Академический Документы
Профессиональный Документы
Культура Документы
HANDOUT
Edition : 03
The Bell Education Centre put in a great effort to give you this document. In case you have any remarks, do not hesitate to send us your comments. Our Training Directory describes all training programmes and modules this document (and others) is used in. This document was especially written for use during class instruction. The contents of this document are generic. It deals with concepts and principles, rather than with the latest releases of and modifications to the product delivered to the customers. International audiences use this document. It is therefore written in a clear, concise and above all, consistent language.
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
ii
TABLE OF CONTENTS
PREFACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1. EVOLUTION TOWARDS SDH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1 COMPLEXITY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.1 THE PROBLEM IN PDH Backtoback multiplexing . . . . . . .
1 3
3 6
1.1.2 THE SOLUTION IN SDH Add/Drop multiplexer . . . . . . . . . . . 10 1.2 TRANSMISSION HIERARCHY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 1.2.1 THE PROBLEM IN PDH Different hierarchies . . . . . . . . . . . . . 11 1.2.2 THE SOLUTION IN SDH One higher order hierarchy . . . . . . 11 1.3 MANAGEMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 1.3.1 THE PROBLEM IN PDH Limited possibilities . . . . . . . . . . . . . . 12
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
2. DESCRIPTION OF SDH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.1 SDH FRAMES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.2 NETWORK ARCHITECTURE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 2.3 SDH TERMINOLOGY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 2.4 MULTIPLEXING STRUCTURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 2.5 SECTION LAYER OVERHEADS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 2.5.1 REGENERATOR SECTION OVERHEAD . . . . . . . . . . . . . . . . . . 29 2.5.2 MULTIPLEXER SECTION OVERHEAD . . . . . . . . . . . . . . . . . . . . 30 2.6 POINTERS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 2.6.1 THE POINTER MECHANISM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 2.6.2 ADMINISTRATIVE UNIT POINTERS . . . . . . . . . . . . . . . . . . . . . . 34 2.6.3 TRIBUTARY UNIT POINTERS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 2.7 PATH LAYER OVERHEADS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 2.7.1 HIGHER ORDER POH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 2.7.2 LOWER ORDER POH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
iii
2.8 A GUIDE THROUGH SDH MULTIPLEXING SUMMARY OF THE VC, TU, TUG, AND AUG STRUCTURES . . . . 56 2.8.1 LOWER ORDER VIRTUAL CONTAINERS . . . . . . . . . . . . . . . . . 56 2.8.2 STRUCTURE OF THE TUG2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 2.8.3 VIRTUAL CONTAINER 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 2.8.4 STRUCTURE OF THE TUG3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 2.8.5 VIRTUAL CONTAINER 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 2.8.6 STRUCTURE OF THE ADMINISTRATIVE UNIT GROUP . . . . 61 2.8.7 MULTIPLEXING OF ADMINISTRATIVE UNIT GROUPS INTO STMN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 2.9 SDH AND ATM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 2.10 SDH AND SONET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
3.1 SDH NETWORK CONFIGURATION AND NETWORK ELEMENTS 69 3.1.1 GENERAL DESCRIPTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 3.1.2 NETWORK ELEMENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 3.1.3 EXAMPLES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 3.2 NETWORK PROTECTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 3.2.1 NETWORK PROTECTION METHODS . . . . . . . . . . . . . . . . . . . . 76 3.2.2 PROTECTION IN RING NETWORKS . . . . . . . . . . . . . . . . . . . . . . 80 3.2.3 PROTECTION IN MESHED NETWORKS . . . . . . . . . . . . . . . . . . 82 3.3 TIMING ASPECTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 3.3.1 TIMING SIGNALS IN SDH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 3.3.2 JITTER, WANDER, AND PHASE VARIATION . . . . . . . . . . . . . . . 85 3.3.3 SDH SYNCHRONISATION NETWORKS . . . . . . . . . . . . . . . . . . . 88 3.4 PHYSICAL INTERFACES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 3.4.1 OPTICAL INTERFACES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 3.4.2 RADIO INTERFACES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 3.4.3 ELECTRICAL INTERFACES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
ANNEX A : ALCATEL PRODUCTS FOR SDH . . . . . . . . . . . . . . . . . . . . 101 ANNEX B : RECOMMENDATIONS FOR SDH . . . . . . . . . . . . . . . . . . . . 103 ANNEX C : ABBREVIATIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
iv
PREFACE
PREFACE
This handout is an introduction to the Synchronous Digital Hierarchy (SDH) transmission system. It supplies the reader with information about: the position of the SDH in the transmission world; the SDH terminology; the SDH transmission structure; the network aspects of an SDH based network; the Alcatel products for the SDH. It has three appendixes: a list of Alcatel products for SDH; a list of the most important recommendations for the SDH; a list of the most common abbreviations in the SDH.
PREFACE
Research started in the mid 1980s in the USA, and resulted in the Bellcore ANSI standard referred to as the Synchronous Optical Network (SONET). This transmission system was specifically designed for the North American market. CCITT accepted the concept of this transmission system, but it had to make certain changes to define a worldwide system. The participants in CCITT reached an agreement in 1988, and the Synchronous Digital Hierarchy (SDH) transmission system was born. Next, we explain the weak points of the existing PDH system that led to the development of SDH. At the same time we give the requirements for the SDH system.
1.1 COMPLEXITY
Let us first take a look at the transmission network itself, and examine the impact of the introduction of optical technology in the long distance transmission network. Traditionally, before optical fibres were available, coaxial cables were used to construct long distance transmission networks. The price of the coaxial cable is heavily related to its bandwidth. ( Figure1)
34
140
Because the coaxial cable costs are much higher for a higher order system than the costs for a lower order system, the networks were carefully dimensioned, according to the capacity needed on each link. Figure 2 shows the typical structure of a small network. Figure 2 : A traditional network
Network node
2 x 8 Mbit/s
Network node
2 x 2 Mbit/s
Optical fibres can carry any bitrate, for example from 2 Mbit/s to 140 Mbit/s and even higher. Consequently, the cost of the optical fibre is independent of the bitrate it carries. Furthermore, because of the constant technical improvements in the field of fibre technology, optical transmitters and receivers, and the widespread use of optical systems, the price of optical transmission systems was reduced drastically over the past years. ( Figure 3)
Figure 3 : Evolution of transmission cost optical systems Transmission Cost per Mbit/s.km (relative)
45 Mbit/s 1000
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
90 Mbit/s
100
400 Mbit/s
10
1975
1980
1985
1990
1995
2000
Consequently, a network, which uses optical fibre transmission links, will possibly have a different structure. The pointtopoint connections in the traditional network can be replaced by a ring network. Such a ring network operates at a high speed, for example at 140 Mbit/s and it passes through all the network nodes. ( Figure 4 )
Network node 140 Mbit/s ring network Network node Network node
Network node
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
It carries information for several network nodes on the same optical cable. Lower order signals (for example 2 Mbit/s) that carry information destined for a certain network node are removed from the high order signal (140 Mbit/s) in that network node. Similarly, lower order signals can also be inserted into the higher order signal in that network node. Let us see what happens in a network node, when we have to remove and/or insert a lower order signal from/to the higher order signal carried by the backbone network.
Figure 5 illustrates backtoback multiplexing. In a PDH system the procedure to remove a tributary signal is as follows: first the incoming 140 Mbit/s signal has to be demultiplexed. This results in four signals of each 34 Mbit/s. then a 34 Mbit/s signal has to be demultiplexed. This results in four signals of each 8 Mbit/s. then an 8 Mbit/s signal has to be demultiplexed. This results in four signals of each 2 Mbit/s. When we want to insert a tributary signal into the higher order signal the inverse procedure is done. Starting from a 2 Mbit/s signal, three multiplexing steps are needed to come to the 140 Mbit/s signal.
140 Mbit/s
140 Mbit/s
2 Mbit/s
140 34
34 Mbit/s 2 Mbit/s
34 140
34 2
2 34
. .
2 Mbit/s 2 Mbit/s
. .
2 Mbit/s 2 Mbit/s
34 Mbit/s
34 Mbit/s
34 Mbit/s
34 Mbit/s
34 Mbit/s
34 Mbit/s
64 x 2 Mbit/s
We need a lot of equipment for this procedure, a cascade of multiplexers/demultiplexers have to be installed in the network node. This solution has a number of disadvantages: expensive and not flexible, because : tailormade installation is required in each network node. If we reconfigure the network we have to reconfigure and/or change the equipment. lots of processing increases the probability of faults and failures.
Backtoback multiplexing is not an optimal solution. The reason lies in the PDH multiplexing structures . The most fundamental parameters of digital telecommunications are the sampling rate of 8 kHz and the allocation of 8 bits per PCM coded sample. This results in a basic frame rate for digital transmission of 125s which, at 8 bits per channel (slot), is equivalent to a basic channel (slot) rate of 64 kbit/s. The first order signals (2 Mbit/s) in the PDH system are formed by the synchronous interleaving of 8bit basic channel octets. This is possible because the basic channel sampling rate (64kbit/s) and the primary aggregate rate (2Mbit/s) are both derived from the same, local clock source. The octet structure is thus maintained in the aggregate signal. ( Figure 6 )
channel nr. 0 1 2 3 29 30 31 0 1 2 3 29 30 31 0 1 2 3 29 30 31
channel 8 bits
time
Frame 125s
To reduce the cost of transmission, it was necessary to multiplex a number of these first order signals into a higher order signal for transmission as a single entity. It was not possible to use the simple process of byte interleaving because it required the universal synchronisation of all first order sources, at the time not available. Consequently, higher order PDH transmission systems are based on bit interleaving. Each bit in a given byte of the higher order frame is part of a different conversation. ( Figure 7 )
Figure 7 : Bit interleaving in a higher order signal (PDH) Within the frame bit nr.
d e f = 1 bit example: conversation 1
= 1 bit
example: conversation 2
p q r time
= 1 bit
example: conversation 3
So the bits that make up a single conversation (64 kbit/s) are distributed throughout the transmission frame. Predicting their exact location is difficult because of the extra timing bit, used for bit stuffing. Each higher order frame contains per tributary one bit position, that can be stuffed. Whether this bit contains tributary signal information or it is stuffed depends on the difference of the real bitrate and the nominal bitrate of the incoming tributary signal. The problem is that the content of this bit (tributary data or stuffing) is not known before demultiplexing. This is the reason why it is impossible to remove a 2 Mbit/s signal from a 140 Mbit/s signal directly. We have to go through the different demultiplexing levels, as shown on Figure 5. Because of the same reasons we can not insert directly a 2 Mbit/s signal into a 140 Mbit/s signal either.
ADD/DROP multiplexer
Drop
Add
10
Hierarchical level 0 1 2 3 4
Europe
Japan
TransAtlantic
11
1.3 MANAGEMENT
Operators need a standardised way to manage their equipment and their network. In this way transmission equipment from different vendors can also be managed centrally.
12
DESCRIPTION OF SDH
2. DESCRIPTION OF SDH
2.1 SDH FRAMES
The name of the SDH transmission frame is Synchronous Transport Module, and it is referred to as STMN, where N indicates the SDH hierarchy level. Figure 10 shows the basic, first level SDH frame structure, the SYNCHRONOUS TRANSPORT MODULE 1 (STM1).
270 bytes
1 1
9 10
270
Overhead
PAYLOAD
9 rows
9 125 sec
The characteristics of the STM1 frame are : content : 9 x 270 bytes = 2430 bytes; period : 125 sec; bitrate : 155,520 Mbit/s (2430 x 8 bits in every 125 sec); payload capacity : 150,336 Mbit/s (2349 x 8 bits in every 125 sec). The transmission of the frame is done row by row, from the top left corner (row number 1 on Figure 10).
13
DESCRIPTION OF SDH
SDH also defines higher order frames. Generally, an STMN frame contains : overhead : 9 rows x 9 bytes x N payload : 9 rows x 261 bytes x N Consequently, its bitrate is N x bitrate of the STM1 frame. Standardised frames are: STM4 STM16 STM64 : bitrate 622, 080 Mbit/s : bitrate 2 488, 320 Mbit/s : bitrate 9 953, 280 Mbit/s
It is also possible, that in the future higher rates corresponding to higher values of N will be defined if network operators need them and when technology permits. All STM frames have a period of 125 sec .
