Organisation Profile: Bharti Airtel Services Limited 234, Phase-III Okhla Industrial Estate, New Delhi-20
Organisation Profile: Bharti Airtel Services Limited 234, Phase-III Okhla Industrial Estate, New Delhi-20
Organisation Profile: Bharti Airtel Services Limited 234, Phase-III Okhla Industrial Estate, New Delhi-20
1
PROJECT REPORT ON
(System Engg.)
2
PROJECT REPORT ON
(Head of C-NOC)
3
ACKNOWLEDGEMENTS
I am also grateful towards Mr. Gaurav kumar, Mr. Shailendra kumar, Mr. Hardev
Singh (Sr. Engineers) & Mr. Vikas Anchal, Mr. Deepak Rana, Mr. Amit Mudgal
(Engineers) & all other members of the System engg department for making me
understand various aspects of System engg..
Last but not the least I am thankful to all those persons with whom I have interacted and
who directly or indirectly contributed significantly to the successful completion of my
training.
MAYANK KURRA
4
TRAINING OBJECTIVE
2. To provide a basic understanding of the culture, work ethics and trade related work
practices at the Organization, i.e. Bharti Telnet Ltd., with which the trainee was
associated for a period of Six weeks.
3. To provide an opportunity to observe the processes, procedures and standards that the
industry uses to ensure quality, productivity and economy of the products or services that
it undertakes.
5
Bharti Enterprises has been at the forefront of technology and has revolutionized
telecommunications with its and has revolutionized telecommunications with its world-
class products and services world-class products and services Established in 1985, Bharti
has been a pioneering force in the telecom sector with many firsts and innovations to its
credit, ranging from being the first mobile service in Delhi, first private basic telephone
service provider in the country, first Indian company to provide comprehensive telecom
services outside India in Seychelles and first private sector service provider to launch
National Long Distance Services in India. As of June 30, 2006, Bharti had
approximately 7 million total customers nearly 3.75 million mobile and 423,000 fixed
line customers.
Its services sector businesses include mobile operations in Andhra Pradesh, Chennai,
Delhi, Gujarat, Haryana, Himachal Pradesh, Karnataka, Kerala, Kolkata, Madhya
Pradesh, Maharashtra, Punjab, Tamil Nadu and Uttar Pradesh (West). In addition, it also
has fixed-line operations in the states of Madhya Pradesh and Chattisgarh, Haryana,
Delhi, Karnataka and Tamil Nadu and nationwide broadband and long distance
networks.
Bharti has recently launched International long distance services by offering data
transmission services and voice transmission. The Company is also implemented a
submarine cable project connecting Chennai-Singapore for providing international
bandwidth
Bharti Enterprises also manufactures and exports telephone terminals and cordless
phones. Apart from being the largest manufacturer of telephone instruments, it is also the
first telecom company to export its products to the USA.
Bharti provides a range of telecom services and solutions from customer premise
equipment to customized data solutions, Bharti comes with an entire range spanning the
entire spectrum of telephony. And all this is made possible with:
Touchtel - the largest network of private fixed line telephone service and solutions in
India.
Bharti Enterprises has set industry standards in all the areas of its operation.
6
Bharti Airtel has reported its net profit for the quarter ended 30 June 2006 (Q1FY07) at
Rs755 crore, a growth of 48 per cent from the corresponding quarter of last year. As per
the un-audited results announced recently, the company registered consolidated total
revenues for the quarter at Rs 3,856 crore, an increase of 53 per cent.
ACCOMPLISHMENTS
7
structured into two main strategic business groups - the MOBILITY Leaders business
group and the INFOTEL Leaders business group. The Mobility business group provides
GSM mobile services across India in twenty three telecom circles, while the Infotel
business group provides broadband & telephone services, long distance services and
enterprise services. All these services are provided under the Airtel brand.
Bharti Tele-Ventures is one of India's leading private sector providers of
telecommunications services based on an aggregate of 16,561,699 customers as
of November 30, 2007, consisting of 15,416,002 GSM mobile and 1,145,697 broadband
& telephone customers.
Bharti is the first private operator to have established satellite based Gateway for internet
access and has established its fibre gateway on Network-I2I-first private submarine cable,
owned by Bharti and Singtel.
Bharti provides complete telephone services and solutions ranging from DSL broadband
Internet access, Leased lines, ISDN services, Unified messaging solutions, a state of the
art high speed communication network capable of handling voice, data and video.
Partners:
The Company has a strategic alliance with SingTel. The investment made by SingTel is
one of the largest investments made in the world outside Singapore, in the company. The
company’s mobile network partners include Ericsson, Nokia, Siemens and IT
partners include IBM.
INTRODUCTION: NETWORKS:-
What is a Network?
8
Campus-area networks (CANs): The computers are within a limited geographic area,
such as a campus or military base.
Metropolitan-area networks MANs): A data network designed for a town or city.
Home-area networks (HANs): A network contained within a user's home that connects a
person's digital devices.
In addition to these types, the following characteristics are also used to categorize
different types of networks:
Topology: The geometric arrangement of a computer system. Common topologies
include a bus, star, and ring. See the Network topology diagrams in the Quick
Reference section of Webopedia.
Protocol: The protocol defines a common set of rules and signals that computers on the
network use to communicate. One of the most popular protocols for LANs is called
Ethernet. Another popular LAN protocol for PCs is the IBM token-ring network .
Architecture: Networks can be broadly classified as using either a peer-to-peer or
client/server architecture.
INTERNET
9
A global network connecting millions of computers. More than 100 countries are
linked into exchanges of data, news and opinions. Unlike online services, which are
centrally controlled, the Internet is decentralized by design. Each Internet computer,
called a host, is independent. Its operators can choose which Internet services to use and
which local services to make available to the global Internet community. Remarkably,
this anarchy by design works exceedingly well.
INTERNET TECHNOLOGIES:
The various Internet technologies used are:
1. ISDN (Integrated Services Digital Network)
2. Leased Lines
3. Dial up
4. Wireless Services
5. Mobile Services
1. Access
A means to connect to users, convert their talk into electronic signals and vice versa.
Access equipment would mean how easily and reliably the customer gets a connection.
2. Switch
10
A means to connect A to B while there are a thousands other connections between A to Z
possible. Switch would mean how many subscribers can be connected.
3. Transport
A means to carry traffic & signals between several switches & also between switch &
access equipment. It also means ,what bandwidth he gets. (how fast does he download)
4. Services:
like Caller ID - SMS – Call diverting-Call forwarding –voice mail-sms, wake-up call, call
debar, Auto answering - R world – On line flight / railway ticket booking – getting a
flight
boarding pass -, Operation support system that’s what network operators need to
operate their networks efficiently and effectively.
5. Signaling:
Analog to railway transport - Train has left at this particular time –if any problem /path
failure-conveying to HQ. In case of link failure, which alternate path to be followed.
And finally OSS decides how efficiently you run the network, repair faults, raise correct
bills, etc.
- can we give new connections as & when required –no waiting time –no limit More
users, more frequent use.
- availability of unlimited talk time without system getting hunged – more frequent use
- more information & data to be carried, so more bandwidth.
2. More flexibility:-
- Can we have voice & data & video on the same line, at the same time,
- Can we get more download speed with increasing uploading speed,
- Can we provide 100 or 500 number in a sequence (corporate connections)
11
-Mere transmission is not good enough, quality of voice or video is also important.
- Reliability of service – Uninterrupted continuous service for 24 hrs & 365 days / year.
Our MTTR should be measured in minutes & not in hrs.-Availability of Protection path
- Can we reduce waiting time to zero – i.e operator should not say –You are in the Queue
for STD or Local calls
- i.e. at Hospital or Hotel – should not say Come tomorrow
- i.e. can we provide the service as & when required.
