SlideShare a Scribd company logo
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
International Bureau of Weights and Measures
25
26
27
28
29
30
31
32
33
34
35
36
37
However, RMS values are useful for characterizing or modeling jitter
accumulation in long line systems using SDH regenerators, for example, and the
appropriate specifications use this metric instead of Peak‐to‐Peak.
38
39
TIE is defined as the phase difference between the signal being measured and
the reference clock, typically measured in ns. TIE is conventionally set to zero at
the start of the total measurement period T. Therefore TIE gives the phase
change since the measurement began.
40
In order to calculate MTIE at a certain observation interval t from the
measurement of TIE, a time window of length t is moved across the entire
duration of TIE data, storing the peak value. The peak value is the MTIE(t) at that
particular t. This process is repeated for each value of t desired.
For example, the Figure in page 40 shows a window of length t=20 sec at a
particular position. The Peak‐to‐Peak TIE for that window is 4 ns. However, as the
20 sec window is slid through the entire measurement period the largest value20 sec window is slid through the entire measurement period, the largest value
of PPTIE is actually 11 ns (at about 30 sec into the measurement). Therefore
MTIE(20 s) = 11 ns.
41
The above Figure shows the complete plot of MTIE(t) corresponding to the plot
of TIE in the Figure in page 40. The rapid 8 ns transient at t = 30 s is reflected in
the value MTIE(t) = 8 ns for very small t.
It should be noted that the MTIE plot is monotonically increasing with
observation interval and that the largest transient masks events of lesser
amplitude.
42
43
The above Figure shows two plots of TDEV(t). The first plot (for T=100s),
corresponding to the TIE data of the Figure in page 40 shows TDEV rising with t.
This is because, for the short measurement period T=100s, the two transients in
that Figure dominate.
If we were to make a longer TIE measurement out to T = 250s, the effect of the
two transients on TDEV would become less, assuming there are no more
transients The TDEV characteristic labeled T=250 s would be the resulttransients. The TDEV characteristic labeled T=250 s would be the result.
It should also be noted that TDEV is insensitive to constant phase slope
(frequency offset).
To calculate TDEV for a particular t, the overall measurement period T must be at
least 3t. For an accurate measure of TDEV, a measurement period of at least
12t is required. This is because the rms part of the TDEV calculation requires
sufficient time to get a good statistical average.
44
45
46
47
1
2
3
4
5
6
7
8
A Cesium‐beam tube is always used in the generation of a PRC signal because the 
underlying physical principle assures that there is no systematic effect like aging 
which could lead to gradual frequency deviation
The only wear‐out mechanism is the limited reservoir of Cesium for the atomic 
particle beam
h l h l f f b b b d d hThis limits the lifetime of a Cesium‐beam tube to about 10 years, depending on the 
manufacturer and the type of tube
9
10
11
12
13
14
15
16
17
18
19
The SEC has been defined as the performance feature set for the equipment timing
generator of synchronous (especially SDH) telecom equipment (SETG). Its transfer
performance is defined between the (SDH) traffic port input and the (SDH) traffic port
output. Such timing generator is part of the Synchronous Equipment Timing Source
(SETG) function. This function adds a reference clock output selection scheme
(selectors A and C) for providing the T4 output. This output signal can either be a
copy of the internal system clock (T0, i.e. the SETG output) or it may be a reference
l d d d l f f h ff l h hsignal derived directly from one of those SDH traffic port input signals which are
configured as input references for the SETG. The SETS functional specification
(excluding the SEC function) is provided in EN 300 417‐6‐1. The SEC specification is in
EN 300 462‐5‐1
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
1
2
3
4
5
In large networks long chains of slave clocks may occur. This leads to phase jumps caused by
pointer actions (in mixed SDH/PDH networks) and to degradation of the synchronization
signal due to:
1. jitter and wander;
2. clock noise;
3. increasing probability of an interruption in the chain, possible disconnection of
large parts of the network from the PRC.
Because of its importance for the proper operation of the telecommunication network
special care must be taken to avoid the mentioned effects by:
1. deploying high‐quality slave clocks at suitable locations in the network, usually
in network nodes.
2. creating subnetworks with network elements supporting SSM‐controlled
automatic reconfiguration mechanisms.
3. planning the synchronization network so that, as far as possible, each network
element has access to several signals suitable as reference signals. This applies
particularly to node clocks.
Gives an example of a synchronization network, showing clock types and typical
architectural structures like network nodes with intra‐node synchronization
distribution, subnetworks suitable for synchronization transport (rings or chains of
SDH network elements).SDH network elements).
6
7
The figures , using the representation method of (ITU‐T Recommendation G.803), 
illustrates the architectural properties and resulting requirements of a master‐slave 
synchronization network:
1. The network consists of several levels related to the position of the clock along the
synchronization chain.
2. The highest level contains the PRC of the network. There should be a second PRC
for backup, if more than one PRC are active at the same time.
3. The highest level provides distribution of the synchronization reference signal to a
number of SSUs which constitutes the synchronization level 1.
4. Each of those SSUs supplies timing to a subnetwork in the second synchronization
level. The role of the SSU for the subnetwork is similar to the role of the PRC for the
whole network. If the SSU loses all reference signals coming from the PRC, it
serves as the reference source for the subnetwork.
5. Synchronization transfer between hierarchy levels is unidirectional, i.e.5. Synchronization transfer between hierarchy levels is unidirectional, i.e.
synchronization is always transferred from a higher to a lower level, otherwise
there is a risk of timing loops. If, e.g. in alternative synchronization paths, the
hierarchical order is changed, additional measures must be taken to avoid timing
loops.
6. The SSU associated with a subnetwork (e.g. a chain or ring of SDH network
elements) synchronizes the network elements in the subnetwork via transport
signals.signals.
7. An SSU may and should receive reference signals from several SSUs via different
paths.
8
9
10
11
12
For describing the synchronization transport in a chain of SDH network elements (NEs) it is
ffi i t t d ti f th h i ti f h i ill t t d i th Fisufficient to regard a section of the synchronization reference chain, as illustrated in the Figure.
Under normal operation the synchronization information (reference frequency and phase) is
transported from SSU1 which is assumed to be synchronized to a PRC, to SSU2 via a chain of
NEs containing an SEC.
Under normal operation the network elements between SSU1 and SSU2 perform the following
tasks in the transport of synchronization (numbers refer to the reference chain):
NE 1: Generate a transport signal whose timing is derived from the upstream SSU (which in
turn is synchronized to the PRC).
NEs 2..n‐1: Recover the clock from the incoming transport SDH signal and use it as reference
for the SEC. The timing of the outgoing transport signals is derived from the SETS.
NE n: Recover the clock from the incoming transport signal and generate a reference signal (T4)
for the SSU.
The rule "a slave clock of a certain quality level must never be synchronized from a lower‐
quality signal" requires that the reference output signal (T4) signal is squelched (switched off)q y g q p g ( ) g q ( )
when the quality falls below the SSU level (or, in some cases, below the PRC level). For that
purpose several signal criteria are supervised and the quality information in the
Synchronization Status Message is evaluated, if SSM processing is supported and enabled in the
NE.
Under a failure which interrupts the synchronization chain, the NEs in the chain are supplied
with synchronization from the downstream SSU, reversing the direction of synchronization
transport up to the point of the faulttransport up to the point of the fault.
13
Synchronization takes the following path from the SSU in node A to the SSU in node B:
1. The SSU in network node A receives a suitable reference signal traceable to the PRC
in the network (assumption).
2. The Timing Source SETS of the SDH Network Element in node A is synchronized
from the SSU in node A via a 2 048 kHz intra‐node synchronization signal.
3. All outgoing SDH signals are timed by the SETS.
4 The Transport Network Element in the chain extracts a reference signal from the4. The Transport Network Element in the chain extracts a reference signal from the
incoming STM‐N transport signal and passes it to the SETS. The outgoing STM‐N
signals, including the backward direction of the signal coming from node A are
timed by the SETS. Potential timing loops are prevented by the SSM
(Synchronization Status Message) in the STM‐N signals.
5. In network node B the reference signal extracted from the incoming STM‐N signal is
forwarded to the T4 output of the SETS, bypassing the internal oscillator of the
SETS. The SSU removes jitter and partly wander (above the cutoff frequency) and
gives a cleaned reference signal to the external input of the SETS.
14
With respect to synchronization, rings can be regarded as parallel chains between SSUs,
as shown in the Figure. The synchronization signal is injected into the ring at one of the
NEs of the ring via the external reference input and transported through one of the
SDH transport chains. At some other NE of the ring the reference signal is recovered
and passed to SSU 2.
With the parallel chains a ring offers some additional or different synchronization
properties compared to the chain:properties, compared to the chain:
1. Using automatic reconfiguration mechanisms, each NE in the ring can be reached
from the upstream SSU via two synchronization trails. Therefore it is not necessary
to inject synchronization from the downstream SSU into the ring, even under many
failure conditions.
2. The downstream SSU can be synchronized via either of the chains, i.e. via two
alternative synchronization trails. There are two single points of failure, the
"gateway" NEs to the SSUs. Those can be eliminated by injecting and extracting the
synchronization signal at two NEs.
Measures must be taken to avoid timing loops around the ring under certain failure
conditions in connection with automatic reconfiguration. A simple method is to restrict
the automatic reference selection process at two NEs in the ringthe automatic reference selection process at two NEs in the ring.
15
16
17
18
EN 300 462‐2 recommends that intra‐node synchronization distribution should
be in the form of a logical star. This configuration is illustrated in the Figure
NOTE: It is possible that the SSU is embedded within an NE; in this case it may
receive and transmit timing through transport signals.
19
Properties and functionalities of intra‐node synchronization:
1.Dedicated signals for synchronization transport to and from the node clock:
a) 2 048 kHz;
b) 2 048 kbit/s;
c) 2 048 kbit/s supporting Synchronization Status Messaging.
In currently existing networks the 2 048 kHz signal is predominantly used.
2.For robustness against faults in the synchronization transport several transport signals arriving at the node are
selected as potential reference sources. Which of the transport signals are suitable as potential reference sources is
determined from the network view during the network synchronization planning process.
3 Ensure that the reference signal at the inputs of the node clock has appropriate performance This can be achieved3.Ensure that the reference signal at the inputs of the node clock has appropriate performance. This can be achieved
in several ways:
a) Squelch the reference output (T4) at the NE if the quality indicated by the SSM in the incoming traffic signal is
below a threshold. The threshold must not be lower than the quality of the node clock (in holdover mode), i.e.
"SSU‐T“ or "SSU‐L". Additionally other supervision criteria like "Loss of Signal", "Loss of Frame" etc. are used
for squelching.
b) Supervise the signals at the inputs of the node clock with respect to frequency deviation, phase jumps etc.
c) Evaluate the SSM at the input of node clock. This requires that the SSM is conveyed to the node clock, i.e. the
f h kb / l huse of the 2 048 kbit/s signal with SSM.
d) Collect the quality information of the NEs in a management system and select the best signal at the node clock
by management command. This solution requires that the NEs and the node clock can be accessed from a
common management system.
4.Provide an SSM code for the STM‐N signals leaving the node. In order to insert the correct value it is necessary to
have the information about the quality of the reference signal in use at the node clock.
a) If the intra‐node synchronization distribution is done via 2 048 kHz signals the only way to “ transport “
information is squelching the signal dependent of some supervision criteria.q g g p p
b) If 2 048 kbit/s signals supporting SSM are used for intra‐node synchronization, the quality information can be
forwarded using the SSM. This solution requires that all involved pieces of equipment have 2 048 kbit/s
reference inputs and outputs and support SSM.
c) Transport the quality information via a management system (requirements see above).
d) If none of the listed options is available, a fixed SSM value must be inserted into the STM‐N signals leaving the
node. The assignment of the appropriate SSM is a task of synchronization planning.
20
The next figure shows an example of a network topology where equipment is
physically within a network node but belongs logically to a subnetwork (a ring)
synchronized from a different node clock. In order not to interfere with automatic
restoration processes and the dynamic properties of the ring the node clock must
not be integrated into the ring.
21
Currently in most network nodes intra‐node synchronization is based on 2 048 
kHz signals. The transport of information on these signals is limited to a binary 
information: on/off. It has been proposed to use 2 048 kbit/s signals with SSM for 
the communication with the SSU. A 2 048 kbit/s signal with SSM has been 
standardized (ITU‐T Recommendation G.704), but the introduction of this 
method requires suitable physical interfaces and evaluation processes in the SSU 
as well as in the transport network elements.
22
The figure shows in detail the synchronization flow in a node with SSU. The detailed view is necessary because of the
functionalities of the SETS.
From NE n to SSU:
NE n extracts a reference signal out of the incoming STM‐N signal and passes it to the T4 output. It is important to note that
the internal clock generator of NE n (SETG) is not involved in generating the T4 signal, otherwise a timing loop between NE n
and the SSU would be created.
As stated above NE n supervises the STM‐N signal selected for synchronization transport on the following criteria:
a) LOS: Loss Of Signal;
b) LOF: Loss Of Frame;
c) MS‐AIS: Multiplex Section‐Alarm Indication Signal;
d) SSM below Minimum Acceptable Quality Level (configurable);d) SSM below Minimum Acceptable Quality Level (configurable);
e) The implementation of further supervision criteria like EBER (Excessive Bit Error Rate) is equipment‐ (manufacturer‐)
dependant.
If the signal fails according to the supervision criteria, the T4 output is squelched (switched off).
Since the SSU is a level‐2 clock in the quality hierarchy ("SSU‐T" according to the scheme in EN 300 417‐6), the Minimum
Acceptable Quality Level must not be lower than "SSU‐T". Which of the two possible values "PRC" or "SSU‐T" has to be
configured, depends on the position of the clock in the synchronization network.
From SSU to NE n:
The SSU supplies a reference signal to all network elements in the node, including the network element that passes the
reference signal to the SSU. The SETS receives the reference signal from the SSU via the T3 input and uses the reference for
generating the outgoing STM‐N signals (in the Figure, only one signal is shown). A timing loop does not occur if the selection
switches in the SETS are properly set. The SSM in the outgoing STM‐N signals is set to a fixed value ("PRC" or "SSU‐T"), see
below.
From SSU to NE 1:
NE 1 represents all "normal" network elements in the node which are the beginning of SDH transport network chains. Those
network elements receive their reference signal via a 2 048 kHz signal, usually duplicated for reliability reasons, at their T3
input.
O bl i NE 1 h i f ti b t th h i ti t t f th SSU If th SSU i h i d d thOne problem is NE 1 has no information about the synchronization status of the SSU. If the SSU is synchronized and the
Minimum Acceptable Quality Level in NE n has been set to "PRC", the appropriate SSM would be PRC. If the SSU were in
holdover mode, "SSU‐T" would have to be inserted. Squelching the output of the SSU does not make sense because an SSU in
holdover mode delivers a reference which is orders of magnitude better than the SETS’ holdover mode. Currently the practice
is to insert a fixed value ("PRC" or "SSU‐T") into the outgoing STM‐N signals. Solutions are under study.
23
24
The major SDH NE of the node (which implements an SEC) may be used as the
node clock. A suitable large number of reference clock inputs (T1) should be
available to such a node in order to ensure that the SEC node almost never loses
all references to EN 300 462‐4 [4] or EN 300 462‐6 [6] clock sources. The output
of this major SDH NE is distributed via SDH interfaces to the other SDH NE’s of
the node (T1) and via 2 MHz, 2 Mbit/s interface to other equipment (T4).
25
Network nodes may form a cross point for several SDH ring networks which do or
do not exchange payload between them. In this case the basic entity for
synchronization is the ring network and not the node itself.
26
Such network node is similarly structured to the second example. The difference
is that in this case a synchronization signal is sent from one ring to an other. This
signal may either be a tributary SDH link (T1) or it may be a 2 MHz interface (T4 –
T3). Proper network synchronization design may not allow 2 Mbit/s making such
synchronization link bidirectional and controlled by the SSM because of the risk
of creating a timing loop in the network.
27
28
An alternative method to the master‐slave one is to distribute a synchronization signal
directly to each clock in the network. This method, referred to as "Distributed Master"
or "Distributed PRC" is feasible only with radio distribution because a wire‐based
distribution would require a complete extra network, which is by far too expensive.
As the main objective of a synchronization network is to synchronize all the SSUs, the
advantages of the distributed PRC method are not affected if only the SSUs are directly
GPS‐synchronized and the transport network elements are master‐slave‐synchronized.
29
The Figure illustrates the GPS‐based synchronization. The GPS system represents the PRC
of the network, the master‐slave distribution chains to the SSUs are replaced by the
satellite signals. A receiver processes the GPS signal and extracts a reference signal for
the SSU. Usually the synchronization distribution below the SSU level is identical to a
master‐slave‐synchronized network.
30
31
32
The advantages of the previous methods can be combined. The Figure shows an 
example with GPS receivers at selected locations in the network, e.g. at important 
network nodes with many pieces of equipment or nodes with few suitable reference 
signals.
The numbers around the SSUs indicate the priorities. The assignment of the priorities 
determines whether the network is master‐slave synchronized under normal operation 
with the GPS‐based references as backup or vice versa. Which of the options is chosen 
depends on the network topology and the operator’ s preferences.
Advantages and disadvantages
As this technique is a combination of different methods, it combines advantages and 
disadvantages of these methods.
33
34
35
NOTE: Some networks may have SDH Network Elements containing clocks other than
G.813 clocks. Provided that the quality level of these clocks is of lower quality than the
SSUs deployed in the network, for the purposes of this Appendix they can be considered
as SEC clocks.
36
The engineering of the synchronization area should be carried out before the equipment
is commissioned. The results of the network synchronization engineering process are
often described in a synchronization plan. This plan may contain maps of the area and all
offices with the normal and fall‐back references indicated, the values of all provisioned
parameters that affect the synchronization in the area and a log of all synchronization
related maintenance activities. The plan may also contain results of measurements and
evaluations on the synchronization network. The synchronization plan should be revised
each time new equipment is installed in a synchronization area. A synchronization
coordinator is usually nominated to maintain the synchronization plan and to co‐
ordinate the synchronization related activities in the synchronization areas.
37
Impairments in the synchronization network may force clocks to operate (temporarily)
without reference. This leads in general to increased octet‐slip rates, which degrades the
performance of the end‐to‐end service. These three methods exist to counter these
problems.
All three methods are used in the designs of clocks and of synchronization networks. In
the upper parts of the synchronization network hierarchy the first approach tends to be
favored, while in the lower parts of the synchronization network hierarchy it is the
second approach that is prevalent. In general a balance must be done between initial
investment, "cost of ownership" and reliability.
38
39
40
41
In the first stage the "SSU‐Level" is considered. The SSU‐Level of the synchronization
network consists of the PRCs and SSUs in a synchronization area plus all transport
facilities that are active or stand‐by carriers for synchronization information between
these clocks. The transport facilities between the PRCs and SSUs are considered
transparent for the timing information in the SSU‐Level view. The resulting network
contains only the SSUs and PRCs of the synchronization area.
42
The Figure present an example where the SSU‐Level is constructed from the complete
synchronization network.
43
In the first stage the "SSU‐Level" is considered. The SSU‐Level of the synchronization
network consists of the PRCs and SSUs in a synchronization area plus all transport
