TCT5
TCT5
SDH PRINCIPLES
इ रसेट IRISET
TCT 5
SDH PRINCIPLES
T
Provisions contained in Manuals or Railway Board’s
directives
E
IS
IR
November 2019
TCT 5
SDH PRINCIPLES
INDEX
T
3 Mapping of PDH tributaries into STM-1
3.0. Mapping of the PDH flows into SDH containers 9
E
3.1. Synchronous mapping
3.2. Asynchronous mapping
3.3. Mapping of e-4 into stm-1
3.4. Path overhead (POH)
IS
3.5. SDH Pointers
3.6. Functions of a Pointer
3.7. Description of Pointer bytes
3.8. Mapping of E-3 into STM-1
3.9. Mapping of E-1 into STM-1
3.10. E1 mapping into STM-1 through AU-3
IR
8 Annexure 48
9 Questions Bank 52
T
10 Abbreviations 57
11 Glossary 58
Prepared by
Reviewed by
E : Y.V.Prasad, Instructor-Tele
: B. B. K. Murthy, Prof. Tele
IS
Approved by : C.Chandrasekhara Sastry, Sr.Prof.-Tele
DTP and Drawings : K.Srinivas, JE (D)
Version No. : 1.0
No. of Pages :
IR
No. of Sheets :
© IRISET
“This is the intellectual property for exclusive use of Indian Railways. No part of this publication
may be stored in a retrieval system, transmitted or reproduced in any way, including but not
limited to photo copy, photograph, magnetic, optical or other record without the prior agreement
and written permission of IRISET, Secunderabad, India”
http://www.iriset.indianrailways.gov.in
CHAPTER - 1 Back to content page
The SDH specifications define optical interfaces that allow transmission of lower-rate (e.g.,
PDH) signals at a common synchronous rate. A benefit of SDH is that it allows multiple vendors’
optical transmission equipment to be compatible in the same span. SDH also enables dynamic
drop-and-insert capabilities on the payload.
T
Simplified add & drop function: Compared with the older PDH system, it is much easier
to extract and insert low-bit rate channels from or into the high-speed bit streams in SDH. It
is no longer necessary to demultiplex and then remultiplex the plesiochronous structure, a
E
complex and costly procedure at the best of times.
High availability and capacity matching: With SDH, network providers can react quickly
and easily to the requirements of their customers. For example, leased lines can be
IS
switched in a matter of minutes. The network provider can use standardized network
elements that can be controlled and monitored from a central location by means of a
telecommunications network management (TMN) system.
Reliability: Modern SDH networks include various automatic back-up and repair
mechanisms to cope with system faults. Failure of a link or a network element does not lead
IR
to failure of the entire network which could be a financial disaster for the network provider.
These back-up circuits are also monitored by a management system.
Future-proof platform for new services: Right now, SDH is the ideal platform for services
ranging from POTS,ISDN and mobile radio through to data communications (LAN, WAN,
etc.), and it is able to handle the very latest services, such as video on demand and digital
video broadcasting via ATM that are gradually becoming established.
Interconnection: SDH makes it much easier to set up gateways between different network
providers and to SONET systems. The SDH interfaces are globally standardized, making it
possible to combine network elements from different manufacturers into a network. The
result is a reduction in equipment costs as compared with PDH.
STM-1 with 155.520 mbps is the basic rate. STM- 4 indicates that it contains 4 STM-1s and
each STM-1 is independent in all respects. Similarly STM 16 means 16 Nos of STM-1s and
STM 64 is 64 Nos of STM-1s.
1.4. SDH Multiplexing Structure: As per ITU (T)’s recommendation G.709 The inputs to
SDH system are PDH bit streams. ITU (T) has standardized E1, E3, E4 of E hierarchy and/or
T1, T2 and T3 of T hierarchy as inputs into SDH. The block diagram of SDH multiplexing
structure shown in Figure 1.
E T
IS
IR
Mapping: A process used when PDH tributaries are adapted into VCs by adding POH
information
Aligning: This process takes place when a pointer is included into a Tributary Unit (TU) or an
Administrative Unit (AU), to allow the 1st byte of the VC to be located
Multiplexing: This process is used when multiple low-order path signals are adapted into a
higher-order path signal, or when high-order path signals are adapted into a Multiplexing
Section
1.5 Mapping Elements: Mapping elements basically the packaging units that have got their
T
sizes fixed depending upon the traffic path they follow in multiplexing hierarchy. They are---
Container(C): The first entry point of the PDH signal. It is the basic packing unit for tributary
E
channels, is filled with the information from a plesiochronous signal. The process is called as
mapping. Justification facilities are provided to adapt plesiochronous tributaries to the
synchronous network clock. Each container is suitable for the rate of the signal inputted into it
and for the structure of the synchronous frame. Fixed stuffing bits are inserted for synchronous
IS
tributaries. Signal is prepared so as to enter into the next stage i.e. virtual container. Containers
are Basic Containers and Higher Order Containers. As per recommendation G.709, C-11, C-
12,C-2,C-3 & C-4 are the containers for PDH bit rates of 1.544 mbps, 2.048 mbps, 6.312
mbps,34 mbps or 45 mbps and 140 mbps respectively.
IR
Virtual Container (VC = C + POH): Each container is added with control information known as
Path Over Head (POH), which helps the service provider to achieve end-to-end path monitoring.
The container and the path overhead are together called as Virtual Container (VC). In Virtual
Container the POH fields are organized in a block frame structure.
Tributary unit (TU):This unit is an information structure, which provides adaptation between the
lower order path layer and the higher order path layer. It consists of information payload of
virtual container and the tributary unit pointer.
Tributary unit group (TUG): One or more tributary units are grouped or multiplexed by byte
interleaving to form higher bit stream rate as part of multiplexing structure. e.g.TUG-2 is a group
of 3 TU-12s or 4 TU11s or 1 TU2. TUG-3 consists of homogenous assembly of TUG-2s or TU-
3, either seven TUG-2s or one TU-3.
Pointer: It is an indicator whose value defines frame offset of a virtual container with reference
to the frame reference of transport entity on which it is supported. It indicates the phase
alignment of the virtual containers (VC-n) with respect to the POH of the next higher level VC in
which it resides. The tributary Unit Pointer location is fixed with respect to this higher level POH.
Administrative Unit (AU):It is the information structure, which provides adaptation between
higher order path layer and the multiplex section layer. It consists of information payload and
AU pointer, which indicates the offset of the payload frame start relating to the multiplex section
frame start. AU location is fixed with respect to STM-frame.
E T
IS
IR
E T
IS
Fig.2.1. Path section designations
2.1. Terminal multiplexers: Terminal multiplexers are used to combine plesiochronous and
synchronous input signals into higher bit rate STM-N signals.
IR
TERMINAL
MULTIPLEXER
2.2. SDH regenerators: As the name implies, have the job of regenerating the clock and
amplitude relationships of the incoming data signals that have been attenuated and distorted by
dispersion. They derive their clock signals from the incoming data stream. Messages are
received by extracting various 64 kbit/s channels (e.g. service channels E1, F1) in the RSOH
(regenerator section overhead). Messages can also be output using these channels.
2.3 Add/drop multiplexers (ADM) Plesiochronous and lower bit rate synchronous signals
can be extracted from or inserted into high speed SDH bit streams by means of ADMs. This
feature makes it possible to set up ring structures, which have the advantage that automatic
back-up path switching is possible using elements in the ring in the event of a fault.
IRISET 5 TCT5 – SDH Principles
ADD/DROP
MULTIPLEXER
2.4. STM-1 Frame Structure: An STM-1 frame structure consists of payload blocks, overhead
blocks and pointers. The ratio of these components can vary and depends on the initial payload
that needs to be transmitted.
E T
IS
Figure2.2.Schematic diagram of STM-1 frame
The STM-1 frame is the basic transmission format for SDH. The frame lasts for 125μSec as
depicted in Figure2.1.The STM-n frame is arranged in matrix format having 9 rows X 270
columns and hence has 2430 bytes, which forms the line rate of 155.52 Mbps.
IR
The Section Over Head (SOH): Contains maintenance, monitoring and operational functions
which is splittet up into two parts, the Regenerator and the Multiplex-Section Overhead.
Regenerator Section Overhead (RSOH): The Regenerator Section Overhead contains only
the information required for the elements located at both ends of a section. This might be two
regenerators, a piece of line terminating equipment and a regenerator, or two pieces of line
terminating equipment
The Regenerator Section Overhead is found in the first three rows of Columns 1 through 9 of
the STM-1 frame.
