Beruflich Dokumente
Kultur Dokumente
Introduction
The Synchronous Digital Hierarchy (SDH) forms the backbone of many service provider and
carrier networks. SDH is used as time-division multiplexed (TDM) transport mechanism for
voice and data. Frame- and cell-switched data networks, such as Frame Relay and ATM also
depend on SDH TDM circuits.
Why SDH?
Early copper-based electrical transmission systems used time-division multiplexing to resolve
capacity issues. However, with the massive increase in voice traffic, and commercialization of
optical technology in the early 1980s, fiber-optic cable technology turned out to be the medium
of choice. Information that previously required hundreds of copper pairs could be transmitted
down a glass fiber only slightly thicker than a human hair. Carriers adopted fiber-optic
technology and started testing and deploying fiber networks. These first-generation fiber-optic
systems in the Public Switched Telephone Network (PSTN) used its private architectures,
equipment, line codes, multiplexing formats, and maintenance procedures. Interconnection and
interoperability between two carriers (each using different hardware vendors) was almost
impossible to achieve.
So the need of standardization was required to solve the issues of interconnection and
interoperability between the carriers. The Consultative Committee for International Telegraph
and Telephone (CCITT) had established a standard, Synchronous Digital Hierarchy (SDH), in
Europe results from the SONET concepts proposed in the USA. The CCITT organization
reorganized and formed the International Telecommunication Union Telecommunication
Standardization Sector (ITU-T) in 1993. The ITU-T SDH standards and equipment are
implemented in Europe, Middle East, and Africa (EMEA), Latin America, and in the Asia
Pacific region.
Page
STM-N
Rate(Mb/s)
STM-1
STM-4
STM-16
STM-64
STM-256
155.520
622.080
2488.320
9953.280
39813.12
Abbreviated as
155 Mb/s
622 Mb/s
2.5 Gb/s
10 Gb/s
40 Gb/s
Each STM-N interface rate contains SDH Overhead (OH) information to support Operation,
Administration and Management (OAM) functions and a Payload capacity for the traffic.
Devices
The figure below shows a simple link using SDH devices. SDH transmission depends on three
basic devices: Terminal Multiplexer (TM), Regenerator (R), and Add/Drop Multiplexer
(ADM).
Tributary Signals
2Mb/s
Tributary Signals
2Mb/s
34Mb/s
34Mb/s
140Mb/s
140Mb/s
Page
optical signal. The optical signal is transmitted to a regenerator, where it is recreated without
the noise. The regenerated signals are then fed into an Add/Drop multiplexer. The Add/Drop
multiplexer reorganizes these signals, if necessary, and sends them out as directed by
information in the data frames. These re-multiplexed signals are sent to another regenerator and
from there to the receiving TM de-multiplexer, where they are returned to its original form.
Connections
The devices defined in the previous section are connected together by using Regenerator
sections, Multiplex sections, and path as shown in the figure below.
Reg. Section
Reg. Section
Reg. Section
Multiplex Section
Reg. Section
Reg. Section
Multiplex Section
Path
Regenerator section
Its the section between two Regenerators (R & R) or between a Regenerator and a Transport
Node (R & TM) or (R & ADM).
Multiplex section
Its the section between two Transport Nodes (TM & ADM).
Path
Its the end-to-end portion of the network between two Transport nodes (TM & TM).
Page
Photonic layer
The photonic layer corresponds to the physical layer of the OSI model. It includes physical
specifications for the optical fiber channel, the sensitivity of the receiver, and so on. SDH uses
NRZ encoding with the presence of light representing 1 and the absence of light representing 0.
Regenerator Section Layer
The Regenerator section in SDH is the portion of a transmission facility, including terminating
points, between a transport node and a Regenerator, or two Regenerators.
Multiplex Section Layer
The multiplex section provides the means of transporting information between two consecutive
transport nodes. One of the transport nodes originates the signal, and the other terminates the
signal in either direction.