facilities that are active or stand‐by carriers for synchronization information between
these clocks. The transport facilities between the PRCs and SSUs are considered
transparent for the timing information in the SSU‐Level view. The resulting network
contains only the SSUs and PRCs of the synchronization area.
44
In the second stage the "SEC‐Level" is considered. The SEC‐Level consists of a number of
unconnected "SEC subnetworks", each consisting of SECs connected by STM‐N
connections. These SEC sub‐networks can be engineered separately.
45
Before embarking on the first stage of the synchronization network engineering, the
synchronization islands have to be known. This defines the PRC‐Level.
In fact, these two strategies can be considered as "extremes" on a continuous scale.
Actual sizes of synchronization areas can be anywhere in between these "extreme"
positions.
46
47
Generally, for an actual synchronization network a strategy somewhere between I and II
is selected., i.e. some (major) nodes have a PRC supplying the synchronization for a
certain sub‐domain of the total operator domain. Networks closer to a strategy II
implementation have shorter, thus more reliable, synchronization trails and also have
smaller, hence easier to engineer, synchronization areas. Networks closer to a strategy I
implementation have fewer synchronization areas, hence fewer pseudo‐synchronous
area boundary crossings in end‐to‐end connections and fewer installed PRC clocks.
48
NOTE: Strictly speaking, EN 302 084 only specifies the Jitter and Wander Network Limits 
for PDH and SDH networks. In practice, these same limits are often applied for other 
transport networks like GSM, ATM etc. as currently no alternative Recommendations 
exist for such networks.
49
The notion of "PRC Autonomy Period" sets a quality parameter for a clock. Knowing the PRC Autonomy Period of
a clock one can determine the following:a clock, one can determine the following:
1. Are multiple references to the SSU necessary? If the PRC Autonomy Period is longer than the time it takes to
repair a failure in the case of a single reference, operation with a single reference is sufficient.
2. How much time is available for a reference switch? If the PRC Autonomy Period is very long, one can make
reference switches manually after judging the impairments and consequences. On the other hand shorter
PRC Autonomy Periods require some kind of automatic reference switch process, which can be from a central
manager (generally a slower process) or made locally by the clock itself (generally a faster process).
3. What staffing levels are required to maintain the synchronization network? Do they need to be, for example,
on a 24 hour/7 day/week stand‐by or is 8 hour/5 day/week sufficient?/ y/ y / y/
The PRC Autonomy Period can be used to classify all SSUs in a synchronization area. The purpose of such a
classification is to be able to provide a hierarchy, based on the above defined "PRC Autonomy Period", among the
SSUs in the synchronization network. A division of SSUs according to their PRC Autonomy Period, the number of
Classes and their boundaries, will in general turn out to be different for different operators., depending on the
size of the synchronization areas, the number of SSUs per area and their quality. In most cases two Classes will
suffice, but more (or fewer) Classes are possible.
I l h ld id i SSU f "l Cl f PRC A t " t id th ti f fIn general one should avoid using an SSU of a "lower Class of PRC Autonomy" to provide the active reference for
an SSU of a "higher Class of PRC Autonomy". This means that in the tree diagram of the SSU network, the PRCs
are at the top and that in downward direction the SSUs are ordered according to their PRC Autonomy
classification; the best ones close to the top, the lowest at the bottom of the tree.
The restoration mechanism for most SSUs will in general be automatic, based on local decisions by the SSUs
themselves. All SSUs support a reference selection mechanism locally controlled by pre‐programmed priorities (in
addition they may also support other selection mechanisms). The method outlined here to design the SSU‐Level
synchronization network is based on the presence of this selection mechanism in all SSUs. Other methods, e.g.y p , g
based on centralized management can also be applied, but are not considered here.
50
SSUs below a certain PRC Autonomy Class need to have at least two independent references. It is
f h l f d b f d ll d f fimportant to verify that no timing loops are formed or can be formed, especially during or after reference
re‐arrangements. A labeling scheme can be applied in the engineering stage, as a simple tool to check
whether a proposed scheme of service and stand‐by reference provisionings (i.e. 1‐st, 2‐nd, etc. reference
priorities). This labeling scheme is described below. Several alternative methods exist to perform this type
of checking.
The idea is to assign to each SSU a label of the format N(m), where the N represents the PRC Autonomy
Class to which the SSU belongs and m is a sub‐number within that Class. A lower value of N or m representsg f p
an SSU that is higher in the hierarchy. The PRC gets the value N=1 assigned. The SSUs are labeled according
to the following rules:
I. Rule A: Any SSU that belongs to Class N and which gets all its references (i.e. including the stand‐by
references) from clocks of Class N‐1 or better, gets the label N(1) assigned.
II. Rule B: If an SSU of Class N gets some reference(s) from other clocks of the same Class N that have
labels N(k1), N(k2), etc, then it gets the label N(m) assigned, where m=1+MAX{k1, k2, … }.
III. Rule C: An SSU of Class N should never be allowed to use a reference of an SSU of Class N+1 or worse.
If it is possible to label all SSUs in a certain synchronization area according to the above rules, no timing
loops can be formed between the SSUs during, or after, synchronization reference switching with the
proposed scheme of service and stand‐by reference assignments. In order to apply N(m) labeling
successfully and to provide each SSU with at least two independent references, a sufficient number of
interconnections between the SSUs need to be present (in other words the SSUs need to be sufficiently
meshed).
Each time new SSUs are added or new interconnections are assigned to act as reference (service or stand‐
by), the complete SSU synchronization network has to be checked again for potential timing loops.
51
The scheme described above assumes that reference assignments and priorities are
static. If the information regarding all active and stand‐by synchronization trails and their
status is known at some central location, priorities and assignments can in principle be
dynamically reprovisioned, to counter failure situations. Each re‐provisioning should be
checked. This whole process could be performed manually or automatically.
52
Although timing loops should always be avoided by applying sound engineering of the
synchronization network, the insertion of SSUs with an absolute frequency offset detection at
strategic places in the network can provide an additional safeguard. Whenever a timing loop is
formed, the clocks in the loop, as a group, will start drifting in frequency in an uncontrolled manner.
This may increase the slip‐rate on traffic between equipment timed by clocks in the loop and
equipment outside the loop to unacceptable levels. Eventually, large frequency deviations may
cause the network to stop processing traffic altogether.
However, if one of the clocks in the loop is capable of detecting absolute frequency deviations
(sustained over some period of time) at an early stage, it can disqualify its current reference and
thereby breaking the loop. The better this frequency offset detection is, the lower the maximum
slip‐rate will be that can affect traffic from/to/via equipment in the loop. E.g. an absolute frequency
guard at 1×10‐8 will limit the slip rate to 6.9 slips/day, i.e. almost within the limits for acceptable
performance (5 slips/day) according to ITU‐T Recommendation G.822.
The more clocks in the network that support this frequency guarding, the higher the probability that
one of those clocks is actually part of a timing loop if it is accidentally created. Moreover, the size of
the affected area will generally be smaller in cases where timing loops are formed without a clock
with frequency guarding being part of it.
53
The SEC‐Level consists of many separated islands of SDH equipment with SEC clocks built in (see
the Figure in page 45). Each island is called an "SEC sub‐network". Within the SEC sub‐network
automatic restoration is mandatory because the PRC Autonomy Period of an SEC is typically well
below 1 minute. Restoration based on local SEC decisions is the fastest method. In most cases the
SEC level does not provide sufficient independent references to motivate the use of the N(m)
numbering scheme of the SSU‐Level also in the SEC‐Level. For example in linear or ring‐type
networks reference can only be from both neighbors, but only the upstream one can have a
"lower" N(m) number and so be a suitable reference. A back‐up reference is then not available.
By enhancing the priority selection with traceability information this problem can be overcome.
This mechanism is described in the Synchronization Status Message (SSM) protocol, specified in EN
300 417‐6‐1. This protocol is proposed to be used as reference restoration control mechanism at
the SEC‐Level.
54
The task of the synchronization engineer is to determine the provisionable parameters of the SSM
algorithm in each SEC sub‐network, such that under normal conditions the flow of the timing
information between the SSUs is according to the plan engineered for the SSU‐level and that in
failure situations the synchronization restores as well as possible without creating timing loops,
hierarchy violations (i.e. references with insufficient traceability becoming active), or instabilities.
The variables at his disposal are the selection of possible references (assignments/un‐assignments),
the setting of priorities for the assigned references, using fixed SSM assignments to certain
reference inputs and setting the squelch thresholds for synchronization outputs. Assignment and
priority setting have in general to be provisioned both for the internal oscillator (denoted as "T0" in
EN 300 462‐2) and for the external clock output (denoted as "T4" in EN 300 462‐2) of an SDH
network element. The interface between stand alone SSUs and SECs is assumed to be a 2 048 kHz
interface or a non‐SSM carrying dedicated 2 048 kbit/s link.
The number of possible different SEC sub‐network topologies is very large, but the size of the SEC
sub‐networks will be restricted, since in most cases the recommendation to limit the number of
SECs between SSUs that are adjacent in the SSU‐Level, to at most 20 clocks, will be honoured.
Although the number of possible SEC sub‐networks is very big, they mostly do not differ much in
principle, hence it is possible to come up with a limited number of example SEC subnetworks, work
out the SSM parameters for those, and adapt those examples for application to real SEC sub‐
networks.
55
1
2
3
4
By providing multiple references to each network element, one can select a stand‐by
input in case the active input fails. So in order to construct a reliable synchronization
network it is important that the trails that carry the synchronization to a central office
are protected by duplicated links, which are preferably routed via different
geographical paths.
5
Since distribution of synchronization is a function of the network as a whole and as
soon as a certain node switches reference the synchronization distribution may be
changed, care has to be taken that the restoration of one node does not lead to
undesirable effects on the network level. Therefore, any possible selection process
has to take the following boundary conditions into consideration:
1) When the timing network is restored, no timing loops may be created. This means
h l k b h d l h h l l d bthat no clock may be synchronized to a signal which ultimately was generated by
this same clock. Such loops may be unstable and may drift away in frequency.
2) When a clock goes into Hold‐Over it should not be a reference for a clock of
better stability than itself.
3) Each Network element should be synchronized to the highest quality available
synchronization source.
4) The number of reference switches should be as small as possible (This does not4) The number of reference switches should be as small as possible. (This does not
imply that non‐revertive schemes are preferred over revertive, it means that
"needless" reference switching and instabilities in the sync routing should be
avoided).
6
7
The reason is that a lot of time usually elapses before a manual switch command can
be given. The process requires that some kind of central point exists where all
(synchronization related) alarms are collected. Each time an alarm occurs a
knowledgeable person has to be called‐in, in order to make the decision on which
switches have to be made. In practice that restricts the application of manual
switching to telecommunication centers, which contain high stability clocks. The
stability of the involved clocks needs to be good enough to last for the duration of the
h h k l f drestoration process, which may take a couple of days.
8
To go one step beyond a manual restoration process, in the direction of automation,
is to introduce a network management function to replace the human operator. Such
a procedure reduces the maintenance costs, but it creates the problem that
algorithms are needed for intelligent synchronization control. An automated central
alarm collection and command issuing system is a prerequisite in order for this to
function and this system has to control the synchronization functionality of all
equipment in the synchronization network (including stand alone SSUs or SASEs).
In practice this method of control is today provided only in distributed PRC systems,
where two or three PRCs are present on different sites and each PRC can take over
the function of any other PRC in case of failures.
Another approach is to restore based on locally available information (incoming signal
failures) and some provisioned data in each node which the user programs duringfailures) and some provisioned data in each node, which the user programs during
installation and which is chosen in such a way that the proper restoration action is
taken, given its place in the synchronization network. This type of restoration scheme
reacts much faster than schemes that take the whole network in account and
switching in a node may take place within 1 second. Fast restoration implies that even
clocks with a relatively poor hold‐over stability (like SECs) can be restored fast enough
to keep the phase transients limited to 1 μs. And these are discussed in the comingto keep the phase transients limited to 1 μs. And these are discussed in the coming
slides
9
Normally the input with the highest priority is selected, but if it fails a switch is made
to the input of second priority. More inputs and priorities are possible.
In practice the priority tables are used in almost all PDH networks inside the
synchronization equipment and switch and cross‐connect equipment.
10
The synchronization status messages can be viewed as an addition to the priority
table method, because more information becomes available to each node in the form
of messages which are coded in the overhead of STM‐N or E1 (2 048 kbit/s) signals.
11
The methods based on priority tables and based on synchronization status messages
are worked out in more detail in the following slides.
In practical networks one can find a mixture of all these synchronization selection
methods.
12
13
Switching based on a priority table is a very simple algorithm. The user can assign a certain
priority to each incoming signal which can potentially be used as a timing reference. In
principle the equipment selects the signal coming in over the input with the highest priority
as its active reference. The other references are stand‐by.
The presence of the latter phenomena can be established by comparing the active
reference signal with the internal oscillator(s) and other input references and to use a
l h d f h ll h h hmajority vote algorithm to determine if the active input really has too high MTIE.
The presence of the latter phenomena can be established by comparing the active
reference signal with the internal oscillator(s) and other input references and to use a
majority vote algorithm to determine if the active input really has too high MTIE.
14
This latter method is specified in EN 300 417‐6 (in the "QL‐disabled" mode).
15
16
17
The first problem requires to rapidly resynchronize the SEC after it has lost its synchronization
reference input signal. Since the SEC's are typically arranged in a chain the re‐synchronization
requires to revert the direction of synchronization through a chain network.
In the case a SEC of the SDH sub‐network is running in the holdover mode the reference clock
output at some network element of the sub‐network may be traceable to that holdover SEC.
Since sound network synchronization operation requires not to slave a high quality clock (SSU
h ) l l l k (h ld ) h ff hin this case) to a low quality clock source (holdover SEC) it is necessary to switch off the
reference clock output in such case. The function providing such controlled switch off
capability is called squelch function.
For solving these problems the SSM had been introduced. The SSM is coded in the S1 byte of
the STM‐N section overhead and it provides the synchronization status of the equipment
being the source of the STM N signal in terms of traceability to clock sources compliant to thebeing the source of the STM‐N signal in terms of traceability to clock sources compliant to the
ITU‐T specifications EN 300 462‐6 (Primary Reference Clock), EN 300 462‐4 (Transit Node
Clock), EN 300 462‐7 (Local Node Clock), and EN 300 462‐5 (SEC) for their long term frequency
accuracy performance. A further state (DNU = do not use for synchronization) is sent on those
ports of an equipment which bear the risk of creating a timing loop if a neighbor network
element would select their output signal as a synchronization reference input signal.
18
The downstream neighbor network element, which is slaved to the reference signal
received from upstream keeps tracking this signal and its synchronization status will
drop from the quality it had before (PRC,SSU‐T, or SSU‐L) down to SEC.
Thus the QL‐SEC SSM is propagated all down the synchronization chain. If the
network element at the low end of the SEC chain receives the QL‐SEC SSM from
upstream and it has a better quality from downstream (e. g. from an SSU) it will
h h d f l h hsynchronize to that downstream reference signal. The new synchronization status
(better than SEC) is now sent upstream and the next upstream network element can
synchronize to the downstream. Thus the SEC's of the chain switch one after the
other to the synchronization reference signal received from downstream.
19
20
21
22
An SDH network element uses several criteria to select its active reference. First, the Quality Level of the signal is considered. All
references that have the highest available Quality Level are singled out. The Quality Level of a particular reference is eitherreferences that have the highest available Quality Level are singled out. The Quality Level of a particular reference is either
retrieved from the incoming signal overhead or it is programmed by the user. If an incoming reference exhibits signal fail (SF)
due to loss of signal, loss of frame or other causes, such a reference can be treated as if it has the quality level DNU.
After this procedure, the references that were singled out are ordered according to the priority that the user assigned to their
respective inputs. From this result the reference with the highest priority (within this group of references with the highest
quality level) is selected. In case some inputs have equal priorities assigned to them, the result may still be ambiguous. In case
multiple references satisfy these criteria, a reference switch is made to an arbitrary input, except when the current reference is
among this group, in that case no switch is made.
An alternative, but equivalent, method of description is that, given the priority and Quality Level of the current reference, all
h bl f l ll d h k f h h h h h l l h hother possible reference sources are continuously polled to check for one that has either a higher Quality Level or a higher
priority than the current selection. As soon as such a reference is found a reference switch is made to this new input, otherwise
the selection remains as is.
Since each network element has to select a reference not only for its internal clock, but also for its external synchronization
outputs, there are two independent processes of the above described type active to select the appropriate reference for both
purposes.
The reference that is eventually selected is forwarded to the internal clock or the external synchronization output circuitry.
These circuits may still reject the reference if the associated Quality Level is insufficient. The internal clock will reject the
reference if the Quality Level is lower than the Quality Level associated with its internal oscillator while the reference for thereference if the Quality Level is lower than the Quality Level associated with its internal oscillator, while the reference for the
external synchronization output will be rejected if its Quality Level is lower than a provisioned threshold. In the first case the
internal clock will go to hold‐over, in the latter case the external station clock output will be squelched, replaced by AIS or a DNU
message is inserted (depending on the format of the output signal).
Selection of a reference can be done by the above described automatic selection process, but it is also possible to force a certain
selection by means of special commands or lock‐out certain references from the selection process. Such commands can be
issued by the user through the management system.
The figure shows an example of the reference selector picking the input with the highest priority (input A has Priority 3, which is
better than input B with priority 4) between two inputs that both receive the highest quality level (A and B both receive QL =p p y ) p g q y (
PRC). Although inputs C and D have higher priorities, they will not be selected, because the incoming references via those inputs
have lower quality level.
NOTE: It should be noted that traffic protection and synchronization protection are independent processes, even if they are
carried on the same media.
23
In the last slide figure the outgoing Quality Levels are shown that correspond to the
current state of the input Quality Levels, all outputs carry "PRC" since that is the QL of
the selected input signal (input A). Output A however transmits "DNU", because this
signal is in the return direction of the selected input.
The message that is forwarded over the external synchronization output, provided
the output supports synchronization messaging, is the QL of the selected input. If no
