Course The SDH multiplexing strategy. Mapping of PDH tributaries. The SDH reference model.
|
|
|
- Tracy Harrison
- 9 years ago
- Views:
Transcription
1 Course The SDH multiplexing strategy. Mapping of PDH tributaries. The SDH reference model. Zsolt Polgar Communications Department Faculty of Electronics and Telecommunications, Technical University of Cluj-Napoca
2 The SDH/SONET multiplexing strategy; The elements of the SDH/SONET multiplex; Block structures used by the SDH system; Block structures used by the SONET system; Content of the course The SDH/SONET synchronous multiplexing scheme; The multiplexing in the SDH system; The multiplexing in the SONET system; The overhead information used for controlling the synchronous multiplexing; The SDH/SONET sections; Error monitoring; The overhead information associated to SDH/SONET frames and containers; Pointers and pointer operations in the SDH/SONET systems; The utility/role of pointers; Pointer operations; Structure of the SDH pointers; Telephony 2
3 Content of the course Mapping of PDH flows in SDH containers; Synchronous and asynchronous mapping techniques; Asynchronous mapping of the PDH flows in SDH containers; Mapping of E4, E3, E1 and T1 PDH flows in the appropriate containers; The reference model associated to SDH equipments; Characterization of the reference model s component blocks; Protection switching in SDH systems; Basic definitions related to protection switching; Protection switching procedures; Path/sub-network protection switching. Telephony 3
4 The elements of the SDH/SONET multiplex Container C; Represents a bloc structure with imposed dimensions; Contains only data belonging to a tributary; doesn t contain any control or management information; There are containers with different dimensions adapted to the data rate of different PDH tributaries; the container s transport capacity is chosen larger than the rate of the corresponding PDH tributaries; the rate deviation of the PDH signals from the nominal value can be managed by an appropriate positive justification. Containers characteristics to the SDH system: C4 149,76Mbps bit rate; C3 48,384Mbps bit rate; C2 6,784Mbps bit rate; C12 2,176Mbps bit rate; C11 1,6Mbps bit rate. Telephony 4
5 The elements of the SDH/SONET multiplex Virtual container VC; Represents the container extended with a Path Overhead (POH); POH is used to control and monitor the transmission of information of the container on the entire path between the source and the destination; it is used also to identify the content of the container; POH is not modified during the transmission; superior order containers (C3 and C4) have the POH composed of a column of 9 bytes. Inferior order containers (C11, C12 and C2); POH is composed of 4 bytes distributed over 4 successive containers; one container includes only a single POH byte. Administrative units AU; These units are obtained from the VC-3 and VC-4 virtual containers by adding pointers to these structures; the pointer establishes the relation between the STM-1 reference point and the beginning of the VC-3 and VC-4 virtual containers. Telephony 5
6 The elements of the SDH/SONET multiplex the AU3 pointer is composed of 3 bytes; the AU4 pointer is composed of 9 bytes; out of from which only 5 bytes are used : 2 pointer bytes+ 3 negative justification bytes. The payload of the STM-1 frame consists of one AU4 unit or three AU3 units. Structure of the containers and virtual containers; POH C4 POH C3 VC4 VC POH C2 POH C12 POH C11 VC2 VC12 VC11 Telephony 6
7 The elements of the SDH/SONET multiplex Tributary units TU; These units are composed of VC11, VC12, VC2 and VC3 virtual containers plus a pointer; In the TU11, TU12 and TU2 units is place only for one pointer byte, but there are necessary 4 bytes for pointer operations; the solution is the distribution of the pointer bytes over 4 TU units. In the TU3 unit obtained from a VC3 container is used a 3 bytes pointer; Parameters of the tributary units of the SDH system; TU type Structure Global rate TU11 9 lines, 3 1,728Mbps columns TU12 9 lines, 4 2,304Mbps columns TU2 9 lines, 12 6,912Mbps columns TU3 9 lines, 86 columns 49,535Mbps Telephony 7
8 The elements of the SDH/SONET multiplex Structure of the administrative units and of the tributary units used in the SDH system; 1 12 TU2 1 4 TU TU11 TU3 pointer stuffing 1 86 TU3 pointer AU4 9 bytes VC4 pointer AU VC3 AU4 3 bytes AU3 Telephony 8
9 The elements of the SDH/SONET multiplex Tributary Unit Group TUG; Tributary units are multiplexed in tributary unit groups; these units represent a grouping of signals structured in frames with 125 s period and having identical phase (position). The generation of the TUG units is achieved by a simple column by column multiplexing of the TU units; no phase (position) adjustment is performed. There are two types of TUG units: TUG2 includes a TU2 unit or 3 TU12 units or 4 TU11 units; TUG3 includes one TU3 units. Administrative Unit Group AUG; Is composed of one AU4 unit or three multiplexed AU3 units; it is a structure composed of 261 columns, 9 rows plus 9 pointer bytes in the fourth row. Telephony 9
10 The elements of the SDH/SONET multiplex Bloc structures used in the SONET system: SPE - SONET Payload Envelope; It is a structure equivalent with the SDH VC3 virtual container; Is composed of: payload: a matrix structure with dimensions: 9 lines 86 columns; POH composed of one column with 9 lines. The payload capacity is 49,536 Mbps, and the capacity of the entire SPE container is 50,112 Mbps; Virtual Tributary VT; These units are similar with the TU units of the SDH system; There are 4 such units: VT type Structure Rate VT1.5 9 lines, 3 1,728Mbps columns VT2 9 lines, 4 2,304Mbps columns VT3 9 lines, 6 3,456Mbps columns VT6 9 lines, 12 columns 6,912Mbps Telephony 10
11 The elements of the SDH/SONET multiplex VT units have (like the TU units of the SDH system) a POH on 4 bytes and a pointer also on 4 bytes; POH and the pointer are distributed over 4 consecutive VT units; Virtual Tributary Group VTG; Matrix structure composed of 9 lines and 12 columns; it can include 4 VT1.5 units, 3 VT2 units, 2 VT3 units and 1 VT6 unit. Telephony 11
12 The SDH multiplexing scheme Synchronous multiplexing implies in general the following operations: Assembling of the PDH data flows or flows generated by other sources in the appropriate containers; Generation of the virtual containers by attaching the POH (Path Overhead); Assembling of the tributary units by attaching the pointers and inserting the containers at the appropriate positions in these units; Generation of the administrative units similarly to the tributary units; Generation of the basic transport frames; Multiplexing of several basic transport frames into a superior order transport frame. Telephony 12
13 The SDH multiplexing scheme The whole SDH multiplexing scheme; xn STM-N AUG N=1, 4, 16 x1 AU-4 VC-4 C-4 139,264 Mbps x3 44,736 Mbps x1 x3 TUG3 TU-3 VC-3 C-3 34,368 Mbps x7 AU-3 VC-3 pointer processing x7 Non-hierarchical rates x1 TU-2 VC-2 C-2 6,312 Mbps TUG2 x3 TU-12 VC-12 C-12 2,048 Mbps x4 TU-12 VC-11 C-11 1,544 Mbps Telephony 13
14 The SDH multiplexing scheme Multiplexing of the C4 container into the STM-N frame; STM-N AUG AU-4 VC-4 C-4 139,264 Mbps N=1, 4, 16 xn x1 The operations performed in this case are the following: the plesiochronous tributary signal having a rate of Mbps is assembled into a C4 container; VC4 is generated by adding the POH; the AU pointer is added to the VC4 and it is obtained the AU4 unit; the AU4 administrative unit is converted into an AUG structure; this structure includes the block having 9 rows, 261 columns and in row 4 an additional number of 9 bytes are used for the AU pointer; AUG is inserted into an STM-1 frame. Telephony 14
15 The SDH multiplexing scheme Multiplexing of a C4 container into an AUG unit; The phase adjustment related to the use of the AUG pointer. VC4 POH J 1 B 3 C 2 G 1 C4 F 2 H 4 Z 3 K 3 Z 5 no fixed phase relation H 1 Y Y H H 3 H 3 H 3 AU4 fixed phase relation AUG Telephony 15
16 The SDH multiplexing scheme Multiplexing of AUG unit into an STM-N transport frame; AUG 1 AUG 2 AUG N RSOH MSOH N 9 Direct multiplexing of the C3 container into an STM-N frame; The VC3 container is transformed in the AU3 units by adding the AU3 pointer composed of 3 bytes; the pointer establishes the position of each VC3 container in the STM-1 frame. The AU3 units have the same fixed phase relatively to the STM-1 frame; N 261 ; STM-N AUG STM-N AU-3 VC-3 C-3 N = 1, 4, 16 xn x3 44,736 Mbps 34,368 Mbps Telephony 16
17 The SDH multiplexing scheme Details related to the multiplexing of the C3 containers into AUG; The AUG structure is obtained by multiplexing three AU3 unit byte by byte. VC3 J 1 VC3 J 1 VC3 The generated AUG can be mapped directly into an STM-1 frame, or N AUG units can be multiplexed byte by byte into an STM-N frame; It has no importance if the AUG includes AU3 or AU4 units. VC3 POH H 1 H 2 H 1 B 3 C 2 G 1 F 2 H 4 Z 3 K 3 Z 5 no fixed phase relation fixed phase relation AU3 A VC3 POH H 1 H 2 H 1 B 3 C 2 G 1 F 2 H 4 Z 3 K 3 Z 5 no fixed phase relation AU3 B fixed phase relation no fix phase VC3 POH J 1 B 3 C 2 G 1 F 2 H 4 Z 3 K 3 Z 5 no fixed phase relation H 1 H 2 H 1 AU3 C fixed phase relation H 1 H 1 H 1 H 2 H 2 H 2 H 3 H 3 H 3 A B C A B C AUG A B C Telephony 17
18 The SDH multiplexing scheme Indirect multiplexing of the C3 container into an STM-N frame; xn STM-N AUG AU-4 VC-4 N = 1, 4, 16 the 34,368Mbps signal (or Mbps) is assembled in the C3 container; the VC3 virtual container (composed of 9 lines and 85 columns) is generated by adding the POH; the TU3 tributary unit is generated (86 de columns and 9 lines) by adding a pointer to the VC3; the TU3 tributary unit generates TUG3 units (TUG3 is practically identical with TU3) and 3 TUG3 units can be multiplexed into a C4 container; the VC4 virtual container is generated by adding the POH; VC-4 is inserted into an STM-1 frame or an STM-N frame. three TUG3 units are multiplexed into a C4 container byte by byte; x1 x3 TUG3 TU-3 VC-3 C-3 TUG3 has a fixed position relatively to the VC4 container. x1 44,736 Mbps 34,368 Mbps Telephony 18
19 The SDH multiplexing scheme Structure of the TUG3 unit and the insertion of the C3 container in this unit; The position of the VC3 container in the TUG3 unit is established by the TU3 pointer composed of 3 bytes. TUG3 86 columns VC3 85 columns pointer TU3 H 1 H 2 J 1 H 3 S T U F F I N G B 3 C 2 G 1 F 2 H 4 Z 3 K 3 POH VC3 Payload C3 Z 5 Telephony 19
