Professional Documents
Culture Documents
© COPYRIGHT
ALCATEL, 2004
J Volume 5 Issue 1
Synchronous Digital Hierarchy
Training Handbook
Contents
1. Fundamentals of SDH
The copyright in this document and the associated drawings are owned by
Alcatel Submarine Networks. Without the written consent of Alcatel
Submarine Networks given by contract or otherwise, the book or document
must not be copied or reprinted or reproduced in any material form, either
wholly or in part and the contents of the book or document or any method
or technique available therefrom must not be disclosed to any other person
whomsoever.
The publication of information herein does not imply freedom from patent
and other protective rights of Alcatel Submarine Networks or others.
Alcatel Submarine Networks takes every precaution to ensure that data and
other material in this publication are correct and complete, but accepts no
liability of any kind for any error or omission therein and as far as allowed
by law, will not accept any liability for any death or personal injury, loss or
damage arising from any error therein or omissions therefrom.
Performance figures and other data quoted herein are typical and must be
specifically confirmed by Alcatel Submarine Networks before they become
applicable to any particular tender, order or contract.
---oOo---
Issue 12 S.959
2/96
Fundamentals of SDH
Training manual
8AS 90200 0551 VH ZZA Ed. 01
Edition 2002
Page intentionally left blank
3 Section Overhead
3.1 Definition of Path and Section
3.2 Example of Path and section
3.3 STM-1 Section Overhead : SOH
3.4 STM-1 Regeneration Section Overhead : RSOH
3.5 STM-1 Multiplexing Section Overhead : MSOH
4 Pointer
4.1 AU-4 Pointer addressing area
4.2 Au- Pointer management
4.3 AU-4 Pointer settings
4.4 AU-4 Pointer and justification use
4.5 Pointer justifications depending on clock deviation
6 High-Rate Multiplexing
6.1 Byte interleaved Multiplexing
6.2 STM-N Section Overhead
6.3 Contiguous Concatenation
11 Network Synchronisation
11.1 Synchronisation Distribution
11.2 Clocks Types and Distribution in the Network
11.3 Synchronisation Diagram
11.4 Synchronous Equipment Timing
11.5 Synchronisation Signals : Quality and Priority
11.6 Linear Networks without SSM
11.7 Linear Network with SSM
12 Optical Interfaces
12.1 Classification of Optical Interfaces
12.2 Laser Safety
12.3 Automatic laser Shutdown : ALS
12.4 Laser Operation Actions
13 Appendices
Other comments
1.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
1.2
Switching Switching
system system
Access PDH / SDH Access
system system
exchange transport exchange
1.3
G.752
32.064 97.728 397.200
JAPAN *3 *4
G.752
*5
*3 *3
Interoperation
(G.802) G.757 G.755
1.4
1.5
Plesiochronous Plesiochronous
Signals Signals
SDH Network
ATM ATM
1.6
1.7
2.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
2.2
139.264 Mbit/s
44.736 Mbit/s
n=4
n=3
n = 11
1.544 Mbit/s C-n
n = 12
n=3
n=2
2.3
P
O VC-4 C-4 139.264 Mbit/s
H
P
O VC-3
H
P
O C-n P
H
O VC-2 C-2 6.312 Mbit/s
H
P
O VC-12 C-12 2.048 Mbit/s
H
P
VC-n O VC-11 C-11 1.544 Mbit/s
H
2.4
P
O VC-4 C-4 139.264 Mbit/s
H
P
TU-3 O VC-3
H
P
TU-2 O VC-2 C-2 6.312 Mbit/s
H
P
TU-12 O VC-12 C-12 2.048 Mbit/s
H
P
TU-11 O VC-11 C-11 1.544 Mbit/s
H
▼ TU: Tributary Unit, it is made up of a low order VC-n (n=11,12, 2, 3) and a pointer
▼ The pointer is an additional rate used to locate its VC-n within the TU: Pointers allow to transport virtual containers phase
shifted related to their TU, which facilitates data processing in the network element.
▼ For high order container (VC-3, VC-4) see: Administrative Unit (AU)
▼ TU-n = VC-n + PTR n = 11, 12, 2, 3
X3
X1 P
TUG-3 TU-3 O VC-3
H
X1 P
TUG-2 TU-2 O VC-2 C-2 6.312 Mbit/s
H
X3
P
TU-12 O VC-12 C-12 2.048 Mbit/s
H
X4
P
TU-11 O VC-11 C-11 1.544 Mbit/s
H
2.6
▼ TUG: Tributary Unit Group, the TUG-2 / TUG-3 can consist of several types of capacity payloads with different sizes.
▼ The TUG-2 is 4 X TU-11 or
3 X TU-12 or
1 X TU-2.
▼ The TUG-3 is 7 X TUG-2 or
1 X TU-3.
▼ The TUG is obtained through byte interleaved multiplexing.
▼ For high order container (VC-3, VC-4) see: Administrative Unit Group (AUG)
▼ TUG-k = m * TU-n n = 11, 12, 2, 3
X3
X1 P
X3 TUG-3 TU-3 O
H
VC-3
X7
P
AU-3 O VC-3 C-3 44.736 Mbit/s
H 34.368 Mbit/s
X7
X1 P
TUG-2 TU-2 O
H
VC-2 C-2 6.312 Mbit/s
X3
P
TU-12 O
H
VC-12 C-12 2.048 Mbit/s
X4
P
TU-11 O
H
VC-11 C-11 1.544 Mbit/s
2.7
▼ AU: Administrative Unit, it is made up of a high order VC-n (n = 3,4) and a pointer.
▼ The AU-3 multiplexing structure is designed for compatibility with SONET frames.
▼ Two types of virtual containers VC-n are used:
l Lower order VC-n (n = 11,12, 2, 3)
This entity contains a single container n associated with the POH.
l Higher order VC-n (n = 3, 4)
This entity contains either a single container n or a TUG (Tributary Unit Group) assembly (TUG-2 or TUG-3)
associated with the POH.
