SDH Basics

Download as pdf or txt
Download as pdf or txt
You are on page 1of 107

SDH Basics

Wednesday, October 17, 2012

www.fiberhomegroup.com

Scopes of NG-Optical Network


NG-SDH/MSTP
Intelligence IP/Packet-based Ultra Long Haul Service-Driven Broadband
TDM ATM IP

ULH DWDM

ASON FTTH

PDH Hierarchy

Japan
1.6Gbit/s 400Mbit/s

North America

Europe

565Mbit/s 274Mbit/s 139Mbit/s 45Mbit/s 6.3Mbit/s 1.5Mbit/s 34Mbit/s 8Mbit/s 2Mbit/s

100Mbit/s 32Mbit/s 6.3Mbit/s

PDH Signals

DS1 E1 DS2 E2 E3 DS3 E4

1.5 Mbit/s 2 6 8 34 45 Mbit/s Mbit/s Mbit/s Mbit/s Mbit/s

1,544 2,048 6,312 8,448 34,368 44,736

Kbit/s Kbit/s Kbit/s Kbit/s Kbit/s Kbit/s

140 Mbit/s

139,264 Kbit/s

PDH multiplexing Structure


Primary Multiplexing Higher Order Multiplexing Level 4 4x140

Level 3 4x34

Level 2 4x8

Level 1 4x2

565

140

139264 kBit/s

Subscribers

34

34368 kBit/s

8448 kBit/s

2048 kBit/s

PDH - Limitations
Almost no standardised Network Management facilities Proprietary, non-standard systems have evolved Difficult to supply Bandwidth on Demand Cannot Add/Drop individual channels from higher orders without complete de multiplexing Leads to Multiplexer mountains

Advantages of SDH International standard NNI specifications, uniform two traditional digital hierarchy Based on direct synchronous multiplexing and flexible mapping Provide abundant built-in signal capacity for network Operation, Administration and Maintenance(OAM)

Definition of SDH
SDH stands for: Synchronous Digital Hierarchy and is: An international standard for a high capacity optical telecommunications network A synchronous digital transport system aimed at providing a more simple,economical, and flexible telecommunications network infrastructure

SDH Advantages
Network Management standardised. Enables central monitoring & control Simplified Multiplexing Can add and drop channels easily using software not hardware Bandwidth on demand semi-permanent circuits Open Systems Standardised interfaces Inter-working between different vendors equipment is possible for traffic, not management

Advantages of SDH (cont.)


Provide international standard optical interface Function of transparent transmission for information payload Function of transparent transmission for timing signal Function of interconnect network equipment from different vendors

Transport Systems & Telecommunications


Transport systems convey data of many types
Data Telephony Telephony Video Transport Network Video

Data Telephony

Data

Typical network Structure (Layered Networks)


STM-16 STM-16 STM-16 STM-16 STM-16

STM-16

STM-4 STM-4

STM-4 STM-4 STM-4

STM-1 STM-1 STM-1

STM-1

Backbone, MAN and access

Advantages of layered networks Grooming between layers - efficient use of the above layer Modular - easy to expand Easy to understand and maintain Supports introduction of new service nodes

Basic Network Topologies

CHAIN POINT TO POINT

RING

DOUBLE RING

STAR

Configurations

S/XMUX

S/XMUX

TERMINAL MULTIPLEXER

ADD/DROP MULTIPLEXER

XMUX ONLY

S/XMUX

8-PORT CROSS CONNECTOR

DOUBLE REGENERATOR

SDH Bus structured line system


Line system
Tributaries Terminal Multiplexer Add/Drop Multiplexer Intermediate Regenerator (Repeater) Terminal Multiplexer Tributaries

Tributaries

Fibre Optic line

SDH Network Segments

MS
Tributary signal RS

MS
RS RS Tributary signal

TM

ADM
REG REG

TM

PATH
MS: multiplexer section REG: regenerator TM: terminal multiplexer RS: regenerator section

Synchronous Signal Structure

8000frame/s

MN bytes

N row

1 2

M column

NNI and SDH Frame Structure


2.1 NNI 2.2 Hierarchical bit rates - STM-N 2.3 Basic frame structure of STM-N 2.4 SOH description

2.1 NNI
NNI(Network Node Interface):The interface at a network node is used to interconnect with another network node. Location of NNI
NNI NNI NNI NNI

