Professional Documents
Culture Documents
SDH Basics
Code: TS12TEC05En
1 PDH Multiplexing Pages (1-12)
Sub - Sections
Principles and Characteristics of
2 Pages (1-16)
the SDH
Aim of study
This chapter introduces principles of PDH multiplexing and multiplexing / demultiplexing
of PDH signals.
Contents Pages
1 Introduction 2
2 Principles of PDH Multiplexing 2
3 ANSI / CEPT Bit Rates 3
4 Frame Structure of a PDH Signal 7
5 Multiplexing / Demultiplexing of PDH Signals 7
6 Summary 10
7 Exercise 11
8 Solution 12
1
TS12TEC05En
Chapter 1: PDH Multiplexing
Chapter 1
PDH Multiplexing
1 Introduction
Multiplex Operation
Four input signals with the same nominal bit rate are combined to form one
multiplex signal and then relayed to the receive side via one common
transmission path.
2
TS12TEC05En
Chapter 1: PDH Multiplexing
De-multiplex Operation:
On the receive side, the sum signal is again distributed to the corresponding
outputs.
Fig. 1
As demand for voice telephony increased, and levels of traffic in the network
grew ever higher, it became clear that the standard 2 Mbit/s signal was not
sufficient to cope with the traffic loads occurring in the trunk network. In
order to avoid having to use excessively large numbers of 2 Mbit/s links, it
was decided to create a further level of multiplexing. The standard adopted in
Europe involved the combination of four 2 Mbit/s channels to produce a single
8 Mbit/s channel. This level of multiplexing differed slightly from the
previous in that the incoming signals were combined one bit at a time instead
of one byte at a time i.e. bit interleaving was used as opposed to byte
interleaving. As the need arose, further levels of multiplexing were added to
the standard at 34 Mbit/s, 140 Mbit/s, and 565 Mbit/s to produce a full
hierarchy of bit rates.
3
TS12TEC05En
Chapter 1: PDH Multiplexing
If two digital signals are Plesiochronous, their transitions occur at “almost” the
same rate, with any variation being constrained within tight limits. These
limits are set down in ITU-T recommendation G.703. For example, if two
networks need to interwork, their clocks may be derived from two different
PRCs. Although these clocks are extremely accurate, there’s a small frequency
difference between one clock and the other. This is known as a Plesiochronous
difference.
4
TS12TEC05En
Chapter 1: PDH Multiplexing
To recover a 64 kbit/s channel from a 140 Mbit/s PDH signal, it’s necessary to
demultiplex the signal all the way down to the 2 Mbit/s level before the
location of the 64 kbit/s channel can be identified. PDH requires “steps” (140-
34, 34-8, 8-2 demultiplex; 2-8, 8-34, 34- 140 multiplex) to drop out or add an
individual speech or data channel. This is due to the bit stuffing used at each
level.
We will consider only two hierarchies, even though Japan has its own
hierarchy it will not be studied in this course.
Fig. 2
6
TS12TEC05En
Chapter 1: PDH Multiplexing
Every signal within a CEPT hierarchy level has a specific frame structure
which basically consists of the following blocks:
A multiplex sum signal is generated from the partial signals 1, 2. 3 and 4 (also
termed input, incoming, or sub signals) through the method of bit interleaving
==> bit-by-bit multiplexing.
Fig 5
7
TS12TEC05En
Chapter 1: PDH Multiplexing
Fig. 6
Here, the insertion of the Frame Alignment Signal (FAS), the justification bits,
etc. into the multisignal is not yet taken into consideration.
The bits of the frame alignment signals (FAS) contained in the input signals I
and II respectively are also inserted bit-by-bit into the multiplexed signal.
Fig. 7
8
TS12TEC05En
Chapter 1: PDH Multiplexing
Caution!
After the multiplex operation, the two FAS no longer form a joint unit. Beside
performing the bit interleaving, the multiplexer has also the function to create
a new CEPT frame for the multiplexed signal. Within this frame, the tributary
information is represented by the two complete CEPT frames of input signals I
and II.
Fig. 8
9
TS12TEC05En
Chapter 1: PDH Multiplexing
There is no phase relationship between the FAS of the multiplexed signal and
the individual frame alignment signals of the tributary signals 1 and 2. A new
frame for the multiplexed signal is created. This new frame has its own FAS.
Fig. 9
6 Summary
• Bit rates in accordance with ANSI: 1,5 Mbit/s, 6 Mbit/s and 45 Mbit/s
• Bit rates in accordance with 2 Mbit/s, 8 Mbit/s, 34 Mbit/s and 140 Mbit/s
CEPT:
• Every signal has a separate frame structure.
• Bit-by-bit multiplexing.
• No frame synchronization of the tributary signal inputs.
• The input signals of the tributaries are plesiochronous to each other, i.e.
their clock rates have the same nominal value, but there is, however, a
slight amount of variation between the two.
10
TS12TEC05En
Chapter 1: PDH Multiplexing
7 Exercise
2. What are the elements of PDH frames and what is their function?
11
TS12TEC05En
Chapter 1: PDH Multiplexing
8 Solution
2 Mbit/s
8 Mbit/s
34 Mbit/s
140 Mbit/s
2. What are the elements of PDH frames and what is their function?
TB Tributary bits
12
TS12TEC05En
Chapter 2: Principles and Characteristics of the SDH
Aim of study
This chapter introduces introduction to the Synchronous Digital Hierarchy SDH.
Contents Pages
1
TS12TEC05En
Chapter 2: Principles and Characteristics of the SDH
Chapter 2
Principles and Characteristics of the SDH
The use of justification bits at each level in the PDH means that identifying
the exact location of the frames in a single 2 Mbit/s line within say a 140
Mbit/s channel is impossible. In order to access a single 2 Mbit/s line the 140
Mbit/s channel must be completely demultiplexed to its 64 constituent 2
Mbit/s lines via 34 and 8 Mbit/s. Once the required 2 Mbit/s line has been
identified and extracted, the channels must then be multiplexed back up to 140
Mbit/s.
Obviously this problem with the "drop and insert" of channels does not make
for very flexible connection patterns or rapid provisioning of services, while
the "multiplexer mountains" required are extremely expensive.
2
TS12TEC05En
Chapter 2: Principles and Characteristics of the SDH
Having just described why we may want to use SDH in preference to PDH, let
us now define a PDH and SDH network in simple terms.
When data signals with the same nominal bit rate (which could have different
sources, as in plesiochronous signals), are controlled by a central clock
frequency (the master clock), the signals are termed synchronous, (i.e. as in a
synchronous network). Thus we can say:
3
TS12TEC05En
Chapter 2: Principles and Characteristics of the SDH
In the synchronous network, on the other hand, the link sections are
synchronous to each other.
Now let us focus on a system that uses synchronous digital signals, i.e. SDH.
Background
The task of creating such a standard was taken up in 1984 by the Exchange
Carriers Standards Association (ECSA) in the U.S. to establish a standard for
connecting one fiber system to another. In the late stages of the development,
the CCITT became involved so that a single international standard might be
developed for fiber interconnects between telephone networks of different
countries. The resulting international standard is known as Synchronous
Digital Hierarchy (SDH).
SDH Advantages
The primary reason for the creation of SDH was to provide a long-term
solution for an optical mid-span meet between operators; that is, to allow
equipment from different vendors to communicate with each other.
4
TS12TEC05En
Chapter 2: Principles and Characteristics of the SDH
SDH was first introduced into the telecommunications network in 1992 and
has been deployed at rapid rates since then. It’s deployed at all levels of the
network infrastructure, including the access network and the long-distance
trunk network. It’s based on overlaying a synchronous multiplexed signal onto
a light stream transmitted over fiber-optic cable. SDH is also defined for use
on radio relay links, satellite links, and at electrical interfaces between
equipment.
