SDH Pocket Guides1 En

Embed Size (px)

Citation preview

  • 8/8/2019 SDH Pocket Guides1 En

    1/90

    D S y n c h r o n o u s D i g

    i t a l H i e r a

    r c h y

    P o c k e t

    G u i d e

  • 8/8/2019 SDH Pocket Guides1 En

    2/90

    Acterna isan active member of ITU-T

    Publisher: Acterna Eningen GmbHPostfach 12 6272795 Eningen u. A.Germanye-mail: [email protected]://www.acterna.com

    Author: Stephan Schultz

  • 8/8/2019 SDH Pocket Guides1 En

    3/90

  • 8/8/2019 SDH Pocket Guides1 En

    4/90

  • 8/8/2019 SDH Pocket Guides1 En

    5/90

  • 8/8/2019 SDH Pocket Guides1 En

    6/90

    6

    Insertingor dropping an individual 64-kbps channel toor from a higher digital hierarchyhowever requiresaconsiderable amount of complex and expensivemultiplexer equipment.

    Towards the end of the 1980s, the synchronousdigitalhierarchy(SDH)wasintroduced, pavingthewayfora world-wide, unified network structure. SDH is idealparticularlyfornetworkproviders,asitdeliversanefficient,economicalnetworkmanagement system that can be easily adaptedto accommodate the demand for bandwidth-hungryapplicationsand services.

    Thispocket guide aims to provide an introduction tosynchronouscommunicationswithout going into thebitsand bytes.

  • 8/8/2019 SDH Pocket Guides1 En

    7/90

    7

    Japanese standard

    397200 kbps

    97728 kbps

    32064 kbps 44736 kbps

    397200 kbps

    564992 kbps

    139264 kbps

    34368 kbps

    8448 kbps

    2048 kbps

    6312 kbps

    1544 kbps

    64 kbps

    x 4

    5.

    4.

    3.

    2. order

    primary rate

    x 6x 3

    x 7

    x 3

    x 24 x 30

    x 3

    x 4

    x 4

    x 4

    x 4

    x 5

    x 4

    European standardNorth American standard

    gure 1 Summary of plesiochronous transmission rates

  • 8/8/2019 SDH Pocket Guides1 En

    8/90

    8

    With the introduction of PCM technology in the 1960s, communicationsnetworks were gradually converted to digital technology during the yearsthat followed. To cope with the demand for ever-higher bit rates, a multiplexhierarchyorplesiosynchronous digital hierarchy(PDH)evolved.Thebit rates

    start withthebasic multiplex rateof 2 Mbpswithfurther stagesof 8,34, and140 Mbps. In North America and Japan, however the primary rate is 1.5 Mbpswith additional stages of 6 and 44 Mbps. This fundamental difference indevelopments made the set up of gateways between the networks bothdifficult and expensive.

    In response to the demand for increased bandwidth, reliability, and high-quality service, SDH developed steadily during the 1980s eliminating manyof the disadvantages inherent in PDH. In turn, network providers began tobenefit from the many technological and economic advantages this newtechnology introduced including:

    Transmissionratesofupto10GbpscanbeachievedinmodernSDHsystems

    making it the most suitable technology for backbones the superhighwaysin today's telecommunications networks.

    High transmission rates

    Why SDH?

  • 8/8/2019 SDH Pocket Guides1 En

    9/90

    9

    Compared to the older PDH system, low bit rate channels can be easilyextracted from and inserted into the high-speed bit streams in SDH. It isnow no longer necessary to apply the complex and costly procedure ofdemultiplexing then remultiplexing the plesiosynchronous structure.

    With SDH, network providers can reactquickly andeasily to the requirementsof their customers. For example, leased lines can be switched in a matter ofminutes. The network provider can use standardized network elements (NE)that can be controlled and monitored from a central location via a telecom-munications management network (TMN) system.

    Modern SDH networks include various automatic back-up circuit and repairmechanisms which are designed to cope with system faults and are moni-tored by management. As a result, failure of a link or an NE does not lead tofailure of the entire network.

    SDH is the ideal platform for a wide range of services including POTS, ISDN,mobile radio, and data communications (LAN, WAN, etc.). It is also able tohandle more recent services such as video on demand and digital videobroadcasting via ATM.

    Simplified add anddrop function

    High availabilityandcapacitymatching

    Reliability

    Future-proof platform for new services

  • 8/8/2019 SDH Pocket Guides1 En

    10/90

    10

    SDH makes it much easier to set up gateways between different networkproviders and to SONET systems. The SDH interfaces are globally standard-ized,making it possible to combine NEs from different manufacturers intoa single network thus reducing equipment costs.

    The trend in transport networks is toward ever-higher bit rates, such asSTM-256 (time division multiplex, TDM). The current high costs of such NEshowever are a restricting factor. The alternative lies in densewavelengthdivisionmultiplexing(DWDM),a technologyenabling themultiple useofsinglemode optical fibers. As a result, a numberofwavelengths can beused as carriers for the digital signals and transmitted simultaneouslythrough the fibers. (See DWDM Pocket Guide for more information.)

    Connected to the introduction of DWDM is the tendency toward the all-optical network. Optical add/drop multiplexers (OADM) are alreadyavailable commercially and the first field trials are in progress for opticalcross connects (OXC). In terms of the ISO-OSI layer model, this development

    basically means the introduction of an additional DWDM layer below theSDH layer (see figure 2). Future systems are therefore quite likely tocombine higher multiplex rates with the use of DWDM.

    Interconnection

  • 8/8/2019 SDH Pocket Guides1 En

    11/90

    11

    Telecommunications technologies are generally explained using so calledlayer models. SDH can also be depicted in the same way.

    SDH networks are subdivided into various layers directly related to the

    network topology. The lowest layer is the physical layer, which representsthe transmission medium. This is usually a glass fiber or possibly radioor satellite link. The regenerator section is the path between regenerators.Partof theregenerator sectionoverhead (RSOH) is available forthesignalingrequired within this layer.

    The remainder of the overhead, the multiplex section overhead (MSOH) isused for multiplex section needs. The multiplex section covers the part ofthe SDH link between multiplexers. The carriers or virtual containers (VC)are available as payload at the two ends of this section. The two VC layersrepresent a part of the mapping process. Mapping is the procedure wherebythe tributary signals, such as PDH and ATM are packed into SDH transportmodules. VC-4 mapping is used for 140-Mbps or ATM signals and VC-12

    mapping is used for 2-Mbps signals.

    The synchronousdigitalhierarchy in termsofalayer model

  • 8/8/2019 SDH Pocket Guides1 En

    12/90

    12

    Theuppermostlayerrepresents theapplicationsof theSDH transportnetwork.

    figure 2 The SDH layer model

    PSTN/ISDN

    VC-12 layer

    VC-4 layer

    Multiplex section

    Physical interface

    Regenerator section

    ATM IP

  • 8/8/2019 SDH Pocket Guides1 En

    13/90

    13

    figure 3 Path section designations

    PDHSDH

    Regeneratorsection

    Regeneratorsection

    Multiplexsection

    Multiplexsection

    SDH#

    Path

    SDHSDHregene-rator

    ATM

    IP IP

    SDHmultiplexer

    PDH

    ATMSDHmultiplexer

    Cross-connect

  • 8/8/2019 SDH Pocket Guides1 En

    14/90

    14

    Figure 4 is a schematic diagram of an SDH ring structure with varioustributaries. The mixture of different applications is typical of the datatransportedbySDH. Synchronousnetworksmust have theability to transmitplesiochronous signals as well as the capability to handle future services

    such as ATM. This requires the use of the various NEs which are discussedin this section.

    The components of asynchronous network

    figure 4 Schematic diagram of hybrid communications networks

    ADM

    DXC

    ADM

    LAN

    STM-1/STS-3c gateway to SONET

    STM-1, STM-4

    140 Mbps

    2 Mbps34 Mbps

    140 MbpsSTM-1STM-4

    34 Mbps

    8 Mbps

    2 Mbps

    STM-1

    ADM: Add Drop MultiplexerDXC: Digital Cross ConnectTM: Terminal Multiplexer

    STM-4/-162 Mbps34 Mbps

    140 Mbps2 Mbps

    ATMswitch

    TM

    ADM

  • 8/8/2019 SDH Pocket Guides1 En

    15/90

    15

    Current SDH networks are comprised of four types of NE. The topology(that is the ring or mesh structure) is governed by the requirements ofthe network provider.

