Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
MUX
MUX
E3
34.368 mbps
E3
34.368 mbps
MUX
E2
8.448 mbps
MUX
E4
139.264 mbps
MUX
E2
8.448 mbps
MUX
E1
2.048 mbps
EI
2.048 mbps
MUX
MUX
Other
Tributaries
30 channels
at 64 kbps
Transmitter
30 channels
at 64 kbps
Receiver
Foreword
could explain the concepts besides providing the functional details. The many
training programmes proved inadequate either, as the trainers themselves
were not very competent.
It was a boon to my desire to learn when in 2004 November I was sent on
forced leave for a period of seven months because of my promotion without a
post being available in the higher grade. After wasting initial few months in
reading the fictions which I always wanted to read but could never read
because I was always hard pressed for time throughout my carrier, the idea of
strengthening my understanding of SDH struck me. Once again I started
searching for good literature on SDH which could explain the principles
besides providing the functional details of the systems. Yet again I could not
find any book worth its name whatsoever on the subject which could impart
the necessary understanding. I needed some support on the fundamentals of
telecommunication technologies too, as after years of being away from fine
details of many technologies; a kind of refresher course was required besides
the knowledge of fundamentals of new technologies. I started gathering all the
training material on the subject, visited book shops on all available
opportunities and bought many books, and gathered as much of related
information as I could. Referring to the books on fundamentals side by side,
with the training material; and white papers and tutorials available on the
internet, the concepts started taking shape in my mind. Encouraged, I started
taking a deeper dip in the subject, till I finally found myself at a level which
was far beyond that of my colleagues, including those who were directly
involved in the installation and maintenance of the SDH systems (Naturally,
as they were all like me, but I had put in a huge effort in learning; which they
had no time for).
Thus I decided to properly organize my learning and put it in the form of
notes, which could be used by our training institutes to impart the knowledge
to the desiring people. While preparing the notes I was reminded of the
difficulties that I had to face in understanding the particular subject being
dealt. This led me to include the fundaments of the underlying technology to
enable the reader to understand the subject, without carrying a doubt in his
mind about these fundamentals. The process went on with every subject and I
found that the volume of the notes was growing with every topic. This was the
time when the idea of converting the whole text into a book struck me. I
started working towards it and found that I had to include many more details
on the fundamentals of underlying telecommunication technologies to make it
a self contained text on the subject of SDH, for telecom professionals.
The first lesson I learnt, was that it was impossible to understand SDH if your
fundamentals about PDH are weak. Thus I included a detailed chapter on
PDH in my work. The scope of the work thus changed from "SDH" to "Digital
Multiplexing", and then to do justice to this scope, I had to include a chapter
on OTN (Optical Transport Networks), the latest transport platform. To
understand PDH one has to know what is HDB-3, what is clock, what is time
division multiplexing, what is pulse code modulation etcetera? Hence I
included chapters on line coding, clock, PCM, and TDM to facilitate ready
reference to the fundamentals. Bit errors are a measure of the quality of digital
ii
signal. To appreciate what are bit errors and their causes one has to know the
properties of the transmission media and their effect on the quality of digital
signal. One chapter has therefore been dedicated to the signal impairments
caused by the transmission media. Though it is expected that the telecom
professionals would never really forget the concepts of analog to digital
conversion and vice versa, a chapter has been included to provide a quick
refresher. The subject of digital multiplexing can not be appreciated well in the
absence of the concepts of the first multiplexing techniques which was analog
FDM (Frequency Division Multiplexing); hence the introductory chapter is
dedicated to the need of multiplexing and analog multiplexing basics. How
and why the digital technology established itself completely wiping out the
analog technology, has also been dealt in brief to help maintain the flow of
concepts. Operations and maintenance features are one of the most
important features of digital communication systems. These features of PDH
and SDH have been dealt with in separate chapters. In fact the O&M features
of the PDH systems are the foundation stones of those of SDH. SDH is in fact
far ahead of its predecessors in capacity, flexibility and management. Many
types of topologies are possible in SDH, which have been explained in brief
besides the protection switching features. The protection switching feature of
SDH facilitates automatic and instantaneous traffic restoration in case of a
breakdown.
The phenomenal growth of data traffic in the recent years has forced the SDH
to develop features for efficient transport of data communication traffic. One
chapter each has been devoted to the data carrying capabilities of SDH and
these new improvements. The transmission media too deserved a little
discussion for refreshing the fundamentals and to get a glimpse of the new
technologies. Accordingly one chapter has been devoted to it.
The unexpected growth of my responsibilities threw the task of finalization of
the work completely out of schedule, and I could complete it only in May 2010,
making use of intermittent periods of long leave besides consistently pursuing
it.
I have thus attempted to present these notes as a comprehensive learning
tool to the professionals in the field of telecommunication transport
technologies. A telecommunication engineer; who left his college years back,
should not need any reference other than this, to develop a strong
understanding of the digital multiplexing and transport technologies.
The effort throughout the work has been to present the material in a very
simple language, through simple to understand illustrations. In fact at many
instances the illustrations appear to be too simple and repetitive which may
not appeal to a learned reader. However my appeal to such readers is to bear
with me in the interest of the persons who do not have equally strong
foundation. In any case the repetitive illustrations will only make your
concepts deeper.
iii
Though the work is primarily meant for the professionals like me, my research
shows that the subject is taught as an elective in degree courses and as a
compulsory subject in PG courses, in many universities across the world.
I have taken utmost care that all the material and the facts presented are
correct and authentic and the editing and typing mistakes are eliminated,
however any lapse on this is highly regretted. I will be grateful to you if you
can give me a feed back on this.