▼ VC-3 can be: lower order à TU-3 à TUG-3 à VC-4 à AU-4 or
higher order à AU-3
* N X1 P
STM-N AUG AU-4 O
H
VC-4 C-4 139.264 Mbit/s
X3
X1 P
X3 TUG-3 TU-3 O
H
VC-3
X1 P X7 44.736 Mbit/s
STM-0 AU-3 O
H
VC-3 C-3 34.368 Mbit/s
X7
X1 P
High rate TUG-2 TU-2 O
H
VC-2 C-2 6.312 Mbit/s
multiplexing
X3
P
Low rate TU-12 O VC-12 C-12 2.048 Mbit/s
H
multiplexing
X4
P
TU-11 O VC-11 C-11 1.544 Mbit/s
Insertion of the SOH H
2.8
▼ N = 1, 4, 16, 64
▼ STM: Synchronous Transport Module
▼ ITU-T: International Telecommunication Union – Telecommunication sector
▼ SDH-SONET compatibility: see Appendix A2
* N X1 P
STM-N AUG AU-4 O VC-4 C-4 139.264 Mbit/s
H
X3
X1 P
TUG-3 TU-3 O
H
VC-3
X7 44.736 Mbit/s
C-3 34.368 Mbit/s
X1 P
TUG-2 TU-2 O
H
VC-2
X3
P
TU-12 O
H
VC-12 C-12 2.048 Mbit/s
P
O VC-11 C-11 1.544 Mbit/s
Insertion of the SOH H
2.9
▼ N = 1, 4, 16, 64
▼ ETSI: European Telecommunication Standard Institute.
l It is a subset of ITU-T standard.
l It focuses on European digital signals to simplify equipment.
l ETSI-standard will be handled in the following chapters
▼ In the SDH signal (or data) processing takes place in three levels:
l mapping of digital signal to container C-n
l multiplexing of low order containers to high order containers via TUGs and finally via AU (AUG) into the STM-1
base frame.
l multiplexing of base frame, i. e. STM-1 frames at 155.520 Mbit/s with each other to create a high-rate frame:
è STM-4 at 622.080 Mbit/s
è STM-16 at 2488.320 Mbit/s
è STM-64 at 9953.280 Mbit/s
1 270
RSOH
AU-4 pointer
9 rows P
(bytes) O C-4
H
MSOH
2430
2.10
2.11
▼ In the SDH signal (or data) processing takes place in three levels:
l mapping of digital signal to container C-n
l multiplexing of low order containers to high order containers via TUGs and finally via AU (AUG) into the STM-1
base frame
l multiplexing of base frame, i. e. STM-1 frames at 155.520 Mbit/s with each other to create a high-rate frame:
è STM-4 at 622.080 Mbit/s
è STM-16 at 2488.320 Mbit/s
è STM-64 at 9953.280 Mbit/s
2.12
3.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
3.2
SOH SOH
POH POH
C VC Regenerator Regenerator VC C
Signal
C VC VC C
plesiochronous
Regenerator Regenerator Regenerator
Section Section Section
Multiplex Section
Path
3.3
▼ C Container
▼ VC Virtual Containe
▼ POH Path Overhead
▼ SOH Section Overhead
▼ The PATH connects the two points where the POH is generated / analyzed.
Section 2
STM-16
1 Pa
n
cti o NE-B NE-C ST th SDH Network
Se -1 M 2
M -1
ST
Path 1
NE-A NE-D
STM-4
STM-4
NE-E NE-F
STM-4
3.4
▼ NE Network Element
▼ Overheads carrying specific info of every path or section, from one end to the other
(e.g. Path 1 between NE-A and NE-E)
* * * * * * * * *
A1 A1 A1 A2 A2 A2 J0
B1 D D E1 D F1 RSOH
D1 D D D2 D D3
AU-4 pointer
9 rows
B2 B2 B2 K1 K2
D4 D5 D6
D7 D8 D9 MSOH
S1 Z1 Z1 Z2 Z2 M1 E2
3.5
▼ All unmarked bytes are reserved for future international normalization (medium dependence, additional national use and
other purposes).
* * * * * * * * *
A1 A1 A1 A2 A2 A2 J0
B1 D D E1 D F1 RSOH: Regenerator
Section
D1 D D D2 D D3
OverHead
3.6
▼ A1, A2 The Frame Alignment Word is used to recognize the beginning of an STM-N frame.
A1: 1111 0110 = F6 (HEX)
A2: 0010 1000 = 28 (HEX)
▼ J0 Path Trace. It is used to give a path through an SDH Network a ‘Name’. This message (Name) enables the
receiver to check the continuity of its connection with the desired transmitter.
▼ B1 Bit Error Monitoring. The B1 Byte contains the result of the parity check of the previous STM frame, before
scrambling of the actual STM frame. This check is carried out with a Bit Interleaved Parity check (BIP-8).
▼ E1 Engineering Orderwire (EOW). It can be used to transmit speech signals beyond a Regenerator Section for
operating and maintenance purposes.
▼ F1 User Channel. It is used to transmit data and speech for service and maintenance.
B2 B2 B2 K1 K2
D4 D5 D6
D7 D8 D9 MSOH: Multiplex
Section
D10 D11 D12
OverHead
S1 Z1 Z1 Z2 Z2 M1 E2
3.7
▼ B2 : Bit Error Monitoring. The B2 Bytes contains the result of the parity check of the previous STM frame, except the RSOH,
before scrambling of the actual STM frame. This check is carried out with a Bit Interleaved Parity check (BIP24).
▼ K1, K2 Automatic Protection Switching (APS). In case of a failure, the STM frames can be routed new with the help of the K1,
K2 Bytes through the SDH Network.
Assigned to the multiplexing section protection (MSP) protocol.
▼ K2 (Bit6,7,8) MS_RDI: Multiplex Section Remote Defect Indication (former MS_FERF: Multiplex Section Far End Receive
Failure).
▼ D4 to D12 Data Communication Channel at 576 kbit/s (DCCM). (See also D1-D3 in RSOH)
3.8
4.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
4.2
AU-4 Pointer
VC-4
Au-4 Pointer
4.3
received transmitted
STM-1 STM-1
VC-4 VC-4 VC-4 VC-4
4.4
▼ The rate of a transmitted VC-4 is consistent with the rate of the received VC-4.
▼ Pointers allow to transport virtual containers phase shifted related to their TU respectively AU, which facilitates data
processing in the network element.
Pointer movement
4.5
4.6
▼ Negative justification:
If the frame rate of container VC-n is too fast compared to that of the AUG, the alignment of container VC-n must be
periodically advanced in time and the pointer‘s value reduced by one unit.
▼ Positive justification:
If the frame rate of container VC-n is too slow compared to that of the AUG, the alignment of container VC-n must be
periodically delayed in time and the pointer‘s value increased by one unit.
1 9 10 270
1
4 H1 H1 H1 H2 H2 H2 H3 H3 H3 0 0 0 1 1 1 2 2 2 86 86 86
* * ** **
5 87
9
522
782
4.7
▼ The value of the pointer remains constant for at least 3 consecutive frames (G.707).
The maximum justification therefore takes place in 1 out of every 4 frames.
justification events /
Number of pointer
second
2000
200
Forbidden area
20
6.48 Hz
2
0,2
0,02
Difference of incoming
3.10-9 3.10-8 3.10-7 3.10-6 3.10-5 3.10-4 clock to equipment
1 ppm clock
≈300 ppm
4.8
▼ A 1-ppm clock difference causes a pointer action frequency of 6.48 Hz, one action every 1235 frames.