    Regenerators, as the name implies, have the job of regenerating the clockand amplitude relationships of the incoming data signals which have beenattenuated and distorted by dispersion. They derive their clock signals fromthe incoming data stream. Messages are received by extracting various64-kbps channels (for example service channels E1, F1) in the regeneratorsection overhead (RSOH) and can also be output using these channels.

    Regenerators

    STM-NRegenerator

    STM-N

  • 8/8/2019 SDH Pocket Guides1 En

    16/90

    16

    Terminal multiplexers are used to combine plesiochronous and synchronousinput signals into higher bit rate STM-N signals.

    Plesiochronous and lower bit rate synchronous signals can be extractedfrom or inserted into high-speed SDH bit streams by means of ADMs. Thisfeature makes it possible to set up ring structures, which have the advan-tage that in the event of a fault, automatic back-up path switching ispossible using elements in the ring.

    Terminalmultiplexers

    Add/drop multiplexers(ADM)

    PDHSDH

    Terminalmultiplexer

    STM-N

    Add/DropMultiplexer

    STM-NSTM-N

    PDH SDH

  • 8/8/2019 SDH Pocket Guides1 En

    17/90

    17

    This NE has the widest range of functions. It allows mapping of PDHtributary signals into virtual containers as well as the switching ofvarious containers up to and including VC-4.

    Digitalcross-connects(DXC)

    Cross-connect

    STM-16

    STM-4

    STM-1

    140 Mbps

    34 Mbps

    2 Mbps

    140 Mbps

    34 Mbps

    2 Mbps

    STM-16

    STM-4

    STM-1

  • 8/8/2019 SDH Pocket Guides1 En

    18/90

    18

    The telecommunications management network (TMN) is also regarded asan element in the synchronous network (more information on TMN in theSDH network can be found on page 55). All the SDH network elementsmentioned so far are software-controlled and can thus be monitored andremotely controlled one of the most important features of SDH.

    OpticalfibersarethephysicalmediummostcommonlyusedinSDHnetworks.The advantage of these fibers is that they are not susceptible to interfer-ence and can transmit at very high speeds. The disadvantage is in therelatively high cost of procurement and installation. Singlemode fibersare the medium of choice in the first and second optical windows

    (1310 nm and 1550 nm).

    SDH signals can also be transmitted via radio link or satellite paths aflexible option when setting up transmission paths quickly, as part of amobile radio network or in difficult terrain. However, the limited bandwidth(currently up to STM-4) and complexity in linking such paths into the net-

    work management system are a disadvantage.

    Networkelementmanagement

  • 8/8/2019 SDH Pocket Guides1 En

    19/90

    19

    A frame with a bit rate of 155.52 Mbps is defined in ITU-T recommendationG.707 and is known as the synchronous transport module (STM). Since thisframe is the first level of the synchronous digital hierarchy, it is known asSTM-1 (see figure 5). It comprises a byte matrix of 9 rows and 270 columns.Transmission is row by row, starting with the byte in the upper left cornerand ending with the byte in the lower right corner. The frame repetition rateis125 s.Eachbytein the payload represents a 64-kbpschannel. The STM-1frame is capable of transporting any PDH tributary signal ( 140 Mbps).

    figure 5 Schematic diagram of STM-1 frame

    Payload (transport capacity)

    270 columns (Bytes)

    RSOH

    AU pointer

    MSOH

    1

    345

    9

    1 270Transmitrow by row

    The STM-1 frame format

  • 8/8/2019 SDH Pocket Guides1 En

    20/90

    20

    The first nine bytes in each of the nine rows are called the overhead. G.707makes a distinction between the RSOH and the MSOH. The reason for thisis so that the functions of certain overhead bytes can be coupled with thenetwork architecture. The table below describes the individual functionsof the bytes.

    Section overhead (SOH)

    figure 6 Overview of STM-1overhead A1

    B1 E1

    D1

    AU pointer

    D2

    A1

    A1 A2

    B2

    D4

    D7

    D10

    S1

    D6

    D9

    D12

    E2

    D5

    D8

    D11

    M1

    B2 B2 K1

    K2

    A2 A2

    E1

    D3

    J0 X X

    X

    X Reserved for national use

    Media-dependent use (radio-link, satellite)

    X

  • 8/8/2019 SDH Pocket Guides1 En

    21/90

    21

    Overhead byte Function

    A1, A2 Frame alignmentB1, B2 Quality monitoring, parity bytesD1 . . . D3 QECC network management

    D4 . . . D12 QECC network managementE1, E2 Voice connectionF1 Maintenance J0 (C1) Trace identifierK1, K2 Automatic protection switching (APS) controlS1 Clock quality indicatorM1 Transmission error acknowledgment

    table 1 Overhead bytes and their functions

  • 8/8/2019 SDH Pocket Guides1 En

    22/90

    22

    VC-3/4 POH

    Path overhead

    J1

    B3

    C2

    G1

    F2

    H4

    F3

    K3

    N1

    Path indication

    Quality monitoring

    Container format

    Transmission error acknowledgment

    Maintenance

    Superframe indication

    Maintenance

    Automatic protection switching

    Tandem connection monitoring

    V5J2

    N2

    K4

    Indication and error monitoringPath indication

    tandem connection monitoring

    Automatic protection switching

    The VC-3/4 POH is the high-orderpath overhead. This path is fortransporting 140 Mbps, 34 Mbps,and ATM signals.

    The VC-11/12 POH is used for thelow-order path. ATM signals and bitrates of1.544 Mbpsand 2.048 Mbpsare transported within this path.

    VC-11/12 POH

    The path overhead (POH) when combined with a container forms a virtualcontainer. The POH has the task of monitoring quality and indicating thetype of container. The format and size of the POH depends on the containertype. A distinction is made between two different POH types VC-3/4 POHand VC-11/12 POH.

  • 8/8/2019 SDH Pocket Guides1 En

    23/90

    23

    The heterogeneous nature of modern network structures has made itnecessary for all PDH, ATM. and IP signals to be transported over the SDHnetwork. The process of matching the signals to the network is calledmapping. The container is the basic package unit for tributary channels.A special container (C-n) is provided for each PDH tributary signal and isalwayssignificantlylargerthanthepayloadtobetransported.Theremainingcapacity is partly used for justification (stuffing) in order to equalize out-timing inaccuracies in the PDH signals.

    Where synchronous tributaries are mapped, fixed fill bytes are insertedinstead of justification bytes. A virtual container (VC-n) is made up of the

    container formed, together with the path overhead (POH). This is trans-mitted unchanged over a path through the network. The next step towardsformation of a complete STM-N signal is the addition of a pointer indicatingthe start of the POH. The unit formed by the pointer and the virtual containeris referred to as the administrative unit (AU-n) or tributary unit (TU-n).

    Several TUs together form a tributary unit group (TUG-n) that in turn iscollected together into a VC. One or more AUs form an administrative unitgroup (AUG). Finally, the AUG plus the SOH form the STM-N.

    How are PDH, ATM andIP signals transportedby SDH?

  • 8/8/2019 SDH Pocket Guides1 En

    24/90

    24

    Container

    Path overhead

    Pointer

    Section overhead

    Plesiochronous signal 140 Mbps

    Virtual container

    Administrative unit

    Synchronous Transport Module

    C4

    VC4

    AU-4 = AUG

    STM-1

    figure 7 Inserting a 140-Mbps tributary into an STM-1

  • 8/8/2019 SDH Pocket Guides1 En

    25/90

    25

    ATM signals can be transported in the SDH network in C11, C12, C3, and C4containers. Sincethecontainertransport capacitydoesnotmeet thecontinuallyincreasing ATM bandwidth requirement, methods have been developed fortransmitting the ATM payload in a multiple (n) C-4 (virtual or contiguous con-catenation). As an example, a quadruple C-4 can be transmitted in an STM-4(see section on Contiguous concatenation).

