125 μs 1 AUG–4
  • 60. STM-1 Section Overhead Bytes A1 A1 A1 A2 A2 A2 J0   B1   E1  F1   D1   D2  D3 A U - P T R B2 B2 B2 K1 K2 D4 D5 D6 D7 D8 D9 D10 D11 D12 S1 M1 E2   R S O H M S O H 9 R O w S 270 Columns Frame Time=125µs  Domestic Use  Transmission Media Usage Blank indicate Future Use
  • 61. A1 & A2 Bytes Framing bytes A1, A2 • Used to identify the start of frame • A1=F6H & A2=28H •Generate Alarms OOF, LOF
  • 62. A1 & A2 Bytes Framing Find A1, A2 OOF LOF AIS Next Process Y N 3ms
  • 63. Regenerator Section Trace Byte: J0 or C1 STM identification byte Every STM-1 frame is assigned an identification number before being multiplexed to an STM-N. It makes sure that regenerator section of sending and receiving points keep continuously connecting.
  • 64. B1 & B2 Bytes Bit Interleaved Parity 8 (BIP-8) byte: B1 Regenerator section error code monitoring Detect unit is bit block B1 BBE represented by RS-BBE Only transmitted in STM-1 #1 of an STM-N Bit Interleaved Parity 24 code (BIP-24) byte: B2 Multiplexing section error code monitoring Detect unit is bit block B2 BBE represented by MS-BBE Only transmitted in STM-1 #1 of an STM-N
  • 65. A1 00110011 A2 11001100 A3 10101010 A4 00001111 B 01011010 BIP-8 Bit Interleaved parity
  • 66. B1 working mechanism: SDH Equipment Sending SDH Equipment Receiving Detect B1 Insert B1 STM-N If error blocks occurred produce: RS-BBE performance event
  • 67. Bit interleaved Parity B2 byte monitor the error blocks of MS SDH Equipment Sending SDH Equipment Receiving Detect B2 Insert B2 STM-N If error blocks occurred produce: MS-BBE performance event
  • 68. 1st Frame A B 1st Frame Tx 2nd Frame No.n Frame 2nd Frame Rx No.n Frame Calculate B1, B2 Verify B1, B2 B1 & B2 Bytes
  • 69. M1 Byte Multiplex Section Remote Error Indication (MS-REI) byte: M1  A return message from Rx to Tx when Rx find MS-BBE  By evaluating the 3xB2, the M1 byte can report back the number of parity code violations.  MS-REI will be generated in Tx.  M1 byte is one per STM-N frame. Find B2 Error: MS-BBE Rx Tx Traffic Return M1 Generate MS-REI
  • 70. User Channel Bytes: F1, F2  Provide a 64 kb/s data or voice channel for local maintenance purpose to network operator.  Only transmitted in STM-1 #1 of STM-N signal.
  • 71. D1~D12 Bytes Data Communication Channel Bytes: D1~D12  These 12 bytes are provided for the transport of monitoring & control data in Network Management System.  D1-D3 belongs to RSOH, bandwidth is 3x64 kb/s  D4-D12 belongs to MSOH, bandwidth is 9x64 kb/s  D1-D12 are transmitted in STM-1#1 of STM-N only. OAM Massages: performance, alarm, operation commands etc. DCC Channel NMS
  • 72. Order Wire Bytes: E1 & E2 Provide 64 kb/s digital telephone channels E1 transmit RS order wire message E2 transmit MS order wire message (express channel) Only present in STM-1#1 of STM-N
  • 73. K1 & K2 Bytes Automatic Protection Switching (APS) bytes: K1, K2 (bits:b1-b5)  Used for network multiplex protection switch function  K1 & K2 only transmitted in STM-1 #1 of STM-N  Multiplex Section Remote Defect Indication (MS-RDI): K2 (b6-b8) – Return alarm message from Rx to Tx – Indicate Rx receiving alarm – K2 (b6-b8) value is 110
  • 75. SDH Equipment Sender SDH Equipment Receiver STM-N Find K2(111) produce: MS-AIS alarm event Sending back K2 (110) Receive K2(110) produce: MS-RDI alarm event
