Professional Documents
Culture Documents
Synchronous Digital Hierarchy: A L C T E L
Synchronous Digital Hierarchy: A L C T E L
SDH
Synchronous Digital
Hierarchy
SDH
Networks
2
SDH
Telecommunication Networks Networks
3
SDH
Telecommunication Networks Networks
4
SDH
Telecommunication Networks Networks
CODING
- Before the transmission of the digital information, an action of
coding is done: each previous value (v1, v2, v3…) is converted in a
sequence of 8 bits.
- The most used codes are:
HDB3 (High Density Bipolar excess 3)
AMI (Alternate Mark Inversion)
NRZ (Non-Return to Zero)
RZ (Return to Zero)
They use some different techniques that allow to decrease the
number of problems and detect any kind of error happened during
the physical transmission. 11
SDH
Pulse Code Modulation Networks
Binary coding
100100100100..
SAMPLER QUANTISER
Binary coding
111001111101..
SAMPLER QUANTISER
NOTES:
• The final stream of bits is only a (good) approximation of the
original analogue signal
• Only the samples are used to represent the signal while the rest
of it is not transmitted
15
SDH
Notes about Frequency & Sampling Networks
- In the FDM each individual information is sent at the same time but
20
SDH
Time Division Multiplexing Networks
Signal 1 1 1
Signal 2 2 2
Signal 3 3 3
Signal n n n
1 2 3 n 1 2 3 n ...
23
SDH
“Bit” or “Byte” Interleaving Networks
channel1 a1 b1 c1 d1 e1 f1 g1 h1
channel2 a2 b2 c2 d2 e2 f2 g2 h2
channel3 a3 b3 c3 d3 e3 f3 g3 h3
channel8 a8 b8 c8 d8 e8 f8 g8 h8
8 bit = 1 byte
Bit Interleaving
-- a1 a2 a3 a4 a5 a6 a7 a8 b1 b2 b3 b4 b5 b6 b7 b8 -- --
Time-slot
Byte Interleaving
-- a1 b1 c1 d1 e1 f1 g1 h1 a2 b2 c2 d2 e2 f2 g2 h2 -- --
Time-slot
24
SDH
Synchronization Networks
Digital exchange
Clock
25
SDH
Frame Alignment Networks
The typical PCM frame has a bit rate equal to 2 Mb/s composed
of 32 channels at 8 bits every 125 microseconds.
The channel 0 is used for frame synchronization, the channel 16 is
usually used for signalling purposes while all the other channels
(1..15 and 17..31) are available for speech conversations.
Channel 0 1 15 16 17 31
27
SDH
Plesiochronous & Synchronous signals Networks
140 / 34 34 / 140
64 x 2Mbps
8/2 2/8
34 / 8 8 / 34
140 / 34 34 / 140
31
SDH
Evolution towards SDH: SYNTRAN Networks
– For this reason the project was put aside very soon.
32
SDH
Evolution towards SDH: SONET Networks
34
SDH
Multiplexing Synchronous Networks
Add Drop
Lower order signal
35
SDH
Advantages of SDH Networks
SDH allows:
• To define a world standardization: it uses a unique worldwide
hierarchy and it supports very high bit rates (155/622/... Mb/s)
• To manage also all existing PDH signals (2/8/34/45/140 Mb/s)
• To apply directly the “Drop-Insert” and “Cross-Connection”
functions: so a lower number of equipment is needed and a great
flexibility is allowed, decreasing the global costs of the
transmission networks
• To implement some “Automatic Traffic Protection” functions
• To execute advanced actions of Network Management, OAM,
Supervision and Remote Control
• To have full compatibility among equipment of different
typologies and manufacturers
• To use powerfully optical fiber properties and capacities
36
SDH
SONET/SDH paths Networks
MULTIPLEXER
REGENERATOR MULTIPLEXER RIGENERATORE MULTIPLEXER
SOURCE
DESTINATARIO
LINE
SONET frame is a block of 810 bytes sent out in a period of 125s. SONET is a
synchronous system; so the packets are sent with useful data or empty. In this way
8x810=6480 bit are transmitted 8000 time per second, for a total data rate = 51,84 Mbps.
This is the SONET basic frame and it is called STS-1 (Synchronous Transport Signal - 1)
SDH frame is a block of 2430 bytes sent out in a period of 125 s. So 8x2430=19440 bit are
transmitted 8000 time per second, and the total data rate is 155,520 Mbps.