    The increased Internet traffic requires a technology to transport the IP packetsto the physical layer. This transport below IP is described by Packet overSONET/SDH, as one possible route.

    FromthenetworklayertheIPpacketsneedtobedeliveredtotheunderlyinglayers:the datalink and physical layers. The actual transmission below the transportlayer is called Packet over SONET/SDH (PoS).

    This transmission can be achieved via alternative routes, two of whichare illustrated in figure 8.

    IP InternetProtocol

  • 8/8/2019 SDH Pocket Guides1 En

    26/90

    figure 8 Alternative routes to transmit IP packets to the fiber

    26

    IP

    PPP

    HDLS

    SDH/SONET

    Fiber

    ATM

    The route chosen (indicated by the solid line) is recommended by theInternet Engineering Task Force (IETF).

  • 8/8/2019 SDH Pocket Guides1 En

    27/90

    27

    STM-64x1

    x4

    x4

    x4

    x4

    x3

    Pointer processing

    x1

    x7 x7

    AUG64

    STM-16x1 x1

    AUG16

    STM-4x1

    AUG16

    STM-1x1

    x1

    AUG16

    STM-0

    x1

    x1

    x1x3

    x1

    x3

    x4

    AU-4-16c

    AU-4-4c

    AU-4

    AU-3 VC-3

    VC-3TUG-3

    TU-2

    TU-11

    TU-12

    VC-4-16c

    VC-4-4c

    VC-4

    ATM/IP: 2 396 160 kbps

    ATM/IP: 599 040 kbps

    ATM: 149 760 kbps

    E4: 139 264 kbps

    ATM: 6 874 kbps

    DS2: 6 312 kbps

    ATM: 2 144 kbps

    E1: 2 048 kbps

    ATM: 1 600 kbps

    DS1: 1 544 kbps

    C-3

    C-2

    C-12

    C-11

    VC-12

    VC-2

    C-4

    C-4-4-c

    C-4-16c

    x1AU-4-64c VC-4-64c

    ATM/IP: 9 584 640 kbps

    C-4-64c

    STM-256x1

    AUG256x1

    AU-4-256c VC-4-256c

    ATM/IP: 38 338 560 kbps

    C-4-256c

    TUG-3

    TUG-2

    VC-11

    ATM: 48 384 kbpsDS3: 44 736 kbpsE3: 34 368 kbps

    figure 9 Mapping in SDH

  • 8/8/2019 SDH Pocket Guides1 En

    28/90

    The differences betweenSDH and SONET

    28

    Figure 9 gives an overview of the mappings currently possible according toATMmappingandITU-TrecommendationG.707.Apointworthmentioningis the so-called sub-STM or STM-0 signal, an interface used in SDH/SONETlinks, radio links and satellite connections. The STM-0 has a bit rate of51.84 Mbps.

    SDH is used worldwide with the exception of the USA, Canada, and Japan.Specification on the synchronous optical network (SONET) transmissiontechnology the American equivalent of SDH began in the USA duringthe mid 1980s. SONET has a base bit rate of 51.84 Mbps and is designatedSTS-1 (synchronous transport signal). When bit rate is transmitted over an

    optical cable system, the signal is designated OC-1 (optical container).Table 2 details the additional SONET and equivalent SDH signals and bitrate levels in the hierarchy.

  • 8/8/2019 SDH Pocket Guides1 En

    29/90

    29

    SONET signal Bit rates Equivalent SDH signal

    STS-1 OC-1 51.84 Mbps STM-0STS-3 OC-3 155.52 Mbps STM-1STS-12 OC-12 622.08 Mbps STM-4STS-48* OC-48 2488.32 Mbps STM-16STS-192* OC-192 9953.28 Mbps STM-64STS-768 OC-768 39813.12 Mbps STM-256

    These hierarchy levels basically match the plesiosynchronous bit ratescommonly used in these countries. Of all the levels listed above, only STS-1,OC-3, OC-12, OC-48 and OC-192 are currently utilized.

    As the table indicates, there are points where transition between SDH andSONET systems are possible. Matching is relatively simple, as gateway issueswere taken into consideration during development of SDH. Only minor adjust-ments need to be made to certain overhead bytes. SONET terminology ishowever, quite different with the packing unit for example referred to as avirtual tributary (VT-n) as opposed to virtual container.

    table 2 SONET/SDH signal and bit rate hierarchy

  • 8/8/2019 SDH Pocket Guides1 En

    30/90

    STS-768c SPE

    STS-12c SPE

    STS-3c SPE

    STS-1 SPE

    VT-group

    STS-3c

    STS-12c

    STS-48c SPESTS-48c

    STS-192c SPESTS-192c

    STS-1

    STS-768c

    VT2

    VT 1.5

    VT6 SPE

    VT2 SPE

    VT1 SPE

    VT3

    STS-N

    Pointer processing

    x1

    x1

    x3

    x4

    x7

    x1,4,16,32

    x1,4,16,64,192

    x1,3,12,48,192,768

    ATM/IP:38 338 560 kbps

    ATM/IP:599 040 kbps

    x1,4,16 ATM/IP:599 040 kbps

    x1,4

    x1

    ATM/IP:9 584 640 kbps

    E4: 139.264 kbpsATMDS3: 44.736 kbpsE3: 34.368 kbpsATM

    ATM/IP:2 396 160 kbps

    ATM/IP:2 396 160 kbps

    ATM/IP:2 396 160 kbps

    figure 10 SONET multiplexing scheme

    30

    i d

  • 8/8/2019 SDH Pocket Guides1 En

    31/90

    31

    The use of pointer procedures also gives synchronous communications adistinct advantage over the plesiochronous hierarchy. Pointers are used tolocalize individual virtual containers in the payload of the synchronoustransport module. The pointer may directly indicate a single VC-n virtualcontainer from the upper level of the STM-1 frame. Chained pointer structures

    can also be used. The AU-4 pointer initially indicates the VC-4 overhead.Three further pointers are located at fixed positions in the VC-4 and are usedto indicate the start of the three VC-3 virtual containers relative to the VC-4.Figure 11 illustrates the pointer procedure using C3 mapping as an example.

    Pointer procedures

  • 8/8/2019 SDH Pocket Guides1 En

    32/90

    32

    figure 11 Schematic diagram of C-3 mapping

    J1

    B3C2G1F2H4F3

    J1B3C2G1F2

    H4F3K3N1

    H1

    H3H2

    H1

    H3H2

    H1

    H3H2

    Fixed justification

    260

    2619

    MSOH

    AU pointer

    RSOH

    K3N1

    J1B3

    C2G1F2H4F3K3N1

    84

    J1

    B3C2G1F2H4F3K3N1

    J1B3C2G1F2H4F3K3N1

    C-334 Mbit/s

  • 8/8/2019 SDH Pocket Guides1 En

    33/90

    33

    SDH multiplexers are controlled from a highly accurate central clock sourcerunning at 2.048 MHz. Pointer adjustment may be necessary if phasevariations occur in the real network or if the connection is fed through thenetworks of different providers. The AU pointer can be altered in everyfourth frame with prior indication. The virtual container is then shifted byprecisely three bytes. Pointer activity is therefore a good indication ofclock variations within a network.

    If h i i hif d l i i i ( h i h i fi 12) h

  • 8/8/2019 SDH Pocket Guides1 En

    34/90

    34

    If the pointer is shifted to a later point in time (to the right in figure 12), thethree bytes immediately preceding it are ignored. If the transmitting source isin advance of the actual clock, space for extra capacity must be provided.This takes place at the pointer position into which three bytes are insertedeach time. If a further clock adjustment is not made, this configuration is

    propagated throughout the network.

    figure 12 Negativepointer justification

    SOH

    Virtual

    Virtual

    Negative justification bytes

    Frame n

    Frame n+1

    Frame n+2

    Frame n+3

    Container

    Container

    Thi ll f th f i ti i ti f i l i t th t hi h

  • 8/8/2019 SDH Pocket Guides1 En

    35/90

    35

    This allows for the free insertion in time of user signals into the next higherframe structure in the form of virtual containers without the need for largerbuffers. However, changes in the phase location of the virtual container relativeto the superior frame can be corrected by appropriate pointer actions. Suchchanges and shifts in phase can be caused by changes in propagation, delay

    in the transmission medium or by non-synchronous branches in the real network.