f l bl h f l h l h h h ld h lreference is available with a QL of at least the squelch threshold, the external
synchronization output is squelched. This may be implemented as transmitting AIS or
DNU in 2 048 kbit/s or by turning the 2 048 kHz signal off.
24
The provisioning of the SSM parameters is an integral part of any network
synchronization design and network synchronization planning. In fact, proper
provisioning of these parameters is needed in order to achieve restoration of
synchronization under all realistic failure scenarios, while meeting the general
objectives for synchronization restoration as stated in the beginning of this clause.
25
26
27
The coming slides describe the configuration and architecture limitations required for 
supporting SSM’s in ring networks and in network nodes employing a SASE.
28
The Figure shows a simple 2‐fibre ring network which is connected in one location
(the hub‐node, i.e. the topmost node of the ring) to the synchronization of the main
network. The ring itself contains add/drop multiplexers (ADMs). Synchronization is
distributed via the hub‐node to the other nodes on the ring. The synchronization
signal obtained from the main network is in this example supposed to be traceable to
the PRC. This message is sent around the ring in both directions by the hub node.
Other nodes re‐transmit this message and return DNU (Do Not Use for
h )synchronization) upstream.
The provisioned port priorities determine how the timing flows in the ring when no
failures are present. In the example in Figure 35 the normal flow of timing is
clockwise through the ring, but it is also possible to time the ring partially clockwise
and partially counter‐clockwise by reversing the port priorities on a part of the nodes.
29
In case of a defect in one of the links that form the ring, the first downstream node
goes into Hold‐Over, since no other option is available. (The STM‐N from the other
direction is labeled "don’t use" and may not be selected. A timing loop would be
created if it was.) This node changes its sync message to "SEC". All downstream
network elements remain locked to the node in hold‐over. So, one by one all
downstream nodes replace their outgoing message by "SEC".
h f l d b f h h b d h ll l k d h hThe final node before the hub‐node however will not remain locked to the chain,
since it receives on the other STM‐N input a signal of higher quality, conveyed by the
message "PRC". This node will perform a reference switch and adapt its outgoing
SSMs accordingly. The Figure shows the situation at this moment.
30
Next, the node before the last node makes the same reference switch, since it can
now choose between a reference with quality level "SEC" from the original direction
and one with quality level "PRC" from the other direction (changed from "DNU"). This
process repeats until the node that originally switched to Hold‐Over is locked to the
timing signal from the other side of the ring. The final situation is depicted in the
above Figure.
h h l f f f d b f h dThe whole process of restoration, for rings of at most 20 nodes, must be finished
within 15 seconds. This ensures that the phase transient in the timing of the node in
hold‐over is less than 1 μs. As soon as the cable break has been repaired, the original
situation will be restored, due to the higher port priorities for references in the
original direction of synchronization.
31
32
In the above figure, each of the two external timing nodes (node with external
timing) can be synchronized, either by is external clock or via any of the 2 lines. In
case of failure of the active external clock in timing node 1, this node selects its
fourth priority, which carries the timing generated by itself. This is a timing loop
situation.
33
In this configuration, only one external reference is active on the ring in nominal
condition. This allows the use of single synchronization reference to synchronize the
whole ring. In nominal condition, timing node 1 delivers timing to all nodes of the
ring, including timing node 2.
Note that each timing node is not allowed to be synchronized on its west (east) line
port when it normally transmit synchronization to its east (west) line port so that it is
bl limpossible to generate a timing loop.
In this example, the 2 Quality levels of the signals provided to the 2 external timing
nodes are QL and QL*. They can be provisioned in the case of 2 MHz external timing
signals or read on the S1 byte in case of timing provided by a STM‐N tributary. These
2 quality levels can be different. In the Figure in this slide QL is higher or equal quality
than QL*; if not the timing node 2 would deliver the timing to the ring as it is thethan QL*; if not, the timing node 2 would deliver the timing to the ring as it is the
case in the coming slide Figure.
34
On this Figure, the external reference of timing node 1 fails; bold lines show how
synchronization is rearranged from timing node 2.
As an alternative, another configuration can be realized by changing the priorities of
timing node2. It is possible to configure the 2 external timing nodes 1 & 2 of timing
node 2 with priority 1 allocated to the external source. In this case, this means that
when QL and QL* are equal value, 2 external timings will be used simultaneously in
hthe ring.
35
36
37
The above flow diagram is derived from the maintenance procedure as described in 
ITU‐T Recommendation M.2130.
38
39
40
41
42
1
2
3
4
5
Frequency synchronization is also referred to as clock synchronization. It keeps
consistency between the frequencies or phases of clock signals to ensure that all
devices on the communication network work at the same rate.
Information is coded into discrete pulses through pulse code modulation (PCM) andInformation is coded into discrete pulses through pulse code modulation (PCM) and
transmitted on the data communication network. If the clock frequencies of two
digital switching devices are different, or the digital bit streams transmitted between
the two devices are added with phase drift and jitter due to interference and damage
during the transmission, the bits in the buffer of the digital switching system may be
lost or duplicated, resulting in slip in the bit stream.
In the Figure, watch A and watch B show different time but they keep a constant timeIn the Figure, watch A and watch B show different time but they keep a constant time
difference, for example, 6 hours. This is called frequency synchronization.
6
Time synchronization means to adjust the internal clock of the local device according
to the received time information. Time synchronization and frequency
synchronization follow similar principles. That is, both the frequency and phase of the
clock are adjusted, and the phase of the clock is represented by a number, that is, a
time point Differing from frequency synchronization time synchronization adjuststime point. Differing from frequency synchronization, time synchronization adjusts
the clock discontinuously by receiving discontinuous time information. The
adjustment of the Phase‐Locked Loop (LLP) of the device clock is periodical.
Time synchronization involves two major functions: time service and time keeping.
Time service is to adjust the clock according to the standard time. By adjusting the
clock at irregular intervals, a device synchronizes its phase with the standard
reference time. Time keeping refers to frequency synchronization. It ensures that thereference time. Time keeping refers to frequency synchronization. It ensures that the
difference between the time on the local device and the standard reference time is
within a reasonable range during the interval of clock adjustment.
In the Figure, watch A and watch B always keep the same time. This is called phase
synchronization.
7
8
9
As an asynchronous system, the Ethernet can function properly without a high‐
precision clock. Consequently, most Ethernet devices do not provide high‐precision
clocks. Nevertheless, this does not mean that the Ethernet is unable to provide a
high‐precision clock. Actually, the Ethernet uses serial code streams to transmit clock
signals at the physical layer just as the SDH does; and the receiver must be able tosignals at the physical layer just as the SDH does; and the receiver must be able to
recover the clock. Otherwise, communication fails. In other words, the Ethernet itself
is capable of transmitting clock signals, but this capability is not actually used.
From a technical perspective, the clock obtained from the physical layer of the
Ethernet is even more precise than that obtained using the SDH technology. For a
clock to be obtained from the code stream of a line, there must be sufficient clock
transitions in the code stream. In other words, the code stream cannot contain tootransitions in the code stream. In other words, the code stream cannot contain too
many consecutive 1s or 0s. By performing a random scrambling, SDH significantly
lowers the possibility of consecutive 1s and 0s. Nevertheless, consecutive 1s and 0s
do occur. The physical layer codes of the Ethernet are in the form of 4B/5B (FE) and
8B/10B (GE). This means that for every 4 bits, one additional bit is added to eliminate
the possibility of four consecutive 1s or 0s. This facilitates recovery of the clock.
10
The sender switch transmits the high‐precision clock to the Ethernet PHY chip. The
Ethernet PHY chip then sends data with the high‐precision clock to the receiver
switch. The PHY chip of the receiver switch extracts the clock from the data code
stream. Clock precision does not decrease in this process. This is the basic
mechanism of synchronous Ethernetmechanism of synchronous Ethernet.
11
The code stream transmitted at the physical layer of the Ethernet contains sufficient
clock transitions. Clock transitions occur even when no data is being transmitted. This
nature of the Ethernet enables the Ethernet to recover the clock from the link. The
sender sends high‐precision clock signals, and the receiver recovers the clock signals
from the link The clock signals pass through a jitter attenuation circuit to reducefrom the link. The clock signals pass through a jitter attenuation circuit to reduce
jitters generated on the link and then can be used as the clock in the system.
The Ethernet and TDM network both support clock recovery. On the Ethernet,
however, low‐precision clock signals are transmitted to save costs. The clock recovery
function of the Ethernet is ignored, but it does not mean that the Ethernet cannot
transmit high‐precision clock.
12
To select the clock source correctly, devices on the network also transmit the
Synchronous State Message (SSM) with the clock information. On the SDH network,
the quality level of the clock is transmitted through the outband overhead byte in the
SDH frame. There is no outband tunnel on the Ethernet. Therefore, the downstream
device sends SSM messages to notify the downstream device of the quality level of adevice sends SSM messages to notify the downstream device of the quality level of a
clock.
13
The ESMC (Ethernet Synchronization Massage Channel) messages are transmitted
through the IEEE 802.3 Organization Specific Slow Protocol (OSSP). In addition, ESMC
messages and ESSM (Ethernet SSM) messages are transmitted separately so that
Sync‐E interfaces and non‐Sync‐E interfaces are compatible with each other.
14
The frequency for sending these messages is configurable. Generally, the acceptable
frequency is 1 frame per second (fps). When to send the messages and how to
process the message have not been defined yet, but the frame format of the message
has been defined as follows:
1 The frame is a slow protocol frame and uses the format of a standard Ethernet1. The frame is a slow protocol frame and uses the format of a standard Ethernet
frame.
2. The frame uses the unique destination MAC address 0x0180C2000002.
3. The value of the Length/Type field is the same as that in the slow protocol frame
(value 0x8809).
4. The frame has a subtype field 0x0A to identify the organizational protocol.
15
16
17
The Ethernet became the IEEE 802.3 standard in 1985. In 1995, the data transmission
rate is increased from 10 Mbit/s to 100 Mbit/s. During the increase of transmission
rate, the computer and network industry were trying to solve the problem of timing
synchronization on the Ethernet.
18
19
The PTP defines the following types of clock devices:
1. Ordinary clock (OC): has only one physical port to the network. The OC can be
used as the grandmaster clock or slave clock. It can send and receive PTP
messages and supports the synchronization hierarchy determining mechanism. In
addition it supports the Delay mechanism and Pdelay mechanismaddition, it supports the Delay mechanism and Pdelay mechanism.
2. Boundary clock (BC): has multiple physical ports to the network. Each physical
port is similar to the physical port of the OC and can be connected to multiple
sub‐domains. The BC can be used as the intermediate transit device.
3. End‐to‐end transparent clock (E2E TC): has multiple ports. The E2E TC can forward
all PTP messages and can correct the residential time of PTP event messages. The
ports of the E2E TC do not have a protocol engine and do not determine the
master and slave status of the clock.master and slave status of the clock.
4. Peer‐to‐peer transparent clock (P2P TC): has multiple ports and each port has a
Pdelay processing module to support the Pdelay mechanism. The ports of the P2P
TC do not have a protocol engine and do not determine the master and slave
status of the clock.
5. PTP management device: has multiple ports, including the management port
used to send PTP Management messages.
20
21
22
23
24
25
The Erbest denote the Announce message that is the best of all the Announce
messages received on port r since the last time the BMC algorithm was executed at
this node. And the Ebest denote the best of all the Erbest for the node
For an OC E = E since r =1 in this caseFor an OC, Ebest = Erbest since r =1 in this case
26
1. Sending and receiving Announce messages: The OC or BC devices exchange their
own grandmaster clock parameters. The information in the Announce messages is
from the data set of each device.
2 Running the BMC algorithm: When receiving Announce messages a device runs2. Running the BMC algorithm: When receiving Announce messages, a device runs
the BMC algorithm to compare the grandmaster clock parameters in the
Announce messages. Then the device selects the port that receives the Announce
message with the best grandmaster parameters as the grandmaster clock or
announces itself as the grandmaster clock. The device also calculates the
recommended status of each port.
3. Updating the data set: According to the recommended status calculated through3. Updating the data set: According to the recommended status calculated through
the BMC algorithm, each device updates the data set.
4. Determining the port status: The state machine of each port determines the
status of the interface according to the recommended status calculated through
the BMC algorithm and the actual status of the port. Then the master‐slave
hierarchy is established in the entire domain.
27
As shown in the preceding figure, the time synchronization process is as follows:
1. The master clock sends a Sync message at t1.
2. The slave clock receives the Sync message at t2.
3 The slave clock sends a Req message at t3. The slave clock sends a Req message at t3.
4. The master clock receives the Req message at t4.
5. The master clock sends a Resp message containing t4 to the slave clock.
Then, t2 ‐ t1 = Delay + Offset
t4 ‐ t3 = Delay ‐ Offset
That is:That is:
Offset = [(t2 ‐ t1) ‐ (t4 ‐ t3)]/2
Delay = [(t2 ‐ t1) + (t4 ‐ t3)]/2
28
The frequency synchronization process is as follows:
1. The slave device calculates the corrected time when each Sync message arrives at
the slave port based on the time of the master device, that is, the set off time of
the Sync message plus the delay of the paththe Sync message plus the delay of the path.
2. The slave device calculates the interval between each two Sync messages based
on the corrected time, and the interval between each two Sync messages based
on the arriving timestamp on the slave port. Then, the slave device calculates the
proportion factor between the two types of interval.
3. The slave clock adjusts its clock frequency according to the proportion factor.
Proportion factor = [(T1N+tN) ‐ (T10+t0)]/[T2N ‐ T20]
29
When a PTP message traverses the protocol stack on a node, the timestamp of the message
is selected among the reference points defined by the protocol stack (A, B, C in the above
figure). The closer a reference point is to the actual physical connection point, the smaller
the timing error is. Point A in the above figure is the best reference point.
NOTE: IEEE 1588 cannot measure the asymmetric path delays between the master and slave
devices. The asymmetric path delays can only be measured by other means and provided for
IEEE 1588.
What is asymmetric correction?
1. When the communication path is symmetric, the path delay is the same in both
directions of the path. In this case, the average path delay can be used to calculate thedirections of the path. In this case, the average path delay can be used to calculate the
unidirectional path delay.
2. When the communication path is asymmetric, the path delays in the two directions of
the path are different. In this case, asymmetric correction needs to be performed on the
average path delay to obtain the unidirectional path delay.
The delayAsymmetry parameter needs to be used to calculate the actual path delay from the
master to the slave or from the responder to the requester.p q
tms = <meanPathDelay> + delayAsymmetry,
tsm = <meanPathDelay> ‐ delayAsymmetry.
30
31
All PTP messages consist of a header, a body, and a suffix. 
1. Header: It is the general packet header consisting of 34 bytes. The header is the 
forepart of the 10 types of PTP messages. 
2 Body: The contents of the body identify the type of a PTP message2. Body: The contents of the body identify the type of a PTP message. 
3. Suffix: This field can be filled with 0s or TLVs to expand the functions of the PTP 
protocol.
32
The general header of a PTP message contains the following fields: 
1.transportSpecific:
 0: indicates that the PTP message is used by IEEE 1588. 
 1: indicates that the PTP message is used by 802.1as. 
2.messageType: indicates the type of the PTP message. 
 0: Sync message y g
 1: Delay_Req message 
 2: Pdelay_Req message 
 3: Pdelay_Resp message 
 4‐7: reserved 
 8: Follow_Up message 
 9: Delay_Resp message 
 A: Pdelay_Resp_Follow_Up message 
 B: Announce messageB: Announce message 
 C: Signaling message 
 D: Management message 
 E‐F: reserved 
3.versionPTP: indicates the version of IEEE 1588. 
4.messageLength: indicates the length of the PTP message. 
5.domainNumber: indicates the domain that the sender of the PTP message belongs to. 
6.correctionField: is the correction value expressed in ns multiplied by 216. For example, if the correction 
value is 2 5 ns the value of this field is 0x28000value is 2.5 ns, the value of this field is 0x28000. 
7.sourcePortIdentity: indicates the clock ID and the port that sends the PTP message. 
8.sequenceld: indicates the sequence number of the PTP message and the relationship between consecutive 
PTP messages. 
9.controlField: depends on the message type and is used for compatibility with IEEE 1588v1. 
10.logMessageInterval: indicates the interval for sending PTP messages, depending on the message type. 
33
34
35
1. Delay jitter of the protocol stack:
 The simplest implementation of PTP is to use it as a common application on the top of the
network protocol stack. Timestamps are generated on the application layer. Therefore, the
delay jitter in the protocol stack causes errors in timestamps. Typical errors of timestamps
range from 100 µs to several milliseconds.
 If timestamps are generated at the interrupt level rather than the application level, the delay
jitter can be reduced to about 10 µs. The actual jitter depends on the application at the
interrupt level and the service traffic on the network.
 The hardware assistant technology can minimize the delay jitter in the protocol stack by
generating timestamps at the physical layer of the protocol stack. The delay jitter can be
controlled in an order of ns. The error of the timestamp is caused by the phase locking
feature of the PHY chip used to recover the clock from data streams and synchronize data.
2. Delay jitter during forwarding
 Network components introduce jitter when transmitting messages, which reduces the
accuracy of the offsetFromMaster and meanPathDelay values.
 High‐priority services have smaller delay jitter when being forwarded. On the bridge and
router that can differentiate service priorities, you can set the priority of the PTP event
messages to be higher than the priority of other data packets, reducing the jitter of the PTP
event messages.
3 A f i3. Accuracy of timestamps
 The clock that is used to generate timestamps required by PTP must retain the ideal
accuracy. The local clock frequency of the TC or slave clock is usually different from the clock
frequency of the grandmaster clock, which affects the accuracy of timestamps.
36
37
38
39
40
11/17/2013
1
NETWORK TIME PROTOCOL -
NTP
INTRODUCTION
 NTP is a protocol for synchronizing the clocks on
computers over packet-switched data networkscomputers over packet switched data networks
 NTP delivers accurate and reliable time in spite
of faults in the network
 Provides a connectionless service (UDP in the
AbuZarGhalib
Transport Layer)
 NTP is used on Internet
2
11/17/2013
2
CLOCK STRATA 1/2
 NTP uses a hierarchical organization of
clocksclocks
 Stratum 0- Composed by: Atomic Clocks, GPS
Clocks.
 Stratum 1 – Primary
 Time Servers- Computers attached to stratus 0 devices
 They act as servers for requests from Stratus 2
 Stratum 2
AbuZarGhalib
 Computers sending NTP requests to Time Servers in Stratum 1
 Computers in this level will reference to several time servers to
synchronize their clocks
 S2 Computers will peer with another S2 computers to provide
more reliable and robust time for all devices in the peer group
 They act as servers for requests from Stratus 3
3
CLOCK STRATA 2/2
 Stratum 3, 4, …
 Computers employ the same NTP function as in Stratum 2
 Potentially up to 16 levels
AbuZarGhalib
4
11/17/2013
3
NTP - SYNCHRONIZATION SUBNET
 Computer local clock are synchronized to a
number of Time Servers and peer computernumber of Time Servers and peer computer
 The set of these computers and Time Servers is
known as the Synchronization Subnet
 The Stratum Number for each computer is
AbuZarGhalib
determined by the hop count to the root (Strata 0)
5
NTP - SYNCHRONIZATION SUBNET:
EXAMPLE
AbuZarGhalib
6
11/17/2013
4
NTP - DETERMINING TIME
 Timestamps exchanged between the server and
clients (subnet peers)clients (subnet peers)
AbuZarGhalib
7
NTP - DETERMINING TIME:
EXAMPLE
AbuZarGhalib
8
11/17/2013
5
REFERENCES
 D. Mills, “Internet Time Synchronization: The
Network Time Protocol”, IEEE Trans. onNetwork Time Protocol , IEEE Trans. on
Communications, vol. 39, no. 10, pp. 1482 – 1493,
Oct. 1991.
 NTP: The Network Time Protocol - www.ntp.org
AbuZarGhalib
 Wikipedia - www.wikipedia.com
9

