Digital communication uses digital signals that have discrete states (on/off) instead of continuous amplitudes like analog signals. This allows for higher quality transmission with less noise and distortion. SDH (Synchronous Digital Hierarchy) was developed to address limitations of earlier PDH (Plesiochronous Digital Hierarchy) transmission, which used almost synchronous clocks. SDH uses a master-slave clock technique and overhead bytes to provide synchronization across nodes, manage payloads, and enable features like automatic protection switching and performance monitoring. The basic SDH frame is STM-1, which has 9 rows and 270 columns for a total of 2430 bytes transmitted every 125 microseconds at 155 Mbps. Higher STM frames are formed by multiplying the
The document discusses the differences between SDH and PDH, as well as key aspects of SDH. SDH provides higher transmission rates up to 40 Gbit/s, simplified add and drop functions, high availability and capacity matching, reliability, and is a future-proof platform for new services compared to PDH. SDH uses synchronous multiplexing where data from multiple sources is byte interleaved at fixed locations in the frame. This allows single channels to be dropped from the data stream without demultiplexing intermediate rates as required in PDH.
This document provides an overview of Synchronous Digital Hierarchy (SDH) including its introduction, components, frame structure, and applications. SDH was developed to provide a standardized digital transmission network with vendor independence. It uses optical fiber to enable end-to-end monitoring and self-healing ring architectures for survivability. The SDH frame structure consists of sections for transport overhead (TOH), path overhead (POH), and payloads. SDH supports multiplexing of various signals like E1, DS1, and STM streams. It allows dynamic bandwidth allocation and is a platform for future services.
The document discusses Synchronous Digital Hierarchy (SDH) and its advantages over Plesiochronous Digital Hierarchy (PDH). It describes some key components of SDH including section overhead bytes, path overhead bytes, virtual containers, tributary units, and administrative units. It also provides definitions and functions of various overhead bytes used for frame alignment, error monitoring, data communication, and other purposes in SDH networks.
This document provides an overview of Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH) networks. It discusses the limitations of PDH networks and how SDH was developed to address these. The key aspects of SDH covered include the frame structure, overhead analysis, multiplexing structure, tributary units, and network protection mechanisms such as linear and ring-based protection.
This document provides an overview of Dense Wavelength Division Multiplexing (DWDM) technology. It discusses the concepts of fiber optics, wavelength division multiplexing, bandwidth demand over time, and options for increasing bandwidth capacity such as TDM and WDM. It also describes DWDM components like transponders, multiplexers/demultiplexers, optical add/drop multiplexers, and erbium-doped fiber amplifiers. Finally, it discusses the evolution of DWDM technology and its benefits for optical networking.
The document discusses key concepts in digital telecommunication networks including Pulse Code Modulation (PCM), Plesiochronous Digital Hierarchy (PDH), Synchronous Digital Hierarchy (SDH), and their frame structures and bit rates. It describes how lower bit rate signals such as E1 (2Mbps) are mapped into higher bit rate structures like STM-1 (155.52Mbps) through multiplexing techniques involving containers, virtual containers, tributary units, and administrative units. The document also outlines the section overhead bytes used in SDH for functions like frame alignment, error monitoring, and automatic protection switching.
The document discusses Synchronous Digital Hierarchy (SDH) and its advantages over earlier transmission systems. It describes the evolution from analog to digital transmission and the standards of Plesiochronous Digital Hierarchy (PDH) and SDH. The key aspects of SDH covered are its frame structure, equipments used, network topologies supported, and advantages such as availability of high speed standards and efficient multiplexing.
E1 LINK IS EUROPEAN FORMAT ,Europe Line Rate
,E1 LINK, E1 VS T1 LINK, E1 SPECIFICATION, E1 ENCODING tECHNIQUES, high density bipolar , alternate marking inversion,itut,t1,e1 frame format
The document discusses the differences between SDH and PDH, as well as key aspects of SDH. SDH provides higher transmission rates up to 40 Gbit/s, simplified add and drop functions, high availability and capacity matching, reliability, and is a future-proof platform for new services compared to PDH. SDH uses synchronous multiplexing where data from multiple sources is byte interleaved at fixed locations in the frame. This allows single channels to be dropped from the data stream without demultiplexing intermediate rates as required in PDH.
This document provides an overview of Synchronous Digital Hierarchy (SDH) including its introduction, components, frame structure, and applications. SDH was developed to provide a standardized digital transmission network with vendor independence. It uses optical fiber to enable end-to-end monitoring and self-healing ring architectures for survivability. The SDH frame structure consists of sections for transport overhead (TOH), path overhead (POH), and payloads. SDH supports multiplexing of various signals like E1, DS1, and STM streams. It allows dynamic bandwidth allocation and is a platform for future services.
The document discusses Synchronous Digital Hierarchy (SDH) and its advantages over Plesiochronous Digital Hierarchy (PDH). It describes some key components of SDH including section overhead bytes, path overhead bytes, virtual containers, tributary units, and administrative units. It also provides definitions and functions of various overhead bytes used for frame alignment, error monitoring, data communication, and other purposes in SDH networks.
This document provides an overview of Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH) networks. It discusses the limitations of PDH networks and how SDH was developed to address these. The key aspects of SDH covered include the frame structure, overhead analysis, multiplexing structure, tributary units, and network protection mechanisms such as linear and ring-based protection.
This document provides an overview of Dense Wavelength Division Multiplexing (DWDM) technology. It discusses the concepts of fiber optics, wavelength division multiplexing, bandwidth demand over time, and options for increasing bandwidth capacity such as TDM and WDM. It also describes DWDM components like transponders, multiplexers/demultiplexers, optical add/drop multiplexers, and erbium-doped fiber amplifiers. Finally, it discusses the evolution of DWDM technology and its benefits for optical networking.
The document discusses key concepts in digital telecommunication networks including Pulse Code Modulation (PCM), Plesiochronous Digital Hierarchy (PDH), Synchronous Digital Hierarchy (SDH), and their frame structures and bit rates. It describes how lower bit rate signals such as E1 (2Mbps) are mapped into higher bit rate structures like STM-1 (155.52Mbps) through multiplexing techniques involving containers, virtual containers, tributary units, and administrative units. The document also outlines the section overhead bytes used in SDH for functions like frame alignment, error monitoring, and automatic protection switching.
The document discusses Synchronous Digital Hierarchy (SDH) and its advantages over earlier transmission systems. It describes the evolution from analog to digital transmission and the standards of Plesiochronous Digital Hierarchy (PDH) and SDH. The key aspects of SDH covered are its frame structure, equipments used, network topologies supported, and advantages such as availability of high speed standards and efficient multiplexing.
E1 LINK IS EUROPEAN FORMAT ,Europe Line Rate
,E1 LINK, E1 VS T1 LINK, E1 SPECIFICATION, E1 ENCODING tECHNIQUES, high density bipolar , alternate marking inversion,itut,t1,e1 frame format
The document discusses the frame structure of Synchronous Digital Hierarchy (SDH). It explains that an SDH frame is transmitted every 125 microseconds and contains 9 rows and 270 columns of bytes for a total of 19,440 bits. This equates to a basic data rate of 155.52 megabits per second. The frame contains sections for regenerator and multiplexer section overhead as well as a payload area. Lower level signals can be mapped and multiplexed into the payload area through a process that includes mapping, aligning, pointer processing and multiplexing.
PDH and SDH are digital multiplexing techniques. PDH uses asynchronous multiplexing and operates over asynchronous networks, applying positive justification. It allows tributary clocks to differ slightly. SDH uses synchronous multiplexing and operates over synchronous networks, applying zero justification. Tributary clocks must be synchronized to a master clock. SDH was developed to simplify interconnection between network operators and expand compatibility by establishing a international standard to replace the different PDH standards.
This document discusses Time Division Multiplexing (TDM) and Synchronous Digital Hierarchy (SDH) basics. It provides information on how TDM converts analog signals to digital signals and multiplexes them. It then explains how SDH was developed to overcome limitations of Plesiochronous Digital Hierarchy (PDH) by employing synchronous transmission and simpler add/drop functionality. The document outlines the frame structure and overhead bytes of STM-1, and defines the common network elements in SDH including Terminal Multiplexer, Add/Drop Multiplexer, Cross-connect, and Regenerator.
This document discusses the basics of PDH (Plesiosynchronous Digital Hierarchy) and SDH (Synchronous Digital Hierarchy). It describes how E1 signals are formed by multiplexing 32 channels of 64 Kbps each. It then explains how higher order E1 signals like E2, E3, E4 are formed by multiplexing E1 signals. The document discusses some disadvantages of PDH. It also provides details of the journey from E1 to STM-1 in SDH, including the various intermediate stages of TUG2, C12, TUG3, VC12, TU12 and VC4. Finally, it highlights some key features of SDH like full synchrony and its ability to carry
The document provides an overview of Next Generation Synchronous Digital Hierarchy (NG-SDH) which brings together SONET/SDH and Ethernet networks. It discusses how virtual concatenation allows efficient transport of Ethernet and other services over SDH networks by virtually concatenating payloads across multiple containers. Sequence indicators and frame counters are used to distinguish and maintain timing between virtually concatenated members. This overcomes issues with inefficient contiguous concatenation and fixed payload sizes in traditional SDH.
OFDM (Orthogonal Frequency Division Multiplexing) is a digital modulation technique that divides the available spectrum into multiple orthogonal subcarriers. It has become popular for digital communication systems due to its ability to mitigate multi-path interference through the use of a guard interval between symbols. OFDM allows for high bandwidth efficiency by overlapping subcarriers and its implementation has been enabled by advances in DFT and LSI technology.
The document discusses wavelength division multiplexing (WDM) transmission basics. It describes:
1) Options for increasing bandwidth including SDM, TDM, and WDM.
2) Varieties of WDM including conventional WDM with 2 wavelengths, DWDM with 100GHz spacing in the C-band, and CWDM with 3000GHz spacing.
3) The components of a DWDM network including transmitters, multiplexers, amplifiers, optical fiber, and receivers.
This document provides an overview of wavelength division multiplexing (WDM) technology. It begins with introducing optical fibers and their components. It then discusses multiplexing techniques like time-division multiplexing (TDM) and frequency-division multiplexing (FDM). The document focuses on WDM, defining it as a technology that multiplexes multiple optical signals on a single fiber using different laser light wavelengths. It describes dense WDM (DWDM) and coarse WDM (CWDM), and compares their wavelength spacing and applications. The document also outlines optical amplifiers like erbium-doped fiber amplifiers and their uses. In conclusion, it states that WDM enables high-speed, high-capacity data transmission and
Public Switched Telephone Network (PSTN)J.T.A.JONES
The document discusses various aspects of the Public Switched Telephone Network (PSTN). It covers topics like modulation/demodulation schemes used to convert between analog and digital signals, the bandwidth of telephone lines, traditional modem standards like V.32, V.90, ADSL, techniques used for multiplexing like TDM and WDM, and components within switching offices. It provides technical details on how analog voice signals are converted to digital, transmitted through digital trunks, and switched within the network.
SDH (Synchronous Digital Hierarchy) & Its Architectureijsrd.com
The SDH (Synchronous Digital Hierarchy) tell us about transferring large amount of data over an same optical fiber and this document gives us the information about the structure and architecture of SDH.
The document discusses SDH (Synchronous Digital Hierarchy) fundamentals. It provides an overview of SDH including:
- SDH was developed as a standard by ITU to replace PDH and allow interoperability between equipment from different vendors.
- SDH defines a hierarchical structure for transporting payloads over fiber optic networks at standardized rates like STM-1, STM-4, etc.
- The SDH frame structure includes sections for transport overhead (TOH), path overhead (POH), and payload. Pointers are used to locate lower rate signals within higher rate frames.
- PDH signals are mapped into SDH by using containers, virtual containers, tributary units, and
This document provides an overview of satellite communication and satellite systems. It discusses different types of transmission systems including radio, coaxial cable, and optical fiber systems. It describes how radio systems use electromagnetic waves to transmit signals and the portions of the frequency spectrum used. The document outlines the layers of the atmosphere and how the ionosphere and troposphere can propagate radio waves. It also categorizes different types of radio communication including ionosphere communication, line of sight microwave communication, and troposphere scatter communication. The document discusses advantages of satellite communication and components of a satellite communication network including the space and ground segments. It covers topics like satellite orbits, frequency bands used, and multiple access techniques in satellite systems.
The document discusses the installation and configuration of an STM-16 synchronous digital hierarchy (SDH) transmission link between Ramna and SBN sites. Key steps included installing single-mode fiber, optical multiplexer equipment, electrical interfaces and cross-connects. Testing validated the optical power levels, fiber continuity and service commissioning over the 2.5 Gbps link. Minor issues were addressed during installation and the STM-16 SDH connection was completed successfully.