4.9
5.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
POH
J1
B3
C2
G1 C-4 or C-3
F2 VC-4 , VC-3 POH
H4
F3
K3
N1
5.3
(HEX-values)
00: path not equipped
01: path equipped, payload not specific
02: TUG payload structure (TUG-2/ TUG-3)
03: TU alignment, locked TU mode
04: asynchronous mapping of signals at 34 / 45 Mbit/s in a C-3 container
12: asynchronous mapping of signals at 140 Mbit/s in a C-4 container
13: ATM mapping
14: MAN mapping (DQDB)
15: FDDI mapping (100 Mbit/s, Fiber Distributed Data Int)
FE: tests signal, 0.181 specific mapping
FF: VC-AIS signal
F2
REI RDI reserved spare
H4 1 2 3 4 5 6 7 8
F3
F2, F3 Path user channels: assigned to the user's communication requirements.
K3
N1 H4 Multiframe Indicator: used to designate a specific use of the VC-4's capacity:
VC-2, VC-12, VC-11
5.4
1 blocks 20
rows
9
180
blocks
5.5
▼ Breakdown of C-4 into 180 blocks of 13 bytes ((9 * 20) * 13 = 2340 bytes payload)
W 96 D X 96 D Y 96 D Y 96 D Y 96 D
X 96 D Y 96 D Y 96 D Y 96 D X 96 D
Y 96 D Y 96 D Y 96 D X 96 D Y 96 D
Y 96 D Y 96 D X 96 D Y 96 D Z 96 D
W Y D Data bit
DDDDDDDD RRRRRRRR
R Fixed stuff bit
O Overhead bit
X CRRRRROO Z DDDDDDSR S Justification opportunity bit
C Justification control bit
5.6
▼ The overhead bits (O) are reserved for future communication requirements
▼ Majority vote for protection against decision errors (data or justification bit).
1 86 1 86 1 86
stuffing
1 P
2 PTR PTR PTR
O A B C
3 H
A B C A C A B C
...
9 VC-4
1 2 3 4 5 6 261
5.7
▼ The TU-3 pointer is similar to the AU-4 pointer and serves the same purpose.
▼ Bytes H1 H2 H3 of the TU-3 pointers are the bytes of rows 1, 2 and 3 of columns 4, 5 and 6 of the VC-4.
VC-3#C
VC-3#A
VC-3#B
RSOH F3
K3
AU-4 pointer N1
J1 H1 H1 H1 595 595 595
B3 H2 H2 H2 680 680 680
MSOH 764 764 764 C2 H3 H3 H3 0 0 0 1 82 83 83 83
84 84 84 G1 85 85 85 86
F2
A B C A B C A B C A C A B C
261 columns of bytes
5.8
5.9
▼ V5: BIP-2 even parity of order 2 of the previous VC-2 / VC-12 / VC-11
REI LP_REI: Lower Path Remote Error Indication
Set to 1 and returned to the source of the path if the BIP-2 parity detects one or
more errors
RFI Remote Failure Indication in the path (optional)
A failure is a fault which lasts longer than the maximum duration of the
transmission systems protection mechanisms.
RRRRRRRR
J2
C1 C2 O O O O R R
32 bytes
140 RRRRRRRR
bytes N2
C1 C2 O O O O R R
32 bytes
RRRRRRRR
K4
C1 C2 R R R R R S1
S2 D D D D D D D D data bit
R fixed stuff bit
31 bytes O overhead bit
S justification opportunity bit
RRRRRRRR C justification control bit
5.10
▼ The 2 Mbit/s signal is placed in a C-12 without taking ist composition into consideration: No link between the 2 Mbit/s frame
and the C-12.
▼ Justification process upon mapping within the C-12 to enable a +/- 50 ppm synchronization tolerance.
▼ VC-12s (35 bytes in 125 µs) of 4 consecutive STM-1 frames (4 x 125 µs = 500 µs) are combined to a multiframe (140 bytes
in 500 µs) to reduce overhead / useful signal ratio.
V5
35 bytes
125 µs
XXXXXX01 V2
J2
35 bytes
250 µs
XXXXXX10 V3 N2
35 bytes
375 µs K4
XXXXXX11 V4
35 bytes
140 bytes
500 µs
capacity of 4 container VC-12:
multiframe (bytes/500 µs)
5.11
▼ H4: multiframe indicator - used for location within the 500 µs multiframe (see VC-4 POH)
Stuffing
5.12
TUG-2 # 1 1 1 2 2 2 3 3 3 4 4 4 5 5 5 6 6 6 7 7 7
VC-12 # 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3 1 2 3
x7
TUG-3 # 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
TUG-3 # 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 7
TUG-3 # 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 7 3
TUG-2 # 1 23 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 3
VC-12 # 1 11 1 1 1 1 2 2 22 2 2 2 3 3 3 3 3 3 3
x3
2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 70 72 256 258 260 Number of VC-4
1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 ... 69 71 73 ... 257 259 container column x
000000000111111111122222 66660 556666 Time period number
V 123456789012345678901234 01231 890123
C
4
P 123123123123123123123123 3 1 2 31 123123 K
O
H
111222333444555666777111 ... 6 7 7 7 1 ... 6 6 6 7 7 7 L address
111111111111111111111222 33331 333333 M
5.13
Header Payload
5 48
J1
B3
C2
G1
F2
H4
F3
K3
N1
5.14
▼ The cell train is mapped in the containers in accordance with the byte structure
5.15
6.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
6.2
270 x N
9xN 261 x N
RSOH
AU-PTR
125 µs
9 PAYLOAD periodicity
MSOH
6.3
▼ N = 1, 4, 16, 64
PTR Nx9
AU-4 3
VC-4 VC-4#1
#1
(byte interleaving)
MULTIPLEXING
VC-4 VC-4#2 Nx9 N x 261
#2
RSOH
STM-N
PTR
AU-4 MSOH
VC-4 VC-4
#3 #3
Addition of the STM-N MSOH
PTR
AU-4
VC-4 VC-4#N 5
#N
Nx9
6.4
RSOH
B1 E1 F1
D1 D2 D3
N * AU-4 pointers
9 rows
B2 B2 B2 K1 K2
B2 B2 B2
D4 D5 D6
MSOH
D7 D8 D9
D D D
10 11 12
S1 E2
M1
position (9, 4, 3) row, block, byte
Bytes reserved for national use. max (9, 9,16)
NOTE: All unmarked bytes are reserved for future international normalization
(medium dependent, additional national use and other purposes).
6.5
▼ N = 1, 4, 16, 64
Exception:
- A1, A2 to keep accuracy of frame detection
- B2 to keep accuracy of block check for the increased block size
9 x 4 = 36 261 x 4 = 1044
RSOH
STM-4
4 * AU-PTR
9
J1
MSOH
Payload VC-4-4c
stuffing
VC-4 POH N1
6.6
▼ Contiguous Concatenation is a procedure associating several virtual containers, which allows their combined capacity to be
used as a single container.