TR

SM SM

Line/ radio

DXC /EA

Line/ radio SM

SM

TR

TR

TR

TR

SM

SM

TR

DXC: Digital cross-connect equipment EA: External Access equipment SM: Synchronous Multiplexer TR: Tributary

2.2 Hierarchical bit rates - STM-N


STM-N ( Synchronous Transport Module) - an information structure used for supporting the section layer connection in SDH, it has three different parts: information payload, Section Overhead(SOH) and Administrative Unit Pointer(AU PTR). A primary STM is STM-1 and its bit rate is 155.520Mbit/s, higher SDH bit rates (STM-N)are formed at rates equivalent to N times the STM-1(the basic level bit rate) by byte-interleaved multiplexing .

2.2 Hierarchical bit rates - STM-N(cont.)

SDH

SONET OC-1/STS-1 (480CH) (1440CH)

Bit rate 51840 Kbit/s 155520 Kbit/s 466560 Kbit/s

155M STM-1 (1920CH)

OC-3/STS-3 OC-9/STS-9

622M STM-4 (7696CH)

OC-12/STS-12 OC-18/STS-18 OC-24/STS-24 OC-36/STS-36

(8046CH)

622080 Kbit/s 933120 Kbit/s 1244160 Kbit/s 1866240 Kbit/s

2.5G 10G

STM-16 (30720CH)

OC-48/STS-48

(32356CH) (129024CH)

2488320 Kbit/s 9953280 Kbit/s

STM-64 (122880CH) OC-192/STS-192

STMSynchronous Transport Module STS Synchronous Transport Signal OC Optical Carrier

Byte-interleaved multiplexing

STM-1 SIG A

BYTE
STM-1 SIG B STM-1 SIG C

INTERLEAVED
STM-4 (4STM-1)

MUX
STM-1 SIG D

2.3 Basic frame structure of STM-N

8000 frame/s 9*270*N(bytes) 155.520Mbit/s 1 RSOH 3 4 5 AU PTR STM-N MSOH 9 9*N 261*N PAYLOAD Transport order

9*270 =2430 byte/frame 2430*8=19440 bits/frame 19440*8000=155520000 bits/s =155.520 Mbits/s

2.3 Basic frame structure of STM-N(cont.)


SOH(Section overhead) Rows 1-3 and 5-9 of columns 1 to 9 x N of the STM-N are dedicated to the SOH. AU-PTR(Administrative Unit pointers) Row 4, of columns 1 to 9 x N is available for Administrative Unit pointers. Administrative Units in the STM-N The STM-N payload can support N AUGs.

2.4 SOH description

OH(overhead) : provide the functions required by the network to efficiently transport the information payload across the SDH network. OH category
SOH(section overhead)
MSOH (Multiplexer SOH)(row5 to 9) RSOH (Regenerator SOH)(row 1 to 3)

POH(path overhead)

2.4 SOH description(cont.)

A1 RSOH B1 D1 H1 B2 D4 MSOH D7 D10 S1

A1

A1

A2 E1 D2 H2

A2

A2 J0/C1 F1 D3 H3 K2 D6 D9 D12 H3 H3

B2

B2

K1 D5 D8 D11

Z1

Z1

M1

Z2

Z2

E2

Frame Alignment: A1=11110110 A2=00101000 BIP-8 Parity


1 2

Order Wire Communications


1 2 3 4 5 6 7 8 9

Section Trace User Channel

A1 A1 A1 A2 A2 A2 B1 D1 E1 D2 AU POINTER(S) B2 B2 B2 K1 D4 D7 D10 S1 D5 D8 D11

J0 F1 D3

Data Communication Channel (DCCr) BIP-24 Parity

3 4 5 6

Automatic Protection Switching

K2 D6 D9 D12 M1 E2

Data Communication Channel (DCCm)

7 8 9

Multiplex Section Remote Defect Indication

Synchronisation status

Multiplex Section Remote Error Indication

Order Wire Communications

STM-1 SOH
9bytes
A1 B1 D1 A1 B2 A1 A2 E1 D2 A2 A2 J0 F1 D3 K2 D6 D9 D12 M1 E2

RSOH

9 row
B2 D4 D7 D10 S1

AU PRT B2 K1 D5 D8 D11

MSOH

Detail in G.782

2.4.2 SOH byte description

1.Framing: A1, A2
A1: 11110110 A2: 00101000

2.Regenerator Section Trace: J0


This byte is used to transmit repetitively a Section Access Point Identifier so that a section receiver can verify its continued connection to the intended transmitter.