In the SONET transmission system the basic, first level transmission frame is the SYNCHRONOUS TRANSPORT SIGNAL 1 (STS1). Its bitrate is 51,840 Mbit/s. (Figure 11) Figure 11 : STS1 (SONET)
90 bytes
1 1
3 4
90
Over head
PAYLOAD
9 rows
9 125 sec
The SDH frames STM1, STM4, and STM16 correspond respectively to STS3, STS12, and STS48 in the SONET standards.
14
DESCRIPTION OF SDH
An SDH transmission network is handled as a layered structure. ( Figure 12 ) The three layers are : Path Layer; Multiplex Section Layer; Regenerator Section Layer.
Transmission path
Multiplex section
Regenerator section
The STMN frame contains different types of overhead information. The overhead information is used for operation, administration, maintenance and provisioning (OAM&P). The concept of layers permits to structure the overhead information into different blocks inside of the STMN frame. So each type of equipment has direct access to the information it needs, and each type of equipment interprets only that information, which is meaningful for it. The Path layer overhead carries information related to a specific signal and its path through the network. The Multiplex Section Layer overhead carries information for the communication between multiplexers. The Regenerator Section Layer overhead carries information for the communication between regenerators.
15
DESCRIPTION OF SDH
Chapter 1 referred to the fact that a PDH network is based on a synchronous frame of 125 sec, derived from the sampling rate used for the PCM of voice signals. It also showed, that the PDH first order signals use byte interleaved frame structures, derived from this same basic 125 sec frame. The SDH extends this principle to higher order multiplexing. Multiplexing is always done by byte interleaving of 125 sec frame synchronous signals. STM1 is the internationally standardised first order SDH frame, with a bitrate of 155,52 Mbit/s. This frame can carry: a single, higher order signal of approximately 140 Mbit/s or several lower order plesiochronous signals, which are multiplexed into a higher order signal of approximately 140 Mbit/s . These lower order signals can be of any type defined in the PDH hierarchy.
An STMN frame contains on the section layer level: SECTION OVERHEADs (SOH) Carry information for the management of the regenerator and multiplexer section layer. See chapter 2.5. ADMINISTRATIVE UNIT POINTER (AU PTR) Indicator, used for the adaptation of the path layers. See chapter 2.6. The payload. The payload part contains higher order Virtual Containers (VC). A higher order Virtual Container contains : lower order Virtual Containers. All Virtual Containers contain on the path layer level: PATH OVERHEAD (POH). See chapter 2.7. payload. Virtual Containers are referred to as virtual because they are logical entities that only exist in an STM, and containers, because they contain the information (a particular signal).
16
DESCRIPTION OF SDH
AU PTR
Payload
SECTION OVERHEAD
17
DESCRIPTION OF SDH
Figure 14 shows an example how multiplexing is done in SDH. It also introduces some new terms (abbreviations), which we want to explain in this chapter. Figure 14 : Multiplexing : from C1 to STMN
C1 C1
C1
POH
VC1
TU1 PTR
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
VC1
TU1
TU1 PTR
TU1 PTR
VC1
TUG2
TUG2
TUG3
TUG3
VC4
AU4 PTR
VC4
AU4
AU4 PTR
VC4
AUG
SOH
AUG
STMN
18
DESCRIPTION OF SDH
CONTAINER (C) A signal, which has to be transported in the SDH transmission network, is first put in a container. To fit the different plesiochronous signals, different container sizes are defined. Figure 15 shows these containers. Figure 15 : Containers in SDH
C2
6,312
C3
C4
VIRTUAL CONTAINER (VC) Each container has its associated Path Overhead (POH). The POH is generated at the plesiochronoussynchronous interface, and it is terminated at the synchronousplesiochronous interface. Thus a Virtual Container = Container + Path Overhead. ( Figure 16 ) Figure 16 : Virtual Container
POH
Container
19
DESCRIPTION OF SDH
Different types of virtual containers exist. They are : VC11, VC12, VC2, VC3, and VC4. They correspond to their respective containers and their associated POH. The different virtual containers are also divided in two types: Lower order virtual containers: VC11, VC12, VC2. Higher order virtual containers: VC3, VC4 or an assembly of tributary unit groups (TUG2s or TUG3s)
TRIBUTARY UNIT (TU) A Tributary Unit consists of a lower order VC and a TU Pointer. ( Figure17 ) The TU Pointer shows the offset of the lower order VC frame start relative to the higher order VC frame start. This information is needed to align the phases of the two VCs. Types of Tributary Units : TU1, TU2, TU3. They correspond to their respective virtual containers and their associated TU pointer.
TU PTR
20
DESCRIPTION OF SDH
TRIBUTARY UNIT GROUP (TUG) One or more TUs in fixed, defined positions in a higher order VC payload form a Tributary Unit Group. ( Figure 18 ) TUGs are defined in a flexible way. A TUG can be formed by different types of TUs, but in a particular TUG structure only TUs of the same type are permitted. Types of Tributary Unit Groups : TUG2 and TUG3. A TUG2 consists of a homogenous, byte interleaved assembly of identical TU1s or a TU2. A TUG3 consists of a homogenous, byte interleaved assembly of TUG2s or a TU3.
TU1 PTR
TU1 PTR
VC1
VC1
21
DESCRIPTION OF SDH
ADMINISTRATIVE UNIT (AU) An Administrative Unit consists of a higher order VC and an AU Pointer. ( Figure 19 ) The AU Pointer shows the offset of the higher order VC frame start relative to the multiplex section frame (STMN) start. This information is needed for phase alignment, which is to adapt the higher order path layer to the multiplex section layer. The location of the AU Pointer is fixed inside of the STMN frame. Types of Administrative Units : AU3, AU4. They correspond to their respective virtual containers and their associated AU pointer. The names AU3 and AU4 correspond respectively to STS1 Synchronous Payload Envelope (SPE), and STS3c SPE in the SONET system. Figure 19 : Administrative Unit (example AU4)
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
AU PTR
ADMINISTRATIVE UNIT GROUP (AUG) One or more AUs in fixed, defined positions in an STMN payload form an Administrative Unit Group. ( Figure 20) An Administrative Unit Group consists of a homogenous, byte interleaved assembly of AU3s or an AU4. Figure 20 : Administrative Unit Group
AU3 PTR
AU3 PTR
VC3
VC3
22
DESCRIPTION OF SDH
23
DESCRIPTION OF SDH
SDH aligning : A procedure, where the frame offset value is combined with the Tributary Unit or with the Administrative Unit. Pointer processing : See description in chapter 2.6. SDH multiplexing : A procedure, where several lower order path layer signals are adapted into a higher order path layer signal; or several higher order path layer signals are adapted into a multiplex section. Concatenation : A procedure, where several Virtual Containers are associated with each other, and their combined capacity is used as a single container. About concatenation in chapter 2.6.
24
DESCRIPTION OF SDH
xN STMN AUG
x7
AU3
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
VC3 x7
x1 TUG2 TU2 VC2 C2 6,312 Mbit/s x3 mapping aligning pointer processing x4 multiplexing TU11 VC11 C11 1,544 Mbit/s
TU12
VC12
This figure shows the signals that are associated with the SDH Containers. However, other type of information, for example ATM cells, can also be mapped into the containers.
25
DESCRIPTION OF SDH
ETSI defined a subset of possible multiplexing versions. Versions related to the SONET standard are not supported. ( Figure 22 ) Figure 22 : ETSI multiplexing structure
xN STMN AUG
x7
TU12
VC12
This figure shows the signals that are associated with the SDH Containers. However, other type of information, for example ATM cells, can also be mapped into the containers.
26
DESCRIPTION OF SDH
Figure 23 shows the Section Overhead (SOH) of the STM1 frame. The Section Overhead has two parts: Regenerator Section Overhead (RSOH), which is analysed by the regenerators; Multiplexer Section Overhead (MSOH), which is analysed at the multiplex section termination. Figure 24 shows the contents of the SOH. Figure 23 : Section Overhead STM1
1
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
9 10
270 bytes
1 3 5 9 STM1
bytes
27
DESCRIPTION OF SDH
1 1 RSOH 2 3 A1
2 A1
3 A1
4 A2 E1 D2
5 A2
6 A2
7 J0 F1 D3
bytes
X X
X X
B1
D1
5
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
B2 D4 D7 D10 S1
B2
B2
K1 D5 D8 D11
K2 D6 D9 D12 Z2 M1 E2
6 MSOH 7 8 9
Z1
Z1
Z2
Unmarked bytes These bytes are RESERVED for future international standardisation (for media dependent, additional national use and other purpose).
28
DESCRIPTION OF SDH
J0 byte This byte is the REGENERATOR SECTION TRACE byte. Its content is for further study. Note: in earlier versions of the recommendation, this byte was marked as C1. Its purpose was to identify the interleaved STM1 frames in an STMN frame.
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
Scrambling The complete STMN frame, except of the first row of the SOH, is scrambled. The scrambling is done to maintain acceptable transition density and DC balance. Control of these two parameters is necessary for transmission on many media, also on optical fibre (transitions). The framing information must not be scrambled, because the scrambler receives its frame synchronisation from the STMN frame itself. Only when the STMN frame is recovered can the rest of the STMN frame be descrambled. The standards recommend a 7stage frame synchronous scrambler of generating polynomial 1+x6+x7 and sequence length 127.
B1 byte This byte permits the ERROR MONITORING of the regenerator section. The error monitoring function uses the Bit Interleaved Parity 8 (BIP8) code, and even parity. The general format of the polynomial is xn+x0, here n=8. When information is sent : the BIP8 is calculated over all bits of the previous STMN frame after scrambling, and it is put in the B1 byte of the actual STMN frame before scrambling. When information is received : the BIP8 is recalculated, and if the calculated value differs from the received value it is a sign of an error block.
E1 byte The name of this byte is ENGINEERING ORDER WIRE channel, and it is used for voice communication. (1 byte in an STMN frame corresponds to a bitrate of 64 kbit/s). It permits to make a telephone call between maintenance people. The standards do not give information about how to use this byte.
29
DESCRIPTION OF SDH
F1 byte The name of this byte is USER CHANNEL. Similar to the E1 byte it is also used for voice (or data) communication. It permits to make a telephone call between operators for example if a physical alarm condition occurs. The standards do not give information about how to use this byte.
D1, D2 and D3 bytes The name of these bytes is DATA COMMUNICATION CHANNEL. These bytes, with a total bitrate of 192 kbit/s, carry data messages for management purposes.
Bytes noted with X These bytes are RESERVED for NATIONAL USAGE, which means that the telecom operator can decide how to use them.
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
B2 bytes These bytes permit the ERROR MONITORING of the multiplex section. The error monitoring function uses the Bit Interleaved Parity N x 24 (BIPN x 24) code, and even parity. N shows the STMN order frame. Thus BIP24 for STM1, BIP96 for STM4, and BIP384 for STM16. The general format of the polynomial is xn+x0, here n=24. When information is sent : the BIPNx24 is calculated over all bits of the previous STMN frame except of the first three rows of the SOH (this is the RSOH), and it is put in the B2 bytes of the actual STMN frame before scrambling. When information is received : the BIPNx24 is recalculated, and if the calculated value differs from the received value it is a sign of an error block (cfr. usage of M1 byte).
K1 and K2 bytes These are bytes for AUTOMATIC PROTECTION SWITCHING. They control the automatic protection switching across a set of multiplex sections organised as a protection group. Bits 6,7, and 8 of the K2 byte carry the Remote Defect Indicator (RDI) signal. This signal is sent to the transmit end (upstream) to indicate that the receiving end detected (downstream) an incoming section failure or received an Alarm Indication Signal (AIS). The RDI signal has the value 110 in the respective bits. (Figure 25)
30
DESCRIPTION OF SDH
transmit end
The purpose of protection switching is to protect the protection group against cable cuts, but it also protects against failure of the optical interface and some of the multiplex section terminating circuitry. Generally, N working multiplex sections are associated with one protection multiplex section, to form a 1: N multiplex section protection group. SDH networks mostly use 1+1 protection mechanism. A possible configuration is, when two identical rings (fibers) form the network. One fibre is the Active ring, the other fibre is the Protection ring. They work in opposite directions. Each source transmits the information (STMN frame) on both fibres. The receivers monitor the signals on both fibres, and they select the better signal of the two. This automatic protection switching ability of the SDH networks largely increase their reliability and it is considered as a very important characteristic of them. It is also referred to as SELF HEALING . Figure 26 shows the principles of protection switching for a typical ring network. More about network protection in chapter 3.2
31
DESCRIPTION OF SDH
Active fibre
Protection fibre
Transmitter Transmitter
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
Multiplexer
Transmitter
Receiver
Multiplexer C
An example: On a full duplex path between multiplexer A and multiplexer C, information flows from A to C clockwise from A through B to C over the Active fibre. Information from C to A also flows over the same Active fibre clockwise, directly from C to A. If a fibre breakdown occurs between A and C, the information does not arrive to A over the Active fibre any longer. A detects the loss of information from C, and it switches over automatically to the Protection fibre to receive the information from the opposite direction. A response time better than 50 msec is required to avoid the loss of telephone calls during protection switching.
