Вы находитесь на странице: 1из 36

SDH

Telecommunications
Standard
Primer

What is SDH?
This document is intended as an introductory guide to the
Synchronous Digital Hierarchy (SDH) multiplexing standard.
Standards in the telecommunications field are always evolv-
ing. Information in this SDH primer is based on the latest
information available from the ITU-T standardisation
organization.
Use this primer as an introduction to the technology of SDH.
Consult the actual material from ITU-T, paying particular
attention to the latest revision, if more detailed information is
required.
For help in understanding the language of SDH telecommuni-
cations, a comprehensive Glossary appears at the end of this
document.

page i
page ii
Contents
Introduction to SDH 1
Background 1
Synchronisation of Digital Signals 1
SDH Advantages 1
Plesiochronous Digital Hierarchy (PDH) 2
Limitations of PDH Networks 2
Basic SDH Signal 2
Transmission Hierarchies 3
Introduction to Synchronisation 4
Synchronous versus Asynchronous 4
Synchronisation Hierarchy 4
Synchronising SDH 4
Evolution of Timing and Synchronization 4
SDH Frame Structure 5
Virtual Container 5
SDH Overhead 6
Regenerator Section Overhead 6
Multiplex Section Overhead 7
Higher-Order Path Overhead (VC-4/VC-3) 8
Lower-Order Path Overhead (VC-2/VC-1) 9
SDH Anomalies, Defects, Failures, and Alarms 11
Definitions 11
SDH Error Performance Monitoring 11
SDH Pointers 13
Payload Pointer 13
Positive Pointer Justification 13
Negative Pointer Justification 14
SDH Multiplexing 15
SDH Tributary Multiplexing 17
Tributary Unit Group 17
TU Multiframe 17
TU Payload Pointer 18
Automatic Protection Switching 19
Multiplex Section Protection, K1/K2 Bytes 19
1+1 Protection 19
1:N Protection 20
SDH Network Elements 21
Terminal Multiplexer 21
Regenerator 21
Add/Drop Multiplexer 21
Wideband Digital Cross-connect 22
Broadband Digital Cross-connect 22
Flexible Multiplexer 22
page iii
SDH Network Configurations 23
Point-to-Point 23
Point-to-Multipoint 23
Mesh Architecture 23
Ring Architecture 24
Benefits of SDH Conclusions 25
Pointers, MUX/DEMUX 25
Reduced Back-to-Back Multiplexing 25
Optical Interconnect 25
Multi-point Configurations 25
Grooming 25
Enhanced OAM 25
Enhanced Performance Monitoring 25
Convergence, ATM, Video, and SDH 25
SONET Reference 27
SONET and SDH Hierarchies 27
Further Information 27
Glossary 28
SDH Reference Materials 32

page iv
Introduction To SDH
SDH (Synchronous Digital The availability of a set of would lie within specified
Hierarchy) is a standard for generic standards, which limits. These phase differ-
telecommunications transport enable multi-vendor inter- ences may be due to propaga-
formulated by the Interna- operability. tion time delays, or low-fre-
tional Telecommunication The definition of a flexible quency wander introduced in
Union (ITU), previously architecture capable of the transmission network. In
called the International Tele- accommodating future a synchronous network, all
graph and Telephone Consul- applications, with a variety the clocks are traceable to one
tative Committee (CCITT). of transmission rates. Primary Reference Clock
SDH was first introduced into (PRC). The accuracy of the
In brief, SDH defines syn-
the telecommunications net- PRC is better than 1 in 1011
chronous transport modules
work in 1992 and has been and is derived from a cesium
(STMs) for the fibre-optic
deployed at rapid rates since atomic standard.
based transmission hierarchy.
then. Its deployed at all lev- If two digital signals are Ple-
els of the network infrastruc- Background siochronous, their transitions
ture, including the access net- Before SDH, the first genera- occur at almost the same
work and the long-distance tions of fibre-optic systems in rate, with any variation being
trunk network. Its based on the public telephone network constrained within tight lim-
overlaying a synchronous used proprietary architec- its. These limits are set down
multiplexed signal onto a tures, equipment line codes, in ITU-T recommendation
light stream transmitted over multiplexing formats, and G.811. For example, if two
fibre-optic cable. SDH is also maintenance procedures. The networks need to interwork,
defined for use on radio relay users of this equipment their clocks may be derived
links, satellite links, and at wanted standards so they from two different PRCs.
electrical interfaces between could mix and match equip- Although these clocks are
equipment. ment from different suppli- extremely accurate, theres a
The comprehensive SDH ers. small frequency difference
standard is expected to pro- The task of creating such a between one clock and the
vide the transport infrastruc- standard was taken up in other. This is known as a ple-
ture for worldwide telecom- 1984 by the Exchange Carri- siochronous difference.
munications for at least the ers Standards Association In the case of Asynchronous
next two or three decades. (ECSA) in the U.S. to estab- signals, the transitions of the
The increased configuration lish a standard for connecting signals dont necessarily
flexibility and bandwidth one fibre system to another. occur at the same nominal
availability of SDH provides In the late stages of the devel- rate. Asynchronous, in this
significant advantages over opment, the CCITT became case, means that the differ-
the older telecommunications involved so that a single ence between two clocks is
system. These advantages international standard might much greater than a ple-
include: be developed for fibre inter- siochronous difference. For
connect between telephone example, if two clocks are
A reduction in the amount networks of different coun- derived from free-running
of equipment and an tries. The resulting interna- quartz oscillators, they could
increase in network relia- tional standard is known as be described as asynchronous.
bility. Synchronous Digital Hierar-
The provision of overhead SDH Advantages
chy (SDH).
and payload bytes the The primary reason for the
overhead bytes permitting Synchronisation of Digital creation of SDH was to pro-
management of the payload Signals vide a long-term solution for
bytes on an individual basis To understand correctly the an optical mid-span meet
and facilitating centralised concepts and details of SDH, between operators; that is, to
fault sectionalisation. its important to be clear allow equipment from differ-
The definition of a syn- about the meaning of Syn- ent vendors to communicate
chronous multiplexing for- chronous, Plesiochronous, with each other. This ability
mat for carrying lower-level and Asynchronous. is referred to as multi-vendor
digital signals (such as In a set of Synchronous sig- interworking and allows one
2 Mbit/s, 34 Mbit/s, nals, the digital transitions in SDH-compatible network ele-
140 Mbit/s) which greatly the signals occur at exactly ment to communicate with
simplifies the interface to the same rate. There may another, and to replace sev-
digital switches, digital however be a phase differ- eral network elements, which
cross-connects, and add- ence between the transitions may have previously existed
drop multiplexers. of the two signals, and this solely for interface purposes.

page 1
The second major advantage sent further along the net- way down to the 2 Mbit/s
of SDH is the fact that its work to their proper destina- level before the location of
synchronous. Currently, most tion. In SDH format, only the 64 kbit/s channel can be
fibre and multiplex systems those channels that are identified. PDH requires
are plesiochronous. This required at a particular point steps (140-34, 34-8, 8-2
means that the timing may are demultiplexed, thereby demultiplex; 2-8, 8-34, 34-
vary from equipment to eliminating the need for back- 140 multiplex) to drop out or
equipment because they are to-back multiplexing. In other add an individual speech or
synchronised from different words, SDH makes individual data channel (see Figure 1).
network clocks. In order to channels visible and they This is due to the bit-stuffing
multiplex this type of signal, can easily be added and used at each level.
a process known as bit-stuff- dropped.
Limitations of PDH Network
ing is used. Bit-stuffing adds
Plesiochronous Digital Hierarchy The main limitations of PDH
extra bits to bring all input
(PDH) are:
signals up to some common
bit-rate, thereby requiring Traditionally, digital transmis- Inability to identify indi-
multi-stage multiplexing and sion systems and hierarchies vidual channels in a higher-
demultiplexing. Because SDH have been based on multiplex- order bit stream.
is synchronous, it allows sin- ing signals which are ple- Insufficient capacity for
gle-stage multiplexing and siochronous (running at network management;
demultiplexing. This single- almost the same speed). Also, Most PDH network manage-
stage multiplexing eliminates various parts of the world use ment is proprietary.
hardware complexity, thus different hierarchies which Theres no standardised
decreasing the cost of equip- lead to problems of interna- definition of PDH bit rates
ment while improving signal tional interworking; for exam- greater than 140 Mbit/s.
quality. ple, between those countries There are different hierar-
using 1.544 Mbit/s systems chies in use around the
In plesiochronous networks,
(U.S.A. and Japan) and those world. Specialized interface
an entire signal had to be
using the 2.048 Mbit/s system. equipment is required to
demultiplexed in order to
access a particular channel; To recover a 64 kbit/s chan- interwork the two hierar-
then the non-accessed chan- nel from a 140 Mbit/s PDH chies.
nels had to be re-multiplexed signal, its necessary to
Basic SDH Signal
back together in order to be demultiplex the signal all the
The basic format of an SDH
signal allows it to carry many
different services in its Vir-
140 Mbit/s 140 Mbit /s tual Container (VC) because
140-34 DEMUX 34-140 MUX it is bandwidth-flexible. This
capability allows for such
34 Mbit/s 34 Mbit/s things as the transmission of
high-speed packet-switched
services, ATM, contribution
34-8 DEMUX 8-34 MUX video, and distribution video.
However, SDH still permits
8 Mbit/s 8 Mbit/s transport and networking at
the 2 Mbit/s, 34 Mbit/s, and
8-2 DEMUX 2-8 MUX 140 Mbit/s levels, accommo-
dating the existing digital
hierarchy signals. In addi-
2 Mbit/s tion, SDH supports the trans-
port of signals based on the
1.5 Mbit/s hierarchy.
Drop & Add

Figure 1. PDH multiplexing by steps, showing add/drop function.

page 2
Transmission Hierarchies nated in 1989 with ITU-Ts
Following ANSIs develop- publication of the Syn-
ment of the SONET standard, chronous Digital Hierarchy
the ITU-T undertook to (SDH) standards.
define a standard that would Tables 1 and 2 compare the
address interworking Non-synchronous and Syn-
between the 2048 kbit/s and chronous transmission
1554 kbit/s transmission hier- hierarchies.
archies. That effort culmi-

Table 1. Non-Synchronous, PDH Hierarchy


Signal Digital Bit Rate Channels
E0 64 kbit/s One 64 kbit/s
E1 2.048 Mbit/s 32 E0
E2 8.448 Mbit/s 128 E0
E3 34.368 Mbit/s 16 E1
E4 139.264 Mbit/s 64 E1