The document discusses Synchronous Digital Hierarchy (SDH) and provides details on:
1. SDH frame structure including section overhead, path overhead, pointer, and information payload areas.
2. SDH multiplexing methods allowing lower rate signals like E1, E3, E4 to be mapped and multiplexed into higher rate SDH frames like STM-1, STM-4.
3. Overhead bytes including framing bytes A1/A2, data communications channel bytes D1-D12, orderwire bytes E1/E2, parity check bytes B1/B2, and remote error indication byte M1.
SONET is a standard for optical telecommunication transport that uses optical fiber to send data. It was developed independently in the US as SONET and in Europe as SDH. The SONET standard includes four functional layers - path, line, section, and photonic. It uses a SONET frame that is a 2-dimensional matrix of bytes transmitted at a fixed rate. SONET networks can be created using SONET equipment to form linear, ring or mesh topologies with advantages like protection, high bandwidth, and efficient bandwidth management.
SONET/SDH are digital fiber optic transmission standards developed independently in the US and Europe to transmit data at high speeds over fiber optic cables. SONET defines a hierarchy of electrical signaling levels called STS and uses synchronous TDM multiplexing. It can transmit data from 155 Mbps to 2.5 Gbps and supports ring topologies. SONET defines layers for signal transmission including path, line, section and physical layers. SDH is the international version of SONET and uses similar framing and network elements like multiplexers, regenerators and cross-connects to transmit digital signals over fiber optic networks. DWDM further increases fiber capacity by transmitting multiple wavelengths/channels over the same fiber using wavelength division
3G UMTS is a 3rd generation mobile network standard that aims to provide improved voice quality, higher data speeds, and more capacity compared to previous 2G standards. It utilizes W-CDMA technology along with a packet-switched core network to support data rates up to 2Mbps. Key aspects of 3G UMTS include soft handovers between base stations, advanced cellular planning to optimize coverage and capacity, and global roaming capabilities. While offering benefits over 2G, 3G also presented challenges such as high infrastructure costs and lack of adoption from some existing mobile users.
Frequency shift keying (FSK) is a digital modulation technique that encodes digital information by shifting the frequency of a carrier wave. There are different types of FSK including binary FSK, which uses two discrete frequencies to represent binary 1 and 0, and double frequency shift keying (DFSK), which uses four frequencies to transmit two independent data streams simultaneously. FSK modulation can be demodulated using either FM detector demodulators, which treat the FSK signal as an FM signal, or filter-type demodulators, which use optimal filters matched to the FSK signal parameters. The filters are used to detect the mark and space frequencies, and a decision circuit then determines which was transmitted.
This document discusses optical time division multiplexing (OTDM) systems. It outlines some of the key challenges with OTDM, including nonlinearity in fibers causing signal-to-noise ratio degradation as the number of channels increases. It also discusses the components needed for an OTDM system, including ultra-short optical pulse generation and modulation at the transmitter, and optical clock extraction and demultiplexing at the receiver. Several approaches for OTDM demultiplexing are described, such as using cascaded modulators, nonlinear optical loop mirrors, or four wave mixing in a nonlinear medium.
This document discusses dense wavelength division multiplexing (DWDM) technology. It begins with an overview of DWDM, describing how it multiplexes multiple optical carrier signals onto a single optical fiber using different laser light wavelengths. It then provides details on DWDM network architecture, including optical transponders, multiplexers/demultiplexers, optical add-drop multiplexers, optical fiber amplifiers, and the optical supervisory channel. The document also discusses optical frequency bands defined by the ITU and advantages and limitations of DWDM networks.
SDH (Synchronous Digital Hierarchy) is a standard technology for synchronous data transmission that provides faster and less expensive network interconnection than traditional PDH (Plesiochronous Digital Hierarchy) equipment. PDH uses asynchronous multiplexing which means low rate signals cannot be directly added or dropped from high rate signals, requiring multi-stage addition and dropping. PDH also lacked universal standards for electrical and optical interfaces and had limited overhead bytes for network management functions. SDH was developed to address these disadvantages of PDH through synchronous multiplexing and a standardized frame structure and network management system.
The document is a course outline for a Digital Networks course at Dar es Salaam Institute of Technology (DIT). The outline covers the following topics: SDH Network, IP Networks, MPLS Fundamentals, IMS, GSM Network, UMTS/HSPA Networks, LTE Network, and WLAN Network.
The document discusses the frame structure of Synchronous Digital Hierarchy (SDH). It explains that an SDH frame is transmitted every 125 microseconds and contains 9 rows and 270 columns of bytes for a total of 19,440 bits. This equates to a basic data rate of 155.52 megabits per second. The frame contains sections for regenerator and multiplexer section overhead as well as a payload area. Lower level signals can be mapped and multiplexed into the payload area through a process that includes mapping, aligning, pointer processing and multiplexing.
PDH and SDH are digital multiplexing techniques. PDH uses asynchronous multiplexing and operates over asynchronous networks, applying positive justification. It allows tributary clocks to differ slightly. SDH uses synchronous multiplexing and operates over synchronous networks, applying zero justification. Tributary clocks must be synchronized to a master clock. SDH was developed to simplify interconnection between network operators and expand compatibility by establishing a international standard to replace the different PDH standards.
This document discusses Time Division Multiplexing (TDM) and Synchronous Digital Hierarchy (SDH) basics. It provides information on how TDM converts analog signals to digital signals and multiplexes them. It then explains how SDH was developed to overcome limitations of Plesiochronous Digital Hierarchy (PDH) by employing synchronous transmission and simpler add/drop functionality. The document outlines the frame structure and overhead bytes of STM-1, and defines the common network elements in SDH including Terminal Multiplexer, Add/Drop Multiplexer, Cross-connect, and Regenerator.
This document discusses the basics of PDH (Plesiosynchronous Digital Hierarchy) and SDH (Synchronous Digital Hierarchy). It describes how E1 signals are formed by multiplexing 32 channels of 64 Kbps each. It then explains how higher order E1 signals like E2, E3, E4 are formed by multiplexing E1 signals. The document discusses some disadvantages of PDH. It also provides details of the journey from E1 to STM-1 in SDH, including the various intermediate stages of TUG2, C12, TUG3, VC12, TU12 and VC4. Finally, it highlights some key features of SDH like full synchrony and its ability to carry
The document provides an overview of Next Generation Synchronous Digital Hierarchy (NG-SDH) which brings together SONET/SDH and Ethernet networks. It discusses how virtual concatenation allows efficient transport of Ethernet and other services over SDH networks by virtually concatenating payloads across multiple containers. Sequence indicators and frame counters are used to distinguish and maintain timing between virtually concatenated members. This overcomes issues with inefficient contiguous concatenation and fixed payload sizes in traditional SDH.
OFDM (Orthogonal Frequency Division Multiplexing) is a digital modulation technique that divides the available spectrum into multiple orthogonal subcarriers. It has become popular for digital communication systems due to its ability to mitigate multi-path interference through the use of a guard interval between symbols. OFDM allows for high bandwidth efficiency by overlapping subcarriers and its implementation has been enabled by advances in DFT and LSI technology.
The document discusses wavelength division multiplexing (WDM) transmission basics. It describes:
1) Options for increasing bandwidth including SDM, TDM, and WDM.
2) Varieties of WDM including conventional WDM with 2 wavelengths, DWDM with 100GHz spacing in the C-band, and CWDM with 3000GHz spacing.
3) The components of a DWDM network including transmitters, multiplexers, amplifiers, optical fiber, and receivers.
This document provides an overview of wavelength division multiplexing (WDM) technology. It begins with introducing optical fibers and their components. It then discusses multiplexing techniques like time-division multiplexing (TDM) and frequency-division multiplexing (FDM). The document focuses on WDM, defining it as a technology that multiplexes multiple optical signals on a single fiber using different laser light wavelengths. It describes dense WDM (DWDM) and coarse WDM (CWDM), and compares their wavelength spacing and applications. The document also outlines optical amplifiers like erbium-doped fiber amplifiers and their uses. In conclusion, it states that WDM enables high-speed, high-capacity data transmission and
Public Switched Telephone Network (PSTN)J.T.A.JONES
The document discusses various aspects of the Public Switched Telephone Network (PSTN). It covers topics like modulation/demodulation schemes used to convert between analog and digital signals, the bandwidth of telephone lines, traditional modem standards like V.32, V.90, ADSL, techniques used for multiplexing like TDM and WDM, and components within switching offices. It provides technical details on how analog voice signals are converted to digital, transmitted through digital trunks, and switched within the network.
SDH (Synchronous Digital Hierarchy) & Its Architectureijsrd.com
The SDH (Synchronous Digital Hierarchy) tell us about transferring large amount of data over an same optical fiber and this document gives us the information about the structure and architecture of SDH.
The document discusses SDH (Synchronous Digital Hierarchy) fundamentals. It provides an overview of SDH including:
- SDH was developed as a standard by ITU to replace PDH and allow interoperability between equipment from different vendors.
- SDH defines a hierarchical structure for transporting payloads over fiber optic networks at standardized rates like STM-1, STM-4, etc.
- The SDH frame structure includes sections for transport overhead (TOH), path overhead (POH), and payload. Pointers are used to locate lower rate signals within higher rate frames.
- PDH signals are mapped into SDH by using containers, virtual containers, tributary units, and
This document provides an overview of satellite communication and satellite systems. It discusses different types of transmission systems including radio, coaxial cable, and optical fiber systems. It describes how radio systems use electromagnetic waves to transmit signals and the portions of the frequency spectrum used. The document outlines the layers of the atmosphere and how the ionosphere and troposphere can propagate radio waves. It also categorizes different types of radio communication including ionosphere communication, line of sight microwave communication, and troposphere scatter communication. The document discusses advantages of satellite communication and components of a satellite communication network including the space and ground segments. It covers topics like satellite orbits, frequency bands used, and multiple access techniques in satellite systems.
The document discusses the installation and configuration of an STM-16 synchronous digital hierarchy (SDH) transmission link between Ramna and SBN sites. Key steps included installing single-mode fiber, optical multiplexer equipment, electrical interfaces and cross-connects. Testing validated the optical power levels, fiber continuity and service commissioning over the 2.5 Gbps link. Minor issues were addressed during installation and the STM-16 SDH connection was completed successfully.
The document discusses Synchronous Digital Hierarchy (SDH) and provides details on:
1. SDH frame structure including section overhead, path overhead, pointer, and information payload areas.
2. SDH multiplexing methods allowing lower rate signals like E1, E3, E4 to be mapped and multiplexed into higher rate SDH frames like STM-1, STM-4.
3. Overhead bytes including framing bytes A1/A2, data communications channel bytes D1-D12, orderwire bytes E1/E2, parity check bytes B1/B2, and remote error indication byte M1.
SONET is a standard for optical telecommunication transport that uses optical fiber to send data. It was developed independently in the US as SONET and in Europe as SDH. The SONET standard includes four functional layers - path, line, section, and photonic. It uses a SONET frame that is a 2-dimensional matrix of bytes transmitted at a fixed rate. SONET networks can be created using SONET equipment to form linear, ring or mesh topologies with advantages like protection, high bandwidth, and efficient bandwidth management.
SONET/SDH are digital fiber optic transmission standards developed independently in the US and Europe to transmit data at high speeds over fiber optic cables. SONET defines a hierarchy of electrical signaling levels called STS and uses synchronous TDM multiplexing. It can transmit data from 155 Mbps to 2.5 Gbps and supports ring topologies. SONET defines layers for signal transmission including path, line, section and physical layers. SDH is the international version of SONET and uses similar framing and network elements like multiplexers, regenerators and cross-connects to transmit digital signals over fiber optic networks. DWDM further increases fiber capacity by transmitting multiple wavelengths/channels over the same fiber using wavelength division
3G UMTS is a 3rd generation mobile network standard that aims to provide improved voice quality, higher data speeds, and more capacity compared to previous 2G standards. It utilizes W-CDMA technology along with a packet-switched core network to support data rates up to 2Mbps. Key aspects of 3G UMTS include soft handovers between base stations, advanced cellular planning to optimize coverage and capacity, and global roaming capabilities. While offering benefits over 2G, 3G also presented challenges such as high infrastructure costs and lack of adoption from some existing mobile users.
Frequency shift keying (FSK) is a digital modulation technique that encodes digital information by shifting the frequency of a carrier wave. There are different types of FSK including binary FSK, which uses two discrete frequencies to represent binary 1 and 0, and double frequency shift keying (DFSK), which uses four frequencies to transmit two independent data streams simultaneously. FSK modulation can be demodulated using either FM detector demodulators, which treat the FSK signal as an FM signal, or filter-type demodulators, which use optimal filters matched to the FSK signal parameters. The filters are used to detect the mark and space frequencies, and a decision circuit then determines which was transmitted.
