Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Outline
Overview to SDH
procedures
SDH network protection
Multiplexing
2Mbit/selectrical signals
155Mb/s
Optical interface
2Mbit/selectrical signals
<ZTE corporation copyright reserved,No spreading abroad>
Demultiplexing
Multiplexing
ADM
155Mb/s
Optical interface
SDH feature
-- plentiful overhead bytes
1. SDH system is an intelligent equipment with powerful self-healing function. SDH NMS and dynamic configuration with intelligent check contribute to easy self-healing of SDH network. When a fault occurs to the equipment or system, the services can be recovered rapidly, greatly improving network reliability and lowering maintenance cost. 2. SDH system has good network management function. The overhead bytes (1/10 of the total capacity) in the SDH frame may meet the present requirements in the alarm, performance supervision, network configuration, switching and orderwire, and can be extended further to satisfy the future requirements in the supervision and NM. SDH advantages: Synchronous multiplexing, standard optical interface and powerful NM.
SDH shortcomings: 1. The frequency band utilization rate of SDH is lower than that of PDH. 2. The pointer adjustment makes the equipment and interfaces more complex. 3. The software control function easily causes major faults.
Outline
Overview to SDH
procedures
SDH network protection
SDH rates
Name
SDH level
SONET level
OC-3/STS3(1440CH) OC-12/STS-12(8046CH)
40G STM--256
OC-576
SOH 9 rows
AU-PTR
SOH
section overhead
9 columns
Frame structure
STM-N frame structure
9270N bytes 125s
1
SOH
3
4
5
AU pointer
Transmission direction
SOH
Frame period, 9 frame frequency block and rate
9N
261 N
STM-1 Signal D
1.
Information payloads --They contain various information blocks and some POH bytes used for channel performance supervision, management and control. Section overheads--They are the additional bytes ensuring the normal and flexible transmission of information payload. They provides the frame synchronization and network OAP bytes. SOH consists of RSOH and MSOH. RSOH terminates in the regenerator, and MSOH transparently goes through the regenerator and is assembled/dissembled in AUG. AU-PTR --It indicates the accurate position of the first byte of information payload in STM-N frame, and employs the pointer adjustment technique to resolve the clock deviation of network node so that the information payload can be detached properly at the receiving end of SDH system.
2.
3.
MS
Tributary signals
RS
MS
RS RS
Tributary signals
SDH TM
SDH DXC
REG REG
SDH TM
VC multiplexing
PATH
VC demultiplexing
Path, MS and RS
<ZTE corporation copyright reserved,No spreading abroad>
SOH bytes
STM-1 SOH bytes
9 columns
A1 B1 D1 A1 B2 A1 A2 E1 D2 A2 A2 J0 F1 D3 K2 D6 D9 * *
RSOH
9 rows
B2 D4 D7 D10 S1
AU PRT B2 K1 D5 D8
MSOH
D11
D12
M1 E2
frame. The byte code pattern are defined as A1: 11110110F6H A2: 0010100028H (transparent transmission)
RS
trace byte: J0
It repeatedly transmits the section AP identity to assure the receiver of the connection with the receiver assigned. The section AP identity adopts the format in section 3 of ITU-T G.831, that is, use a 16-byte frame to transmit the section AP identity. byte number 8bit value 1 1 C1 C2 C3 C4 C5 C6 C7 2 0 X X X X X X X 3 0 X X X X X X X . 16 0 X X X X X X X
<ZTE corporation copyright reserved,No spreading abroad>
note: the first byte is the initial location identity of the frame. C1-C7 is the calculation result of CRC-7 in the previous frame. The other 15 bytes transmit the section AP identity.
Data Communication Channel (DCC): D1D12 SOH DCC is the transmission link of SDH management network (SMN). D1~D3 byte transmits OAM information between RS terminals. D4~D12 byte transmits OAM information between MS terminals. One purpose of SDH network management control is to implement the fast distributed control. The best route table calculated by NMS can be delivered quickly to NE via DCC at any time. DCC is the SDH physical channel and has the protocol stack Qecc.