J0: Regenerator section trace. It’s used to transmit a Section Access Point Identifier so that a
section receiver can verify its continued connection to the intended transmitterSupports
continuity testing between transmitting and receiving device on each regenerator section.
B1: This is a parity code (even parity), used to check for transmission errors over a regenerator
section.The regenerator section BIP-8 provides end to-end error performance monitoring across
T
an individual regenerator section and is calculated over all bits of the previous STM-N frame
after scrambling. Computed value is placed in B1 byte before scrambling.
E
E1: Provides local order wire channel for voice communications between regenerators, hubs
and remote terminal locations.
F1: Allocated for user’s purposes (eg, temporary data/voice channel connection for special
IS
maintenance applications).
D1–D3: Bytes are used for message-based data communications channel providing
administration, monitor, alarm and maintenance functions between regenerator section
termination equipment.
IR
Multiplex Section Overhead (MSOH): The Multiplex Section Overhead contains the
information required between the multiplex section termination equipment at each end of the
Multiplex section (that is, between consecutive network elements excluding the regenerators).
K1, K2 Two bytes allocated for APS signaling for multiplex section protection.These two bytes
are used for MSP (Multiplex Section Protection) signalingbetween multiplex level entities for bi-
directional automatic protection switching and for communicating Alarm Indication Signal(AIS)
and Remote Defect Indication (RDI) conditions.
The Multiplex Section Remote Defect Indication (MS-RDI) is used to return an indication to the
transmit end that the received end has detected an incoming section defect
D4 - D12: MS Data Communications Channel (DCC) bytes.These nine bytes are used for OAM
information (control, maintenance, remote provisioning, monitoring, administration and other
communication needs).
S1: Synchronisation status message byte (SSMB).Bits 5 to 8 of this S1 byte are used to carry
the synchronisation messages
2.5. Payload: This is the data area. The bytes containing data from the tributaries are
transferred to the pay load area without buffering and are in relation with the STM-N frame. This
is a low level multiplexing of low rate plesiochronous signals, by inserting them into synchronous
T
frame or putting them in contact, which varies as per the flow rates of input signals. To adapt the
flow rates of the plesiochronous signals to the required rates of them in VCs, some additional
bits are added as pointers as per the process of justification. The entry point of the
E
plesiochronous tributaries is container.
IS
IR
To transport the PDH flows in the SDH systems it is necessary an appropriate mapping of these
flows in containers. The mapping has to solve the problem of rate matching between the local
clock of the multiplexer and the received flow. For each PDH flow exists a separate mapping
algorithm that uses usually positive justification for rate matching between the multiplexer and
the received plesiochronous flow.
T
achieved with the help of the transport units pointers:
tributary units pointers in the case of low order containers;
Administrative units pointers in the case of high order containers.
Container C4: The input to container C4 is E4 -139.264 mbps. After clock recovery and
regeneration of the tributary, the data is placed in container.
The 260 columns and 9 rows matrix structure (the C4 container) intended for payload is
processed as follow:
12 of these bytes carry information bits (i.e. bits from the 140Mbit/s signal). The 13th byte is
used as W, X, Y and Z bytes for different purposes.
Pay load area (9 x 260 bytes) is divided as: 20 Blocks (In each row) X 9 Rows = 180 Blocks.
Bit allocation in the C4 container in the asynchronous mapping of a PDH tributary having bit rate
T
140 mbps.
E
IS
IR
The bit rate is 149.760 mbps, which is higher than input to C4, (139.264 mbps). Hence all the
bits carried are not information bits. Some additional bits are added for justification and other
purposes
Justification: It is an operation, which makes it possible to fit a variable rate signal into a fixed
rate frame.
To transmit the tributary with in S frame, it is necessary to allocate highest possible bit rate.
S = X + ∆ bits / sec.
E4 = 139.264 mbps + 15 ppm = 139264 + 2.088 kbps.
1 justification bit is added in a row in Z byte.
Fig.3.2.Mapping of Container C4
The special bytes are called W, X, Y and Z and have the following roles:
T
Y is a stuffing byte with undefined structure;
X is a byte having the structure: C R R R R R O O:
E
bits O are used as control overhead for the PDH flow;
bits R are fixed stuffing bits;
C is a justification control bit, which indicates if the possible justification position from the
considered row contains information bit (C=0) or justification (C=1);
IS
byte X is transmitted 5 times in a row;
are available 5 justification control bits;
identification of the justification operation is realized based on a majority logic decision
applied to the C bits.
IR
Total information bits are [(12 x 8 x 20) + (1 X 8) + (1 X 6)] X 9 X 8000 = 139.248 mbps. This bit
rate is the rate of C4 bits, which is less than the E4 - 139.264 mbps. To add some more
information bits, S bit in Z byte is used as information bit (as justification bit) to the extent
necessary, which gives a max. bit rate of139.320 mbps.
3.4. Path overhead (POH): The POH has the task of monitoring quality and indicating the
type of container. The format and size of the POH depends on the container type. The Path
Overhead is assigned to, and transported with the payload from the time it’s created by path
terminating equipment until the payload is demultiplexed at the termination point in a piece of
path terminating equipment. The Path Overhead is found in Rows 1 to 9 of the first column.
B3 Path bit interleaved parity code (Path BIP-8) byte - This is a parity code (even), used to
determine if a transmission error has occurred over a path. Its value is calculated over all the
bits of the previous virtual container before scrambling and placed in the B3 byte of the current
frame.
C2 Path signal label byte – This byte specifies the mapping type in the VC-N
G1 Path status byte – This byte is used to convey the path terminating status and performance
back to the originating path terminating equipment. Therefore the bi-directional path in its
entirety can be monitored, from either end of the path.
F2 Path user channel byte - This byte is used for user communication between path elements.
H4 Position and Sequence Indicator byte - This byte provides a multi frame and sequence
indicator for virtual VC-3/4 concatenation and a generalized position indicator for payloads. In
the latter case, the content is payload specific (e.g., H4 can be used as a multi frame indicator
for VC-2/1 payload).
F3 Path user channel byte - This byte is allocated for communication purposes between path
elements and is payload dependent.
K3 signaling is provided in K3 bits 1-4, allocated for protection at the VC- 4/3 path levels. K3
bits 5-8 are allocated for future use. These bits have no defined value. The receiver is required
to ignore their content.
N1 Network operator byte - This byte is allocated to provide a Higher-Order Tandem Connection
Monitoring (HO-TCM) function.N1 is allocated for Tandem Connection Monitoring for contiguous
concatenated VC-4, the VC-4 and VC-3 levels
VC4 is composed of 261 columns each of 9 rows; the first column contains the POH and the
rest compose the C4 container
3.5. AU-4 Pointers: This pointer points to the VC-4 in an STM-1 frame. SDH provides payload
pointers to permit differences in the phase and frequency of the Virtual Containers (VC-N) with
respect to the STM-N frame. (Lower-order pointers are also provided to permit phase
differences between VC-1/VC-2 and the higher-order VC-3/VC-4)
Functions of a Pointer
T
• This is the main advantage of pointers. Normally signals from different originating points
differ in their phases, because of different transmission length and different clock
generation. E
• In the usual multiplexing process, to align them, each signal has to be written into memories
and read out using a new phase of the frame to be multiplexed.
• Thus, it is inevitable to cause additional delay of half of the frame time in average and one
IS
frame time at maximum. Also, it requires large capacity memories.
• To avoid above inconveniences, this pointer method was introduced into the multiplexing of
SDH signal.
• A pointer is assigned to each VC to be multiplexed and it indicates relative phase shift
IR
between the VC and the new frame by using the address number in the new frame.
• As a matter of course, every VC has different pointer value.
• The pointer is renewed at every multiplexing process, so it is not necessary to introduce
undesirable additional delays
Payload Pointers: When there’s a difference in phase or frequency, the pointer value is
adjusted. To accomplish this, a process known as byte stuffing is used. In other words, the VC
payload pointer indicates where in the container capacity a VC starts, and the byte stuffing
process allows dynamic alignment of the VC in case it slips in time.
On a frame-by-frame basis, the payload pointer indicates the offset between the VC payload
and the STM-N frame by identifying the location of the first byte of the VC in the payload.
In other words, the VC is allowed to “float” within the STM-1 frame capacity. To make this
possible, within each STM-N frame, there’s a pointer, known as the VC Payload Pointer that
indicates where the actual payload container starts.
