Understanding Error Checking Using Parity Bytes in SDH/SONET Networks
|
|
|
- Dustin Tucker
- 9 years ago
- Views:
Transcription
1 Understanding Error Checking Using Parity Bytes in SDH/SONET Networks by Arnaud WROBLEWSKI TABLE OF CONTENTS:.0 Introduction 2. BIP: Definition 2.2 BIP: Examples of Calculations 2.3 Difference between BIP-X and X-BIP BIP: Calculation applied to SDH/SONET Networks 4 2. Block Concept Parity Bytes: Definition 2.3 BIP Mechanism in SDH/SONET Networks Maximum Values BIP: Limitations 2 5 Compared to PDH/T-Carrier systems, SDH/SONET systems provide advanced network management features. One of the most important is that any bit errors can be assigned to a particular portion of the network, meaning that it is easier to isolate the source of the error. This feature is made possible thanks to a special technique known as Bit Interleaved Parity (BIP). The results of the BIP check for each link section of the network are inserted into parity bytes known as: B, B2,, V5. Low Order Path High Order Path Section / Reg. Line / Mux. Section / Reg. 3. Errors occuring within the Same Block Errors occuring at the Same Relative Bit Position Practical Example with OTA Application Bibliography 6 B B2 V5 M G V5 (bit 3 ) Parity Bytes Remote Error Indication Bytes The BIP calculation method introduces some limitations. The limitations regarding the maximum error rates for B, B2,, V5 bytes in SDH/SONET transmission system can be confusing. The purpose of this application note is to provide some explanations about the BIP calculation method and the ensuing limitations. Technical Paper
2 .0 Introduction. BIP: Definition Bit Interleaved Parity (BIP-X) code is defined as a method of error monitoring. With even parity (as opposed to odd parity) an X-bit code is generated by the transmitting equipment over a specified portion (also called ) of the frame. The BIP-X calculation principle is the following: The monitored portion is divided in words of X-bit length. X can take the values:, 2, 8, 24, 6, etc... The first bit of the BIP code provides even parity over the first bit of all the X-bit words in the portion of the frame in question, the second bit provides even parity over the second bit of all the X-bit words within the specified portion, etc... Even parity is generated by setting the BIP-X bits, so that there is an even number of s in each monitored partition of the frame. A monitored partition comprises all bits which are in the same relative bit position within the X-bit words in the portion of the frame in question. The example in the next paragraph illustrates this definition..2 BIP: Examples of Calculations The following example illustrates the calculation of a (X=8) over a monitored portion of 5 bytes: Monitored portion 8-bits word 8-bits word 8-bits word 8-bits word 8-bits word Byte 5 Byte 4 Byte 3 Byte 2 Byte Bit position Word Word 2 Word 3 Word 4 Word 5 «s» count Odd/Even Odd Odd Even Even Odd Odd Even Even BIP- 8 calculation process An odd total in the s count row causes a binary to be placed in the same position below. code A second example illustrates a BIP-24 calculation over a monitored portion of 2 bytes: Understanding Error Checking Using Parity Bytes in SDH/SONET Networks Page 2 of 6
3 Monitored portion Byte Byte 2 Byte 3 Byte 4 Byte 5 Byte 6 Byte 7 Byte 8 Byte Byte 0 Byte Byte 2 Bit position Bytes Bytes Bytes Bytes s count Odd/Even E E E O E E O E E O E E E O O E E O E O E E O O BIP-24 Code 24-bit words Difference between BIP-X and X BIP- A BIP code can be exploited as a BIP-X and X BIP-. The calculation of BIP-X and X BIP- is identical but the interpretation differs. The concept of Block is fundamental to understanding the difference. In both cases, the size and the number of monitored s are different. This affects the number of errored s that can be detected and consequently affects the maximum error rate if the rates are displayed in Equivalent BER (very usual with SDH/SONET testers). Equiv BER =(Number of errored s/sec) / (Total Number of bits/sec) If we take the example given in the previous paragraph and imagine that the line rate of the 5 bytes is 0 Mbit/s, then the differences between the 2 methods of calculation are shown below: Monitored Byte Byte 2 Byte 3 Byte 4 Byte code Size of the monitored : 5 bytes (40 bits) Number of s/sec: Max BER= (Maximum number of errored s/sec) / (Total number of bits/sec) Max BER= / = Understanding Error Checking Using Parity Bytes in SDH/SONET Networks Page 3 of 6
4 Monitored s Byte Byte Byte Byte Byte BIP- code BIP- Size of the monitored s: 5 bits Number of s/sec: Max BER= (Maximum number of errored s/sec) / (Total number of bits/sec) Max BER= / = In conclusion, the maximum equivalent BER is X times higher with X BIP interpretation compared to BIP-X interpretation. 2.0 BIP Calculation applied to SDH/SONET Networks As mentioned previously, the BIP technique allows error performance monitoring in real time in the SDH/SONET networks and is calculated on a frame by frame basis. The results of the BIP check for each link section of the network are inserted into parity bytes known as: B, B2,, V5. In addition, Remote Error Indication (REI) signals are sent back to the equipment at the originating end of a path. 2. Block Concept The function of the SDH/SONET parity bytes (B, B2,, V5) is more easily understood if they are associated with the definition of the Block : a set of consecutive bits associated with the path or the section; each bit belongs to one and only one ; consecutive bits may not be contiguous in time. In concrete terms, the table hereafter shows the monitored by each parity byte: Understanding Error Checking Using Parity Bytes in SDH/SONET Networks Page 4 of 6