This is SDH basic frame and it is called STM-1 (Synchronous Transport Module - 1)
41
SDH
Network Architecture Networks
MULTIPLEX MULTIPLEX
SECTION (MSOH) SECTION (MSOH)
PATH
42
SDH
Network Architecture Networks
• Payload submatrix (9x261) includes all digital frames (=Data) that SDH multiplexer
assembles starting from tributaries flows.
• To balance eventual frequency and/or phase variation, the start position of these
structures can float within a determinate range into several payload submatrix belonging
to consecutive frames.
• Each change of position is easy located by using some very flexible data structures:
==> POINTERS
• All digital structures contained in a payload (containers, virtual containers, tributary
units, tributary unit groups, administrative units, administrative unit groups) are used
to form a STM-1 frame, in according to fixed hierarchical rules
44
SDH
OVERHEAD Submatrix Networks
• Overhead submatrix (9x9) includes not data but some other auxiliary information related
to several very important functions as: frame alignment, error monitoring, alarm
indications, service channels for maintenance purposes, engineering order wire, data
channels, Automatic Protection Switching (APS) functions, etc.
1
RSOH
2 Regenerator Section Overhead
3
46
SDH
Synchronous Transport Module Networks
RSOH
AU PTR PAYLOAD STM
MSOH
Path
OverHead P
O Higher order
P H container
P O Higher order P
H order container Higher order
O Higher O Higher order
containers
H container H container
P P
O Lower order O Lower order Lower order
P H container P H container container
O Lower order O Lower order
H container H container
47
SDH
Containers and Virtual Containers Networks
CONTAINER (C)
Before to be transported in the SDH transmission network a signal is placed
into an elementary structure called Container (C-x). To fit the different types of
plesiochronous signals, several kinds of containers have been defined:
Name Bit-rate (Mbps)
C-11 1,544
C-12 2,048
C-2 6,312
C-3 34,368 -- 44,736
C-4 139,264
VIRTUAL CONTAINER (VC)
When a container C-x is associated to a structure called POH (Path OverHead);
from this association arises the Virtual Container. Virtual Containers (VC-x)
are so called because they are logical and not physical entities.
P We have 5 types of VCs: VC-11, VC-12, VC-2, VC-3, VC-4
Container
O They can be divided into Lower Order VC (VC-11, VC-12,
H C-x
VC-2) and Higher Order VC (VC-3, VC-4)
Virtual Container
48
SDH
Tributary Unit Networks
TU PTR
P
O Lower order
H container
Tributary Unit
49
SDH
Tributary Unit Group Networks
TU-12 TU-12
PTR PTR VC-12 VC-12
Two different kinds of AUs are: AU-3 and AU-4, corresponding to respective
Virtual Containers and their associated AU pointers.
P
AU PTR O Higher order
H container
Administrative Unit
51
SDH
Administrative Unit Group Networks
STM FRAME
STM-1 Frame
53
SDH
CCITT/ITU Multiplexing Structure Networks
139,264Mbps
xN x1
STM-N AUG AU-4 VC-4 C-4
x3 x1
TUG-3 TU-3 VC-3 44,736Mbps
x3 34,368Mbps
x7
AU-3 C-3
VC-3
x1
x7 TUG-2 TU-2 VC-2
x3 2,048Mbps
Multiplexing
TU-12 VC-12 C-12
Aligning (+TUx_ptr or +AU4_ptr)
x4
1,544Mbps
Pointer processing
TU-11 VC-11 C-11
Mapping (+VCx_POH)
54
SDH
ETSI multiplexing structure
(*)
Networks
139,264Mbps
xN x1
STM-N AUG AU-4 VC-4 C-4
x3 x1
TUG-3 TU-3 VC-3 44,736Mbps
34,368Mbps
C-3
x7
x1
TUG-2 TU-2 VC-2
Multiplexing
x3 2,048Mbps
Aligning (+TUx_ptr or +AU4_ptr)
TU-12 VC-12 C-12
Pointer processing
1,544Mbps
Mapping (+VCx_POH)
VC-11 C-11
(*)
European Telecommunication Standards Institute
55
SDH
Reduced structure Networks
139,264Mbps
xN x1
STM-N AUG AU-4 VC-4 C-4
x3 x1
TUG-3 TU-3 VC-3 44,736Mbps
34,368Mbps
C-3
x7
TUG-2
Multiplexing x3 2,048Mbps
Pointer processing
Mapping (+VCx_POH)
56
SDH
SDH structure description Networks
57
SDH
SDH structure description(2) Networks
TUG2 = 3 TU12
58
SDH
SDH structure description(3) Networks
TUG3 = 1 TU3
TUG3 = 7 TUG2
59
SDH
SDH structure description(4) Networks
AUG4 = 1 AU4
60
SDH
SDH structure description(5) Networks
61
SDH
Section OverHead Networks
1
RSOH
2 Regenerator Section Overhead
3
4 SOH
5 Section
6 Overhead
MSOH
7 Multiplexer Section Overhead
8
62
SDH
RSOH Bytes Networks
1 2 3 4 5 6 7 8 9 A1-A2 (Framing bytes): used for frame
A1 A1 A1 A2 A2 A2 J0 X X 1
alignment: so each frame always starts
with a prefixed sequence of six bytes.
