Professional Documents
Culture Documents
SDH Basics
SDH Basics
6\QFKURQRXV'LJLWDO+LHUDUFK\
SDH Basics
AN00091831 (62.1013.105.11-A001)
Edition e, 03.2000
M a r c o n i C o m m u n ic a t io n s G m b H
D -7 1 5 2 0 B a ck n a n g
T e le f o n ( 0 7 1 9 1 ) 1 3 -0 T e le f a x ( 0 7 1 9 1 ) 1 3 - 3 2 1 2
h t t p : / / w w w .m a r c o n i . c o m
C o p y r ig h t 2 0 0 0 b y M a r c o n i C o m m u n ic a t io n s G m b H ( h ie r in b e z e ic h n e t a ls M a r c o n i)
n d e r u n g e n v o r b e h a lt e n G e d r u c k t in D e u t s c h la n d
M a r c o n i , M a r c o n i C o m m u n i c a t i o n s , d a s M a r c o n i L o g o , d a s g e s c h w u n g e n e 'M ' ,
S k y b a n d , M D R S , M D M S u n d S e r v ic e O n A c c e s s s in d e in g e t r a g e n e M a r k e n z e ic h e n
v o n M a r c o n i C o m m u n ic a t io n s G m b H .
W in d o w s is t e in e in g e t r a g e n e s M a r k e n z e ic h e n d e r M ic r o s o ft C o r p o r a t io n , R e d m o n d .
M a r c o n i C o m m u n ic a t io n s G m b H
D -7 1 5 2 0 B a ck n a n g
T e le p h o n e + 4 9 (7 1 9 1 ) 1 3 -0 T e le f a x + 4 9 (7 1 9 1 ) 1 3 - 3 2 1 2
h t t p : / / w w w .m a r c o n i . c o m
C o p y r ig h t 2 0 0 0 b y M a r c o n i C o m m u n ic a t io n s G m b H ( h e r e in r e f e r r e d to a s M a r c o n i)
S p e c if ic a t io n s s u b je c t t o c h a n g e P r in t e d in G e r m a n y
M a r c o n i , M a r c o n i C o m m u n i c a t i o n s , t h e M a r c o n i l o g o , t h e s w a s h 'M ',
S k y b a n d , M D R S , M D M S a n d S e r v ice O n A cce ss a re tra d e m a rk s of
M a r c o n i C o m m u n ic a t io n s G m b H .
W in d o w s is a t r a d e m a r k o f M ic r o s o f t C o r p o r a tio n , R e d m o n d .
Notes
This Introduction to the Synchronous Digital Hierarchy is a company-internal brochure. Marconi Communications GmbH takes no responsibility for the
correctness of its contents!
Have you detected any faults or deficiencies? Do you have any new ideas?
Please let us know them!
Marconi Communications GmbH, Department: Customer documentation.
Attention:
The ordering no. has changed with edition e.
The new ordering no. is:
62.1013.105.11-A001
Ordering no. of previous editions: 62.1013.109.00-A001.
62.1013.105.11-A001
62.1013.105.11-A001
Table of contents
Table of contents
1
Introduction
1.1
1.2
1.3
1.4
Structures
2.1
2.2
2.3
2-4
2-4
2-5
2-6
2-6
2-8
2-8
2.4
Concatenation....................................................................................................................... 2-13
2.5
2.6
2.7
2.8
3.2
3.3
3.4
3.5
3.6
3.7
Mapping procedures
4.1
4.2
4.3
4.4
4.5
Overhead
5.1
5.2
Pointers
6.1
62.1013.105.11-A001
-5-
Table of contents
6.3
6.4
6.5
6.6
Reference model
7.1
7.2
7.3
Applications
8.1
8.2
Multiplexers.............................................................................................................................
8.2.1 Terminal Multiplexer .......................................................................................................
8.2.2 Add/Drop Multiplexer ......................................................................................................
8.2.3 Cross-connect Multiplexer ..............................................................................................
8.3
Networks............................................................................................................................... 8-10
8.3.1 Ring networks............................................................................................................... 8-11
8.3.2 Double rings ................................................................................................................. 8-11
8-4
8-4
8-6
8-8
Protection switching
9.1
Overview................................................................................................................................. 9-1
9.2
9.3
9-1
9-3
9-4
9-4
9-6
9-6
9-7
9.4
9.5
10 Literature
Index
-6-
62.1013.105.11-A001
List of figures
List of figures
Fig. 1-1
Fig. 1-2
Fig. 1-3
Fig. 1-4
Fig. 1-5
Fig. 1-6
Fig. 1-7
Fig. 1-8
Fig. 1-9
Fig. 2-1
Fig. 2-2
Fig. 2-3
Fig. 2-4
Fig. 2-5
Fig. 2-6
Fig. 2-7
Fig. 2-8
Fig. 2-9
Fig. 2-10
Fig. 2-11
Fig. 2-12
Fig. 2-13
Fig. 2-14
Fig. 2-15
Fig. 2-16
Fig. 3-1
Fig. 3-2
Fig. 3-3
Fig. 3-4
Fig. 3-5
Fig. 3-6
Fig. 3-7
Fig. 3-8
Fig. 3-9
Fig. 3-10
Fig. 3-11
Fig. 3-12
Fig. 4-1
Fig. 4-2
Fig. 4-3
Fig. 4-4
Fig. 4-5
Fig. 4-6
Fig. 4-7
Fig. 5-1
Fig. 5-2
Fig. 5-3
Fig. 5-4
Fig. 5-5
Fig. 5-6
Fig. 5-7
Fig. 6-1
Fig. 6-2
Fig. 6-3
62.1013.105.11-A001
-7-
List of figures
Fig. 6-4
Fig. 6-5
Fig. 6-6
Fig. 6-7
Fig. 6-8
Fig. 6-9
Fig. 7-1
Fig. 8-1
Fig. 8-2
Fig. 8-3
Fig. 8-4
Fig. 8-5
Fig. 8-6
Fig. 8-7
Fig. 8-8
Fig. 8-9
Fig. 8-10
Fig. 8-11
Fig. 8-12
Fig. 8-13
Fig. 9-1
Fig. 9-2
Fig. 9-3
Fig. 9-4
Fig. 9-5
Fig. 9-6
Fig. 9-7
Fig. 9-8
Fig. 9-9
Fig. 9-10
Fig. 9-11
-8-
62.1013.105.11-A001
Introduction
1 Introduction
The Synchronous Digital Hierarchy (SDH) supersedes the previous Plesiochronous Digital Hierarchy (PDH) and provides a worldwide uniform multiplex hierarchy. Besides standardization, SDH systems offer further
advantages for the setup and operation of modern network topologies:
Transport frame
2 Mbit/s
140 Mbit/s
Transmitter
Receiver
Receiver
Transmitter
2 Mbit/s
140 Mbit/s
2 Mbit/s
2 Mbit/s
140 Mbit/s
140 Mbit/s
62.1013.105.11-A001
1-1
Introduction
Block size: 260 columns with 9 rows each consisting of 1 byte = 2340 Byte
Number of blocks per second: 8000
This results in a transmission capacity of
260 columns x 9 rows x 8000 blocks per second = 18,720 kbyte/s or 149,760
kbit/s.
The above calculation shows that the transmission capacity of the blocks is
larger than the bit rate of the source signal. In order to compensate this difference, each block must contain a certain amount of justification, i.e. stuffing
information.
1 byte
9CH
1
260
9C
72
33
A4
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
...
260
260
9C
1-2
62.1013.105.11-A001
Introduction
Containers
The transmission of SDH signals can be compared with the transmission of
containers on a conveyor belt.
The payload is transported in containers of certain sizes. Since the payloads
have different volumes, containers with different capacities have been defined. If the payload is too small, it is filled up with stuffing information.
er
tain
n
o
C
Label
Fig. 1-4 Container with label
The complete containers are then put on a kind of conveyor belt. This conveyor belt is divided up into several frames of identical size. They are used to
transport the containers.
62.1013.105.11-A001
1-3
Introduction
The position of the containers in the frame is arbitrary, i.e. a container does
not have to start at the beginning of the frame. A container can be located on
two adjacent frames.
ta
Con
tain
Co n
of
tion
c
e
r
Di
s mi
t ra n
iner
er
n
ssio
Start of frame
Empty frame
1-4
62.1013.105.11-A001
Introduction
Groups of containers
The type of payload in the containers is unimportant for transportation. The
stuffing information can therefore be regarded as part of the payload. Before
transportation, several small containers can be combined to form a group.
This group is then packed into a larger container. Each of these containers
includes a label which is evaluated by the receiver. Whenever necessary,
stuffing information is added.
The individual containers are assigned a certain position within the group.
The position no. determines the start of the respective container.
Stuffing information
62.1013.105.11-A001
1-5
Introduction
Concatenation
The above description was based on the assumption that the payload is
smaller than the container available. If the payload to be transported is larger
than the container available for it, several containers can be concatenated.
They then form a continuous container chain. In this case, the payload is distributed on this container chain.
Example:
The source signal is 599.04 Mbit/s (broadband ISDN). Since the largest container defined can transport only a signal up to 140 Mbit/s, four such containers have to be concatenated. The position of the container chain on the
conveyor belt is defined for the first container. The position of all other containers 2, 3 and 4 is determined by the first one.
1st container
Position
2nd container
3rd container
4th container
Concatenation
Start of frame
Fig. 1-7 Concatenated containers
1-6
62.1013.105.11-A001
Introduction
9 rows
Additional
transport
capacity
261 columns
Payload area
62.1013.105.11-A001
1-7
Introduction
Hierarchy levels
The transport frame of the higher hierarchy levels differ from each other only
with respect to the number of columns. The following hierarchy levels have
been defined:
Hierarchy
level
Number of
columns
Number of
rows
Transport
capacity
270
155.520 Mbit/s
1080 (4 x 270)
622.080 Mbit/s
16
2488.320 Mbit/s
1-8
62.1013.105.11-A001
Introduction
n
ctio
Dire
r
of t
ter
Poin
on
issi
m
s
an
nter
Poi
Section Overhead
70
nter
Poi
30
Cro
ter
Poin
ssc on
Position of pointer in
the Section Overhead
ne c
t
nter
Poi
60
nter
P oi
40
ter
Poin
Reference point
Add/Drop
62.1013.105.11-A001
1-9
Introduction
1-10
62.1013.105.11-A001
Structures
2 Structures
2.1 Synchronous Transport Module Level 1 (STM-1)
The Synchronous Digital Hierarchy (SDH) defines the Synchronous Transport Module Level 1 (STM-1) as multiplex signal of the lowest level. It has a
transmission rate of 155.520 Mbit/s. The STM-N bit rates of the standardized
higher hierarchy level (N= 4 and 16) are always higher by factor 4.
