Connection-Oriented Network - Ch2 - Sol

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Chapter 2: SONET/SDH, GFP and Data over SONET/SDH

1. Considering DS1 and E1 signals,


(a) Number of voice calls multiplexed in a DS1 signal = 24
(b) Number of voice calls multiplexed in an E1 signal = 30
(c) The DS1 format consists of 24 8-bit time slots and a 1-bit slot for
synchronization. The E1 format for voice consists of 32 8-bit time slots of
which 2 slots are used for synchronization. Hence, the DS1 signal is capable
of carrying only 24 voice call while the E1 signal can carry 30 voice calls.

2. Every sixth frame, the 8th bit is robbed. Hence, one bit is used for every 6*125
µsec (remember that the voice signal is sampled every 125 µseconds).

1bit ---------------> 750 * 10-6 sec

? ----------------> 1 sec

Data rate of the signaling channel = 106 / 750 bps = 1.333 Kbps

3. Fractional T1 is a service which allows a user to purchase only a fraction of the T1


capacity. These services are offered on Nx64 Kbps or Nx56 Kbps basis where N = 2,
4, 6, 8 etc. With fractional T1, a user needs to pay only for the number of time slots
that matches his bandwidth requirements.

4. In SONET,

A section is a single link with a SONET device or a regenerator on either side of it.

A line is a link between two SONET devices (containing multiple sections) which
may or may not include regenerators.

A path is a link between the two end-devices in a communication (point where the
SPE originates and the point where it terminates).

5. The STS-1 signal carries a payload of user data and path overhead. This payload can
be defined to carry multiple sub-rate data streams such as DS1, DS2 and E1 signals.
Such a sub-rate stream which has a transmission rate below that of STS-1 is called a
virtual tributary.

The STS-1 payload is divided into seven sections of 108 bytes each. Each of these
seven sections is called a virtual tributary group (VTG). Each VTG is capable of
carrying a number of virtual tributaries.

VT1.5 and VT2 are examples of virtual tributaries. VT1.5 carries one DS1 signal
while VT2 carries an E1 signal.

Copyright 2004, Harry G. Perros


All rights reserved
6. The SONET/SDH add/drop multiplexer (ADM) receives an OC-N signal from which
it can demultiplex and terminate any number of DSn and/or OC-M signals, where
M<N. It can also add new DSn or OC-M signals into the OC-N signal.

Specifically, the incoming OC-N signal is converted into the electrical domain and
the payload is extracted from each incoming frame. The information contained in the
time slots of these frames is transmitted to local users through the ADM’s low speed
DSn and OC-M interfaces. This termination process frees up some time slots in the
frame which can then be used to carry the locally generated traffic. The final payload
is transmitted out at the same SONET level as the incoming OC-N signal.

7. Average packet size = .33*50 + .67*1,500 = 1021.5 bytes. An STS-3c frame has three
STS-1 frames with 3 columns overhead for each STS-1 frame. Thus, the STS-3c
payload = 270*9 - 9*9 = 2349 bytes. We subtract 1 column POH so that at the end we
have 2349 - 1*9 = 2340 payload bytes per STS3c frame. In these payload bytes we
can fit: 2340/1021.5 = 2.29 packets per frame. Since we sample 8,000 frames per
second, the packet rate will be 2.29 packets/frame * 8,000 frames/sec = 1832
packets/sec.

8. The 1:1 protection scheme provides better protection mechanism. In this protection
scheme, 100% redundancy is assigned to the working link. Hence, each individual
link has an alternate link for protection. Since each working signal has its own backup,
multiple link failures do not interrupt communications in the network. In the 1:N
scheme, several working links share a common protection link. Therefore, when
multiple links fail, only the traffic from one of them will be diverted to the protection
link.

9. Assume that the transmission rate of each fiber is C.


(a) When all the fibers are working, the available capacity for each working ring is
C/2, since the other half is reserved for protection traffic. As a result, the total
available capacity is C.
(b) When fibers 2 and 8 fail, the protection traffic on fiber 7 is also seized. Hence, the
total available capacity for working traffic remains the same.
(c) When fiber 12 also fails, no communication is possible between ADM1 and ADM
3. Hence, the total available working traffic is reduced to zero.

10. Virtual concatenation is a SONET/SDH procedure that maps an incoming traffic


stream into a number of individual sub-rate payloads. In this scheme, the incoming
traffic is split into sub-streams and mapped onto the available SONET payloads.
These payloads are then switched through the SONET network as individual
payloads without the intermediate nodes being aware of their relationship. These
payloads are then multiplexed back to the original stream at the terminating node. As
an example, a GbE stream can be split into seven OC-3c (155 Mbps) sub-rate
streams and transmitted with a total payload of 1.088 Gbps. At the terminating node,
these sub-streams can be multiplexed back into a GbE stream.

Copyright 2004, Harry G. Perros


All rights reserved
Since the intermediate nodes are not aware of the relationship between the sub-rate
payloads, the virtual concatenation scheme needs to be implemented only at the
originating and terminating nodes.

Copyright 2004, Harry G. Perros


All rights reserved

You might also like