B1 E1 F1 X X 2 The receiver can easy identify the header
D1 D2 D3 3 of each new signal.
4
A1=11110110 --- A2=00101000
B2 B2 B2 K1 K2 5 J0 (Regenerator Section Trace): reserved
D4 D5 D6 6 for future purposes. In earlier versions of
the recommendations, this byte was
D7 D8 D9 7
marked as C1 and its purpose was to
D10 D11 D12 8 identify the interleaved STM-1 stream
S1 Z1 Z1 Z2 Z2 M1 E2 X X 9 inside the STM-N frame
SCRAMBLING: Before to be transmitted by a physical link, a complete and assembled
STM-N frame (except RSOH first row), is always “scrambled”. Scrambling action is
performed to assure an acceptable transition density (ex. a good density of 1’s is
maintained in the signal) that is important for transmission on many kinds of media, as
optical fibres. For scrambling is generally used a “scrambler” based on polynomial
6 7
algorithm: 1+x +x .
At receiver side, each frame is “descrambled” for restoring the original sequence.
63
RSOH first row isn’t scrambled because it contains bytes locating frame’s beginning.
SDH
RSOH Bytes(2) Networks
1 2 3 4 5 6 7 8 9
A1 A1 A1 A2 A2 A2 J0 X X 1
E1 (Engineering Order Wire): it is used
E1 F1 by maintenance people for voice
B1 X X 2 communication.
D1 D2 D3 3 It uses only 1 byte of RSOH: so, the
4
available telephone channel is at 64 kb/s
and it is operative only between
B2 B2 B2 K1 K2 5 “regenerators”.
D4 D5 D6 6
F1 (User Channel): similar to the E1 byte
D7 D8 D9 7 it is also used for voice or data
D10 D11 D12 8 communication (ex. Call at 64 kb/s
S1 Z1 Z1 Z2 Z2 M1 E2 X X 9
between operators when a physical alarm
condition occurs)
B1 [BIP-8] (Error Monitoring): the error monitoring function used this byte B1 to apply the
Bit Interleaved Parity 8 [BIP-8] for calculating the error rate at regenerator level.
When a frame is sent: this parity byte is calculated over all bits of the previous STM-N
frame before scrambling and it’s placed into B1 of the actual frame before scrambling.
When a frame is received: BIP-8 is recalculated over all bits of the frame and compared
with the B1 received value: if they are different, a transmission error has been detected!
64
SDH
BIP-N Technique Networks
[BIP-N] Bit Interleaved Parity N is a technique frequently used in SDH network for
error control. It acts according to this principle:
The entire blocks of (MxN) binary digits that must be transmitted (and controlled)
is divided into M strings each containing N digits.
On the first digit of each string is executed the classic “parity bit control”.
The same action is repeated for each position (second, third…last).
Finally a new N-bit string Y is so obtained [BIP-N string].
In it each bit Yj has a value so calculated:
• if the number of bit in position “j” (calculated over all M blocks) is even: Y j = 0
• if X
the X12 of
11 number Xposition
…..bit in 1j X1n
….. “j” (calculated over all M blocks) is odd: Y j = 1
X21 X22 ….. X2j ….. X2n
…… ….. …… ….. …...
BIP-N string
65
SDH
RSOH Bytes(3) Networks
1 2 3 4 5 6 7 8 9
A1 A1 A1 A2 A2 A2 J0 X X 1
D1 - D2 - D3 (Data Communication
E1 F1 Channel): these 3 bytes, having a total bit
B1 X X 2 rate of 192 kbps, carry data messages
D1 D2 D3 3 between regenerators and equipment of
4
section.