5 Parity Byte STM-n / OC-n Monitored Block B B STM-n / OC-n B2 B2 STM-n / OC-n Notes: A recommendation, G.82, defined B as a N. (for an STM-N frame). But it is only applicable for Hertzian and satellite transmission systems. This recommendation is not covered by this application note. V5 VC-2 V5 40 bytes /500 µs VT-.5 envelope capacity V5 04 bytes /500 µs 2.2 Parity Bytes: Definition Parity Byte: B B byte is calculated over all bits of the previous STM-n/OC-n frame after it has been scrambled. This calculated value of B is then placed in the following frame before it is scrambled. B is a (). In the case of an STM-/OC-3 frame, the value of the parity byte (B) is calculated over rows by 270 columns (or 2430 bytes). This represents 440 bits which are protected by 8 parity bits: 270 Byte Byte 2 Byte 2430 code Although the parity is calculated over the entire STM-n/OC-n frame, the number of parity bits remains the same when the size of the frame increases: Understanding Error Checking Using Parity Bytes in SDH/SONET Networks Page 5 of 6
6 STM-/OC-3 STM-64/OC-2 ( byte) ( byte) The table below summarizes the B parity byte characteristics according to the line rates: Path Bit Rate Kbit/s Bit/ Block/frame Block/sec B STM0-Reg STS-Sect Notes: Officially, there is no B definition for STM64/OC- 2 frames. But it is widely accepted that the general B calculation method also applies to these frames. 2 With n depending on the SDH/SONET frame. STM-Reg OC-3-Sect STM4-Reg OC-2-Sect STM6-Reg OC-48-Sect STM64-Reg OC-2-Sect Parity Byte: B2 B2 bytes are calculated prior to scrambling, but exclude the Regenerator/Section overhead bytes (A, A2, J0, B, E, D, D2, D3, etc...). The B2 bytes are then placed in the appropriate column, i.e B2 Col., B2 Col.2, B2 Col.3 (for an STM/OC-3) of the following frame before it is scrambled. B2 is a n x 24 BIP- (2). This means that the number of parity bytes depends on the size of the frame, as shown below: STM/OC-3 STM4/OC-2 24 BIP- (3 bytes) 6 BIP- (2 bytes) Monitored s Monitored s BIP- 6 BIP- Understanding Error Checking Using Parity Bytes in SDH/SONET Networks Page 6 of 6
7 STM6/OC-48 STM64/OC BIP- (48 bytes) 536 BIP- (2 bytes) Monitored s Monitored s BIP- 536 BIP- The table below summarizes the B2 parity bytes characteristics according to the line rates: Path Bit Rate Kbit/s Bit/ Block/frame Block/sec B2 STM0-Mux STS-Line *BIP- STM-Mux OC-3-Line *BIP- STM4-Mux OC-2-Line *BIP- STM6-Mux OC-48-Line *BIP- STM64-Mux OC-2-Line *BIP- Parity Byte: is a. specifically does not include the SOH/TOH portion of the frame in its calculation which is made prior to scrambling. The result of the calculation is placed in the following frame for each VC4/STS3-SPE. The result that can be conveyed using the depends directly on the type of mapping used (concatenated payload for example: VC4-4c, STS2c...). For example, if VC4/STS-3c-SPE is used, then the number of bytes is given by 26 columns by rows, or 234 bytes. The number of bits protected by is 872. Although the parity is calculated over the different Virtual Containers (VC) or Synchronous Payload Envelopes (SPE), the number of parity bits remains the same when the size of the VC/SPEs increases (concatenated payload): Understanding Error Checking Using Parity Bytes in SDH/SONET Networks Page 7 of 6
8 VC4/ STS3c-SPE VC4-4c/ STS2c-SPE ( byte) ( byte) Byte Byte Byte 2 Byte 2 Byte 234 Byte 36 code code VC4-6c/ STS48c-SPE VC4-64c/ STS2c-SPE ( byte) ( byte) Byte Byte Byte 2 Byte 2 Byte Byte code code The table below summarizes the parity byte characteristics according to the VC/SPEs: Path Bit Rate Kbit/s Bit/ Block/frame Block/sec VC3 STS -SPE VC4 STS 3c-SPE VC4-4c STS 2c-SPE VC4-6c STS 48c-SPE VC4-64c STS 2c-SPE Understanding Error Checking Using Parity Bytes in SDH/SONET Networks Page 8 of 6
9 Parity Byte: V5 V5 is a BIP-2. Only 2 bits of the V5 byte are used to carry the BIP-2 result: BIP-2 REI RFI Signal Label RDI The V5 parity byte monitors the VC-2 (SDH) or the VT-.5 Envelope Capacity (SONET). VC-2 VT-.5 Envelope Capacity V5 0 V bytes 26 bytes J2 25 µs J2 25 µs 35 bytes 26 bytes N2 250 µs N2 250 µs 35 bytes 26 bytes K4 375 µs K4 375 µs 35 bytes 26 bytes 500 µs 500 µs As shown above, a VC-2/VT-.5 needs 4 SDH/SONET frames to be completely transmitted. So, it takes 500 µs. The result of the BIP-2 calculation is placed in the following V5 byte. As mentionned previously, the recurrence of the V5 byte is once every 4 SDH/SONET frames. V5 monitors 40 bytes in SDH (VC-2). V5 monitors 04 bytes in SONET (VT-.5 Envelope Capacity). VC-2 VT-.5 Envelope Capacity # # 2 # # 2 # 560 # 46 BIP-2 code BIP-2 code Understanding Error Checking Using Parity Bytes in SDH/SONET Networks Page of 6