32
DESCRIPTION OF SDH
D4 D12 bytes The name of these bytes is embedded DATA COMMUNICATION CHANNEL. These bytes, with a total bitrate of 576 kbit/s, carry data messages between multiplex sections for management purposes. Telecommunications Management Network (TMN) management entities can communicate through this channel. So it has a similar purpose to that of the DCC of the RSOH. S1 byte The bits 5 to 8 of this byte are used to carry the SYNCHRONISATION STATUS MESSAGE. Four synchronisation levels that are defined by recommendations are indicated by defined bit patterns. These are: 0010 for G.811 , 0100 for G.812transit , 1000 for G.812local , and 1011 for Synchronous Equipment Timing Source (SETS). Two additional bit patterns are assigned, 0000 to indicate that the quality of the synchronisation is unknown, and 1111 to indicate that the section can not be used for synchronisation. Other bit patterns are operator defined (reserved). M1 byte This byte is (provisionally) allocated to carry the multiplex section Remote Error Indication (REI). It contains the number of errored blocks that were detected by the B2 bytes calculation. ( Figure 27 ) Figure 27 : B2 and REI STMN (with B2) MUX STMN (with M1) MUX receive end
transmit end
E2 byte The name of this byte is ENGINEERING ORDER WIRE channel, and it is used for voice communication. So it has a similar purpose to that of the E1 byte of the RSOH. It permits to make a telephone call between maintenance people located at the multiplex section termination. The standards do not give information about how to use this byte. Z1 and Z2 bytes Their function is not defined yet. Bytes noted with X These bytes are RESERVED for NATIONAL USAGE, which means that the telecom operator can decide how to use them.
33
DESCRIPTION OF SDH
2.6 POINTERS
All types of signals, thus the virtual containers, both in the AUs and in the TUs can be located and accessed directly through the pointers. It is this pointer mechanism, together with the synchronous multiplexing structure, that permits us to do add/drop multiplexing. Thus it is a very important characteristic of SDH. Two types of pointers are used: AU Pointers and TU Pointers.
34
DESCRIPTION OF SDH
1 1 RSOH
STM1
270 1
1 RSOH
STM1
270
a. AU Pointer location and value The AU Pointer fills the space of the 4th row of the overhead in the STMN frame. Three types of bytes (H1, H2, and H3) contain the AU Pointer. ( Figure 31) One AU4 Pointer is assigned in the available position. Because three VC3s fit into an AUG, each of them has its associated AU3 pointer. Consequently, three AU3 Pointers are assigned, one for each VC3. Each AU3 Pointer operates autonomously.
Remark : The case, when three VC3s form an AUG is typical for SONET networks. SONET and ETSI SDH form the internal structure of the AUG differently. More about this in chapter 2.10.
35
DESCRIPTION OF SDH
Bytes H1 and H2 contain the AU Pointer value. The H3 bytes, and the three bytes after them are used for the justification. Three bytes for a VC4, and one byte for a VC3. The two bytes , H1 and H2, of the pointer operate as one 16bit word, as Figure 30 shows it. The last 10 bits (bits 716) of this word carry the pointer value, which is a binary number with a range of 0782. It represents the offset between the AU Pointer position and the first byte of the higher order VC. See Figure 29 and Figure 31 for this. The offset is measured in 3byte increments for the AU4 Pointer, and in 1byte increments for the AU3 Pointer. The AU Pointer bytes are not part of the offset value. For example, in an AU4, the AU Pointer value of 0 shows, that the VC4 starts in the byte location that immediately follows the last H3 byte. An AU4 Pointer value of 87 shows, that the VC4 starts three bytes after the K2 byte.
I >
1 N 2 N 3 N 4 N
H1 < I >
5 S S 6 I 7 8 D I 9 10 D I 11 12 D
H2 < I
13 I 14 D I 15 16 D
0 to 782 <
N bits : New Data Flag I bits : Increment bits (used at positive justification) enabled: 1001 D bits : Decrement bit (used at negative justification) disabled : 0110 Note : The complete pointer value (H1 and H2) is set to all 1s, when an AIS occurs.
AU Pointer example: 0 1 1 0 1 0 PO IN TE R VA LU E
Concatenation Indicator: 1 0 0 1 S S 1 1 1 1 1 1 1 1 1 1
36
DESCRIPTION OF SDH
270
4 H1 Y Y H2 1 1
87
9 1
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
125 sec
H1 Y
Y H2 1 1
H3 H3H3 0
9
Y byte : 1001SS11 (S bits are not specified) 1 byte : 11111111
250 sec
270
4 H1 H1 1 1 1 H2 H2H2 H3 H3H3 0 0 H1 0
87 87 87 88
9 1
125 sec
250 sec
37
DESCRIPTION OF SDH
b. Justification procedure During the alignment process between the higher order path layer and the multiplex section layer, the higher order VCs, which have to be multiplexed, are put in a buffer. ( Figure 28 )
Positive justification ( Figure 32 ) When the buffer reaches its low fill threshold, which corresponds to the fact, that the incoming higher order VC arrives temporary slower than the rate of the outgoing STMN frame, then : 1. the phase of the outgoing higher order VC must be put back in time by one unit relative to the STMN frame. This means: Transmission from the buffer is stopped during the unit time, which is equivalent to the transmission of dummy information in the three positive justification bytes of the AUG for VC4, or in one of the three positive justification bytes of the AUG for a VC3 . This bytes are marked 0 on Figure 31. the AU Pointer has to be incremented by one unit. This means: The bits 7, 9, 11, 13, and 15, marked the I bits, of the AU Pointer are inverted. This five bits permit majority voting at the receiver. The next frame will carry the new pointer value, which is equal to the old pointer value + the incremented unit. Pointer adjustments must be separated by at least three STMN frame times. This means, that the receiver only accepts the new pointer value, if it remains the same during at least three frame times.
2.
Adjusting one unit is equal to three bytes for AU4, and one byte for AU3 as seen in 2.6.2.a.
Remark: Majority voting means, that that information is accepted, which occurs in the majority of the bits.
38
DESCRIPTION OF SDH
VC4
pointer value = A H1 Y Y H2 X X H3 H3 H3
VC4
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
VC4
pointer value = A+ 1 H1 Y Y H2 X X H3 H3 H3
VC4
pointer value = A+1 H1 Y Y H2 X X H3 H3 H3
VC4
39
DESCRIPTION OF SDH
Negative justification ( Figure 33 ) When the buffer reaches its high fill threshold, which corresponds to the fact, that the incoming higher order VC arrives temporary faster than the rate of the outgoing STMN frame, then : 1. the phase of the outgoing higher order VC must be put forward in time by one unit relative to the STMN frame. This means: VC payload information is transmitted in the three negative justification bytes of the AUG for VC4, or in one of the three negative justification bytes of the AUG for a VC3. This bytes are marked H3 on Figure 31. the AU Pointer has to be decremented by one unit. This means: The bits 8, 10, 12, 14, and 16, marked the D bits, of the AU Pointer are inverted. This five bits permit majority voting at the receiver. The next frame will carry the new pointer value, which is equal to the old pointer value the decremented unit. Pointer adjustments must be separated by at least three STMN frame times. This means, that the receiver only accepts the new pointer value, if it remains the same during at least three frame times.
2.
Adjusting one unit is equal to three bytes for AU4, and one byte for AU3 as seen in 2.6.2.a.
40
DESCRIPTION OF SDH
VC4
pointer value = A H1 Y Y H2 X X H3 H3 H3
VC4
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
VC4
pointer value = A 1 H1 Y Y H2 X X H3 H3 H3
VC4
pointer value = A 1 H1 Y Y H2 X X H3 H3 H3
VC4
41
DESCRIPTION OF SDH
New Data Flag When it is necessary to make a specific, nonunit change of the pointer value the New Data Flag (NDF) indicator is used. This indicator fills the first 4 bits, marked N of the AU Pointer, as Figure 30 shows it. Normally the value of NDF is 0110, which means that the indicator is disabled. When the nonunit change of the pointer has to be signalled, the value of NDF is set to 1001. This means, that the indicator is enabled. The other bits of the AU Pointer show the new pointer value. The new pointer value is immediately accepted, if al least three out of the four Nbits are correct (majority voting). In the next STMN frame, the NDF is reset to 0110. Also applies here, that pointer adjustments must be separated by at least three STMN frame times.
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
Remark : If a receiver detects a new pointer value without previous positive or negative justification, or the NDF indication, it rejects it. However if the next three STMN frames contain the same new pointer value, it will accept it.
AU4 Concatenation Concatenation of AU4s permits to transport payloads larger than the capacity of one VC4. In this case, the payload is put into a number of AU4s, which directly follow each other. The concatenation indicator ( Figure 30 ) shows, that this multi C4 payload must be held together. X concatenated AU4s form an AU4Xc. Only the first AU4 contains the AU4 Pointer, all other AU4s of the AU4Xc have the Concatenation Indicator set in their pointer position. However, to maintain bit sequence integrity over the whole payload, the same pointer actions are applied for each of the AU4s as for the first one. The pointer offset unit for an AU4Xc is X times 3 bytes. The number of AU4s that are concatenated is only limited by the maximum payload quantity of the SDH structure. A particular case is AU44c, when 4 AU4s are concatenated. It is recommended for the transport of BISDN payloads. See chapter 2.9. on this.
42
DESCRIPTION OF SDH
a. TU3 Pointer Three TUG3s fit into the payload of the VC4, as shown on Figure 21. The TU3 Pointer permits to locate the VC 3 inside of the TU3 frame through a flexible and dynamic procedure.
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
Because three VC3s fit in a VC4, three separate TU3 Pointers are assigned in an AU4. The three pointers operate autonomously. Three types of bytes (H1, H2, and H3) contain the TU3 Pointer. ( Figure 35) They have exactly the same function and mode of operation as those of the AU3 and AU4 Pointers. Bytes H1 and H2 contain the TU3 Pointer value. The H3 byte, and the byte after it are used for the justification. The two bytes , H1 and H2, of the pointer operate as one 16bit word, as Figure 34 shows it. The last 10 bits (bits 716) of this word carry the pointer value, which is a binary number with a range of 0764. It represents the offset between the pointer and the first byte of the VC3. The offset is measured in 1byte increments. Figure 35 shows the TU3 Pointer offset numbering.
43
DESCRIPTION OF SDH
I > H1
1 N 2 N 3 N 4 N
0 to 764 < I
N bits : New Data Flag I bits : Increment bits (used at positive justification) enabled: 1001 D bits : Decrement bit (used at negative justification) disabled : 0110 Note : The complete pointer value (H1 and H2) is set to all 1s, when an AIS occurs.
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
S bits: not specified. Remark: Figure 21 shows that a TUG3 can contain : one TU3 (VC3) or an assembly of seven TUG2s. If the TUG3 carries an assembly of TUG2s the TU3 Pointer is set to Null Pointer Indicator, which means that the TU3 Pointer is not used.
44
DESCRIPTION OF SDH
Figure 35 : TU3 Pointer offset numbering VC4 1 positive justification 1 P H1 H1 H1 opportunity ( 3x1 byte ) a H2 H2 H2 t 2 H3 H3 H3 0 0 0 1 1 1 h 85 85 85 86 86 86 87 O v Fixed negative justification e stuff opportunity ( 3x1 byte) rh e a 9 d 596 1 H1 H1 H1 595 595 595
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
H2 H2 H2 P 2 O H3 H3 H3 0 0 0 1 1 1 H Fixed 85 85 85 86 86 86 87 stuff
261
83 83 83 84 84 84
125 sec
83 83 83 84 84 84
b. TU2, TU12 and TU11 Pointer Four TU2s, (TUG2s) or TU1s transmitted after each other form a multiframe. Consequently, the multiframe time period is 500sec. ( Figure 37 ) The TU2 Pointer permits to locate the VC 2 inside of TU2 multiframes through a flexible and dynamic procedure. The TU1 Pointer permits to locate the VC 1 inside of TU1 multiframes through a flexible and dynamic procedure. The TU1 pointer is only used with floating mapping. The Vx bytes carry the TU Pointer ( Figure 37 ), where x is equal to the position of the particular TU frame inside of the multiframe, thus 1, 2, 3 or 4. For the position of the TU Pointers and Vx bytes, see also Figure 45 and Figure 46. Bytes V1 and V2 contain the TU Pointer value. The V3 byte, and the byte after it are used for the justification. Byte V4 is not defined yet.