They can be used for alarms, maintenance,
B2 B2 B2 K1 K2 5
monitoring, administration by advanced
D4 D5 D6 6 Operation System Supervisors (OSS,
D7 D8 D9 7 TMN, etc.)
D10 D11 D12 8 X (Reserved for National Usage): each
S1 Z1 Z1 Z2 Z2 M1 E2 X X 9 national telecom operator can decide
their meaning and use
66
SDH
MSOH Bytes Networks
1 2 3 4 5 6 7 8 9
B2 (Error Monitoring): very similar to byte
A1 A1 A1 A2 A2 A2 J0 X X 1 B1 of RSOH, these 3 bytes are used for
B1 E1 F1 X X 2 calculating the error rate but at multiplexer
D1 D2 level.
D3 3
When a new frame is sent: these parity bytes
4 are calculated over all bits of the previous
B2 B2 B2 K1 K2 5 STM-N frame (except RSOH) before
scrambling and they are placed into B2 bytes
D4 D5 D6 6
of the actual frame before scrambling.
D7 D8 D9 7 When a frame is received: BIP-24 is
D10 D11D12 8 recalculated over all bits of the frame and
S1 Z1 Z1 Z2 Z2 M1 E2 X compared with the B2 received values: if
X 9
they are different, a transmission error has
been detected!
67
SDH
MSOH Bytes(2) Networks
1 2 3 4 5 6 7 8 9
A1 A1 A1 A2 A2 A2 J0 X X D4-D12 (Data Communication Channel):
1
very similar to bytes D1, D2, D3 of
B1 E1 F1 X X 2 RSOH, these 9 bytes, having a total bit
D1 D2 D3 3 rate of 576 kb/s, carry data messages
between multiplexers.
4
They can be used for alarms, maintenance,
B2 B2 B2 K1 K2 5 monitoring, administration by advanced
D4 D5 D6 6 Operation System Supervisors (OSS,
TMN, etc.)
D7 D8 D9 7
D10 D11D12 M1: this byte carries the REI (Remote
8
Error Indication) of multiplex section.
S1 Z1 Z1 Z2 Z2 M1 E2 X X 9 It contains the number of errored blocks
that were detected by calculation based
on received B2 bytes (see later)
70
SDH
AIS & RDI Networks
AIS
MUX Tx MUX Rx
RDI
1 2 3 4 5 6 7 8 9 The bits 6,7,8 of byte K2 belonging to
A1 A1 A1 A2 A2 A2 J0 X X 1 MSOH can carry the signals RDI
B1 E1 F1 X X 2 (Remote Defect Indication) or AIS
D1 D2 D3 3 (Alarm Indication Signal).
4 RDI signal is sent towards the transmit
5 end to indicate that the receiving end
B2 B2 B2 K1 K2
has detected an incoming section
D4 D5 D6 6
failure or to give an “ack” message to a
D7 D8 D9 7
previous received AIS signal.
D10 D11 D12 8
The related configurations of bits are:
S1 Z1 Z1 Z2 Z2 M1 E2 X X 9
• RDI = 110
• AIS = 111
71
SDH
Protection Switching Networks
72
SDH
Protection Switching (2)
Networks
Each signal is transmitted on both fibers but the receiver drops the
information only from the active ring. When a problem occurs (a link
crashes) in the active ring the affected receivers automatically switch,
extracting the signal from the other one.
73
SDH
Automatic Protection Switching Networks
Active Fibre
Protection Fibre
Transmitter Transmitter
Receiver Receiver
MUX A MUX B
Tr. Rec.
74
MUX C
Automatic Protection Switching(2) SDH
Networks
Active Fibre
Protection Fibre
Transmitter Transmitter
Receiver Receiver
MUX A MUX B
Failure on Active
link between A and C
Tr. Rec.
MUX C 75
SDH
Pointers Networks
This number of bytes is only “nominally” correct because in the network the
phase of an incoming 2,048 Mb/s is not exact but only “approximately” equal
to this value.
To solve the problem of any phase variation, SDH includes a mechanism that
allows to move the signal information inside the frame.
76
SDH
Pointers(2) Networks
Moreover, a signal can easily float backwards and forwards inside the payload
submatrix of a frame to balance little phase oscillations!
So all types of signals can be easily located and directly accessed through the
pointers.
For example the Administrative Unit Pointer (AU-PTR) allows to locate the
(floating) position of a VC-3 or a VC-4 inside a frame by a very flexible and
dynamic procedure.