    When a multiplex bundle is resolved, pointer procedures make it immediatelypossible to locate every user channel from each STM-N frame, which consid-erably simplifies drop and insert operations within a network node. In contrast,complete demultiplexing of every level of a plesiochronous hierarchy signal isrequired in order to access a particular tributary channel.

    This mechanism is provided to allow bit rates in excess of the capacity ofAU 4contiguous

  • 8/8/2019 SDH Pocket Guides1 En

    36/90

    36

    This mechanism is provided to allow bit rates in excess of the capacity ofthe C-4 container to be transmitted. For example, the AU-4-4c is intendedfor transporting B-ISDN bit rates. The advantage of this method is that thepayload does not have to be split up, since a virtually contiguous containeris formed within an STM-4. The payloads of several consecutive AU-4sare linked by setting all the pointers to a fixed value the concatenationindicator (CI) with the exception of the pointer for the first AU-4. If pointeractivity becomes necessary, this takes place for all concatenated AU-4sequally.Figure13illustrateshowthepayloadofATMcellscanbetransmittedas a whole.

    AU-4 contiguousconcatenation

    figure 13 Virtual concatenation

  • 8/8/2019 SDH Pocket Guides1 En

    37/90

    37

    The first pointer indicates byte J1. All other pointers are set toconcatenation indication (CI) ATM Cell.

    figure 13 Virtual concatenation

    J1B3C2G1F2H4F3K3N1

    C-4-4c

    VC-4-4c

    STM-4

    F i x e

    d s

    t u f f

    F i x e

    d s

    t u f f

    F i x e

    d s

    t u f f

    4 x 2614 x 9 bytes

    MSOH

    AU-4 Pointers

    RSOH

    ATM cell

    If the cross-connects in the SDH network are unable to switch completeAU-4 virtual

  • 8/8/2019 SDH Pocket Guides1 En

    38/90

    VC-4-4c

    622 Mbps

    STM-4c port STM-4c port STM-4c port

    SDH cross-connect for VC-4

    STM-4c port

    622 Mbps

    600 Mbps

    VC-4

    VC-4VC-4

    VC-4

    150 Mbps

    VC-4-4c

    600 Mbps

    ATMswitch

    OutIn

    ATMswitch

    InOut

    OutIn

    InOut

    38

    If the cross-connects in the SDH network are unable to switch completeVC-4-4cs, the method described previously cannot be used to transmit ATMpayloads. On the transmit side, four complete VC-4s with four identicalpointer values are combined into an AUG. The individual VC-4s are trans-ported independently through the network. Ensuring the integrity of thepayload is the task of the NE on the receiving side. These NEs reassemblethe payload of the individual virtually concatenated VC-4s into a unit, evenif different pointer values are present.

    figure 14 Principle of contiguous concatenation

    AU 4 virtualconcatenation

    Transmission at higher To achieve higher bit rates AU-3/4s are multiplexed into STM-N frames

  • 8/8/2019 SDH Pocket Guides1 En

    39/90

    39

    Transmission at higherhierarchy levels

    To achieve higher bit rates, AU 3/4s are multiplexed into STM N frames.The following hierarchy levels are defined in SDH:STM-1 155.52 MbpsSTM-4 622.08 MbpsSTM-16 2488.32 MbpsSTM-64 9953.28 MbpsSTM-256 39813.12 Mbps

    The STM-N frame structures are basically N times the STM-1 structure.For example, the STM-4 overhead is four times the size of the STM-1 over-head. The SOH content is specified for each stage individually. For this, the

    A1, A2and B2bytes are formedN times.The frame alignment ofan STM-256frameiscomposedof64A1bytes(byteNo.705toNo.768)followedby64A2bytes. The other bytes are reserved for future international standardization.

    Large numbers of alarm and error messages are an integral part of SDHError and alarm

  • 8/8/2019 SDH Pocket Guides1 En

    40/90

    40

    Large numbers of alarm and error messages are an integral part of SDHnetworks.InSDH,thesearereferredtoasdefectsandanomalies,respectively.They are coupled to network sections and the corresponding overhead infor-mation. The advantage of this detailed information is illustrated as follows.Complete failure of a circuit results for example, in a loss of signal (LOS)alarm in the receiving NE. This alarm triggers a complete chain of sub-sequent messages in the form of alarm indications signals (AIS) as shownin figure 15. The transmitting side is informed of the failure by the returnof a remotedefectindication (RDI) alarm.Thealarm messages are trans-mitted in fixed bytes in the SOH or POH. For example, byte G1 is used forthe HP-RDI alarm.

    Error and alarmmonitoring

    figure 15 Overview of major defects STMN Alarm scheme

  • 8/8/2019 SDH Pocket Guides1 En

    41/90

    41

    g jand anomalies

    SDH multiplexer SDH regenerator SDH multiplexer

    STMN Alarm scheme

    High order path

    Multiplex section

    Regenerator section

    LOS/LOF MS-AIS

    MS-RDI

    MS-RDI

    MS-RDI

    HP-RDI

    HP-REI

    AIS AIS

    K2

    K2

    B1

    M1

    G1

    BIP Err.

    B1

    MS-BIP

    B1

    MS-BIP

    If the received signal contains bit errors, the sensor indicates BIP errors.

  • 8/8/2019 SDH Pocket Guides1 En

    42/90

    42

    g ,Since this is not the same as a complete failure of the circuit, the alarmhere is referred to as an anomaly that is indicated back in the direction oftransmission. The return message is referred to as a remote error indication(REI). Table 3 lists the possible defects and anomalies, the corresponding

    bytes, and their definitions.

    Anomalies/Defects Detection criteria

    LOS Loss of signal Drop in incoming opticalpower level causes high

    bit error rateOOF Out of frame A1, A2 errored for 625 sLOF Loss of frame If OOF persists for 3 ms

    (to be defined)RS BIP Error Regenerator Section Mismatch of the recovered

    BIP Error (B1) and computed BIP-8Covers the wholeSTM-N frame

    RS-TIM Regenerator Section Mismatch of the acceptedTrace Identifier Mismatch and expected Trace

    Identifier in byte J0

    table 3 Anomalies and defects in SDH

    Anomalies/Defects Detection criteriatable 3 (continued)

  • 8/8/2019 SDH Pocket Guides1 En

    43/90

    43

    MS BIP Error Multiplex Section BIP Mismatch of the recoveredError (B2) and computed N x BIP-24

    Covers the whole frame

    except RSOHMS-AIS Multiplex Section K2 (bits 6, 7, 8) = 111

    Alarm Indication Signal for 3 frames

    MS-REI Multiplex Section Number of detected B2Remote Error Indication errors in the sink side

    encoded in byte M1 of the

    source sideMS-RDI Multiplex Section K2 (bits 6, 7 8) = 111 for

    Remote Defect Indication z frames (z = 3 to 5)AU-AIS Administrative Unit All ones in the AU pointer

    Alarm Indication Signal bytes H1 and H2AU-LOP Administrative Unit 8 to 10 NDF enable 8 to 10

    Loss of Pointer invalid pointersHP BIP Error HO Path BIP Error (B3) Mismatch of the recovered

    and computed BIP-8Covers entire VC-n

    HP-UNEQ HO Path Unequipped C2 = 0 for 5 frames

    Anomalies/Defects Detection criteriatable 3 (continued)

  • 8/8/2019 SDH Pocket Guides1 En

    44/90

    44

    HP-TIM HO Path Trace Identifier Mismatch of the acceptedMismatch and expected Trace