45
DESCRIPTION OF SDH
The V1 and V2 bytes operate as one 16bit word, as Figure 36 shows it. The last 10 bits (bits 716) of this word carry the pointer value, which has a different range for each type of TU. It represents the offset between the V2 byte and the first byte of the VC (V5 byte see chapter 2.7.2 ). The TU Pointer bytes are not calculated in the offset value. The offset is measured in 1byte increments.
I >
1 N
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
V1 < I >
4 N S 5 S 6 I 7 D 8 I 9 10 D I 11 12 D
V2 <I
13 I D 14 I 15 D 16
2 N N
N bits : New Data Flag I bits : Increment bits (used at positive justification) enabled: 1001 D bits : Decrement bit (used at negative justification) disabled : 0110
0 to 427 < I
0 to 139 < I
PO
IN
TE
VA
LU
0 to 103 < I
Concatenation Indicator: 1 0 0 1 S S 1 1 1 1 1 1 1 1 1 1
46
DESCRIPTION OF SDH
Figure 37 : TU2 and TU1 Pointer offset numbering TU multiframe TU nr.1 V1 TU2 TU12 TU11 o f f s e t v a l u e s 321 105 78
427 0
139 0
103 0
106
neg. just. (1 byte) pos. just. (1 byte )
34
25
107
35
26
213 214
69 70
51 52
500 sec
320
104
77
TU2 concatenation TU2 concatenation is defined, because in the future, transmission systems will also have to carry new services at bit rates different than those of PDH. Such typical services are highspeed data and intermediate video rates. The TU Concatenation Indicator is used as it is explained for the AU concatenation.
47
DESCRIPTION OF SDH
POH
payload
Virtual Container
49
DESCRIPTION OF SDH
J1 byte This byte offers the PATH TRACE function. The source, at the beginning of the path, repetitively inserts in this byte a string, the high order Path Access Point Identifier (PAPI). The receiver at the path termination compares the received string with the expected value, so it can be sure that it is connected to the intended source. The standards recommend a 64byte free format string or a 16byte E.164 format string. B3 byte The B3 byte permits the ERROR MONITORING of the path. The error monitoring function uses the Bit Interleaved Parity 8 (BIP8) code, and even parity. When information is sent: the BIP8 is calculated over all bits of the previous VC (VC4 or VC3) before scrambling, and it is put in the B3 byte of the actual VC before scrambling. When information is received: BIP8 is recalculated. C2 byte The C2 byte is the path SIGNAL LABEL, and it identifies the VC payload type. The byte mapping code is defined as (hexadecimal values): 0: VC path is not equipped. This value is used, when the section is complete,but there is no path originating equipment. For example, a crossconnect equipment can fill in this 0 value, if no crossconnection is done. Note : any value other than 0 of the C2 byte shows an equipped condition. 1: VC path is equipped, nonspecific payload. This value is used for all payloads that do not need to be detailed. 2: TUG payload structure 3: locked TU mode 4: asynchronous 34Mbit/s or 45Mbit/s signal in VC3 12: asynchronous 140Mbit/s signal in VC4 13: ATM (Asynchronous Transfer Mode) cells payload 14: MAN (Metropolitan Area Network) frames payload 15: FDDI (Fiber Distributed Data Interface) frames payload The 247 other possible values of the C2 byte remain for future usage.
50
DESCRIPTION OF SDH
G1 byte The G1 byte is the PATH STATUS byte. It carries information back to the VC path source about the condition and performance of the path termination. Figure 40 shows the contents of the G1 byte.
REI 1 2 3 4
RDI 5 6
7 8
Bits 14:
contain the Remote Error Indication (REI), which shows the number of errors received in the BIP8 code (B3 byte). The permitted range of this bits show 08 errors. The values in range 915 are considered as no error in the BIP8 code. contains the Remote Defect Indicator (RDI) signal. This bit is set to 1, to indicate path RDI, otherwise it is set to 0. are not used.
Bit 5:
Bits 68:
F2 and Z3 bytes This USER CHANNEL byte permits user communication between path elements.
51
DESCRIPTION OF SDH
H4 byte The H4 byte is a general POSITION INDICATOR. It can be payload specific, then it can show the position of the VC1 or VC2 multiframes. (Figure 41)
Figure 41 : H4 byte position indicator POH 1 Payload TU PTR (V4) VC3 / VC4 6 9 1 H4: 00 TU PTR (V1) H4: 01 VC3 / VC4
6 9 1
6 9 1
6 9 1
K3 byte Bits 1 to 4 are used for AUTOMATIC PROTECTION SWITCHING (APS), to protect the higher order path level. The allocation of the other bits of this byte is for further study.
Z5 byte The Z5 byte is a NETWORK OPERATOR byte, used for specific management purposes.
52
DESCRIPTION OF SDH
TU nr.1
V1
TU nr.2
V2
TU nr.3
V3 V5
TU nr.4
V4 J2
125 sec
Z6
250 sec
K4
375 sec
500 sec
53
DESCRIPTION OF SDH
V5 byte The V5 byte supplies the function of ERROR MONITORING, SIGNAL LABEL, and PATH STATUS. ( Figure 43 )
BIP2 1 2
REI 3
RFI 4
SIGNAL LABEL 5 6 7
RDI 8
Bits 12:
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
error monitoring by BIP2 code, with even parity. BIP2 is calculated over the complete previous VC, except the V1, V2, and V3 bytes (unless V3 contains data information, thus when negative justification occurred). Bit 1 is set for the odd number bits (1,3,5, and 7), bit 2 is set for the even number bits (2,4,6, and 8).
Bit 3:
contains the Remote Error Indication (REI) signal, which shows if errors are received in the BIP2 code . It is set to 1 if one or more errors occurred. It is set to 0 if no error occurred.
Bit 4:
the path trace bit, or REMOTE FAILURE INDICATOR (RFI). Indicator of path failure, if bit is set to 1.
Bit 57:
these bits are the path SIGNAL LABEL. Possible values: 000: VC path is not equipped. Note : any value other than 0 of these bits shows an equipped condition. 001: VC path is equipped, nonspecific payload. 010: asynchronous, optional usage 011: bit synchronous, optional usage 100: byte synchronous, optional usage other values are reserved for future usage
Bit 8:
contains the Remote Defect Indication (RDI) signal. This bit is set to 1, if: an Alarm Indication Signal (AIS) was detected ; or signal failure condition is received; Else the bit is set to 0.
54
DESCRIPTION OF SDH
J2 byte This byte offers the PATH TRACE function, similar to that of the J1 byte of the higher order POH. The source, at the beginning of the path, repetitively inserts in this byte a string, the low order Path Access Point Identifier (PAPI). The receiver at the path termination compares the received string with the expected value, so it can be sure that it is connected to the intended source. The standards recommend a 16byte E.164 format string.
Z6 byte This byte has a similar function as the Z5 byte in the higher order POH.
K4 byte This byte has a similar function as the K3 byte in the higher order POH. Bits 1 to 4 are used for AUTOMATIC PROTECTION SWITCHING (APS), to protect the lower order path level. The allocation of the other bits of this byte is for further study.
55
DESCRIPTION OF SDH
2.8 A GUIDE THROUGH SDH MULTIPLEXING SUMMARY OF THE VC, TU, TUG, AND AUG STRUCTURES
The figures in this chapter together with Figure 21 and Figure 22 will help to make a final summary of the possible structures we can find in SDH. The figures in this chapter also follow the multiplexing hierarchy.
POH (V5)
POH (V5)
POH (V5)
9 r o w s
3 bytes
4 bytes
12 bytes
VC11
VC12
VC2
56
DESCRIPTION OF SDH
9 r o w s
12 bytes TU Pointer byte TU nr. 1 TU nr. 2
4 TU11s in TUG2
12 bytes
3 TU12s in TUG2
12 bytes
1 TU2 in TUG2
TU nr. 3
TU nr. 4
57
DESCRIPTION OF SDH
Figure 46 shows one possible TUG2 multiframe structure. Figure 46 : TUG2 multiframe contains 3 TU12s
V1
V2
V3
V4
58
12 bytes
9 r o w s 125 sec
250 sec
375 sec
500 sec
DESCRIPTION OF SDH
C3 container
9 r o w s
P O H
C3
O H
85 bytes
85 bytes
59
DESCRIPTION OF SDH
1 TU3 in TUG3
H1 H2 H3 P
9 r o w s
N P I
C3
O H
86 bytes
86 bytes
fixed stuff
60
DESCRIPTION OF SDH
A VC4 is a 9row by 261column structure. We can assemble a VC4 by either multiplexing 3 TUG3s or by mapping a C4 signal. ( Figure 49 ) If the VC4 is assembled by 3 TUG3s: each TUG3 has a fixed position inside of the VC4; the TUG3s are multiplexed by onebyte interleaving.
3 TUG3s in VC4
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
C4 container
9 r o w s
P O H
C4
O H
261 bytes
261 bytes
fixed stuff
The Administrative Units AU3 and AU4 transport the higher order virtual containers VC3 and VC4 respectively, together with their respective frame offsets coded in the AU Pointer. ( Figure 50 ) Remark : the content of the AU3 is equal to the VC3 plus two columns of fixed stuff. We can assemble an AUG by either multiplexing 3 AU3s or by 1 AU4. ( Figure 51 ) If the AUG is assembled by 3 AU3s: the AU3s are multiplexed by onebyte interleaving.
61
DESCRIPTION OF SDH
Figure 50 : Structure of the AU3 and AU4 AU3 (VC3 plus 2 columns of fixed staff) AU4
9 r o w s
AUPointer
P O H
AUPointer
VC4
30
59
87
261 bytes
9 r o w s
AUPointers AUPointer
261 bytes
261 bytes
62
DESCRIPTION OF SDH
AUG nr. 1
AUG nr. N
AUPointer
AUPointer
261 bytes
261 bytes
1
RSOH AUPointers
H1H1..H1H2H2..H2 H3H3 H3
11..122..233...344..4
MSOH
260260...260261261..261
63
DESCRIPTION OF SDH
Figure 53 shows the structure of the STMN frame Section Overhead. We can note, that certain bytes are present for all the N of the STM1 frames, others are present only for the first STM1 frame. Figure 53 : STMN SOH 1 Nx9 ... N 1 ... N 1 ... N J0
(n1)x Z0
*1
1 ... N
A1 A1 A1 A1 A1 A1 A2 A2 A2 A2 A2 A2 B1 D1
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
X X X X X X X X
R S O H
E1 D2 AU Pointers
F1 D3
B2 B2 B2 B2 B2 B2 K1 D4 D7 D10 S1
(n1)x Z1
K2 D6 D9 D12 Z2 Z2 Z2 Z2 E2 M S O H
D5 D8 D11 Z2 M1 Z1 Z1 Z1 Z1
(n2)x Z2
X X X X
64
DESCRIPTION OF SDH
AU4 concatenation ( Figure 54 ) The end of chapter 2.6.2. explained about the VC4 concatenation. The capacity of the VC4Xc, multi Container4, is exactly X times the capacity of the C4. For example: X=4 : capacity is 599,040 Mbit/s; X=16 : capacity is 2 396,160 Mbit/s.
9 r o w s
P O H
C4Xc
fixed stuff
X1
65
DESCRIPTION OF SDH
Header
Payload
1
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
56
53 bytes
An adaptation function maps the ATM cells into the SDH transmission system. It inserts zero cells if the offered rate is not sufficient to fully load the SDH capacity, and restricts the ATM source if its rate is too high. Thus, the actual transmitted cellstream has a rate that is synchronous with the SDH Container in which it is transported, although the information rate is defined by the ATM source. To prevent the ATM cell payload to accidentally contain the SDH frame alignment or ATM cell delineation information stream, the payload part of the ATM cell is scrambled. This also protects the SDH network and the users against malicious users. The standards recommend a selfsynchronising scrambler of generating polynomial x43+1.
