Documente Academic
Documente Profesional
Documente Cultură
SDH Basics
AN00091831 (62.1013.105.11-A001) Edition e, 03.2000
Notes
This Introduction to the Synchronous Digital Hierarchy is a company-internal brochure. Marconi Communications GmbH takes no responsibility for the correctness of its contents! Have you detected any faults or deficiencies? Do you have any new ideas? Please let us know them! Marconi Communications GmbH, Department: Customer documentation.
Attention: The ordering no. has changed with edition e. The new ordering no. is: 62.1013.105.11-A001 Ordering no. of previous editions: 62.1013.109.00-A001.
62.1013.105.11-A001
62.1013.105.11-A001
Table of contents
Table of contents
1 Introduction
1.1 1.2 1.3 1.4 SDH functional model ............................................................................................................. 1-1 From the source signal to the transport frame ........................................................................ 1-2 Transport frame ...................................................................................................................... 1-7 Section Overhead ................................................................................................................... 1-9
Structures
2.1 2.2 2.3 Synchronous Transport Module Level 1 (STM-1) ................................................................... 2-1 Structure of the synchronous STM-1 frame ............................................................................ 2-1 SDH multiplex elements ......................................................................................................... 2.3.1 Container C .................................................................................................................... 2.3.2 Virtual container.............................................................................................................. 2.3.3 Administrative Unit.......................................................................................................... 2.3.4 Tributary Unit .................................................................................................................. 2.3.5 Tributary Unit Group ....................................................................................................... 2.3.6 Administrative Unit Group............................................................................................... 2-4 2-4 2-5 2-6 2-6 2-8 2-8
Concatenation....................................................................................................................... 2-13 Synchronous multiplexing ..................................................................................................... 2-14 Multiframe generation ........................................................................................................... 2-15 Error monitoring using BIP-X ................................................................................................ 2-17 SDH transmission sections................................................................................................... 2-18
3
3.1 3.2 3.3 3.4 3.5 3.6 3.7
Mapping procedures
4.1 4.2 4.3 4.4 4.5 Asynchronous mapping of 140 Mbit/s signals into VC-4 ........................................................ 4-1 Asynchronous mapping of 34 Mbit/s signals into VC-3 .......................................................... 4-4 Asynchronous mapping of 2 Mbit/s signals into VC-12 .......................................................... 4-6 Asynchronous mapping of 1.5 Mbit/s signals into VC-11 ....................................................... 4-7 Mapping 1.5 Mbit/s signals into VC-12 ................................................................................... 4-8
5
5.1
Overhead
Section Overhead ................................................................................................................... 5-1 5.1.1 Regenerator Section Overhead (RSOH) ........................................................................ 5-2 5.1.2 Multiplex Section Overhead (MSOH) ............................................................................. 5-2 Path Overhead........................................................................................................................ 5-3 5.2.1 Higher-order POH (VC-3/VC-4) ...................................................................................... 5-3 5.2.2 Lower-order POH (VC-1x/VC-2) ..................................................................................... 5-6
5.2
6
6.1
Pointers
Pointer value modification....................................................................................................... 6-1
62.1013.105.11-A001
-5-
Table of contents
6.1.1 Setting a new pointer value ............................................................................................ 6-1 6.1.2 Frequency matching ....................................................................................................... 6-1 6.2 Pointer types ........................................................................................................................... 6-4 6.2.1 AU-3 pointer ................................................................................................................... 6-4 6.2.2 AU-4 pointer ................................................................................................................... 6-6 TU-3 pointer............................................................................................................................ 6-8 TU-2 pointer.......................................................................................................................... 6-10 TU-11 pointer........................................................................................................................ 6-12 TU-12 pointer........................................................................................................................ 6-14
Reference model
7.1 7.2 7.3 Lower-order path functions ..................................................................................................... 7-2 Higher-order path functions .................................................................................................... 7-2 Transport terminal functions ................................................................................................... 7-2
Applications
8.1 Synchronous line equipment .................................................................................................. 8-1 8.1.1 Synchronous line multiplexer.......................................................................................... 8-1 8.1.2 Synchronous line regenerator ........................................................................................ 8-2 Multiplexers............................................................................................................................. 8.2.1 Terminal Multiplexer ....................................................................................................... 8.2.2 Add/Drop Multiplexer ...................................................................................................... 8.2.3 Cross-connect Multiplexer .............................................................................................. 8-4 8-4 8-6 8-8
8.2
8.3
Networks............................................................................................................................... 8-10 8.3.1 Ring networks............................................................................................................... 8-11 8.3.2 Double rings ................................................................................................................. 8-11
Protection switching
9.1 9.2 9.3 Overview................................................................................................................................. 9-1 Definitions ............................................................................................................................... 9-1 Protection switching ................................................................................................................ 9.3.1 MS 1+1 protection .......................................................................................................... 9.3.2 MS 1:n protection ........................................................................................................... 9.3.3 MS shared protection ring .............................................................................................. 9.3.4 MS dedicated protection ring .......................................................................................... 9.3.5 Path/subnetwork protection ............................................................................................ 9.3.6 Protocols......................................................................................................................... 9-1 9-3 9-4 9-4 9-6 9-6 9-7
9.4 9.5
10 Literature Index
-6-
62.1013.105.11-A001
List of figures
List of figures
Fig. 1-1 Fig. 1-2 Fig. 1-3 Fig. 1-4 Fig. 1-5 Fig. 1-6 Fig. 1-7 Fig. 1-8 Fig. 1-9 Fig. 2-1 Fig. 2-2 Fig. 2-3 Fig. 2-4 Fig. 2-5 Fig. 2-6 Fig. 2-7 Fig. 2-8 Fig. 2-9 Fig. 2-10 Fig. 2-11 Fig. 2-12 Fig. 2-13 Fig. 2-14 Fig. 2-15 Fig. 2-16 Fig. 3-1 Fig. 3-2 Fig. 3-3 Fig. 3-4 Fig. 3-5 Fig. 3-6 Fig. 3-7 Fig. 3-8 Fig. 3-9 Fig. 3-10 Fig. 3-11 Fig. 3-12 Fig. 4-1 Fig. 4-2 Fig. 4-3 Fig. 4-4 Fig. 4-5 Fig. 4-6 Fig. 4-7 Fig. 5-1 Fig. 5-2 Fig. 5-3 Fig. 5-4 Fig. 5-5 Fig. 5-6 Fig. 5-7 Fig. 6-1 Fig. 6-2 Fig. 6-3 Transmitter/receiver model ................................................................................................ 1-1 Conversion of a serial source signal into a block structure................................................ 1-2 Container ........................................................................................................................... 1-3 Container with label ........................................................................................................... 1-3 Transport frame ................................................................................................................. 1-4 Combining containers to a container group ....................................................................... 1-5 Concatenated containers................................................................................................... 1-6 Transport frame of the 1st hierarchy level ......................................................................... 1-7 Overhead with pointer........................................................................................................ 1-9 STM-1 frame...................................................................................................................... 2-1 Pointer ............................................................................................................................... 2-3 Containers ......................................................................................................................... 2-4 Virtual containers ............................................................................................................... 2-5 Administrative Unit............................................................................................................. 2-6 Tributary Unit ..................................................................................................................... 2-7 Tributary Unit Group .......................................................................................................... 2-8 Administrative Unit Group.................................................................................................. 2-8 Generation of an STM-1 signal from a 140 Mbit/s signal................................................... 2-9 Generation of an STM-1 signal in compliance with ETSI ................................................ 2-10 Generation of an STM-1 signal from a 2.048 Mbit/s signal.............................................. 2-11 Terminal Multiplexer 63 x 2.048 Mbit/s ............................................................................ 2-12 SDH multiplexing procedure ............................................................................................ 2-14 TU-1x/TU-2 Multiframe identification by the H4 byte ....................................................... 2-16 BIP-8 monitoring process ................................................................................................ 2-17 SDH digital signal sections .............................................................................................. 2-18 Synchronous multiplex structure in compliance with ITU-T Recommendation G.707 ....... 3-1 Multiplexing of AU-4 to AUG.............................................................................................. 3-2 Multiplexing N x AUGs into STM-N.................................................................................... 3-3 Multiplexing of three AU-3s into AUG ................................................................................ 3-4 Multiplexing of one TUG-3 into one VC-4 .......................................................................... 3-6 TU-3 pointer....................................................................................................................... 3-7 TU-11 Tributary Unit ......................................................................................................... 3-8 TU-12 Tributary Unit .......................................................................................................... 3-9 TU-2 Tributary Unit ............................................................................................................ 3-9 Multiplexing TU-11, TU-12 and TU-2 into TUG-2 ............................................................ 3-10 Multiplexing seven TUG-2s into one TUG-3 .................................................................... 3-11 Multiplexing seven TUG-2s into one VC-3....................................................................... 3-12 Splitting up VC-4 into 13-byte blocks................................................................................. 4-1 Asynchronous mapping of 140 Mbit/s signals into VC-4 ................................................... 4-2 VC-3 divided up into three partial frames .......................................................................... 4-4 Asynchronous mapping of 34 Mbit/s signals into VC-3 ..................................................... 4-4 Asynchronous mapping of 2 Mbit/s signals into VC-12 ..................................................... 4-6 Asynchronous mapping of 1.5 Mbit/s signals into VC-11 .................................................. 4-7 Conversion of a VC-11 into a VC-12 (1.5 Mbit/s in VC-12) ............................................... 4-8 Overhead bytes ................................................................................................................. 5-1 Higher-order POH.............................................................................................................. 5-3 VC3/VC4 path status (G1) ................................................................................................. 5-4 TU multiframe indicator H4 ................................................................................................ 5-5 Lower Order POH .............................................................................................................. 5-6 Bit assignment of the V5 byte ............................................................................................ 5-6 V5[5-7] Mapping Code....................................................................................................... 5-7 Pointer modification (positive justification)......................................................................... 6-2 Pointer modification (negative justification) ....................................................................... 6-3 AU-3 pointer....................................................................................................................... 6-4
62.1013.105.11-A001
-7-
List of figures
Fig. 6-4 Fig. 6-5 Fig. 6-6 Fig. 6-7 Fig. 6-8 Fig. 6-9 Fig. 7-1 Fig. 8-1 Fig. 8-2 Fig. 8-3 Fig. 8-4 Fig. 8-5 Fig. 8-6 Fig. 8-7 Fig. 8-8 Fig. 8-9 Fig. 8-10 Fig. 8-11 Fig. 8-12 Fig. 8-13 Fig. 9-1 Fig. 9-2 Fig. 9-3 Fig. 9-4 Fig. 9-5 Fig. 9-6 Fig. 9-7 Fig. 9-8 Fig. 9-9 Fig. 9-10 Fig. 9-11
AU-4 pointer....................................................................................................................... 6-6 Multiplexing a VC-3 into a TUG-3 ...................................................................................... 6-8 TU-3 pointer....................................................................................................................... 6-9 TU-2 pointer..................................................................................................................... 6-10 TU-11 pointer................................................................................................................... 6-12 TU-12 pointer................................................................................................................... 6-14 Reference model for the design of SDH units ................................................................... 7-1 SLA4 and SLA16 synchronous line equipment (Example) ................................................ 8-1 Multiplex scheme in compliance with ITU G.707 ............................................................... 8-2 FlexPlex MS1/4 used as Terminal Multiplexer in an SDH network.................................... 8-4 Functioning of a Terminal Multiplexer................................................................................ 8-5 FlexPlex MS1/4 used as an Add/Drop Multiplexer in an SDH network ............................. 8-6 Functioning of an Add/Drop Multiplexer............................................................................. 8-7 FlexPlex MS1/4 used as Cross-connect Multiplexer in an SDH network .......................... 8-8 Functioning of a Cross-connect Multiplexer....................................................................... 8-9 Synchronous networks .................................................................................................... 8-10 Single ring network .......................................................................................................... 8-11 Double ring network......................................................................................................... 8-12 Interrupted double ring..................................................................................................... 8-12 Double ring connection of two ring networks ................................................................... 8-13 MSP 1+1 Multiplex Section Protection .............................................................................. 9-3 MS 1:n Protection Switch................................................................................................... 9-4 Example of the traffic flow in an MS shared protection ring............................................... 9-5 Example for the traffic flow in an MS dedicated protection ring......................................... 9-6 Path und subnetwork protection ........................................................................................ 9-7 Linear multiplexer chain with redundancy.......................................................................... 9-9 Path protection in a multiplexer chain................................................................................ 9-9 Examples for multiplexer rings with two and four connecting lines.................................. 9-11 Example for protection switching in interconnected rings................................................ 9-12 Interconnection of two rings with path protection............................................................. 9-13 Interconnection of two rings with MS shared protection .................................................. 9-14
-8-
62.1013.105.11-A001
Introduction
1 Introduction
The Synchronous Digital Hierarchy (SDH) supersedes the previous Plesiochronous Digital Hierarchy (PDH) and provides a worldwide uniform multiplex hierarchy. Besides standardization, SDH systems offer further advantages for the setup and operation of modern network topologies: Simple multiplex process (no positive/negative justification) Network-wide standardized reference clock Direct access to individual channels High bit rates for broadband applications High transmission capacity for network monitoring and network control Control by highly efficient network management systems Integration of the previous plesiochronous multiplex hierarchy.
