You are on page 1of 88

Internal Use Only▲

Basic Principles of SDH

Pre-sales Comm. And Tech. Support, OTPD

Pang Lipeng

<ZTE corporation copyright reserved,No spreading


Outline Internal Use Only▲

▼ Overview to SDH

▼Rate and frame structure

▼Multiplexing structure and procedures

▼SDH network protection

▼ SDH network synchronization

<ZTE corporation copyright reserved,No spreading


Add/drop 2Mbit/s signals Internal Use Only▲
in PDH and SDH systems
O E
Demultiplexing

Multiplexing
/ /

Demultiplexing
E O

Multiplexing
Demultiplexing

Multiplexing
2Mbit/s ( electrical signals )

155Mb/s 155Mb/s
ADM
Optical Optical
interface interface
2Mbit/s ( electrical signals )
<ZTE corporation copyright reserved,No spreading
SDH feature Internal Use Only▲
-- plentiful overhead bytes

 1. SDH system is an intelligent equipment with powerful self-healing


function. SDH NMS and dynamic configuration with intelligent chec
k contribute to easy self-healing of SDH network. When a fault occu
rs to the equipment or system, the services can be recovered rapidly,
greatly improving network reliability and lowering maintenance cos
t.
 2. SDH system has good network management function. The overhe
ad bytes (1/10 of the total capacity) in the SDH frame may meet the
present requirements in the alarm, performance supervision, networ
k configuration, switching and orderwire, and can be extended furth
er to satisfy the future requirements in the supervision and NM.
 SDH advantages: Synchronous multiplexing, standard optical interf
ace and powerful NM.

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

SDH shortcomings:
1. The frequency band utilization rate of SDH
is lower than that of PDH.
2. The pointer adjustment makes the
equipment and interfaces more complex.
3. The software control function easily causes
major faults.

<ZTE corporation copyright reserved,No spreading


Outline Internal Use Only▲

▼ Overview to SDH

▼Rate and frame structure

▼Multiplexing structure and procedures

▼SDH network protection

▼ SDH network synchronization

<ZTE corporation copyright reserved,No spreading


SDH rates Internal Use Only▲

Name SDH level SONET level Standard rate

155M STM-1(1920CH) OC-3/STS3(1440CH) 155.520Mbit/s

622M STM-4 OC-12/STS-12(8046CH) 622.080Mbit/s

2.5G STM-16 OC-48/STS-48(32356CH) 2488.320Mbit/s

10G STM-64 OC-192/STS-192 9953.280Mbit/s


40G STM--256 OC-576 39813.120Mbit/s

STM- Synchronous transfer mode

<ZTE corporation copyright reserved,No spreading


STM-1 frame structure Internal Use Only▲

8000 frames/s

capacity = 9 ×270 bytes

SOH 1
2
9 rows AU-PTR PAYLOAD
SOH ( with POH )
( section o
verhead )

9 columns
270 columns (byte)

<ZTE corporation copyright reserved,No spreading


Frame structure Internal Use Only▲

STM-N frame structure


9270N bytes
125s
1
SOH
3 Transmission
4 AU pointer SDH payload direction
5
( with POH
SOH )

Frame period,
frame frequency 9
block and rate
9N 261 N
<ZTE corporation copyright reserved,No spreading
Byte interleave synchronous Internal Use Only▲
multiplexing

Byte interleaver multiplexer


t

STM-1
Signal “A”
t

STM-1
Signal “B”
STM-4
STM-1 signal
Signal “C” (4×STM-1)

STM-1
Signal “D”

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

1. Information payloads --They contain various information blocks and


some POH bytes used for channel performance supervision,
management and control.
2. Section overheads--They are the additional bytes ensuring the
normal and flexible transmission of information payload. They
provides the frame synchronization and network OAP bytes. SOH
consists of RSOH and MSOH. RSOH terminates in the regenerator,
and MSOH transparently goes through the regenerator and is
assembled/dissembled in AUG.
3. AU-PTR --It indicates the accurate position of the first byte of
information payload in STM-N frame, and employs the pointer
adjustment technique to resolve the clock deviation of network node
so that the information payload can be detached properly at the
receiving end of SDH system.

<ZTE corporation copyright reserved,No spreading


SDH network segment modelInternal Use Only▲

MS MS

Tributary RS RS RS Tributary
signals signals

SDH TM SDH DXC SDH TM


REG REG

VC demultiplex
VC multiplex PATH
ing
ing

Path, MS and RS

<ZTE corporation copyright reserved,No spreading


SOH bytes Internal Use Only▲

STM-1 SOH bytes


9 columns
A1 A1 A1 A2 A2 A2 J0 * *
B1   E1  F1   RSOH
D1   D2  D3
9 AU PRT
B2 B2 B2 K1 K2
rows
D4 D5 D6
D7 D8 D9 MSOH
D10 D11 D12
S1 M1 E2  