Transport
capacity in
kbit/s
Synchronous
Hierarchy
Transport Module level
Interface
Electrical
Optical
STM-1
155 520
G.703
G.957
STM-4
622 020
G.957
STM-16
16
2 488 320
G.957
An STM-N multiplex signal is formed by interleaving the individual STM-1 frames byte by byte.
1
SOH
Pointer
9 rows
Payload
SOH
9
19440 bits or 2430 bytes/frame
Bit length: 6.4300411 ns
Transmission bit rate: 155.520 Mbit/s
Frame length: 125 s
62.1013.105.11-A001
2-1
Structures
The first 9 columns include the Section Overhead (SOH) and the Pointer of
the Administrative Unit (AU pointer). The remaining 261 columns are used for
transporting the payload. It consists of packed and multiplexed payload
signals (tributaries) and an accompanying Path Overhead (POH).
The repetition frequency of the STM-1 frame is 8 kHz, i.e. one STM-1 frame
has a length of 125 s. The transmission capacity of one byte in an STM-N
frame is thus 64 kbit/s.
With STM-1, an Overhead capacity of 5184 kbit/s is transported in addition to
the traffic bit rate of 150,336 kbit/s.
Bit rates of the STM-1
frame
Columns x rows x 64 kbit/s
STM-1 frame
Section-Overhead
Payload
Bit rate
270 x 9 x 64 kbit/s
155,520 kbit/s
9 x 9 x 64 kbit/s
5,184 kbit/s
261 x 9 x 64 kbit/s
150,336 kbit/s
2-2
62.1013.105.11-A001
Structures
The payload has no fixed phase relation to the STM-N frame. In order to be
able to access the payload, the Section Overhead block contains a pointer. It
is located in the 4th row of the STM-N frame.
Payload
SOH
522
...
...
STM-1
Pointer
782
...
310
310
...
522
522
...
...
Pointer
3- 101
782
...
310
310
...
62.1013.105.11-A001
2-3
Structures
2.3.1 Container C
The transmission capacity of the incoming source signal is smaller than the
capacity of the block structure. The source signal is therefore filled up by
adding stuffing information (positive justification).
The process of filling up the incoming information to obtain the defined block
structure is referred to as mapping. The complete block structure is called
Container C. Different container sizes (e.g. C-11, C-12, C-2, C-3, C-4) are
available for the different source signal bit rates.
The digit in the container designation indicates the hierarchy level of the plesiochronous signal (e.g. C-4 for 140 Mbit/s). If several containers for different
bit rates are available within one hierarchy level, a second digit defines the bit
rate assignment (C-11=1,5 Mbit/s, C-12=2 Mbit/s).
1
260
C-3
C-4
12
C-2
84
C-12
C-11
Hierarchy
C-11
C-12
C-2
C-3
C-4
2-4
62.1013.105.11-A001
Structures
261
POH
C-4
85
C-3
POH
VC-3
VC-4
1
12
POH
POH
C-2
C-11 + POH
C-12 + POH
C-2 + POH
C-3 + POH
C-4 + POH
VC-2
POH
C-12
VC-12
C-11
VC-11
VC-11
VC-12
VC-2
VC-3
VC-4
62.1013.105.11-A001
2-5
Structures
9 10
270
AU-4 pointer
VC-4
AU-3
123 4
90
AU-3 pointer
VC-3
VC-4 + AU-4 pointer
VC-3 + AU-3 pointer
AU-4
AU-3
2-6
62.1013.105.11-A001
Structures
12
TU-2
TU-2
in frame #2
in frame #1
TU-2
TU-2
TU-2
in frame #3
in frame #4
... 105 106 V3 107 108 ... 212 213 V4 214 215 ... 319 320
Pointer bytes
1
TU-12
TU-12
in frame #2
in frame #1
TU-12
TU-12
in frame #3
in frame #4
TU-12
V1 105 106 ... 138 139 V2
...
33 34 V3 35 36
...
68 69 V4 70 71
Pointer bytes
1
TU-11
TU-11
in frame #2
in frame #1
TU-11
TU-11
in frame #3
in frame #4
TU-11
V1 78 79
...
24 25 V3 26 27
...
50 51 V4 52 53
...
76 77
Pointer bytes
TU-3
1
Pointer
bytes
86
H1
H2
H3
VC-3
...
62.1013.105.11-A001
2-7
Structures
12
86
TU-3
TUG-2
Stuffing
information
4 x TU-11
TUG-2
3 x TU-12
TUG-2
1 x TU-2
TUG-2
7 x TUG-2 + stuff. info TUG-3
1 x TU-3 + stuff. info TUG-3
Fig. 2-7 Tributary Unit Group
270
Space for
3 AU-3 or
1 AU-4 pointers
1x AU-4
3x AU-3
AUG
AUG
2-8
62.1013.105.11-A001
Structures
Examples
With 140 Mbit/s signals, the generation of an STM-1 signal can be described
as follows:
1.
2.
3.
4.
C-4
VC-4
AU-4
STM-1
In this case, AUG and AU-4 are identical, i.e. the AUG does not have to be
separately illustrated in the following figure.
270 bytes
9
3
1
SOH
PTR
POH
SOH
PTR
POH
POH
Payload
STM-1
AU-4
VC-4
62.1013.105.11-A001
2-9
Structures
At bit rates lower than 140 Mbit/s, the plesiochronous signals are converted
into an STM-1 signal via a 2-step procedure. .
No
<140
Mbit/s
No
<140
P
O
H
Calculating and
adding the pointer
P
T
R
VC
No
<34
Mbit/s
No
<34
Generating TUG-2
TUG-2
Generating TUG-3
TUG-3
P
O C-4
H
Calculating and
adding the pointer
P
T VC-4
R
S
O AU-4
H
STM-1
2-10
62.1013.105.11-A001
Structures
The following diagram shows how a 2.048 Mbit/s signal is converted into an
STM-1 signal via the different multiplex steps.
9 bytes
270 bytes
SOH
9
bytes
Pointer
VC-4 POH
stuff. info
TUG-3
Pointer
SOH
stuff. info
TUG-2
f
TU-12
STM-1
AU-4
TU-12 pointer
VC-4
VC-12 POH
TUG-3
TUG-2
TU-12
Payload
VC-12
C-12
x1
STM-1
AU-4
x3
VC-4
x7
TUG-3
x3
TUG-2
TU-12
VC-12
C-12
2.048 Mbit/s
62.1013.105.11-A001
2-11
Structures
TUG-2
TUG-2
TUG-2
TUG-3
TUG-2
TUG-2
STM-1
AU-4
VC-4
TUG-2
TUG-2
TUG-3
TUG-3
7x
7x
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
TU-12
VC-12
C-12
2.048 Mbit/s
21 x 2.048 Mbit/s
21 x 2.048 Mbit/s
2-12
62.1013.105.11-A001
Structures
2.4 Concatenation
If the payload is larger than the container available for it, it can be distributed
to several consecutive containers. The individual containers are concatenated by means of a special pointer value. This pointer value is referred to as
Concatenation Indication.
Example of a VC-4 concatenation
A number of four VC-4 containers are required for an ATM cell stream of the
broadband ISDN with a bit rate of 599.04 Mbit/s. In the first VC-4, a valid
POH is generated. The other three VC-4s are only filled up with payload and
are assembled to form one VC-4-4c Virtual Container.
By adding the pointer, the VC-4-4c is converted into the AU-4-4c group. The
first AU-4 of the AU-4-4c group is provided with a pointer. All other AUs contained in the AU-4-4c group receive the pointer value which indicates the
concatenation of the containers. All following AUs within the AU-4-4c group
receive the Concatenation Indication (CI) instead of the pointer value. The
CI is composed as follows:
1 0 0 1 S S 1 1
1 1 1 1 1 1 1 1
The CI value indicates that this AU-4 belongs to the previous AU-4 and that
all pointer operations of the first AU-4 shall be executed on all AU-4 units
contained in the AU-4-4c group.
62.1013.105.11-A001
2-13
Structures
STM-1#1
1
STM-1#2
9 10 11 12 13
270
STM-1#3
9 10 11 12 13
270
9 10 11 12 13
STM-1#4
270
9 10 11 12 13
SOH
SOH
SOH
SOH
Pointer
Pointer
Pointer
Pointer
SOH
SOH
SOH
SOH
125s
125s
10
11
10
4x9
12
11
10
1 1
1 1
125s
Byte interleaving
125s
270
12
11
11
13
12
12
270
270
270
270
13
13
13
9
9 9
Pointer
STM-4 frame
SOH
4x9
Payload
4 x 261
SOH
SOH
125s
2-14
62.1013.105.11-A001
Structures
Example:
62.1013.105.11-A001
2-15
Structures
VC-3/VC-4 POH
H4 (00)
VC-3/VC-4 Payload
9 rows
V4
V1
H4 (01)
VC-3/VC-4 Payload
V2
H4 (10)
VC-3/VC-4 Payload
V3
H4 (11)
VC-3/VC-4 Payload
V4
H4 (00)
VC-3/VC-4 Payload
2-16
62.1013.105.11-A001
Structures
Example: BIP-8
Then the same process is executed starting from the second bit of the signal
to be monitored, i.e. every eighth bit is analyzed and the second bit of the
BIP-8 value is defined by applying the same rule.