▼ Contiguous Concatenation is defined for TU-2 and AU-4 (SONET: also for AU-3)
▼ This technique has the advantage of optimizing the frame filling relative to the mapping of a higher rate container.
▼ STM-4 / STM-16 is used to transport a VC-4-Xc signal (SONET: STM-1 for VC-3-3c)
▼ Application:
l for bit streams which can not be contained in a VC-4
l typical: ATM signals with a bandwidth of 600 Mbit/s
▼ Procedure:
l the first AU-pointer indicates the J1-byte (POH VC-4), the other 3 pointers indicate Concatenation Indication (CI):
three columns with stuffing bytes
l H1*+H2**: 1001SS11 11111111 Concatenation Indication (CI):
6.7
7.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
7.2
ATM-Equipment
ATM VP
PDH Equipment
2 Mbit/s
SDH-Network
-4
PDH Equipment
M
ST
ST
M-
ST
6
4
-1
M
M
-1
ST
6
-4 STM-1 34 Mbit/s
ST
M
M
ST
ST
-4
6
-1
M
M
M-1
-1
ST
6
ST
140 Mbit/s STM-4 45 Mbit/s
ATM VP
PDH Equipment
PDH Equipment
ATM Equipment
7.3
▼ An SDH network can be seen as a set of different network layers (path layers, section layers, physical layers) and can also
be divided into different sub-networks.
Path
layer network
Section
layer network
Physical
layer network
7.4
7.5
▼ Partitioning concept
In general a sub-network is constructed by representing the physical implementation as links and sub-networks, starting from
the matrix that is the smallest (indivisible) sub-network. A set of sub-networks and links may be abstracted as a higher
(containing) sub-network. The way in which the contained sub-networks are interconnected by links describes the topology of
the containing sub-network. The ports at the boundary of the containing sub-network and the interconnection capability must
fully represent, but not extend, the connectivity supported by the contained sub-networks and links. Therefore a higher level
sub-network may be partitioned to show the level of detail required.
Thus in general, any sub-network may be partitioned into a number of smaller (contained) sub-networks interconnected by
links.
The partitioning of a sub-network cannot extend or restrict its
connectivity i.e.:
l The ports on the boundary of the containing sub-network and the interconnection capability must be represented by
the contained sub-networks and links.
l The contained sub-networks and links cannot provide connectivity that is not available in the containing sub-network.
Regenerator section
7.6
▼ The transport network can be decomposed into a number of independent layer networks with a client/server relationship
between adjacent layer networks.
A layer network describes the generation, transport and termination of a particular characteristic information.
l Client/server relationship
Any two adjacent network layers are associated in a client/server relationship.
Each transport network layer provides transport to the layer above and uses transport from the layer below.
The layer providing transport is termed a server.
The layer using transport is termed a client.
LO PATH / TRAIL
NE NE NE NE
7.7
▼ Client/server relationship between adjacent layers is one where a link connection in the client layer is supported by a trail in
the server layer network.
Server
trail
Example: MS trail supports HO Link Connection
HO trail supports LO Link Connection
▼ Link Connection: represents a pair of adaptation functions and a trail in the server layer.
l A complete example of Layering is given in appendix C1
▼ A Trail defines a section inside an SDH network between two basic functions where any kind of overhead information
(POH+SOH) is generated or analyzed. The trail definition exists for
several transmission layers:
l RS Trail (RS layer) / MS Trail (MS layer)
l VC-4 Trail (HO path layer)
l VC-3 / VC-12 Trail (LO path layer)
▼ A Path is a specific kind of trail inside an SDH network between two basic functions that generate and analyze the Path
Overhead (POH) of a Virtual Container. The path definition exists for
the following transmission layers:
l VC-4 path (HO path layer)
l VC-3 / VC-12 path (LO path layer)
AP AP
trail
7.8
▼ Two CTPs are combined to a CP: Connection Point, if they are connected in the same layer
▼ If the information in a CTP is given to/got from a termination function, the related reference is called a TCP: Termination
Connection Point
▼ ITU-T definition:
A bi-directional TCP consists of a pair of collocated unidirectional TCPs.
A unidirectional TCP is the binding of an output of a trail termination source to an input of a unidirectional connection or the
output of a unidirectional connection to the input of a trail termination sink.
NE 1 NE 2
LOPA source LOPA sink
LOP trail LOP layer
LOP AP LOP AP
LOPT source LOPT sink
LOP LC
LOP TCP LOP TCP
7.9
▼ LC : Link Connection
▼ : Adaptation
▼ : Termination
7.10
8.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
8.2
Layer Z
Y/Z Y/Z
Y Y
Layer Y
Client
Server Layer X
Sink Source
8.3
Layer Z
Y/Z Y/Z
Y Y
Layer Y
Client
Server Layer X
Sink Source
8.4
Layer Z
Y/Z Y/Z
Y Y
Layer Y
Client
Server Layer X
Sink Source
8.5
LPA
Sm/Pq
LTCA
Sm SmD/Sm
Sms LPT
LSUT Low
Order
SmD Path
LTCT
Layer
Sms Smm Sm
LPC
LPOM
LTCM SmDm
MSA MSn/Sn
MSP MSnP
Multiplex
Section
MSnPC
Layer
MSn/MSnP
MSn
MST
RSn/MSn Regenerator
RST RSn Section
Layer
OSn/RSn or ESn/RSn
Eq/Pqs or Eq/Pqx Physical
OSn or ESn Layer
SPI
PPI Eq
8.6
8.7
9.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
9.2
SDH-Network
PDH PDH
140Mbit/s 2 Mbit/s
ADM ADM ADM
MSN MSN Regenerator MSN
DXC DXC DXC
9.3
▼ Communication alarms can be subdivided in primary and secondary alarms and alarms which have to be send in reversed
direction.