20 The SDH multiplexing scheme Multiplexing of the TUG3 units into a VC4 container; TUG3 A TUG3 B TUG3 C P O H AB CAB CABC VC4 Multiplexing of the C11, C12 and C2 containers into a TUG2 unit; according to the bit rate, the signals are assembled in containers with different dimensions; the virtual containers are generated by adding the POH; the TU11, TU12 and TU2 units are generated by adding the pointer; AB CABC stuffing information POH and the pointer are distributed on 4 TU units, each having only one POH and pointer byte it is generated a TU multiframe. Telephony 20
21 The SDH multiplexing scheme TU11, TU12 and TU2 units are multiplexed into a TUG2 unit columns by columns; there is a fixed relation between the TUG2 unit and the TU units multiplexed into the TUG2. Non-hierarchical rates TUG3 x7 x1 TU-2 VC-2 C-2 6,312 Mbps VC-3 x7 TUG2 x3 TU-12 VC-12 C-12 2,048 Mbps x4 TU-12 VC-11 C-11 1,544 Mbps Telephony 21
22 The SDH multiplexing scheme Multiplexing of the TU tributary units into the tributary group unit TUG2 and after that into the TUG3 unit; TU11 TU12 TU2 TUG NPI TUG stuffing It is a fixed phase relation between the TUG2 and the TUG3 units; it is not necessary the use of a TU3 pointer in the first column of the unit; the TU3 pointer is replaces with NPI (Null Pointer Indicator ); a TUG3 unit can be generated by multiplexing 7 TUG2 units byte by byte. Telephony 22
23 The SDH multiplexing scheme Multiplexing of the TUG2 tributary unit groups into VC3 containers; Represents an alternative to the multiplexing of TUG2 into TUG3; a VC3 virtual container is generated by multiplexing 7 TUG2 units byte by byte; the multiplexing of the TUG2 units is made in the columns 2 85, column 1 being occupied by the VC3 POH. TU11 TU12 TU2 TUG VC3 POH VC3 Telephony 23
24 The SDH multiplexing scheme Generation of a TU2 multiframe, multiplexing of TUG2 into VC3; C2 C2 C2 C2 125 s 125 s 125 s 125 s VC2 VC2 VC2 VC2 K 4 V 5 J 2 Z 6 K 4 pointer TU2 multiframe V 1 V 2 V 5 V 3 V 4 TU2 TU2 TU2 TU2 V V 1 V 2 V 5 V 3 V 4 TUG2 TUG2 TUG2 TUG2 V V 1 V 2 V 3 V 4 V 1 TUG2 VC3 VC3 VC3 VC3 POH 125 s POH 125 s POH 125 s POH 125 s H 4 =xxxxxx01 H 4 =xxxxxx10 H 4 =xxxxxx11 H 4 =xxxxxx00 Telephony 24
25 Examples: The SDH multiplexing scheme Multiplexing of a 140Mbps PDH signal into a STM-1 transport frame; Telephony 25
26 The SDH multiplexing scheme Multiplexing of several 2Mbps PDH tributaries into a STM-1 transport frame; Telephony 26
27 The SONET multiplexing scheme The SONET multiplexing scheme for PDH data streams; 10 Gbps 2.5 Gbps 622 Mbps 155 Mbps 52 Mbps OC-192 x4 x16 OC-48 x4 OC-12 x64 STS-12 x4 OC-3 OC-1 STS-3 STS-1 x3 SPE-3c SPE-1 x7 VT group x4 x3 VT-6 VT Mbps 45 Mbps 6 Mbps 2 Mbps VT Mbps Telephony 27
28 The SONET multiplexing scheme Plesiochronous signals with 1,5Mbps rate (DS1 primary PCM frame), 2Mpbs (E1 primary PCM frame) and 6Mbps (DS2 PDH frame) are inserted into VT1.5, VT2 and VT6 units; VT units form a VTG group; VTG units are multiplexed column by column into SPE (Synchronous Payload Envelope); The STS-1 transport frame is formed from the SPE unit by adding a pointer and a Section Overhead (SOH); Insertion of a 45Mbps flow, which includes the third PDH level (European + American), can be done directly into the SPE; The 140Mbps PDH flow which includes the fourth PDH level (European + American) can be inserted into 3 concatenated SPEs; The difference between the OC-x and STS-x units consists only in the type of the carrier; the OC units are transmitted on optical carrier and the STS units on electrical carrier. Telephony 28
29 The SDH/SONET sections There are defined two sections which characterize the transmission of the SDH/SONET transport frames, namely: Regenerator section; located between two consecutive regenerators; Multiplex section; located between two consecutive multiplexers; The management and control information necessary for the transmission on these sections is included in the Section Overhead, SOH, associated to transport frames; SOH is divided in two groups, namely: RSOH Regenerator Section Overhead; MSOH Multiplex Section Overhead. Telephony 29
30 The SDH/SONET sections The regenerators of the synchronous systems control the quality of the transmission and identify the faults on the line; the information included in the RSOH is processed in each regenerator; the information included in MSOH is processed only in multiplexers; this information is transmitted unaltered through regenerators. inferior order paths multiplex sections superior order paths C3 assembling VC3 assembling VC4 regenerator sections assembling VC4 assembling VC3 C3 multiplexer regenerators multiplexer C11 C12 C2 assembling VC11 VC12 VC2 assembling VC3 VC4 STM1 STM1 assembling VC3 VC4 assembling VC11 VC12 VC2 C11 C12 C2 C3 C4 STM-N RSOH C3 C4 STM-N MSOH VC3, VC4 POH VC11, VC12, VC2 POH Telephony 30
31 The SDH/SONET sections The sections are components of the transmission paths of the containers; Paths are identified by the generation and destination points of the containers; The information necessary for the management and the control of the transmission on these paths is included in the path overhead (POH) of the containers; There are two types of paths: inferior order paths; superior order paths; the differences between these paths consist in the bit rates of the units transmitted on these paths and the insertion methods of these units into the transport frames. In the SONET system the inferior order paths are associated to the VT1.5, VT2, VT3 and VT6 units, and the superior order path is associated to the SPE unit. Telephony 31
32 Error control on the SDH sections The quality control of the transmission on the SDH/SONET sections is achieved by monitoring the bit error; The bit error monitoring is based on the BIP-X method (Bit Interleaved Parity-X); The method consists in the addition of the every X th bit transmitted in a transport frame at a given hierarchy level or in a container; after the addition results an error control (detection) structure; the value of the X parameter depends on the type of the frame or of the container; it is practically a parity type method; the obtained result is transmitted in the overhead of the next frame or container to the receiver, where the BIP-X is recomputed. it is possible to identify a maximum number of X errors; X = 2 for inferior order containers; X = 8 for superior order containers and RSOH; X = 24 for MSOH; the bits are randomized before the transmission using a scrambler; BIP-X is computed in front of the scrambler and it is inserted in the next frame. Telephony 32
33 Error control on the SDH sections The BIP-8 computation algorithm; Telephony BIP-8 value STM1 signal
34 The SDH Overhead information Section Overhead (SOH); The structure includes information necessary for: frame synchronization; maintenance; performance (error) monitoring; for different other functions. It is composed of 9 rows and N*9 columns (N=1,4,16); It is structured in the following blocks: Regenerator Section Overhead (RSOH): composed of rows 1 to 3; it is processed in regenerators. Multiplex Section Overhead (MSOH); composed of rows 5 to 9; it is processed in multiplexers; in row 4 is placed the AU pointer. Telephony 34
35 The SDH Overhead information Structure of the STM-1 transport frame s SOH and the structure of the C4 container s POH. AU4 261 bytes RSOH pointer MSOH A 1 A 1 A 1 A 2 A 2 A 2 C 1 B 1 E 1 F 1 D 1 D 2 D 3 H 1 H 1 H 1 H 2 H 2 H 2 H 3 H 3 H 3 B 2 B 2 B 2 K 1 K 2 D 4 D 5 D 6 D 7 D 8 D 9 D 10 D 11 D 12 S 1 Z 1 Z 1 Z 2 Z 2 M 1 E 2 J 1 B 3 C 2 G 1 F 2 H 4 Z 3 K 3 VC4 Payload C4 POH VC4 Structure of the Regenerator Section Overhead (RSOH) bytes: A 1, A 2 ; frame alignment signal A 1 = ; A 2 = ; Z 5 Telephony 35
36 The SDH Overhead information C 1 STM-N identification; can be used to identify a STM-N connection between two multiplexers. B 1 - BIP-8 monitoring; defined only in STM-1; it is used for error monitoring in regenerators; it is computed on all bits of the STM-N signal using an even parity and it is inserted in the next frame. E 1 regenerator service channel; defined only in STM-1; it is used to create a service voice channel having a bit rate of 64kbps and this channel is accessible in all regenerators and multiplexers. F 1 user channel; defined only in STM-1; it is reserved for network operations and it is accessible in all regenerators and multiplexers. Telephony 36
37 The SDH Overhead information D 1, D 2, D 3 data communication channel; defined only in STM-1; form a common data communication channel DCC R with a 192kbps bit rate; channel dedicated to management information exchange between regenerators. Structure of the Multiplex Section Overhead (MSOH) bytes; B 2 BIP-N*24 monitoring; N*3 bytes are used for error monitoring in the multiplexer section; it is computed in such a way to obtain an even parity on all bits of the STM-N frame, excepting the RSOH; it is inserted in the next frame. K 1, K 2 automatic protection switching; defined only in STM-1; it is used for the control of the automatic protection switching; the structure of these bytes is defined for several protection configurations. Telephony 37
38 The SDH Overhead information D 4...D 12 data communication channel DCC; 8 bytes form a common data channel DCC M with a 576kbps bit rate for the multiplex section. S 1 synchronization status; defined only in STM-1; informs the operator about the performance of the clock used in the unit. Z 1, Z 2 N*4 bytes reserved for subsequent applications; M 1 distant error indication for the multiplex section; E 2 multiplexer service channel; defined only in STM-1; forms a service voice channel accessible only in the multiplexers. Section Overhead (SOH) together with the useful data (SPE) compose a STS-1 frame in the SONET system; The size of the overhead is three times smaller than the SOH of the SDH system. Telephony 38
39 The SONET Overhead information Structure of the SONET system STS-1 transport frame SOH and of the POH associated to SPE container; Essential differences consist in: the pointer has only 3 bytes; the error monitoring in MSOH is done using a single byte; the frame alignment signal has only 2 bytes; there are missing some reserved bytes of the STM-1 SOH. Section overhead Line overhead A 1 A 2 J 0 /Z 0 J 1 B 1 E 1 F 1 B 3 D 1 D 2 D 3 C 2 H 1 H 2 H 3 G 1 B 2 K 1 K 2 F 2 D 4 D 5 D 6 H 4 D 7 D 8 D 9 Z 3 D 10 D 11 D 12 K 3 S 1 /Z 1 M 0 or M 1 /Z2 D 12 Z 5 Transport overhead Path Telephony 39