All multiplex levels in the SDH are positive integer multiples of this base
signal "STM-1".
In this way, a world-wide uniform concept for the transmission of 155 Mbit/s
data signals was provided, which means that all previous PDH signals (CEPT
/ ANSI ) must be interleaved to the SDH base signal by a procedure called
"MAPPING".
Fig. 1
6
TS12TEC05En
Chapter 2: Principles and Characteristics of the SDH
Fig. 2
The STM-1 frame is repeated (1s: 125 µs) = 8000 times per second.
7
TS12TEC05En
Chapter 2: Principles and Characteristics of the SDH
Fig. 3
Contrary to the PDH, the SDH uses the method of BYTE INTERLEAVING
to generate the multiplex sum signal * out of the sub-signals I and II
byte-by-byte multiplexing.
The multiplex signal STM-4 has the same frame duration as the STM-1, i.e.
125µs.
NOTE!
The explanation given in the example has been simplified. SDH equipment
adds SOH at different stages of the multiplex process. There is no need to go
into too much detail at this stage. This is sufficient to give an understanding of
the principles.
8
TS12TEC05En
Chapter 2: Principles and Characteristics of the SDH
Fig. 4
9
TS12TEC05En
Chapter 2: Principles and Characteristics of the SDH
Fig. 6
Fig. 7
10
TS12TEC05En
Chapter 2: Principles and Characteristics of the SDH
By scrambling the NRZ code it is ensured that when sending an STM signal
on the line, the signal includes sufficient clock edges to allow timing recovery
on the receiver side. The transmission of long "0" or "1" bit sequences must
therefore be avoided.
When sending an STM signal on the line it must be ensured that the signal
includes sufficient clock edges to allow timing recovery on the receiver side.
The transmission of long „0“ or „1“ bit sequences must therefore be avoided.
11
TS12TEC05En
Chapter 2: Principles and Characteristics of the SDH
For transmission on coaxial lines the established practice for electric signals is
to select a line code which suffices to enable clock recovery on the receiver
side.
Both STM-1 and STM-N are provided for transmission on optical fiber routes.
Application to STM-N
The STM signal of the synchronous hierarchy is scrambled only prior to its
optical conversion for transmission on optical fiber. Accordingly, an STM-1
or STM-N signal is not scrambled if it is first being encoded to a higher-level
multiplex signal. Only a multiplex signal, which is converted, to an optical
transmission signal is subjected to the scramble procedure.
12
TS12TEC05En
Chapter 2: Principles and Characteristics of the SDH
The CMI code is a binary transmission code. The binary values „1“ are
alternately represented by a positive and negative status and the binary values
„0“ are always represented by a negative status in the first half and a positive
status in the second half of the binary interval.
Code: NRZ
13
TS12TEC05En
Chapter 2: Principles and Characteristics of the SDH
8 Summary
14
TS12TEC05En
Chapter 2: Principles and Characteristics of the SDH
9 Exercise
4. List the line codes used for SDH optical and electrical line signals?
15
TS12TEC05En
Chapter 2: Principles and Characteristics of the SDH
10 Solution
155.52 Mbit/s
622.08 Mbit/s
Nx155.52 Mbit/s
2430
4. List the line codes used for SDH optical and electrical line signals?
CMI (electrical)
NRZ (optical)
Aim of study
This chapter introduces elements of an STM-1 signal.
Contents Pages
1
TS12TEC05En
Chapter 3: Basic Elements of STM-1
Chapter 3
Basic Elements of STM-1
1.1 Terminologies
Before discussing the basic elements of an STM frame, we will look at the
terminology used.
The suffixes used throughout the SDH multiplex levels derive from the older
PDH multiplex orders.
For instance
The above terms will be described in detail later in this section. Note,
however, that the First Order of multiplexing has two sub divisions, one for 2
Mbit/s PDH signals, e.g. VC 12, and one for 1.5 Mbit/s PDH signals e.g. VC
11. The other Orders of multiplexing have only one designation.
2
TS12TEC05En
Chapter 3: Basic Elements of STM-1
1.2 Container C
The tributary information must be fitted into these containers. This is done
with bit-by-bit and byte-by-byte justification for plesiochronous signals, by
means of purely positive justification as well as negative/zero/justification.
3
TS12TEC05En
Chapter 3: Basic Elements of STM-1
2. Fixed justification bytes and bits (fixed stuffing) for approximate timing
alignment. These bytes (or bits) are always without information content and
are used to approximately match the bit rate of the PDH signal to the
basically higher container bit rate. The precise bit rate alignment which
follows are performed with single justification opportunity bits.
3. Justification opportunity bits for precise timing alignment. These bits can be
used as tributary bits or justification bits as required.
4. Justification control bits to notify the receiver whether the justification
opportunity bits is an information bit or a justification bit.
Depending on its size, one virtual container can either be transmitted alone in
the STM-1 frame or otherwise interleaved in a larger VC, which is directly
transported in the STM-1.
4
TS12TEC05En
Chapter 3: Basic Elements of STM-1
The higher-order virtual containers VC-4 and VC-3 are transmitted directly in
the STM-1 frame.
In this case the pointers (AU-PTR block) embedded in the STM-1 frame
record the phase relationship between the frame and the respective virtual
container. That component of the STM-1 frame within which the VC is able to
„float“ is termed administrative unit (AU). The corresponding pointer,
described as AU pointer, likewise counts as part of the AU. Three 3-byte AU
pointers are included in the first 9 bytes of the 4th row of the STM-1 frame. A
distinction is made between the AU-4 and AU-3.
either 1 x AU-4 or
3 x AU-3. ( This has not been implemented by ETSI)
Transmission of the VC-3 is possible either
5
TS12TEC05En
Chapter 3: Basic Elements of STM-1
With the exception of the VC-4, all VC can be interleaved in a larger VC and
transported in the STM-1. The „smaller“VC can generally float in phase terms
inside the „larger“(higher-order) VC. For this purpose a pointer establishing
the phase relationship between the two VC must be positioned at a fixed
location in the higher order VC. Tributary unit TU is the term used to describe
the component of the higher order container inside which the embedded LO
VC can vary plus the corresponding pointer (TU pointer).
6
TS12TEC05En
Chapter 3: Basic Elements of STM-1
7
TS12TEC05En
Chapter 4: Mapping
Chapter 4 Mapping
Aim of study
This chapter introduces mapping of 140 Mbit/s signal, 34 Mbit/s signal, 2 Mbit/s signal &
ATM cells.
Contents Pages
1
TS12TEC05En
Chapter 4: Mapping
Chapter 4
Mapping
Fig. 1
Prior to its transmission in the STM-1 frame, the 140 Mbit/s PDH signal is
interleaved into a container C-4. The position of the signal bits in the container
is exactly defined. The term "mapping" describes this fixed bit arrangement.
The size of the container C-4 amounts to 2340 byte. For a better
understanding, a two-dimensional representation of the container is shown
below (9 x 260):
2
TS12TEC05En
Chapter 4: Mapping
Fig. 2
And the number of bits (nominal bit rate: 139,264 Mbit) actually to be
transmitted per container
3
TS12TEC05En
Chapter 4: Mapping
Fig. 3
Beside the pure tributary information bits (140 Mbit/s) the following bits are
transmitted in the container C-4:
The 140-Mbit/s
Plesiochronous signal is aligned to the C-4 container bit rate through bit-by-bit
positive justification. 1 justification opportunity bit and 5 justification control
bits are provided per container row. The exact mapping of these bits in the
container is shown in fig. 5.
4
TS12TEC05En
Chapter 4: Mapping
5
TS12TEC05En
Chapter 4: Mapping
The 140-Mbit/s signal has a nominal bit rate of 139.264 Mbit/s, corresponding
to 17408 bit/125 µs. This, results in 1934.222 bits per signal container row.