66
DESCRIPTION OF SDH
Mapping of ATM cells are done mainly into VC4 and VC44c Containers. This second type, concatenated Container is a special case of VC4Xc, where X=4. (see end of chapters 2.8.7. and 2.6.2.) Note: In principle ATM cells can be mapped into any type of Virtual Container. Figure 56 shows an example of the ATM cell mapping. The ATM cell is mapped into a container with its byte boundaries aligned with the containers byte boundaries. However, because the containers capacity is not an integer multiple of the cell size, a cell can go across a containers boundary. To find the ATM cell boundary (cell delineation) the Header Error Control (HEC) parameter is used, which is part of the contents of the ATM cell header.
67
DESCRIPTION OF SDH
68
Figure 57 shows a typical SDH network configuration for a national network. The first level represents the backbone network which is implemented as a mesh network to provide flexible traffic routing and network protection. It operates typically with STM16 equipment. The second level represents the regional network. It operates typically with STM4 equipment. The third level represents the local network, which interfaces with the access network. It operates typically with STM1 equipment. Here is an example to show what happens with the information that user A sends to user B. Follow the way of the information on Figure 57. (Remark : this figure is limited to the transmission equipment, so it doesnt show the digital exchanges.) The originating user, A transmits its information to user B, who is situated several hundreds of kilometres away. The signal of user A, together with other users plesiochronous signals (2 Mbit/s, 34 Mbit/s), arrives to the SDH network. In the local network the STM1 frame that contains user As signal travels toward the gateway to the regional network. Meanwhile this signal passes through a number of Add/Drop multiplexers, where other plesiochronous signals are dropped and added. When the STM1 frame that contains user As signal arrives to the regional network, it is added into the STM4 frame format of that regional network. This STM4 frame then travels toward the gateway to the backbone network. At this gateway this, and other STM4 frames are multiplexed into an STM16 frame. At this point in the regional network, and in the backbone network Crossconnect equipment is used. In the backbone network, the STM16 frame that contains user As signal is forwarded to the crossconnect equipment, which forms the gateway toward that regional network, which is connected to user Bs local network. Further the same actions, naturally in a reverse order, take place as explained above.
69
Cross Connect
Cross Connect
Backbone network
Cross Connect
Cross Connect
Cross Connect gateway Add Drop Mux Cross Connect gateway Add Drop Mux
Regional network
Add Drop Mux
Add Drop Mux Add Drop Mux AddDrop Mux Mux
Mux
Add Drop Mux Add Drop Mux
Local network
STM1
Ring Network
AddDrop Mux
user B
Access
user A
Mux Mux Mux
70
a. Add/Drop multiplexer (ADM) As it was explained in chapter 2, this equipment permits to add and to drop tributary signals to and from a passing STM frame. ( Figure 58 )
STM1
STM1
. . .
Remark: The minimum granularity that the SDH network can handle is the bitrate of 2 Mbit/s (1.5 Mbit/s). Consequently, information can not arrive with a smaller bitrate to the access multiplexer. For example, this is the case of a telephone call, whose bitrate is 64 kbit/s. Therefore telephone signals or other signals less than 2 Mbit/s have to be multiplexed into a signal, which is equal to one of the defined hierarchy levels, thus 2 Mbit/s or more, before they arrive to the SDH network.
71
b. Digital CrossConnect (DXC) DXC equipment is usually used in the backbone network, or at the gateway between the regional and backbone network. This equipment has a very similar functionality to that of the add/drop multiplexer ( Figure 59 ). However, it is bigger, and it has more ports than an ADM. For example it can have up to 192 STM1 equivalent ports, which means up to 12000 2 Mbit/s ports or a corresponding mixture of ports with different bit rates. Another difference compared to the ADM is the internal connection possibilities.
STM1
. . .
. . .
STM1
c. Line Equipment This multiplexer is basically a higher order multiplexer, which grooms STM1 frames into STM4 frames ( Figure 60 ), or STM4 frames into STM16 frames.
. . .
STM4
72
Figure 61 gives an overview about the different types of SDH network elements. Note, that the biggest difference among these network elements is in their size and in their flexibility concerning the connection function.
CrossConnect
Add/Drop mux
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
Line equipment
Relative complexity
Consequently, an important remark: So, if we compare the functionality of these equipments, explained on the previous pages, we can notice, that they are quite similar. All of them treat STMN frames, virtual containers, and other elements of the SDH system. Therefore, we can state, that in a real network the decision about which type of equipment we have to use depends on the network configuration, on the required equipment functionality, and on the required network protection procedure. (About network protection in chapter 3.2.)
73
3.1.3 EXAMPLES
Rings of ADMs play an important role in the SDH network architecture. Therefore, when we design complex networks, it becomes very important how we interconnect these rings. Figure 62 until Figure 64 show some possible ring architectures, and their interconnections.
ADM
ADM
ADM
STM4 ring
ADM
STM1 tributaries interconnection
ADM
STM1 ring
ADM
ADM
ADM
74
ADM
ADM
ADM
STM1 tributaries interconnection
ADM
ADM
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
ADM
ADM
ADM
ADM
STM4 ring
DXC
STM1 ring
ADM
ADM
ADM
75
Figure 66 gives an overview of the different types of failures and protections. Some explanations about the used notations: N + 1 Protection : N : 1 Protection: 1 protection board,link, etc. foreseen respectively for N active board, link,etc. the protection board, link,etc. can be used for low priority traffic. ( Figure 65 )
. . .
. . .
N 1 tributaries operational J high priority traffic , taken over from K low priority traffic is stopped
EPS (Equipment Protection Switching) : this protection is done at unit level. It occurs after an internal failure, like card missing, card mismatch, no response from card, etc., or after other specifically defined failure condition. APS (Automatic Protection Switching) : It occurs after a multiplex section failure. PPS (Path Protection Switching) : This protection is done at path level, and mainly used in ring networks. It occurs after a path failure.
76
Component
Board
o o
Automatic protection switching APS APS APS APS N+1 1 +1 N:1 1:1 Board and Cable
o o
o o
Link
route 2
Route
Node
Node protection
Node
77
We can make a summary of the usage of the different protection types: Equipment Protection Switching : For nonstrategic networks that carry light traffic, EPS is an adequate protection type. Circuit board duplication supports this EPS 1+1 or EPS N + 1 function. ( Figure 66 ) Sometimes the cables are also duplicated; then APS 1+1 or APS N + 1 can be done. This means, that in case of a circuit board failure, there is not only a changeover to the protection board, but also to the protection link. Automatic Protection Switching, link protection : For networks that carry heavy traffic or that are of strategic importance, a more powerful protection procedure is needed. The network also needs protection against link failure. Duplication of the link on two different routes (APS 1+1) provides such a protection. ( Figure 66 ) Another possibility is to set up a ring, or a meshed, or a ring/meshed network. If one of the internode links fails, the traffic is routed through another node. See link restoration on Figure 67. Automatic Protection Switching, path protection: Besides link protection, the protection of strategic nodes are also needed. Important network nodes are then duplicated. ( Figure 66 ) It is also possible, to set up a ring, or a meshed, or a ring/meshed network. If one of the internode links fails, the traffic is routed through other nodes. See path restoration on Figure 67.
Link restoration
Path restoration
possible paths
original path
restored path
78
Path restoration and link restoration are the two main procedures to support network restoration. Path restoration is based on the principle that failures identify the paths where the failure occurred, and so the failed network connections. These network connections are then restored by alternative paths. Path restoration is relatively resource efficient but requires information of a broad scope. For example: it requires the actions of the network management system, which controls the routing map in each of the involved DXC equipment, to do the rerouting. Link restoration is based on the principle that failures are related to links, where they occur. These links are then replaced by other links. Link restoration is therefore a simpler procedure than path restoration, but it is generally less efficient.
79
Active fibre
ADM
Protection fibre
ADM
ADM
ADM
Figure 69 shows a twofiber bidirectional ring, where the transmitted traffic and the traffic to be received travel in opposite directions, respectively over the transmission fibre and over the reception fibre. Because both fibres carry active traffic, half of the bandwidth have to be reserved for protection, to permit to reroute the traffic in case of failure in one part of the ring. Fourfiber bidirectional rings can also be built. In such a ring one pair of fibres is reserved for protection. Figure 69 : Twofiber bidirectional selfhealing ring
Transmission fibre
ADM
Reception fibre
ADM ADM
ADM
80
We can also consider link protection and path protection in ring networks. Link protection means, that the failure is detected on both sides of the link (multiplex section), and the STMN signal is rerouted to the protection fiber. ( Figure 70 ) Figure 70 : Link protection in a ring network
ADM
ADM
ADM
ADM
Path protection is done the way explained earlier. Traffic is sent simultaneously on both, active and protection, fibers. The receiver selects that fiber, which provides the better quality signal. Thus, path protection is only done in unidirectional ring networks.
Bidirectional rings are mainly used for balanced traffic between each node, for example in regional networks. Unidirectional rings with path protection are more applicable for local networks, where traffic is often directed to a specific node.
81
It is likely, that high speed, backbone SDH networks have a meshed structure. Two protection types are used: traffic division; traffic duplication (path protection). Figure 71 shows the traffic division procedure. The drawing on the top of the figure shows the simplest case, when half of the traffic is sent over one link, and the other half of the traffic is sent over an other possible link. If one of the links breaks down, 50% of the total traffic is lost. Consequently, this protection procedure only protects one half of the traffic. An improved version of this protection type, when redundant links are installed. This permits 1+1 APS or 1:1 APS (link protection). The bottom part of the same figure shows this case.
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
DXC
DXC ADM
DXC
82
Figure 72 shows the principles of traffic duplication. The drawing on the top of the figure shows that traffic is sent simultaneously over two paths. At the receiver, the signal with the better quality is selected, just as it was explained earlier. This type of protection protects 100% of the traffic. If we install redundant links, 1+1 APS or 1:1 APS also becomes possible. The bottom part of the same figure shows this case.
ADM DXC
0
Traffic duplication
0
DXC ADM
83
The name of the transmission network, Synchronous DH, already indicates that synchronisation is handled with particular care in this network. So, this chapter briefly tells about the problems of timing and synchronisation in the SDH network.
A digital signal can be considered as binary data where each bit occurs at a discrete point in time. The two characteristics of this digital signal are the data value itself and the point in time, the discrete instance when it occurs. The timing signal that determines the discrete instances when the data is defined is also referred to as the clock. The SDH network uses two types of clock : regular clock; gapped clock. Regular clock The regular clock has all its expected discrete instances evenly spaced in time. ( Figure 73 ) Such a clock is defined by its phase parameter p(n), which is in proportion with the basic clock period: p(n) = 2 nt0 where p: phase, n: the nth clock pulse, t0: clock period All STMN signals are produced from such regular clocks. Gapped clock A gapped clock is generally derived from a regular clock. They both have the same clock period, but the gapped clock has a lower average frequency. This lower average frequency is a result of the gaps left in the clock signals of the regular clock. This also explains the name gapped clock. ( Figure 73 ) Gapped clocks are very important in the SDH network. Payloads within the SDH frame are timed by gapped clocks. For example, the VC4 uses a gapped clock derived from the STMN regular clock. The VC12 uses a gapped clock derived from the VC4 gapped clock. Frame phase An additional clock, derived from the regular clock, to mark the start of each frame.
84
t0
t0
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
72 missing STM1 regular clock pulses : gap for RSOH and MSOH
85
If phase variations occur, the actual times p(n) when the clock pulses of the transported signal occur are described as: p(n) = p(n) + e(n) where p: actual phase, p: expected phase, e(n): error, n: the nth clock pulse, It is the error e(n) that defines the quality of a clock signal. E(n) is the measure of the phase variation, so if e(n) is equal to 0, no phase variation occurs.
p(0)
p(1)
p(2)
p(3)
p(4)
p(5)
p(6)
p(7)
p(8)
time
p(0)+ e(0)
p(2)+e(2) p(1)+e(1)
p(4)+e(4)
p(6)+e(6)
p(8)+e(8)
time
p(3)+e(3)
p(5)+e(5)
p(7)+e(7)
Phase variations in the SDH network are handled by the pointer adjustment mechanism, as chapter 2.6 described it. The main reason of the pointer adjustments is the clock noise of the exchange clock. At a bitrate of 150 Mbit/s, it can cause pointer adjustments in every few seconds. Figure 75 illustrates the situation. Therefore, it is very important for the synchronisation of the SDH network to limit the clock noise.