<ZTE corporation copyright reserved,No spreading


Description for SOH byte Internal Use Only▲
 framing bytes: A1, A2 bytes identifies the initial location of the fram
e. The byte code pattern are defined as A1: 11110110 ( F6H ) A2: 0010
1000 ( 28H ) (transparent transmission)

RS trace byte: J0


It repeatedly transmits the section AP identity to assure the receiver of t
he connection with the receiver assigned. The section AP identity adopts the f
ormat in section 3 of ITU-T G.831, that is, use a 16-byte frame to transmit th
e section AP identity.

byte number 8bit value note: the first byte is the initial l
1 1 C1 C2 C3 C4 C5 C6 C7 ocation identity of the frame. C1
2 0 X X X X X X X -C7 is the calculation result of C
3 0 X X X X X X X RC-7 in the previous frame. The
. …………………………… other 15 bytes transmit the secti
16 0 X X X X X X X on AP identity.
<ZTE corporation copyright reserved,No spreading
Internal Use Only▲

•Data Communication Channel (DCC): D1—D12


SOH DCC is the transmission link of SDH management network (SMN).
D1~D3 byte transmits OAM information between RS terminals.
D4~D12 byte transmits OAM information between MS terminals.
One purpose of SDH network management control is to implement the fast
distributed control. The best route table calculated by NMS can be deliver
ed quickly to NE via DCC at any time. DCC is the SDH physical channel a
nd has the protocol stack Qecc.

•Orderwire channel: E1 and E2


E1 and E2 offers the orderwire voice channel. E1 is used for the RS order
wire and E2 for the orderwire between terminals.

•User channel: F1
It is for the network provider. It is used for the special maintenance of syst
em operator, e.g., providing temporary 64kb/s data/voice channel.

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

•B1: BIP-8
B1 supervises the MS bit error in BIP-8 method. After all the bytes
scrambled in the previous frame of STM-N make the BIP-8 check, the
result is in the B1 byte before unscrambled in the present frame.
The bit error supervision is one of SDH characteristics. It can
automatically supervise the MS bit error in a simple way. But this mode
can not check out the even number of bit errors in one supervise code
group. (This case seldom occurs, but a certain error exists.

•B2: BIP-N24
It makes the online of supervision of the MS bit error in the BIP-N24
method. The BIP-N24 value of all bytes in the previous STM-N frame
is in B2 before scrambled in the present frame. The first three lines of
SOH is not for check.

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

APS channel: K1 and K2 ( b1-b5 )


The two bytes are used for APS instruction. (K1 indicates the switching
type and channel No., and K2 indicates the channel No. switched to the
protection channel.)
•MS-RDI byte: K2 (b6-b8)
MS-RDI sends back an instruction signal to the transmitting end, indica
ting that the receiving end finds an incoming fault or is receiving MS-AI
S. After unscrambled, K2 (b6-b8) forms “110”, that is, MS-RDI.
•Synchronization state: S1 ( b5-b8 )
S1 (b5-b8) transmits the synchronization state information, that is, the s
ynchronization state of the upstream station is transmitted to the downs
tream station via S1 (b5-b8).
S1 (b5-b8)
b5-b8) Clock level
0000 Unknown quality
0010 G.811 reference clock
0100 G.812 exchange slave clock
1000 G.812 local slave clock
1011 SETS
1111 Not for clock synchronization
<ZTE corporation copyright reserved,No spreading
Internal Use Only▲

MS-REI: M1
M1 is used for MS-REI. It sends the quantity of the bit errors
checked out by B2.

Bytes related to transmission media: 


One-fiber unidirection, one-fiber bidirection, etc.
Backup bytes -Free byte (for future use in the international
standard)
(Note: The bytes with “*” will not be scrambled.

STM-N(N>1) SOH
It is formed in the byte interleaving mode. The SOH in the fir
st STM-1 is remained, but the SOH in other N-1 STM-1 is re
mained only with byte A1, A2 and B2.
<ZTE corporation copyright reserved,No spreading
STM-4 SOH bytes Internal Use Only▲

36 byte

AU PRT
9
rows

<ZTE corporation copyright reserved,No spreading 15


STM-16 SOH bytes Internal Use Only▲

144 bytes
R
A1 A1 A1 A1 A2 A2 A2 A1 J0/C1 Z0/C1 Z0/C1 
S
B1   E1  F1   
O
D1   D2  D3 H
9 AU PRT
rows B2 B2 B2 B2 K1 K2
D4 D5 D6
M
S
D7 D8 D9
O
D10 D11 D12
H
S1 E2   

注:新协议中有些字节用 M1 。。。
作 FEC 功能
<ZTE corporation copyright reserved,No spreading
STM-64 SOH bytes Internal Use Only▲

576 bytes
R
A1 A1 A1 A1 A2 A2 A2 A1 J0/C1 Z0/C1 Z0/C1 
S
B1   E1  F1   
O
D1   D2  D3 H
AU PRT
9
rows B2 B2 B2 B2 K1 K2
D4 D5 D6
M
S
D7 D8 D9
O
D10 D11 D12
H
S1 E2   

注:新协议中有些字节用 M1 。。。
作 FEC 功能
<ZTE corporation copyright reserved,No spreading
FEC (Forward Error Correction) Internal Use Only▲

Some bytes in SOH of STM-16 ~ STM-256 are used for


FEC. FEC means that the signals are coded in a certain
format before transmission, then they are decoded with a
specific algorithm at the receiver in order to find out the
bit errors and correct them.
ITU-I G.975, issued in 1996, employs FEC as a part of
the cable communication standards. The new draft,
passed in April, 2000, is added with FEC as an option in
the 10Gbit/s system.