The C-4 container provides 1934 I-bits and 1 stuffable bit per row for
transmission of this useful information. Each row further contains 5 stuff
check bits as well as overhead and fixed stuff bits and bytes respectively.
Fig. 6
6
TS12TEC05En
Chapter 4: Mapping
The route which a container and its overhead take through the SDH network is
also called "path".
The path is defined by the operator. At the beginning of the path, every
container is assigned a trace, which can be checked at the end of the path.
The block resulting from the container C-4 and the POH is called
Fig. 7
There is a floating embedding of the Virtual Container VC-4 into the STM-1
frame of the payload. Part of the Virtual Container VC-4 is transmitted in one
STM-1 frame, and another part in the next frame.
7
TS12TEC05En
Chapter 4: Mapping
Fig. 8
The Pointer (PTR) indicates the start of the Virtual Container (VC-4) in the
payload.
8
TS12TEC05En
Chapter 4: Mapping
Fig. 9
Prior to its transmission in the STM-1 frame, the 34 Mbit/s PDH signal is
interleaved into a container C-3 (=Mapping).
The size of the container C-3 amounts to 756 byte. For a better understanding,
a two-dimensional representation of the container is shown below (9 x 84):
And the number of bits (nominal bit rate: 34,368 Mbit/s) actually to be
transmitted per container
9
TS12TEC05En
Chapter 4: Mapping
Fig. 10
Fig. 11
10
TS12TEC05En
Chapter 4: Mapping
it emerges that only three C-3 (3 x 6048 bit) at maximum can be transmitted
per STM-1 frame => this means only 3 x 34 Mbit/s instead of the 4 x 34
Mbit/s which can be transmitted in a 140 Mbit/s PDH signal.
Beside the pure tributary information bits (34 Mbit/s)! the following bits are
transmitted in the container C-3:
34 Mbit/s in C-3
11
TS12TEC05En
Chapter 4: Mapping
Three C-3 container rows at a time provide 2016 bits for transmission. These
bits comprise 1431 I-bits, 2 justification opportunity bits, 2 x 5 justification
control bits as well as overhead and fixed stuff bits. The 34 Mbit/s signal has a
nominal bit rate of 34,368 Mbit/s.
12
TS12TEC05En
Chapter 4: Mapping
1432 bits must thus be transmitted per 3 C-3 container rows. The 1431 I-bits
in the container are used up by the incoming signal at the nominal bit rate.
One justification opportunity bit must permanently be used as an I-bit. One
justification opportunity bit is transmitted as a justification bit (without
information).
However, if the bit rate of the incoming signal is below the nominal value, the
second s-bit (an I-bit in the nominal case) must also be stuffed if necessary
(positive justification).
If the bit rate of the incoming signal exceeds the nominal value, the first S-bit
(a justification bit in the nominal case) is used as an I-bit if required (negative
justification).
Fig. 14
13
TS12TEC05En
Chapter 4: Mapping
Every C-3 receives a "Path OverHead" (POH) with a size of 9 byte. The block
resulting from the C-3 and POH is termed Virtual Container-3 = VC-3.
Fig. 15
14
TS12TEC05En
Chapter 4: Mapping
Fig. 16
The three resulting TUG-3 (#1, #2 and #3) are byte-interleaved into a Virtual
Container VC-4 (=HIGHER ORDER VC ).
Fig. 17
15
TS12TEC05En
Chapter 4: Mapping
In this case, the pointer (PTR) embedded in the STM-1 frame contains an
address indicating the beginning of the VC-4 in the payload.
That component of the STM-1, inside which the VC-4 can "float" and which
comprises the two blocks PTR and Payload is designated.
Fig. 18
To supplement the STM-1 frame, the Section OverHead (SOH) is added to the
AU-4.
16
TS12TEC05En
Chapter 4: Mapping
Fig. 19
Fig. 20
17
TS12TEC05En
Chapter 4: Mapping
Prior to its transmission in the STM-1 frame, the 2 Mbit/s PDH signal is
interleaved into a container C-12 (=Mapping).
The size of the container C-12 amounts to 34 byte. For a better understanding,
you can find a two-dimensional representation of the container below:
Fig. 21
And the number of bits (nominal bit rate: 2,048 Mbit/s) actually to be
transported per container
18
TS12TEC05En
Chapter 4: Mapping
Fig. 22
A "Path OverHead" (POH) with the size of 1 byte is added to every C-12.
The function of these bytes will be explained in chapter 6.
19
TS12TEC05En
Chapter 4: Mapping
Fig. 23
Fig. 24
20
TS12TEC05En
Chapter 4: Mapping
Fig. 25
21
TS12TEC05En
Chapter 4: Mapping
In a next step, seven TUG-2 (=21 x 2 Mbit/s signals) are combined to form a
TUG-3, i.e. byte-interleaved.
Fig. 26
22
TS12TEC05En
Chapter 4: Mapping
The three resulting TUG-3 (#1 #2 and #3) are byte-interleaved into a Virtual
Container VC-4 (=HIGHER ORDER VC).
Fig. 27
In this case, the pointer (PTR) embedded in the STM-1 frame contains an
address indicating the beginning of the VC-4 in the payload.
23
TS12TEC05En
Chapter 4: Mapping
Fig. 28
That component of the STM-1, inside which the VC-4 can "float" and which
comprises the two blocks PTR and Payload is designated.
To supplement the STM-1 frame, the Section OverHead (SOH) is added to the
AU-4.
Fig. 29
24
TS12TEC05En
Chapter 4: Mapping
A "Path OverHead" (POH) with the size of 1 byte is added to every C-12.
Fig. 30
25
TS12TEC05En
Chapter 4: Mapping
26
TS12TEC05En
Chapter 4: Mapping
Fig. 32
Each TUG-2 can comprise three TU-12s which shall be numbered #1 to #3(#K).
Thus any TU-12 can be allocated a two-figure address in the form #L, #M,
where L designates the TUG-2 number (1 to 7) and M designates the TU-12
number (1 to 3).
Thus TU-12 #1 (1, 1) resides in columns 10, 73, 136 and 199 of the VC-4, and
TU-12 #2(7, 3) resides in columns 71, 134, 197 and 260 of the VC-4. A full
listing of the location of the TU-12 columns with the VC-4 frame follows.
NOTE – The Time Slot number contained in the diagrams below should
not be interpreted as the tributary port number, as the time slots and port
numbers are independent from each other. It is only during configuration
of the equipment that port is assigned a time slot.
27
TS12TEC05En
Chapter 4: Mapping
Fig. 33
28
TS12TEC05En
Chapter 4: Mapping
Fig. 34
That component, inside which the multiframe VC-12 can "float" with the aid
of a pointer, is termed multiframe TU-12. The four pointer bytes also count
as part of the multiframe TU-12. Every 125 µs one pointer byte is transmitted,
i.e. the transmission of the complete pointer takes 500 µs.
29
TS12TEC05En
Chapter 4: Mapping
In a next step, seven TUG-2 (=21 x 2 Mbit/s signals) are combined to form a
TUG-3, i.e. byte-interleaved.
The three resulting TUG-3 (#1 #2 and #3) are byte-interleaved into a Virtual
Container VC-4 (=HIGHER ORDER VC ) and so on (see 3.6).
Fig. 35
Fig. 36
30
TS12TEC05En
Chapter 4: Mapping
To account for the rapidly increasing need for broadband services and
applications (e.g. video conferences, multimedia etc.), the pieces of
information are no longer transported and switched through via channels with
a defined structure, but in the form of short packets with a constant length (=
Asynchronous Transfer Mode - cells).
Fig. 37
Is written into the PAYLOAD bit by bit and supplemented by the HEADER.