40 The SDH POH information Path Overhead (POH); Together with the container C form the virtual container VC; For the superior order containers there are available 9 byres (a column) per container; For inferior order containers it is available only 1 byte per container; POH is composed at the generation of the container and remains unchanged until the container is disassembled; POH is the same for the SDH and SONET containers for both inferior and superior containers; The bytes of the high order SDH containers are defined as follows: J 1 path trace; it is the access point in the virtual container; it is used to transmit a path check sequence. Telephony 40
41 The SDH POH information B 3 BIP-8 monitoring; error monitoring over the entire path; it is computed over all bits of the current VC-3 or VC-4 to obtain an even parity; it is inserted in the next frame. C 2 content identifier of the VC; G 1 path status sent by the receiver to the transmitter with data related to the transmission quality; remote error indication; remote defect indication. F 2 user channel 64kbps channel available for communication between the path ends for user purposes; H 4 multi-frame indicator; used for lower order multi-frame synchronization. Z 3 user channel; 64kbps channel available for communication between path ends. K 3 automatic protection switching; ensures the control of the protection switching process on higher order paths. Z 5 network operator byte it is provided for management purposes. Telephony 41
42 The SDH POH information POH associated to low order containers (VC-1/VC-2); Composed of 4 bytes inserted into a multiframe composed of 4 VC units; each VC unit has allocated one byte for POH. Composed of bytes V 5, J 2, Z 6, K 4 ; V 5 is the first byte in VC-1/VC-2; is the reference point for the lower order containers; is used to transmit the following information: BIP-2 monitoring; remote error indication; remote defect identification. J 2 path trace; identical with byte J 1 of the higher-order POH; a digital sequence is transmitted to check the link over the entire communication path. K 4 automatic protection switching on lower order paths; Z 6 unused spare byte. Telephony 42
43 Pointer operations The pointers used in the administrative and tributary units of the synchronous SDH/SONET systems have two main roles: Establishment of the phase relation between the containers carrying payload data and the administrative and tributary units; it is established the phase relation between containers and the transport frame; Bit rate adaptation between the data streams received by a multiplexer and the streams transmitted by the multiplexer in the situation of interruption of the synchronization link; dynamic establishment of the position of containers in different units and implicitly in the transport frame; it is ensured an easy insertion / extraction of different elementary streams into / from the transport frame, without being necessary the demultiplexing and remultiplexing of the entire multiplex stream; this situation is encountered in the case of PDH systems; it is ensured a flexible and efficient use of the transmission capacity for a wide range of services with various characteristics. Telephony 43
44 Pointer operations The container loaded in the transport frame can start anywhere (practically can be some restrictions); the starting position is given by the pointer value; the container can extend over two units (administrative or tributary units, according to the considered case); Establishment of the position of a VC4 container relatively to the beginning of the STM-1 frame by using the AU4 pointer; STM-1 frame Pointer H1 H2 H3 Beginning of container VC4 Frame n 125 s Pointer H1 H2 H3 Frame n s Telephony 44
45 The pointer includes three or four bytes; Pointer operations Three bytes in the case of the SDH administrative units; Four bytes in the case of the SDH tributary units; only the first two bytes (H1 and H2) give the position of the container; the third byte (H3) is reserved for negative justification operations; the fourth byte, if exists, has no defined role. In SOH STM-1 there are reserved 9 bytes for pointer; if in STM-1 is loaded a VC4 container we have a single pointer on two bytes plus three positions for negative justification (the other bytes are not used) each position in AU4 is composed of three bytes; if three VC3 containers are loaded in STM-1, three pointers are used each position in AU3 is composed of a single byte. Telephony 45
46 Pointer operations Structure of the AU3 pointers and the position of these pointers inside the STM-1 transport frame; Numbering of positions inside the STM-1 frame in the case of loading of three AU3 units; H1 H1 H1 H2 H2 H2 H3 H3 H H1 H1 H1 H2 H2 H2 H3 H3 H Telephony 46
47 Pointer operations Structure of the AU4 pointers and the position of these pointers inside the STM-1 transport frame; Numbering of positions inside the STM-1 frame in the case of loading of one AU4 units; H1 H1 H1 H2 H2 H2 H3 H3 H H1 H1 H1 H2 H2 H2 H3 H3 H Telephony 47
48 Pointer operations The use of the pointers in the SDH/SONET systems creates the possibility to maintain the synchronous character of the connection in the situation when the clock connection is interrupted; It is used the positive or negative justification according to the difference between the value of the local clock frequency and the frequency of the input stream; byte H3 of the pointers facilitates the negative justification; the justification is combined with the change of the container s starting position in the transport frame or in other SDH/SONET units; Example: it is about administrative or tributary units; It is considered the case of the STM-1 transport frame which carries a VC4 container; It exists a difference between the local clock of the multiplexer and the received signal; it is used a positive or negative justification process for phase adjustment. Telephony 48
49 Pointer operations Rate adjustment between the STM-1 frame of the multiplexer and a VC4 container received with a lower frequency; it is used a positive justification at byte level; the justification position is the first position after byte H3;. the pointer is increased with one unit Frame STM-1 Pointer H1 H2 H3 beginning Frame n 125 s Pointer New pointer H1 H2 H1 H2 H3 H3 positive justification byte dopare byte pozitivă Frame n s Frame n s Pointer H1 H2 H3 Frame n s Telephony 49
50 Pointer operations Rate adjustment between the STM-1 frame of the multiplexer and a VC4 container received with a larger frequency; it is used a negative justification at byte level; the justification position is the H3 byte position included in the pointer;. the pointer is decreased with one unit Frame STM-1 Pointer H1 H2 H3 beginning Frame n 125 s Pointer New pointer H1 H2 H1 H2 H3 H3 negative justification byte dopare byte pozitivă Frame n s Frame n s Pointer H1 H2 H3 Frame n s Telephony 50
51 Structure of the H 1 and H 2 bytes of the SDH administrative units pointer; N N N N S S I D I D I D I D I D bits 1 4 bits 7 16 The significance of the bits of the word composed of bytes H1 and H2 is the following: bits 1 4 form the NDF (New Data Flag); indicates the change of the pointer value; there are defined two values: NDF=0110 (non active) it is maintained the value of the pointer; NDF=1001 (active) it is specified a new value for the pointer; bits 5 and 6 called S S; identify the pointer type - they have the value 1 0 in the case AU pointer; bits 7 16 represents the value of the pointer; Telephony 51
52 SDH pointer structure If a new value is attributed to the pointer then bits 7 16 contain effectively the value of the pointer; If it is about frequency matching then the pointer value must be incremented or decremented; bits 7 16 are divided in two groups, of increment bits (I) and respectively of decrement bits (D); there are 5 bits in each group and if the pointer must be incremented the I bits are inverted, and if the pointer must be decremented the D bits are inverted; identification of the pointer incrementing and decrementing operations is achieved based on a majority logic which takes into consideration the changes of I and D bits; this signaling method of the pointer modification ensures some error protection in the case of a low bit error probability channel; there is also some error protection of the NDF bits; the Hamming distance between the codes associated to active and inactive states is 4. the modification of the pointer value can be realized at most once in 4 units; if we have a pointer adjustment in one unit or transport frame then in the following three units or transport frames there are not allowed pointer adjustments; Telephony 52
53 SDH pointer structure In the case of concatenation of AU4 units, the first AU has a normal pointer and the following units include a concatenation indication CI these units must be processed like the first unit; bits H 1 and H 2 are defined as: H 1 : S S 1 1 (S undefined), H 2 : 1; The TU3 pointer allows a dynamic adaptation of the VC3 container phase to the TU3 frame; The TU3 pointer is located in the first column of the unit and is composed also of bytes H 1, H 2 and H 3 ; The structure of this pointer and the operations suported are identical with the structure and operations of the AU pointers; the TU3 unit is identical as dimensions with the TUG3 unit; if in the TUG3 unit are multiplexed TUG2 units, which have a fix phase relation with the TUG3 frame, the positions corresponding to bytes H 1 and H 2 of the pointer are replaced with NPI (Null Pointer Indicator); NPI has the structure: S S (S undefined). Telephony 53
54 SDH pointer structure Structure of the TU3 pointer and its position in this unit. The numbering of TU3 positions; H H H S T U F F I N G H H H S T Telephony 54
55 The TU2 pointer; SDH pointer structure Allows a dynamic adaptation of the VC2 container phase to the phase of the TU2 frame; It is composed of 4 bytes: V 1, V 2, V 3 and V 4 ; these 4 bytes are located in 4 consecutive TU2 frames, frames which compose a multiframe (see figure 14). bytes V1 and V2 are equivalent with bytes H1 and H2 and give effectively the value of the pointer; byte V3 is used for negative justification operations, similar to byte H3 of the AU pointers; the structure of byte V4 is undefined. The definition of the pointer byte available in a TU2 frame is given by byte H 4 multiframe indicator of POH VC3 and POH VC4. Telephony 55
