Professional Documents
Culture Documents
- II part -
by JM Caballero
© Trend Communications
Transportation of a 2 Mbit/s circuit
2Mbit/s C 2Mbit/s
SDH
D
PBX PBX
A B
Section
Mapping of the 2 Mbit/s circuit
x64
2,5 Gbit/s STM-16
x16
622 Mbit/s STM-4
x4
x1 x1
155 Mbit/s STM-1 AUG AU-4 VC-4 C-4
x1 x3
x3 x1
(A
TUG-3 TU-3 VC-3
NS
I)
(ANSI)
51 Mbit/s STM-0 AU-3 VC-3 C-3
x7 x7
(AN
SI) x1
TUG-2 TU-2 VC-2 C-2
x3
ATM:2144kbit/s
TU-12 VC-12 C-12 E1:2048kbit/s
x4
(AN
SI)
TU-11 VC-11 C-11
Mapping for the insertion (transmission) of the 2 Mbit/s circuit. At the ind of the path, for
extracting the circuit (reception) the process is the inverse.
136 bytes
I 125 s
: Bits with extra information
µ
(32 x 8 bits)
: bytes with information bits and S
extra information R
(2) 2Mbit/s
S : stuffing bits 50
I 0
µs
(32 x 8 bits )
S 500
(1) SSSSSSSS
µs C-12
(2) C 1C 2OOOOSS R
(3)
(3) C 1C 2O O O O S S
I
(4) C 1C 2S S S S S J 1
(32 x 8 bits)
(5) J 2 I I I I I I I
S
S: Stuffing R
Ci: Justification criteria
(4)
(5)
VC-12
O: Overhead
J1: Positive justification I
J2: Negative justification (31 x 8 bits)
The public network can be a RDSI circuit, Frame Relay, ATM, leased...
• mapping of the 2 Mbit/s signal into the C2 container witch is synchronous with the network
• The mapping is performed in four blocks of the same multicontainer of 500 µs
• justification bits are added
client
F ixed mode network
34 b y t e s
2Mbit/s
CAS CCS
10RRRRRR
TS0 TS0
Channels Channels
32 bytes
1 to 15 1 to 15 I 1 2 5 ms C-12
31 bytes TS16 Channels 16
Channels Channels
(32 bytes )
16 to 30 17 to 31
VC-12
This mapping maintains the byte synchronism of the 2 Mbit/s circuit and makes the connection
of nx64k data/voice services easier because all 30 channels are directly located
VC-12
140 bytes
client network
.
v5
35 bytes
I
2Mbit/s
32 bytes
R
J2 C-12
35 bytes I
125 µs
32 bytes
500 µs
500 µs R 50
N2 0
µs
I
35 bytes 32 bytes
VC-12
125 µ s
R
K4
35 bytes I
31 bytes
R TU-12
POH (Path Overhead )
: V5 J2 N2 K4
The path overhead (POH) is added to the multiframe resulting the VC-12
v1
TU-12
VC-12
1 4
35 bytes H4 = XXXXXX00
1 PTR
v2 50
0
µs
125 µs 35 bytes
35 bytes H4 = XXXXXX01
TU-12
9 125 µs
v3
• The TU have a pointer (V5) in a fixed location witch identifies the carried information (the
VC12)
• The pointer points to the LO-POH overhead
• A VC12 is a 4 element multiframe and need four TU14 frames for being transported
1 PTR
A
1 PTR
B
1 PTR
C TU-12
35 bytes 35 bytes 35 bytes
9 9 9
x3
1 12
1 PTR PTR PTR
A B C TUG-2
125 µs
9 bytes of tu-12#1
9 bytes of tu-12#1
9 bytes of tu-12#1
9 bytes of tu-12#1
TUG-2 TUG-3
TUG-2 #1 TUG-2 #7
1 12 1 12
1 1
TUG-2
9
9
x7
1 2 86
1 N #1 #2 #3 #4 #5 #6 #7 #1
P TUG-3
3 I 125 µs
x3
S S
9 VC-4
T U G -3
• Seven TUG-12 are multiplexed in a byte oriented way and they form a new structure named
TUG-3
• Size 7x12=84 columns, plus 2 stuffing columns gives 86 columns
• The pointers that identifies the information are always in fixed positions
1 1 1
9 9 9 TUG-3
x3
10 11 12 13 14 270
J1
B3
C2 VC-4
G1
F2 S S
H4
F3
K3
9 N1
AU-4
VC4-POH
1 9 10
STM-1 270 VC-4
RSOH 10 11
VC-4 270
J1
B3
C2
AU-4
G1
MSOH F2
H4
F3
POH