Table 2. SDH Hierarchy


Bit Rate Abbreviated SDH SDH Capacity
51.84 Mbit/s 51 Mbit/s STM-0 21 E1
155.52 Mbit/s 155 Mbit/s STM-1 63 E1 or 1 E4
622.08 Mbit/s 622 Mbit/s STM-4 252 E1 or 4 E4
2488.32 Mbit/s 2.4 Gbit/s STM-16 1008 E1 or 16 E4
9953.28 Mbit/s 10 Gbit/s STM-64 4032 E1 or 64 E4
STM = Synchronous Transport Module

page 3
Introduction to Synchronisation
Synchronous versus Low-speed synchronous vir- Evolution of Timing and
Asynchronous tual container (VC) signals Synchronisation
Traditionally, transmission are also simple to interleave This is a time of great change
systems have been asyn- and transport at higher rates. for Timing and Synchronisa-
chronous, with each terminal At low speeds, 2.048 Mbit/s tion in the network and there
in the network running on its E1 signals are transported are many challenges for oper-
own recovered clock timing. within synchronous VC-12 ators and suppliers and
In digital transmission, tim- signals which run at a con- many issues to resolve:
ing is one of the most funda- stant rate of 2.304 Mbit/s.
Single-step multiplexing up Synchronisation networks
mental operations. are changing with the intro-
to STM-1 requires no bit-
Since these clocks are not stuffing and VCs are easily duction of SDH; the histori-
synchronised, large variations accessed. cal PDH-based sync net-
can occur in the clock rate work will be replaced by an
and thus the signal bit rate. A mechanism known as SDH-based architecture.
For example, an E3 signal pointers, operating in con-
junction with buffers, accom- New equipment, network
specified at 34 Mbit/s timing, and sync standards
20 ppm (parts per million) modates differences in the
reference source frequencies have been developed
can produce a timing differ- (Tektronix is contributing
ence of up to 1789 bit/s and phase wander, and so
prevents data loss during syn- expertise at ITU and ETSI).
between one incoming E3 sig-
chronisation failures. This is Transport networks are
nal and another.
discussed in more detail later evolving and hybrid
Asynchronous multiplexing in this primer. SDH/PDH has specific
uses multiple stages. Signals problems due to the quanti-
such as asynchronous E1s Synchronisation Hierarchy sation of network phase
(2 Mbit/s) are multiplexed Digital switches and digital variation as pointer justifi-
(bit-interleaving), extra bits cross-connect systems are cations.
are added (bit-stuffing) to commonly employed in the New services such as video
account for the timing varia- digital network synchronisa- and ATM depend on excel-
tions of each individual tion hierarchy. The network lent timing and network
stream and are combined with is organized with a master- sync to deliver good Qual-
other bits (framing bits) to slave relationship with clocks ity of Service.
form an E2 (8 Mbit/s) stream. of the higher-level nodes
Bit-interleaving and bit-stuff- feeding timing signals to Jitter/Wander measurement
ing is used again to multiplex clocks of the lower-level technology is changing
up to E3 (34 Mbit/s). The E1s nodes. All nodes can be from analogue to digital,
are neither visible nor accessi- traced up to a Primary Refer- leading to dramatically new
ble within an E3 frame. E3s ence Clock (PRC). instrument capabilities.
are multiplexed up to higher New test equipment stan-
rates in the same manner. At Synchronising SDH
dards are being developed
the higher asynchronous rate, The internal clock of an SDH (Tektronix is taking a lead-
they cannot be accessed with- terminal may derive its tim- ing role at ITU).
out demultiplexing. ing signal from a Synchroni-
These and many other timing
In a synchronous system, sation Supply Unit (SSU)
and sync issues are addressed
such as SDH, the average fre- used by switching systems
in another publication from
quency of all clocks in the and other equipment. Thus,
Tektronix: Performance
system is the same. Every this terminal can serve as a
Assessment of Timing and
slave clock can be traced back master for other SDH nodes,
Synchronisation in Broad-
to a highly stable reference providing timing on its outgo-
band Networks.
clock. Thus, the STM-1 rate ing STM-N signal. Other SDH
nodes will operate in a slave Copies can be requested from
remains at a nominal Tektronix offices around the
155.52 Mbit/s, allowing many mode with their internal
clocks timed by the incoming world, or by Internet e-mail
synchronous STM-1 signals at: timingsync@tek.com.
to be multiplexed without STM-N signal. Present stan-
any bit-stuffing. Thus, the dards specify that an SDH
STM-1s are easily accessed at network must ultimately be
a higher STM-N rate. able to derive its timing from
a PRC.

page 4
SDH Frame Structure
The STM-1 frame is the basic The first nine columns of Virtual Containers can have
transmission format for SDH. each frame make up the Sec- any phase alignment within
The frame lasts for 125 tion Overhead, and the last the Administrative Unit, and
microseconds, therefore, 261 columns make up the this alignment is indicated by
there are 8000 frames per Virtual Container (VC) capac- the Pointer in row four, as
second. ity. The VC plus the pointers described later in the Pointers
The STM-1 frame consists of (H1, H2, H3 bytes) is called section. Within the Section
overhead plus a virtual con- the AU (Administrative Unit). Overhead, the first three rows
tainer capacity (see Figure 2). Carried within the VC capac- are used for the Regenerator
ity, which has its own frame Section Overhead, and the
structure of nine rows and last five rows are used for the
Table 3. Virtual Containers (VC) 261 columns, is the Path Multiplex Section Overhead.
SDH Digital Bit Rate Size of VC Overhead and the Container The STM frame is transmitted
VC-11 1.728 Mbit/s 9 rows, 3 columns
(see Figure 3). The first col- in a byte-serial fashion, row-
umn is for Path Overhead; its by-row, and is scrambled
VC-12 2.304 Mbit/s 9 rows, 4 columns followed by the payload con- immediately prior to trans-
VC-2 6.912 Mbit/s 9 rows, 12 columns tainer, which can itself carry mission to ensure adequate
VC-3 48.960 Mbit/s 9 rows, 85 columns other containers. clock timing content for
downstream regenerators.
VC-4 150.336 Mbit/s 9 rows, 261 columns
Virtual Container
SDH supports a concept
Frame = 125 s Frame = 125 s Frame = 125 s called virtual containers
1 byte = One 64 kbit/s channel (VC). Through the use of
STM-1 = 270 Columns (2430 bytes) pointers and offset values,
VCs can be carried in the
SDH payload as independent
1
Regenerator data packages. VCs are used
2 Section
to transport lower-speed trib-
Overhead
3 Administrative Unit utary signals. Figure 3 illus-
Pointers 4 H1 H2 H3 trates the location of a VC-4
H1H1H1 H2H2H2 H3H3H3
Capacity of the 9 Rows within the STM-1 frame.
5 Virtual Container Note that it can start (indi-
6 Multiplex + cated by the J1 path overhead
7
Section Pointers byte) at any point within the
Overhead
STM-1 frame. The start loca-
8 tion of the J1 byte is indi-
9 cated by the pointer byte
values.
Overhead width = 9 columns
Virtual containers can also be
Figure 2. STM-1 frame structure. concatenated to provide more
capacity in a flexible fashion.
Frame = 125 s Frame = 125 s Frame = 125 s Table 3 lists the names and
STM-1 = 270 Columns
some of the parameters of the
virtual containers.
1 A1 A1 A1A2 A2 A2 J 0 /
Regenerator Z0

Section 2 B1 E1 F1

Overhead 3 D1 D2 D3
9 Rows

Pointers 4 H1 B2 B2 H2 H2 H2 H3 H3 H3
Path Overhead
B2 K1 K2
5 J1 Unidad
D4 D5 D6 B3
6
Multiplex C2
Bounded by 261 columns
D7 D8 D9
Section 7 G1

Overhead 8 D10 D11 D12 F2 Wrap-around within SDH payload


H4
S1 M 1 E2
9 F3

K3
N1

Figure 3. Virtual container structure showing VC-4.


page 5
SDH Overhead
The SDH standard was devel- This section details the differ- of a section. This might be
oped using a client/server ent SDH overhead informa- two regenerators, a piece of
layer approach. The overhead tion, specifically: line terminating equipment
and transport functions are Regenerator Section Over- and a regenerator, or two
divided into layers. They are: head pieces of line terminating
Regenerator Section Multiplex Overhead equipment.
Multiplex Section Path Overhead The Regenerator Section
Path Overhead is found in the first
Regenerator Section Overhead
The layers have a hierarchical three rows of Columns 1
The Regenerator Section through 9 of the STM-1 frame
relationship, with each layer Overhead contains only the (see Figure 5). Byte by byte,
building on the services pro- information required for the the Regenerator Section Over-
vided by all the lower layers. elements located at both ends head is shown in Table 4.

Path
Multiplex Section Multiplex Section
Regenerator Section Regenerator Section

REG ADM REG


PTE PTE
Section Section
Path Termination Termination Path
Termination Multiplex Section Termination
Termination

Legend:
Service (2 Mbit/s,140 Mbit/s...) PTE = Path Terminating Element Service
REG = Regenerator
Mapping Mapping
ADM = Add/Drop Multiplexer
Demapping Demapping

Figure 4. Regenerator section, multiplex section, path.

Regenerator
Section STM-1

1 A1 A1 A1 A2 A2 A2 J0
2 B1 B1 F1
3 D1 D2 D3
4 H1 H1 H1 H2 H2 H2 H3 H3 H3
5 B2 B2 B2 K1 K2
6 D4 D5 D6
7 D6 D8 D9
8 D10 D11 D12
9 S1 E2

Figure 5. STM-1 Regenerator section overhead.

page 6
Table 4. Regenerator Section Overhead
Byte Description
A1 and A2 Framing bytes These two bytes indicate the beginning of the STM-1 frame. The A1, A2 bytes are unscrambled. A1 has the binary value
11110110, and A2 has the binary value 00101000. The frame alignment word of an STM-N frame is composed of (3 x N) A1 bytes followed by
(3 x N) A2 bytes.
J0 Regenerator Section (RS) Trace message Its used to transmit a Section Access Point Identifier so that a section receiver can verify its
continued connection to the intended transmitter. The coding of the J0 byte is the same as for J1 and J2 bytes. This byte is defined only for
STM-1 number 1 of an STM-N signal.
Z0 These bytes, which are located at positions S[1,6N+2] to S[1,7N] of an STM-N signal (N > 1), are reserved for future international
standardisation.
B1 RS bit interleaved parity code (BIP-8) byte This is a parity code (even parity), used to check for transmission errors over a regenerator
section. Its value is calculated over all bits of the previous STM-N frame after scrambling, then placed in the B1 byte of STM-1 before
scrambling. Therefore, this byte is defined only for STM-1 number 1 of an STM-N signal.
E1 RS orderwire byte This byte is allocated to be used as a local orderwire channel for voice communication between regenerators, cross-
connects, and remote terminal locations.
F1 RS user channel byte This byte is set aside for the users purposes; it terminates at all section terminating equipment within a line; that is, it
can be read and/or written to at each section terminating equipment in that line.
D1, D2, D3 RS data communications channel (DCC) bytes Together, these three bytes form a 192 kbit/s message channel providing a message-based
channel for Operations, Administration and Maintenance (OAM) between pieces of section terminating equipment. The channel can be used
from a central location for alarms, control, monitoring, administration, and other communication needs. Its available for internally generated,
externally generated, or manufacturer-specific messages.

Multiplex Section Overhead The Multiplex Section Over-


The Multiplex Section Over- head is found in Rows 5 to 9
head contains the informa- of Columns 1 through 9 of the
tion required between the STM-1 frame (see Figure 6).
multiplex section termination Byte by byte, the Multiplex
equipment at each end of the Section Overhead is shown in
Multiplex section (that is, Table 5.
between consecutive network
elements excluding the regen-
erators).

STM-1
1 A1 A1 A1 A2 A2 A2 J0
2 B1 E1 F1
3 D1 D2 D3
4 H1 H1 H1 H2 H2 H2 H3 H3 H3
5 B2 B2 B2 K1 K2
6 D4 D5 D6
7 D6 D8 D9
8 D10 D11 D12
9 S1 E2

Multiplex Section

Figure 6. STM-1 Multiplex section overhead.

page 7
Table 5. Multiplex Section Overhead
Byte Description
B2 Multiplex Section (MS) bit interleaved parity code (MS BIP-24) byte This bit interleaved parity 24 code is used to determine if a
transmission error has occurred over a multiplex section. Its even parity, and is calculated over all bits of the MS Overhead and the STM-N
frame of the previous STM-N frame before scrambling. The value is placed in the three B2 bytes of the MS Overhead before scrambling.
These bytes are provided for all STM-1 signals in an STM-N signal.
K1 and K2 Automatic Protection Switching (APS channel) bytes These two bytes are used for MSP (Multiplex Section Protection) signaling between
multiplex level entities for bi-directional automatic protection switching and for communicating Alarm Indication Signal (AIS) and Remote
Defect Indication (RDI) conditions.
D4 to D12 MS data communications channel (DCC) bytes These 9 bytes form a 576 kbit/s message channel from a central location for OAM
information (alarms, control, maintenance, remote provisioning, monitoring, administration and other communication needs). This message
channel is available for internally generated, externally generated, and manufacturer specific messages.
S1 Synchronisation status message byte (SSMB) Bits 1 to 4 of this S1 byte are used to carry the synchronisation messages. The following is
` the assignment of bit patterns to the four synchronisation levels agreed to within ITU-T (other values are reserved):
0000 Quality unknown (existing sync. network)
0010 G.811 PRC
0100 G.812 transit
1000 G.812 local
1011 G.813 Synchronous Equipment Timing Source (SETS)
1111 Do not use for synchronisation. This message may be emulated by equipment failures and will be emulated by a Multiplex
Section AIS signal.
M1 The M1 byte of an STM-1 or the first STM-1 of an STM-N is used for a MS layer remote error indication (MS-REI). Bits 2 to 8 of the M1 byte
are used to carry the error count of the interleaved bit blocks that the MS BIP-8 has detected to be in error at the far end of the section. This
value is truncated at 255 for STM-N >4.
E2 MS orderwire byte This orderwire byte provides a 64 kbit/s channel between multiplex entities for an express orderwire. Its a voice channel
for use by craftspersons and will be ignored as it passes through the regenerators.