56 SDH pointer structure Structure of the TU2 pointer and its position in this unit. Numbering of the TU2 unit positions; V V V V The TU11 pointer; Allows a dynamic adaptation of the VC11 container phase to the phase of TU11 frame; The structure of this pointer is identical with that of the TU2 pointer; The insertion/extraction of data into/from TU11 multiframe and the multiplexing in superior units is realized like in the case of TU2 units; Structure of the TU11 pointer and its position in this unit. Numbering of the TU11 unit positions; V V V V Telephony 56
57 The TU12 pointer; SDH pointer structure Allows a dynamic adaptation of the VC12 container phase to the phase of the TU12 frame; The structure of this pointer is identical with that of thetu2 pointer; The insertion / extraction of data into / from TU12 multiframe and the multiplexing in superior units is realized like in the case of TU2 units; Structure of the TU12 pointer and its position in this unit. Numbering of the TU12 unit positions; V V V V The insertion and extraction of data is realized using a multiframe composed of 4 units; The multiframe has a vector type structure; the zero position in this multiframe is the first position after byte V2; the pointer value specifies the position where is inserted the group of 4 containers. Telephony 57
58 SDH pointer structure After the insertion of the useful information, the vector type structure is transformed into a structure composed of 4 matrices; each matrix has in the position located in the upper left corner a pointer byte; The multiplexing of the TU units into the superior units is realized byte by byte and column by column; At the reception side the TU matrices are extracted from the superior units by column by column demultiplexing; the group of 4 consecutive matrices is transformed into the vector structure; the information is extracted starting with the position specified by the pointer. For the transport of the nonhierarchical PDH bit rates, several TU2 multiframes can be concatenated; It is possible in this way the transport of information with bit rates multiples of the VC2 bit rate in concatenated VC2-mc containers In the case of the SONET system the operations with STS-1 and the VT pointers are similar with the pointer of AU3 SDH units. Telephony 58
59 Mapping of the PDH flows into SDH containers To transport the PDH flows in the SDH/SONET synchronous systems it is necessary an appropriate mapping of these flows in containers; The mapping has to solve the problem of rate matching between the local clock of the multiplexer and the received flow; for each PDH flow exists a separate mapping algorithm that uses, usually, positive justification for rate matching between the multiplexer and the received plesiochronous flow. There are two categories of mapping algorithms, namely: synchronous mapping: insertion of the bits from the plesiochronous flows into the appropriate containers is realized using the clock extracted from the received flow; rate matching between the formed containers and the synchronous transport frames is achieved with the help of the transport units pointers: tributary units pointers in the case of low order containers; administrative units pointers in the case of high order containers. Telephony 59
60 Mapping of the PDH flows into SDH containers asynchronous mapping: insertion of the bits from the plesiochronous flows into the appropriate containers is realized using the local clock of the multiplexer; rate matching is realized with the help of positive justification; it is the most used mapping method being more easy to be implemented; there are not necessary continuous pointer operations only for mapping of the plesiochronous tributaries. Asynchronous mapping of a 140Mbps rate flow into a VC4 container; It is used the following algorithm: VC4 is composed of 261 columns each of 9 rows; the first column contains the POH and the rest compose the C4 container; The 260 columns and 9 rows matrix structure (the C4 container) intended for payload is processed as follows: each row is split in 20 blocks of 13 bytes each; a total number of 180 blocks are obtained. Telephony 60
61 Mapping of the PDH flows into SDH containers The structure of a VC4 container used in the asynchronous mapping of a plesiochronous tributary having rate 140Mbps; Bloc 1 Bloc 2 Bloc 20 VC-4 POH J1 B3 C2 G1 F2 H4 Z3 K3 Z5 The first byte of each block is a special one, and the next 12 bytes are used for information; we have 96 information bits per block. Bloc 180 Telephony 61
62 Mapping of the PDH flows into SDH containers The special bytes are called W, X, Y and Z and have the following roles: W is a normal information byte; Y is a stuffing byte with undefined structure; X is a byte having the structure: C R R R R R O O: bits O are used as control overhead for the PDH flow; bits R are fixed stuffing bits; C is a justification control bit, which indicates if the possible justification position from the considered row contains information bit (C=0) or justification (C=1); byte X is transmitted 5 times in a row; there are available 5 justification control bits; identification of the justification operation is realized based on a majority logic decision applied to the C bits. Z byte having the structure: I I I I I I I S R: bits I are information bits; bit R is a fixed stuffing bit; bit S is a possible justification bit. Telephony 62
63 Mapping of the PDH flows into SDH containers Structure of a row of the C4 container used in the asynchronous mapping process of a 140Mbps PDH flow; J 1 W 96 I = 12 info bytes X 96 I Y 96 I Y 96 I Y 96 I X 96 I Y 96 I Y 96 I Y 96 I X 96 I Y 96 I Y 96 I Y 96 I X 96 I Y 96 I Y 96 I Y 96 I X 96 I Y 96 I Z 96 I The mapping process ensures the following characteristics of the VC4 SDH flow: total bit rate (of the payload area) VC4 = kbps; useful nominal rate f s = kbps; it is obtained by transmitting 2 information bits and 7 justification bits in the 9 possible justification positions of a VC 4 container. Telephony 63
64 Mapping of the PDH flows into SDH containers useful rate without the justification positions (the possible justification positions contain effectively justification bits) =139248kbps=f s f s ; useful rate with justification positions (the possible justification positions contain information bits) = kbps= f s f s. Bit allocation in the C4 container in the asynchronous mapping of a PDH tributary having bit rate 140Mbps; Bytes / row Information bits / row Stuffing bits / row Justification ctrl. bits / row Justification bits / row Overhead bits / row 240 info. 1 W 13 Y 5 X Z Bytes / VC4 Info. bits /VC4 Stuffing bits / VC4 Justification ctrl. bits/vc4 Justification bits / VC4 Overhead bits / VC = = = =45 1 9=9 10 9=90 Rate (kbps) Total rate VC4 (without POH) = kbps Telephony 64
65 Mapping of the PDH flows into SDH containers Asynchronous mapping of a 34Mbps rate into a VC3 container; It is used the following algorithm: The VC3 container is composed of 85 columns and 9 rows, the first column is occupied by the POH while the rest form C3; The matrix having 84 columns and 9 rows (i.e., container C3), obtained after suppressing POH is processed in the following way: are generated 3 partial frames, each composed of 3 rows and 84 columns; the structure of the 3 partial frames is identical. A partial frame includes: bytes with information bits; bytes with stuffing bits; special bytes bytes A, B and C; bytes A and B includes, each of them, one possible justification bit, bits S 1 and S 2 ; bytes C (5 bytes) include, each of them, 2 justification control bits, C 1 and C 2 ; there are 5 C 1 and 5 C 2 bits, the identification of justification on the bits S 1 and S 2 is realized based on a majority decision applied to the justification control bits. Telephony 65
66 Mapping of the PDH flows into SDH containers Structure of the C3 container used in the asynchronous mapping process of a 34Mbps PDH flow; VC-3 POH J1 B3 C2 G1 F2 H4 Z3 K3 Z5 The mapping process ensures the following characteristics of the VC3 SDH flow: total bit rate debit (of the payload area) VC3 = 48384kbps; useful nominal rate f s = 34368kbps; it is obtained by transmitting one information and one justification bit in the 2 possible justification positions of a partial frame; there are used 3 information and 3 justification bits per VC3 container. Partial frame 1 Partial frame 2 Partial frame 3 Telephony 66
67 Mapping of the PDH flows into SDH containers useful rate without the justification positions (the possible justification positions contain effectively justification bits) = 34344kbps = f s f s ; useful rate with justification positions (the possible justification positions contain information bits) kbps = 34392kbps = f s f s. Structure of a partial frame of the C3 container used in the asynchronous mapping process of a 34Mbps PDH flow; C C C C C A B R fixed stuffing bit I information bit S 1, S 2 possible justification bits C 1, C 2 justification control bits R R R R R R R R I I I I I I I I C R R R R R R C 1 C 2 A B R R R R R R R S 1 S 2 I I I I I I I Telephony 67
68 Mapping of the PDH flows into SDH containers Bit allocation in the C3 container in the asynchronous mapping of a PDH tributary having bit rate 34Mbps; Bytes / partial frame Information bits / partial frame Stuffing bits / partial frame Justification ctrl. bits / partial frame Justification bits / partial frame Overhead bits / partial frame Bit / VC3 Info bits./vc3 Stuffing bits / VC3 Justification ctrl. bits / VC3 Justification bits / VC3 Overhead bits / VC = = = =30 2 3= Rate (kbps) Total rate VC3 (without POH) = kbps Telephony 68
69 Mapping of the PDH flows into SDH containers Asynchronous mapping of a 2Mbps rate into a VC12 container; It is used the following algorithm: The mapping is realized into the TU12 multiframe, which includes 4 VC12 containers; The group of the VC12 containers consists of 140 bytes, the repetition period of the group being 500 s; the TU12 multiframe has a period of 500 s = 4 frames (containers) of 125 s. In the multiframe are included 4 VC12 POH bytes, namely the bytes V 5, J 2, Z 6 and K 4. The group of 4 VC12 containers includes 2 possible justification bits, S 1 şi S 2 ; To each justification bits are associated 3 justification control bits, namely bits C 1 şi C 2 ; identification of justification on any possible justification position is realized based on a majority decision applied to the justification control bits. Telephony 69