31
TS12TEC05En
Chapter 4: Mapping
Fig. 38
32
TS12TEC05En
Chapter 4: Mapping
The ATM method is so simple that the user packets can be conveyed purely
by hardware (table-controlled) after a software-controlled call setup and not
by slow software as in current packet networks. This makes ATM as efficient
as the STM method and far superior to conventional packet-oriented methods
(e.g. X.25).
Current international standards envisage the transport bit rates 155 and 622
Mbit/s for ATM. Due to these high rates and the hardware-controlled
switching, the delay times (otherwise typical for packet methods) are
significantly reduced. Thus ATM seems suitable for all information types:
both for fixed and variable bit rate signals and for packet-oriented signals.
33
TS12TEC05En
Chapter 4: Mapping
Fig. 39
These cells consist of 48 octets for payload and a 5-octet cell head. If no
payload is to be transmitted, specially labeled blank cells are sent.
ATM allows connections with any net bit rate. The latter is very low if almost
no information cells are being sent, but approaches the transport bit rate
(approx. 130 Mbit/s for 155-Mbit/s transport bit rate) if information cells are
being sent almost exclusively. By a label in the cell head each cell is assigned
to a specific virtual transmission path (short form: path) and to a (virtual)
channel routed in this path. This principle allows the capacity of the
transmission sections in the entire ATM network to be flexibly allocated to
narrowband and broadband connections in any desired combination.
34
TS12TEC05En
Chapter 4: Mapping
The ATM network functions trunk-oriented, i.e. it retains the cell sequence for
every connection. When the connection is set up the network user notifies the
network of the desired bit rate via a (virtual) signaling channel; the network
subsequently reserves the appropriate band width on all transmission paths.
Should a user exceed the agreed bit rate on a connection, the network detects
this at the network input and takes precautions against possible overload, e.g.
by ignoring excess cells.
With ATM, a very simple protocol is used. The protocol works without
acknowledgements, flow control or error correction. This results in a rapid,
service-independent basis switching service. Further performance features can
be added, if necessary, in more advanced protocol levels. Section-by-section
error correction can be omitted due to the high quality of the digital and
optical transmission techniques employed in the network.
Correspondingly, the structure of the cell head is simple fig. 1 shows the cell
structure defined by CCITT for the user-network interface. The essential
elements in the cell head are the "virtual path identifier" (VPI; 8 bits) and the
"virtual channel identifier" (VCI; 16 bits). Together VIP and VCI provide for
the unambiguous assignment of a cell to a virtual connection on a section-by-
section basis.
The field "payload type" (PLT: 3 bits) is used to differentiate useful cells and
blank cells. The field "cell loss priority" (CLP: 1 bit) is used to differentiate
the cells the loss of which is more or less acceptable. The field "header error
control" (HEC: 8 bits) is used to protect the cell head against transmission
errors. Finally, the field "generic flow control" (GFC: 4 bits) is only relevant
in the subscriber area and is discussed for flow control in the case of multiple
access of terminal equipment in the subscriber area.
35
TS12TEC05En
Chapter 4: Mapping
This field is not significant network-internally; its place in the cell head is
therefore used network-internally to extend the virtual path identifier (to 12
bits).
Further peculiarities relate to the runtime. The procedure used means that in
an ATM network the end-to-end runtime for cells will be lower than in a
narrowband ISDN. A considerable "packeting time" may arise for filling the
ATM cells, however, particularly with lower bit rates. This packeting time
arises whenever the information appears at the source as continuous signal (as
is the case with most computer applications) rather than in packet form. The
packeting time for PCM-coded speech (64 kbit/s) is as much as 6 ms. Thanks
to the low runtime in the ATM network, this delay hardly disturbs speech
quality as long as no additional packeting procedures arise through transitions
to STM networks. Special measures such as the use of echo suppressor
equipment, guarantee the standard high speech quality in such cases.
36
TS12TEC05En
Chapter 4: Mapping
Fig. 40
Prior to their transmission in the STM-1 frame, the ATM cells are interleaved
into the container C-4 (= Mapping).
Fig. 41
37
TS12TEC05En
Chapter 4: Mapping
Fig. 42
A comparison between the number of possible, usable bits per container C-4
reveals that an ATM cell can also be transmitted via two C-4.
The block resulting from the C-4 and POH is called Virtual Container-4 = VC-4.
38
TS12TEC05En
Chapter 4: Mapping
Fig. 43
The pointer indicates the start of the Virtual Containers (VC-4) in the
payload.
Fig. 44
39
TS12TEC05En
Chapter 4: Mapping
That component of the STM-1, inside which a VC-4 is able to "float" and
which consists of the blocks PTR and payload, is termed Administrative Unit
4 = AU-4.
Fig. 45
Fig. 46
40
TS12TEC05En
Chapter 4: Mapping
5 Concatenation of Payloads
5.1 Introduction
Therefore if we can transmit data in one channel rather than several individual
channels, then we would have better utilization of the available channel
bandwidth. This would also prove to be a much less expensive solution for our
customers.
These large channels are called "Clear Channels". Concatenation is the merger
of multiple channels (say 155Mbit/s) into one large Clear Channel.
1. CONTIGUOUS CONCATENATION.
2. VIRTUAL CONCATENATION.
An example of where this feature is used is when there is a requirement to
carry IP packets over the SDH network.
41
TS12TEC05En
Chapter 4: Mapping
The first AU 4 of an AU4 Xc has the normal range of pointer values. All
subsequent AU 4 within the AU4 Xc will have their pointer set to
Concatenation Indication (CI) "1001" in bits 1 to 4, with bits 5 & 6
unspecified, and the 10 bit decimal pointer values will have all 1's.
The CI indicates that the pointer processors will perform the same operations
as performed on the first AU4 of the AU4 Xc.
The first TU 2 of an TU 2mc has the normal range of pointer values. All
subsequent Tu 2's within the TU 2 mc will have their pointer set to
Concatenation Indication (CI) "1001" in bits 1 to 4, with bits 5 & 6
unspecified, and the 10 bit decimal pointer values will have all 1's.
The CI indicates that the pointer processors will perform the same operations
as performed on the first TU2 of the TU 2mc.
42
TS12TEC05En
Chapter 4: Mapping
This method of concatenation has been initially developed for the transport of
a single VC 2 mc, m times TU 2 without the use of CI of the pointer bytes.
This method only requires the path termination equipment to provide
concatenation functions.
With Virtual Concatenation the available capacity is lower than that for a
Contiguous Concatenation, therefore, care should be taken to base the required
capacity of VC 2mc's to the lower value to allowed the interconnections of
both types of concatenation. The reasons for this is because Virtual
concatenations need a separate POH for every VC 2 whereas contiguous
concatenation only requires a POH for the first VC signal. Byte stuffing
techniques are used to fill up the spare capacity in the Contiguously
concatenated TU 2mc.
43
TS12TEC05En
Chapter 4: Mapping
Fig. 48
44
TS12TEC05En
Chapter 4: Mapping
Fig. 49
• SRT1S.
• SRA1S.
45
TS12TEC05En
Chapter 4: Mapping
6 Summary
In the SDH, containers with a fixed transmission capacity are provided every
125 µs.
Fig. 50
The incorporation of the 140 Mbits/s signals/ATM cells into the STM-1 is
performed as follows:
Fig. 51
46
TS12TEC05En
Chapter 4: Mapping
The interleaving of the three 34 Mbits/s signals into the STM-1 looks like this:
Fig. 52
Container-Terminology (2 Mbit/s)
The interleaving of the 63 x 2 Mbit/s signals to the STM-1 looks like this:
Fig. 53
47
TS12TEC05En
Chapter 4: Mapping
Fig. 54
Fig. 55
48
TS12TEC05En
Chapter 4: Mapping
7 Exercise
Fill in the missing components of the STM-1 signal in order to complete the
mapping function.