3.Spare: Z0
These bytes are reserved for future international standardization.

2.4.2 SOH byte description (cont.)

4.BIP-8: B1
B1 is allocated for regenerator section error monitoring. This function shall be a Bit Interleaved Parity 8 (BIP-8) code using even parity. The BIP-8 is computed over all bits of the previous STM-N frame after scrambling and is placed in byte B1 of the current frame before scrambling.

5.Order wire: E1, E2


These two bytes are used to provide order wire channels for voice communication.

2.4.2 SOH byte description (cont.)

6.User channel: F1
This byte is reserved for user purposes (eg. to provide temporary data/voice channel connection for special maintenance purposes)

7.Data Communication Channel (DCC): D1-D12


D1, D2 and D3 are defined as a Regenerator Section DCC. D4 to D12 are defined as a Multiplex Section DCC. These message-based protocol channel are used to carry network administration and maintenance information.

2.4.2 SOH byte description (cont.)

8.BIP-N*24: B2(Bit-interleaved Parity-N)


The B2 bytes are allocated for a multiplex section error monitoring function. This function shall be a Bit Interleaved Parity N 24 code (BIP-N 24) using even parity. The BIP-N 24 is computed over all bits of the previous STM-N frame except for the first three rows of SOH and is placed in bytes B2 of the current frame before scrambling.

9.Automatic Protection Switching (APS) channel: K1, K2 (b1-b5)


K1,K2 are allocated for the protection of the multiplex section.

2.4.2 SOH byte description (cont.)

10.MS-RDI: K2 (b6-b8)
The Multiplex Section Remote Defect Indication (MS-RDI) is used to return an indication to the transmit end that the received end has detected an incoming section defect or is receiving MS-AIS. MS-RDI is generated by inserting a "110" code in positions 6, 7 and 8 of the K2 byte before scrambling.

11.Synchronization status: S1 (b5-b8)


Quality of the synchronization reference source used by the equipment is indicated and conveyed to the next station by the S1 byte.

12.MS-REI (Remote Error Indication) : M1


M1 is allocated for use as a Multiplex Section REI.

3.Multiplexing Structure and Process

3.1 Basic multiplexing unit 3.2 Multiplexing Structure 3.3 Mapping 3.4 Aligning - Pointers 3.5 Multiplexing

3.2 Multiplexing Structure

STMN

AUG

AU-4

VC-4

C-4

139264kbit/s

3 3
AU-3 VC-3 TUG-3 TU-3 VC-3

7
C-3 TUG2

44736kbit/s 34368kbit/s 6312kbit/s 2048kbit/s

7
Pointer processing Multiplexing Aligning Mapping

TU-2

VC-2 VC12 VC11

C-2 C-12

3 4
TU12 TU11

C-11

1544kbit/s

3.1 Basic multiplexing unit

Container ( C-n) Virtual Container (VC-n) Tributary Unit and Tributary Unit Group (TU and TUG) Administrative Unit and Administrative Unit Group (AU and AUG)

3.1.1 Container ( C-n)

A container is the information structure which forms the network synchronous information payload for a Virtual Container. Type of C-n (for PDH rate hierarchy) C-11,C-12,C-2,C-3,C-4

C-n

3.1.2 Virtual Container-n (VC-n)

A Virtual Container is the information structure used to support path layer connections in the SDH. VC-n=C-n+VC-n POH Types of Virtual Containers Lower order VC-n (n=1, 2, 3) Higher order VC-n (n=3, 4)

VC-n POH C-n

Relationship among service signal, C-n and VC-n

Justification bits POH

= =
Service/ PDH Container

Virtual Container

3.1.3 Tributary Unit-n (TU-n)

A Tributary Unit is an information structure which provides adaptation between the lower order path layer and the higher order path layer. TU-n=VC-n+TU-n PTR
Justification bit
C12
2Mbit/s

