Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Communication Basics
Transmitter, Medium, Receiver Network Communication Rules Protocol
3
Types of Signals
Voice Video & High quality video Data
4
Medium
Copper - Electrical Wireless - Microwave / Radio Fiber - Optical Satellite*
5
Multiplexing Techniques
TDM FDM WDM STDM
6
Transmission Types
Asynchronous Plesiochronous Synchronous
Transmission Protocols
ATM Frame Relay IP TCP
8
Types of Networks
9
Network Topologies
10
Star Network Hierarchical Mesh Bus Ring Hybrid Private & Public
Types of Circuits
Point-to-Point Multi-Point 2 and 4 Wire Digital Wire, Twisted Pair, Coaxial,
Optical,Wireless
11
12
The synchronous multiplexing results in simple access to SDH system has consistent frame structures throughout the hierarchy. The payload is transparent SDH system has consistent frame structures throughout the hierarchy. Digital cross- connections are provided at different signal levels and in different ways on NMS
Comparison (Contd.)
PDH G.702 specifies maximum 45Mpbs & 140Mpbs & no higher order (faster) signal structure is not specified PDH system does not bear capacity to transport B-ISDN signals. Few services are available Limited amount of extra capacity for user / management Bit - by - bit stuff multiplexing SDH G.707 specified the first level of SDH.That is, STM-1, Synchronous Transport Module 1st Order & higher. (STM-1,STM-4,STM-16, STM-64) SDH network is designed to be a transport medium for B-ISDN, namely ATM structured signal. It will transport variety of services. It will transport service bandwidths Sufficient number of OHBs is available Byte interleaved synchronous multiplexing.
14
15
Contents
Introduction SDH frame format and structure Payload and Virtual container SDH multiplexing Technique Function of Section, Multiplex section over head and pointer bytes Operations (consolidation and grooming) Check your learning
16
History
Bellcore originally proposed SONET Synchronous Optical NETwork 1985ANSI T1X1 committee agreed the proposal 1986 CCITT SDH standards published: G.707, G.708, G.709 1987 Bellcore submitted SONET to CCITT much European opposition
17
History (Contd)
PDH Transmission Rates
Hierarchica l Level
0 1 2 3 4
18
American DS-x
64 1544 6312 44736 139264
European CEPT-x
64 2048 8448 34368 139264
Japanese
64 1544 6312 32064 97728
International
64 2048 6312 44736 139264
History (contd)
Note the various differences and hence the standardization problem Compromises Basic rate for SONET increased to 51.840 Mbs to permit more bandwidth for OAM - concession to Europeans - a good move. Europeans dropped demand for level 2 and 3 rates to be directly supported. SDH/SONET merged on DS-3 and CEPT-4 rates
19
Summary
SONET is a digital hierarchy interface conceived by Bellcore and defined by ANSI for use in North America. SDH is (a) a network node interface (NNI) defined by CCITT/ITUTS for worldwide use and partly compatible with SONET; and (b) one of two options for the user-network interface (UNI) (i.e., the customer connection), and formally the U referencepoint interface for support of BISDN.
20
OC-768
STS-768/STM256
39813.12
22
Frame Structure
24
Payload details
25
Elements of SDH
26
Container (C) Virtual Container (VC) Tributary Unit (TU) Tributary Unit Group (TUG) Administrative Unit (AU) Administrative Unit Group (AUG) Synchronous Transport Module - N (STM N)
Container
Input signals are placed into the containers It adds stuffing bytes for PDH signals,which compensates for the permitted frequency deviation between the SDH system and the PDH signal
27
C12 (2 Mbps G.703) C11 (1.5 Mbps) C2 (6 Mbps) C3 (34 / 45 Mbps) C4 (140 Mbps)
Container(Contd)
ALIGNMENT : It is a process of adopting the incoming PDH signals into containers i.e. PCM 30 or 2Mbps to C12.