49
TS12TEC05En
Chapter 4: Mapping
8 Solution
50
TS12TEC05En
Chapter 5: Pointer
Chapter 5 Pointer
Aim of study
This chapter introduces pointer functions, types and structure, pointer addressing scheme
and pointer justification.
Contents Pages
1 Pointer Functions 2
2 Pointer Types 3
3 Pointer Structure 6
4 Pointer Addressing Scheme 9
5 Pointer Justification 11
6 Exercise 15
7 Solution 16
1
TS12TEC05En
Chapter 5: Pointer
Chapter 5
Pointer
1 Pointer Functions
The pointer technique allows the tributary signals, which are packed in VC, to
be inserted in the higher-order frame without elaborate and time-consuming
buffering. Any phase and bit rate fluctuation can be compensated through
pointer value alignment together with byte-by-byte positive, zero and negative
justification.
The pointer allows single user channels to be dropped from and added to the
overall signal without the signal having to be demultiplexed completely.
2
TS12TEC05En
Chapter 5: Pointer
2 Pointer Types
a) AU pointer.
b) TU-3 pointer.
c) TU-1/TU-2 pointer.
H3 contains:
2.1 AU Pointer
• AU-4 pointer.
• AU-3 pointer.
AU-x (x = 3, 4) pointer allow the phase and frequency adaptation of the VC-x
to a particular AU-x frame. This corresponds to a direct alignment of the
payload (VC) to the section overhead (SOH).
The VC-3 containers can also be transported indirectly via a VC-4 container in
the STM-1 frame.
5
TS12TEC05En
Chapter 5: Pointer
For indirect transmission, the VC-3 containers are initially aligned to the VC-4
frame by means of the TU-3 pointers; the VC-4 container is subsequently
aligned to the STM-1 frame with the AU-4 pointer.
TU-12 pointer allows the VC-12 to be aligned in phase and frequency to the
higher-order frame (VC-3 or VC-4).
3 Pointer Structure
7
TS12TEC05En
Chapter 5: Pointer
Fig. 8
8
TS12TEC05En
Chapter 5: Pointer
9
TS12TEC05En
Chapter 5: Pointer
10
TS12TEC05En
Chapter 5: Pointer
5 Pointer Justification
Zero Justification:
Positive Justification:
If the VC bit rate is too low compared to the frame transmission capacity, - i.e.
the available transmission capacity is higher than the one effectively required -
3 justification bytes (without information content) are, if required transmitted
instead of 3 VC information bytes at a defined position in the frame in order to
align the bit rates.
11
TS12TEC05En
Chapter 5: Pointer
Negative Justification:
If to the VC bit rate is too high compared to the frame transmission capacity -
i.e. the transmission capacity is inadequate - supplementary capacity must be
provided in the frame if required. This is accomplished by the transfer of 3
bytes of the VC content to the pointer action bytes. The phase difference
between frame and VC is thus decreased by 3 bytes and accordingly the
pointer value must be decremented by 1.
Pointer corrections are only permitted in every fourth frame, i.e. at least 3
consecutive frames with unchanged pointers must exist between 2 pointer
corrections.
13
TS12TEC05En
Chapter 5: Pointer
Fig. 15
14
TS12TEC05En
Chapter 5: Pointer
6 Exercise
3. Which pointer value range exists for the AU-4 pointer and which bytes can
be addressed?
5. What is the value of an AU-4 pointer originally set to 782 after positive
justification?
15
TS12TEC05En
Chapter 5: Pointer
7 Solution
The pointer indicates the address of the first POH bytes of the VC and thus
the location of the VC within the frame. It therefore serves to synchronize
payload information which can be accessed directly.
3. Which pointer value range exists for the AU-4 pointer and which bytes
can be addressed?
Value range 0 - 782 decimal; only every third byte can be accessed.
5. What is the value of an AU-4 pointer originally set to 782 after positive
justification?
To 0 (zero)
16
TS12TEC05En
Chapter 6: Overhead
Chapter 6 Overhead
Aim of study
This chapter introduces overhead functions & Section Overhead (SOH).
Contents Pages
1 Overhead Functions 2
2 Section Overhead (SOH) 3
3 Exercise 25
4 Solution 26
1
TS12TEC05En
Chapter 6: Overhead
Chapter 6
Overhead
1 Overhead Functions
• Frame formation.
• Status monitoring.
• Error monitoring.
• Error localization.
• Maintenance functions.
• Control functions.
The structure of the STM-1 or STM-N frame is such that the overhead is
always an entity separate form the useful information. The advantage of this
arrangement is that the individual overhead bytes can be interrogated, changed
or added at any time without the individual signal first having to be
demultiplexed.
A distinction is made between the section overhead (SOH) and path overhead
(POH).
2
TS12TEC05En
Chapter 6: Overhead
3
TS12TEC05En
Chapter 6: Overhead
The SOH block is composed of eight 9-column rows. The first 9 bytes of rows
1-3 respectively contain the RSOH (regenerator section overhead), while the
first 9 bytes of rows 5-9 contain the MSOH (multiplex section overhead). The
first 9 bytes of the 4th row are used by the AU pointers and are not a
component of the SOH.
A1 and A2 Framing bytes – These two byte types indicate the beginning of
the STM-N frame. The A1, A2 bytes are unscrambled. A1 has the binary
value 11110110, and A2 has the binary value 00101000. The frame alignment
word of an STM-N frame is composed of (3 x N) A1 bytes followed by
(3 x N) A2 bytes.
4
TS12TEC05En
Chapter 6: Overhead
B1 RS bit interleaved parity code (BIP-8) byte – This is a parity code (even
parity), used to check for transmission errors over a regenerator section. Its
value is calculated over all bits of the previous STM-N frame after
scrambling, then placed in the B1 byte of STM-1 before scrambling.
Therefore, this byte is defined only for STM- 1 number 1 of an STM-N signal.
F1 RS user channel byte – This byte is set aside for the user’s purposes; it
can be read and/or written to at each section terminating equipment in that
line.
5
TS12TEC05En
Chapter 6: Overhead
DCC-channels
6
TS12TEC05En
Chapter 6: Overhead
B2 Multiplex Section (MS) bit interleaved parity code (MS BIP-24) byte –
This bit interleaved parity N x 24 code is used to determine if a transmission
error has occurred over a multiplex section. It’s even parity, and is calculated
overall bits of the MS Overhead and the STM-N frame of the previous STM-
N frame before scrambling. The value is placed in the three B2 bytes of the
MS Overhead before scrambling. These bytes are provided for all STM-1
signals in an STM-N signal.
7
TS12TEC05En
Chapter 6: Overhead
Bits 5-8
8
TS12TEC05En
Chapter 6: Overhead
9
TS12TEC05En
Chapter 6: Overhead
• Inband FEC.
• Outband FEC.
Inband FEC makes use of the spare bytes to be found in the Section Overhead
of the STM-4, 16, 64, 256. The previous figure of the STM-16 frame shows
the bytes reserved for this function.
On the transmit side the STM-4 part signal is put through an arithmetic-logic
unit which calculates the FEC Parity bytes from the 4 STM-1's signals.
These calculated parity FEC parity bytes are then inserted into the SOH of the
STM- 1 signals # 2, 3 and 4 (STM-1 # 1 is not used to carry FEC signals).
10
TS12TEC05En
Chapter 6: Overhead
On the receive side of the STM-4 part signal, the signal is delayed and put
through an arithmetic-logic unit which calculates the correction information
by means of the received STM-4 part signal and the received FEC parity
bytes. This correction information is then used to correct the delayed STM-4
signal. A similar process is also used for the STM-16, STM-64, and STM-256
line rates.
This feature will be described in more detail during specific product training,
in products which supports this feature.
Some examples of improvements of BER and power gains by using FEC are:
Thus you may improve your BERPRIM to BERFEC for the same distance, or
for the same BERPRIM have more power to go an increased distance.