This calculation is performed for all eight bits of the BIP-8 value. The result is
then transmitted together with the signal to the opposite station. There the
same calculation is performed. Possible deviations of the calculated value
from the transmitted BIP-8 value permit transmission errors to be detected.
A maximum of 8 parity violations can be identified by means of one BIP-8
value on condition that these parity violations are statistically distributed.
The BIP-2 and BIP-24 monitoring process is based on the same principle.
The BIP-2 value to be transmitted is composed of two bits, the BIP-24 value
of three bytes.
Before being transmitted, the signals are scrambled. On reception, they are
descrambled. The BIP value is calculated in front of the scrambler and inserted in the next frame also in front of the scrambler.
1st bit
CBH <-
Signal
1
9
17
25
1 1 1 1 0 1 1 1 0 1 1 0 1 0 1 0 0 1 1 0 1 1 0 0 0 1 1
BIP-8 value
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
62.1013.105.11-A001
2-17
Structures
C-3,
C-4
VC-4
Assembler
Regenerator
STM-N RSOH
VC-3, VC4
Assembler
VC-4
Assembler
Regenerator
STM-N
Multiplexer
VC-11,
VC-12,
VC-2
Assembler
Regenerator
Section
STM-N
Multiplexer
C-11,
C-12,
C-2
VC-3
Assembler
VC-3, VC4
Assembler
C-3
VC-3
Assembler
VC-11,
VC-12,
VC-2
Assembler
C-3
C-11,
C-12,
C-2
C-3,
C-4
STM-N MSOH
2-18
62.1013.105.11-A001
xN
STM-N
x1
AU-4
AUG
C-4
VC-4
N = 1, 4
139.264
Mbit/s
x3
x1
TUG-3
TU-3
TUG-3
x3
AU-3
VC-3
VC-3
44.736
Mbit/s
C-3
34.368
Mbit/s
VC-3
x7
see note
x7
x1
TU-2
VC-2
C-2
6.312
Mbit/s
TU-12
VC-12
C-12
2.048
Mbit/s
TU-11
VC-11
C-11
1.544
Mbit/s
x3
TUG-2
x4
Pointer processing
Note
Fig. 3-1 Synchronous multiplex structure in compliance with ITU-T Recommendation G.707
The following chapter contains a detailed description of the individual sections and elements of the multiplex structure. The assembly of payload
signals in containers is explained in a separate chapter.
62.1013.105.11-A001
3-1
x1
AUG
AU-4
C-4
VC-4
139,264
Mbit/s
N=1, 4
C-4 to AU-4
The 139.264 Mbit/s signal is assembled in a C-4 container. Then the
VC-5 is generated by adding the POH. It is composed of 261 columns, each
consisting of 9 rows.
By adding the AU-4 pointer, the VC-4 is converted into an AU-4. The AU
pointer indicates the relative offset between the frame start of the VC and the
STM-1 frame.
AU-4 to AUG
The AU-4 Administrative Unit is converted into an AUG arrangement. The
AUG represents an information structure composed of 9 rows consisting of
261 columns plus 9 additional bytes in row 4 for the AU pointers. In the
example depicted below, the AUG consists of one VC-4 and one AU-4 pointer. The AU-4 and AUG are identical.
1
261
J1
B3
C2
G1
VC-4-POH
F2
C-4
VC-4
H4
F3
K3
N1
no fixed phase
H1 Y Y H2 1* 1* H3 H3 H3
AU-4
fixed phase
AUG
3-2
62.1013.105.11-A001
AUG to STM-N
The AUGs generated this way can now be either assembled in a STM-1
frame by mapping in an AUG directly or in an STM-N frame by multiplexing N
x AUGs byte by byte.
10
1
261
SOH
10
1
261
#1
#2
AUG
AUG
123...N123...N
123...N123...N
SOH
Nx9
N x 261
STM-N
Phase relation
The phase of the VC-4 has no fixed relation to the STM-N frame. The AU-4
pointer indicates the frame start of VC-4. This pointer is transmitted in the
STM-N signal and establishes thus the phase relation to the STM-N frame.
The AU-4 pointer has a defined phase relation to the AUG and thus to the
STM-N frame.
62.1013.105.11-A001
3-3
xN
44,736
Mbit/s
x3
AU-3
AUG
STM-N
C-3
VC-3
34,368
Mbit/s
N=1, 4
VC-3
30
59
87
J1
VC-3
B3
30
59
J1
87
VC-3
B3
C2
C2
G1
G1
G1
F2
F2
F2
H4
H4
H4
F3
F3
F3
K3
K3
K3
N1
N1
N1
VC-3-POH
no fixed phase
AU-3
H1 H2 H3
AU-3
H1 H2 H3
H1 H2 H3
A
B
87
no fixed phase
AUG
B
C
VC-3-POH
AU-3
A B C A B C A B C
no fixed phase
59
B3
C2
VC-3-POH
30
J1
A
B
C
3-4
62.1013.105.11-A001
Phase relation
The phase of the VC-3 has no fixed relation to the STM-N frame. The AU-3
pointer indicates the frame start of the VC-3. This pointer is transmitted in the
STM-N signal and establishes thus the phase relation to the STM frame.
For each VC-3, the STM-N transmits one pointer, i.e. it contains a total of
three pointers.
The AU-3 pointer has a defined phase relation to the AUG and thus to the
STM-N frame.
62.1013.105.11-A001
3-5
xN
STM-N
x1
AUG
AU-4
VC-4
N=1, 4
x3
x1
TUG-3
TU-3
TUG-3
VC-3
VC-3
44.736
Mbit/s
C-3
34.368
Mbit/s
86
TUG-3
(A)
86
TUG-3
(B)
86
TUG-3
(C)
Stuffing information
P
O
H
VC-4
A B C A B C A B C
1 2 3 4 5 6 7 8 9 10 11 12
A B C A B C
261
3-6
62.1013.105.11-A001
Phase relation
In the first three bytes of the first column, the TU-3 pointer sets up the phase
relation between VC-3 and TUG-3.
86 columns
TU-3
pointer
H1
H2
TUG-3
Stuffing bits
H3
85 columns
J1
B3
C2
G1
F2
C-3
VC-3
H4
F3
K3
N1
VC-3-POH
62.1013.105.11-A001
3-7
x1
TU-2
VC-2
C-2
6.312
Mbit/s
TU-12
VC-12
C-12
2.048
Mbit/s
TU-11
VC-11
C-11
1.544
Mbit/s
x3
TUG-2
x4
Depending on their bit rate, the payload signals are assembled in containers
C-n of appropriate size. The Virtual Containers (VC-n) are generated by
adding the POHs. By providing these VC-n containers with their pointers, the
TU-n Tributary Units are generated.
Since all SDH stuctures are based on a structure composed of 9 rows, the
TUs can be described as a structure with a certain number of columns and
nine rows.
TU-11
The capacity of a TU-11 is 1,728 kbit/s = 27 bytes per 125 s. A TU-11 can
be described as a structure composed of three columns and nine rows.
3 columns
1
2
1 2 3
1,728 kbit/s
9 rows
TU-11
27
bytes
27
27 125 s
Fig. 3-7 TU-11 Tributary Unit
TU-12
The capacity of a TU-12 is 2,304 kbit/s = 36 bytes per 125 s. A TU-12 can
be described as a structure composed of four columns and nine rows.
3-8
62.1013.105.11-A001
4 columns
1
2
1 2 3 4
2,304 kbit/s
9 rows
TU-12
36
bytes
36
36 125 s
Fig. 3-8 TU-12 Tributary Unit
TU-2
The capacity of a TU-2 is 6,912 kbit/s = 108 bytes per 125 s. A TU-2 can be
described as a structure composed of 12 columns and nine rows.
12 columns
1
2
9 rows
1 2 3 4 5 6 7 8 9 10 11 12
TU-2
108
bytes
108
6912 kbit/s
108 125 s
Fig. 3-9 TU-2 Tributary Unit
62.1013.105.11-A001
3-9
TUG-2
A TUG-2 is generated by multiplexing
4 x TU-11 or
3 x TU-12 or
1 x TU-2
column by column. Thus, the TUG-2 frame represents an arrangement in
which each byte of a TU has its fixed position.
TU-11
TU-12
4x
3x
1
TUG-2
TU-2
1
2
1
2
3
4
1
2
1
2
3
4
1x
1
2
3
1
2
2
3
3-10
62.1013.105.11-A001
TUG-3
x1
x7
TU-2
VC-2
C-2
6.312
Mbit/s
TU-12
VC-12
C-12
2.048
Mbit/s
TU-11
VC-11
C-11
1.544
Mbit/s
x3
TUG-2
x4
TU-12
1
2
TUG-2
1
2
1
2
3
4
1
2
3
4
TU-2
1
2
1
2
(2)
Stuffing info
1
2
3
5
7
5
6
TUG-3
4
5
1
3
4
5
(7)
2
3
(3)
1
2
3
4
(1)
2
3
6
7
3
4
5
6
1 234 . . .
7
82 84 86
Phase relation
The TU-11, TU-12 and TU-2 Tributary Units and the TUG-2 and TUG-3 Tributary Unit Groups have a fixed phase relation to each other. A direct multiplexing process without pointer matching is therefore possible.
62.1013.105.11-A001
3-11
VC-3
x1
x7
TU-2
VC-2
C-2
6.312
Mbit/s
TU-12
VC-12
C-12
2.048
Mbit/s
TU-11
VC-11
C-11
1.544
Mbit/s
x3
TUG-2
x4
TU-12
1
2
TUG-2
1
2
1
2
3
4
1
2
3
4
TU-2
1
2
1
2
(2)
1
2
1
2
3
5
7
VC-3
5
6
2
4
5
6
1
3
4
5
(7)
2
3
(3)
1
2
3
4
(1)
VC-3
POH
2
3
6
7
4
5
6
1 234 . . .
7
81 83 85
3-12
62.1013.105.11-A001
Mapping procedures
4 Mapping procedures
For all defined PDH bit rates there are mapping procedures which permit the
plesiochonous bit rates to be assembled in the corresponding containers.
These mapping procedures are always based on a positive justification process, i.e. the transmission capacity of the container is larger than the maximum amount of information received.