iv
Contents
Foreword i - iv
Contents v - xv
Chapter I
Introduction
14
20
Chapter II
Advent of Digital Technology
2.1 Analog Communication Systems 22
2.2 Problems in Analog Communication Systems
2.2.1 Attenuation 24
2.2.2 Noise and Interference 25
2.2.2.1 Sources of Noise 27
22
23
31
43
Chapter III
Analog to Digital Conversion and TDM principles
45
76
vi
Chapter IV
Line Coding and Digital Modulation
77
115
Chapter V
Clock
116
5.1
5.2
5.3
5.4
124
126
vii
Chapter VI
Signal Impairments, Error Detection; and Correction
128
6.1
6.2
6.3
6.4
160
Chapter VII
Synchronization
7.1 Synchronization Process 164
7.1.1 Correct Detection of Symbols 164
7.1.2 Timing Recovery and Clock Synchronization 169
7.1.3 Framing 171
7.1.4 Use of Multi-Frames 173
7.2 Synchronous versus Asynchronous Systems 174
7.2.1 Asynchronous systems 175
7.2.2 Synchronous systems 177
7.3 Synchronous Networks 177
7.4 Plesiochronous networks 178
7.5 Slips 181
7.6 Elastic Store and Controlled Slips 182
7.7 Line Synchronization vs Network Synchronization 184
7.8 Types of Network Synchronization 186
7.8.1 Master Slave Synchronization 187
7.8.1.1 By using Primary and Secondary reference
clocks
7.8.1.2 By Timing distribution through GPS 187
7.8.2 Mutual synchronization 188
7.9 Pseudo-synchronization 189
162
187
viii
205
Chapter VIII
Plesiochronous Digital Hierarchy (PDH)
8.1 PCM 208
8.1.1 The Multiplexer 209
8.1.2 PCM/E1/2MB Multiplexing Structure 211
8.1.3 Time Slot 0 212
8.1.4 Multi-frame 213
8.1.5 Time slot 16 215
8.2 Higher order Multiplexing/Hierarchical Multiplexing 217
8.2.1 E2 Multiplexing 219
8.2.2 E1 Bit Rate Variation 221
8.2.3 Justification or Bit Stuffing 221
8.2.4 Number of Justification Bits 224
8.2.5 Justification Control 225
8.2.6 E2 Frame Structure 227
8.2.7 E2 Bit Rate and Bit Rate Adaptation of E1s 232
8.2.8 Bit Rate Adaptation 234
8.2.9 Positive/Negative Justification 234
8.2.10 Variable data rates of E2 235
8.3 E3 Multiplexing 236
8.3.1 E3 Frame Structure 236
8.3.2 Bit Rate Adaptation in E3 238
8.4 E4 multiplexing 239
8.4.1 E4 Frame Structure 240
8.4.2 Bit Rate Adaptation in E4 245
8.5 Higher Bit Rates 246
8.6 Framing Stages and Tributary Data, Overhead and Payload Bits
8.7 North American PDH Hierarchy 247
8.8 Types of Line Codes used in PDH 248
8.9 Synchronization in PDH 249
8.9.1 Using Master-Slave Synchronization 250
207
246
ix
260
Chapter IX
PDH Alarms and Maintenance
262
278
Chapter X
Synchronous Digital Hierarchy (SDH) Principles
280
357
Chapter XI
Operations and Maintenance in SDH
359
xi
392
409
Chapter XII
SDH Architecture and Protection Mechanisms
411
447
455
Chapter XIII
Data over SDH
13.1
13.2
13.3
13.4
13.5
13.6
13.7
References
456
467
473
Chapter XIV
Emerging Systems and future of SDH
475
513
Chapter XV
Transmission media for PDH/SDH,
And Optical Fiber Technology
15.1 Types of media for the transmission of PDH and SDH signals
15.1.1 Copper Wire Pairs 516
15.1.2 Coaxial Cables 517
15.1.3 Microwave Radios 518
15.1.4 Free Space Optics (Air Fiber) 519
15.1.5 Optical Fiber Cables 520
15.2 Optical Fiber Communication Technology 521
15.2.1 Principles of OFC 521
15.2.2 The Optical Frequency/Wavelength used 523
15.2.3 Types of Optical Fibers 526
15.2.3.1 Plastic Fibers 526
15.2.3.2 Glass Fibers 527
15.2.3.3 Multimode Fibers 527
15.2.3.4 Single Mode Fibers 528
15.2.3.5 Dispersion Shifted Fibers 529
15.2.3.6 Step Index Fibers 529
15.2.3.7 Graded Index Fibers 530
15.2.4 OFC System Components 530
15.2.4.1 Optical Source 531
15.2.4.2 Photo Detector 533
15.3 All Optical Networks 534
15.3.1 Optical Amplifiers 535
15.3.2 Wavelength Division Multiplexing (WDM) 536
515
515
xiv
538
542
Chapter XVI
Introduction to Optical Transport Networks [OTN]
16.1
16.2
16.3
16.4
16.5
16.6
16.7
16.8
544
546
569
570
572
Alphabetical Index
xvi - xxii
*******************************
xv
Chapter II
In the previous chapter; that is the first chapter of this text, we have seen how
the telecommunication started and what are the basic components of a
telecommunication system? How the need for proliferation of telecom services
drove the world to develop manual and automatic exchanges and how they
worked? Further proliferation of services lead to the development of long
distance telephony for: intercity, inter-state and finally international calls.
Various media used for long distance communication, the need for
multiplexing, analog multiplexing principles and applications, and finally we
had an introduction of the modern digital multiplexing technologies.
In this chapter, we are going to learn about the problems and limitations
associated with analog systems. What lead to the development of digital
technology? How the problems of analog systems are overcome by digital
technology? What are the other advantages of digital technology and what are
the limitations and disadvantages of digital technology?
22
the quality of received speech became a serious issue and started getting
more and more attention, which made the telephone engineers strive hard to
overcome the shortcomings, which were affecting the quality.
The major factors leading to speech quality deterioration were noise,
distortion, attenuation (reduction in signal strength with distance), cross talk
(one call getting partially coupled to another call in progress in another pair of
the cable), and interference etcetera. Majority of these factors were
contributed by the equipments like: amplifies, filters, transducers etcetera, and
by the transmission media. A number of techniques were developed to
overcome the adverse effects of these factors on the quality of speech.
Besides the quality issues, the capacity of analog communication systems too;
started showing the signs of saturation.
Let us have a look at all these issues in brief.
To appreciate and understand the problems and issues related with analog
systems, let us consider the very basic analog system consisting of a
microphone, an amplifier, a channel consisting of copper pair, and a receiver.
Though the systems developed for multi-channel capacities and long distance
capabilities were much more complex, involving many types of media like
coaxial cables, microwave etcetera, and complex multiplexing technologies
including sophisticated repeaters, the problems and their effects can be best
understood by this basic model. (In fact the only part of the transmission
network, which remains without an amplifier is the one between the
subscribers telephone and the local exchange).
Transmission Line
Copper pair
Microphone
Amplifier
Receiver
Loud speaker
Or
Ear phone
Fig: 2.2-1:- The basic analog communication model using base-band (audio
frequency) transmission on a copper wire pair
23
A basic analog communication model using base-band i.e. 0.3 to 3.4 kHz
audio frequency transmission on a copper pair is shown in fig 2.2-1. Only one
way communication has been shown for the purpose of simplicity. The
microphone gives the voice input to the amplifier, which is transmitted on the
transmission line after amplification. The receiver tries to filter out the
corruptions of the signal caused by the amplifier and the channel.
Now let us examine the various sources of corruption of the signal; while it
makes its journey from the microphone at one station to the loudspeaker at
the other station, with reference to fig 2.2-1.
2.2.1: Attenuation:As the voice signal traverses the channel (transmission line), it experiences
loss in its strength due to ohmic loss in the channel owing to the resistance of
the copper wire. This is the reason for deployment of an amplifier at the
transmitting end, i.e. to boost the signal sufficiently; such that the received
signal; after suffering losses due to attenuation, is still within the receive
threshold limit of the receiver. The amplifier solves one problem but adds
many more like: distortion and noise, which is the cost to be paid for the gain.
Nevertheless the use of the amplifier is a must (we will see about the
problems added by the amplifier, later in this chapter). Fig 2.2.1-1 illustrates
the attenuation phenomenon.
Transmitted Signal
Medium/Transmission
line
Received Signal
Station A
Station B
24
natural signals of speech/video etcetera. The actual voice signal may look
something like what is shown in fig 2.2.1-2.
Amplitude
Time
2.2.2: Noise and Interference:Noise is perhaps the single most bothersome factor of the telecommunication
systems, which has troubled the design and maintenance engineers of
telecommunication system; ever since its inception, and which continues to
hog them till today.
Noise is defined as unwanted
telecommunication signal.
electrical
interference
with
the
25
Referring to fig 2.2-1 again, in our basic communication model (the terms
telecommunication and communication are used synonymously in this text),
the noise is generated in each and every part of the link: be it Microphone,
Channel, Receiver (receiver too has an amplifier in addition to other
processing circuitry), or the Loud speaker. Let us see the effect of noise on
the signal.
Output Signal
(Noisy)
Input Signal
(Clean)
Device
Any device like resistor,
Transistor etcetera
Fig 2.2.2-1 above stows the input output relationship of a device with respect
to an analog signal. The input analog signal is absolutely clean (assumed to
be a sine wave for simplicity of expression) but the output signal is corrupted
by the noise generated by the device.