RSOH 1
1
1 1 1 1 MS - AIS
1 1 1
1
RSOH 1
1
1 1 1 1
AU - AIS
MSOH 1
1
RSOH 1
P 1
AU-Pointer
O 1 TU – AIS
H 1
MSOH
1
9.4
▼ AIS: Alarm Indication Signal, means the signal is adapted to all ONES
▼ It is generated to replace the normal SDH signal when it contains a defect condition
1 ... 8
1 1 0 K2-Byte
K2
MS-RDI
1 ... 8
G1
1 G1-Byte
HP-RDI
V5
1 ... 8
1 V5-Byte
LP-RDI
9.5
▼ RDI: Remote Defect Indication, signal which is returned to the transmitting NE upon detecting a LOS, LOF or AIS
Sm
S
m
Sn/Sm
Sn
Sn
MSn/Sn
MSn
OSr/ESr RSn
LOS
Detection
A1/A2 LOF
RS-TIM Generation
J0 MS-AIS
RS-BIP
B1
MS-AIS
K2
MS-BIP
B2 AU-AIS
MS-REI
M1
MS-RDI
K2
AU-AIS
AU-LOP
HP-UNEQ
C2
HP-TIM
J1
HP-BIP
B3 TU-AIS
HP-REI
G1
HP-RDI
G1
TU-AIS
TU-LOP
TU-LOM TU-AIS
H4
TU-PLM
C2
LP-UNEQ
V5
LP-TIM
J2
LP-BIP TU-AIS
V5
LP-REI
V5
LP-RDI
V5 PDH-AIS
LP-PLM
V5
© Alcatel University - 8AS 90200 0551 VH ZZA Ed.01 Page 9.6
▼ Explanation of Alarm and Error Codes
SDH-Network
PDH PDH
140Mbit/s 2 Mbit/s
ADM ADM ADM
MSN MSN Regenerator MSN
DXC DXC DXC
Trail / Path
9.8
RS1 / MS1
RS1 / MS1
OS1 / RS1
OS1 / RS1
OS1
OS1
RS1
RS1
MS-AIS
LOS
RSOH 1
LOF MS-AIS 1
1 1 1 1
RS-TIM
RS-BIP(PM) 1 1 1
1
Detection
Generation
9.9
▼ The regenerator is the only NE which can cause the MS-AIS alarm because the RSOH is built completely new.
▼ In a multiplexer also the MSOH is rebuilt and the output then is an AU-AIS.
RS1 / MS1
RS1 / MS1
OS1 / RS1
OS1 / RS1
MS1 / S4
MS1 / S4
MS1
MS1
OS1
OS1
RS1
RS1
S4
LOS
LOF MS-AIS
AU-AIS
RS-TIM
RSOH 1
RS-BIP(PM) 1
AU-AIS 1 1 1 1
MS-AIS
MSOH 1
1
MS-BIP (PM)
MS-REI (PM)
MS-RDI
Detection
Generation
9.10
MS1 / S4
S4 / S12
MS1
S4 S12
S4
AU-AIS
AU-AIS TU-AIS
AU-LOP
HP-UNEQ TU-AIS
HP-TIM TU-AIS
HP-BIP (PM)
HP-REI (PM) 1
RSOH
HP-RDI P 1
AU-Pointer O 1
H 1
MSOH
1
Detection
Generation
9.11
2Mbit/s
NE A NE B NE C
LO-passthrough HO-passthrough
Reg. F Reg. E
LOS
NE D
9.12
▼ Assumptions:
l Bi-directional 2Mbit/s-Path between NE C and NE D via NE B, A, F, E
l Path fault: Unidirectional interruption (C → D) in section A-F
▼ Alarms in direction C → D :
l NE F: detection: LOS
generation: MS-AIS
l NE E: -
l NE D: detection: MS-AIS, AU-AIS, TU-AIS, generation:
PDH-AIS
▼ Alarms in direction D → C :
l NE D: generation: MS-RDI, HP-RDI, LP-RDI
l NE E: -
l NE F: -
l NE A: detection: MS-RDI, HP-RDI
l NE B: -
l NE C: detection: LP-RDI
2Mbit/s
LOS
NE A NE B NE C
LO-passthrough HO-passthrough
Reg. F Reg. E
NE D
9.13
▼ Assumptions
l Unidirectional 2Mbit/s-Path between NE C and NE D via NE B, A, F, E
l Reference fault: Loss of input signal
▼ Alarms in direction C → D :
l NE C: detection: LOS
l NE D: generation: PDH-AIS
max. number of
Error checksum Block size
block errors per second
9.14
Alarms = Defects
▼ Each block is monitored by calculating a checksum e.g. Bit Interleaved Parity (BIP).
These block errors can be monitored on several layers inside each NE:
Yes
Defects ?
No
No
Anomalies ?
Yes
Yes
% EB >= 30 ?
No
Extracted End
from G 826
9.15
▼ Background Block Errors (BBE) Errored block (EB) occurring outside a severely
errored second (SES).
x t in sec
ES := ES - 10 ES := ES + x
SES := SES - 10 SES := SES
UAS := UAS + 10 UAS := UAS - 10
Inhibition of counters:
SES
ES / SES / (BBE)
ES which is not a SES
Non errored second
9.16
▼ Unavailable Time (UAT) A period of unavailable time (UAT) begins at the onset of 10 consecutive SES
events. These 10 seconds are considered to be part of
unavailable time. A
new period of available time begins at the onset of 10 consecutive non-SES
events.
▼ Unavailable Second (UAS) An unavailable second (UAS) is a second which is part of the
Unavailable Time (UAT).
NE A NE B
9.17
▼ Near End counters are incremented if in the received STM-N frame anomalies (bit errors) or defects (alarms) have been
detected.
▼ Far End counters are incremented if the transmitted STM-N frame was erroneous: anomalies (bit errors) or defects (alarms).
▼ The Network Element which is transmitting an errored signal, is informed about the bit errors by receiving Remote Error
Indications (REI)
l MS-REI: M1-Byte inside MSOH contains the number of erroneous blocks detected in B2
▼ The transmitting Network Element is informed about the alarms by receiving Remote Defect Indications (RDI)
VCn-Path
Path Path
Source Sink
Domain 1 Domain 2
[total biterrors] Inter Domain
Link
9.18
▼ In transmission networks it is normal that signals are transported over multiple domains managed by different network
operators
▼ The signal is entering the network at the Path Source (SDH POH is added) and leaves the network at the Path Sink (SDH
POH is terminated)
▼ Statistic models assume that within each domain and inter-domain link equally distributed bit errors are inserted into the
signal
▼ Problem:
l It is not possible to check the performance of domain1 and domain 2 or the link between the two domains
l Usage of the Performance Monitoring counters on path basis would indicate only the overall bit errors without any hint
where and how many bit errors are introduced
▼ Solution:
l Tandem Connection Monitoring is the solution for this problem
l The TCM standards were approved by the ITU-T in 2000 (G.783), in 1996 (G.707)
VCn-Path
TC 1 TC 12 TC 2
Path Path
Source Sink
Domain 1 Domain 2
Inter Domain
Link
so sk so sk so sk
[total biterrors]
so: source
sk: sink
9.19
▼ The complete VCn path is virtually split into fragments, where an independent monitor considers only effects on this fragment.
Tandem Connection (TC) monitors the performance (bit errors and alarms) on a configurable fragment of the path.
▼ TCs are independent from each other. Each operator can decide where and when to use a TC.