Pointer processor buffer + control Buffer write Outgoing pointer adjustment gaps or pulses + Buffer read
86
Generally, the phase variation e(n) is represented in a graphic form, which shows the e(n) variation in function of the time. ( Figure 76 )
Time
When standardisation organisations have to specify the clocks, which are suitable for the synchronisation of SDH equipment, they also have to specify the clock noise parameter(s). The proposed parameter is the Time Variance (TVAR) parameter, which is also known as Allan Variance. The TVAR is the square of the second differences between samples of the clock noise. It tries to give statistical estimates of e(n) over units of time (t). t is normally in nanoseconds (ns). ( Figure 77 )
reference A1 t A2 t A3
Time
87
In the SDH network all equipment is synchronised to a master clock. Consequently, all SDH equipment must contain a slave clock to synchronise all the outgoing STMN line signals and the pointer processors. In the SDH network two types of SDH slave clock are used : in the regenerators, as described in G.958; in the crossconnects and add/drop multiplexers, as described in G.81s. The general synchronisation network topology is a tree structure. ( Figure 78 ) The timing is transferred by the regenerator section between SDH equipment. Generally, SDH regenerator slave clocks do not filter clock noise, but they do not add much noise either. A crossconnect slave clock filter some slave noise, especially that of the regenerator slave clocks, but it also adds some clock noise. A main node slave clock can filter more clock noise, but it also adds more clock noise.
Main nodes
Local nodes
>
>
>
>
>
>
primary reference clock slave clock (G.812) DXC or ADM slave clock (G.81s)
>
88
The restoration of the timing distribution is also based on a hierarchical structure. ( Figure 79 ) The main node slave clocks can maintain timing to the greatest accuracy. Crossconnect slave clocks can maintain a usable service. Regenerator slave clocks only send alarm signals when the incoming reference is lost.
@
Main nodes
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
Local nodes
>
>
>
>
>
>
primary reference clock slave clock (G.812) DXC or ADM slave clock (G.81s)
>
main node clock in holdover and not slaved to DXC clock in holdover
Off air timing is an other alternative to synchronise the SDH network. Both GPS (Global Positioning Satellite system) and LORANSC offer very high stability timing reference, which can be recovered from air. The advantages of these systems are: timing is very stable, with very low clock noise; timing is not influenced by errors and breaks in the transmission links; no need to design a complex synchronisation network.
89
core
cladding
protective jacket
A very important parameter of an optical fibre is the refractive index (n). It is the ratio of the speed of light in vacuum (c0) to the speed of light in the medium (cx), thus n= c0 /cx. The refractive index of vacuum is n0=1. The core and the cladding have different refractive indexes. They are always chosen that ncore ncladding. This is a condition for total reflection at the edge between the core and the cladding. See Figure 81 for reflection and refraction of light.
90
Reflection of light
Refraction of light
refracted ray
The refractive index profile is a curve of the refractive index (n) over the cross section (r) of the optical fiber. Two types of index profiles are defined ( Figure 82 ): step index profile: the refractive index of the core has the same value (n1) over the complete crosssection of the core. At the interface with the cladding the refractive index changes in a step. graded index profile: the refractive index of the core decreases parabolically from a maximum value n1 at the axis of the core to a refractive index n2 at the interface with the cladding.
91
Types of optical fibres are ( Figure 83 ): single mode fibre, also known as monomode fibre: step index profile; typically: diameter of core= 8,7m, diameter of cladding=125 m. Mostly this type of fibre is used in SDH networks. multi mode fibre: step index; typically: diameter of core= 50m, diameter of cladding=125 m. or graded index profile; typically: diameter of core= 100m, diameter of cladding=140 m.
92
Not all light waves pass through the optical fibre with the same efficiency. The attenuation of the light waves depends also on their wavelength. The range of wavelengths that pass through optical fibres with little loss, and consequently are suitable for optical transmission are called optical windows. The most commonly used windows are around the wavelengths of 850nm, 1300nm, and 1550nm. Figure 84 shows a typical example for single mode fibre. Figure 84 : Channel capacity of single mode fibre
Loss (dB/km)
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
900
1100
1500
1700
Dispersion is an other factor that reduces the transmission quality. Because of dispersion, light pulses in the optical fibre broaden temporally ( Figure 85 ). The total dispersion consists of: modal dispersion: mostly occurs in multi mode step index fibres; material dispersion; waveguide dispersion : mostly occurs in single mode fibres. The combination of material dispersion and waveguide dispersion is the chromatic dispersion. Figure 85 : Effect of dispersion
input pulse
output pulse
93
b. Optical Interface Specifications The recommendation G.957 about optical interfaces specifies optical transmitter, optical receiver, and optical path characteristics. The optical path is defined between the reference points S and R. ( Figure 86 )
Figure 86 : Reference points in the optical section at which the physical interface is defined.
Figure 87 shows the standard classification of optical interfaces. In the SDH network all optical fibres are of the single mode type, using the second and third optical window. Three different distance types are defined, because of different applications in the SDH network. These are: Intraoffice: to connect equipment up to a distance of 2 km; Short haul interoffice: to connect equipment up to a distance of 15 km; Long haul interoffice: to connect equipment up to a distance of 40 km or 60 km.
Application
Interoffice Long haul ~ 40 1550 Rec. G.652 S1.2 S4.2 S16.2 1310 Rec. G.652 L1.1 L4.1 L16.1 ~ 60 1550 Rec. G.652 Rec. G.654 L1.2 L4.2 L16.2 Rec. G.653 L1.3 L4.3 L16.3
distance (km) nominal wavelength(nm) fiber type STM STM1 level STM4 * STM16
~ 15
* : parameter value in function of the application, bit rate, fiber type : AN.x
A: application (I, S, L) N: STM level (1,4,16) x: fiber/optical source type (1: 1310nm/G.652. 2:1550nm/ G.652. or 1550nm/G.654. 3: 1550nm/ G.653.)
94
The OPTICAL PATH between the reference points is specified by: (see also Figure 89 ) attenuation range also known as optical budget: for each application, attenuation is specified as a range, characteristic of the different application distances. Remark: definition of attenuation is A () = 10 log ( P1() / P2() ) in dB, where : wavelength P: optical power. dispersion : the maximum dispersion value, defined in ps/nm. It depends on the transmitter type, and the fiber dispersion coefficient over the operating wavelength range. Not all systems have a defined maximum dispersion value (see NA in Figure 89). Such a system is limited by attenuation. reflections: are caused by refractive index discontinuities along the optical path. This discontinuities occur because of splices, connectors, or other passive components. Reflections can decrease system performance, thus they must be controlled. Two parameters are used for that: minimum optical return loss (ORL) at reference point S. maximum discrete reflectance between reference points S and R. The appendix of recommendation G.957. describes the measurement methods for these two parameters.
95
The OPTICAL interfaces at the TRANSMITTER and at the RECEIVER are specified by: For the transmitter (see also Figure 88 and Figure 89): mean launch power: describes the transmitter output power. The mean launch power is the average power of a pseudorandom data sequence of full width transmitter pulses. Its maximum and minimum value is specified. extinction ratio : the ratio between the on power and the off power. EX = 10 log 10 (A / B) where EX: extinction ratio, A : average optical power level for a logical 1, B : average optical power level for a logical 0.
receiver sensitivity : is the minimum acceptable value of average received optical power at reference point R, for a bit error ratio BER=1 x 1010. receiver overload : the maximum value of average received optical power at reference point R that the receiver can accept and still maintain the required quality (BER 1x1010). optical path power penalty: the receiver must tolerate an optical path penalty of maximum 1dB ( 2dB for L16.2.). The optical path penalty is related to the reflections and dispersions occurred over the optical path. receiver reflectance : the maximum value of permitted reflectance of the receiver at reference point R. Figure 88 : Transmitter and receiver parameters
Maximum launched power Minimum launched power Minimum attenuation Maximum attenuation Receiver overload
Receiver sensitivity
96
Unit Digital signal Nominal bit rate Application code Operating wavelength range nm kbit/s
Values STM1 according to Recommendations G.707 and G.958 155 520 I1 S1.1 S1.2 14301580
Transmitter at reference point S Source type Spectral characteristics max. RMS width () max. 20 dB width min. suppression ratio Mean launched power maximum minimum Minimum extinction ratio nm nm dB dBm dBm dB MLM 40 8 15 8.2 LED 80 MLM 7.7 8 15 8.2 MLM 2.5 8 15 8.2 SLM 1 30
Optical path between S and R Attenuation range Maximum dispersion Minimum optical return loss of cable plant at S Maximum discrete reflectance between S and R dB ps/nm dB dB 07 NA NA NA 012 96 NA NA 296 NA NA 012 NA
Receiver at reference point R Minimum sensitivity Minimum overload Maximum optical path penalty Maximum reflectance of the receiver at R dBm dBm dB dB 23 8 1 NA 23 8 1 NA 23 8 1 NA
97
Unit Digital signal Nominal bit rate Application code Operating wavelength range nm kbit/s
Values STM1 according to Recommendations G.707 and G.958 155 520 L1.1 L1.2 L1.3 14801580
Transmitter at reference point S Source type Spectral characteristics max. RMS width () max. 20 dB width min. suppression ratio Mean launched power maximum minimum Minimum extinction ratio nm nm dB dBm dBm dB MLM 4 0 5 10 SLM 1 30 SLM 1 30 0 5 10 MLM 4/2.5 0 5 10 SLM 1 30
Optical path between S and R Attenuation range Maximum dispersion Minimum optical return loss of cable plant at S Maximum discrete reflectance between S and R dB ps/nm dB dB 1028 NA NA NA 1028 NA 20 25 296 NA NA 1028 NA
Receiver at reference point R Minimum sensitivity Minimum overload Maximum optical path penalty Maximum reflectance of the receiver at R dBm dBm dB dB 34 10 1 NA 34 10 1 25 34 10 1 NA
98
When we use radio links, other difficulties need to be solved than if we use optical links. For example: allocation of the available radio spectrum is needed: this is done by international agreements; within the allocated spectrum, user channels also have to be allocated; interference tolerance levels have to be defined; have to limit (avoid) the interference with other systems: for example with satellites; modulation techniques to be improved to increase bit rates (STM16).