Path Layer
The path layer is responsible for the movement of a signal from its optical source to its optical
destination. At the optical source, the signal is changed from an electronic form into an optical
form, multiplexed with other signals, and encapsulated in a frame. At the optical destination,
the received frame de-multiplexed, and the individual optical signals are changed back into
their electronic forms.
The figure below shows the relationship between the devices used in SDH transmission and the
four layers of the standard. As you can see TM multiplexer is a four-layer device, Add/Drop
multiplexer is a three-layer device and Regenerator is a two-layer device.
Page
Payload
Page
2. A column of Path Overhead (POH) is added to every C-4 block to implement real-time
monitoring over the path of 140Mb/s Signals. The resulting block is called VC-4. The
rate of VC-4 = 9 rows x 261 columns x 8 bit/byte x 8000 frame/s =150.336 Mb/s.
3. A row of Administrative Unit Pointer (AU-PTR) is added to the VC-4 to indicate the
start of the VC-4 in the payload. The resulting is called AU-4and it has the basic
structure of STM-1 frame but without SOH.
4. The Section Overhead (RSOH + MSOH) is added to the AU-4 to complete the STM-1
Frame.
Page
E3 (34Mb/s) to STM-1
1. First the 34Mb/s PDH signal adapted via bit stuffing into contair called C-3.
The C-3 Container has 9 rows x 84 columns (756 bytes).
2. A column of Path Overhead (POH) is added to every C-3 block to implement real-time
monitoring over the path of 34Mb/s Signals. The resulting block is called VC-3.
3. A three bytes Tributary Uint pointer (TU-PTR) is added to every VC-3 block to indcate
the start of the VC-3 in the payload. The resulting is called Tributary Unit 3(TU-3). i.e
the TU-PTR indicates the start of VC-3 in TU-3.
4. TU-3 frame structure is incomplete. Six Random bytes (R) are stuffed to fill the gap of
the TU-3. The new block is called Tributary Unit Group 3 (TUG-3).
Page
6. C-4 container is not complete. We add two columns of stuffed bytes (R).
i.e three E3 (34Mb/s) PDH signals Can be multiplexed into one STM-1
E1 (2Mb/s) to STM-1
1. First the 2 Mb/s PDH signal adapted via bit stuffing into contair called C-12.
The C-12 Container can mount (34 bytes).
2. One byte of Low-Order Path Overhead (LO-POH) is added to the notch in the top left
corner of each C-12 block to implement real-time monitoring over the path of 2Mb/s
Signals. The resulting block is called VC-12.
Page
3. One byte of Tributary Uint pointer (TU-PTR) is added to every VC-12 block to indcate
the start of the VC-3 in the payload. The resulting is called Tributary Unit 12(TU-12).
i.e the TU-PTR indicates the start of VC-12 in TU-12.
4. Three Tributary Unit 12 (TU-12) are byte interleaved to form Tributary unit group 2
(TUG-2).
5. Seven TUG-2 are byte interleaved with the same method and add two columns of
stuffed bytes to form TUG-3.
Page
C (Container),
VC (Virtual Container),
TU (Tributary Unit),
TUG (Tributary Unit Group),
AU (Administrative Unit),
AUG (Administrative Unit Group).
Low-rate tributaries are multiplexed into STM-N signals through three procedures: mapping,
aligning, and multiplexing.
SDH mapping: is a procedure by which tributaries are adapted into virtual containers at the
boundary of an SDH network, e.g. E1 into VC-12.
SDH aligning: is a procedure to add TU-PTR or AU-PTR into the VC-12, VC-3 or VC4. The
pointer value constantly locates the start point of VC within the TU or AU so that the receiving
end can correctly separate the corresponding VC.
SDH multiplexing: is the procedure by which the TUs are organized into the higher order VC
or the AUs are organized into STM-N via byte interleaving.
Page 10
VC-4 #1
VC-4 #1
VC-4 #2
VC-4 #2
RSOH
VC-4 #3
VC-4 #3
VC-4 #N
VC-4 #N
MSOH
6.4 Overhead
The functions of overhead are to implement layered monitoring management (OAM) for SDH
signals. The monitoring is classified into Section layer monitoring and Path layer monitoring.