Now imagine a situation where an equipment; like amplifier or receiver, is
made up of a large number of such devices. The noise generated by all such
devices gets added up at the output of each such equipment. The trouble
increases many folds in case of a long communication link where a large
number of such equipments come into play. At every stage i.e.: the amplifier,
the channel, the receiver and the repeater amplifier, the noise generated by
individual equipments continues to add. Moreover all the amplifiers keep on
amplifying the noise along with the signal amplification. Fig 2.2.2-2 depicts the
situation.
26
Output signal
after amplifier
Input Signal
(Clean)
Amplifier
Receiver
and
Transmitter
Repeater 1
Output signal
after n
repeaters
Receiver
Repeater n
Fig: 2.2.2-2:- The noise multiplication effect in a long communication link with
n repeaters
Fig 2.2.2-2 depicts a long communication link, having a large number of
repeaters [Repeater is an equipment where the signal strength is boosted by
amplification. The signal strength goes down with distance due to attenuation,
as explained in the previous section.] At each stage of equipment and channel,
the noise gets added, and finally the noise becomes so much that the link can
not be extended any further, depending upon the acceptable quality of the
audio. Thus a practical limit is reached in the length of the communication link.
Naturally a lot of effort went into noise reduction measures in the devices,
equipments and channel media. All those measures extended the limit, but a
'limit' as such stayed; though it was much higher than what it was in the
absence of these noise reduction measures.
2.2.2.1: Sources of Noise:The type of noise we have just seen in fig 2.2.2-1 is generated by each and
every: device, equipment or channel through their resistive components. It is
generated by the random motion of electrons and atoms inside the
components, due to heat. More the temperature more is the noise, less the
temperature less is the noise. This type of noise is called Thermal Noise.
Since ohmic resistance is present in all devices and in metallic wire channels,
or so to say; everywhere, this noise is generated by every component of the
link. This type of noise is completely random in nature, and no correlation can
be established in the noise values at any two instants of time. This thermal
noise is evenly distributed throughout the frequency band beginning with a
few hertz to several Gega-hertz. Due to this more or less constant amplitude
throughout the frequency spectrum, it is also called White Noise. The white
light is composed of all the frequencies of visible light spectrum, which gives
this White Noise its name.
27
2.2.3: Distortion:As the meaning of the word goes, the shape of the signal gets changed with
respect to the original signal during transmission, and since this change is not
a welcome change, it is called distortion.
28
The distortion is caused by the amplifier as well as by the channel and by the
receiver equipment, in fact by all of them. If an equipment or a channel
introduces a change in amplitude and a constant delay, there is no distortion.
Distortion comes when along with the amplitude change (or without it) the
shape of the signal changes; and the delay is not constant for all frequencies.
The distortion can be mainly put into two categories: amplitude distortion
and phase or delay distortion. Let us look at them in a little more detail.
2.2.3.1: Amplitude Distortion:Amplitude distortion is encountered by a signal when the frequency response
of the system components (e.g. transmitter equipment or channel) is not
constant for all the frequencies.
In case of an amplifier, the inductance and capacitance associated with the
active components or the ones otherwise used discretely in the circuit, make
the response (amplification or gain) sensitive to frequency (because the
impedance of inductors and capacitors is highly dependent on frequency. The
impedance of an inductor is proportional to the frequency and that of the
capacitor is inversely proportional to the frequency). Different frequencies get
amplified to different magnitudes. Fig 2.2.3.1-1 shows the typical frequency
response of an audio amplifier and the amplitude distortion of the signal.
Frequency A
Input Signal
Amplifier
gain
(b)
High freq component
Freq = A
Frequency
(a)
x-
Output Signal
(c)
As can be seen in fig 2.2.3.1-1 (a), the gain of the amplifier is more at central
frequencies and less at low and high frequencies. Fig (b) shows the input
signal having medium and high frequency components. The high frequency in
this case is falling at the knee (A) of the frequency response curve. The gain
starts falling on these frequencies, with the result that the output signal is
distorted in shape as shown in fig (c), having lower amplitude at higher
frequencies.
In the case of a channel too the phenomenon is almost the same, except that
instead of gain, the channel introduces losses or attenuation. The attenuation
varies with frequency to give rise to the amplitude distortion, similar to the one
shown in fig 2.2.3.1-1. The inductive and capacitive reactance are in fact
much more predominant in case of a channel (particularly the metallic media
like copper wire pair or co-axial cable etcetera) as compared to those in the
amplifier. Fig 2.2.3.1-2 below shows that a channel of copper wire pair has
resistance and inductance all along its length due to the presence of wire. It
has capacitance and leakage conductance because of parallelism with the
second conductor. All these components are uniformly distributed all along
the line.
jwL
jwL
jwC
jwL
jwL
jwL
jwC
jwC
jwL
30
2.2.3.2: Phase Distortion or Delay Distortion:The transmission line or channel consists of various components as shown in
fig 2.2.3.1-2. Out of these components the inductance and capacitance are
sensitive to frequency. The inductance value is jwL and the capacitance
value is 1/jwC, both of which have w i.e. 2f (f is the frequency) in their
reactance values. Owing to these frequency sensitive components, the
velocity of propagation of the signal in the transmission line becomes a
complex issue. All the frequencies do not travel at the same velocity through
the medium of the transmission line, giving rise to a change in the shape of
the received waveform, as compared to the transmitted waveform at the
sending end. This change of waveform is called Phase Distortion or Delay
Distortion.
In case of a twisted pair telephone cable, the velocity of propagation can be
given approximately by the following equation:
V = 2w/CR
Where the terms w, C and R have similar meaning as brought out in fig
2.2.3.1-2 and V is the velocity of propagation of the input signal wave in the
transmission line.
It can be clearly seen that the velocity is directly proportional to the square
root of the frequency. Thus higher frequencies travel faster than the lower
frequencies, giving rise to distortion in the received waveform, called Phase
Distortion or Delay Distortion.
It is important to note that some amount of propagation delay will always be
there for all frequencies. As long as this delay is constant, there is no delay
distortion, and only when the delay is non uniform over the range of
transmitted frequencies, the delay distortion occurs.
At times one more cause which adds to the delay distortion is the reflection of
the propagating wave inside the channel due to impedance inaccuracies. This
leads to multiple waves arriving at the receiver causing distortion of the phase.
The effect of phase or delay distortion is negligible on speech circuits,
because the human ear can not diagnose such a minute difference. However
in case of a video transmission, the effect becomes very significant as it
causes different time delays to each picture element causing the picture to
appear smeared.
31
(a)
Common delay
assumed zero
Delay distortion
(b)
32
Transfer characteristic
Of transmitter/channel
Input wave
Linear Region
Output wave
Without Distortion
(a)
Transfer characteristic
Of transmitter/channel
Non Linear Region
Linear Region
Input wave
33
2.2.4: Cross Talk, Echoes and Singing:Cross talk, echoes and singing are a few more impairments that hamper the
quality of communication, particularly in a speech circuit.
Cross talk takes place when the signal of one speech channel gets coupled to
its adjacent channel; lets say in a multi-pair telephone cable; or in a
multiplexed carrier system. We are able to hear some other conversation
while talking on our telephone. This happens due to unwanted coupling of
signal between two pairs of wires of the cable due to: poor insulation between
pairs, inadequate carrier suppression in multiplexed environment, or due to
defective components permitting overlapping frequency bands.
Echo is produced when the transmitted signal gets coupled back partially to
the receiving pair of the channel. This coupling back of signal is called
reflection. Reflection takes place due to impedance mismatch amongst
various components of the system like: the transmitter, the hybrid and the
transmission line (Hybrid is a circuit used for converting the two wire
telephone circuit to a four wire channel having separate pairs for transmitting
and receiving of the signal or vice versa).
34
2.3: What is done about these problems:The obvious question in your mind must be that if there are so many problems
with the analog communication, why the engineers did not do anything to
overcome them?