For a VC-4 payload, this pointer is located in columns 1 and 4 of the fourth row of the Section
Overhead. The bytes H1 and H2 (two 8-bit bytes) of the Overhead can be viewed as one value
H1 H1 H1 H2 H2 H2 H3 H3 H3
E T
FIG.3.5.structure of an AU-4 pointer.
• H1, H2 – Together are used to give the offset of the VC-4 in the STM-1 frame
IS
Details of the Pointer Coding
IR
N- New Data Flag - Bits 1-4 (N-bits) of the pointer word carry an NDF. It is the mechanism
which allows an arbitrary change of the value of a pointer. the normal value is "0110",
and the value "1001" indicates a new alignment for the VC-n, and possibly new size.
1001 –enabled, 0110 – disabled
• If the VC-4 is filled by lower tributaries such as 34 Mbps, 2 Mbps or any of these two
combinations, the AU pointer will not be filled by any information.
• The AU-4 pointer value is a binary number with a range of 0 to 782 [ to number (261 x 9)/3
bytes] which indicates the offset, in three-byte increments, between the pointer and the first
byte of the VC-4 (POH is included in this numbering).
• Numbering starts from the first byte of the 4th row of VC.
E T
IS
IR
Frame-n Start of VC-n, where clock is recovered from incoming bits & set as reference.
Frame (n+1) Pointer initialization, payload slipped back because clock difference.
Frame (n+2) Pointer value I bits inverted to have 5bit majority voting at receiver & stuffing bytes
added after 3H3 bytes.
Frame (n+3) Pointer value incremented by 1.
Negative justification: If the frame speed of the STM is lower than the payload arrival speed. If
the frame rate of the VC-n is too fast with respect to that of the AUG-N, then the alignment of
the VC-n must periodically be advanced in time It is similar to PPJ till frame (n+1), Frame
(n+2)Pointer value D bits inverted to have 5bit majority voting at receiver & Buffering is done in
H3 bytes where payload data is loaded (which is extra in VC-n). Frame (n+3)Pointer value
decremented by 1.
IRISET 15 TCT5 – SDH Principles
Mapping of PDH Tributaries into STM-1
T
FIG.3.8. Negative justification
The 34,368Mbps (or 44.736Mbps) signal is assembled into the C3 container. The VC3 virtual
container (composed of 9 lines and 85 columns) is generated by adding the POH. The TU3
tributary unit is generated (86 columns and 9 rows) by adding a pointer to the VC3.The TU3
tributary unit generates TUG3 units (TUG3 is practically identical with TU3) and 3 TUG3 units
can be multiplexed in a C4 container. The VC4 virtual container is generated by adding the
POH and VC-4 is inserted into an STM-1 frame or an STM-N frame.
IRISET 16 TCT5 – SDH Principles
Mapping of PDH Tributaries into STM-1
The mapping process ensures the following characteristics of the VC3 SDH flow:
Total bit rate debit (of the payload area) VC3 = 48384kbps;
Useful nominal rate fs = 34368kbps;
It is obtained by transmitting one information and one justification bit in the 2 possible
justification positions of a partial frame;
There are used 3 information and 3 justification bits per VC3 container.
Useful rate without the justification positions (the possible justification positions contain
effectively justification bits) = 34344kbps = fs-7X10-4Xfs;
Useful rate with justification positions (the possible justification positions contain information
bits) 139320kbps = 34392kbps = fs+7 X 10-4 X fs
T
Fig,3.10. Mapping of E-1 into STM-1
E
E1 traffic to form STM-1 frame through AU-4 mapping which is performed in following steps:
In the case of 2Mbps the number of spare words to accommodate POH and Pointer in a given
125μs period is not sufficient enough. Hence 4 frames of 125μs are used to indicate the POH
and Pointer for the respective 2Mbps PDH stream.
E T
IS
IR
Multiplexing of the TU tributary units into the tributary group unit TUG2 and after that into the
TUG3 unit;
It is a fixed phase relation between the TUG2 and the TUG3 units;
• it is not necessary the use of a TU3 pointer in the first column of the unit;
• the TU3 pointer is replaces with NPI (Null Pointer Indicator );
• a TUG3 unit can be generated by multiplexing 7 TUG2 units byte by byte
Every row will be having 4bytes of each TU-12 (every TUG-2 will be having 4 columns of TU-12
in it). This procedure follows for remaining 8 rows, which forms TUG-2 of 9X12. Similarly TUG-3
& VC-4 are multiplexed. In STM-1 frame, 63 VC-12‟s (K*L*M) can be mapped each having 4
columns & these columns will be framed in STM-1 frame (K*L*M) columns apart.
STM-1 frame is formed through AU-3 mapping from E1 traffic in following steps:
TUG2 is formed similar to that of AU4 mapping.
Seven TUG2‟s are multiplexed to map into VC3 by adding 1 column path overhead with 2
columns of stuffing, which makes the size of VC-3 of 9X87.
VC-3 is mapped into AU-3 by addition of the 3byte pointer, which gives the starting location
of the VC-3 payload.
Three AU-3‟s are multiplexed into AUG-1.
Then framing is done by adding SOH bytes to AUG-1 to form STM-1 frame.
STM-1 frame when mapped through AU-4 mapping technique will be having 1column VC-4
POH & 8 stuffing columns where as when mapped through AU-3 mapping has got 3columns of
VC-3 POH & 6column stuffing. In AU-3 mapping 2columns of data is more compared to AU-4,
which increases the data rate comparatively. So according to data rate varies according to
mapping.
Similar to 63XVC-12 STM-N frame can also cater combination of traffics like 21VC-12 and 2VC-
T
3 can be combined together in STM-1 frame in AU-4 mapping. Similarly there can be many
combinations with respect to K, L, M values and data rate.
E
The mapping process ensures the following characteristics of the VC12 SDH flow:
Useful rate with justification positions (the possible justification positions contain information
bits) = 2050kbps= fs+10-3.
Ethernet over SDH (EoS) was developed primarily to provide a simple, flexible and cost-
effective solution to customers offering Ethernet based services. An EoS transport solution
fundamentally addresses the following key issues.
Advantages of GFP
T
• Traffic management and QoS control are significantly easier
• GFP is more robust than HDLC and less susceptible to bit errors
• GFP is supported by OTN (Optical Transport Network)/WDM interfaces in addition to SDH
E
• GFP permits multiple protocols from different ports or links to share the same transport
path, resulting in more efficient use of available bandwidth
IS
4.2. Concatenation: is the process of summing the bandwidth of X containers of the same type
into a larger container.
pieces during transmission. For this, each NE must have concatenation functionality.
Virtual concatenation, which transports the individual VCs and aggregates them at the
end point of the transmission path. For this, concatenation functionality is only needed at
the path termination equipment.
4.3. Virtual Concatenation (VCAT): allows the separation of GFP-adapted traffic into different
paths in an SDH network. Bandwidth mapping of the SDH payload to SDH channels, which are
either high-order or low-order virtual containers (VCs)
Bandwidth provisioning scheme. Bandwidth mapping of the SDH payload to SDH channels,
which are either high-order or low-order virtual containers (VCs).Concatenation is the process of
summing the bandwidth of X containers of the same type into a larger container.
2. Virtual concatenation: which transports the individual VCs and aggregates them at the
end point of the transmission path. For this, concatenation functionality is only needed at
the path termination equipment.
T
(VC3/4-Xv, X = 1... 256), providing a payload capacity of X times 48 384 or 149 760 kbit/s.
E
IS
IR
Advantages of VCAT
• Scalability: Allows bandwidth to be tuned in small increments on demand to match
desired data rate and avoid wastage. Traditional contiguous concatenation comes in coarse
increments.
• Efficiency: More easily routed through a network and aids to eliminate stranded
bandwidth. Allows for more efficient usage of an existing network’s available bandwidth.
• Compatibility: Requires only end nodes of the network to be aware of the containers
being virtually concatenated. Transparent to core network elements.
• Resiliency: Individual members of a virtually concatenated group can be routed as
diversely as possible across a network. So if one member is lost, the others are likely to be
operational albeit with a reduced bandwidth
4.4. Link Capacity Adjustment Scheme (LCAS) dynamically adjusts the capacities of SDH
paths according to source and/or destination needs. In combination, these technologies have
brought new life to SDH. In fact, this new network vision was named Next Generation SDH
(NGSDH). ITU-T as G.7042, designed to manage the bandwidth allocation of a VCAT path.
LCAS can add and remove members of a VCG that control a VCAT channel. LCAS cannot
adapt the size of the VCAT channel according to the traffic pattern.
