SDH

Download as pdf or txt
Download as pdf or txt
You are on page 1of 57

ILP – SDH Technology

Objectives

Upon completion of this course, you will be able to:

Understand the basic of SDH multiplexing standard

Know the features, applications and advantages of SDH based equipment


Course content

Part 1 SDH Overview

Part 2 Frame Structure & Multiplexing Methods

Part 3 Overhead & Pointers

Part 4 Logical Functional Blocks

References

SDH Principle Manual


ITU-T G.701, G.702, G.707
PDH system Overview and Disadvantages

PDH signal with a higher transmission rate are obtained by multiplexing several lower-
rate signals.
PDH digital signal hierarchy has three section:

European Series.

North American Series &

Japanese series.
Disadvantages :
• Since PDH adopts asynchronous multiplexing method, low-rate signals cannot be
directly added or dropped from high-rate signals. Therefore, adding and dropping
must be conducted level by level.
• Increases the cost, Power consumption, complexity and the impairment to the
signal.
• Decrease the transmission performance.
Emergence of SDH

• A variety of telecommunication services.

• Network that can transmit, switch, and process a large amount of information.

• Network to be digital, integrate, intelligent and personalized.

• High Speed (broad Bandwidth)

• Universal interface.
Characteristics of SDH

According to the ITU-T specifications, the bit rate of the


lowest level of SDH signal is 155.520Mb/s which is
known as “Synchronous Transport Module-1” (STM-1). N X 155.52Mb/s

The Line rate of higher levels are positive integers of


STM-1.

2488.32Mb/s

622.08Mb/s

155.52Mb/s

STM-1 STM-4 STM-16 STM-N


Characteristics of SDH

Digital signals in all the network elements in a SDH network are controlled by a master
clock. The signals are clock aligned to each-other, and thus termed as synchronous.

Lower-rate signals are multiplexed into higher rate SDH signals using byte interleaved
multiplexing method. The location in the SDH frame is predictable. Therefore lower-rate
signals can be directly added to or dropped from higher-rate signals.

Abundant overhead bits for OAM function are arranged in the frame structure of SDH
signals.
Objectives

Advantages of SDH:
SDH provides universal standards for both electrical and optical interfaces.
So, SDH equipment for different vendors can be easily interconnected.
SDH networks can be used for transmitting PDH services, as well as signals of other
hierarchies, such as ATM, FDDI.
FDDI

PDH
SDH Frame Structure and Multiplexing

SDH frames are illustrated as Rectangular Blocks.


SDH frames includes 9 Rows & 270 Columns.
Bytes 1 Bytes 2430

STM-1
Bytes 270
Bytes 1

Bytes 2430
Bit Rate Calculation

1
1
1

2
270
3

4
SDH Frame has 9 Rows and
270 Columns.
5

SDH Base Rate = 9 rows X 270 columns X 8 bits/bytes X 8000 frames per sec
= 155520000 = 155.52 Mbps
Frame Structure of STM-1

9 10 11 270
1

SOH
3
4 AU-PTR
5
PAYLOAD

SOH

9
Frame Structure

RSOH POH
Payload

AU Pointer

J3

B3

MSOH C2

G1 C4

F2 Data Payload

H4

F3
SOH is classified as RSOH and MSOH.
K3

RSOH Monitors the Whole STM-N, MSOH N1


monitors STM-1 in STM-N.
To monitor payload in real time, POH is added in the Payload area. This POH
together with payload forms Virtual container VC4.
Frame Structure

270 Columns (Bytes)


transmit
9 270
1 row by row
1
RSOH
3
4 AU Pointer Payload
5 (transport capacity)

MSOH

RSOH: Regenerator section overhead


MSOH: Multiplex section overhead
Payload: Area for information transport

Transport capacity of one Byte: 64 kbit/s


Frame capacity: 270 x 9 x 8 x 8000 = 155.520 Mbit/s
Frame repetition time: 125 µs
Frame Structure

139264Kb/s

STM AUG AU-4 VC-4 C-4

TUG-3 TU-3 VC-3 C-3


X7 34368Kb/s

TUG-2

X3
TU-12 VC-12 C-12
2048Kb/s
POINTER PROCESSING

MULTIPLEXING
ALLIGNING
MAPPING
Mapping 140Mbps (E4) signal to C4

139.264 Mb/s
P
C-4 O C-4 PTR C-4
H

VC-4 AU-4

SOH
P
PTR O C-4
H
SOH
Multiplexing 134Mbps signal into STM-1

Three 34Mb/s signal can be multiplexed into STM-1 Signal.