<ZTE corporation copyright reserved,No spreading


Outline Internal Use Only▲

▼ Overview to SDH

▼Rate and frame structure

▼Multiplexing structure and procedures

▼SDH network protection

▼ SDH network synchronization

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

Multiplexing structure and procedures


×N ×1
VC-4 140Mb/s
STM-N AUG AU-4 C-4
×3
×3 TUG-3 ×1 TU-3 VC-3
45Mb/s
AU-3 VC-3 C-3
×7 ×7 34Mb/s
×7 ×1 6.3Mb/s
TUG-2 × 1 TU-2 VC-2 C-2
×3
2Mb/s
TU-12 VC-12 C-12
×4 ×4
1.5Mb/s
TU-11 VC-11 C-11

C TUG Mapping
VC AUG
Positioning
TU STM
Multiplexing
AU

Multiplexing structure in G.707


<ZTE corporation copyright reserved,No spreading
Mapping structure in China Internal Use Only▲

Pointer processing

Positioning

Multiplexing

Mapping
注 2: VC-2-mc 主要用于传输图象等业务,具体技术
STM-1 capacity:
实施方法待定。大约是 1. 1×140M
4Mb/s34Mb/s signal
之间。而 SD 2. 3×34M signals
H 可为其提供 VC-2 、 VC-2 的级联等方式来传输。 图 3.2
3. 63×2M signals
<ZTE corporation copyright reserved,No spreading
Internal Use Only▲

Pointer processing
Positioning
Multiplexing New multiplexing structur
Mapping e in G.707
<ZTE corporation copyright reserved,No spreading
Byte interleaving multiplexing and Internal Use Only▲
byte block multiplexing

Byte interleaving multiplexing:


(4×AUG-1 are multiplexed into 1×AUG-4)

Byte block multiplexing: When AUG-N (N≧4), AUG-16 is

Byte block interleaving multiplexing:

<ZTE corporation copyright reserved,No spreading


Multiplexing unit Internal Use Only▲

1. Container (C)
C contains service signals at various rates.
G.707 specifies five standard containers for PDH rate
series: C-11, C-12, C-2, C-3 and C4.
PDH series indicate the payload by H-n, which is divided
into different levels.

C-n

<ZTE corporation copyright reserved,No spreading


2. VC Internal Use Only▲

VC supports the connection at the SDH path layer. VC,


composed of payload (C output) and POH, is the infor
mation terminal of SDH path.
VC-n=C-n+VC-n POH
LOVC: VC-1 and VC-2
VC-3 (VC-3 - TU-3 - TUG-3- VC-4)
VC-n
HOVC: VC-4
POH
VC-3 (in AU-3)
C-n

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

Service signal/PDH signal, C and VC

POH
VC
=
Adjustment

=
bit
C

Service/
PDH signal

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

VC parameters

VC VC-4 VC-3 VC-2 VC-12 VC-11


Frame period and multiframe (s) 125 125 500 500 500
Frame frequency and multiframe fr
equency (Hz) 8000 8000 2000 2000 2000
Structure 2619 859 4(129-1) 4(49-1) 4(39-1)
Capacity (byte number) 2349 765 428 140 104
Rate (Mbit/s) 150.336 48.960 6.848 2.240 1.664

<ZTE corporation copyright reserved,No spreading


3. TU and TUG Internal Use Only▲

TU adapts the low-order path signals into the high-order


path layer (e.g., VC-4).
Four TUs are available, i.e., TU-n (n=11, 12, 2 and 3).
TU-n consists of a LOVC-n and a TU-n PTR.
TU-n =VC-n+TU-n PTR
TU-n PTR points the shift between VC-n payload start p
oint and HOVC frame start point.
TUG is composed of one or several TUs at the fixed locati
on of HOVC payload.

<ZTE corporation copyright reserved,No spreading


4. AU and AUG Internal Use Only▲

AU adapts the HO path signals into MS layer.