  • 76. Synchronization Status Message (SSM) Byte: S1  SSM indicates the status & quality level of SDH signal  Value indicates quality level of available clock source (b5-b8) 0010 = G.811 = External Clock (Cesium) 0100 = G.812 = Transit Exchange Clock Signal (Rubidium) 1000 = G.812 = Local Exchange Clock Signal (Rubidium or Crystal) 1011 = G.813 = Internal Clock (SETS) (Crystal) 1111= Not Suitable for synchronization  Only transmitted in STM-1 #1 of STM-N
  • 77. 2 Path Overhead VC4 POH VC12 POH (HPOH) (LPOH) Classification: • Lower-order POH--VC12 • Higher-order POH---VC4 • Difference: • VC-4 macro, VC-12 micro • VC-4 includes VC-12 Path Overhead
  • 78. High Order Path Overhead J1 B3 C2 G1 F2 H4 F3 K3 N1 VC4 Structure of High Order Path Overhead 1 261 1 9
  • 79. Signal Label Byte: C2 Indicates the type & composition of multiplexing structure. Example:  00H means unused  02H means multiplexing structure is 3xTUG-3  13H means ATM cells  12H means C-4
  • 80. Path Status Byte: G1 • Indicates high order VC transmission status • Report back the fault from path end to path start •Using G1(b1-b4) to tell the number of error blocks detected by B3 •Sender gives HP-REI performance event at corresponding VC4 path •If receiver detects AIS, J1 and C2 mismatch, VC4 UNEQ, it will inform the sender at corresponding VC4 path using G1(b5)=1, and the sender will give HP-RDI alarm
  • 81. Low Order Path Overhead VC-12 POH • Location  First byte of each basic frame in a multi-frame  Consist of four bytes • Monitoring VC12 performance during signal transmission 1 1 9 500us VC12 Multi-frame V5 J2 N2 VC12 VC12 VC12 4 K4 VC12
  • 82. Other Bytes  J2: Low order path trace byte (VC-12 level)  N2: byte for network operator usage  K4: APS for low order path
  • 83. E1 Mapping In VC4 TS# X+ 3 (Y-1)+ 21 (Z-1) X= TUG-3 Location (1-3) Y= TUG-2 Location (1-7) Z= TU-12 Location (1-3) If E1 location is TU 2 4 3, find TS#
  • 84. 84 (TU-12) X (TUG – 2) Y (TUG–3) Z 2 5 8 11 14 17 20 1 2 3 3 6 9 12 15 18 21 1 2 3 1 2 3 1 1 4 7 10 13 16 19 2 3 4 5 6 7
  • 85.  Network elements are synchronized to a central clock. This central clock is generated by a high-precision primary reference clock (PRC) unit (ITU-T G.811). This specifies an accuracy of 1 x 10 e-11.  This clock signal must be distributed throughout the entire network. A hierarchical structure is used for this.  Improper synchronization causes degradation in network function, and even total failure results SDH Synchronization Method
  • 86. PRC SEC 1 20 SSU 1 SSU 10 21 60 Cascading of timing references through a network should be minimized and governed by the ITU recommendation. Timing performance degrades as timing is passed from clock to clock. Synchronization chains should be kept short Synchronization Network Chain
  • 87. SETPI SETS  Synchronous Equipment Timing Source (SETS)  Synchronous Equipment Timing Physical Interface (SETPI) Synchronous Timing Unit
  • 88.  The system clock distribution  The system timing signal generation Synchronous Timing Unit
  • 89. ① Normal Operating mode ② Holdover mode ③ Free-run mode Normal a b b c d Holdover Free-run  NE clock working mode Synchronous Timing Unit
  • 90. S1 byte: used for clock protection switching Clock setting: Primary station: set external and built-in clock’s priority Secondary station: set line tracing and built-in clock’s priority  NE clock protection configuration Synchronous Timing Unit
  • 91. TM TM 1) Point-to-Point Network Network Topologies
  • 92. TM 2) Point-to-multi Point Network TM ADM ADM TM TM TM
  • 96. Self-healing Network It is a network which can automatically resume its loaded services within a very short time in case of fault. Its terminal users do not notice any service interruption.