Transport frame
Receiver
Transmitter
140 Mbit/s
62.1013.105.11-A001
1-1
Introduction
1 byte
9CH
1 260 260 1 260
9C
1-2
62.1013.105.11-A001
Introduction
Containers
The transmission of SDH signals can be compared with the transmission of containers on a conveyor belt. The payload is transported in containers of certain sizes. Since the payloads have different volumes, containers with different capacities have been defined. If the payload is too small, it is filled up with stuffing information.
t Co n
r aine
Fig. 1-3 Container For transporting the information, the container needs a label. The latter includes information on the container contents, monitoring data etc. The receiver evaluates this information. Payload Blind information
er tain Con
Label Fig. 1-4 Container with label The complete containers are then put on a kind of conveyor belt. This conveyor belt is divided up into several frames of identical size. They are used to transport the containers.
62.1013.105.11-A001
1-3
Introduction
The position of the containers in the frame is arbitrary, i.e. a container does not have to start at the beginning of the frame. A container can be located on two adjacent frames.
iner
ta Con
t Co n
n ssio
r aine
n ctio D i re
of
s mi t ra n
Start of frame
Empty frame
1-4
62.1013.105.11-A001
Introduction
Groups of containers
The type of payload in the containers is unimportant for transportation. The stuffing information can therefore be regarded as part of the payload. Before transportation, several small containers can be combined to form a group. This group is then packed into a larger container. Each of these containers includes a label which is evaluated by the receiver. Whenever necessary, stuffing information is added. The individual containers are assigned a certain position within the group. The position no. determines the start of the respective container.
Stuffing information
62.1013.105.11-A001
1-5
Introduction
Concatenation
The above description was based on the assumption that the payload is smaller than the container available. If the payload to be transported is larger than the container available for it, several containers can be concatenated. They then form a continuous container chain. In this case, the payload is distributed on this container chain. Example: The source signal is 599.04 Mbit/s (broadband ISDN). Since the largest container defined can transport only a signal up to 140 Mbit/s, four such containers have to be concatenated. The position of the container chain on the conveyor belt is defined for the first container. The position of all other containers 2, 3 and 4 is determined by the first one. 1st container 2nd container 3rd container 4th container
Concatenation
1-6
62.1013.105.11-A001
Introduction
9 rows
Payload area
Fig. 1-8 Transport frame of the 1st hierarchy level The Additional transport capacity has a transmission capacity of 9 (columns) x 9 (rows) x 8 (bits) x 8000 (frames per second) = 5.184 Mbit/s. This area is referred to as Section Overhead. In addition to the payload (which can be arbitrarily structured), additional payload-independent information is transmitted. The Section Overhead is transmitted even when there is no payload.
62.1013.105.11-A001
1-7
Introduction
Hierarchy levels
The transport frame of the higher hierarchy levels differ from each other only with respect to the number of columns. The following hierarchy levels have been defined: Hierarchy level 1 4 16 Number of columns 270 1080 (4 x 270) 4320 (16 x 270) Number of rows 9 9 9 Transport capacity 155.520 Mbit/s 622.080 Mbit/s 2488.320 Mbit/s
1-8
62.1013.105.11-A001
Introduction
ti o n irec
r of t
on issi nsm a
nter Poi
ter Poin
Section Overhead
nter Poi
70
30
ter Poin
Cro
ssc on
ne c t
nter Poi
60
P oi
40
ter Poin
Reference point
Add/Drop
62.1013.105.11-A001
1-9
Introduction
1-10
62.1013.105.11-A001
Structures
2 Structures
2.1 Synchronous Transport Module Level 1 (STM-1)
The Synchronous Digital Hierarchy (SDH) defines the Synchronous Transport Module Level 1 (STM-1) as multiplex signal of the lowest level. It has a transmission rate of 155.520 Mbit/s. The STM-N bit rates of the standardized higher hierarchy level (N= 4 and 16) are always higher by factor 4.
Transport capacity in kbit/s 155 520 622 020 2 488 320 Interface Electrical G.703 Optical G.957 G.957 G.957
An STM-N multiplex signal is formed by interleaving the individual STM-1 frames byte by byte.
SOH 9 19440 bits or 2430 bytes/frame Bit length: 6.4300411 ns Transmission bit rate: 155.520 Mbit/s Frame length: 125 s
62.1013.105.11-A001
2-1
Structures
The first 9 columns include the Section Overhead (SOH) and the Pointer of the Administrative Unit (AU pointer). The remaining 261 columns are used for transporting the payload. It consists of packed and multiplexed payload signals (tributaries) and an accompanying Path Overhead (POH). The repetition frequency of the STM-1 frame is 8 kHz, i.e. one STM-1 frame has a length of 125 s. The transmission capacity of one byte in an STM-N frame is thus 64 kbit/s. With STM-1, an Overhead capacity of 5184 kbit/s is transported in addition to the traffic bit rate of 150,336 kbit/s. Bit rates of the STM-1 frame
Columns x rows x 64 kbit/s STM-1 frame Section-Overhead Payload 270 x 9 x 64 kbit/s 9 x 9 x 64 kbit/s 261 x 9 x 64 kbit/s Bit rate 155,520 kbit/s 5,184 kbit/s 150,336 kbit/s
2-2
62.1013.105.11-A001
Structures
The payload has no fixed phase relation to the STM-N frame. In order to be able to access the payload, the Section Overhead block contains a pointer. It is located in the 4th row of the STM-N frame.
Payload
522 ...
SOH
...
782
STM-1
Pointer
310
...
310 522
...
522
...
...
782
Pointer
3101
310
...
310
...
Fig. 2-2 Pointer The pointer indicates the beginning of the payload frame and permits the payload to be directly accessed. The first byte of the payload frame (byte 0) follows the last pointer byte. Bytes 522 to 782 are located in front of the pointer. Pointer values higher than 521 are thus pointing at the next STM frame!
62.1013.105.11-A001
2-3
Structures
2.3.1 Container C
The transmission capacity of the incoming source signal is smaller than the capacity of the block structure. The source signal is therefore filled up by adding stuffing information (positive justification). The process of filling up the incoming information to obtain the defined block structure is referred to as mapping. The complete block structure is called Container C. Different container sizes (e.g. C-11, C-12, C-2, C-3, C-4) are available for the different source signal bit rates. The digit in the container designation indicates the hierarchy level of the plesiochronous signal (e.g. C-4 for 140 Mbit/s). If several containers for different bit rates are available within one hierarchy level, a second digit defines the bit rate assignment (C-11=1,5 Mbit/s, C-12=2 Mbit/s). 1 260 1 84
C-4
C-3
12
C-2
C-12
C-11
Hierarchy
1.5 Mbit/s + stuffing bits 2 Mbit/s + stuffing bits 6 Mbit/s + stuffing bits 45 (34) Mbit/s + stuffing bits 140 Mbit/s + stuffing bits Fig. 2-3 Containers
2-4
62.1013.105.11-A001
Structures
261
85
POH
C-4
POH
C-3
VC-3 3
VC-11
C-11 + POH C-12 + POH C-2 + POH C-3 + POH C-4 + POH
62.1013.105.11-A001
2-5
Structures
AU-3 123 4 AU-3 pointer VC-3 VC-4 + AU-4 pointer VC-3 + AU-3 pointer Fig. 2-5 Administrative Unit 90
AU-4 AU-3
2-6
62.1013.105.11-A001
Structures
1
V
12
TU-2
in frame #1
TU-2
in frame #2
TU-2
in frame #3
TU-2
in frame #4
TU-2
... 105 106 V3 107 108 ... 212 213 V4 214 215 ... 319 320
Pointer bytes 1
V
TU-12
in frame #1
TU-12
in frame #2
0 1 ...
TU-12
in frame #3
...
TU-12
in frame #4
68 69 V4 70 71 ... 103 104
TU-12
V1 105 106 ... 138 139 V2 33 34 V3 35 36
Pointer bytes 1
V
TU-11
in frame #1
TU-11
in frame #2
0 1 ...
TU-11
in frame #3
...
TU-11
in frame #4
50 51 V4 52 53 ... 76 77
TU-11
V1 78 79 ... 102 103 V2 24 25 V3 26 27
Pointer bytes
86
VC-3
...
VC-2 + TU-2 pointer TU-2 VC-12 + TU-12 pointer TU-12 VC-11 + TU-11 pointer TU-11 or VC-11 + stuff. info + TU-12 pointer TU-12 VC-3 + TU-3 pointer TU-3 Fig. 2-6 Tributary Unit
62.1013.105.11-A001
2-7
Structures
TUG-2 Stuffing information 4 x TU-11 TUG-2 3 x TU-12 TUG-2 1 x TU-2 TUG-2 7 x TUG-2 + stuff. info TUG-3 1 x TU-3 + stuff. info TUG-3 Fig. 2-7 Tributary Unit Group
TU-3
2-8
62.1013.105.11-A001
Structures
Examples
With 140 Mbit/s signals, the generation of an STM-1 signal can be described as follows: 1. 2. 3. 4. Filling up the 140 Mbit/s signal with stuffing bits -> Adding the Path Overhead (POH)-> Calculating and adding the pointer -> Adding the Section Overhead (SOH) -> C-4 VC-4 AU-4 STM-1
In this case, AUG and AU-4 are identical, i.e. the AUG does not have to be separately illustrated in the following figure.
270 bytes 9 1
3 1
Payload
STM-1
AU-4
VC-4
62.1013.105.11-A001
2-9
Structures
At bit rates lower than 140 Mbit/s, the plesiochronous signals are converted into an STM-1 signal via a 2-step procedure. .
No
<140 Mbit/s
No
<140
P O H P T R
VC
No
<34 Mbit/s
No
<34
Generating TUG-2
TUG-2
Generating TUG-3
TUG-3
2-10
62.1013.105.11-A001
Structures
The following diagram shows how a 2.048 Mbit/s signal is converted into an STM-1 signal via the different multiplex steps.
9 bytes 270 bytes
SOH Pointer VC-4 POH stuff. info Pointer SOH stuff. info TUG-2 TU-12 f TUG-3
9 bytes
x3 TUG-3
x7 TUG-2
Fig. 2-11 Generation of an STM-1 signal from a 2.048 Mbit/s signal The maximum number of 2.048 Mbit/s signals can be calculated as follows: 3 (TU-12) x 7 (TUG-2) x 3 (TUG-3) x 1 (VC-4) = 63 x 2.048 Mbit/s A maximum of 63 x 2.048 Mbit/s signals can thus be assembled in one STM-1 signal. This is shown in the next figure. The individual 2.048 Mbit/s signals are subjected to the same multiplex procedure in both the transmit and receive direction, however, in the opposite order. For this reason, the two directions are not separately depicted. For further simplification, tributary signals of the same type (e.g. 2.048 Mbit/s) are shown only one time. All intermediate steps of the same type (e.g. TUG-2) are also illustrated only once. The application of this principle to all tributary signals defined results in the SDH multiplex scheme described in chapter 3 below.