Higher-Order Path Overhead from the time its created by The Path Overhead is found
(VC-4/VC-3) path terminating equipment in Rows 1 to 9 of the first col-
The Path Overhead is until the payload is demulti- umn of the VC-4 or VC-3 (see
assigned to, and transported plexed at the termination Figure 7). Byte by byte, the
with the Virtual Container point in a piece of path termi- Path Overhead is shown in
nating equipment. Table 6.

1 J1 J1 VC-n Path Trace


2 B3 B3 Path BIP-8
3 C2 C2 Path Signal Label
4 G1 G1 Path Status
5 F2 F2 Path User Channel
6 H4 H4 TU Multiframe Indicator
7 F3 F3 Path User Channel
8 K3 K3 Automatic Protection Switching
9 N1 N1 Network Operator (TCM)

Section Overhead Path Overhead

Figure 7. Higher-order path overhead (VC-4/VC-3).

page 8
Table 6. Higher-Order Path Overhead
Byte Description
J1 Higher-Order VC-N path trace byte This user-programmable byte repetitively transmits a 15-byte, E.64 format string plus 1-byte CRC-7.
A 64-byte free-format string is also permitted. This allows the receiving terminal in a path to verify its continued connection to the intended
transmitting terminal.
B3 Path bit interleaved parity code (Path BIP-8) byte This is a parity code (even), used to determine if a transmission error has occurred over a
path. Its value is calculated over all the bits of the previous virtual container before scrambling.
C2 Path signal label byte This byte specifies the mapping type in the VC-N. Standard binary values for C2 are:
0000 0000 Unequipped
0000 0001 Equipped, non-specific
0000 0010 TUG structure
0000 0011 Locked TU-n
0000 0100 34 Mbit/s or 45 Mbit/s into C-3 asynchronous
0001 0010 140 Mbit/s into C-4 asynchronous
0001 0011 ATM mapping
0001 0100 MAN (DQDB) mapping
0001 0101 FDDI mapping
1111 1110 Test signal, O.181 specific mapping
1111 1111 VC-AIS
G1 Path status byte This byte is used to convey the path terminating status and performance back to the originating path terminating
equipment. Therefore the bi-directional path in its entirety can be monitored, from either end of the path.
F2 Path user channel byte This byte is used for user communication between path elements.
H4 Tributary Unit (TU) multiframe indicator byte This byte provides a generalized multiframe indicator for payload containers. At present, its
used only for tributary unit structured payloads. A 4-value incrementing count (0-3) is used to indicate the frame number within a 2 Mbit/s
multiframe structure.
F3 Path user channel byte This byte is allocated for communication purposes between path elements and is payload dependent.
K3 APS signalling is provided in K3 (b1-b4) bits, allocated for protection at the VC-4/3 path levels. K3 (b5-b8) bits are allocated for future use.
These bits have no defined value. The receiver is required to ignore their content.
N1 Network operator byte This byte is allocated to provide a Higher-Order Tandem Connection Monitoring (HO-TCM) function.

Lower-Order Path Overhead Bits 1 and 2 of the V5 byte (LP-RFI). This bit is set to one
(VC-2/VC-1) are allocated for error perfor- if a failure is declared, other-
The bytes V5, J2, N2, and K4 mance monitoring. A Bit wise it is set to zero. A failure
are allocated to the VC-2/VC-1 Interleaved Parity (BIP) is a defect that persists beyond
POH. The V5 byte is the first scheme is specified. the maximum time allocated
byte of the multiframe and its Bit 3 is a VC-2/VC-1 path to the transmission system
position is indicated by the Remote Error Indication protection mechanisms.
TU-2/TU-1 pointer. The V5 (LP-REI) that is set to one and Bits 5 through 7 provide a
byte provides the functions of sent back towards a VC-2/VC-1 VC-2/VC-1 signal label. The
error checking, signal label, path originator if one or more Virtual Container path Signal
and path status of the errors were detected by the Label coding is shown in
VC-2/VC-1 paths. The bit BIP-2, and is otherwise set to Table 7.
assignments for the V5 byte zero. Bit 8 is set to 1 to indicate a
are illustrated in Figure 8. Bit 4 is a VC-2/VC-1 path VC-2/VC-1 path Remote
Remote Failure Indication Defect Indication (LP-RDI),
otherwise it is set to zero.
BIP-2 REI RFI Signal Label RDI Byte J2 is used to transmit
repetitively a Lower-Order
Access Path Identifier so that
a path receiving terminal can
1 2 3 4 5 6 7 8 verify its continued connec-
tion to the intended transmit-
ter. A 16-byte frame is
BIP = Bit Interleaved Parity defined for the transmission
REI = Remote Error Indication of Path Access Point Identi-
RFI = Remote Failure Indication fiers. This 16-byte frame is
RDI = Remote Defect Indication identical to the 16-byte frame
of the J1 and J0 bytes.
Figure 8. Lower-order path overhead (VC-2/VC-1) V5 byte.

page 9
Table 7. V5 Signal Label Coding Byte N2 is allocated to pro-
b5 b6 b7 Description
vide a Lower-Order Tandem
Connection Monitoring
0 0 0 Unequipped or supervisory-unequipped (LO-TCM) function.
0 0 1 Equipped non-specific Byte K4 Bits 1 through 4 are
0 1 0 Asynchronous allocated for APS signalling
0 1 1 Bit synchronous for protection at the Lower-
Order path level. Bits 5
1 0 0 Byte synchronous
through 7 are reserved for
1 0 1 Reserved for future use optional use.
1 1 0 Test signal, O.181 specific mapping
1 1 1 VC-AIS
Virtual Container path REI coding: 0 = 0 errors
1 = 1 or more errors

page 10
SDH Anomalies, Defects, Failures, and Alarms
The SDH frame structure has Definitions Failure The inability of a
been designed to contain a Alarm The maintenance function to perform a
large amount of overhead signal used in the digital net- required action which has
information. The overhead work to alert downstream persisted beyond a maximum
information provides for a equipment that a defect or time allocated.
variety of management and equipment failure has been SDH Error Performance
other functions such as: detected. Monitoring
Alarm Indication Signals Anomaly The smallest dis- Error performance monitoring
(AIS) crepancy which can be in the SDH is based on Bit-
Error Performance Monitor- observed between the actual Interleaved-Parity (BIP)
ing using BIP-N and desired characteristics of checks calculated on a frame-
Pointer Adjustment Infor- an item. The occurrence of a by-frame basis. These BIP
mation single anomaly does not con- checks are inserted in the
Path Status stitute an interruption in the Regenerator Section Over-
Path Trace ability to perform a required head, Multiplex Section
Section Trace function. Examples of SDH Overhead, and Path Over-
Remote Defect, Error, and anomalies are: heads.
Failure Indications
Signal Labels B1 BIP In addition, Higher-Order
New Data Flag Indications B2 BIP Path Terminating Equipment
Data Communications Path B3 BIP (HO PTE) and Lower-Order
Channels (DCC) REI Path Terminating Equipment
Automatic Protection Pattern Bit (OOS test) (LO PTE) produce Remote
Switching (APS) Control Defect The density of Error Indications (REI) based
Orderwire anomalies has reached a level on errors detected in the HO
Synchronisation Status where the ability to perform a Path and LO Path BIP respec-
Message required function has been tively. The REI signals are
interrupted. Defects are used sent back to the equipment at
Much of this overhead infor- the originating end of a path.
mation is involved with as input for performance
monitoring, the control of All defects listed in Figure 9
alarm and in-service monitor- are described in Table 8.
ing of the particular SDH sec- consequent actions, and the
tions. Table 8 and Figure 9, determination of fault cause.
that follow the definitions, Examples of SDH Defects are:
list the criteria for errors and OOF
the performance monitoring AIS
for errors. RDI
LOF
LOP
LOM

Lower Order Path

Higher Order Path

Multiplex Section (MSOH)

Regenerator Section (RSOH)

LO PTE HO PTE MSTE RSTE RSTE RSTE MSTE HO PTE LO PTE


LOS LOS LOS
LOF LOF LOF LOP LOP Tributary
AIS

MS MS AU-AIS TU-AIS
RDI
(K2) AIS AIS (H1,H2) (V1,V2)
RDI
(K2)
RDI
RDI
(G1) (G1)
RDI
(V5) RDI
(V5)

Alarm Transmission

Alarm Detection

Figure 9. Interaction between defects in forward and backward directions, according to the different SDH levels.

page 11
Table 8. Anomalies, Defects, Failures, Alarms
Abbreviation Description Criteria
LOS Loss of Signal LOS is raised when the synchronous signal (STM-N) level drops below the threshold at which a BER of 1 in 103 is
predicted. It could be due to a cut cable, excessive attenuation of the signal, or equipment fault.
The LOS state will clear when two consecutive framing patterns are received and no new LOS condition is detected.
OOF Out of Frame alignment OOF state occurs when several consecutive SDH frames are received with invalid (errored) framing patterns (A1 and
A2 bytes). The maximum time to detect OOF is 625 microseconds.
OOF state clears within 250 microseconds when two consecutive SDH frames are received with valid framing patterns.
LOF Loss of Frame alignment LOF state occurs when the OOF state exists for a specified time in microseconds.
The LOF state clears when an in-frame condition exists continuously for a specified time in microseconds.
The time for detection and clearance is normally 3 milliseconds.
LOP Loss of Pointer LOP state occurs when N consecutive invalid pointers are received or N consecutive New Data Flags (NDF) are
received (other than in a concatenation indicator), where N = 8, 9, or 10.
LOP state is cleared when three equal valid pointers or three consecutive AIS indications are received.
LOP can be identified as:
AU-LOP (Administrative Unit Loss of Pointer)
TU-LOP (Tributary Unit Loss of Pointer)
AIS Alarm Indication Signal AIS is an all-ONES characteristic or adapted information signal. Its generated to replace the normal traffic signal when
it contains a defect condition in order to prevent consequential downstream failures being declared or alarms being
raised.
AIS can be identified as:
MS-AIS (Multiplex Section Alarm Indication Signal)
AU-AIS (Administrative Unit Alarm Indication Signal)
TU-AIS (Tributary Unit Alarm Indication Signal)
REI Remote Error Indication An indication returned to a transmitting node (source) that an errored block has been detected at the receiving node
(sink). This indication was previously known as FEBE (Far End Block Error).
REI can be identified as:
MS-REI (Multiplex Section Remote Error Indication)
HP-REI (Higher-order Path Remote Error Indication)
LP-REI (Lower-order Path Remote Error Indication)
RDI Remote Defect Indication A signal returned to the transmitting Terminating Equipment upon detecting a Loss of Signal, Loss of Frame, or AIS
defect. RDI was previously known as FERF (Far End Receiver Failure).
RDI can be identified as:
MS-RDI (Multiplex Section Remote Defect Indication)
HP-RDI (Higher-order Path Remote Defect Indication)
LP-RDI (Lower-order Path Remote Defect Indication)
RFI Remote Failure Indication A failure is a defect that persists beyond the maximum time allocated to the transmission system protection
mechanisms. When this situation occurs, an RFI is sent to the far end and will initiate a path protection switch if this
function has been provisioned.
RFI can be identified as:
LP-RFI (Lower-order Path Remote Failure Indication)
B1 error B1 error Parity errors evaluated by byte B1 (BIP-8) of an STM-N shall be monitored. If any of the eight parity checks fail, the
corresponding block is assumed to be in error.
B2 error B2 error Parity errors evaluated by byte B2 (BIP-24 x N) of an STM-N shall be monitored. If any of the N x 24 parity checks fail,
the corresponding block is assumed to be in error.
B3 error B3 error Parity errors evaluated by byte B3 (BIP-8) of a VC-N (N = 3,4) shall be monitored. If any of the eight parity checks fail,
the corresponding block is assumed to be in error.
BIP-2 error BIP-2 error Parity errors contained in bits 1 and 2 (BIP-2) of byte V5 of an VC-m (m=11,12,2) shall be monitored. If any of the two
parity checks fail, the corresponding block is assumed to be in error.
LSS Loss of Sequence Out-of-service bit error measurements using pseudo-random sequences can only be performed if the reference
Synchronisation sequence produced on the receiving side of the test set-up is correctly synchronised to the sequence coming from the
object under test. In order to achieve compatible measurement results, its necessary that the sequence synchronisation
characteristics are specified. The following requirement is applicable to all ITU-T O.150 Recommendations dealing with
error performance measurements using pseudo-random sequences.
Sequence synchronisation shall be considered to be lost and re-synchronisation shall be started if:
The bit error ratio is 0.20 during an integration interval of 1 second; or
It can be unambiguously identified that the test sequence and the reference sequence are out of phase.