In fact a phenomenal amount of effort had been made by the
telecommunication engineers to eliminate or at least minimise these problems.
Though the problems could not be completely eliminated, quite a sizable
success was achieved in minimizing them; to a varying degree in each case.
Attenuation is the impairment where the efforts have not met with much
success. The improvements in cable parameters could not achieve much
reduction in the attenuation per unit length of the cable. Further reduction
needed the diameter of the copper conductor to be increased, which involved
higher costs. A sizable improvement was achieved in the cables optimized for
the voice frequency circuits through the use of lumped inductances in series
with the conductors at fixed intervals. These inductors were called Loading
Coils and provided compensation to the cable capacitance, reducing the
attenuation in the higher frequency area of the voice frequencies.
On the noise and interference front, commendable improvements were
achieved. The development of low noise amplifiers and receivers, and various
techniques to reduce the EMI (Electro Magnetic Interference) helped in
reducing this menace to a great extent. Installing telecom equipments away
from the heavy machinery or electrical switching installations also helped.
Distortion, as mentioned earlier was compensated to a great extent by the use
of equalizers. Band pass filters minimized the harmonic distortion.
Cross talk, echo and singing are almost completely manageable if the
equipments are properly designed and properly maintained. Echo
suppressors had been successfully developed and deployed.
In all, the impairments/problems continued to stay, and so did the fight against
them. But the ultimate effect was that the length and capacity of an analog
communication link were limited severely because of these problems. Every
time the signal was required to be amplified, noise got added to it, and every
time it was again transmitted on the channel, it gathered more noise,
distortion and other impairments. Fig 2.3-1 depicts an analog communication
link to illustrate the point.
35
10
Input Signal
Output Signal
Trans
receiver
Noise/Distortion
added
Trans
receiver
Repeater required
to boost signal.
Noise/Distortion added.
Trans
receiver
Trans
receiver
Noise/Distortion build up
Prevents further repeaters, limiting
the length of the link.
Fig: 2.3-1:- A long link with many repeaters is finally limited in length by the
noise and distortion build up.
The capacity of the analog link was increased to a few thousand channels by
the use of coaxial cable in place of twisted pair copper cable. But the repeater
spacing was always a trade off with the number of channels. More the number
of channels, less was the repeater spacing, lesser the repeater spacing; more
was the requirement of number of repeaters for a given length, and hence
lesser was the ultimate length of the link. Thus, very long distance links could
not have very high number of channels. Very high density links could be built
only for shorter distances.
The digital technology overcomes almost all the above problems with ease.
So, what is the magic by which all the impairments discussed in the previous
sections do not affect the digital signal? There is no magic whatsoever, all the
impairments affect the digital signal as much as they do an analog signal, and
in fact the effect of each of the impairments on digital signal is more as
compared to that on an analog signal.
The digital signal does not fight much to overcome the effect of all those
impairments, but it simply tolerates them. Let us see how.
36
When the digital signal of fig 2.5-1 is processed i.e.: filtered, amplified,
transmitted and received; over the telecommunication link, it suffers from the
same impairments as those for the analog signal. The worsening effects are
more in case of digital signal because of square shape of the pulse. The
sharp edges are much less likely to be maintained as they are, as compared
to the sinusoidal shape of our assumed analog signal.
[According to Fourier analysis, a square wave consists of a fundamental sine wave
and infinite number of harmonics of the fundamental sine wave. In fact if we work it
back, i.e. if we take a sine wave and add to it its entire set of harmonics in proper
proportions, we will get a square wave. Because of these high frequency
components, the shape of the pulse suffers more impairment].
37
Station
A
Input signal
square wave
Station
B
Trans
-
Output signal
Attenuated and
De-shaped
Receive
Channel
Received pulse
Receiver
Threshold
x
volts
Thus all that the receiver is required to do is, generate a square pulse locally
(exactly as per the defined and mutually agreed norms between the
transmitter and receiver), and pass it on to the digital to analog converter or to
38
the user directly as the case may be. The digital to analog converter or the
user gets a clean pulse, which is an exact replica of the transmitted pulse.
Thus even though all the impairing factors were present, we are able to
transmit and receive a square pulse without any degradation at all in its
quality.
In digital technology only two types of signals are processed: a One and a
Zero. What we have seen just now can be considered as a One or 1, and
a negative pulse or an absence of a pulse may be considered as a Zero, or
vice versa (there are many variations to this philosophy, the details of which
can be seen in chapter IV).
Now if there is a long communication link with a large number of repeaters, at
every repeater; the digital signal will get generated afresh or it will be
Regenerated. In fact the repeaters in digital communication link are called
Regenerators for this reason. This regeneration approach permits an
unlimited chain of repeaters without affecting the signal quality at all.
Whatever may be the length of the digital link, you get a crystal clear sound
on your telephone and a very clear picture on your TV. All the problematic
factors can have their effect only in between the regenerators; the multiplying
effects of impairments at every repeater are simply driven away. As long as
the regenerator spacing is maintained within acceptable limits for correct
reception, the signal does not deteriorate at all, no matter how many times it is
regenerated. The concept is illustrated in fig 2.6-3.
Transmitted
signal
Transmitted
signal
Received
signal
Transmitted
signal
Received
signal 1
Received
signal n
Output Signal
Input
Input signal
square
Trans
receive
Trans
receive
Trans
receive
Trans
receive
Regenerators
39
Now let us see how the digital technology helps in overcoming another most
important limitation of the analog systems, i.e. the limited line capacity.
The digital technology allows the use of Time Division Multiplexing (TDM).
For analog to digital conversion of signal for speech, one sample of the
analog signal is taken every 125 micro seconds (we will see the whys and
how's of this in detail in chapter III). Thus if the width of the digital signal
(pulse) is less than 125 s, then another similar signal can also be
accommodated in the same period of 125 s. Let us see fig 2.7-1.
Signal
1
Signal
2
Signal
3
125 s
Fig: 2.7-1:- Accommodating more than one signal in the time period of one
signal
Generally the width of the pulse of each signal is much less than 125 s.
Using this principle, initially a 24 channel system was developed by
multiplexing their corresponding pulses in a common time frame of 125 s.
[In actual practice eight bits (called one byte) are used for each signal. These details
will be clear as we read the chapter III. However for understanding of the concept it is
easier to visualize one pulse for each signal]
40
2.8: Advantages of Digital Technology:Besides the features discussed in the previous section, there are hoards of
other advantages of digital technology, leading to a virtual uprooting the
analog technology in signal processing and transmission. What continues to
remain analog is the user interface; rest all has been changed to digital. Let
us have a look at some of the important advantages of the digital technology,
in addition to the revolutionary advantages like regeneration and TDM
(Time Division Multiplexing) we have seen in the preceding section.
i)
It was next to impossible to store the analog data for a long time and retrieve
it correctly. The storage was mostly done on magnetic tapes. The same
storage medium provides much more reliable storage of the digital data, as
the reproduction requires only retrieval of levels 1 and 0.
A variety of devices like CD ROMs, DVDs, Blue ray disks etcetera are
available today, which provide vary high capacity storage at a very small
fraction of the cost as compared to the analog data, and of course the
reliability is very high. The storage densities are so high that electronic copies
41
Ease of Signalling:-
Use of Micro-Processor:-
The digital technology permits the use of microprocessor for signal processing,
which provides tremendous flexibility, versatility and universality in the
equipment design. Besides the operational features, the microprocessor
greatly enhances the management features of the system, without adding
much to the cost, as the same set of hardware is able to take up both the jobs.
vi)
42
2.9: Disadvantages of Digital Technology:The biggest disadvantage of digital technology over analog technology is that
digital processing needs the analog signal to be first converted to digital, and
in the last the digital signal is again required to be converted to analog signal.
