SlideShare a Scribd company logo
1 of 9
Defect and Failure
1. A defect is a detection of an alarm such as loss of signals, loss
of frames, AIS and Excessive Errors
2. A failure is a defect that persists beyond a maximum time
allocated. It is used to access to integrate Automatic
Protection Switching ( APS ).
57/1
LOS : Loss of Signal
1. This alarm is raised when the STM-N level drops below the
threshold at which a BER of 10-3 or worse is detected
2. It could be due to cut cable, excessive attenuation of the signal or
an equipment fault
3. The LOS state will clear when 2 consecutive framing patterns are
received and no LOS condition is detected
58/1
OOF : Out of frame
1. This situation occurs when 5 consecutive SDH frames are
received with invalid framing patterns(A1 and A2 bytes)
2. The maximum time to detect OOF is therefore 625µSec
3. The OOF clears when consecutive SDH frames are received with
valid framing patterns
59/1
LOF : loss of frame
1. The LOF occurs when the OOF state exists for a 3 mSec.
2. If OOFs are intermittent, the timer is not reset to zero until an “in
frame” state persists continuously for specified time in msecs
3. As the framing bytes are there in Regenerator section overhead
(RSOH), this alarm is sometimes known as RS-LOF
60/1
LOP : loss of Pointer
1. The LOP state occurs when ‘n’ consecutive invalid pointers are
received or ‘n’ New Data Flags (NDF) are received (other than in a
concatenation indicator), where n >8
2. The LOP state is cleared when 3 equal valid pointers or 3
consecutive AIS indications are received.
61/1
Network Protection
Linear Protection (G.783)
W
P
W
P
W
W
P
1 + 1 Protection scheme
1 : 1 Protection scheme
1 : N Protection scheme
62/1
W
P
W
P
W
W
P
1 + 1 Protection scheme
1 : 1 Protection scheme
1 : N Protection scheme
Network Protection
Linear Protection (G.783)
63/1
Protection : RING SYSTEM
Ring System
Unidirectional
Ring / Switch
Bidirectional
Ring / Switch
PPS
LPS
PPS
LPS
2-fiber
2-fiber
2-fiber
4-fiber
2-fiber
Subnetwork Connection Protection Ring (SNCP-ring)
(2F-UPSR)
MS Dedicated Protection Ring
(2F-ULSR) (for further study, G.841)
Subnetwork Connection Protection Ring (SNCP-ring)
(2F-BPSR) (for further study, G.841)
4F MS Shared Protection Ring (MS-SP ring)
(4F-BLSR)
2F MS Shared Protection Ring (MS-SP ring)
(2F-BLSR)
LPS: Line Protection Switch (MS protection)
PPS: Path Protection Switch (VC trail protection)
MS: Multiplex Section
64/1
Unidirectional and Bidirectional Rings
ADM
ADM
ADM
A
ADM B
Traffic A  B
Traffic B  A
Unidirectional Ring
• traffic between A-B
• uses the entire length of ring
B -> A
Bidirectional Ring
A
B
longer
path
ADM
ADM
ADM
ADM
• use the shorter or longer path
• increase number of paths
• short path  traffic
• long path  protection
Traffic A  B
Traffic B  A
65/1

More Related Content

Similar to Sdh alarm presentation

Alarms_grouping_Current_Alarms.pdf
Alarms_grouping_Current_Alarms.pdfAlarms_grouping_Current_Alarms.pdf
Alarms_grouping_Current_Alarms.pdfCristiVoinea1
 
American Fibertek MT-88SL Data Sheet
American Fibertek MT-88SL Data SheetAmerican Fibertek MT-88SL Data Sheet
American Fibertek MT-88SL Data SheetJMAC Supply
 
American Fibertek Rt 88
American Fibertek Rt 88American Fibertek Rt 88
American Fibertek Rt 88JMAC Supply
 
American Fibertek RT-88 Data Sheet
American Fibertek RT-88 Data SheetAmerican Fibertek RT-88 Data Sheet
American Fibertek RT-88 Data SheetJMAC Supply
 
Survivability-2.ppt
Survivability-2.pptSurvivability-2.ppt
Survivability-2.pptGamersDen3
 
Local Backup Protection Algorithm For HVDC Grids
Local Backup Protection Algorithm For HVDC GridsLocal Backup Protection Algorithm For HVDC Grids
Local Backup Protection Algorithm For HVDC Gridsyash Natani
 