In order to compensate the difference between the information received and
transmitted, useful information or stuffing information must be inserted at
defined points.
In the following sections, the mapping procedures available for signals with
bit rates normally used in Europe are described.
Block 1
VC-4
POH
1
J1
B3
C2
G1
F2
H4
F3
K3
N1
Block 2
10
11
12
13
14
Block 20
Block 180
Fig. 4-1 Splitting up VC-4 into 13-byte blocks
The first byte of each block is a special byte, the following 12 bytes contain
(12 x 8) = 96 information bits.
The special bytes are referred to as W, X, Y and Z and have the following
order:
W is a normal information byte. Y is a stuffing byte, i.e. its contents are not
defined. The bits of the X byte are assigned as follows:
C R R R R R O O
The O bits can be used as overhead bits for the PDH. Five R bits are filled
62.1013.105.11-A001
4-1
Mapping procedures
with undefined stuffing information. The C bit is a stuffing check bit which
includes the information as to whether this row contains traffic or justification
information in the stuffing position. If the C bit is 0, the stuffing bits are real
traffic bits. If it is 1, the stuffing information consists of justification bits only.
Since the X byte is transmitted 5 times per row, five stuffing check bits are
available. On the Rx side, a majority decision prevents transmission errors
from leading to a false interpretation of the stuffing bit contents.
The Z byte is occupied as follows:
I I I I I I S R
It contains six information bits (I), one fixed stuff bit (R) as well as the justification bit (S) that can be used for real or stuffing information.
The following figure shows the first row of VC-20 divided up into 20 blocks.
1
J1 W
12 bytes
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
POH
byte
4-2
62.1013.105.11-A001
Mapping procedures
x9
Information
bits
Fixed stuffing
bits
240 x Inf
1xW
13 x Y
5xX
1xZ
1.920
8
260
2340
Bit rate
[kbit/s]
Stuffing check
bits
104
25
1
1.934
17.406
130
1.170
5
45
139,248
9,360
10
1
360
1
9
72
10
90
720
139,264 kbit/s
62.1013.105.11-A001
4-3
Mapping procedures
1
J1
B3
C2
G1
F2
H4
F3
K3
N1
VC-3
POH
...
...
...
...
...
...
...
...
...
...
80
81
82
83
84
85
Partial frame 1
Partial frame 2
Partial frame 3
...
...
...
...
17
Byte C
Bytes A, B
18
...
...
...
...
39
C
C
C
...
...
...
...
58
59
60
61
...
...
...
...
81
82
C
C
83
84
85
R R R R R R C1 C2
R R R R R R R S1 S2 I
R R R R R R R R
I
4-4
62.1013.105.11-A001
Mapping procedures
Fixed stuffing
bits
Stuffing check
bits
1.431
573
10
4.293
1.719
30
34,344
13,752
240
48
x3
Bit rate
[kbit/s]
34.368 kbit/s
62.1013.105.11-A001
4-5
Mapping procedures
500 s
Fig. 4-5 Asynchronous mapping of 2 Mbit/s signals into VC-12
The VC-12 has two stuffing positions (S1, S2). They are controlled by the two
stuffing bits (C1, C2). On evaluation of the stuffing check bits C1 and C2, a
majority decision is performed on the receive side. The evaluation of the
information transmitted in each multiframe leads to the following result:
Information
bits
Bits/500 s
Bit rate
[kbit/s]
Fixed stuffing
bits
Stuffing check
bits
1.016
7
64
9
1.023
73
2.046
146
12
16
2.048 kbit/s
2.046 kbit/s = fs - 1 x 10-3
2.050 kbit/s = fs + 1 x 10-3
4-6
62.1013.105.11-A001
Mapping procedures
24 bytes
N2
C1 C2 O O O O R R
24 bytes
K4
C1 C2 R R R S1 S2 R
24 bytes
500 s
Fig. 4-6 Asynchronous mapping of 1.5 Mbit/s signals into VC-11
The two stuffing positions S1 and S2 are controlled by three stuffing check
bits C1 and C2 each.
A majority decision performed on the receive side with regard to the three
check bits determines as to whether the associated stuffing position S is
interpreted as information bit or as justification bit. The evaluation of the information transmitted leads to the following result:
Information
bits
Bits/500 s
Bit rate
[kbit/s]
Fixed stuffing
bits
768
3
24
13
771
37
1.542
74
12
16
1.544 kbit/s
62.1013.105.11-A001
4-7
Mapping procedures
V5
V5
J2
J2
N2
N2
K4
K4
500 s
Fixed stuffing information with even parity
Fig. 4-7 Conversion of a VC-11 into a VC-12 (1.5 Mbit/s in VC-12)
4-8
62.1013.105.11-A001
Overhead
5 Overhead
For monitoring and controlling the SDH network, additional information is
transmitted together with the traffic data (payload). This additional information, called Overhead, is divided up into two main groups, i.e. the Section
Overhead and the Path Overhead.
STM
identifier
261 bytes
A1 A1 A1 A2 A2 A2 J0/
C1
B1
E1
F1
Voice
D1
D2
D3
RSOH
BER monitoring
H1
MSOH
Pointer H2
AU-4
Service channel
STM-1
H3 H3 H3
B2 B2 B2 K1
K2
D4
D5
D6
Connection check
J1
D7
D8
D9
BER monitoring
B3
D10
D11
D12
S1 Z1 Z1 Z2
Synchronization
status
Ident. of VC contents
Future purposes
Voice
Section REI
C2
Path status
G1
User channel
F2
Multiframe indic.
H4
User channel
F3
Z2 M1 E2
C-4
Payload
VC-4
D..
Data transmission
Managem. purposes
K4
Spare channels
62.1013.105.11-A001
5-1
Overhead
Frame
alignment
signal
Assignment:
A1 = 1111 0110
A2 = 0010 1000
C1
STM-N
identifier
The C1 byte can be used to check an STM-N connection between two multiplexers (old meaning, new see J0).
J0
Path
Trace
B1
BIP-8
monitoring
E1
Regenerator service
channel
F1
User
channel
D1, D2, D3
Data
Communication
Channel
(DCC)
BIP-N x 24
monitoring
N x 3 bytes for bit error monitoring of the multiplex section. The BIP-Nx24
value is calculated to obtain an even parity over all bits of the current STM-N
frame with the exception of the RSOH rows (row 1 to 3) and is inserted in the
next frame.
K1, K2
MS-AIS,
5-2
Data Communication
Channel
(DCC)
MS-RDI.
62.1013.105.11-A001
Overhead
S1
Synchronization status
(Synchronization Status Message
(SSM))
Z1,Z2
Spare bytes
M1
Section REI
E2
Multiplexer
service channel
Connection check
J1
BER monitoring
B3
Identif. of VC contents
Path status
C2
G1
User channel
F2
Multiframe indicator
H4
User channel
F3
C-4
Payload
K3
N1
62.1013.105.11-A001
5-3
Overhead
J1 Path Trace
This is the first byte in the VC-3/VC-4. Its position is indicated by the pointer
and represents thus the reference point of the VC-3/VC-4 structure. This byte
can be used to transmit either a repetitive telegram with a length of 64 bytes
in any format or a 16-byte telegram in the so-called E.164 format. The Path
Trace permits the link to be checked over the complete path.
E.164 format:
The first byte marks the beginning of the frame. It includes the result of a
CRC-7 calculation performed for the previous frame. The following 15 bytes
are used to transmit the ASCII signs. If the 16-byte format shall be transmitted in a 64-byte format, it must be repeated four times.
B3 BIP-8 monitoring
This byte is used for error monitoring over the complete path. The BIP-8
value is calculated over all bits of the current VC3/VC-4 to obtain an even
parity and is inserted into the next VC3/VC-4.
C2 Contents identifier
This byte is used as identifier for the VC contents. The following table gives
an overview of the defined codings of the C2 byte.
MSB
1 2 3 4
LSB
1 2 3 4
Hex.
code
Explication
0 0 0 0
0 0 0 0
00
Unequipped
0 0 0 0
0 0 0 1
01
0 0 0 0
0 0 1 0
02
TUG structure
0 0 0 0
0 0 1 1
03
Locked TU
0 0 0 0
0 1 0 0
04
Asynchronous mapping of
34,368 kbit/s or 44,736 kbit/s into
Container-3
0 0 0 1
0 0 1 0
12
Asynchronous mapping of
139,264 kbit/s into Container-4
0 0 0 1
0 0 1 1
13
ATM mapping
0 0 0 1
0 1 0 0
14
0 0 0 1
0 1 0 1
15
FDDI mapping
Via this byte, the transmission performance data are reported by the path
end to the VC source. Thus, it is possible to monitor the complete path from
any point or from any of the two ends.
REI
RDI
(not used)
5-4
62.1013.105.11-A001
Overhead
Bit 1..4
This signal is returned whenever the VC-3/VC-4 assembler does not receive
a valid signal. The following conditions have been defined:
a) Path AIS
b) Loss of signal
c) Wrong path trace (J1 byte)
In each of these cases, bit 5 is set to logic 1, otherwise it is 0.
Bit 6...8
F2 User channel
This 64 kbit/s channel is available for communication between the path start
and path end for user purposes.
H4 Multiframe indicator
P1
P1
SL2
SL1
C3
C2
C1
This 64 kbit/s channel is available for communication between the path start
and path end for user purposes.
K3 Autom. protection
switching
Bits 1 to 4 are provided for controlling automatic protection switching processes at the higher-order level. Bits 5 to 8 are reserved for future applications.
N1 Network operator
byte
62.1013.105.11-A001
5-5
Overhead
V5 is the first byte in VC-1x/VC-2. The TU-1x/TU-2 pointer points at this byte
and represents thus the reference point of the lower-order VC. V5 is used for
transmitting the following information:
BIP-2
REI
RFI
Signal Label
RDI
BIP-2 monitoring
These two bits are used for error monitoring over the complete lower-order
path. The result is calculated to obtain an even parity. The calculation is performed for the complete VC-1/VC-2 including the POH bytes, however,
without bytes V1 to V4 of the TU-1/TU-2 pointer. If information is transmitted
in byte V3 in negative justification processes, this byte is included in the calculation.
