0% found this document useful (0 votes)
55 views41 pages

Synchronous Digital Hierarchy: VOL-2 SARISCS&T100TELE0006

Synchronous Digital Hierarchy (SDH) is a transmission technology that transmits digital signals over optical fiber using optical carrier signals. It uses ring topologies to provide network resilience through self-healing rings that can reroute traffic around failures. Protection schemes like 1+1, 1:1 and 1:N are used to provide redundancy. Bandwidth is provisioned and synchronized across the network to support digital signals. Performance is monitored using metrics like errored seconds to ensure quality of service.

Uploaded by

binoyns
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views41 pages

Synchronous Digital Hierarchy: VOL-2 SARISCS&T100TELE0006

Synchronous Digital Hierarchy (SDH) is a transmission technology that transmits digital signals over optical fiber using optical carrier signals. It uses ring topologies to provide network resilience through self-healing rings that can reroute traffic around failures. Protection schemes like 1+1, 1:1 and 1:N are used to provide redundancy. Bandwidth is provisioned and synchronized across the network to support digital signals. Performance is monitored using metrics like errored seconds to ensure quality of service.

Uploaded by

binoyns
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 41

Synchronous Digital Hierarchy

VOL-2
SARISCS&T100TELE0006
Contents
• Network resilience
• Provisioning (Bandwidth configuration)
• Synchronization
Network resilience
• Ring Topology
• Protection
Ring Topology
• Self Healing rings
• automatically detect failures and reroute
traffic away from failed links and nodes onto
other routes rapidly.
• The rings are implemented using add/drop
multiplexers (ADMs). These ADMs selectively
drop and add traffic from/to the ring as well as
protect the traffic against failures.
Ring Topology
Ring Topology
• Backbone/Express Ring
High Capacity Ring.
Bandwidth Configured as VC4 and above

• Collector/Access Ring
Low capacity Ring.
Connected to Backbone Ring for Protection and for long distance Connectivity.
Bandwidth starting from VC11 and above
Collector/Access Rings
• Single Homing
• Dual Homing
• Folded Ring
Protection
• 1+1 Protection
• 1:1 Protection
• 1:N Protection
1+1 Protection
• The simplest form of back-up is known as 1 + 1 APS.
• Here, each working line is protected by one
protection line. The same signal is transmitted on
both lines.
• If a failure or degradation occurs, the network
elements switch the connection over to the
protection line at the receive end.
1+1 Protection
1:1 Protection
• A protection line is used to directly replace the
working line when it fails.
• The protection path can only be used if a
switchover takes place at both the
transmitting end and the receiving end.
1:1 Protection
1:N Protection
• A 1:N configuration represents a more cost-
effective solution than the other two
mechanisms described above.
• N working channels are protected by one
protection channel. If there are no defects in
the network, this protection channel can be
used to transport low-priority traffic.
1:N Protection
Protection
• Path Protection
SNCP(UPSR)

• Section Protection
MSP
MS-SPRING(BLSR)
Sub Network Connection Protection
• 1+1
• Two complete traffic paths are provisioned
• Traffic is carried on both paths simultaneously.
• Receive end – Best quality path is selected as working
path
• If quality of working path is decreased, the other path is
selected at receive end and the path labels are
interchanged.
• This mechanism works independently on both directions
• Supports all bandwidths
SNCP
SNCP
• Unidirectional protection switching is a simple
scheme to implement and does not require a
protocol.
• Unidirectional protection switching can be
faster than bidirectional protection switching
because it does not require a protocol.
• Under multiple failure conditions there is a
greater chance of restoring traffic by protection
Multiplex Section Protection(MSP)
• Section Protection
• Protecting card failures for interconnection
• 1+1 card protection
• non-revertive and revertive configurations
• Unidirectional and Bidirectional Operations
• K1, K2 Bytes are used for protection switching
• Specified in ITU-T G.783
1+1 Unidirectional MSP
1+1 Bidirectional MSP
MSSP-RING
• Multiplex Section Shared Protected RING
• Bidirectional Line Switched Ring(BLSR)
• Shared protection
• Used in High Capacity Backbone Networks
• Specified in ITU-T G.841
• Connections in AU-4/VC-4 and AU-3/VC-3
• Half of the total Bandwidth is used for protection
• Uses K1, K2 Bytes are used for protection switching
MSSP-RING
• Support up to 16 NE’s in a ring
• 4-Bit Addressing for Each NE
• Maximum ring length is limited to 1200 km (6
ms propagation delay)
• Protection Switching in 50 ms
• Protection bandwidth can be used for non
priority traffic in normal condition
2F MSSP-RING
2F MSSP-RING
Effective utilization of bandwidth in MSSP-
Ring
Effective utilization of bandwidth in MSSP-
Ring
Effective utilization of bandwidth in MSSP-
Ring
4F MSSP-RING
4F MSSP-RING Span Switching
4F MSSP-RING Ring Switching
Protection using hybrid protection
Provisioning
• End to End Bandwidth Configuration
• J-KLM is used to identify the time slot
• Visibility of NEs to be integrated
• X-connections are made at individual NEs
• Optical Service Provisioning Software's
• Circuit Lay out Records for better bandwidth
management.
• Use unique J-KLMs in a ring for future easiness of
O&M activities
Network Synchronization
Performance Monitoring
• G.821 and G.826

• Errored Seconds (ES)


Any second which contains an error.
• Severely Errored Seconds (SES)
Any second during which the error ratio exceeds 10-3.
• Degraded Minutes (DM)
Any minute during which the error ratio exceeds 10-6.
• Available and Unavailable Time
Time is normally Available.
Unavailable time starts when the error
ratio exceeds 10-3 for ten consecutive seconds. It terminates
when the error ratio is less than 10-3 for ten consecutive seconds,
signifying the restart of Available time.
Performance Monitoring…
• Errored Block (EB)
A block in which one or more bits are in error. This can be a CRC
block or some other block such as parity.
• Background Block Error (BBE)
An errored block which is not part of a SES.
• Errored Second Ratio (ESR)
The ratio of ES to total seconds.
• Severely Errored Second Ratio (SESR)
The ratio of SES to total seconds.
• Background Block Error Ratio (BBER)
The ratio of BBE to total seconds.
WHAT NEXT?
• DATA COMMUNICATION NETWORK
• GSM Radio Access Network

You might also like