70 Mapping of the PDH flows into SDH containers Structure of the TU12 a) and TU11 b) multiframes used for asynchronous mapping of a plesiochronous tributary with rate 2Mbps or 1,544Mbps. V 5 R V 5 R R R R R R I R 32 information bytes 24 information bytes VC12 structure 140 bytes 500 s R J 2 C 1 C 2 O O O O R R 32 information bytes R Z 6 C 1 C 2 O O O O R R VC11 structure 104 bytes 500 s J 2 C 1 C 2 O O O O I R 24 information bytes Z 6 C 1 C 2 O O O O R R 24 information bytes 32 information bytes R K 4 C 1 C 2 R R R R R S 1 S 2 I I I I I I I 31 information bytes R K 4 C 1 C 2 R R R S 1 S 2 R 24 information bytes R fixed stuffing bit O overhead bit I information bit S 1, S 2 possible justification bits C 1, C 2 justification control bits Telephony 70
71 Mapping of the PDH flows into SDH containers The mapping process ensures the following characteristics of the VC12 SDH flow: total bit rate (of the payload area) VC12 = 2224kbps; useful nominal rate f s = 2048kbps; it is obtained by transmitting one information and one justification bit in the 2 possible justification positions in a TU12 multiframe; useful rate without the justification positions (the possible justification positions contain effectively justification bits) = 2046kbps =f s ; useful rate with justification positions (the possible justification positions contain information bits) = 2050kbps= f s Bit allocation in the TU12 multiframe in the asynchronous mapping of a PDH tributary having bit rate 2Mbps; Bytes / multiframe Information bits / multiframe Stuffing bits / multiframe Justification ctrl. bits / multiframe Justification bits / multiframe Overhead bits / multiframe = = Rate (kbps) Total rate TU12 (VC12) multiframe (without POH) = 2224 kbps Telephony 71
72 Mapping of the PDH flows into SDH containers Asynchronous mapping of a 1.5Mbps rate into a VC11 container; It is used the following algorithm: The mapping is realized into the TU11 multiframe, which includes 4 VC11 containers; The group of the VC11 containers consists of 104 bytes, the repetition period of the group being 500 s; the TU11 multiframe has a period of 500 s = 4 frames (containers) of 125 s. In the multiframe are included 4 VC11 POH bytes, namely the bytes V 5, J 2, Z 6 and K 4 ; The group of 4 VC11 containers includes 2 possible justification bits, S 1 şi S 2 ; To each justification bits are associated 3 justification control bits, namely bits C 1 şi C 2 ; identification of justification on any possible justification position is realized based on a majority decision applied to the justification control bits. Telephony 72
73 Mapping of the PDH flows into SDH containers The mapping process ensures the following characteristics of the VC11 SDH flow: total bit rate (of the payload area) VC11 = 1648kbps; useful nominal rate f s = 1544kbps; it is obtained by transmitting one information and one justification bit in the 2 possible justification positions in a TU11 multiframe; useful rate without the justification positions (the possible justification positions contain effectively justification bits) = 1542kbps =f s - 1, ; useful rate with justification positions (the possible justification positions contain information bits) = 1546kbps= f s + 1, Bit allocation in the TU11 multiframe in the asynchronous mapping of a PDH tributary having bit rate 1.544Mbps; Bytes / multiframe Information bits / multiframe Stuffing bits / multiframe Justification ctrl. bits / multiframe Justification bits / multiframe Overhead bits / multiframe = = Rate (kbps) Total rate TU11 (VC11) multiframe (without POH) = 1648 kbps Telephony 73
74 Mapping of the PDH flows into SDH containers Asynchronous mapping of a 1.544Mbps rate into a VC12 container; Can be realized by using the following algorithm: It is generated a VC11 multiframe composed of 104 bytes; The bytes are placed into a structure having 36 rows and 3 columns, structure from which is eliminated each 9 th byte of the 3 rd column; the 4 missing positions are filled with the TU pointer. The obtained structure represents 4 concatenated VC11 containers (9 rows 3 columns) which forms a TU11 multiframe; It is inserted a column with fixed stuffing bytes (fulfilling an even parity relation) between columns 2 and 3 of the structure; as a result of this operation it is obtained a group of 4 concatenated VC12 containers (9 rows 4 columns), which form a TU12 multiframe. the VC12 containers generated in this way can not be distinguished in the network from normal VC12 containers, only at the receiver the original VC11 containers are rebuilt. Telephony 74
75 Mapping of the PDH flows into SDH containers Asynchronous mapping of a plesiochronous tributary having the Mbps into a TU12 multiframe V5 V5 500 s Stuffing information Telephony 75
76 The SDH reference model Standardization of the units and equipments used to implement the synchronous digital hierarchies is necessary to ensure the interoperability of equipments from different manufacturers; This can be achieved by defining a reference model; are specified the physical characteristics of the interfaces (bit rates, optical / electrical levels, impedances) and the content of each byte or even of each bit. The specifications refer to the following aspects: frame structure (containers, tributary units, administrative units, transport frames); frame identification; data randomization; data coding / decoding (line codes, error protection codes); mapping procedures of the tributaries in the synchronous data structures; use of the service channels; signal control and monitoring; network management; network synchronization. Telephony 76
77 The SDH reference model The essential parts of the signal processing are defined as functions; Each function is characterized by the effectively implemented function and by logical reference points used by the individual blocks to communicate; the reference points are not test or measurement points and have no physical equivalent in many situations; the external interfaces are physically defined, the specifications concerning these interfaces are identical with those of PDH systems interfaces. The SDH reference model is composed of 16 basic functions; Each functional block has a clock reference point T and a management reference point S; the T reference points communicate with blocks called SETS and the S reference points communicate with blocks called SEMF. Telephony 77
78 The SDH reference model The SDH equipments reference model; STM-N Functions of the transport terminal SPI T RST T T MST T MSP T MSA S S S S S PDH Inferior order paths T T T PPI LPA LPT T LPC Superior order paths T T T HPA HPT HPC Functions of the transport terminal T T T T MSA MSP MST RST STM-N T SPI S S S S S S S S S S S S Superior order paths PDH T PPI S T HPA S S SEMF MCF T SETS SETPI S S Q interface F interface External synchronization Telephony 78
79 The SDH reference model The functions associated to the inferior order paths are: PPI (PDH Physical Interface); represents the interface for information transfer from / toward PDH; equipments; tasks: electrical isolation/ separation, overvoltage protection; cable equalization, line coding; clock recovery, input signal monitoring. LPA (Lower Order Path Adaptation); these functions define the mapping algorithms of the plesiochronous signals into virtual containers Cn (n=11, 12, 2, 3) and the necessary justification procedures. LPT (Lower Order Path Termination); this function generates and evaluates the Path Overhead of the virtual container. LPC (Lower Order Path Connection); this function allows the flexible positioning of the VC11, VC12, VC2 and VC3 containers in VC4 or of VC11, VC12, VC2 in VC3 according to a connection matrix. Telephony 79
80 The SDH reference model The functions associated to the superior order paths are: HPA (Higher Order Path Adaptation); it is assembled the content of the VC3 and VC4 containers; are generated and adjusted the TU pointers which establish the phase relation between VCn (n=11, 12, 2, 3) şi VCm (m=3, 4); HPT (Higher Order Path Termination); it is generated and evaluated the POH of VCm (m = 3, 4). HPC (Higher Order Path Connection) ; this function allows the flexible positioning of the VCm (m=3, 4) containers in the STM-N frame. The functions associated to the transport terminal are: MSA (Multiplex Section Adaptation); are generated and adjusted the AU pointers; are generated the AUG groups and the STM-N frames without SOH. Telephony 80
81 The SDH reference model MSP (Multiplex Section Protection); ensures the possibility of switching on the protection paths in the case of defects on the line; the MSP communication with the receiving station is realized with the K bytes from the SOH. MST (Multiplex Section Termination); generates and evaluates MSOH. RST (Regenerator Section Termination); generates and evaluates RSOH; ensures the randomization of the STM-N signal; ensures the frame alignment and the de-randomization at the reception. SPI (SDH Physical Interface); realizes the conversion of the electrical STM-N signal into optical signal; invers conversion and clock recovery at the reception side. SETS (Synchronous Equipment Timing Source); ensures the clock signal necessary for the functioning of Network Elements (NE); all the mentioned functions receive the clock signal through T interface of SETS. Telephony 81
82 The SDH reference model SETPI (Synchronous Equipment Timing Physical Interface); represents the interface between the external synchronization source and SETS. SEMF (Synchronous Equipment Management Function); the monitoring data (data concerning the performance monitoring and data concerning the functioning of the equipment s hardware) are converted in messages sent over the DCC (Data Communication Channel) from the header of the transport frames to a management and operation center; in the opposite direction the messages from the management units are converted into signals specific to the hardware used; the connections to the individual functional blocks are realized through the S logical reference points. MCF (Message Communication Function); covers all the tasks related to the transport of the TMN messages to and from the management system. Telephony 82
83 The SDH protection switching The reliability and the maintenance of the transmission networks are two major aspects which have to be considered when the SDH multiplexers are installed; The redundancy plays and important part and has to be ensured both at the level of the transmission channels and multiplexers; if the transmission channel has interruptions, the data traffic has to be switched on an appropriate protection (backup) channel (protection switching); if a multiplexer is out of order the system has to switch on available protection equipments (equipment protection). Some basic definitions related to protection switching: single-ended operation; unidirectional operation mode; in the case of faults only on one transmission direction, the protection switching is activated only on that direction. Telephony 83