STP Protection
STP ProtectionSTP Protection
STP ProtectionNetwax Lab
 
Andel Floodline - Instruction Manual
Andel Floodline - Instruction ManualAndel Floodline - Instruction Manual
Andel Floodline - Instruction ManualThorne & Derrick UK
 
Takex PB-100AT-KH Instruction Manual
Takex PB-100AT-KH Instruction ManualTakex PB-100AT-KH Instruction Manual
Takex PB-100AT-KH Instruction ManualJMAC Supply
 
transmission lineprotection_20100513_web
 transmission lineprotection_20100513_web transmission lineprotection_20100513_web
transmission lineprotection_20100513_webVara Prasad Moturi
 
Synchronization in SDH network
Synchronization in SDH networkSynchronization in SDH network
Synchronization in SDH networkasifmatin
 
Switchgear and protection 3
Switchgear and protection 3Switchgear and protection 3
Switchgear and protection 3Md Irshad Ahmad
 
Ccnp3 lab 3_1_en (hacer)
Ccnp3 lab 3_1_en (hacer)Ccnp3 lab 3_1_en (hacer)
Ccnp3 lab 3_1_en (hacer)Omar Herrera
 
Radio frequency power point presentation
Radio frequency power point presentationRadio frequency power point presentation
Radio frequency power point presentationprabalkalita13
 

Similar to Sdh alarm presentation (20)

Alarms_grouping_Current_Alarms.pdf
Alarms_grouping_Current_Alarms.pdfAlarms_grouping_Current_Alarms.pdf
Alarms_grouping_Current_Alarms.pdf
 
American Fibertek MT-88SL Data Sheet
American Fibertek MT-88SL Data SheetAmerican Fibertek MT-88SL Data Sheet
American Fibertek MT-88SL Data Sheet
 
SLC
SLCSLC
SLC
 
American Fibertek Rt 88
American Fibertek Rt 88American Fibertek Rt 88
American Fibertek Rt 88
 
American Fibertek RT-88 Data Sheet
American Fibertek RT-88 Data SheetAmerican Fibertek RT-88 Data Sheet
American Fibertek RT-88 Data Sheet
 
Survivability-2.ppt
Survivability-2.pptSurvivability-2.ppt
Survivability-2.ppt
 
Sonet
SonetSonet
Sonet
 
3 g by pasha
3 g by pasha3 g by pasha
3 g by pasha
 
Local Backup Protection Algorithm For HVDC Grids
Local Backup Protection Algorithm For HVDC GridsLocal Backup Protection Algorithm For HVDC Grids
Local Backup Protection Algorithm For HVDC Grids
 
STP Protection
STP ProtectionSTP Protection
STP Protection
 
Et601 chapter1 ayu
Et601  chapter1 ayuEt601  chapter1 ayu
Et601 chapter1 ayu
 
Andel Floodline - Instruction Manual
Andel Floodline - Instruction ManualAndel Floodline - Instruction Manual
Andel Floodline - Instruction Manual
 
Takex PB-100AT-KH Instruction Manual
Takex PB-100AT-KH Instruction ManualTakex PB-100AT-KH Instruction Manual
Takex PB-100AT-KH Instruction Manual
 
06-DistanceProtection.ppt
06-DistanceProtection.ppt06-DistanceProtection.ppt
06-DistanceProtection.ppt
 
transmission lineprotection_20100513_web
 transmission lineprotection_20100513_web transmission lineprotection_20100513_web
transmission lineprotection_20100513_web
 
Synchronization in SDH network
Synchronization in SDH networkSynchronization in SDH network
Synchronization in SDH network
 
7SD5 Relay
7SD5 Relay7SD5 Relay
7SD5 Relay
 
Switchgear and protection 3
Switchgear and protection 3Switchgear and protection 3
Switchgear and protection 3
 
Ccnp3 lab 3_1_en (hacer)
Ccnp3 lab 3_1_en (hacer)Ccnp3 lab 3_1_en (hacer)
Ccnp3 lab 3_1_en (hacer)
 
Radio frequency power point presentation
Radio frequency power point presentationRadio frequency power point presentation
Radio frequency power point presentation
 