Bit 3
Remote Error
Indication
(REI)
By setting this bit to logic 1, the VC source is informed that one or several
parity violations were detected in the BIP-2 calculation. If there are no errors,
this bit is logic 0.
Bit 4
Remote
Failure Indication (RFI)
On detection of a fault or failure, this bit is set to logic 1. RFI is sent back to
the VC source.
5-6
62.1013.105.11-A001
Overhead
Bit 5, 6, 7 Contents
identifier
These three bits correspond with the C2 byte of the higher-order POH. The
use of the three special mapping indicators 010, 011 and 100 is optional.
However, these values must not be used for other purposes.
b5
b6
b7
Meaning
Unequipped
Asynchronous
Bit-synchronous
Byte-synchronous
equipped - unused
VC-Path
Remote
Defect Indication (RDI)
J2
Path Trace
The function of this byte is identical with that of byte J1 of the higher-order
POH. This byte can be used to transmit a 16 byte telegram in the E.164 format. Using the Path Trace, it is possible to check the link over the complete
path.
K4
Bits 1 to 4 are provided for controlling automatic protection switching processes at the lower-order level. Bits 5 to 8 are reserved for future applications.
N2
62.1013.105.11-A001
5-7
Overhead
5-8
62.1013.105.11-A001
Pointers
6 Pointers
A worldwide synchronous network represents an ideal condition that can in
practise not always be achieved. In synchronous networks, failures can lead
to islands without clock connection. In this case, a free-running oscillator
must supply these islands with the required clock information.
The introduction of pointers in the SDH created the possibity to maintain the
synchronous character of the transported information in a not clock-synchronous environment. The information sent to such an island can thus be processed without any loss of information and can be passed on although the
clock bit rates are not identical.
The payload has no fixed phase relation to the frame. In order to be able to
access the payload, a pointer is transmitted in the overhead block. It permits
the dynamic adaptation of the phase of the Virtual Container to the frame. In
this connection, dynamic means:
1. The phase of the Virtual Container can differ from that of the frame.
2. At different frequencies, the phase position can continuously vary without
causing any loss of information.
62.1013.105.10-A001
6-1
Pointers
Positive justification
If the frame frequency of the VC is lower than that of the STM-N frame, stuffing bytes must be inserted and the pointer value must be increased by 1 at
regular intervals.
STM-1 frame
1
Pointer (P) H1 H2 H3
270
Beginning of
VC-4
Frame n
125 s
Pointer (P)
H1 H2 H3
Frame n+1
250 s
Pos. stuffing
byte(s)
Pointer (P)
H1 H2 H3
Frame n+2
375 s
New pointer
(P+1)
H1 H2 H3
Frame n+3
500 s
6-2
62.1013.105.10-A001
Pointers
Negative justification
If the frame frequency of the VC is higher than that of the STM-N frame, additional information of the VC must be transmitted in the H3 bytes and the pointer value must be decreased by 1 at regular intervals.
STM-1 frame
1
Pointer
H1 H2 H3
270
Beginning of
VC-4
Frame n
125 s
Pointer (P)
H1 H2 H3
Frame n+1
250 s
Neg. justification
bytes
(data)
Pointer (P)
H1 H2
Frame n+2
375 s
H1 H2 H3
Frame n+3
500 s
62.1013.105.10-A001
6-3
Pointers
10
11
12
13
14
...
269 270
522 522 522 523 523 523 524 524 524 ... 607 607 607 608 608 608
3
4
696 696 696 697 697 697 698 698 698 ... 781 781 781 782 782 782
0
87
87
87
88
88
88
89
89
89
174 174 174 175 175 175 176 176 176 ... 259 259 259 260 260 260
261 261 261 262 262 262 263 263 263 ... 346 346 346 347 347 347
348 348 348 349 349 349 350 350 350 ... 433 433 433 434 434 434
435 435 435 436 436 436 437 437 437 ... 520 520 520 521 521 521
522 522 522 523 523 523 524 524 524 ... 607 607 607 608 608 608
696 696 696 697 697 697 698 698 698 ... 781 781 781 782 782 782
H1 H1 H1 H2 H2 H2 H3 H3 H3
H1 H1 H1 H2 H2 H2 H3 H3 H3
87
87
87
88
88
88
89
89
89
...
85
85
85
86
86
86
...
85
85
85
86
86
86
6-4
62.1013.105.10-A001
Pointers
The three AU-3 pointers are interleaved byte by byte and arranged as follows:
Pointer a
Pointer b
Pointer c
The three pointers are independent of each other and indicate the beginning
of the corresponding VC, only the bytes of this VC being counted and those
of all others being skipped.
H1, H2
H1 and H2 are read as a 16-bit data word. Bits 1 to 4 form the so-called New
Data Flag NDF. The NDF indicates as to whether a new pointer value has to
be set. Two values have been defined:
NDF 0110 = disabled
NDF 1001 = enabled
H3
62.1013.105.10-A001
Pointer value
6-5
Pointers
10
11
12
13
14
...
522
523
524
609
610
611
269 270
... 607
608
... 694
695
696
697
698
... 781
695
...
86
87
88
89
... 172
173
174
175
176
... 259
260
261
262
263
... 346
347
348
349
350
... 433
434
435
436
437
... 520
521
522
523
524
... 607
608
609
610
611
... 694
695
696
697
698
... 781
695
...
85
86
87
88
89
... 172
173
H1
H1
H2
H2
1*
1*
1*
1*
H3 H3 H3
H3 H3 H3
85
H1 and H2 are read as a 16-bit data word. It includes the New Data Flag NDF
and the pointer value.
NDF 0110 = disabled
NDF 1001 = enabled
6-6
62.1013.105.10-A001
Pointers
H3
Pointer value
AU-4 concatenation
In case of large payload amounts, several AU-4 Administrative Units are concatenated. The first AU-4 contains a normal pointer. The associated following
AU-4s include the CI instead of the pointer value. This CI indicates that these
AU-4s are to be treated in the same way as the previous ones.
1
Concatenation Indication CI
62.1013.105.10-A001
6-7
Pointers
TU-3 pointer
H1
H2
TUG-3
85 columns
H3
S
T
U
F
F
I
N
G
J1
B3
C2
VC-3
G1
F2
H4
C-3
F3
K3
N1
VC-3 POH
Fig. 6-5 Multiplexing a VC-3 into a TUG-3
The TU-3 pointer is located in the first column of the TUG-3 frame. It is composed of three bytes referred to as H1, H2 and H3.
H1, H2
H1 and H2 are read as a 16-bit data word. Bits 1 to 4 represent the New
Data Flag NDF. The NDF indicates as to whether a new pointer value must
be set or not. The following two values have been defined:
NDF 0110 = disabled
NDF 1001 = enabled
6-8
62.1013.105.10-A001
Pointers
In the negative justification process, the five D bits (bits 8, 10, 12, 14 and 16)
are inverted. On the decoder side, the D bits are evaluated in the same way
and the information contained in H3 is inserted into the payload of the current
VC-3.
N
H3
Pointer value
...
82
83
84
85
86
H3
4
5
6
7
8
9
S
T
U
F
F
I
N
G
...
85
86
87
88
89
80
81
82
83
84
H3
...
80
81
82
83
84
...
86
85
86
87
88
89
62.1013.105.10-A001
6-9
Pointers
V1 321 322
V1 and V2 can be read as a 16-bit data word. Bits 1 to 4 represent the New
Data Flag NDF. The following two values have been defined:
NDF 0110 = disabled
NDF 1001 = enabled
Bits 5 and 6 are referred to as S S and indicate the type of the TU.
TU-2: S S = 0 0
Bits 7 to 16 represent a 10-bit word, the so-called pointer value. As a binary
value, the pointer value indicates the offset between the VC-2 start and the
reference point in bytes. The bits are by turns referred to as I and D bit (Increment and Decrement). If the pointer value is to be increased by positive justification, this is indicated by the inversion of all five I bits (bits 7, 9, 11, 13 and
15).
On the decoder side, an inversion of the I bits is followed by a majority decision, i.e. if at least three I bits have been inverted, the current pointer value is
increased by 1 and the justification bytes contained in the payload of the current VC-2 are ignored.
In the negative justification process, the five D bits (bits 8, 10, 12, 14 and 16)
are inverted. On the decoder side, the D bits are evaluated in the same way
and the information contained in V3 is inserted into the payload of the current
6-10
62.1013.105.10-A001
Pointers
VC-2.
N
V3
Pointer value
V4
TU-2 concatenation
In order to be able to transport bit rates not defined by ITU-T within the Synchronous Digital Hierarchy (SDH), several TU-2 Tributary Units can be concatenated to TU-2-mc. Thus, it is possible to transport information in
multiples of VC-2 within a VC-2-mc.
Three different concatenation types are possible:
a. Concatenation of consecutive TU-2s in one higher-order VC-3 (contiguous concatenation).
b. Sequential concatenation of several TU-2s in one higher-order VC-3
(sequential concatenation).
c. Virtual concatenation of TU-2s in one higher-order VC-4 (virtual concatenation).
In case of a contiguous concatenation, the first TU-2 receives a valid pointer.
All other TU-2s contained in the TU-2-mc receive the Concatenation Indicator
(CI) instead of the pointer.
The CI indicates that all pointer operations of the first TU-2 are to be performed in the same way in all other TU-2s. The VC-2-mc includes a VC-2 POH
which is located in the first VC-2 of the VC-2-mc.
1
Concatenation Indication CI
62.1013.105.10-A001
6-11
Pointers
V1
78
79
...
24
25
V3
26
27
...
50
51
V4
52
53
...
76
77
V1 and V2 can be read as a 16-bit data word. Bits 1 to 4 represent the New
Data Flag NDF. The following two values have been defined:
NDF 0110 = disabled
NDF 1001 = enabled
Bits 5 and 6 are referred to as S S and indicate the Type of the TU.