Data communications (often called datacomm) implies the exchange of data, generally
defined as a group of facts or statistics. In today’s digital networks, datacomm actually
refers to facts, statistics, and any other information that is digitally encoded and
intelligible to various network devices (i.e., computers, terminals, word processors,
microcomputers, etc.).Datacomm The movement of encoded information by means of
electric transmissionsystems via one or more data links according to a protocol. Put
simply, the process of communicating information in binary form between two points in a
network.Protocol The rules for communicating between like processes, giving a means to
control the orderly communication of information between stations on a data link. Put
simply, the rules used to govern communication between two points in a network.
12
The Physical Layer:-
1. Physical Layer- Concerned with the transmission of the bitstream. Deals with the
mechanical and electrical characteristics of accessing the physical medium.
2.Data Link Layer- Sends data in frames across the physical link. Concerned with error
control, synchronization, and flow control.
4. Transport Layer Provides reliable, transparent transfer of data between end points.
Responsible for maintaining the quality of service: throughput, transit delay, and ratio of
lost data units to data units transmitted.
6. Presentation Layer- Provides information about the syntax and data format used
by an application to the session layer so that the communicating applications can make
any necessary syntax conversions.
13
Categorically, three types of networks are used to transfer data:
Public Network A network run by a telephone company, value added networkoperator,
government agency, specifically to serve the needsof the general public. This type of
network is shared amongmany users, any one of which can establish communications
with any other user by use of a dial or push-button telephone.It is referred to as the public
switched telephone network(PSTN) in the United Kingdom.
Public Data Network Commonly called a PDN, this network is operated by the
government or a private agency for the purpose of providingdata transmission services to
the public. This type of networktransmits packets (data messages). Packets from different
sources are interleaved and sent to their destination over virtualcircuits. PDNs may be
either a packet-switched network suchas X.25, or a digital network such as DDS.
Human Voice ranges from 300 - 3300 Hz, --- - -Maximum 4000 HzNyquist Principle.- to
be sampled at least at double that rate for recreation
So 8000 samples / second for each voice signal. =1 sample / every 125 micro sec. = 8 bit
lData capacity reqd. per individua = 8bits/sec. x 8000 samples = 64,000 bits/sec.
= 64 kbps = Data Speed
01110010100011101110
We need to take atleast 8000 samples to faithfully recreate human voice,meaning one
sample takes 125 µs - to transmit.Each sample time duration of 125 microseconds is
called FRAME (e.g. train)
As we take a 8 bit / sample - we get 64,000 bits/seconds = 64 kbps - to be transmitted per
second.
A single channel of Voice needs 64 kbps to communicate.- known as Data Speed i.e. in a
second–Talking capacity -Data transfer capacity of each individual is 64kbps.This 64
kbps is called a DS0 (Digital Signal Zero). –Data speed of Individual
For Video conference we need 60 Mbps.- In Japan each gets 100Mbps,- In USA it is
2Mbps
125 micro sec. FRAME - -can be compared with - - - - - - - TRAIN
14
– 32 channels - - - - - - - - - - - - -- - - - - - - - - - - - - - - - - - - - -BOGGIE
– 8 bits = are comparable to - - - - - - - - - - - - - - - - - - - -- -Passengers
. Time Division Multiplexing - TDM
During 125 micro seconds-Each person’s talk will be sampled for 3.9 micro seconds
only.
During rest of the time (121.1 microsecond) we can send 31 more signals each of 8 bits.
i.e.125 micro seconds is divided into 32 slots / channels & is called TDM
i.e. 32 person can talk – one by one - within 125 microseconds
i.e. When we bunch 32 DS0 &transmit them at the gap of 125 Microsecond.
Each channel is called as Eo.
Each frame E1 carries 32 E0 / channels - each channels of 8 bits .
Total data transferred per second = 32 x (8bits x 8000 samples/sec.)
Band width =2,048,000 bits / second = 2.048 Mbps = E1
\
Facets of Transport:
1. Media-
• Wireline Copper , Aluminium
• Wireless RF, µW ( Electromagnetic)
• Optical OFC
2.Topology –
(Pattern of connecting network element)
•Mesh - Local – links
•Star
•Bus - for LAN
•Ring
3. Technology
• Voice Communication PDH
• Modern Transport SDH, DWDM
15
4 .Network Management
Token Ring – Ring in which only one circulating Token - Token holder can speak ,
others are listners only –If token holder do not want to use, he has to pass it to next
fellow in the ring.
Network Management –
A ) Local Craft Terminal – Local panel through which nearby Mux are controlled - e.g in
Lab. we are controlling 4 transport equipment
through Laptop / Desk top.
B) Hyper Terminal - Dumb terminal – softwear through which response from the Mux
can be received.
C) Network management – All Mux & CT ( control terminal) in the network ( large scale
) can be controlled by SERVER at NNOC.
MEDIA :-
16
Features of Microwave transmission :-
Guided Media:-
17
Optic Fiber Cable (OFC) :-
Distance:- The extremely low losses of modern telecom grade fiber enable distances of
50-100Km between repeaters to be routinely achieved.
Security:- Optical fiber systems do not radiate any signal, and hence have almost total
immunity to ‘wire tapping’. It can be done but is very difficult unless access to splices or
connectors is possible.
Immunity to Noise:- The glass optical fiber is a dielectric rather than a metal and thus
does not act as an antenna in the way metal conducting elements do. The fiber will not,
therefore suffer from inductive interference such as RFI Radio Interference - EMI
Electromagnetic Interference - EMP Electromagnetic Pulse.
This effective immunity to interference makes it possible to use fibers alongside or even
on power lines.
Light Weight:- Optical fiber is remarkably light in weight. A 10Km stand of telecom
grade fiber on a shipping spool weighs less than 2kg whereas a 500m reel of co-ax copper
cable weighs 30kg.
Future Proof:- Maybe yes –maybe no. It is impossible to know, however the signs are
encouraging. It lasts a long time –we only use a small amount of its theoretical capacity
—as a result it is probably fair to say that fiber provides our most future proof
transmission medium.
18
If we get a optical tunnel where once a light pulse enters at one end can only come out at
the other end, would serve our purpose. Well an OFC is just that. Transmission through a
OFC is like light ball traveling down a tunnel. It reflects several time on the “wall” before
reaching the end of the tunnel.
Train travels on railway track transfers the Passengers similarly
Wavelength travels on OFC transfer the Data / voice / video.
1. Very low attenuation-Loss depends on length only –free from amount of data
Transmitted.
2. No Electromagnetic Interference (EMI).
3. No Bandwidth-distance relation, hence enormous large bandwidth available.-10Gbps
whereas Capacity of Cu wire is limited i.e. 34 Mbps.
4. OFC are far thinner in diameter.-smaller in size-light in weight.
5. Greater safety as difficult to join-High security.
Disadvantages are :-
1. OFC is costlier than Cu-wire.
2. OFC is fragile.
3. OFC are difficult to join.
4. OFC has it’s own set of losses – dispersion, absorption, etc
Optical Spectrum :-
Visible Light: Electromagnetic radiation visible to the human eye; wavelengths of 400-
700 nm.
Infrared (IR): The region of the electromagnetic spectrum bounded by the long
wavelength, extreme of the visible spectrum (about 0.7 µm) and the shortest microwaves
(about 0.1 µm).
Total internal reflection:- Total internal reflection is the phenomenon by which an optical
fiber guides light. If light incident at any angle more than the Critical Angle at the
interface between the core and cladding (Refractive index of Core > Refractive index of
Cladding ) such that it will be entirely reflected back in the Core (none is transmitted into
19
the cladding where it is lost). The critical angle depends on the material of core and the
cladding. It can be summarized that the important concept of fiber optic communication
technology is: When light travels from a medium with higher refractive index ( Core) to a
medium with lower refractive index (Cladding )and if it strikes the boundary at an angle
more than a critical angle, all light will be reflected back to the incident medium (Core).
This phenomenon is known as total internal reflection.