Basic Information
The POH is added to the container C. Both form together the virtual container
VC which is carried as unchanged entity in the network path. The POH
contains all information required for reliable transportation of the container.
Information about the status of the entire path can be obtained by evaluating
the POH data. Fig. 1 shows the scope of validity of the POH.
11
TS12TEC05En
Chapter 6: Overhead
Byte Description
12
TS12TEC05En
Chapter 6: Overhead
B3 Path bit interleaved parity code (Path BIP-8) byte – This is a parity
code (even), used to determine if a transmission error has occurred over a
path. Its value is calculated over all the bits of the previous virtual container
before scrambling and placed in the B3 byte of the current frame.
C2 Path signal label byte – This byte specifies the mapping type in the VC-
N. Standard binary values for C2 are:
0000 0100 (04) Asynchronous mapping of 34,368 kbit/s or 44,736 kbit/s into
the Container-3
0001 0010 (12) Asynchronous mapping of 139,264 kbit/s into the Container-4
0001 0110 (16) Mapping of HDLC/PPP (Internet Standard 51) framed signal
0001 0111 (17) Mapping of Simple Data Link (SDL) with SDH self
synchronizing scrambler
13
TS12TEC05En
Chapter 6: Overhead
0001 1001 (19) Mapping of Simple Data Link (SDL) with set-reset scrambler
G1 Path status byte – This byte is used to convey the path terminating status
and performance back to the originating path terminating equipment.
Therefore the bidirectional path in its entirety can be monitored, from either
end of the path. Byte G1 is allocated to convey back to a VC-4-Xc/VC-4/VC-
3 trail termination source the status and performance of the complete trail. Bits
5 to 7 may be used to provide an enhanced remote defect indication with
additional differentiation between the payload defect (PLM), server defects
(AIS, LOP) and connectivity defects (TIM, UNEQ). The following codes are
used:
14
TS12TEC05En
Chapter 6: Overhead
F2 Path user channel byte – This byte is used for user communication
between path elements.
H4 Position and Sequence Indicator byte – This byte provides a multi frame
and sequence indicator for virtual VC-3/4 concatenation and a generalized
position indicator for payloads. In the latter case, the content is payload
specific (e.g., H4 can be used as a multiframe indicator for VC-2/1 payload).
For mapping of DQDB in VC- 4, the H4 byte carries the slot boundary
information and the Link Status Signal (LSS). Bits 1-2 are used for the LSS
code as described in IEEE Standard 802.6. Bits 3-8 form the slot offset
indicator. The slot offset indicator contains a binary number indicating the
offset in octets between the H4 octet and the first slot boundary following the
H4 octet. The valid range of the slot offset indicator value is 0 to 52. A
received value of 53 to 63 corresponds to an error condition.
15
TS12TEC05En
Chapter 6: Overhead
1001 0
0001 1
0010 2
0011 3
0100 4
0101 5
0110 6
0111 7
1000 8
1110 Incoming AIS
NOTE: To guarantee a non all-zeroes N1 byte independent of the incoming
signal status, it is required that the IEC code field contains at least one “1”.
When zero errors in the BIP-8 of the incoming signal are detected, an IEC
code is inserted with “1”s in it. In this manner, it is possible for the Tandem
Connection sink at the tail end of the Tandem Connection link to use the IEC
code field to distinguish between unequipped conditions started within or
before the Tandem Connection. Bit 5 Operates as the TC-REI of the Tandem
Connection to indicate errored blocks caused within the Tandem Connection.
Bit 6 Operates as the OEI to indicate errored blocks of the egression VC-n.
16
TS12TEC05En
Chapter 6: Overhead
17
TS12TEC05En
Chapter 6: Overhead
Fig. 10 Example for 500-_s multiframe of a TU-1/2 multiframe indicator using H4 bytes
18
TS12TEC05En
Chapter 6: Overhead
Basic Information
In floating mode transmission of VC-12 four bytes (V5, J2, Z6, Z7) per 500 _s
are provided as POH.
19
TS12TEC05En
Chapter 6: Overhead
Byte Description
Bits 1-2
Bit 3
A VC-2/VC-1 path Remote Error Indication (LP-REI) that is set to one and
sent back towards a VC-2/VC-1 path originator if one or more errors were
detected by the BIP- 2; otherwise set to zero.
20
TS12TEC05En
Chapter 6: Overhead
Bit 4
A VC-2/VC-1 path Remote Failure Indication (LP-RFI). This bit is set to one
if a failure is declared, otherwise it is set to zero. A failure is a defect that
persists beyond the maximum time allocated to the transmission system
protection mechanisms.
Bits 5-7
Provide a VC-2/VC-1 signal label. The Virtual Container path Signal Label
coding is:
010 Asynchronous
111 VC-AIS
Bit 8
21
TS12TEC05En
Chapter 6: Overhead
Path Trace J2
Bit 3 Fixed to “1”. This guarantees that the contents of N2 is not all zeroes at
the TCsource. This enables the detection of an unequipped or supervisory
unequipped signal at the Tandem Connection sink without the need of
monitoring further OHbytes.
22
TS12TEC05En
Chapter 6: Overhead
Bit 6 Operates as the OEI to indicate errored blocks of the egression VC-n.
23
TS12TEC05En
Chapter 6: Overhead
These bits are allocated for APS signaling for protection at the lower order
path level.
Reserved: K4 (b5-b7)
Bit 5 to 7 of K4 are reserved for an optional use. If this option is not used,
these bits shall be set to "000" or "111". A receiver is required to be able to
ignore the contents. The use of the optional function is at the discretion of the
owner of the trail termination source generating the K4-byte.
Spare: K4 (b8)
This bit is allocated for future use. This bit has no defined value. The receiver
is required.
24
TS12TEC05En
Chapter 6: Overhead
3 Exercises
2. What is the function of the byte B1 and in which type of network elements
(multiplexer, regenerator) is it evaluated?
3. What is the function of the bytes B2 and in which type of network elements
(multiplexer, regenerator) is it evaluated?
4. Which byte and bits are used to transmit the signal multiplex section remote
defect indication?
25
TS12TEC05En
Chapter 6: Overhead
4 Solution
Framing
Multiplexer
Regenerator
Only multiplexer
4. Which byte and bits are used to transmit the signal multiplex section
remote defect indication?
J1
26
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
Aim of study
This chapter introduces alarm interactions overview, bit error monitoring and AIS.
Contents Pages
1
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
Chapter 7
Monitoring, Maintenance and Control in the SDH
With the help of the overhead data bytes, we can send forward and backward
from the reporting network element certain alarm conditions. This information
helps to localize the fault as quickly as possible.
The following diagram attempts to show the Alarms raised, their subsequent
actions, destinations in the forward and backward directions.
(J0), (C2), (H4) etc are bytes to be found in the RSOH, MSOH, POH High
and low order.
Description
• The line shows the direction the Alarm is sent, with a description of the
alarm event for example Loss of Signal, or Loss of frame.
• The following show all the alarms that cause the forwarding onwards or
backwards of the next alarm indication as required.
• The alarm names indicate the alarms that all cause the subsequent alarm
indication and the "1" indicates the contents of the STM frame contains all
"1"s in the AU4.
2
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
Fig. 1
Fig. 2
3
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
1.1 Abbreviations
4
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
Specific bytes in the individual overheads are provided for bit error
monitoring and fault localization. These bytes contain information indicating
the bit error rate and thus the quality of the transmission sections concerned.
5
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
Fig. 3
6
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
On the transmit side, an n-bit code word is generated over a bit stream of
specific length in conformity with a fixed code protocol. This code word is
carried supplementary to the useful information in the overhead.
The bit stream is coded according to the same rules on the receive side and a
code word is regenerated. The new code word is compared with the
transmitted one. Any discrepancy between the code words indicates bit errors
in transmission. The precise number of bit errors is not determined with this
audit. However, a statistical evaluation of the incorrect code words allows
conclusion to be drawn about the transmission bit error rate.