TU-11: S S = 1 1
Bits 7 to 16 represent a 10-bit word, the so-called pointer value. As a binary
value, the pointer value indicates the offset between the VC-11 start and the
reference point expressed in bytes. The bits are by turns referred to as I and
D bit (Increment and Decrement). If the pointer value is to be increased by
positive justification, this is indicated by the inversion of all five I bits (bits 7, 9,
11, 13 and 15).
On the decoder side, an inversion of the I bits is followed by a majority decision, i.e. if at least three I bits have been inverted, the current pointer value is
increased by 1 and the justification bytes contained in the payload of the current VC-11 are ignored.
In the negative justification process, the five D bits (bits 8, 10, 12, 14 and 16)
are inverted. On the decoder side, the D bits are evaluated in the same way
and the information contained in V3 is inserted into the payload of the current
VC-11.
N
6-12
Pointer value
62.1013.105.10-A001
Pointers
V3
V4
62.1013.105.10-A001
6-13
Pointers
V1 105 106
...
33
34
V3
35
36
...
68
69
V4
70
71
V1 and V2 can be read as a 16-bit data word. Bits 1 to 4 represent the New
Data Flag NDF. The following two values have been defined:
NDF 0110 = disabled
NDF 1001 = enabled
Bits 5 and 6 are referred to as S S and indicate the type of the TU.
TU-12: S S = 1 0
Bits 7 to 16 represent a 10-bit word, the so-called pointer value. As a binary
value, the pointer value indicates the offset between the VC-12 start and the
reference point expressed in bytes. The bits are by turns referred to as I and
D bit (Increment and Decrement). If the pointer value is to be increased by
positive justification, this is indicated by the inversion of all five I bits (bits 7, 9,
11, 13 and 15).
On the decoder side, an inversion of the I bits is followed by a majority decision, i.e. if at least three I bits have been inverted, the current pointer value is
increased by 1 and the justification bytes contained in the payload of the current VC-12 are ignored.
In the negative justification process, the five D bits (bits 8, 10, 12, 14 and 16)
are inverted. On the decoder side, the D bits are evaluated in the same way
and the information contained in V3 is inserted into the payload of the current
VC-12.
6-14
62.1013.105.10-A001
Pointers
V3
Pointer value
V4
62.1013.105.10-A001
6-15
Pointers
6-16
62.1013.105.10-A001
Reference model
7 Reference model
International standards set up for the Synchronous Digital Hierarchy (SDH)
and the associated equipment units ensure that networks can be established
using equipment from different manufacturers. This is achieved thanks to the
introduction of application-independent reference models.
The general reference model (acc. G.783) specifies both the physical characteristics (bit rates, optical/electrical level, impedances) and definitions regarding the contents of each byte and even bit. These specifications cover the
following aspects:
Frame structure
Identification
Scrambling
Coding/decoding
Mapping procedures
Service channel utilization
Monitoring and control signals.
The essential parts of signal processing are defined as functions. Regarding external interfaces, previous recommendations were maintained. The
reference model is composed of 16 different basic functions. They have an
internal function and logic reference points via which the individual blocks
communicate with each other. These reference points are no internal test or
measuring points and in many cases physically not even obvious. The external interfaces (inputs and outputs), however, are physically defined.
Transport terminal function
STM-M
SPI
RST
MST
MSP
Lower-order path
G.703
T
MSA
S
Higher-order path
PPI
LPA
LPT
LPC
HPA
T
HPT
S
T
MSA
S
MSP
MST
RST
SPI
DCC
M
Higher-order path
T
PPI
LPA
DCC
R
Q interface
S
G.703
T STM-N
SEMF
MCF
F interface
SETS
S
SETPI
External
synchronization
62.1013.105.11-A001
7-1
Reference model
order path, higher-order path, overhead etc. are generally applicable to both
transmission directions. All functional blocks have a clock reference point T
and a management reference point S. The reference point T communicates with the functional block referred to as SETS, the reference point S with
functional block SEMF.
This function represents the interface for the information transfer to other
transmission systems as defined in ITU-T Rec. G.703 for the PDH. Essential
tasks include the electrical isolation, overvoltage protection, exchange cable
equalization, line coding/decoding as well as clock recovery and monitoring
of the incoming signal.
This function defines how plesiochronous signals are mapped into C-n containers (n=11, 12, 2, 3) and the justification procedures necessary for this
purpose.
This function generates and/or evaluates the VC-Path Overhead. The Path
Overhead is carried in the container from its assembly up to its disassembly.
Here the VC-m contents are assembled (m = 3, 4); in addition, the TU pointers are generated or modified. These pointers set up the phase relation between VC-n (n = 11, 12, 2, 3) and VC-m (m = 3, 4).
This function permits the flexible arrangement of the VC-m Virtual Containers
(m = 3, 4) within an STM-N frame.
Here the AU pointers are generated and/or modified. The AU Groups (AUG)
thus generated are interleaved byte by byte to obtain the STM-N frame (without Section Overhead SOH).
This function includes all aspects necessary to ensure that switchover to protection paths is possible in case of failures on the line side. MSP communication with the opposite station takes place via the K bytes of the Section
Overhead.
This function generates the MSOH (row 5 to 9 of the SOH) and/or evaluates
it on the receive side.
7-2
62.1013.105.11-A001
Reference model
This function generates the RSOH (row 1 to 3 of the SOH) and/or evaluates it
on the receive side. In addition, the STM-N signal is scrambled in the transmit direction. Frame alignment and descrambling take place in the receive
direction.
The logic signal is normally converted into an optical STM-N signal appropriate for the transmission medium available. Both signal conversion and
clock recovery are performed in the receive direction.
SETSSynchronous
Equipment Timing
Source
This function provides all clocks required by the network element (NE). All
functions mentioned above receive the necessary clock signals via the reference points T from the SETS.
SETPI Synchronous
Equipment
Timing Physical
Interface
SEMF Synchronous
Equipment
Management
Function
Here the monitoring data (performance data and hardware-specific messages) are converted into object-oriented messages which can be transmitted
via the DCC or the Q or F interface to a management system or an Operator
Terminal. In the opposite direction, messages from the management system
are converted into hardware-specific control signals. The connections to the
individual functional blocks are set up via logic reference points S.
MCF
This function covers all tasks to be fulfilled in conjunction with the transport of
TMN messages to or from the management system via DCC channels or via
the Q or F interface.
Message Communication
Function
62.1013.105.11-A001
7-3
Reference model
7-4
62.1013.105.11-A001
Applications
8 Applications
8.1 Synchronous line equipment
In the SDH, no distinction is made between multiplexers and line terminating
units. The synchronous line equipment includes both synchronous multiplexers with integrated optical transmitters and receivers and the associated
regenerators.
140/155 Mbit/s
4
F2in
F1out
Fin1
SLX1/4
4
F2out
Fout2
F2in
F1in
Fout4
F2out
Fout2
SLR4
Fin3
Fout4
Fin3
F1in
F1out
Fin1
Fout2
SLR16
F1in
Fout4
Fin3
F2out
SLX1/4
F1out
F2in
140/155 Mbit/s
2488 Mbit/s
SLX1/16
16
Fin1
SLR4
140/155 Mbit/s
16
140/155 Mbit/s
622 Mbit/s
Fin1
Fout2
SLR16
Fout4
Fin3
F1in
F2out
16
SLX1/16
F1out
F2in
16
62.1013.105.11-A001
8-1
Applications
Alternatively, 140 Mbit/s signals can be applied to the synchronous line multiplexer instead of STM-1 signals.
In the transmit direction, the asynchronous 140 Mbit/s signals are converted
into an STM-1 signal. In the receive direction, the initial 140 Mbit/s signals
are extracted from the STM-1 signal.
As opposed to the PDH, the conversion of STM-4 signals to STM-16 signals
is not performed by a 4 x STM-4 multiplexing process, but 16 STM-1 signals
are directly combined to form the STM-16 signal.
155.520 Mbit/s
622 Mbit/s
4
STM-4
139.264 Mbit/s
AUG
AU-4
VC-4
2448 Mbit/s
C-4
155.520 Mbit/s
16
STM-16
139.264 Mbit/s
16
AUG
AU-4
VC-4
C-4
8-2
62.1013.105.11-A001
Applications
the user channel is made available via byte F1 and the service channel via
byte E1. Then the SOH is completed again by forming a new RSOH. Here
the new Regenerator Section begins.
Fault location is generally performed by a management system using the
information supplied by all equipment units available in the network. A special system-internal fault-locating device is therefore not necessary here.
The difference between SLA-4 and SLA-16 consists only in the different
regenerator bit rates.
62.1013.105.11-A001
8-3
Applications
8.2 Multiplexers
Regarding their functions, multiplexers can be divided up into the following
three basic types:
Terminal Multiplexers
Add/Drop Multiplexers
Cross-connect Multiplexers
MS1/4
TMS
STM-4
STM-1
STM-1
MS1/4
MS1/4: FlexPlex MS1/4
TMS: Terminal Multiplexer (SDH)
STM-4
TMS
e.g.:
2 Mbit/s
34 Mbit/s
140 Mbit/s
8-4
62.1013.105.11-A001
Applications
Functioning of a
Terminal Multiplexer
Aggregate signal
(e.g. STM-1, STM-4)
n
Tributary signals
(e.g. 2 Mbit/s, 34 Mbit/s, 140 Mbit/s, (STM-1))
62.1013.105.11-A001
8-5
Applications
STM-4
STM-4
MS1/4
AMS
STM-1
STM-1
e.g.:
2 Mbit/s
34 Mbit/s
140 Mbit/s
e.g.:
2 Mbit/s
34 Mbit/s
140 Mbit/s
e.g.:
2 Mbit/s
34 Mbit/s
140 Mbit/s
8-6
62.1013.105.11-A001
Applications
Functioning of an
Add/Drop Multiplexer
TU-12
Aggregate signal
East
(e.g. STM-1, STM-4)
Aggregate signal
West
(e.g. STM-1, STM-4)
n
Tributary signals
(e.g. 2 Mbit/s, 34 Mbit/s, 140 Mbit/s, (STM-1))
62.1013.105.11-A001
8-7
Applications
One of the FlexPlex MS1/4 applications is its use as a Cross-connect Multiplexer. Within SDH networks, the Cross-connect Multiplexer is used at
nodes, in which several signals of the same hierarchy level have to be crossconnected. This cross-connect function is possible for both signals available
on the aggregate side and signals available on the tributary side of the multiplexer. The Cross-connect Multiplexer is ideally suited for network nodes
located on a linear SDH link to which further SDH signals of the same hierarchy are routed (star topology) or for network nodes representing the interface
between two SDH rings. Fig. 8-7 shows the example of a network section
with such nodes.