Recently uploaded

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 

Recently uploaded (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 

Sdh alarm presentation

  • 1. Defect and Failure 1. A defect is a detection of an alarm such as loss of signals, loss of frames, AIS and Excessive Errors 2. A failure is a defect that persists beyond a maximum time allocated. It is used to access to integrate Automatic Protection Switching ( APS ). 57/1
  • 2. LOS : Loss of Signal 1. This alarm is raised when the STM-N level drops below the threshold at which a BER of 10-3 or worse is detected 2. It could be due to cut cable, excessive attenuation of the signal or an equipment fault 3. The LOS state will clear when 2 consecutive framing patterns are received and no LOS condition is detected 58/1
  • 3. OOF : Out of frame 1. This situation occurs when 5 consecutive SDH frames are received with invalid framing patterns(A1 and A2 bytes) 2. The maximum time to detect OOF is therefore 625µSec 3. The OOF clears when consecutive SDH frames are received with valid framing patterns 59/1
  • 4. LOF : loss of frame 1. The LOF occurs when the OOF state exists for a 3 mSec. 2. If OOFs are intermittent, the timer is not reset to zero until an “in frame” state persists continuously for specified time in msecs 3. As the framing bytes are there in Regenerator section overhead (RSOH), this alarm is sometimes known as RS-LOF 60/1
  • 5. LOP : loss of Pointer 1. The LOP state occurs when ‘n’ consecutive invalid pointers are received or ‘n’ New Data Flags (NDF) are received (other than in a concatenation indicator), where n >8 2. The LOP state is cleared when 3 equal valid pointers or 3 consecutive AIS indications are received. 61/1
  • 6. Network Protection Linear Protection (G.783) W P W P W W P 1 + 1 Protection scheme 1 : 1 Protection scheme 1 : N Protection scheme 62/1
  • 7. W P W P W W P 1 + 1 Protection scheme 1 : 1 Protection scheme 1 : N Protection scheme Network Protection Linear Protection (G.783) 63/1
  • 8. Protection : RING SYSTEM Ring System Unidirectional Ring / Switch Bidirectional Ring / Switch PPS LPS PPS LPS 2-fiber 2-fiber 2-fiber 4-fiber 2-fiber Subnetwork Connection Protection Ring (SNCP-ring) (2F-UPSR) MS Dedicated Protection Ring (2F-ULSR) (for further study, G.841) Subnetwork Connection Protection Ring (SNCP-ring) (2F-BPSR) (for further study, G.841) 4F MS Shared Protection Ring (MS-SP ring) (4F-BLSR) 2F MS Shared Protection Ring (MS-SP ring) (2F-BLSR) LPS: Line Protection Switch (MS protection) PPS: Path Protection Switch (VC trail protection) MS: Multiplex Section 64/1
  • 9. Unidirectional and Bidirectional Rings ADM ADM ADM A ADM B Traffic A  B Traffic B  A Unidirectional Ring • traffic between A-B • uses the entire length of ring B -> A Bidirectional Ring A B longer path ADM ADM ADM ADM • use the shorter or longer path • increase number of paths • short path  traffic • long path  protection Traffic A  B Traffic B  A 65/1

Editor's Notes

  1. Ring systems are classified into five types based on employed switching method combination (unidirectional or bidirectional switch and path or line switch), (and fiber number (2 or 4 fibers). Theoretically any combination between switching and routing direction is possible. But in the ring system, above uni-uni and bi-bi combination is used. SNCP-ring (Unidirectional) 3.1 Also called 2-fiber Unidirectional Path Protection Switch Ring (2F-UPSR) 3.2 No switching protocol is required. This is a simple and fast switching scheme. MS Dedicated Protection Ring 4.1 2-fiber Unidirectional Line protection Switch Ring (2F-ULSR) 4.2 Protocol by K1 and K2 in MSOH is required and it is not standardized yet by ITU-T. SNCP-ring (Bidirectional) 5.1 2-fiber Bidirectional Path protection Switch Ring (2F-BPSR) 5.2 Ring must be controlled at a path level and protocol by K3 or K4 in POH is required. It is not standardized yet by ITU-T. 4F MS-SP ring 6.1 4-fiber Bidirectional Line protection Switch Ring (4F-BLSR) 6.2 Protocol by K1 and K2 in MSOH is required. 2F MS-SP ring 7.1 2-fiber Bidirectional Line protection Switch Ring (2F-BLSR) 7.2 Protocol by K1 and K2 in MSOH is required. There are two different algorithm in 4/2F MS-SP ring, the terrestrial application and the transoceanic application.