K3
N1 STM-1
• A AU4 pointer that points to the first byte of the VC-4 is included
• The AU4 is in a fixed position of the frame. This fact allows its location
• This operation is known as alingment
S T M -1
500ms S T M -1
1 2 5 ms S T M -1 S T M -1
9
1 J1
B3
C 2
G1
F2
H4
R R 9 V C -4
F3
K3
9 N1
V1
H 4 = 00
TUG-3 TUG-3 TUG-3 VC-12
x3 12
V2
H 4 = 01
x7 VC-12
5 0 0 ms
V3
1
1 1 PTR
H4= 10
VC-12
TUG-2 TUG-2 TUG-2
9 9
V4
H 4 = 11
VC-12
x3
A VC12 formed by four need a time interval of 500µs in order to put all four components into
B1 E1 F1
D1 D2 D3
AU Pointer
B2 B2 B2 K1 K2
D4 D5 D6
D7 D8 D9
S1 M1 E2
Section
SDH Overheads
NNI NNI
Add Drop Multiplexer Add Drop Multiplexer
Assembling of Assembling of
C-11, C-12 C-11, C-12
VC-11 , VC-12 VC-11 , VC-12
Assembling of Assembling of
VC-3 , VC-4 VC-3 , VC-4
MUX MUX
C-3, C-4 C-3, C-4
STM-N STM-N
·
·
·
MSOH
STM-N SOH
Each overhead is intended to do specific task related with the transmission management at
different layers: regeneration, multiplexing and path
As the classical protocol tower an overhead is controlled just by one layer but is transparent for
the rest of the SDH layers
P
O+ C4
H
back up link
PLL
VC4 active link
POH
Each container (C-n) has associated an overhead, named Path Overhead (POH) with
information enough to manage the transmission through the SDH network.
The union of C-n and POH is renamed as Virtual Container (VC-n) and is the interchange unit
between origin and destination multiplexers.
RFI
G1: REI (FEBE) FERF
RDI
Unused
FEBE (Far End Block Errors) > HO-FEBE or HP-REI (Remote Error Indicator) error or LP-REI if it is a VC3
If 0<FEBE<9 shows the remote BIP-8 violation count as a binary number
FERF (Far End Reveive Failure) > HO/HP FERF o HP-RDI (Remote Defect Indication) alarm shows a remote AIS alarm
detected, or a LP-REI if it is a VC3
RFI/RDI (Remote Failure Indication) > RFI alarm indication
C2: 00 unequiped > HP/LP-UNEQ defect, unequiped H4: > TU-LOM alarm Loss of Multiframe
01 unspecified 12: 140 Mbit/s xxxxxx00 - pointer points V1
02 TUG structure 13: ATM xxxxxx01 - pointer points V2
03 blocked TU 14: DQDB xxxxxx10 - pointer points V3
04 34 or 45 Mbit/s 15: FDDI xxxxxx11 - pointer points V4
V5 Path Overhead
N2 Reserved for its use by the operator. It can be used for tandem connection monitoring
Tandem connection monitoring (TCM)
K4 Trace protection
bits 1-4 APS
bits 5-7RDI
Path overheads can detect transmission errors from the receiver side but it can’t identify where
those errors rose. This is one of the missions of the section overhead: RSOH (Regenerator
Section Overhead) and MSOH (Multiplexer Section Overhead)
SDH
ADM
LO-PTE HO-PTE MUX REG DXC REG REG HO-PTE LO-PTE
M >N
M >N
2M 2M
STM-1 STM-1
STM-N STM-M STM-M
STM-M STM-M STM-N
STM-M HO-PTE LO-PTE
34M 34M
140M 140M
STM-N
P
PDDH
H
HIGH ORDER
PATH
LOW ORDER
PATH
LO-POH LO-POH
LO HO HO LO
POH POH POH POH
MSOH RSOH RSOH RSOH MSOH
VC11 VC3 VC3 VC11
VC12 VC4 VC4 VC12
B1 B1
B2
B3
V5
Cada tara es gestionada exclusivamente por dos nivel correspondientes pareja contiguas de
elementos de red contiguos. Ningún otro nivel pude manipularlos lícitamente.