The section layer monitoring is further classified into Regenerator section layer monitoring and
Multiplex section layer monitoring while the path layer monitoring is further classified into
Higher order path layer and Lower order path layer.
Example
The figure below shows that the incoming tributary signals are adapted into the suitable
containers, after that the terminal multiplexer generates the POH and SOH (RSOH1, MSOH1),
and then sends the STM-N signal to the regenerator. The regenerator evaluates the RSOH1 and
generates new RSOH2 and sends the STM-N signal to the second regenerator. The second
regenerator evaluates the RSOH2 and generates RSOH3 and sends the STM-N signal to the
terminal multiplexer. The terminal multiplexer evaluates the POH, MSOH1, and RSOH3and
then drop the tributary signals.
Page 11
We can now define (Path, Multiplex section, and Regenerator section) again as follows
Regenerator section
Its the section between two Regenerators (R & R) or between a Regenerator and a Transport
Node (R & TM) where RSOH generated or evaluated or extracted.
Multiplex section
Its the section between two Transport Nodes (TM & ADM) where the MSOH generated or
evaluated or extracted.
Path
Its the end-to-end portion of the network between two Transport nodes (TM & TM) where the
POH generated or extracted.
Frame alignment.
STM-1 Identification.
Error Control.
Engineering orderwire.
User channel.
Data communication channel.
Automatic protection switching.
Synchronization quality level.
The first step is to properly extract each STM-N frame from the received continuous signal
stream at the receiver. The function of the bytes A1 and A2 is to locate the start of the STM-N
Page 12
frame. So the receiver can align and extract the STM-N frame from the information stream via
these two bytes.
How does the receiver align the frames via the A1 and A2 bytes?
The A1 and A2 have fixed value, i.e. fixed bit patterns: A1: 11110110 (f6H) and A2:
00101000(28H). The receiver monitors each byte in the stream. After detecting 3N successive
f6H bytes followed by 3N 28H bytes (there are three A1 and three A2 bytes within an STM-1
frame), the receiver determines that an STM-N frame starts to be received. By aligning the start
of each STM-N frame, the receiver can identify different STM-N frames and disassemble them.
If the receiver doesn't receive A1 and A2 bytes within five or more successive frames (625us),
i.e. it can't identify the start of five successive frames (identify different frames), it will enter
out-of-frame status and generate out-of-frame alarm ---- OOF. If the OOF keeps for 3ms, the
receiver will enter loss-of-frame status ---- the equipment will generate loss-of-frame alarm ---LOF. Meanwhile, an AIS signal will be sent downward and the entire services will be
interrupted. Under LOF status, if the receiver stays in normal frame alignment status again for
successive 1ms or more, the equipment will restore the normal status.
b) STM-1 Identification (J0)
Its used for repeatedly transmission to give a path through an SDH network a (predefined
Name between the receiver & intended transmitter), this (predefined Name) enables the
receiver to check the continuity of its connection with the intended transmitter. Also its used as
an STM-1 identifier, each STM-1 frame take an ID number before being interleaved into an
STM-N signal.
Note
Before the STM-N frame transmitted by the physical link (optical fiber) it is always scrambled
at the transmitter except RSOH first row and at the receiver side each frame is descrambled to
restore the original data sequence.
The RSOH first row (A1, A2, and J0) is not scrambled because it contains bytes locating
frames beginning.
c) Error monitoring (B1, B2)
B1 is one byte uses the technique of Bit Interleaved Parity Code (BIP-8) at the regenerator
section level (for detailed description about BIP-N Technique please see appendix 2).
The B1 Byte is only defined in the first STM-1 frame in an STM-N signal.
To understand the mechanism of B1 see the figure below and follow its related discussion.