10 The table below summarizes the V5 parity byte characteristics according to the standard, SDH or SONET: Path Bit Rate Kbit/s Bit/ Block/frame Block/sec VC / BIP-2 VT-.5 Envelope Capacity / BIP BIP Mechanism in SDH/SONET Networks As mentioned previously, all the BIPs are calculated over their respective portion and the results are placed in the following frame (except for V5 which is inserted every 4 frames). All the BIPs are calculated prior to scrambling except B which is calculated after the frame has been scrambled. The following example illustrates this specific process with the B byte: Transmit Frame n+ Frame n From previous frame To next frame Compute parity Add parity from previous frame 2Scramble 3Compute parity for next frame Transmitter side (B example) Receive Frame n Frame n+ From previous frame Calculate parity, compare with stored parity Calculate parity 2Compare with stored parity from previous frame 3Count errors if detected Receiver side (B example) 2.4 Maximum Values Parity bytes monitor s. The conceptual definition of a was introduced in G.826 and remains valid in the current versions of G.826, G.828, G.82 ITU recommendations. All the parity bytes detect errored s. And even if there are several errored bits in one, the parity byte will just detect ONE errored. This explains why there is a maximum value for B, B2,, V5, which cannot be exceeded. B, B2,, V5 can be displayed as a rate. The formula is: (B, B2,, V5) rate = Number of errored s Total number of received s Understanding Error Checking Using Parity Bytes in SDH/SONET Networks Page 0 of 6
11 But it is very usual for SDH/SONET testers to translate this formula in Equivalent Bit Error Rate (BER) for practical reasons. This is valid only if there are not too many errors. In concrete terms, if there is no more than one errored bit per, we can assume that the number of errored bits is equal to the number of errored s (and we will see in the next chapters that it is always the case in normal conditions). So, the formula becomes: (B, B2,, V5) Equiv.BER = Number of errored s (= Number of errored bits) Number of received s * Number of bits / The maximum value for parity byte is reached when all the s are errored. The table below gives this maximum Equivalent BER value for each parity byte: Path Byte Bit / Block Block / Sec Maximum Equiv. BER STM64-Reg. OC-2-Sect. STM6-Reg. OC-48-Sect. STM4-Reg. OC-2-Sect. STM-Reg. OC-3-Sect. STM0-Reg. STS-Sect. STM64-Mux OC-2-Line STM6-Mux OC-48-Line STM4-Mux OC-2-Line STM-Mux OC-3-Line STM0-Mux STS-Line VC4-64c STS 2c-SPE VC4-6c STS 48c-SPE VC4-4c STS 2c-SPE VC4 STS 3c-SPE VC3 STS -SPE VC-2 VT-.5 Envelop Capacity B B B B B B2 B2 B2 B2 B2 V5 V In conclusion: B: The maximum number of errors that B can detect is reduced with an increase in the line rate. This is because the number of parity bits remains the same while the size of the increases. B2: The maximum number of errors that B2 can detect remains constant with an increase in the line rate. This is because the quantity of parity bits increases in the same proportion as the number of s , ,2 0-6, ,4 0-5,54 0-4,25 0-3,25 0-3,25 0-3,25 0-3, , ,32 0-6, ,32 0-5, ,2 0-4, Understanding Error Checking Using Parity Bytes in SDH/SONET Networks Page of 6
12 : The maximum number of errors that can detect remains constant with an increase in line rate, but it is dependent on the mapping type. is the path-error monitoring function associated with the payload. 3.0 BIP: Limitations BIP calculation methods have some limitations. In particular cases, all the errors occuring during the transmission of the SDH/SONET frames may not be detected. These particular cases are described below: 3. Errors occuring within the Same Block As already mentioned, each parity byte monitors a. Even if there are several errored bits within the same, only one errored will be detected. The next example shows what happens with the byte when several errors occur in the VC4-6c/STS 48c-SPE of an STM6/OC-48 frame. 476 VC4-6c/ STS48c-SPE : Errors ( byte) Byte Byte 2 2 errors within the Byte code Only one errored will be declared In short, on the reception side, there is no difference between: and Understanding Error Checking Using Parity Bytes in SDH/SONET Networks Page 2 of 6
13 3.2 Errors occuring at the Same Relative Bit Position Another special case may appear, which is in fact an exceptional example of the case described in the previous paragraph: error occur within the same AND at the same relative bit position. In this case, if the number of errors is even, then these errors will not be detected because the parity is respected. For example: Byte Byte 2 Notes: All recommendations give the same definition of unavailable time: an unavailable period starts with the occurence of the first SES of 0 consecutive Severly Errored Second (SES). In G.826, G.828, an SES event is declared when at least 30% of the received s in a second are errored. Byte code 2 errors within the and in the same bit position No errors will be detected because the parity is respected The probability of errors occuring within the same (and occasionally in the same bit position) is very low in normal conditions. The higher the number of errors, the higher the probability of meeting the special cases described above. But in practice, when there is a high bit error rate, the corresponding path is declared in unavailability state and the errors are no longer cumulated. The graph below shows the limitations of BIP and the unavailable state area with the B parity byte of an STM/OC-3 frame: Understanding Error Checking Using Parity Bytes in SDH/SONET Networks Page 3 of 6
14 , = 30% of the s Real BER on the path ,4 0-5 Unavailable State B (Equiv. BER) 4.0 Practical Example with OTA Application The Optical Transport Analysis (OTA) application of the NetTest CMA 5000 platform provides a very easy way to display the parity bytes as a rate. The Quality window (accessed via the Quality tab) shows all the analyzed parameters in a single window and a flip-flop button allows the user to select the display mode for the results (Count or Rate mode): Understanding Error Checking Using Parity Bytes in SDH/SONET Networks Page 4 of 6