Section
The pointer mechanism
10 11
VC-4 270
+ J1
B3
C2
G1
F2
H4
F3
POH
K3
N1
H1 Y Y H2 1 1 H3 H3 H3
All the elements inside the SDH network must be synchronized with only one master clock but:
10 11
VC-4 270 TU-3 86
2 3
+ J1
H1 1 J1
B3
H2 B3
C2 +
H3 C2
G1
G1
F2
F2
H4 H1 H2 H3 H4
F3
POH N N N N 1 0 I D I D I D I D I D F3
K3 K3
negative justification positive justification
N1 N1
NDF pointer value 9
(10 bits)
VC-3
N : new data flag (NDF) N D F enabled: 1 0 0 1
I : increase bit
N D F disabled : 0 1 1 0
H1 Y Y H2 1 1 H3 H3 H3 D : decrease bit
TU-12 v1
TU-2
v1
1 2 5 ms 35 bytes
35 bytes H4 = X X X X X X01 1 2 5 ms 107 bytes 107 bytes H4 = X X X X X X 01
9
v3 5 0 0 ms 9 5 0 0 ms
v3
P T R : V1, V2, V3 ó V4
35 bytes H4 = X X X X X X 10 PTR: V1, V2, V3 ó V4
107 bytes H4 = X X X X X X 1 0
S S size
N : New data flag (NDF)
0 0 TU-2
N D F enabled : 1 0 0 1
1 0 TU-12
N D F disabled : 0 1 1 0
I : increase bit D : decrease bit
AU Pointer 0 0 0 1 1 1
J1 125µs J1
781781781782782782
AU Pointer 0 0 0 1 1 1
J1 125µs
781781781782782782
C
2
R2 R1
D 1
3
2Mbit/s
STM-1 STM-1
B 5
A
6
R3
4
E
1 - B doesn’t see pointer movement because the 2 Mbit/s frame and the STM-1 are created in
A with the same clock. B send the STM-1 with R2 and the pointer moves like a function f (R1
-R2)
3 - The VC4 will be extracted like R1 altough the STM-1 has arrived with R2 frecuency. At B
the STM is sent at R3 and the pointer moves like a function f (R1-R3)
© Trend Communications Pointers 29 /
55
Case 1: clock transparency (ii)
C
2
c y!!! R2 R1
a r e n
r a n sp 1
ck t
D 3
clo STM-1
2Mbit/s
STM-1
B A
5 6
R3
4
E
4 - E multiplexer doesn’t generate pointer movement because it uses the same clock like D
5 - At B the VC4 is extracted like R1 altough it has arrived in the STM-1 at a R3 frequency. At
B the STM-1 is sent at R3 and the pointer moves like f(R1-R2).
6 - A multiplexer receive the STM-1 like R2 but the VC12 arrives at the first rate R1!!