84 dual-ended operation; The SDH protection switching bidirectional operation; in the case of faults only on one transmission direction, the protection switching is activated on both directions. extra traffic; an extra traffic is transmitted on the redundant channels and this traffic is interrupted when defects appear. normal traffic; traffic transmitted on the redundant channels. revertime/non-revertime; it is possible or not to switch back on the original channel after the defect is eliminated. Telephony 84
85 The SDH protection switching Some basic aspects related to protection switching: Monitoring; the traffic has to be monitored in order to detect immediately the faults/ defects; Protection switching; the traffic has to be switched by appropriate switches. Protocol; in protection switching a protocol is exchanged between multiplexers; this protocol is controlling the protection switching process. Control; the protection switching has to be controlled in an appropriate way; the detected faults/ defects has to be signaled by alarms; due to maintenance reasons the switching on backup channels has to be possible even if faults/ defects are not present. Telephony 85
86 The SDH protection switching Protection switching procedures; Procedure name Operation type Transmission protocol MS 1+1 protection Single-ended/ dual-ended Bytes K 1 /K 2 revertime/ non-revertime MS 1+n protection Single-ended/ dual-ended Bytes K 1 /K 2 revertime/ non-revertime Shared MS ring Dual-ended Bytes K 1 /K 2 protection revertime/ non-revertime Dedicated MS ring Single-ended/ dual-ended Bytes K 1 /K 2 protection revertime/ non-revertime Single-ended/ dual-ended Not Path/ subnetwork revertime/ non-revertime necessary protection Dual-ended Bytes K 3 /K 4 revertime/ non-revertime MS 1+1 protection (MS Multiplex Section); The traffic is doubled and sent on two lines; the receiver selects one of the lines. Extra traffic is not possible in this case. Extra traffic Not possible Possible Possible Possible Not possible Not possible Telephony 86
87 The SDH protection switching MS 1+1 protection procedure; operational path protection path doubling bridge selector MS 1:n protection; A number of n operational channels (n=1,...,14, usually) share the same protection section; The protection switches from the transmission and reception have to operate in the same way, but in opposite order; In this case it is possible the transmission of extra traffic. Telephony 87
88 The SDH protection switching MS 1:n protection procedure; Channel zero (0) (protection channel) Operational channel 1 Operational section Operational channel 2 Operational section Channel for extra traffic (15) Protection section 0 15 Bridge Selector Telephony 88
89 The SDH protection switching The shared MS protection ring; Can be implemented a topology composed of two or four fibers; The connections are established in both directions, using the same ring segment; the advantage consists in increased transmission capacity. The protection ring can be used for extra traffic and in the case of faults the backup multiplexers switch on normal traffic; In the case of a ring composed of four fibers there are two levels of protection switching: in the first phase the system tries to protect each section by an MS 1+1 protection; if the fault can not be eliminated in this way new loops are formed using the second double ring. Telephony 89
90 The SDH protection switching MS shared ring protection switching procedure; Node 1 Node 2 Node 1 Node 2 Node 1 Node 2 N N N N N N E E E E E E E E E E E E N N N N N N Node 4 Node 3 Node 4 Node 3 Node 4 Node 3 No defect Defect on section located between nodes 1 and 2 Defect in node 2 N Add/Drop traffic for normal traffic E Add/Drop switch for extra traffic Telephony 90
91 The SDH protection switching Dedicated MS protection ring; Consists of two fibers: one fiber is used for normal traffic; the other fiber remains free or can be used for supplementary traffic; Each connection occupies only one single ring; In the case of a fault the adjacent multiplexers switch the normal traffic on the protection ring; the switching process is only dual-ended in this case. Telephony 91
92 The SDH protection switching Dedicated MS ring protection procedure; Node 1 Node 2 Node 1 Node 2 Node 1 Node 2 N N N N N N E E E E E E E E E E E E N N N N N N Node 4 Node 3 Node 4 Node 3 Node 4 Node 3 No defect Defect on section located between nodes 1 and 2 Defect in node 2 N Add/Drop switch for normal traffic E Add/Drop switch for extra traffic Telephony 92
93 The SDH protection switching The path/ subnetwork protection protects the useful data by doubling them and assembling them in virtual containers sent through different interfaces and transmission paths; The receiver monitors both containers and selects one of them based on criteria related to the quality of the transmission and of the services provided; There are available the following variants of this protection: Path protection; the useful data are doubled at the virtual container level and are sent two different containers on two separate paths. Subnetwork protection; it is generated only a single virtual container, which is sent over two separate paths; usually no distinction is made between the two protection variants. Telephony 93
94 The SDH protection switching Path protection and subnetwork protection procedures; Path protection VC-xy - 1 C-xy C-xy C-xy C-xy C-xy Bridge Path selector Path terminator VC-xy - 2 Path terminator C-xy Subnetwork protection VC-xy - 1 C-xy VC-xy VC-xy C-xy Path terminator Bridge Path selector Path terminator VC-xy - 2 Telephony 94
95 The SDH protection switching Advantages of the path / subnetwork protection: Low technical complexity; The possibility to use it in any network topology; Flexibility concerning the selection of the protection path. Disadvantages of the path / subnetwork protection: High technical complexity; a large number of switches are necessary; Extra traffic is not possible; The traffic which has to be protected is always transmitted with redundancy. Telephony 95
96 The SDH protection switching The control of the protection switching is realized by exchanging a protocol between the multiplexers; There are necessary dedicated channels for transmission of these protocols; the K 1 and K 2 bytes of the SOH are used for protocols which ensure the MS protections; for path/ subnetwork protection is necessary a separate protocol for each virtual container; this protocol can be transmitted on the K 3 and K 4 bytes of the POH. Telephony 96
Course 13 SDH/SONET multiplexing strategy
Course SDH/SONET multiplexing strategy Elements of the SDH/SONET multiplex o Container C represents a bloc structure with imposed dimensions which contains data belonging to a tributary and doesn t contain
It explains the differences between the Plesiochronous Digital Hierarchy and the Synchronous Digital Hierarchy.
TECHNICAL TUTORIAL Subject: SDH Date: October, 00 Prepared by: John Rumsey SDH Synchronous Digital Hierarchy. Introduction. The Plesiochronous Digital Hierarchy (PDH). The Synchronous Digital Hierarchy
Course 12 Synchronous transmission multiplexing systems used in digital telephone networks
Course 12 Synchronous transmission multiplexing systems used in digital telephone networks o Disadvantages of the PDH transmission multiplexing system PDH: no unitary international standardization of the
Synchronous Optical Network (SONET)
Synchronous Optical Network (SONET) Definition Synchronous optical network (SONET) is a standard for optical telecommunications transport formulated by the Exchange Carriers Standards Association (ECSA)
DigiPoints Volume 1. Student Workbook. Module 5 Growing Capacity Through Technology
Growing Capacity Through Technology Page 5. 1 DigiPoints Volume 1 Module 5 Growing Capacity Through Technology Summary This module covers the North American Digital Hierarchy (NADH), the European Digital
The Fundamentals of SDH
1 Overview Recent global changes in government structures and resulting economic pressures, increased competition and growing private networks have forced telecommunications service providers throughout
Fundamentals of SONET/SDH
W P. Michael Henderson [email protected] September 18, 2001 hen data is transmitted over a communications medium, a number of things must be provided on the link, including framing of the data,
Lecture 12 Transport Networks (SONET) and circuit-switched networks
CS4/MSc Computer Networking Lecture 1 Transport Networks (SONET) and circuit-switched networks Computer Networking, Copyright University of Edinburgh 005 Transport Networks and SONET/SDH In most cases
SDH and WDM: a look at the physical layer
SDH and WDM: a look at the physical SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group [email protected] http://www.telematica.polito.it/ Network management and
SDH and WDM A look at the physical layer
SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group [email protected] http://www.telematica.polito.it/ Network management and QoS provisioning - 1 Copyright This
BROADBAND AND HIGH SPEED NETWORKS
BROADBAND AND HIGH SPEED NETWORKS INTRODUCTION TO MUTIPLEXING Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link INTRODUCTION
2-port STM-1/OC-3 Channelized E1/T1 Line Card for Cisco 12000 Series Internet Routers
2-port STM-1/OC-3 Channelized E1/T1 Line Card for Cisco 12000 Series Internet Routers This feature module describes the Two-port STM-1/OC-3 Channelized E1/T1 line card and its use in the Cisco 12000 series
A Brief Overview of SONET Technology
A Brief Overview of SONET Technology Document ID: 13567 Contents Introduction Prerequisites Requirements Components Used Conventions SONET Basics SONET Transport Hierarchy Configuration Example SONET Framing
Chap 4 Circuit-Switching Networks
hap 4 ircuit-switching Networks Provide dedicated circuits between users Example: 1. telephone network: provides 64Kbps circuits for voice signals 64Kbps=8 k samples/sec * 8 bits/sample 2. transport network:
Computer Networks II
Computer Networks II SDH Giorgio Ventre COMICS LAB Dipartimento di Informatica e Sistemistica Università di Napoli Federico II Nota di Copyright Quest insieme di trasparenze è stato ideato e realizzato
Overview of SDH and SONET overhead processing commonalities and differences.