Thus the process requires additional components in the form of analog to
digital and digital to analog converters. But this is a very small price to be paid
for a much larger gain, and it is many more times compensated by the
reduced cost of digital components.
Another disadvantage of the digital technology is that the digital signal is
never an exact replica of an analog signal, it is only an approximation.
However the corruption of the signal caused by this approximation process
(called quantization) is many orders of magnitudes less, as compared to the
impairments suffered by the analog signal, particularly on long distance links.
This is more than evident to us if we know and compare; the unbearable
quality of the analog days to the present day digital quality of our long
distance telephone calls.
The overall scenario is that the digital technology has completely replaced the
analog technology in the processing and transmission. The analog technology
however continues to play its important role at the entry and exit points of the
systems, where the signals are required to interact with the human beings. In
short, we can say that today analog technology is acting as an interface
between humans and the digital technology.
**********************
References:
1. John G. Proakis, and Dimitris G. Manolakis, Digital Signal Processing
Principles, Algorithms, and Applications, Third Edition, Prentice Hall India
2005.
2. William Stalllings, Data and Computer Communications, Seventh Edition,
Prentice Hall of India 2003.
43
*****************************
44
Chapter IX
ii)
The first situation can arise either due to a fault in the equipment or its
associated power plant etcetera, at the transmitting or receiving nodes, or due
to a break in the transmission media like: optical fibre or copper cable.
On the other hand, the incorrect reception of data could be due to various
impairing factors in the transmission media (mostly it is the media causing the
problem, very rarely we come across an incorrect reception problem due to an
equipment failure), as we have seen in detail in chapter VI.
The PDH standards cater for detection and reporting of both the above types
of faults in the system. While going through the previous chapter on PDH, we
have come across the description of the roles of various bits of the E1, E2, E3
and E4 frames. Besides bulk of the bits which carry the user data, there are
some bits dedicated for alarms, indication of national/international origin and
CRC (cyclic redundancy check) applications. These bits, in addition to some
more pattern recognition mechanisms built into the equipments, help us to
locate the fault and determine its nature.
Let us have a look at these features of PDH systems.
9.1: Types of Alarms:The following alarms are provided in the PDH systems:i)
262
This is a local alarm, activated when the signal is not received from a
transmitter due to any reason.
ii)
This too is a local alarm at node, which gets activated when the framing
sequence (FAS word) is not properly received.
iii)
This is an alarm signal sent to the next station downstream when no signal
is being received from an upstream node, or if there is a loss of frame.
iv)
This is an alarm indication sent by a node, which receives AIS from the
previous node. This indication is sent back to the node which had sent AIS
to this node. RDI is also sent to the upstream node by a node having LOS
or LOF alarm.
v)
This alarm indication is sent to the next node downstream when the multiframe alignment is lost.
vii)
All the above alarms and indications are as per the standards defined by
ITU-T in their recommendation G.704, which are complied by all the
manufacturers of the systems. The individual manufacturers however
usually offer some more indications by making use of the spare bits
available in the standard formats.
263
Now we will have a look at each of these alarms in little more detail.
9.1.1: Loss of Signal (LOS):A local alarm is generated at a receiving node, when it stops receiving any
data. The loss of signal may be due to a disruption in the transmitting
media like copper cable or OFC, or even due to a high amount of fading in
terrestrial microwave or satellite communication. The loss of signal may
also take place due to an equipment failure at the transmitting node.
Break
Alarm LOS
Tx
Rx
Node
A
Node B
Tx
Rx
But how and when the equipment at node B decides to set the alarm? Or
how long it has to wait on a situation of no received signal before
activating the alarm? Fortunately there is no confusion on this account, as
the criterion has been clearly defined by ITU-T in their recommendation
number G.775. The criterion goes like this:If there are no transitions in the received signal for more than 10 and
less than 255 pulse intervals, a LOS is declared. A no transition is a
signal level which is less than or equal to 35 db below nominal signal level
[for all PDH levels from 2.048 Mbps to 139.264 Mbps]
The equipment also needs to know a criterion when it can Clear or stop
the alarm. This clearance criterion is to have transitions in the received
signal for more than 10 and less than 255 pulse intervals. A transition is
considered to be a signal level which is greater than or equal to 9 db below
the nominal signal level for 2.048 Mbps signal [for 34.368 Mbps and
139.264 Mbps it is 15 db].
264
Referring to fig 9.1.1-1 again, if the signal is being received by the node B
(there is no LOS), but if the framing sequence (or the FAS word) is not
being received properly; it will not be able to make any use of the received
data, leading to same consequences as LOS. This type of error is quite
common, when a temporary or permanent fault is there in the transmission
media or the transmitting equipment, or due to any other impairment to the
signal.
The criterion for equipment at node B to decide and generate the LOF
alarm is to not receive the framing sequence properly for three
consecutive frames or receive the bit no 2 of the time slot 0 of odd
frames incorrectly for three consecutive frames. To understand it clearly
let us redraw the bit allocation diagram of time slot zero in a 2048 kbps bit
stream of an E1.
Bit 1 CRC/Origin
International = 1
Domestic
=0
Bit error indication
In 13th and 15th
Frame.
Bit 2
Frame marker
1 = Odd frame
0 = Even frame
Bit 3 Remote
alarm in
odd frames
As can be seen in fig 9.1.2-1, the Frame Alignment Signal or FAS word is
defined in bits 2 to 8 of the time slot 0 of Even Numbered frames. The FAS
word is 0011011. If this sequence is not received correctly for three
consecutive frames, the LOF alarm is generated by the receiving equipment.
The bit number 2 which is a frame marker bit is always set to 1 in the odd
265
frames and to 0 in the even frames. The odd frames are not supposes to
carry the FAS word, thus if odd frames have a value of bit number 2 set to 0,
it is a signature of an erroneous framing information. Hence three consecutive
wrong values of bit 2 in odd frames will also entitle the equipment at the
receiving end to generate an LOF alarm. Fig 9.1.2-2 illustrates the principle.
Impairment
Tx
Incorrect FAS
reception
LOF generated
Rx
Node B
Node
A
Tx
Rx
[There were a lot of other criteria being used by various vendors for different
alarms, before the ITU-T recommendation G.775 was made. They are not being
explained here because the idea here is to impart an understanding of the
concept, rather than providing a detailed reference. The PDH by itself is obsolete
today. We are discussing the details in this text only to develop an understanding
of the prevailing SDH technology, for which the understanding of PDH is a
necessary stepping stone. In fact the alarms and management features of SDH
are a further development of PDH features only.]
9.1.3: Alarm Indication Signal (AIS):When an LOS or LOF is detected at a node in accordance with sections
9.1.1 and 9.1.2 above, the node generates an Alarm Indication Signal or
AIS, and sends it to the next node downstream. Fig 9.1.3-1 shows the AIS
generation and transmission.
266
1 1
Framed 1s
No alarm
1
1
1 1
Break
Tx
Node
A
Rx
Tx
Node
B
Rx
Rx
Node
C
Tx
Fig: 9.1.3-1:- The Alarm Indication Signal (AIS) generation and transmission
The format of the AIS signal, sent to the downstream node (node C in this
case) is All 1s in an unframed format. The continuous transitions in the
1s bit stream helps in maintaining the timings in the node B.
The detection criterion for the alarm at node C is the detection of Less than
or equal to 2 zeros in the bit stream in each of the two consecutive double
frame periods (i.e. 512 bits). Naturally when all 1s are being transmitted by
node B, no zeros will be detected at node C; and thus AIS alarm will be
activated. The defect is cleared and the alarm is stopped when the node B
starts sending the normal signal containing data bits. The criteria for
clearance adopted by node C are: reception of 3 or more zeros in each of
the two consecutive double frame periods (which is very normal for any real
data), or on the detection of proper FAS (frame alignment signal).