POH
TU12

TU-Pointer TU

VC12

C-1 C1 2Mbit/s
2Mbit/s

VC12

2Mbit/s 2Mbit/s SH2 C12 C-12

2Mbit/s SH3 VC12 VC-12

2Mbit/s SH18 2Mbit/s TU12 2Mbit/s TU-12

Tributary Unit Group (TUG-n)

One or more Tributary Units, occupying fixed, defined positions in a higher order VC-n payload is termed a Tributary Unit Group (TUG). A TUG-2 consists of a homogeneous assembly of identical TU-1s or a TU-2. A TUG-3 consists of a homogeneous assembly of TUG-2s or a TU-3.

3.1.4 Administrative Unit-n (AU-n)

An Administrative Unit is the information structure which provides adaptation between the higher order path layer and the multiplex section layer. AU-n=VC-n+AU-n PTR; n=3,4 AU-n PTR: indicates the offset of the payload frame start relative to the multiplex section frame start.

Administrative Unit Group (AUG)

One or more Administrative Units occupying fixed, defined positions in an STM payload are termed an Administrative Unit Group (AUG). An AUG consists of a homogeneous assembly of AU-3s or an AU-4.

3.2 Multiplexing Structure

STMN

AUG

AU-4

VC-4

C-4

139264kbit/s

3 3
AU-3 VC-3 TUG-3 TU-3 VC-3

7
C-3 44736kbit/s 34368kbit/s 6312kbit/s 2048kbit/s

7
Pointer processing Multiplexing Aligning Mapping

TUG2

TU-2

VC-2 VC12 VC11

C-2 C-12

3
TU12

4
TU11 C-11 1544kbit/s

TU-12 TU-12 TU-12

63TU-12

TU-12 TU-12 TU-12

PTR + VC-12

POH + C-12

2M

2Mbit/s adapted into C-12

TUG2

21TUG-2

TUG2

TUG2

TU-12

TUG-3

TUG-3

TUG-3

TUG-3

PTR +

TUG2

AU-4

AU- PTR +

TUG-3

STM-N N STM-1 SOH AU-4 PTR VC-4 POH TUG-3, 2 3 7, 3 TU-12 PTR VC-12 POH C-12 Voice/data
multiplexing

aligning

mapping

3.3 Mapping Mapping:A procedure by which tributaries are adapted into Virtual Containers at the boundary of an SDH network.
Justification bits POH

= =
Service/ PDH Container

Virtual Container

SDH Hierarchy
STM-64 x4 x64 STM-16 x16 x4 STM-4 x4 STM-1 AUG x3 AU-3 AU-4 VC-4 x3 TUG-3 TU-3 VC-3
E3: 34.368Mb/s DS3: 44.736Mb/s

AU-4-64c

VC-4-64c

C-4-64c

9039.872Mb/s

x16

AU-4-16c

VC-4-16c

C-4-16c

2259.968Mb/s

AU-4-4c

VC-4-4c

C-4-4c

564.992Mb/s

C-4

E4: 139.264Mb/s

High Order Payloads Containers of Base Signal (Low Order Payloads)

VC-3 x7 x7 x1 TUG-2 x3 TU-12 x4 TU-11 VC-11 VC-12

C-3

STM-n AUG AU-n VC-n

Synchronous Transport Module Administrative Unit Group: One or more AU(s) Administrative Unit: VC + pointers Virtual Container: payload + path overhead

TU-2

VC-2

C-2

DS2:6.312 Mb/s

C-12

E1: 2.048Mb/s

C-11

DS1:1.544Mb/s

STM-1 Frame with AU-4 Mapping


9 bytes 261 bytes

3 1

Regenerator Section OH AU Pointer Multiplex Section OH

J1 B3 C2 G1 F2 H4 F3 K3 N1

VC-4 Payload: C4 or TUG-3 mapped


H1 H1 H1 H2 H2 H2 H3 H3 H3 J1 B3 C2 G1 F2 H4 F3 5 bytes K3 N1 J1 B3 C2
ptr

Higher Order Path OH

C-3 Payload

G1 F2 H4 F3 K3 N1

C-3 Payload
Vx

TUG-3
TUG-2/VC12 Muxed

V C 1 2

Low Order Path OH

3.3.1 Choice of Primary rate Mapping

Three mapping methods


The asynchronous mapping The bit synchronous mapping The byte synchronous mapping