▼ Full PM is supported
▼ In the example above the operator created three Tandem Connections for supervising the performance of the signal in a
specific domain
l TC1 counts only bit errors that have been added in Domain1.
l TC12 counts only bit errors that have been added on the Inter Domain Link
l TC2 counts only bit errors that have been added in Domain2.
l The function TC12 sk (sink) is created before matrix, therefore this TC is called “TC Before Matrix”, “Ingressing
TC”or “TCT RX” .
This TC supervises a domain external signal arriving at the domain ingress (e.g. a inter domain link)
l The functions TC1 sk and TC2 sk are created behind matrix, therefore they are called “TC After Matrix”, “Egressing
TC” or “TCT TX”.
This type of TCs allow to supervise a domain internal signal shortly before the domain egress.
J1
B3
C2
G1
F2 Payload
H4
N1 used for TCs F3
K3
N1
1 2 3 4 5 6 7 8
9.20
▼ Existing path is not affected by the TC, which is transparent for the path layer
▼ For a working TC it´s necessary that the start and end point exchanges management information in a bidirectional way.
Therefore TC uses a part of the already existing Path Overhead (POH)
▼ For the VC4 or the VC3 path the N1 byte is used (see figure above), for the VC12 path the N2 byte of the VC12 multiframe is
used
▼ Every modification of the N1 byte has to be compensated so that no BIP failure occurs because of this modification
▼ N1byte:
l Bit 1 - 4 contains number of errors in the signal before the TC starts (range=0-8) calculated
via 8 bits of BIP8 (B3 byte)
l Bit 5: Remote Error Indication (REI) is used to indicate block errors to the TC-source, necessary for Far
End PM
l Bit 6: Outgoing Error Indication (OEI) necessary for counting of outgoing Far End PM data
l Bit 7 - 8 contains several information in a multi frame (consisting of 76 frames)
è FAS Frame Alignment Signal
è TC-TI Tandem Connection - Trail Identification
è TC-RDI Tandem Connection- Remote Defect Indication
è ODI Outgoing Defect Indication
BBE = 6
BBE = 2 N1 = 2
N1:=2 NE_BBE := 6 - 2 =4
SPI SPI
Path RST RST
MST MST
MSA MSA
N1=0 N1=0
NE 1 NE x
Domain 1
9.21
▼ Example:
In NE 1 and NE x of Domain 1 a “TC after Matrix” is configured, to find out how many bit errors happened inside Domain 1 on
the VC-4 path
l TC Source of NE 1 calculates arriving bit errors (BBE = 2) and inserts the number into Bit1-4 of the N1 byte
l TC Sink of NE x calculates the current bit errors: 2+4=6 of the signal (using BIP). These are called “outgoing bit
errors” because they’re in the outgoing signal of the TC Sink
l TC Sink of NE x calculates the bit errors on TC segment: (bit errors detected) - (N1 value);
NE_BBE: 6 - 2 =4
▼ As for the path we have signaling information to do Far End PM on bidirectional TCs:
l NE_BBE sent in backward direction as REI (Remote Error Indication)
l Alarms on the TC Segment sent in backward direction as RDI (Remote Defect Indication)
▼ Outside an TC the N1 byte is set to 0 to indicate that no TC is created on this path segment
TC SPI SPI
RST RST
MST MST
MSA MSA
Path
9.22
▼ Additional to the Tandem Connection Termination (Source and Sink function) a Monitor function can be used for:
l TCM before Matrix (TCm RX) to supervise for example the TC of a inter domain link
l TCM after Matrix (TCm TX) to supervise for example the TC of a domain
l Creation of TC terminations without failures. The following creation rules have to be fulfilled:
è NO “Nesting” allowed
è NO “Overlapping” allowed
è “Cascading” is allowed
9.23
10.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
10.2
W
W
W 2 W W
W
2
P P P P
10.3
Equipment 1
Equipment 2
10.4
▼ The 1+1 EPS protection type means that one working equipment is protected by one redundant equivalent.
▼ The EPS mechanism ensures that transmission is continued and the faulty equipment can be exchanged should equipment
failure occur.
Equipment 1
Line 1
Equipment 2
Line 2
Equipment N
Line N
Equipment P
10.5
▼ The 1:N EPS protection type means that N working pieces of equipment are protected by just 1 protecting equivalent.
▼ During normal operation without equipment failure the protecting equipment is inactive.
Protection Protection
Item to be protected
architecture mechanism
SNCP/I
Section
10.6
▼ The protection mechanisms are defined by ETSI and ITU-T at section or path level.
Sub Network
selection broadcast
VC-n VC-n
broadcast selection
Sub Network
10.7
▼ SNCP: Sub Network Connection Protection is performed on the path (VC-n) level
▼ Signal is broadcasted on the working and protecting path, and selected upon reception.
▼ 2 operating modes:
l revertive: traffic is switched back to the working channel when the fault has
disappeared, once the wait-to-restore time (5 to 12 minutes)
has elapsed.
l non revertive: no switch back.
Sub Network
Sub Network
10.8
SNCP-I: SNCP-N:
LOS LOS
LOF LOF
LOP LOP
AU-/TU-AIS AU-/TU-AIS
HP-/LP-UNEQ
HP-/LP-E-BER
HP-/LP-DEG
HP-/LP-TIM
B3-/BIP-2-SD
Working
T RX 1+1 protection
X Protecting
10.9
▼ Switching criteria:
l MS-AIS
l LOS
l LOF
broadcast selection
TX Line A RX
Multiplex section
RX Line B TX
selection broadcast
10.10
TX RX
TX RX
High priority line
RX RX TX TX
Multiplex section
TX RX
TX RX
extra traffic Low priority line extra traffic
RX RX TX TX
10.11
▼ When the protected/working line operates normally, the protecting line may be used for “extra traffic”: low priority line
Node D Node C
Section overhead
Normal traffic channels
Detailed view of the ring Protection channels
Section overhead
Normal traffic channels
STM-16 fiber:
Protection channels
Normal channel: AU4 #1-8
Protection channel: AU4 #9-16
10.12
▼ Protection called MS-SPRING: Multiplex Section Shared Protection in a Ring it enables a larger flow of traffic to be
processed than with other resources
▼ Shared Protection: protection architecture in which m protection entities are shared between n traffic
entities (m:n).
Protection entities may be used to transport additional traffic.
▼ The ring protection switching protocol is performed by the K1 and K2 bytes in the protection channels MSOH.
▼ Two types of ring with MS-SPRING: 2-fiber ring and 4-fiber ring for STM-16 fiber
Failure
1 2 3
6 5 4
10.13
▼ BRIDGE: sends the traffic of the working channel additionally to the opposite port via the protecting channel (broadcast
function)
▼ SWITCH: uses for receiving traffic the protecting channels of the opposite port (selection function)
Node D Node C
10.14
▼ The normal and the protection channels are materialized on different fibers.
▼ Four-fiber rings enable ring switching for protection purposes, as well as span switching, but not both simultaneously.