AU-3 and AU-4 are available.
AU-n (n=3, 4) comprises a HOVC-n and a AU-n PTR. Fo
r example:
AU-n =VC-n+AU-n PTR
AU-n PTR points the shift between VC-n payload start po
int and MS start point.
AUG is composed of one or several AUs at the fixed locati
on of STM-N payload.
One AU is composed of one AU-4 or three AU-3 in the by
te interleaving multiplexing mode.
<ZTE corporation copyright reserved,No spreading
Internal Use Only▲

TU and AU parameters

TU and AU AU-4 AU-3 TU-3 TU-2 TU-12 TU-11


Frame period and multiframe (s) 125 125 125 500 500 500
Frame frequency and multiframe fr
equency (Hz) 8000 8000 8000 2000 2000 2000
Structure 2619+9 819+3 859+3 4(129) 4(49) 4(39)
Capacity (byte number) 2358 786 768 432 144 108
rate ( Mbit/s ) 150.912 50.304 49.152 6.912 2.304 1.728

<ZTE corporation copyright reserved,No spreading


Multiplexing step 1 Internal Use Only▲

-mapping
Mapping synchronizes tributary signals with the
corresponding VC so that VC can send, multiplex and cross
signals independently. (Only STM-1 has the mapping
function.)
1. Mapping mode
The mapping can be divided into asynchronous mapping
and synchronous mapping by the synchronization state
between mapped signals and SDH network.
Asynchronous mapping --The pointer adjusts the payload to
adapt the signals into SDH frame, independent of signal
features and network synchronization. The pointer adjusts
the frequency or phase difference to synchronize the signals
without slide buffer. As a common mapping mode, it is
necessary in the long transition from PDH to SDH.
<ZTE corporation copyright reserved,No spreading
Internal Use Only▲

Synchronous mapping --The mapped signals must be stric


tly synchronous with SDH network. 125us (the duration of
one frame) slide buffer is required to reduce the slide loss
in the synchronization. The slide buffer causes 150us dela
y to the multiplexer, but 10us delay to the demultiplexer.
Synchronous mapping are categorized as bit synchronous
mapping and byte synchronous mapping.

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

Comparison between asynchronous mapping


and synchronous mapping
Mapping Asynchronous Synchronous mapping
node mapping
Bit synchronous Byte synchronous mapping

It is a common mode, It is independent of 2Mb/s signals should be


independent of signal signal features, but it framed according to G.7
features, network requires the network 04. It requires the networ
synchronization and synchronization and k synchronization and 12
characteristics slide buffer. The 125us slide buffer. 5us slide buffer. The del
The delay caused is ay caused is more than 1
minimum delay more than 125us
caused is 10us. The 25us (multiplexer). N×6
(multiplexer). 4kb/s signals can be acce
primary group N×64kb/s signals can
mapping can not not be accessed ssed directly because the
access directly directly because the de-framing is not require
N×64kb/s signals de-framing is required. d. The interface is the m
because the de- The interface is ost complex.
framing is required. comparatively simple.
The interface is
simple.
<ZTE corporation copyright reserved,No spreading
C-4 is mapped into VC-4 Internal Use Only▲

J1
B3
C2
G1
HP-POH VC-4 PAYLOAD
F2
9 rows×1 column
H4
F3
K3
N1

260 columns (byte)

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

1. Add VC-4 POH


2. HPOH
J1: Path trace byte
It repeatedly sends the HP access point identifier whose
content is decided by the transmitter and receiver, thus
the transmitter may confirm the connection with the
specified receiver. J1 location is pointed by the related
pointer.
B3: Path BIP-8 code
It comes from the interleaving parity calculation of all
VC-4 bits before scrambling.

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

F2 and F3: Path user byte


They offers the orderwire communication between path units.
H4: TU indication byte
It indicates the payload multiframe type and payload location.
K3 (b1-b4): APS path byte
It sends HP APS signals.
K3 (b5-b8): For future use (backup)
N1: Network operator byte
It monitors the HP serial connection.

<ZTE corporation copyright reserved,No spreading


Multiplexing step 2 Internal Use Only▲

-Positioning
Positioning refers to a process to take the frame deviation info
rmation into TU or AU, that is, TU PTR (AU PTR) attached t
o VC indicates and determined the LOVC frame start point i
n the TU payload ( the HOVC frame start point in the AU pa
yload.
SDH pointer function:
•When the network works synchronously, the pointer aligns the phases of
synchronous signals.
•When the network dismatches, the pointer aligns the frequencies and pha
ses. When the network is out of synchronization or works asynchronously,
the pointer traces and aligns the frequencies.
•The pointer can also accept the frequency jitter and wander in the netwo
rk.
<ZTE corporation copyright reserved,No spreading
Internal Use Only▲

VC-4/VC-3 positioning in AU-4/TU-3


AU-4=VC-4+AU-4 PTR
TU-3=VC-3+TU-3 PTR

AU-4 PTR=H1 , Y , Y , H2 , 1* , 1* , H3 , H3 ,
H3
Y=1001SS11 : SS --bit without specific value
1*=11111111

TU-3 PTR=H1 , H2 , H3

<ZTE corporation copyright reserved,No spreading


Multiplexing step 3 Internal Use Only▲

-synchronous multiplexing

Multiplexing refers to the adaption of several LP signals (TU-12


) into HP signals (VC4) or several HP signals (AU-4) into STM-
N frame, that is, adapt TU into VC or AU into STM-N in the byt
e interleaving mode.
For example: TU12(×3) → TUG2(×7) → TUG3(×3) → VC4
For example: AU-4(×1) → AUG(×N) → STM-N
As VC tributaries are synchronous due to TU and AU pointers, t
he process is called the synchronous multiplexing.
Multiplexing mode: Byte interleaving mode.