ANALOGY 1. Putting 30 mobile phones in one polythene bag 2. Packing the above polyethene bag in one carton box along with some packing material. 3. The above packing material called bytes
28
2Mbps or PCM30
Alignment Stuffing
Virtual Container
MAPPING : It is a process from Containers to
Virtual containers.
POH
PAYLOAD
POH
PAYLOAD
ANALOGY: Packing C2 carton box with some more packing material and labeled as VC2 box
29
Mapping (Asynchronous)
Mapping is a process used when tributaries are adapted into VCs by adding justification bits and Path overhead information The 2 Mbps signals are not synchronized to the SDH signal.It imposes no signal structure requirements, so 2 Mbps signals using this mapping do not need to be framed.This allows easy interface with existing PDH systems as variable bit justification occurs as part of this type of 2Mbps mapping.
30
32
Virtual Container
It adds overheads to a container or groups of tributary units, that provides facilities for supervision and maintenance of the end to end paths VCs carry information end to end between two path access points through the SDH system VCs are designed for transport and switching sub-SDH payloads VC12 (C12 + POH) VC11 (C11 + POH) VC2 (C2 + POH) VC3 (C3 + POH) VC4 (C4 + POH) 33
Tributary Unit
It adds pointers to the VCs This pointer permits the SDH system to compensate for phase differences within the SDH network and also for the frequency deviations between the SDH networks TUs acts as a bridge between the lower order path layer and higher order path layer TU12 (VC12 + pointer) TU2 (VC2 + pointer) TU3 (VC3 + pointer)
36
37
Administrative Unit
It adds pointer to the HO Virtual containers(similar to the tributary unit) AU - 3 (VC-3 + pointer) AU - 4 (VC-4 + pointer)
It defines a group of administrative units that are multiplexed together to form higher order STM signal
38
39
40
41
42
43
44
32 Bytes
Stuffing Bytes
C-12
1 23
32
34 Bytes
VC-12
1 23
32
35 Bytes
47
TU-12
36 Bytes
9 Rows
4 Columns
48
9 Rows
4 Columns Multiplexing
4 Columns
4 Columns
TUG-2
9 Rows
49
12 Columns
Stuffing Bytes
X 7 TUG-2
TUG-3(multiplexing)
TUG 3
50
86 Columns
84 Columns
VC - 4
X 3 TUG3
51
9 rows
Pay Load
Pay Load
9 Columns
261 Columns
52
RSOH
AU Pointer
PAY LOAD
5-9 rows
MSOH
9 Columns
53
54
55
J0 Regenerator Section Trace Its used to transmit a Section Access Point Identifier so that a section receiver can verify its continued connection to the intended transmitter
RSOH (contd.)
B1- Bit Interleaved parity (BIP-8) This is a parity code (even parity), used to check for transmission errors over a regenerator section Its value is calculated over all bits of the previous STM-N frame after scrambling, then placed in the B1 byte of STM-1 before scrambling E1 Engineering Order wire This byte is allocated to be used as a local order wire channel for voice communication between regenerators This byte functionality is available at both multiplexers and Regenerators
57
58
BIP (contd)
Regenerator section BIP is calculated over the entire signal including all RSOH,MSOH,VC-4 POH and payload of the previous frame..The result is placed in B1 for a STM-1. MS BIPs are calculated over the previous STM-1 frame,minus RSOH, and placed in the B2 bytes. Path BIP are calculated over the previous frame, minus RSOH and MSOH and are found in the B3 byte of every STM-1.
59
RSOH (contd.)
F1 User Channel This byte is set aside for the users purposes D1 to D3 Data Communication Channel These three bytes form a 192 kbps DCC for Operation & management of the SDH System Network management system sends / receives provisioning, security, status / control alarm and performance monitoring command / response by way of DCC
60
MSOH (contd.)
