You are on page 1of 41

Synchronous Digital Hierarchy

VOL-2
SARISCS&T100TELE0006
Contents
• Network resilience
• Provisioning (Bandwidth configuration)
• Synchronization
Network resilience
• Ring Topology
• Protection
Ring Topology
• Self Healing rings
• automatically detect failures and reroute
traffic away from failed links and nodes onto
other routes rapidly.
• The rings are implemented using add/drop
multiplexers (ADMs). These ADMs selectively
drop and add traffic from/to the ring as well as
protect the traffic against failures.
Ring Topology
Ring Topology
• Backbone/Express Ring
High Capacity Ring.
Bandwidth Configured as VC4 and above

• Collector/Access Ring
Low capacity Ring.
Connected to Backbone Ring for Protection and for long distance Connectivity.
Bandwidth starting from VC11 and above
Collector/Access Rings
• Single Homing
• Dual Homing
• Folded Ring
Protection
• 1+1 Protection
• 1:1 Protection
• 1:N Protection
1+1 Protection
• The simplest form of back-up is known as 1 + 1 APS.
• Here, each working line is protected by one
protection line. The same signal is transmitted on
both lines.
• If a failure or degradation occurs, the network
elements switch the connection over to the
protection line at the receive end.
1+1 Protection
1:1 Protection
• A protection line is used to directly replace the
working line when it fails.
• The protection path can only be used if a
switchover takes place at both the
transmitting end and the receiving end.
1:1 Protection
1:N Protection
• A 1:N configuration represents a more cost-
effective solution than the other two
mechanisms described above.
• N working channels are protected by one
protection channel. If there are no defects in
the network, this protection channel can be
used to transport low-priority traffic.
1:N Protection
Protection
• Path Protection
SNCP(UPSR)

• Section Protection
MSP
MS-SPRING(BLSR)
Sub Network Connection Protection
• 1+1
• Two complete traffic paths are provisioned
• Traffic is carried on both paths simultaneously.
• Receive end – Best quality path is selected as working
path
• If quality of working path is decreased, the other path is
selected at receive end and the path labels are
interchanged.
• This mechanism works independently on both directions
• Supports all bandwidths
SNCP
SNCP
• Unidirectional protection switching is a simple
scheme to implement and does not require a
protocol.
• Unidirectional protection switching can be
faster than bidirectional protection switching
because it does not require a protocol.
• Under multiple failure conditions there is a
greater chance of restoring traffic by protection
Multiplex Section Protection(MSP)
• Section Protection
• Protecting card failures for interconnection
• 1+1 card protection
• non-revertive and revertive configurations
• Unidirectional and Bidirectional Operations
• K1, K2 Bytes are used for protection switching
• Specified in ITU-T G.783
1+1 Unidirectional MSP
1+1 Bidirectional MSP
MSSP-RING
• Multiplex Section Shared Protected RING
• Bidirectional Line Switched Ring(BLSR)
• Shared protection
• Used in High Capacity Backbone Networks
• Specified in ITU-T G.841
• Connections in AU-4/VC-4 and AU-3/VC-3
• Half of the total Bandwidth is used for protection
• Uses K1, K2 Bytes are used for protection switching
MSSP-RING
• Support up to 16 NE’s in a ring
• 4-Bit Addressing for Each NE
• Maximum ring length is limited to 1200 km (6
ms propagation delay)
• Protection Switching in 50 ms
• Protection bandwidth can be used for non
priority traffic in normal condition
2F MSSP-RING
2F MSSP-RING
Effective utilization of bandwidth in MSSP-
Ring
Effective utilization of bandwidth in MSSP-
Ring
Effective utilization of bandwidth in MSSP-
Ring
4F MSSP-RING
4F MSSP-RING Span Switching
4F MSSP-RING Ring Switching
Protection using hybrid protection
Provisioning
• End to End Bandwidth Configuration
• J-KLM is used to identify the time slot
• Visibility of NEs to be integrated
• X-connections are made at individual NEs
• Optical Service Provisioning Software's
• Circuit Lay out Records for better bandwidth
management.
• Use unique J-KLMs in a ring for future easiness of
O&M activities
Network Synchronization
Performance Monitoring
• G.821 and G.826

• Errored Seconds (ES)


Any second which contains an error.
• Severely Errored Seconds (SES)
Any second during which the error ratio exceeds 10-3.
• Degraded Minutes (DM)
Any minute during which the error ratio exceeds 10-6.
• Available and Unavailable Time
Time is normally Available.
Unavailable time starts when the error
ratio exceeds 10-3 for ten consecutive seconds. It terminates
when the error ratio is less than 10-3 for ten consecutive seconds,
signifying the restart of Available time.
Performance Monitoring…
• Errored Block (EB)
A block in which one or more bits are in error. This can be a CRC
block or some other block such as parity.
• Background Block Error (BBE)
An errored block which is not part of a SES.
• Errored Second Ratio (ESR)
The ratio of ES to total seconds.
• Severely Errored Second Ratio (SESR)
The ratio of SES to total seconds.
• Background Block Error Ratio (BBER)
The ratio of BBE to total seconds.
WHAT NEXT?
• DATA COMMUNICATION NETWORK
• GSM Radio Access Network

You might also like