SDH Basics
SDH Basics
PDH
Almost synchronous signals
MUX MUX
PDH Hierarchy
x32 x4 x4
E3 E3 E2 E2 E1 E1
Ch 00 Ch 01 Ch 02 Ch 03
x4
MUX MUX 140 Mbps
E3
E2
MUX MUX
E3
E1
MUX MUX
E2
MUX MUX
Ch 28 Ch 29 Ch 30 Ch 31
E1
64 Kbps
2.048 Mbps
Plesiochronous Drop/Insert
34 Mbps 140 Mbps
140 34 140 34
140 Mbps
8 Mbps
34 8 8 34
2 Mbps
8 2 2 8
Problems of PDH
The Plesiochronous Digital Hierarchy had a number of problems:
Each multiplexing section has to add overhead bits for justification (higher rate -> more overhead) Each part of the world has its own transmission hierarchy (expensive interconnection equipment) Justification (bit stuffing) spreads data over the frame add-drop-multiplexers are hard to build extract a single voice call -> demultiplex all steps down switching of bundles of calls (n * 64 kbit/s) is difficult (every switch has to demultiplex down to DS0 level) The management and monitoring functions were not sufficient in PDH PDH did not define a standard format on the transmission link Every vendor used its own line coding, optical interfaces etc. Very hard to interoperate
OUT LINE
Introduction SDH Frame structure SDH Principles Multiplexing Structure Network Elements Network Topologies Alarms Timing sources Protection Ethernet over SDH Management functions Optical technology SDH Measurements
INTRODUCTION TO SDH
WHAT IS SDH
The SDH is hierarchically organized set of Digital transport structures which have been standardized by CCITT for Transmission of pay loads in Transmission Networks
What is SDH ?
A Modular, Layered & Organized Architecture using Synchronous Multiplexing Technique. A Standardized hierarchical Set of Digital Transport Structures for transport of suitably Adapted Payloads.
A Set of Improved & Standardized Management Interfaces and Functions, allowing Digital Transmission Systems to inter-work in a multi-vendor environment. Three major goals: Avoid the problems of PDH Achieve higher bit rates (Gbit/s) Better means for Operation, Administration, and Maintenance (OA&M)
SDH FEATURES
Common standard - Multi vendor. Better Management NMS. Fast provisioning. Better Network utilization. Better Network survivability. Simpler hand over. Support future services.
REGENERATOR SECTION
3 4 5
OVERHEAD
AU - POINTER
STM PAYLOAD
9 rows MULTIPLEX SECTION OVERHEAD
SDH PRINCIPLES
CONTAINER TERMINOLOGY
AU
POH
+AU-PTR
SOH
Plesio. signal
VC
AU
AUG
STM-1
+TU-PTR C.. VC.. TU.. TUG.. AU.. AUG.. CONTAINER VIRTUAL CONTAINER TRIBUTARY UNIT TRIB.UNIT GROUP ADMINISTRATIVE UNIT ADMINISTRATIVE UNIT GROUP
TU
TUG
VC
+AU-PTR
HIGHER ORDER TU PTR.. SOH.. POH.. POINTER SECTION OVERHEAD PATH OVERHEAD
CONTAINERS The term container C describes a defined network- synchronized transmission capacity. Every piece of tributary information is interleaved in containers. The following containers are distinguished: Designation C-11 C-12 C-2 C-3 C-4 Signal to be transmitted 1,544 kbit/s 2048 kbit/s 6312 kbit/s 44,736 kbit/s or 34,368 kbit/s 139264 kbit/s
VIRTUAL CONTAINERS
Apath overhead is added to each container.This unit is called a virtual container POH carries information on supervision and maintenance of a path switched in the network. POH ensures reliable transport of the container from signal source to destination. All containers transmitted in one larger container are termed as LO containers. Those containers that are transmitted directly are termed as HO containers. The following VCs are distinguished: VC-11, VC-12, VC-2 VC-3, VC-4 LO Containers HO Containers
TRIBUTARY UNIT The tributary unit TU is termed as the component of the higher order container inside which the embedded LO VC can vary plus the corresponding pointer. The following TU are distinguished : TU 11 , TU 12 , TU 2 , TU 3 . TRIBUTARY UNIT GROUP Before being interleaved in the higher order container, the TU are combined into a group , ie,byte interleaved. Such a group is called a TUG. The following TUG have been defined: TUG 2 , TUG 3