Two operating modes


floating mode locked mode

3.3.2 mapping of 139264kbit/s into VC-4

One 139 264 kbit/s signal can be mapped into a VC-4 of an STM-1 frame . VC-4 = C-4 + VC-4 POH The VC-4 consists of a 9-byte (1 column) Path Overhead (POH) plus a 9 row by 260 column payload structure . This payload can be used to carry one 139 264 kbit/s signal.

Step1: 139264kbit/s signal adapted into C-4

1*13
1 2 3 4 5 6 7 8 9
12bytes

20*13bytes = 260bytes
C-4/125s

I
W X Y Y Y X Y Y Y X Y Y Y X Y Y Y X Y Z W X Y Z I I I I I I I I C R R R R R O O R R R R R R R R I I I I I I S R I: O: R: C: S: Information bit Overhead bit Fixed stuff bit Justification control bit Justification opportunity bit

Step2: Adding VC-4 POH to C-4

270 bytes 261 bytes AU-4 SOH


3

1 byte 13 bytes J1

VC-4

AU-4 PTR

B3 C2 G1

SOH

F2 H4 F3 K3

STM-1 VC-4 POH PTR Pointer

N1 20 blocks of 13 bytes
T1518350-95

3.3.3 VC-4/VC-3 POH (HO-POH)

1.Path trace:J1
J1 is used to transmit repetitively a Path Access Point Identifier so that a path receiving terminal can verify its continued connection to the intended transmitter.

2.Path BIP-8:B3
B3 is allocated for a path error monitoring function.

3.Signal label:C2
One byte is allocated to indicate the composition or the maintenance status of the VC-4/VC-3.

3.3.3 VC-4/VC-3 POH (HO-POH) (CONT.)

4.Path status:G1
G1is allocated to convey the path status and performance back to a VC4/VC-3 trail termination source as detected by a trail termination sink.

5.Path user channels:F2,F3


These bytes are allocated for user communication purposes between path elements and are payload dependent.

6.Position indicator:H4
This byte provides a generalized position indicator for payloads and can be payload specific (e.g. H4 can be used as a multi frame position indicator for the VC-2/VC-1).

3.3.3 VC-4/VC-3 POH (HO-POH) (CONT.)

7.APS channel: K3 (b1-b4)


These bits are allocated for APS signaling for protection at the VC-4/3 path levels.

8.Network operator byte: N1 (TCM function)


This byte is allocated to provide a Tandem Connection Monitoring (TCM) function.

9.Spare: K3 (b5-b8)
These bits are allocated for future use. These bits have no defined value. The receiver is required to ignore their content.

3.3.4 VC-2/VC-1 POH (LO-POH)

1.V5 byte
The byte V5 provides the functions of error checking, signal label and path status of the VC-2/VC-1 paths.

2.Path Trace: J2
Byte J2 is used to transmit repetitively a Low Order Path Access Point Identifier so that a path receiving terminal can verify its continued connection to the intended transmitter.

3.Network operator byte: N2


This byte is allocated to provide a Tandem Connection Monitoring (TCM) function.

3.3.4 VC-2/VC-1 POH (LO-POH) (cont.)

4.Automatic Protection Switching (APS) channel: K4 (b1-b4)


These bits are allocated for APS signaling for protection at the lower order path level.

5.Reserved: K4 (b5-b7)
Bit 5 to 7 of K4 are reserved for an optional use. If this option is not used, these bits shall be set to "000" or "111".

6.Spare: K4 (b8)
This bit is allocated for future use.

3.4 Aligning - Pointers

SDH aligning: A procedure by which the frame offset information is incorporated into the Tributary Unit or the Administrative Unit when adapting to the frame reference of the supporting layer. pointer: An indicator whose value defines the frame offset of a Virtual Container with respect to the frame reference of the transport entity on which it is supported.