STM-1
STM-4
MS1/4
MS1/4
XMS4
XMS1
STM-1
STM-4
STM-1
MS1/4: FlexPlex MS1/4
XMS1: Cross-connect Multiplexer (STM-1)
XMS4: Cross-connect Multiplexer (STM-4)
8-8
62.1013.105.11-A001
Applications
Functioning of the
Cross-connect Multiplexer
Aggregate signal
West 1
(e.g. STM-1, STM-4)
Aggregate signal
East 1
(e.g. STM-1, STM-4)
TU-12
Aggregate signal
West 2
(e.g. STM-1, STM-4)
Aggregate signal
East 2
(e.g. STM-1, STM-4)
n
Tributary signals
(e.g. 2 Mbit/s, 34 Mbit/s, 140 Mbit/s, (STM-1))
62.1013.105.11-A001
8-9
Applications
8.3 Networks
If a telecommunications network, e.g. the DBP Telekom network, is divided
up into three levels, i.e. the local area network, the regional long-distance
network and the supraregional long-distance network (see Fig. 8-6), all three
levels can be equipped with SDH units. However, in order to be able to optimally exploit all possiblilities offered by the Synchronous Digital Hierarchy,
different equipment types have to be provided for the different network topologies.
The synchronous line equipment (SLA) available for the transmission capacities of 622 Mbit/s and 2.5 Gbit/s (SLA 4, SLA 16) is appropriate for the longdistance network levels where the networks are in most cases implemented
as line networks with point-to-point connections.
The local area network level mostly consists of ring networks implemented
using add/drop multiplexers (ADM). Cross-connect systems can be used at
all network levels.
Long-distance
network 1
Network nodes
SLA4, SLA16
Long-distance
network 2
SLA4, SLA16
Network nodes
ADM
Local area
network
FMUX
ADM
8-10
62.1013.105.11-A001
Applications
to the long-distance
network
62.1013.105.11-A001
8-11
Applications
to the long-distance
network
to the long-distance
network
self-healing
Interruption/
cable break
self-healing
8-12
62.1013.105.11-A001
Applications
By a double connection of the two rings via two stations, the reliability can be
further increased.
Long-dist. netw.
62.1013.105.11-A001
8-13
Applications
8-14
62.1013.105.11-A001
Protection switching
9 Protection switching
9.1
Overview
The reliability and maintenance of transmission networks are two important
aspects to be taken into account on installation of SDH multiplexers. In this
connection, redundancy plays an important role. Redundancy means that
additional functions are made available on a standby basis. Redundancy
should be provided for both the transmission channels of the network and the
multiplexer modules.
If a transmission channel is faulty or disturbed, the data traffic is switched
over to an appropriate protection channel (protection switching).
If the function of a multiplexer fails, the system switches over to the redundant function available (equipment protection).
9.2 Definitions
1. Single-ended operation (unidirectional operation)
On failure of only one direction of transmission, only the protection switches
of this direction are switched over.
2. Dual-ended operation (bidirectional operation)
On failure of only one direction of transmission, the protection switches of
both directions are switched over.
3. Extra traffic
Extra traffic occupies redundant transmission channels. In the case of a fault,
this traffic is interrupted.
4. Normal traffic
Normal traffic is routed via the redundant transmission channels.
62.1013.105.11-A001
9-1
Protection switching
9-2
62.1013.105.11-A001
Protection switching
Operation
Protocol in
Extra traffic
MS 1+1 Protection
Single-ended/
dual-ended
revertive/nonrevertive
K1/K2 bytes
not possible
MS 1:n Protection
Single-ended/
dual-ended
revertive/nonrevertive
K1/K2 bytes
possible
MS Shared
Protection
Ring
Dual-ended
revertive/nonrevertive
K1/K2 bytes
possible
MS Dedicated
Protection
Ring
Dual-ended
revertive/nonrevertive
K1/K2 bytes
possible
Single-ended
revertive/nonrevertive
not necessary
not possible
Dual-ended
revertive/nonrevertive
K3/K4 bytes
not possible
Path/Subnetwork Protection
Multiplex Section
Operating
path
Protection
path
Doubling
Selector
62.1013.105.11-A001
9-3
Protection switching
Zero
channel
(0)
0
1
Operating
channel
1
Operating
section
1
1
2
Operating
channel
2
Operating
section
2
2
15
Extra
traffic
channel
(15)
15
Bridge
Protection
section
(0)
Selector
9-4
62.1013.105.11-A001
Protection switching
In the event of a fault, the adjacent multiplexers switch over the normal traffic
at the AU level to the half provided for protection. Operation is dual-ended
and revertive or non-revertive.
In four-fibre rings, there are two protection switching levels. At first the
system tries to protect each section of the ring by an own MS 1:1 protection.
If the fault cannot be eliminated this way, a loop is switched.
Node 1
Node 2
Node 1
N
E
N
Node 4
N
Node 3
N
Node 4
No failure
Node 2
Node 1
N
Node 3
Node 2
N
Node 4
N
Node 3
Failure of node 2
62.1013.105.11-A001
9-5
Protection switching
Node 2
Node 1
N
E
Node 4
Node 3
Node 4
No failure
Node 2
Node 1
N
Node 3
Node 2
N
Node 4
Node 3
Failure of node 2
Fig. 9-4 Example for the traffic flow in an MS dedicated protection ring
The payload is available in the form of a container and is doubled. Then each
container is separately assembled in a VC. Thus, there are two independent
VCs which are transmitted via separate paths.
Subnetwork protection
9-6
62.1013.105.11-A001
Protection switching
VC-xy #1
C-xy
C-xy
C-xy
C-xy
C-xy
Permanent
bridge
C-xy
Path
termination
Subnetwork Protection:
Path
termination
VC-xy
VC-xy
C-xy
Path
termination
Path
selector
VC-xy #2
Permanent
bridge
VC-xy
VC-xy
Path
selector
C-xy
Path
termination
9.3.6 Protocols
Protocols exchanged between the multiplexers are used to control the protection switching processes.
Appropriate channels are required for transmitting these protocols. In the
Section Overhead, there are the K1/K2 bytes. They are used for the protocols of the following protection types:
MS 1+1 protection,
MS 1:n protection,
For path protection, a separate protocol is required for each virtual container
(VC). For this reason, path protection protocols can be appropriately transmitted in the Path Overhead only (bytes K3, K4).
62.1013.105.11-A001
9-7
Protection switching
Linear chain
In a linear chain, the multiplexers are connected in series via Aggregate
Interfaces. The multiplexers at both ends of the chain are Terminal Multiplexers, those in between are Add/Drop Multiplexers.
In order to increase reliability, the transmission lines between two neigbouring multiplexers are doubled. The transmission lines are operated as MS
1:1, MS 1+1 protection (or path protection). The chain is thus protected
against faults occurring on individual transmission lines or Aggregate Interfaces.
However, there is no protection against an interruption (cut) of all connection
cables between two multiplexers or a total failure of a multiplexer in such a
chain configuration. Ring configuration offers better protection features.
With path protection in a chain configuration of multiplexers, the following two
variants can be implemented:
Variant 1 - The protection switches are located only in the multiplexers dropping the path to be protected (see Fig. 9-6).
Variant 2 - Each multiplexer through which the path to be protected is running
is equipped with protection switches (see Fig. 9-7).
Variant 1 can be implemented in each multiplexer which supports path protection for signals available at the Tributary Interfaces. For variant 2, the multiplexer must also support path protection at the Aggregate Interfaces.
The reliability of variant 2 is higher, since it also copes with multiple faults on
condition that only one single fault occurs on each section.
9-8
62.1013.105.11-A001
Protection switching
4 x STM-N
TM #1
ADM #2
ADM #3
TM #4
TR
TR
TR
TR
TR ...
Tributaries
TM ...
Terminal multiplexer
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
Aggregate
Interface
Aggregate
Interface
VC-xy
VC-xy
VC-xy
Tributary
Interface
62.1013.105.11-A001
9-9
Protection switching
Rings
Add/drop multiplexers can be operated in a ring (see Fig. 9-8). Between each
multiplexer pair located in a ring, there are two separate transmission paths.
For this reason, rings are especially appropriate for setting up reliable subnetworks. These rings can include two or four fibres.
Interconnected rings
Rings can be connected with each other so that (1) the connecting lines are
protected and (2) protection switching can be performed independently for
both rings (see Fig. 9-9). The two multiplexers serving one connecting line
form a so-called Serving Node. It is possible to combine the two multiplexers
and their connecting line to one multiplexer.
All ring types available can be interconnected (see Fig. 9-10 and 9-11). Even
connections between different ring types are possible.
A complete recovery of the traffic signals failed is possible, if not more than
one single fault occurs in each ring and with only one single fault in the Serving Nodes.
9-10
62.1013.105.11-A001
Protection switching
TR
ADM #1
TR
ADM #2
Two-fiber ring
ADM #4
TR
ADM #3
TR
TR
TR
... Tributaries
ADM #1
TR
ADM #2
Four-fiber ring
ADM #4
TR
ADM #3
TR
Fig. 9-8 Examples for multiplexer rings with two and four connecting lines
62.1013.105.11-A001
9-11
Protection switching
ADM
ADM
ADM
Serving nodes
ADM
ADM
ADM
ADM
ADM
ADM
ADM
9-12
62.1013.105.11-A001
Protection switching
VC-xy
ADM #1
ADM #3
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
ADM #2
ADM #4
62.1013.105.11-A001
9-13
Protection switching
VC-xy
ADM #1
ADM #3
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
ADM #2
ADM #4
9-14
62.1013.105.11-A001
Protection switching
Revertive/non-revertive operation
This option permits the operator to decide whether the system shall switch
back to the original function on elimination of the fault.