    Identifier in byte J1

    HP-REI HO Path Number of detected B3Remote Error Indication errors in the sink side

    encoded in byte G1 (bits 1,2, 3, 4) of the source side

    HP-RDI HO Path G1 (bit 5) = 1 for zRemote Defect Indication frames (z = 3, 5 or 10)

    HP-PLM HO Path Mismatch of the acceptedPayload Label Mismatch and expected Payload

    Label in byte C2TU-LOM Loss of Multiframe H4 (bits 7, 8) multiframe

    X = 1 to 5 ms not recovered for X msTU-AIS Tributary Unit All ones in the TU pointer

    Alarm Indication Signal bytes V1 and V2TU-LOS Tributary Unit 8 to 10 NDF enable 8 to 10

    Loss of Pointer invalid pointers

    Anomalies/Defects Detection criteriatable 3 (continued)

  • 8/8/2019 SDH Pocket Guides1 En

    45/90

    45

    LP BIP Error LO Path BIP Error Mismatch of the recoveredand computed BIP-8 (B3)or BIP-2 (V5 bits 1, 2)

    Covers entire VC-nLP-UNEQ LO Path Unequipped VC-3: C2 = 0 for 5 frames

    frames VC-m (m = 2, 11,12): V5 (bits 5, 6, 7) = 000for 5 multiframes

    LP-TIM LO Path Trace Mismatch of the accepted

    Identifier Mismatch and expected TraceIdentifier in byte J1(VC-3) or J2

    Anomalies/Defects Detection criteriatable 3 (continued)

  • 8/8/2019 SDH Pocket Guides1 En

    46/90

    46

    LP-REI LO Path VC-3: Number of detectedRemoteError Indication B3 errors in the sink side

    encoded in byte G1 (bits 1,

    2, 3, 4) of the source sideVC-m (m = 2, 11, 12): Ifone or more BIP-2 errorsdetected in the sink side,byte V5 (bits 3) = 1 on thesource side

    LP-RDI LO Path VC-3: G1 (bit 5) = 1 for

    zRemote Defect Indication frames VC-m (m = 2, 11,

    12): V5 (bit 8) = 1 for zmultiframes (z = 3, 5 or 10)

    LP-PLM LO Path Mismatch of the acceptedPayload Label Mismatch and expected Payload

    Label in byte C2 or V5(bits 5, 6, 7)

    Modern society is almost completely dependent on communications tech-Back-up networkswitching

  • 8/8/2019 SDH Pocket Guides1 En

    47/90

    47

    nology. Network failures,whether dueto human error or faulty technology, canbe expensive for users and network providers alike. As a result, the subjectof fall-back mechanisms is currently one of the most discussed in SDH.A wide range of standardized mechanisms has been incorporated into syn-

    chronous networks in order to compensate for failures in network elements.

    Two basic types of protection architecture are distinguished in APS: linearprotection mechanism, which is used for point-to-point connections, andring protection mechanism, which can take on many different forms. Bothmechanisms use spare circuits or components to provide the back-up path.

    Switching is controlled by the overhead bytes K1 and K2.

    The simplest form of back-up is the so-called 1 + 1 APS, where each workingline is protected by one protection line. If a defect occurs, the protectionagent in the NEs at both ends switches the circuit over to the protection line.The switchover is triggered by a defect such as LOS. Switching at the far endis initiated by the return of an acknowledgment in the backward channel.

    Automatic protectionswitching (APS)

    Linear protection

    1+1architecture includes 100 percent redundancy, as there is a spare line

  • 8/8/2019 SDH Pocket Guides1 En

    48/90

    48

    for eachworking line. Economic considerations have led to the preferentialuse of 1:N architecture,particularly for long-distancepaths. Here,severalworking lines are protected by a single back-up line. If switching isnecessary, the two ends of the affected path are switched over to the

    back-up line.

    The 1+1 and 1:N protection mechanisms are standardized in ITU-T recom-mendation G.783. The reserve circuits can be used for lower-priority traffic,which can simply be interrupted if the circuit is needed to replace a failedworking line.

    figure 16 Linear protection schemes

  • 8/8/2019 SDH Pocket Guides1 En

    49/90

    49

    W

    P

    1+1 protection scheme

    1:1 protection scheme

    1:N protection scheme

    W

    P

    W

    P

    W

    The greater the communications bandwidth carried by optical fibers, thehi h th t i i i t t h d ith li t

    Ring protection

  • 8/8/2019 SDH Pocket Guides1 En

    50/90

    50

    higher the cost saving in ring structures when compared with linear struc-tures. A ring is the simplest and most cost-effective way of linking anumber of network elements.

    A number of protection mechanisms are available for this type of networkarchitecture,someofwhichhavebeenstandardizedinITU-TrecommendationG.841. There are some basic distinctions to be observed however betweenring structures with unidirectional and bidirectional connections.

    Figure17showsthebasicprincipleofAPSforunidirectionalrings.Assuming

    an interruption in the circuit occurs between network elements A and B,direction y would be unaffected. An alternative path would however have tobe found for direction x. The connection would therefore be switched to thealternative path in NEs A and B while the other NEs (C and D) would switchthrough the back-up path. This is known as a line-switched process.A simpler method would be to use the path-switched ring (figure 18).In this case, traffic would be transmitted simultaneously over both theworking and protection line. Should there be an interruption, the receiver(in this case A) would switch to the protection line and immediately takeup the connection.

    Unidirectional rings

    B B

    figure 17 Two-fiber unidirectional path switched ring

  • 8/8/2019 SDH Pocket Guides1 En

    51/90

    51

    xy

    xy

    D

    A C A C

    B B

    xy

    xy

    D

    working lineprotection line

    path switched ring

    In this network structure, connections between NEs are bidirectional(figure 18) The overall capacity of the network can be split up for several

    Bidirectional rings

  • 8/8/2019 SDH Pocket Guides1 En

    52/90

    52

    (figure 18). The overall capacity of the network can be split up for severalpaths, each with one bidirectional working line. For unidirectional rings, anentire virtual ring is required for each path. If a fault occurs between neigh-boring elements A and B, network element B triggers protection switching

    and controls network element A by means of the K1 and K2 bytes in the SOH.

    Bidirectional rings with four fibers provide even greater protection. Eachpair of fibers transports working and protection channels. This results in1:1 protection, that is 100 percent redundant. This improved protection ishowever coupled with relatively high costs.

    figure 18 Two-fiber bidirectional line-switched ring (BLSR) working line protection line

    xy

    y y

    x

    D

    A C A C

    B B

    xy

    x

    D

    working line

    protection line

    If synchronization is not guaranteed, this can result in considerable degra-dation in network functionality and even total failure To avoid such

    Synchronization

  • 8/8/2019 SDH Pocket Guides1 En

    53/90

    53

    dation in network functionality and even total failure. To avoid suchscenarios, all NEs are synchronized to a central clock. This central clock isgenerated by a high-precision, primary reference clock (PRC) unit conform-ing to ITU-T recommendation G.811. This specifies an accuracy of 1x10-11.

    This clock signal must be distributed throughout the entire network.A hierarchical structure is used, in which the signal is passed on by thesubordinate synchronization supply units (SSU) and synchronous equip-ment clocks (SEC). The synchronization signal paths can be the same asthose used for SDH communications.

    figure 19 Clock supply hierarchy

    structure PRCG.811

    SSUG.812

    SECG.813

    SECG.813

    SSUG.812

    SECG.813

    SECG.813

  • 8/8/2019 SDH Pocket Guides1 En

    54/90

    Theprincipleof telecommunicationsmanagementnetwork(TMN)technologywas established in 1989, with the publication by the CCITT (now ITU-T)

    Telecommunicationsmanagement network

  • 8/8/2019 SDH Pocket Guides1 En

    55/90

    55

    was established in 1989, with the publication by the CCITT (now ITU T)recommendationM.3010.ThefunctionsofaTMNareexpressedas:operation,administration, maintenance, and provisioning (OAM&P). This includesmonitoring of network performance and checking of error messages, among

    other things.