& commonalities and differences 1 of 6 14/01/04 Overview of and overhead processing commonalities and differences. The information is based on ITU-T G.707, G.783 and ETSI EN 300 417-x-1 (x=1..7,9) The
A review of Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH)
677 A review of Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH) Olabenjo Babatunde 1, Salim Mbarouk 2 1 (Department of Information Systems Engineering, Cyprus International
FURTHER READING: As a preview for further reading, the following reference has been provided from the pages of the book below:
FURTHER READING: As a preview for further reading, the following reference has been provided from the pages of the book below: Title: Broadband Telecommunications Handbook Author: Regis J. Bud Bates Publisher:
Overview of SDH and SONET overhead processing commonalities and differences.
& commonalities and differences 1 of 6 20/05/03 Overview of and overhead processing commonalities and differences. The information is based on ITU-T G.707, G.783 and ETSI EN 300 417-x-1 (x=1..7,9) The
Understanding Error Checking Using Parity Bytes in SDH/SONET Networks
Understanding Error Checking Using Parity Bytes in SDH/SONET Networks by Arnaud WROBLEWSKI TABLE OF CONTENTS:.0 Introduction 2. BIP: Definition 2.2 BIP: Examples of Calculations 2.3 Difference between
FIBER OPTIC COMMUNICATIONS. Optical Fibers
FIBER OPTIC COMMUNICATIONS Optical Fibers Fiber optics (optical fibers) are long, thin strands of very pure glass about the size of a human hair. They are arranged in bundles called optical cables and
The Fundamentals of SONET
1 The Overview When fiber optical cables were initially deployed as a medium for high-speed digital transport, the lack of standards led to widespread deployment of proprietary optical interfaces. This
SONET. Pocket Guide. Synchronous Optical Networks
SONET Pocket Guide Synchronous Optical Networks Pocket Guide for Synchronous Optical Networks Fundamentals and SONET Testing Publisher: Acterna Germany GmbH Postfach 1262 72795 Eningen u.a. Germany E-mail:
DigiPoints Volume 1. Leader Guide. Module 5 Growing Capacity Through Technology
Growing Capacity Through Technology Page 5. i DigiPoints Volume 1 Module 5 Growing Capacity Through Technology Summary In Module 4, TDM was introduced and explained. The technology focus was on T1, the
Protocol Overhead in IP/ATM Networks
Protocol Overhead in IP/ATM Networks John David Cavanaugh * Minnesota Supercomputer Center, Inc. This paper discusses the sources of protocol overhead in an IP/ATM protocol stack. It quantifies the amount
10 Gigabit Ethernet WAN PHY
White PAPER 10 Gigabit Ethernet WAN PHY Introduction The introduction of 10 Gigabit Ethernet (10 GbE) WAN PHY into the IP/Ethernet networking community has led to confusion over the applicability between
CHAPTER 8 MULTIPLEXING
CHAPTER MULTIPLEXING 3 ANSWERS TO QUESTIONS.1 Multiplexing is cost-effective because the higher the data rate, the more cost-effective the transmission facility.. Interference is avoided under frequency
SONET-SDH. Fabio Neri e Marco Mellia Gruppo Reti Dipartimento di Elettronica e-mail: [email protected] http://www.tlc-networks.polito.
SONET-SDH Fabio Neri e Marco Mellia Gruppo Reti Dipartimento di Elettronica e-mail: [email protected] http://www.tlc-networks.polito.it/ [email protected] - tel 011 564 4076 [email protected]
SDH Telecommunications Standard Primer
SDH Telecommunications Standard S D H S t a n d a r d P r i m e r What is SDH? This document is intended as an introductory guide to the Synchronous Digital Hierarchy (SDH) multiplexing standard. Standards
ANT-20, ANT-20E Advanced Network Tester PDH MUX/DEMUX
ANT-20, ANT-20E Advanced Network Tester BN 3035/90.30 to 90.31 Drop & Insert BN 3035/90.20 in combination with 4 Software Version 7.20 Operating Manual BN 3035/98.23 Please direct all enquiries to your
Multiplexing. Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single physical medium.
Multiplexing Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single physical medium. The following two factors in data communications lead to
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
FIBER OPTIC COMMUNICATIONS Optical Fibers Fiber optics (optical fibers) are long, thin strands of very pure glass about the size of a human hair. They are arranged in bundles called optical cables and
Enhancing High-Speed Telecommunications Networks with FEC
White Paper Enhancing High-Speed Telecommunications Networks with FEC As the demand for high-bandwidth telecommunications channels increases, service providers and equipment manufacturers must deliver
VOL. 1. Pocket Guide
VOL. 1 Pocket Guide The sun is made of copper... Anyone making a statement like that these days would likely be considered as quite mad, yet with these words, spoken back in 1861, Johann Philipp Reis began
Metropolitan Area Networks
Metropolitan Area Networks Bridge larger distances than a LAN, usage e.g. within the city range or on a campus. Only one or two cables, no switching elements. Thus a simple network design is achieved.
Transmission Systems and the Telephone Network
CHAPTER 4 Transmission Systems and the Telephone Network In the preceding chapter we presented the basic techniques that are used in digital communication systems to transfer information from one point
Appendix D T1 Overview
Appendix D T Overview GENERAL T refers to the primary digital telephone carrier system used in North America. T is one line type of the PCM T-carrier hierarchy listed in Table D-. T describes the cabling,
The Fundamentals of DS3
1 The Overview To meet the growing demands of voice and data communications, America s largest corporations are exploring the high-speed worlds of optical fiber and DS3 circuits. As end-users continue
Making Ethernet Over SONET Fit a Transport Network Operations Model
Making Over SONET Fit a Transport Network Operations Model Introduction Many carriers deploy or evaluate deployment of EoS as a private line offering to enhance existing service offerings. Service definitions
Setting Alarms and Inserting Errors
This section describes how to simulate error conditions, set alarms, and simulate network failures. To test the response of a network, you might need to simulate parity errors, send alarm signals, and
Performance Management and Fault Management. 1 Dept. of ECE, SRM University
Performance Management and Fault Management 1 Dept. of ECE, SRM University Performance Management Performance management requires monitoring of the performance parameters for all the connections supported
New WAN PHY Approach Proposals
New WAN Approach Proposals Feed Forward Rate Control (FFRC) & 10Gigabit Ethernet Network Interface Extension (10GENIE) IEEE P802.3ae 6-10 March, 2000 Albuquerque, NM Osamu ISHIDA and Haruhiko ICHINO NTT
Distributed Queue Dual Bus (DQDB) Metropolitan Area Networks. DQDB - Transmission principle. DQDB - Example MAN
Metropolitan Area Networks Bridge larger distances than a LAN, usage e.g. within the city range or on a campus. Only one or two cables, no switching elements. Thus a simple network design is achieved.
TCOM 370 NOTES 99-6 VOICE DIGITIZATION AND VOICE/DATA INTEGRATION
TCOM 370 NOTES 99-6 VOICE DIGITIZATION AND VOICE/DATA INTEGRATION (Please read appropriate parts of Section 2.5.2 in book) 1. VOICE DIGITIZATION IN THE PSTN The frequencies contained in telephone-quality
Course 1. General view on the fixed telephone network. Digital networks. General aspects. Definitions.
Course 1. General view on the fixed telephone network. Digital networks. General aspects. Definitions. 1. General view on the fixed telephone network Communication network dedicated to voice transmission;
VictoriaSTM-N/OC-M. Universal, Compact, User-Friendly. SDH/SONET PDH, T-Carrier, ATM and IP
VictoriaSTM-N/OC-M Universal, Compact, User-Friendly SDH/SONET PDH, T-Carrier, ATM and IP Global Transport network The interconnection between technological cultures, the impact of new applications and
Raj Jain. The Ohio State University Columbus, OH 43210 [email protected] These slides are available on-line at:
IP Over SONET The Ohio State University Columbus, OH 43210 [email protected] These slides are available on-line at: http://www.cis.ohio-state.edu/~jain/cis788-99/h_bipsn.htm 1 Overview IP over SONET:
Efficient survivable reconfiguration in SDH networks
Efficient survivable reconfiguration in SDH networks Diplomarbeit bei Prof. Dr. M. Grötschel vorgelegt von Thomas Thevis Fachbereich Mathematik der TU Berlin, Studiengang Wirtschaftsmathematik Berlin,
WAN Interface Sublayer (WIS) Update
WAN Interface Sublayer (WIS) Update IEEE P802.3ae La Jolla July 2000 Norival Figueira, Paul Bottorff, David Martin, Tim Armstrong, Bijan Raahemi: Richard Dugan:... Tom Palkert:. Juan Pineda, Bill Rivard:..