K1 & K2 Multiplex Section Protection These two bytes are used for MSP signaling between multiplex level entities for bi-directional automatic protection switching and for communicating Alarm Indication Signal (AIS) and Remote Defect Indication (RDI) conditions D4 to D12 Data Communication Channel These nine bytes form a 576 kbps DCC for Operation & management of the multiplexers on a SDH line Network management system sends / receives provisioning, security, status / control alarm and performance monitoring command / response by way of DCC
62
K1 Byte Allocation
Bits 1234 1111 1110 1101 1100 1011 1010 1001 1000 Condition,state or external request Lockout of protection Forced switching Signal fail, high priority Signal fail, low priority Signal degrade, high priority Signal degrade, low priority Unused Manual switch Priority High .. .. .. .. .. .. ..
63
K1 Byte Allocation
Bits 1234 0111 0110 0101 0100 0011 0010 0001 0000 Condition,state or external request Unused Wait to restore Unused Exercise Unused Reverse request Do not revert No request Priority .. .. .. .. .. .. .. Low
64
K1 Byte Allocation
Bits 5678 1111 1110 1101 1100 1011 1010 1001 1000 Channel Requesting switch action no. 15 14 13 12 11 10 09 08 Extra Traffic channel Working channel Working channel Working channel Working channel Working channel Working channel Working channel
65
K1 Byte Allocation
Bits 5678 0111 0110 0101 0100 0011 0010 0001 0000 Channel Requesting switch action no. 07 06 05 04 03 02 01 00 Working channel Working channel Working channel Working channel Working channel Working channel Working channel Null channel
66
K2 Byte Allocation
Bits 1234 1111 1110 1101 1100 1011 1010 1001 1000 Channel no. Requesting switch action 15 14 13 12 11 10 09 08 Extra traffic channel Working channel Working channel Working channel Working channel Working channel Working channel Working channel
67
K2 Byte Allocation
Bits 1234 0111 0110 0101 0100 0011 0010 0001 0000 Channel Requesting switch action no. 07 06 05 04 03 02 01 00 Working channel Working channel Working channel Working channel Working channel Working channel Working channel Null channel
68
K2 Byte Allocation
Bit 5 1 0 MSP switch architecture 1: n architecture 1+ 1 architecture
69
K2 Byte Allocation
Bits 678 111 110 101 100 011 010 001 000
70
Status MS AIF MS FERF Future use Future use Future use Future use Future use Future use
APS (contd)
Protection Switching is initiated due to : Signal failure Signal degradation In response to commands from a local craft terminal or a remote network manager. Two modes of APS are provided 1+1 Protection 1:N protection
72
Source
Destination
73
1: N Protection switching
Near End
Working
Far End
Normal condition Protection on channel empty
Protection
Near End
Working
Far End
Failure condition Protection channel contains failed line
Protection
Source
74
Destination
MSOH (contd.)
E2 Engineering Order wire This byte is allocated to be used as a local order wire channel for voice communication between multiplexers This byte is not accessible at the regenerators
M1 - Remote Error indication It is used to indicate the MS layer remote error indication (MS-REI)
75
MSOH (contd.)
S1 Synchronization status message byte (SSMB) Bits 5 to 8 of this S1 byte are used to carry the synchronization messages
0000 0010 0100 1000 1011 Quality unknown (existing sync. network) G.811 PRC (Primary Reference Clock) G.812 transit SSU-A (Synchronisation Supply Unit - A) G.812 local SSU-B (Synchronisation Supply Unit B) G.813 Option 1 SEC (Synchronous Equipment Timing Clock)
1111 Do not use for synchronization. This message may be emulated by equipment failures and will be emulated by
76
SDH Pointers
H1
H2 1
H3 H3 H3
Use of Pointers H1 & H2 = VC payload pointer It indicates the starting position of VC H3 = Negative Justification 1 = All 1s It is also used for justification AU pointer is also used for concatenation Y = 1001SS11 (S bits unspecified) SDH provides payload pointers to permit differences in the phase and frequency of the Virtual Containers (VC-n) with respect to the STM-N frame Lower-order pointers are also provided to permit phase differences between VC-12/VC-2 and the higher-order VC3/VC-4 To accomplish this, a process known as byte stuffing is used
77
Pointers (contd.)