LCAS applications
VCAT bandwidth allocation, LCAS enables the resizing of the VCAT pipe in use when it
receives an order from the NMS to increase or decrease the size.
Network Resilience, In the case of a partial failure of one path, LCAS reconfigures the
connection using the members still up and able to continue carrying traffic.
Asymmetric Configurations, LCAS is a unidirectional protocol allowing the provision of
asymmetric bandwidth between two MSSP nodes to configure asymmetric links
Cross-Domain Operation, because LCAS resides only at edge nodes it is not necessary
to coordinate more than one configuration centre
4.5 Auto negotiation: Auto negotiation is a feature to detect the link partner capabilities. It
T
allows the devices at both ends of a link segment to advertise abilities, acknowledge receipt and
understand the common mode(s) of operation that both devices share.
E
IS
IR
4.6 Link Integrity: Allows detecting faults along the end-to-end Ethernet transport
connection. For any traffic affecting VCG side problem, no point in keeping the ETH port UP (or
pumping ETH traffic).Link Integrity Enabled forces the ETH port to go down.
T
These architectures allow for efficient bandwidth usage as well as protection (i.e. the ability to
transmit traffic even when part of the network has failed).These topologies have different level
E
of protection which can be possible in the network.
5.1 Linear networks: In linear networks, SDH ADM nodes are connected in a linear fashion
where two terminal multiplexers exist at both ends as shown in Figure.1.This topology provides
IS
drop and insert capability to all network elements. There may be unprotected linear networks,
establishing two fiber connections between two ADMs or protected with four fiber connections
where two of them are working and other two serving as a backup or protection pair.
IR
Fig.5.1.Linear network
The meshed network architecture accommodates unexpected growth and change more
easily than simple point-to-point networks. A cross connects function concentrates traffic at a
central site and allows easy re-provisioning of the circuits. There are two possible
implementations of this type of network function:
5.3 Ring Architecture: The SDH building block for a ring architecture is the ADM.
Multiple ADMs can be put into a ring configuration for either Bi-directional or Unidirectional
traffic. The main advantage of the ring topology is its survivability; if a fibre cable is cut,
for example, the multiplexers have the local intelligence to send the services affected via
an alternate path through the ring without a lengthy interruption. The demand for
survivable services, diverse routing of fibre facilities, flexibility to rearrange services to
alternate serving nodes, as well as automatic restoration within seconds, have made rings
a popular SDH topology.
E T
IS
IR
Rings are very important because they give greater flexibility in the allocation of bandwidth to
the different users and they allow rerouting of traffic should a link fail under normal operation, a
2 Mb/s tributary is sent round the ring in both the directions. The ADM assigned to drop the 2
Mb/s tributary monitors the two SDH signals for errors and delivers the one with better
performance. This is known as path switching. When a catastrophic failure occurs, for example,
when the fiber is cut by a road digger, the nodes either side of the failure loop the clockwise ring
to the anticlockwise ring, allowing traffic to avoid the failed ring segment. This forms an
extended ring which carries all the traffic to each node in the ring, allowing service to continue.
The reliability and the maintenance of the transmission networks are two major aspects which
have to be considered when the SDH multiplexers are installed. The redundancy plays an
important part and has to be ensured both at the level of the transmission channels and
multiplexers. If the transmission channels has interruptions, the data traffic has to be switched
T
on an appropriate protection (backup) channel (protection switching) and if a multiplexer is out
of order the system has to switch on available protection equipments (equipment protection).
E
Two basic types of protection architecture are distinguished in APS.
When first 2 conditions occur the traffic quality will be lost and in the later case traffic itself will
be lost. So there was service level agreement done between service provider & customer,
according to which 99.999% of the time connection should be available and this is possible only
by Automatic Protection Switching.
W - working
P - protection
FIG.5.4. 1+1 Protection scheme
The simplest of all the forms is the 1+1 type of protection. Each working line (port or path) is
protected by one dedicated protection line (port or path). Protection line is redundant line
dedicated for the working line. Traffic is taken through both working line & protection line
simultaneously and at the far end traffic will be selected by switch depending upon the
healthiness of the traffic. The switch over is triggered by a defect such as fiber cut, SF or SD.
When working line is on the toss, traffic will be selected from the protection line. The main
disadvantage of the 1+1 is high bandwidth redundancy but 1+1 is faster than any of the
protection-switching scheme.
W - working
P - protection
T
1:1 in general can be called as 1:N; in 1:1 protection for each of the working line (which can be
either port or path) there will be a corresponding protection line. There will be 2 types of traffics
identified for catering it, high priority traffic & low priority traffic (Not supported in Tejas
E
products). High priority traffic will be catered in the working line and low priority traffic will be
taken through protection line. When the working line goes on the toss, traffic has to be catered
through protection line where low priority traffic is present, which will be pre-empted from
IS
protection line for serving the high priority traffic.
W - working
P - protection
In 1:N there will be N working line, which are getting protected by 1 protection line through
which low priority traffic is catered and the switching occurs depending upon the priority given to
the working line and low priority traffic will be given least priority.
Above said 2 protection schemes can be discussed in detail based on network topology, which
are
1. Linear protection scheme:
2. Ring protection scheme
Linear protection scheme: 1+1, 1:1 and 1:N Configurations can be used in linear protection
switching scheme.Linear topology leads to different configuration of protection fibers depending
on the type of equipments and their capabilities. The ‘1+1’ configuration means that a
supplementary fiber pair (called the ‘protection channel’) is dedicated to protect the primary fiber
pair (referred to as ‘working channel 1’). Depending of the operation (unidirectional or
IRISET 26 TCT5 – SDH Principles
Network Topology & APS in SDH
The protection switching mode can be configured either as revertive & non-revertive mode.
Non-revertive protection allows the traffic remains on the protect path even after the working
path is repaired.
Revertive systems restore working traffic on the original path after the Wait To Restore time
(WTR).
Multiplex section protection (MSP): is a port level protection supported on STM-1 interfaces.
The term MSP differentiates it from ring systems. The ‘1+1’ configuration uses a complete
duplication of services and implies that two identical lines are active at the same time.
Multiplex section protection is based on failure detection at the multiplex section level, by both
ADMs located on both sides of the failure. If a failure occurs in one section, the STM-N signal is
completely rerouted by switching over to the protection fibre, even if the failure is due to only
one of the containers in the frame
T
Ring protection scheme: Ring network is made up of ADM and any traffic added can reach to
its destination in 2 ways, which can be useful in APS.
E
IS
IR
Unidirectional rings Figure 5.7 shows the basic principle of APS for unidirectional rings. Let us
assume that there is an interruption in the circuit between the network elements A and B.
Direction y is unaffected by this fault. An alternative path must, however, be found for direction
x. The connection is therefore switched to the alternative path in network elements A and B.
The other network elements (C and D) switch through the back-up path. This switching process
is referred to as line switched. A simpler method is to use the so-called path switched ring.
Traffic is transmitted simultaneously over both the working line and the protection line. If there is
an interruption, the receiver (in this case A) switches to the protection line and immediately
takes up the connection
Unidirectional Operation
In the event of a single fiber cut, only one direction of traffic is switched over to the protection
T
fiber and the other direction remains on the original working fiber. Suitable for dedicated
protection schemes
E
IS
IR
Path Switching
Today, path switching is only used on unidirectional rings – hence the name Unidirectional Path
Switched Rings (UPSR)
To a large degree, path switching can be done completely by the receiver, without coordination
with the sender.
Line Switching
Line Switching is done on bi-directional rings, either two fiber or four fiber.
Thus the name Bi-directional Line Switched Ring (BLSR).
The total capacity of the fibers must be twice the carried traffic.
For four fiber systems, this means two fibers are dedicated for protection.
T
What does Line Switching mean?
Two adjacent nodes monitor the traffic between them.
If one detects “failure” on a fiber, it signals the other.
E
The two nodes coordinate switching to the protection fiber(s).
IS
IR
Sub network connection protection is a dedicated protection mechanism that can be used on
any physical structure (i.e. meshed, rings, or mixed). It may be applied at any path layer in a
layered network.
It can be used to protect a portion of a path (e.g. that portion where two separate paths
segments are available) between two Connection Points (CPs) or between a CP and a
Termination Connection Point (TCP), or the full end-to-end path between two TCPs. It switches
T
on server failures (using inherent monitoring) or it switches using client layer information (using
non-intrusive monitoring).