62.1013.105.11-A001
2-11
Structures
TU-12 TUG-2 TU-12 TU-12 TU-12 TUG-2 TU-12 TU-12 TU-12 TUG-2 TU-12 TU-12 TU-12 TUG-3 TUG-2 TU-12 TU-12 TU-12 TUG-2 STM-1 AU-4 VC-4 TU-12 TU-12 TU-12 TUG-2 TU-12 TU-12 TU-12 TUG-2 TU-12 TU-12
VC-12 VC-12 VC-12 VC-12 VC-12 VC-12 VC-12 VC-12 VC-12 VC-12 VC-12 VC-12 VC-12 VC-12 VC-12 VC-12 VC-12 VC-12 VC-12 VC-12 VC-12
C-12 C-12 C-12 C-12 C-12 C-12 C-12 C-12 C-12 C-12 C-12 C-12 C-12 C-12 C-12 C-12 C-12 C-12 C-12 C-12 C-12
2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s 2.048 Mbit/s
TUG-3
7x
21 x 2.048 Mbit/s
TUG-3
7x
21 x 2.048 Mbit/s
2-12
62.1013.105.11-A001
Structures
2.4 Concatenation
If the payload is larger than the container available for it, it can be distributed to several consecutive containers. The individual containers are concatenated by means of a special pointer value. This pointer value is referred to as Concatenation Indication. Example of a VC-4 concatenation A number of four VC-4 containers are required for an ATM cell stream of the broadband ISDN with a bit rate of 599.04 Mbit/s. In the first VC-4, a valid POH is generated. The other three VC-4s are only filled up with payload and are assembled to form one VC-4-4c Virtual Container. By adding the pointer, the VC-4-4c is converted into the AU-4-4c group. The first AU-4 of the AU-4-4c group is provided with a pointer. All other AUs contained in the AU-4-4c group receive the pointer value which indicates the concatenation of the containers. All following AUs within the AU-4-4c group receive the Concatenation Indication (CI) instead of the pointer value. The CI is composed as follows: 1 0 0 1 S S 1 1 1 1 1 1 1 1 1 1
The CI value indicates that this AU-4 belongs to the previous AU-4 and that all pointer operations of the first AU-4 shall be executed on all AU-4 units contained in the AU-4-4c group.
A VC-4 concatenation is possible only in STM-N frames with N > 1, e.g. STM-4 frames.
62.1013.105.11-A001
2-13
Structures
STM-1#1
1 9 10 11 12 13 270 1
STM-1#2
9 10 11 12 13 270 1
STM-1#3
9 10 11 12 13 270 1
STM-1#4
9 10 11 12 13 270
SOH
Pointer
SOH
Pointer
SOH
Pointer
SOH
Pointer
SOH
125s
SOH
125s
SOH
125s
SOH
125s
Byte interleaving
10 11 11 11 12 12 13 11 12 13 12 13 13
4x9 Pointer
Payload
SOH
SOH
125s
2-14
62.1013.105.11-A001
Structures
Example:
The system generates a TU multiframe composed of four TU-2 frames. The TU-2 Tributary Units are converted via TUG-2 into a VC-3. The TU pointer bytes V1 to V4 are distributed to four consecutive VC-3s. By means of a counting process, the H4 byte determines the VC-3 frames containing the individual pointer bytes. H4 = x x x x x x 0 0 indicates that the next VC-3/VC-4 frame includes the V1 pointer byte. .
62.1013.105.11-A001
2-15
Structures
H4 (00)
V1 VC-3/VC-4 Payload
H4 (01)
V2 VC-3/VC-4 Payload
H4 (10)
V3 VC-3/VC-4 Payload
H4 (11)
V4 VC-3/VC-4 Payload
H4 (00)
2-16
62.1013.105.11-A001
Structures
1 1 0 1 0 0 1 1
0 0 1 1
BIP-8 value
62.1013.105.11-A001
2-17
Structures
VC-4 Assembler
C-3
VC-4 Assembler
VC-3 Assembler
VC-3 Assembler
C-3
C-3, C-4
STM-N RSOH
C-3, C-4
STM-N MSOH
SOH = Section Overhead (assigned to the transmission section) POH = Path Overhead (assigned to the virtual container)
2-18
62.1013.105.11-A001
xN STM-N N = 1, 4 AUG
AU-3
VC-3 x7 x7 x1 x3 TUG-2 x4 TU-12 TU-2 VC-2 C-2 see note 6.312 Mbit/s 2.048 Mbit/s 1.544 Mbit/s
VC-12
C-12
Pointer processing Note 8 Mbit/s and non-hierarchical bit rates can be mapped into concatenated VC-2 virtual containers.
TU-11
VC-11
C-11
Fig. 3-1 Synchronous multiplex structure in compliance with ITU-T Recommendation G.707 The following chapter contains a detailed description of the individual sections and elements of the multiplex structure. The assembly of payload signals in containers is explained in a separate chapter.
62.1013.105.11-A001
3-1
C-4 to AU-4
The 139.264 Mbit/s signal is assembled in a C-4 container. Then the VC-5 is generated by adding the POH. It is composed of 261 columns, each consisting of 9 rows. By adding the AU-4 pointer, the VC-4 is converted into an AU-4. The AU pointer indicates the relative offset between the frame start of the VC and the STM-1 frame.
AU-4 to AUG
The AU-4 Administrative Unit is converted into an AUG arrangement. The AUG represents an information structure composed of 9 rows consisting of 261 columns plus 9 additional bytes in row 4 for the AU pointers. In the example depicted below, the AUG consists of one VC-4 and one AU-4 pointer. The AU-4 and AUG are identical. 1
J1 B3 C2 G1 VC-4-POH F2 H4 F3 K3 N1
261
C-4
VC-4
no fixed phase
H1 Y Y H2 1* 1* H3 H3 H3
AU-4
fixed phase
AUG
3-2
62.1013.105.11-A001
AUG to STM-N
The AUGs generated this way can now be either assembled in a STM-1 frame by mapping in an AUG directly or in an STM-N frame by multiplexing N x AUGs byte by byte. 10 1 9
#1
261 1 9
10
261
#2
AUG
AUG
123...N123...N
Nx9
N x 261 STM-N
Phase relation
The phase of the VC-4 has no fixed relation to the STM-N frame. The AU-4 pointer indicates the frame start of VC-4. This pointer is transmitted in the STM-N signal and establishes thus the phase relation to the STM-N frame. The AU-4 pointer has a defined phase relation to the AUG and thus to the STM-N frame.
62.1013.105.11-A001
3-3
The 34.368 Mbit/s signal (44.736 Mbit/s) is assembled in a C-3 container. Then the VC-3 is generated by adding the POH. This virtual container is composed of 85 columns with 9 rows each. For mapping three VC-3s into a AUG, two columns with fixed stuffing information must at first be inserted in VC-3 (3 x (85 +2) = 261).
1 30 59 87 1 30 59 87 1 30 59 87
VC-3
J1 B3 C2 G1 F2 H4 F3 K3 N1
VC-3
J1 B3 C2 G1 F2 H4 F3 K3 N1
VC-3
J1 B3 C2 G1 F2 H4 F3 K3 N1
VC-3-POH
no fixed phase
VC-3-POH
no fixed phase
VC-3-POH
no fixed phase
AU-3
H1 H2 H3
AU-3
H1 H2 H3
AU-3
H1 H2 H3
A B A B C A B C A B C C
A B C
AUG
A B C
Fig. 3-4 Multiplexing of three AU-3s into AUG In order to achieve a relatively uniform distribution of this stuffing information, it is inserted in columns 30 and 59. These extended VC-3s obtain their phase relation to the STM-N signal by adding an AU-3 pointer. The three AU-3s generated have the same fixed phase relation to the STM-N signal. The structure of the AUG is filled by multiplexing the three AU-3s byte by byte.
3-4
62.1013.105.11-A001
The AUGs thus generated can now be assembled in an STM-1 frame by mapping in an AUG directly or in a STM-N frame by multiplexing N x AUGs byte by byte. In this connection, it is of no importance whether the AUGs contain AU-3s or AU-4s, since the structure (261 columns each with 9 rows + 9 bytes for pointer) is always the same.
Phase relation
The phase of the VC-3 has no fixed relation to the STM-N frame. The AU-3 pointer indicates the frame start of the VC-3. This pointer is transmitted in the STM-N signal and establishes thus the phase relation to the STM frame. For each VC-3, the STM-N transmits one pointer, i.e. it contains a total of three pointers. The AU-3 pointer has a defined phase relation to the AUG and thus to the STM-N frame.
62.1013.105.11-A001
3-5
x1 AU-4 VC-4 x3 x1 TUG-3 TUG-3 TU-3 VC-3 VC-3 44.736 Mbit/s C-3 34.368 Mbit/s
The 34.368 Mbit/s signal (44.736 Mbit/s) is assembled in a C-3 container. Then the VC-3 is generated by adding the POH. This virtual container is composed of 85 columns, each consisting of 9 rows. By providing the VC-3 with a pointer, the TU-3 Tributary Unit is generated. This TU-3 is then converted into a TUG-3 arrangement by adding stuffing information. A TUG-3 is composed of 86 columns. Up to three TUG-3s can be multiplexed into one VC-4. A VC-4 has a POH and is composed of 261 columns. Behind the POH of the VC-4, two columns with fixed stuffing information (pos. justification bits) are inserted. In the remaining 258 columns, the three TUG-3s are multiplexed by turns into the VC-3 byte by byte. This process results in a total of 3 x 86 + 2 + 1 = 261 columns.
1 86 1 86 1 86
TUG-3 (A)
TUG-3 (B)
TUG-3 (C)
Stuffing information
P O H
VC-4
A B C A B C A B C A B C A B C
1 2 3 4 5 6 7 8 9 10 11 12
261
3-6
62.1013.105.11-A001
Phase relation
In the first three bytes of the first column, the TU-3 pointer sets up the phase relation between VC-3 and TUG-3. 86 columns TU-3 pointer
H1 H2 H3
TUG-3 85 columns
J1 B3 C2 G1 F2 H4 F3 K3 N1
Stuffing bits
C-3
VC-3
VC-3-POH
Fig. 3-6 TU-3 pointer TUG-3 has a fixed phase relation to VC-4. AU-4 sets up the phase relation to the STM-N signal.
62.1013.105.11-A001
3-7
x1 x3 TUG-2 x4
TU-2
VC-2
C-2
TU-12
VC-12
C-12
TU-11
VC-11
C-11
Depending on their bit rate, the payload signals are assembled in containers C-n of appropriate size. The Virtual Containers (VC-n) are generated by adding the POHs. By providing these VC-n containers with their pointers, the TU-n Tributary Units are generated. Since all SDH stuctures are based on a structure composed of 9 rows, the TUs can be described as a structure with a certain number of columns and nine rows.
TU-11
The capacity of a TU-11 is 1,728 kbit/s = 27 bytes per 125 s. A TU-11 can be described as a structure composed of three columns and nine rows.
1 2 9 rows
TU-11 27 bytes
27
TU-12
The capacity of a TU-12 is 2,304 kbit/s = 36 bytes per 125 s. A TU-12 can be described as a structure composed of four columns and nine rows.
3-8
62.1013.105.11-A001
1 2 9 rows
TU-12 36 bytes
36
TU-2
The capacity of a TU-2 is 6,912 kbit/s = 108 bytes per 125 s. A TU-2 can be described as a structure composed of 12 columns and nine rows. 1 2 9 rows 12 columns 1 2 3 4 5 6 7 8 9 10 11 12
108
62.1013.105.11-A001
3-9
TUG-2
A TUG-2 is generated by multiplexing 4 x TU-11 or 3 x TU-12 or 1 x TU-2 column by column. Thus, the TUG-2 frame represents an arrangement in which each byte of a TU has its fixed position. TU-11 TU-12 TU-2
4x
1 1 2 3 4 2 3 4 1 2
3x
1 2 3 4 3 1 2 3 1 2 3 1 2
1x
TUG-2
3-10
62.1013.105.11-A001
TUG-3 x7
x1 x3
TU-2
VC-2
C-2
TUG-2 x4
TU-12
VC-12
C-12
TU-11
VC-11
C-11
A TUG-3 frame can be filled by multiplexing seven TUG-2 frames byte by byte. The first two columns are contain stuffing information. TU-11 TU-12 TU-2
1 2 3 4 2 3 4
1 2 3 4
1 2 3
1 2 3
1 2 3
1 2 3
TUG-2
(1)
(2)
(3)
(7)
1 2 3 4 5 6 7
1 2 3 4 5 6 7
1 2 3 4 5 6 7
1 2
TUG-3
3 4 5 6 7 82 84 86
Phase relation
The TU-11, TU-12 and TU-2 Tributary Units and the TUG-2 and TUG-3 Tributary Unit Groups have a fixed phase relation to each other. A direct multiplexing process without pointer matching is therefore possible.