page 12
SDH Pointers
SDH provides payload point- VC, which is the J1 byte. N-bits, are known as the New
ers to permit differences in Because the Section Over- Data Flag. The VC pointer
the phase and frequency of head bytes are not counted, value that accompanies the
the Virtual Containers (VC-N) and starting points are at New Data Flag will indicate
with respect to the STM-N 3-byte increments for a VC-4 the new offset.
frame. Lower-order pointers payload, the possible range Payload Pointers
are also provided to permit is:
phase differences between When theres a difference in
Total STM-1 bytes Section
VC-1/VC-2 and the higher- Overhead bytes = Pointer
phase or frequency, the
order VC-3/VC-4. value range pointer value is adjusted. To
accomplish this, a process
On a frame-by-frame basis, For example: known as byte stuffing is
the payload pointer indicates (2430 81)/3 = 783 valid used. In other words, the VC
the offset between the VC pointer positions payload pointer indicates
payload and the STM-N
That is, the value of the where in the container capac-
frame by identifying the loca-
pointer has a range of 0 to ity a VC starts, and the byte
tion of the first byte of the VC
782. For example, if the VC-4 stuffing process allows
in the payload. In other
Payload Pointer has a value dynamic alignment of the VC
words, the VC is allowed to
of 0, then the VC-4 begins in in case it slips in time.
float within the STM-1
the byte adjacent to the H3 Positive Pointer Justification
frame capacity.
byte of the Overhead; if the
To make this possible, within Payload Pointer has a value When the data rate of the VC
each STM-N frame, theres a of 87, then the VC-4 begins in is too slow in relation to the
pointer, known as the VC the byte adjacent to the K2 rate of the STM-1 frame, bits
Payload Pointer, that indi- byte of the Overhead in the 7, 9, 11, 13, and 15 of the
cates where the actual pay- next row. pointer word are inverted in
load container starts. For a one frame, thus allowing 5-bit
The pointer value, which is a majority voting at the receiver
VC-4 payload, this pointer is
binary number, is carried in (these bits are known as the
located in columns 1 and 4 of
bits 7 through 16 of the H1- I-bits or Increment bits). Peri-
the fourth row of the Section
H2 pointer word. The first odically, when the VC is
Overhead. The bytes H1 and
four bits of the VC-4 payload about one byte off, these bits
H2 (two 8-bit bytes) of the
pointer make provision for are inverted, indicating that
Overhead can be viewed as
indicating a change in the positive stuffing must occur.
one value (see Figure 10).
VC, and thus an arbitrary
The pointer value indicates change in the value of the An additional byte is stuffed
the offset in bytes from the pointer. These four bits, the in, allowing the alignment of
pointer to the first byte of the the container to slip back in
time. This is known as posi-
Table 9. SDH Pointers tive stuffing, and the stuff
Byte Description byte is made up of non-infor-
mation bits. The actual posi-
H1 and H2 Pointer bytes These two bytes, the VC payload pointer, specify the location of the VC frame. tive stuff byte immediately
Its used to align the VC and STM-1 Section Overheads in an STM-N signal, to perform
frequency justification, and to indicate STM-1 concatenation. follows the H3 byte (that is,
the stuff byte is within the
H3 Pointer action byte This byte is used for frequency justification. Depending on the pointer
value, the byte is used to adjust the fill input buffers. The byte only carries valid information in
VC portion). The pointer is
the event of negative justification, otherwise its not defined. incremented by one in the
next frame, and the subse-
quent pointers contain the
new value.
3 X AU-3 H1 H1 H1 H2 H2 H2 H3 H3 H3
1 = All 1s
1 X AU-4 H1 Y Y H2 1 1 H3 H3 H3 Y = 1001SS11
(S bits unspecified)

Figure 10. Pointer 9-byte structure.

page 13
Simply put, if the VC is run- Decrement bits). Periodically, put, if the VC is running more
ning more slowly than the when the VC is about one quickly than the STM-1
STM-1 frame, every now and byte off, these bits are frame, every now and then
then stuffing an extra byte inverted, indicating that neg- pulling an extra byte from the
in the flow gives the VC a ative stuffing must occur. flow and stuffing it into the
one-byte delay (see Figure Because the alignment of the Overhead capacity (the H3
11). container advances in time, byte) gives the VC a one-byte
the payload capacity must be advance (see Figure 12).
Negative Pointer Justification
moved forward. Thus, actual In both positive or negative
Conversely, when the data
data is written in the H3 byte, cases, there must be at least
rate of the VC is too fast in
the negative stuff opportunity three frames in which the
relation to the rate of the
within the Overhead; this is pointer remains constant
STM-1 frame, bits 8, 10, 12,
known as negative stuffing. before another stuffing opera-
14, and 16 of the pointer
The pointer is decremented tion (and, therefore a pointer
word are inverted, thus
by one in the next frame, and value change) can occur.
allowing 5-bit majority voting
the subsequent pointers con-
at the receiver (these bits are
tain the new value. Simply
known as the D-bits, or

Frame N Frame N
P P
H1 H2 H3 H1 H2 H3

J1 J1

Frame N + 1
P Frame N + 1 P
H1 H2 H3
H1 H2 H3

J1
J1

Frame N + 2 Frame N + 2
H1 H2 H3 D-bits
H1 H2 H3 I-bits
J1
J1

Frame N + 3 Frame N + 3
P+1 H1 H2 H3
P1
H1 H2 H3
J1
J1

500 s 500 s
elapsed elapsed
The VC moves forward in time when a data byte
Extra bytes allow the VC to slip back in time. has been stuffed into the H3 byte.
A positive stuff byte immediately follows the H3 byte. Actual payload data is written in the H3 byte.

Figure 11. Payload pointer positive justification. Figure 12. Payload pointer negative justification.

page 14
SDH Multiplexing
The multiplexing principles Stuffing As the tributary (ranging from VC-11 at
of SDH follow, using these signals are multiplexed and 1.728 Mbit/s to VC-4 at
terms and definitions: aligned, some spare capac- 150.336 Mbit/s) are covered
Mapping A process used ity has been designed into by the SDH hierarchy. Next,
when tributaries are the SDH frame to provide VCs are aligned into tributary
adapted into Virtual Con- enough space for all the units (TUs), where pointer
tainers (VCs) by adding jus- various tributary rates. processing operations are
tification bits and Path Therefore, at certain points implemented.
Overhead (POH) informa- in the multiplexing hierar- These initial functions allow
tion. chy, this space capacity is the payload to be multiplexed
filled with fixed stuffing into TU groups (TUGs). As
Aligning This process bits that carry no informa- Figure 13 illustrates, the xN
takes place when a pointer tion, but are required to fill label indicates the multiplex-
is included in a Tributary up the particular frame. ing integer used to multiplex
Unit (TU) or an Administra-
tive Unit (AU), to allow the Figure 13 illustrates the ITU-T the TUs to the TUGs. The
first byte of the Virtual Con- SDH multiplexing structure next step is the multiplexing
tainer to be located. defined in Rec. G.707. The of the TUGs to higher level
notations in the boxes, such VCs, and TUG-2 and TUG-3
Multiplexing This process as C-1, VC-3, and AU-4, are are multiplexed into VC-3
is used when multiple explained in Table 10. (ANSI mappings) and VC-4.
lower-order path layer sig-
At the lowest level, contain- These VCs are multiplexed
nals are adapted into a
ers (C) are input to virtual with fixed byte-stuffing to
higher-order path signal, or
containers (VC). The purpose form administration units
when the higher-order path
of this function is to create a (AUs) which are finally mul-
signals are adapted into a
uniform VC payload by using tiplexed into the AU group
Multiplex Section.
bit-stuffing to bring all inputs (AUG). This payload then is
to a common bit-rate ready multiplexed into the Syn-
for synchronous multiplex- chronous Transport Module
ing. Various containers (STM).

2.4 Gbit/s STM-16

x16

622 Mbit/s STM-4

x4

155 Mbit/s STM-1 AUG AU-4 VC-4 C-4 140 Mbit/s


x3

x3
TUG-3 TU-3 VC-3 C-3 34/45 Mbit/s
x7
51 Mbit/s STM-0 AU-3 VC-3
x7 TUG-2 TU-2 VC-2 C-2 6 Mbit/s
x3
ETSI Multiplexing
TU-12 VC-12 C-12 2 Mbit/s
ANSI Multiplexing x4

Pointer processing TU-11 VC-11 C-11 1.5 Mbit/s

Sub-STM-1 multiplexing

Figure 13. SDH multiplexing hierarchy.