TU-PTR

34 Mb/s P
C-3 O VC-3 TU-3
VC-3 TUG-3
TU-3 TUG-3
C-4
H

VC-3
X3

SOH
P
PTR
STM-1
AU-4 PTR
PTR
AU-4
VC-4 O
H
VC-4
C-4
SOH
Multiplexing 2Mb/s signal into STM-1

2Mb/s STM-1: Complete Procedure

+LO-POH +TU-PTR 3xTU-12 7xTUG-2 3xTUG-3


2 Mb/s
C - 12 VC - 12 TU - 12 TUG - 2 TUG - 3 C-4

+HO-POH

+SOH +AU-PTR

STM - 1 AU - 4 VC - 4

PIR
Classification Of SDH Over-Head

CLASSIFICATION:

Overhead in SDH signals supports Network Management at Both Path and Section Levels. i.e.

➢ Section Overheads

➢Path Over heads.

SDH SECTION OVER_HEADS

Section Over Head further classified as

➢Regenerator Section Over Head

➢ Multiplex Section Over Head.


SDH Section Over-Head Function

Frame Alignment Pattern


Parity Check
STM-1 Identification
Alarm Information
APS
Data Communication Channel
Voice Communication Channel
User Channel
Section Over Head SDH

A1 A1 A1 A2 A2 A2 J0 X X
B1 E1 F1
D1 D2 D3

B2 B2 B2 K1 K2
D4 D5 D6
D7 D8 D9
D10 D11 D12
S1 M1 E2 X X
Continue…..

A1 and A2 Indicates the beginning of STM-1 Frames (A1:11110110, A2: 00101000).


The Frame Alignment word of and STM-N frame is composed of 3*N A1 bytes
followed by 3*N A2 Bytes.
J0: Path Trace. It is used to give a path through an SDH Network a "Name". This
message (Name) enables the receiver to check the continuity of its connection with
the desired transmitter
B1: Bit Error Monitoring. The B1 Byte contains the result of the parity check of
the previous STM frame, before scrambling of the actual STM frame. This check is
carried out with a Bit Interleaved Parity check (BIP-8).
E1 Engineering Orderwire (EOW). It can be used to transmit speech signals beyond
a Regenerator Section for operating and maintenance
F1 User Channel. It is used to transmit data and speech for service and maintenance
D1 to D3 Data Communication Channel at 192 kbit/s (DCCR). This channel is used to
transmit management information via the STM-N frames
Objectives

B2 : Bit Error Monitoring. The B2 Bytes contains the result of the parity check of the previous STM
frame, except the RSOH, before scrambling of the actual STM frame. This check is carried out with a
Bit Interleaved Parity check (BIP24)
K1, K2 Automatic Protection Switching (APS). In case of a failure, the STM frames can be routed new
with the help of the K1, K2 Bytes through the SDH Network. Assigned to the multiplexing section
protection (MSP) protocol
K2 (Bit6,7,8) MS_RDI: Multiplex Section Remote Defect Indication (former MS_FERF: Multiplex Section
Far End Receive Failure)
D4 to D12 Data Communication Channel at 576 kbit/s (DCCM). (See also D1-D3 in RSOH above)
S1 (Bit 5 - 8) Synchronization quality level:
0000 Quality unknown
0010 G.811 10-11/day frequency drift
0100 G.812T transit 10-9 /day frequency drift
1000 G.812L local 2*10-8/day frequency drift
1011 G.813 5*10-7/day frequency drift
1111 Not to be used for synchronization
E2 Engineering Order wire (EOW). Same function as E1 in RSOH
M1 MS_REI: Multiplex Section Remote Error Indicator, number of interleaved bits which have been
detected to be erroneous in the received B2 bytes. (former MS_FEBE: Multiplexing Section Far End
Block Errored)
Z1, Z2 Spare bytes
SDH Path OverHead