<ZTE corporation copyright reserved,No spreading


Byte interleave synchronous Internal Use Only▲
multiplexing
t

Byte interleave multiplexer


STM-1
signal “A”
t

STM-1
signal “B”
STM-4
STM-1 signal
signal “C” (4×STM-1)

STM-1
signal “D”

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

For example: Multiplex N×AUG into STM-N

1 AUG 261 1 AUG 261 1 AUG 261

1 9 1 9 1 9
#1 #2 #N

123…N 123…N

123…N 123…N

N 9 N 261
STM-N
<ZTE corporation copyright reserved,No spreading
Multiplex 2Mbit/s into STM-1 (1)Internal Use Only▲

2048kbit/s frame

TS0 TS1 TS2 TS15 TS16 TS17 TS18 TS31

C-12 frame C-12 multiframe TU-12 frame VC-12 frame

V1V5 R 1 V2J2 R 1 V3N2 R 1 V4K4 R 1

99

32 R 32 R 32 R 32 R

<ZTE corporation copyright reserved,No spreading


Multiplex 2Mbit/s into STM-1 (2)Internal Use Only▲

 3 个 TU-12 通过字节间插复用成 1 个 TUG-2 的信息结构


TU-12 TU-12 TU-12
a b c
1 2 3 4 1 2 3 4 1 2 3 4

99 a b c a b c

12
12

TUG-2 information structure

<ZTE corporation copyright reserved,No spreading


Multiplex 2Mbit/s into STM-1 (3)Internal Use Only▲
 Multiplex 7×TUG-2 into 1 × TUG-3 in the byte interleaving mode
1 1 1 1 1 1 1 1 1 1 1 1

2 2 2 2 2 2 2 2 2 2 2 2

Insert bytes 3 3 3 3 3 3 3 3 3 3 3 3
TUG-2 ( 1 ) TUG-2 ( 2 ) TUG-2 ( 7 )

1 1 1 1
2 2 2 2
3 3 3 3
99 4 4 4 4
5 5 5 5
6 6 6 6
7 7 7 7

84
8486
86
TUG-3 information structure
<ZTE corporation copyright reserved,No spreading
Multiplex 2Mbit/s into STM-1 (4)Internal Use Only▲

Multiplex 3×TUG-3 into C4 in the byte interleaving mode

C4 structure

<ZTE corporation copyright reserved,No spreading


Multiplex 2Mbit/s into STM-1 (5)Internal Use Only▲
J1
B3 Map C-4 intoVC-4
C2
G1
HPOH VC-4 PAYLOAD
F2
9 rows×1 column
H4
F3
K3
N1

260 columns (byte)


 In order to supervise the 140Mb/s path signals, it is required in the
multiplexing to add a column of VC4 POH before C4 frame. Then the
signals is in the VC4 structure.
<ZTE corporation copyright reserved,No spreading
Multiplex 2Mbit/s into STM-1 (6)Internal Use Only▲

 Add AU-PTR to VC-4 to make VC-4 become AU-4.

J1
B3
C2
H1 Y Y H2 1 1 H3 H3 H3 G1
F2 VC-4 PAYLOAD
H4
F3
AU-4 PTR consists of 9 K3
bytes from column 1~9 a N1
t row 4 of AU-4 frame. 261 columns (byte)

<ZTE corporation copyright reserved,No spreading


Multiplex 2Mbit/s into STM-1 (7)Internal Use Only▲

RSOH

STM-1 PAYLOAD
9 rows
MSOH
P
O
AU-PTR H VC-4 PAYLOAD

9 rows×1 column

261 column

 Add RSOH and MSOH to form STM-1.

<ZTE corporation copyright reserved,No spreading


Mapping and multiplexing diagram
Internal Use Only▲

× 3 multiplexing

× 3 multiplexing
AU PTR LD POH
× N × 1
STM-N AUG-4 AU-4 VC-4 TUG-3 TUG-2 TU-12 VC-12 C-12 2Mb/s

TU PTR code speed


×N multiplexing adjustment
HD POH
×7 multiplexing

<ZTE corporation copyright reserved,No spreading


STM-1 rate adjustment Internal Use Only▲

49.536Mbit/s
150.912Mbit/s 2.304Mbit/s
150.336Mbit/s 2.176Mbit/s

× N × 1
STM-N AUG-4 AU-4 VC-4 TUG-3 TUG-2 TU-12 VC-12 C-12 2Mb/s

2.048Mbit/s
155.520Mbit/s 2.240Mbit/s
6.912Mbit/s

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲
Layer standard

STM-N

STM-1

AU-4

VC-4

TUG-3,2

TU-12

VC-12

C-12

Service Telephone and databas


e
Multiplexing Positioning Mapping
<ZTE corporation copyright reserved,No spreading
Outline Internal Use Only▲

