Beruflich Dokumente
Kultur Dokumente
Application
ISSUE 1.0
1
Objectives
Internal Use 2
Chapter1 Common SDH Network Topologies
Internal Use 3
Network Topologies
Internal Use 4
Common SDH Network Topologies
Chain Network
Star Network
Tree Network
Ring Network
Mesh Network
Internal Use 5
Chain Network
A B C D E
Internal Use 6
Ring Network
Internal Use 7
Mesh Network
A
B D
E
Advantages of mesh network:
No bottle neck C
Very reliable
Disadvantages of mesh network:
Expensive
Complicated
Difficult to manage
Applications of mesh network:
Regions with large traffic
High hierarchy communication networks
Internal Use 8
Questions
Internal Use 9
Summary
Internal Use 10
Chapter1 Common SDH Network Topologies
Internal Use 11
Common Network Elements
MADM
REG
Internal Use 12
TM
STM-16/64
Internal Use 13
TM
Applications:
Point-to-point Network TM TM
Chain Network
Ring-chain Combination
TM ADM TM
ADM
ADM ADM TM
ADM
Internal Use 14
Common Network Elements
MADM
REG
Internal Use 15
ADM
STM-16/64 STM-16/64
Internal Use 16
ADM
Chain Network
Ring Network
Hub Network ADM
ADM ADM
ADM
TM TM
ADM
TM TM
Internal Use 17
Common Network Elements
MADM
REG
Internal Use 18
MADM
Internal Use 19
Common Network Elements
MADM
REG
Internal Use 20
REG
STM-16/64 STM-16/64
Internal Use 21
Choosing the NE Type
Internal Use 22
Summary
Internal Use 23
Chapter1 Common SDH Network Topologies
Internal Use 24
Introduction to SDH Network Protection
Basic Concepts
Linear MS Protection
Protection Rings
Internal Use 25
Basic Concepts
Survivable Network
A network that is capable of restoring traffic in the
event of a failure.
Automatically restore services
Within very short time (50ms)
Without manual intervention
Internal Use 26
Basic Concepts
Bidirectional Traffic
Traffic flow direction along the ring
Clockwise or counter-clockwise
Unidirectional Traffic
Traffic flow direction along the ring
a) Uniformly routed
Clockwise and counter-clockwise
The traffic is on
different equipment
and links
T1516670-94
b) Diversely routed
Internal Use 28
Introduction to SDH Network Protection
Basic Concepts
Linear MS Protection
Protection Rings
Internal Use 29
Types of Survivable Networks
Internal Use 30
Introduction to SDH Network Protection
Basic Concepts
Linear MS Protection
Protection Rings
Internal Use 31
1+1 Linear MS Protection
Working
Double Double
TM TM
Protection
Internal Use 32
1+1 Linear MS Protection
A B
Internal Use 33
1+1 Linear MS Protection
Internal Use 34
1:N Linear MS Protection
Internal Use 35
1:1 Linear MS Protection
Working
Protection
Internal Use 36
1:1 Linear MS Protection
Working
switch
switch
Protection
TU traffic TU traffic
Internal Use 37
1:N Linear MS Protection
Internal Use 38
Linear MS Protection
Features
Based on TM
Switch within point to point
Dual slots are not necessary
After configuration 2 minutes, MS protocol is started automatically
External commands
FS
WS
EXER
Locked
Internal Use 39
Summary
Internal Use 40
Summary
Network Capacity
Summary NSTM-N for 1:N linear MS protection without
extra traffic or (1+N) STM-N with extra traffic
STM-N for 1+1 linear MS protection
regardless of the switching modes
Internal Use 41
Questions
Internal Use 42
Introduction to SDH Network Protection
Basic Concepts
Linear MS Protection
MSP Rings
Internal Use 43
What Protection Rings Can We Have
MSP Rings
Two-fiber bidirectional multiplex section protection ring
Four-fiber bidirectional multiplex section protection ring
Internal Use 44
2f-bi MSP Ring
Traffic flow when network is normal:
Working channels: 1~N/2 VC4
Protection channels: N/2+1~N VC4
16 VC4s
8 Working S1
8 Protection P2 NE A
S1 P2
S2 P1
16 VC4s
8 Working S2 NE D
NE B
8 Protection P1
NE C
Internal Use 45
2f-bi MSP Ring
Assume Traffic Service between NEA and NEC under normal traffic flow
The STM-1(e) signals occupy VC4 - #1
NE A
East West
#1 VC-4
East
NE A East Line unit (VC4 - #1)
West
STM-16 two-fiber fiber Line
NE B bidirectional MSP ring NE D
NE B West Line unit (VC4 - #1)
East Primary ring West
NE B East Line unit (VC4 - #1)
fiber Line
West East NE C West Line unit (VC4 - #1)
NE C
Internal Use 46
2f-bi MSP Ring
Internal Use 47
2f-bi MSP Ring
Internal Use 48
2f-bi MSP Ring
Internal Use 49
2f-bi MSP Ring
APS controller:
Processes APS protocol and algorithm
APS protocol is carried in the K1, K2 bytes.