More Related Content

What's hot

4.4 diversity combining techniques
4.4   diversity combining techniques4.4   diversity combining techniques
4.4 diversity combining techniques
JAIGANESH SEKAR
 
Synchronization in SDH network
Synchronization in SDH networkSynchronization in SDH network
Synchronization in SDH network
asifmatin
 
OFDM_Behind 4G technology
 OFDM_Behind 4G technology OFDM_Behind 4G technology
OFDM_Behind 4G technology
Fouad Hasan Meraj
 
Rake Receiver
Rake ReceiverRake Receiver
Rake Receiver
ManochandarThenralma
 
Multiple access techniques for wireless communication
Multiple access techniques for wireless communicationMultiple access techniques for wireless communication
Multiple access techniques for wireless communication
Dr.Umadevi V
 
Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)
Gagan Randhawa
 
8051 serial communication-UART
8051 serial communication-UART8051 serial communication-UART
8051 serial communication-UART
Pantech ProLabs India Pvt Ltd
 
Cross Bar Switching
Cross Bar SwitchingCross Bar Switching
Cross Bar Switching
Saravanan Sukumaran
 
Phase shift keying Presentation
Phase shift keying PresentationPhase shift keying Presentation
Phase shift keying Presentation
Pavan Goswami
 
PSK (PHASE SHIFT KEYING )
PSK (PHASE SHIFT KEYING )PSK (PHASE SHIFT KEYING )
PSK (PHASE SHIFT KEYING )
vijidhivi
 
Equalization
EqualizationEqualization
Equalization
@zenafaris91
 
03 time division-multiplexing
03 time division-multiplexing03 time division-multiplexing
03 time division-multiplexingRafeek Mohamed
 
Data communications Class notes
Data communications  Class notesData communications  Class notes
Data communications Class notes
Dr.YNM
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
DhanashriNandre
 
Multiplexing FDM and TDM
Multiplexing FDM and TDMMultiplexing FDM and TDM
Multiplexing FDM and TDM
aliahmadfarooq
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrum
Harshit Gupta
 
NYQUIST CRITERION FOR ZERO ISI
NYQUIST CRITERION FOR ZERO ISINYQUIST CRITERION FOR ZERO ISI
NYQUIST CRITERION FOR ZERO ISI
FAIZAN SHAFI
 
Lecture 22 Threshold effects in FM.pptx
Lecture 22 Threshold effects in FM.pptxLecture 22 Threshold effects in FM.pptx
Lecture 22 Threshold effects in FM.pptx
infomerlin
 
Linear Predictive Coding
Linear Predictive CodingLinear Predictive Coding
Linear Predictive Coding
Shruti Bhatnagar Dasgupta
 

What's hot (20)

4.4 diversity combining techniques
4.4   diversity combining techniques4.4   diversity combining techniques
4.4 diversity combining techniques
 
Synchronization in SDH network
Synchronization in SDH networkSynchronization in SDH network
Synchronization in SDH network
 
OFDM_Behind 4G technology
 OFDM_Behind 4G technology OFDM_Behind 4G technology
OFDM_Behind 4G technology
 
Rake Receiver
Rake ReceiverRake Receiver
Rake Receiver
 
Multiple access techniques for wireless communication
Multiple access techniques for wireless communicationMultiple access techniques for wireless communication
Multiple access techniques for wireless communication
 
Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)
 
8051 serial communication-UART
8051 serial communication-UART8051 serial communication-UART
8051 serial communication-UART
 
Cross Bar Switching
Cross Bar SwitchingCross Bar Switching
Cross Bar Switching
 
Phase shift keying Presentation
Phase shift keying PresentationPhase shift keying Presentation
Phase shift keying Presentation
 
PSK (PHASE SHIFT KEYING )
PSK (PHASE SHIFT KEYING )PSK (PHASE SHIFT KEYING )
PSK (PHASE SHIFT KEYING )
 
Equalization
EqualizationEqualization
Equalization
 
03 time division-multiplexing
03 time division-multiplexing03 time division-multiplexing
03 time division-multiplexing
 
Data communications Class notes
Data communications  Class notesData communications  Class notes
Data communications Class notes
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
 
SDH Frame Structure
SDH Frame StructureSDH Frame Structure
SDH Frame Structure
 
Multiplexing FDM and TDM
Multiplexing FDM and TDMMultiplexing FDM and TDM
Multiplexing FDM and TDM
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrum
 
NYQUIST CRITERION FOR ZERO ISI
NYQUIST CRITERION FOR ZERO ISINYQUIST CRITERION FOR ZERO ISI
NYQUIST CRITERION FOR ZERO ISI
 
Lecture 22 Threshold effects in FM.pptx
Lecture 22 Threshold effects in FM.pptxLecture 22 Threshold effects in FM.pptx
Lecture 22 Threshold effects in FM.pptx
 
Linear Predictive Coding
Linear Predictive CodingLinear Predictive Coding
Linear Predictive Coding
 

Viewers also liked

Embedded systems-for-beginners-electro8
Embedded systems-for-beginners-electro8Embedded systems-for-beginners-electro8
Embedded systems-for-beginners-electro8
Electro 8
 
Mba business school india mumbai worldclass
Mba business school india mumbai  worldclassMba business school india mumbai  worldclass
Mba business school india mumbai worldclassPiyush Sah
 
Edket pitch v8_ru
Edket pitch v8_ruEdket pitch v8_ru
Edket pitch v8_ruizayniev
 
Edu market pitch_v6_ru
Edu market pitch_v6_ruEdu market pitch_v6_ru
Edu market pitch_v6_ruizayniev
 
Simple solution e8
Simple solution e8Simple solution e8
Simple solution e8Electro 8
 
Social Fundraising Seminar, presented at Silicon Valley SCORE 9/23/13
Social Fundraising Seminar, presented at Silicon Valley SCORE 9/23/13Social Fundraising Seminar, presented at Silicon Valley SCORE 9/23/13
Social Fundraising Seminar, presented at Silicon Valley SCORE 9/23/13
YapperGirl
 
Social Engagement Strategies: Attracting New Audiences and Funding in the Age...
Social Engagement Strategies: Attracting New Audiences and Funding in the Age...Social Engagement Strategies: Attracting New Audiences and Funding in the Age...
Social Engagement Strategies: Attracting New Audiences and Funding in the Age...
YapperGirl
 
Mba business school india mumbai finance it accounting marketing
Mba business school india mumbai  finance it accounting marketingMba business school india mumbai  finance it accounting marketing
Mba business school india mumbai finance it accounting marketingPiyush Sah
 
Virtual iMac
Virtual iMacVirtual iMac
Virtual iMacbillhot97
 
Edket pitch v8_b2b_ru
Edket pitch v8_b2b_ruEdket pitch v8_b2b_ru
Edket pitch v8_b2b_ruizayniev
 
Str 581 final exam answers set 2
Str 581 final exam answers set 2Str 581 final exam answers set 2
Str 581 final exam answers set 2homeworklikeaboss
 
The Time Is Now The Convergence Of Networks, Time Synchronization And Inform...
The Time Is Now  The Convergence Of Networks, Time Synchronization And Inform...The Time Is Now  The Convergence Of Networks, Time Synchronization And Inform...
The Time Is Now The Convergence Of Networks, Time Synchronization And Inform...
Ben Rothke
 
Telecordia NIST/WSTS Workshop: Mobile Backhaul Synchronization
Telecordia NIST/WSTS Workshop: Mobile Backhaul SynchronizationTelecordia NIST/WSTS Workshop: Mobile Backhaul Synchronization
Telecordia NIST/WSTS Workshop: Mobile Backhaul Synchronization
ADVA
 
2 ro-pdh-sonet-sdh
2 ro-pdh-sonet-sdh2 ro-pdh-sonet-sdh
2 ro-pdh-sonet-sdh
kongara
 
Random broadcast based distributed consensus clock synchronization for mobile...
Random broadcast based distributed consensus clock synchronization for mobile...Random broadcast based distributed consensus clock synchronization for mobile...
Random broadcast based distributed consensus clock synchronization for mobile...
LogicMindtech Nologies
 
Symmetricom Telecom Profile_Webinar
Symmetricom Telecom Profile_WebinarSymmetricom Telecom Profile_Webinar
Symmetricom Telecom Profile_WebinarSymmetricomSYMM
 

Viewers also liked (20)

Embedded systems-for-beginners-electro8
Embedded systems-for-beginners-electro8Embedded systems-for-beginners-electro8
Embedded systems-for-beginners-electro8
 
Mba business school india mumbai worldclass
Mba business school india mumbai  worldclassMba business school india mumbai  worldclass
Mba business school india mumbai worldclass
 
Edket pitch v8_ru
Edket pitch v8_ruEdket pitch v8_ru
Edket pitch v8_ru
 
Edu market pitch_v6_ru
Edu market pitch_v6_ruEdu market pitch_v6_ru
Edu market pitch_v6_ru
 
Simple solution e8
Simple solution e8Simple solution e8
Simple solution e8
 
Social Fundraising Seminar, presented at Silicon Valley SCORE 9/23/13
Social Fundraising Seminar, presented at Silicon Valley SCORE 9/23/13Social Fundraising Seminar, presented at Silicon Valley SCORE 9/23/13
Social Fundraising Seminar, presented at Silicon Valley SCORE 9/23/13
 
Social Engagement Strategies: Attracting New Audiences and Funding in the Age...
Social Engagement Strategies: Attracting New Audiences and Funding in the Age...Social Engagement Strategies: Attracting New Audiences and Funding in the Age...
Social Engagement Strategies: Attracting New Audiences and Funding in the Age...
 
Mba business school india mumbai finance it accounting marketing
Mba business school india mumbai  finance it accounting marketingMba business school india mumbai  finance it accounting marketing
Mba business school india mumbai finance it accounting marketing
 
Virtual iMac
Virtual iMacVirtual iMac
Virtual iMac
 
Edket pitch v8_b2b_ru
Edket pitch v8_b2b_ruEdket pitch v8_b2b_ru
Edket pitch v8_b2b_ru
 
Bus 475 final exam answers
Bus 475 final exam answersBus 475 final exam answers
Bus 475 final exam answers
 
Str 581 final exam answers set 2
Str 581 final exam answers set 2Str 581 final exam answers set 2
Str 581 final exam answers set 2
 
Asma
AsmaAsma
Asma
 
The Time Is Now The Convergence Of Networks, Time Synchronization And Inform...
The Time Is Now  The Convergence Of Networks, Time Synchronization And Inform...The Time Is Now  The Convergence Of Networks, Time Synchronization And Inform...
The Time Is Now The Convergence Of Networks, Time Synchronization And Inform...
 