99
100
Alcatel 1631 FX Alcatel 1641 SM/C Alcatel 1641 SM Alcatel 1651 SM/C Alcatel 1651 SM Alcatel 1661 SM/C Alcatel 1664 SM Alcatel 1603 SM Alcatel 1612 SM Alcatel 1648 SM Alcatel 1692 SM
Synchronous Optical Fibre Line Equipment 622 Mbit/s Fibre Optic Line System 2.5 Gbit/s Fibre Optic Line System
Alcatel 1610 OA
Synchronous High Order CrossConnect Systems 431 Wideband Digital CrossConnect Alcatel 1641 SX 44 Broadband Digital CrossConnect Alcatel 1644 SX 310 Wideband Digital CrossConnect (SONET) Alcatel 1630 SX 31 Wideband Digital CrossConnect (SONET) Alcatel 1631 SX 33 Broadband Digital CrossConnect (SONET) Alcatel 1633 SX
101
102
RECOMMENDATIONS
103
RECOMMENDATIONS
104
ABBREVIATIONS
ANNEX C : ABBREVIATIONS
ADM AIS ANSI APS ATM AU AUG Bellcore BER BIP BISDN
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
Add/Drop multiplexer Alarm Indication Signal American National Standards Institute Automatic Protection Switching Asynchronous Transfer Mode Administrative Unit Administrative Unit Group Bell Communications Research Bit Error Ratio Bit Interleaved Parity Broadband Integrated Services Digital Network Container International Telegraph and Telephone Consultative Committee Cyclic Redundancy Check Direct Current Data Communication Channel Digital Cross Connect Embedded Control Channel European Telecommunications Standards Institute Fiber Distributed Data Interface Global Positioning System Header Error Control International Telecommunication Union Standardisation Sector (the former CCITT) Metropolitan Area Network Multiplexing Section Overhead New Data Flag Operation, Administration, Maintenance and Provisioning Optical Line Terminal Equipment Optical Return Loss
C CCITT CRC DC DCC DXC ECC ETSI FDDI GPS HEC ITUT
105
ABBREVIATIONS
PAPI PCM PDH POH PPM RDI REI RFI RMS RSOH SDH SETS SOH SONET SPE STM STS TM TMN TU TUG TVAR VC
Path Access Point Identifier Pulse Code Modulation Plesiochronous Digital Hierarchy Path Overhead Part Per Million Remote Defect Indication Remote Error Indication Remote Failure Indication Root Mean Square Regenerator Section Overhead Synchronous Digital Hierarchy Synchronous Equipment Timing Source Section Overhead Synchronous Optical Network Synchronous Payload Envelop Synchronous Transport Module Synchronous Transport Signal Terminal Multiplexer Telecommunications Management Network Tributary Group Tributary Unit Group Time Variance (Allan Variance) Virtual Container
106
LIST OF TRANSPARENCIES
Figure 1 : Relative cable cost coaxial cable . . . . . . . . . . . . . . . . . . . . . . . . . Figure 2 : A traditional network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 3 : Evolution of transmission cost optical systems . . . . . . . . . . . . . Figure 4 : Optical fibre based ring network . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 5 : Backtoback multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 6 : Byte interleaving in the first order signal (PDH) . . . . . . . . . . . . . . Figure 7 : Bit interleaving in a higher order signal (PDH) . . . . . . . . . . . . . . . Figure 8 : Add/drop multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 9 : International plesiochronous digital hierarchies (kbit/s) . . . . . . . . Figure 10 : STM1 (SDH) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 11 : STS1 (SONET) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 12 : SDH network structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 13 : Synchronous multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 14 : Multiplexing : from C1 to STMN . . . . . . . . . . . . . . . . . . . . . . . . Figure 15 : Containers in SDH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 16 : Virtual Container . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 17 : Tributary Unit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 18 : Tributary Unit Group (example TUG2) . . . . . . . . . . . . . . . . . . . . Figure 19 : Administrative Unit (example AU4) . . . . . . . . . . . . . . . . . . . . . . Figure 20 : Administrative Unit Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 21 : CCITT multiplexing structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 22 : ETSI multiplexing structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 23 : Section Overhead STM1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 24 : Contents of the SOH (STM1) . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 25 : AIS and RDI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 26 : Protection switching (example) . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 27 : B2 and REI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 28 : Clock phase variations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 29 : Possible positions of a VC4 in an STM1 (examples) . . . . . . Figure 30 : AU Pointer format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
EDITION : 03
Figure 31 : AU Pointer offset numbering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Figure 32 : Positive justification in the AU4 . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Figure 33 : Negative justification in the AU4 . . . . . . . . . . . . . . . . . . . . . . . . . 33 Figure 34 : TU3 Pointer format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Figure 35 : TU3 Pointer offset numbering . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Figure 36 : TU2 and TU1 Pointer format . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Figure 37 : TU2 and TU1 Pointer offset numbering . . . . . . . . . . . . . . . . . . 37 Figure 38 : Path Overhead . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Figure 39 : POHs for VC4 and VC3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Figure 40 : G1 byte format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Figure 41 : H4 byte position indicator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Figure 42 : VC mapping in multiframe and lower order POH . . . . . . . . . . . . 42 Figure 43 : VC1, VC2 POH V5 byte format . . . . . . . . . . . . . . . . . . . . . . . . 43 Figure 44 : Lower order VCs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
Figure 45 : Possible structures of a TUG2 . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Figure 46 : TUG2 multiframe contains 3 TU12s . . . . . . . . . . . . . . . . . . . . . 46 Figure 47 : Possible structures of a VC3 . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 Figure 48 : Possible structures of a TUG3 . . . . . . . . . . . . . . . . . . . . . . . . . . 48 Figure 49 : Possible structures of a VC4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Figure 50 : Structure of the AU3 and AU4 . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Figure 51 : Possible structures of an AUG . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 Figure 52 : Multiplexing of N AUGs into STMN . . . . . . . . . . . . . . . . . . . . . . 52 Figure 53 : STMN SOH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Figure 54 : VC4Xc structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Figure 55 : ATM cell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Figure 56 : ATM cells mapped into VC4Xc . . . . . . . . . . . . . . . . . . . . . . . . . 56 Figure 57 : Typical SDH network configuration . . . . . . . . . . . . . . . . . . . . . . . . 57 Figure 58 : Add/Drop multiplexer function (example) . . . . . . . . . . . . . . . . . . 58 Figure 59 : Digital Crossconnect function (example) . . . . . . . . . . . . . . . . . . 59 Figure 60 : Higher order multiplexer function (example) . . . . . . . . . . . . . . . . 60 Figure 61 : SDH network element types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Figure 62 : Ring interconnection with STMN tributaries . . . . . . . . . . . . . . . 62 Figure 63 : Ring interconnection with STMN tributaries (dual node) . . . . 63 Figure 64 : Single node ring interconnection with DXC . . . . . . . . . . . . . . . . . 64 Figure 65 : N : 1 protection (example) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Figure 66 : Possible failures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Figure 67 : Link and path protection in selfhealing networks (example) . 67 Figure 68 : Unidirectional, selfhealing ring . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Figure 69 : Twofiber bidirectional selfhealing ring . . . . . . . . . . . . . . . . . . . 69
ii
Figure 70 : Link protection in a ring network . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Figure 71 : Traffic division . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Figure 72 : Traffic duplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Figure 73 : Regular clock and Gapped clock . . . . . . . . . . . . . . . . . . . . . . . . . 73 Figure 74 : Clock signal with phase variation . . . . . . . . . . . . . . . . . . . . . . . . . 74 Figure 75 : Clocks and pointer processing . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Figure 76 : Phase variation from clock noise . . . . . . . . . . . . . . . . . . . . . . . . . 76 Figure 77 : Measurement of TVAR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Figure 78 : Distribution of timing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Figure 79 : Restoration of the timing distribution . . . . . . . . . . . . . . . . . . . . . . 79 Figure 80 : An optical fibre . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Figure 81 : Reflection and refraction of light . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Figure 82 : Index profile of fibers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Figure 83 : Optical fibre types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
Figure 84 : Channel capacity of single mode fibre . . . . . . . . . . . . . . . . . . . . . 84 Figure 85 : Effect of dispersion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Figure 86 : Reference points in the optical section at which . . . . . . . . . . . . 86 Figure 87 : Optical interfaces classification (G.957) . . . . . . . . . . . . . . . . . . . . 87 Figure 88 : Transmitter and receiver parameters . . . . . . . . . . . . . . . . . . . . . . 88 Figure 89 : Optical interface specification for STM1 (G.957) . . . . . . . . . . 89 Figure 89 : (cont) Optical interface specification for STM1 (G.957) . . . . 90 Figure 90 : Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Figure 91 : Characteristics of SDH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92 Figure 92 : Network aspects of SDH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 Figure 93 : Network protection levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Figure 94 : Physical interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Figure 95 : Optical path parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Figure 96 : Optical transmitter and receiver parameters . . . . . . . . . . . . . . . 97 Figure 97 : Radio and electrical interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Figure 98 : Alcatel 1600 range for SDH (1) . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Figure 98 : (cont) Alcatel 1600 range for SDH (2) . . . . . . . . . . . . . . . . . . . . . 100 Figure 99 : Recommendations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
iii
Cost
Network node
2 x 8 Mbit/s
Network node
2 x 2 Mbit/s
100
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
400 Mbit/s
10
1975
1980
1985
1990
1995
2000
Network node
Network node
Network node
140 Mbit/s
140 Mbit/s
2 Mbit/s
140 34
34 Mbit/s 2 Mbit/s
34 140
34 2
2 34
. .
2 Mbit/s 2 Mbit/s
. .
2 Mbit/s 2 Mbit/s
34 Mbit/s
34 Mbit/s
34 Mbit/s
34 Mbit/s
34 Mbit/s
34 Mbit/s
64 x 2 Mbit/s
channel nr.
0 1 2 3
29 30 31 0 1 2 3
channel 8 bits
29 30 31 0 1 2 3
29 30 31
ADD/DROP multiplexer
Drop
Add
Hierarchical level 0 1 2 3 4
North America
Europe
Japan
TransAtlantic
270 bytes
1 1
9 10
270
Overhead
PAYLOAD
9 rows
9 125 sec
90 bytes
1 1
3 4
90
Over head
PAYLOAD
9 rows
9 125 sec
Transmission path
Multiplex section
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
Regenerator section
AU PTR
Payload
SECTION OVERHEAD
C1
C1
POH
C1
VC1
TU1 PTR
VC1
TU1
TU1 PTR
TU1 PTR
VC1
TUG2
TUG2
TUG3
TUG3
VC4
AU4 PTR
VC4
AU4
AU4 PTR
VC4
AUG
SOH
AUG
STMN
C2
6,312
C3
C4
POH
Container
TU PTR
TU1 PTR
TU1 PTR
VC1
VC1
AU PTR
AU3 PTR
AU3 PTR
VC3
VC3
xN STMN AUG
x7
AU3
VC3 x7
aligning
TU12
VC12
xN STMN AUG
x7
x3 mapping
aligning
TU12
VC12
pointer processing
1 1 3 5 9
9 10
270 bytes
STM1
bytes
1 1 RSOH 2 3 A1
2 A1
3 A1
4 A2 E1 D2
5 A2
6 A2
7 J0 F1 D3
bytes
X X
X X
B1
D1
5 6 MSOH 7 8 9
B2 D4 D7 D10 S1
B2
B2
K1 D5 D8 D11
K2 D6 D9 D12 Z2 M1 E2
Z1
Z1
Z2
AIS
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
MUX RDI
transmit end
Active fibre
Protection fibre
Transmitter Transmitter
Multiplexer
Transmitter
Receiver
Multiplexer C
transmit end
1 1 RSOH
STM1
270 1
1 RSOH
STM1
270
4 AU PTR
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
MSOH 9
I >
1 N 2 N 3 N 4 N
H1 < I >
5 S 6 S I 7 D 8 I 9 10 D I 11
H2 < I
12 D I 13 14 D I 15 D 16
I >
< I
I bits : Increment bits (used at positive justification) D bits : Decrement bit (used at negative justification)
AU Pointer example: 0 1 1 0 1 0 PO IN TE R VA LU E
Concatenation Indicator: 1 0 0 1 S S 1 1 1 1 1 1 1 1 1 1
270
87
9 1
521 522
125 sec
782
H1 Y
Y H2 1 1
H3 H3 H3
86
9
Y byte : 1001SS11 (S bits are not specified)
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
250 sec
1 byte : 11111111
270
87 87 87 88
9 1
125 sec
H1 H1 H1
H2 H2 H2 H3 H3 H3
1 1 1
85 86 86 86
250 sec
VC4
pointer value = A H1 Y Y H2 X X H3 H3 H3
VC4
pointer value : I bits inverted H1 Y Y H2 X X H3 H3 H3 three positive justification bytes
VC4
pointer value = A+ 1 H1 Y Y H2 X X H3 H3 H3
VC4
pointer value = A+1 H1 Y Y H2 X X H3 H3 H3
VC4
VC4
pointer value = A H1 Y Y H2 X X H3 H3 H3
VC4
pointer value: D bits inverted H1 Y Y H2 X X three negative justification bytes
VC4
pointer value = A 1 H1 Y Y H2 X X H3 H3 H3
VC4
pointer value = A 1 H1 Y Y H2 X X H3 H3 H3
VC4
I >
1 N 2 N 3 N 4 N
H1 < I >
5 S 6 S I 7 D 8 I 9 10 D I 11
H2 < I
12 D I 13 14 D I 15 D 16
I >
< I
I bits : Increment bits (used at positive justification) D bits : Decrement bit (used at negative justification)
1 1 P a t h O v e Fixed r- stuff h e a 9 d 1 P O H
Fixed stuff
VC4 261
positive justification opportunity ( 3x1 byte ) 83 83 83 84 84 84
H1 H1 H1 H2 H2 H2
593 594 594 594 595 595 595 596 763 764 764 764
125 sec
H1 H1 H1 H2 H2 H2
2 H3 H3 H3 0 0 0 1 1 1 85 85 85 86 86 86 87
83 83 83 84 84 84
I >
1 N 2 N 3 N 4 N
V1 < I >
5 S 6 S I 7 D 8 I 9 10 D I 11
V2 < I
12 D I 13 14 D I 15 D 16
I bits : Increment bits (used at positive justification) D bits : Decrement bit (used at negative justification)
I >
< I
I >
< I
I >
< I
Concatenation Indicator: 1 0 0 1 S S 1 1 1 1 1 1 1 1 1 1
TU multiframe TU nr.1 V1
427 0
139 0
103 0
106
neg. just. (1 byte) pos. just. 107 (1 byte )
34
25
35
26
213 214
69 70
51 52
500 sec
320
104
77
POH
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
payload
Virtual Container
1 J1 B3 C2 G1
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
261 bytes
1 J1 B3 C2 G1 F2 H4 Z3 K3 Z5
85
F2 H4 Z3 K3 Z5 VC4
VC3
REI 1 2 3 4
RDI 5 6
7 8
POH 1
Payload TU PTR (V4) VC3 / VC4 H4: 00 TU PTR (V1) H4: 01 VC3 / VC4
6 9 1
6
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
9 1
6 9 1
6 9 1
TU nr.1
V1
TU nr.2
V2
TU nr.3
V3 V5
TU nr.4
V4 J2
125 sec
Z6
250 sec
K4
375 sec
500 sec
BIP2 1 2
REI 3
RFI 4
SIGNAL LABEL 5 6 7
RDI 8
POH (V5)
POH (V5)
POH (V5)
9 r o w s
3 bytes
4 bytes
12 bytes
VC11
VC12
VC2
9 r o w s
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
12 bytes
4 TU11s in TUG2
12 bytes
3 TU12s in TUG2
12 bytes
1 TU2 in TUG2
TU nr. 2
TU nr. 3
TU nr. 4
12 bytes V1
V2
V3
V4
46
250 sec
375 sec
500 sec
7 TUG2s in VC3
C3 container
9
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
P O H
P O H
r o w s
C3
85 bytes
85 bytes
7 TUG2s in TUG3
N P I H1 H2 H3 P O H
1 TU3 in TUG3
9 r o w s
C3
86 bytes
86 bytes
fixed stuff
3 TUG3s in VC4
C4 container
9 r o w s
P O H
P O H
C4
261 bytes
261 bytes
fixed stuff
AU4
9 r o w s
AUPointer
P O H
AUPointer
VC4
30
59
87
261 bytes
3 AU3s in AUG
AU4 in AUG
9
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
r o w s
AUPointers
AUPointer
261 bytes
261 bytes
AUG nr. 1
AUG nr. N
AUPointer
AUPointer
261 bytes
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
261 bytes
1
RSOH AUPointers
H1H1..H1H2H2..H2 H3H3 H3
11..122..233...344..4
MSOH
260260...260261261..261
1 ... A1 B1 D1
1 ...