▼ 4f-MS-SPRING supports:
l span switching
l ring switching
▼ A fault condition present only on the working link determines a SPAN PROTECTION:
High Priority traffic is restored by switching to the protection channels of the same span.
▼ A fault condition present on both working and protection links determines a RING PROTECTION:
The High Priority traffic travelling the failed span is restored by switching to the protection channels travelling in the opposite
direction (away from the failure).
1 2 3
6 5 4
10.15
▼ SPAN switching: the protection channels of the affected span are used to carry the working channels. The corresponding
low priority connections (protection channel) crossing the span are preempted (AU-AIS insertion on LP paths).
▼ When the working channel operates normally, the protecting channel may be used for “extra traffic”: low priority line / traffic
Failure
VC-n
A B C
VC-n
D
F E
Failure
VC-n
A B C
VC-n
D
F E
DXC
any NE
10.16
▼ DXC supports together with SDH Network Manager a restorable network providing:
l Path restoration on VC-n level
l MSP and SNCP
l SNCP protection and restoration combined
▼ All the VC-n connections of the network are configured and supervised by the SDH Network Manager. With its knowledge
about the routes and bearers of the network as well as of the current interconnections it can recalculate alternative routings
for possible network failures.
▼ In case of a failure, reported from one (or several) DXC, the SDH Network Manager analyses the location of the failure and
initiates the relevant restoration scenario:
l Working circuit path: ABCD
l Failure on section: BC
l NMS decides optimum routing: e.g. AFECD
l The recalculated cross connection commands are sent to the relevant DXC which immediately performs them.
10.17
11.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
11.2
PRC
11.3
▼ The synchronization networks architecture must accept faults (path cutoffs, equipment failures) providing auxiliary paths and
spare clock systems.
▼ A synchronization plan must be set up to ensure that synchronous NEs in a network really run synchronously. This plan
indicates the way each NE is synchronized.
▼ Strictly forbidden are synchronization loops: i.e. an NE receives a sync signal it has generated, via a sequence of slave
clocks.
▼ Master-Slave synchronization:
l The PRC provides synchronization to the first node hierarchical level
l These nodes provide synchronization to the next hierarchical level
l Stability and precision level defined for each level, 4 levels maximum
▼ The PRC is doubled (tripled in some countries) on different sites (for safety), one acting as the master and the others as
slaves.
▼ Degradation of the PRC due to the justification during multiplexing of a higher-order signal (jitter).
1 60
1 10
PRC SEC SEC SSU SEC SEC SEC SSU SEC SEC SEC SEC
1 20
11.4
▼ The PRC provides the best clock accuracy, which decreases via the SSU up to the SEC
▼ The SSUs are located at strategic nodes: they are designed to filter the accumulated jitter and wander and have good stability
in holdover mode.
▼ Holdover Mode: If the NE looses its reference clock, it enters the Holdover Mode to provide
synchronization at the last average of the phase locked frequency
▼ Free running Mode: The NE operates at the frequency of its own generator/oscillator without
any timing reference
PRC PRC
PRC level
SSU SSU
SSU SSU
SSU
SSU level SSU
SSU SSU
SEC level
NE
MSP
NE containing SSU
11.5
▼ The lines of the SSU level represent the synchronization links carried by the STM-N signals.
Squelch
Selector Selector
T4
A C
reference Squelch
inputs T1
T2 Selector
SETG T0
T3 B
Oscillator
11.6
▼ Depending on specific NE more reference inputs (T1, T2, T3) are possible.
l T0 SDH equipment internal clock
l T1 2 MHz signal derived from an STM-N port (SDH) synchronization
l T2 2 MHz signal derived from a 2 Mbit/s port (PDH) source,
l T3 2 MHz signal of external clock reference inputs
(coming from: separate clock network / SSU / PRC)
l T4 Sync output of an SDH equipment, clock signal send to another NE
NE A
S1:SEC T1A NE B
S1:PRC T1 *
S1:PRC Quality Priority S1:Don‘t use
S1:PRC T1B T1A S1-Byte 1 (highest)
*
S1:Don‘t use T1B S1-Byte 2 * T2 SEC
S1:PRC T1C
T1C S1-Byte 3
S1:PRC T2 SSU 4
S1:PRC T1
PDH: 2 Mbit/s T2 T3 PRC 5 NE C
S1:PRC
internal SEC 0 (lowest)
T3 T1 *
2 MHz signal,
external clock (PRC) SEC
SEC
11.7
▼ Selection criteria:
l SSM indicates quality level (QL) of each T1 reference.
l priority table: each reference input is given a certain priority (by operator)
▼ If the SSM (Synchronization Status Message) is not managed, only the priority table is taken into account and the transmitted
qualities have QL6: not to be used for synchronization.
▼ Quality Levels:
S1-byte Clock
l QL2: 0000 --- à Quality unknown (invalid)
l QL1: 0010 PRC à STM-N signals with a G.811 source
l QL3: 0100 SSU-Transit à STM-N signals with a G.812T source
l QL4: 1000 SSU-Local à STM-N signals with a G.812L source
l QL5: 1011 SEC à STM-N signals with a G.813 source
l QL6: 1111 --- à Not to be used for synchronization
W E W E W E
Without faults
W E W E W E
Correct
W E W E W E
Incorrect
Sync loop
11.8
▼ Incorrect NE configuration:
T1 from W, priority 1
T1 from E, priority 2 : Sync-loops in case of failure
1 1 1 1 1
E E E E E
PRC 1111 SEC SEC SEC SSU
W 2 W 2 W 2 W 2 W 2
E E E E E
PRC 1111 SEC 1111 SEC 1111 SEC 1111 1111 SSU
W W W W W
3 3 3 3 3
E E E E E
PRC 1111 PRC 1111 SEC 1111 SEC SSU 1111 SSU
W 4 W 4 W 4 W 4 W 4
11.9
T1 from E 2 S1-Byte
T1 from E 2 S1-Byte
4 T1 from W 1 S1-Byte
11.10
12.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
12.2
Inter-station
Intra-
Application
station Joint
Short-haul Long-haul
Engineering
Rated source
1310 1310 1550 1310 1550 1550
wavelength (nm)
12.3
▼ If these categories are inadequate, Inter-station Joint Engineering (JE) shall be used: distances of approximately 90 km with
1550 nm
▼ The distances are used for classification and NOT specification purposes.
Hazard level limits for single mode fibers with 11 µm mode field diameter
Wavelength Hazard Level 1 Hazard Level 3A
1310 nm 8.85 mW (+9.5 dBm) 24 mW (+13.8 dBm)
1550 nm 10 mW (+10 dBm) 50 mW (+17 dBm)
12.4
▼ They might be different from laser classifications complying with IEC 60825-1:
The reason is that hazard levels are assigned under consideration of reasonable events whereas laser classification is made
under consideration of one single fault.