Internal Use 50
2f-bi MSP Ring
Transition of APS controller status:
I I
S WTR
S P WTR P
P P
I = Idle P = Pass-through
S = Switching WTR = Wait to Restore
Internal Use 51
2f-bi MSP Ring
Internal Use 52
MSP ring
Please try your best to use the dual slots to build a MSP ring.
Between the dual slots, K1&K2 bytes can passthrough faster.
The dual optical ports for dual slots are 1 to 1, 2 to 2, etc.
Internal Use 53
OSN 1500 Dual Slots
Slot 14
Slot 18 PIU
Slot 15
Slot 16
Slot 19 PIU
Slot 17
Internal Use 54
OSN 2500 Dual Slots
S S
S S S S S S S S
L L
L L L L L L L L
O O S S S S
S S S S O O O O O O O O
T T L L L L
L L L L T T T T T T T T
9 10 O O O O
O O O O 5 6 7 8 11 12 13 14
T T T T
T T T T
C C 1 1 1 1
1 2 3 4 S
622Mbit/s
622Mbit/s
622Mbit/s
622Mbit/s
622Mbit/s
2.5Gbit/s
2.5Gbit/s
X X 5 6 7 8
A
L L
P
16 16
fiber Routing
PIU FAN FAN PIU
SLOT22 SLOT23 SLOT24 SLOT25
S S S S S S S S S S S S S S S S S S
L L L L L L L L L L L L L L L L 1 L
O O O O O O O O O O O O O O O O 7 O
T T T T T T T T T T T T T T T T S T
1 2 3 4 5 6 7 8 9 1 1 1 1 1 1 1 C 1
0 1 2 3 4 5 6 C 8
1.25Gbit/s
1.25Gbit/s
1.25Gbit/s
1.25Gbit/s
1.25Gbit/s
1.25Gbit/s
1.25Gbit/s
2.5Gbit/s
2.5Gbit/s
2.5Gbit/s
2.5Gbit/s
10Gbit/s
10Gbit/s
10Gbit/s
10Gbit/s
S
EXCS
EXCS
C
C
fiber Routing
Internal Use 56
OSN 7500 Dual Slots
S LS LS LS LS LS S S S S S S S SLOT S S S S S
L L OL OL OL O L L L L L L L L 32 L L L L L
OTO TO TO TO TO O
PIU(A)
O O O O O O O O O O O
T T 1T 1T 1T 1T T T T T T T T T T T T T
1 42 52 62 72 82 2 2 2 2 2 3 3 3 3 3 3 3
9 0 1 2 3 4 5 6 7 8 9 0 1 4 5 6 7 8
SLOT
S S 33
SCC(B)
SCC(A)
PIU(B)
EOW
AUX
C C
S S S S S S S S S S S S S S S S S S
L L L L L L L L L L L L L L L L L L
O O O O O O O O O O O O O O O O O O
T T T T T T T T T T T T T T T T T T
1 2 3 4 5 6 7 8 9 1 1 1 1 1 1 1 1 1
0 1 2 3 4 5 6 7 8
XCS(B)
XCS(A)
A: active B: backup
Internal Use 57
OSN 9500 Dual Slots
Not fixed
Software configuration
Internal Use 58
2f-bi MSP Ring
West and east direction
West: the left one of dual slot
East: the right one of dual slot
Ring direction
Node A
Active ring direction
E W
Transmitting from E
Receiving from W
Standby ring direction
Transmitting from W
W E
Receiving from E
E W
Node B Node D
W E
Node C
Internal Use 59
What Protection Rings Can We Have
MSP Rings
Two-fiber bidirectional multiplex section protection ring
Four-fiber bidirectional multiplex section protection ring
Internal Use 60
4f-bi MSP Ring
Structure:
Four fibers
Working channels--S1,S2, carry normal traffic
Protection channels--P1,P2, protect normal traffic
CA AC
S1
P1
S2
P2
B D
P2 C
S2
P1
S1
CA AC
Internal Use 61
4f-bi MSP Ring
B D
Internal Use 62
4f-bi MSP Ring
B D
Internal Use 63
4f-bi MSP Ring
B D
Internal Use 64
4f-bi MSP Ring
Internal Use 65
4f-bi MSP Ring
Internal Use 66
4f-bi MSP Ring
Internal Use 67
4f-bi MSP Ring
Internal Use 68
4f-bi MSP Ring
Internal Use 69
Summary
Internal Use 70
Introduction to SDH Network Protection
Basic Concepts
Linear MS Protection
MSP Rings