15 Examples: STM measurement after 5 minutes: OC-3 measurement after 5 minutes: Understanding Error Checking Using Parity Bytes in SDH/SONET Networks Page 5 of 6
16 5.0 Bibliography Standards IUT-T Bellcore ANSI G.707: Network Node Interface for the SDH Annex D: Byte structure and frame layout for the VC-4 and VC-3 containers Annex E: Byte structure and frame layout for the VC-2, VC- and VC-2 containers G.783: Principal characteristics of multiplexing equipment for the synchronous digital hierarchy G.826: Error performance parameters and objectives for international, constant bit rate digital paths at or above the primary rate G.828: Defines parameters and objectives for SDH paths GR-253: SONET Transport System: Common Generic Criteria T.05-5: SONET - Basic description including multiplex structure, rates and formats T.05.02: SONET - Payload mapping Technical Paper NetTest technical paper: Availability and Performance Evaluation of your PDH/SDH Networks - Ref: TXP-C Ed. NetTest A/S Kirkebjerg Allé 0 DK-2605 Brøndby Denmark Tel: Fax: [email protected] NetTest Sales Offices Brazil Italy China Singapore Denmark Spain France USA Germany NetTest, the pioneer in multi-layer network testing, is a global provider of test and measurement systems, instruments and components for all types of networks and all stages of network development and operation. Our solutions offer leaders in optical, wireless and fixed networking vital insights into network performance, enabling informed business decisions that drive profitability. ISO 000 certified. LRQA NetTest All Rights Reserved. Specifications are subject to change without notice. CMA-C-4008 Understanding Error Checking Using Parity Bytes in SDH/SONET Networks Ed.
Course 13 SDH/SONET multiplexing strategy
Course SDH/SONET multiplexing strategy Elements of the SDH/SONET multiplex o Container C represents a bloc structure with imposed dimensions which contains data belonging to a tributary and doesn t contain
It explains the differences between the Plesiochronous Digital Hierarchy and the Synchronous Digital Hierarchy.
TECHNICAL TUTORIAL Subject: SDH Date: October, 00 Prepared by: John Rumsey SDH Synchronous Digital Hierarchy. Introduction. The Plesiochronous Digital Hierarchy (PDH). The Synchronous Digital Hierarchy
A Brief Overview of SONET Technology
A Brief Overview of SONET Technology Document ID: 13567 Contents Introduction Prerequisites Requirements Components Used Conventions SONET Basics SONET Transport Hierarchy Configuration Example SONET Framing
DigiPoints Volume 1. Student Workbook. Module 5 Growing Capacity Through Technology
Growing Capacity Through Technology Page 5. 1 DigiPoints Volume 1 Module 5 Growing Capacity Through Technology Summary This module covers the North American Digital Hierarchy (NADH), the European Digital
BROADBAND AND HIGH SPEED NETWORKS
BROADBAND AND HIGH SPEED NETWORKS INTRODUCTION TO MUTIPLEXING Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link INTRODUCTION
Lecture 12 Transport Networks (SONET) and circuit-switched networks
CS4/MSc Computer Networking Lecture 1 Transport Networks (SONET) and circuit-switched networks Computer Networking, Copyright University of Edinburgh 005 Transport Networks and SONET/SDH In most cases
VictoriaSTM-N/OC-M. Universal, Compact, User-Friendly. SDH/SONET PDH, T-Carrier, ATM and IP
VictoriaSTM-N/OC-M Universal, Compact, User-Friendly SDH/SONET PDH, T-Carrier, ATM and IP Global Transport network The interconnection between technological cultures, the impact of new applications and
Fundamentals of SONET/SDH
W P. Michael Henderson [email protected] September 18, 2001 hen data is transmitted over a communications medium, a number of things must be provided on the link, including framing of the data,
Course 12 Synchronous transmission multiplexing systems used in digital telephone networks
Course 12 Synchronous transmission multiplexing systems used in digital telephone networks o Disadvantages of the PDH transmission multiplexing system PDH: no unitary international standardization of the
SDH and WDM: a look at the physical layer
SDH and WDM: a look at the physical SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group [email protected] http://www.telematica.polito.it/ Network management and
SDH and WDM A look at the physical layer
SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group [email protected] http://www.telematica.polito.it/ Network management and QoS provisioning - 1 Copyright This
Chap 4 Circuit-Switching Networks
hap 4 ircuit-switching Networks Provide dedicated circuits between users Example: 1. telephone network: provides 64Kbps circuits for voice signals 64Kbps=8 k samples/sec * 8 bits/sample 2. transport network:
Synchronous Optical Network (SONET)
Synchronous Optical Network (SONET) Definition Synchronous optical network (SONET) is a standard for optical telecommunications transport formulated by the Exchange Carriers Standards Association (ECSA)
Computer Networks II
Computer Networks II SDH Giorgio Ventre COMICS LAB Dipartimento di Informatica e Sistemistica Università di Napoli Federico II Nota di Copyright Quest insieme di trasparenze è stato ideato e realizzato
Overview of SDH and SONET overhead processing commonalities and differences.