X X X X X X
X X
R S O H
F1 D3
B2 D4 D7 D10 S1
B2 B2
B2 B2
B2 K1 D5 D8 D11 Z2 M1
K2 D6 D9 D12 Z2 Z2 Z2 Z2 E2 M S O H
(n1)x Z1
Z1
Z1 Z1
Z1
(n2)x Z2
X X X
9 r o w s
P O H
C4Xc
fixed stuff
X1
Header
Payload
56
53 bytes
Cross Connect
Cross Connect
Backbone network
Cross Connect
Cross Connect
Cross Connect Add Drop Mux Cross Connect gateway Add Drop Mux Add Drop
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
Regional network
Add Drop
gateway
Mux
Mux
gateway Add Drop Mux Add Drop Mux AddDrop Mux
Mux
gateway Add Drop Mux Add Drop Mux Add Drop Mux
Local network
STM1
Ring Network
AddDrop Mux
user B
Mux
Access
user A
Mux Mux Mux
STM1
STM1
. . .
STM1
. . .
. . .
STM1
STM1 STM1
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
. . . STM1
. . .
STM4
CrossConnect
Add/Drop mux
ADM
ADM
ADM
STM4 ring
ADM
STM1 tributaries interconnection
ADM
STM1 ring
ADM
ADM
ADM
ADM
ADM
ADM
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
ADM
ADM
ADM
ADM
node)
ADM
ADM
ADM
STM4 ring
DXC
STM1 ring
ADM
ADM
ADM
Before failure 1 J K
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
After failure 1 J K N
. . .
. . .
N 1 tributaries operational J high priority traffic , taken over from K low priority traffic is stopped
Component
Board
o o
Automatic protection switching APS APS APS APS N+1 1 +1 N:1 1:1 Board and Cable
o
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
o o
o o o
Link
route 2
Route
Node
Node protection
Node
Link restoration
Path restoration
possible paths
original path
restored path
Figure 67 : Link and path protection in selfhealing networks (ex770 00438 1030VVBE 67 BELL EDUCATION CENTRE
ample)
Active fibre
ADM
Protection fibre
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
ADM
ADM
ADM
Transmission fibre
ADM
Reception fibre
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
ADM ADM
ADM
ADM
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
ADM
ADM
ADM
DXC
DXC ADM
DXC
Traffic duplication
0
DXC ADM
DXC ADM
t0
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
72 missing STM1 regular clock pulses : gap for RSOH and MSOH
t
0
p(0)
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
p(1)
p(2)
p(3)
p(4)
p(5)
p(6)
p(7)
p(8)
time
p(0)+ e(0)
p(2)+e(2) p(1)+e(1)
p(4)+e(4)
p(6)+e(6)
p(8)+e(8)
time
p(3)+e(3)
p(5)+e(5)
p(7)+e(7)
Pointer processor buffer + control Buffer write Outgoing pointer adjustment gaps or pulses + Buffer read
e(n)
Time
reference
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
Time A1 t A2 t A3
Main nodes
Local nodes
>
>
>
>
>
>
primary reference clock slave clock (G.812) DXC or ADM slave clock (G.81s)
>
@
Main nodes
Local nodes
>
>
>
>
>
>
primary reference clock break in timing distribution network slave clock (G.812) new link to restore timing distribution DXC or ADM slave clock (G.81s)
>
main node clock in holdover and not slaved to DXC clock in holdover
core
cladding
protective jacket
normal of incidence
Reflection of light
Refraction of light
refracted ray
n n1 n2 n0 r
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
n n1 n2 n0 r
Loss
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
(dB/km)
900
1100
1500
1700
input pulse
output pulse
Application
Interoffice Long haul ~ 40 1550 Rec. G.652 S1.2 S4.2 S16.2 1310 Rec. G.652 L1.1 L4.1 L16.1 Rec. G.652 Rec. G.654 L1.2 L4.2 L16.2 ~ 60 1550 Rec. G.653 L1.3 L4.3 L16.3
distance (km) nominal wavelength(nm) fiber type STM STM1 level STM4 * STM16
<2 1310 Rec. G.652 I1 I4 I16 1310 Rec. G.652 S1.1 S4.1 S16.1
~ 15
* : parameter value in function of the application, bit rate, fiber type : AN.x
A: application (I, S, L) N: STM level (1,4,16) x: fiber/optical source type (1: 1310nm/G.652. 2:1550nm/ G.652. or 1550nm/G.654. 3: 1550nm/ G.653.)
Receiver sensitivity
Unit Digital signal Nominal bit rate Application code Operating wavelength range nm kbit/s
Values STM1 according to Recommendations G.707 and G.958 155 520 I1 S1.1 S1.2 14301580
Transmitter at reference point S Source type Spectral characteristics max. RMS width () max. 20 dB width min. suppression ratio Mean launched power maximum minimum Minimum extinction ratio nm nm dB dBm dBm dB MLM 40 8 15 8.2 LED 80 MLM 7.7 8 15 8.2 MLM 2.5 8 15 8.2 SLM 1 30
dB ps/nm dB dB
07 NA NA NA
012 96 NA NA 296
012 NA NA NA
Maximum dispersion Minimum optical return loss of cable plant at S Maximum discrete reflectance between S and R
Receiver at reference point R Minimum sensitivity Minimum overload Maximum optical path penalty Maximum reflectance of the receiver at R dBm dBm dB dB 23 8 1 NA 23 8 1 NA 23 8 1 NA
Unit Digital signal Nominal bit rate Application code Operating wavelength range nm kbit/s
Values STM1 according to Recommendations G.707 and G.958 155 520 L1.1 L1.2 L1.3 14801580
Transmitter at reference point S Source type Spectral characteristics max. RMS width () max. 20 dB width min. suppression ratio Mean launched power maximum minimum Minimum extinction ratio
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
SLM 1 30
SLM 1 30 0 5 10
MLM 4/2.5 0 5 10
SLM 1 30
Optical path between S and R Attenuation range Maximum dispersion Minimum optical return loss of cable plant at S Maximum discrete reflectance between S and R dB ps/nm dB dB 1028 NA NA NA 1028 NA 20 25 296 NA NA 1028 NA
Receiver at reference point R Minimum sensitivity Minimum overload Maximum optical path penalty Maximum reflectance of the receiver at R dBm dBm dB dB 34 10 1 NA 34 10 1 25 34 10 1 NA
(G.957)
DATA CONTAINER (C) CONTAINER + POH VIRTUAL CONTAINER (VC) VIRTUAL CONTAINER + TU POINTER TRIBUTARY UNIT (TU) TRIBUTARY UNITS TRIBUTARY UNIT GROUP (TUG)
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
TRIBUTARY UNIT GROUPS + POH HIGHER ORDER VIRTUAL CONTAINER (VC) HIGHER ORDER VIRTUAL CONTAINER + AU POINTER ADMINISTRATIVE UNIT (AU) ADMINISTRATIVE UNITS ADMINISTRATIVE UNIT GROUP (AUG) ADMINISTRATIVE UNIT GROUP + SOH STM_N
Figure 90 : Terminology
770 00438 1030VVBE 91 BELL EDUCATION CENTRE
ADD/DROP MULTIPLEXING
92
NETWORK PROTECTION
TIMING ASPECTS
PHYSICAL INTERFACES
UNIT PROTECTION
PATH PROTECTION
94
PHYSICAL INTERFACES :
OPTICAL INTERFACES
RADIO INTERFACES
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
ELECTRICAL INTERFACES
95
ATTENUATION RANGE
DISPERSION
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
96
TRANSMITTER PARAMETERS:
EXTINCTION RATIO
RECEIVER PARAMETERS:
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
RECEIVER SENSITIVITY
RECEIVER OVERLOAD
RECEIVER REFLECTANCE
97
RADIO INTERFACES:
ACCESS TO FIBRE
PRIVATE NETWORKS
ELECTRICAL INTERFACES:
98
VC12 Fiber Optic Extender 155 Mbit/s Compact Add/Drop multiplexer 155 Mbit/s Add/Drop multiplexer 622 Mbit/s Compact Add/Drop multiplexer 622 Mbit/s Add/Drop multiplexer 2.5 Gbit/s Compact Add/Drop multiplexer 2.5 Gbit/s Add/Drop multiplexer
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
Alcatel 1631 FX Alcatel 1641 SM/C Alcatel 1641 SM Alcatel1651 SM/C Alcatel 1651 SM Alcatel 1661 SM/C Alcatel 1664 SM
155 Mbit/s SONET Transport System 622 Mbit/s SONET Transport System 2.5 Gbit/s SONET Transport System 9.6 Gbit/s SONET Transport System
Optical Amplifier
Optical Amplifier Alcatel 1610 OA
310 Wideband Digital CrossConnect (SONET) Alcatel 1630 SX 31 Wideband Digital CrossConnect (SONET) Alcatel 1631 SX
1996 ALCATEL BELL N.V. ALL RIGHTS RESERVED
622 Mbit/s Fibre Optic Line System 2.5 Gbit/s Fibre Optic Line System
Synchronous digital hierarchy bit rates Network node interface for the synchronous digital hierarchy Synchronous multiplexing structure Network node interface for the synchronous digital hierarchy (merged version of G.707, G.708, G.709)
SDH management information model Structure of recommendations on multiplexing equipment for SDH Types and general characteristics of SDH multiplexing equipment Characteristics of SDH multiplexing equipment functional blocks SDH Management Timing requirements at the outputs of slave clocks suitable for plesiochronous operation of international digital links
G.81s
Timing characteristics of slave clocks suitable for the operation in SDH equipments
G.825
The control of jitter and wander within digital networks which are based on the SDH
G.957 G.958
Optical interfaces for equipment and systems relating to the SDH Digital line systems based on the SDH for use on optical fibre cables
Figure 99 : Recommendations
770 00438 1030VVBE 101 BELL EDUCATION CENTRE