This document discusses optical time division multiplexing (OTDM) systems. It outlines some of the key challenges with OTDM, including nonlinearity in fibers causing signal-to-noise ratio degradation as the number of channels increases. It also discusses the components needed for an OTDM system, including ultra-short optical pulse generation and modulation at the transmitter, and optical clock extraction and demultiplexing at the receiver. Several approaches for OTDM demultiplexing are described, such as using cascaded modulators, nonlinear optical loop mirrors, or four wave mixing in a nonlinear medium.
This document discusses dense wavelength division multiplexing (DWDM) technology. It begins with an overview of DWDM, describing how it multiplexes multiple optical carrier signals onto a single optical fiber using different laser light wavelengths. It then provides details on DWDM network architecture, including optical transponders, multiplexers/demultiplexers, optical add-drop multiplexers, optical fiber amplifiers, and the optical supervisory channel. The document also discusses optical frequency bands defined by the ITU and advantages and limitations of DWDM networks.
SDH (Synchronous Digital Hierarchy) is a standard technology for synchronous data transmission that provides faster and less expensive network interconnection than traditional PDH (Plesiochronous Digital Hierarchy) equipment. PDH uses asynchronous multiplexing which means low rate signals cannot be directly added or dropped from high rate signals, requiring multi-stage addition and dropping. PDH also lacked universal standards for electrical and optical interfaces and had limited overhead bytes for network management functions. SDH was developed to address these disadvantages of PDH through synchronous multiplexing and a standardized frame structure and network management system.
The document is a course outline for a Digital Networks course at Dar es Salaam Institute of Technology (DIT). The outline covers the following topics: SDH Network, IP Networks, MPLS Fundamentals, IMS, GSM Network, UMTS/HSPA Networks, LTE Network, and WLAN Network.
Project Report on Optical Fiber Cables and Systems (MTNL Mumbai)Pradeep Singh
This document provides a summary of a project report on optical fiber cables and systems used by MTNL Mumbai. It discusses the basic optical fiber transmission system including digital distribution frames, multiplexers, optical line terminating units, and repeaters. It also covers topics like Pulse Code Modulation (PCM), digital transmission hierarchies including Synchronous Digital Hierarchy (SDH), data circuits, Dense Wavelength Division Multiplexing (DWDM), and the construction, maintenance and fault detection of optical fiber cables. Network elements of SDH like terminal multiplexers, add/drop multiplexers, and digital cross-connects are also described.
Pmit lecture 03_wlan_wireless_network_2016Chyon Ju
The document discusses requirements and specifications for wireless local area networks (WLANs). It notes that the IEEE 802 committee develops standards for wired and wireless networking, including 802.11 for WLANs. The document then describes several 802.11 specifications such as 802.11, 802.11a, 802.11b, and 802.11g that define transmission speeds and frequencies for WLANs. It also discusses modulation techniques like BPSK and QPSK used in wireless communications.
chapter four circuit switching communicationGeletaAman
chapter four circuit switching network End-to-end dedicated circuits between clients
Client can be a person or equipment (router or switch)
Circuit can take different forms
Dedicated path for the transfer of electrical current
Dedicated time slots for transfer of voice samples
Dedicated frames for transfer of Nx51.84 Mbps signals
Dedicated wavelengths for transfer of optical signals
Circuit switching networks require:
Multiplexing & switching of circuits
Signaling & control for establishing circuits
These are the subjects covered in this chapter
Optical fiber link carries several wavelengths
From few (4-8) to many (64-160) wavelengths per fiber
Imagine prism combining different colors into single beam
Each wavelength carries a high-speed stream
Each wavelength can carry different format signal
e.g., 1 Gbps, 2.5 Gbps, or 10 Gbps
Synchronous Optical NETwork
North American TDM physical layer standard for optical fiber communications
8000 frames/sec. (Tframe = 125 sec)
compatible with North American digital hierarchy
SDH (Synchronous Digital Hierarchy) elsewhere
Needs to carry E1 and E3 signals
Compatible with SONET at higher speeds
Greatly simplifies multiplexing in network backbone
OA&M support to facilitate network management
Protection & restoration
Defines electrical & optical signal interfaces
Electrical
Multiplexing, Regeneration performed in electrical domain
STS – Synchronous Transport Signals defined
Very short range (e.g., within a switch)
Optical
Transmission carried out in optical domain
Optical transmitter & receiver
OC – Optical Carrier
chapter four circuit switching network End-to-end dedicated circuits between clients
Client can be a person or equipment (router or switch)
Circuit can take different forms
Dedicated path for the transfer of electrical current
Dedicated time slots for transfer of voice samples
Dedicated frames for transfer of Nx51.84 Mbps signals
Dedicated wavelengths for transfer of optical signals
Circuit switching networks require:
Multiplexing & switching of circuits
Signaling & control for establishing circuits
These are the subjects covered in this chapter
Optical fiber link carries several wavelengths
From few (4-8) to many (64-160) wavelengths per fiber
Imagine prism combining different colors into single beam
Each wavelength carries a high-speed stream
Each wavelength can carry different format signal
e.g., 1 Gbps, 2.5 Gbps, or 10 Gbps
Synchronous Optical NETwork
North American TDM physical layer standard for optical fiber communications
8000 frames/sec. (Tframe = 125 sec)
compatible with North American digital hierarchy
SDH (Synchronous Digital Hierarchy) elsewhere
Needs to carry E1 and E3 signals
Compatible with SONET at higher speeds
Greatly simplifies multiplexing in network backbone
OA&M support to facilitate network management
Protection & restoration
Defines electrical & optical signal interfaces
Electrical
Multiplexing, Regeneration performed in electrical domain
STS – Synchronous Transport Sign
This document summarizes information about Bharat Sanchar Nigam Limited (BSNL), the seventh largest telecommunications company in the world. It provides an overview of BSNL's services and sections within telephone exchanges, including the main distribution frame room, power room, PCM room, switch room, optical fiber cable section, broadband section, and mobile section. It also describes technologies used like DWDM, signaling, PDH and SDH multiplexing hierarchies, and defines key terms like STM.
A complete power point presentation to know how Public Switching Telephone Network works. Useful for those in the working field or for the ones who want to know more or submitting any project report..
This presentation include the basic concept of communication, modulation techniques in analog and digital. ADC (Analog to Digital Conversion) and Demodulation schemes
This document discusses digital T-carriers and multiplexing. It describes various multiplexing techniques including time division multiplexing, frequency division multiplexing, and wavelength division multiplexing. It also discusses T1 digital carriers which carry 24 channels of digital data at 1.544 Mbps using time division multiplexing. Channel banks are used to convert analog signals to digital signals to be carried on T-carrier lines. Fractional T-carriers allow customers to purchase less than the full 24 channels of a T1. The document also covers digital signal hierarchy and uses of digital terminals for voice, data, pictures and video.
The document provides an overview of the ISO OSI model and its 7 layers, describing the functions of each layer. It then discusses several topics related to computer networks, including the ISO/OSI model (layers and functions), ISDN (architecture and usage), LAN protocols (such as Ethernet), framing in the data link layer and its importance, and the IEEE 802.11 wireless networking standard.
The document discusses the Public Switched Telephone Network (PSTN) architecture and components. It describes how PSTN uses digital trunks between central office switches and analog lines from phones to the central office. It also discusses digitization of voice signals, the major components of PSTN including local loops, trunks, and switching offices.
This document discusses bandwidth utilization and multiplexing techniques. It begins by explaining that bandwidth is a precious commodity in communication and that bandwidth utilization aims to make wise use of available bandwidth. It then discusses various multiplexing techniques including frequency-division multiplexing (FDM), time-division multiplexing (TDM), and wavelength-division multiplexing (WDM). For each technique, it provides examples and applications. It also covers digital carrier systems like T1, T2, T3 and discusses the North American digital multiplexing hierarchy.
This document discusses different types of network structures, including broadcast channels and point-to-point channels. It also covers ISDN (Integrated Services Digital Network), describing its architecture, usage, and services like bearer services and teleservices. The concept of framing in the data link layer is explained, including its importance for error detection and variable vs. fixed size framing. Finally, the document differentiates between noisy and noiseless channels, describing various types of noise and error control protocols.
The document provides information about line transmission and summarizes key details about the European E1 digital transmission format, the VMX0100 versatile multiplexer, and synchronous digital hierarchy (SDH). It describes that the E1 format reserves two channels for signaling and control, with time slot 0 for transmission management and time slot 16 for signaling. It then provides an introduction to the VMX0100 multiplexer, describing its features such as E1 and fractional E1 interfaces, voice ports, and data interfaces. The document discusses transmission mediums, cards, user interfaces, and applications of the VMX0100. It concludes with an introduction to SDH, describing its frame structure and advantages over the plesiochronous digital hierarchy such as support
This document provides an overview of PDH (Plesiochronous Digital Hierarchy) networks and SONET/SDH (Synchronous Optical Networking/Synchronous Digital Hierarchy) technologies. It discusses the evolution of PDH networks and their implementation, as well as the evolution of SONET/SDH. The basic units of transmission for SONET/SDH are described, including framing, interleaving, and their data rates. Differences between PDH and SONET/SDH are also outlined.
The document provides an overview of telecommunication networks and their components. It discusses:
1) The major components of telecommunication networks including transmission facilities, local loops, interoffice facilities, switching systems, and customer premise equipment.
2) How transmission facilities such as local loops and trunks connect different parts of the network and carry traffic.
3) Analog and digital transmission methods, including frequency division multiplexing, time division multiplexing, and pulse code modulation to convert analog signals to digital formats.
Ethernet is a widely used local area network technology that operates at the Physical and Data Link layers of the OSI model. It uses CSMA/CD access method to share the transmission medium and detect collisions. Key Ethernet standards include 10Base-T, 100Base-TX, 1000Base-T, and 10GBase-T for copper cable, as well as 100Base-FX and 1000Base-LX for fiber-optic cable. Switches help improve network performance by segmenting collision domains and enabling full-duplex transmissions.
This document contains a summary of key concepts in digital communication. It discusses digital communication, quantizing, encoding, advantages and disadvantages of digital communication, basic signal processing operations, common channels used, telephone channel specifications, adaptive equalization, waveform coding techniques including pulse modulation, analog pulse modulation types, digital pulse modulation types like PCM and DM, sampling, quantizing, uniform and non-uniform quantization, companding, applications of PCM, advantages and disadvantages of delta modulation and DPCM, and an introduction to digital modulation techniques.
This document discusses digital transmission and analog-to-digital conversion. It describes how an analog signal is converted to a digital signal using pulse code modulation (PCM). PCM involves sampling, quantizing, and encoding an analog signal. The document then discusses various digital carrier systems like T1, components of a digital terminal, and codecs used in digital transmission.
The document provides an overview of network fundamentals including basic concepts in communication, network structures and topologies, transmission mediums such as twisted pair cables, coaxial cable, and optical fibers, and network protocols. It describes essential components for communication including a message, transmitter, transmission medium, receiver, and destination. Common network topologies like bus, star, ring and variations are explained. Characteristics of different cabling options are also outlined.
Similar to Sdh basics hand_outs_of_sdh_basics (20)
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Securing BGP: Operational Strategies and Best Practices for Network Defenders...APNIC
Md. Zobair Khan,
Network Analyst and Technical Trainer at APNIC, presented 'Securing BGP: Operational Strategies and Best Practices for Network Defenders' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
Discover the benefits of outsourcing SEO to Indiadavidjhones387
"Discover the benefits of outsourcing SEO to India! From cost-effective services and expert professionals to round-the-clock work advantages, learn how your business can achieve digital success with Indian SEO solutions.
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...APNIC
Adli Wahid, Senior Internet Security Specialist at APNIC, delivered a presentation titled 'Honeypots Unveiled: Proactive Defense Tactics for Cyber Security' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Sdh basics hand_outs_of_sdh_basics
1. Tejas Networks Ltd. Proprietary Information Page 1
SDH BASICS
HAND OUTS OF SDH BASICS
[1] Introduction:
Telecommunication is a process of transmitting or receiving information over a distance by
any electrical or electromagnetic medium. Telecommunication can be possible in 2 ways
1) Analog Communication
2) Digital Communication
In Analog communication, analog signals that vary continuously amplitude and frequency
are used in transmission media In an analog communication, it is difficult to remove noise
and wave distortions during the transmission. For this reason, analog signals cannot perform
high-quality data transmission.
In digital communication, digital signal is an electrical signal, which possesses two distinct
states, on/off or positive/negative. Noise and distortions have little effect, making high-
quality data transmission possible.