Orderwire channel: E1 and E2 E1 and E2 offers the orderwire voice channel. E1 is used for the RS orderwire and E2 for the orderwire between terminals.
User channel: F1 It is for the network provider. It is used for the special maintenance of system operator, e.g., providing temporary 64kb/s data/voice channel.
<ZTE corporation copyright reserved,No spreading abroad>
B1: BIP-8 B1 supervises the MS bit error in BIP-8 method. After all the bytes scrambled in the previous frame of STM-N make the BIP-8 check, the result is in the B1 byte before unscrambled in the present frame. The bit error supervision is one of SDH characteristics. It can automatically supervise the MS bit error in a simple way. But this mode can not check out the even number of bit errors in one supervise code group. (This case seldom occurs, but a certain error exists.
B2: BIP-N24 It makes the online of supervision of the MS bit error in the BIP-N24 method. The BIP-N24 value of all bytes in the previous STM-N frame is in B2 before scrambled in the present frame. The first three lines of SOH is not for check.
Internal Use Only APS channel: K1 and K2b1-b5 The two bytes are used for APS instruction. (K1 indicates the switching type and channel No., and K2 indicates the channel No. switched to the protection channel.) MS-RDI byte: K2 (b6-b8) MS-RDI sends back an instruction signal to the transmitting end, indicating that the receiving end finds an incoming fault or is receiving MS-AIS. After unscrambled, K2 (b6-b8) forms 110, that is, MS-RDI. Synchronization state: S1b5-b8 S1 (b5-b8) transmits the synchronization state information, that is, the synchronization state of the upstream station is transmitted to the downstream station via S1 (b5-b8). S1 (b5-b8) b5-b8) Clock level 0000 Unknown quality 0010 G.811 reference clock 0100 G.812 exchange slave clock 1000 G.812 local slave clock 1011 SETS 1111 Not for clock synchronization
<ZTE corporation copyright reserved,No spreading abroad>
M1 M1 is used for MS-REI. It sends the quantity of the bit errors checked out by B2. related to transmission media: One-fiber unidirection, one-fiber bidirection, etc. Backup bytes -Free byte (for future use in the international standard) (Note: The bytes with * will not be scrambled.
Bytes STM-N(N>1)
SOH It is formed in the byte interleaving mode. The SOH in the first STM-1 is remained, but the SOH in other N-1 STM-1 is remained only with byte A1, A2 and B2.
<ZTE corporation copyright reserved,No spreading abroad>
9 rows
AU PRT
15
A1
F1 D3 K2 D6 D9 D12 E2 M1
R S O H M S O H
9 rows
F1 D3
R S O H M S O H
9 rows B2 B2 B2
D4 D7 D10 S1
FEC
<ZTE corporation copyright reserved,No spreading abroad>
ITU-I G.975, issued in 1996, employs FEC as a part of the cable communication standards. The new draft, passed in April, 2000, is added with FEC as an option in the 10Gbit/s system.
Outline
Overview to SDH
procedures
SDH network protection
1
AU-4 VC-4
C-4
140Mb/s
3
AU-3 VC-3 TUG-3
TU-3
45Mb/s 34Mb/s
6.3Mb/s 2Mb/s 1.5Mb/s
1 TUG-2 TU-2 3
TU-12
4 4
TU-11
C VC TU
AU
Pointer processing
Positioning Multiplexing
Mapping
2: VC-2-mc STM-1 capacity: 1. 1140M signal 2. 334M 4Mb/s34Mb/sSDH 3.2 VC-2VC-2
signals
3. 632M signals
Multiplexing unit
1. Container (C)
C contains service signals at various rates.
G.707 specifies five standard containers for PDH rate series: C-11, C-12, C-2, C-3 and C4.
PDH series indicate the payload by H-n, which is divided into different levels.