E
SNC protection is a linear protection scheme which can be applied on an individual basis to VC-
n signals. It need not be used on all VCs within a multiplex section. It need not be used on all
LO VCs within a HO VC. SNC protection operates in a unidirectional protection switching
IS
manner.
networks. One protection multiplex section can be used to protect the normal traffic from a
number (N) of working multiplex sections. It cannot protect against node failures. It can operate
in a unidirectional or bidirectional manner, and it can carry extra traffic on the protection
multiplex section in bidirectional operation.
Switch time – In a ring with no extra traffic, all nodes in the idle state (no detected failures, no
active automatic or external commands, and receiving only Idle K-bytes), and with less than
1200 km of fibre, the switch (ring and span) completion time for a failure on a single span shall
be less than 50 ms. On rings under all other conditions, the switch completion time can exceed
50 ms (the specific interval is under study) to allow time to remove extra traffic, or to negotiate
and accommodate coexisting APS requests.
Switch time – The APS algorithm for LO/HO VC trail protection shall operate as fast as possible.
A value of 50 ms has been proposed as a target time. Concerns have been expressed over this
proposed target time when many VCs are involved. This is for further study. Protection switch
completion time excludes the detection time necessary to initiate the protection switch, and the
hold-off time.
E T
IS
IR
SNC Protection
Protection Mechanisms
Where to use – Rule of thumb
Point-to-point
– MSP
– SNCP
Ring
– SNCP
– MS-SPRing
Leased line
– SNCP (individual VC-Xs)
– MSP (whole MS)
Mixed traffic
– SNCP (individual VC-Xs)
E T
IS
Table.2.The Ring Protection Architectures
IR
Traffic Protection
The protection based on inherent switching is controlled by receipt of AIS (alarm indication
signal) or LOP (loss of pointer). Errors leading to AIS and LOP and therefore protection
switching are: LOS (loss of signal), LOF (loss of frame) or excessive errors.
The SNC/N protection will initiate a switch, if an SF (Signal Failure) or SD (Signal Degrade)
condition is detected..
E T
IS
IR
The clock signal is regenerated in the SSUs and SECs with the aid of phase-locked loops. If the
clock supply fails, the affected network element switches over to a clock source with the same
or lower quality, or if this is not possible, it switches to hold-over mode. In this situation, the
clock signal is kept relatively accurate by controlling the oscillator by applying the stored
frequency correction values for the previous hours and taking the temperature of the oscillator
into account.
6.1. Synchronization network is a network that shall be able to provide all types of
telecommunication traffic networks with reference timing signals of required quality. The
objective for the traffic networks, for example switching, transport, signaling, mobile, is to not
lose information. Loss of information is often caused by poor synchronization. This can be
avoided by properly connecting the traffic network to an adequate synchronization network (how
to connect to a synchronization network is normally called network synchronization)
synchronization network is set up to ensure that all of the elements in the communications
network are synchronous. A network where transmission system payloads are synchronised to
a master (network) clock and traceable to a reference clock. A network where all clocks have
the same long term accuracy under normal operating conditions.
Back to content page
6.2 Poor synchronization causes loss of information in varying degrees. Examples of results
of poor synchronization are:
T
up to N=20 SECs cascaded between any two SSUs
up to K=10 SSUs in one chain
E
total number of SECs in one chain limited to 60
IS
Fig.6.2. Synchronization Network Reference Chain model
As pointed out earlier, the switches in digital communication networks in which time division
multiplexing is applied, need a common timing reference. The requirements on the accuracy
and stability of the reference result from the connection quality objectives (measured in terms of
the slip rate) of a digital connection, specified in ITU-T Recommendation G.822 . Currently
those requirements can only be met with atomic (Caesium-beam) clocks used as the network
primary reference clock (PRC: Primary Reference Clock) or with use of GPS receivers; but by
deploying different strategies on clock holdover, repair time and network planning, these
objectives can also be met under failure condition for a limited period of time. The task of
network synchronization is to distribute the reference signal from the PRC to all network
elements requiring synchronization. The PRC determines the long-term stability of the reference
frequency.
SSUs (Synchronization Supply Units) regenerate the clock signal after it has passed a chain
of SECs and serve as temporary references for parts of the network when the connection to the
PRC is lost in failure situations. Usually SSUs are located in network nodes where they
distribute a timing signal to all network elements in the node.
SECs (SDH Equipment Clocks) are the clocks incorporated in SDH network elements. SECs
offer great flexibility in the selection of references and support automatic reconfiguration
mechanisms in rings or chains of SDH network elements.
T
T4 : 2MHz output sync. Signals (may be derived from 2 Mbit/s without traffic)
Holdover mode: An operating condition of a clock which has lost its controlling reference input
and is using stored data, acquired while in locked operation, to control its output. The stored
data are used to control phase and frequency variations, allowing the locked condition to be
reproduced within specifications. Holdover begins when the clock output no longer reflects the
influence of a connected external reference, or transition from it. Holdover terminates when the
output of the clock reverts to locked mode condition.
Locked mode: An operating condition of a slave clock in which the output signal is controlled by
an external input reference such that the clock’s output signal has the same long-term average
frequency as the input reference, and the time error function between output and input is
bounded. Locked mode is the expected mode of operation of a slave clock.
6.6 Synchronization Status Message (SSM): This is a communication channel in the SDH
protocol designated for setting-up of protected synchronization of an SDH network.
The status message contains information on the quality level of the timing source. The quality
message, together with a list of synchronization sources in each network element, allows
controlled switching of the synchronization source if there is a fault.
Note: An SDH network will operate completely satisfactorily even if it is not synchronized to very
precise external references. The important requirement is the selection of one source and to
use that to distribute synchronization. In the initial phase, the internal clock of one TM/ADM can
be used to synchronize the others. If one of the external interfaces is synchronized, it can be
used as a reference.
E T
IS
IR
Jitter and Wander are defined respectively as the short term and long term variations of the
significant instants of a digital signal from their ideal positions. They are relative terms and
always mentioned with respect to a reference clock and can be represented as varying their
positions with respect to time by moving backward or forward in reference to an ideal clock
source. In any transmission network Jitter and Wander accumulate according to their generation
and transfer characteristics of each equipment connected, can effect the signals and might
cause bit errors, uncontrollable slips etc. It is necessary that the amount of jitter and wander are
controlled for SDH network interface. The jitter, which is specified as maximum phase amplitude
and is quantified as a peak to peak value as it is the peak jitter that causes the bit error. Jitter is
measured in Unit Intervals (UIs). One UI is of one data bit width.
T
The measurement of wander needs any Primary Reference Clock (PRC) or any other reference
clock, which is free from wander. It involves low frequencies with long duration and can consist
of hours of phase information. High temporal resolution is needed to measure phase transients.
7.1
E
Parameters To Measure Synchronization Quality And to Specify Performance
Limits:
IS
Time Interval Error (TIE): It is the phase difference between the signal and reference
clock, measured in nano seconds. It is set to zero at the start of total measurement period
and provides the information of phase changes since the beginning of the measurement.
Maximum Time Interval Error (MTIE): It is defined as the largest peak to peak TIE within
a specified interval and characterizes frequency off set and phase transients. A time
IR
window of specified interval is moved across the entire measurement time of TIE and the
peak value is the MTIE.
Time Deviation (TDev): It is defined as the rms value of the filtered TIE and characterizes
its spectral contents. The band pass filter is centered on a frequency of 0.42/t, where t is
the observation interval. As rms part of T Dev calculation requires sufficient time to get a
good statistical average, at least 12 t is required for accurate value of T Dev. Normal
practice is to observe for 3t for calculation of T Dev for an interval of t.
The cross connect as shown in Fig. 7.1 receives various tributaries as inputs and generates a
new aggregate output signal. The timing of the output signal is determined by the synchronous
clock function and the input signal might be at slower phase when compared with the output
signal. The two signals are originated from the same clock function but varying at the input and
output of the network element. The causes are as given below.
The input and output phase variations are to be removed to maintain the integrity of data. This
is achieved by the pointer justification process, which shifts the pay load by advancing or
retarding within the STM-N signal. At receiving end where the pay load is demapped, these
adjustments might result in pay load jitter which should be smoothened to ensure that jitter
remains within limit. Especially the low frequency wander in the SDH systems is gradually
stored up by the pointer processing mechanism and released as a higher frequency phase
transient in the pay load causing adverse effects on data integration. To avoid this, the jitter and
wander should be kept within the permissible limits.
T
Design verification and field trial
Installation and commissioning
Operation and maintenance
E
SDH network contains the capability to support the in service testing by network management
system for operation and maintenance. However, the insufficiency of this capability and
necessity of comprehensive testing make it essential to use external SDH Test Set to ensure
IS
that the SDH network elements provide the promised operational benefits to the network
operators and their customers as per ITU-T standards.