In digital communication prior to transmission, analog to digital conversion is needed and
Analog-to-Digital Conversion (ADC) is carried over 3 steps
a. Sampling:
The analog signal is sampled at regular intervals to create pulses, each representing the
amplitude of the signal at an instant in time. This process is called sampling. Sampling
frequency is given by Nyquist Theorem, which says that „ to recover the original analog
signal from the sampled signal, sampling rate should be 2*fmax, where fmax is maximum
frequency of the analog signal.
Voice frequency range: 300Hz to 3.4kHz rounded off to 0 to 4 kHz
Sampling occurs at Sampling frequency, 2 * 4 KHz = 8000 Samples/Sec.
Duration of the samples is 125Sec.
b. Quantization:
Quantization is process of assigning a discrete amplitude value that closely matches the
original sample is now used to present the value of the pulse.
c. Encoding
Encoding is to allot an 8bit binary code to each of the quantized samples and transmit the
binary code.
Voice channel occupies 8000 samples/sec.*8 bits/sample=64000=64kbps
Baseband frequency= 64kHz.
When communication is carried using only single Baseband signal on a line, its called as
Baseband communication. But due to high bandwidth requirement Broadband
communication need to be used. Broadband communication is the process of combining a
number of individual baseband signals into a common frequency band or into a common bit
stream for transmission. Broad communication uses Time Division Multiplexing (TDM) to
cater multiple voice frequencies. There are 3 kinds of transmission types
a. Asynchronous transmission
Asynchronous transmission is transmission of data in which time intervals between
transmitted characters may be of unequal length. Transition of signals do not occur at the
same nominal rate generally free running quartz oscillators derive the clock, there is no
timing pulses sent from transmitter to receiver.
2. Tejas Networks Ltd. Proprietary Information Page 2
SDH BASICS
b. Plesiochronous transmission
Plesiochronous is a Greek word meaning Almost Synchronous, but not fully synchronous.
The digital transitions in the signals occur at almost the same rate. There may be a phase
difference between the transitions of the two signals, and this would lie on specified limits.
Based on this Plesiochronous Digital Hierarchy (PDH) is developed.
c. Synchronous transmission
The digital transitions in the signals occur at exactly the same rate. There will be no phase
difference between the transitions of the two signals, and this would lie on specified limits.
Based on this Synchronous Digital Hierarchy (SDH) is developed.
[2] Plesiochronous Digital Hierarchy (PDH):
Traditionally, digital transmission systems and hierarchies have been based on multiplexing
signals, which are Plesiochronous (running at almost the same speed). Various parts of the
world use different PDH and multiplexing levels Indians followed the European hierarchy
levels.
2.1 Frame format:
The multiple PDH frame formats are starting with baseband signal E0 upto E4 level.
E1 signal level has line rate/data rate of 2.048Mbps consisting of 30 time division
multiplexed (TDM) voice channels, each running at 64Kbps known as E1 and two
additional channels carrying control information. E1 level only used, byte interleaved
multiplexing where 1 byte from each voice signal is combined together within frame
duration of 125µsec. each to form the 2Mbps data.
2.1.1 TDM of E1 level:
Increasing traffic has demanded that more of these basic E1 are to be multiplexed together
to provide increased capacity. In order to move multiple 2 Mbit/s data streams from one
place to another, they are combined together, or multiplexed in groups of four. This is done
by taking 1 bit from stream #1, followed by 1 bit from stream #2, then #3, then #4 which is
Bit interleave TDM. All higher-level frames use bit interleaved TDM. Since each MUX can
use its own clock in PDH, 4 X E1 levels will be having different frequency, multiplexing by
compensating for the frequency difference by adding justification bits wherever possible.
This changes the line rate of E2 level 8.448Mbps instead of 8.192Mbps.This follows for all
higher hierarchy levels.
PDH standards are as depicted in Figure1. The European standard named E0, E1, E2 & E4
hierarchy levels and North American standard named DS1, DS2, DS3 & DS4 levels.
E1 Level: Byte interleaved TDM.
32 * 64 KHz = 2.048 Mb/s, Capacity = 30 Base Channels
E2 Level: Bit interleaved TDM
4 * 2.048 +stuffing bits = 8.448 Mbps, Capacity = 120 Base Channels
E3 Level: Bit interleaved TDM
4 * 8.448 + stuffing bits = 34.368 Mbps, Capacity = 480 Base Channels
E4 Level: Bit interleaved TDM
4 * 34.368 +stuffing bits = 139.264 Mbps, Capacity = 1920 Base Channels
3. Tejas Networks Ltd. Proprietary Information Page 3
SDH BASICS
Figure1
2.2 Limitations of PDH:
Because of Plesiochronous transmission & bit interleave TDM at higher levels, mainly
problem aroused that is
a. Problem of channel segregation:
Access to digital channels from hierarchical signals requires demultiplexing and subsequent
full multiplexing, which leads to the proliferation of equipment at those points where
segregation of channels is needed.
Because of this another problem aroused that‟s voice channels can‟t be Added/Dropped
when at higher hierarchy level and in turn send /receive voice channels. This is the problem
of cross-connection.
b. Homogeneity of equipment:
PDH when deployed with optical fiber, as multiplexing is carried out with electrical signals;
these electrical signals should be converted into optical signal for which Line Terminal
Equipment (LTE) is used. The terminal equipment in a link between exchanges (fiber,
coaxial, etc) must come from the same manufacturer. This limits flexibility when it comes to
reconfiguring and extending the network, since equipment from different manufacturers
cannot be interconnected.
c. Limited functionality:
Supervision and maintenance functions are limited with multiframe structure of E1 level The
PDH don‟t have capability to provide service automatically when there is connection failure.
d. Problem of interoperability:
In the process of successive PDH multiplexing of the 64 Kbps channels, interoperability is
lost between the interfaces used in the European, American and Japanese hierarchies, that is,
the transmission rates are different for the same multiplexing level. This creates a need for
equipment to convert between interfaces in internetworking situations.
4. Tejas Networks Ltd. Proprietary Information Page 4
SDH BASICS
[3] Synchronous Digital Hierarchy (SDH):
Telecommunication Networking formulated by ITU-T (International Telecommunication
Union for Telecommunication standards) and can have capacity upto 40Gbps (not yet
formalized). SDH solved all the problems, which PDH faced by following ways
1. SDH follows the Master-Slave clock technique with PLL (Phase Locked Loop) to
synchronize the nodes.
2. SDH provides mapping, MUXing (byte interleaved TDM) & framing to mainly carry
PDH & Ethernet traffic to form STM frame.
3. Overhead bytes ensure the management of payload & Pointers allow dynamic allocation
of payload in STM frame with which justification can be done under specified limit.
4. Automatic Protection Switching provide protection to traffic against the fiber cut & errors
with the help of overhead bytes in SDH.
5. Performance Monitoring & Alarms strengthens the SDH by giving sufficient indication
using Overheads bytes against errors like equipment, operator & communication.
SDH does not multiplex in predefined steps; one unit is multiplexing all incoming links, adds
overhead information and creates a synchronous transport module (STM).
3.1 STM frame structure:
The STM frame standards with line rate are as shown in Table1. The zero level of the
synchronous digital hierarchy shall be 51 Mbps. The first level of the synchronous digital
hierarchy shall be 155Mbps. Higher synchronous digital hierarchy bit rates shall be obtained
as integer multiples of the first level bit rate and shall be denoted by the corresponding
multiplication factor of the first level rate.
The STM-1 frame is the basic transmission format for SDH. The frame lasts for 125µSec as
depicted in Figure2.The STM-n frame is arranged in matrix format and STM-1 frame
structure is having 9 rows X 270 columns and hence has 2430 bytes within 125µSec, which
forms the line rate of 155Mbps(2430X64Kbps). Similarly the STM-N frame is formed, will
be having 9 rows only but columns
Figure2
will be multiplied, which is nothing but column multiplexing and is as depicted in Figure3.
The STM-n frames are transmitted in left-right and top-bottom manner, i.e. 1st
row is
transmitted starting from 1x1 byte and continue upto 1x270 byte, then 2nd
row transmitted in
same manner, 3rd
row,4th
row,…….7th
row.
5. Tejas Networks Ltd. Proprietary Information Page 5
SDH BASICS
Table1 Figure 3
STM-4 will be having 9 rows only but columns will be multiple of 4 (270 x 4) columns,
which simplifies all higher STM-n frame similarly all STM frames are formed.
At the Network Node Interface, node derives timing information from the STM-n frames
for network node synchronization so STM-n frame should have sufficient bit timing content
(long sequence of 1 or 0 must be avoided). This is done by Frame synchronous scrambler,
which generates alternate 1‟s & 0‟s.
Scrambling is performed on 1st
row of RSOH bytes, at transmitter side and will be de-
scrambled at receiver after deriving the timing from it.
The STM-N frame consists of
Section overhead and Administrative Unit.
Section overhead – Regenerator section overhead and Multiplex section overhead.
Administrative unit – Virtual container and Pointer.
Virtual container - Payload and Path overhead information.
Multiplexing hierarchy forms these entities using the mapping elements, which is explained
in section 3.2.
3.2 SDH multiplexing hierarchy:
SDH multiplexing hierarchy uses mapping elements and perform the mapping, multiplexing
and framing to form STM frame.
3.2.1 Mapping Elements:
Mapping elements basically the packaging units that have got their sizes fixed beforehand
depending upon the traffic path they follow in multiplexing hierarchy. There are 5 mapping
elements
a. Container-n:
Container is basic mapping (packaging) unit for the PDH tributary signals. For every PDH
traffic, container is provided for mapping and unused capacity of container can‟t be filled by
any other traffic. Only one PDH traffic can be mapped into every container and then
remaining bytes will be stuffed.
C11=DS1, C12=E1, C2=DS2, C3=E3&DS3 and C4=E4
Optical Signal Bit Rate Abbreviated as
STM-0 51.84 Mbps 51 Mbps
STM-1 155.52 Mbps 155 Mbps
STM- 4 622.080 Mbps 622 Mbps
STM-16 2488.320 Mbps 2.5 Gbps
STM-64 9953.280 Mbps 10 Gbps
STM-256 39813.12 Mbps 40 Gbps
6. Tejas Networks Ltd. Proprietary Information Page 6
SDH BASICS
There is separate container for E1&DS1 but single container for E3&DS3 because
maximum 3 E3 & 3 DS3 traffics are possible in STM-1 even if used separate container
where as 63E1 and 84DS1 possible by using separate container.
b. Virtual Container-n
Virtual Container is the information structure used to support path (explained in Section
Hierarchy) connections in the SDH. Adding POH byte(s) to container forms VC. For every
container there is VC.
VC11=C11, VC12=C12, VC2=C2, VC3=C3 & VC4=C4
c. Tributary Unit/Administrative Unit:
Tributary Unit is an information structure, which provides adaptation between two layers
and is formed by adding pointer(s) to VC:
When pointer is added to lower order VC-n it forms TU.
When pointer is added to higher order VC-n it forms AU.
POINTER is an indicator whose value defines the frame offset of a VC with respect to the
frame reference of the payload.
d. Tributary Unit Group (TUG):
TUG combines multiple TU by means of multiplexing.
TUG-2 = 4xTU11 or 3xTU12 or 1xTU2.
TUG-3 = 7xTUG2 or 1xTU3.
e. Administrative Unit Group (AUG):
Similar to the TUG, AUG combines the multiple AU by means of multiplexing.
AUG = 3xAU3 or 1x AU4.
3.2.2 Multiplexing Hierarchy:
The Multiplexing hierarchy caters both European & North American hierarc
Figure 4
7. Tejas Networks Ltd. Proprietary Information Page 7
SDH BASICS
levels data rates to form STM frame which is as depicted in Figure4. There are 2 types of
mapping AU-4 & AU-3 mapping through which the PDH traffic is mapped into STM frame
and when mapped with AU-3 mapping data rate will be more compared to AU-4 mapping.
Considering E1 traffic to form STM-1 frame through AU-4 mapping which is performed
in following steps:
a. E1 traffic is of 32 bytes with 2.048Mbps data rate.
b. E1 traffic is mapped into C-12 container whose size is of 34 bytes; the remaining 2 bytes
will be stuffed to complete the mapping (packaging).
c. C-12 is mapped into VC-12 by adding 1 byte of VC-12 path overhead byte.
d. TU-12 is formed by adding 1byte pointer value, which points to the first byte of VC-
12,then TU-12 is framed to form 9X4 information structure.
e. TUG-2 is formed by multiplexing three TU-12 containers which is indicated by M=1, 2,
3. The TUG-2 size is 9X12.
f. TUG-2 is mapped into TUG-3 by multiplexing seven TUG-2‟s which is indicated by L=1,
2, 3…7.TUG-3 size being 9X86, with first 2 columns of fixed stuffing.
g. VC-4 is formed by multiplexing three TUG-3‟s which is indicated by K=1, 2, 3 and
adding VC-4 POH bytes, with 2 columns of stuffing whose size is 9X261.
h. VC-4 is mapped into AU-4 by adding the 1 row pointer, which gives the offset location
of VC-4 in AU-4; AU-4 is then mapped into AUG-1, which is of same size.
i. The STM-1 frame is formed by performing the framing by adding SOH bytes to AUG-1,
with line rate of 155Mbps. Figure5 depicts the byte interleaved TDM which forms TU-12 to
TUG-2 to TUG-3 to VC-4.