62.1013.105.11-A001
3-11
VC-3
x7
x1 x3
TU-2
VC-2
C-2
TUG-2 x4
TU-12
VC-12
C-12
TU-11
VC-11
C-11
A VC-3 Virtual Container can be filled by multiplexing seven TUG-2 frames byte by byte. In doing this, seven TUG-2s are multiplexed into columns 2 to 85. The VC-3 POH occupies column 1 of the VC-3. TU-11 TU-12 TU-2
1 2 3 4 2 3 4
1 2 3 4
1 2 3
1 2 3
1 2 3
1 2 3
TUG-2
(1)
(2)
(3)
(7)
VC-3 POH
1 2 3 4 5 6 7 1 234 . . .
1 2 3 4 5 6 7
1 2 3 4 5 6 7
1 2 3 4 5 6 7
1 2 3
VC-3
4 5 6 7 81 83 85
3-12
62.1013.105.11-A001
Mapping procedures
4 Mapping procedures
For all defined PDH bit rates there are mapping procedures which permit the plesiochonous bit rates to be assembled in the corresponding containers. These mapping procedures are always based on a positive justification process, i.e. the transmission capacity of the container is larger than the maximum amount of information received. In order to compensate the difference between the information received and transmitted, useful information or stuffing information must be inserted at defined points. In the following sections, the mapping procedures available for signals with bit rates normally used in Europe are described.
Block 1
Block 2
Block 20
VC-4 POH
1 J1 B3 C2 G1 F2 H4 F3 K3 N1
10
11
12
13
14
Block 180 Fig. 4-1 Splitting up VC-4 into 13-byte blocks The first byte of each block is a special byte, the following 12 bytes contain (12 x 8) = 96 information bits. The special bytes are referred to as W, X, Y and Z and have the following order: W is a normal information byte. Y is a stuffing byte, i.e. its contents are not defined. The bits of the X byte are assigned as follows: C R R R R R O O The O bits can be used as overhead bits for the PDH. Five R bits are filled
62.1013.105.11-A001
4-1
Mapping procedures
with undefined stuffing information. The C bit is a stuffing check bit which includes the information as to whether this row contains traffic or justification information in the stuffing position. If the C bit is 0, the stuffing bits are real traffic bits. If it is 1, the stuffing information consists of justification bits only. Since the X byte is transmitted 5 times per row, five stuffing check bits are available. On the Rx side, a majority decision prevents transmission errors from leading to a false interpretation of the stuffing bit contents. The Z byte is occupied as follows: I I I I I I S R It contains six information bits (I), one fixed stuff bit (R) as well as the justification bit (S) that can be used for real or stuffing information. The following figure shows the first row of VC-20 divided up into 20 blocks.
1 12 bytes
J1 W
96 I
96 I
96 I
96 I
96 I
POH byte
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
96 I
4-2
62.1013.105.11-A001
Mapping procedures
An evaluation of this assignment leads to the following result: Bytes 240 x Inf 1xW 13 x Y 5xX 1xZ x9 260 2340 Information bits 1.920 8 6 1.934 17.406 139,248 104 25 1 130 1.170 9,360 360 5 1 5 45 72 1 9 720 10 90 10 Fixed stuffing bits Stuffing check bits Possible justifi- Overhead bits cation bits
VC-4 sum bit rate = 149,760 kbit/s VC-4 sum bit rate = 149,760 kbit/s Nominal bi trate fs 139,264 kbit/s
Bit rate w/o stuffing positions 139,248 kbit/s = fs - 1 x 10-4 Bit with stuffing positions 139,320 kbit/s = fs + 4 x 10-4
The nominal bit rate is achieved on transmission of 2 x information and 7 x justification bits in the nine possible stuffing positions.
62.1013.105.11-A001
4-3
Mapping procedures
VC-3 POH
1 J1 B3 C2 G1 F2 H4 F3 K3 N1
... ... ... ... ... ... ... ... ... ...
80
81
82
83
84
85
Fig. 4-3 VC-3 divided up into three partial frames The assignment of these partial frames is depicted in the following diagram. Columns 39 and 82 contain the C bytes which include the stuffing check bits C1 and C2. The A and B bytes (columns 83, 84) contain the stuffing positions S1 and S2. All partial frames are occupied in the same way. In contrast to the VC-4 mapping procedure, two stuffing positions, i.e. S1 and S2, with the associated five stuffing check bits C1 and C2 are transmitted here. Additional overhead bytes are not provided.
17
18
39 C C C
58
59
60
61
81
82 C C
83
84
85
R: Fixed stuffing bits C1, C2: Stuffing check bit S1, S2: Possible stuffing bits I: Information bit R R R R R R R R I I I I I I I I
Byte C Bytes A, B
R R R R R R C1 C2 R R R R R R R S1 S2 I I I I I I I
4-4
62.1013.105.11-A001
Mapping procedures
The evaluation of the information transmitted in each partial frame leads to the following result: Information bits 1.431 4.293 x3 Bit rate [kbit/s] 34,344 13,752 240 48 0 Fixed stuffing bits 573 1.719 Stuffing check bits 10 30 Possible justifi- Overhead bits cation bits 2 6 0 0
VC-3 sum bit rate = 48,384kbit/s VC-3 sum bit rate = 48,384 kbit/s Nominal bit rate fs Bit rate w/o stuffing positions Bit rate with stuffing positions 34.368 kbit/s 34.344 kbit/s = fs - 7 x 10-4 34.392 kbit/s = fs + 7 x 10-4
The nominal bit rate is achieved on transmission of 1 x information and 1 x justification bit in the two possible stuffing positions.
62.1013.105.11-A001
4-5
Mapping procedures
VC-12 sum bit rate = 2.224 kbit/s Nominal bit rate fs Bit rate w/o stuffing positions Bit rate with stuffing positions 2.048 kbit/s 2.046 kbit/s = fs - 1 x 10-3 2.050 kbit/s = fs + 1 x 10-3
The nominal bit rate is achieved on transmission of 1 x information and 1 x justification bit in the two possible stuffing positions.
4-6
62.1013.105.11-A001
Mapping procedures
VC-12 sum bit rate = .,648 kbit/s Nominal bit rate fs Bit rate w/o stuffing positions Bit rate with stuffing positions 1.544 kbit/s 1.542 kbit/s = fs - 1.3 x 10-3 1.546 kbit/s = fs + 1.3 x 10-3
The nominal bit rate is achieved on transmission of 1 x information and 1 x justification bit in the two possible stuffing positions.
62.1013.105.11-A001
4-7
Mapping procedures
V5
V5
J2
J2
N2
N2
K4
K4
500 s Fixed stuffing information with even parity Fig. 4-7 Conversion of a VC-11 into a VC-12 (1.5 Mbit/s in VC-12)
4-8
62.1013.105.11-A001
Overhead
5 Overhead
For monitoring and controlling the SDH network, additional information is transmitted together with the traffic data (payload). This additional information, called Overhead, is divided up into two main groups, i.e. the Section Overhead and the Path Overhead.
RSOH
BER monitoring
STM-1
Autom. prot. switch. sign.
H3 H3 H3 K2 D6 D9 D12 Z2 M1 E2
B2 B2 B2 K1 D4 D5 D8 D11
Connection check BER monitoring Ident. of VC contents Path status User channel
J1 B3 C2 G1 F2 H4 F3
MSOH
D7 D10
C-4 Payload
S1 Z1 Z1 Z2
Synchronization status
Future purposes
VC-4
D..
Managem. purposes
K4
62.1013.105.11-A001
5-1
Overhead
C1
The C1 byte can be used to check an STM-N connection between two multiplexers (old meaning, new see J0). 16 byte telegram for connection check
J0
B1
Only defined in STM-1 no. 1. This byte is used for error monitoring on the Regenerator Section. The BIP-8 value is calculated over all bits of the current STM-N frame to receive an even parity and is inserted in the next frame. Only defined in STM-1 no. 1. This byte can be used to generate a 64 kbit/s voice channel for service channel purposes. This channel is accessible at all regenerators and the associated multiplexers. Only defined in STM-1 no. 1. This byte is reserved for network operator purposes. This channel is accessible at all regenerators and the associated multiplexers. Only defined in STM-1 no. 1. These three bytes form a common DCCR data channel with a capacity of 192 kbit/s for the regenerator section. This channel is used to exchange management information.
E1
F1
D1, D2, D3
K1, K2
110 for Multiplex Section Remote Defect Indication D4...D12 Data Communication Channel (DCC)
Only defined in STM-1 no. 1. These eight bytes form a common data channel ( DCCM) with 576 kbit/s for the Multiplex Section.
5-2
62.1013.105.11-A001
Overhead
S1
Synchronization status (Synchronization Status Message (SSM)) Spare bytes Section REI Multiplexer service channel
Only defined in STM-1 no. 1. The SSM informs the operator on the performance of the clocks used in the unit.
Z1,Z2 M1 E2
These N x 4 bytes are reserved for future applications. Remote Error Indication for the Multiplex Section. Only defined in STM-1 no. 1. This byte can be used to form a 64 kbit/s voice channel for service channel purposes. This channel is accessible only at multiplexers.
Connection check BER monitoring Identif. of VC contents Path status User channel Multiframe indicator User channel Autom. prot. switch. Managem. purposes Fig. 5-2 Higher-order POH
62.1013.105.11-A001
5-3
Overhead
J1 Path Trace
This is the first byte in the VC-3/VC-4. Its position is indicated by the pointer and represents thus the reference point of the VC-3/VC-4 structure. This byte can be used to transmit either a repetitive telegram with a length of 64 bytes in any format or a 16-byte telegram in the so-called E.164 format. The Path Trace permits the link to be checked over the complete path. E.164 format: The first byte marks the beginning of the frame. It includes the result of a CRC-7 calculation performed for the previous frame. The following 15 bytes are used to transmit the ASCII signs. If the 16-byte format shall be transmitted in a 64-byte format, it must be repeated four times.
B3 BIP-8 monitoring
This byte is used for error monitoring over the complete path. The BIP-8 value is calculated over all bits of the current VC3/VC-4 to obtain an even parity and is inserted into the next VC3/VC-4. This byte is used as identifier for the VC contents. The following table gives an overview of the defined codings of the C2 byte.
MSB 1 2 3 4 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 LSB 1 2 3 4 0 0 0 0 0 0 0 1 0 0 1 0 0 0 1 1 0 1 0 0 Hex. code 00 01 02 03 04 Explication Unequipped Equipped - non specific TUG structure Locked TU Asynchronous mapping of 34,368 kbit/s or 44,736 kbit/s into Container-3 Asynchronous mapping of 139,264 kbit/s into Container-4 ATM mapping MAN (DQDB) mapping FDDI mapping
C2 Contents identifier
0 0 0 1 0 0 0 1 0 0 0 1 0 0 0 1
0 0 1 0 0 0 1 1 0 1 0 0 0 1 0 1
12 13 14 15
MAN: Metropolitan Area Network DQDB: Dual Queue Dual Bus FDDI: Fibre Distributed Data Interface
Table 5-1 C2 byte mapping code G1 Path status Via this byte, the transmission performance data are reported by the path end to the VC source. Thus, it is possible to monitor the complete path from any point or from any of the two ends.
REI
RDI
(not used)
Fig. 5-3 VC3/VC4 path status (G1) The following information is transmitted:
5-4
62.1013.105.11-A001
Overhead
Bit 1..4
The binary value transmitted corresponds to the number of parity violations detected on comparison of B3 with BIP-8. Numbers higher than 8 are evaluated as 0 errors, since the BIP-8 error monitoring method does not permit errors > 8 to be detected. Bit 5 VC Path Remote Defect Indication (RDI)
This signal is returned whenever the VC-3/VC-4 assembler does not receive a valid signal. The following conditions have been defined: a) Path AIS b) Loss of signal c) Wrong path trace (J1 byte) In each of these cases, bit 5 is set to logic 1, otherwise it is 0. Bit 6...8 F2 User channel not yet defined.
This 64 kbit/s channel is available for communication between the path start and path end for user purposes. On generation of a payload multiframe, this byte is used in the lower-order VC for multiframe synchronization. It is therefore payload-specific.