The value of the pointer has a range of 0 to 782 For example, If the VC-4 Payload Pointer has a value of 0, then the VC4 begins in the byte adjacent to the H3 byte of the Overhead; If the Payload Pointer has a value of 87 (since each row of the payload has 86 positions), then the VC-4 begins in the byte adjacent to the K2 byte of the overhead in the byte of the next row The pointer value, which is a binary number, is carried in bits 7 through 16 of the H1-H2 pointer word.
78
Pointers (contd.)
Positive Pointer Justification
When the data rate of the VC is too slow in relation to the rate of the STM-1 frame, positive stuffing must occur. An additional byte is stuffed in, allowing the alignment of the container to slip back in time. This is known as positive stuffing
Conversely, when the data rate of the VC is too fast in relation to the rate of the STM-1 frame, that negative stuffing must occur. Because the alignment of the container advances in time, the payload capacity must be moved forward. Thus, actual data is written in the H3 byte, the negative stuff opportunity within the Overhead; this is known as negative stuffing
79
VC-4 Boundary
H1 Y Y
H2 1 1 H3 H3 H3
VC-4 Boundary
80
VC-4 Boundary
From next row From next row
Points out H1 Y Y H2 1 1
Start of VC-4
VC-4 Boundary
H1 Y Y
H2 1 1 H3 H3 H3
VC-4 Boundary
81
Path OverHead
Path Overhead
J1- Path trace Starting point of VC It is used to transmit repetitively a path access point identifier, similar to J0
B3 Path Bit Interleaved Parity BIP- 8 Error Monitoring over the previous VC-4 frame. Even parity is used to monitor path errors
83
POH (contd.)
C2 Signal Label It is defined to indicate the composition or the maintenance of the VC-4
Binary 0000 0000 0000 0001 0000 0010 0000 0011 0000 0100 0001 0010 0001 0011 0001 0100
84
Hex 00 01 02 03 04 12 13 14 15
Mapping Unequipped Equipped,non specific TUG structure Locked TU 34 / 45 Mbps into C3 (async) 140 Mbps into C4 (async) ATM MAN (DQDB) FDDI
0001 0101
POH (contd.)
G1- Path status It is defined to send back the path status and performance to where the path is generated F2,F3 Path User Channels It is assigned for user communication purposes between path elements by the network operator H4 Multi frame Indicator
85
POH (contd.)
K3 Automatic protection switching(APS) channel (b1-b4) are assigned for APS signaling for protection at the VC-4/3 path labels N1 Network operator Byte The tandem connection monitoring function is currently not used
86
Benefits of SDH
87
Benefits of SDH
Pointers, Mux/Demux Reduced back to back multiplexing Optical Interconnect Multi Point Configuration Grooming Enhanced OAM Enhanced Performance monitoring
88
Operations
Managing capacity in the network involves such operations as the following: a. protection, for circuit recovery in milliseconds a. restoration, for circuit recovery in seconds or minutes a. provisioning, for the allocation of capacity to preferred routes destinations for each type of traffic
89
Operations ( contd)
a. consolidation, or the funneling of traffic from unfilled bearers onto fewer bearers in order to reduce waste of traffic capacity b. grooming, or the sorting of different traffic types from mixed payloads into separate
90
91
92
93
94
Terminal Multiplexer
STM-1 E1 E1 E3 E3 STM-1 VC STM-N STM-N STM 1
Regenerator
STM-N STM-N
95
STM-N
96
STM-N STM-N
STM-1
2 Mbps
140 Mbps
97
STM-N STM-N
STM-1
2 Mbps
140 Mbps
Topologies
98
Network Configurations
Point to Point Point to Multipoint Mesh Architecture Ring Architecture
99
Point to Point
PTE
Regen
PTE
100
Ring Architecture
ADM
ADM
ADM
ADM
101
Mesh Topology
102
Synchronization
Clock type Primary Reference Clock (PRC) Slave clock (transit node) Slave clock (local node) SDH network-element clock Related CCITT recommendation G.811 G.812 G.812 Under definition (G.81s)
103