When the node C receives an AIS signal from up stream, it does not have
any real data to send to the down stream node. It can pass on the same AIS
signal to the next node. However carrying the alarm to more nodes is neither
useful nor necessary, thus the node C sends a bit stream of all 1s to the
downstream nodes, so that the timing pulses at the downstream node can be
sustained in the absence of a real data signal, but this time this All 1s signal
is Framed, to make it different from the AIS signal. The framed 1s will have
a proper FAS word, thereby avoiding activation of AIS alarm, as per the
criteria mentioned in the above paragraph.
The detection criteria for higher PDH levels like E2, E3 and E4 are similar,
except the number of zeros to be detected in the bit stream for activation or
clearance, in two consecutive frames. The details are shown in the table in fig
9.1.3-2.
267
PDH level
Number of 0s
in two
consecutive
frames, for
detection
Number of bits
in each frame
Number of 0s,
in two
consecutive
frames, for
clearance
E1
2.048
E2
E3
E4
8.448
34.368
139.264
4
4
5
512 (double
frame)
848
1536
2928
5
5
6
Fig: 9.1.3-2:- The detection and clearance criteria for various PDH levels
9.1.4: Remote Defect Indication (RDI):When AIS is detected at a node, it generates a local AIS alarm and sends an
alarm signal to the node from where it received the AIS signal. Let us consider
fig 9.1.4-1 for the discussion.
1 1
Framed 1s
No alarm
1
1
1 1
Break
Rx
Tx
Node
B
Tx
Rx
Tx
Node
A
Rx
Rx
Node
C
Tx
268
Bit 1 CRC/Origin
International = 1
Domestic
=0
Bit error indication
In 13th and 15th
Frame.
Bit 2
Frame marker
1 = Odd frame
0 = Even frame
Bit 3 Remote
alarm in
odd frames
9.1.5: Determination of Fault Location:Please refer to fig 9.1.4-1 again. From the position of alarms at various nodes
we can diagnose the faulty section.
269
In the depicted situation, node A is receiving an RDI alarm from nodes down
stream to node A, i.e. nodes B onwards. Node C is receiving an AIS signal
from an up stream node and also sending a RDI alarm, meaning that the fault
is beyond the up stream node. This establishes that the faulty section is
between node A and node B.
9.1.6: Loss of Multi-frame Alignment (LOMF):At times it may so happen that at a particular node, though the frames are
being received properly, the multi-frame alignment is lost. It means that the
multiplexer equipment does not know the frame number. This type of defect
may come up due to some problem in the node equipment. Let us recall our
study of chapter VII section 7.1.3, where we have seen the details of multiframing. Fig 9.1.6-1 is redrawn from this section for easy reference.
TS 16 Bit Nos
1
-MFAS-
---
---
---
Frame 0
Frame 1
Alarm
Frame 2
Frame 15
270
9.1.7: Multi-frame Alignment AIS (MFAIS):When a local alarm is generated at a node about the loss of multi-frame, as
explained in section 9.1.6 above, an AIS signal is sent down the stream to the
next node. This AIS signal is sent using the complete 'Time Slot 16'. The
signalling information contained in the time slot 16 is rendered useless as
soon as the multi-frame alignment is lost. Thus TS-16 becomes free from its
normal duties and is used to send AIS, also called TS-16 AIS, to the next
node. The format of this TS-16 AIS signal is "setting all the bits of TS-16 to 1".
Fig 9.1.7-1 illustrates the situation.
Loss of multi-frame
Alignment
Tx
Node
A
Rx
TS-16 AIS
Rx
Tx
Node B
Rx
Node C
Tx
Tx
Rx
271
On receipt of the multi-frame alignment AIS in TS-16, node C sets the value
of the alarm bit of time slot 16 to 1, in the signal being transmitted to node B
(please refer to fig 9.1.7-1 above). We have already learnt in chapter VIII
section 8.1.5 (and also seen in fig 9.1.6-1 above) about the bit assignment of
TS-16 in an E1 bit stream. Fig 9.1.8-1 shows the bit assignment of TS-16 of
frame 1 of a multi-frame of 16 frames.
Spare Bits
Bit number
Bit Assignment
1
TS-16
Frame
1
Multi-frame
Alignment
Signal
Alarm Bit
The bit number 6 used for alarm signal is shown in fig 9.1.8-1 above. The bit
is normally a 0 and is set to 1 in case of alarm, i.e. when the node C
receives a TS-16 AIS from node B. The alarm is again called RDI; let us call
it Multi-frame RDI (MFRDI) to differentiate it from the RDI defined earlier in
this chapter. The MFRDI is thus sent to the up stream node B (Fig 9.1.8-2).
TS-16 AIS
(All 1s in TS-16)
1
1 1
Loss of Multi-frame
Alignment
Rx
Tx
Node
A
Tx
Node B
Rx
Node C
Tx
Rx
Tx
Rx
MFRDI
(Bit 1 of TS-16
Set to1)
MFRDI
(Bit 1 of TS-16
Set to1)
272
9.1.9: Remote End Block Error (REBE):As stated earlier in the beginning of this chapter, this is an alarm signal which
is sent back to the transmitter, when there is a mismatch in the CRC
checksum at the receiver, indicating bit errors in the received data.
CRC or Cyclic Redundancy Check is a very powerful tool to detect errored
reception of data, without taking the system out of service [CRC has been
explained in detail in section 6.7]. Let us see how CRC is implemented in
PDH level 1 i.e. E1 level, and how the REBE bit is accommodated and
transmitted.
The diagram showing the principle of operation of CRC is redrawn here for
the ease of reference as fig 9.1.9-1.
CRC
Compu
tation
Tx
Node
A
Rx
CRC
word
Extraction
of received
CRC word
Local computation
of CRC word
R
Node B
Data + CRC
word
Comparator
Matching
No Action
Mismatch
Error
The 'frame check sequence' (FCS) or as it is normally called; the CRC word,
is generated by performing a complex logical manipulation (usually through a
polynomial implementation) on 8 frames of the E1 bit stream at a time. These
8 frames are actually half of a multi-frame of 16 frames. For this purpose the
multi-frame (MF) is divided into two sub multi-frames (SMFs) called SMF I and
SMF II. This is depicted in fig 9.1.9-2.
273
Multi-frame of 16 frames
Frame number
SMF I
10
11 12
13 14 15
SMF II
Fig: 9.1.9-2:- The multi-frame of E1 is divided into two sub multi-frames SMF I
and SMF II
The CRC manipulations are performed on all the bits of an SMF and a four bit
CRC word (FCS Frame Check Sequence) is generated.
[Use of a 4 bit word for CRC gives it the name CRC-4, for the use in E1 transmission.
For different transmission schemes the CRC word length may be different, may be 5,
6, 7 or 8, and accordingly the CRC scheme will be called CRC-5, CRC-6, CRC-7 or
CRC-8 etcetera]
This CRC word is transmitted in the next frame. At the receiver the same
manipulations are performed again on respective SMFs and a local CRC word
is generated. The received and locally generated CRC words are compared
with each other. If they are found matching, then the received data has no
errors, else the data is interpreted as errored, by the receiver.
Let us see how exactly the CRC word is carried from the transmitter to the
receiver.