500 s TU multiframe
H4 Multiframe indicator
P1
P1
SL2
SL1
C3
C2
C1
Fig. 5-4 TU multiframe indicator H4 F3 User channel This 64 kbit/s channel is available for communication between the path start and path end for user purposes. Bits 1 to 4 are provided for controlling automatic protection switching processes at the higher-order level. Bits 5 to 8 are reserved for future applications. This byte is provided for management purposes, e.g. Tandem Connection Maintenance.
62.1013.105.11-A001
5-5
Overhead
BIP-2
REI
RFI
Signal Label
RDI
Fig. 5-6 Bit assignment of the V5 byte Definitions: Bit 1, 2 BIP-2 monitoring These two bits are used for error monitoring over the complete lower-order path. The result is calculated to obtain an even parity. The calculation is performed for the complete VC-1/VC-2 including the POH bytes, however, without bytes V1 to V4 of the TU-1/TU-2 pointer. If information is transmitted in byte V3 in negative justification processes, this byte is included in the calculation. By setting this bit to logic 1, the VC source is informed that one or several parity violations were detected in the BIP-2 calculation. If there are no errors, this bit is logic 0. On detection of a fault or failure, this bit is set to logic 1. RFI is sent back to the VC source.
Bit 3
Bit 4
5-6
62.1013.105.11-A001
Overhead
These three bits correspond with the C2 byte of the higher-order POH. The use of the three special mapping indicators 010, 011 and 100 is optional. However, these values must not be used for other purposes. b5 0 0 0 0 1 1 1 1 b6 0 0 1 1 0 0 1 1 b7 0 1 0 1 0 1 0 1 equipped - unused Meaning Unequipped Equipped - non specific Asynchronous Bit-synchronous Byte-synchronous
Fig. 5-7 V5[5-7] Mapping Code Bit 8 VC-Path Remote Defect Indication (RDI) Path Trace This bit is sent back to the VC source. In normal operation, it is logic 0. On reception of TU1x/TU2 Path AIS or detection of LOS or wrong path trace (J2), it is set to logic 1.
J2
The function of this byte is identical with that of byte J1 of the higher-order POH. This byte can be used to transmit a 16 byte telegram in the E.164 format. Using the Path Trace, it is possible to check the link over the complete path. Bits 1 to 4 are provided for controlling automatic protection switching processes at the lower-order level. Bits 5 to 8 are reserved for future applications.
K4
N2
This byte is provided for management purposes, e.g. Tandem Connection Maintenance.
62.1013.105.11-A001
5-7
Overhead
5-8
62.1013.105.11-A001
Pointers
6 Pointers
A worldwide synchronous network represents an ideal condition that can in practise not always be achieved. In synchronous networks, failures can lead to islands without clock connection. In this case, a free-running oscillator must supply these islands with the required clock information. The introduction of pointers in the SDH created the possibity to maintain the synchronous character of the transported information in a not clock-synchronous environment. The information sent to such an island can thus be processed without any loss of information and can be passed on although the clock bit rates are not identical. The payload has no fixed phase relation to the frame. In order to be able to access the payload, a pointer is transmitted in the overhead block. It permits the dynamic adaptation of the phase of the Virtual Container to the frame. In this connection, dynamic means: 1. The phase of the Virtual Container can differ from that of the frame. 2. At different frequencies, the phase position can continuously vary without causing any loss of information.
62.1013.105.10-A001
6-1
Pointers
Positive justification If the frame frequency of the VC is lower than that of the STM-N frame, stuffing bytes must be inserted and the pointer value must be increased by 1 at regular intervals.
STM-1 frame 1 9 270
Pointer (P) H1 H2 H3
125 s
Pointer (P)
H1 H2 H3
Frame n+1
375 s
H1 H2 H3
Frame n+3
500 s
Fig. 6-1 Pointer modification (positive justification) The stuffing bytes are inserted directly behind the last H3 byte. For an AU-3 one stuffing byte, for an AU-4 three stuffing bytes are inserted. The new pointer (P+1) is then transmitted starting at the next frame. The next VC starts at the position indicated by the new pointer.
6-2
62.1013.105.10-A001
Pointers
Negative justification If the frame frequency of the VC is higher than that of the STM-N frame, additional information of the VC must be transmitted in the H3 bytes and the pointer value must be decreased by 1 at regular intervals.
STM-1 frame 1 9 270
Pointer
H1 H2 H3
125 s
Pointer (P)
H1 H2 H3
Frame n+1
375 s
H1 H2 H3
Frame n+3
500 s
Fig. 6-2 Pointer modification (negative justification) The following three H3 bytes are filled with information. With AU-3, only the H3 byte belonging to the VC to be stuffed is filled with information. The new pointer (P-1) is transmitted starting at the next frame. The next VC starts at the position indicated by the new pointer.
62.1013.105.10-A001
6-3
Pointers
522 522 522 523 523 523 524 524 524 ... 607 607 607 608 608 608 609 609 609 610 610 610 611 611 611 ... 694 694 694 695 695 695
696 696 696 697 697 697 698 698 698 ... 781 781 781 782 782 782 0 87 0 87 0 87 1 88 1 88 1 88 2 89 2 89 2 89 ... 85 85 85 86 86 86
174 174 174 175 175 175 176 176 176 ... 259 259 259 260 260 260 261 261 261 262 262 262 263 263 263 ... 346 346 346 347 347 347 348 348 348 349 349 349 350 350 350 ... 433 433 433 434 434 434 435 435 435 436 436 436 437 437 437 ... 520 520 520 521 521 521 522 522 522 523 523 523 524 524 524 ... 607 607 607 608 608 608 609 609 609 610 610 610 611 611 611 ... 694 694 694 695 695 695
696 696 696 697 697 697 698 698 698 ... 781 781 781 782 782 782 0 87 0 87 0 87 1 88 1 88 1 88 2 89 2 89 2 89 ... 85 85 85 86 86 86
6-4
62.1013.105.10-A001
Pointers
The three AU-3 pointers are interleaved byte by byte and arranged as follows:
The three pointers are independent of each other and indicate the beginning of the corresponding VC, only the bytes of this VC being counted and those of all others being skipped. H1, H2 H1 and H2 are read as a 16-bit data word. Bits 1 to 4 form the so-called New Data Flag NDF. The NDF indicates as to whether a new pointer value has to be set. Two values have been defined: NDF 0110 = disabled NDF 1001 = enabled Maintain pointer value Set new pointer value
Bits 5 and 6 are referred to as S S. They are set to S S = 10. Bits 7 to 16 represent the pointer value. As a binary value, the pointer value indicates the offset between the VC start and the reference point expressed in bytes. The bits are by turns referred to as I bit and D bitt (Increment and Decrement). If the pointer value is to be increased by positive justification, this is indicated by the inversion of all five I bits (bits 7, 9, 11, 13 and 15). On the decoder side, an inversion of the I bits is followed by a majority decision, i.e. if at least three I bits have been inverted, the current pointer value is increased by 1 and the justification bytes contained in the payload of the current VC are ignored. In the negative justification process, the five D bits (bits 8, 10, 12, 14 and 16) are inverted. On the decoder side, the D bits are evaluated and the information contained in H3 is inserted into the payload of the current VC.
N N N N S S I D I D I D I D I D
Pointer value
H3
H3 is the Pointer action byte. It is used to transmit the additional information byte in negative justification processes (VC frame frequency higher than STM frame frequency). In all other cases of application, the content of this byte is not defined.
62.1013.105.10-A001
6-5
Pointers
... 172 ... 259 ... 346 ... 433 ... 520 ... 607 ... 694 ... 781 ... 85
... 172
Fig. 6-4 AU-4 pointer H1, H2 H1 and H2 are read as a 16-bit data word. It includes the New Data Flag NDF and the pointer value. NDF 0110 = disabled NDF 1001 = enabled Maintain pointer value Set new pointer value
The bits S S are set to 1 0. Bits 7 to 16 represent the pointer value. As a binary value, the pointer value indicates the offset between the VC-4 start (J1 byte) and the reference point in 3-byte increments. The bits are by turns referred to as I bit and D bit (Increment and Decrement). If the pointer value is to be increased by a positive justification process, this is indicated by the inversion of all five I bits (bits 7, 9, 11, 13 and 15). On the decoder side, an inversion of I bits is followed by a majority decision, i.e. if at least three I bits have been inverted, the current pointer value is increased by 1 and the justification bytes contained in the payload of the current VC-4 are ignored. In negative justification processes, the five D bits (bit 8, 10, 12,14 and 16) are inverted. On the decoder side, the D bits are evaluated in the same way and
6-6
62.1013.105.10-A001
Pointers
the information contained in H3 is inserted into the payload of the current VC-4.
N N N N S S I D I D I D I D I D
Pointer value
H3
H3 is the Pointer action byte. In negative justification processes, it is used for transmitting the additional information byte. In all other cases of application, the content of this byte is not defined. The H1 and H2 bytes not required have been defined as follows: H1 1 0 0 1 S S 1 1 (S bits not defined, in Fig. AU-4 pointer on page 6 referred to as Y) H2 1 1 1 1 1 1 1 1 (in Fig. AU-4 pointer on page 6 referred to as 1*) The bit combination H1 and H2 thus corresponds with the Concatenation Indication CI, i.e. an AU-4 is treated just like three concatenated AU-3s. If the pointer value is 0, it indicates that the VC starts with the byte directly following the last H3 byte.
AU-4 concatenation
In case of large payload amounts, several AU-4 Administrative Units are concatenated. The first AU-4 contains a normal pointer. The associated following AU-4s include the CI instead of the pointer value. This CI indicates that these AU-4s are to be treated in the same way as the previous ones.
1 0 0 1 S S 1 1 1 1 1 1 1 1 1 1
Concatenation Indication CI
62.1013.105.10-A001
6-7
Pointers
TUG-3
TU-3 pointer
85 columns
VC-3
C-3
VC-3 POH Fig. 6-5 Multiplexing a VC-3 into a TUG-3 The TU-3 pointer is located in the first column of the TUG-3 frame. It is composed of three bytes referred to as H1, H2 and H3. H1, H2 H1 and H2 are read as a 16-bit data word. Bits 1 to 4 represent the New Data Flag NDF. The NDF indicates as to whether a new pointer value must be set or not. The following two values have been defined: NDF 0110 = disabled NDF 1001 = enabled Maintain pointer value Set new pointer value
Bits 5 and 6 are referred to as S S. They are set to S S = 10. Bits 7 to 16 represent the pointer value. As binary value, the pointer value indicates the offset between the VC-3 start (J1 byte) and the reference point expressed in bytes. The bits are by turns referred to as I bit and D bitt (Increment and Decrement). If the pointer value is to be increased by positive justification, this is indicated by the inversion of all five I bits (bits 7, 9, 11, 13 and 15). On the decoder side, an inversion of the I bits is followed by a majority decision, i.e. if at least three I bits have been inverted, the current pointer value is increased by 1 and the justification bytes contained in the payload of the current VC-3 are ignored.
6-8
62.1013.105.10-A001
Pointers
In the negative justification process, the five D bits (bits 8, 10, 12, 14 and 16) are inverted. On the decoder side, the D bits are evaluated in the same way and the information contained in H3 is inserted into the payload of the current VC-3.
N N N N S S I D I D I D I D I D
Pointer value
H3
H3 is the Pointer action byte. It is used to transmit the additional information byte in negative justification processes (VC-3 frame frequency higher than STM frame frequency). In all other cases of application, the content of this byte is not defined. If the pointer value is 0, it indicates that the VC-3 starts with the byte directly following the H3 byte. The values for the TU-3 pointer range from 0 to 764. Pointer values between 595 and 764 point to the next TUG-3 frame!