3.4.1 Functions of pointer

The AU-n pointer provides a method of allowing flexible and dynamic alignment of the VC-n within the AU-n frame. The TU-n pointer provides a method of allowing flexible and dynamic alignment of VC-n within the TU-n frame, independent of the actual content of the VC-n. Dynamic alignment means that the VC-n is allowed to "float" within the AU-n frame. Thus, the pointer is able to accommodate differences, not only in the phases of the VC-n and the SOH, but also in the frame rates.

3.4.2 Frequency justification

If there is a frequency offset between the frame rate of the AUG and that of the VC-n, then the pointer value will be incremented or decremented as needed, accompanied by a corresponding positive or negative justification byte or bytes. Consecutive pointer operations must be separated by at least three frames (i.e. every fourth frame) in which the pointer value remains constant.

3.5 Multiplexing SDH multiplexing: A procedure by which multiple lower order path layer signals are adapted into a higher order path or the multiple higher order path layer signals are adapted into a multiplex section.

3.5.1 Multiplexing of AUs into STM-N

3.5.1.1 Multiplexing of AUGs into STM-N


1 1 9 #1 AUG SOH 1 2 3N 1 2 3N 1 2 3N 1 2 3N SOH N9 N261 261 1 9 #2 AUG 1 261

3.5.1.2 Multiplexing of an AU-4 via AUG

1 J1 C2 G1 F2 H4 F3 K3 N1 POH

85

C-3

VC-3

Floating phase

H1

H2

H3

H1 Y Y H2 1* 1* H3 H3 H3

AU-4

Fixed phase

AUG

3.5.2 Multiplexing of TUs into VC-4 and VC-3

3.5.2.1 Multiplexing of TUG-3s into VC-4

3.5.2.2 Multiplexing of an TU-3 via TUG-3

Fixed Stuff

3.5.2.2 Multiplexing of TUG-2s via TUG-3

86 column

Fixed Stuff

Fixed Stuff

Byte allocation for Multiplexing of 7 TUG-2s via TUG-3

TU-11

TU-12

TU-2

TUG-2

12

3 4

12

3 4 (1)

12

3 4

1 2 1 2 1 2 12 3 3 3 3 (2)
TUG-3

(3) 123 45

(7) 123 67
80

123

45

123 67

45

67

45

67
86

1 2 3 456 78 9

Fixed Stuff

Multiplexing levels and Virtual Containers

x63 2 Mbit/s

VC-12
x16 x3

VC-4 VC-3

STM-N

+POH

+POH

+POH

+SOH

Summary An introduction to SDH NNI and the SDH frame structure The formats for mapping and multiplexing PDH into an STM-N frame

Protection

Equipment Protection and Service Protection Protection and Restoration Linear and ring protection MSP and MSP-ring 2-Fiber and 4-Fiber Path Protection and Multiplex Section Protection

Terminal Multiplexer (TM) in a point-to-point line system with 1+1 MSP

Tributaries

TM

STM-16

TM

MSP 1+1 Working Protection

Tributaries

Add-Drop Multiplexer (ADM) in a chain network configuration with 1+1 MSP


STM-16
Tributaries

STM-16
Tributaries

TM

ADM

TM

MSP 1+1

MSP 1+1

Tributaries Working Protection

Terminal Multiplexer (TM) in a point-to-point line system with 1:N MSP


STM-1

TM
Tributaries

TM
Tributaries

MSP 1:N Working Protection

Comparison of 1+1 and 1:1 protection

Working Protected Traffic Protection Protected Traffic

MSP 1+1, normal state

Working

MSP 1+1, working failed

Protected Traffic Protection

Protected Traffic

Working Protected Traffic Low priority Traffic (optional) Protection Protected Traffic Low priority Traffic (optional)

MSP 1:1, normal state

MSP 1:1, working failed

Working Protect Traffic Low priority Traffic (interrupted) Protection Protect Traffic Low priority Traffic (interrupted)

Tributaries

Fibre pair ADM STM-16 STM-16

Add-Drop Multiplexers in a 2-fibre, single ring network configuration

Tributaries

ADM

ADM

STM-16 ADM

STM-16

Tributaries

Tributaries

Tributaries

Fibre pairs ADM STM-16 STM-16

Add-Drop Multiplexers in a 4-fibre, double ring network configuration

Tributaries

ADM

ADM

STM-16 ADM

STM-16

Tributaries

Tributaries

Two-Fibre, MSSPRing protection Normal condition

Two-Fibre, MSSPRing protection Link failure

Two-Fibre, MSSPRing protection Node failure

Sub-Network Connection Protection

ADM

TM

ADM

ADM

TM

ADM

Summary
Describe the historical evolution of time synchronization List main synchronization requirements Describe the network element synchronization modes

Review Questions
In general, why is synchronization needed? How is synchronization achieved in PDH networks? How is synchronization achieved in SDH networks?