page 15
Table 10. SDH Multiplexing Structure
Term Contents User
C-N N = 1 to 4 Payload at lowest multiplexing level
VC-N N = 1, 2 (Lower-Order) Single C-n plus VC POH
VC-N N = 3, 4 (Higher-Order) C-N, TUG-2s, or TUG-3s, plus POH for the specific level
TU-N N = 1 to 3 VC-N plus tributary unit pointer
TUG-2 1, 3 or 4 (TU-N) Multiplex of various TU-Ns
TUG-3 TU-3 or 7 TUG-2s TU-3 or multiplex of 7 TUG-2s
AU-N N = 3, 4 VC-N plus AU pointer
AUG 1, 3 (AU-n) Either 1 AU-4 or multiplex of 3 AU-3s
STM-N N = 1, 4, 16, 64 AUGs N synchronously-multiplexed STM-1 signals
POH = Path Overhead
C= Container
TU = Tributary Unit
AU = Administrative Unit
VC = Virtual Container
TUG = Tributary Unit Group
STM = Synchronous Transport Module

page 16
SDH Tributary Multiplexing
In order to accommodate This figure also shows several could accommodate the
mixes of different TU types columns allocated for fixed 2.048 Mbit/s signal. This par-
within a VC-4, the TUs are stuffing. NPI (Null Pointer ticular TU is simply desig-
grouped together (refer to the Indicators) are used to indi- nated a TU-12. In this case
previous SDH Multiplexing cate when a TUG-2 structure the four columns provide a
Hierarchy diagram Figure is being carried, rather than a signal rate of 2.304 Mbit/s,
13). A VC-4 that is carrying TU-3 with its associated TU-3 allowing capacity for over-
Tributary Units is divided pointer. head. Other signals require
into three TUG-3, each of Tributary Unit Group TUs of different sizes.
which may contain seven With each TU Group using 12
TUG-2s or a single TU-3. The first TUG-2 Group within
a TUG-3, called Group 1, is columns of the VC-4, note
There can be a mix of the dif- that the number of columns
ferent TU Groups. For exam- found in every seventh col-
umn, skipping columns 1 and in each of the different
ple, the first TUG-3 could Lower-Order TU types are all
contain twelve TU-12 and 2 of the TUG-3, and starting
with column 3. factors of 12. As a result, a
three TU-2, making a total of TU group could contain one
seven TUG-2 groups. The TU The Tributary Unit columns of the following combina-
groups have no overhead or within a group are not placed tions:
pointers; they are just a way in consecutive columns
Three TU-12s (with four
of multiplexing and organiz- within that group. The
columns per TU-12)
ing the different TUs within columns of the individual
One TU-2 (with twelve
the VC-4 of a STM-1. TUs within the TU Group are
byte-interleaved as well. columns per TU-2)
The columns in a TU Group
are not consecutive within Tributary Units are optimized TU Multiframe
the VC; they are byte-inter- in different sizes to accom- In the floating TU mode, four
leaved column-by-column modate different signals. consecutive 125-microsecond
with respect to the other TU Each size of TU is known as a frames of the VC-4 are com-
groups (see Figure 14). type of TU. A 36-byte struc- bined into one 500-microsec-
ture, or 4 columns by 9 rows, ond structure, called a TU
Multiframe. In other words,
the 500-microsecond multi-
STM-1 VC-4 Virtual Container frame is overwritten on, and
1 aligned to the 125-microsec-
261 Columns 1 140 Mbits/s
or ond VC-4s. The occurrence of
of 9 Rows C A B C the TU Multiframe and its
A B C A B C A 3 TUG-3
phase is indicated in the
3
VC-N Path Overhead, by the
Path Overhead Multiframe Indicator byte
TUG-3 Group 1 (H4). A value XXXXXX00 in
2 Stuff
Columns
made up of the Multiframe Indicator byte
1 3 4 5 6 7 1 2 3 1 2 3 4 5 6 7
7 TUG-2 Groups indicates that the next STM
or frame contains the first frame
Pointer for TU-3
1TU-3 34 Mbits/s
or NPI for TUG-2 in the TU Multiframe; a value
Path Overhead VC-3 XXXXXX01 in the Multi-
or Stuffing for TUG-2 frame Indicator byte indi-
cates that the next VC-4 con-
Figure 14. SDH tributary structure showing TUG-3 multiplexing in VC-4. tains the second frame in the
TU Multiframe, and so on.
(Only the last two bits of the
TUG-3 Group 1 H4 byte have a value of 0 or 1
made up of assigned; the first six bits are
1 3 4 5 6 7 1 2 3 1 2 3 4 5 6 7
7 TUG-2 Groups
Pointer for TU-3
unassigned and this is
or
or NPI for TUG-2 1TU-3 34 Mbits/s denoted by the X.)
Path Overhead VC-3 The Tributary Units also con-
or Stuffing for TUG-2 tain payload pointers to
TUG-2 Group 2 allow for flexible and
(made up of 12 columns)
dynamic alignment of the
TU-12 TU-12 TU-12 VC. In this case, the TU
pointer value indicates the
TU-12
offset from the TU to the first
Figure 15. Tributary unit structures.
byte of the VC. TU pointers

page 17
allow AU and TU payloads to The payload pointers V1 and capacity differs for the differ-
differ in phase with respect to V2 indicate the start of the ent TU types because their
each other and the network payload within the multi- size varies according to the
while still allowing AUs and frame and V3 provides a number of columns in each
TUs to be synchronously 64 kbit/s channel for a pay- type.
multiplexed. load pointer movement The container capacity for
The TU Multiframe overhead opportunity. The V4 byte is each type of TU is shown in
consists of four bytes: V1, V2, reserved. The remaining Table 11.
V3, and V4 (see Figure 16). bytes in the TU Multiframe
define the TU container TU Payload Pointer
Each of these four bytes, V1
to V4, is located in the first capacity which carries the The TU Payload Pointer
byte of the respective TU Virtual Container, and the allows dynamic alignment of
frame in the TU Multiframe. Path Overhead. The container the lower-order VC-M within
the TU Multiframe in much
Table 11. TU Container Capacity the same fashion as described
TU Type TU Capacity Calculation * TU Pointer TU Container Capacity for the higher-order VC-N.
The alignment of any one
TU-11 3x9x4 4 bytes 104 bytes
lower-order VC-M is inde-
TU-12 4x9x4 4 bytes 140 bytes pendent of the other VC-Ms;
TU-2 12 x 9 x 4 4 bytes 428 bytes in other words, all VCs
* Columns x rows x frames
within an STM can float
independently of each other.
Table 12. TU Container Pointer Values This payload pointer, which
TU Type Total TU bytes V1 to V4 Pointer value range
is located in positions V1 and
V2 of the TU Multiframe, is
TU-11 108 4 104 made up of two 8-bit bytes,
TU-12 144 4 140 and it can be viewed as one
TU-2 432 4 428 word. The value of the
pointer is a binary number
found in bits 7 to 16 of V1
H4 byte and V2. This value indicates
00 V1
the offset in bytes from the
105 end of the pointer (byte V2)
to the first byte of the VC; the
---

Frame 1
V3 and V4 bytes are not
139 125 s counted. The range of the off-
01 V2 Four consecutive frames form a
0
TU Superframe set differs for each TU type
(see Table 12).
---

Frame 2
4 *125 s = 500 s That is, the value of the
34 250 s
10 V3 Indication in H4
pointer for a TU-12 has a
35
(multiframe indication byte) range of 0 to 140. For exam-
ple, if the TU Payload Pointer
---

Frame 3
TU Pointers consist of has a value of 0, then the
69 375 s V1 and V2
11 V4 VC-M begins in the byte adja-
70
cent to the V2 byte; if the TU
Payload Pointer has a value
---

Frame 4
of 35, then the VC-M begins
104 500 s
in the byte adjacent to the V3
Figure 16. TU multiframe structure.
byte. The V5 byte is the first
byte of the VC-M in the first
multiframe.

page 18
Automatic Protection Switching
Automatic Protection Switch- Protection (MSP) protocol rectional or bi-directional
ing (APS) is the capability of used to coordinate protection switching.
a transmission system to switching between the Near 1+1 Protection
detect a failure on a working End and the Far End.
facility and to switch to a In 1+1 protection switching,
Protection switching is initi-
standby facility to recover the there is a protection facility
ated as a result of one of the
traffic. This capability has a (backup line) for each work-
following situations:
positive effect on the overall ing facility (see Figure 18).
Signal failure
system availability. At the Near End of the sec-
Signal degradation
Only the Multiplex Section in tion, the optical signal is
In response to commands
SDH is protected in this auto- bridged permanently (split
from a local craft terminal
matic fashion. The Multiplex into two signals) and sent
or a remote network
Section protection mecha- over both the working and
manager
nisms are coordinated by the the protection facilities
Two modes of APS are pro- simultaneously, producing a
K1 and K2 bytes in the Multi-
vided: 1+1 protection switch- working signal and a protec-
plex Section Overhead. Path
ing and 1:N protection tion signal that are identical.
protection is managed at a
switching.
higher level by network man- At the Far End of the section,
agement functions. The K1 byte (see Figure 17) both signals are monitored
contains both the switching independently for failures.
Multiplex Section Protection, pre-emption priorities (in bits The receiving equipment
K1/K2 Bytes 1 to 4), and the channel num- selects either the working or
In SDH, the transmission is ber of the channel requesting the protection signal. This
protected on optical sections action (in bits 5 to 8). selection is based on the
from the Near End (the point The K2 byte contains the switch initiation criteria
at which the MS Overhead is channel number of the chan- which are either a signal fail
inserted) to the Far End (the nel that is bridged onto pro- (hard failure such as the loss
point where the MS Over- tection (bits 1 to 4), and the of frame (LOF) within an
head is terminated). mode type (bit 5); as well, optical signal), or a signal
Bytes K1 and K2 in the MS bits 6 to 8 contain various degrade (soft failure caused
Overhead of the STM-1 signal conditions such as MS-AIS, by the error rate exceeding
carry a Multiplex Section MS-RDI, indication of unidi- some pre-defined value).
Normally, 1+1 protection
switching is uni-directional,
although if the line terminat-
K1 K2
ing equipment at both ends
support bi-directional switch-
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
ing, the uni-directional
Switch Priority Switch Action Channel Number Provisioned
default can be overridden.
Channel Request Bridged bi-directional switch Switching can be either
uni-directional switch
MS-AIS
revertive (the flow reverts to
Provisioned MS-RDI the working facility as soon
1:n/1+1 as the failure has been cor-
rected) or non-revertive (the
Figure 17. APS/ MSP, K1/K2 byte functions. protection facility is treated
as the working facility).
Near End Far End In 1+1 protection architec-
ture, all communication from
Working Facility
the Near End to the Far End
is carried out over the APS
Protection Facility Normal Condition: channel, using the K1 and K2
one signal is chosen per pair
Working Facility bytes. In 1:1 bi-directional
switching, the K-byte signal-
Protection Facility
ing indicates to the Near End
Working Facility Failure Condition: that a facility has been
the best signal is chosen switched so that it can start to
Protection Facility
receive on the now active
facility.
Source Destination

Figure 18. 1+1 protection switching.

page 19
1:N Protection In 1:N protection switching, Near End can act directly, or
In 1:N protection switching, optical signals are normally if theres more than one prob-
there is one protection facil- sent only over the working lem, the Near End decides
ity for several working facili- facilities, with the protection which is top priority. On a
ties (the range is from 1 to facility being kept free until a decision to act on the prob-
14). In 1:N protection archi- working facility fails. Lets lem on working facility 2, the
tecture, all communication look at a failure in a bi-direc- Near End carries out the fol-
from the Near End to the Far tional architecture (see Figure lowing steps:
End is carried out over the 19). Suppose the Far End 1. Bridges working facility 2
APS channel, using the K1 detects a failure on working at the Near End to the pro-
and K2 bytes. All switching is facility 2. The Far End sends tection facility.
revertive; that is, the traffic a message in bits 5 to 8 of the
2. Returns a message on the
reverts to the working facility K1 byte to the Near End over
K2 byte indicating the
as soon as the failure has the protection facility
channel number of the
been corrected. requesting switch action. The
traffic on the protection
channel to the Far End.
3. Sends a Reverse Request
Near End Far End
Working Facility
to the Far End via the K1
byte to initiate bi-direc-
Normal Condition:
tional switch.
protection on channel empty
Protection Facilty On receipt of this message,
the Far End carries out the
following steps:
Working Facility
Failure Condition:
1. Switches to the protection
protection channel contains facility to receive.
failed line 2. Bridges working facility 2
Protection Facility
to the protection facility to
Source Destination transmit back.
Now transmission is carried
Figure 19. 1:N protection switching. out over the new working
facility.