    To provide these functions, TMN uses object-oriented techniques based onthe open system interconnection (OSI) reference model. The TMN modelcomprises one manager, that handles several agents. The agents in turneach handle several managed objects (MOs). The manager is included inthe operating system (OS) which forms thecontrol center for the networkas a whole or in part. In SDH networks, the agents are located in the NEs.An MO may be a physical unit, for example a plug-in card, or multiplexsection,butcanalso occuras a logical element suchasa virtual connection).TMN can also distinguish between logical management units. For example,one management unit operates at network level, handling individual NEs.Another management unit operates at the service level to monitor billing

    charges for example.

    management network(TMN) in the SDH network

    These tasks are performed in modern telecommunications networks byusing the common management information protocol (CMIP). The simple

  • 8/8/2019 SDH Pocket Guides1 En

    56/90

    56

    g g p ( ) pnetwork management protocol (SNMP) is often mentioned in this contextand is basically a simplified form of CMIP. SNMP is mainly used in datacommunications, however, and cannot cope with the requirements of large

    telecommunicationsnetworks.TheQ3interface,whichiswheretheexchangeof data between manager and agent takes place, is the point of referencefor CMIP. CMIP is also used where several TMNs or their managers are linkedtogether via the X interface.

    Since large quantities of data are not generally required for exchanginginformation in the TMN, the capacity of the embedded communicationchannels (ECC) or data communication channels (DCC) is sufficient whenmanaging SDH networks. Channels D1 to D3 with a capacity of 192 kbps(DCCp) areused for SDH-specific NE management. Channels D4 toD12witha capacity of 576 kbps (DCCm) can be used for non SDH-specific purposes.

    Central Centralx x

    figure 20 TMN overlay

  • 8/8/2019 SDH Pocket Guides1 En

    57/90

    57

    OS OS

    NEManager

    NEManager Local

    OS

    DXC DXC

    A D MA

    D M

    ADM

    ADM

    Q Interfaces: X.25, ISDN, LAN

    QQ

    QECCQECC

    QECC

    To distinguish the implementation in the SOH from data channels from theQ interface, the term QECCprotocol is used. Such networks are called SDH

  • 8/8/2019 SDH Pocket Guides1 En

    58/90

    58

    pmanagement networks (SMN) and are primarily responsible for managingNEs. SMNs canalso besubdivided into SDHmanagement subnetworks(SMS).

    figure 21 D bytes in the STM-1 SOH

    A1

    B1

    DCCp

    DCCm

    E1

    D1

    AU pointer

    D2

    A1

    A1 A2

    B2

    D4

    D7

    D10

    S1

    D6

    D9

    D12

    E2

    D5

    D8

    D11

    M1

    B2 B2 K1

    K2

    A2 A2

    E1

    D3

    J0 X X

    X X

    X X

    Although trouble-free operation of all NEs should have been guaranteed bystandardization on the part of various bodies (ITU, ETSI, ANSI, Bellcore),

    SDH measurement tasks

  • 8/8/2019 SDH Pocket Guides1 En

    59/90

    59

    problems still arise, particularly when NEs from different sources are linkedtogether. Transmission problems also occur at gateways between networksrun by different providers.

    Themeasurementfacilitiesbuiltintothesystemprovideonlyanapproximatelocation of a fault. Separate measuring equipment in contrast, is of muchgreater use particularly when monitoring individual channels, and moredata relevant to clearing the fault can be obtained. The only areas that arecovered by both network management and measurement procedures arelong-term analysis and system monitoring.

    Separate measuring equipment, of course, finds further application in thefields of research and development, production, and installation. Theseareas in particular require testequipmentwithwidelydifferingspecifications.

    In production and installation for example, systems manufacturersconfigure their NEs or entire networks according to customer requirements

  • 8/8/2019 SDH Pocket Guides1 En

    60/90

    60

    and use measuring techniques that check everything operates as it should.The equipment is then installed on the customers site and put into opera-tion. Test equipment is essential at this stage to eliminate any faults that

    may have occurred during production and installation and to verify correctfunctioning. Such test equipment needs to be portable, robust, and capableof performing test sequences in order to reproduce repeat measurementsand long-term analyses reliably and quickly.

    With network providers, fault clearance and maintenance are the mainareas of deployment for measuring equipment. The continuing processof network optimization is also a major area in which test equipment needsto be portable. It must also be reasonably priced, suitable for in andout-of-service measurements, and provide users with a rapid, easilyinterpreted display of results.

    Generally speaking SDH test equipment must also be capable of fulfillingthe following measurement tasks:

  • 8/8/2019 SDH Pocket Guides1 En

    61/90

    61

    Mapping analysis Alignment of port interfaces Measurements with structured test signals

    Measurements on add/drop multiplexers Delay measurements Testing of automatic protection switching (APS) Simulation of pointer activity In-service SDH measurements:

    Alarm analysisPath trace monitoringPointer analysisChecking the systems in-built sensorsDrop and insert measurementsChecking network synchronizationMeasurements on the TMN interface

    Error performance measurement Jitter and wander analysis

    Some of these measurements are discussed in more detail below.

    These measurements are performed in order to check the reaction of systemcomponents to defects and anomalies. Anomalies are faults such as parity

    Sensor tests

  • 8/8/2019 SDH Pocket Guides1 En

    62/90

    62

    errors. Defects result in the interruption of a connection. As an example, anNE must react to an LOS alarm by sending an AIS to the subsequent NEsand transmitting an RDI signal in the return path (figure 10).

    A special mechanism operates in SDH networks in the event of a fault thatallows the faulty link to be automatically rerouted over a back-up circuit(see APS section above). This function is controlled using overhead bytes K1and K2. Switching over to the protection line must take place in less than50 ms. External equipment is needed to ensure this and to measure theresponse time, that is the loss of a specific test pattern or triggering of apreset alarm when a connection is intentionally interrupted (figure 22).The measurement is important as a delayed response can result in consid-erable degradation in performance and even total failure of the networkleading to loss of income for the network provider.

    APStime measurements

    figure 22 Checking APS response time STM-1

  • 8/8/2019 SDH Pocket Guides1 En

    63/90

    63

    STM-16 STM-16

    STM-16

    protection line

    working line

    RxSOH byte capture

    APS timemeasurement

    ADM ADM

    ADM

    ADM

    ANT-20

    ANT-20

    The quality of digital links is determined with the aid of bit error ratio tests(BERT). The results of such measurements must, however, be classified in

    l b h l f h f h

    ITU-T error performancerecommendations

  • 8/8/2019 SDH Pocket Guides1 En

    64/90

    64

    some way, not least because the quality of a transmission path is often thesubject of a contract between the network provider and the telecommunica-tions user. For this reason, an objective means of classifying a line as either

    goodorbad is required.TheITU-TrecommendationsG.821, G.826,G.828, G.829, M.2100, and M.2101 are internationally recognized standardswhich specify these parameters.

    This recommendation was originally specified for international circuit-switched n x 64 kbps connections and expanded to include higher bit rates.Ahypotheticalreferenceconnectionisthebasisusedfordeterminingqualityparameters and comprises an international long-distance segment, anational segment and a subscriber access segment.G.821 definitions: Errored second (ES): a one-second time interval in which one or more bit

    errors occurs. Severely errored second (SES): a one-second time interval in which the

    bit error ratio exceeds 103. Unavailable second (US): a circuit is considered to be unavailable from

    the first of at least ten consecutive SESs. The circuit is available fromthe first of at least ten consecutive seconds which are not SESs.

    G.821

  • 8/8/2019 SDH Pocket Guides1 En

    65/90

    The results are referred to as the measurement time. This gives the follow-ing error parameters: errored seconds ratio (ESR), severely errored seconds

    ti (SESR) d b kg d bl k ti (BBER) Th ifi d lit

  • 8/8/2019 SDH Pocket Guides1 En

    66/90

    66

    ratio (SESR) and background block error ratio (BBER). The specified qualityrequirements refer to a particular path. The recommended measurementtime for G.821 and G.826 is 30 days.