& commonalities and differences 1 of 6 14/01/04 Overview of and overhead processing commonalities and differences. The information is based on ITU-T G.707, G.783 and ETSI EN 300 417-x-1 (x=1..7,9) The
The Fundamentals of SDH
1 Overview Recent global changes in government structures and resulting economic pressures, increased competition and growing private networks have forced telecommunications service providers throughout
DigiPoints Volume 1. Leader Guide. Module 5 Growing Capacity Through Technology
Growing Capacity Through Technology Page 5. i DigiPoints Volume 1 Module 5 Growing Capacity Through Technology Summary In Module 4, TDM was introduced and explained. The technology focus was on T1, the
Overview of SDH and SONET overhead processing commonalities and differences.
& commonalities and differences 1 of 6 20/05/03 Overview of and overhead processing commonalities and differences. The information is based on ITU-T G.707, G.783 and ETSI EN 300 417-x-1 (x=1..7,9) The
2-port STM-1/OC-3 Channelized E1/T1 Line Card for Cisco 12000 Series Internet Routers
2-port STM-1/OC-3 Channelized E1/T1 Line Card for Cisco 12000 Series Internet Routers This feature module describes the Two-port STM-1/OC-3 Channelized E1/T1 line card and its use in the Cisco 12000 series
FIBER OPTIC COMMUNICATIONS. Optical Fibers
FIBER OPTIC COMMUNICATIONS Optical Fibers Fiber optics (optical fibers) are long, thin strands of very pure glass about the size of a human hair. They are arranged in bundles called optical cables and
WAN Interface Sublayer (WIS) Update
WAN Interface Sublayer (WIS) Update IEEE P802.3ae La Jolla July 2000 Norival Figueira, Paul Bottorff, David Martin, Tim Armstrong, Bijan Raahemi: Richard Dugan:... Tom Palkert:. Juan Pineda, Bill Rivard:..
FURTHER READING: As a preview for further reading, the following reference has been provided from the pages of the book below:
FURTHER READING: As a preview for further reading, the following reference has been provided from the pages of the book below: Title: Broadband Telecommunications Handbook Author: Regis J. Bud Bates Publisher:
Setting Alarms and Inserting Errors
This section describes how to simulate error conditions, set alarms, and simulate network failures. To test the response of a network, you might need to simulate parity errors, send alarm signals, and
Enhancing High-Speed Telecommunications Networks with FEC
White Paper Enhancing High-Speed Telecommunications Networks with FEC As the demand for high-bandwidth telecommunications channels increases, service providers and equipment manufacturers must deliver
SONET-SDH. Fabio Neri e Marco Mellia Gruppo Reti Dipartimento di Elettronica e-mail: [email protected] http://www.tlc-networks.polito.