Internal Use 71
Subnetwork Connection Protection
Description:
Protection one SubNetwork Connection
Can be adapted to all networks
123
Working Subnetwork 1
SNC
SNC
SNC
Starting Termination
Node
Node
Selector
NE A Protection NE B
SNC
Subnetwork 2
123
Internal Use 72
SubNetwork Connection Protection
Protection principle
Concurrent sending (transmit end)
Selective receiving (receive end)
2M
in out
out in
A
out in out in
SNCP
B Ring D
in out in out
Subnetwork 1 C Subnetwork 2
in out
out in
STM-N
2M
Internal Use 73
SubNetwork Connection Protection
Internal Use 74
SubNetwork Connection Protection
Protection Restoration:
Restoration time - 10 minutes (provisionable on the order of 5-12
minutes)
S1 S1
P1 P1
A A
B D B D
C C
switch
Internal Use 75
SubNetwork Connection Protection
SNCP service
Service sink
Internal Use 76
SNCP services grouping
If
too much SNCP services, switch completion time >50ms
Method to solve the problem: grouping
Make multi-SNCP services with the same source, sink and route
as a group
Select a SNCP service as detection objective
Increase SNCP information processed
Restoration is separated from grouping
Grouping is not effective for external commands
Internal Use 77
Networking Capability
Internal Use 78
Questions
Internal Use 79
Summary
Item 2f-MSP Ring SNCP
APS protocol necessary unnecessary
Typical services Bidirectional and disperse unidirectional and centralized
Switch level (objective) MS SNC services
Suitable networking Only ring All topology
Switching LU, XC LU, XC
implementing boards
Switch time About 25ms The more traffic, the longer
switching time
Network Capacity K*STM-N/2 STM-N
Extra traffic Support Not support
Network Capacity K*STM-N/2 STM-N
Internal Use 80
Chapter1 Common SDH Network Topologies
Internal Use 81
Synchronous Clock Sources
Internal Use 82
Working modes of the clock unit
BITS
Normal
A
Timing signals is ok
Holdover
Frequency information
stored, holding for 24hrs C
Free-run B
Internal clock
Internal Use 83
Chapter1 Common SDH Network Topologies
Internal Use 84
An Example of Orderwire Application
Internal Use 85
Chapter1 Common SDH Network Topologies
Internal Use 86
Communication ways between stations
TCP/IP Protocol
ECC Protocol
GNE NE NE NE NE
TCP/IP
Protocol
DCC Channel (ECC Protocol)
TMN
OAM Messages: Performance, Alarm,
Operation commands
Internal Use 87
ECC Communication
Internal Use 88
ECC Optimization
Internal Use 89
ECC channels
OSN 1500 20
OSN 2500 40
OSN 3500 40
Internal Use 90
Connection Mode between Gateway and NMS
Internal Use 91
Connection Mode between Gateway and NMS
NMS
HUB
TCP/IP
GNE GNE
......
NE NE NE NE
NE NE
Internal Use 92
Connection Mode between Gateway and NMS
Internal Use 93
Gateway Backup
NE2
NE3
NE1
DDN
NE3
NE5
NE4
Internal Use 94
Extended ECC
Internal Use 95
Questions
How many ways can connect the NMS computer with the gateway?
Internal Use 96
Summary
Internal Use 97
Confidential Information of Huawei. No Spreading without Permission.