Since the CRC manipulations take place simultaneously with the transmission
of the data, CRC word can not be carried in the same SMF on which the CRC
manipulations are being done. The natural choice thus for carrying the CRC
word is the next sub multi-frame. Hence the CRC word of SMF I of current
frame is carried in the SMF II of the current frame, and the CRC word of the
SMF II of the current frame is carried in the SMF I of the next frame, and so
on. Fig 9.1.9-3 illustrates the concept.
274
MF I
SMF I
MF II
SMF II
SMF I
SMF II
CRC word of
SMF I/ MF I
CRC word of
SMF II/ MF I
CRC word of
SMF I/ MF II
So SMF is ok, but which are the bits, which actually carry the CRC word?
We have discussed earlier that the bit number 1 of Time-Slot 0 (TS-0)
(Please refer to fig 9.1.4-2) is used to indicate the origin of the E1. If the E1
is of international origin, the bit is set to 1 or if it is of domestic origin, the bit
is set to 0. The same bit is utilized for carrying the CRC word in Even
numbered frames of a multi-frame, when CRC is deployed. In this situation,
the identification of (international or otherwise) the origin is lost; and it is
considered to be an acceptable penalty for giving way to the implementation
of CRC.
[CRC may not be deployed always by all vendors, as it is considered to be an add on
feature for enhancing system availability through better diagnostics, without which
also the basic functioning of the system may continue]
There are four numbers of even numbered frames in an SMF, and thus 4 bits
are available for accommodating the 4 bit CRC word of the previous SMF.
Each even numbered frame of a multi-frame thus carries one bit each of CRC
words. Fig 9.1.9-4 shows the details.
275
TS 0
TS 1
TS 2
TS 31
1 2 3 4 5 6 7
Frame 0
Frame 1
Frame 2
Bit no 1 of
TS 0 of even
numbered
frames used
for CRC word
Frame 3
S
M
F
I
Frame 4
(Frame 6)
Frame 7
Fig: 9.1.9-4:- The bit number 1 of TS-0 of even numbered frames carries the
CRC word in each SMF
As stated earlier in this section, the received and locally generated CRC
words are compared with each other. If they match properly, no action is
taken, but in case of a mismatch, an error signal is sent back to the
transmitter by the receiver. This signal called REBE (Remote End Block Error).
The situation is depicted in fig 9.1.9-5.
Data + CRC
Tx
Rx
Extraction
of received
CRC word
Node
B
Node
A
Rx
Local
computation
of CRC word
Tx
Comparator
Matching
Mismatch
No Action
REBE
Error
276
The REBE signal is sent back to the transmitter indicating that there are errors
in the received data. Though it is not clear as to how many errored bits are
received and where they are located, still CRC is considered very useful
because its operation is In Circuit, i.e., it does not call for the system to be
taken out of service. The maintenance engineers are alerted on receipt of
REBE alarm and take necessary remedial action to correct the bit errors.
The REBE signal is conveyed by setting the bit number 1 of time slot 0 (TS0) of frame number 13 of the multi-frame of 16 frames, to a value of 0,
which is normally set to 1 otherwise. Let us have a look at the bit assignment
of TS-0 of frame number 13, which is shown in fig 9.1.9-7.
TS 0
1 2 3 4 5 6 7 8
Bit no 1 of
even numbered
frames, used
for CRC
TS 1
TS 2
TS 31
Frame
Number
0
1
2
3
CRC word
of SMF II
of Previous
frame
S
M
F
I
5
6
Multi
Frame
7
8
CRC word
of SMF I
of this
frame
10
11
Bit no 1 of
frame no 13
is REBE bit
for SMF I
of previous
frame
S
M
F
II
12
13
14
15
Bit no 1 of
frame no 15
is REBE bit
for SMF II
of previous
frame
Fig: 9.1.9-7:- The utilization of bit number 1 of TS-0 of multi-frame for CRC
word and REBE
277
all the even numbered frames for CRC word, and in odd numbered frame
numbers 13 and 15 for CRC error indication. The bit in remaining odd
frames is also not used for origin identification when CRC is deployed, rather
it is used for a 6 bit CRC sequence, which is utilized for inter-working with the
nodes which do not deploy the CRC procedure.
******************************
References:
***************************
278
Chapter-XII
In this chapter we will discuss these elements and architectures. We will also
see about various types of ring architectures and their relative merits and the
mechanisms of protection switching in each case. The role of K1, K2 bytes of
the MSOH which is very important for protections switching, will also be
explored. The practical deployment scenarios are generally very different and
complex from the scenarios considered for explaining the principles, however
they work on same principles for achieving the end objectives. We will have a
look at practical deployment too.
SDH can operate on any media, like: paired copper cables; coaxial cables;
radio; or optical fibre cables, however bulk of the present SDH network is on
OFC. To keep our focus on the subject of architecture and protection
arrangements, we will presume the media to be OFC throughout this chapter.
The SDH network elements can be arranged in following categories:(i) Terminal Multiplexer
(ii) Regenerator
(iii) Add and Drop Multiplexer
(iv) Digital Cross Connect
Let us see the features of each of them.
12.1.1:- Terminal Multiplexer (TM):A terminal multiplexer is a multiplexer equipment, beyond which there is no
transmission. It could be located at the end of the telecom operators territory
or may be at customer premises etcetera. A terminal multiplexer is depicted in
fig 12.1.1-1.
Rx(STMN)
TM
Tx(STMN)
Tributaries
E1, E3, Ethernet
Etcetera
Thus a TM has the STM transmission and reception on one side of it and
tributaries getting inserted or dropped on the other side. There is no
regeneration at TM.
12.1.2: Regenerator (REG):A regenerator node is an equipment, which simply regenerates (or repeats)
the signal received from either side and transmits it on to the opposite sides,
in an SDH network. Fig- 12.1.2-1 shows a regenerator node.
Tx(STMN)
(STMN)Rx
Regenerator
(STMN)Tx
Rx(STMN)
12.1.3: Add/ Drop Multiplexer (ADM):At the add/drop multiplexer equipment, we regenerate the signal as well as
we can add or drop tributaries. These are the nodes which form the multiplex
section NE. An ADM is shown in fig 12.1.3-1.
Rx
Tx
(STM N)
(STM N)
ADM
Tx
Rx
(STM N)
(STM N)
Tributaries like
E1, E3, Ethernet
etcetera
12.1.4:- Digital Cross Connect (DXC):Digital Cross Connect is basically a switching unit, facilitating the
interconnection of any of the tributaries connected to it on one side to any of
the tributaries connected on the other side of the equipment. It is just like a
small automatic exchange interconnecting various subscribers.
In SDH, cross connects can be divided in two categories namely:
(a) Higher order cross connect, and
(b) Lower order cross connect.
Let us see their functioning.
(a) Higher Order Cross Connect:Higher Order Cross Connect switches the higher order virtual container (VC4) from one STM-1 to another STM-1. The access capacity in this cross
connect is STM-1. Fig 12.1.4-1 shows this.
VC 4Switching
STM1
STMN
Optical to
Electrical
conversion
STM1
STM1
STM1
STM1
STM1
STM1
STM1
STM1
STM1
Optical to
Electrical
conversion
STMN
Electrical Levels
(a)
STMN
STMN
(b)
Fig -12.1.4-1:- Higher Order Cross Connect (a) and its symbolic
representation (b).
The STM-N is first broken into STM-1s (electrical signals); then any of the
STM-1s on one side can be connected to any other STM-1 s on the other side.
(b) Lower Order Cross Connect:The cross connections of lower order payloads i.e. VC12, VC2 etcetera are
required rather more frequently as compared to higher order payload. This is
owing to the fact that most of the user channels are tributaries like E1, E3 and
Ethernet etcetera, the lower order cross connects provide this switching. Fig
12.1.4-2 shows the concept.