  • 97. Self-healing Basic Principle When the working route fails or experience problems, services will be switched to the protecting route automatically within a very short time (<50ms). Redundancy routes are essential for self-healing networks. Working Path Protection Path
  • 99. Line Network Protection Types • 1+1 Multiplex Section Protection • 1:1 Multiplex Section Protection
  • 100. Line Network 1+1 Multiplex Section Protection OL OL TR OL OL TR At sending end, the STM-N signal is sent simultaneously over both segments of the work and protect. At receiving side, only one (work or protect) path is selected based on quality. Send Together Receive One work route protect route work or protect CS CS
  • 101. Line Network 1:1 Multiplex Section Protection OL OL Work CS OL OL CS Protection Work The 1:1 structure is the subset of the 1:N (where N=1) structure. It has the capacity to work in the 1+1 structure and to interconnect with the 1+1 structure of the other end. Protection
  • 102. Continue…  In Multiplexing segment 1:1 protection The working payload is transmitted through the working path while the protection path can be used to carry extra payload which is of inferior class.  When the working path fails, the extra payload on the protection path will be superseded by the working payload according to APS protocol. Thus the working payload is protected.  Under normal circumstances, 1:1 becomes 2+0.
  • 103. Basic Ring Network Protection Types  2-fiber Unidirectional Path Protection Ring  2-fiber Bidirectional Multiplex Section Protection Ring  4-fiber Bidirectional Multiplex Section Protection Ring
  • 104. 2-fiber Unidirectional Path Protection Ring • It adopts 1+1 protection mode, the switching criteria is PATH-AIS, & APS protocol is not needed. • At the source NE, the payload is send to the working path and protection path simultaneously. The destination NE detect and compare the coming signal from both paths, then determine to receive the payload of better quality. AC CA AC A B C D CA W1 W1 P1 P1 CA AC A B C D W1 P1 P1 W1 CA AC switching
  • 105. 2-fiber Bidirectional MS Protection Ring  2 fiber: Two fibers between a pair of nodes  Bi-direction: Service between two NEs use the same section of the network and are transmitted by reverse direction  Multiplexing Section: Protection based on MS, protect the payload part, use APS protocol for protection.
  • 106. Working Principle S1/P2 S2/P1 A C B D Working path S1 & S2; under normal situations, service are transmitted over working path. The first half of one fiber is working path. Taking STM-16 as an example, 1-8 AU4 are used for working path.
  • 107. Working Principle S1/P2 S2/P1 A C B D Protecting Path P1 & P2; services transmit along protection path after switch over. The last half part of the fiber is used as protecting path. Taking STM-16 as example, 9-16 AU4 are used as protecting path.
  • 108. Working Principle S1/P2 S2/P1 A C B D Relationship between working & protecting paths The protecting path of one direction protect the working path of the other direction, i.e, P1 protects S1, & P2 protects S2.
  • 109. Working Principle Use S1 & S2 to transmit services. Service AC is sent in S1 through path A->B->C Service CA is sent in S2 through path C->B->A P1 and P2 can be used to send extra service now. AC Tx S1/P2 S2/P1 A C B D AC Rx CA Tx CA Rx
  • 110. Switching Conditions Auto Switch Conditions: LOS, LOF, MS-AIS, Signal Degrade
  • 111. Switching Procedure Switch:If the fiber between B and C is broken, switching occurs in B and C B node: service AC crosses from S1 to P1, and sent through A->B->A->D->C C node: service CA crosses from S2 to P2, and sent through C->D->A->B->A AC Tx S1/P2 S2/P1 A C B D AC Rx CA Tx CA Rx
  • 112. Normal state in MS-SPRING. • AU4 # 1-8 used for working channels • AU4# 9-16 used for protection & can be used for low priority traffic. •Time slots can be reused •High network capacity ½*M*STM-N •Switching time - 25ms Multiplex Section Shared Protection Ring
  • 113. Features Of 2 Fiber Bidirectional MSP Ring  Advantages: Time slots between two nodes can be reused, thus increasing the transmission capacity. Standby path P1 and P2 can be used to transmit extra services of inferior class.  Disadvantages: longer switching time due to APS protocol. Numbers of maximum nodes supported by APS is limited to 16.  Transmission capacity: (k/2) x STM-N (k=no. of nodes).