Fiber Geometry:-
Core: The core of an optical fiber – is a glass rod - denotes the central part of the fiber
where the majority of the light propagates.
Cladding: The cladding of an optical fiber surrounds the core and has a Refractive Index
lower than that of core. This difference in refractive index allows total internal reflection
to occur within the fiber core. & avoids the entry into the Cladding .Total internal
reflection is the phenomenon by which light propagates in optical fiber.
Attenuation - ( Losses ) :-
Loss is the measure of the reduction in signal magnitude, or loss of power of a optic
pulse, along a length of fiber. When the loss is described per km, it is known as
Attenuation. Attenuation in fiber optic cabling is usually expressed in decibels per unit
per length of cable (i.e. dB/km) at a specified wavelength. Attenuation depends on length
of a fiber & also on Link components like splice Joints - connectors etc.
Attenuation describes how energy is lost or dissipated. Loss is the cost of moving
something, like charges or particles or light pulses. Attenuation / Losses are due to -
Impure- non uniform material , joints i.e. Splicing Attenuation in fiber optic cabling is
usually expressed in decibels per unit length of cable (i.e. dB/km) at a specified
wavelength.
20
2005 – 0.18 dB / km
Absorption –
Caused by impurities in the glass, and any atomic defects in the glass increases
dramatically above 1700 nm. The peak absorption occurs at approx.1400nmë -
proportional to 1 / ë
Scattering –
Scattering is caused by small variations in the density of glass . Loss of optical energy
due to imperfections / in homogeneities (localized density variations). And therefore act
as scattering objects. - proportional to 1 / ë4
Geometric Effects –
Bending losses increases with increase in Wavelength. Effects of 2 cm radius bend at
three wavelengths - 1310 nm = < 0.1 dB loss
1550 nm = 2 dB loss
1625 nm = 6 dB loss
Classification Of Fibers :-
The most effective means of limiting the number of modes is to reduce the core diameter.
While a core with 50 µm dia is sure to be Multimode, a core of 7-9 µm would allow only
1 mode. The number of modes however depends on the wavelength, so while 7-9 µm is
Single mode for 1310 nm or higher wavelengths, it maybe allowing
more than one mode at lower wavelengths.
21
Core diameter varies - 50 to 62.5 µ-meter. Mode Depends on - Wave length Core
diameter - Refractive Index n1 & n2.
B - Mode Classification:-
Multimode fiber:-
Multimode fiber allows multiple modes of light to ropagate along its length at various
angles and orientations to the central xis. Conventional sizes of multimode fiber are
62.5/125µm or 50/125µm. .g. G-652- SM – for city network - of various make - like
Corning(Germany) – Sterlite-RPG – Finolex – Tamilnadu Telecom Ltd (TTL) – BEOL
(Birla Erricson Optical Ltd.)
Conventionally, the size of a fiber is denoted by writing its core diameter &then writing
the cladding diameter (Both in µm) with a slash between them. For example: 50/125µm
fibers describe a fiber with a 50µm
Designs of single-mode fiber have evolved over several decades. The three principle
types and their ITU-T specifications are:
• Non-dispersion-shifted fiber (NDSF), G.652
-Minimum dispersion at 1310 nm
-Attenuation – Between 0.35 dB /km to 0.4 dB/km
22
• Non-zero dispersion-shifted fiber (NZ-DSF), G.655
- Optimum dispersion at 1550 nm – 18 Pico second / (nm.km)
- Attenuation – Between 0. 18 dB /km to 0.21 dB/km.
- Linear amplification for various wavelengths – DWDM
As optical fiber use became more common and the needs for greater bandwidth and
distance increased,a third window, near 1550 nm, was exploited for single-mode
transmission. The third window, or C band,offered two advantages: it had much lower
attenuation (0.18 dB/km to 0.25dB.km.), and its operatingfrequency was the same as that
of the new Erbium-doped fiber amplifiers (EDFAs- Amplifies the pulse in optical state
only –doesn’t need to convert in elect. pulse.-Direct amplification). However, its
dispersioncharacteristics were severely limiting. This was overcome to a certain extent by
using narrower linewidthand higher power lasers. But because the third window had
lower attenuation than the 1310-nm window,manufacturers came up with the dispersion-
shifted fiber design, which moved the zero-dispersion point to the 1550-nm region.
Although this solution now meant that the lowest optical attenuation and the zero-
dispersion pointscoincided in the 1550-nm window, it turned out that there are
destructive nonlinearities in optical fiber near the zero-dispersion point for which there is
no effective compensation. Because of this limitation, these fibers are not suitable for
DWDM applications.
The third type, non-zero dispersion-shifted fiber, is designed specifically to meet the
needs of DWDM applications. The aim of this design is to make the dispersion low in the
1550-nm region, but not zero.
This strategy effectively introduces a controlled amount of dispersion, which counters
nonlinear effects such as four-wave mixing (see the “Other Nonlinear Effects” section on
page 2-11) that can hinder the performance of DWDM systems.
23
140 Mb/s 140 Mb/s
140-34 DEMUX 34-140 MUX
34 Mb/s 34 Mb/s
8 Mb/s 8 Mb/s
2 Mb/s
What is SDH?
Introduction :-
24
SDH (Synchronous Digital Hierarchy) is a standard for telecommunications transport
formulated by the International Telecommunication Union (ITU), previously called the
International Telegraph and Telephone Consultative Committee (CCITT).
SDH was first introduced into the telecommunications network in 1992 and has been
deployed at rapid rates since then. It is deployed at all levels of the network
infrastructure, including the access network, and the long-distance trunk network. It is
based on overlaying a synchronous multiplexed signal onto a light stream transmitted
over fibre-optic cable. SDH is also defined for use on radio relay links, satellite links, and
at electrical interfaces between equipment.
The comprehensive SDH standard is expected to provide the transport infrastructure for
worldwide telecommunications for at least the next two or three decades.
The increased configuration flexibility and bandwidth availability of SDH provides
significant advantages over the older telecommunications system.
These advantages include: A reduction in equipment requirements and an increase in
network reliability.The provision of overhead and payload bytes - the overhead bytes
permitting management of the payload bytes on an individual basis and facilitating
centralised fault sectionalisation.
The definition of a synchronous multiplexing format for carrying lower-level digital
signals (such as 2 Mbit/s, 34 Mbit/s, 140 Mbit/s) which greatly simplifies the interface to
digital switches, digital cross-connects, and add-drop multiplexers.
The availability of a set of generic standards, which enable products from different
vendors to be connected and inter-operated. The definition of a flexible architecture
capable of accommodating future applications, with a variety of transmission rates.In
brief, SDH defines synchronous transport modules (STMs) for the fibre-optic based
transmission hierarchy.
Background :-
Before SDH, the first generations of fibre-optic systems in the public telephone network
used proprietary architectures, equipment, line codes, multiplexing formats, and
maintenance procedures. The users of this equipment wanted standards so they could mix
and match equipment from different suppliers. The task of creating such a standard was
taken up in 1984 by the Exchange Carriers Standards Association (ECSA) in the U.S. to
establish a standard for connecting one fibre system to another. In the late stages of the
development, the CCITT became involved so that a single international standard might
be developed for fibre interconnect between telephone networks of different countries.
The resulting international standard is known as Synchronous Digital Hierarchy (SDH).
To understand correctly the concepts and details of SDH, it is important to be clear about
the meaning of Synchronous, Plesiochronous, and Asynchronous.
25
In a set of Synchronous signals, the digital transitions in the signals occur at exactly the
same rate. There may however be a phase difference between the transitions of the two
signals, and this would lie within specified limits. These phase differences may be due to
propagation time delays, or wander introduced in the transmission network. In a
synchronous network, all the clocks are traceable to one Primary Reference Clock (PRC).
The accuracy of the PRC is better than ± 1 in 1011 and is derived from a cesium atomic
standard.