C-n
2. VC
VC supports the connection at the SDH path layer. VC, composed of payload (C output) and POH, is the information terminal of SDH path.
VC-n=C-n+VC-n POH
LOVC: VC-1 and VC-2 VC-3 (VC-3 - TU-3 - TUG-3- VC-4) HOVC: VC-4 VC-3 (in AU-3)
POH
=
Adjustment bit
VC
VC parameters
VC
Frame period and multiframe (s) Frame frequency and multiframe frequency (Hz)
VC-4
VC-3
VC-2
VC-12
VC-11
125
8000 2619 2349 150.336
125
8000 859 765 48.960
500
2000
500
2000
500
2000
3. TU and TUG
TU adapts the low-order path signals into the high-order path layer (e.g., VC-4).
Four TUs are available, i.e., TU-n (n=11, 12, 2 and 3).
TU-n consists of a LOVC-n and a TU-n PTR. TU-n =VC-n+TU-n PTR TU-n PTR points the shift between VC-n payload start point and HOVC frame start point. TUG is composed of one or several TUs at the fixed location of HOVC payload.
4. AU and AUG
AU adapts the HO path signals into MS layer. AU-3 and AU-4 are available.
AU-n PTR points the shift between VC-n payload start point and MS start point.
AUG is composed of one or several AUs at the fixed location of STM-N payload. One AU is composed of one AU-4 or three AU-3 in the byte interleaving multiplexing mode.
<ZTE corporation copyright reserved,No spreading abroad>
TU and AU parameters
TU and AU
Frame period and multiframe (s) Frame frequency and multiframe frequency (Hz)
2619+9 819+3 859+3 4(129) 4(49) 4(39) 2358 786 768 432 6.912 144 2.304 108 1.728
Multiplexing step 1
-mapping
Mapping synchronizes tributary signals with the corresponding VC so that VC can send, multiplex and cross signals independently. (Only STM-1 has the mapping function.) 1. Mapping mode The mapping can be divided into asynchronous mapping and synchronous mapping by the synchronization state between mapped signals and SDH network. Asynchronous mapping --The pointer adjusts the payload to adapt the signals into SDH frame, independent of signal features and network synchronization. The pointer adjusts the frequency or phase difference to synchronize the signals without slide buffer. As a common mapping mode, it is necessary in the long transition from PDH to SDH.
<ZTE corporation copyright reserved,No spreading abroad>
Synchronous mapping --The mapped signals must be strictly synchronous with SDH network. 125us (the duration of one frame) slide buffer is required to reduce the slide loss in the synchronization. The slide buffer causes 150us delay to the multiplexer, but 10us delay to the demultiplexer. Synchronous mapping are categorized as bit synchronous mapping and byte synchronous mapping.
Synchronous mapping
Bit synchronous It is independent of signal features, but it requires the network synchronization and 125us slide buffer. The delay caused is more than 125us (multiplexer). N64kb/s signals can not be accessed directly because the de-framing is required. The interface is comparatively simple.
It is a common mode, independent of signal features, network synchronization and characteristics slide buffer. The minimum delay caused is 10us. The primary group mapping can not access directly N64kb/s signals because the deframing is required. The interface is simple.
VC-4 PAYLOAD
N1
260 columns (byte)
2. HPOH
J1: Path trace byte It repeatedly sends the HP access point identifier whose content is decided by the transmitter and receiver, thus the transmitter may confirm the connection with the specified receiver. J1 location is pointed by the related pointer. B3: Path BIP-8 code It comes from the interleaving parity calculation of all VC-4 bits before scrambling.
<ZTE corporation copyright reserved,No spreading abroad>
F2 and F3: Path user byte They offers the orderwire communication between path units.
Multiplexing step 2
-Positioning
Positioning refers to a process to take the frame deviation information into TU or AU, that is, TU PTR (AU PTR) attached to VC indicates and determined the LOVC frame start point in the TU payload ( the HOVC frame start point in the AU payload. SDH pointer function:
When the network works synchronously, the pointer aligns the phases of synchronous signals. When the network dismatches, the pointer aligns the frequencies and phases. When the network is out of synchronization or works asynchronously, the pointer traces and aligns the frequencies. The pointer can also accept the frequency jitter and wander in the network.