C
2
R2 R1
D 3 1
2Mbit/s
STM-1 STM-1
B 5 6 A
R3
4
E
If the R1 clock synchronizes R2 then the STM-1 frame won’t have pointer movements
beacuse:
18792 bits
VC-4 transmission rate = = 150336000 bit/s
125 s
µ
P actions 24 bits
∆f 1 s
= . . = P x 1.6E-7: clock adjustement got with P pointer movements
f0 s 1 action 150336000 bits
P
∆f = P x 1.6E-7
f0
2000
P MAX : maximum pointer activity
only one pointer movement is 200
possible in four frames
20
Forbidden
1 acción 1 trama 2
PMAX = . = 2000 acciones/s
4 tramas 125
µs 0.2
∆f m a x = 2 0 0 0 x 1 , 6 E - 7 = 3 , 2 x 1 0 E - 4 0.02
f0
P shows how many pointer movements are made in one second while the horizontal axis
shows de frequency correction met
1 9 1 9 1 9
C a r g a# ú
1 til de 9 C a r g a# ú
2 til de 9 C a r g a# ú
Nt i l d e 9
1 123...N123...N
RSOH
3
4 123...N123...N
5 9
MSOH
N x 9 N x 261
STM-N
x 4 frames
In a STM-N frame that is the result of STM-1 frame multiplexion there are 4 pointers of lower
order STM-M (N=4M) and the useful load is divided for each component.
One concatenated STM-N groups all the useful load for only one client. For example, an ATM
network, that is, there are only one pointer for the load.
Section
Anomalies, Defects, Errors, Alarms and Failures
• Anomaly: Is the least disagreement that can be observed between the measured and the
expected characteristics of a network element without service interruption (for example a
parity error)
• Defect: A defect level is reached when de anomaly density is high enough to interrupt a re-
quested function (for example a loss of signal).
• Damage: A damage is is produced when a function can’t finish a requested action. This sit-
uation doesn’t comprise incapacities caused by preventive maintenance.
• Fault: The cause of a damage without interruption for a time long enough that makes pos-
sible to consider that a network element can’t achieve a recuested function
• Alarm: An obserbable indication that points to a fault (revealed damage) that usually shows
an indication of the damage depth, for example a LED or a siren
Errors reflect anomalies and alarms show defects and ofen those words are used to speak
about the formers.
Nowadays, high capacity transmission systems are robust but they are yet vulnerable to some
effects like:
* * * * * * *J 0 * *
A1 A1 A1 A2 A2 A2 C1
RSOH B1 E1 F1
D1 D2 D3
Are events associated with the SOH overheads and
Puntero AU the network elements that manage them. That is, they
B2 B2 B2 K1 K2 are the Regeneration and Multiplexing Sections
D4 D5 D6
MSOH D7 D8 D9
S1 M1 E 2
J1 HO-POH V5
HO-POH B3
J2
C2 They are events identified by the pair of multiplexers
N2
G1 defining a path. There are two kinds of paths, higher
F2 K4
H4
order paths (HOP) lower order paths (LOP) there are
F3 two different groups of events.
K3
N1
H1 H2 H3
V3
They are events identified
V1 V2
NDF enabled: 1 0 0 1
(10 bits)
S S size
pointer in STM-1 basic
N : New data flag (NDF)
I
D
: increase bit
: decrease bit
NDF disabled : 0 1 1 0
N D F enabled: 1 0 0 1
0 0
1 0
TU-2
TU-12 frame an the TU pointer in
N D F disabled : 0 1 1 0
: increase bit
transported
AU ptr TU ptr
An RDI is indicated in a specific byte while an AIS is a secuence of “1” in the space deticated
to the load because de affected element can’t access to the information.