1 1 2 3 4 5 6 7 8 9 1 2 3 4 5 2 3 4 5 6 ... 82 83 84 85 86
H1 595 596 597 598 599 H2 680 681 682 683 684 H3 S T U F F I N G 0 85 1 86 2 87 3 88 4 89
... 675 676 677 678 679 ... 760 761 762 763 764 ... 80 81 82 83 84
... 165 166 167 168 169 ... 250 251 252 253 254 335 336 337 338 339 ... 420 421 422 423 424 ... 505 506 507 508 509 ... 590 591 592 593 594 ... 675 676 677 678 679 ... 760 761 762 763 764 ... ... 80 81 82 86 83 84 -
170 171 172 173 174 255 256 257 258 259 340 341 342 343 344 425 426 427 428 429 510 511 512 513 514
H1 595 596 597 598 599 H2 680 681 682 683 684 H3 0 0 85 1 86 2 87 3 1 88 4 89
62.1013.105.10-A001
6-9
Pointers
V1 321 322
V1, V2= Pointer byte V3= Pointer action byte V4= Spare byte Fig. 6-7 TU-2 pointer V1, V2 V1 and V2 can be read as a 16-bit data word. Bits 1 to 4 represent the New Data Flag NDF. The following two values have been defined: NDF 0110 = disabled NDF 1001 = enabled Bits 5 and 6 are referred to as S S and indicate the type of the TU. TU-2: S S = 0 0 Bits 7 to 16 represent a 10-bit word, the so-called pointer value. As a binary value, the pointer value indicates the offset between the VC-2 start and the reference point in bytes. The bits are by turns referred to as I and D bit (Increment and Decrement). If the pointer value is to be increased by positive justification, this is indicated by the inversion of all five I bits (bits 7, 9, 11, 13 and 15). On the decoder side, an inversion of the I bits is followed by a majority decision, i.e. if at least three I bits have been inverted, the current pointer value is increased by 1 and the justification bytes contained in the payload of the current VC-2 are ignored. In the negative justification process, the five D bits (bits 8, 10, 12, 14 and 16) are inverted. On the decoder side, the D bits are evaluated in the same way and the information contained in V3 is inserted into the payload of the current
6-10
62.1013.105.10-A001
Pointers
VC-2.
N N N N S S I D I D I D I D I D
Pointer value
V3
V3 is the Pointer action byte. It is used to transmit the additional information byte in negative justification processes (VC-2 frame frequency higher than TU-2 frame frequency). In all other cases of application, the content of this byte is not defined. If the pointer value is 0, it indicates that the VC-2 starts with the byte directly following the V2 byte. The values for the TU-2 pointer range from 0 to 427. Pointer values between 321 and 427 point to the next TUG-2 frame!
V4 TU-2 concatenation
In order to be able to transport bit rates not defined by ITU-T within the Synchronous Digital Hierarchy (SDH), several TU-2 Tributary Units can be concatenated to TU-2-mc. Thus, it is possible to transport information in multiples of VC-2 within a VC-2-mc. Three different concatenation types are possible: a. Concatenation of consecutive TU-2s in one higher-order VC-3 (contiguous concatenation). b. Sequential concatenation of several TU-2s in one higher-order VC-3 (sequential concatenation). c. Virtual concatenation of TU-2s in one higher-order VC-4 (virtual concatenation). In case of a contiguous concatenation, the first TU-2 receives a valid pointer. All other TU-2s contained in the TU-2-mc receive the Concatenation Indicator (CI) instead of the pointer. The CI indicates that all pointer operations of the first TU-2 are to be performed in the same way in all other TU-2s. The VC-2-mc includes a VC-2 POH which is located in the first VC-2 of the VC-2-mc.
1 0 0 1 S S 1 1 1 1 1 1 1 1 1 1
Concatenation Indication CI
The sequential concatenation permits the simultaneous transport of both TU-2-mc and TU-3 in one VC-4. In case of a virtual concatenation, all VC-2s of a VC-2-mc receive the same pointer at the beginning of the path. The control circuit ensures that all VC-2s belonging together are accommodated in the same VC-4.
62.1013.105.10-A001
6-11
Pointers
V1
78
79
...
24
25
V3
26
27
...
50
51
V4
52
53
...
76
77
V1, V2= Pointer byte V3= Pointer action byte V4= Spare byte Fig. 6-8 TU-11 pointer V1, V2 V1 and V2 can be read as a 16-bit data word. Bits 1 to 4 represent the New Data Flag NDF. The following two values have been defined: NDF 0110 = disabled NDF 1001 = enabled Bits 5 and 6 are referred to as S S and indicate the Type of the TU. TU-11: S S = 1 1 Bits 7 to 16 represent a 10-bit word, the so-called pointer value. As a binary value, the pointer value indicates the offset between the VC-11 start and the reference point expressed in bytes. The bits are by turns referred to as I and D bit (Increment and Decrement). If the pointer value is to be increased by positive justification, this is indicated by the inversion of all five I bits (bits 7, 9, 11, 13 and 15). On the decoder side, an inversion of the I bits is followed by a majority decision, i.e. if at least three I bits have been inverted, the current pointer value is increased by 1 and the justification bytes contained in the payload of the current VC-11 are ignored. In the negative justification process, the five D bits (bits 8, 10, 12, 14 and 16) are inverted. On the decoder side, the D bits are evaluated in the same way and the information contained in V3 is inserted into the payload of the current VC-11.
N N N N S S I D I D I D I D I D
Pointer value
6-12
62.1013.105.10-A001
Pointers
V3
V3 is the Pointer action byte. It is used to transmit the additional information byte in negative justification processes (VC-11 frame frequency higher than TU-11 frame frequency). In all other cases of application, the content of this byte is not defined. If the pointer value is 0, it indicates that the VC-11 starts with the byte directly following the V2 byte. The values for the TU-11 pointer range from 0 to 103. Pointer values between 78 and 103 point to the next TUG-2 frame!
V4
62.1013.105.10-A001
6-13
Pointers
V1 105 106
...
33
34
V3
35
36
...
68
69
V4
70
71
V1, V2= Pointer byte V3= Pointer action byte V4= Spare byte Fig. 6-9 TU-12 pointer V1, V2 V1 and V2 can be read as a 16-bit data word. Bits 1 to 4 represent the New Data Flag NDF. The following two values have been defined: NDF 0110 = disabled NDF 1001 = enabled Bits 5 and 6 are referred to as S S and indicate the type of the TU. TU-12: S S = 1 0 Bits 7 to 16 represent a 10-bit word, the so-called pointer value. As a binary value, the pointer value indicates the offset between the VC-12 start and the reference point expressed in bytes. The bits are by turns referred to as I and D bit (Increment and Decrement). If the pointer value is to be increased by positive justification, this is indicated by the inversion of all five I bits (bits 7, 9, 11, 13 and 15). On the decoder side, an inversion of the I bits is followed by a majority decision, i.e. if at least three I bits have been inverted, the current pointer value is increased by 1 and the justification bytes contained in the payload of the current VC-12 are ignored. In the negative justification process, the five D bits (bits 8, 10, 12, 14 and 16) are inverted. On the decoder side, the D bits are evaluated in the same way and the information contained in V3 is inserted into the payload of the current VC-12.
6-14
62.1013.105.10-A001
Pointers
Pointer value
V3
V3 is the Pointer action byte. It is used to transmit an additional information byte in negative justification processes (VC-12 frame frequency higher than TU-12 frame frequency). In all other cases of application, the content of this byte is not defined. If the pointer value is 0, it indicates that the VC-12 starts with the byte directly following the V2 byte. The values for the TU-12 pointer range from 0 to 139. Pointer values between 105 and 139 point to the next TUG-2 frame!
V4
62.1013.105.10-A001
6-15
Pointers
6-16
62.1013.105.10-A001
Reference model
7 Reference model
International standards set up for the Synchronous Digital Hierarchy (SDH) and the associated equipment units ensure that networks can be established using equipment from different manufacturers. This is achieved thanks to the introduction of application-independent reference models. The general reference model (acc. G.783) specifies both the physical characteristics (bit rates, optical/electrical level, impedances) and definitions regarding the contents of each byte and even bit. These specifications cover the following aspects: Frame structure Identification Scrambling Coding/decoding Mapping procedures Service channel utilization Monitoring and control signals.
The essential parts of signal processing are defined as functions. Regarding external interfaces, previous recommendations were maintained. The reference model is composed of 16 different basic functions. They have an internal function and logic reference points via which the individual blocks communicate with each other. These reference points are no internal test or measuring points and in many cases physically not even obvious. The external interfaces (inputs and outputs), however, are physically defined.
Transport terminal function STM-M T T RST S T MST S T MSP S T MSA S Higher-order path T LPC S T HPA S T HPT S T HPC S T MSA S Transport terminal function T MSP S T MST S DCC M Higher-order path S G.703 T PPI S T LPA T S S S SETS SETPI External synchronization SEMF MCF F interface T RST S DCC R Q interface T STM-N SPI S
SPI S
Fig. 7-1 Reference model for the design of SDH units The SDH definitions used in the reference model such as section, lower-
62.1013.105.11-A001
7-1
Reference model
order path, higher-order path, overhead etc. are generally applicable to both transmission directions. All functional blocks have a clock reference point T and a management reference point S. The reference point T communicates with the functional block referred to as SETS, the reference point S with functional block SEMF.
7-2
62.1013.105.11-A001
Reference model
This function generates the RSOH (row 1 to 3 of the SOH) and/or evaluates it on the receive side. In addition, the STM-N signal is scrambled in the transmit direction. Frame alignment and descrambling take place in the receive direction. The logic signal is normally converted into an optical STM-N signal appropriate for the transmission medium available. Both signal conversion and clock recovery are performed in the receive direction. This function provides all clocks required by the network element (NE). All functions mentioned above receive the necessary clock signals via the reference points T from the SETS. This is the interface between an external synchronization source and SETS.
SETSSynchronous Equipment Timing Source SETPI Synchronous Equipment Timing Physical Interface SEMF Synchronous Equipment Management Function
Here the monitoring data (performance data and hardware-specific messages) are converted into object-oriented messages which can be transmitted via the DCC or the Q or F interface to a management system or an Operator Terminal. In the opposite direction, messages from the management system are converted into hardware-specific control signals. The connections to the individual functional blocks are set up via logic reference points S. This function covers all tasks to be fulfilled in conjunction with the transport of TMN messages to or from the management system via DCC channels or via the Q or F interface.
MCF
62.1013.105.11-A001
7-3
Reference model
7-4
62.1013.105.11-A001
Applications
8 Applications
8.1 Synchronous line equipment
In the SDH, no distinction is made between multiplexers and line terminating units. The synchronous line equipment includes both synchronous multiplexers with integrated optical transmitters and receivers and the associated regenerators.
140/155 Mbit/s 4
622 Mbit/s
140/155 Mbit/s 4
F2in
F1out
Fin1
Fout2 SLR4
Fin1
Fout2 SLR4
F1in
F2out
Fout4
Fin3
Fout4
Fin3
140/155 Mbit/s 16
2488 Mbit/s
140/155 Mbit/s 16
F2in
F1out
Fin1
Fout2
Fin1
Fout2
F1in
F2out
62.1013.105.11-A001
8-1
Applications
Alternatively, 140 Mbit/s signals can be applied to the synchronous line multiplexer instead of STM-1 signals. In the transmit direction, the asynchronous 140 Mbit/s signals are converted into an STM-1 signal. In the receive direction, the initial 140 Mbit/s signals are extracted from the STM-1 signal. As opposed to the PDH, the conversion of STM-4 signals to STM-16 signals is not performed by a 4 x STM-4 multiplexing process, but 16 STM-1 signals are directly combined to form the STM-16 signal.
622 Mbit/s 4
155.520 Mbit/s
AUG
AU-4
VC-4
C-4
2448 Mbit/s 16
155.520 Mbit/s
AUG
AU-4
VC-4
C-4
8-2
62.1013.105.11-A001
Applications
the user channel is made available via byte F1 and the service channel via byte E1. Then the SOH is completed again by forming a new RSOH. Here the new Regenerator Section begins. Fault location is generally performed by a management system using the information supplied by all equipment units available in the network. A special system-internal fault-locating device is therefore not necessary here. The difference between SLA-4 and SLA-16 consists only in the different regenerator bit rates.
62.1013.105.11-A001
8-3
Applications
8.2 Multiplexers
Regarding their functions, multiplexers can be divided up into the following three basic types: Terminal Multiplexers Add/Drop Multiplexers Cross-connect Multiplexers
MS1/4 TMS
STM-4 STM-1
STM-1
MS1/4 MS1/4: FlexPlex MS1/4 TMS: Terminal Multiplexer (SDH) STM-4 TMS e.g.: 2 Mbit/s 34 Mbit/s 140 Mbit/s
8-4
62.1013.105.11-A001
Applications
The Terminal Multiplexer can split up the signal available at an aggregate interface into the subsignals contained. These are then passed on to the associated tributary interfaces. In the opposite direction, the Terminal Multiplexer combines the signals received at the tributary interfaces to one signal which is routed to the aggregate interface. Fig. 8-4 shows the functioning of a Terminal Multiplexer with regard to the traffic data to be transmitted.