<ZTE corporation copyright reserved,No spreading abroad>
TU-3 PTR=H1H2H3
Multiplexing step 3
-synchronous multiplexing
Multiplexing refers to the adaption of several LP signals (TU-12) into HP signals (VC4) or several HP signals (AU-4) into STM-N frame, that is, adapt TU into VC or AU into STM-N in the byte interleaving mode. For example: TU12(3) TUG2(7) TUG3(3) VC4
For example: AU-4(1) AUG(N) STM-N As VC tributaries are synchronous due to TU and AU pointers, the process is called the synchronous multiplexing. Multiplexing mode: Byte interleaving mode.
STM-1 signal D
AUG
261 1 9
AUG
261
1 9
AUG
261
#1
#2
#N
123N
N 9
N 261
STM-N
<ZTE corporation copyright reserved,No spreading abroad>
TS31
C-12 frame C-12 multiframe TU-12 frame VC-12 frame V1V5 R 1 V2J2 R 1 V3N2 R 1 V4K4 R 1
32 R
32 R
32 R
32 R
3TU-121TUG-2
TU-12 a
1 2 3 4 1
TU-12 b
2 3 4 1
TU-12 c
2 3 4
a b
a b
12
Insert bytes
TUG-21
TUG-22
TUG-27
1 2
1 2 3 4 5 6 7 3 4 5 6 7
1 2 3 4 5 6
1 2 3 4 5 6 7 7
84
<ZTE corporation copyright reserved,No spreading abroad>
86
C4 structure
<ZTE corporation copyright reserved,No spreading abroad>
B3
C2 G1 HPOH 9 rows1 column F2 H4 F3 K3 N1
260 columns (byte) In order to supervise the 140Mb/s path signals, it is required in the multiplexing to add a column of VC4 POH before C4 frame. Then the signals is in the VC4 structure.
Internal Use Only Multiplex 2Mbit/s into STM-1 (6) Add AU-PTR to VC-4 to make VC-4 become AU-4. J1 B3 C2 H1 Y Y H2 1 1 H3 H3 H3 G1 F2 H4 F3 AU-4 PTR consists of 9 K3 bytes from column 1~9 N1
VC-4 PAYLOAD
STM-1 PAYLOAD
AU-PTR
VC-4 PAYLOAD
9 rows1 column 261 column Add RSOH and MSOH to form STM-1.
<ZTE corporation copyright reserved,No spreading abroad>
multiplexing multiplexing LD POH VC-4 TUG-3 TUG-2 TU-12 VC-12 C-12 2Mb/s code speed adjustment
AU PTR
N
STM-N AUG-4
1
AU-4
TU PTR
49.536Mbit/s 150.912Mbit/s
150.336Mbit/s
2.304Mbit/s
2.176Mbit/s
N
STM-N AUG-4
1
AU-4 VC-4 TUG-3 TUG-2 TU-12 VC-12 C-12 2Mb/s
155.520Mbit/s 6.912Mbit/s
2.240Mbit/s
2.048Mbit/s
Layer
STM-N
standard
STM-1
AU-4
VC-4
TUG-3,2
TU-12
VC-12
C-12
Service
Outline
Overview to SDH
procedures
SDH network protection
Ring
Star
Mesh
Tree
Self-sealing: When a fault occurs to the network, the service transmission can recover automatically in such a short time that a user can not find it.