8. Tejas Networks Ltd. Proprietary Information Page 8
SDH BASICS
Figure5
Three TU-12‟s TU-12 #1, #2 and #3 are byte interleaved multiplexed to form TUG-2,
Byte1 #1--1X1, Byte1 #2--1X2, Byte1 #3--1X3, Byte2 #1--1X4………Byte4 #3--1X12.
Every row will be having 4bytes of each TU-12 (every TUG-2 will be having 4 columns of
TU-12 in it). This procedure follows for remaining 8 rows, which forms TUG-2 of 9X12.
Similarly TUG-3 & VC-4 are multiplexed. In STM-1 frame, 63 VC-12‟s (K*L*M) can be
mapped each having 4 columns & these columns will be framed in STM-1 frame (K*L*M)
columns apart.
STM-1 frame is formed through AU-3 mapping from E1 traffic in following steps:
a. TUG2 is formed similar to that of AU4 mapping.
b. Seven TUG2‟s are multiplexed to map into VC3 by adding 1 column path overhead with
2 columns of stuffing, which makes the size of VC-3 of 9X87.
c. VC-3 is mapped into AU-3 by addition of the 3byte pointer, which gives the starting
location of the VC-3 payload.
d. Three AU-3‟s are multiplexed into AUG-1.
e. Then framing is done by adding SOH bytes to AUG-1 to form STM-1 frame.
STM-1 frame when mapped through AU-4 mapping technique will be having 1column VC-4
POH & 8 stuffing columns where as when mapped through AU-3 mapping has got
3columns of VC-3 POH & 6column stuffing. In AU-3 mapping 2columns of data is more
compared to AU-4, which increases the data rate comparatively. So according to data rate
varies according to mapping.
Similar to 63XVC-12 STM-N frame can also cater combination of traffics like 21VC-12 and
2VC-3 can be combined together in STM-1 frame in AU-4 mapping. Similarly there can be
many combinations with respect to K, L, M values and data rate.
STM-4 frame:
The STM-4 frame can be formed through the multiplexing hierarchy of STM-1 till AUG-1
then four AUG-1‟s are multiplexed to form AUG-4 container. Then STM-4 framing is done
by addition of SOH bytes to the AUG-4 to form STM-4 frame with line rate of 622Mbps.In
STM-4 frame there is replication of 4 AUG-1 which indicates presence of 4 VC-4 POH
columns.
Contiguous Concatenation:
STM-4 frame can also be formed by contiguous concatenation as depicted in Figure 3, where
C4-4c is formed by concatenation of 4-C4 containers, VC4-4c is formed by concatenating 4
no. of Higher order POH column then AU4-4c is formed by concatenating 4 no. of AU4
pounters and hence STM-4 frame is formed.STM-4 frame can also be formed by
multiplexing 4 no. of AUG‟s to form AUG-4 hence the STM4 is formed.
Similarly all STM-N frames are formed using the basic frame format of STM-1, with only
multiplexing N times from AUG-1 to form the AUG-N, then directly framing to STM-N.
3.3 SDH network elements:
There are 4 network elements, which form the SDH network, they are
a. Terminal Multiplexer(TM):
The Terminal Multiplexer depicted in Figure6, also called as Path Terminating Element
(PTE) acts as a concentrator of tributary signals, which forms the STM-N frame. It converts
signals from electrical domain to optical domain. It is the end equipment in any link or a line,
which can either multiplex or de-multiplex optical signals/electrical signals.
9. Tejas Networks Ltd. Proprietary Information Page 9
SDH BASICS
b. Regenerator:
A regenerator depicted in Figure7 is needed when, due to the long distance between
multiplexers, the signal level in the fiber becomes too low. The regenerator does
regenerating, reshaping and re-timing of received signal and replaces the Regenerator Section
overhead bytes before re-transmitting the signal.
c. Add/Drop Multiplexer (ADM):
One of the major advantages of SDH is its ability to Add & Drop tributaries directly from
higher-order aggregate bit streams and that is performed by Add/Drop multiplexer, which is
as depicted in Figure8.
d. Digital cross Connect (DXC):
Digital cross-connect (DXC)(see Figure9) handles multiple STM-N signals and
simultaneously switches tributaries across multiple STM-N signals. One major difference
between a cross-connect and an add/drop multiplexer is that a cross-connect may be used to
interconnect a much larger number of STM-1s.. There are 2 types of cross-connects
possible; add/drop cross-connect (ADXC) & pass-through cross connect (PTXC). ADXC is
used for grooming (consolidating or segregating tributaries) of STM-1s and PTXC is used
for switching multiple signals at VC-n levels.
Figure6 Figure7
Figure8 Figure9
3.4 Overheads & Pointers:
Several types of overhead have been identified for application in the SDH. They are SOH
and POH byte. SOH & POH bytes perform maintenance operation for their respective
sections like regenerator section, multiplex section and path (higher order & lower order),
which are explained under the heading of Section Hierarchy.
3.4.1 Section Overhead bytes (SOH):
SOH information is added to the information payload to create an STM-N. The SOH
information is further classified as
a. Regenerator section overhead (RSOH):
The Regenerator Section Overhead contains only the information required for the elements
located at both ends of a regenerator section. The section can be between two regenerators
or regenerator & ADM etc. The RSOH is found in the first three rows of STM-N frame as
depicted in Figure10. Byte level description is explained in Table2.
STM-N
E1
E3
T1
Reg
..
STM-N
STM-N
E3
T1 E1
STM-N
STM-N
STM-N STM-N
10. Tejas Networks Ltd. Proprietary Information Page 10
SDH BASICS
HOPOH
Figure10
b. Multiplex section overhead (MSOH):
The MSOH contains the information required between the multiplex section termination
equipment at each end of the Multiplex section (that is, between consecutive network
elements excluding the regenerators). The Multiplex Section Overhead is found in Rows 5 to
9 of STM-N frame as depicted in Figure10. Byte level description is in explained in Table3.
3.4.2 Virtual Container Path-Overhead (POH):
Virtual container POH provides for integrity of communication between the point of
assembly of a virtual container and its point of disassembly. Two categories of virtual
container POH have been identified:
a. Higher order virtual container POH (VC-4/VC-3 POH):
VC-3 POH is added to either an assembly of TUG-2s or a C-3 to form a VC-3. VC-4 POH
is added to either an assembly of TUG-3s or a C-4 to form a VC-4 as depicted in Figure10.
J1
B3
C2
G1
F2
H4
F3
K3
N1
RSOH Description
A1=F6H
A2=28H
Indicate the beginning of the STM-N frame; The frame alignment word of an STM-
N frame (N=1, 4, 16, 64) is composed of 3XN A1 bytes followed by 3XN A2
bytes.
J0: RS
trace
Regenerator Section (RS) Trace byte is used to transmit repetitively a section access
point identifier so that a section receiver can verify its continued connection to the
intended transmitter. J0 byte transmitted as 16-byte code sent in 16 consecutive
frames.
B1: BIP-8 This is a parity code (even parity), used to check for transmission errors over a RS.
Its value is calculated over all bits of the nth
STM-1 frame and then placed in the B1
byte of (n+1)th
STM-1 frame.
E1 This byte is used as a local orderwire channel for voice communication in RS.
F1 This byte is reserved for user purposes (e.g., to provide temporary data/voice
channel connections for special maintenance purposes).
D1-D3–
DCCR
RS Data Communication Channel bytes form a 192 Kbps message channel
providing a message-based channel for Operations, Administration and
Maintenance (OAM) between pieces of section terminating equipment.
E2
M1
S1
D12
D11
D10
D9
D8
D7
D6
D5
D4
K2
K1
B2
B2
B2
D3
D2
D1
F1
E1
B1
J0
A2
A2
A2
A1
A1
A1
RSOH
MSOH
11. Tejas Networks Ltd. Proprietary Information Page 11
SDH BASICS
Table2
Table3
VC-3/VC-4 POH bytes are also termed as Higher Order POH (HOPOH) as HOPOH is
added to the higher order VC‟s only. Bytes are explained in Table4.
b. Lower order virtual container POH (VC-2/VC-1 POH):
The bytes V5, J2, N2 and K4 are allocated to the VC-2, VC-12 and VC-11 POH. The V5
byte is the
first byte of the multiframe and its position is indicated by the TU-2, TU-12 or TU-11
pointer. These bytes are explained as in Table5. The LOPOH bytes
MSOH Description
B2: BIP-24 Error monitoring over MS & computed over STM frame excluding RSOH
bytes.3XN B2 bytes in STM-N (N=1,4,16,64).
K1 & K2 Automatic Protection Switching (APS channel) K1 & K2 (b1-b5) bytes are
allocated for APS signalling for the protection of the multiplex section. K2 (b6-
b8) for communicating Alarm Indication Signal (AIS) and Remote Defect
Indication (RDI).
D4 -D12
DCCM
MS Data Communications Channel bytes form a 576 kbps message channel from
a central location for OAM information (control, maintenance, remote
provisioning, monitoring, administration and other communication needs).
S1 Bits 5 to 8 of byte S1 are allocated for synchronization status messages.
M1 The M1 byte is used for a MS layer remote error indication (MS-REI). Bits 2 to 8
of the M1 byte are used to carry the error count of the interleaved bit blocks that
the MS BIP-24xN has detected.
E2 Local orderwire channel for voice communication in MS, E2 is sent in 4
consecutive frames to initiate the communication which includes segment no.(00-
99) & orderwire no.(000-249).
12. Tejas Networks Ltd. Proprietary Information Page 12
SDH BASICS
Table4
Table5
3.4.3 Pointers:
SDH provides payload pointers to permit differences in the phase and frequency of the
virtual containers (VC-N) with respect to the STM-N frame. Lower-order pointers are also
provided to permit phase differences between VC-1/VC-2 and the higher-order VC-3/VC-
4. On a frame-by-frame basis, the payload pointer indicates the offset between the VC
HOPOH Description
J1 Path access point identifier sends trace message either as 16byte or 64byte in
consecutive frames.
B3: BIP-8 B3 bytes checks the transmission error over HP.
C2: Signal
label
One byte is allocated to indicate the composition or the maintenance status of the
VC-4Xc/VC-4/VC-3 like 00(H)=Unequipped, 02(H)=TUG structure--- FF(H)= No
valid incoming signal(VC-AIS).
G1: Path
status byte
G1 byte is used to convey the path terminating status and performance back to
the originating PTE. 4bits used as Path –REI that has 0-8 valid BIP violations;
1bit for HP-RDI, which acknowledgement for the AU-AIS.
F2 & F3 These bytes are allocated for user communication purposes between path
elements and are payload dependent.
H4:
Position &
Sequence
Indicator
H4 byte provides a multi frame and sequence indicator for VC-3/4 generalized
position indicator for payloads. In the latter case, the content is payload specific
(e.g., H4 can be used as a multiframe indicator for VC-2/1 payload). H4 byte can
be 00,01,02 or 03 for VC-12 multiframe.
K3 APS signalling is provided in K3 bits 1-4, allocated for protection at the VC-4/3
path levels. K3 bits 5-8 are allocated for future use.
N1:
Network
operator
byte
N1 byte is allocated to provide a Higher-Order Tandem Connection Monitoring
(HO-TCM) function. At each node the B3 data is copied into N1 & sent and at
next node B3 is compared with N1, if they don‟t match the error is sent back to
its previous node as REI, which goes till TC source (terminating node).
LOPOH Description
V5 i) 2 bits allocated for error performance monitoring where BIP-2 scheme is used
which includes POH bytes, but excludes V1, V2, V3, and V4.
ii) 1bit as REI that has 2 valid BIP violations.
iii) 3bits for signal label, 000=Unequipped, 001=equipped-non-specific, all other
values are used by new equipment to indicate specific mapping.
iv) 1bit as LP-RDI as acknowledgement for TU-AIS.
J2 Lower order path trace.
N2 N2 byte is allocated to provide a tandem connection monitoring (TCM) function
that works similar to N1, along with V5.
K4 1bit for as extended signal label which works along with signal label of V5 and
2bits as APS signalling for protection at lower order path level.
13. Tejas Networks Ltd. Proprietary Information Page 13
SDH BASICS
payload and the STM-N frame by identifying the location of the first byte of the VC in the
payload. In other words, the VC is allowed to “float” within the STM-N frame capacity.