Fig. 8-4 Functioning of a Terminal Multiplexer On splitup of the signal available at the aggregate interface, the multiplexer extracts the associated Overhead information and routes parts of it accessible to the user and appropriate e.g. for operating a service channel system to the corresponding interfaces. In the outgoing direction, the Terminal Multiplexer generates the Overhead data for the signal sent out at the aggregate interface.
62.1013.105.11-A001
8-5
Applications
STM-4
STM-1
STM-1
8-6
62.1013.105.11-A001
Applications
The Add/Drop Multiplexer is an expansion of the Terminal Multiplexer. In contrast to the Terminal Multiplexer, it is equipped with two aggregate-side interfaces for signals of the same hierarchical level. It can split up the signals of the two aggregate interfaces (referred to as "West" and "East") into the subsignals contained and can route individual subsignals to the associated tributary interfaces (drop function). In the opposite direction, it inserts the signals received at the tributary interfaces into the aggregate signals instead of the subsignals extracted (add function). Subsignals not affected by the add/drop functions are switched through from one aggregate interface to the other. On through-connection, the subsignals can be switched at TU-12 level. Fig. 8-6 shows the functioning of an Add/Drop Multiplexer with regard to the traffic data to be transmitted.
TU-12
Aggregate signal West (e.g. STM-1, STM-4) Aggregate signal East (e.g. STM-1, STM-4)
62.1013.105.11-A001
8-7
Applications
STM-1 STM-4
MS1/4 XMS4
MS1/4 XMS1
STM-1
STM-4
STM-1 MS1/4: FlexPlex MS1/4 XMS1: Cross-connect Multiplexer (STM-1) XMS4: Cross-connect Multiplexer (STM-4)
8-8
62.1013.105.11-A001
Applications
The Cross-connect Multiplexer is an expansion of the Add/Drop Multiplexer or Terminal Multiplexer. In contrast to these, it is equipped with up to four aggregate interfaces. They can be referred to as "West1/East1" and "West2/East2", if e.g. the multiplexer is used as network node at the interface between two SDH rings. These interfaces do not have to be used in pairs. In case of a star-shape network node, it is possible to occupy e.g. three of them. The aggregate and tributary interfaces are identical with regard to their crossconnecting capabilities. A FlexPlex MS1/4 configured as Cross-connect Multiplexer is also capable of cross-connecting the individual tributary signals. Thus, it offers maximum flexibility when setting up network structures. Fig. 8-8 shows the functioning of a Cross-connect Multiplexer with respect to the traffic data (payload) to be transmitted.
TU-12
Aggregate signal West 2 (e.g. STM-1, STM-4) Aggregate signal East 2 (e.g. STM-1, STM-4)
62.1013.105.11-A001
8-9
Applications
8.3 Networks
If a telecommunications network, e.g. the DBP Telekom network, is divided up into three levels, i.e. the local area network, the regional long-distance network and the supraregional long-distance network (see Fig. 8-6), all three levels can be equipped with SDH units. However, in order to be able to optimally exploit all possiblilities offered by the Synchronous Digital Hierarchy, different equipment types have to be provided for the different network topologies. The synchronous line equipment (SLA) available for the transmission capacities of 622 Mbit/s and 2.5 Gbit/s (SLA 4, SLA 16) is appropriate for the longdistance network levels where the networks are in most cases implemented as line networks with point-to-point connections. The local area network level mostly consists of ring networks implemented using add/drop multiplexers (ADM). Cross-connect systems can be used at all network levels.
Long-distance network 1
Network nodes
8-10
62.1013.105.11-A001
Applications
Fig. 8-10 Single ring network The stations have access to all information available in the ring. Thus, each station can set up a connection to any other station. Furthermore, each station included in the ring can enter the long-distance network. A central station is no longer required for these tasks. Connections within the ring are set up by informing the corresponding stations on which part of the STM-N signal (i.e. time slot) is to be used for the connection.
62.1013.105.11-A001
8-11
Applications
self-healing
8-12
62.1013.105.11-A001
Applications
By a double connection of the two rings via two stations, the reliability can be further increased.
Long-dist. netw.
62.1013.105.11-A001
8-13
Applications
8-14
62.1013.105.11-A001
Protection switching
9 Protection switching
9.1 Overview
The reliability and maintenance of transmission networks are two important aspects to be taken into account on installation of SDH multiplexers. In this connection, redundancy plays an important role. Redundancy means that additional functions are made available on a standby basis. Redundancy should be provided for both the transmission channels of the network and the multiplexer modules. If a transmission channel is faulty or disturbed, the data traffic is switched over to an appropriate protection channel (protection switching). If the function of a multiplexer fails, the system switches over to the redundant function available (equipment protection).
9.2 Definitions
1. Single-ended operation (unidirectional operation) On failure of only one direction of transmission, only the protection switches of this direction are switched over. 2. Dual-ended operation (bidirectional operation) On failure of only one direction of transmission, the protection switches of both directions are switched over. 3. Extra traffic Extra traffic occupies redundant transmission channels. In the case of a fault, this traffic is interrupted. 4. Normal traffic Normal traffic is routed via the redundant transmission channels.
62.1013.105.11-A001
9-1
Protection switching
The traffic must be switched over by appropriate protection switches. 3. Protocol In many protection switching procedures, a protocol is exchanged between the multiplexers. 4. Control The protection switches have to be controlled in an appropriate way. Any fault detected must be signalled by an alarm. For maintenance purposes, it must be possible to switch over traffic even if there is no fault or failure. There are different protection switching procedures. All these procedures are highly reliable and appropriate for saving the complete traffic protected in case of a single fault. With multiple faults, this is not always possible. For some protection switching procedures there are several variants which differ from each other with regard to the following characteristics: 1. Extra traffic Redundant transmission channels can be occupied by low-priority traffic. In the event of a fault, this traffic is interrupted. 2. Revertive/non-revertive operation This option permits the operator to decide whether the system shall switch back to the original transmission channel on elimination of the fault. 3. Single-ended/dual-ended operation This option permits the operator to decide whether both directions of transmission shall be switched over in common.
9-2
62.1013.105.11-A001
Protection switching
The following table gives an overview of the protection switching procedures currently available. Designation MS 1+1 Protection Operation Single-ended/ dual-ended revertive/nonrevertive Single-ended/ dual-ended revertive/nonrevertive Dual-ended revertive/nonrevertive Dual-ended revertive/nonrevertive Single-ended revertive/nonrevertive Dual-ended revertive/nonrevertive Protocol in K1/K2 bytes Extra traffic not possible
MS 1:n Protection
K1/K2 bytes
possible
K1/K2 bytes
possible
K1/K2 bytes
possible
not necessary
not possible
Path/Subnetwork Protection
K3/K4 bytes
not possible
Multiplex Section
62.1013.105.11-A001
9-3
Protection switching
15
Bridge
Selector
9-4
62.1013.105.11-A001
Protection switching
In the event of a fault, the adjacent multiplexers switch over the normal traffic at the AU level to the half provided for protection. Operation is dual-ended and revertive or non-revertive. In four-fibre rings, there are two protection switching levels. At first the system tries to protect each section of the ring by an own MS 1:1 protection. If the fault cannot be eliminated this way, a loop is switched.
Node 1 N E E Node 2 N Node 1 N Node 2 N Node 1 N Node 2 N
E N Node 4 No failure
Failure on section between node 1 and 2 N E Add/drop function for normal traffic Add/drop function for extra traffic
Failure of node 2
62.1013.105.11-A001
9-5
Protection switching
E N Node 4 No failure
Failure on section between node 1 and 2 N E Add/drop function for normal traffic Add/drop function for extra traffic
Failure of node 2
Fig. 9-4 Example for the traffic flow in an MS dedicated protection ring
Subnetwork protection
9-6
62.1013.105.11-A001
Protection switching
Operation is normally single-ended and non-revertive. In dual-ended operation, a protocol is necessary. The advantages of path/subnetwork protection are (1) the low technical complexity, (2) the possibility of application in any network topology and (3) the flexibility regarding the decision on which connections are to be protected. The disadvantages are (1) the relatively high expenditure resulting from the high number of protection switches and (2) the missing possiblity of extra traffic, since the normal traffic to be protected is always transmitted redundantly.
Path Protection: C-xy C-xy C-xy Permanent bridge VC-xy #2 Path termination Path termination C-xy Path selector
Subnetwork Protection:
VC-xy
C-xy
VC-xy
VC-xy
C-xy
Path termination
Permanent bridge
VC-xy
Path selector
Path termination
9.3.6 Protocols
Protocols exchanged between the multiplexers are used to control the protection switching processes. Appropriate channels are required for transmitting these protocols. In the Section Overhead, there are the K1/K2 bytes. They are used for the protocols of the following protection types: MS 1+1 protection, MS 1:n protection, MS shared protection ring, MS dedicated protection ring.
For path protection, a separate protocol is required for each virtual container (VC). For this reason, path protection protocols can be appropriately transmitted in the Path Overhead only (bytes K3, K4).
62.1013.105.11-A001
9-7
Protection switching
Linear chain
In a linear chain, the multiplexers are connected in series via Aggregate Interfaces. The multiplexers at both ends of the chain are Terminal Multiplexers, those in between are Add/Drop Multiplexers. In order to increase reliability, the transmission lines between two neigbouring multiplexers are doubled. The transmission lines are operated as MS 1:1, MS 1+1 protection (or path protection). The chain is thus protected against faults occurring on individual transmission lines or Aggregate Interfaces. However, there is no protection against an interruption (cut) of all connection cables between two multiplexers or a total failure of a multiplexer in such a chain configuration. Ring configuration offers better protection features. With path protection in a chain configuration of multiplexers, the following two variants can be implemented: Variant 1 - The protection switches are located only in the multiplexers dropping the path to be protected (see Fig. 9-6). Variant 2 - Each multiplexer through which the path to be protected is running is equipped with protection switches (see Fig. 9-7). Variant 1 can be implemented in each multiplexer which supports path protection for signals available at the Tributary Interfaces. For variant 2, the multiplexer must also support path protection at the Aggregate Interfaces. The reliability of variant 2 is higher, since it also copes with multiple faults on condition that only one single fault occurs on each section.
9-8
62.1013.105.11-A001
Protection switching
4 x STM-N
TM #1
ADM #2
ADM #3
TM #4
TR
TR
TR
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
Tributary Interface
62.1013.105.11-A001
VC-xy
Aggregate Interface
Aggregate Interface
9-9
Protection switching
Rings
Add/drop multiplexers can be operated in a ring (see Fig. 9-8). Between each multiplexer pair located in a ring, there are two separate transmission paths. For this reason, rings are especially appropriate for setting up reliable subnetworks. These rings can include two or four fibres.
Interconnected rings
Rings can be connected with each other so that (1) the connecting lines are protected and (2) protection switching can be performed independently for both rings (see Fig. 9-9). The two multiplexers serving one connecting line form a so-called Serving Node. It is possible to combine the two multiplexers and their connecting line to one multiplexer. All ring types available can be interconnected (see Fig. 9-10 and 9-11). Even connections between different ring types are possible. A complete recovery of the traffic signals failed is possible, if not more than one single fault occurs in each ring and with only one single fault in the Serving Nodes.