ADMINISTRATIVE UNIT The component of the STM-1 frame within which the VC is able to float is termed as administrative unit. The corresponding pointer is called the AU-pointer. It is possible to transmit the following AU in the STM-1 frame: 1 X AU 4 3 X AU 3 ADMINISTRATIVE UNIT GROUP
VC-11
VC-12
VC-2
VC-3
VC-3
VC-4
Section Layer
Synchronous Technology
Master Clock SDH MUX SDH MUX
STM1/4/16/64
SDH MUX
1 . . . . . . 63
SDH MUX
1 . . . . . . 63
TMN
SDH Interfaces
140 Mbps 45 Mbps 34 Mbps 6 Mbps 2 Mbps 1.5 Mbps LAN FDDI ATM MAN ISDN ISDN-B Any Speed (TU-n)
STM-1
STM-4
622.08
STM-16 STM-64
2488.32 9953.28
Multiplexing Structure
Terminal Multiplexer
Add/Drop Multiplexer
Regenerator
POINT TO POINT
TRIBUTARY SIDE LINE SIDE TRIBUTARY SIDE
WORKING PATH
TERMINAL MULTIPLEXER
TERMINAL MULTIPLEXER
PROTECTION PATH
RING TOPOLOGY
TRIBUTARY SIDE ADM WEST EAST
TRIBUTARY SIDE
EAST ADM
WEST
TRIBUTARY SIDE
MESH TOPOLOGY
ALARMS
A la rm T e s t a t S T Mo rt -N p
L O S /L O F (J 0 ) R S-T IM (B 1 ) B IP E rr. (K 2 ) (B 2 ) (M 1 ) (K 2 )
H ig her O rd er P a th
L ow er O rder P a th
"1 " A IS
"1 " H P-U N E Q H P-T IM H P-B IP E rr. H P-R E I H P-R D I T U-A IS T U-L O P LO M H P-P L M L P-U N E Q L P-T IM LP-B IP E rr. L P-R E I LP-R D I LP-P LM "1 " A IS "1 " "1 " A IS
(C 2 ) (J1 ) (B 3 ) (G 1 ) (G 1 )
(H 4 ) (C 2 ) (V 5 ) (J2 ) (V 5 ) (V 5 ) (V 5 ) (V 5 )
"1 " A IS
TIMING SOURCES
FOR RING CONNECTIONS MULTIPLEX SECTION SHARED PROTECTION RING (MS-SPRING) SUB NETWORK PROTECTION (SNC)
1+1 protection scheme the working channel is permanently bridged to the W & P path.
In
1:1 protection scheme the working channel is not permanently bridged to the W & P path and extra traffic is possible on the Protection path.
In
MS shared protection rings, the working channels carry the normal traffic signals to be protected while the protection channels are reserved for protection of this service. Protection channels may be used to carry extra traffic when not being used for protection of normal traffic. Normal traffic signals are transported bidirectional over spans. The pair of tributaries (incoming and outgoing) only uses capacity along the spans between the nodes where the pair is added and dropped. Switch action by using the APS bytes (K1 and K2 bytes in the MSOH of the protection section).
protection is a linear protection scheme which can be applied on an individual basis to VC-n signals. Sub network connection protection is a dedicated protection mechanism that can be used on any physical structure (i.e. meshed, rings, or mixed). It may be applied at any path layer in a layered network. SNC protection operates in a unidirectional protection switching manner. 1+1 Uni-directional protection switching is generally used. In this architecture, there is no APS channel required.
Customer 3 = 100M
Customer 2 = 60M
time
...too small !
OR
2.176 Mbit/s
VC Nomenclature
VC-n -X v
Virtual Container n n=4, 3, 2, 12, 11
Defines the type of virtual containers, which will be virtually concatenated.
v = virtual concat All X Virtual Containers c = contiguous concat form together the Virtual Concatenated Group (VCG)
STM-16
MSOH
VC-4-13
The blocks can start at any position in the payload The block consists of distributed VC-ns Each container has its own pointer
STM-1 = 64 x VC-12
MANAGEMENT FUNCTIONS
The functions of a TMN are : operation,administration, maintenance, and provisioning (OAM&P). This includes monitoring of network performance and checking of error messages. SDH includes a management layer where the communication is through the data communication channel (DCC) time slots (D1 D12) in the interface rate. Channels D1 to D3 with a capacity of 192 kbps (DCCp) are used for SDH-specific NE management. Channels D4 to D12 with a capacity of 576 kbps (DCCm) can be used for non SDH-specific purposes.