Pointer operation carried out with H1, H2 & H3 bytes in AU & TU-3 pointers and V1, V2
& V3 that works analogous to H1, H2 & H3 respectively in TU-2/TU-1 pointers. Byte
explanation is as depicted in Figure11. The figure shows the byte arrangements for AU-4 &
Figure11
3xAU-3 (due to multiplexing 3xAU-3 to map into AUG-1). 3xH3 bytes (AU-4)/1xH3 byte
each in 3AU-3/3TU-3/1xV3byte(TU-2/TU-1) is used for buffering of payloads in negative
pointer justification & equivalent number of bytes after H3/V3 byte are used for stuffing in
positive justification. There are different pointer values for different pointer that is explained
in Table6.
Pointer
type
Pointer
value
Description
AU-4 0-782 VC-4 has 2349bytes to be allocated pointer values with 10bit(1024)
so 2349/3=783,3byte each 1 pointer value.
AU-3 0-782 VC-3 is783bytes, which is possible with 783 pointer values.
TU-3 0-764 VC-3 (AU-4 map) has 765 bytes so 765pointer values.
TU-n Lower order VC will be structured in multiframe format, in which 4
frames of VC-n are formed by adding 4 POH bytes (V5, J2, N2, K4),
with each of POH byte there will be pointer bytes (V1, V2, V3, V4
respectively) added which indicates location of V5 to form TU-n as
depicted in Figure 12(LO).
14. Tejas Networks Ltd. Proprietary Information Page 14
SDH BASICS
TU-2
TU-12
TU-11
0-427
0-139
0-103
4X107byte(VC-2)=428.
4X35byte(VC-12)=140.
4X26byte(VC-11)=104.
Table6
Figure 12(LO)
After the pointer value assignment, the hierarchy should be able to process the data even in
case of clock difference between the nodes, which can be because of jitter & wander and in
all cases the hierarchy does the justification. For performing the justification First byte of the
payload should be allocated from 4th
row, immediately after H3 bytes and they can float
anywhere in frame there after. Pointer justification occurs when the sending SDH NE‟s
timing is different than the receiving SDH NE‟s timing. There are 2 types of justification
possible depending upon the clock frequency.
a. Positive Pointer Justification (PPJ):
If the frame rate of the VC-n is too slow with respect to that of the AUG-N, then the
alignment of the VC-n must periodically slip back in time as depicted in Figure12 [a], where
there are 2 nodes (NE1 & NE2) in network, VC-n data rate of NE1 is 782bytes/sec &
AUG-n data rate of NE2 is 783bytes/sec(reference clock recovered) with respective number
of pointers. Because of the difference in clock rate, when NE1 sends only 782bytes, which
will fill the NE2 buffer with leaving 1byte empty (1 pointer no information is present) and
the pointer is pointing to the 1st
position, this is where positive pointer justification is used.
Pointer value is showing the false pointer value where as actual data starts from 2nd
position,
so for that stuffing byte is added at 1st
position (doesn‟t contribute for payload) & pointer
incremented from position 1(dotted arrow) to 2(where actual data starts). This is Positive
Pointer Justification (PPJ). PPJ operation is carried out in 4 consecutive frames as depicted
in Figure12 [b].
Frame-n Start of VC-n, where clock is recovered from incoming bits & set as reference.
Frame (n+1) Pointer initialization, payload slipped back because clock difference.
Frame (n+2) Pointer value I bits inverted to have 5bit majority voting at receiver &
stuffing bytes added after 3H3 bytes.
Frame (n+3) Pointer value incremented by 1.
NE2
15. Tejas Networks Ltd. Proprietary Information Page 15
SDH BASICS
783
NE1
VC-n AUG-n
Figure12 [a]
Figure12 [b]
b. Negative Pointer Justification (NPJ):
If the frame rate of the VC-n is too fast with respect to that of the AUG-N, then the
alignment of the VC-n must periodically be advanced in time as depicted in Figure13 [a],
where VC-n data rate is 784bytes/sec and AUG-n data rate of adjacent node is 783bytes/sec
(reference clock recovered). When NE1 sends the data all 783 positions (50-783 in nth frame
to 49 shown in figure) of NE2 are filled with data sent by NE1, even then 1 byte is
remaining which has to be accommodated in frame of NE2, this is done by vacating the
H3H3H3 bytes, because of which payload is moved in that place and the remaining data is
included within payload by decrementing the pointer from 50 to 49.NPJ operation is carried
out in 4 consecutive frames as depicted in Figure13 [b]. It is similar to PPJ till frame (n+1),
Frame (n+2)Pointer value D bits inverted to have 5bit majority voting at receiver &
Buffering is done in H3 bytes where payload data is loaded (which is extra in VC-n)
Frame (n+3) Pointer value decremented by 1.
VC-n(NE1) AUG-n(NE2)
Figure13 [a]
Figure13 [b]
[4] Section Hierarchy:
1
2
3
|
|
|
|
780
781
782
1
1q1
2
3
4
|
|
|
|
781
782
783
1
1q1
2
3
4
|
|
|
|
782
783
784
50
51
52
|
782
783
0
1
|
48
49
49
16. Tejas Networks Ltd. Proprietary Information Page 16
SDH BASICS
Section Hierarchy is useful for effective traffic planning, where depending upon the NE
capacity and population of traffic cross connect is provisioned.
There are 2 sections in any optical fiber network depending upon the part of the STM frame
processed as depicted in Figure14, they are
a. Regenerator Section (RS): RS is a part (section) of the optical fiber network,
within which RSOH part of STM frame is NOT processed.
Figure14
b. Multiplex Section: MS is a part (section) of the optical fiber network, within which
MSOH part of STM frame is NOT processed.
c. Higher order Path: HP is a part (section) of the optical fiber network, within which
higher order VC part of SDH frame is NOT processed (it may be processed only for
interpreting HOPOH).
d. Lower order Path: LP is a part (section) of the optical fiber network, within which lower
order VC part of SDH frame is NOT processed (it may be processed only for interpreting
LOPOH).
RS & MS are defined in network only on the basis of the type of the equipment used in the
in it, but for defining the HP & LP it depends upon the traffic provisioning (type of the
cross connect) in the NE‟s. While provisioning in NE following points has to be
remembered
i. After receiving the STM frame at NE, while disassembling it; NE follows the sequence of
RSOHMSOHAU-4/AU-3 PointerVC-4/VC-3 POHTU-n pointerVC-n
POH.n-11, 12,2,3.
ii. For Tejas nodes, even if one is making a VC4 level pass-through (an operation with HP
without processing it), he/she is processing MS & therefore terminating the MS.
iii. One can change any HPOH field (e.g., J1 transmitted trace) only when one is processing
HP (e.g., VC12 level pass through cross-connect (PTXC) exists on AU4 mapping), but not
when HP is not disturbed (e.g., VC4 level PTXC on AU4 mapping).
iv. For Tejas nodes, for AU4 mapping, one can make VC4 and VC12/VC11 level and not
VC3 level pass-through for E1/DS1 traffic.
v. If in a STM-1 node, multiple (say, 18) E1/DS1 traffic has to be passed-through with some
other traffic added/dropped from that node, one has to make multiple (18) VC12 level
PTXC.
17. Tejas Networks Ltd. Proprietary Information Page 17
SDH BASICS
Traffic planning is explained with the example as depicted in Figure15.As depicted there are 3
kinds of traffics needs to have communication between the NEs with respective number as
shown. There are 7 ADM & 1 Regenerator, with this knowledge, there will are 7RS & 6MS
defined as depicted irrespective of traffics going to be provisioned in them.
Figure15
Amongst the NEs, A, B, F and C (port 1) is of STM1 capacity and C (port 2&3), G, E and F
is of STM4 capacity all are following AU4 mapping technique.
For any traffic terminating NEs must be provisioned with ADXC of respective VC, for
example: E1VC12, E3VC3.
Now the PTXC provision in intermediate NEs is part of effective traffic planning so that
maximum traffic can be catered with existing capacity.
At B:
There are 3 traffic 21E1 from port 1 to 3,21E1 & 1E3 from port 2 to 3.STM1 capacity NE
means each port of the NE can receive or deliver traffic of STM1 capacity.
a. For 21E1 from 1-3, according to point iv both VC4/VC12 PTXC is possible but
according to point v only VC-12 PTXC has to be provisioned as port3 capacity is STM1 and
if VC4 PTXC is provided then no other traffic can be either delivered or received.
b. Similarly for traffic from 2-3, 21E1 & 1E3; VC12 & VC3 PTXC is provisioned
respectively and all traffic must be in STM#1 as NE is of STM1 capacity.
At C:
From port 1-3 there 2 traffic of 42E1 capacity & 1-2 1E3 traffic, here port1-STM1 & port
2&3-STM4 capacity.
a. If VC4 PTXC is provisioned from 1-3 then all traffic including E3 will go to port3, which
is not expected so VC12 PTXC from 1-3 carried within STM#2 for 42E1 traffic and VC3
PTXC from 1-2 within STM#4.
b. Port 2&3 can cater traffic in any of the STM number (1-4), in port 3 42E1 traffic is
catered within STM#2 in which can cater still 21E1 traffic.
Similarly at E VC12 PTXC is provisioned from 1-2 within STM#2.After all traffic are
provisioned in all NEs, HP & LP can be indicated for each traffic as depicted in Figure15.
18. Tejas Networks Ltd. Proprietary Information Page 18
SDH BASICS
[5] Automatic Protection Switching (APS):
Protection is required for the traffic against 3 conditions Signal Degrade (SD), Signal Failure
(SF) and fiber cut. When first 2 conditions occur the traffic quality will be lost and in the
later case traffic itself will be lost. So there was service level agreement done between service
provider & customer, according to which 99.999% of the time connection should be
available and this is possible only by Automatic Protection Switching. APS can be classified
in general as
i. 1+1 protection scheme/Dedicated protection scheme
The simplest of all the forms is the 1+1 type of protection. Each working line (port or path)
is protected by one dedicated protection line (port or path). Protection line is redundant line
dedicated for the working line. Traffic is taken through both working line & protection line
simultaneously and at the far end traffic will be selected by switch depending upon the
healthiness of the traffic. The switch over is triggered by a defect such as fiber cut, SF or SD.
When working line is on the toss, traffic will be selected from the protection line. The main
disadvantage of the 1+1 is high bandwidth redundancy but 1+1 is faster than any of the
protection-switching scheme.
ii. 1:1 protection scheme/Shared protection scheme
1:1 in general can be called as 1:N; in 1:1 protection for each of the working line (which can
be either port or path) there will be a corresponding protection line. There will be 2 types of
traffics identified for catering it, high priority traffic & low priority traffic (Not supported in
Tejas products). High priority traffic will be catered in the working line and low priority
traffic will be taken through protection line. When the working line goes on the toss, traffic
has to be catered through protection line where low priority traffic is present, which will be
pre-empted from protection line for serving the high priority traffic.
In 1:N there will be N working line, which are getting protected by 1 protection line through
which low priority traffic is catered and the switching occurs depending upon the priority
given to the working line and low priority traffic will be given least priority.
Above said 2 protection schemes can be discussed in detail based on network topology,
which are
5.1. Linear protection scheme:
1+1 & 1:N protection switching scheme when deployed in linear network will be termed as
linear protection switching scheme.
a.1+1 MSP:
1+1 protection scheme in linear network are termed as 1+1 MSP as each section in our
Tejas optical network is MS. Figure16 depicts the normal operation of the 1+1 MSP, where
communication needs to establish between 2 NE‟s A & B.
Figure16
1+1 MSP is port level protection scheme where traffic catered in one port called as Working
port (3-1 or 4-1) as depicted will be protected by Protecting port (3-2 or 4-2). Each port will
be having Tx. & Rx fiber which will be connected to its adjacent port to Rx. & Tx.
respectively, which will be either Working Path (WP) if its for working port & Protecting
19. Tejas Networks Ltd. Proprietary Information Page 19
SDH BASICS
Path(PP) if its for protecting port. Both WP & PP will be carrying the signal simultaneously
and at the far end the traffic will be selected by switch depending upon healthiness of the
traffic, in normal case it will be from working path and switching to protecting path occurs
when SD, SF & fiber cut is observed on working path which are traffic affecting. For
example if single fiber cut occurs in WP as depicted in Figure17, then selector switch in A will
be switched from WP to PP (ie. Only affected direction of traffic will be switched over to
PP) and traffic will be undisturbed. This type of switching is called as Unidirectional
Switching.
Figure17
On single fiber cut if both direction of traffic is switched over from WP to PP then it will be
called as Bi-directional switching. User can configure both switching types.