▼ Overview to SDH

▼Rate and frame structure

▼Multiplexing structure and procedures

▼SDH network protection

▼ SDH network synchronization

<ZTE corporation copyright reserved,No spreading


SDH network topology Internal Use Only▲

Link Ring

Star
Mesh

Tree

<ZTE corporation copyright reserved,No spreading


SDH network protection Internal Use Only▲

and self-healing
Self-sealing: When a fault occurs to the network, the servic
e transmission can recover automatically in such a short ti
me that a user can not find it.

Cross function
Redundant Network self-
healing

intelligence

<ZTE corporation copyright reserved,No spreading


SDH network protections Internal Use Only▲

MS 1 + 1 protection
MS 1 : 1 protection
Link network MS 1 : n protection
( n<=14 )

2-fiber unidirectional path protection ring


Ring network 2-fiber unidirectional MS protection ring
2-fiber bidirectional MS protection ring
4-fiber bidirectional MS protection ring

Dual-Node interconnection (DNI)

<ZTE corporation copyright reserved,No spreading


SDH ring protections Internal Use Only▲

Ring protection categorization:


By fiber quantity: 2-fiber and 4-fiber
By service direction: Unidirectional and bidirectional
By protection object level: Path protection and MS protection
Common ring protection:
2-fiber unidirectional path protection ring
2-fiber unidirectional MS protection ring
2-fiber bidirectional MS protection ring
4-fiber bidirectional MS protection ring

<ZTE corporation copyright reserved,No spreading


Several definitions Internal Use Only▲

There are two kinds of SDH protection switching ring: MS protection


switching ring and path protection switching ring. What are the most
commonly used are 2-fiber unidirectional path protection ring, 2-fiber
unidirectional MS protection ring, 2-fiber bidirectional MS protection
ring and 4-fiber bidirectional MS protection ring. Before the principles
of these rings is described in detail, several definitions should be
explained: MS protection switching, path switching, unidirectional ring
and bidirectional ring.
What are MS and path? Simply speaking, MS refers to the section
between two multiplexers (or the equipment with multiplexing
functions), and the multiplexed low-rate signals are called the path.
An extra channel is required to protection signals in the transmission.
For the MS switching ring, the protection are based on MS, the
switching depends on the MS signal quality between a pair of nodes, and
all MS services are switched to another channel in the switching.
However, for the path switching ring, the protection is based on path,
and the switching depends on the quality of one channel.
<ZTE corporation copyright reserved,No spreading
Internal Use Only▲

Unidirectional ring and bidirectional ring

Unidirectional ring Bidirectional ring

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

2-fiber unidirectional path protection ring

A A

D B D B

C C
P P

W W

倒换

a ) in normal case b ) in abnormal case

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

Working principles of 2-fiber ring


Two fibers respectively form internal ring and external
ring. One fiber is used to transmit service signals and the
other to protect them. The two rings are unidirectional
and transmit services in different directions. The
tributary signals from node A to node C are transmitted
simultaneously in two fibers and reach C in different
direction at one time. C receives the signals of one fiber
with better signal quality. If the connection from A to C
breaks off, the signals in W fiber will be lost, the switch
will be switched from W fiber to P fiber and receives the
signals in P fiber. Thus the signals from A to C go on
transmission.
<ZTE corporation copyright reserved,No spreading
Working principles of 2-fiber ring Internal Use Only▲

A ring has 4 fibers: Two service fibers (one for receiving and the other for
transmitting), and two protection fibers (one for receiving and the other for
transmitting). Each fiber has a changeover switch. The signals transmit from A to C
via W1 fiber clockwise, and the signals transmit from C to A via W2 fiber
anticlockwise. This is a bidirectional ring and the two protection fibers are idle.
When the connection from A to C breaks off, the changeover switches at B and C
connect W1 to P1 and W2 to P2, ensuring the continuity of the ring.
In a 4-fiber ring, the transmission directions of W1 and P2 are the same, and so are
those of W2 and P1. W1 and P2 can be integrated into one fiber W1/P2, and W2
and P1 into one fiber W2/P1. A half of W1/P2 timeslots transmit services, and the
other half are idle in the normal case and protect W2/P1 services in the faulty case.
A half of W2/P1 timeslots transmit services, and the other half are idle in the
normal case and protect W1/P2 services in the faulty case. Thus a 4-fiber ring is
simplified into a 2-fiber ring.
One half of W1/P2 timeslots transmit signals from A to C clockwise and the other
half is idle. When the connection between A and C breaks off, the changeover
switches at B and C connect the two fiber together. With the timeslot switching
technique, the signals are switched from the service timeslot of one fiber to the idle
protection timeslot of the other fiber.
<ZTE corporation copyright reserved,No spreading
Internal Use Only▲

4-fiber bidirectional MS shared protection ring

a) In the normal case b) Switching in the faulty case

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

2-fiber bidirectional MS shared protection ring

a) In the normal case b) Switching in the faulty case

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

Features and applications of self-healing rings

Advantage: The protection can be implemented easily. No


APS protocol is required and the switching is the fastest
(<30ms)
Shortcoming: The timeslots between nodes can not be used
repeatedly, so the ring transmission capacity is small. And
extra services can not be transmitted.
Ring transmission capacity: STM-N
Note: The unidirectional path protection ring found a wide
application. It is applied to the centralized services.