77
SDH
Pointers(3) Networks
This pointer mechanism and the simple (but general) multiplexing structure
represent two of the most important characteristics of SDH and the main
reasons of its world-wide success.
78
SDH
AU Pointers Networks
Two kinds of AU-PTR are provided: AU-3 Pointer and AU-4 Pointer.
Both fill the space in the fourth row of Header STM Frame, between the
RSOH (rows 1,2,3) and MSOH (rows 5,6,7,8,9).
If the payload contains three VC-3s, then the Pointer Area (=row 4)
contains exactly 3 AU-3 Pointers (one for each VC-3).
In this case, each pointer (H1H2H3) operates in an autonomous way.
If the payload instead includes one VC-4, then the Pointer Area contains
only the AU-4 Pointer related to the Virtual Container.
H1 H2
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
16 NDF S POINTER
NDF (New Data Flags): initialization request indicator; it can assume 2 different values
• NDF = 0110
• NDF = 1001
The second value is used when occur some remarkable variations in the frame and then
a new resynchronization is needed.
The last ten bits represent the real pointer indicating the VC starting position
When an Alarm Indication Signal (AIS) happens, all bits of H1 and H2 are set to 1.
82
SDH
Path OverHead (POH) Networks
VC4 VC3
1 261 bytes 1 85 bytes
J1 J1
B3 B3
C2 C2
G1 G1
C4 C3
F2 F2
H4 H4
Z3 Z3
K3 K3
Z5 Z5
VC4-POH VC3-POH 83
SDH
POH for VC-3 and VC-4 Networks
The internal structure of a POH is the same for VC-3 & VC-4. POH for
VC-3 &
- Byte J1 (Path Trace): At the begin of a transmission path, the source of signal
VC-4
inserts a particular configuration string called PAPI (Path Access Point
Identifier). At the end of the transmission path, the termination compares the
J1
received string with the expected value. In this way, it can check if it’s
actually connected with the correct source.
B3
- Byte B3 (Path Error Monitoring): the error monitoring function uses the Bit
Interleaved Parity 8 (BIP-8) code and “even parity”. BIP-8 is calculated over C2
all bits of the previous VC before scrambling and put it in the current byte.
G1
- Byte C2 (Signal Label): it identifies the VC Payload Type. For example:
- If C2 = 0 the VC isn’t equipped. F2
- If C2 = 1 the VC is equipped but the payload is not specified H4
- If C2 = 2 TUG structured payload
- If C2 = 4 asynchronous 34 Mb/s or 45 Mb/s in VC3 Z3
- If C2 = 12 asynchronous 140 Mb/s in VC4 K3
- If C2 = 13 ATM cells payload
- Bytes F2 e Z3 (User Channel): they allow user communication between path Z5
elements. 84
SDH
POH for VC-3 and VC-4(2) Networks
POH for
- Byte G1 (Path Status): It is used to give to the VC_path_source some VC-3 &
important information about the actual status and performance of the path VC-4
termination.
The first 4 bits contain the REI (Remote Error Indication): J1
if its value is included in the range 0-8, it is equal to the number of errors
and violations detected using the BIP-8 code (i.e. the received byte B3); B3
All other values (between 9 and 15) mean: no error detected.
C2
The fifth bit contains the RDI (Remote Defect Indicator):
this flag is set to 1 when the receiving end has detected an incoming path G1
failure; otherwise, it is reset to 0.
F2
The last three bits are actually not used yet.
H4
REI R Not Used
D Z3
1 2 3 4 5I 6 7 8
K3
Z5
85
SDH
POH for VC-3 and VC-4(3) Networks
- Byte H4 (Position Indicator): it can indicate the start position of VC-1 or POH for
VC-2 multiframes. VC-3 &
VC-4
- Byte K3 (Automatic Protection Switching): it is used to protect the higher
order path level. J1
Only the first 4 bits are actually used for this purpose while the last 4 are not
allocated yet B3
C2
- Byte Z5 (Network Operator): it is used for management and maintenance
purposes. G1
F2
H4
Z3
K3
Z5
86
SDH
POH for VC-12 Networks
All lower order Virtual Containers (VC-11, VC-12, VC-2) carry a POH containing
auxiliary information for Error Monitoring, Error Indication and Signalling Labels.
It is composed of 8 bits and it is called V5-byte.