1+1 MSP can also be configured by user as Revertive or Non-Revertive protection, when
provisioned as Revertive protection, after WP is repaired back, switching takes place PP to
WP and traffic will be selected from WP but after Wait-To-Restore (WTR variable from 5-
12min which is user configurable) time is elapsed which ensures proper splicing in WP.
If Non-Revertive protection is provisioned then traffic will not be switched back from PP to
WP even if the WP is repaired completely, until user forcefully switches the traffic using
external commands.
5.2Ring protection scheme:
Ring network is made up of ADM and any traffic added can reach to its destination in 2
ways, which can be useful in APS. There are 2 types of protection switching schemes.
a. Sub Network Connection Protection (SNCP):
Sub Network Connection Protection (SNCP) or Unidirectional Path Switched Ring
(UPSR)(in SONET terminology) is dedicated protection scheme, which gives path level
protection for each traffic and traffic will be flowing in both WP & PP simultaneously. The
SNCP has to be provisioned at terminating nodes, for each traffic individually Destination
Work (DW), Destination Protect (DP) and Source Work (SW), Source Protect (SP) has to be
specified as depicted in Figure18.Consider communication is needed between A & D and the
HP or LP will be as shown from A to D in 2 ways, one is selected as Working HP/LP (WP)
(for this traffic) and another one selected as Protecting HP/LP (PP) (for this traffic).
Whenever the WP is on the toss its PP will protect the traffic and corresponding switching
occurs at far end. PP is dedicated to WP for individual traffic, like this 63 E1 can be
protected in STM-1 node, each having different WP and PP.
20. Tejas Networks Ltd. Proprietary Information Page 20
SDH BASICS
Figure18
SNCP has to be provisioned only in terminating nodes and PTXC has to be provisioned in
intermediate nodes. SNCP is necessarily follows Unidirectional switching only as the
protection directly provided for the traffic separately and if traffic flowing from 3-1 to 4-1 is
affected then traffic will be received from 5-2 in PP. Traffic is still received in A from 3-1
through WP only. If both direction traffic is affected in WP then both direction traffic will
switch over to PP. SNCP also can have both Revertive & Non-Revertive protection.
Tandem SNCP is another application of SNCP where single fiber cut in N rings can be
protected simultaneously for which can be simulated using 4-way XC. SNCP protection
can‟t be provisioned in the presence of MSP or MSSP protection.
b. Multiplex Section Shared Protection (MS-SP):
MS-SP ring is also called as Bi-directional Line Switched Ring (BLSR) in SONET terms,
which is ring network application of 1:1 protection switching scheme There are types of
rings
i. MS-SP 2F ring:
MS-SP-2Fiber ring will be having 2 fibers with bandwidth divided for the working traffic &
protecting traffic, for example in STM-N ring having 6 nodes as depicted in Figure19,
communication needs to be carried out between NE A & D. In MS-SP ring within every
port each fiber is divided as working traffic & protecting traffic of N/2 capacity each (i.e. in
each fiber AU4 1-8 will be working traffic & AU4 9-16 will be protecting traffic). Working
traffic of one direction say from A to B in AU4 1-8 is protected by protecting traffic in
opposite direction from B to A in AU4 9-16.
The protection process is explained with example as depicted in Figure 20, if Multiplex
Section between B & C is affected then all other Multiplex Sections in ring will share their
bandwidth to protect the traffic because of which it‟s named as MS-Shared Protection.
When the traffic between B & C is affected the traffic will reach from A to B in
AU4#1(working traffic) then at B, RING SWITCHING takes place where traffic will be
switched from AU4#1 to AU4#9(protecting traffic) and will go back from B to A. The
traffic will reach the node C in AU4#9 only then traffic will be switched back to AU4#1 as
the MS between B & C was on the toss so traffic got protected by other MS. After traffic
reached the C another ring switch takes place where traffic will be switch back to
AU4#1(working traffic) then will reach the destination D in AU4#1only.Similarly the
opposite direction traffic also will be protected in Ring switching.
As name suggests this follows only Bi-directional switching and MS-SP 2F can‟t be Non-
Revertive at all, as main advantage of Non-Revertive protection is to avoid the fiber ageing
when it is heavily loaded, keeping another path idle. Only disadvantage of the MS-SP 2F is
that maximum bandwidth utilization is STM-N/2 capacity, which was overcome by MS-SP
4F. Tejas products do not support MS-SP 4F for now.
21. Tejas Networks Ltd. Proprietary Information Page 21
SDH BASICS
Figure 19 Figure 20
There can be maximum of 16 NE‟s (0-15) in a ring because every NE is given Node ID for
which 4 bits reserved in K1& K2 byte. Provisioning needs to be done at every NE giving
East/West chassis-slot-port, ring ID, node ID and ring map.
ii. MS-SP 4F ring:
MS-SP 4F ring require four fibers for each span of the ring. As illustrated in Figure21,
working and protection traffic are carried over different fibers: two NE‟s transmitting in
opposite directions carry the working traffic while two NE‟s, also transmitting in opposite
directions, carry the protection traffic. This permits the bi-directional transport of working
traffic.
Figure 21
MS-SP 4F rings support RING SWITCHING as a protection switch, as well as SPAN
SWITCHING, though not concurrently. Multiple span switches can coexist on the ring
since only the protection channels along one span are used for each span switch. Certain
multiple failures can be fully protected using span switching. MS-SP 4F can support only Bi-
directional switching and it supports both Revertive & Non-Revertive protection.
5.3 External Commands:
22. Tejas Networks Ltd. Proprietary Information Page 22
SDH BASICS
External commands enable the user to have control over routing of the traffic whenever
application arises. There are 4 external commands whose priority is given by 4bits of K1
byte.
a. Clear/Release
This external command clears all external commands applied on any port, which is having
the highest priority.
b. Lock Out of Protection (LOP):
Lock out of protection is external command given by user, when maintenance operation has
to be carried on the PP, in which case if WP goes on the toss traffic continuously tries to
acquire the PP and selector switch keeps on switching between WP & PP. To avoid this
loop LOP is given so that PP is locked & no traffic will be allowed to go through PP.
c. Forced Switch: Work or Protect
Forced Switch is the explicit command, which forcefully switches traffic to intended path; it
can be Forced Switch to Work or Forced Switch to Protect. The switching takes place
regardless of condition of the path to which it is switching to because SF/SD are of lower
priority compared to this command.
d. Manual Switch: work or Protect
Manual switch is similar to the Forced switch but main difference is while switching the
traffic, condition of the path is checked as SF/SD are of higher priority. Hence whenever
Manual switch to work is given and WP is having SF/SD then switching doesn‟t take place.
Following table illustrates the different types of protection switching schemes.
Protection
Schemes
Topology
Uni-Directional
/ Bi-Directional
Revertive /
Non-Revertive
Shared /
Dedicated
Switching
Time
1+1 MSP
(Port protection)
Linear Uni / Bi-
Directional
Revertive /
Non-Revertive
Dedicated Low
1+1 SNCP
(Path protection)
Ring Uni-Directional
(UPSR)
Revertive /
Non-Revertive
Dedicated Low
MSSP2F
(Line protection)
Ring Bi-Directional
(BLSR)
Revertive Shared Switching
time is more
MSSP4F
(Line protection)
Ring Bi-Directional
(BLSR)
Revertive /
Non-Revertive
Shared Switching
time is more
1:N
(Card
protection)
Linear NA Revertive/Non
Revertive
Shared Switching
time is more
[6] Synchronization:
Synchronization is required to enable service providers to transport bits of information
within and across network without losing any bits, which can be due to mis-timing (phase
23. Tejas Networks Ltd. Proprietary Information Page 23
SDH BASICS
variation) inside transmission equipment when data is regenerated. When mistiming
becomes large, errors are produced and the system can become unusable. Even at low values
of mis-timing (phase variation), sensitivity to amplitude and phase variations is increased and
performance suffers. There are 2 types of phase variation Jitter & Wander. Jitter is a short-
term variation of the digital signal from its ideal position in time and its frequency is >10Hz.
Figure 22
Wander is long-term variation of the digital signals from its ideal position and its frequency
is <10Hz.Jitter & wander is as depicted in Figure 22.
Synchronization is attained in the SDH using Master-Slave clock technique along with Phase
Locked Loop (PLL), which is performed by Synchronous Status Message (SSM) state
machine.
6.1 SSM state machine:
SSM state machine present in every NE will synchronize all NE in network, which is as
depicted in Figure 23.
.
Figure 23
SSM state machine nominates the clocks through 3 interfaces
i. Optical interface (STM ports),
ii. Electrical interface (E1/DS1 interface)
iii. BITS (clock/data) (external reference signal)
24. Tejas Networks Ltd. Proprietary Information Page 24
SDH BASICS
Every NE will be having multiple of interfaces representing different clocks SSM will lock to
the particular clock depending upon the provisioning done by the user in synchronization
configuration in NES.
A Nominated clock signal can be either in “Signal Fail” or “No Signal Fail State”. If
Signal Fail is present on nominated clock, it will not be considered for timing reference
clock selection process until and unless it is overridden by an external command. The
following Alarms are considered for declaring/clearing a signal fail: LOS, LOF and AIS.
User can configure following parameters, which is applied to the SSM for synchronization.
a. Priority:
Priority of the nominated clock can have range of 0-8. A “0” Priority, which is also the initial
default, indicates that this clock should not be considered for selecting the timing reference.
Valid priorities can range from 1-8. “1” is the highest priority and “8” is the lowest. More
than one clock can have the same priority.
b. QL mode:
The following quality modes are available to the user. The quality of a clock is
automatically detected in case of STM clocks from their S1 byte. The S1 byte is as shown
in Table7.
The user can configure the QL label of the BITS/PDH clocks manually. When a
PDH/BITS clock is nominated, it comes up with an “INVALID” Quality Label. There are
mainly 3 quality levels of clock.
i. Primary Reference Clock (PRC): G.811
a. Accuracy of clock is 10 –11
(10pico second
deviation/sec.).
b. Stratum 1 clock derived from GPS satellite, Cesium
clock.
ii. Synchronization Supply Unit (SSU): G.812
a. Accuracy of the clock is 1.6X10-8
(0.016Sec
deviation/sec).
b. Stratum 2 clock derived from Quartz crystal oscillator Table 7
iii. SDH Equipment Clock (SEC): G.813
a. Accuracy 4.6X10-6
b. Stratum 3 clock derived from Quartz crystal oscillator.
When all quality of clocks are mixed together maximum number of clocks to be used is
given by G.803 series; according to which
Maximum number of SEC's between 2 SSUs: < 20
Maximum number of SSU's in a chain: < 10
Maximum number of SEC's in a chain: 60.
i. QL Disable:
Nominated clock input QL is not considered for clock selection. In this mode, clock with
high priority will be selected. The next highest priority clock gets selected as the secondary
reference.
ii. QL Enable:
Nominated clock input QL is considered for clock selection. In this mode clock with better
QL is selected. In case of two or more having the QL label the user configured priorities are
used to break the deadlock.
c. Output QL mode:
Depending on NE configuration (SONET/SDH) and Output QL mode.
S1: 1234 Description
0000 Quality Unknown
0010 PRC
0100 SSU-A
1000 SSU-B
1011 SEC
1111 DNU
25. Tejas Networks Ltd. Proprietary Information Page 25
SDH BASICS
The following is the list of options available to the user for configuring the output Quality
mode:
i. Auto: SSM will send quality level/label of the selected clock as NE Quality to all interfaces
connected to NE.
ii. Manual: SSM will send user (operator) specified value as NE Quality to all interfaces
connected to NE
Note: Irrespective of the Output QL Mode, a DNU/DUS is sent on the selected clock
interface and its MSP mate port, if any.
d. External Commands:
The following external commands are supported in the SSM timing subsystem as described
with a decreasing order of priority
i. Lockout
This is an explicit request given by the user to the timing subsystem indicating that the clock
that is put in the lockout state should not be considered as a reference clock. Indicating a
Priority of “0” also is equivalent to putting a clock into lockout. A user can also manually
bring a clock out of lockout. Lockout has the highest priority among all external commands
and clears the last external command if any on the clock.
ii. Forced Switch
SSM timing subsystem chooses the Primary (and the secondary) reference clock based on
various parameters. However, the user can explicitly force the SSM module to latch onto a
lower quality/priority clock by giving a forced switch to a particular clock.
Network conditions like Signal Fail, DNU and signal PPM going above the -/+ 17 (1byte
slip =4.6ppm) mark do NOT take precedence over the Forced Switch. In the above
conditions the SSM module goes into holdover waiting for the forced clock to come back to
a usable state. Forced switch has a priority over a Manual Switch command
Doing the following and only the following can explicitly clear forced switch:
Issuing a Clear Command.
Locking out the clock on which Forced Switch was given.
Reducing the Priority of the forced clock to zero.
iii. Manual Switch
A Manual Switch command is a user-configured command forcing the SSM module to latch
on to a particular reference clock. The following conditions manual switch fails:
Existence of Lockout of the requested clock.