I TAKE CARE OF
GOODS INSIDE
I TAKE CARE OF
WHOLE TRUCK

POH

SOH
Path OverHead Bytes

HO-POH LO-POH

SOH

P
PTR O VC-4 VC-12 VC-12 VC-12 VC-12
H

SOH

Further Path OverHead POH is further classified as HO-POH and LO-POH.


Here HO-POH refers to VC-4 level and LO-POH refers to VC-12 Level.
SDH HO-POH

J1 VC-n Path Trace Byte

B3 Path BIP-8

SOH
C2 Path Signal Label
P
PTR O VC-4 G1 Path Status
H

SOH F2 Path User Channel

H4 TU Multiframe Indi

F3 Path User Channel

K3 AP Switching

N1
Network Operator
SDH LO-POH

V5 J2 N2 K4

VC-12 VC-12 VC-12 VC-12

V5 J2 This Byte is used to N2: Network K4: Used for


> First byte of the multi-frame repeatedly transmit a Operated Byte, Future Use.
> Indicated by TU-PTR LO_POH access Point used for specific
> Functions: Error checking, identifier agreed network
Signal Label and Path Status of mutually by the management
VC-12 transmitter and the purpose
receiver so that the
path receiving can
verify its continued
connection to the TX
Pointers

SDH network is intended to be a synchronous network. However, there will always be slight
timing differences because different clock are being used or the same clock is being
distributed over long distances.

SDH pointers allow this limited asynchronous operation within the synchronous network.

Pointers are classified into AU-PTR and TU-PTR, which are used for aligning of VC-4 and
VC-12 respectively.
Administrative Unit Pointer AU-PTR

Float H1 Y Y H2 1 1 H3 H3 H3
PAYLOAD
SOH

H1 & H2: VC payload Pointer P


PTR O
Y : 1001SS11 (S is unspecified) H

1 : ALL ‘1’ SOH VC-4


H3 : 3 X H3 are provide as additional transmission
capacity during negative justification.
SOH

P
PTR O
H

SOH
PAYLOAD
Tributary Unit Pointer TU-PTR

V5

V1 V2 V3 V4 V1 V2 V3 V4

TU-PTR Is used to indicate the specification location of first byte (V5) of the VC-12 within the TU-12 payload so
that the receiver can properly extract the VC-12. It is located in the bytes denoted by V1, V2, V3 & V4 within
TU-12 Multiframe.
V1 and V2 contains the start address of TU-12 Multiframe.
SDH Network Elements

• SDH network configurations


– Point-to-point
• Node at ends
– Terminal Multiplexers (TM)
– Line Terminating Equipment (LTE)
– Linear
• Inserting add/drop multiplexers (ADM) between TM in point-to point-
links.
• Allows insertion or extraction of smaller traffic at mid-points
– Rings
• ADM with added function of protection: High level of availability
• Unidirectional path-switched rings (UPSRs)
• Bidirectional line-switched rings (BLSRs)
– Two fibers BLSR/2,
– Four fibers BLSR/4
SDH Topology

Backbone ring ADM Point to point ADM

BLSR/2 BLSR/2
ADM Or ADM DSC
ADM ADM Or ADM
BLSR/4 BLSR/4
Central office

ADM Central ADM ADM


ADM office ADM

UPSR UPSR
DCS ADM Linear add/drop
ADM

ADM ADM ADM Access ring


TM
Access ring
UPSR
ADM ADM

Access ring
ADM
Objectives

Understand features and scope of Common SDH Network Topologies.

Compare Advantages and Disadvantages of SDH Network Topologies.