If two digital signals are Plesiochronous, then their transitions occur at "almost" the
same rate, with any variation being constrained within tight limits. These limits are set
down in ITU-T recommendation G.811. For example, if two networks need to interwork,
their clocks may be derived from two different PRCs. Although these clocks are
extremely accurate, there is a small frequency difference between one clock and the
other. This is known as a plesiochronous difference.
In the case of Asynchronous signals, the transitions of the signals do not necessarily
occur at the same nominal rate. Asynchronous, in this case, means that the difference
between two clocks is much greater than a plesiochronous difference. For example, if two
clocks are derived from free-running quartz oscillators, they could be described as
asynchronous.
SDH Advantages:-
The primary reason for the creation of SDH was to provide a long-term solution for an
optical mid-span meet between vendors, that is, to allow equipment from different
vendors to communicate with each other. This ability is referred to as multi-vendor
interworking and allows one SDH-compatible network element to communicate with
another, and to replace several network elements, which may have previously existed
solely for interface purposes.
The second major advantage of SDH is the fact that it is synchronous. Currently, most
fibre and multiplex systems are plesiochronous. This means that the timing may vary
from equipment to equipment because they are synchronised from different network
clocks. In order to multiplex this type of signal, a process known as bit-stuffing is used.
Bit-stuffing adds extra bits to bring all input signals up to some common bit-rate, thereby
requiring multi-stage multiplexing and demultiplexing. Because SDH is synchronous, it
allows single-stage multiplexing and demultiplexing. This single-stage multiplexing
eliminates hardware complexity, thus decreasing the cost of equipment while improving
signal quality.
In plesiochronous networks, an entire signal had to be demultiplexed in order to access a
particular channel, then the non-accessed channels had to be re-multiplexed back together
in order to be sent further along the network to their proper destination. In SDH format,
only those channels that are required at a particular point are demultiplexed, thereby
eliminating the need for back-to-back multiplexing. In other words, SDH makes
individual channels “visible” and they can easily be added and dropped.
26
The basic format of an SDH signal allows it to carry many different services in its Virtual
Container (VC) because it is bandwidth-flexible. This capability will allow for such
things as the transmission of high-speed, packet-switched services, ATM, contribution
video and distribution video. However, SDH still permits transport and networking at the
2 Mbit/s, 34 Mbit/s and
140 Mbit/s levels, accommodating the existing digital hierarchy signals. In addition, SDH
supports the transport of signals based on the 1.5 Mbit/s hierarchy.
Transmission Hierarchies :-
Following ANSI’s development of the SONET standard, the ITU-T undertook to define a
standard that would address interworking between the 2048 kbit/s and 1554 kbit/s
transmission hierarchies. That effort culminated in 1989 with ITU-T’s publication of the
Synchronous Digital Hierarchy (SDH) standards.
The tables below compare the Non-synchronous and Synchronous transmission
hierarchies.
Why Synchronise? :-
27
Since these clocks are not synchronised, large variations can occur in the clock rate and
thus the signal bit rate. For example, a E3 signal specified at 34 Mbit/s ± 20 ppm (parts
per million) can produce a timing difference of up to 1789 bit/s between one incoming E3
signal and another.
Asynchronous multiplexing uses multiple stages. Signals such as asynchronous E1s (2
Mbit/s) are multiplexed (bit-interleaving), extra bits are added (bit-stuffing) to account
for the variations of each individual stream and are combined with other bits (framing
bits) to form an E2 (8 Mbit/s) stream. Bit-interleaving and bit-stuffing is used again to
multiplex up to E3 (34 Mbit/s). The E1s are neither visible nor accessible within an E3
frame. E3s are multiplexed up to higher rates in the same manner. At the higher
asynchronous rate, they cannot be accessed without demultiplexing.
In a synchronous system, such as SDH, the average frequency of all clocks in the system
will be the same. Every slave clock can be traced back to a highly stable reference clock.
Thus, the STM-1 rate remains at a nominal 155.52 Mbit/s, allowing many synchronous
STM-1 signals to be multiplexed without any bit-stuffing. Thus, the STM-1s are easily
accessed at a higher
STM−N rate.
Low-speed synchronous virtual container (VC) signals are also simple to interleave and
transport at higher rates. At low speeds, 2.048 Mbit/s E1 signals are transported within
synchronous
VC-12 signals which run at a constant rate of 2.304 Mbit/s. Single-step multiplexing up
to
STM-1 requires no bit-stuffing and VCs are easily accessed.
A mechanism known as "pointers" accommodates differences in the reference source
frequencies and phase wander, and so prevents data loss during synchronisation failures.
This is discussed in more detail later in this primer
.
Synchronisation Hierarchy
Digital switches and digital cross-connect systems are commonly employed in the digital
network synchronisation hierarchy. The network is organized with a master-slave
relationship with clocks of the higher level nodes feeding timing signals to clocks of the
lower level nodes. All nodes can be traced up to a Primary Reference Clock (PRC).
Synchronising SDH
The internal clock of an SDH terminal may derive its timing signal from a
Synchronisation Supply Unit (SSU) used by switching systems and other equipment.
Thus, this terminal can serve as a master for other SDH nodes, providing timing on its
outgoing STM−N signal. Other SDH nodes will operate in a slave mode with their
internal clocks timed by the incoming STM−N signal. Present standards specify that an
SDH network must ultimately be able to derive its timing from a Primary Reference
Clock (PRC).
This is a time of great change for Timing and Synchronisation in the network and there
are many challenges for operators and suppliers - and many issues to resolve:
Synchronisation networks are changing with the introduction of SDH; the historical
PDH-based sync network will be replaced by an SDH-based architecture.New equipment,
28
network timing, and sync standards have been developed (Tektronix is contributing
expertise at ITU and ETSI).
Transport networks are evolving and hybrid SDH/PDH has specific problems due to the
quantisation of network phase variation as pointer justifications.New services like video
and ATM depend on excellent timing and network sync to deliver good Quality of
Service.Jitter/Wander measurement technology is changing from analogue to digital,
leading to dramatically new instrument capabilities.New test equipment standards are
being developed (Tektronix is taking a leading role at ITU).
Overview of SONET:-
In 1985, Bellcore proposed the idea of an optical carrier-to-carrier interface that would
allow the interconnection of different manufacturers’ optical equipment. This was based
on a hierarchy of digital rates, all formed by the interleaving of a basic rate signal. The
idea of a Synchronous Optical NETwork (SONET) attracted the interest of carriers,
Regional Bell Operating Companies (RBOCs) and manufacturers alike and quickly
gained momentum. Interest in SONET by CCITT (now the International
Telecommunication Union – ITU-T) expanded its scope from a domestic to an
international standard. By 1988, the ANSI committee had successfully integrated the
changes requested by the ITU-T and were well on their way toward the issuance of the
new standard. When fiber optical cables were initially deployed as a medium for high-
speed digital transport, the lack of standards led to widespread deployment of proprietary
optical interfaces. This meant that fiber optic transmission equipment from one
manufacturer could not interface with equipment from any of the other manufacturers.
Service providers were required to select a single vendor for deployment throughout the
network, and then were locked into the network control and monitoring capabilities of
that manufacturer. Although this technology satisfied the bandwidth needs of the network
for several years, it became evident that this arrangement could not support the future
needs of the industry because of the limited interconnection capabilities. Today, the
SONET standard is contained in the ANSI specification T1.105 Digital Hierarchy –
Optical Interface Rates & Formats Specifications (SONET), and technical
recommendations are found in Bellcore TR-NWT-000253 Synchronous Optical
Network(SONET) Transport Systems: Common Generic Criteria .
Bellcore
TR-253 Generic Requirements
TR-303 Loop Carriers
TR-499
TR-496 ADM
29
ANSI
T1.105.xx Rates, Formats, etc...