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

4-fiber bidirectional MS protection ring


Advantage: The timeslots between nodes can be used repeatedl
y, so the ring transmission capacity is large. And extra services
can not be transmitted via the standby fibers P1 and P2.
Shortcoming: The switching is slow because APS protocol and
cross connection are required. And the equipment should meet
some high requirements.
Ring transmission capacity: k×STM-N (k is the node quantity i
n the ring)
Note: ADM equipment in a 4-fiber ring should meet some req
uirements, e.g., system capacity, cross capacity and software fu
nction. It is applied to the distributed services.

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

2-fiber bidirectional MS protection ring


Advantage: The timeslots between nodes can be used
repeatedly, so the ring transmission capacity is large. And
extra services can not be transmitted via the standby fibers P1
and P2.
Shortcoming: The switching is slow because APS protocol and
cross connection are required. And the equipment should meet
some high requirements.
Ring transmission capacity: k/2×STM-N (k is the node
quantity in the ring)
Note: The bidirectional MS protection ring found a wide
application. It is applied to the distributed services.
<ZTE corporation copyright reserved,No spreading
Internal Use Only▲

Characteristics and applications of 3 protection rings

item Unidirectional path ring 2-fiber MS ring 4-fiber MS ring


node k k k
Line rate STM-N STM-N STM-N
ring transmission capacity STM-N k/2×STM-N k×STM-N
APS protocal no yes yes
swiching time 30ms 50-200ms 50-200ms
node cost low medium high
system complexity simple complex complex
Access network and Relay network and toll Relay network and toll
applications relay net work network (distributed network (distributed
(centralized service) service) service)

<ZTE corporation copyright reserved,No spreading


DNI protection Internal Use Only▲

DNI, based on ITU-


T G.842, is very
B(primary) D(secondary practical to the
)
services across rings.

The services from A to F are t


C(primary E(secondary) ransmitted in two ways:
)
ABCF or AB
DECF.
F

<ZTE corporation copyright reserved,No spreading


Outline Internal Use Only▲

▼ Overview to SDH

▼Rate and frame structure

▼Multiplexing structure and procedures

▼SDH network protection

▼ SDH network synchronization

<ZTE corporation copyright reserved,No spreading


Synchronization Internal Use Only▲

The synchronization is the nervous system of SDH


network.
The asynchronization between NEs in one networ
k leads to the unaligned timeslots and no proper c
onnection between transmitter and receiver.
The asynchronization between networks leads to t
he broken network communication and service dis
connection.

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

4-level clocks in ITU-T recommendation

• Reference master clock — In compliance with G.811.


• Transit exchange clock — In compliance with G.812
(transit clock at the intermediate exchange)
• End exchange clock — In compliance with G.812
(local exchange clock)
• SDH NE clock — In compliance with G.813 (clock
embedded in SDH NE)

<ZTE corporation copyright reserved,No spreading


Clock type Internal Use Only▲

1. Caesium atom clock: It has the high long-term frequen


cy stability and precision. The long-term frequency dev
iation is better than 1*10E-11, but the short-term stabil
ity is not good.
2. Quartz crystal oscillator: It has cheap clock source and
high reliability, but low long-term frequency stability.
3. Rubidium atom clock: Its stability, precision and cost i
s between the above clocks. The adjustable frequency r
ange is larger than caesium atom clock, the long-term s
tability is lower by about one magnitude, but it has exc
ellent short-term stability, low cost and 10-year service
life.

<ZTE corporation copyright reserved,No spreading


Synchronization mode Internal Use Only▲

1. Full-synchronization mode: The overall network is


synchronous with the unique PRC. Its synchronization is
highly precise but difficult. In the implementation the
hierarchical control scheme is usually adopted, that is, the
hierarchical master/slave synchronization mode.
2. Pseudo-synchronization mode: The overall network is
divided into several sub-networks, and the master clocks of
the sub-networks comply with G.811. The slave clock is
synchronous with the master clock in the sub-network. The
clocks of the sub-networks are independent of each other, but
the differences are so small that they are approximately
synchronous.

<ZTE corporation copyright reserved,No spreading


Synchronization mode Internal Use Only▲

3. Quasi-synchronization mode: After the external timin


g reference is lost, the node clock holds on. The network
synchronization quality is not good.
4. Asynchronization mode: The node clocks are differen
t from each other in the synchronization, and the service
can not go on normally, so the alarm signals are sent.
SDH network adopts the hierarchical master/slave sync
hronization mode at present.