A special parity code known as the BIP-n code is provided for bit error
monitoring in the synchronous hierarchy.
Here the bit stream of the multiplex unit under test (e.g. STM-N, VC) must be
envisaged as divided into sequences n bits in length.
Parity is now generated over the first bit of each sequence respectively and
even parity is produced at the end of the multiplex unit being tested. The even-
parity bit corresponds to the 1st bit of the n-bit long code word.
To „produce even parity“means that there must be an even total (including the
parity bits in the code word) of „1s“in the particular bit stream must exist.
The same procedure is applied to the 2nd bit in each sequence with the result
that the 2nd bit of the code word is generated. This continues in the same
manner until all n-bits are generated. The n-bit long code word is then inserted
and carried in the appropriate overhead.
8
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
Different BIP-N code words are used to monitor individual route sections in
the synchronous hierarchy:
One BIP-8 code word (1 byte) is provided for bit error monitoring. This code
word is generated over all bits in the STM-N frame after scrambling. The BIP-
8 byte is subsequently inserted in the allocated position B1 of the RSOH in the
next frame before scrambling starts. This byte is evaluated and regenerated in
every multiplexer and regenerator.
9
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
A B3 byte is provided for error monitoring of the individual VC-3 and VC-4
transmission paths. One BIP-989 (1 byte) code word is generated over the
entire bit stream of the virtual container and inserted in the appropriate byte
B3 of the POH of the follow-on VC. The B3 code word is generated over the
entire VC bit stream including the POH but without pointers. In the case of
negative justification it must be noted that the pointer action byte contains
useful information of the VC and is therefore incorporated in the B3
generation.
The first 2 bits in the POH byte V5 of the respective VC are provided for bit
error monitoring of the individual VC-1 and VC-2 transmission paths. A BIP-
2 (2 bits) code word is generated over the entire VC block in the 500 _s
multiframe and inserted in the first two bit positions of the POH (V5) of the
next VC.
10
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
It is not possible to determine in which part of the path the error occurred.
Fig. 8
11
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
The incoming and outgoing data streams (SINK and SOURCE) are each
monitored at the network limits.
This allows network provider 2 to monitor own errors in the path layer
independently of any received errors.
Fig. 9
12
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
Path parity errors are checked at the input to the sub-network. If errors are
present, they are copied into N1/N2 bytes in the POH. The data now passes
through the sub-network.
At the far end of the sub-network a check is made again: Path parity errors are
checked and compared with the extracted N1/N2 bytes.
Fig. 10
13
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
SOURCE:
14
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
Fig. 11
The right-hand figure shows the TCM sink and source functions. There is an
exchange of errors and alarms in the incoming and outgoing data signals.
15
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
T1.105 and T1.105.05 apply to SONET (Bellcore GR-253 only refers to the
ANSI recommendation).
Fig. 12
a) Path REI
The POH of the individual virtual containers contain one byte (VC-3 and
VC-4) or 2 bits (VC-1 and VC-2) for bit error monitoring. As mentioned
previously the BIP-8 or BIP-2 codes are used respectively. If bit errors are
detected at the path end when the BIP end words are evaluated, a REI code is
inserted in the opposite direction (to the path start) in order to notify the
source of the detected failure.
16
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
Bits 1-4 in POH byte G1 are used for REI transmission by VC-3 and VC-4.
The parity of 8 bit sequences is checked with the BIP-8 code employed.
Maximum 8 parity violations can thus be detected. The REI code contains the
total number of parity violations, with the values 0 to 8 being transmitted.
Should a different value appear in the REI code, however, it must be
interpreted as 0.
Bit 3 in POH byte V5 is used for REI transmission by VC-1 and VC-2. The bit
is set to 0 if no parity violation is detected with the BIP-2. A parity error is
indicated by the value 1.
b) Section REI
The M1 byte in the MSOH is used for relaying the number of parity violations
occurred in the B2 bytes to the far end side.
Depending on the multiplex signal (STM-N), the M1 REI code can have
values between 0 and N x 24.
a) Path-RDI
If no valid signal or an AIS is present when the individual VCs are received,
the distant end is notified through the remote alarm.
This remote alarm is set to „1“in the event of a fault; in normal operation its
value is „0“.
The remote alarm is carried in POH byte G1 (bit 5) for VC-3 and VC-4.
For VC-1 and VC-2, the remote alarm is carried in POH byte V5 (bit 8).
17
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
b) Section-RDI
If the STM-N multiplexer receives an AIS or no valid signal, it inserts the RDI
code in the opposite direction.
4 AIS
a) Definition
In the synchronous hierarchy, the STM-1 frame is fully retained even in the
event of an AIS. A distinction is made between the section AIS and the path
AIS.
b) Path AIS
These permanent one signals are carried in the STM-1 as valid tributaries.
c) Section AIS
Section AIS is set if the entire STM-1 or STM-N has failed. It is indicated in
byte K2, of which bits 6, 7 and 8 are set to „1“.
5 Examples
Fig. 13
The three B1 are generated in the Regenerator Section, and monitor the STM –N
frame after scrambling. This B1, BIP 8 code is subsequently inserted in the B1
position of the RSOH in the next frame, before scrambling. this byte is then
evaluated and regenerated along the route at each Multiplexer and Regenerator.
Fig. 14
19
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
The three B2 are generated prior to scrambling over the entire STM-1 in the
STM-N signal, but not on the first three rows of the SOH (=RSOH). The B2
monitor individual STM-1 signals on the multiplex section; they are only
generated (TRANSMITTER) and evaluated (RECEIVER) in MUX systems.
Fig. 15
B1 - code errors are only indicated in those MUX/REG systems which are
contained in the faulty regenerator section.
B2 - code errors are only indicated in those MUX systems which are
contained in the faulty multiplex section.
20
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
Fig. 16
Example 1
Fig. 17
Example 2
Fig. 18
21
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
Example 3
Fig. 19
Example 4
Fig. 20
Example 5
Fig. 21
22
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
REI is sent in the backward direction, if there are code errors (bit errors) in
the incoming signal of the local receiver (MUX).
Fig. 22
Path REI
Fig. 23
23
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
Section REI
Fig. 24
Example REI
Fig. 25
Since MUX 2 detects a bit error rate SD in bytes B2 and B3, there is an error
report due to which Path REI and Section REI is indicated in MUX1.
24
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
RDI is reported in the backward direction in the case of urgent line alarms.
Fig. 26
B3 SD B2 LOS
25
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
Example RDI
Fig. 27
AIS is sent to the forward direction, if urgent line alarms were detected in the
MUX/REG.
Fig. 28
26
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
Path AIS
e.g. with VC-4 the entire AU-4 including the pointer is set to "1".
Section AIS
27
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
AIS is sent in the forward direction if the following conditions were detected
in the MUX/REG:
28
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
Fig. 31
The last SDH MUX (MUX 3) also sends AIS to the PDH device.
MUX 2 sends Section RDI and Path RDI for paths #1, #2 and #3 to MUX 1.
MUX 3 sends Path FERF for channel #4 , which is switched through until the
end of the path (MUX1).
5.4 Summary
29
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
Error Report REI Remote Error Indication (previously called FEBE Far
End Block Error)
• Path RDI is sent in the backward direction of the respective path in the
following cases:
30
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
- -> SD
- -> no signal in the VC
- -> wrong path trace in the VC POH
- -> Path AIS already received in the path
31
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
6 Exercises
4. Which byte is used to monitor the VC4 and VC3 path with BIP?
5. Which byte and bits are used to monitor the VC12 path with BIP?
32
TS12TEC05En
Chapter 7: Monitoring, Maintenance and Control in the SDH
7 Solution
Bit-interleaved parity
B1
B2
4. Which byte is used to monitor the VC4 and VC3 path with BIP?
B3
5. Which byte and bits are used to monitor the VC12 path with BIP?
Path AIS
Section AIS
33
TS12TEC05En
Chapter 8: Appendix
Chapter 8 Appendix
Aim of study
This chapter introduces ITU-T Recommendation list, multiplex section overhead bytes K1
& K2, SONET and IP over SDH.