page 20
SDH Network Elements
Terminal Multiplexer ment. A single synchronous Multiplex Section overhead,
The path terminating element node can perform the function path overhead, and payload
(PTE) acts as a concentrator of an entire plesiochronous are not altered.
of E1s as well as other tribu- multiplexing by steps, lead- Add/Drop Multiplexer
tary signals (see Figure 20). ing to significant reductions in
the amount of equipment used One of the major advantages
Its simplest deployment and consequently space and of SDH is its ability to Add
would involve two terminal energy savings. and Drop tributaries directly
multiplexers linked by fibre from higher-order aggregate
with or without a regenerator Regenerator bit streams.
in the link. This implementa- A regenerator (see Figure 21) Although network elements
tion represents the simplest is needed when, due to the (NEs) are compatible at the
SDH link (Regenerator Sec- long distance between multi- STM-N level, they may differ
tion, Multiplex Section, and plexers, the signal level in the in features from vendor to
Path, all in one link). fibre becomes too low. vendor. SDH does not restrict
One of the main benefits of The regenerator recovers tim- manufacturers from provid-
SDH as seen by the network ing from the received signal ing a single type of product,
operator is the network simpli- and replaces the Regenerator nor require them to provide
fication brought about through Section overhead bytes before all types. For example, one
the use of synchronous equip- re-transmitting the signal; the vendor might offer an
add/drop multiplexer with
access at E1 only, whereas
Terminal Configuration another might offer simulta-
neous access at E1 and E4
STM-1 STM-1 rates (see Figure 22).
A single-stage multiplexer/-
E1 VC demultiplexer can multiplex
E1 STM-N STM-N
various inputs into an
STM-N signal. At an
STM-1
E3 E3 add/drop site, only those sig-
nals that need to be accessed
are dropped or inserted. The
Figure 20. Terminal multiplexer example. remaining traffic continues
through the network element
without requiring special
pass-through units or other
signal processing.
STM-N STM-N In rural applications, an
ADM can be deployed at a
terminal site or any interme-
diate location for consolidat-
ing traffic from widely sepa-
rated locations. Several
ADMs can also be configured
as a survivable ring.
Figure 21. Regenerator.
SDH enables drop-and-con-
tinue, a key capability in both
telephony and cable TV appli-
cations. With drop-and-con-
STM-N tinue, a signal terminates at
STM-N STM-N STM-N one node, is duplicated, and
STM-N TU AU-4 is then sent to the next node
and to subsequent nodes.
STM-N E1 E4 In ring-survivability applica-
tions, drop-and-continue pro-
vides alternate routing for
traffic passing through inter-
connecting rings in a
STM-N 2 Mbit/s 140 Mbit/s matched-nodes configura-
tion. If the connection cannot
Figure 22. Add/Drop multiplexer example. be made through one of the

page 21
nodes, the signal is repeated nodes. Channels not terminat- larger number of STM-1s. The
and passed along an alternate ing at a node can be passed cross-connect can be used for
route to the destination node. through without physical grooming (consolidating or
In multi-node distribution intervention to other nodes. segregating) of STM-1s or for
applications, one transport broadband traffic manage-
Wideband Digital Cross-connect
channel can efficiently carry ment. For example, it may be
An SDH cross-connect used to segregate high-band-
traffic between multiple dis- accepts various SDH rates, width from low-bandwidth
tribution nodes. When trans- accesses the STM-1 signals, traffic and send them sepa-
porting video, for example, and connects payloads, for rately to the high-bandwidth
each programming channel is example, at a TU-12 level (see (for example video) switch
delivered (dropped) at the Figure 23). One major differ- and a low-bandwidth (voice)
node and repeated for deliv- ence between a cross-connect switch. It supports hubbed
ery to the next and subse- and an add-drop multiplexer network architectures.
quent nodes. Not all band- is that a cross-connect may be
width (program channels) This type of cross-connect is
used to interconnect a much
need be terminated at all the similar to the broadband
cross-connect except that the
switching is done at TU-12
level. It is suitable for E1
TU-12 Switch Matrix level grooming applications
at cross-connect locations.
TU-12 TU-12 TU-12 TU-12 One major advantage of
wideband digital cross-con-
nects is that less demulti-
STM-N STM-1 E1 E4 plexing and multiplexing is
required because only the
required tributaries are
accessed and switched.
STM-N STM-N STM-1 2 Mbit/s 140 Mbit/s Broadband Digital Cross-connect
The Broadband Digital Cross-
connect interfaces SDH sig-
Figure 23. Wideband digital cross-connect example.
nals and possibly high-rate
tributaries (see Figure 24). It
accesses the STM-N signals,
Transparent Switch Matrix and typically switches at an
AU-4 level.
Its best used as an SDH cross-
AU-4 AU-4 AU-4 AU-4 connect, where it can be used
for grooming STM-1s, for
STM-N STM-N E1 E4 broadband restoration pur-
poses, or for routing traffic.
Flexible Multiplexer
The Flexible Multiplexer (see
STM-N STM-N STM-1 2 Mbit/s 140 Mbit/s Figure 25) may be considered
a concentrator of low-speed
services before they are
Figure 24. Broadband digital cross-connect example. brought into the local
exchange for distribution. If
this concentration were not
done, the number of sub-
Exchange scribers (or lines) that an
64 kbit/s
exchange could serve would
be limited by the number of
lines served by the exchange.
Exchange Concen- Concen-
trator
SDH STM-1 SDH Voice The Flexible Multiplexer
Switch trator Data itself is actually a system of
ISDN
Public Phone
multiplexers and switches
designed to perform some
Remote traffic concentration and lim-
Locations ited switching at a remote
(subscribers)
64 kbit/s
location.

Figure 25. Flexible multiplexer example.

page 22
SDH Network Configurations
Point-to-Point Point-to-Multipoint Mesh Architecture
The simplest network config- A point-to-multipoint (linear The meshed network archi-
uration involves two terminal add/drop) architecture tecture accommodates unex-
multiplexers linked by fibre includes adding and drop- pected growth and change
with or without a regenerator ping circuits along the way more easily than simple
in the link (see Figure 26). (see Figure 27). The SDH point-to-point networks. A
In this configuration, the SDH ADM (add/drop multiplexer) cross-connect function con-
path and the Service path (for is a unique network element centrates traffic at a central
example, E1 or E3 links end- specifically designed for this site and allows easy re-provi-
to-end) are identical and this task. It avoids the current sioning of the circuits (see
synchronous island can exist cumbersome network archi- Figure 28).
within an asynchronous net- tecture of demultiplexing, There are two possible imple-
work world. In the future, cross-connecting, adding and mentations of this type of net-
point-to-point service path dropping channels, and then work function:
connections will span across re-multiplexing. The ADM
1. Cross-connection at
the whole network and will typically is placed in an SDH
higher-order path levels,
always originate and termi- link to facilitate adding and
for example, using AU-4
nate in a multiplexer. dropping tributary channels
granularity in the switch-
at intermediate points in the
ing matrix.
network.
2. Cross-connection at lower-
order path levels, for
example, using TU-12
granularity in the switch-
ing matrix.
PTE REG PTE

Figure 26. Point-to-point.

PTE REG ADM REG PTE

Figure 27. Point-to-multipoint.

REG MUX

MUX REG DCS REG MUX

MUX REG

Figure 28. Mesh architecture.

page 23
Ring Architecture send the services affected via
The SDH building block for a an alternate path through the
ring architecture is the ADM ring without a lengthy inter-
(see Figure 29). Multiple ruption.
ADMs can be put into a ring The demand for survivable
configuration for either Bi- services, diverse routing of
directional or Uni-directional fibre facilities, flexibility to
traffic. The main advantage of rearrange services to alternate
the ring topology is its surviv- serving nodes, as well as
ability; if a fibre cable is cut, automatic restoration within
for example, the multiplexers seconds, have made rings a
have the local intelligence to popular SDH topology.

ADM

ADM ADM

ADM

Figure 29. Ring architecture.

page 24
Benefits of SDH Conclusions
A transport network using and coding. The current stan- segregation is the separation
SDH provides much more dards also fully define the of traffic.
powerful networking capabil- frame structure, overhead, Grooming eliminates ineffi-
ities than existing asyn- and payload mappings. cient techniques such as
chronous systems. The key Enhancements are being back-hauling. Its possible to
benefits provided by SDH are: developed to define the mes- groom traffic on asyn-
Pointers, MUX/DEMUX sages in the overhead chan- chronous systems, however
nels to provide increased to do so requires expensive
As a result of SDH transmis- OAM functionality.
sion, the network clocks are back-to-back configurations
referenced to a highly stable SDH allows optical intercon- and manual or electronic
reference point; so the need nection between network cross-connects. By contrast,
to align the data streams providers regardless of who an SDH system can segregate
using non-deterministic bit- makes the equipment. The traffic at either an STM-1 or
stuffing is unnecessary. network provider can pur- VC level to send it to the
Therefore, a lower rate chan- chase one vendors equip- appropriate nodes.
nel such as E1 is directly ment and conveniently inter- Grooming can also provide
accessible, and intermediate face with other vendors SDH segregation of services. For
demultiplexing is not needed equipment at either operator example, at an interconnect
to access the bitstreams. locations or customer point, an incoming SDH line
premises. Users may now may contain different types of
For those situations in which obtain the STM-N equipment
synchronisation reference fre- traffic, such as switched
of their choice and meet with voice, leased circuits for data,
quency and phase may vary, their network provider of
SDH uses pointers to allow or video. An SDH network
choice at that STM-N level. can conveniently segregate
the streams to float within
the payload. Pointers are the Multi-point Configurations the switched and non-
key to synchronous timing; Most existing asynchronous switched traffic.
they allow a very flexible transmission systems are only Enhanced OAM
allocation and alignment of economic for point-to-point SDH allows integrated net-
the payload within the trans- applications, whereas SDH work OAM, in accordance
mission frame. can efficiently support a with the philosophy of sin-
Reduced Back-to-Back multi-point or cross-con- gle-ended maintenance. In
Multiplexing nected configuration. other words, one connection
In the asynchronous PDH sys- The cross-connect allows can reach all network ele-
tems, care must be taken many nodes or sites to com- ments within a given archi-
when routing circuits in municate as a single network tecture; separate links are not
order to avoid multiplexing instead of as separate sys- required for each network
and demultiplexing too many tems. Cross-connecting element. Remote provisioning
times since electronics (and reduces requirements for provides centralized mainte-
their associated capital cost) back-to-back multiplexing nance and reduced travel for
are required every time an E1 and demultiplexing, and maintenance personnel
signal is processed. With helps realize the benefits of which translates to expense
SDH, E1s can be multiplexed traffic grooming. savings.
directly to the STM-N rate. Network providers no longer Note: OAM is sometimes
Because of synchronisation, need to own and maintain referred to as OAM&P.
an entire optical signal customer-located equipment. Enhanced Performance
doesnt have to be demulti- A multi-point implementa- Monitoring
plexed only the individual tion permits STM-N intercon-
nects and mid-span meets, Substantial overhead infor-
VC or STM signals that need mation is provided in SDH to
to be accessed. allowing network providers
and their customers to opti- allow quicker troubleshooting
Optical Interconnect mize their shared use of the and detection of failures
A major SDH benefit is that it SDH infrastructure. before they degrade to serious
allows mid-span meet with levels.
multi-vendor compatibility. Grooming
Convergence, ATM, Video,
Todays SDH standards con- Grooming refers to either con- and SDH
tain definitions for fibre-to- solidating or segregating traf-
fic to make more efficient use Convergence is the trend
fibre interfaces at the physi- toward delivery of voice,
cal level. They determine the of the network facilities. Con-
solidation means combining data, images, and video
optical line rate, wavelength, through diverse transmission
power levels, pulse shapes, traffic from different loca-
tions onto one facility, while and switching systems that

page 25
supply high-speed transporta- fixed-length packets called 53 octets, or bytes (see Figure
tion over any medium to any cells. Asynchronous Transfer 30). Of these, 48 octets make
location. Tektronix is pursu- Mode multiplexes a service up the user-information field
ing new opportunities to lead into cells that may be com- and five octets make up the
the market by providing test bined and routed as neces- header. The cell header iden-
and measurement equipment sary. Because of the capacity tifies the virtual path to be
to users who process or trans- and flexibility that it offers, used in routing the cell
port voice, data, image, and SDH is a logical transport through the network. The vir-
video signals over high-speed mechanism for ATM. tual path defines the connec-
networks. In principle, ATM is quite tions through which the cell
Many of the new broadband similar to other packet- is routed to reach its destina-
services may use Asyn- switching techniques; how- tion (see Figure 31).
chronous Transfer Mode ever, the detail of ATM oper- An ATM-based network is
(ATM) a fast packet-switch- ation is somewhat different. bandwidth-flexible, which
ing technique using short, Each ATM cell is made up of allows handling of a dynami-
cally variable mixture of ser-
vices at different bandwidths.
The ATM cell consists of two parts: a five-byte ATM also easily accommo-
header and a 48-byte information field. dates traffic of variable
speeds. An example of a ser-
GFC (UNI) or vice that realizes the benefits
VPI (NNI) VPI
of a variable-rate interface is
5
VPI VCI that of a video service, where
Byte video can be digitally coded
VCI Header
VCI PT CLP and packetised within ATM
cells.
HEC
The rate at which cells can be
transmitted through the net-
(48 bytes) (Payload) USER work is dependent upon the
INFO physical layer of the network
used for transport of the
cells. The interface rate pre-
sented to the user may vary
VCI: Virtual Channel Identifier PTI: Payload Type Indicator between a minimum and
VPI: Virtual Path Identifier CLP: Cell Loss Priority maximum rate, which
HEC: Header Error Check GFC: Generic Flow Control ensures a much more effi-
cient use of the bandwidth
Figure 30. ATM cell structure. made available to the end
user.