7.4 Objectives of Testing: The SDH functionality is dependent more on software. The testing
objective covers four broad categories.
IR
Payload Pointer Tests: Payload Pointer tests include timing offset and tributary output jitter
tests, which confirm that SDH network equipment is operable with other non-SDH network
elements already in use in networks.
Line Interface Tests: Line Interface tests include the parametric tests that confirm the electrical
and optical functional capabilities of an SDH interface.
Embedded Overhead Tests: Embedded overhead tests include alarm stressing and
performance monitoring, network management protocol tests and other special tests, which
confirm that SDH network elements respond in a predictable manner under stress condition.
7.6 General Aspects Of Testing: The general aspects that should be considered while
testing SDH network, are as below.
Each Network Element (NE) is fully assembled with its cards installed
Cabling is done between Digital Distribution Frame (DDF) and NE tributary ports
Computer control of the NE is established
Configuring of NE operating characteristics is completed
Avoiding Optical Receive Overload: Care should be taken to avoid overload of receiver using
attenuator while testing NE.
7.7 Functional Tests: The test set up is as shown in Fig.10.2 for the following functional
verification tests.
T
Verifying Correct Mechanical Installation: This test is for checking correct mechanical
installation of an SDH network element that may be Add/Drop Multiplexer (ADM), Line Terminal
Multiplexer (LTM) or Digital Cross Connect (DXC). In Fig. 7.2, it is assumed that the NE is an
E
ADM.
Performing a BER test on each Virtual Container path (VC-n) processed by the NE, checks the
IS
NE for the following.
Verifying Path Routing To PDH Tributary Ports: This test verifies path routing through an
ADM or DXC. It identifies, which VC-n paths are terminated by the NE, with the mapped
payload being dropped to a PDH tributary port.
IRISET 39 TCT5 – SDH Principles
Jitter & Wander in SDH systems & Testing of SDH network
Verifying Path Routing To SDH Tributary Ports: This test verifies the VC-4 path routing to the
SDH tributary ports. The test set up is as in Fig. 10.2 with the receive input shown in dotted line.
Verifying Trail Trace Identifier Configuration: This test verifies correct NE configuration of
the trail trace identifier for a terminated path. In addition, it verifies automatic reporting of the
associated trace identifier mismatch alarm to the management system.
T
If the PRC is poorly distributed to NEs it causes increase in pointer activity, resulting in
increased tributary jitter and in worst case, this activity leads to corruption or even loss of
payload data. E
The Lock Sync. test verifies correct configuration of the clock synchronization hierarchy in the
NE. Three alternative clock sources are mentioned below.
IS
Primary: External 2 MHz clock (also used for Sync of SDH test set),
Secondary: Received STM-N line signal
Tertiary: NE’s own internal clock.
IR
The test set up for Mapping and De-mapping tests is as shown in Fig.10.7.3.
Mapping Test: Mapping is the process of assembling the payload from the container into virtual
container. This test verifies the performance of the payload mapping process in a device under
IRISET 40 TCT5 – SDH Principles
Jitter & Wander in SDH systems & Testing of SDH network
test by off-setting the bit rate of tributary test signal to stress the synchronization capabilities of
the mapping process. There should be no error in the bit rate of 2 mbps, 34 mbps, 140 mbps or
55 mbps with the off setting by + 50 ppm, + 20 ppm, + 15 ppm and +20 ppm respectively.
7.9 Jitter Testing: Jitter testing of SDH network includes measurement of the following.
STM-N optical jitter tolerance
STM-N optical output jitter
PDH tributary jitter
Pointer adjustment jitter (combined jitter)
De-mapping jitter
Jitter is the short term variation of the significant instants of the digital signal with respect to the
position in time, which they should otherwise occupy. It can also be considered as spurious
T
phase modulation of digital signal clock. Jitter measurements are always made on clock signal
and expressed in Unit Intervals (UIs), which are independent of bit rate and can be calculated
as below.
E
The jitter frequency is rarely a sinusoidal, although sinusoidal jitter frequency is often used in
testing. For example,
IS
Peak deviation of bit rate
M = Modulation Index = ---------------------------------- = ╥ X jpp (Jpp = Jitter Peak to Peak)
Jitter frequency
For a 2.048 kbps data, UI = 0.488 ns, if the Jitter function (amplitude) is 2.44,the peak to peak
jitter will be = 2.44/0.488 = 5 UI
IR
If jitter frequency is 100 Hz, peak deviation of bit rate = 100 x 15.70 = 1570 Hz
Therefore, the bit stream varies as 2048000 + 1570 Hz at a rate of 100 times per second.
The primary sources of jitter are the network elements themselves. The types of jitter and the
possible causes are as given below.
Mapping/De-Mapping Jitter: Mapping and De-Mapping jitter are caused by the phase
smoothing associated with the read/write clock of elastic stores and the bit stuffing/de-
stuffing used to compensate for frequency variation of the mapped tributary signal.
Pointer Jitter: Pointer jitter is caused by excessive pointer movements as a result of the
effects of clock noise, frequency off-sets.
Systematic Jitter: Systematic jitter is caused by mis aligned timing recovery circuits, finite
pulse width and clock threshold off-sets.
E T
IS
Fig. 7.5 SDH Jitter Tolerance Mask (ITU-T G.825)
IR
Measuring SDH Jitter Tolerance: This test as shown in Fig. 7.4 verifies that NE complies with
the ITU-T Jitter Specification and requires evaluating the results against the defined mask as
shown in Fig. 7.5.
Measuring SDH Optical Output Jitter: This test verifies maximum acceptable jitter as per ITU-
T Recommendation G.958 at NE’s optical output. The test set up is as shown in Fig. 7.6.
Measuring PDH Tributary Jitter: The jitter present on a PDH signal output from an SDH
network, results from following two primary sources.
Pointer adjustment
Bit stuff justification process performed when mapping an asynchronous signal into the
synchronous transport signal.
Therefore, both pointer adjustment jitter and de-mapping jitter are to be tested to verify the
compliance with the ITU-T standard G.783, which limits the maximum acceptable level of jitter.
Pointer Jitter (Combined Jitter): The pointer movements occur often in SDH network causing
the output of large amount of jitter spikes at the tributary ports and into the PDH network, which
is not designed to withstand with such large amount of transient jitter. Therefore, testing of this
jitter is very much essential to ensure that this effect is minimized and that errors and loss of
data do not occur.
Jitter resulting from pointer adjustment is totally different in character from jitter previously
experienced in PDH network. It is transient in nature, relatively high in amplitude and most of
the energy is contained in low frequency components as shown in Fig. 10.7
E T
IS
IR
For this testing, the set up is as shown in Fig. 7.8. The SDH test set is capable to generate
combined impairment by providing independent control over PDH off set and pointer sequence.
This set is to be done according to ITU-T standard G.783 given in Table. 10.1
Current ITU-T/ETSI standards define four pointer sequences for use during this testing of NE.
Pointer jitter test involves measuring the tributary jitter while the network element is stressed
with pointer sequence shown in Fig. 7.9 defined in ITU-T standard G.783 for 34 mbps (TU-3
pointer) and for 140 mbps (AU-4 pointer).
SDH SDH
TEST Network
Element
SET
T
Fig. 7.8 Pointer Jitter Test
When testing 2 mbps, similar pointer sequences are generated on the TU-12 pointer associated
with the 2 mbps tributary under test with the following differences.
The maximum acceptable level of pointer adjustment jitter at PDH output tributaries on SDH
NEs as per ITU-T standard G.783 is given in Table. 7. 2.
IR
T
0.075
Low amplitude
IR
Relatively high frequency and can therefore be suppressed by the de-synchronizer in SDH-
NE
Its amplitude varies as the PDH tributary frequency is off set relative to VC-n. This is due to
changes in the mapping’s bit stuff justification ratio to compensate such off set.
The peak de-mapping jitter occurs at a small off set from OPPM (PDH tributary relative to VC-
n). The limits as per ITU-T G.783 Rec. are given below in Table 10.3.
The objective of a de-mapping jitter test is to find the maximum peak to peak jitter caused by off
setting the frequency mapped PDH signal relative to that of the VC-n used to transport this
T
payload. The test set up is shown in Fig. 7.11.
E
IS
IR
Here, the SDH test set and NE must be synchronized with the same clock, which ensures that
no unexpected pointer adjustment occurs during testing and that only de-mapping jitter is
measured.