▼ The optical transmitters and amplifiers used in the system emit optical power in the invisible infra-red spectrum range. Under
normal operating conditions, the optical power is transferred in the fibers and is not accessible. The hazard levels of optical
transmitters and optical amplifiers in the system are classified according to IEC 60825-1, without optical fibers connected to
the output and taking one single component failure into account.
▼ X dBm = 10 x/10 mW
▼ 0 dBm = 1 mW
NE 1 NE 2
Port A LOS 1 Port B
Cutoff
Laser1
A.L.S. A.L.S.
command command
Laser2
LOS 2
12.5
▼ A cut-off which triggers a Loss of Signal (LOS) causes the laser in the opposite direction to be turned off automatically.
▼ Timing:
1. cut-off
2. LOS 1 (detected in NE2)
3. ALS (command sent to Laser2 in NE2)
4. LOS 2 (detected in NE1)
5. ALS (command sent to Laser1 in NE1)
Start
Section in
normal operation
Automatic Manual Manual restart
ALS in service
Restart restart for testing
Yes
12.6
12.7
13.1
© Alcatel University - 8AS 90200 0551 VT ZZA Ed.01
ID IDentifier
INC INCrement
IP Internet Protocol
ISO International Standards Organization
ITU-T International Telecommunication Union - Telecommunication sector
JE Joint Engineering
LASER Light Amplification by Stimulated Emission of Radiation
LC Link Connection
LED Light Emitting Diode
LO Lower Order
LOF Loss Of Frame
LOM Loss Of Multiframe
LOP Loss Of Pointer
LOP Low Order Path
LOPA Low Order Path Adaptation
LOPT Low Order Path Termination
LOS Loss Of Signal
LOVC Lower Order Virtual Container
LP Lower order Path
LPA Lower order Path Adaptation
NA Not Applicable
NC Network Connection
NDF New Data Flag
NE Network Element
NPI Null Pointer Indication
NRZ Non Return to Zero (optical signal, G.783)
NSAP Network Service Access Point
NU National Use
CT CT CT CT CT ECT
13.7
SDH SONET
4 x 9 bytes
STS-12 622.08 Mbit/s
STM-4
resp.
STS-12
3 x 3 bytes
9 bytes
Same frame structure STS-3
155.52 Mbit/s
STM-1
synchronous
Plesiochronous origin
Plesiochronous origin signals
(European standard) signals
(US standard)
13.8
▼ Low-or medium-rate systems using radio or satellite technologies in the SDH hierarchy have not been designed to use STM-1
signals:
They operate with a 51.840 Mbit/s binary rate: STM-0
STS-9 466.560
A1 A1 A1 A2 A2 A2 J0 X X A1 A2 C1 A1 A1 A1 A2 A2 A2 C1 C1 C1
B1 D D E1 D F1 X X RSOH B1 E1 F1 B1 B1 B1 E1 E1 E1 F1 F1 F1 SOH
D1 D D D2 D D3 D1 D2 D3 D1 D1 D1 D2 D2 D2 D3 D3 D3
B2 B2 B2 K1 K2 B2 K1 K2 B2 B2 B2 K1 K1 K1 K2 K2 K2
D4 D5 D6 D4 D5 D6 D4 D4 D4 D5 D5 D5 D6 D6 D6
D7 D8 D9 MSOH D7 D8 D9 D7 D7 D7 D8 D8 D8 D9 D9 D9 Line
OH
D10 D11 D12 D10 D11 D12 D10 D10 D10 D11 D11 D11 D12 D12 D12
S1 Z1 Z1 Z2 Z2 M1 E2 X X Z1 Z2 E2 Z1 Z1 Z1 Z2 Z2 Z2 E2 E2 E2
#1
#2 STS-1
#3
Section overhead : byte assignment
13.9
1 90
1 A1 A2 C1 STM-0 Frame
B1 E1 F1
D1 D2 D3
VC-3
J1
H1 H2 H3
B3
B2 K1 K2
C2
D4 D5 D6
G1
fixed stuff
fixed stuff
D7 D8 D9
F2
D10 D11 D12
9 S1 M1 E2 H4
F3
K3
N1
29 30 31 58 59 60
VC-3 POH
13.10
6 5 4
No fault 1 2 3
Switch to holdover mode
Path fault
Correct 6 5 4
1 2 3
Sync loop
Incorrect 6 5 4
1 2 3
Switch to holdover mode
Reference fault
Correct 6 5 4
holdover
1 2 3
Sync loop
6 5 4
Incorrect
13.11
▼ Correct / No fault
l NE1 configuration: T3 (from PRC), priority 1
no second reference
l NE other configuration: T1 from W, priority 1
no second reference
▼ Incorrect
l NE1 configuration: T3 (from PRC), priority 1
T1 from E, priority 2
l NE other configuration: T1 from W, priority 1
T1 from E, priority 2: sync loops in case of line failure
or PRC failure
▼ No SSU available
1 PRC 2 PRC 3
1 PRC 2 PRC 3
"1111" SEC SEC
holdover
phase 4 PRC 6 PRC 5 "1111" 4
PRC
"1111" "1111"
1 PRC 2 PRC 3
13.12
▼ No SSU available
1 T3 (PCR) 1 PCR
T1 from E 2 S1-Byte
13.13
AP Access Point LOP Lower-order path e.g. VC-12 HOP Higher-order path e.g. VC-4
CP Connection Point LOPA Lower-order path adaptation HOPA Higher-order path adaptation
TCP Termination Connection Point LOPT Lower-order path termination HOPT Higher-order path termination
IOST Intra-Office section termination LOPSN Lower-order path sub-network HOPSN Higher-order path sub-network
IOSA Intra-Office section adaptation SA STM-N section adaptation
ST STM-N section termination
Application of the functional architecture of the case of PDH supported on SDH
13.14
TSF TSF
SmD/Sm SmD/Sm TSD TSD
SmD_AP SmDm Sm Sm Smm Sms Sms
SmD SmD TSF Sm_RI Sm_RI
SD
Sm_RI
Sm
Sm_CP Ppx_CP User_CP Sm_CP Ppx_CP User_CP Higher order
Sn/Sm Sn/Pqx Sn/User Sn/Sm Sn/Pqx Sn/User
path layer
TSF TSF
SnD/Sn SnD/Sn TSD TSD
SnD_AP SnDm Sn Sn Snm Sns SnS
SnD SnD TSF Sn_RI Sn_RI
SD
Sn_RI
Sn
Sn_CP Sn_CP Multiplex section layer
D4-D12 E2 S1[5-8] S1[5-8] E2 D4-D12
MSn MSn
MSn_RI
MSn
RSn RSn
RSn
OSn ESl
OSn_CP ESl_CP