Existence of a Forced Switch on the same/any other clock.
If the clock has it‟s Priority Disabled.
If Quality is disabled and if the clock is a SF state.
If Quality is enabled and the clock has a DNU or a quality lower than the existing
reference clock.
The manual switch command can be cleared due to the following conditions:
An explicit clear command.
A higher priority lockout or forced switch.
SF/DNU on the clock for priority disabled/enabled respectively.
If the quality of another source becomes higher than the clock on which manual switch
is active.
6.2 SSM status advertising:
SSM After selection of the clock, PLL will synthesize the frequency as depicted in Figure 24.
Selected clock will be applied as Frequency Reference Input and with the help of Voltage
26. Tejas Networks Ltd. Proprietary Information Page 26
SDH BASICS
VCO
Offset
Regist
er
Output
frequency (f0)
Nominated clock (fR)
Controlled Oscillator (VCO) Output Frequency will be synthesized. SSM will keep on
surveying clock & will be indicating to user with the help of SETG status and resulting
alarms.
Figure 24
a. SETG (Synchronous Equipment Timing Generation) status:
The SETG status is the indicator of what state the SSM module is in. It has the following
states:
i. Free Running: When the offset register value is completely ignored, PLL becomes an
open loop system. The output frequency cannot be tracked to the nominated clock or no
external clock is nominated or in holdover mode for more than 24 hours.
ii. Holdover: The offset register value is fixed to the last value when both inputs were
available or the Timing reference on all nominated clocks failed or PPM offset on
selected clock is high (> +/- 17 PPM).
iii. Lock: The offset register value in PLL changes dynamically to track the output
frequency to the input frequency and thus, derives timing from the nominated clock
source. The node also shows which timing source it is deriving its reference from by
indicating a “*” against the Timing reference which is current reference clock.
b. Alarms:
SM provides following Alarms to indicates the current status of SSM
i. Timing reference failed:
This alarm is raised whenever nominated clock source has LOS, LOF or AIS or if the
Primary or the Secondary clock PPM offset is higher than +/- 17 PPM.
ii. System clock in holdover mode:
This alarm is raised in the following scenarios.
a. Current selected clock received signal fail and no other nominated clock is available for
timing reference.
b. Current selected clock PPM offset crosses +/-17PPM
iii. Timing generation entry free run:
This alarm will be generated when
a. No clock is nominated for timing reference.
b. Internal clock is selected as reference clock.
[7] Performance Monitoring (PM) Parameters:
Even though Digital Communication is immune to noise addition, noise set to occur in
transmission and performance is inversely proportional to the noise, hence performance of
the hierarchy is going to change accordingly. In STM frame while carrying the voice “data” is
27. Tejas Networks Ltd. Proprietary Information Page 27
SDH BASICS
of not much importance so even if noise introduction is monitored then respective measures
can be taken and in SDH PM will be monitoring the every section using Bit Interleaved
Parity (BIP) monitoring.
7.1 BIP monitoring:
BIP monitoring will be used to monitor error, which may be getting introduced in the
transmission path and every transmission path in SDH is divided as RS, MS, HP & LP.
Every section in any optical network will be necessarily a RS, which is as depicted in Figure14
in Section Hierarchy. So if RS is monitored then all transmission paths will be monitored but
in SDH PM BIP monitoring is done on all sections. Because parity check only gives
information about probability of error occurring only but not about the exact number of
errors & mainly in which part of the frame the error occurred so to inform to the SDH user
probable place of the error, all section are monitored which will be explained under BIP
calculation.
In STM frame for every section there are bytes reserved which are used in BIP monitoring
there are 4 BIP monitoring bytes
B1 byte --- RS.
B2 (3bytes) --- MS.
B3 byte --- HP.
V5 (BIP-2) --- LP.
7.2 BIP calculation:
BIP calculation is done on the STM frames and part of the STM frame over which BIP bits
are calculated is called as BLOCK. BIP monitoring bytes will be calculated over different
part of the STM frame.
a. BLOCK: The Block over which BIP monitoring bytes are calculated is as given below.
B1 byte --- STM frame --- Monitoring RS.
B2 (3 bytes) ---- STM frame-RSOH --- Monitoring MS.
B3 byte --- VC4/VC3 --- Monitoring HP.
V5 byte --- LO VC --- Monitoring LP.
So if only RS was monitored then we will get information that error occurred but its over
complete STM frame (2430 bytes), which makes it very difficult to find probable byte of
error occurrence. So if MS, HP & LP are also monitored then it will be easy to find the part
of STM frame in which error occurred. To explain this consider the example when B1
calculation shows error occurred and B2 byte shows no error occurred then obviously the
probable error occurred in RSOH bytes only.
Example: B1 byte calculation over STM frame as depicted in Figure 25.
28. Tejas Networks Ltd. Proprietary Information Page 28
SDH BASICS
Figure 25
STM frame 2430 bytes are arranged in vertical manner as shown and EVEN PARITY is
followed to calculate the B1 byte, according to which in every column it will see that even
number of 1‟s are present. B1 byte is calculated over nth
STM frame & that B1 byte will be
placed in (n+1)th
STM frame because if placed in nth
frame itself then it is difficult to debug
the error which may occur in B1 byte of nth
frame only. Then nth
frame will be transmitted
which when received will be again subjected to Even parity check over STM frame and it
will be stored as B1‟.Then (n+1)th
frame is received and B1 byte is retrieved from that which
will be compared with B1‟ by B1(XOR)B1‟.If they match then probably no errors have
occurred(its probable because even parity can find only odd number of errors occurred in
case of even number of errors it will not trace the error) and if 1 bit doesn‟t match then in
that column 1 or more errors occurred. In B1 if 8bits don‟t match then it can be concluded
that 8BIP bits are in error. Similarly all BIP monitoring bytes are calculated over their
respective blocks.
7.3 Performance Monitoring Parameters:
BIP monitoring bytes only will give information regarding errors occurred in the section and
will report the alarms like SD (1 bit error in 105
– 109
bits) & SF (1 bit error in 103
– 105
bits),
but PM parameters will give the conclusion drawn over period of 15min or 24Htrs.
a. Errored Block (EB):
Errored Block is block in which one or more BIP bits are in error.
b. Errored Second (ES):
Errored Second is one-second period in which one/more Errored Blocks occurred or defect
second occurred. A second is said to be defect second if traffic affecting alarm is reported.
Traffic affecting alarms like LOS, LOF, AIS, RDI.
1 Block 125Sec.
1 Sec. 8000 blocks (For B1, B2 & B3).
1 Sec. 2000 blocks (For V5 bytes because of multiframe).
ES only gives the account of error occurred in the second but not is it very severe condition
to be considered so that traffic is affected, so for that another PM parameter will be counted.
c. Severely Errored Second (SES):
Severely Errored Second (SES) is one-second period, which contains >=30% Errored
blocks or the defect second has occurred.
1s 8000 blocks.
30% of 8000 blocks 2400 blocks.
30% of 2000 blocks 600 blocks (Only for V5).
SES will be counted only when 2400(600) blocks are in error but if user can control over
the situation performance degradation from ES to SES then it adds error performance
monitoring.
29. Tejas Networks Ltd. Proprietary Information Page 29
SDH BASICS
d. Background Block Error (BBE):
When performance degrades gradually from ES to SES, EB‟s are counted as BBE to indicate
gradual degradation. BBE doesn‟t increment when SES is counted as depicted in Figure 26.
Till 5 sec. BBE goes on incrementing but at 6th
sec. EB >30% EB in 1 Sec. BBE retains
value which is indication of performance degradation from ES to SES. Errored Block Count
(EBC) is equal to BBE but BBE is preferred because
i. EBC is cumulative count, which keeps on incrementing (Doesn‟t contribute to any
performance monitoring), hence is not included in PM parameter in UI of NES..
ii. BBE is also cumulative count but doesn‟t count when part of SES.
Figure 26
e. Unavailable Second (UAS):
UAS is PM parameters which indicates more severe condition compared to SES, where
there is burst of SES events. UAS count start incrementing by 10 its previous count, at the
occurrence of contiguous 10th
SES event and period of unavailable time begins, where
these 10 consecutive SES started their burst of 10 event as depicted in Figure 27.
Figure 27
There are 33 seconds under consideration, in which 10 SES event started at 6th
sec, previous
to that SES count was 1 & ES count was 3,so when UAS set to 10(at 15th
sec), the count was
ES=13 & SES=11,which will be decremented by 10,as UAS started counting and period of
unavailable time started at the beginning of 10 SES event from 6th
Sec.
Resetting Logic of UAS:
UAS count decrements by 10 at the onset of 10th consecutive non-SES and period of
available time begins where 10 non-SES event started.
In Period of Unavailable time ES, SES, UAS counts will counted as shown in Table 8.
30. Tejas Networks Ltd. Proprietary Information Page 30
SDH BASICS
Time interval(sec) 0 1 2 3 4 5 6 7 8 9 10 11 12 13
SES count 1 2 3 4 5 6 7 8 9 9
Table 8
NOTE:
# UAS increments because, its period of unavailable time and if its 10th
error free
second(non-SES) then it will be part of available time where UAS will decrement by
10.
* ES count increments because that second can be the 10th
ES (non-SES) event which
will make it part of available time. UAS count increments but if ES is 10th
ES
(non-SES) then it will be part of Available time depicted in Figure 26.
@ES & SES retains value as its SES and no way it can become part of available time
in past 10 sec, and also UAS increments as it part of Unavailable time.
i. Max. count possible in 900 sec of
ES: 900
SES: 810(9SES & 1non-SES(SEP)
UAS: 900.
f. Severely Errored Period:
If 10 consecutive SES event was counted as Unavailable period but if there is burst of SES
(as in NOTE i.) but less than 10 counts then it can also affect the performance of the
network in that case it will be declared as Severely Errored Period.
A SEP begins at the onset of 5 to 9 consecutive SES events. For Tejas Nodes, after 7
consecutive SES, SEP is set as depicted in Figure 28.
Figure 28
g. Errored Second Ratio (ESR):
The ratio of ES to total seconds in available time during a fixed measurement interval.
Say interval is of 13 sec then,
ESR: (13 sec/ 13 sec)…. Refer Figure 28.
h. Severely Errored Second Ratio (SESR): The ratio of SES to total seconds in available
time during a fixed measurement interval.
SESR: (9 sec/ 13 sec)… Refer Figure 28.
i. Background Block Error Ratio (BBER): The ratio of Background Block Errors (BBE)
to total blocks in available time during a fixed measurement interval. The count of total
blocks excludes all blocks during SES.
BBER: (3000)/48000) …Refer Figure 26.
Condition of Sec. ES count SES count UAS count
#Error free sec. Retains value Retains value Increments (if 10th
DEC. by 10)
*
ES Increments Retains value Increments (if 10th
DEC. by 10)
@
SES Retains value Retains Value Increments.
31. Tejas Networks Ltd. Proprietary Information Page 31
SDH BASICS
j. Severely Errored Period Intensity (SEPI): The number of SEP events in the available
time, divided by total available time in seconds.
SEPI: (1/ 13 sec)…Refer Figure 28.
7.4 Performance Monitoring Event:
Performance Monitoring Processing is done with help of PM primitives (DS & EBC)
In every NE in 2 directions Near End & Far End. Consider example in which NE A,B & C
are connected as depicted in Figure 29.
Figure 29
At NE B: a-b & c-b trunk will be Near End (NE) and b-c & b-a trunk will be Far End (FE).
Similarly in all NE there will be 2 trunks and for each trunk PM will be done as shown
below.
For Near End Performance Monitoring Events refer Figure 30(a).
NES = (NDS) + (NEBC)
NSES = (NDS) +(NEBC)
NBBE = !(NSES) + (NEBC)
Figure 30(a)
For Far End Performance Monitoring Events refer Figure 30(b).
FES = !(NDS) + (FEBC) + (FDS)
FSES = !(NDS) +(FEBC) +(FDS)
FBBE = !(NSES) + (FEBC)
Figure 30(b)
For calculating FES, FSES & FBBE Near end Defect Second (NDS) should be absent
because if NDS is present then it will give the information for PM of NE and which will be
propagated to FE trunk also. So PM processing on the FE trunk NDS must be absent.
References:
32. Tejas Networks Ltd. Proprietary Information Page 32
SDH BASICS
i. ITU-T Recommendation G.707/Y.1322
ii. ITU-T Recommendation G.784
iii. Training Manual (TejTM) Version 1.0
iv. ITU-T Recommendation G.841
v. SSM: Timing Sub-system Version 0.2
vi. Synchronizing SDH/SONET Application Note 1264-2
viii. Training Team Tejas Networks slides.