Chap 5
Chap 5Chap 5
Chap 5
 
Telecordia NIST/WSTS Workshop: Mobile Backhaul Synchronization
Telecordia NIST/WSTS Workshop: Mobile Backhaul SynchronizationTelecordia NIST/WSTS Workshop: Mobile Backhaul Synchronization
Telecordia NIST/WSTS Workshop: Mobile Backhaul Synchronization
 
Precision clock synchronization_wp
Precision clock synchronization_wpPrecision clock synchronization_wp
Precision clock synchronization_wp
 
2 ro-pdh-sonet-sdh
2 ro-pdh-sonet-sdh2 ro-pdh-sonet-sdh
2 ro-pdh-sonet-sdh
 
Random broadcast based distributed consensus clock synchronization for mobile...
Random broadcast based distributed consensus clock synchronization for mobile...Random broadcast based distributed consensus clock synchronization for mobile...
Random broadcast based distributed consensus clock synchronization for mobile...
 
Symmetricom Telecom Profile_Webinar
Symmetricom Telecom Profile_WebinarSymmetricom Telecom Profile_Webinar
Symmetricom Telecom Profile_Webinar
 

Similar to Synchronization Overview

SONET.pdf
SONET.pdfSONET.pdf
SONET.pdf
Jayaprasanna4
 
Design Of Sub Synchronous Damping Controller (SSDC) For TCSC To Improve Power...
Design Of Sub Synchronous Damping Controller (SSDC) For TCSC To Improve Power...Design Of Sub Synchronous Damping Controller (SSDC) For TCSC To Improve Power...
Design Of Sub Synchronous Damping Controller (SSDC) For TCSC To Improve Power...
inventionjournals
 
Synchronization of Photo-voltaic system with a Grid
Synchronization of Photo-voltaic system with a GridSynchronization of Photo-voltaic system with a Grid
Synchronization of Photo-voltaic system with a Grid
IOSR Journals
 
A Novel Direct Torque Control for Induction Machine Drive System with Low Tor...
A Novel Direct Torque Control for Induction Machine Drive System with Low Tor...A Novel Direct Torque Control for Induction Machine Drive System with Low Tor...
A Novel Direct Torque Control for Induction Machine Drive System with Low Tor...
IAES-IJPEDS
 
Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...
Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...
Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...Cemal Ardil
 
Four Switch Three Phase Inverter using Space Vector Modulation
Four Switch Three Phase Inverter using Space Vector ModulationFour Switch Three Phase Inverter using Space Vector Modulation
Four Switch Three Phase Inverter using Space Vector Modulation
Biprajit Routh
 
Frequency domain behavior of S-parameters piecewise-linear fitting in a digit...
Frequency domain behavior of S-parameters piecewise-linear fitting in a digit...Frequency domain behavior of S-parameters piecewise-linear fitting in a digit...
Frequency domain behavior of S-parameters piecewise-linear fitting in a digit...
Piero Belforte
 
An Adaptive Neuro-Fuzzy Inference Distributed Power Flow Controller (DPFC) in...
An Adaptive Neuro-Fuzzy Inference Distributed Power Flow Controller (DPFC) in...An Adaptive Neuro-Fuzzy Inference Distributed Power Flow Controller (DPFC) in...
An Adaptive Neuro-Fuzzy Inference Distributed Power Flow Controller (DPFC) in...
IAES-IJPEDS
 
Clock distribution in high speed board
Clock distribution in high speed boardClock distribution in high speed board
Clock distribution in high speed board
Pankaj Khodifad
 
Cyclostationary analysis of polytime coded signals for lpi radars
Cyclostationary analysis of polytime coded signals for lpi radarsCyclostationary analysis of polytime coded signals for lpi radars
Cyclostationary analysis of polytime coded signals for lpi radars
eSAT Journals
 
Detection of Power Line Disturbances using DSP Techniques
Detection of Power Line Disturbances using DSP TechniquesDetection of Power Line Disturbances using DSP Techniques
Detection of Power Line Disturbances using DSP Techniques
KashishVerma18
 
Performance Analysis of Differential Beamforming in Decentralized Networks
Performance Analysis of Differential Beamforming in Decentralized NetworksPerformance Analysis of Differential Beamforming in Decentralized Networks
Performance Analysis of Differential Beamforming in Decentralized Networks
IJECEIAES
 
DESIGN OF V-BAND SUBSTRATE INTEGRATED WAVEGUIDE POWER DIVIDER, CIRCULATOR AND...
DESIGN OF V-BAND SUBSTRATE INTEGRATED WAVEGUIDE POWER DIVIDER, CIRCULATOR AND...DESIGN OF V-BAND SUBSTRATE INTEGRATED WAVEGUIDE POWER DIVIDER, CIRCULATOR AND...
DESIGN OF V-BAND SUBSTRATE INTEGRATED WAVEGUIDE POWER DIVIDER, CIRCULATOR AND...
cscpconf
 
A novel delay dictionary design for compressive sensing-based time varying ch...
A novel delay dictionary design for compressive sensing-based time varying ch...A novel delay dictionary design for compressive sensing-based time varying ch...
A novel delay dictionary design for compressive sensing-based time varying ch...
TELKOMNIKA JOURNAL
 
CMOS ring oscillator delay cell performance: a comparative study
CMOS ring oscillator delay cell performance: a comparative studyCMOS ring oscillator delay cell performance: a comparative study
CMOS ring oscillator delay cell performance: a comparative study
IJECEIAES
 

Similar to Synchronization Overview (20)

SONET.pdf
SONET.pdfSONET.pdf
SONET.pdf
 
Design Of Sub Synchronous Damping Controller (SSDC) For TCSC To Improve Power...
Design Of Sub Synchronous Damping Controller (SSDC) For TCSC To Improve Power...Design Of Sub Synchronous Damping Controller (SSDC) For TCSC To Improve Power...
Design Of Sub Synchronous Damping Controller (SSDC) For TCSC To Improve Power...
 
Synchronization of Photo-voltaic system with a Grid
Synchronization of Photo-voltaic system with a GridSynchronization of Photo-voltaic system with a Grid
Synchronization of Photo-voltaic system with a Grid
 
Assign3
Assign3Assign3
Assign3
 
evm
evmevm
evm
 
Vail 2015 Paper
Vail 2015 PaperVail 2015 Paper
Vail 2015 Paper
 
A Novel Direct Torque Control for Induction Machine Drive System with Low Tor...
A Novel Direct Torque Control for Induction Machine Drive System with Low Tor...A Novel Direct Torque Control for Induction Machine Drive System with Low Tor...
A Novel Direct Torque Control for Induction Machine Drive System with Low Tor...
 
A0430107
A0430107A0430107
A0430107
 
Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...
Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...
Optimal straight-line-trajectory-generation-in-3 d-space-using-deviation-algo...
 
Four Switch Three Phase Inverter using Space Vector Modulation
Four Switch Three Phase Inverter using Space Vector ModulationFour Switch Three Phase Inverter using Space Vector Modulation
Four Switch Three Phase Inverter using Space Vector Modulation
 
Frequency domain behavior of S-parameters piecewise-linear fitting in a digit...
Frequency domain behavior of S-parameters piecewise-linear fitting in a digit...Frequency domain behavior of S-parameters piecewise-linear fitting in a digit...
Frequency domain behavior of S-parameters piecewise-linear fitting in a digit...
 
An Adaptive Neuro-Fuzzy Inference Distributed Power Flow Controller (DPFC) in...
An Adaptive Neuro-Fuzzy Inference Distributed Power Flow Controller (DPFC) in...An Adaptive Neuro-Fuzzy Inference Distributed Power Flow Controller (DPFC) in...
An Adaptive Neuro-Fuzzy Inference Distributed Power Flow Controller (DPFC) in...
 
Clock distribution in high speed board
Clock distribution in high speed boardClock distribution in high speed board
Clock distribution in high speed board
 
Cyclostationary analysis of polytime coded signals for lpi radars
Cyclostationary analysis of polytime coded signals for lpi radarsCyclostationary analysis of polytime coded signals for lpi radars
Cyclostationary analysis of polytime coded signals for lpi radars
 
Detection of Power Line Disturbances using DSP Techniques
Detection of Power Line Disturbances using DSP TechniquesDetection of Power Line Disturbances using DSP Techniques
Detection of Power Line Disturbances using DSP Techniques
 
Performance Analysis of Differential Beamforming in Decentralized Networks
Performance Analysis of Differential Beamforming in Decentralized NetworksPerformance Analysis of Differential Beamforming in Decentralized Networks
Performance Analysis of Differential Beamforming in Decentralized Networks
 
DESIGN OF V-BAND SUBSTRATE INTEGRATED WAVEGUIDE POWER DIVIDER, CIRCULATOR AND...
DESIGN OF V-BAND SUBSTRATE INTEGRATED WAVEGUIDE POWER DIVIDER, CIRCULATOR AND...DESIGN OF V-BAND SUBSTRATE INTEGRATED WAVEGUIDE POWER DIVIDER, CIRCULATOR AND...
DESIGN OF V-BAND SUBSTRATE INTEGRATED WAVEGUIDE POWER DIVIDER, CIRCULATOR AND...
 
A novel delay dictionary design for compressive sensing-based time varying ch...
A novel delay dictionary design for compressive sensing-based time varying ch...A novel delay dictionary design for compressive sensing-based time varying ch...
A novel delay dictionary design for compressive sensing-based time varying ch...
 
Poster_submitted_final
Poster_submitted_finalPoster_submitted_final
Poster_submitted_final
 
CMOS ring oscillator delay cell performance: a comparative study
CMOS ring oscillator delay cell performance: a comparative studyCMOS ring oscillator delay cell performance: a comparative study
CMOS ring oscillator delay cell performance: a comparative study
 

Recently uploaded

sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 

Recently uploaded (20)

sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 

Synchronization Overview

  • 1. 1
  • 2. 2
  • 3. 3
  • 4. 4
  • 5. 5
  • 6. 6
  • 7. 7
  • 8. 8
  • 9. 9
  • 10. 10
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. 14
  • 15. 15
  • 16. 16
  • 17. 17
  • 18. 18
  • 19. 19
  • 20. 20
  • 21. 21
  • 22. 22
  • 23. 23
  • 24. 24
  • 26. 26
  • 27. 27
  • 28. 28
  • 29. 29
  • 30. 30
  • 31. 31
  • 32. 32
  • 33. 33
  • 34. 34
  • 35. 35
  • 36. 36
  • 37. 37
  • 38. However, RMS values are useful for characterizing or modeling jitter accumulation in long line systems using SDH regenerators, for example, and the appropriate specifications use this metric instead of Peak‐to‐Peak. 38
  • 39. 39
  • 40. TIE is defined as the phase difference between the signal being measured and the reference clock, typically measured in ns. TIE is conventionally set to zero at the start of the total measurement period T. Therefore TIE gives the phase change since the measurement began. 40
  • 41. In order to calculate MTIE at a certain observation interval t from the measurement of TIE, a time window of length t is moved across the entire duration of TIE data, storing the peak value. The peak value is the MTIE(t) at that particular t. This process is repeated for each value of t desired. For example, the Figure in page 40 shows a window of length t=20 sec at a particular position. The Peak‐to‐Peak TIE for that window is 4 ns. However, as the 20 sec window is slid through the entire measurement period the largest value20 sec window is slid through the entire measurement period, the largest value of PPTIE is actually 11 ns (at about 30 sec into the measurement). Therefore MTIE(20 s) = 11 ns. 41
  • 42. The above Figure shows the complete plot of MTIE(t) corresponding to the plot of TIE in the Figure in page 40. The rapid 8 ns transient at t = 30 s is reflected in the value MTIE(t) = 8 ns for very small t. It should be noted that the MTIE plot is monotonically increasing with observation interval and that the largest transient masks events of lesser amplitude. 42
  • 43. 43
  • 44. The above Figure shows two plots of TDEV(t). The first plot (for T=100s), corresponding to the TIE data of the Figure in page 40 shows TDEV rising with t. This is because, for the short measurement period T=100s, the two transients in that Figure dominate. If we were to make a longer TIE measurement out to T = 250s, the effect of the two transients on TDEV would become less, assuming there are no more transients The TDEV characteristic labeled T=250 s would be the resulttransients. The TDEV characteristic labeled T=250 s would be the result. It should also be noted that TDEV is insensitive to constant phase slope (frequency offset). To calculate TDEV for a particular t, the overall measurement period T must be at least 3t. For an accurate measure of TDEV, a measurement period of at least 12t is required. This is because the rms part of the TDEV calculation requires sufficient time to get a good statistical average. 44
  • 45. 45
  • 46. 46
  • 47. 47
  • 48. 1
  • 49. 2
  • 50. 3
  • 51. 4
  • 52. 5
  • 53. 6
  • 54. 7
  • 55. 8
  • 57. 10
  • 58. 11
  • 59. 12
  • 60. 13
  • 61. 14
  • 62. 15
  • 63. 16
  • 64. 17
  • 65. 18
  • 66. 19
  • 67. The SEC has been defined as the performance feature set for the equipment timing generator of synchronous (especially SDH) telecom equipment (SETG). Its transfer performance is defined between the (SDH) traffic port input and the (SDH) traffic port output. Such timing generator is part of the Synchronous Equipment Timing Source (SETG) function. This function adds a reference clock output selection scheme (selectors A and C) for providing the T4 output. This output signal can either be a copy of the internal system clock (T0, i.e. the SETG output) or it may be a reference l d d d l f f h ff l h hsignal derived directly from one of those SDH traffic port input signals which are configured as input references for the SETG. The SETS functional specification (excluding the SEC function) is provided in EN 300 417‐6‐1. The SEC specification is in EN 300 462‐5‐1 20
  • 68. 21
  • 69. 22
  • 70. 23
  • 71. 24
  • 72. 25
  • 73. 26
  • 74. 27
  • 75. 28
  • 76. 29
  • 77. 30
  • 78. 31
  • 79. 32
  • 80. 33
  • 81. 34
  • 82. 35
  • 83. 36
  • 84. 37
  • 85. 1
  • 86. 2
  • 87. 3
  • 88. 4
  • 89. 5
  • 90. In large networks long chains of slave clocks may occur. This leads to phase jumps caused by pointer actions (in mixed SDH/PDH networks) and to degradation of the synchronization signal due to: 1. jitter and wander; 2. clock noise; 3. increasing probability of an interruption in the chain, possible disconnection of large parts of the network from the PRC. Because of its importance for the proper operation of the telecommunication network special care must be taken to avoid the mentioned effects by: 1. deploying high‐quality slave clocks at suitable locations in the network, usually in network nodes. 2. creating subnetworks with network elements supporting SSM‐controlled automatic reconfiguration mechanisms. 3. planning the synchronization network so that, as far as possible, each network element has access to several signals suitable as reference signals. This applies particularly to node clocks. Gives an example of a synchronization network, showing clock types and typical architectural structures like network nodes with intra‐node synchronization distribution, subnetworks suitable for synchronization transport (rings or chains of SDH network elements).SDH network elements). 6
  • 91. 7
  • 92. The figures , using the representation method of (ITU‐T Recommendation G.803),  illustrates the architectural properties and resulting requirements of a master‐slave  synchronization network: 1. The network consists of several levels related to the position of the clock along the synchronization chain. 2. The highest level contains the PRC of the network. There should be a second PRC for backup, if more than one PRC are active at the same time. 3. The highest level provides distribution of the synchronization reference signal to a number of SSUs which constitutes the synchronization level 1. 4. Each of those SSUs supplies timing to a subnetwork in the second synchronization level. The role of the SSU for the subnetwork is similar to the role of the PRC for the whole network. If the SSU loses all reference signals coming from the PRC, it serves as the reference source for the subnetwork. 5. Synchronization transfer between hierarchy levels is unidirectional, i.e.5. Synchronization transfer between hierarchy levels is unidirectional, i.e. synchronization is always transferred from a higher to a lower level, otherwise there is a risk of timing loops. If, e.g. in alternative synchronization paths, the hierarchical order is changed, additional measures must be taken to avoid timing loops. 6. The SSU associated with a subnetwork (e.g. a chain or ring of SDH network elements) synchronizes the network elements in the subnetwork via transport signals.signals. 7. An SSU may and should receive reference signals from several SSUs via different paths. 8
  • 93. 9
  • 94. 10
  • 95. 11
  • 96. 12
  • 97. For describing the synchronization transport in a chain of SDH network elements (NEs) it is ffi i t t d ti f th h i ti f h i ill t t d i th Fisufficient to regard a section of the synchronization reference chain, as illustrated in the Figure. Under normal operation the synchronization information (reference frequency and phase) is transported from SSU1 which is assumed to be synchronized to a PRC, to SSU2 via a chain of NEs containing an SEC. Under normal operation the network elements between SSU1 and SSU2 perform the following tasks in the transport of synchronization (numbers refer to the reference chain): NE 1: Generate a transport signal whose timing is derived from the upstream SSU (which in turn is synchronized to the PRC). NEs 2..n‐1: Recover the clock from the incoming transport SDH signal and use it as reference for the SEC. The timing of the outgoing transport signals is derived from the SETS. NE n: Recover the clock from the incoming transport signal and generate a reference signal (T4) for the SSU. The rule "a slave clock of a certain quality level must never be synchronized from a lower‐ quality signal" requires that the reference output signal (T4) signal is squelched (switched off)q y g q p g ( ) g q ( ) when the quality falls below the SSU level (or, in some cases, below the PRC level). For that purpose several signal criteria are supervised and the quality information in the Synchronization Status Message is evaluated, if SSM processing is supported and enabled in the NE. Under a failure which interrupts the synchronization chain, the NEs in the chain are supplied with synchronization from the downstream SSU, reversing the direction of synchronization transport up to the point of the faulttransport up to the point of the fault. 13
  • 98. Synchronization takes the following path from the SSU in node A to the SSU in node B: 1. The SSU in network node A receives a suitable reference signal traceable to the PRC in the network (assumption). 2. The Timing Source SETS of the SDH Network Element in node A is synchronized from the SSU in node A via a 2 048 kHz intra‐node synchronization signal. 3. All outgoing SDH signals are timed by the SETS. 4 The Transport Network Element in the chain extracts a reference signal from the4. The Transport Network Element in the chain extracts a reference signal from the incoming STM‐N transport signal and passes it to the SETS. The outgoing STM‐N signals, including the backward direction of the signal coming from node A are timed by the SETS. Potential timing loops are prevented by the SSM (Synchronization Status Message) in the STM‐N signals. 5. In network node B the reference signal extracted from the incoming STM‐N signal is forwarded to the T4 output of the SETS, bypassing the internal oscillator of the SETS. The SSU removes jitter and partly wander (above the cutoff frequency) and gives a cleaned reference signal to the external input of the SETS. 14
  • 99. With respect to synchronization, rings can be regarded as parallel chains between SSUs, as shown in the Figure. The synchronization signal is injected into the ring at one of the NEs of the ring via the external reference input and transported through one of the SDH transport chains. At some other NE of the ring the reference signal is recovered and passed to SSU 2. With the parallel chains a ring offers some additional or different synchronization properties compared to the chain:properties, compared to the chain: 1. Using automatic reconfiguration mechanisms, each NE in the ring can be reached from the upstream SSU via two synchronization trails. Therefore it is not necessary to inject synchronization from the downstream SSU into the ring, even under many failure conditions. 2. The downstream SSU can be synchronized via either of the chains, i.e. via two alternative synchronization trails. There are two single points of failure, the "gateway" NEs to the SSUs. Those can be eliminated by injecting and extracting the synchronization signal at two NEs. Measures must be taken to avoid timing loops around the ring under certain failure conditions in connection with automatic reconfiguration. A simple method is to restrict the automatic reference selection process at two NEs in the ringthe automatic reference selection process at two NEs in the ring. 15
  • 100. 16
  • 101. 17
  • 102. 18
  • 103. EN 300 462‐2 recommends that intra‐node synchronization distribution should be in the form of a logical star. This configuration is illustrated in the Figure NOTE: It is possible that the SSU is embedded within an NE; in this case it may receive and transmit timing through transport signals. 19
  • 104. Properties and functionalities of intra‐node synchronization: 1.Dedicated signals for synchronization transport to and from the node clock: a) 2 048 kHz; b) 2 048 kbit/s; c) 2 048 kbit/s supporting Synchronization Status Messaging. In currently existing networks the 2 048 kHz signal is predominantly used. 2.For robustness against faults in the synchronization transport several transport signals arriving at the node are selected as potential reference sources. Which of the transport signals are suitable as potential reference sources is determined from the network view during the network synchronization planning process. 3 Ensure that the reference signal at the inputs of the node clock has appropriate performance This can be achieved3.Ensure that the reference signal at the inputs of the node clock has appropriate performance. This can be achieved in several ways: a) Squelch the reference output (T4) at the NE if the quality indicated by the SSM in the incoming traffic signal is below a threshold. The threshold must not be lower than the quality of the node clock (in holdover mode), i.e. "SSU‐T“ or "SSU‐L". Additionally other supervision criteria like "Loss of Signal", "Loss of Frame" etc. are used for squelching. b) Supervise the signals at the inputs of the node clock with respect to frequency deviation, phase jumps etc. c) Evaluate the SSM at the input of node clock. This requires that the SSM is conveyed to the node clock, i.e. the f h kb / l huse of the 2 048 kbit/s signal with SSM. d) Collect the quality information of the NEs in a management system and select the best signal at the node clock by management command. This solution requires that the NEs and the node clock can be accessed from a common management system. 4.Provide an SSM code for the STM‐N signals leaving the node. In order to insert the correct value it is necessary to have the information about the quality of the reference signal in use at the node clock. a) If the intra‐node synchronization distribution is done via 2 048 kHz signals the only way to “ transport “ information is squelching the signal dependent of some supervision criteria.q g g p p b) If 2 048 kbit/s signals supporting SSM are used for intra‐node synchronization, the quality information can be forwarded using the SSM. This solution requires that all involved pieces of equipment have 2 048 kbit/s reference inputs and outputs and support SSM. c) Transport the quality information via a management system (requirements see above). d) If none of the listed options is available, a fixed SSM value must be inserted into the STM‐N signals leaving the node. The assignment of the appropriate SSM is a task of synchronization planning. 20
  • 105. The next figure shows an example of a network topology where equipment is physically within a network node but belongs logically to a subnetwork (a ring) synchronized from a different node clock. In order not to interfere with automatic restoration processes and the dynamic properties of the ring the node clock must not be integrated into the ring. 21
  • 107. The figure shows in detail the synchronization flow in a node with SSU. The detailed view is necessary because of the functionalities of the SETS. From NE n to SSU: NE n extracts a reference signal out of the incoming STM‐N signal and passes it to the T4 output. It is important to note that the internal clock generator of NE n (SETG) is not involved in generating the T4 signal, otherwise a timing loop between NE n and the SSU would be created. As stated above NE n supervises the STM‐N signal selected for synchronization transport on the following criteria: a) LOS: Loss Of Signal; b) LOF: Loss Of Frame; c) MS‐AIS: Multiplex Section‐Alarm Indication Signal; d) SSM below Minimum Acceptable Quality Level (configurable);d) SSM below Minimum Acceptable Quality Level (configurable); e) The implementation of further supervision criteria like EBER (Excessive Bit Error Rate) is equipment‐ (manufacturer‐) dependant. If the signal fails according to the supervision criteria, the T4 output is squelched (switched off). Since the SSU is a level‐2 clock in the quality hierarchy ("SSU‐T" according to the scheme in EN 300 417‐6), the Minimum Acceptable Quality Level must not be lower than "SSU‐T". Which of the two possible values "PRC" or "SSU‐T" has to be configured, depends on the position of the clock in the synchronization network. From SSU to NE n: The SSU supplies a reference signal to all network elements in the node, including the network element that passes the reference signal to the SSU. The SETS receives the reference signal from the SSU via the T3 input and uses the reference for generating the outgoing STM‐N signals (in the Figure, only one signal is shown). A timing loop does not occur if the selection switches in the SETS are properly set. The SSM in the outgoing STM‐N signals is set to a fixed value ("PRC" or "SSU‐T"), see below. From SSU to NE 1: NE 1 represents all "normal" network elements in the node which are the beginning of SDH transport network chains. Those network elements receive their reference signal via a 2 048 kHz signal, usually duplicated for reliability reasons, at their T3 input. O bl i NE 1 h i f ti b t th h i ti t t f th SSU If th SSU i h i d d thOne problem is NE 1 has no information about the synchronization status of the SSU. If the SSU is synchronized and the Minimum Acceptable Quality Level in NE n has been set to "PRC", the appropriate SSM would be PRC. If the SSU were in holdover mode, "SSU‐T" would have to be inserted. Squelching the output of the SSU does not make sense because an SSU in holdover mode delivers a reference which is orders of magnitude better than the SETS’ holdover mode. Currently the practice is to insert a fixed value ("PRC" or "SSU‐T") into the outgoing STM‐N signals. Solutions are under study. 23
  • 108. 24
  • 109. The major SDH NE of the node (which implements an SEC) may be used as the node clock. A suitable large number of reference clock inputs (T1) should be available to such a node in order to ensure that the SEC node almost never loses all references to EN 300 462‐4 [4] or EN 300 462‐6 [6] clock sources. The output of this major SDH NE is distributed via SDH interfaces to the other SDH NE’s of the node (T1) and via 2 MHz, 2 Mbit/s interface to other equipment (T4). 25
  • 110. Network nodes may form a cross point for several SDH ring networks which do or do not exchange payload between them. In this case the basic entity for synchronization is the ring network and not the node itself. 26
  • 111. Such network node is similarly structured to the second example. The difference is that in this case a synchronization signal is sent from one ring to an other. This signal may either be a tributary SDH link (T1) or it may be a 2 MHz interface (T4 – T3). Proper network synchronization design may not allow 2 Mbit/s making such synchronization link bidirectional and controlled by the SSM because of the risk of creating a timing loop in the network. 27
  • 112. 28
  • 113. An alternative method to the master‐slave one is to distribute a synchronization signal directly to each clock in the network. This method, referred to as "Distributed Master" or "Distributed PRC" is feasible only with radio distribution because a wire‐based distribution would require a complete extra network, which is by far too expensive. As the main objective of a synchronization network is to synchronize all the SSUs, the advantages of the distributed PRC method are not affected if only the SSUs are directly GPS‐synchronized and the transport network elements are master‐slave‐synchronized. 29
  • 114. The Figure illustrates the GPS‐based synchronization. The GPS system represents the PRC of the network, the master‐slave distribution chains to the SSUs are replaced by the satellite signals. A receiver processes the GPS signal and extracts a reference signal for the SSU. Usually the synchronization distribution below the SSU level is identical to a master‐slave‐synchronized network. 30
  • 115. 31
  • 116. 32
  • 117. The advantages of the previous methods can be combined. The Figure shows an  example with GPS receivers at selected locations in the network, e.g. at important  network nodes with many pieces of equipment or nodes with few suitable reference  signals. The numbers around the SSUs indicate the priorities. The assignment of the priorities  determines whether the network is master‐slave synchronized under normal operation  with the GPS‐based references as backup or vice versa. Which of the options is chosen  depends on the network topology and the operator’ s preferences. Advantages and disadvantages As this technique is a combination of different methods, it combines advantages and  disadvantages of these methods. 33
  • 118. 34
  • 119. 35
  • 120. NOTE: Some networks may have SDH Network Elements containing clocks other than G.813 clocks. Provided that the quality level of these clocks is of lower quality than the SSUs deployed in the network, for the purposes of this Appendix they can be considered as SEC clocks. 36
  • 121. The engineering of the synchronization area should be carried out before the equipment is commissioned. The results of the network synchronization engineering process are often described in a synchronization plan. This plan may contain maps of the area and all offices with the normal and fall‐back references indicated, the values of all provisioned parameters that affect the synchronization in the area and a log of all synchronization related maintenance activities. The plan may also contain results of measurements and evaluations on the synchronization network. The synchronization plan should be revised each time new equipment is installed in a synchronization area. A synchronization coordinator is usually nominated to maintain the synchronization plan and to co‐ ordinate the synchronization related activities in the synchronization areas. 37
  • 122. Impairments in the synchronization network may force clocks to operate (temporarily) without reference. This leads in general to increased octet‐slip rates, which degrades the performance of the end‐to‐end service. These three methods exist to counter these problems. All three methods are used in the designs of clocks and of synchronization networks. In the upper parts of the synchronization network hierarchy the first approach tends to be favored, while in the lower parts of the synchronization network hierarchy it is the second approach that is prevalent. In general a balance must be done between initial investment, "cost of ownership" and reliability. 38
  • 123. 39
  • 124. 40
  • 125. 41
  • 126. In the first stage the "SSU‐Level" is considered. The SSU‐Level of the synchronization network consists of the PRCs and SSUs in a synchronization area plus all transport facilities that are active or stand‐by carriers for synchronization information between these clocks. The transport facilities between the PRCs and SSUs are considered transparent for the timing information in the SSU‐Level view. The resulting network contains only the SSUs and PRCs of the synchronization area. 42
  • 127. The Figure present an example where the SSU‐Level is constructed from the complete synchronization network. 43
  • 128. In the first stage the "SSU‐Level" is considered. The SSU‐Level of the synchronization network consists of the PRCs and SSUs in a synchronization area plus all transport facilities that are active or stand‐by carriers for synchronization information between these clocks. The transport facilities between the PRCs and SSUs are considered transparent for the timing information in the SSU‐Level view. The resulting network contains only the SSUs and PRCs of the synchronization area. 44