T1.106 Optical Interfaces
T1.204 OAM&P
SONET Advantages :-
The SONET specifications define optional carrier (OC) interfaces and their electrical
equivalents to allow transmission of lower-rate signals at a common rate. Some of the
benefits of SONET are:
• Currently uses fiber optics as the primary transmission medium.
• Allows for dynamic drop and insert capabilities on the payload, without the delay or
additional hardware associated with demultiplexing and remultiplexing the higher rate
signal.
• Synchronous Networking: Plesiochronous capability allows integration with existing
synchronized networks. Timing may be extracted from an external source, or from the
received optical line signal.
• Speed: SONET allows for transmission rates from 51.84 Mb/s to the theoretical upper
limit of 13.2 Gb/s.
• Network Management: Bandwidth can be managed to the DS0 level to provide
maximum control of bandwidth regardless of the carrier system.
• Transport of Higher Order Services: SONET provides the flexibility to map and
transport many types of services, including ATM (Asynchronous Transfer Mode), SMDS
(Switched Multimegabit Data Service), BISDN (Broadband Integrated Services Digital
Networks), and FDDI (Fiber Data Distributed Interface).
(PoS), the traditional transmission of IP data over Sonet frames via PPP, is gradually
replaced by EoS in many cases.
EoS specifications account for the mapping, aligning, bandwidth management,
sequencing and delay compensation of the individual channels. The core technologies in
30
the EoS architectures are the encapsulation schemes to match Ethernet and SONET/SDH
rates effectively and manage bandwidth usage. Currently, there are a few encapsulation
techniques used: virtual concatenation (VC) and the link capacity adjustment scheme
(LCAS) techniques, the generic framing procedure (GFP) and link access procedure for
SDH (LAPS) technique.
What is a NOC?
A network operations center (NOC), is an organizational unit that:
•Handles day-to-day monitoring of the network
•Serves as a point of contact for customers, internal and external
•Creates, processes, and sometimes resolves events that arise in the network .
IP ADDRESSING:-
The Internet has grown larger than anyone ever imagined it could be. Although the exact
size is unknown, the current estimate is that there are about 100 million hosts and more
than 350 million users actively on the Internet. That is more than the entire population of
the United States! In fact, the rate of growth has been such that the Internet is effectively
doubling in size each year.
So what does the size of the Internet have to do with NAT? Everything! For a computer
to communicate with other computers and Web servers on the Internet, it must have an IP
address. An IP address (IP stands for Internet Protocol) is a unique 32-bit number that
31
identifies the location of your computer on a network. Basically, it works like your street
address -- as a way to find out exactly where you are and deliver information to you. JWE
WILL multicasting, testing or other special uses.
With the explosion of the Internet and the increase in home networks and business
networks, the number of available IP addresses is simply not enough. The obvious
solution is to redesign the address format to allow for more possible addresses. This is
being developed (called IPv6), but will take several years to implement because it
requires modification of the entire infrastructure of the Internet.
ERROR 691
1. Username does not exist
Check for username if it exists in the database. If not then search for it in DSL (north)
and encrypt it and push to LDAP. If it already exists in LDAP then delete it from the
database through user deletion and zip net and create it again manually.
2. Check for password
Password mismatch: Enter the username in the LDAP and verify if the user is entering
the correct username and password. If not then give the correct password. If yes then
verify if it is being authenticated from the server side by giving the commands mentioned
below on the telnet session.
Test aaa ppp <email id> <password>
If he is being authenticated then this means that the user is typing the wrong password.
If not then check whether the PVC has been made and whether its tag is confirmed.
Check out if any person is logged in by typing the following command:
Subscriber’s username <username>
If yes then log out the other subscribers by typing the command mentioned below:
Log out subscribers username<username>
If the problem still persists then check customer login status and delete radius sessions as
session hangs out sometimes.
3. Interface mismatch
Ask for his ip address.
Find out the correct interface through the command mentioned below on the ERX router:
Sh ip route <ip address>
Copy the interface and insert it inside the text box of the dynamic user updation.
4. Check for touchtelindia.net
The spelling of the email address or the field in it may be wrong.
5. Other reasons
a) Local address pool may be missing in LDAP.Give it inside the text box of the option
update local pool along with user id.
32
b) Package plan may be missing then policies won’t be implemented. So the
authentication failure exists.
Put the username in the textbox of option update rate plan.
ERROR 678
1.Check if the PVC has been made or not. If not then make it.
2.If the problem still persists then confirm the tag by locking and unlocking the cards.
Siemens
Making of PVC
1.Ask for the RSU and the tag.
2.Find the RSU in the main DSLAM sheet and copy corresponding interface.
3.Find that particular interface in erx2 notepad in case of interfaces (2/3,3/2,3/3,5/0,5/1)
and rest of them in erx1 notepad.
4.Now change the last 3 digits of the interface by asking the tag and ensure that the total
no. of digits are 8.
5.Copy the command from erx notepad and paste it on erx router.
In case of username being created for the first time, fill up the following entries in the
CAF:
a) Username
b) VPI
c) VCI
d) Interface
And encrypt and push to LDAP.Forward it in the OPS or installation as required.
In case of Ericsson and UT
1.Just fill the username.
2.Encrypt and push to LDAP.
3.Forward it to the required deptt.
Manual Creation of the user id
This is done incase JavaScript error comes up or if the entry is missing in LDAP and after
pushing to LDAP still the same error comes up. The following has to be done to resolve
this issue:
1.Go to zip net.
2.Give username and the region.
3.Click on continue.
4.A form appears.
5.Enter the required entries by seeing the record in DSL (north) CAF.
The following entries are to be filled:
a). First name
b). Middle name
c). Last name
d). Username
e). Password (Account id in CAF)
f). Package plan
g). Mail id [email protected]
6.Click the register button.
7.Check if not its entry is there in LDAP.
33
LOCK AND UNLOCK (Tag confirmation)
Siemens
1.Goto remote desktop.
2.Click on EMHIX5300 serva del.
3.Click on SNMP port.
4.Find for required region obtained from RSU in the main DSLAM sheet and the ip
address given in the main DSLAM sheet corresponding to the RSU
5.Click on the card for siemens.
6.Now lock the port by clicking on ADSL local.
7.Ask the user if his modem is off or not. If yes then the user’s tag is the one that he told.
8.If not then click on update status.
9.Make the user write all the active ports.
10.Now unlock the port determined through the calculations.
11.Again make the user write all the active ports again.
12.On comparing the 2 lists there will be one port missing which is the correct port of the
user.
NOTE: If on locking the users tag the modem does not go off then ask him to get his tag
confirmed from MDF.
CARD AND PORT CALCULATION (For siemens)
1. Take the last 3 digits of the tag.
2. Subtract 31 from it as the first 31 cards are used for controlling purposes.
3. Then again subtract the host entry of the previous card from the result.The following is
the required port: For eg:Given tag is S10200
34
COMMISSIONING AND PROVISIONING OF NEW SITES :
SIEMENS
For commissioning and expansion of new sites, SDH technology is used. SDH gives an
Ethernet drop both at the MSU n the RSU end. In case of SIEMENS at the RSU end
siemens dslam is connected to SDH DDF on w/c an Ethernet drop has been given by
SDH. This SDH DDF is connected to a fiber mgt system (FMS) w/c passes the optical
signal to the MUX whose o/p is an electrical signal E1.This E1 then passes to DDF
(SDH) w/c in turn goes to a DDF n then finally terminates onto the STM cards of the
ATM switch. Once we have the E1s coming to the ATM switch, E1s for that particular
siemens dslam at that particular site is up n the users connected to that dslam are now in
the n/w. The ATM switch is further connected to the BRAS (ERX) w/c through the
routers goes to the customer’s end.
UT
In case of UT the E1 passes from the DDF (SDH) to the central terminal (CT). On the
central terminal we have the EOE cards. One EOE card can support 8E1s.4E1s are
dedicated for 1 site, but at our end 2E1s are used for 1 site and the other 2E1s are
reserved in case there is some traffic.