1. Overview. 2. F-bit Utilization
1. Overview... 1 2. F-bit Utilization... 1 3. T1 Line Signal... 2 4. T1 Alarm Conditions... 3 5. 64 kbps Channel Characteristics... 3 6. Timeslot Handling... 3 7. Unframed Mode... 4 1. Overview The T1
Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1
Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note Bandwidth utilization is the wise use of
The MTS-8000 Transport Module SDH, PDH, and Ethernet Test Module for the MTS-8000
ACTERNA TEST & MEASUREMENT SOLUTIONS The MTS-8000 Transport Module SDH, PDH, and Ethernet Test Module for the MTS-8000 Key Features Optical testing at 155 Mb/s, 622 Mb/s, 2.5 Gb/s, and 10 Gb/s SDH/SONET
Ultra High-Speed SONET Fiber-Optic Transmission System
Ultra High-Speed Fiber-Optic Transmission System Takashi Mori Hirokuni Tsuji Hiroyuki Nakano, D.E. Shigeo Shinada ABSTRACT: Recently, there have been numerous demands not only on voice but also data/image
E1+Jitter+Wander+Data
testing +Jitter+Wander+Data PDH worldwide T-Carrier US and Canada Japan E4 13964 kbps x3 9778 kbps Kbps x3 E3 34368 kbps Kbps T3 44736 kbps 3064 kbps x7 x5 E 8448 kbps Kbps T 631 kbps Kbps x J x3 T1c 315
Protocol Architecture. ATM architecture
Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode: ATM 1990 s/00 standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated,
Introduction. Background
Introduction By far, the most widely used networking technology in Wide Area Networks (WANs) is SONET/SDH. With the growth of Ethernet now into Metropolitan Area Networks (MANs) there is a growing need
Interworking issues between 10GBE WAN and existing transmission network
IEEE G.802.3ae May 23-25 St Louis Interworking issues between 10GBE WAN and existing transmission network Jean Loup FERRANT ALCATEL [email protected] 10GBE WAN interworking issues 1 introduction
- T-Carrier Technologies -
1 T-Carrier Fundamentals - T-Carrier Technologies - T-Carrier systems provide digitized communication for voice or data traffic across a telephone provider s network. The T-Carrier specification defines
Introduction to Carrier Network Architectures
1 Introduction to Carrier Network Architectures In the first chapter, we give an overview about existing and possible future Carrier Network Architectures. We will explain the traditional architectural
Example: Multiple OFDM Downstream Channels and Examining Backwards Compatibility. Mark Laubach, Avi Kliger Broadcom
Example: Multiple OFDM Downstream Channels and Examining Backwards Compatibility Mark Laubach, Avi Kliger Broadcom 1 Big Fat Downstream Pipe MULTIPLE DOWNSTREAM OFDM CHANNELS 2 Intent of this Presentation
TUTORIAL FOR CHAPTER 8
TUTORIAL FOR CHAPTER 8 PROBLEM 1) The informaiton in four analog signals is to be multiplexed and transmitted over a telephone channel that has a 400 to 3100 Hz bandpass. Each of the analog baseband signals
Suppliers' Information Note. Broadcast Access: 140MBit/s. Service and Interface Description
SIN 473 Issue 2.1 December 2014 Suppliers' Information Note For The BT Network Broadcast Access: 140MBit/s Service and Interface Description Each SIN is the copyright of British Telecommunications plc.
Network Technologies
Network Technologies Telephone Networks IP Networks ATM Networks Three Network Technologies Telephone Network The largest worldwide computer network, specialized for voice ing technique: Circuit-switching
Adtech Data Link Simulators.
Adtech Data Link Simulators. Adtech SX series Data Link Simulators create the same delay and error characteristics caused by long distance terrestrial and satellite data links. By providing realistic simulations
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
6.02 Fall 2012 Lecture #5
6.2 Fall 22 Lecture #5 Error correction for linear block codes - Syndrome decoding Burst errors and interleaving 6.2 Fall 22 Lecture 5, Slide # Matrix Notation for Linear Block Codes Task: given k-bit
Written examination in Computer Networks
Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the
HDSL Basics. HDSL Basics. Introduction. HDSL Overview
1 Introduction Providing T1 service is a competitive race, and High-bit-rate Digital Subscriber Line () is quickly emerging as the ideal solution to remain a step ahead. Currently touted as repeaterless
INTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION )454 6 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU $!4! #/--5.)#!4)/. /6%2 4(% 4%,%0(/.%.%47/2+ ")43 0%2 3%#/.$ $50,%8 -/$%- 34!.$!2$):%$ &/2 53% ). 4(% '%.%2!,
Switch Fabric Implementation Using Shared Memory
Order this document by /D Switch Fabric Implementation Using Shared Memory Prepared by: Lakshmi Mandyam and B. Kinney INTRODUCTION Whether it be for the World Wide Web or for an intra office network, today
AE64 TELECOMMUNICATION SWITCHING SYSTEMS
Q2. a. Draw the schematic of a 1000 line strowger switching system and explain how subscribers get connected. Ans: (Page: 61 of Text book 1 and 56 of Text book 2) b. Explain the various design parameters
Physical Layer, Part 2 Digital Transmissions and Multiplexing
Physical Layer, Part 2 Digital Transmissions and Multiplexing These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,
BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry
LAN and WAN Rate 10 GigE
LAN and WAN Rate 10 GigE IEEE 802.3 Sept. 27, 1999 Paul A. Bottorff Nortel Networks 1 Agenda A 2 PHYs Solution is the Way To Go LAN PHY compatible with LAN market LAN PHY provides connections up to 40
Dense Wavelength Division Multiplexing (DWDM)
Definition Dense Wavelength Division Multiplexing (DWDM) Dense wavelength division multiplexing (DWDM) is a fiber-optic transmission technique that employs light wavelengths to transmit data parallel-by-bit
Multiplexing on Wireline Telephone Systems
Multiplexing on Wireline Telephone Systems Isha Batra, Divya Raheja Information Technology, Dronacharya College of Engineering Farrukh Nagar, Gurgaon, India ABSTRACT- This Paper Outlines a research multiplexing
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
White Paper. OPCOM3500 Multi-Service Access Platform INTRODUCTION CHARACTERISTICS
OPCOM3500 Multi-Service Access Platform INTRODUCTION Until recently, the service model for carriers and service providers focuses on delivering bandwidth to a stable, predictable customer base through
Guidelines for Application of OTN TCM
Guidelines for Application of OTN TCM OIF-OTN-TCM-01.0 June 2013 1 1 Introduction... 3 2 Summary of ITU T Recommendations Regarding TCM... 4 2.1 ITU T Recommendation G.805 Generic functional architecture
Sol: Optical range from λ 1 to λ 1 +Δλ contains bandwidth
1. Use Figure 3.47 and Figure 3.50 to explain why the bandwidth of twisted-wire pairs and coaxial cable decreases with distance. Figure 3.47 figure 3.50 sol: The bandwidth is the range of frequencies where
WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services
WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most
Data Link Protocols. 5.4 Framing
Data Link Protocols A Packets Data link layer Physical layer Frames Packets Data link layer Physical layer B Data Links Services Framing Error control Flow control Multiplexing Link Maintenance Security:
Interfaces and Payload Testing
application note 225 Packet Optical Transport Network Testing: From Commissioning to In-Service Monitoring Mai Abou-Shaban, Product Specialist, Transport and Datacom For network service providers considering
Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?
Lecture 4 Continuation of transmission basics Chapter 3, pages 75-96 Dave Novak School of Business University of Vermont Objectives Line coding Modulation AM, FM, Phase Shift Multiplexing FDM, TDM, WDM
10GbE Implementation Architectures
10GbE Implementation Architectures A View of Where and How 10GbE Will Be Used And the Fiber Facilities Support Needed Roy Bynum Optical and Data Network Technology Development MCI WorldCom, Richardson,
INTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION ITU-T G.825 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2000) SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKS Digital networks Quality
Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)
Chapter 11: WAN Abdullah Konak School of Information Sciences and Technology Penn State Berks Wide Area Networks (WAN) The scope of a WAN covers large geographic areas including national and international
Advanced Test Equipment Rentals www.atecorp.com 800-404-ATEC (2832)
Established 1981 Tektronix MBD: Products > SDH/PDH and Jitter/Wander Test Set CTS 850 : Intro Advanced Test Equipment Rentals www.atecorp.com 800-404-ATEC (2832) SDH/PDH and Jitter/Wander Test Set CTS
DEPARTEMENT SIGNAL ET TELECOMMUNICATION
DEPARTEMENT SIGNAL ET TELECOMMUNICATION Réseaux Hauts Débits Réseaux Optiques 5 ème Année B IRT 008-009 Stephan ROULLOT Agenda Cours Réseaux Optiques Partie I - PDH, SDH, Carrier Ethernet, FTTx Stéphan
FALCO. Broadband Groomer. F-330 Series. Applications. Access system for:
Broadband Groomer F-330 Series Falco is the industry first Access Unit designed to offer access to SDH/SONET/PDH backbones by different. extends the usefulness of WAN/LAN to and GbE backbones. Falco combines
OC3-12/STM-1/4 Analysis and Emulation (& rec/playback)system ATM/POS Analysis
Monitor, Record, Playback, and Processing of ATM, PoS, RAW Traffic Add and drop T1, E1, T3, STS-1/STM-0 signals to and from an OC-3/STM-1 signal or T1 and E1 signals to and from an STS-1/STM-0 signal 19
FAST TUTORIALS FOR TIME-CHALLENGED TECHNICIANS
Tech Notes from a Telephone Engineer FAST TUTORIALS FOR TIME-CHALLENGED TECHNICIANS DDS Description: DDS Digital Data Service Long held industry acronym for transporting digital data at rates of: 2.4kbps,
1500 bytes 1308. Universal Serial Bus Bandwidth Analysis
An Analysis of Throughput Characteristics of Universal Serial Bus John Garney, Media and Interconnect Technology, Intel Architecture Labs Abstract Universal Serial Bus (USB) is a new personal computer
Fundamentals of Telecommunications
Fundamentals of Telecommunications Professor of CIS Columbus, OH 43210 [email protected] http://www.cis.ohio-state.edu/~jain/ 1 Overview Time Division Multiplexing T1, T3, DS1, E1 T1 Framing Echo Cancellation
How To Communicate With A Token Ring Network (Dihon)
Token us Token -procedure: Only someone who possesses a certain ken (= bit sequence), may send. One example for a ken network: IEEE 80. Token us All stations should be treated equally, i.e. they have pass