9-10
62.1013.105.11-A001
Protection switching
TR
ADM #1
TR
ADM #2
Two-fiber ring
ADM #4
TR
ADM #3
TR TR
ADM #1
TR
ADM #2
Four-fiber ring
ADM #4
TR
ADM #3
TR
Fig. 9-8 Examples for multiplexer rings with two and four connecting lines
62.1013.105.11-A001
9-11
Protection switching
ADM
ADM
ADM
ADM
ADM
ADM
ADM
ADM
ADM
9-12
62.1013.105.11-A001
Protection switching
VC-xy
ADM #1 VC-xy
ADM #3
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
62.1013.105.11-A001
VC-xy
9-13
Protection switching
VC-xy
ADM #1 VC-xy
ADM #3
VC-xy VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
VC-xy
ADM #2
ADM #4
9-14
VC-xy
62.1013.105.11-A001
Protection switching
This option permits the operator to decide whether the system shall switch back to the original function on elimination of the fault. The following table gives an overview of Equipment Protection procedures available: Designation Equipment 2+1 protection Equipment 1+1 protection Equipment 1:1 protection Equipment 1:n protection Operation Majority decision Revertive/non-revertive Revertive/non-revertive Revertive/non-revertive
62.1013.105.11-A001
9-15
Protection switching
9-16
62.1013.105.11-A001
Literature
10 Literature
[1] ITU-T Recommendation G.702: Digital Hierarchy Bit Rates (Blue Book) [2] ITU-T Recommendation G.703: Physical/Electrical Characteristics of Hierarchical Digital Interfaces (Blue Book) [5] ITU-T Recommendation G.707: Network Node Interface fo rthe SDH [6] ITU-T Recommendation G.773: Protocol Suites for Q Interfaces for Management of Transmission Systems [7] ITU-T Recommendation G.781: Structure of Recommendations on Multiplexing Equipment for the Synchronous Digital Hierarchy (SDH) [8] ITU-T Recommendation G.782: Types and General Characteristics of Synchronous Digital Hierarchy (SDH) Multiplexing Equipment [9] ITU-T Recommendation G.783: Characteristics of Synchronous Digital Hierarchy (SDH) Multiplexing Equipment Functional Blocks [10] ITU-T Recommendation G.784: Synchronous Digital Hierarchy (SDH) Management
62.1013.105.11-A001
10-1
Literature
10-2
62.1013.105.11-A001
Index
Index
A
A byte 4-4 A1 byte (RSOH) 5-2 A2 byte (RSOH) 5-2 Administrative Unit (AU) 2-6 Administrative Unit Group (AUG) 2-8 AU 2-6 AU pointer 2-6 AU-3 pointer 6-4 D bit 6-5, 6-8 H1, H2 pointer bytes 6-5 H3 pointer action byte 6-5 I bit 6-5, 6-8 NDF 6-5 AU-4 concatenation 6-7 AU-4 pointer 6-6 Concatenation 6-7 D bit 6-6 H1, H2 pointer bytes 6-6 I bit 6-6 NDF 6-6 AUG 2-8 Autom. protection switching (K4 byte) 5-7 Autom. protection switching bytes K1, K2 5-2 Automatic protection switching at the higher-order path 5-5
Continuous concatenation 6-11 Sequential concatenation 6-11 Virtual concatenation 6-11 Concatenation Indication 2-13, 6-7
Concatenation of containers 1-6 Container C Container sizes 2-4 Container chain 1-6 Containers 1-3 Contents identifier (higher-order POH) 5-4 Contents identifier (lower-order POH) 5-7 Conveyor belt 1-3 Cross-connect Multiplexer XMS 8-8
D
D bit (Decrement) 6-5, 6-8 D1...D3 byte (RSOH) 5-2 D4...D12 byte (MSOH) 5-2 Data Communication Channel 5-2 DCC 5-2 DCCM 5-2 DCCR 5-2 Descrambling 2-17 Double ring connection 8-13 Double rings 8-11 Dual-ended operation 9-1
E
E.164 format 5-4 E1 byte (RSOH) 5-2 E2 byte (MSOH) 5-3 Equipment protection 9-15 Error monitoring byte B3 5-4 Error monitoring byte V5 (Bit 1, 2) 5-6 Error monitoring using BIP-X 2-17 Extra traffic 9-1, 9-2
B
B byte 4-4 B1 byte 5-2 B2 byte (MSOH) 5-2 B3 byte (higher-order POH) 5-4 BIP 2-17 BIP values 2-17 BIP-2 monitoring (lower-order POH) 5-6 BIP-8 monitoring 5-2 BIP-8 monitoring (higher-order POH) 5-4 BIP-N x 24 monitoring 5-2 Bit errors 2-17 Bit Interleaved Parity 2-17 Bit rates of the STM-1 frame 2-2 Block structure 2-4
F
F1 byte (RSOH) 5-2 F2 byte (higher-order POH) 5-5 Floating mode 2-15 Frame alignment signal 5-2
G C
C bit 4-2 C1 bit 4-4, 4-6, 4-7 C1 byte (RSOH) 5-2 C2 bit 4-4, 4-6, 4-7 C2 byte (higher-order POH) 5-4 G1 byte (higher-order POH) 5-4
H
H1, H2 byte 6-5, 6-6, 6-8 H3 byte 6-5, 6-7, 6-9 H4 byte 2-15 , 5-5
62.1011.105.11-A001
I-1
Index
Hierarchy level 1-7 Higher-order path 3-1 HPA 7-2 HPC 7-2 HPT 7-2 Higher-order path functions (reference model) 7-2 Higher-order POH 5-3 B3 byte (BIP-8 monitoring) 5-4 C2 byte (contents identifier) 5-4 F2 byte (user channel) 5-5 F3 bytes (User Channel) 5-5 G1 byte (path status) 5-4 H4 byte (multiframe indicator) 5-5 J1 byte (Path Trace) 5-4
5-7
M
M1 byte (MSOH) 5-3 Mapping 2-4 Mapping procedures 4-1 4-8
Asynchronous mapping of 1.5 Mbit/s signals into VC-11 4-7 Asynchronous mapping of 140 Mbit/s into VC-4 4-1 Asynchronous mapping of 2 Mbit/s signals into VC-12 4-6 Asynchronous mapping of 34 Mbit/s signals into VC-3 4-4 Mapping of 1.5 Mbit/s signals into VC12
4-8 MS 1
I
I bit 4-2
J
J0 byte 5-2 J1 byte (higher-order POH) 5-4 J2 byte 5-7 Justification information 1-2, 4-2
K
K1, K2 byte (MSOH) 5-2 K3 byte 5-5 K4 byte (lower-order POH) 5-7
L
Label 1-3 Local area network 8-10, 8-11 Long-distance network 8-10, 8-11 Loss of signal 5-5 Lower-order path 3-1 LPA 7-2 LPC 7-2 LPT 7-2 PPI 7-2 Lower-order path functions (reference model) 7-2 Lower-order POH 5-6 J2 byte 5-7
n protection 9-4 MS 1+1 protection 9-3 MS dedicated protection ring 9-6 MS shared protection ring 9-4 MSOH 5-2 Multiframe 4-6, 4-7 Multiframe generation 2-15 Multiframe indicator (H4) 2-15, 5-5 Multiplex paths 3-1 AU-4 to AUG 3-2 AUG to STM-N 3-3 C11, C12 and C2 to TUG-2 3-8 C-3 to STM-N 3-4, 3-6 C-4 to STM-N 3-2 TUG-2 to TUG-3 3-11 TUG-2 to VC-3 3-12 Multiplex scheme 3-1 Multiplex scheme in compliance with ITU-T G.709 3-1 Multiplex Section Overhead 5-2 Multiplexer Cross-connect Multiplexer XMS 8-8 Multiplexer service channel 5-3 N
N1 byte 5-5 N2 byte (lower-order POH) 5-7 NDF 6-1, 6-5 Negative justification 6-3 Network operator byte 5-5 Networks, synchronous 8-10 New Data Flag 6-1, 6-5 Normal traffic 9-1
V5 byte Bit 1, 2 (BIP-2 monitoring) 5-6 Bit 3 (REI) 5-6 Bit 4 (RFI) 5-6 Bit 8 (RDI) 5-7 V5 byte Bit 5, 6, 7 (contents identifier)
I-2
62.1013.105.11-A001
Index
O
O bit 4-1, 4-6, 4-7 Offset 1-9 Overhead 5-1 5-7
Path Overhead (POH) 5-1 Section Overhead (SOH) 5-1 Overhead bit 4-1, 4-6, 4-7
Overhead capacity 2-2
P
Parittsverletzung 2-17 Parity violations 2-17 Path AIS (P AIS) 5-5 Path monitoring 5-4 Path Overhead 2-2, 2-5, 5-3 5-7 Path status 5-4 Path Trace 5-2 Path Trace J1 (higher-order POH) 5-4 Path Trace J2 (lower-order POH) 5-7 Path/subnetwork protection 9-6 Payload 1-3, 2-2 POH 2-5 Pointer action byte 6-5 Pointer modification 6-1 Frequency matching 6-1 H3 byte 6-2, 6-3 Negative justification 6-3 Positive justification 6-2 Setting a new pointer 6-1 Pointer types 6-4 AU pointer 6-4 TU pointer 6-4 Pointers 6-1 6-15
RDI (lower-order POH) 5-7 Reference model 7-1 Reference points 7-1 Regenerator Section Overhead 5-2 Regenerator service channel 5-2 REI 5-3, 5-5 REI (lower-order POH) 5-6 Remote Defect Indication (RDI) 5-5 Remote Defect Indication (VC path) 5-7 Remote Error Indication (REI) 5-3, 5-5 Remote Error Indication (REI) (lower-order POH) 5-6 Remote Failure Indication (RFI) 5-6 Revertive/non-revertive operation 9-2 RFI 5-6 Ring network 8-11 Rings, self-healing 8-11 RSOH 5-2
S
S bit 4-2 S1 bit 4-4, 4-6, 4-7 S1 byte (MSOH) 5-3 S2 bit 4-4, 4-6, 4-7 Scrambler 2-17 Scrambling 2-17 SDH multiplex elements 2-4 2-8 Section Overhead 1-7, 5-1 Section REI 5-3 Setting a new pointer value 6-1 Setting the pointer by frequency matching 6-1 Single ring 8-11 Single-ended operation 9-1 Single-ended/dual-ended operation 9-2 SOH 5-1
AU pointer AU-3 pointer 6-4 AU-4 pointer 6-6 TU pointer TU-11 pointer 6-12 TU-12 pointer 6-14 TU-2 pointer 6-10 TU-3 pointer 6-8
Point-to-point connections 8-10 Positive justification procedure 6-2 Protection switching 9-1 Protection switching in interconnected rings 9-10 Protection switching in linear chains 9-8 Protocols for protection switching 9-7
MSOH B2 byte (BIP-N x 24 monitoring) 5-2 D4 to D12 (DCCM) 5-2 E2 byte (multiplex service channel)
5-3
K1, K2 byte (automatic protection switching) 5-2 M1byte (section FEBE) 5-3 S1 byte (timing marker) 5-3 Z1, Z2 byte (spare bytes) 5-3 RSOH A1, A2 byte (frame alignment signal)
5-2
R
R bit 4-2 RDI 5-5
B1 byte (BIP-8 monitoring) 5-2 D1 to D3 (DCCR) 5-2 E1 byte (regenerator service channel)
62.1011.105.11-A001
I-3
Index
5-2
V4 byte 6-15 TU-2 concatenation 6-11 TU-2 pointer 6-10 D bit 6-10 I bit 6-10 NDF 6-10 V1, V2 pointer bytes 6-10 V3 byte 6-11 V3 pointer action byte 6-11
TU-3 pointer 6-8 D bit 6-9
H1, H2 pointer bytes 6-8 H3 pointer action byte 6-9 NDF 6-8
TUG 2-8
U
User channel 5-2
T
Terminal Multiplexer (TMS) 8-4 Transport frame 1-7 Transport terminal functions MCF 7-3 MSA 7-2 MSP 7-2 MST 7-2 RST 7-3 SEMF 7-3 SETPI 7-3 SETS 7-3 SPI 7-3 Transport terminal functions (reference model) 7-2 Tributary Unit (TU) 2-6 Tributary Unit Group (TUG) 2-8 TU pointer 2-6 TU size 6-10 , 6-12, 6-14 TU-11 pointer 6-12 D bit 6-12 I bit 6-12 NDF 6-12 V1, V2 pointer bytes 6-12, 6-14 V3 pointer action byte 6-13 V4 byte 6-13 TU-12 pointer 6-14 D bit 6-14 I bit 6-14
V
V1, V2 byte 6-10, 6-12, 6-14 V3 byte 6-11, 6-13, 6-15 V4 byte 6-11, 6-13, 6-15 V5 5-6 VC-12 4-6 VC-3 4-4 VC-3 POH 4-4 VC-3/VC-4 assembler 5-5 VC-4 4-1 VC-4 POH 4-1 Virtual Container (VC) Formats 2-5 Voice channel 5-3
W
W byte 4-1
X
X byte 4-1
Y
Y byte 4-1
Z
Z byte 4-2 Z1, Z2 byte (MSOH) 5-3
I-4
62.1013.105.11-A001