Tributary containers
STMN
M
U
X
VC2,VC12etc
Tributary containers
VC12,VC2
VC2,VC12etc
M
U
X
STMN
Switching
(a)
STMN
VC12
VC
12
STMN
(b)
The SDH network topology will basically depend upon the application. The
simplest one could be point to point connection between two places, say
connecting two exchanges or two offices of a company. The more general
application is the network of a telecom operator, which could be linear or a
ring or a mesh network, again depending upon the geography of the nodes to
be served and the requirement of reliability. These topologies are depicted in
fig-12.2-1(a) (b) (c) & (d).
OFC Link
Tx
TM
Rx
TM
Rx
Tx
STM-N
Terminal
Multiplexer
Terminal
Multiplexer
In our discussion in the previous section, we have taken the tributaries like
E1, T1, and E3 etcetera for the purposes of concatenation, to enable easy
understanding. However in actual practice the concatenation is done at the
Virtual Container (VC - Level). We have seen in detail in section 10.6 and
10.8, the formation of containers and virtual containers from the
asynchronous tributaries. The asynchronous tributary (E1, T1, E3 etc) is
brought to a constant bit rate level by adding some justification and control
bits. The unit so formed is called a container. The container is added with
path overhead bytes, to be called a virtual container (VC). The VC, when
added with a pointer (TU/AU) is called a Tributary Unit or Administrative
Units. Fig 13.4-1 shows this process.
Asynchronous Tributary
Rate
Adaptation
Unit
Path Overhead
Container
Virtual
Container
TU/AU Pointer
TributaryUnit/
Administrative
Unit
whereas the POH portion of the VC-4 is filled with stuff bytes (which are
discarded at the receiving end) except that of the first VC -4. The AU-4
pointer, which points to the location of the first byte J1 of the VC-4, is
retained as it is for the first AU-4, while the rest of the AU-4s pointers are
filled with bits, which indicate that this VC-4 has been concatenated. The
concatenated payload structure so formed is called VC-4-Xc, where X is
s
POH
Row No
J1
B3
C2
Fixed
F2
Stuff
H4
F3
K3
N1
1
Container
C4-Xc
Bytes
X-1
X x 260
X x 261
1st AU-4
H1 Y
H2
H3
H3
H3
First H1 & first H2 bytes make
up the AU-4
Pointer
1101SS11
11111111
STM 1 has only one VC-4, STM-4 has 4-VC4s and STM-16 has 16 VC4s. The respective data communication capacities of these concatenations
will be (maximum capacities if X=N)
STM-4 : VC4-4c = 599.040 Mbps. (4 x 260 x 9 x 8 x 8000)
STM-16 :- VC-4-16c = 2396.160 Mbps (16 x 260 x 9 x 8 x 8000)
The concatenation indication tells the receiver that this particular VC-4 has
been concatenated, and thus it should not look for J1 byte, but continue to
receive the bit stream. After reception of the bits, the knowledge of
locations of stuff bytes is used in discarding them.
Thus treating the data communication bitstream as payload and using
concatenation allows us to use SDH for the transport of data
communication services.
The process of arranging the data-communication frames into the SDH
payload area; in a systematic manner, is called Mapping. ITU-T has
defined the mapping of various types of data signals into SDH in their
recommendation G.707. We will have a look at some of them; in the next
few sections, to develop our understanding further.
53 Bytes
Header
Payload
5 Bytes
48 Bytes
Since ATM cell is only 53 bytes long, it can be mapped into any size of
payload of SDH i.e. VC-12, VC-11, VC-2, VC-3 or VC-4. We will see here
s
STM-1
RSOH
Pointer
MSOH
C4 = 260 x 9 bytes
(Or C4-Xc)
Since the ATM cell size is 53 bytes and VC-4 payload area size is 260 x 9
= 2360 bytes, the VC-4 is not an integer multiple of ATM cells. Thus the
boundary at the end of VC-4 will not align with the boundary of the ATM
cell. A part of the last ATM cells is thus allowed to get into the next VC-4,
or in other words it is allowed to cross the boundary of the container VC-4.
Though the example shown above is for a single VC-4, similar mapping
will be done for a concatenated VC-4-Xc. The mapping in the case of VC-3
or VC-3Xc will also be similar.
2. ATM Mapping in VC -2: The process of mapping the ATM cells into VC-2 remains the same as that
used for VC-4. The VC-2 structure is a four frame multi-frame of 428
bytes, out of which 4 bytes are overhead bytes, and remaining 424 bytes
are data bytes. The mapping is shown in fig 13.53.
V5
125s
J2
125s
428 Bytes
500s
N2
125s
We can see that each individual frame of the multi-frame has an area of
106 bytes as the payload area. It is a great coincidence that it can
accommodate just 2 ATM cells of 53 bytes each, completely aligning the
boundaries at the beginning and at the end.
Similar results will be produced for mapping of ATM cells into VC-2-Xc, i.e.
concatenated VC-2 containers too. The only difference being that the POH
of all the VC-2s, except the first one, will be filled with stuff bytes and the
pointers will carry the concatenation indication as explained in section 13.4
above.
The ATM mapping can be done in all other types of tributaries of SDH, in a
manner similar to the above two methods.
HDLC (High Level Data Link Control) is a data communication protocol for
data link layer, which was developed by ISO (International Standard
Organization).
ITU-T modified HDLC and called it LAP (Link Access Procedure). LAP was
subsequently modified to LAP B and finally to LAP-S (Link Access Procedure
for SDH). PPP (Point to Point Protocol) is a protocol which was especially
developed for Internet.
Ethernet and IP are carried over one of these protocols.
All these protocols i.e. HDLC, PPP and LAPS have a similar format, with
some
difference from one another; incorporated by different
standardization organizations.
However as far as the mapping over SDH is concerned, their exact shape &
size and the contents do not matter, they have to be carried over the SDH as
a payload. Fig. 13.6-1(a) and (b) show the format of HDLC and LAPS frames
for example.
>=0
16
1
Flag
Address
Control
Data
Checksum
Flag
>=0
1
Flag
Add
Control
SAPI
SAPI
Data
FCS
Flag
No. of bytes
7
46-1500
4
Preamble
Flag
1
Start of Destination
Frame
Add
Add
Control
1
Source
Add
SAPI
2nd
SAPI
1st
1
Length/Type Data
Data
1
FCS
Ethe
Fra
FCS
LAPS
Fram
Flag
>=0
The developments so far discussed in this chapter, facilitated the muchneeded transport of data communication bit-stream over long distances.
However these procedures have some limitations and shortcomings, which
are the subject of next section.
When the data over SDH was made possible, it was a wonderful
achievement, but as the time passed and we got used to it, we started
realizing that things could be better than what they are. A number of
shortcomings started surfacing by and by, which limited the capacity and
efficiency of the system. The important ones are as follows: i) Requirement of Concatenation feature : The concatenation feature is required to be available at all the nodes,
throughout the link on which the facility is required. This makes the
deployment of concatenated services very difficult on the existing
infrastructure, which may not have this feature.
ii) Inefficient capacity utilization: The capacity utilization of the SDH; when used for data communication;
remains poor, which results in poor overall circuit efficiency. For example if a
100 Mbps traffic (100 base T Ethernet) is to be carried over the SDH, the
nearest suitable capacity is approximately 150 Mbps in the container C-4 in
an STM-1, leaving about 50 Mbps of the data capacity unutilized, leading to
an efficiency of 66%. If a 1000 Mbps (GB Ethernet) is to be transported, the
nearest SDH level is 2.5 Gbps (STM-4), resulting in only 40% or so efficiency.
iii) Stuffing Bytes requirement:The protocols like, HDLC, PPP & LAPS etc have a frame marker or flag with a
value