    Although recommendation G.826 found broad use in the specification ofPDH systems, it was applied predominantly to SDH systems. It becameapparent that the target values in G.826 which to a large extent wereinfluenced by PDH technology did not match the capabilities of modernSDH systems based on fiber optic technology. As a result, work commencedon the development of the new recommendation G.828, with the aim ofspecifying tighter target values for error performance concerning modernSDH systems. The suggestion to include the error event severely erroredperiod (SEP) in G.828 was based on the results of practical measurements.An SEP is defined as a period of time during which at least three but notmore than nine consecutive, SESs occur. A period of consecutive SES canhave the same effect as a microinterruption and may lead to a severe

    impairment of the service supported by the SDH path.

    G.828

  • 8/8/2019 SDH Pocket Guides1 En

    67/90

    Overhead byte B3 is used to monitor the quality of a path and is evaluatedat the start and end of the path. However, it is becoming increasinglynecessary to determine the quality of individual segments of a path which

    Tandem connectionmonitoring (TCM)

  • 8/8/2019 SDH Pocket Guides1 En

    68/90

    68

    necessary to determine the quality of individual segments of a path whichmight pass through the networks of different providers. In such cases, it isespeciallyimportanttobeabletodemonstratethathighqualityisguaranteed

    in one's own network. When a fault occurs, the question of who bears theresponsibility and the costs of making the repairs is one that warrants ananswer.TCMallowsmonitoringoftheperformanceof path segments withthe aid of the N bytes in the POH. The high-order and low-order POH paritybytes are evaluated by the NEs. The number of errors detected is indicatedto the end of the TCM using the N1 or N2 byte. This error count is comparedagain with the number of parity errors detected at the end of the TCM. Thedifference is the number of errors occurring within the TCM.

    figure 23 Path parity check on the respective network limits; comparison using N1/N2 b t Provider 1

  • 8/8/2019 SDH Pocket Guides1 En

    69/90

    69

    N1/N2 bytes

    Checkerrors

    Provider 2

    Provider 1

    CheckN1/N2

    CompareresultsCheck

    errors Yes

    InsertN1/N2

    Provider 1

    Thetermjitterreferstophasevariationsinadigitalsignalinwhichtheedgesof the digital signal may differ from the expected ideal positions in time.Jitter isdescribedin termsof itsamplitude (expressed inunit intervals UI)

    Jitter measurements

  • 8/8/2019 SDH Pocket Guides1 En

    70/90

    70

    Jitter isdescribedin termsof itsamplitude (expressed inunit intervals, UI)and its frequency. If the jitter frequency is below 10 Hz, it is described aswander. Signals affected by jitter cannot be sampled accurately. In an

    extreme situation, this might result in misinterpretation of the input signalleading to single errors or error bursts and a corresponding degradation intransmissionquality.Jitterandwandercanalsobethecauseofbufferunder-flow or overflow, which causes bit slips. The theoretical limit of correctsampling at high jitter frequencies is half the bit width. Distortion andadditive noise means that the actual limit must be set much lower thanthis. The causes of jitter lie chiefly in the clock sources for NEs such asregenerators and add/drop multiplexers. The various types of jitter areillustrated in table 4.

    Jitter type Cause

    Mapping jitter Mapping of asynchronous tributary signalsinto synchronous transport signals requires

    table 4 Causes of jitter

  • 8/8/2019 SDH Pocket Guides1 En

    71/90

    71

    into synchronous transport signals requiresbit stuffing in order to match the bit rates.This results in mapping jitter when the signalis demapped.

    Pointer jitter If the SDH transmission bit rates are notsynchronous, the timing of the transportedpayload containers must be matched to theoutgoing frame. This is done by incrementingor decrementing the pointer by one unit.

    Intrinsic jitter Jitter at the output of a device that is fedwith a jitter-free input signal.

    Stuffing and wait-time jitter Non synchronous digital signals must bematched during multiplexing to the higher bitrate system by the insertion of stuffing bits.These stuffing bits must be removed whenthe signal is demultiplexed. The gaps thatoccur as a result are equalized by means ofa smoothed clock signal. This smoothinghowever is imperfect, resulting in stuffingand wait-time jitter.

    Jitter type Cause

    Pattern jitter Distortion in the digital signal leads toso-called inter-symbol interference or time-

    table 4 (Continued)

  • 8/8/2019 SDH Pocket Guides1 En

    72/90

    72

    so called inter symbol interference, or timedomain impulse cross-talk. This results ininterference between consecutive pulses in adigital signal which leads to jitter that ispattern-dependent.

    Wander Wander is a slow drift in the significantinstants of a digital signal from their idealequidistant positions in time. These delayvariations occur for example in optical fibersas a result of diurnal temperature variations.

    Other causes of jitter are interference signals and phase noise. Jitter caused byinterference signals is also called non-systematic jitter. Phase noise can occurdespite the use of a central clock as a result of thermal noise and drift in theoscillator used. Various measurement methods have been developed for thedifferent causes of jitter.

    Measurements Maximum tolerable jitter (MTJ)

    Everydigitalinput interfacemustbeableto toleratea certain amountof jitter

  • 8/8/2019 SDH Pocket Guides1 En

    73/90

    73

    y g p jbefore bit errors or synchronization errors occur. The measurement is madeby feeding the input of the device under test with a digital signal modulated

    with sinusoidal jitter from a jitter generator.

    A bit error tester monitors the output of the device for bit errors and alarmswhich eventually occur as the jitter amplitude is increased.

    ADMANT-20

    InterfacesSTM-4

    A

    B

    Tx

    Rx

  • 8/8/2019 SDH Pocket Guides1 En

    74/90

    Combined jitter Jitter at PDH outputs is caused by stuffing during mapping and bypointer activity.

  • 8/8/2019 SDH Pocket Guides1 En

    75/90

    75

    Wander analysisAn external,high-precision reference signal is requiredforperformingwander

    measurements. The phase of the signal under test is compared with thereference signal phase. The very low frequency components require appro-priately long measurement times of up to 12 days.

    If the jitter behavior of a tributary output in response to pointer activity is to betested, pointer sequences must be used. These sequences have been defined bythe ITU-T to guarantee network stability even under extreme conditions.

    Simulating pointer activity

  • 8/8/2019 SDH Pocket Guides1 En

    76/90

    76

    This is a sequence of steady pointer increments where three pointer actions are

    omittedafterasequenceof87actions.Thiskindofsequencecanoccurasaresultof loss of synchronization in an NE and can cause very large jitter amplitudes.

    Pointer sequence 87-3 INC

    Pointeraction

    3

    87-3 sequence

    87

    Missingpointeraction

    Start ofnextsequence

    T

    G.703 Physical/electrical characteristics of hierarchicaldigital interfaces

    G.707 Network node interface for the synchronous digital

    Overview of currentITU-T recommendationsrelevant to SDH

  • 8/8/2019 SDH Pocket Guides1 En

    77/90

    77

    hierarchy (SDH)G.709 Interface for the optical transport network (OTN)

    G.772 Protected monitoring points provided on digitaltransmission systemsG.774 SDH information model for the network element viewG.774.01 SDH performance monitoring for the network element viewG.774.02 SDH configuration of the payload structure for the network

    element viewG.774.03 SDH management of multiplex section protection for the

    network element viewG.774.04 SDH management of subnetwork connection protection from

    the network element viewG.774.05 SDH management of the connection supervision functionality

    (HCS/LCS) for the network element viewG.780 Vocabulary of terms for SDH networks and equipment

    G.783 Characteristics of synchronous digital hierarchy (SDH)equipment functional blocks (replaces G.781, G.782 andG.783 version of 01/94)

    G.784 Synchronous digital hierarchy (SDH) managementG.803 Architectures of transport networks based on the

    synchronous digital hierarchy (SDH)

  • 8/8/2019 SDH Pocket Guides1 En

    78/90

    78

    G.810 Definitions and terminology for synchronization networksG.811 Timing requirements at the output of primary reference

    clocks suitable for plesiochronous operation of internationaldigital links

    G.813 Timing characteristics of SDH equipment slave clocks (SEC)G.825 The control of jitter and wander in digital networks based

    on the SDHG.826 Error performance parameters and objectives for international,

    constant bit rate digital paths at or above the primary rate

    G.828 Error performance parameters and objectives for international,constant bit rate synchronous digital paths