Understand the concepts of sub-networks.


Network Protection Architecture

• Causes for a network to go down:


– Failure of a fiber link:
• Fiber is accidentally cut.
• The transmission or receiver equipment on the fiber link fail.
• SDH device fails (rare)

• Services automatically restored: using the automatic protection switching


(APS) protocol.

– The time to restore the services has to be less than 50 msec.


– There are two fundamentally different protection architecture for APS.

✓ Linear Protection:- Linear multiplex section protection for point –to-point. (linear
MSP)
✓ Ring protection:- Multiplex section shared protection ring (MSSP) for ring
structures.
Linear Protection

• There are three different protection mechanism that are available


• 1+1
• 1:1
• 1:N
• Link protection:
– Dedicated 1 + 1,
• The two devices are connected with two different fibers.

• The SDH signal is split and simultaneously transmitted over both fibers.
• The Selector in destination selects the best of the two signals based on their
quality.
• The working and protection fibers have to be diversely routed
Linear Protection

• Link protection:
– 1:1 scheme,
• Two diversely routed fibers: a working fiber and a protection fiber.
• The signal is transmitted over the working fiber.
• If this fiber fails, then the source and destination both switch to the
protection fiber.
– The 1:N scheme
• Generalization of the 1:1 scheme,
• N working fibers are protected by a single protection fiber.
• Only one working fiber can be protected at any time.
• Once a working fiber has been repaired, the signal is switched back, either
automatically or manually, from the protection fiber to the working fiber.
PROTECTION LINE
ADM WORKING LINE-1 ADM
WORKING LINE-2
WORKING LINE-3
X
Ring Protection

For Ring Architecture Different Mechanism are :

Direction of Transmission
Line Switching and Path Switching.
Direction of Transmission.

Line is a link between two SDH A path is an end-to-end connection


devices and might include between the point where the circuit
regenerators. originates and the point where it
terminates.
Line switching restores all of the Path switching restores some of the
traffic that pass through a failed link connections that are affected by a link
failure.
Linear Protection Scheme

Used in Traditional PDH System.

Two Pair of Fibers Used : Working (Active) Channel and


Protection (Standby )Channel.
Normal Scenario

When Working Channel Fails it used Protection Channel.


1 : 1 linear Protection

K1 K2
K2
K1

R-LOS
1 : 1 linear Protection

R-LOS
2F- MSPRing Protection

2F- MSPRing needs two fibers. One of the each Fiber is defined as Working Channel (S),
and the other channel is defined as Protection Fiber
2F- MSPRing Protection

The working Channel is one direction is divided into Working channel S1 and Protection
Channel P2, While the Other direction is divided into S2 and P1.

Traffic in Optical fiber in one


direction S1 is protected by
the P1 which is in other fiber
in reverse direction

Each Node is assigned One ID,


In active Direction
Exploded one fiber of STM-16. It has 16 AU-4’s where,
#1 to # 8 AU-4’ s are used as Working Channel,
#9 to # 16 AU-4’s are used as Protection Channel.
It has only One overhead channel.
Objectives

ADM When the Network is Normal


A
the traffic in both the direction
between NE-B and NE-E are vice
versa.
ADM ADM
Tributary
F B
Using Working Channel S1 and
S2.

ADM Tributary ADM


E C

ADM
D
Objectives

ADM
A

ADM Tributary ADM


F B

ADM Tributary ADM


E C

ADM
D
Objectives

R-LOS Alarm is generated


B Sends Signal Failure
(SF) bridge request for A
along both short and
long path simultaneously
using K1K2 Bytes.
A receives the short-path
request from B. it
recognizes the request
for itself and sends new
bridge request destined
for B on both long and
short paths.
Each Intermediate Node
verifies the destination
node ID of the Long-path
bridge request and relays
the bridge request y
establishing K Byte Pass
through.
Sub-Network Connection Protection (SNCP)

SNCP is Implemented for protecting services across sub-network.


Similar to PP is uses 1+ 1 protection mechanism.