The following table gives an overview of Equipment Protection procedures
available:
Designation
Operation
Majority decision
Revertive/non-revertive
Revertive/non-revertive
Revertive/non-revertive
62.1013.105.11-A001
9-15
Protection switching
9-16
62.1013.105.11-A001
Literature
10 Literature
[1] ITU-T Recommendation G.702: Digital Hierarchy Bit Rates (Blue Book)
[2] ITU-T Recommendation G.703: Physical/Electrical Characteristics of
Hierarchical Digital Interfaces (Blue Book)
[5] ITU-T Recommendation G.707: Network Node Interface fo rthe SDH
[6] ITU-T Recommendation G.773: Protocol Suites for Q Interfaces for
Management of Transmission Systems
[7] ITU-T Recommendation G.781: Structure of Recommendations on Multiplexing Equipment for the Synchronous Digital Hierarchy (SDH)
[8] ITU-T Recommendation G.782: Types and General Characteristics of
Synchronous Digital Hierarchy (SDH) Multiplexing Equipment
[9] ITU-T Recommendation G.783: Characteristics of Synchronous Digital
Hierarchy (SDH) Multiplexing Equipment Functional Blocks
[10] ITU-T Recommendation G.784: Synchronous Digital Hierarchy (SDH)
Management
62.1013.105.11-A001
10-1
Literature
10-2
62.1013.105.11-A001
Index
Index
CI 2-13 , 6-7
Concatenation 2-13 , 6-11
A byte 4-4
A1 byte (RSOH) 5-2
A2 byte (RSOH) 5-2
Administrative Unit (AU) 2-6
Administrative Unit Group (AUG) 2-8
AU 2-6
AU pointer 2-6
AU-3 pointer 6-4
D bit 6-5, 6-8
H1, H2 pointer bytes 6-5
H3 pointer action byte 6-5
I bit 6-5, 6-8
NDF 6-5
AU-4 concatenation 6-7
AU-4 pointer 6-6
Concatenation 6-7
D bit 6-6
H1, H2 pointer bytes 6-6
I bit 6-6
NDF 6-6
AUG 2-8
Autom. protection switching (K4 byte) 5-7
Autom. protection switching bytes K1, K2 5-2
Automatic protection switching at the higher-order
path 5-5
B
B byte 4-4
B1 byte 5-2
B2 byte (MSOH) 5-2
B3 byte (higher-order POH) 5-4
BIP 2-17
BIP values 2-17
BIP-2 monitoring (lower-order POH) 5-6
BIP-8 monitoring 5-2
BIP-8 monitoring (higher-order POH) 5-4
BIP-N x 24 monitoring 5-2
Bit errors 2-17
Bit Interleaved Parity 2-17
Bit rates of the STM-1 frame 2-2
Block structure 2-4
D
D bit (Decrement) 6-5, 6-8
D1...D3 byte (RSOH) 5-2
D4...D12 byte (MSOH) 5-2
Data Communication Channel 5-2
DCC 5-2
DCCM 5-2
DCCR 5-2
Descrambling 2-17
Double ring connection 8-13
Double rings 8-11
Dual-ended operation 9-1
E
E.164 format 5-4
E1 byte (RSOH) 5-2
E2 byte (MSOH) 5-3
Equipment protection 9-15
Error monitoring byte B3 5-4
Error monitoring byte V5 (Bit 1, 2) 5-6
Error monitoring using BIP-X 2-17
Extra traffic 9-1, 9-2
F
F1 byte (RSOH) 5-2
F2 byte (higher-order POH) 5-5
Floating mode 2-15
Frame alignment signal 5-2
G
C
C bit 4-2
C1 bit 4-4, 4-6, 4-7
C1 byte (RSOH) 5-2
C2 bit 4-4, 4-6, 4-7
C2 byte (higher-order POH) 5-4
62.1011.105.11-A001
H
H1, H2 byte 6-5, 6-6, 6-8
H3 byte 6-5, 6-7, 6-9
H4 byte 2-15 , 5-5
I-1
Index
M
M1 byte (MSOH) 5-3
Mapping 2-4
Mapping procedures 4-1 4-8
MS 1
I bit 4-2
J
J0 byte 5-2
J1 byte (higher-order POH) 5-4
J2 byte 5-7
Justification information 1-2, 4-2
K
K1, K2 byte (MSOH) 5-2
K3 byte 5-5
K4 byte (lower-order POH) 5-7
L
Label 1-3
Local area network 8-10, 8-11
Long-distance network 8-10, 8-11
Loss of signal 5-5
Lower-order path 3-1
LPA 7-2
LPC 7-2
LPT 7-2
PPI 7-2
Lower-order path functions (reference model)
7-2
Lower-order POH 5-6
J2 byte 5-7
V5 byte
Bit 1, 2 (BIP-2 monitoring) 5-6
Bit 3 (REI) 5-6
Bit 4 (RFI) 5-6
Bit 8 (RDI) 5-7
V5 byte Bit 5, 6, 7 (contents identifier)
I-2
5-7
n protection 9-4
MS 1+1 protection 9-3
MS dedicated protection ring 9-6
MS shared protection ring 9-4
MSOH 5-2
Multiframe 4-6, 4-7
Multiframe generation 2-15
Multiframe indicator (H4) 2-15, 5-5
Multiplex paths 3-1
AU-4 to AUG 3-2
AUG to STM-N 3-3
C11, C12 and C2 to TUG-2 3-8
C-3 to STM-N 3-4, 3-6
C-4 to STM-N 3-2
TUG-2 to TUG-3 3-11
TUG-2 to VC-3 3-12
Multiplex scheme 3-1
Multiplex scheme in compliance with ITU-T G.709
3-1
Multiplex Section Overhead 5-2
Multiplexer
Cross-connect Multiplexer XMS 8-8
Multiplexer service channel 5-3
N
N1 byte 5-5
N2 byte (lower-order POH) 5-7
NDF 6-1, 6-5
Negative justification 6-3
Network operator byte 5-5
Networks, synchronous 8-10
New Data Flag 6-1, 6-5
Normal traffic 9-1
62.1013.105.11-A001
Index
O
O bit 4-1, 4-6, 4-7
Offset 1-9
Overhead 5-1 5-7
P
Parittsverletzung 2-17
Parity violations 2-17
Path AIS (P AIS) 5-5
Path monitoring 5-4
Path Overhead 2-2, 2-5, 5-3 5-7
Path status 5-4
Path Trace 5-2
Path Trace J1 (higher-order POH) 5-4
Path Trace J2 (lower-order POH) 5-7
Path/subnetwork protection 9-6
Payload 1-3, 2-2
POH 2-5
Pointer action byte 6-5
Pointer modification 6-1
Frequency matching 6-1
H3 byte 6-2, 6-3
Negative justification 6-3
Positive justification 6-2
Setting a new pointer 6-1
Pointer types 6-4
AU pointer 6-4
TU pointer 6-4
Pointers 6-1 6-15
AU pointer
AU-3 pointer 6-4
AU-4 pointer 6-6
TU pointer
TU-11 pointer 6-12
TU-12 pointer 6-14
TU-2 pointer 6-10
TU-3 pointer 6-8
Point-to-point connections 8-10
Positive justification procedure 6-2
Protection switching 9-1
Protection switching in interconnected rings 9-10
Protection switching in linear chains 9-8
Protocols for protection switching 9-7
R
R bit 4-2
RDI 5-5
62.1011.105.11-A001
S
S bit 4-2
S1 bit 4-4, 4-6, 4-7
S1 byte (MSOH) 5-3
S2 bit 4-4, 4-6, 4-7
Scrambler 2-17
Scrambling 2-17
SDH multiplex elements 2-4 2-8
Section Overhead 1-7, 5-1
Section REI 5-3
Setting a new pointer value 6-1
Setting the pointer by frequency matching 6-1
Single ring 8-11
Single-ended operation 9-1
Single-ended/dual-ended operation 9-2
SOH 5-1
MSOH
B2 byte (BIP-N x 24 monitoring) 5-2
D4 to D12 (DCCM) 5-2
E2 byte (multiplex service channel)
5-3
I-3
Index
NDF 6-14
V3 pointer action byte 6-15
5-2
T
Terminal Multiplexer (TMS) 8-4
Transport frame 1-7
Transport terminal functions
MCF 7-3
MSA 7-2
MSP 7-2
MST 7-2
RST 7-3
SEMF 7-3
SETPI 7-3
SETS 7-3
SPI 7-3
Transport terminal functions (reference model)
7-2
Tributary Unit (TU) 2-6
Tributary Unit Group (TUG) 2-8
TU pointer 2-6
TU size 6-10 , 6-12, 6-14
TU-11 pointer 6-12
D bit 6-12
I bit 6-12
NDF 6-12
V1, V2 pointer bytes 6-12, 6-14
V3 pointer action byte 6-13
V4 byte 6-13
TU-12 pointer 6-14
D bit 6-14
I bit 6-14
I-4
TU-14 pointer
V4 byte 6-15
TU-2 concatenation 6-11
TU-2 pointer 6-10
D bit 6-10
I bit 6-10
NDF 6-10
V1, V2 pointer bytes 6-10
V3 byte 6-11
V3 pointer action byte 6-11
TU-3 pointer 6-8
D bit 6-9
U
User channel 5-2
V
V1, V2 byte 6-10, 6-12, 6-14
V3 byte 6-11, 6-13, 6-15
V4 byte 6-11, 6-13, 6-15
V5 5-6
VC-12 4-6
VC-3 4-4
VC-3 POH 4-4
VC-3/VC-4 assembler 5-5
VC-4 4-1
VC-4 POH 4-1
Virtual Container (VC)
Formats 2-5
Voice channel 5-3
W
W byte 4-1
X
X byte 4-1
Y
Y byte 4-1
Z
Z byte 4-2
Z1, Z2 byte (MSOH) 5-3
62.1013.105.11-A001