Page 13
Tx
Rx
1# STM-N
2# STM-N
2# STM-N
1# STM-N
1- The transmitting equipment processes BIP-8 even parity over all bytes of the previous frame
(1#STM-N) after scrambling [parity process result = x] and places the result in byte B1 of the
current frame (2#STM-N) before scrambling [B1= x].
2- The receiver processes BIP-8 parity over all bits of the current frame (1#STM-N) before descrambling [result =y]and compares the parity result and the value of B1 in the next frame
(2#STM-N) after de-scrambling[which is x].
3-If x y , it means an error occurred and the different bit means error block. According to the
number of different bits, we can monitor the number of error blocks occurred in 1#STM-N
frame during transmission.
4- If the B1 of the receive end has detected error blocks, the number of error blocks detected by
the B1 will be displayed in receive end performance event RS-BBE (Regenerator Section
Background Block Error).
5-When the error bits detected by the receive end exceed a given threshold, the equipment will
report corresponding alarms, i.e. when the error bit ratio (EBR) is greater than 10-6, the given
alarm is B1-SD(signal degrade) & When the error bit ratio (EBR) is greater than 10-3, B1-EXC
(another name B1-OVER) will be given.
6- It is necessary to differentiate between events & alarms; all alarms are events not vice versa,
and the alarm is an indication for a problem need to be solved almost quickly.
B2 is similar to B1 in operation mechanism except that it monitors the error status of the
multiplex section layer. The B1 byte monitors the transmission error of the complete STM-N
frame signal. There is only one B1 byte in an STM-N frame. There are N*3 B2 bytes in an
STM-N frame with every three B2 bytes corresponding to an STM-1 frame. The B2 monitoring
adopts BIP-24 (three bytes) method, which can at most monitor 24 error blocks one time.
As can be seen from the BIP-24 parity method, each bit of the parity result is corresponding to a
bit block. So three B2 bytes can at most monitor 24 error blocks from an STM-N frame that
occur during transmission (The result of BIP-24 is 24 bits with each bit corresponding to a
column of bits ---- a block).
If the B2 of the receive end has detected error blocks, the number of error blocks detected by
the B2 will be displayed in this end performance event MS-BBE (Multiplex Section
Background Block Error). At the same time, M2 will be used to report to the transmit end that
error blocks have been detected, and the transmit end will report MS-FEBBE (Multiplex
Section Far End Background Block Error) performance event and MS-REI (Multiplex
Section Remote Error Indication) alarm. When the error bits detected by the receive end
exceed a given threshold, the equipment will report corresponding alarms. When the error bit
ratio (EBR) is greater than 10-6, the given alarm is B2-SD. When the error bit ratio (EBR) is
greater than 10-3, B2-EXC will be given.
Page 14
E1 is part of the RSOH and may be accessed at regenerators. E2 is part of the MSOH and can
be accessed at multiplex section terminations. Each of these two bytes provides a 64kb/s
orderwire channel for voice communication, i.e. voice information is transmitted via these two
bytes. The orderwire provides a convenient communication function during maintenance and
troubleshooting. E1and E2 bytes are only defined is STM-1 frame in an STM-N signal.
e) User channel (F1)
It is reserved for the network operators and can be used to provide a 64 kb/s data or voice
channel i.e. this byte can be used for services and maintenance purposes. This byte is only
defined in the first STM-1 frame in an STM-N frame.
f) Data communication channel
RS-DCC D1 ~ D3 192 Kbit/s (3x64 Kbit/s).
MS-DCC D4 ~ D12 576 Kbit/s (9x64 Kbit/s).
Page 15
One of the features of SDH is its highly automatic OAM function which can conduct
commands issues and performance auto poll to the networks element via NMT Network
Management Terminals. SDH has some functions which do not exist in PDH systems, such as
real-time service allocation, alarm fault location and on-line performance testing. Where are
these OAM data arranged to transmit? The data used for OAM functions, such as sent
commands and checked alarm performance data, are transmitted via D1-D12 bytes within the
STM-N frame. Thus the D1-D12 bytes provide a common data communication channel
accessible to all SDH network elements. As the physical layer of the embedded control channel
(ECC), the D1-D12 bytes transmit OAM information among the network elements and form a
transmission channel of the SDH management network (SMN).