Signal is simultaneously feed into working fiber and protection fiber.


Difference in PP and SNCP.
In the event of transmission failure the respective node will switch to select
service form the protection channel.
Synchronization of SDH Network

SDH signals are controlled by Master Clock called Primary Reference Clock (PRC).
The signals are clock aligned to each other and thus called as Synchronous.

During Networking great


attention has to be paid
for timing and
synchronization of the
network, or it leads to
deterioration of
performance or even
traffic interruption.
Synchronization of SDH Network

Synchronization in SDH Network is achieved by two modes:


Pseudo- Synchronous Mode.
Master / Slave Synchronous Mode.
Mater/ Slave Synchronization method the salve clock unit has normally three work
Modes: Locked , Holdover and free running Mode.
Locked Mode: The Clock is traced and locked is from the master Station.
This work mode has high precision and thus this is expected mode.
Hold over Mode: The condition when it has los connection with reference clock and
using last saved frequency reference before it was lost.
Free Running Mode: The clock reference and the saved reference is lost. The clock
starts running in Free Running Mode.
Standardized Clock Level

Master/ Slave clock synchronization uses a hierarchy of clocks in which each level of the
hierarchy is synchronized with the reference to a higher level, the highest level being the PRC.

Primary Reference Clock (ITU-T G.811)

Transit exchange Clock (ITU-T G.812)

Local Exchange Clock (ITU-T G.812)

SDH Network Element Clock (ITU-T G.813)


Clock Sources

Type of Clock sources in SDH Network are :

External Clock Source: Clock reference is provided by External Clock Source.

Line Interface Clock Source: Reference clock from Line Interface.

Tributary Interface Clock Source: Reference clock from tributary Interface (PDH)

Internal Clock Source: Clock is from the built-in clock source


SSM and S1 Bytes Synchronization

The SSM and S1 bytes are used to perform the clock automatic protection switching.
S1 ( b5 ~ b8 ) indicated which level of synchronization is being used at the transmit end.
In a Network, each NE in sequence tracks the
same clock reference source through a specific
clock reference path.
Generally NE has more than one path to obtain
NE-1 the synchronous clock source.

NE-4 can receive its BITS clock from


NE-2 NE-6
East i.e. from NE-1 => NE-2 => NE-3 => NE-4.

Or from West i.e. NE-1 => NE-6 => NE-5 => NE-4
NE-3 NE-5

NE-4
2:42:06 PM

SSM and S1 Bytes Synchronization

In case of the link failure between NE-2 and


NE-3.

Both the nodes are able to trace the timing


from East Direction.

NE-1

NE-2 NE-6

X
NE-3 NE-5

NE-4
2:59:21 PM

Clock Protection Protocol.

SSM and switching protocol, makes it


possible to implement automatic
protection switching of clock source.
Every node has a pre-specified clock
priority table and a clock quality threshold.
NE-1

NE-2 NE-6

NE-3 NE-5 NE select the clock source with the highest


quality as its current synchronization, from
the configured clock source and transmit
the SSM in S1 byte to its downstream
NE-4 nodes..
To Avoid Loop the content of SSM in the
backward direction is always “ Do not use
for Synchronization”
4:42:17 PM

Order-Wire (EOW)

Order-Wire is the voice communication facility provided between the nodes in SDH network.

Order-Wire Bytes: E1 and E2

E1 byte is used as a voice channel between regenerators and multiplexers.


E2 byte is used as a voice channel between Multiplexers.
Embedded Communication Channel (ECC)

The function of TMN are summed up in the expression “ Operation , administration,


maintenance and provisioning” (OAM&P).

Within an STM-N signal there are two DCC channels,


D1-D3, giving a 192 Kbit/s channel, and
D4-D12, giving a 576 Kbit/s channel.
D1-D3 (DCCR) are accessible by all SDH NEs
D4-D12 (DCCM), not being part of the regenerator section overhead, are not
accessible at regenerators.
It is recommended to have both DCCM and DCCR available in backbone STM-16
(and higher order) network sections.

You might also like