9 261
AU-4
3 Transport VC-4
Overhead

AU-4 Pointer J1
B3
C2
5 Transport G1
Overhead F2
H4
F3
53 Byte ATM Cell K3
N1

VC-4 POH

Figure 31. ATM SDH mapping.

page 26
SONET Reference
Transmission standards in the An important issue for the SONET and SDH Hierarchies
U.S., Canada, Korea, Taiwan, ITU-T to resolve was how to SONET and SDH converge at
and Hong Kong (ANSI) and efficiently accommodate both SDHs 155 Mbit/s base level,
the rest of the world (ITU-T) the 1.5 Mbit/s and the defined as STM-1 or
evolved from different basic- 2 Mbit/s non-synchronous Synchronous Transport
rate signals in the non-syn- hierarchies in a single net- Module-1. The base level for
chronous hierarchy. ANSI work standard. The agreement SONET is STS-1 (or OC-1)
Time Division Multiplexing reached specified a basic and is equivalent to 51.84
(TDM) combines twenty four transmission rate of 51 Mbit/s Mbit/s. Thus, SDHs STM-1 is
64 kbit/s channels (DS0) into for SONET and a basic rate of equivalent to SONETs STS-3
one 1.544 Mbit/s DS1 signal. 155 Mbit/s for SDH. (3 x 51.84 Mbit/s =
ITU TDM multiplexes thirty Synchronous and non-syn- 155.52 Mbit/s). Higher SDH
64 kbit/s channels (E0) into chronous line rates and the rates of STM-4 (622 Mbit/s),
one 2.048 Mbit/s E1 signal (an relationships between each STM-16 (2.4 Gbit/s), and
extra two channels provide are shown in Tables 13 and STM-64 (10 Gbit/s) have also
frame alignment and sig- 14. been defined.
nalling, making 32 total).
Multiplexing is accomplished
by combining or interleaving
multiple lower-order signals
(1.5 Mbit/s, 2 Mbit/s, etc.) into
Table 13. SONET/SDH Digital Hierarchies higher-speed circuits
SONET Bit Rate SDH SONET Capacity SDH Capacity (51 Mbit/s, 155 Mbit/s, etc.).
By changing the SONET stan-
STS-1, OC-1 51.84 Mbit/s STM-0 28 DS1 or 1 DS3 21 E1
dard from bit-interleaving to
STS-3, OC-3 155.52 Mbit/s STM-1 84 DS1 or 3 DS3 63 E1 or 1 E4 byte-interleaving, it became
STS-12, OC-12 622.08 Mbit/s STM-4 336 DS1 or 12 DS3 252 E1 or 4 E4 possible for SDH to accommo-
STS-48, OC-48 2488.32 Mbit/s STM-16 1344 DS1 or 48 DS3 1008 E1 or 16 E4
date both transmission hierar-
chies. This modification
STS-192, OC-192 9953.28 Mbit/s STM-64 5376 DS1 or 192 DS3 4032 E1 or 64 E4 allows an STM-1 signal to
Note: Although an SDH STM-1 has the same bit rate as the SONET STS-3, the two signals contain different frame carry multiple 1.5 Mbit/s or
structures. 2 Mbit/s signals and multi-
STM = Synchronous Transport Module (ITU-T) ple STM signals to be aggre-
STS = Synchronous Transport Signal (ANSI) gated to carry higher orders of
OC = Optical Carrier (ANSI) SONET or SDH tributaries.
Further Information
Table 14. Non-Synchronous Digital Hierarchies
Another publication from
ANSI Rate ITU Rate Tektronix, SONET Tele-
Signal Digital Bit Rate Channels Signal Digital Bit Rate Channels communications Standard
DS0 64 kbit/s 1 DS0 E0 64 kbit/s 64 kbit/s Primer reviews the SONET
network standard. Copies can
DS1 1.544 Mbit/s 24 DS0 E1 2.048 Mbit/s 32 E0
be requested from Tektronix
DS2 6.312 Mbit/s 96 DS0 E2 8.448 Mbit/s 128 E0 offices.
DS3 44.736 Mbit/s 28 DS1 E3 34.368 Mbit/s 16 E1
not defined E4 139.264 Mbit/s 64 E1

page 27
Glossary
Add/Drop The process ANSI American National Bandwidth Information-car-
where a part of the informa- Standards Institute. A stan- rying capacity of a communi-
tion carried in a transmission dards-setting, non-govern- cation channel. Analog band-
system is extracted (dropped) ment organization, which width is the range of signal
at an intermediate point and develops and publishes stan- frequencies that can be trans-
different information is dards for voluntary use in mitted by a communication
inserted (added) for subse- the United States. channel or network.
quent transmission. The Asynchronous A network Bi-directional Operating in
remaining traffic passes where transmission system both directions. Bi-direc-
straight through the multi- payloads are not synchro- tional APS allows protection
plexer without additional nised and each network ter- switching to be initiated by
processing. minal runs on its own clock. either end of the line.
Add/Drop Multiplexer (ADM) Asynchronous Transfer Binary N-Zero Suppression
A multiplexer capable of Mode (ATM) A multiplex- (BNZS) Line coding system
extracting and inserting ing/switching technique in that replaces N number of
lower-rate signals from a which information is orga- zeros with a special code to
higher-rate multiplexed sig- nized into fixed-length cells maintain pulse density
nal without completely with each cell consisting of required for clock recovery. N
demultiplexing the signal. an identification header field is typically 3, 6, or 8.
Administrative Unit (AU) and an information field. The BIP-8 (Bit Interleaved
An Administrative Unit is the transfer mode is asyn- Parity-8) A method of error
information structure which chronous in the sense that the checking in SDH which
provides adaptation between use of the cells depends on allows in-service perfor-
the Higher-Order path layer the required or instantaneous mance monitoring. For exam-
and the Multiplex Section bit rate. ple, a BIP-8 creates eight-bit
layer. The Virtual Container Attenuation Reduction of (one-byte) groups, then does a
(VC) plus the pointers (H1, signal magnitude or signal parity check for each of the
H2, H3 bytes) is called the loss, usually expressed in eight bit positions in the byte.
Administrative Unit (AU). decibels. B-ISDN (Broadband Inte-
AIS (Alarm Indication Sig- Automatic Protection Switch- grated Services Digital Net-
nal) A code sent down- ing (APS) The ability of a work) A single ISDN net-
stream indicating an network element to detect a work which can handle
upstream failure has failed working line and voice, data, and eventually
occurred. switch the service to a spare video services.
AMI Alternate Mark Inver- (protection) line. 1+1 APS Bit One binary digit; a pulse
sion. The line-coding format pairs a protection line with of data.
in transmission systems each working line. 1:N APS
Bit Error Rate (BER) The
where successive ones provides one protection line
number of bit errors detected
(marks) are alternatively for every N working lines.
in a unit of time, usually one
inverted (sent with polarity Backhauling Cumbersome second. Bit Error rate (BER) is
opposite that of the preceding traffic management technique calculated with the formula:
mark). used to reduce the expense of
BER = errored bits
multiplexing/demultiplexing. received/total bits sent

Dont Confuse The Terms!


Three sets of terms are often information is inserted (added) Multiplex/Demultiplex Multi-
used interchangeably to describe for subsequent transmission. The plex (MUX) allows the transmis-
SDH processes. However, its remaining traffic passes straight sion of two or more signals over a
important to recognize that these through the multiplexer without single channel. Demultiplex
terms are not equivalent; each additional processing. (DEMUX) is the process of sepa-
has a distinct meaning: Map/Demap A term for multi- rating two or more signals previ-
Add/Drop The process where a plexing, implying more visibility ously combined by compatible
part of the information carried in inside the resultant multiplexed multiplexing equipment to
a transmission system is bit stream than available with recover signals combined within
extracted (dropped) at an inter- conventional asynchronous tech- it and for restoring the distinct
mediate point and different niques. individual channels of the signals.

page 28
Block Error rate (BLER) Concatenation The linking Failure A termination of the
One of the underlying con- together of various data struc- ability of an item to perform a
cepts of error performance is tures, for example two chan- required function. A failure is
the notion of Errored Blocks, nels joined to form a single caused by the persistence of a
i.e., blocks in which one or channel. In SDH, a number defect.
more bits are in error. A block (M) of TUs can be linked FEBE (Far End Block Error)
is a set of consecutive bits together to produce a con- See Remote Error Indication
associated with the path or catenated container, M times (REI).
section monitored by means the size of the TU. An exam-
FERF (Far End Receive Fail-
of an Error Detection Code ple of this is the concatena-
ure) See Remote Defect
(EDC), such as Bit Interleaved tion of five TU-2s to carry a
Indication (RDI).
Parity (BIP). Block Error rate 32 Mbit/s video signal,
(BLER) is calculated with the known as VC-2-5c. Once Fixed Stuff A bit or byte
formula: assembled, any concatenated whose function is reserved.
VC structure is multiplexed, Fixed stuff locations, some-
BLER = errored blocks
received/total blocks sent switched, and transported times called reserved loca-
through the network as a sin- tions, do not carry overhead
Bit-Interleaved Parity (BIP) or payload.
gle entity.
A parity check that groups all
the bits in a block into units Cyclic Redundancy Check Floating Mode A tributary
(such as byte), then performs (CRC) A technique for using mode that allows the syn-
a parity check for each bit overhead bits to detect trans- chronous payload to begin
position in the group. mission errors. anywhere in the VC. Pointers
Data Communications Chan- identify the starting location
Bit-Stuffing In asyn- of the LO-VC. LO-VCs in dif-
chronous systems, a tech- nel (DCC) Data channels in
SDH that enable OAM com- ferent multiframes may begin
nique used to synchronise at different locations.
asynchronous signals to a munications between intelli-
common rate before multi- gent controllers and individ- Framing Method of distin-
plexing. ual network nodes as well as guishing digital channels that
inter-node communications. have been multiplexed
Bits per second (bit/s) The together.
number of bits passing a Defect A limited interrup-
point every second. The tion in the ability of an item Frequency The number of
transmission rate for digital to perform a required func- cycles of periodic activity
information. tion. Persistence of a defect that occur in a discrete
can cause a failure. amount of time.
Broadband Services requir-
ing over 2 Mbit/s transport Demultiplex (DEMUX) To Grooming Consolidating or
capacity. separate two or more signals segregating traffic for effi-
previously combined by com- ciency.
CCITT Former name of ITU.
patible multiplexing equip- HDB3 High Density
Channel The smallest sub- ment to recover signals com- Bipolar 3. A bipolar coding
division of a circuit that pro- bined within it and for restor- method that does not allow
vides a type of communica- ing the distinct individual more than three consecutive
tion service; usually a path channels of the signals. zeros.
with only one direction.
Digital Cross-connect (DCS) ITU (International Telecom-
Circuit A communications An electronic cross-connect munication Union) An
path or network; usually a which has access to lower- agency of the United Nations
pair of channels providing bi- rate channels in higher-rate responsible for the regulation,
directional communication. multiplexed signals and can standardization, coordination,
Circuit Switching Basic electronically rearrange and development of interna-
switching process whereby a (cross-connect) those chan- tional telecommunications as
circuit between two users is nels. well as the harmonization of
opened on demand and main- Digital Signal An electrical national policies. It functions
tained for their exclusive use or optical signal that varies in through international commit-
for the duration of the trans- discrete steps. Electrical sig- tees of telecommunications
mission. nals are coded as voltages, administrations, operators,
Coding Violation (CV) A optical signals are coded as manufacturers, and scien-
transmission error detected pulses of light. tific/industrial organizations.
by the difference between the ETSI (European Telecommu-
transmitted line code and nications Standards Insti-
that expected at the receive tute) Organization responsi-
end by the logical coding ble for defining and maintain-
rules. ing European standards,
Concatenation The linking including SDH.
together of various data struc-