SONET-SDH Fabio Neri e Marco Mellia Gruppo Reti Dipartimento di Elettronica e-mail: [email protected] http://www.tlc-networks.polito.it/ [email protected] - tel 011 564 4076 [email protected]
Protocol Overhead in IP/ATM Networks
Protocol Overhead in IP/ATM Networks John David Cavanaugh * Minnesota Supercomputer Center, Inc. This paper discusses the sources of protocol overhead in an IP/ATM protocol stack. It quantifies the amount
The Fundamentals of SONET
1 The Overview When fiber optical cables were initially deployed as a medium for high-speed digital transport, the lack of standards led to widespread deployment of proprietary optical interfaces. This
SONET. Pocket Guide. Synchronous Optical Networks
SONET Pocket Guide Synchronous Optical Networks Pocket Guide for Synchronous Optical Networks Fundamentals and SONET Testing Publisher: Acterna Germany GmbH Postfach 1262 72795 Eningen u.a. Germany E-mail:
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
FIBER OPTIC COMMUNICATIONS Optical Fibers Fiber optics (optical fibers) are long, thin strands of very pure glass about the size of a human hair. They are arranged in bundles called optical cables and
Raj Jain. The Ohio State University Columbus, OH 43210 [email protected] These slides are available on-line at:
IP Over SONET The Ohio State University Columbus, OH 43210 [email protected] These slides are available on-line at: http://www.cis.ohio-state.edu/~jain/cis788-99/h_bipsn.htm 1 Overview IP over SONET:
SDH Telecommunications Standard Primer
SDH Telecommunications Standard S D H S t a n d a r d P r i m e r What is SDH? This document is intended as an introductory guide to the Synchronous Digital Hierarchy (SDH) multiplexing standard. Standards
Transmission Systems and the Telephone Network
CHAPTER 4 Transmission Systems and the Telephone Network In the preceding chapter we presented the basic techniques that are used in digital communication systems to transfer information from one point
ANT-20, ANT-20E Advanced Network Tester PDH MUX/DEMUX
ANT-20, ANT-20E Advanced Network Tester BN 3035/90.30 to 90.31 Drop & Insert BN 3035/90.20 in combination with 4 Software Version 7.20 Operating Manual BN 3035/98.23 Please direct all enquiries to your
VictoriaCombo. The Only Truly Future-Proof Tester. Multitechnology. SDH, SONET, PDH and T-Carrier up to 10 Gbit/s
VictoriaCombo The Only Truly Future-Proof Tester Multitechnology SDH, SONET, PDH and T-Carrier up to 10 Gbit/s Beyond Compare the most flexible tester in the market Trend Communications has redefined the
A review of Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH)
677 A review of Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH) Olabenjo Babatunde 1, Salim Mbarouk 2 1 (Department of Information Systems Engineering, Cyprus International
Interfaces and Payload Testing
application note 225 Packet Optical Transport Network Testing: From Commissioning to In-Service Monitoring Mai Abou-Shaban, Product Specialist, Transport and Datacom For network service providers considering
By: Mohsen Aminifar Fall 2014
By: Mohsen Aminifar Fall 2014 Contact Information: E-Mail: [email protected] [email protected] Phone : 021-22919726 09128442885 Website : http://parsenet.ir http://aminifar.ir SMS Center : 5000262175
Configuring POS. POS on the ML-Series Card. ML-Series SONET and SDH Circuit Sizes CHAPTER
5 CHAPTER Configuring POS This chapter describes advanced packet-over-sonet/sdh (POS) interface configuration for the ML-Series card. Basic POS interface configuration is included in Chapter 4, Configuring
Introduction. Background
Introduction By far, the most widely used networking technology in Wide Area Networks (WANs) is SONET/SDH. With the growth of Ethernet now into Metropolitan Area Networks (MANs) there is a growing need
New WAN PHY Approach Proposals
New WAN Approach Proposals Feed Forward Rate Control (FFRC) & 10Gigabit Ethernet Network Interface Extension (10GENIE) IEEE P802.3ae 6-10 March, 2000 Albuquerque, NM Osamu ISHIDA and Haruhiko ICHINO NTT
Chapter 11: WAN. Abdullah Konak School of Information Sciences and Technology Penn State Berks. Wide Area Networks (WAN)
Chapter 11: WAN Abdullah Konak School of Information Sciences and Technology Penn State Berks Wide Area Networks (WAN) The scope of a WAN covers large geographic areas including national and international
10 Gigabit Ethernet WAN PHY
White PAPER 10 Gigabit Ethernet WAN PHY Introduction The introduction of 10 Gigabit Ethernet (10 GbE) WAN PHY into the IP/Ethernet networking community has led to confusion over the applicability between
Performance Management and Fault Management. 1 Dept. of ECE, SRM University
Performance Management and Fault Management 1 Dept. of ECE, SRM University Performance Management Performance management requires monitoring of the performance parameters for all the connections supported
AT&T Private Line Service OC-192 SERVICE DESCRIPTION AND INTERFACE SPECIFICATION
TR 54079 Data Communications AT&T Private Line Service OC-192 SERVICE DESCRIPTION AND INTERFACE SPECIFICATION Issue 1.0 September 1999 AT&T 1999 Printed in USA ii NOTICE This Technical Reference is published
Ethernet over SONET. Dr. John S. Graham University of London Computer Centre
Ethernet over SONET Dr. John S. Graham University of London Computer Centre Ethernet vs SONET Feature Ethernet SONET Guaranteed Delivery No (Packet Switched) Yes (Circuit Switched) Guaranteed BW No Yes
VOL. 1. Pocket Guide
VOL. 1 Pocket Guide The sun is made of copper... Anyone making a statement like that these days would likely be considered as quite mad, yet with these words, spoken back in 1861, Johann Philipp Reis began
Network Technologies
Network Technologies Telephone Networks IP Networks ATM Networks Three Network Technologies Telephone Network The largest worldwide computer network, specialized for voice ing technique: Circuit-switching
DS-3 Technology and Testing Overview
DS-3 Technology and Testing Overview Presented by Moti Shacham for Cincinnati Bell Technical Training Symposium September 12-14, 2000 Tel: 770-246-9662 Fax: 770-246-9733 www.telesync.com 1 OC-48/STM-16
The MTS-8000 Transport Module SDH, PDH, and Ethernet Test Module for the MTS-8000
ACTERNA TEST & MEASUREMENT SOLUTIONS The MTS-8000 Transport Module SDH, PDH, and Ethernet Test Module for the MTS-8000 Key Features Optical testing at 155 Mb/s, 622 Mb/s, 2.5 Gb/s, and 10 Gb/s SDH/SONET
RS-232 Communications Using BobCAD-CAM. RS-232 Introduction
RS-232 Introduction Rs-232 is a method used for transferring programs to and from the CNC machine controller using a serial cable. BobCAD-CAM includes software for both sending and receiving and running
The Fundamentals of DS3
1 The Overview To meet the growing demands of voice and data communications, America s largest corporations are exploring the high-speed worlds of optical fiber and DS3 circuits. As end-users continue
Making Ethernet Over SONET Fit a Transport Network Operations Model
Making Over SONET Fit a Transport Network Operations Model Introduction Many carriers deploy or evaluate deployment of EoS as a private line offering to enhance existing service offerings. Service definitions
Principles of Circuit Switched Networks. John S Graham Indiana University
Principles of Circuit Switched Networks John S Graham Indiana University Syllabus Review of Current OpAcal Technologies What s a circuit; what s a cross connect? How are SONET/SDH and OTN different? How
MPEG-2 Transport vs. Program Stream
MPEG-2 Transport vs. Program Stream White Paper What is the difference between Program Stream and Transport Stream, and why do we currently only support the Transport Stream format? Well, this topic is
Customer Interface Publication: CIP024
Customer Interface Publication: CIP024 KCOM Group PLC DataLine Access Service Description and Technical Characteristics Issue: Version 1.2 April 2016 The information in this document is provided in accordance
Multiplexing. Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single physical medium.