The DCC has a total rate of 768kb/s that provides a powerful communication base for SDH
network management. D1, D2 and D3 are regenerator section DCC bytes (DCCR) with a rate of
364kb/s 192kb/s and are used to transmit OAM information among regenerator section
terminals. D4-D12 are multiplex section DCC bytes (DCCM) with a sum rate of
964kb/s=576kb/s and are used to transmit OAM information among multiplex section
terminals.
g) Automatic protection switching (K1, K2 (b1-b5))
Automatic Protection Switching (APS) is the capability of a transmission system to detect a
failure on a working facility and to switch to a standby facility to recover the traffic. This
capability has a positive effect on the overall system availability. The Multiplex Section in SDH
is protected in this automatic fashion. The Multiplex Section protection (MSP) mechanisms are
coordinated by the K1 and K2 bytes in the Multiplex Section Overhead. You should know that
Protection switching is initiated as a result of one of the following situations:
1- Signal failure.
2- Signal degradation.
3- In response to commands from a local craft terminal or a remote network manager.
There are two modes of APS, 1+1 protection switching and 1: N protection switching. More
about APS and K1, K2 bytes will be discussed later in chapter 8.
Multiplex Section Remote Defect Indication (MS-RDI) K2 (b6-b8):
The bits 6, 7 and 8 of K2 are used for error indication alarm function; you can understand the
function of these bits by the following examples:
As shown in figure below , If the signal from REG to TM2 was defected resulting in bit error
rate exceed 10-3 then TM2 sets K2(b6-b8) to 110 and transmits a new STM-N frame to TM1,
and TM1 receiver interprets that as an error message of MS-RDI return by the opposite side.
Page 16
REG
TM 1
TM 2
MS-RDI
110
110
Another probability may occur; If the optical line between TM1and REG is disconnected ,then
a status of loss of frame (LOF) will happen and K2(b6-b8) will be set to 111 and will be
transmitted to TM2 ,then TM2 receiver interprets the message to an MS-AIS(multiplex section
alarm indication signal )as an alarm received by the current side , meanwhile TM2 sets
K2(b6-b8) to 110 and sends it to the opposite side , after that normally TM1 generates an MSRDI alarm return by the opposite direction ,as shown in the figure below.
TM 1
Line disconnection
REG
111
MS-RDI
TM 2
111
MS-AIS
110
110
110
As a brief summary: we can say that if the SDH MUX receiver detects:
K2 =110, then the MUX will generate MS-RDI alarm.
K2=111, then the MUX will generate MS-AIS alarm, and return MS-RDI to the
opposite direction MUX.
h) Synchronization quality level (S1)
Bits 5 to 8 of S1 byte are allocated for Synchronization Status Messages (SSM) to indicate the
synchronization quality level. The table below gives the assignment of bit patterns to the four
synchronization levels agreed to ITU-T.
bits 5 ~ 8
0000
0010
0100
1000
1011
1111
Description
Quality unknown (existing sync. Network)
G.811 PRC
SSU-A (G.812 transit)
SSU-B (G.812 local)
G.813 (Sync. Equipment Timing Clock)
Do not use for sync (DNU).
Different bit patterns, indicating different quality levels of clocks defined by ITU-T, enable the
equipment to determine the quality of the received clock timing signal. This helps to determine
whether or not to switch the clock source, i.e. switch to higher quality clock source. The smaller
the value of S1 (b5-b8), the higher the level of clock quality. Bits 1 to 4 of S1 byte indicate the
different external clock sources ID for clock protection purposes. This byte is only defined in
the first STM-1 frame in an STM-N signal.
Z1 and Z2 Bytes are spare bytes for future use
Page 17
The received J1 should match or be same with the expected J1. If not, HO-Path Trace
Identifier Mismatch (HP-TIM) alarm will be generated, which perhaps interrupts the service
within the VC4 sometimes.