  • 114. Protection Type 2f Unidirectional PP Ring 2f Bidirectional MSP Ring 4f Bidirectional MSP Ring No. of Nodes K K K Line Speed STM-N STM-N STM-N Transmission Capacity STM-N K/2*STM-N k*STM-N APS Protocol No Yes Yes Switching Time <30ms 50-200ms 50-200ms Cost Low Medium High System Complexity Simple Complex Complex Field of Application Relay Networks (Centralized Services) Long Distance Networks (Distribution Services) Long Distance Networks (Distribution Services) Comparison Of Protection Schemes
  • 115. Node Protection (SNCP) Protection features:  Traffic transmit end sends concurrently, receive end receives selectively  2 fiber unidirectional traffic (Diversely routed)  1 + 1 single-ended protection Protection switching criteria:  Signal fail (SF)  Signal degrade (SD)  Externally initiated command
  • 116. SNCP
  • 120. OSN3500 Huawei NGSDH series OSN stands for Optical Switch Node Intelligent (support ASON)
  • 121. OSN 3500 Intelligent Features  Service level agreement (SLA)  Topology automatic discovery function  Automatic end-to-end service configuration  Support mesh networking and protection  Traffic engineering  Supports RPR
  • 122. Sub rack with Boards (OSN3500)
  • 129. Board Appearance and Dimensions
  • 133. PDH Boards with Slot Allocation
  • 136. Capacity of Cross Connect Boards
  • 137. Cross Connect Unit Functions
  • 138. GSCC  Support NE ID setting by software  Supports 1+1 hot backup  Supports 40 DCC  Processes Order-wire bytes  Controls cabinet indicators and intelligent fans  Collects and monitors alarms and performance events  Monitors power supply  Supports ASON intelligent function  Inserted in slot 18 (Active) and/or Slot 17 (Standby

Editor's Notes

  1. SDH Synchronization Method Master-slave synchronization uses a hierarchy of clocks in which each level of the hierarchy is synchronized with reference to a higher level, the highest level being the primary reference clock (PRC). Clock reference signals are distributed between levels of the hierarchy via a distribution network which may use the facilities of the transport network. The hierarchical levels are shown in the slide. The distribution of timing between hierarchical node clocks must be done by a method that avoids intermediate pointer processing. Two possible methods are recommended : Recover timing from a received STM-N signal. This avoids the unpredictable effect of a pointer justification on the downstream slave clock. Derive timing from a synchronization link that is not supported by an SDH network, for example, a PDH network. The slave clock determines the synchronization link to be used as its reference and changes to an alternative if the original link fails.
  2. Synchronization network reference chain The node clocks are interconnected via N network elements each having clocks compliant with Recommendation G.813. The longest chain should not exceed K slave clocks compliant with Recommendation G.812. The quality of timing will deteriorate as the number of synchronization links increases. The value of N will be limited by the quality of timing required by the last network element in the chain. This ensures the short-term stability requirements .To determine synchronization clock specifications, the values for the worst-case synchronization reference chain are: K=10, N=20 with the total number of SDH network element clocks limited to 60. Because jitter can rise on the signal after it has passed many nodes, in some NEs down the transmission link, the synchronization signal must be recovered and reshaped. In this case a Synchronization Supply Unit (SSU) will be used. In addition to recovering and reshaping, the SSU will also able to run on its own when the reference signal (e.g. coming from the PRC) is lost, in this case, the SSU will be able to maintain the quality of the reference signal it produces by means of a holdover mode: the frequency and phase of each reference signal are stored in a memory and used to generate a reference signal locally
  3. Multiplex Section Shared Protection RING The-two-fiber bidirectional multiplex section protection ring requires only two fibers for each span of the ring. Each fiber carries both working channels and protection channels. On each fiber, half the channels are defined as working channels and half are defined as protection channels. The normal traffic carried on working channels in one fiber are protected by the protection channels in another fiber traveling in the opposite direction around the ring. This permits the bidirectional transport of normal traffic. Two-fiber MS shared protection rings support ring switching only. When a ring switch is invoked, the normal traffic is switched from the working channels to the protection channels in the opposite direction. From 1 to N according to the order that they appear in the multiplex. AU-4s numbered from 1 to N/2 shall be assigned as working channels, and AU-4s numbered from (N/2) + 1 to N shall be assigned as protection channels. The normal traffic carried on working channel “m” is protected by protection channel (N/2) +m.