  • 129. In the second stage the "SEC‐Level" is considered. The SEC‐Level consists of a number of unconnected "SEC subnetworks", each consisting of SECs connected by STM‐N connections. These SEC sub‐networks can be engineered separately. 45
  • 130. Before embarking on the first stage of the synchronization network engineering, the synchronization islands have to be known. This defines the PRC‐Level. In fact, these two strategies can be considered as "extremes" on a continuous scale. Actual sizes of synchronization areas can be anywhere in between these "extreme" positions. 46
  • 131. 47
  • 132. Generally, for an actual synchronization network a strategy somewhere between I and II is selected., i.e. some (major) nodes have a PRC supplying the synchronization for a certain sub‐domain of the total operator domain. Networks closer to a strategy II implementation have shorter, thus more reliable, synchronization trails and also have smaller, hence easier to engineer, synchronization areas. Networks closer to a strategy I implementation have fewer synchronization areas, hence fewer pseudo‐synchronous area boundary crossings in end‐to‐end connections and fewer installed PRC clocks. 48
  • 134. The notion of "PRC Autonomy Period" sets a quality parameter for a clock. Knowing the PRC Autonomy Period of a clock one can determine the following:a clock, one can determine the following: 1. Are multiple references to the SSU necessary? If the PRC Autonomy Period is longer than the time it takes to repair a failure in the case of a single reference, operation with a single reference is sufficient. 2. How much time is available for a reference switch? If the PRC Autonomy Period is very long, one can make reference switches manually after judging the impairments and consequences. On the other hand shorter PRC Autonomy Periods require some kind of automatic reference switch process, which can be from a central manager (generally a slower process) or made locally by the clock itself (generally a faster process). 3. What staffing levels are required to maintain the synchronization network? Do they need to be, for example, on a 24 hour/7 day/week stand‐by or is 8 hour/5 day/week sufficient?/ y/ y / y/ The PRC Autonomy Period can be used to classify all SSUs in a synchronization area. The purpose of such a classification is to be able to provide a hierarchy, based on the above defined "PRC Autonomy Period", among the SSUs in the synchronization network. A division of SSUs according to their PRC Autonomy Period, the number of Classes and their boundaries, will in general turn out to be different for different operators., depending on the size of the synchronization areas, the number of SSUs per area and their quality. In most cases two Classes will suffice, but more (or fewer) Classes are possible. I l h ld id i SSU f "l Cl f PRC A t " t id th ti f fIn general one should avoid using an SSU of a "lower Class of PRC Autonomy" to provide the active reference for an SSU of a "higher Class of PRC Autonomy". This means that in the tree diagram of the SSU network, the PRCs are at the top and that in downward direction the SSUs are ordered according to their PRC Autonomy classification; the best ones close to the top, the lowest at the bottom of the tree. The restoration mechanism for most SSUs will in general be automatic, based on local decisions by the SSUs themselves. All SSUs support a reference selection mechanism locally controlled by pre‐programmed priorities (in addition they may also support other selection mechanisms). The method outlined here to design the SSU‐Level synchronization network is based on the presence of this selection mechanism in all SSUs. Other methods, e.g.y p , g based on centralized management can also be applied, but are not considered here. 50
  • 135. SSUs below a certain PRC Autonomy Class need to have at least two independent references. It is f h l f d b f d ll d f fimportant to verify that no timing loops are formed or can be formed, especially during or after reference re‐arrangements. A labeling scheme can be applied in the engineering stage, as a simple tool to check whether a proposed scheme of service and stand‐by reference provisionings (i.e. 1‐st, 2‐nd, etc. reference priorities). This labeling scheme is described below. Several alternative methods exist to perform this type of checking. The idea is to assign to each SSU a label of the format N(m), where the N represents the PRC Autonomy Class to which the SSU belongs and m is a sub‐number within that Class. A lower value of N or m representsg f p an SSU that is higher in the hierarchy. The PRC gets the value N=1 assigned. The SSUs are labeled according to the following rules: I. Rule A: Any SSU that belongs to Class N and which gets all its references (i.e. including the stand‐by references) from clocks of Class N‐1 or better, gets the label N(1) assigned. II. Rule B: If an SSU of Class N gets some reference(s) from other clocks of the same Class N that have labels N(k1), N(k2), etc, then it gets the label N(m) assigned, where m=1+MAX{k1, k2, … }. III. Rule C: An SSU of Class N should never be allowed to use a reference of an SSU of Class N+1 or worse. If it is possible to label all SSUs in a certain synchronization area according to the above rules, no timing loops can be formed between the SSUs during, or after, synchronization reference switching with the proposed scheme of service and stand‐by reference assignments. In order to apply N(m) labeling successfully and to provide each SSU with at least two independent references, a sufficient number of interconnections between the SSUs need to be present (in other words the SSUs need to be sufficiently meshed). Each time new SSUs are added or new interconnections are assigned to act as reference (service or stand‐ by), the complete SSU synchronization network has to be checked again for potential timing loops. 51
  • 136. The scheme described above assumes that reference assignments and priorities are static. If the information regarding all active and stand‐by synchronization trails and their status is known at some central location, priorities and assignments can in principle be dynamically reprovisioned, to counter failure situations. Each re‐provisioning should be checked. This whole process could be performed manually or automatically. 52
  • 137. Although timing loops should always be avoided by applying sound engineering of the synchronization network, the insertion of SSUs with an absolute frequency offset detection at strategic places in the network can provide an additional safeguard. Whenever a timing loop is formed, the clocks in the loop, as a group, will start drifting in frequency in an uncontrolled manner. This may increase the slip‐rate on traffic between equipment timed by clocks in the loop and equipment outside the loop to unacceptable levels. Eventually, large frequency deviations may cause the network to stop processing traffic altogether. However, if one of the clocks in the loop is capable of detecting absolute frequency deviations (sustained over some period of time) at an early stage, it can disqualify its current reference and thereby breaking the loop. The better this frequency offset detection is, the lower the maximum slip‐rate will be that can affect traffic from/to/via equipment in the loop. E.g. an absolute frequency guard at 1×10‐8 will limit the slip rate to 6.9 slips/day, i.e. almost within the limits for acceptable performance (5 slips/day) according to ITU‐T Recommendation G.822. The more clocks in the network that support this frequency guarding, the higher the probability that one of those clocks is actually part of a timing loop if it is accidentally created. Moreover, the size of the affected area will generally be smaller in cases where timing loops are formed without a clock with frequency guarding being part of it. 53
  • 138. The SEC‐Level consists of many separated islands of SDH equipment with SEC clocks built in (see the Figure in page 45). Each island is called an "SEC sub‐network". Within the SEC sub‐network automatic restoration is mandatory because the PRC Autonomy Period of an SEC is typically well below 1 minute. Restoration based on local SEC decisions is the fastest method. In most cases the SEC level does not provide sufficient independent references to motivate the use of the N(m) numbering scheme of the SSU‐Level also in the SEC‐Level. For example in linear or ring‐type networks reference can only be from both neighbors, but only the upstream one can have a "lower" N(m) number and so be a suitable reference. A back‐up reference is then not available. By enhancing the priority selection with traceability information this problem can be overcome. This mechanism is described in the Synchronization Status Message (SSM) protocol, specified in EN 300 417‐6‐1. This protocol is proposed to be used as reference restoration control mechanism at the SEC‐Level. 54
  • 139. The task of the synchronization engineer is to determine the provisionable parameters of the SSM algorithm in each SEC sub‐network, such that under normal conditions the flow of the timing information between the SSUs is according to the plan engineered for the SSU‐level and that in failure situations the synchronization restores as well as possible without creating timing loops, hierarchy violations (i.e. references with insufficient traceability becoming active), or instabilities. The variables at his disposal are the selection of possible references (assignments/un‐assignments), the setting of priorities for the assigned references, using fixed SSM assignments to certain reference inputs and setting the squelch thresholds for synchronization outputs. Assignment and priority setting have in general to be provisioned both for the internal oscillator (denoted as "T0" in EN 300 462‐2) and for the external clock output (denoted as "T4" in EN 300 462‐2) of an SDH network element. The interface between stand alone SSUs and SECs is assumed to be a 2 048 kHz interface or a non‐SSM carrying dedicated 2 048 kbit/s link. The number of possible different SEC sub‐network topologies is very large, but the size of the SEC sub‐networks will be restricted, since in most cases the recommendation to limit the number of SECs between SSUs that are adjacent in the SSU‐Level, to at most 20 clocks, will be honoured. Although the number of possible SEC sub‐networks is very big, they mostly do not differ much in principle, hence it is possible to come up with a limited number of example SEC subnetworks, work out the SSM parameters for those, and adapt those examples for application to real SEC sub‐ networks. 55
  • 140. 1
  • 141. 2
  • 142. 3
  • 143. 4
  • 144. By providing multiple references to each network element, one can select a stand‐by input in case the active input fails. So in order to construct a reliable synchronization network it is important that the trails that carry the synchronization to a central office are protected by duplicated links, which are preferably routed via different geographical paths. 5
  • 145. Since distribution of synchronization is a function of the network as a whole and as soon as a certain node switches reference the synchronization distribution may be changed, care has to be taken that the restoration of one node does not lead to undesirable effects on the network level. Therefore, any possible selection process has to take the following boundary conditions into consideration: 1) When the timing network is restored, no timing loops may be created. This means h l k b h d l h h l l d bthat no clock may be synchronized to a signal which ultimately was generated by this same clock. Such loops may be unstable and may drift away in frequency. 2) When a clock goes into Hold‐Over it should not be a reference for a clock of better stability than itself. 3) Each Network element should be synchronized to the highest quality available synchronization source. 4) The number of reference switches should be as small as possible (This does not4) The number of reference switches should be as small as possible. (This does not imply that non‐revertive schemes are preferred over revertive, it means that "needless" reference switching and instabilities in the sync routing should be avoided). 6
  • 146. 7
  • 147. The reason is that a lot of time usually elapses before a manual switch command can be given. The process requires that some kind of central point exists where all (synchronization related) alarms are collected. Each time an alarm occurs a knowledgeable person has to be called‐in, in order to make the decision on which switches have to be made. In practice that restricts the application of manual switching to telecommunication centers, which contain high stability clocks. The stability of the involved clocks needs to be good enough to last for the duration of the h h k l f drestoration process, which may take a couple of days. 8
  • 148. To go one step beyond a manual restoration process, in the direction of automation, is to introduce a network management function to replace the human operator. Such a procedure reduces the maintenance costs, but it creates the problem that algorithms are needed for intelligent synchronization control. An automated central alarm collection and command issuing system is a prerequisite in order for this to function and this system has to control the synchronization functionality of all equipment in the synchronization network (including stand alone SSUs or SASEs). In practice this method of control is today provided only in distributed PRC systems, where two or three PRCs are present on different sites and each PRC can take over the function of any other PRC in case of failures. Another approach is to restore based on locally available information (incoming signal failures) and some provisioned data in each node which the user programs duringfailures) and some provisioned data in each node, which the user programs during installation and which is chosen in such a way that the proper restoration action is taken, given its place in the synchronization network. This type of restoration scheme reacts much faster than schemes that take the whole network in account and switching in a node may take place within 1 second. Fast restoration implies that even clocks with a relatively poor hold‐over stability (like SECs) can be restored fast enough to keep the phase transients limited to 1 μs. And these are discussed in the comingto keep the phase transients limited to 1 μs. And these are discussed in the coming slides 9
  • 149. Normally the input with the highest priority is selected, but if it fails a switch is made to the input of second priority. More inputs and priorities are possible. In practice the priority tables are used in almost all PDH networks inside the synchronization equipment and switch and cross‐connect equipment. 10
  • 150. The synchronization status messages can be viewed as an addition to the priority table method, because more information becomes available to each node in the form of messages which are coded in the overhead of STM‐N or E1 (2 048 kbit/s) signals. 11
  • 151. The methods based on priority tables and based on synchronization status messages are worked out in more detail in the following slides. In practical networks one can find a mixture of all these synchronization selection methods. 12
  • 152. 13
  • 153. Switching based on a priority table is a very simple algorithm. The user can assign a certain priority to each incoming signal which can potentially be used as a timing reference. In principle the equipment selects the signal coming in over the input with the highest priority as its active reference. The other references are stand‐by. The presence of the latter phenomena can be established by comparing the active reference signal with the internal oscillator(s) and other input references and to use a l h d f h ll h h hmajority vote algorithm to determine if the active input really has too high MTIE. The presence of the latter phenomena can be established by comparing the active reference signal with the internal oscillator(s) and other input references and to use a majority vote algorithm to determine if the active input really has too high MTIE. 14
  • 154. This latter method is specified in EN 300 417‐6 (in the "QL‐disabled" mode). 15
  • 155. 16
  • 156. 17
  • 157. The first problem requires to rapidly resynchronize the SEC after it has lost its synchronization reference input signal. Since the SEC's are typically arranged in a chain the re‐synchronization requires to revert the direction of synchronization through a chain network. In the case a SEC of the SDH sub‐network is running in the holdover mode the reference clock output at some network element of the sub‐network may be traceable to that holdover SEC. Since sound network synchronization operation requires not to slave a high quality clock (SSU h ) l l l k (h ld ) h ff hin this case) to a low quality clock source (holdover SEC) it is necessary to switch off the reference clock output in such case. The function providing such controlled switch off capability is called squelch function. For solving these problems the SSM had been introduced. The SSM is coded in the S1 byte of the STM‐N section overhead and it provides the synchronization status of the equipment being the source of the STM N signal in terms of traceability to clock sources compliant to thebeing the source of the STM‐N signal in terms of traceability to clock sources compliant to the ITU‐T specifications EN 300 462‐6 (Primary Reference Clock), EN 300 462‐4 (Transit Node Clock), EN 300 462‐7 (Local Node Clock), and EN 300 462‐5 (SEC) for their long term frequency accuracy performance. A further state (DNU = do not use for synchronization) is sent on those ports of an equipment which bear the risk of creating a timing loop if a neighbor network element would select their output signal as a synchronization reference input signal. 18
  • 158. The downstream neighbor network element, which is slaved to the reference signal received from upstream keeps tracking this signal and its synchronization status will drop from the quality it had before (PRC,SSU‐T, or SSU‐L) down to SEC. Thus the QL‐SEC SSM is propagated all down the synchronization chain. If the network element at the low end of the SEC chain receives the QL‐SEC SSM from upstream and it has a better quality from downstream (e. g. from an SSU) it will h h d f l h hsynchronize to that downstream reference signal. The new synchronization status (better than SEC) is now sent upstream and the next upstream network element can synchronize to the downstream. Thus the SEC's of the chain switch one after the other to the synchronization reference signal received from downstream. 19
  • 159. 20
  • 160. 21
  • 161. 22
  • 162. An SDH network element uses several criteria to select its active reference. First, the Quality Level of the signal is considered. All references that have the highest available Quality Level are singled out. The Quality Level of a particular reference is eitherreferences that have the highest available Quality Level are singled out. The Quality Level of a particular reference is either retrieved from the incoming signal overhead or it is programmed by the user. If an incoming reference exhibits signal fail (SF) due to loss of signal, loss of frame or other causes, such a reference can be treated as if it has the quality level DNU. After this procedure, the references that were singled out are ordered according to the priority that the user assigned to their respective inputs. From this result the reference with the highest priority (within this group of references with the highest quality level) is selected. In case some inputs have equal priorities assigned to them, the result may still be ambiguous. In case multiple references satisfy these criteria, a reference switch is made to an arbitrary input, except when the current reference is among this group, in that case no switch is made. An alternative, but equivalent, method of description is that, given the priority and Quality Level of the current reference, all h bl f l ll d h k f h h h h h l l h hother possible reference sources are continuously polled to check for one that has either a higher Quality Level or a higher priority than the current selection. As soon as such a reference is found a reference switch is made to this new input, otherwise the selection remains as is. Since each network element has to select a reference not only for its internal clock, but also for its external synchronization outputs, there are two independent processes of the above described type active to select the appropriate reference for both purposes. The reference that is eventually selected is forwarded to the internal clock or the external synchronization output circuitry. These circuits may still reject the reference if the associated Quality Level is insufficient. The internal clock will reject the reference if the Quality Level is lower than the Quality Level associated with its internal oscillator while the reference for thereference if the Quality Level is lower than the Quality Level associated with its internal oscillator, while the reference for the external synchronization output will be rejected if its Quality Level is lower than a provisioned threshold. In the first case the internal clock will go to hold‐over, in the latter case the external station clock output will be squelched, replaced by AIS or a DNU message is inserted (depending on the format of the output signal). Selection of a reference can be done by the above described automatic selection process, but it is also possible to force a certain selection by means of special commands or lock‐out certain references from the selection process. Such commands can be issued by the user through the management system. The figure shows an example of the reference selector picking the input with the highest priority (input A has Priority 3, which is better than input B with priority 4) between two inputs that both receive the highest quality level (A and B both receive QL =p p y ) p g q y ( PRC). Although inputs C and D have higher priorities, they will not be selected, because the incoming references via those inputs have lower quality level. NOTE: It should be noted that traffic protection and synchronization protection are independent processes, even if they are carried on the same media. 23
  • 163. In the last slide figure the outgoing Quality Levels are shown that correspond to the current state of the input Quality Levels, all outputs carry "PRC" since that is the QL of the selected input signal (input A). Output A however transmits "DNU", because this signal is in the return direction of the selected input. The message that is forwarded over the external synchronization output, provided the output supports synchronization messaging, is the QL of the selected input. If no f l bl h f l h l h h h ld h lreference is available with a QL of at least the squelch threshold, the external synchronization output is squelched. This may be implemented as transmitting AIS or DNU in 2 048 kbit/s or by turning the 2 048 kHz signal off. 24