BIP-2 R R SIGNAL R
E F LABEL D
1 2 I 3 I 4 5 6 7 I 8
- Bits 1-2 (BIP-2): they are used for error monitoring by BIP-2 code, with even parity.
This pair of bits is calculated over all bits of the previous VC.
Bit 1 is calculated over odd number bits (1,3,5,7) while Bit 2 concerning even number
bits (2,4,6,8)
- Bit 3 (REI - Remote Error Indication): used to inform the other side about detected
error(s). It’s set to 1 when 1 or 2 errors are occurred; it’s 0 in case of “no error”.
- Bit 4 (RFI - Remote Failure Indicator): a value equal to 1 indicates a “path failure”.
- Bits 5-7 (Signal Label): are used as VC path type indicators. For example:
- 000 the VC path isn’t equipped.
- 001 the VC path is equipped but without a specific payload
- 010 asynchronous (optional)
- 011 bit synchronous (optional)
- 100 byte synchronous (optional)
- Bit 8 (RDI - Remote Defect Indication): it is set to 1 when an AIS has been detected
or acknowledged or in presence of a signal failure condition; else, its value is 0.
87
SDH
Maintenance Networks
88
SDH
Alarms Networks
89
SDH
Internal Alarms Networks
For the priorities are often used other terms: Critical, Major and Minor
90
SDH
Internal Alarms Description Networks
CARD MISSING
This alarm indicates that in a specific slot a card has been declared but the slot
is actually empty.
The alarm is cancelled when a new card is inserted into the slot or when the
card’s declaration is removed from the rack configuration.
CARD MISMATCH
This alarm indicates that in a specific slot a card has been declared but the slot
is actually filled in with a different kind of card.
The alarm is cancelled when the right card is inserted into the slot or when the
card’s declaration is modified into the rack configuration.
CARD FAILURE
This alarm indicates that the card filled in a specific slot is out of service.
The alarm is cancelled when the old card is substituted by a new one.
91
SDH
Internal Alarms Description (2)
Networks
LAP-D KO
This alarm indicates that the data channels connecting the present NE and
remote units are down.
In the remote side a LAP-D FAIL Alarm is generated
The problem can be solved checking the LAP-D settings in the Application
Local Configuration, or in the LAP_D Configuration and Local Configuration
Table.
92
SDH
Line Alarms Networks
Line Alarms:
The most common and important line alarms are:
- LOS (Loss Of Signal)
- LOF (Loss Of Frame)
- LOP (Loss Of Pointer)
- LSS (Loss of Sequence Synchronization)
- SD (Signal Degraded).
- EXBER (Excessive Bit Error Rate)
- PDH/SDH-AIS (PDH or SDH Alarm Indication Signal)
- AU-AIS (Administrative Unit Alarm Indication Signal)
- MS-AIS (Multiplex Section Alarm Indication Signal)
- MS-RDI (Multiplex Section Remote Defect Indication)
- MS-FERF (Multiplex Section Far End Receive Failure)
93
SDH
Line Alarms Description (1)
Networks
LOS: it is an alarm indicating that the present (receiving) unit is waiting for an
external signal but actually it is receiving nothing.
It is declared when no light pulses persist for 100sec.
If it persists for a period longer than 2.5sec, then an URGENT alarm LOS is
generated and sent.
It requires an immediate check about incoming line equipment (connectors,
cables, fibres) and about transmitters (lasers).
LOF: it is an alarm indicating that the present (receiving) unit has detected a
persistent error into incoming fixed pattern bytes (A1&A2) of RSOH.
It is declared when an error frame is detected for a period longer than 3ms,
while it’s really considered by receiver only if four consecutive frames carry
incorrect patterns: in this case an URGENT alarm LOF is generated and sent.
94
SDH
Line Alarms Description (2)
Networks
SD: it is an URGENT alarm indicating that has been detected, for an incoming
STM-N signal, a value of BER (Bit Error Rate) 10-6
It means that NE is actually receiving a degraded SDH signal.
AIS: There are two different kinds of AIS alarms related to hierarchical signal
kinds: PDH-AIS and SDH-AIS.
When a problem about a PDH signal occurs (along its transmission path) a
PDH-AIS is generated and forwarded. In this way, all the equipment involved
in the transmission path (starting from the point of failure) are correctly alerted.
In presence of a PDH-AIS, the data channel is filled with a sequence of “1” that
can be detected and handled only by PDH devices.
97
SDH
Line Alarms Description (5) Networks
98
SDH
Document Info Networks
99