Network selfhealing
Link network
Ring network
Several definitions
There are two kinds of SDH protection switching ring: MS protection switching ring and path protection switching ring. What are the most commonly used are 2-fiber unidirectional path protection ring, 2-fiber unidirectional MS protection ring, 2-fiber bidirectional MS protection ring and 4-fiber bidirectional MS protection ring. Before the principles of these rings is described in detail, several definitions should be explained: MS protection switching, path switching, unidirectional ring and bidirectional ring. What are MS and path? Simply speaking, MS refers to the section between two multiplexers (or the equipment with multiplexing functions), and the multiplexed low-rate signals are called the path. An extra channel is required to protection signals in the transmission. For the MS switching ring, the protection are based on MS, the switching depends on the MS signal quality between a pair of nodes, and all MS services are switched to another channel in the switching. However, for the path switching ring, the protection is based on path, and the switching depends on the quality of one channel.
<ZTE corporation copyright reserved,No spreading abroad>
Unidirectional ring
Bidirectional ring
D C P W
D C P W
a ) in normal case
b ) in abnormal case
A ring has 4 fibers: Two service fibers (one for receiving and the other for transmitting), and two protection fibers (one for receiving and the other for transmitting). Each fiber has a changeover switch. The signals transmit from A to C via W1 fiber clockwise, and the signals transmit from C to A via W2 fiber anticlockwise. This is a bidirectional ring and the two protection fibers are idle. When the connection from A to C breaks off, the changeover switches at B and C connect W1 to P1 and W2 to P2, ensuring the continuity of the ring. In a 4-fiber ring, the transmission directions of W1 and P2 are the same, and so are those of W2 and P1. W1 and P2 can be integrated into one fiber W1/P2, and W2 and P1 into one fiber W2/P1. A half of W1/P2 timeslots transmit services, and the other half are idle in the normal case and protect W2/P1 services in the faulty case. A half of W2/P1 timeslots transmit services, and the other half are idle in the normal case and protect W1/P2 services in the faulty case. Thus a 4-fiber ring is simplified into a 2-fiber ring. One half of W1/P2 timeslots transmit signals from A to C clockwise and the other half is idle. When the connection between A and C breaks off, the changeover switches at B and C connect the two fiber together. With the timeslot switching technique, the signals are switched from the service timeslot of one fiber to the idle protection timeslot of the other fiber.
<ZTE corporation copyright reserved,No spreading abroad>
item
2-fiber MS ring
4-fiber MS ring
node
Line rate ring transmission capacity APS protocal swiching time node cost system complexity applications
k
STM-N STM-N no 30ms low simple Access network and relay net work (centralized service)
k
STM-N k/2STM-N yes 50-200ms medium complex Relay network and toll network (distributed service)
k
STM-N kSTM-N yes 50-200ms high complex Relay network and toll network (distributed service)
DNI protection
A
B(primary)
D(secondary)
DNI, based on ITUT G.842, is very practical to the services across rings.
C(primary) E(secondary)
Outline
Overview to SDH
procedures
SDH network protection
Synchronization
The synchronization is the nervous system of SDH network. The asynchronization between NEs in one network leads to the unaligned timeslots and no proper connection between transmitter and receiver. The asynchronization between networks leads to the broken network communication and service disconnection.
Clock type
1. Caesium atom clock: It has the high long-term frequency stability and precision. The long-term frequency deviation is better than 1*10E-11, but the short-term stability is not good. 2. Quartz crystal oscillator: It has cheap clock source and high reliability, but low long-term frequency stability.
3. Rubidium atom clock: Its stability, precision and cost is between the above clocks. The adjustable frequency range is larger than caesium atom clock, the long-term stability is lower by about one magnitude, but it has excellent short-term stability, low cost and 10-year service life.
<ZTE corporation copyright reserved,No spreading abroad>
Synchronization mode
1. Full-synchronization mode: The overall network is synchronous with the unique PRC. Its synchronization is highly precise but difficult. In the implementation the hierarchical control scheme is usually adopted, that is, the hierarchical master/slave synchronization mode.
2. Pseudo-synchronization mode: The overall network is divided into several sub-networks, and the master clocks of the sub-networks comply with G.811. The slave clock is synchronous with the master clock in the sub-network. The clocks of the sub-networks are independent of each other, but the differences are so small that they are approximately synchronous.