<ZTE corporation copyright reserved,No spreading


Three working modes of slave clock inUse Only▲
Internal

master/slave synchronization mode


Normal working mode – Upper-level clock tracing and locking mode
The clock reference, traced and locked by the slave site, comes from the
upper-level site. It may be the master clock in the network, the clock from the
clock source embedded in the upper-level NE, or the GPS clock at the local
area. Comparing with the other two working modes of the slave clock, this
mode is the most precise.
Hold-on mode
After all timing references are lost, the slave clock is in the hold-on mode. The
slave site clock source uses the last frequency information, stored before the
timing reference signal is lost, as the timing reference. That is to say, the slave
clock has the “memory” function. The function can offer the timing signal
complying with the original timing reference, ensuring that the slave clock
frequency has a small deviation from reference clock frequency in a long time.
This mode is less precise than the normal working mode. The equipment
employs the memorized synchronization information, stored before 24 hours,
to keep the synchronization state. The precision is required to be 0.37ppm.

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

Free-run mode – free-oscillation mode


When the slave clock loses all external timing references and timing
reference memory, or works in the hold-on mode for a very long time, the
oscillator in the slave clock will work in the free-oscillation mode. This
mode is the worst precise. After the memorized synchronization
information, stored in the equipment, has been used for 24 hours, the
synchronization signals generated by the internal oscillator are used as
synchronization signal. The precision is required to 4.6ppm.

<ZTE corporation copyright reserved,No spreading


Synchronization network of Internal Use Only▲

China Telecom
The digital synchronization network of China Telecom integrates the
hierarchical master/slave synchronization and pseudo-synchronizatio
n, that is, the distributed timing mode.
1. PRC complying with G.811 in Beijing hierarchically controls the cl
ocks until the lowest-level slave clock, which adopts the hierarchical
master/slave synchronization mode.
2. This nation is divided into several synchronization areas. Each area
has one LPR – rubidium atom clock. LPR can receive PRC signals or
GPS signals. There are small differences in LPR between synchronou
s areas, but the differences are so small that they are approximately s
ynchronous. So it is called the pseudo-synchronization mode.
As shown in the figure, the slave clock is in Wuhan. When a fault occ
urs to the master clock (Beijing), the slave clock will replace the mast
er clock.

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

PRC
Master clock (Beijing) Slave clock (Wuhan)

GPS
GPS

Regional LPR Regional


reference clock 1 reference clock 2

Provincial provincial
exchange exchange

市 局 市 局
synchronization area 1 synchronization area 2

<ZTE corporation copyright reserved,No spreading


SDH synchronization network
Internal Use Only▲

-synchronization reference link


note: K=10;
G.811
N=20;

G.812 NE clock quantity < 60


No.1 transit
exchange
} N×G.813 SDH equipment clock
No.2 transit G.812
exchange
} N×G.813 SDH equipment clock
No.K transit G.812
exchange
} N×G.813 SDH equipment clock
<ZTE corporation copyright reserved,No spreading
Synchronization scheme Internal Use Only▲

General principle
Reduce the timing reference transmission length.
The controlled clock obtains the timing from higher-
level clock.
The node clock quantity in a synchronization reference
link is not more than 60.
Configure more than one external timing references.
Prevent the timing loop – make full use of S1 byte.
Timing information transmission – Obtain the timing
from STM-N.

<ZTE corporation copyright reserved,No spreading


SSM and S1 byte Internal Use Only▲

SSM
SSM (Synchronization Status Message) directly reflects
the synchronous timing signal level in the synchronous
timing transfer link. The messages can be used to judge
the quality level of the synchronous timing signal
received so as to control the operation state of the local
node clock, e.g., continue tracing the signal, switch the
input reference signal or change to the hold-on state.

<ZTE corporation copyright reserved,No spreading


How to use S1 byte Internal Use Only▲

ITU-T G.707 specifies SSM coding mode of STM-N


interface, which is shown with MS overhead byte S1 b5~b8.

S I b5~b8 Clock level


0000 Unknown quality
0010 G.811 reference clock
0100 G.812 transit exchange slave clock
1000 G.812 local exchange slave clock
1011 SETS
1111 Not for clock synchronization
Note: other utilizations are reserved.

<ZTE corporation copyright reserved,No spreading


Timing protection switching anInternal Use Only▲
d recovery
The equipment has more than 2 external synchronization
signal input interfaces.
A) Timing protection switching function
When the high-level external synchronization source fails,
the equipment can automatically switch to the low-level
external synchronization source.
B) Recovery function
When the high-level external synchronization source
return to normal, the equipment can obtain the timing
signals from the high-level external synchronization source.

<ZTE corporation copyright reserved,No spreading


Internal Use Only▲

Thank you!

<ZTE corporation copyright reserved,No spreading

You might also like