NMS
EMS
EMS
Ring 1
Ring 2
LCT
OPTICAL FIBRE
An optical fiber is made of very thin glass rods composed of two parts:the inner portion of the rod or core and the surrounding layer or cladding.Light injected into the core of a glass fiber will follow the physical path of that fiber due to the total internal reflection of the light between the core and the cladding. A plastic sheathing around the fiber provides the mechanical protection.
TYPES OF FIBRE
MULTIMODE FIBER Multimode fiber, due to its large core, enables different paths (multi-modes) to transmit the light along the link. The primary advantages of multimode fiber are its ease of coupling to light sources and to other fibers, connectorization and splicing. The disadvantage is its relative higher attenuation and/or low bandwidth. The reduced core diameter limits the light to propagation of only one mode, eliminating modal dispersion completely. The advantage of single mode fiber is its higher performance with respect to bandwidth and attenuation.
MULTIMODE FIBER
Connector Types Straight physical contact (PC) Slanted (angled) physical contact (APC) Straight air gap Straight physical contact (PC)
The fiber ends are pressed together in the connector. There is no air gap left to cause reflections. The return loss is 30 55 dB. This is the most common connector for single mode fibers (for example FC/PC, ST, SC/PC, DIN, HMS, E 2000 connectors).
In these connectors the ends of the fibers are slanted.Again no air gap is left. This gives the best return loss(60-80 dB). These connectors are used for high-speed telecom and CATV links (for example FC/APC, SC/APC, E 2000-HRL connectors).
Inside these connectors there is a small air gap between the two fiber ends. Their return loss is less than 14 dB andthe reflection is fairly high. Straight air gap connectors, for example ST connectors, are used for multimode fibers.
Attenuation
Dispersion
Loss mechanism
Bandwidth Limitation
TRANSMITTER PARAMETERS
MEAN LAUNCHED POWER
The mean launched power is the average power of a pseudo-random data sequence coupled into the fibre by the transmitter. The Extinction ratio (EX) is defined as: EX = 10 log A/B where A is the average optical power level for a logical "1" and B is the average optical power level for a logical "0".
EXTINCTION RATIO
General transmitter pulse shape characteristics including rise time, fall time,pulse overshoot, pulse undershoot, and ringing, all of which should be controlled to prevent excessive degradation of the receiver sensitivity, are specified in the form of a mask of the transmitter eye diagram
RECEIVER PARAMETERS
RECEIVER SENSITIVITY
Receiver sensitivity is defined as the minimum acceptable value of average received power at to achieve a 1 10-10 BER. Receiver overload is the maximum acceptable value of the received average power at point R for a 1 10-10 BER. Reflections from the receiver back to the cable plant are specified by the maximum permissible reflectance of the receiver.
RECEIVER OVERLOAD
RECEIVER REFLECTANCE
OPTICAL LASER SOURCE AND POWER METER A light source is a device used as a continuous and stable source (CW) for attenuation measurements. The power meters main function is to display the incident power on the photodiode.
Talk sets
Talk sets transmit voice over installed fiber cable, allowing technicians splicing or testing the fiber to communicate, even when they are in the field.
OTDR An OTDR (Optical Time Domain Reflectometer) is a fiber optic tester characterizing fibers and optical networks. The aim of this instrument is to detect, locate and measure events at any location in the fiber link. One of the main benefits of the OTDR is that it can fully test a fiber from only one end.
SDH Measurements
Summary of Typical Tests
Functional Tests Error-free Transmission (via all Paths through NE) Protection Switching test Order wire calling Automatic Laser Shutdown Ethernet testing Parametric Tests Optical Power ( transmitter ) Optical Sensitivity and overload ( receiver ) Electrical tributaries Line rate tolerance
Functional Tests
Functional Tests Error-free Transmission (via all Paths through NE) Protection Switching test Order wire calling Automatic Laser Shutdown Ethernet testing Ethernet traffic generator / PCs Instrument used SDH Analyser SDH Analyser
Parametric Tests
Parametric Tests Optical Power ( transmitter ) Optical Sensitivity and overload ( receiver ) Electrical tributaries Line rate tolerance Instruments used Optical power meter Optical power meter, Optical attenuator,SDH Analyser SDH Analyser