Page 18
C2
Unequipped
C2= 00000000
C2
C2
C-4(140Mb/s)
C2= 00010010
3 X TUG-3(34
or 2Mb/s)
C2= 00000010
C2
C2
ATM Cells
FDDI signal
C2= 00010011
C2= 00010101
For 5 frames
The received C2 should match or be same with the expected C2. If not, HO-Path Payload
Label Mismatch (HP-PLM) alarm will be generated, which interrupts the service within the
VC4 sometimes. And if the received C2 is 00H a HO-Path Unequipped (HP-UNEQ) alarm
will be generated. As shown in the figure above.
Path Status Byte (G1)
It is used to give to the VC3/VC4 path source some important information about the actual
status and performance of the path sink or termination.
Page 19
HP-REI
5
HP-RDI
NOT USED
Page 20
V5
It is the first byte in VC-12. The TU-12 pointer points at this byte and represents thus the
reference point of the VC-12. V5 is used for transmitting the following information.
2
BIP-2
LP-REI LP-RFI
Signal Label
8
LP-RDI
b6
0
0
1
1
0
0
1
1
b7
0
1
0
1
0
1
0
1
Meaning
Unequipped
Equipped non specific payload
Asynchronous
Bit - Synchronous
Byte Synchronous
Equipped - unused
Page 21
6.5 Pointers
SDH network is intended to be a synchronous network. However, there will always be slight
timing difference because different clocks are being used or the same clock is being distributed
over long distances. SDH pointers allow this limited asynchronous operation within the
synchronous network.
The VC has no fixed phase relation to the frame it can start at any position within the payload
area. Most often it begins in one frame and ends in another. This ability of the VC to move
relative to the STM frame is known as floating.
Pointer types
In the Synchronous Digital Hierarchy (SDH), there are two pointer types: the AU pointer and
the TU pointer which are used for aligning of VC-4 and VC-12 within the AU-4 and TU-12
respectively.
Page 22
The stuffing bytes are inserted directly behind the last H3 byte, for an AU-4 three stuffing bytes
are inserted. The new pointer (P+1) is then transmitted starting at the next frame. The next VC4 starts at the position indicated by the new pointer.
Negative justification
If the frame frequency of the VC-4 is higher than that of the STM-N frame, additional
information of the VC-4 must be transmitted in the H3 bytes and the pointer value must be
decreased by 1 at regular intervals.
The following three H3 bytes are filled with information. The new pointer (P-1) is transmitted
starting at the next frame. The next VC starts at the position indicated by the new pointer.
Page 23
H1 and H2 are read as a 16-bit data word including the New Data Flag NDF and the pointer
value. In case of modifications of the payload, it may be necessary to set a new pointer value. In
order to indicate this change, the so-called New Data Flag (NDF) is set. Then the new pointer
value is transmitted. On the receive side, the NDF is evaluated. The new pointer value received
indicates the new position of the Virtual Container VC-4. The NDF with the new pointer value
is transmitted only once, i.e. in the first frame. There must not be any further pointer operations
within the next three frames.
V1 and V2 can be read as a 16-bit data word. Bits 1 to 4 represent the New Data Flag NDF. The
following two values have been defined:
Page 24
Page 25
Card Failure
This alarm indicates that the card filled in a specific slot is out of service. The alarm is
cancelled when the old card is substituted by a new one.
LAP-D KO
This alarm indicates that the data channels connecting the present NE and remote units are
down.
In the remote side a LAP-D FAIL Alarm is generated
There are two different types of LAP-D KO Alarm:
- MS LAP-D Fail (data channels of Multiplexer Section are down)
- RS LAP-D Fail (data channels of Regenerator Section are down).
It is a NOT URGENT Alarm. The problem can be solved checking the LAP-D settings in the
Application Local Configuration, or in the LAP_D Configuration and Local Configuration
Table.
Page 26
Page 27