Una AIS es una secuancia de bytes todos a “1” en el espacio dedicado a carga puesto que el
elemento afectado por la alarma no puede acceder a la información. Mientras que el RDI se
indica en un byte específica. A failure sent in a transmission way doesn’t depends on the failure
in the other transmission way
Alarm Criteria
LOW ORDER
PATH
HIGH ORDER
PATH
MULTIPLEXER
SECTION
REGENERATOR REGENERATOR
SECTION SECTION
2M 2M
STM-1 STM-N STM-1
HO-PTE LO-PTE
34M 34M
140M 140M
AU-LOP
PDH AIS
(All 1s)
AU-AIS
(All 1s)
LO-RDI
(V5=xxxxxxx1)
LO-REI
(V5=nº of detected errors)
V 5 = x x nx x x x x ; E r r o r s = 0 . . 2
• Any loss of pointer (AU-LOP) or an alarm (AU-AIS) generate: a PDH-AIS forwards and a
HO-RDI backwards
• Any parity error in the tributary (V2 bip2) generate a LO-REI backwards
LOW ORDER
PATH
HIGH ORDER
PATH
MULTIPLEXER
SECTION
REGENERATOR REGENERATOR
SECTION SECTION
2M 2M
STM-1 STM-N STM-1
HO-PTE LO-PTE
34M 34M
140M 140M
AU-LOP
TU-AIS PDH AIS
(All 1s) (All 1s)
AU-AIS
(All 1s)
HO-RDI
(G1=xxxx1xxx)
LO-RDI
(V5=xxxxxxx1)
B3 with errors
HO-REI
(G1=nº of detected errors)
G 1 = n n n nxxxx; Errors=0..8
LOW ORDER
PATH
HIGH ORDER
PATH
MULTIPLEXER
SECTION
REGENERATOR REGENERATOR
SECTION SECTION
2M 2M
STM-1 STM-N STM-1
HO-PTE LO-PTE
34M 34M
140M 140M
HO-RDI
(G1=xxxx1xxx)
LO-RDI
(V5=xxxxxxx1)
B2 with errors
MS-REI
(M1=nº of detected errors)
M1=nnnnnnnn; Errors=0..24
LOW ORDER
PATH
HIGH ORDER
PATH
MULTIPLEXER
SECTION
REGENERATOR REGENERATOR
SECTION SECTION
2M 2M
STM-1 STM-N STM-1
HO-PTE LO-PTE
34M 34M
140M 140M
MS-RDI
(K2=xxxxx110)
HO-RDI
(G1=xxxx1xxx)
LO-RDI
(V5=xxxxxxx1)
B1 with errors
:X K2
• MS-AIS: All bits excepting the ones of the RSOH are put to the binary value ‘1’.
• AU-AIS: All bits of the adminsitrative unit are put to ‘1’ but the RSOH and MSOH maintains
their codification.
• TU-AIS: All bits in the tributary unid are put to ‘1’ but the unaffected tributaries and the RSOH
and MSOH maintains their codification.
• PDH-AIS: All the bits in the tributary are ‘1’.
Section
SDH means infrastructures standardization
Frame Relay
GSM
SDH
node STM-N
SDH
ATM
SDH
node
UMTS
A SDH network can offer transport services to final users or it can be used as a transport
infrastructure by a GSM, ISDN, ATM, Frame Relay, UMTS..., network.
Simple
• Direct tributaries add&drop avoiding the typical PDH mux/demux
• The tributaries are synchronized to the network
• Byte oriented justification; stuffing bits are not necessary
• Tributaries can be drop&insert to the signal dynamically without disturbing the signal.
• The High efficiency level reached is a consequence of management facilities
• It is cheaper to provide new service
Reliable
• SDH is byte oriented allowing the integration of telecommunications with computers
• Automatic reconfiguration is possible to prevent faults
• Multiplexers provide a high reliability equivalent similar in backbones and in regional areas
• Hierarchical management of alarms and maintenance functions by the network elements.
Host
IWU Services
Frame
Relay Telephony
UMTS
Frame Relay
GSM
ATM access
Infrastructures
SDH ATM
SDH link
Superserver
Interconnected rings
PDH access
SDH access
point ot point
45 Mb/s
SDH ring
2,5 Gb/s
622 Mb/s
SDH network
“SDH will be the dominant technology in the next 10 years” as Pioneers Optical Edge Networks
Boston (MA) June 2000 said