7.10 Testing With “Built-In” Capability Of SDH NE And Use Of Overheads: Network
management, detection and location of fault, performance monitoring, protection switching,
alarms simulation and duration etc are possible with the additional benefits inherent in SDH NE.
Exploitation of SDH Analyzer (Designed as per TEC Spec. NO.G/SDA-01/02 Feb.97) can also
help performing those tests.
Performance Monitoring: The mechanism within SDH is used to derive the error performance,
short interruption parameters and unavailability parameters based on eroded blocks and the
BIP-n is used on frame by frame basis. These BIP checks inserted in the overheads associated
with the selection, line, path maintenance spans. Errors detected in HO and LO paths BIPs
cause FEBE signal to be sent up streams. Following are the performance monitoring
parameters.
T
RS, B2, BIP2 and FEBE in TUs.
Alarm Simulation and Detection: Major alarm signals based on overheads bytes, such as
E
Loss Of Signal (LOS), Loss Of Frame (LOF) and Loss Of Pointer (LOP) cause Alarm Indication
Signal (AIS) to be transmitted down stream. In response to different AIS signals, Far End
Remote Failure (FERF) and Remote Alarm Indication (RAI) as applicable are sent up stream, to
IS
warn about trouble in down streams.
IR
T
G.782 - General characteristics of SDH multiplexing equipment
G.783 - Characteristics of functional blocks of SDH multiplexing equipment
G.784 - SDH management
G.sdxc1
G.sdxc2
G.sdxc3
-
-
-
E
Structure of recommendations concerning SDH cross-connect panels
General characteristics of SDH cross-connect panels
Characteristics of functional blocks of SDH cross-connect panels
IS
G.802 - Inter working between networks, based on different asynchronous digital
G.803 Hierarchies and speech encoding laws.
G.821 - Architectures of transport networks based on the SDH
IR
G.702 & G.703: Mainly PDH recommendations covering the number of PDH digital
hierarchy bit rates 1544 & 2048 kbps, and PDH based digital networks.
G.70x: G.707, G.708 & G.709 form a coherent set of specifications for SDH & NNI.
– The first level of SDH shall be 155.520 mbps.
– Higher SDH bit rates shall be obtained as integer multiples.
– Higher rate levels should be denoted by the corresponding multiplication factor of the
first level.
G.707: Covers the advantages offered by synchronous digital multiplexing method, defines
the standardized levels of SDH bit rates, specifies the SDH bit rates. The bit rates of SDH
as specified by G.707 are shown in Table 9.2
T
G.708: Specifies signal structure of NNI for SDH, specifies the general principles and basic
frame structure of the network node interface (NNI) for SDH and covers the principles of
SDH working. The SDH is the key to flexible broadband networks that features efficient
E
operation, administration and maintenance. The SDH standards exploit one common
characteristic of all PDH networks, i.e. 125 micro seconds duration, the sampling rate of
audio signal. The frame structure contains 9 rows and number of columns depending upon
IS
STM level. In STM-1 there are 9 rows and 270 columns. In 1.544 mbps 24 channel PDH
signal, there are 25 bytes (time slots) in 125 microseconds and two additional bytes for
supervisory etc i.e. 9 rows x 3 columns. Similarly in 2.048 mbps (30 Chl), there are 32
bytes in one frame. Adding 4 bytes more, it becomes 36 bytes i.e. 9 rows x 4 columns.
STM-1 contains 9 rows and 270 columns. The first 9 rows and 9 columns accommodate
IR
Section Overhead (SOH) and 9 rows and 261 columns accommodate the information
payload. So the speed is 270 x 9 x 8 x 8000 bits / sec, i.e. equal to 155.520 mbps.
G.709: Specifies the multiplexing structure within the basic frame and multiplexing of basic
frames with one another. Formats for mapping of multiplexing elements into the STM-1 at
the NNI and the method of multiplexing to STM-1 shall be as described as in this
Recommendation. It is a Synchronous Basic Multiplexing Structure.
G.773: Covers mainly the network and transmission management systems and defines the
Q interfaces for management.
G.781, G.782, G.783 & G.784: Covers the characteristics of SDH multiplexing equipment.
G.781 presents the structure of recommendations concerning synchronous multiplexing
equipment and gives information on the different options to be found there.
IRISET 49 TCT5 – SDH Principles
Annexure
T
describes the layered model of transport network.
Inter–Office
Intra
Application Short–haul
Office Long–haul
Source nominal 1310 1310 1550 1310 1550
wavelength (nm)
T
STM STM-1 1-1 S-1.1 S-1.2 L-1.1 L-1.2 L-1.3
Level STM-4 1-4 S-4.1 S-4.2 L-4.1 L-4.2 L-4.3
STM-16 E1-16 S-16.1 S-16.2 L-16.1 L-16.2 L-16.3
OBJECTIVE
Chapter – 1
1. Mapping is a process used when PDH tributaries are adapted into VCs by adding POH
information (T/F)
2. Aligning is a process takes place when a pointer is included into a Tributary Unit (TU) or an
Administrative Unit (AU) (T/F)
3. Multiplexing is used when multiple low-order path signals are adapted into a higher-order
path signal (T/F)
4. Container(C) is the first entry point of the PDH signal into STM-N frame (T/F)
5. Each container is added with control information known as Path Over Head (POH) called as
Virtual Container (T/F)
6. Tributary unit (TU) provides adaptation between the lower order path layer and the higher
order path layer. (T/F)
7. Pointer indicates the phase alignment of the virtual containers (VC-n) (T/F)
8. Administrative Unit (AU) provides adaptation between higher order path layer and the
T
multiplex section layer (T/F)
Chapter – 2
1. Terminal multiplexers are used to combine plesiochronous and synchronous input signals
E
into higher bit rate STM-N signals. (T/F)
2. SDH regenerators have to regenerate the clock and amplitude relationships of the incoming
data signals. (T/F)
IS
3. An Add/drop multiplexer (ADM) can be extracted Plesiochronous and lower bit rate
synchronous signals from or inserted into high speed SDH bit streams. (T/F)
4. An STM-1 frame structure consists of payload blocks, overhead blocks and pointers (T/F)
5. The time duration of an STM-1 frame is 125μSec. (T/F)
6. The Section Over Head (SOH) Contains maintenance, monitoring and operational
IR
functions. (T/F)
7. A1, A2 Framing bytes indicate the beginning of the STM-N frame. (T/F)
8. B1 byte is used to check for transmission errors over a regenerator section (T/F)
9. D1–D3 Bytes are used for data communications channel in regenerator section termination
equipment. (T/F)
10. The Multiplex Section Overhead contains the information required between the multiplex
section termination equipment at each end of the Multiplex section (T/F)
11. K1,K2 Two bytes allocated for APS signaling for multiplex section protection. (T/F)
Chapter – 3
1. The input to container C4 is E4 -139.264 mbps. (T/F)
2. The size of the C4 container is 260 columns and 9 rows matrix structure (T/F)
3. Justification is an operation, which makes it possible to fit a variable rate signal into a fixed
rate frame. (T/F)
4. The POH has the task of monitoring quality and indicating the type of container. (T/F)
5. J1 is an Higher-Order VC-N path trace byte (T/F)
6. K3 byte is provided for protection at the VC-4/3 path levels (T/F)
7. VC4 is composed of 261 columns each of 9 rows (T/F)
8. AU-4 Pointer points to the VC-4 in an STM-1 frame (T/F)
IRISET 52 TCT5 – SDH Principles
Chapter – 4
1. Concatenation is the process of summing the bandwidth of X containers of the same type
into a larger container. (T/F)
2. Virtual Concatenation (VCAT) allows the separation of GFP-adapted traffic into different
paths in an SDH network (T/F)
T
3. Link Capacity Adjustment Scheme (LCAS) dynamically adjusts the capacities of SDH
paths. (T/F)
4. Auto negotiation is a feature to detect the link partner capabilities. (T/F)
5.
E
Link Integrity allows detecting faults along the end-to-end Ethernet transport connection.