  • 164. The provisioning of the SSM parameters is an integral part of any network synchronization design and network synchronization planning. In fact, proper provisioning of these parameters is needed in order to achieve restoration of synchronization under all realistic failure scenarios, while meeting the general objectives for synchronization restoration as stated in the beginning of this clause. 25
  • 165. 26
  • 166. 27
  • 168. The Figure shows a simple 2‐fibre ring network which is connected in one location (the hub‐node, i.e. the topmost node of the ring) to the synchronization of the main network. The ring itself contains add/drop multiplexers (ADMs). Synchronization is distributed via the hub‐node to the other nodes on the ring. The synchronization signal obtained from the main network is in this example supposed to be traceable to the PRC. This message is sent around the ring in both directions by the hub node. Other nodes re‐transmit this message and return DNU (Do Not Use for h )synchronization) upstream. The provisioned port priorities determine how the timing flows in the ring when no failures are present. In the example in Figure 35 the normal flow of timing is clockwise through the ring, but it is also possible to time the ring partially clockwise and partially counter‐clockwise by reversing the port priorities on a part of the nodes. 29
  • 169. In case of a defect in one of the links that form the ring, the first downstream node goes into Hold‐Over, since no other option is available. (The STM‐N from the other direction is labeled "don’t use" and may not be selected. A timing loop would be created if it was.) This node changes its sync message to "SEC". All downstream network elements remain locked to the node in hold‐over. So, one by one all downstream nodes replace their outgoing message by "SEC". h f l d b f h h b d h ll l k d h hThe final node before the hub‐node however will not remain locked to the chain, since it receives on the other STM‐N input a signal of higher quality, conveyed by the message "PRC". This node will perform a reference switch and adapt its outgoing SSMs accordingly. The Figure shows the situation at this moment. 30
  • 170. Next, the node before the last node makes the same reference switch, since it can now choose between a reference with quality level "SEC" from the original direction and one with quality level "PRC" from the other direction (changed from "DNU"). This process repeats until the node that originally switched to Hold‐Over is locked to the timing signal from the other side of the ring. The final situation is depicted in the above Figure. h h l f f f d b f h dThe whole process of restoration, for rings of at most 20 nodes, must be finished within 15 seconds. This ensures that the phase transient in the timing of the node in hold‐over is less than 1 μs. As soon as the cable break has been repaired, the original situation will be restored, due to the higher port priorities for references in the original direction of synchronization. 31
  • 171. 32
  • 172. In the above figure, each of the two external timing nodes (node with external timing) can be synchronized, either by is external clock or via any of the 2 lines. In case of failure of the active external clock in timing node 1, this node selects its fourth priority, which carries the timing generated by itself. This is a timing loop situation. 33
  • 173. In this configuration, only one external reference is active on the ring in nominal condition. This allows the use of single synchronization reference to synchronize the whole ring. In nominal condition, timing node 1 delivers timing to all nodes of the ring, including timing node 2. Note that each timing node is not allowed to be synchronized on its west (east) line port when it normally transmit synchronization to its east (west) line port so that it is bl limpossible to generate a timing loop. In this example, the 2 Quality levels of the signals provided to the 2 external timing nodes are QL and QL*. They can be provisioned in the case of 2 MHz external timing signals or read on the S1 byte in case of timing provided by a STM‐N tributary. These 2 quality levels can be different. In the Figure in this slide QL is higher or equal quality than QL*; if not the timing node 2 would deliver the timing to the ring as it is thethan QL*; if not, the timing node 2 would deliver the timing to the ring as it is the case in the coming slide Figure. 34
  • 174. On this Figure, the external reference of timing node 1 fails; bold lines show how synchronization is rearranged from timing node 2. As an alternative, another configuration can be realized by changing the priorities of timing node2. It is possible to configure the 2 external timing nodes 1 & 2 of timing node 2 with priority 1 allocated to the external source. In this case, this means that when QL and QL* are equal value, 2 external timings will be used simultaneously in hthe ring. 35
  • 175. 36
  • 176. 37
  • 178. 39
  • 179. 40
  • 180. 41
  • 181. 42
  • 182. 1
  • 183. 2
  • 184. 3
  • 185. 4
  • 186. 5
  • 187. Frequency synchronization is also referred to as clock synchronization. It keeps consistency between the frequencies or phases of clock signals to ensure that all devices on the communication network work at the same rate. Information is coded into discrete pulses through pulse code modulation (PCM) andInformation is coded into discrete pulses through pulse code modulation (PCM) and transmitted on the data communication network. If the clock frequencies of two digital switching devices are different, or the digital bit streams transmitted between the two devices are added with phase drift and jitter due to interference and damage during the transmission, the bits in the buffer of the digital switching system may be lost or duplicated, resulting in slip in the bit stream. In the Figure, watch A and watch B show different time but they keep a constant timeIn the Figure, watch A and watch B show different time but they keep a constant time difference, for example, 6 hours. This is called frequency synchronization. 6
  • 188. Time synchronization means to adjust the internal clock of the local device according to the received time information. Time synchronization and frequency synchronization follow similar principles. That is, both the frequency and phase of the clock are adjusted, and the phase of the clock is represented by a number, that is, a time point Differing from frequency synchronization time synchronization adjuststime point. Differing from frequency synchronization, time synchronization adjusts the clock discontinuously by receiving discontinuous time information. The adjustment of the Phase‐Locked Loop (LLP) of the device clock is periodical. Time synchronization involves two major functions: time service and time keeping. Time service is to adjust the clock according to the standard time. By adjusting the clock at irregular intervals, a device synchronizes its phase with the standard reference time. Time keeping refers to frequency synchronization. It ensures that thereference time. Time keeping refers to frequency synchronization. It ensures that the difference between the time on the local device and the standard reference time is within a reasonable range during the interval of clock adjustment. In the Figure, watch A and watch B always keep the same time. This is called phase synchronization. 7
  • 189. 8
  • 190. 9
  • 191. As an asynchronous system, the Ethernet can function properly without a high‐ precision clock. Consequently, most Ethernet devices do not provide high‐precision clocks. Nevertheless, this does not mean that the Ethernet is unable to provide a high‐precision clock. Actually, the Ethernet uses serial code streams to transmit clock signals at the physical layer just as the SDH does; and the receiver must be able tosignals at the physical layer just as the SDH does; and the receiver must be able to recover the clock. Otherwise, communication fails. In other words, the Ethernet itself is capable of transmitting clock signals, but this capability is not actually used. From a technical perspective, the clock obtained from the physical layer of the Ethernet is even more precise than that obtained using the SDH technology. For a clock to be obtained from the code stream of a line, there must be sufficient clock transitions in the code stream. In other words, the code stream cannot contain tootransitions in the code stream. In other words, the code stream cannot contain too many consecutive 1s or 0s. By performing a random scrambling, SDH significantly lowers the possibility of consecutive 1s and 0s. Nevertheless, consecutive 1s and 0s do occur. The physical layer codes of the Ethernet are in the form of 4B/5B (FE) and 8B/10B (GE). This means that for every 4 bits, one additional bit is added to eliminate the possibility of four consecutive 1s or 0s. This facilitates recovery of the clock. 10
  • 192. The sender switch transmits the high‐precision clock to the Ethernet PHY chip. The Ethernet PHY chip then sends data with the high‐precision clock to the receiver switch. The PHY chip of the receiver switch extracts the clock from the data code stream. Clock precision does not decrease in this process. This is the basic mechanism of synchronous Ethernetmechanism of synchronous Ethernet. 11
  • 193. The code stream transmitted at the physical layer of the Ethernet contains sufficient clock transitions. Clock transitions occur even when no data is being transmitted. This nature of the Ethernet enables the Ethernet to recover the clock from the link. The sender sends high‐precision clock signals, and the receiver recovers the clock signals from the link The clock signals pass through a jitter attenuation circuit to reducefrom the link. The clock signals pass through a jitter attenuation circuit to reduce jitters generated on the link and then can be used as the clock in the system. The Ethernet and TDM network both support clock recovery. On the Ethernet, however, low‐precision clock signals are transmitted to save costs. The clock recovery function of the Ethernet is ignored, but it does not mean that the Ethernet cannot transmit high‐precision clock. 12
  • 194. To select the clock source correctly, devices on the network also transmit the Synchronous State Message (SSM) with the clock information. On the SDH network, the quality level of the clock is transmitted through the outband overhead byte in the SDH frame. There is no outband tunnel on the Ethernet. Therefore, the downstream device sends SSM messages to notify the downstream device of the quality level of adevice sends SSM messages to notify the downstream device of the quality level of a clock. 13
  • 195. The ESMC (Ethernet Synchronization Massage Channel) messages are transmitted through the IEEE 802.3 Organization Specific Slow Protocol (OSSP). In addition, ESMC messages and ESSM (Ethernet SSM) messages are transmitted separately so that Sync‐E interfaces and non‐Sync‐E interfaces are compatible with each other. 14
  • 196. The frequency for sending these messages is configurable. Generally, the acceptable frequency is 1 frame per second (fps). When to send the messages and how to process the message have not been defined yet, but the frame format of the message has been defined as follows: 1 The frame is a slow protocol frame and uses the format of a standard Ethernet1. The frame is a slow protocol frame and uses the format of a standard Ethernet frame. 2. The frame uses the unique destination MAC address 0x0180C2000002. 3. The value of the Length/Type field is the same as that in the slow protocol frame (value 0x8809). 4. The frame has a subtype field 0x0A to identify the organizational protocol. 15
  • 197. 16
  • 198. 17
  • 199. The Ethernet became the IEEE 802.3 standard in 1985. In 1995, the data transmission rate is increased from 10 Mbit/s to 100 Mbit/s. During the increase of transmission rate, the computer and network industry were trying to solve the problem of timing synchronization on the Ethernet. 18
  • 200. 19
  • 201. The PTP defines the following types of clock devices: 1. Ordinary clock (OC): has only one physical port to the network. The OC can be used as the grandmaster clock or slave clock. It can send and receive PTP messages and supports the synchronization hierarchy determining mechanism. In addition it supports the Delay mechanism and Pdelay mechanismaddition, it supports the Delay mechanism and Pdelay mechanism. 2. Boundary clock (BC): has multiple physical ports to the network. Each physical port is similar to the physical port of the OC and can be connected to multiple sub‐domains. The BC can be used as the intermediate transit device. 3. End‐to‐end transparent clock (E2E TC): has multiple ports. The E2E TC can forward all PTP messages and can correct the residential time of PTP event messages. The ports of the E2E TC do not have a protocol engine and do not determine the master and slave status of the clock.master and slave status of the clock. 4. Peer‐to‐peer transparent clock (P2P TC): has multiple ports and each port has a Pdelay processing module to support the Pdelay mechanism. The ports of the P2P TC do not have a protocol engine and do not determine the master and slave status of the clock. 5. PTP management device: has multiple ports, including the management port used to send PTP Management messages. 20
  • 202. 21
  • 203. 22
  • 204. 23
  • 205. 24
  • 206. 25
  • 207. The Erbest denote the Announce message that is the best of all the Announce messages received on port r since the last time the BMC algorithm was executed at this node. And the Ebest denote the best of all the Erbest for the node For an OC E = E since r =1 in this caseFor an OC, Ebest = Erbest since r =1 in this case 26
  • 208. 1. Sending and receiving Announce messages: The OC or BC devices exchange their own grandmaster clock parameters. The information in the Announce messages is from the data set of each device. 2 Running the BMC algorithm: When receiving Announce messages a device runs2. Running the BMC algorithm: When receiving Announce messages, a device runs the BMC algorithm to compare the grandmaster clock parameters in the Announce messages. Then the device selects the port that receives the Announce message with the best grandmaster parameters as the grandmaster clock or announces itself as the grandmaster clock. The device also calculates the recommended status of each port. 3. Updating the data set: According to the recommended status calculated through3. Updating the data set: According to the recommended status calculated through the BMC algorithm, each device updates the data set. 4. Determining the port status: The state machine of each port determines the status of the interface according to the recommended status calculated through the BMC algorithm and the actual status of the port. Then the master‐slave hierarchy is established in the entire domain. 27
  • 209. As shown in the preceding figure, the time synchronization process is as follows: 1. The master clock sends a Sync message at t1. 2. The slave clock receives the Sync message at t2. 3 The slave clock sends a Req message at t3. The slave clock sends a Req message at t3. 4. The master clock receives the Req message at t4. 5. The master clock sends a Resp message containing t4 to the slave clock. Then, t2 ‐ t1 = Delay + Offset t4 ‐ t3 = Delay ‐ Offset That is:That is: Offset = [(t2 ‐ t1) ‐ (t4 ‐ t3)]/2 Delay = [(t2 ‐ t1) + (t4 ‐ t3)]/2 28
  • 210. The frequency synchronization process is as follows: 1. The slave device calculates the corrected time when each Sync message arrives at the slave port based on the time of the master device, that is, the set off time of the Sync message plus the delay of the paththe Sync message plus the delay of the path. 2. The slave device calculates the interval between each two Sync messages based on the corrected time, and the interval between each two Sync messages based on the arriving timestamp on the slave port. Then, the slave device calculates the proportion factor between the two types of interval. 3. The slave clock adjusts its clock frequency according to the proportion factor. Proportion factor = [(T1N+tN) ‐ (T10+t0)]/[T2N ‐ T20] 29
  • 211. When a PTP message traverses the protocol stack on a node, the timestamp of the message is selected among the reference points defined by the protocol stack (A, B, C in the above figure). The closer a reference point is to the actual physical connection point, the smaller the timing error is. Point A in the above figure is the best reference point. NOTE: IEEE 1588 cannot measure the asymmetric path delays between the master and slave devices. The asymmetric path delays can only be measured by other means and provided for IEEE 1588. What is asymmetric correction? 1. When the communication path is symmetric, the path delay is the same in both directions of the path. In this case, the average path delay can be used to calculate thedirections of the path. In this case, the average path delay can be used to calculate the unidirectional path delay. 2. When the communication path is asymmetric, the path delays in the two directions of the path are different. In this case, asymmetric correction needs to be performed on the average path delay to obtain the unidirectional path delay. The delayAsymmetry parameter needs to be used to calculate the actual path delay from the master to the slave or from the responder to the requester.p q tms = <meanPathDelay> + delayAsymmetry, tsm = <meanPathDelay> ‐ delayAsymmetry. 30
  • 212. 31
  • 213. All PTP messages consist of a header, a body, and a suffix.  1. Header: It is the general packet header consisting of 34 bytes. The header is the  forepart of the 10 types of PTP messages.  2 Body: The contents of the body identify the type of a PTP message2. Body: The contents of the body identify the type of a PTP message.  3. Suffix: This field can be filled with 0s or TLVs to expand the functions of the PTP  protocol. 32
  • 214. The general header of a PTP message contains the following fields:  1.transportSpecific:  0: indicates that the PTP message is used by IEEE 1588.   1: indicates that the PTP message is used by 802.1as.  2.messageType: indicates the type of the PTP message.   0: Sync message y g  1: Delay_Req message   2: Pdelay_Req message   3: Pdelay_Resp message   4‐7: reserved   8: Follow_Up message   9: Delay_Resp message   A: Pdelay_Resp_Follow_Up message   B: Announce messageB: Announce message   C: Signaling message   D: Management message   E‐F: reserved  3.versionPTP: indicates the version of IEEE 1588.  4.messageLength: indicates the length of the PTP message.  5.domainNumber: indicates the domain that the sender of the PTP message belongs to.  6.correctionField: is the correction value expressed in ns multiplied by 216. For example, if the correction  value is 2 5 ns the value of this field is 0x28000value is 2.5 ns, the value of this field is 0x28000.  7.sourcePortIdentity: indicates the clock ID and the port that sends the PTP message.  8.sequenceld: indicates the sequence number of the PTP message and the relationship between consecutive  PTP messages.  9.controlField: depends on the message type and is used for compatibility with IEEE 1588v1.  10.logMessageInterval: indicates the interval for sending PTP messages, depending on the message type.  33
  • 215. 34
  • 216. 35
  • 217. 1. Delay jitter of the protocol stack:  The simplest implementation of PTP is to use it as a common application on the top of the network protocol stack. Timestamps are generated on the application layer. Therefore, the delay jitter in the protocol stack causes errors in timestamps. Typical errors of timestamps range from 100 µs to several milliseconds.  If timestamps are generated at the interrupt level rather than the application level, the delay jitter can be reduced to about 10 µs. The actual jitter depends on the application at the interrupt level and the service traffic on the network.  The hardware assistant technology can minimize the delay jitter in the protocol stack by generating timestamps at the physical layer of the protocol stack. The delay jitter can be controlled in an order of ns. The error of the timestamp is caused by the phase locking feature of the PHY chip used to recover the clock from data streams and synchronize data. 2. Delay jitter during forwarding  Network components introduce jitter when transmitting messages, which reduces the accuracy of the offsetFromMaster and meanPathDelay values.  High‐priority services have smaller delay jitter when being forwarded. On the bridge and router that can differentiate service priorities, you can set the priority of the PTP event messages to be higher than the priority of other data packets, reducing the jitter of the PTP event messages. 3 A f i3. Accuracy of timestamps  The clock that is used to generate timestamps required by PTP must retain the ideal accuracy. The local clock frequency of the TC or slave clock is usually different from the clock frequency of the grandmaster clock, which affects the accuracy of timestamps. 36
  • 218. 37
  • 219. 38
  • 220. 39
  • 221. 40
  • 222. 11/17/2013 1 NETWORK TIME PROTOCOL - NTP INTRODUCTION  NTP is a protocol for synchronizing the clocks on computers over packet-switched data networkscomputers over packet switched data networks  NTP delivers accurate and reliable time in spite of faults in the network  Provides a connectionless service (UDP in the AbuZarGhalib Transport Layer)  NTP is used on Internet 2
  • 223. 11/17/2013 2 CLOCK STRATA 1/2  NTP uses a hierarchical organization of clocksclocks  Stratum 0- Composed by: Atomic Clocks, GPS Clocks.  Stratum 1 – Primary  Time Servers- Computers attached to stratus 0 devices  They act as servers for requests from Stratus 2  Stratum 2 AbuZarGhalib  Computers sending NTP requests to Time Servers in Stratum 1  Computers in this level will reference to several time servers to synchronize their clocks  S2 Computers will peer with another S2 computers to provide more reliable and robust time for all devices in the peer group  They act as servers for requests from Stratus 3 3 CLOCK STRATA 2/2  Stratum 3, 4, …  Computers employ the same NTP function as in Stratum 2  Potentially up to 16 levels AbuZarGhalib 4
  • 224. 11/17/2013 3 NTP - SYNCHRONIZATION SUBNET  Computer local clock are synchronized to a number of Time Servers and peer computernumber of Time Servers and peer computer  The set of these computers and Time Servers is known as the Synchronization Subnet  The Stratum Number for each computer is AbuZarGhalib determined by the hop count to the root (Strata 0) 5 NTP - SYNCHRONIZATION SUBNET: EXAMPLE AbuZarGhalib 6
  • 225. 11/17/2013 4 NTP - DETERMINING TIME  Timestamps exchanged between the server and clients (subnet peers)clients (subnet peers) AbuZarGhalib 7 NTP - DETERMINING TIME: EXAMPLE AbuZarGhalib 8
  • 226. 11/17/2013 5 REFERENCES  D. Mills, “Internet Time Synchronization: The Network Time Protocol”, IEEE Trans. onNetwork Time Protocol , IEEE Trans. on Communications, vol. 39, no. 10, pp. 1482 – 1493, Oct. 1991.  NTP: The Network Time Protocol - www.ntp.org AbuZarGhalib  Wikipedia - www.wikipedia.com 9