Multiplexing Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single physical medium. The following two factors in data communications lead to
Packets vs. Circuits Why N+0 Ethernet Protection is Better Than the N+1 SDH/SONET Protection Scheme
Packets vs. Circuits Why N+0 Ethernet Protection is Better Than the N+1 SDH/SONET Protection Scheme Abstract Summary N+0 Ethernet protection vs. N+1 SDH/SONET Many operators are considering, or are in
Bluetooth in Automotive Applications Lars-Berno Fredriksson, KVASER AB
Bluetooth in Automotive Applications Lars-Berno Fredriksson, KVASER AB ABSTRACT There is a potential for 50-400 million per year Bluetooth nodes within the car market if Bluetooth can be integrated into
Fundamentals of Telecommunications
Fundamentals of Telecommunications Professor of CIS Columbus, OH 43210 [email protected] http://www.cis.ohio-state.edu/~jain/ 1 Overview Time Division Multiplexing T1, T3, DS1, E1 T1 Framing Echo Cancellation
How To Test For 10 Gigabit Ethernet At 10 Gb/S
White Paper Testing Scenarios for Ethernet at 10 Gb/s By Guylain Barlow Introduction As a natural evolution, the typical test concepts borrowed from lower-rate Ethernet apply to 10 Gigabit Ethernet (GigE).
Monitoring and Testing
CHAPTER 5 Monitoring and Testing This chapter tells you how to use the Cisco 6200 Manager to monitor and test a Cisco 6200 DSLAM. This chapter includes the following sections: Status Alarm Overview Cisco
1.264 Lecture 32. Telecom: Basic technology. Next class: Green chapter 4, 6, 7, 10. Exercise due before class
1.264 Lecture 32 Telecom: Basic technology Next class: Green chapter 4, 6, 7, 10. Exercise due before class 1 Exercise 1 Communications at warehouse A warehouse scans its inventory with RFID readers that
Virtual Integrated Design Getting started with RS232 Hex Com Tool v6.0
Virtual Integrated Design Getting started with RS232 Hex Com Tool v6.0 Copyright, 1999-2007 Virtual Integrated Design, All rights reserved. 1 Contents: 1. The Main Window. 2. The Port Setup Window. 3.
Chapter 4 T1 Interface Card
Chapter 4 T1 Interface Card GENERAL This chapter describes DTE interface options that may be required if application requirements change. It also describes software configuration for the T1 interface card.
Technical Support Bulletin Nr.18 Modbus Tips
Technical Support Bulletin Nr.18 Modbus Tips Contents! Definitions! Implemented commands! Examples of commands or frames! Calculating the logical area! Reading a signed variable! Example of commands supported
EUROPEAN ETS 300 411 TELECOMMUNICATION May 1995 STANDARD
EUROPEAN ETS 300 411 TELECOMMUNICATION May 1995 STANDARD Source: ETSI TC-TM Reference: DE/TM-02215 ICS: 33.080 Key words: Performance, information model, NE Transmission and Multiplexing (TM); Performance
Guidelines for Application of OTN TCM
Guidelines for Application of OTN TCM OIF-OTN-TCM-01.0 June 2013 1 1 Introduction... 3 2 Summary of ITU T Recommendations Regarding TCM... 4 2.1 ITU T Recommendation G.805 Generic functional architecture
Packet-over-SONET/SDH
APPLICATION NOTE Packet-over-SONET/SDH Introduction Synchronous Optical Network/Synchronous Digital Hierarchy (SONET/SDH) and optical fiber have emerged as significant technologies for building large-scale,
Cisco 1-Port Channelized STM-1/OC-3 Shared Port Adapter Version 2
Data Sheet Cisco 1-Port Channelized STM-1/OC-3 Shared Port Adapter Version 2 Today's successful businesses require more bandwidth and feature-rich services to maintain a competitive advantage. To serve
Efficient survivable reconfiguration in SDH networks
Efficient survivable reconfiguration in SDH networks Diplomarbeit bei Prof. Dr. M. Grötschel vorgelegt von Thomas Thevis Fachbereich Mathematik der TU Berlin, Studiengang Wirtschaftsmathematik Berlin,
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
System Maintenance and Monitoring
CHAPTER 16 This chapter describes the system maintenance and monitoring capabilities available in the element management system (EMS), and includes the following sections: Getting System Information, page
ADSL TUTORIAL. Figure 1: Typical DSL system.