Contents Pages
1
TS12TEC05En
Chapter 8: Appendix
Chapter 8
Appendix
5
TS12TEC05En
Chapter 8: Appendix
2.1 K1 Byte
6
TS12TEC05En
Chapter 8: Appendix
2.2 K2 Byte
0 1+1
1 1: n
Bits 6-8 Indicate mode of operation
111 MS-AIS
110 MS-RDI
101 Provisioned mode is bi-directional
100 Provisioned mode is unidirectional
011 Future use
010 Future use
001 Future use
000 Future use
3 SONET
3.1 Introduction
7
TS12TEC05En
Chapter 8: Appendix
3.2 Background
Before SONET, the first generations of fiber optic systems in the public
telephone network used proprietary architectures, equipment, line codes,
multiplexing formats, and maintenance procedures. The users of this
equipment – Regional Bell Operating Companies and inter-exchange carriers
(IXCs) in the U.S., Canada, Korea, Taiwan, and Hong Kong – wanted
standards so they could mix and match equipment from different suppliers.
The task of creating such a standard was taken up in 1984 by the Exchange
Carriers Standards Association (ECSA) to establish a standard for connecting
one fiber system to another. This standard is called SONET for Synchronous
Optical NETwork.
8
TS12TEC05En
Chapter 8: Appendix
STS-1 is a specific sequence of 810 bytes (6480 bits), which includes various
overhead bytes and an envelope capacity for transporting payloads. It can be
depicted as a 90 column by 9 row structure. With a frame length of 125 µs
(8000 frames per second), STS-1 has a bit rate of 51.840 Mb/s. The order of
transmission of bytes is row-by-row from top to bottom, left to right (most
significant bit first). The first three columns of the STS-1 frame are for the
Transport Overhead. The three columns each contain nine bytes. Of these,
nine bytes are overhead for the Section layer (for example, Section Overhead),
and 18 bytes are overhead for the Line layer (for example, Line Overhead).
9
TS12TEC05En
Chapter 8: Appendix
Fig. 1
4 IP over SDH
4.1 Overview
The objective is quite clear. Service Providers require a mechanism that lets
them deliver the proper services where and when their customers need them.
Data traffic is increasing dramatically whilst carriers will enjoy to use the
existing circuit-switched equipment. Although the combination of data and
voice sounds to be incompatible, the reality of both networks is changing.
New services like voice and video over IP on the one hand and the rapidly
increasing bandwidth supply on the other suggest this combination.
LANs (Local Area Networks) are mostly based on CSMA/CD (carrier sense
multiple access/collision detect) generally referred to as Ethernet. Ethernet
speed has been increased from 10Mbps to 100Mbps (Fast Ethernet).
Most of today’s equipment automatically adjusts to the right data rate (auto-
sensing) and is designed to work with twisted pair (UTP) and fiber media
(100BaseT-FS).
Gigabit Ethernet builds on top of the Ethernet protocol but increases speed
tenfold over Fast Ethernet to 1000Mbps. All participants of a network are
grouped into so called LAN segments or Collision Domains. Physically all
stations within a LAN segment are connected to one common Hub.
Thus each station contends with all others for access to the network. If
multiple stations send out packets simultaneously, a collision occurs, which
corrupts the data. The more participants in a collision domain are, the more
collisions occur and the lower the data throughput of a LAN segment is.
11
TS12TEC05En
Chapter 8: Appendix
4.2.2 Bridges
Fig. 2
Bridges keep local traffic within a particular LAN segment while allowing
packets destined for other segments to pass through. This process is called
filtering. To increase the throughput within a dedicated LAN segment, the
segment can be subdivided into two sub segments combined via bridges,
creating two separated collision domains and thus minimizing the probability
of collisions.
Ethernet specifies the data link (layer 2) (with the MAC sublayer) of the ISO
protocol model, while IP (Internet Protocol) and TCP (Transfer Control
Protocol) in turn specify the network (layer 3) and transport (layer 4) portions
and allow communication services between applications.
12
TS12TEC05En
Chapter 8: Appendix
4.2.3 Switches
Fig. 3
13
TS12TEC05En
Chapter 8: Appendix
4.2.4 Router
Fig. 4
14
TS12TEC05En
Chapter 8: Appendix
4.2.5 Latency
Such delays as the result of queuing are variable because of the bursty nature
of IP traffic. The higher those bursts are, the longer the delays.
In fact, studies of IP networks show that traffic patterns are “self linear”, like a
fractal. Traffic still has the same burstiness, no matter how large or how small
the aggregate channel is. There is no smoothing of traffic peaks and valleys as
with the combination of large numbers of voice phone calls.
15
TS12TEC05En
Chapter 8: Appendix
Fig. 5
The bandwidth limitations of the Internet, as well as its high latency and slow
response time, have to be overcome. Network managers have to employ
appropriate routing protocols that conserve bandwidth and/or reserve network
resources and implement flow control.
4.3.1 Tunneling
POS (Packet over SDH/SONET) is a high speed WAN transport, that leaves
LAN traffic in its native format. It is a serial link between two access points
like any other - only much more reliable and a whole lot faster.
16
TS12TEC05En
Chapter 8: Appendix
With POS, IP Traffic runs over PPP with the resulting frame embedded into
HDLC-like framing (High-level Data Link Control), just it would like any
other type of WAN- circuits-like leased lines. These link layer protocols in
turn run directly over SDH.
Fig. 6
Fig. 7
17
TS12TEC05En
Chapter 8: Appendix
Fig. 8
18
TS12TEC05En
Chapter 8: Appendix
Fig. 9
With the increasing rate of data streams Gigabit Ethernet comes along with,
coping with the biggest SDH containers, which only offer 155 Mbit/s,
problems are encountered, which need to be resolved. Standard SDH-
Interfaces for IP use multiple independent Virtual Containers which allow the
transport of data via established SDH-networks. Those solutions are offered
by any important IP-vendor.
Fig. 10
The biggest advantage is, that the transport of data is supported by any
established SDH-network even via third party networks (Cross Domain).
Because of the independence of the different transport channels, transport
planning remains highly flexible. Unfortunately additional processing effort in
the appropriate data machines comes along, which reduces data throughput
and subsequently leads to loss of performance on the one hand and to highly
priced equipment on the other.
20
TS12TEC05En
Chapter 8: Appendix
Fig. 11
The advantages are lower pricing and better performance due to higher
throughput. But contiguous concatenation requires support in each
intermediate network element, which is less supported in established SDH
networks and nearly impossible to maintain in multi carrier topologies.
21
TS12TEC05En
Chapter 8: Appendix
Fig. 12
22
TS12TEC05En
Chapter 8: Appendix
Fig. 13
With all these features SDH is the ideal transport network for IP wide
area connectivity.
23
TS12TEC05En
Chapter 8: Appendix
Fig. 14
But to become effective this needs label switch routers entirely integrated in
the network elements, working directly on the switched circuit paths (VC-n).
This enables Traffic Engineering to use the knowledge of path utilization
within the network to divert traffic avoiding congestion and overload of paths.
24
TS12TEC05En
Chapter 8: Appendix
Normal router cores suffer from the lack of scalability and bad exploitation of
the network capacity. IP-over-ATM topologies are expensive and complex
caused by the additional cell tax and the co-ordination and management of two
separate networks. Scalability should be proven up to STM-16 and higher.
All these features and more are gained by an SDH backbone network with
integrated label switch routers.
25
TS12TEC05En