Chapter – 5
(T/F)
IS
1. Equipment of the SDH can be adequately protected by circuit board duplication 1+1 or
N+1 (T/F)
2. Duplicating the link on different routes provides the automatic path protection of a SDH
network. (T/F)
3. If one of the inter node links of a APS network fails, the traffic is interrupted. (T/F)
IR
4. In the event of a failure of a SDH network, protection switches operate on both sides of the
failure to route the traffic through spare capacity. (T/F)
5. The multiplexing section of a SDH network is protected by MSOH. (T/F)
6. In case of 1+1 configuration of a SDH network the stand by route is idle when main is
working condition. (T/F)
7. In case of 1:1 configuration of the SDH network the main route transports traffic of higher
importance where as the stand by carries the traffic of lesser importance. (T/F)
8. Bi-directional SDH ring supports only section protection. (T/F)
9. In bi-directional ring of SDH, half the bandwidth must be reserved for protection to allow for
rerouting the traffic in the event of failure in another part of the ring. (T/F)
10. Network reliability in SDH increases with the number of rings. (T/F)
11. A linier network topology provides drop and insert capability to all network elements (T/F)
12. Protection is to provide some redundant capacity within a network and automatically
reroute traffic (T/F)
13. 1:1 Protection is based on the principle of Bridging at the sending site and Selection at the
receiving site. (T/F)
14. In 1+1 protection system if fiber cuts, the source & the destination both switch over to the
other protection fiber (T/F)
15. SNCP is a port level protection supported on the STM interfaces (T/F)
IRISET 53 TCT5 – SDH Principles
Question Bank
Chapter – 6
1. SSUs (Synchronization Supply Units) regenerate the clock signal after it has passed a
chain of SECs. (T/F)
2. SSUs distribute a timing signal to all network elements in the node. (T/F)
3. In free running mode the clock has never had a network reference input. (T/F)
4. SDH NE operates in Holdover mode when NE has lost its controlling reference input and is
using stored data. (T/F)
5. Locked mode is the expected mode of operation of a slave clock (T/F)
6. The synchronization status message contains information on the quality level of the timing
source. (T/F)
Chapter – 7
1. The short-term variation of significant instants of digital signal from their ideal position is
called jitter. (T/F)
2. The long-term variation of significant instants of digital signal from their ideal position is
called wander. (T/F)
3. One UI is of one data bit width. (T/F)
T
4. For testing of transport capability test the BER and mapping /de-mapping tests are
conducted. (T/F)
5. For testing of payload pointer tests, the timing offset and tributary output jitter tests are
conducted. E (T/F)
6. Clock synchronization test is conducted by verifying the line frequency, pointer activity and
sync status byte. (T/F)
7. Jitter testing includes optical jitter tolerance, optical output jitter, PDH tributary jitter, pointer
IS
adjustment jitter and de- mapping jitter. (T/F)
8. Network management includes fault management, performance management, configuration
management, and software download and telecom management network. (T/F)
1. Jitter is the ( )
a) Short-term variation b) Long-term variation
2. For testing of transport capability tests- ( )
a) The BER and mapping /de-mapping tests are conducted.
b) The timing offset and tributary output jitter tests are conducted.
c)
3. Clock synchronization test is conducted by ( )
a) Verifying the line frequency c) Pointer activity
b) Sync status byte. d) All
4. Jitter testing includes- ( )
a) Optical jitter tolerance b) Optical output jitter,
c) PDH tributary jitter c) Pointer adjustment jitter
d) De- mapping jitter e) All
SUBJECTIVE
Chapter – 1
T
b. Aligning
c. Multiplexing
4. What are the mapping elements in multiplexing process? Explain them briefly?
Chapter – 2
E
1. Briefly explain the following
IS
a. Regenerator Section
b. Multiplex Section
c. Path
2. Draw and explain the STM-1 frame structure?
IR
Chapter – 3
Chapter – 4
Chapter – 5
Chapter – 6
Chapter – 7
T
1. What do you know about jitter and wander in SDH?
2. What are the parameters to measure synchronization quality?
3. What is path synchronization?
4.
5.
6.
E
What are the objectives of testing?
Explain the SDH functional tests?
Explain how to verify clock synchronization?
IS
7. Explain mapping and de-mapping tests?
8. Explain what do you understand about jitter testing?
IR
T
MS-RDI Multiplex Section Remote Defect Indication
MS-REI MS remote error indication
MS-SPRing Multiplex Section-Shared Protected Rings,
MTIE Maximum Time Interval Error
E
OTN Optical Transport Network
POH Path Overhead
PPJ Positive Pointer Justification
PRC primary reference clock
IS
RDI Remote Defect Indication
RSOH Regenerator Section Overhead
SDH Synchronous Digital Hierarchy
SEC synchronous equipment clocks
SNCP Sub-Network Connection Protection
IR
T
availability, 1, 25, 22, 20 dxc, 20
B E
bidirectional, 27, 31, 20
bip, 20
bip2, 20
E e1, 20
e3, 20
e4, 20
IS
bit, 1, 2, 3, 4, 5, 6, 10, 11, 12, 13, 15, 16, elements, 1, 3, 6, 7, 13, 14, 16, 22, 23, 28,
19, 21, 22, 20, 24, 25, 29, 20, 21, 20 29, 20, 21, 22, 21, 22, 23, 25, 21, 22, 20
bits, 1, 3, 7, 8, 9, 10, 11, 12, 13, 14, 16, 17, error, 7, 8, 13, 29, 22, 20, 22, 24, 31, 20
19, 22, 21, 20 es, 20
block, 1, 2, 3, 18, 24, 20 ethernet, 20
IR
blsr, 20 etsi, 20
byte, 3, 4, 7, 8, 10, 11, 12, 13, 14, 15, 16, extracted, 6, 9, 29, 20
19, 20, 21, 23, 21, 20
bytes, 6, 7, 8, 10, 11, 15, 16, 17, 18, 19, 20, F
21, 26, 31, 21, 20 frame, 1, 3, 4, 5, 6, 7, 8, 11, 13, 14, 15, 16,
17, 18, 19, 20, 21, 28, 33, 31, 21, 22, 20
C
channel, 7, 13, 14, 22, 25, 26, 27, 22, 21, G
20 gfp, 20
clock, 3, 5, 9, 10, 14, 16, 17, 20, 21, 22, 23,
20, 21, 23, 24, 25, 30, 23, 24, 20 H
code, 7, 13, 20
hdlc, 20
coding, 20
holdover, 21, 20
columns, 6, 10, 14, 15, 18, 19, 20, 21, 20
commissioning, 21, 20 I
compatible, 1, 20
concatenation, 13, 15, 20, 21, 22, 20 interface, 20, 22, 31, 20, 21, 20
configure, 22, 20 itu, 20
configured, 27, 20
Back to content page
IRISET 58 TCT5 – SDH Principles
Glossary
T
rsoh, 21
monitored, 1, 13, 29, 20
msoh, 20 S
msp, 20 E scrambling, 7, 8, 13, 21
mssp, 20
sdh, 21
mtie, 20
ses, 21
multiframe, 22, 20
sesr, 21
IS
multiplexing, 1, 2, 3, 4, 8, 14, 19, 20, 21, 24,
sf, 21
21, 20, 21, 22, 20
slave, 22, 21
N slip, 16, 21
sncp, 21
ngsdh, 20
IR
soh, 21
nms, 20 sonet, 21
node, 21, 23, 25, 29, 31, 22, 20, 21, 20 ssm, 21
ssu, 21
O
stm, 21
offset, 4, 15, 16, 20, 21, 20 survivability, 24, 21
overheads, 31, 20 synchronisation, 8, 21
P T
path, 3, 4, 6, 12, 13, 14, 19, 21, 20, 21, 22, tdm, 21
24, 25, 26, 27, 28, 29, 31, 33, 22, 23, 31, tec, 21
22, 20 topology, 23, 24, 27, 21
payload, 1, 4, 6, 10, 12, 13, 14, 15, 16, 17, tributaries, 3, 8, 9, 16, 20, 28, 21
19, 21, 20, 21, 23, 24, 30, 21, 20 tributary, 3, 4, 9, 10, 11, 18, 21, 24, 25, 21,
pdh, 20 22, 23, 24, 25, 26, 27, 28, 29, 21
performance, 7, 8, 13, 25, 22, 23, 24, 30, tu, 21
31, 22, 23, 20 tu11, 21
plesiochronous, 1, 3, 5, 8, 9, 18, 20 tu12, 21
poh, 20 tu2, 21
tu3, 21
IRISET 59 TCT5 – SDH Principles
Glossary
tug, 21 vc11, 21
tug2, 21 vc12, 21
tug3, 21 vc2, 21
tx, 21 vc3, 21
vc4, 21
U vcat, 21
unidirectional, 22, 27, 28, 29, 31, 21 vcg, 21
unprotected, 23, 21
W
upsr, 21
wander, 20, 21, 20, 23, 21
V
vc, 21
E T
IS
IR
www.iriset.indianrailways.gov.in