ERICSSON
In case of Ericsson, E1s from the SDH DDF goes to the FE toE1 converter. Thus the E1s
are through and the users for that particular RSU are in the network.
ETHERNET DROP
It is a 2mb link given by the SDH on both the MSU and the RSU end. This Ethernet drop
is given by the SDH at the RSU (DDF) from where it is brought to the DDF at the MSU
and finally to the ATM switch, EOE cards at the central terminal or to the FE to E1
converters as the case may be.
E1 LINE :
E1 is the European format for digital transmission. E1 carries signals at 2 Mbps (32
channels at 64Kbps, with 2 channels reserved for signaling and controlling
EOE CARDS :
35
The cards on which the E1s for UT are terminated are known as the EOE cards i.e.
Ethernet to E1.There is fiber connectivity between the EOE cards at the MSU end and the
EOE cards at the RSU end. One EOE card supports 8E1s.4E1s are dedicated for 1 site.
But only 2E1s are used for 1 site. The other 2E1s are reserved in case there is some
traffic.
SIEMENS
There are 3 types of cards:
1.Low density: These support cards that have 2 slots of 32 ports each. Siemens have
stopped making these cards.
2.Medium high density: These support cards have 4 slots of 64 ports each.
3.High density: These support cards have 15 slots of 64 ports each.
The STM-1 frame is the basic transmission format for SDH. The frame lasts for
125 microseconds, therefore, there are 8000 frames per second.
The STM-1 frame consists of overhead plus a virtual container capacity. The first 9
columns of each frame make up the Section Overhead, and the last 261 columns make up
the Virtual Container (VC) capacity. The VC plus the pointers (H1, H2, H3 bytes) is
called the AU (Administrative Unit).
Carried within the VC capacity, which has its own frame structure of 9 rows and 261
columns, is the Path Overhead and the Container. The first column is for Path Overhead,
it is followed by the payload container, which can itself carry other containers.
Virtual Containers can have any phase alignment within the Administrative Unit, and this
alignment is indicated by the Pointer in row four, as will be described later in the
Pointers section. Within the Section Overhead, the first three rows are used for the
Regenerator Section Overhead, and the last 5 rows are used for the Multiplex Section
Overhead
36
The STM frame is transmitted in a byte-serial fashion, row-by-row, and is scrambled
immediately prior to transmission to ensure adequate clock timing content for
downstream regenerators.
1
Regenerator
2 Section
Overhead
3 Administrative Unit
Pointers 4 H1 H2 H3
H1H1H1 H2 H2 H2H3 H3H3
Capacity of the 9 Rows
5 Virtual Container
6 Multiplex +
7
Section
Overhead
Pointers
8
9
Virtual Container :-
SDH supports a concept called virtual containers (VC). Through the use of pointers and
offset values, VCs can be carried in the SDH payload as independent data packages. VCs
are used to transport lower-speed tributary signals. The figure below illustrates the
location of a VC-4 within the STM-1 frame. Note that it can start (indicated by the J1
path overhead byte) at any point within the STM-1 frame. The start location of the J1
byte is indicated by the pointer byte values.
Virtual containers can also be concatenated to provide more capacity in a flexible
fashion.
The following table lists the names and some of the parameters of the virtual containers.
37
Frame = 125 µ s Frame = 125 µ s Frame = 125 µ s
STM-1 = 270 Columns
1 A1 A1 A1 A2 A2 A2 J0/
Regenerator Z0
Section 2 B1 E1 F1
Overhead 3 D1 D2 D3
9 Rows
Pointers 4 H1 B2 B2 H2 H2 H2 H3 H3 H3
5 B2 K1 K2
J1 Unidad Administrativa
B3
6 D4 D5 D6
Multiplex C2
Bounded by 270 columns
Section 7
D7 D8 D9
G1
K3
N1
SDH Overhead :-
The SDH standard was developed using a client/server layer approach. The overhead and
transport functions are divided into layers. They are the:
• Regenerator Section,
• Multiplex Section.
• Path.
The layers have a hierarchical relationship, with each layer building on the services
provided by all the lower layers.
38
Path
Multiplex Section Multiplex Section
Legend
PTE= Path Terminating Element
Service (2Mbit/s,140Mbit/s ...) Service
REG= Regenerator
Mapping Mapping
ADM= Add/Drop Multiplexer
Demapping Demapping
The next pages detail the different SDH overhead information, specifically:
Regenerator Section Overhead;
Multiplex Overhead; and,
Path Overhead.
STM-1
J0/Z0
B2 B2
39
The Regenerator Section Overhead is found in the first three rows of Columns 1 - 9 of
the
STM-1 frame. Byte by byte, the Regenerator Section Overhead consists of:
Byte Description
A1 and A2 Framing bytes - These two bytes indicate the beginning of the STM- 1
frame. The A1, A2 bytes are unscrambled. A1 has the binary value
11110110, and A2 has the binary value 00101000. The frame alignment
word of an STM-N frame is composed of (3 x N) A1 bytes followed by
(3 x N) A2 bytes.
J0 Regenerator Section (RS) Trace message (ex-C1). It is used to
transmit a Section Access Point Identifier so that a section receiver can
verify its continued connection to the intended transmitter. The coding
of the J0 byte is the same as for J1 and J2 bytes. This byte is defined
only for STM-1 number 1 of an STM-N signal.
Z0 These bytes, which are located at positions S[1,6N+2] to S[1,7N] of an
STM-N signal (N > 1), are reserved for future international
standardisation.
B1 RS bit interleaved parity code (BIP-8) byte - This is a parity code
(even parity), used to check for transmission errors over a regenerator
section. Its value is calculated over all bits of the previous STM-N frame
after scrambling, then placed in the B1 byte of STM-1 before
scrambling. Therefore, this byte is defined only for STM-1 number 1 of
an STM-N signal.
E1 RS orderwire byte - This byte is allocated to be used as a local
orderwire channel for voice communication between regenerators, cross-
connects, and remote terminal locations.
F1 RS user channel byte - This byte is set aside for the users’ purposes; it
terminates at all section terminating equipment within a line; that is, it
can be read and/or written to at each section terminating equipment in
that line.
D1, D2, D3 RS data communications channel (DCC) bytes - Together, these three
bytes form a 192 kbit/s message channel providing a message-based
channel for Operations, Administration and Maintenance (OAM)
between pieces of section terminating equipment. The channel can be
used from a central location for alarms, control, monitoring,
administration and other communication needs. It is available for
internally generated, externally generated, or manufacturer-specific
messages.
40
The Multiplex Section Overhead contains the information required between the multiplex
section termination equipment at each end of the Multiplex section (that is, between
consecutive network elements excluding the regenerators).
STM-1
J0/Z0
B2 B2
Multiplex
Section
Byte Description
B2 Multiplex Section (MS) bit interleaved parity code (MS BIP-24) byte - This
bit interleaved parity 24 code is used to determine if a transmission error has
occurred over a multiplex section. It is even parity, and is calculated over all
bits of the MS Overhead and the STM-N frame of the previous STM-N frame
before scrambling. The value is placed in the B2 bytes of the MS Overhead
before scrambling. These bytes are provided for all STM-1 signals in an STM-
N signal.
K1 and K2 Automatic Protection Switching (APS channel) bytes - These two bytes are
used for MSP (Multiplex Section Protection) signaling between multiplex level
entities for
bi-directional automatic protection switching and for communicating Alarm
Indication Signal (AIS) and Remote Defect Indication (RDI) conditions.
D4 to D12 MS data communications channel (DCC) bytes - These 9 bytes form a 576
kbit/s message channel from a central location for OAM information (alarms,
control, maintenance, remote provisioning, monitoring, administration and other
communication needs). This message channel is available for internally
generated, externally generated, and manufacturer specific messages. A
protocol analyzer is required to access the MS-DCC information.