ADSL TUTORIAL Matthew J. Langlois, University of New Hampshire InterOperability Laboratory 121 Technology Drive, Suite 2, Durham, NH 03824 USA. Extracted from the Introduction and Chapter 1 of A G.hs Handshaking
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
Intelligent Network Monitoring for Your LAN, WAN and ATM Network
Intelligent Network Monitoring for Your LAN, WAN and ATM Network Solutions ZettaE2E Intelligent Network Monitoring for Your LAN, WAN and ATM Network Key Benefits Reduce current and future LAN, WAN and
ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services
WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most
Delay Measurement in OTN networks. Apodis Application Note
Delay Measurement in OTN networks Apodis Application Note Leon Bruckman System Engineering [email protected] April 2010 2010 IP Light, Inc. Background. OTN standardization efforts got under way seeking
GPON - EPON Comparison
White Paper GPON - EPON Comparison CommScope Solutions Marketing October 2013 Contents Introduction 3 Protocol fundamentals 4 Framing/service adaption 4 Basic operation 5 Service hierarchy 7 Bandwidth
An Introduction to Excel Pivot Tables
An Introduction to Excel Pivot Tables EXCEL REVIEW 2001-2002 This brief introduction to Excel Pivot Tables addresses the English version of MS Excel 2000. Microsoft revised the Pivot Tables feature with
A RF18 Remote control receiver MODULE
A RF18 Remote control receiver MODULE User Guide No part of this document may be reproduced or transmitted (in electronic or paper version, photocopy) without Adeunis RF consent. This document is subject
The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL
The OSI Model and the TCP/IP Protocol Suite - the OSI model was never fully implemented. - The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively
FALCO. Broadband Groomer. F-330 Series. Applications. Access system for:
Broadband Groomer F-330 Series Falco is the industry first Access Unit designed to offer access to SDH/SONET/PDH backbones by different. extends the usefulness of WAN/LAN to and GbE backbones. Falco combines
Next Generation SONET/SDH Technologies and Applications
White Paper Next Generation SONET/SDH Technologies and Applications By Werner Habisreitinger Executive summary Innovation, the lifeline to survival in the telecommunications market, has spurred the telecommunications
Connecting AMD Flash Memory to a System Address Bus
Connecting AMD Memory to a System Address Bus Application Note This document is intended to clarify how memories may be connected to a system address bus and how software should issue device commands to
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
LAN and WAN Rate 10 GigE
LAN and WAN Rate 10 GigE IEEE 802.3 Sept. 27, 1999 Paul A. Bottorff Nortel Networks 1 Agenda A 2 PHYs Solution is the Way To Go LAN PHY compatible with LAN market LAN PHY provides connections up to 40
PA-MC-T3 Multi-Channel T3 Synchronous Serial Port Adapter Enhancement
PA-MC-T3 Multi-Channel T3 Synchronous Serial Port Adapter Enhancement This feature module describes the PA-MC-T3 Multi-Channel T3 port adapter (PA-MC-T3 [=]), which can now be configured as either customer
Computer Systems Structure Main Memory Organization
Computer Systems Structure Main Memory Organization Peripherals Computer Central Processing Unit Main Memory Computer Systems Interconnection Communication lines Input Output Ward 1 Ward 2 Storage/Memory
MULTIPRON. E1, Gigabit Ethernet, RS232/485 Tester MULTIPRON
MULTIPRON E1, Gigabit Ethernet, RS232/485 Tester MULTIPRON 10/100/1000 Mbit/s Ethernet transmission data monitoring and analysis (two Gigabit Ethernet interfaces, 2x 100/1000Mbit/s SFP and 2x 10/100/1000Mbit/s
Creating tables of contents and figures in Word 2013
Creating tables of contents and figures in Word 2013 Information Services Creating tables of contents and figures in Word 2013 This note shows you how to create a table of contents or a table of figures
2 Basic Concepts. Contents
2. Basic Concepts Contents 2 Basic Concepts a. Link configuration b. Topology c. Transmission mode d. Classes of networks 1 a. Link Configuration Data links A direct data link is one that establishes a
Schedule 2e. Additional terms for Ethernet services
1. SERVICE DESCRIPTION The Interoute Ethernet Clear and Ethernet Flex Services offer Circuits carrying telecommunications traffic between Network Termination Points on the Interoute Ethernet Network and/
6.02 Fall 2012 Lecture #5
6.2 Fall 22 Lecture #5 Error correction for linear block codes - Syndrome decoding Burst errors and interleaving 6.2 Fall 22 Lecture 5, Slide # Matrix Notation for Linear Block Codes Task: given k-bit
A NOVEL RESOURCE EFFICIENT DMMS APPROACH
A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer
INTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION ITU-T G.825 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2000) SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKS Digital networks Quality