Synchronization
If synchronization not guaranteed, considerable degradation in network function, and even total failure of the network can be the result. All network element should be synchronized with a central clock. Central clock is generated by a high precision primary reference clock (PRC) unit conforming to ITU-T Rec.G811 This specifies an accuracy of 110-11 This clock signal should be distributed through the entire network A hierarchical structure is used. (SSU, SEC) Synchronization signal paths can be same as those used for SDH communications.

Synchronization
PRC G.811

SSU G.812 SEC G.813 SEC G.813

SSU G.812 SEC G.813 SEC G.813

Synchronization The clock signal is regenerated in the SSUs and SECs with the aid of phase locked loops. If the clock supply fails, the affected NE switches over to a clock source with the same or lower quality, or if this is not possible, it switches to HO mode. Clock islands should be avoided, this is prevented by signaling the NEs with the aid of synchronization status messages (SSM, part of S1 byte).

GFP Introduction
Generic Framing Procedure (GFP) All optical network client signals must be mapped in some way to an underlying optical transport payload container in order to transport the client through the network. Typically, past mapping methods have been either fixed mappings or very narrow in scope
For example, Packet On SONET (POS), maps only IP packets over PPP in HDLC like framing.

GFP is more efficient and effective; its two modes can accommodate many different client signals GFP ensures interoperability when connecting different manufacturers equipment

GFP-F Frame-Mapped GFP (GFP-F)

GFP-F Frame-Mapped GFP (GFP-F)


The entire client packet is dropped into a GFP frame Data Client signals such as Ethernet, PPP and DVB are queued waiting to be mapped Some codes can be removed to minimize the transmission size The encapsulation processes described above increase latency, making GFPF inappropriate for time-sensitive protocols

GFP-T Transparent GFP (GFP-T)

GFP-T Transparent GFP (GFP-T)

GFP-T client signals are mapped into fixed-length GFP frames and transmitted immediately without waiting for the entire client data packet to be received. ALL the client characters, without exception, are transported to the far end. GFP-T is very good for time sensitive use .This is because it is not necessary to process client frames or to wait for arrival of the complete frame.

Virtual Concatenation (VC)

Contiguous concatenation and virtual concatenation Concatenation granularity


(1) Lower-Order Virtual Concatenation (LO-VCAT) uses X times VC12 containers. (2) Higher-Order Virtual Concatenation (HO-VCAT) uses X times VC4 containers.
FEVC12 GEVC4

Features of VC:

Independent transmission of VC SDH network Multi-path transmission of VC Flexible bandwidth allocation Independent path protection of each virtual container

Multi-vendor

Concatenation Contiguous Concatenation (CCAT) Virtual Concatenation (VCAT)

C4

C4

C4

C4

VC-4-4c VC-4 #4 VC-4 #3 VC-4 #2 VC-4 #1 VC-4-4v

LCAS

Link Capacity Adjustment Scheme (LCAS)


Link Capacity Adjustment Scheme (LCAS) is a next generation SDH feature that allows VCAT Groups (VCGs) to be resized dynamically. This allows network providers to more quickly respond to customer requests for service bandwidth changes. LCAS provides a control mechanism for both changes (VCG size increase or decrease) on demand, and in response to failures of individual VCs. This latter feature allows the network provider to quickly substitute an unused VC-n for a failed VC-n, sustaining the SLA-contracted service in the face of the failure. Basically, LCAS is a set of commands to be implemented within SDH Network Elements that support VCAT

LCAS LCAS applications


Network Resilience: In the case of a partial failure of one path, LCAS reconfigures the connection using the members still up and able to continue carrying traffic.

Thank you!

www.fiberhomegroup.com

You might also like