S1 S1 byte is used for synchronisation 1000 G.812 local
information. Bits 1 to 4 of this S1 byte 1001 Reserved
are used to carry the synchronisation 1010 Reserved
messages. The following is the 1011 Synchronous Equipment Timing
41
assignment of bit patterns to the four
synchronisation levels agreed to Source (SETS)
within ITU-T. 1100 Reserved
0000 Quality unknown (existing sync. 1101 Reserved
1110 Reserved
network) 1111 Do not use for synchronisation.
0001 Reserved This message may be emulated
0010 G.811 by
0011 Reserved equipment failures and will be
0100 G.812 transit emulated by a Multiplex Section
0101 Reserved AIS signal.
0110 Reserved
0111 Reserved
M1 The M1 byte of an STM-1 or the first STM-1 of an STM-N is used for a MS
layer remote error indication (MS-REI). Bits 2 to 8 of the M1 byte are used to
carry the error count of the interleaved bit blocks that the MS BIP-8 has
detected to be in error at the far end of the section. This value is truncated at 255
for STM-N >4.
E2 MS orderwire byte - This orderwire byte provides a 64 kbit/s channel between
multiplex entities for an express orderwire. It is a voice channel for use by
crafts persons and will be ignored as it passes through the regenerators.
The Path Overhead is assigned to, and transported with the Virtual Container from the
time it is created by path terminating equipment until the payload is demultiplexed at the
termination point in a piece of path terminating equipment.
42
1 J1 J1 VC-n Path Trace
2 B3 B3 Path BIP-8
3 C2 C2 Path Signal Label
4 G1 G1 Path Status
5 F2 F2 Path User Channel
6 H4 H4 TU Multiframe Indicator
7 F3 F3 Path User Channel (ex-Z3)
8 K3 K3 Automatic Protection Switching (ex-Z4)
9 N1 N1 Network Operator (ex-Z5)
Path Overhead
The Path Overhead is found in Rows 1 to 9 of the first column of the VC-4 or VC-3.
Byte by byte, the Path Overhead consists of:
C-3 async
G1 Path status byte - This byte is used to convey the path terminating status and
performance back to the originating path terminating equipment. Therefore the
bi-directional path in its entirety can be monitored, from either end of the path.
43
F2 Path user channel byte - This byte is used for user communication between path
elements.
H4 Tributary Unit (TU) multiframe indicator byte - This byte provides a
generalized multiframe indicator for payload containers. At present, it is used only
for tributary unit structured payloads. A 4-value incrementing count (0-3) is used
to indicate the frame number within a 2 Mbit/s multiframe structure.
F3 This byte is allocated for communication purposes between path elements and is
payload dependent.
K3 APS signalling is provided in K3 (b1-b4) bits, allocated for protection at the VC-
4/3 path levels.
K3 (b5-b8) bits are allocated for future use. These bits have no defined value. The
receiver is required to ignore their content.
N1 Network operator byte - This byte is allocated to provide a Higher-Order
Tandem Connection Monitoring (HO-TCM) function.
1 2 3 4 5 6 7 8
Bits 1 and 2 of the V5 byte are allocated for error performance monitoring. A Bit
Interleaved Parity (BIP) scheme is specified.
Bit 3 is a VC-2/VC-1 path Remote Error Indication (LP-REI) that is set to one and sent
back towards a VC-2/VC-1 path originator if one or more errors were detected by the
BIP-2, and is otherwise set to zero.
Bits 4 is a VC-2/VC-1 path Remote Failure Indication (LP-RFI). This bit is set to one if a
failure is declared, otherwise it is set to zero. A failure is a defect that persists beyond the
maximum time allocated to the transmission system protection mechanisms.
Bits 5 through 7 provide a VC-2/VC-1 signal label.
44
Virtual Container path REI coding: 0 = 0 errors
1 = 1 or more errors
The Virtual Container path Signal Label coding follows:
b5 b6 b7 Description
0 0 0 Unequipped or supervisory-
unequipped
0 0 1 Equipped - non-specific
0 1 0 Asynchronous
0 1 1 Bit synchronous
1 0 0 Byte synchronous
1 0 1 Reserved for future use
1 1 0 Test signal, O.181 specific mapping
1 1 1 VC-AIS
Bit 8 is set to 1 to indicate a VC-2/VC-1 path Remote Defect Indication (LP-RDI),
otherwise it is set to zero.
The SDH frame structure has been designed to contain a large amount of overhead
information. The overhead information provides for a variety of management and other
functions such as:
Alarm Indication Signals (AIS);
Error performance monitoring using BIP-n;
Pointer adjustment information;
Path status;
Path Trace;
Section Trace;
Remote Defect, Error, and Failure Indications;
Signal labels;
New Data Flag indications;
Data Communications Channels (DCC);
Automatic Protection Switching (APS) control;
Orderwire; and,
45
Much of this overhead information is involved with alarm and in-service monitoring of
the particular SDH sections. Table 4 and Figure 9, that follow the definitions, list the
criteria for errors and the performance monitoring for errors.
Definitions
Anomaly - The smallest discrepancy which can be observed between the actual and
desired characteristics of an item. The occurrence of a single anomaly does not constitute
an interruption in the ability to perform a required function. Examples of SDH Anomalies
are: B1 BIP; B2 BIP; Path B3 BIP; REI; and, Pattern Bit.
Defect - The density of anomalies has reached a level where the ability to perform a
required function has been interrupted. Defects are used as input for performance
monitoring, the control of consequent actions, and the determination of fault cause.
Examples of SDH Defects are:
Out-of-Frame; AIS; RDI; LOP; LOP; and LOM.
Failure - The inability of a function to perform a required action persisted beyond a
maximum time allocated.
Alarm - The maintenance signal used in the digital network to alert downstream
equipment that a defect or equipment failure has been detected.
46
Table 4. Anomalies, Defects, Failures, Alarms
Abbr. Description Criteria
LOS Loss of Signal LOS is raised when the synchronous signal (STM-N) level
drops below the threshold at which a BER of 1 in 103 is
predicted. It could be due to a cut cable, excessive
attenuation of the signal or equipment fault.
The LOS state will clear when two consecutive framing
patterns are received and no new LOS condition is detected.
OOF Out of Frame OOF state occurs when several consecutive SDH frames are
alignment received with invalid (errored) framing patterns (A1 and A2
bytes). The maximum time to detect OOF is 625
microseconds.
OOF state clears within 250 microseconds when two
consecutive SDH frames are received with valid framing
patterns.
LOF Loss of Frame LOF state occurs when the OOF state exists for a specified
alignment time in microseconds.
The LOF state clears when an in frame condition exists
continuously for a specified time in microseconds.
The time for detection and clearance is normally 3
milliseconds.
LOP Loss of Pointer LOP state occurs when N consecutive invalid pointers are
received or "N" consecutive New Data Flags (NDF) are
received (other than in a concatenation indicator), where N =
8,9 or 10.
LOP state is cleared when three equal valid pointers or three
consecutive AIS indications are received.
47
End Block Error).
48
Sequence synchronisation shall be considered to be lost and resynchronisation shall
be started if:
the bit error ratio is ≥ 0.20 during an integration interval of 1 second; or
it can be unambiguously identified that the test sequence and the reference sequence
are out of phase.
NOTE – One method to recognize the out-of-phase condition is the evaluation of the
error pattern resulting from the bit-by-bit comparison. If the error pattern has the
same structure as the pseudo-random test sequence, the out-of-phase condition is
reached.
Alarm Transmission
Alarm Detection
Figure 9 Interaction between defects and errors in forward and backward directions,
according to the different SDH levels.
49
SDH Pointer:-
SDH provides payload pointers to permit differences in the phase and frequency of the
Virtual Containers (VC-n) with respect to the STM-N frame. Lower-order pointers are
also provided to permit phase differences between VC-1/VC-2 and the higher-order VC-
3/VC-4.