    G.829 Error performance events for SDH multiplex andregenerator sections

    G.831 Management capabilities of transport network based onthe SDH

    G.832 Transport of SDH elements on PDH networksG.841 Types and characteristics of SDH network

    protection architecturesG.842 Interworking of SDH network protection architectures

    G.957 Optical interfaces for equipments and systems relating tothe SDH

    G.958 Digital line systems based on the SDH for use on opticalfiber cables

  • 8/8/2019 SDH Pocket Guides1 En

    79/90

    79

    M.2101 Performance limit for bringing into service and maintenanceof international SDH paths, and multiplex sections

    M.2110 Bringing into service international paths, sections andtransmission systems

    M.2120 Digital path, section, and transmission system fault detectionand localization

    O.150 General requirements for instrumentation for performancemeasurements on digital transmission equipment

    O.172 Jitter and wander measuring equipment for digital systemswhich are based on the SDH

    O.181 Equipment to assess error performance on STM-NSDH interfaces

    AA1 RSOH frame synchronization byte; 1111 0110A2 RSOH frame synchronization byte; 0010 1000ADM Add/d l i l

    Abbreviations

  • 8/8/2019 SDH Pocket Guides1 En

    80/90

    80

    ADM Add/drop multiplexerAIS Alarm indication signalAPS Automatic protection switching (channels K1, K2)ATM Asynchronous transfer modeAU Administrative unitAU-n Administrative unit, level n = 3, 4AUG Administrative unit group

    B

    B1 BIP-8 parity word in regenerator section (RSOH)B2 BIP-N x 24 parity word in multiplex section (MSOH)B3 BIP-8 parity word in VC-3, 4 path (POH)BBE Background block error (G.826)BBER Background block error ratio (G.826)BER Bit error ratio

    BIP-2 BIP-2 parity word in VC-1, 2 path (POH)BIP-N Bit interleaved parity, N bitsBSHR Bidirectional self-healing ring

  • 8/8/2019 SDH Pocket Guides1 En

    81/90

    EE2 Service channel (voice) in multiplex section (MSOH)EBC Errored block countECC Embedded communication channel

  • 8/8/2019 SDH Pocket Guides1 En

    82/90

    82

    ECC Embedded communication channelEDC Error detection codeEFS Error-free secondES Errored second (G.826)ESR Errored seconds ratio (G.826)

    FF1 User channel, for example, for operational service purposes

    (RSOH)

    F2 Path user channel for an end-to-end connection (POH)FAS Frame alignment signal

    GG1 End-to-end path status (POH)

    HH1 Pointer byte 1: Bit nos. 1 to 4: New data flag; bit nos. 5, 6:

    (Unspecified), bit nos. 7, 8: Pointer value (highest 2 bits)H2 Pointer byte 2: Pointer value (lowest 8 bits)

  • 8/8/2019 SDH Pocket Guides1 En

    83/90

    83

    H2 Pointer byte 2: Pointer value (lowest 8 bits)H3 Pointer byte 2: Negative justification opportunityH4 Payload indication (POH)HDLC High Level Data Link Control

    IIP Internet protocolISDN Integrated services digital networkISO International standardization organization

    J J0 Regenerator section trace (RSOH) J1 Path trace (POH in VC-3, 4) J2 Path trace (POH in VC-1, 2)

    K K1, K2 (MSOH) APS channels for APS signaling and back-up

    line switchingK3 K4 (POH) APS channels for APS signaling and back-up line

  • 8/8/2019 SDH Pocket Guides1 En

    84/90

    84

    K3, K4 (POH) APS channels for APS signaling and back-up lineswitching

    LLAN Local area networkLO Lower orderLOF Loss of frameLOM Loss of multiframeLOP Loss of pointerLOS Loss of signal

    MM1 MS-REI byte (MSOH)MI Management informationMO Managed objectMS Multiplexer section

    MS-AIS Multiplexer section AISMSOH Multiplexer section overheadMTIE Maximum time interval error

    NN1, 2 Network operator bytes (POH)NDF New data flagNE Network element

  • 8/8/2019 SDH Pocket Guides1 En

    85/90

    85

    NE Network element

    OOAM Operation, administration and managementOC-N Optical carrier, N = 1; 4; 16OH OverheadOOF Out of frameOSI Open system interconnection

    PPDH Plesiochronous digital hierarchyPLL Phase-locked loopPOH Path overheadPoS Packet over SONET/SDHPPP Point-to-point protocol

    PRBS Pseudorandom binary sequencePRC Primary reference clock

    QQoS Quality of service

    R

  • 8/8/2019 SDH Pocket Guides1 En

    86/90

    86

    RRDI Remote defect indicatorREI Remote error indicatorROSE Remote operations service elementRSOH Regenerator section overhead

    SS1 Synchronization status byte (MSOH)SDH Synchronous digital hierarchy

    SEC SDH equipment clockSEP Severely errored periodSES Severely errored secondSESR Severely errored seconds ratioSHR Self-healing ringSMN SDH management network

    SMS SDH management subnetworkSOH Section overheadSPRING Shared protection ringSTM Synchronous transport module

    SSTM-N Synchronous transport module, level N = 1, 4, 16, 64STS Synchronous transport signal

  • 8/8/2019 SDH Pocket Guides1 En

    87/90

    87

    TTMN Telecommunications management networkTU Tributary unitTU-m Tributary unit, level m = 1...3TUG-m Tributary unit group, level m = 1, 2

    UUAS Unavailable second

    UAT Unavailable timeUNEQ UnequippedUI Unit interval

  • 8/8/2019 SDH Pocket Guides1 En

    88/90

    ATM Pocket GuideTP/EN/PG04/0400/AE

    DWDM Pocket Guide

    Available ReferenceGuides:

  • 8/8/2019 SDH Pocket Guides1 En

    89/90

    89

    DWDM/PG/OPT/05-02/AE/ACT00278

    Packet over SONET/SDH Pocket GuidePoS/PG/OPT/01-02/AE/ACT00074

    Q-factor Pocket GuideQFACTOR/PG/OPT/11-01/AE/ACT00055

    SDH Pocket GuideSDH/PG/OPT/06-02/AE/ACT00279

    SONET Pocket GuideTP/EN/PG03/0201/AE

    WorldwideHeadquarters

    12410 Milestone Center Dr.Germantown, Maryland

    Regional SalesHeadquarters

    North America12410 Milestone Center Dr.

    Western EuropeArbachtalstrasse 6

    Copyright 2002Acterna, LLC.

  • 8/8/2019 SDH Pocket Guides1 En

    90/90

    20876-7100USA

    Acterna is present in morethan 80 countries. To findyour local sales office go to:www.acterna.com

    Germantown, Maryland20876-7100 USA

    Toll Free: 1 866 ACTERNAToll Free: 1 866 228 3762Tel: +13013531560x 2850Fax: +1301 353 9216

    Latin AmericaAv. Eng. Luis Carlos Berrini936/8 e 9 andares

    04571-000 So PauloSP-BrazilTel: +551155033800Fax:+55 11 5505 1598

    Asia Pacific42 Clarendon StreetPO Box 141South MelbourneVictoria 3205AustraliaTel: +61 3 9690 6700Fax:+61 3 9690 6750

    72800 Eningen u.A.Germany

    Tel: +49 7121 86 2222Fax:+49 7121 86 1222

    Eastern Europe,Middle East & AfricaElisabethstrasse 362500 BadenAustria

    Tel: +43 2252 85 521 0Fax:+43 2252 80 727

    1st Neopalimovskiy Per.15/7 (4th floor)RF 119121 MoscowRussiaTel: +7 095 248 2508Fax:+7 095 248 4189

    All rights reserved.

    Acterna, The Keepers ofCommunications, andits logo are trademarksof Acterna, LLC. Allother trademarks andregistered trademarksaretheproperty oftheir respective

    owners. Major Acternaoperations sites areIS0 9001 registered.

    Note: Specifications,terms and conditionsare subject to changewithout notice.

    SDH/PG/OPT/07-02/AE/ACT002