page 29
Jitter The short-term varia- Multiplex Section Overhead OSI Seven-layer Model A
tions of the significant (MSOH) 18 bytes of over- standard architecture for data
instants of a timing signal head accessed, generated, and communications. Layers
from their ideal positions in processed by MS terminating define hardware and software
time (where short term equipment. This overhead required for multi-vendor
implies that these variations supports functions such as information processing
are of frequency greater than locating the payload in the equipment to be mutually
or equal to 10 Hz). frame, multiplexing or con- compatible. The seven layers
Locked Mode A virtual trib- catenating signals, perfor- from lowest to highest are:
utary mode that fixes the mance monitoring, automatic physical, link, network, trans-
starting location of the VC. protection switching, and port, session, presentation,
Locked mode has less pointer line maintenance. and application.
processing than floating Multiplex (MUX) To trans- Overhead Extra bits in a
mode. mit two or more signals over digital stream used to carry
Map/Demap A term for a single channel. information besides traffic
multiplexing, implying more Multiplexer A device for signals. Orderwire, for exam-
visibility inside the resultant combining several channels ple, would be considered
multiplexed bit stream than to be carried by a single phys- overhead information.
available with conventional ical channel. Packet Switching An effi-
asynchronous techniques. Narrowband Services cient method for breaking
Mapping The process of requiring up to 2 Mbit/s down and handling high-vol-
associating each bit transmit- transport capacity. ume traffic in a network. A
ted by a service into the SDH transmission technique that
Network Element (NE) Any
payload structure that carries segments and routes informa-
device which is part of an
the service. For example, tion into discrete units.
SDH transmission path and
mapping an E1 service into Packet switching allows for
serves one or more of the sec-
an SDH VC-12 associates efficient sharing of network
tion, line and path-terminat-
each bit of the E1 with a loca- resources as packets from dif-
ing functions.
tion in the VC-12. ferent sources can all be sent
In SDH, the five basic net- over the same channel in the
Multiframe Any structure work elements are: same bitstream.
made up of multiple frames.
Add/drop multiplexer Parity Check An error-
SDH has facilities to recog-
Broadband digital cross- checking scheme which
nize multiframes at the E1
connect examines the number of
level and at the VC-N level.
Wideband digital cross- transmitted bits in a block
Multiplex Section Alarm connect which hold the value of
Indication Signal (MS-AIS) Flexible multiplexer one. For even parity, an
MS-AIS is generated by Sec- Regenerator overhead parity bit is set to
tion Terminating Equipment
OAM Operations, Adminis- either one or zero to make the
(STE) upon the detection of a
tration, and Maintenance. total number of transmitted
Loss of Signal or Loss of
Also called OAM&P. ones in the data block plus
Frame defect, on an equip-
OAM&P (Operations, Admin- parity bit an even number.
ment failure. MS-AIS main- For odd parity, the parity bit
tains operation of the down- istration, Maintenance, and
Provisioning) Provides the is set to make the total num-
stream regenerators, and
facilities and personnel ber of ones in the block an
therefore prevents generation
required to manage a net- odd number.
of unnecessary alarms. At the
same time, data and order- work. Path A logical connection
wire communication is Orderwire A dedicated between a point where a ser-
retained with the down- voice channel used by vice in a VC is multiplexed to
stream equipment. installers to expedite the pro- the point where it is demulti-
visioning of lines. plexed.
Multiplex Section Remote
Defect Indication (MS-RDI) OS (Operations System) Path Overhead (POH) Over-
A signal returned to the trans- Sophisticated applications head accessed, generated, and
mitting equipment upon software that manages opera- processed by path-terminat-
detecting a Loss of Signal, tion of the entire network. ing equipment.
Loss of Frame, or MS-AIS Path Terminating Equipment
defect. MS-RDI was previ- (PTE) Network elements
ously known as Multiplex such as fibre optic terminat-
Section FERF. ing systems which can
access, generate, and process
Path Overhead.

page 30
Payload The portion of the Remote Failure Indication synchronous networking, and
SDH signal available to carry (RFI) A failure is a defect enhanced OAM&P.
service signals such as E1 and that persists beyond the maxi- SSM (Synchronisation Status
E3. The contents of a VC. mum time allocated to the Message) Bits 5 to 8 of SDH
Payload Pointer Indicates transmission system protec- overhead byte S1 are allo-
the beginning of a Virtual tion mechanisms. When this cated for Synchronisation
Container. situation occurs, an RFI is sent Status Messages. For further
to the far end and will initiate details on the assignment of
Payload Capacity The num- a protection switch if this bit patterns for byte S1, see
ber of bytes the payload of a function has been enabled. the section of this primer on
single frame can carry.
Regenerator Device that Multiplex Section Overhead.
Plesiochronous A network restores a degraded digital Stuffing See bit-stuffing.
with nodes timed by separate signal for continued transmis-
clock sources with almost the Synchronous A network
sion; also called a repeater.
same timing. where transmission system
SDH (Synchronous Digital payloads are synchronised to
Pointer A part of the SDH Hierarchy) The ITU-defined a master (network) clock and
overhead that locates a float- international networking traceable to a reference clock.
ing payload structure. AU-N standard whose base trans- A network where all clocks
pointers locate the payload. mission level is 155 Mbit/s have the same long term
TU-M pointers locate floating (STM-1). SDH standards were accuracy under normal oper-
mode tributaries. All SDH first published in 1989 to ating conditions.
frames use AU pointers; only
address interworking
floating mode virtual contain- Synchronisation Supply Unit
between the ITU and ANSI
ers use TU pointers. (SSU) A G.812 network
transmission hierarchies.
POP (Point-of-Presence) A equipment clock.
SEC (Synchronous Equip-
point in the U.S. network Synchronous Transport Mod-
ment Clock) G.813 slave
where inter-exchange carrier ule (STM) A structure in the
clock contained within an
facilities meet with access SDH transmission hierarchy.
SDH network element.
facilities managed by tele- STM-1 is SDHs base-level
phone companies or other Section The span between transmission rate equal to
service providers. two SDH network elements 155.52 Mbit/s. Higher rates of
capable of accessing, generat- STM-4, STM-16, and STM-64
PRC (Primary Reference
ing, and processing only SDH are also defined.
Clock) In a synchronous net-
Section overhead.
work, all the clocks are trace- Tributary Unit (TU) A Trib-
able to one highly stable refer- Section Overhead Nine utary Unit is an information
ence supply, the Primary Ref- columns of SDH overhead structure which provides
erence Clock (PRC). The accu- accessed, generated, and pro- adaptation between the
racy of the PRC is better than cessed by section terminating Lower-Order path layer and
1 in 1011 and is derived from equipment. This overhead the Higher-Order path layer.
a cesium atomic standard. supports functions such as It contains the Virtual Con-
framing the signal and perfor- tainer (VC) plus a tributary
Remote Alarm Indication
mance monitoring. unit pointer.
(RAI) A code sent upstream
on an En circuit as a notifica- Section Terminating Equip- Tributary Unit Group (TUG)
tion that a failure condition has ment (STE) Equipment that Contains several Tributary
been declared downstream. terminates the SDH Section Units.
(RAI signals were previously layer. STE interprets and
Virtual Container (VC) A
referred to as Yellow signals.) modifies or creates the Sec-
signal designed for transport
tion Overhead.
Remote Defect Indication and switching of sub-SDH
(RDI) A signal returned to Slip An overflow (deletion) payloads.
the transmitting Terminating or underflow (repetition) of
Wander The long-term vari-
Equipment when the receiv- one frame of a signal in a
ations of the significant
ing Terminating Equipment receiving buffer.
instants of a digital signal
detects a Loss of Signal, Loss SONET (Synchronous Opti- from their ideal position in
of Frame, or AIS defect. RDI cal Network) A standard for time (where long term
was previously known as Far optical transport in the implies that these variations
End Receive Failure (FERF). United States, Canada, Korea, are of frequency less than
Remote Error Indication and Hong Kong that defines 10 Hz).
(REI) An indication optical carrier levels and
Yellow Signal See Remote
returned to a transmitting their electrically equivalent
Alarm Indication (RAI).
node (source) that an errored synchronous transport sig-
block has been detected at the nals. SONET allows for a
receiving node (sink). REI multi-vendor environment
was previously known as Far and positions the network for
End Block Error (FEBE). transport of new services,

page 31
SDH Reference Materials
ITU-T: G.783 Characteristics of tion of satellite and radio
G.701 Vocabulary of digi- SDH equipment functional systems in SDH
tal transmission and multi- blocks G.957 Optical interfaces
plexing and PCM terms G.784 SDH management for equipment and systems
G.702 Digital Hierarchy G.803 Architecture of relating to the SDH
bit rates transport networks based G.958 Digital line systems
G.703 Physical/electrical on the SDH based on SDH for use on
characteristics of hierarchi- G.823 Control of jitter and optical fibre cables
cal digital interfaces wander in PDH systems I.432 B-ISDN user-net-
G.704 Synchronous frame G.825 Control of jitter and work interface Physical
structures used at 1544, wander in SDH systems layer specification
6312, 2048, 8448, and G.826 Error performance M.2100 Performance lim-
44736 kbit/s hierarchical parameters and objectives its for bringing-into-service
levels for international, constant and maintenance of inter-
G.706 Frame alignment bit rate digital paths at or national digital paths, sec-
and cyclic redundancy above the primary rate tions, and transmission sys-
check (CRC) procedures tems
G.827 Availability param-
relating to basic frame eters and objectives for path M.2101 Performance lim-
structures defined in Rec- elements of international its for BIS and maintenance
ommendation G.704 constant bit-rate digital of SDH paths and multiplex
G.707 Network Node paths at or above the pri- sections
Interface for the SDH mary rate O.150 General require-
G.772 Protected monitor- G.831 Management capa- ments for instrumentation
ing points provided on digi- bilities of transport network for performance measure-
tal transmission systems based on SDH ments on digital transmis-
sion equipment
G.780 Vocabulary of G.841 Types and charac-
terms for SDH networks teristics of SDH network O.181 Equipment to
and equipment protection architectures assess error performance on
STM-N interfaces
G.861 Principles and
guidelines for the integra- F.750 (ITU-R) Architec-
tures and functional aspects
of radio-relay systems for
SDH-based networks

page 32

Вам также может понравиться