AU-3 H1 H1 H1 H2 H2 H2 H3 H3 H3
1= All 1s
AU-4 H1 Y Y H2 1 1 H3 H3 H3 Y= 1001SS11
(S bits unspecified)
H1 and H2 Pointer bytes - These two bytes, the VC payload pointer, specify the location
of the VC frame. It is used to align the VC and STM-1 Section Overheads in
an STM-N signal, to perform frequency justification, and to indicate STM-1
concatenation.
H3 Pointer action byte - This byte is used for frequency justification. Depending
on the pointer value, the byte is used to adjust the fill input buffers. The byte
only carries valid information in the event of negative justification, otherwise
it is not defined.
One of SDH’s main advantages is that it is synchronous. On a frame by frame basis, the
payload pointer indicates the offset between the VC container and the STM-1 frame by
identifying the location of the first byte of the VC in the container. In other words, the
VC is allowed to “float” within the STM-N frame capacity.
To make this possible, within each STM-1 frame, there is a pointer, known as the VC
Payload Pointer, that indicates where the actual payload container starts. For a VC-4
payload, this pointer is located in columns 1 and 4 of the fourth row of the Section
Overhead. The bytes H1 and H2 (two 8-bit bytes) of the Overhead can be viewed as one
value.
The pointer value indicates the offset in bytes from the pointer to the first byte of the VC,
which is the J0 byte. Because the Section Overhead bytes are not counted, and starting
points are at 3-byte increments for a VC-4 payload, the possible range is:
Total STM-1 bytes - Section Overhead bytes = Pointer value range,
for example, (2430-81)/3 = 783 valid pointer positions
That is, the value of the pointer has a range of 0 to 782. For example, if the VC-4 Payload
Pointer has a value of 0, then the VC-4 begins in the byte adjacent to the H3 byte of the
50
Overhead; if the Payload Pointer has a value of 87, then the VC-4 begins in the byte
adjacent to the K2 byte of the Overhead in the next row.
The pointer value, which is a binary number, is carried in bits 7 through 16 of the pointer
word. The first four bits of the VC-n payload pointer make provision for indicating a
change in the VC, and thus an arbitrary change in the value of the pointer. These four
bits, the N-bits, are known as the New Data Flag. The VC pointer value that accompanies
the New Data Flag will indicate the new offset.
DTE/DCE Concepts :-
To fully understand the importance of the physical layer, various concepts will be defined
over the next several pages. The first concept is Data Terminating Equipment (DTE) and
Data Communications Equipment (DCE).
DTE This device converts information into data signals for transmission, or reconverts
the received data signals into user information. A DTE could be a host computer, front-
end processor (FEP), terminal, printer, controller, etc. It is a piece of equipment that, as
the name implies, terminates the data for a higher level of processing.
DCE This device is required to establish, maintain, and terminate a connection. ADCE
also performs signal conversion required for communications between the DTE and the
communication line. Typically, the DCE supplies the clock; however there are cases
when this is not possible or desirable. Certain data arrangements require that clocking for
the transmitted data be supplied by the DTE. This would require the DCE to phase-lock
to an external clock source. This source would be provided from the DTE or another
modem. A DCE could be a modem, Channel Service Unit/Data Service Unit
(CSU/DSU), Packet Assembler/Disassembler (PAD), uncombined multiplexer port, etc.
.
Virtual Concatenation (VC):-
51
A supporting technology to the Virtual Concatenation, LCAS dynamically changes the
amount a bandwidth used for a virtual concatenated channel and provides “tuning” of the
allocated bandwidth depends on customer needs. LCAS is also useful for fault tolerance
and protection since the protocol has the ability to remove failed links from the Virtually
Concatenated Group (VCG). Using Link Capacity Adjustment Scheme (LCAS),
signaling messages are exchanged within the SONET overhead in order to change the
number of tributaries being used by a VCG. The number of tributaries may be either
reduced or increased, and the resulting bandwidth change may be applied without loss of
data in the absence of network errors.
Type of high-level data link controller (HDLC), LAPS includes data link service and
protocol specification used in transporting IP packets over SDH networks. LAPS
provides a point-to-point unacknowledged connectionless service over SONET/SDH.
LAPS enables the encapsulation of IPv6, IPv4, PPP, and other higher-layer protocols.
Another key encapsulation scheme in EoS and more robust technology than LAPS, GFP
maps Ethernet packet data into an octet-synchronous transport such as SONET. GFP has
adapted the cell delineation protocol used by ATM to encapsulate variable length
packets. A fixed amount of overhead is required by the GFP encapsulation that is
independent of the contents of the packets. In contrast to HDLC whose overhead is data
dependent, the fixed amount of overhead per packet allows deterministic matching of
bandwidth between the Ethernet stream and the virtually concatenated SONET stream.
Within GFP, there are two different mapping modes defined: frame based mapping and
transparent mapping. Each mode is optimized for providing different services.
EQUIPMENT DETAILS:-
There are many types of MULTIPLEXER (equipment) are used in the C- NOC to
provide the different service to the Customers. Some of these equipment are:
XDM-2000
XDM-1000
XDM-100
BG-40
BG-20
Ulan
From these equipment some equipment details are given below:
52
BG-40 is a compact STM-1/STM-4-compatible multiservice transmission system
offering powerful expansion capabilities. Within its 2 U (88 mm) height, it can provide a
maximum of 88 E1 services, or 10 E3/DS-3 services, or 36 10BaseT/100BaseT Ethernet
services. It also supports six 155 Mbps optical or electrical interfaces, or two 622 Mbps
optical interfaces and two 155 Mbps optical or electrical interfaces simultaneously.
According to actual networking needs, it can be flexibly configured as TM, ADM, and
multi-ADM. In addition, it supports a variety of complete and flexible network-level
protection.
The BG-40 supports two power supply modes: -48 VDC and 220 VAC. In combination
with its multiservice access capability, small size, and low cost, it can be deployed widely
in various carrier MAN access layers and private communication networks.
Function Structure:-
BG-40 equipment is of high integrity. The height of the integrated equipment is 2 U (88
mm), so that it takes a smaller space in the equipment room. The dimensions of the BG-
40 are 88 mm × 432 mm × 300 mm(height × width × depth).
CHARTERSTICS :-
53
•System access capabilities:
•One to six 155 Mbps optical interfaces
•One to six 155 Mbps electrical interfaces
•One to three 622 Mbps optical interfaces
•8/16/32/40/63/72/80/88 channels of E1 services
•3/6/8/10 channels of E3/DS-3 services
•4/12/16/20/24/28/32/36 channels of 10BaseT/100BaseT Ethernet
services
•2/4 channels of GbE Ethernet services
•8/16/24 FXO/RD interfaces
•8/16/24 FXS/FXD interfaces
•6/12/18 2W/4W interfaces
•6/12/18 4W E&M interfaces
•8/16/24 V.24 transparent interfaces
•2/4/6 V.24 asynchronous interfaces with programmable control signals
•1/2/4 V.24 synchronous interfaces with programmable control signals
•2/4/6 V.35 interfaces
•Two 10BaseT Ethernet interfaces (with a bandwidth of 2.048 Mbps)
For the 155 Mbps or 622 Mbps optical interface, multiple distance specifications are
provided.
Function Structure :-
Mechanical Description :-
BG-20B equipment is of high integrity. The height of the integrated equipment is 1 U (44
mm), so that it takes a smaller space in the equipment room.
54
The dimensions of the BG-20B are 44 mm (1 U) x 430 mm x 240 mm (height × width ×
depth). The dimensions of the BG-20E are 88 mm (2 U) x 430 mm x 240 mm (height ×
width × depth).
REFERENCE:-
55
1. Modern digital and analog communication system (Sanjay Sharma)
56
THANK YOU
57