Synchronization mode
3. Quasi-synchronization mode: After the external timing reference is lost, the node clock holds on. The network synchronization quality is not good. 4. Asynchronization mode: The node clocks are different from each other in the synchronization, and the service can not go on normally, so the alarm signals are sent.
Internal Use Three working modes of slave clock in Only master/slave synchronization mode
Normal working mode Upper-level clock tracing and locking mode The clock reference, traced and locked by the slave site, comes from the upperlevel site. It may be the master clock in the network, the clock from the clock source embedded in the upper-level NE, or the GPS clock at the local area. Comparing with the other two working modes of the slave clock, this mode is the most precise. Hold-on mode After all timing references are lost, the slave clock is in the hold-on mode. The slave site clock source uses the last frequency information, stored before the timing reference signal is lost, as the timing reference. That is to say, the slave clock has the memory function. The function can offer the timing signal complying with the original timing reference, ensuring that the slave clock frequency has a small deviation from reference clock frequency in a long time. This mode is less precise than the normal working mode. The equipment employs the memorized synchronization information, stored before 24 hours, to keep the synchronization state. The precision is required to be 0.37ppm.
<ZTE corporation copyright reserved,No spreading abroad>
Free-run mode free-oscillation mode When the slave clock loses all external timing references and timing reference memory, or works in the hold-on mode for a very long time, the oscillator in the slave clock will work in the free-oscillation mode. This mode is the worst precise. After the memorized synchronization information, stored in the equipment, has been used for 24 hours, the synchronization signals generated by the internal oscillator are used as synchronization signal. The precision is required to 4.6ppm.
The digital synchronization network of China Telecom integrates the hierarchical master/slave synchronization and pseudosynchronization, that is, the distributed timing mode. 1. PRC complying with G.811 in Beijing hierarchically controls the clocks until the lowest-level slave clock, which adopts the hierarchical master/slave synchronization mode.
2. This nation is divided into several synchronization areas. Each area has one LPR rubidium atom clock. LPR can receive PRC signals or GPS signals. There are small differences in LPR between synchronous areas, but the differences are so small that they are approximately synchronous. So it is called the pseudo-synchronization mode.
As shown in the figure, the slave clock is in Wuhan. When a fault occurs to the master clock (Beijing), the slave clock will replace the master clock.
<ZTE corporation copyright reserved,No spreading abroad>
PRC
Master clock (Beijing) Slave clock (Wuhan)
GPS
Regional reference clock 1 Provincial exchange
GPS LPR
Regional reference clock 2 provincial exchange
synchronization area 1
<ZTE corporation copyright reserved,No spreading abroad>
synchronization area 2
G.812
Synchronization scheme
General principle
Reduce the timing reference transmission length. The controlled clock obtains the timing from higherlevel clock. The node clock quantity in a synchronization reference link is not more than 60. Configure more than one external timing references. Prevent the timing loop make full use of S1 byte. Timing information transmission Obtain the timing from STM-N.
<ZTE corporation copyright reserved,No spreading abroad>
SSM (Synchronization Status Message) directly reflects the synchronous timing signal level in the synchronous timing transfer link. The messages can be used to judge the quality level of the synchronous timing signal received so as to control the operation state of the local node clock, e.g., continue tracing the signal, switch the input reference signal or change to the hold-on state.
ITU-T G.707 specifies SSM coding mode of STM-N interface, which is shown with MS overhead byte S1 b5~b8.
S I b5~b8 Clock level 0000 Unknown quality 0010 G.811 reference clock 0100 G.812 transit exchange slave clock 1000 G.812 local exchange slave clock 1011 SETS 1111 Not for clock synchronization Note: other utilizations are reserved.
B) Recovery function
When the high-level external synchronization source return to normal, the equipment can obtain the timing signals from the high-level external synchronization source.
<ZTE corporation copyright reserved,No spreading abroad>
Thank you!